{"id":301,"date":"2021-04-18T01:39:06","date_gmt":"2021-04-18T01:39:06","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/gwils006\/?p=301"},"modified":"2021-04-26T01:18:18","modified_gmt":"2021-04-26T01:18:18","slug":"eportfolio-entry-11","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/gwils006\/2021\/04\/18\/eportfolio-entry-11\/","title":{"rendered":"ePortfolio entry #12"},"content":{"rendered":"\n<p class=\"has-text-align-left\">Moore\u2019s can tell us a lot about where we have come from in terms of technology advancements. In a nutshell Moore\u2019s law states that technology doubles almost every two years. Technology is intertwined into almost every facet of our everyday lives. These advancements have also impacted interactions between offenders and victims. \u201cBy 2025, 38.6 billion smart devices will be collecting, analyzing and sharing data\u201d&nbsp;(Galov) This speaks volumes as to why cyber harassment and cyber stalking have been key points of legislative talks as of lately. Before the days of the internet, harassment\/stalking were simply dealt with by avoidance or police involvement. Now that the internet has been a part of everyday life, harassment\/stalking can be executed with the click of the mouse. The person doesn\u2019t even have to know an offender or have seen him\/her before. Today harassment\/stalking can be done anonyms through fake accounts, vpns, and deep fakes to name a few avenues. For example, a New York study showed that 40% of all stalking cases involved the internet in some fashion.&nbsp;(Reyns) Megan\u2019s law is also proof that even the laws of our society can be impacted by technology. Megan\u2019s law came about from the use of a fake account for harassment that led to a young girl\u2019s death. The examples above have anonymity in common. This false sense of anonymity has led offender to be bold in their advances to toward victims. The closeness a victim\/offender share that has been achieved through the use of technology , has made 49 states of the United States place legislation in place that strictly deals with alarm\/distress\/fear.&nbsp;(Koon-Magnin) The overall impact that has been placed on the victim and has given power to the offenders will be on that shapes the future generations communications for years to come.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Works Cited<\/h1>\n\n\n\n<p>Galov, Nick. <em>https:\/\/hostingtribunal.com\/blog\/how-fast-is-technology-growing\/#gref<\/em>. 15 January 2021. 17 April 2021.<\/p>\n\n\n\n<p>Koon-Magnin, Steven D. Hazelwood1 &amp; Sarah. &#8220;Cyber Stalking and Cyber Harassment .&#8221; <em>International Journal of Cyber Criminology <\/em>(2013): 155-168.<\/p>\n\n\n\n<p>Reyns, B. W., Henson, B., &amp; Fisher, B. S. &#8220;Stalking in the twilight zone: Extent of.&#8221; (2012).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Moore\u2019s can tell us a lot about where we have come from in terms of technology advancements. In a nutshell Moore\u2019s law states that technology doubles almost every two years. Technology is intertwined into almost every facet of our everyday lives. These advancements have also impacted interactions between offenders and victims. \u201cBy 2025, 38.6 billion&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/gwils006\/2021\/04\/18\/eportfolio-entry-11\/\">Read More<\/a><\/div>\n","protected":false},"author":19580,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/gwils006\/wp-json\/wp\/v2\/posts\/301"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/gwils006\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/gwils006\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gwils006\/wp-json\/wp\/v2\/users\/19580"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gwils006\/wp-json\/wp\/v2\/comments?post=301"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/gwils006\/wp-json\/wp\/v2\/posts\/301\/revisions"}],"predecessor-version":[{"id":306,"href":"https:\/\/sites.wp.odu.edu\/gwils006\/wp-json\/wp\/v2\/posts\/301\/revisions\/306"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/gwils006\/wp-json\/wp\/v2\/media?parent=301"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gwils006\/wp-json\/wp\/v2\/categories?post=301"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gwils006\/wp-json\/wp\/v2\/tags?post=301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}