support 24/7
Subscribe!
Home » technology » sexting is a modern trend in conversation research

Sexting is a modern trend in conversation research

Child Porn material, Pornography, Gender Communication, Sexual intercourse Offenders

Excerpt from Study Paper:

Sexting is known as a modern pattern in communication that elevates a number of legal and moral issues. The term itself is a portmanteau of “sex” and “texting, inches the latter referring to the sending of communications either using a smartphone or perhaps online through texting application. The sexual element consists of a wide variety of activities, but of most concern may be the “digital exchange of sexually explicit photos between teens using txt messaging services about camera-equipped cellular phones (Eraker, 2000) or on their laptop computers using messaging services and the integrated cameras. Sexting among consenting adults is usually not considered an issue worth addressing, but when those under 18 are involved this can be a significant issue covering several different subjects, including law, education and sociable work. This paper will begin with a initial study with the literature on sexting, and then propose aimed research on the subject.

Mitchell, Finkelhor, Jones Wolak (2011) seen in their research that situations of sexting are relatively low, but still in significant numbers. Within their study, six. 1% of respondents outdated 10 through 17 said that they had received nude or perhaps nearly pictures images more; and your five. 9% said that they had received sexually direct images. Further, 2 . 5% said that that were there appeared in or developed nude photos or video clips, and 1% had done appeared in or developed sexually direct content. Some other sources put the amounts much higher (Celizic, 2009).

Coming from a cultural perspective, anecdotal evidence shows that sexting can be very harmful to a few participants. Celizic (2009) pertains the story of 1 teenaged woman who sent nude pictures of himself to her man. When that relationship finished, he given away the images to other women, and those ladies began harassing the patient. The sufferer eventually committed suicide due to bullying. A search of news reviews on the subject shows that this standard scenario has been repeatedly recurrent, with suicide often the finishing for the victim.

Dark brown, Keller and Stern (2009) note that young adults spend 6-7 hours per day interacting with diverse media varieties. They often employ “the Internet to find sex health information, and social networking expressing sexual personality and wants, and to find and maintain relationships. ” Sexting is a organic result of this, perhaps while teens are less capable of compartmentalizing. They see on the web media forms and instantaneous messaging not only as being a natural part of life, but as an extension of their identity. In the event that they want to express themselves sexually, for many teens it is common to use the Internet or instantaneous messaging as a medium. Most teens are likely unaware of the consequences in the same manner that adults, having discovered the Internet instead of having been elevated from labor and birth with that, are.

By a legal standpoint, sexting has also become a significant issue in recent years. Wastler (2010) notes that “creating, having or distributing sexually explicit photographs of a minor, even when self-produced, may possibly violate federal and state child porn material statutes. inch She notes that while child pornography laws and regulations were enacted to address different crimes, images from sexting would not become exempt below current legislation. Sexting constitutes a deviation via norms with regards to child porn material cases, yet , in that the child involved is typically involved voluntarily in the production of the fabric, and it is typically minors who are in possession of the fabric and distributing the material. In addition, child porn material laws tend not to in any way address the consequences of bullying associated with sexting.

Richards and Calvert (2009) examine some of the circumstances that emerged with respect to the using the law. They will note that prosecutors have pursued legal actions against the teenagers who made the material, and teens whom possessed the fabric

< Prev post Next post >

Find Another Essay On Exploiting My Strengths and Strengthening My Weaknesses

Revolutions the history of modern individual

Human Anatomy, Commercial Revolution, France Revolution, Global Civilization Excerpt from Term Paper: Revolutions A brief history of modern man civilization displays the progressive evolution of thoughts, suggestions, political reform, and ...

Firewalls wonderful network protection devices but

Port Security, Cisco Devices, Wireless Network, Security Breach Excerpt by Term Daily news: Firewalls: Great Network Security Devices, but Not a “Silver Bullet” Solution In construction, a firewall is known ...

Community safety and crime reduction an assessment

Community Resources, Criminal offense Prevention, Conflict Crime, Security Excerpt from Essay: Community Protection and Offense Reduction: An Evaluation of the Role of New Technology Recent technological advances include effectively altered ...

Technology and management functions the term

Technology Effects, Data Warehousing, Technology And Education, I . t Excerpt coming from Term Newspaper: inch (Wu, 2005) III. DETAILS Management like a Business FUNCTION The work of Nancy T. ...

Nascar in november 2005 nascar term paper

Mice And Men, Previously, Drunk Driving, National Football League Excerpt coming from Term Newspaper: As a result meeting, the National Affiliation for Stock Car Auto Racing was developed, and Italy, ...

What it takes to become a database administrator

Unix, Cybersecurity, Internet Security, As You Like It Research from Term Paper: Database Administrator What It Takes To become Database Officer A databases can be defined as an organized variety ...

Director details security there is now essay

Database Secureness, Business Continuity, Security Breach, Private Reliability Excerpt coming from Essay: Director of Information Security There is a need innovating to create a better-sophisticated system of secureness that can ...

Cloud computer on database software research daily

Relational Database, Disruptive Innovation, Data source Security, Consumer Relationship Management Excerpt by Research Paper: Impair computing applications often must have a 99. 999% uptime as consumers use them immediately over ...

Mobile and wireless web site eweek com is a

Wireless, Cellular Technology, Iphone, Website Evaluation Excerpt via Essay: Mobile and Wireless Site eWeek. com is a one of the top portals that is focused on providing technology-related news to ...

Game of dominoes we all essay

Ethnographic, Analytical, Big Black Very good Man, Human Brain Excerpt via Essay: Sometimes everybody draws nine bones. Usually, in Dominican rules, if one gamer is blocked, he simply cannot play, ...
Category: Technology,
Words: 667

Published: 03.26.20

Views: 609

A+ Writing Tools
Get feedback on structure, grammar and clarity for any essay or paper
Payment discover visa paypalamerican-express How do we help? We have compiled for you lists of the best essay topics, as well as examples of written papers. Our service helps students of High School, University, College