Rhode Island Cyberstalking and Cyberharassment law

Stalking is a major concern all across the globe and with the advancement in technology digital forms of stalking has become one of the serious issues. Some of the common platforms used by cyber stalkers are Emails, Blogs, Websites, Facebook, Twitter etc.., Cyberstalking is a criminal offense in many states and California was the first state to enact a specific stalking law in the year 1990. Since that time, all the 50 states has enacted stalking laws.

According to Rhode Island Cyber law, section 11-52-4.2 extensively addresses the cyberstalking and cyberharassment issues. Any individual using internet or any other electronic device to contact any person for the sole reason of seriously alarming, annoying or bothering the person with no legitimate purpose is defined as the cyberstalking or cyberharrasment as per the section 11-52-4.2. Series of actions performed over a period of time that would cause a reasonable person to suffer substantial emotional distress, or be in fear of bodily injury is also termed as cyberstalking or cyberharassment according to § 11-52-4.2.

Cyberstalking and Cyberharassment charges can impact reputation, employment, and also freedom. Individual who intentionally cyberstalks are charged with first misdemeanor offense under RI law. Accused can be charged with an imprisonment of a year and a fine up to 500$. A second or subsequent conviction can be charged as felony. Felony offense can be punishable by imprisonment for not more than 2 years or by a fine of more than 6000$ or both. According to the Rhode Island restraining order, section 11-52-4.3 a subsequent conviction of felony can also be charged with imprisonment for not more than 5 years, by a fine of 10,000$ or both. Stalking law is strictly enforced in Rhode Island. In addition to the mentioned penalties, individuals who are convicted under RI cyber stalking law will also be stripped from their gun rights.

Pranitha – Cyberstalking refers to harassment over the internet(world wide web) utilizing diverse modes of transmission including electronic mail (e-mail), chat rooms, newsgroups, mail chains. Cyberstalkers typically have a tendency to attain personal facts pertaining to their victims, together with home addresses, mobile and domestic phone numbers and commonly harass the victims. To save such acts Cyberspace law is developing daily which encompasses all instances and constitutional provisions that impact human beings with many groups in cyberspace globally. The distinct additives of cyberspace law often encompass jurisdiction and freedom of expression.
Cyberstalking in the main may be charged and falls under New Jersey’s cyber harassment regulation when the crime includes generally the movements which take region in a digital format this is supposed to annoy the sufferer. This crime kind of crime may be described as making threats to inflict injury or harm on the victim or the sufferer’s property, and knowingly/intentionally sending substances intended to emotionally disturb the sufferer or put the sufferer in high quantity of fear of physical or emotional damage which can be directed in opposition to the sufferer. Few instances encompass posting abusive messages and posts on a social media platform or sending threatening textual content messages to a sufferer which might emotionally hassle them.

Stalking is a crime of the fourth degree but increases to a crime of the third degree when the offense occurs in violation of a restraining or similar court order so more awareness about it must be spread by Organizations and government to prevent it.

Task 2:

Attacks on our national infrastructure are already happening. And the expectation is that they will continue to increase at an accelerated rate. For this week’s discussion, we’ll cover threats to our nation’s pipelines. To get started, read this article:

https://www.eenews.net/stories/1060054924

After reading the article, start a discussion thread and discuss how the types of threats discussed in the article could impact our economy, and how implementing Diversity and Commonality (as discussed in chapters 5) could help mitigate these threats.

Sample Solution

The post Rhode Island Cyberstalking and Cyberharassment law appeared first on homework handlers.

3 Questions

 

Q1: What is the definition of project management? How is project management different from program management? What are some of the selection criteria used in support of starting a project? What is the difference between a revenue bearing project versus a capital project? Give an example.

DQ2: What is the role of a project manager? What are their responsibilities? Would you want to be a project manager? Why or why not?

DQ3: Project teams can be geographically dispersed and composed of different cultures. What are some of the challenges with culturally dispersed project teams? What are some of the benefits derived from culturally dispersed project teams? What is the relationship between multicultural communications and managerial behavior? Have you experienced a multicultural business environment?

600 words. APA style.

Required text:

 Kloppenborg, Timothy J. (2012). Contemporary project management (2nd ed.). Thompson Learning. ISBN: 978-0-538- 47702-4 

Serving Vulnerable Populations

Imagine you are a community health nurse assigned to care for a family with a newly diagnosed type-2 diabetic member. The diabetic family member, JK, is a 66-year-old African American woman with hypertension and asthma. JK lives in a food desert and does not drive. JK’s family visits her weekly, but they have complicated lives and are unable to provide daily care for her.Evaluate the following community health resources for JK’s situation:
United States Department of Agriculture
Food Access Research Atlas Overview
Food Access Research Atlas Map
CDC
A Look Inside Food Deserts
Small Food Stores and Availability of Nutritious Foods
State Health Statistics
American Nutrition Association
USDA Defines Food Deserts
Create a plan detailing opportunities for JK to gain adequate access to appropriate foods for 1 week. Your plan must:
Create an appropriate and realistic estimated budget.
Identify shopping locations.
Map out transportation means, routes, and timing.
Define and explain support services.

Sample Solution

The post Serving Vulnerable Populations appeared first on homework handlers.

Current Event Discussion

  

Current Event Project- How it works..

The class is divided into teams. This is not a group assignment; teams are assigned for scheduling purposes. Each member of the team will be completing their own current event. To see what team you have been assigned to check the table in this assignment. Each member of a particular team will find a current event article, create a mind map, and write a summary of the article that includes at least 3 discussion questions for the class and a link to the original current event. The team member will submit their current event summary and mind map as an electronic assignment in BlackBoard They will also post their summary, link and mind map to the discussion board for the class to read and discuss the next week. This way every week there will be 4 or 5 current events summaries for the class to read and discuss.

Choose a current event article of your choice pertaining to ethics in information technology. Examples of current topics in the news: 

Copyright 

Two Factor Authentication  Licensing 

Deep Packet Inspection Skimming

Identity theft NSA

Censorship and the internet  Certification

Cyber bullying  Phishing

Violent computer games   Spamming

Privacy issues?  Spyware

Surveillance  Spam 

Workplace monitoring  Cookies 

Recognition software  Blogs

National Ids  Whistle Blowers

Consumer Profiling  E-waste 

Global positioning (GPS)  Face book / My Space

Radio Frequency Id tags  Encryption 

USA Patriot Act of 2001  Encryption 

Computer Viruses  Worms, Trojan horses

Create a mind map. A mind map or concept map is just a colorful, visual, graphical representation of the main ideas of your article. If another student was to look at your mind map they would be able to quickly see what your article was about. There is an example of a well done current event and article in the Current Event folder. Your mind map does not have to be as elaborate as the example. One PowerPoint slide with photos, graphics and text is fine. Please note it is not a flow chart. Make sure your topic is original (no one else has presented this current event article, so check with the members of your team so you are not choosing the same article). Your task is to make connections between concepts presented in class and a “real-life” example found in the news. This assignment requires close reading of the news items you choose and summarizing your analysis in a coherent way to the rest of the class. Include a mind map and several follow-up questions. 

Tips 

Be selective in your choice of articles. Find one that is substantive but not excessively long or complicated. Avoid tabloids, theme or genre publications, and web sources that are not credible. Use articles from current technical and business publications (preferably online). Ask me if you are unsure of your choice. (NO WIKIPEDIA!)  

Think contemporary, not ancient. While your article doesnt have to have been written in the week of your current event, try to pick something that was written in the past year. Make connections between the issue/event you have chosen and a concept or concepts from one or more of our readings for the week.
Ideally, your current event will lead us into a discussion of our topic on the discussion board. You must create a mind map; write a summary of your article which includes some discussion questions and a link to the current event article. POST THIS TO THE CURRENT EVENT DISCUSSION BOARD. ALSO SUBMIT IT IN THE ASSIGNMENT FILES SECTION ON BB. It is due at the end of the week your team was assigned the current event project. 

Remember to:

  1. create a mind map

2. summarize and analyze your current event

3. pose critical questions to the class

4. include a link to the article and reference where and when the article was written

5. post to the current event discussion board If you need help posting to the discussion board see the tutorial videos in Start Here on the main menu of this course.