support 24/7
Subscribe!
Home » technology » sexting is a modern trend in conversation research

Sexting is a modern trend in conversation research

Child Porn material, Pornography, Gender Communication, Sexual intercourse Offenders

Excerpt from Study Paper:

Sexting is known as a modern pattern in communication that elevates a number of legal and moral issues. The term itself is a portmanteau of “sex” and “texting, inches the latter referring to the sending of communications either using a smartphone or perhaps online through texting application. The sexual element consists of a wide variety of activities, but of most concern may be the “digital exchange of sexually explicit photos between teens using txt messaging services about camera-equipped cellular phones (Eraker, 2000) or on their laptop computers using messaging services and the integrated cameras. Sexting among consenting adults is usually not considered an issue worth addressing, but when those under 18 are involved this can be a significant issue covering several different subjects, including law, education and sociable work. This paper will begin with a initial study with the literature on sexting, and then propose aimed research on the subject.

Mitchell, Finkelhor, Jones Wolak (2011) seen in their research that situations of sexting are relatively low, but still in significant numbers. Within their study, six. 1% of respondents outdated 10 through 17 said that they had received nude or perhaps nearly pictures images more; and your five. 9% said that they had received sexually direct images. Further, 2 . 5% said that that were there appeared in or developed nude photos or video clips, and 1% had done appeared in or developed sexually direct content. Some other sources put the amounts much higher (Celizic, 2009).

Coming from a cultural perspective, anecdotal evidence shows that sexting can be very harmful to a few participants. Celizic (2009) pertains the story of 1 teenaged woman who sent nude pictures of himself to her man. When that relationship finished, he given away the images to other women, and those ladies began harassing the patient. The sufferer eventually committed suicide due to bullying. A search of news reviews on the subject shows that this standard scenario has been repeatedly recurrent, with suicide often the finishing for the victim.

Dark brown, Keller and Stern (2009) note that young adults spend 6-7 hours per day interacting with diverse media varieties. They often employ “the Internet to find sex health information, and social networking expressing sexual personality and wants, and to find and maintain relationships. ” Sexting is a organic result of this, perhaps while teens are less capable of compartmentalizing. They see on the web media forms and instantaneous messaging not only as being a natural part of life, but as an extension of their identity. In the event that they want to express themselves sexually, for many teens it is common to use the Internet or instantaneous messaging as a medium. Most teens are likely unaware of the consequences in the same manner that adults, having discovered the Internet instead of having been elevated from labor and birth with that, are.

By a legal standpoint, sexting has also become a significant issue in recent years. Wastler (2010) notes that “creating, having or distributing sexually explicit photographs of a minor, even when self-produced, may possibly violate federal and state child porn material statutes. inch She notes that while child pornography laws and regulations were enacted to address different crimes, images from sexting would not become exempt below current legislation. Sexting constitutes a deviation via norms with regards to child porn material cases, yet , in that the child involved is typically involved voluntarily in the production of the fabric, and it is typically minors who are in possession of the fabric and distributing the material. In addition, child porn material laws tend not to in any way address the consequences of bullying associated with sexting.

Richards and Calvert (2009) examine some of the circumstances that emerged with respect to the using the law. They will note that prosecutors have pursued legal actions against the teenagers who made the material, and teens whom possessed the fabric

< Prev post Next post >

Find Another Essay On Exploiting My Strengths and Strengthening My Weaknesses

Job evaluation report product sales

Excerpt via Term Conventional paper: Task Analysis Record Sales Reps At Circuit Job brief summary: Sales representatives play a significant role generally in most organizations. All of us visited Outlet, ...

Role of social media in business marketing essay

Social Media, Fb, Photographic, Role Model Research from Dissertation: social websites strategies for organization through the performs of published commentators on the phenomenon (Mendelson, Haydon) and through two case studies, ...

Mobile technology the ever increasing number of

I phone, Paramedic, Egyptian Revolution, Medical Technology Excerpt from Essay: Cellular Technology The ever-increasing range of smart devices and the mobilization of technology in general features precipitated a number of ...

Heat exchanger technology and applications in heat

Engineering, Temperature Over the years, all the parts of a industrial refrigerator, such as the compressor, high temperature exchangers, refrigerant, and product packaging, have been better considerably due to the ...

Director details security there is now essay

Database Secureness, Business Continuity, Security Breach, Private Reliability Excerpt coming from Essay: Director of Information Security There is a need innovating to create a better-sophisticated system of secureness that can ...

How isps code provides impacted maritime security

Port Reliability, Cyber Secureness, Cybersecurity, Singapore Excerpt from Essay: ISPS Code on Ocean going Security Shipping and delivery is a business that has knowledgeable rapid development in the past five ...

Virtual training in corporate america research

Info Mining, Athletic Training, Military Training, Schooling Excerpt from Research Paper: Electronic Training in Corporate and business America Characteristics Organizational Variety The Geography of Virtual Training The Virtual Teaching Campus ...

Internet and social networks affect term

Myspace, Sports, Anne Honest, Drunk Driving Excerpt from Term Paper: The most successful of these cross strategies can be David Beckham and his method to making sure his personality pervades ...

Determining of methylmercury in human curly hair

Test In this article, the experiment is to determine methylmercury in man hair by simply capillary GC with electron capture recognition. Curly hair is one of the main accumulation sites ...

Security information security and risk management

Details Assurance, Protection Principles, Secureness, National Security Excerpt by Term Conventional paper: SECURENESS Information Secureness and Risikomanagement in THIS This dissertation is designed to present and talk about both a ...
Category: Technology,
Words: 667

Published: 03.26.20

Views: 576

A+ Writing Tools
Get feedback on structure, grammar and clarity for any essay or paper
Payment discover visa paypalamerican-express How do we help? We have compiled for you lists of the best essay topics, as well as examples of written papers. Our service helps students of High School, University, College