Obscenity Statutes

Obscenity Statutes

Prior to beginning work on this discussion, read the Heins (2009) and Kinsley (2013) articles, and read Chapter 7 in the text.

Technological advancements associated with the Internet and global economics were paralleled by new avenues for marketing pornography along with a variety of obscene materials. No longer do people need to venture forth to visit adult bookstores or sex shops. Availability of the desired commodity is now as easy as accessing one’s computing device. However, as access to sordid material is made decidedly easier, efforts to combat the dissemination of such material also becomes more fervent as pedophiles and human traffickers have turned to the Internet to target children and young people.

For your initial post, you must carefully review the required articles and examine at least two ways legal authorities have attempted to combat online pornography and obscenity. Your initial post must address the following points:

Required Resources

Text

Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2018). Cybercrime and digital forensics: An introduction (2nd ed.).  Retrieved from https://www.vitalsource.com/

  • Chapter 6: Economic Crimes and On-Line Fraud
  • Chapter 7: Pornography, Prostitution, and Sex Crimes

Article

Heins, M. (2009). Not in my backyard (Links to an external site.)Index on Censorship38(1), 96-103. http://dx.doi.org/10.1080/03064220802712191

  • The full-text version of this article is available through the EBSCOhost database in the University of Arizona Global Campus Library. This article provides legal and legislative background on various attempts by authorities to curb online obscenity. It will assist you in the development of this week’s discussion post.

Kinsley, J. M. (2013). Sexual privacy in the internet age: How substantive due process protects online obscenity (Links to an external site.)Vanderbilt Journal of Entertainment and Technology Law16(1), 103- 131. Retrieved from http://www.jetlaw.org/

  • The full-text version of this article is available through the EBSCOhost database in the University of Arizona Global Campus Library. This article provides an analysis of legal attempts throughout the years used to combat obscenity with a specific focus on issues related to the First and Fourteenth Amendments. It will assist you in the development of this week’s discussion post.

Multimedia

Holman, P. (2012, August 31). Top hacker shows us how it’s done: Pablos Holman at TEDx Midwests (Links to an external site.) [Video file]. Retrieved from http://tedxtalks.ted.com/video/Top-Hacker-Shows-Us-How-Its-Don;search%3Aholman

  • This TEDx video is a discussion by Pablo Homan on techniques used by hackers and cyber criminals to conduct fraud and various other computer based crime. It will assist you in the development of this week’s discussion post. This video has closed captions.
    Accessibility Statement does not exist.
    Privacy Policy (Links to an external site.)
Recommended Resources
Website

MSCJ Professional Sources (Links to an external site.). (http://ashford-mscj.weebly.com)

  • This resource site will provide assistance in researching additional sources for the assessments within this course.