support 24/7
Subscribe!
Home » technology » sexting is a modern trend in conversation research

Sexting is a modern trend in conversation research

Child Porn material, Pornography, Gender Communication, Sexual intercourse Offenders

Excerpt from Study Paper:

Sexting is known as a modern pattern in communication that elevates a number of legal and moral issues. The term itself is a portmanteau of “sex” and “texting, inches the latter referring to the sending of communications either using a smartphone or perhaps online through texting application. The sexual element consists of a wide variety of activities, but of most concern may be the “digital exchange of sexually explicit photos between teens using txt messaging services about camera-equipped cellular phones (Eraker, 2000) or on their laptop computers using messaging services and the integrated cameras. Sexting among consenting adults is usually not considered an issue worth addressing, but when those under 18 are involved this can be a significant issue covering several different subjects, including law, education and sociable work. This paper will begin with a initial study with the literature on sexting, and then propose aimed research on the subject.

Mitchell, Finkelhor, Jones Wolak (2011) seen in their research that situations of sexting are relatively low, but still in significant numbers. Within their study, six. 1% of respondents outdated 10 through 17 said that they had received nude or perhaps nearly pictures images more; and your five. 9% said that they had received sexually direct images. Further, 2 . 5% said that that were there appeared in or developed nude photos or video clips, and 1% had done appeared in or developed sexually direct content. Some other sources put the amounts much higher (Celizic, 2009).

Coming from a cultural perspective, anecdotal evidence shows that sexting can be very harmful to a few participants. Celizic (2009) pertains the story of 1 teenaged woman who sent nude pictures of himself to her man. When that relationship finished, he given away the images to other women, and those ladies began harassing the patient. The sufferer eventually committed suicide due to bullying. A search of news reviews on the subject shows that this standard scenario has been repeatedly recurrent, with suicide often the finishing for the victim.

Dark brown, Keller and Stern (2009) note that young adults spend 6-7 hours per day interacting with diverse media varieties. They often employ “the Internet to find sex health information, and social networking expressing sexual personality and wants, and to find and maintain relationships. ” Sexting is a organic result of this, perhaps while teens are less capable of compartmentalizing. They see on the web media forms and instantaneous messaging not only as being a natural part of life, but as an extension of their identity. In the event that they want to express themselves sexually, for many teens it is common to use the Internet or instantaneous messaging as a medium. Most teens are likely unaware of the consequences in the same manner that adults, having discovered the Internet instead of having been elevated from labor and birth with that, are.

By a legal standpoint, sexting has also become a significant issue in recent years. Wastler (2010) notes that “creating, having or distributing sexually explicit photographs of a minor, even when self-produced, may possibly violate federal and state child porn material statutes. inch She notes that while child pornography laws and regulations were enacted to address different crimes, images from sexting would not become exempt below current legislation. Sexting constitutes a deviation via norms with regards to child porn material cases, yet , in that the child involved is typically involved voluntarily in the production of the fabric, and it is typically minors who are in possession of the fabric and distributing the material. In addition, child porn material laws tend not to in any way address the consequences of bullying associated with sexting.

Richards and Calvert (2009) examine some of the circumstances that emerged with respect to the using the law. They will note that prosecutors have pursued legal actions against the teenagers who made the material, and teens whom possessed the fabric

< Prev post Next post >

Find Another Essay On Exploiting My Strengths and Strengthening My Weaknesses

Energy sources power source fuel fossil fuel

Energy, Renewable Energy, Fossil Fuel, Elemental Energy Research from Composition: Energy Sources: Energy Source Gas (Coal)/Uranium Required (tons) CARBON DIOXIDE Emissions Sulfur Dioxide and also other Emissions (tons) Radioactivity mSv ...

Innovation the world in which term paper

Pablo Picasso, 3m, Entrepreneur, Trust Excerpt from Term Conventional paper: We can never tell might have been with Pablo Picasso’s talent in the event not for this sort of strict ...

Chemical reaction s observations and analysis

Reaction Prices can be assessed by deciding the amount of the item formed each minute time. Each of our group observed the reaction. The ions in iodate ion (Solution A) ...

Mobile technology the ever increasing number of

I phone, Paramedic, Egyptian Revolution, Medical Technology Excerpt from Essay: Cellular Technology The ever-increasing range of smart devices and the mobilization of technology in general features precipitated a number of ...

Future energy guiding decisions evidence as a way

Solar powered energy, Renewable Energy, Strength, Solar Power Excerpt from Essay: Future Energy: Leading Decisions Data in order decrease negative environmental impacts developing human population increasing demands strength technological advances ...

Grid connected photo voltaic pv devices though

Breathing, Solar System, The Solar System, Hazardous Materials Excerpt from Exploration Paper: Batteries are routine in specific household systems. Inverters may help, though their particular technology is definitely not standard. ...

Operating systems requirements of my own company

Operating Systems, Barullo Systems, Internet Conferencing, Google android Excerpt from Marketing Strategy: Operating Systems Requirements of my Organization To keep up in a significantly competitive globe, my own company must ...

Information warfare and terrorism term newspaper

Cybersecurity, Web Security, Spain, Attack Research from Term Paper: Warfare Terrorism The proliferation of cyberattacks – appropriately referred to as cyberterrorism – completed by criminal miscreants with grudges, shadowy techies ...

Sociology observational analysis of cultural term

Norms, Sociological Point of view, Subculture, Principle Analysis Research from Term Paper: There is some suggestion upon observation that numerous students of the dominant usual on grounds do not participate ...

Dna and criminal forensics essay

Forensics And Dna, Forensic Science, Forensics, Forensic Evidence Research from Article: GENETICS has increased the Forensics Field Since technology and science have progressed, DNA evidence and its particular use within ...
Category: Technology,
Words: 667

Published: 03.26.20

Views: 345

A+ Writing Tools
Get feedback on structure, grammar and clarity for any essay or paper
Payment discover visa paypalamerican-express How do we help? We have compiled for you lists of the best essay topics, as well as examples of written papers. Our service helps students of High School, University, College