support 24/7
Subscribe!
Home » technology » sexting is a modern trend in conversation research

Sexting is a modern trend in conversation research

Child Porn material, Pornography, Gender Communication, Sexual intercourse Offenders

Excerpt from Study Paper:

Sexting is known as a modern pattern in communication that elevates a number of legal and moral issues. The term itself is a portmanteau of “sex” and “texting, inches the latter referring to the sending of communications either using a smartphone or perhaps online through texting application. The sexual element consists of a wide variety of activities, but of most concern may be the “digital exchange of sexually explicit photos between teens using txt messaging services about camera-equipped cellular phones (Eraker, 2000) or on their laptop computers using messaging services and the integrated cameras. Sexting among consenting adults is usually not considered an issue worth addressing, but when those under 18 are involved this can be a significant issue covering several different subjects, including law, education and sociable work. This paper will begin with a initial study with the literature on sexting, and then propose aimed research on the subject.

Mitchell, Finkelhor, Jones Wolak (2011) seen in their research that situations of sexting are relatively low, but still in significant numbers. Within their study, six. 1% of respondents outdated 10 through 17 said that they had received nude or perhaps nearly pictures images more; and your five. 9% said that they had received sexually direct images. Further, 2 . 5% said that that were there appeared in or developed nude photos or video clips, and 1% had done appeared in or developed sexually direct content. Some other sources put the amounts much higher (Celizic, 2009).

Coming from a cultural perspective, anecdotal evidence shows that sexting can be very harmful to a few participants. Celizic (2009) pertains the story of 1 teenaged woman who sent nude pictures of himself to her man. When that relationship finished, he given away the images to other women, and those ladies began harassing the patient. The sufferer eventually committed suicide due to bullying. A search of news reviews on the subject shows that this standard scenario has been repeatedly recurrent, with suicide often the finishing for the victim.

Dark brown, Keller and Stern (2009) note that young adults spend 6-7 hours per day interacting with diverse media varieties. They often employ “the Internet to find sex health information, and social networking expressing sexual personality and wants, and to find and maintain relationships. ” Sexting is a organic result of this, perhaps while teens are less capable of compartmentalizing. They see on the web media forms and instantaneous messaging not only as being a natural part of life, but as an extension of their identity. In the event that they want to express themselves sexually, for many teens it is common to use the Internet or instantaneous messaging as a medium. Most teens are likely unaware of the consequences in the same manner that adults, having discovered the Internet instead of having been elevated from labor and birth with that, are.

By a legal standpoint, sexting has also become a significant issue in recent years. Wastler (2010) notes that “creating, having or distributing sexually explicit photographs of a minor, even when self-produced, may possibly violate federal and state child porn material statutes. inch She notes that while child pornography laws and regulations were enacted to address different crimes, images from sexting would not become exempt below current legislation. Sexting constitutes a deviation via norms with regards to child porn material cases, yet , in that the child involved is typically involved voluntarily in the production of the fabric, and it is typically minors who are in possession of the fabric and distributing the material. In addition, child porn material laws tend not to in any way address the consequences of bullying associated with sexting.

Richards and Calvert (2009) examine some of the circumstances that emerged with respect to the using the law. They will note that prosecutors have pursued legal actions against the teenagers who made the material, and teens whom possessed the fabric

< Prev post Next post >

Find Another Essay On Exploiting My Strengths and Strengthening My Weaknesses

Brine shrimp wal mart retailers inc term paper

Data Exploration, Wal Mart, Counterfeit, Global Supply Cycle Excerpt from Term Paper: inch Wal-Mart uses high technology to effectively plan and schedule employees shifts. At present, Wal-Mart provides 1 . ...

Dell com analysis the actual the internet supplies

Disruptive Creativity, Head Start, Facebook, Advantages Of Net Excerpt coming from Essay: Dell. com Analysis The potential the Internet provides businesses to scale their particular supply organizations, manufacturing, completion, services ...

Business report apple computers term daily news

Nano Technology, Annual Survey, Steve Careers, Inaugural Talk about Excerpt by Term Paper: (Apple iPhone: Revolutionary Phone) Earnings and Earnings Loss to get 2005: Intended for the fiscal year june ...

Oxygen intended for spirits

Energy, Heart, Spirituality Initial thing to understand about demons and other spirits is they dont completely exist in the mortal realm. That is, without help they do not have a ...

Technology had been leading to changes in essay

Texting, Digital, Technology, Technology And Education Excerpt from Essay: technology have been resulting in transformations in how people are interacting with each other. This is certainly taking place, through various ...

Mobile technology the ever increasing number of

I phone, Paramedic, Egyptian Revolution, Medical Technology Excerpt from Essay: Cellular Technology The ever-increasing range of smart devices and the mobilization of technology in general features precipitated a number of ...

Director details security there is now essay

Database Secureness, Business Continuity, Security Breach, Private Reliability Excerpt coming from Essay: Director of Information Security There is a need innovating to create a better-sophisticated system of secureness that can ...

Information warfare and terrorism term newspaper

Cybersecurity, Web Security, Spain, Attack Research from Term Paper: Warfare Terrorism The proliferation of cyberattacks – appropriately referred to as cyberterrorism – completed by criminal miscreants with grudges, shadowy techies ...

Community safety and crime reduction an assessment

Community Resources, Criminal offense Prevention, Conflict Crime, Security Excerpt from Essay: Community Protection and Offense Reduction: An Evaluation of the Role of New Technology Recent technological advances include effectively altered ...

Apple distributor management composition

Classroom Supervision, Global Supply Chain, Sustainability, Excel Excerpt from Dissertation: Apple: Challenges of a Global Source Chain Offered the accelerating pace of its cool product development and introduction cycles, success ...
Category: Technology,
Words: 667

Published: 03.26.20

Views: 520

A+ Writing Tools
Get feedback on structure, grammar and clarity for any essay or paper
Payment discover visa paypalamerican-express How do we help? We have compiled for you lists of the best essay topics, as well as examples of written papers. Our service helps students of High School, University, College