sem4 ulab english utm

27
UNIVERSITI TEKNOLOGI MALAYSIA EXAMPLE FINAL EXAMINATION SEMESTER I 2014/2015 SESSION COURSE CODE : ULAB 2122 COURSE : ADVANCED ENGLISH ACADEMIC SKILLS PROGRAMME : ALL PROGRAMMES DURATION : 2 HOURS DATE : DECEMBER 2014 MARKS : 30 NAME : _____________________________________ SECTION NO. : _____________________________________ LECTURER’S NAME : _____________________________________ INSTRUCTIONS TO CANDIDATES: Read Texts 1 and 2 and answer all questions. THIS EXAMINATION PAPER CONSISTS OF 11 PRINTED PAGES (INCLUDING THIS PAGE).

Upload: sscfcrew

Post on 14-Jan-2017

345 views

Category:

Education


1 download

TRANSCRIPT

Page 1: Sem4 ulab english utm

UNIVERSITI TEKNOLOGI MALAYSIA

EXAMPLE FINAL EXAMINATION SEMESTER I

2014/2015 SESSION

COURSE CODE : ULAB 2122 COURSE : ADVANCED ENGLISH

ACADEMIC SKILLS

PROGRAMME : ALL PROGRAMMES

DURATION : 2 HOURS DATE : DECEMBER 2014

MARKS : 30

NAME : _____________________________________

SECTION NO. : _____________________________________

LECTURER’S NAME : _____________________________________

INSTRUCTIONS TO CANDIDATES:

Read Texts 1 and 2 and answer all questions.

THIS EXAMINATION PAPER CONSISTS OF 11 PRINTED PAGES

(INCLUDING THIS PAGE).

Page 2: Sem4 ulab english utm

2

Instruction: Read the text below and answer all questions.

Text 1

Cyberstalking

I

II

III

Stalking is a pattern of behaviour that is measured over time in which an

individual seeks to gain access to, or control, an unwilling victim. Cyberstalking is

defined as making these advances through online and other computer

communication arenas. These behaviours can range from benign longing for the

victim to malicious, sexual attacks which cause emotional distress and physical

harm to the victim. As technology grows on a daily basis the "arenas" where

stalking can take place grows at the same rate. Cyberstalking has created new

challenges for the detection, prevention, and prosecution of stalkers in the virtual

world and traditional methods of detection and enforcement often are inadequate.

Thus, the best way to prevent cyberstalking is for technology users to be educated

on cyberstalking and take preventative measures to avoid a stalker in cyberspace.

In this paper we discuss the differences between stalking and cyberstalking, the

physiology of a stalker, current law enforcement measures and most importantly,

how to prevent becoming a victim of cyberstalking. In 1990, California was the

first state to pass laws that criminalized offline stalking. By the end of the

twentieth century, all fifty states outlawed stalking. However, cyberstalking laws

are in their infancy. The law is behind in combating cyberstalking and law

enforcement authorities are not properly trained or equipped to handle

cyberstalking cases. Due to this, it is very difficult for law enforcement authorities

to arrest cyberstalkers before any physical harm has been caused.

Cyberstalking was covered extensively in a Department of Justice report entitled,

"Cyberstalking: A New Challenge for Law Enforcement and Industry". The report

argued that easier access to the personally identifiable information of internet

users has made cyberstalking easier for predators. The evolution of personal blogs

and social networking websites has provided more locations for internet users to

share information such as their name, location and their phone number. The article

also makes a strong connection between cyberstalking and offline stalking.

Cyberstalking can serve as a way to gather information about a victim. That

personal information can be taken off of the internet and can allow a predator to

stalk victims offline as well. This can lead to physical confrontations and more

serious crimes such as rape and murder.

There are many similarities and differences between offline and online stalking.

Although cyberstalkers may prey upon total strangers, stalking victims normally

know who their predator is and have had personal contact with the predator in the

past. Just like offline stalking, evidence has shown that the majority of stalkers are

men and that most of the victims are women. In offline and cyberstalking, the

main motive of the predator is to control and dominate the victim. In the case of

strictly offline stalking, victims have to be within the vicinity of the stalker. This

is not the case for cyberstalking. Through the use of computer technology and

social networking sites such as Facebook, cyberstalkers have the potential to prey

upon victims who live hundreds of miles away. Unlike offline stalking,

Page 3: Sem4 ulab english utm

3

IV

V

VI

VII

VIII

cyberstalkers do not have to reveal their identity to have an effect on their victims.

Furthermore, they do not have to physically confront the person to stalk them.

With the rise of the technology and cyberstalking, there has been a rise in the

importance to catch these predators. The penalty for this crime is very severe and

should not be taken lightly. Everyone has heard about the Dateline NBC cases as

documented by Chris Hanson. Most of the people caught on the show faced large

fines, but some faced multiple years in prison based on the extent of the

stalking/sexual solicitation. The first person charged with cyberstalking was

Robert James Murphy. He violated Title 47 of the U.S. Code 223 which prohibits

the use of telecommunications to annoy, abuse, threaten or harass anyone. Murphy

was sending obscene messages and pictures to his ex-girlfriend for more than 4

years. The woman, Joelle Ligon, was deleting these e-mails at first but then started

collecting them as evidence. Murphy pleaded guilty to two counts of

cyberstalking.

In 1999, a 50 year old security guard used the Internet to solicit rape of a 28 year

old woman. This was the first prosecution under California's new cyberstalking

law. The defendant impersonated the victim in chat rooms and online bulletins

where he gave out her contact information and posted messages of how she had a

fantasy of being raped. The reason the defendant was doing this was because the

woman rejected the man's sexual advances. The fake messages posted online led

to random men knocking on the woman's door saying how they wanted to rape

her. The defendant pleaded guilty in April of 1999 to one count of stalking and

three counts of solicitation of sexual assault. He was sentenced to six years in

prison.

The penalties for cyberstalking can be very severe ranging from fines to many

years in prison. This can mean different things for different people. For a person

involved in some sort of cyberstalking, they might want to think about the

consequences before doing anything drastic. It may not seem like a big deal at the

time to be sending out multiple e-mails or pretending to be someone you are not,

but it could turn out very badly. Also, a lot of people seem to think that they are

invisible behind a computer screen and feel that nothing will happen to them

because of this. These cases prove this theory wrong as someone of this nature

could be spending the next 6 years behind bars.

The penalties for cyberstalking are very severe and if someone is being

cyberstalked, they should let the authorities know about it. Victims of

cyberstalkers should report their case to the authorities and let them determine the

seriousness of the crime that is being committed. Cyberstalking is fairly new so a

victim may not know how serious the law enforcement is and may take matters

into her own hands. This is not a good idea hence they should let the authorities

deal with the situation.

Cyberstalking is a growing problem and should not be taken lightly. With the

improvements of technology and the use of computers, cyberstalking has

increased. The popularity of social networking sites has also led to the increase in

cyberstalking as more and more people are posting personal information on these

websites. This makes it very easy for a stalker to obtain this information and use it

in negative ways towards individuals. The use of the Internet makes it very easy

Page 4: Sem4 ulab english utm

4

IX

X

XI

for stalkers to harass and threaten. Furthermore, law enforcement is increasing,

but is still behind the times. It seems that the stalkers are one step ahead of the

authorities. This is because it is much easier to hide identities online and people

being cyberstalked are not informed on what to do if this is happening. Most

people feel invincible behind their computer screen and think that something of

this nature could never happen to them.

As easy as it is to become a victim of cyberstalking, it is just as easy to prevent it.

A person can prevent this from happening by not posting contact and personal

information on public websites. Nowadays pretty much every teenager and young

adult has a Facebook page where they post all sorts of this information. They

should refrain from doing this and if they feel the need to do so they need to

educate themselves of how to use the websites security features. There are ways to

make certain information private on Facebook as well as other social networking

websites. If a person is being stalked there are many things that the victim can do

which are listed on the prevention page. If you decide you want to post

information about yourself online, do it in a smart way. Research the websites,

chat clients, and their privacy settings. Most websites such as Facebook or

Instagram have options for you to make certain information invisible to the

general public. Take the extra time to find these settings and learn how to utilize

them. This will make sure that only those you wish to view your information have

access to it.

The Protection from Harassment Act 1997 may also be invoked in cases of online

harassment. This Act provides a combination of civil and criminal measures to

deal with stalking. It creates two criminal offences, the summary offence of

criminal harassment and an indictable offence involving fear of violence. Under

section 2 it is an offence to pursue a course of conduct which amounts to the

harassment of another where the accused knew or ought to have known that the

course of conduct amounts to harassment. A person commits an offence under

section 4 if he pursues a course of conduct which causes another to fear, on at

least two occasions, that violence will be used against him. It is sufficient that the

accused ought to have known that his course of conduct would cause the other to

so fear on each of those occasions. The Act also gives courts the power to impose

restraining orders on convicted defendants, prohibiting them from further conduct

which may be injurious to the victim. Breach of such an order carries a potential

sentence of five years imprisonment.

The dangers of cyberstalking are severe and it is only going to get worse as

technology increases. It is up to you to educate yourself about the dangers of

posting information online so that you do not become a victim of cyberstalking.

Adapted from:

Ellison, L., & Akdeniz, Y. (1998). Cyber-stalking: the Regulation of Harassment on the Internet.

Criminal Law Review, 29, 29-48.

Page 5: Sem4 ulab english utm

5

Based on your reading of Text 1 and your background knowledge, answer the questions

below.

1. Define cyberstalking based on the text.

___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

(2 marks)

2. Describe the seriousness of cyberstalking problem.

___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

(2 marks)

3. What are the factors that lead to cyberstalking?

___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

(2 marks)

Page 6: Sem4 ulab english utm

6

4. In your opinion, what is the best way to avoid being a victim of cyberstalking? Justify

your answer.

___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

(3 marks)

Page 7: Sem4 ulab english utm

7

5. The following is part of a Literature Synthesis Matrix of the solutions for minimising

incidences of cyberstalking. Complete the matrix, using your own words wherever

possible.

Solution 1: _________

__________________

__________________

__________________

(1 m)

Impose a jail term of up to six years as punishment for serious

cyberstalking crime. (paragraph IV)

__________________________________________________

__________________________________________________

_________________________________________________

(1 m)

__________________________________________________

__________________________________________________

_________________________________________________

(1 m)

Solution 2: _________

__________________

__________________

__________________

(1 m)

Internet and smartphone users need to be educated on the subject

of cyberstalking (paragraph 1)

__________________________________________________

__________________________________________________

_________________________________________________

(1 m)

__________________________________________________

__________________________________________________

_________________________________________________

(1 m)

Cyberstalking victims should report their case to authorities.

Solution 3: Educate

technology users. __________________________________________________

__________________________________________________

_________________________________________________

(1 m)

__________________________________________________

__________________________________________________

_________________________________________________

(1 m)

(8 marks)

Page 8: Sem4 ulab english utm

8

Instruction: Read the text below and answer all questions.

Text 2

Cyber-stalkers escape the net

I

II

III

IV

V

VI

VII

A new stalking law that comes into force today offers no protection against victims

being harassed and intimidated online, the Government was warned last night.

The new law came into force following a high-profile campaign organised by the

first independent parliamentary inquiry of its kind – the Independent Parliamentary

Inquiry into Stalking Law Reform, chaired by Elfyn Llwyd MP. The advisors to the

inquiry were Laura Richards and Harry Fletcher and the researcher was Delyth

Jewell. Over the course of six months, the group took written and oral evidence

from practitioners, victims and their families, legal professionals and academics on

whether the Protection from Harassment Act (1997) needed to be reformed.

On 7th February 2012 the group published a report with detailed recommendations

(as well as a draft bill). On 8th March 2012 (International Women’s Day), the

Prime Minister announced that the government would be implementing the main

recommendation of the group – that is, that a specific offence of “stalking” should

be introduced. Amendments to the 1997 Act were drafted and passed within a

record 11 days of this announcement.

The new offences were, firstly, a new “2A” offence of stalking (which would

involve two or more incidents) which is triable in the Magistrates court only, as

well as a second, more serious “4A” offence which is applicable if the victim can

be proven to have experienced serious alarm, distress or fear of violence and if the

perpetrator’s behaviour can be proven to have had a substantial and adverse effect

on the victim’s day to day activities. The less serious “2A” offence carries a

maximum sentence of 51 weeks in prison, whilst anyone convicted under the new

“4A” offence could face a maximum of 5 years in prison.

For the first time stalking is being treated as a crime, punishable by up to five years

in prison. However, it does not prevent perpetrators from continuing their reign of

terror on the internet by sending obscene and menacing messages via Facebook or

Twitter.

The Sunday Express has revealed a disturbing rise in cyberstalking and bullying

over the past four years. According to the Ministry of Justice, 1,286 people were

convicted of sending offensive or indecent messages last year. That equates to 24 a

week and is nearly double the 2008 total of 693.

Online bullying by so-called internet “trolls” is covered by the Communications

Act and offenders can be jailed for up to six months and fined a maximum of

£5,000. Only a handful, however, have been convicted.

Page 9: Sem4 ulab english utm

9

VIII

IX

X

Now one of those who helped bring in the new stalking law has warned that more

needs to be done to protect victims of online abuse. Harry Fletcher, assistant

general secretary of Napo (National Association of Probation Officers), said:

“There is still no code of conduct for social media providers. The new law does not

go far enough in terms of stamping out cyber-stalking or Twitter trolls”.

He further stated that while much is being done to stop stalkers intimidating their

victims in the street or at work, little is being done to stop them from doing the

same via their computers. “At the moment there is no duty for social media

providers to co-operate with police investigations, which I find extraordinary. Sites

such as Facebook or Twitter operate on a self-regulatory basis. That needs to

change.”

Critics say the police are too slow to prosecute and the penalties are too weak. For

example, last November internet stalker Shane Webber was jailed for just four

months for subjecting his girlfriend Ruth Jeffrey to a three-year campaign of abuse

which left her suicidal. Webber, 23, from Nottingham, assumed Miss Jeffrey’s

identity and used social networking sites to send naked pictures of her to family and

friends as well as inviting men to knock on her door for sex. Within days of his

release in January, however, Webber committed a series of online sexual offences

against two 15-year-old girls and was jailed again in September, this time for three

years.

Adapted from:

Fielding, J., & Davis, M. (2012, November 25). Cyber-stalkers escape the net. Retrieved

November 30, 2014, from http://www.express.co.uk/news/uk/360333/Cyber-stalkers-

escape-the-net

Page 10: Sem4 ulab english utm

10

Based on Text 2 and your background knowledge, answer the questions below.

1. What is the authors’ main argument about the new stalking law?

___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

(1 mark)

2. In your opinion, are the authorities to be blamed for the uncontrolled cases of

cyberstalking? Justify your answer.

___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

(2 marks)

3. State the arguments made by the author by completing the table below

Argument 1: _______________________________________________________________

__________________________________________________________________________

(1 m)

Support

It does not prevent perpetrators from continuing their reign of terror on the internet.

(paragraph I)

____________________________________________________________________

_____________________________________________________________________

(1 m)

____________________________________________________________________

_____________________________________________________________________

(1 m)

Page 11: Sem4 ulab english utm

11

Argument 2: _______________________________________________________________

__________________________________________________________________________

(1 m)

Support

There is still no code of conduct for social media provider (paragraph IX)

____________________________________________________________________

____________________________________________________________________

(1 m)

____________________________________________________________________

____________________________________________________________________

(1 m)

Argument 3 : Current penalties are too weak and do not deter the criminal from repeating the

offense (1 m)

Support

____________________________________________________________________

____________________________________________________________________

( 1 m)

(6 marks)

4. Paragraphs VIII and IX talks about the inadequate roles played by social media

providers. In your opinion, what more should be done and who should be responsible

to improve the situation? Give examples to explain your answer.

___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

(4 marks)

Page 12: Sem4 ulab english utm

UNIVERSITITEKNOLOGIMALAYSIA

EXAMPLE FINALEXAMINATIONSEMESTERI

2014/2015SESSION

COURSECODE : ULAB2122 COURSE : ADVANCEDENGLISH

ACADEMIC SKILLS

PROGRAMME : ALLPROGRAMMES

DURATION : 2HOURS DATE : DECEMBER 2014

MARKS : 30

NAME : _____________________________________

SECTION NO. : _____________________________________

LECTURER’S NAME : _____________________________________

INSTRUCTIONSTOCANDIDATES:

Read Texts 1 and 2 and answer all questions.

THISEXAMINATION PAPERCONSISTS OF 11PRINTEDPAGES

(INCLUDINGTHISPAGE).

Page 13: Sem4 ulab english utm

2

Instruction:Read the text below and answer all questions.

Text 1

Cyberstalking

I

II

III

Stalking is a pattern of behaviour that is measured over time in which an

individual seeks to gain access to, or control, an unwilling victim. Cyberstalking is

defined as making these advances through online and other computer

communication arenas. These behaviours can range from benign longing for the

victim to malicious, sexual attacks which cause emotional distress and physical

harm to the victim. As technology grows on a daily basis the "arenas" where

stalking can take place grows at the same rate. Cyberstalking has created new

challenges for the detection, prevention, and prosecution of stalkers in the virtual

world and traditional methods of detection and enforcement often are inadequate.

Thus, the best way to prevent cyberstalking is for technology users to be educated

on cyberstalking and take preventative measures to avoid a stalker in cyberspace.

In this paper we discuss the differences between stalking and cyberstalking, the

physiology of a stalker, current law enforcement measures and most importantly,

how to prevent becoming a victim of cyberstalking. In 1990, California was the

first state to pass laws that criminalized offline stalking. By the end of the

twentieth century, all fifty states outlawed stalking. However, cyberstalking laws

are in their infancy. The law is behind in combating cyberstalking and law

enforcement authorities are not properly trained or equipped to handle

cyberstalking cases. Due to this, it is very difficult for law enforcement authorities

to arrest cyberstalkers before any physical harm has been caused.

Cyberstalking was covered extensively in a Department of Justice report entitled,

"Cyberstalking: A New Challenge for Law Enforcement and Industry". The report

argued that easier access to the personally identifiable information of internet

users has made cyberstalking easier for predators. The evolution of personal blogs

and social networking websites has provided more locations for internet users to

share information such as their name, location and their phone number. The article

also makes a strong connection between cyberstalking and offline stalking.

Cyberstalking can serve as a way to gather information about a victim. That

personal information can be taken off of the internet and can allow a predator to

stalk victims offline as well. This can lead to physical confrontations and more

serious crimes such as rape and murder.

There are many similarities and differences between offline and online stalking.

Although cyberstalkers may prey upon total strangers, stalking victims normally

know who their predator is and have had personal contact with the predator in the

past. Just like offline stalking, evidence has shown that the majority of stalkers are

men and that most of the victims are women. In offline and cyberstalking, the

main motive of the predator is to control and dominate the victim. In the case of

strictly offline stalking, victims have to be within the vicinity of the stalker. This is

not the case for cyberstalking. Through the use of computer technology and social

networking sites such as Facebook, cyberstalkers have the potential to prey upon

victims who live hundreds of miles away. Unlike offline stalking, cyberstalkers do

not have to reveal their identity to have an effect on their victims. Furthermore,

Page 14: Sem4 ulab english utm

3

IV

V

VI

VII

VIII

they do not have to physically confront the person to stalk them.

With the rise of the technology and cyberstalking, there has been a rise in the

importance to catch these predators. The penalty for this crime is very severe and

should not be taken lightly. Everyone has heard about the Dateline NBC cases as

documented by Chris Hanson. Most of the people caught on the show faced large

fines, but some faced multiple years in prison based on the extent of the

stalking/sexual solicitation. The first person charged with cyberstalking was

Robert James Murphy. He violated Title 47 of the U.S. Code 223 which prohibits

the use of telecommunications to annoy, abuse, threaten or harass anyone. Murphy

was sending obscene messages and pictures to his ex-girlfriend for more than 4

years. The woman, Joelle Ligon, was deleting these e-mails at first but then started

collecting them as evidence. Murphy pleaded guilty to two counts of

cyberstalking.

In 1999, a 50 year old security guard used the Internet to solicit rape of a 28 year

old woman. This was the first prosecution under California's new cyberstalking

law. The defendant impersonated the victim in chat rooms and online bulletins

where he gave out her contact information and posted messages of how she had a

fantasy of being raped. The reason the defendant was doing this was because the

woman rejected the man's sexual advances. The fake messages posted online led

to random men knocking on the woman's door saying how they wanted to rape

her. The defendant pleaded guilty in April of 1999 to one count of stalking and

three counts of solicitation of sexual assault. He was sentenced to six years in

prison.

The penalties for cyberstalking can be very severe ranging from fines to many

years in prison. This can mean different things for different people. For a person

involved in some sort of cyberstalking, they might want to think about the

consequences before doing anything drastic. It may not seem like a big deal at the

time to be sending out multiple e-mails or pretending to be someone you are not,

but it could turn out very badly. Also, a lot of people seem to think that they are

invisible behind a computer screen and feel that nothing will happen to them

because of this. These cases prove this theory wrong as someone of this nature

could be spending the next 6 years behind bars.

The penalties for cyberstalking are very severe and if someone is being

cyberstalked, they should let the authorities know about it. Victims of

cyberstalkers should report their case to the authorities and let them determine the

seriousness of the crime that is being committed. Cyberstalking is fairly new so a

victim may not know how serious the law enforcement is and may take matters

into her own hands. This is not a good idea hence they should let the authorities

deal with the situation.

Cyberstalking is a growing problem and should not be taken lightly. With the

improvements of technology and the use of computers, cyberstalking has

increased. The popularity of social networking sites has also led to the increase in

cyberstalking as more and more people are posting personal information on these

websites. This makes it very easy for a stalker to obtain this information and use it

in negative ways towards individuals. The use of the Internet makes it very easy

for stalkers to harass and threaten. Furthermore, law enforcement is increasing, but

Page 15: Sem4 ulab english utm

4

IX

X

XI

is still behind the times. It seems that the stalkers are one step ahead of the

authorities. This is because it is much easier to hide identities online and people

being cyberstalked are not informed on what to do if this is happening. Most

people feel invincible behind their computer screen and think that something of

this nature could never happen to them.

As easy as it is to become a victim of cyberstalking, it is just as easy to prevent it.

A person can prevent this from happening by not posting contact and personal

information on public websites. Nowadays pretty much every teenager and young

adult has a Facebook page where they post all sorts of this information. They

should refrain from doing this and if they feel the need to do so they need to

educate themselves of how to use the websites security features. There are ways to

make certain information private on Facebook as well as other social networking

websites. If a person is being stalked there are many things that the victim can do

which are listed on the prevention page. If you decide you want to post

information about yourself online, do it in a smart way. Research the websites,

chat clients, and their privacy settings. Most websites such as Facebook or

Instagram have options for you to make certain information invisible to the

general public. Take the extra time to find these settings and learn how to utilize

them. This will make sure that only those you wish to view your information have

access to it.

The Protection from Harassment Act 1997 may also be invoked in cases of online

harassment. This Act provides a combination of civil and criminal measures to

deal with stalking. It creates two criminal offences, the summary offence of

criminal harassment and an indictable offence involving fear of violence. Under

section 2 it is an offence to pursue a course of conduct which amounts to the

harassment of another where the accused knew or ought to have known that the

course of conduct amounts to harassment. A person commits an offence under

section 4 if he pursues a course of conduct which causes another to fear, on at

least two occasions, that violence will be used against him. It is sufficient that the

accused ought to have known that his course of conduct would cause the other to

so fear on each of those occasions. The Act also gives courts the power to impose

restraining orders on convicted defendants, prohibiting them from further conduct

which may be injurious to the victim. Breach of such an order carries a potential

sentence of five years imprisonment.

The dangers of cyberstalking are severe and it is only going to get worse as

technology increases. It is up to you to educate yourself about the dangers of

posting information online so that you do not become a victim of cyberstalking.

Adapted from:

Ellison, L., &Akdeniz, Y. (1998). Cyber-stalking: the Regulation of Harassment on the Internet.

Criminal Law Review, 29, 29-48.

Page 16: Sem4 ulab english utm

5

Based on your reading of Text 1 and your background knowledge, answer the questions

below.

1. Define cyberstalking based on the text.

Based on the text, cyberstalking is defined as a prolonged behaviour in which the

perpetrator tries to gain access to, or control, an unwilling victim through online

or other computer communication means. (paragraph I)

(2 marks)

2. Describe the seriousness of cyberstalking problem.

Cyberstalking is serious because it is hard to detect, prevent, and prosecute

stalkers on the virtual world and traditional methods of detection and enforcement

of cyberstalking crime are often inadequate. (Paragraph I)

OR

Cyberstalking can be considered serious as personal information can be taken off

of the internet and can allow a predator to stalk victims offline as well. This can

lead to physical confrontations and more serious crimes such as rape and murder.

(Paragraph II)

OR

Through the use of computer technology and social networking sites,

cyberstalkers have the potential to prey upon victims who live hundreds of miles

away and unlike offline stalking, cyberstalkers do not have to reveal their identity

or confront to have an effect on their victims. (Paragraph III)

Any one answer from above = 2 marks

(2 marks)

3. What are the factors that lead to cyberstalking?

Popularity of social networking sites and improvement of technology make it

easier access to the personally identifiable information of internet users has made

cyberstalking easier for predators (Paragraphs II & VIII).

The evolution of personal blogs and social networking websites has provided

more locations for internet users to share information such as their name, location

and their phone number which provide more chances for cyberstalking to occur.

The stalker’s intention to control and dominate the victim. (Paragraph III)

The stalker feels that they are invisible behind screen and feel that nothing will

happen to them if they commit cyberstalking. (Paragraph VI). / Stalkers do not

have to reveal their identity to have an effect on their victims. (Paragraph III).

Any two answers from above (2 x 1mark)

(2 marks)

Page 17: Sem4 ulab english utm

6

4. In your opinion, what is the best way to avoid being a victim of cyberstalking?

Justify your answer.

a) Technology users should be educated on cyberstalking (1 m)

-don’t post contact and personal information on public websites (1 m)

-take the time to change privacy setting on social networking websites (1 m)

b) Take preventive measures to avoid from being cyberstalked (1 m)

- inform authorities if they are being cyberstalked (1 m)

Accept any other plausible answer. Maximum 3 marks.

(3 marks)

Page 18: Sem4 ulab english utm

7

5. The following is part of a Literature Synthesis Matrix of the solutions for

minimising incidences of cyberstalking. Complete the matrix, using your own

words wherever possible.

Solution 1: Impose

severe punishment on

offenders

(1 m)

Impose a jail term of up to six years as punishment for serious

cyberstalking crime. (paragraph IV)

Potential cyberstalkers would think twice before committing

cyberstalking crime if the punishment is severe. (paragraph VI)

(1 m)

Impose restraining orders on convicted criminals and jail them

for up to five years if they breach the restraining order (paragraph

X)

(1 m)

Solution 2: Take

preventive measures

(1 m)

Internet and smartphone users need to be educated on the subject

of cyberstalking (paragraph 1)

Don’t post personal information on social network sites as

cyberstalkers can make use of this information in damaging

ways. (paragraph IX)

(1 m)

Internet users should educate themselves on the use of website

security features and use them to protect their privacy. (paragraph

IX)

(1 m)

Cyberstalking victims should report their case to authorities.

Solution 3: Educate

technology users. Since cyberstalking is a fairly new phenomena, a victim may not

be aware of the law enforcement which is available for this crime

and might take matters into her own hands. (paragraph VII)

(1 m)

Users should take time to learn how to utilize privacy settings on

social network sites such as Facebook and Instagram (paragraph

IX)

(1 m)

(8 marks)

Page 19: Sem4 ulab english utm

8

Instruction: Read the text below and answer all questions.

Text 2

Cyber-stalkers escape the net

I

II

III

IV

V

VI

VII

A new stalking law that comes into force today offers no protection against victims

being harassed and intimidated online, the Government was warned last night.

The new law came into force following a high-profile campaign organised by the

first independent parliamentary inquiry of its kind – the Independent Parliamentary

Inquiry into Stalking Law Reform, chaired by ElfynLlwyd MP. The advisors to the

inquiry were Laura Richards and Harry Fletcher and the researcher was Delyth

Jewell. Over the course of six months, the group took written and oral evidence

from practitioners, victims and their families, legal professionals and academics on

whether the Protection from Harassment Act (1997) needed to be reformed.

On 7th February 2012 the group published a report with detailed recommendations

(as well as a draft bill). On 8th March 2012 (International Women’s Day), the

Prime Minister announced that the government would be implementing the main

recommendation of the group – that is, that a specific offence of “stalking” should

be introduced. Amendments to the 1997 Act were drafted and passed within a

record 11 days of this announcement.

The new offences were, firstly, a new “2A” offence of stalking (which would

involve two or more incidents) which is triable in the Magistrates court only, as

well as a second, more serious “4A” offence which is applicable if the victim can

be proven to have experienced serious alarm, distress or fear of violence and if the

perpetrator’s behaviour can be proven to have had a substantial and adverse effect

on the victim’s day to day activities. The less serious “2A” offence carries a

maximum sentence of 51 weeks in prison, whilst anyone convicted under the new

“4A” offence could face a maximum of 5 years in prison.

For the first time stalking is being treated as a crime, punishable by up to five years

in prison.However, it does not prevent perpetrators from continuing their reign of

terror on the internet by sending obscene and menacing messages via Facebook or

Twitter.

The Sunday Express has revealed a disturbing rise in cyberstalking and bullying

over the past four years. According to the Ministry of Justice, 1,286 people were

convicted of sending offensive or indecent messages last year.That equates to 24 a

week and is nearly double the 2008 total of 693.

Online bullying by so-called internet “trolls” is covered by the Communications

Act and offenders can be jailed for up to six months and fined a maximum of

£5,000.Only a handful, however, have been convicted.

Page 20: Sem4 ulab english utm

9

VIII

IX

X

Now one of those who helped bring in the new stalking law has warned that more

needs to be done to protect victims of online abuse. Harry Fletcher, assistant

general secretary of Napo (National Association of Probation Officers), said:

“There is still no code of conduct for social media providers. The new law does not

go far enough in terms of stamping out cyber-stalking or Twitter trolls”.

He further stated that while much is being done to stop stalkers intimidating their

victims in the street or at work, little is being done to stop them from doing the

same via their computers. “At the moment there is no duty for social media

providers to co-operate with police investigations, which I find extraordinary.Sites

such as Facebook or Twitter operate on a self-regulatory basis. That needs to

change.”

Critics say the police are too slow to prosecute and the penalties are too weak. For

example, last November internet stalker Shane Webber was jailed for just four

months for subjecting his girlfriend Ruth Jeffrey to a three-year campaign of abuse

which left her suicidal.Webber, 23, from Nottingham, assumed Miss Jeffrey’s

identity and used social networking sites to send naked pictures of her to family and

friends as well as inviting men to knock on her door for sex.Within days of his

release in January, however, Webber committed a series of online sexual offences

against two 15-year-old girls and was jailed again in September, this time for three

years.

Adapted from:

Fielding, J., & Davis, M. (2012, November 25). Cyber-stalkers escape the net. Retrieved

November 30, 2014, from http://www.express.co.uk/news/uk/360333/Cyber-stalkers-

escape-the-net

Page 21: Sem4 ulab english utm

10

Based on Text 2 and your background knowledge, answer the questions below.

1. What is the authors’ main argument about the new stalking law?

The authors’ main argument about the new stalking law is that it does not provide

protection for similar stalking crimes which is done on the virtual world such as the

internet and on mobile networks.

(1 mark)

2. In your opinion, are the authorities to be blamed for the uncontrolled cases of

cyberstalking? Justify your answer.

o Yes. Because the authorities have not setup enough infrastructure to tackle this

problem. Authorities should have cyber-cops to monitor criminal activities

online. They should set up offices which should be easily accessible to the

public to lodge reports or complaints about cyberstalking and other internet

crimes. They should put laws in place which could be used to swiftly take

action against cyberstalkers. Also the punishment for this crime must be

severe enough that it will deter future perpetrators. However, the authorities

are slow in doing all these. Therefore, they are mostly to blame for the rising

cases of cyberstalking.

OR

o No. The authorities are not to be blamed. Instead users who are careless with

their personal information are to be blamed. Users should be more careful

when they post any personal information over public websites. They should

educate themselves first on how to protect their personal information on the

internet. For example, social network websites such as Facebook and

Instagram have privacy or safety features which can be utilised by users in

order to protect their personal data. Users should know this and make use of

this. If they became victims of cyberstalking because of their carelessness in

managing their personal information, why blame it on anyone but themselves?

o Accept any other logical answer with adequate justification.

(2 marks)

Page 22: Sem4 ulab english utm

11

3. State the arguments made by the authors by completing the table below

Argument 1: The current law against stalking does not offer protection to victims of

cyberstalking.(paragraph I)

(1 m)

Support

It does not prevent perpetrators from continuing their reign of terror on the internet.

(paragraph I)

There is a disturbing rise of cases of cyberstalking and cyberbullying over the years.

(paragraph VI)

(1 m)

Only a handful of the perpetrators have been convicted. (paragraph VII)

(1 m)

Argument 2: More needs to be done to protect victims of cyberstalking(1 m)

Support

There is still no code of conduct for social media provider (paragraph IX)

Little has been done to stop cyber stalkers from intimidating their victims through

computers (paragraph IX)

(1 m)

There is no duty for social media providers to cooperate with police. (paragraph IX)

(1 m)

Argument 3 : Current penalties are too weak and do not deter the criminal from repeating the

offense (1 m)

Support

Cyberstalker, Shane Webber, was jailed for just short period of time and continued

with the same crime after he was released. (paragraph X)

( 1 m)

(6 marks)

Page 23: Sem4 ulab english utm

12

4. Paragraphs VIII and IX talks about the inadequate roles played by social media

providers. In your opinion, what more should be done and who should be

responsible to improve the situation? Give examples to explain your answer.

There are many more things which could be done in order to tackle the problem of

cyberstalking. On the part of social network providers, they must provide more

effective tools for their users to be able to protect their personal information.

Social network providers need to provide clear guidelines to their users on how to

guard their private information. They must also develop and incorporate tools on

their websites which would let users do this in a hassle-free way. The tools needs

to be simple to use so that (almost) everyone could use them with ease.

Another party who should be responsible is the authority. The authority should

make laws to require social media providers to be more vigilant about the safety

of their websites. The authority also must require social media providers to

comply with their requests for information about suspected cyberstalking cases in

a timely manner. Also, laws could also be made to hold social media providers

accountable for cyberstalking cases which happen due to their negligence in not

putting enough security measures on their websites.

Give marks for any other logical answers with adequate examples.

(4 marks)

Page 24: Sem4 ulab english utm

kANSWER KEY FOR TEXT 1

1. Describe the seriousness of the current Ebola outbreak.

ANSWER:

By stating that the death toll from the current outbreak is far more than that of

previous outbreaks combined (paragraph I) OR

By stating that past outbreaks have not been as big or as persistant as the current

outbreak (paragraph I) OR

By stating that the outbreak is happening in a deadly populated area and is spreading

fast (paragraph 2)

o Award 2 marks for any one of the answers above. (Total 2 marks)

2. One of the preventive interventions suggested by the authors is related to adjusting

local funeral practices. However, the authors stated that “this is a culturally sensitive

issue that requires culturally appropriate outreach and education” (paragraph VIII,

lines 3-5). In your opinion, why is this a culturally sensitive issue? Give your own

example to support your answer.

ANSWER:

Because funeral rites and practices are conducted during a time of bereavement,

therefore people are more sensitive. Also funeral rites are tied to either religious

or age-old cultural practices which are very dear to the practitioners. Thus the

idea of ‘adjusting’ or changing this religious/cultural custom is a very sensitive

issue. Example : In Muslim and Chinese custom, the body is bathed and clothed.

This might expose the people conducting the bathing/clothing ceremony to be

infected by the disease.

o Accept any other logical answer. You may award partial marks for

incomplete answers. (Total 3 marks)

3. Based on your reading of paragraphs XII and XIII, why is it important to improve

global health security and what should be done in order to ensure that it is a success?

ANSWER:

It is important to improve global health security because in today’s world where global

travelling is a norm, an outbreak in any country can be easily spread to other countries

worldwide (1 mark). Therefore, governments all over the world must work together to

build strong systems which can ensure that cases can be identified and treated quickly,

and the response to the outbreaks is swift and effective. (1 mark)

(Total 2 marks)

4. The authors state that “EVD is a painful reminder that “an outbreak anywhere can

be a risk everywhere” (paragraph XIII, line 1). Explain the highlighted phrase.

Give your own example to support your answer.

Page 25: Sem4 ulab english utm

ANSWER:

In today’s world where global travel is a norm, an outbreak in any country can spread

quickly to other countries when an undiagnosed infected person travels and come into

close contact with people from other countries.(2 marks)For example, a person who is

infected with EVD in Nigeria could have flown to United States and infect people there.

(1 mark)

o Accept any other logical answer. You may award partial marks for

incomplete answers. (Total 3 marks)

.

5. The following is part of a Literature Synthesis Matrix of the solutions for containing

the Ebola epidemic. Complete the matrix, using your own words wherever possible.

Solution 1: Thorough

case and contact

finding.

(1m)

Diagnostic and treatment facilities need to be readily available in order to

quickly detect infected people

Solution 2: Effective

responses to contacts

Once detected, the temperature of the contacts needs to be checked daily

for 21 days

People with fever need to be promptly quarantined and tested.

(1m)

If they tested positive, they must be interviewed in order to find their

contacts who will have to be quarantined and monitored for 21 days.

(1m)

Active involvement of the community and health education efforts which

is culturally sensitive are very important in determining the success of

identifying and tracking contacts.

Solution 3: Effective

responses to patients

and the community

Responding to patients includes the actions of segregating and treating

them, tracing their contacts, and monitoring these contacts continuously

for 21 days after exposure

Survival rate can be improved by giving patients good supportive

care which includes fluid and electrolyte management and treatment

of bacterial superinfections

(1m)

Solution 4 :

Preventive solutions

(1m)

The first is an exhaustive control of infection effort in chosen hospitals

and clinics.

Second, Prevent close contact with body fluids of people recently

deceased due to EVD by educating and supporting the community,

especially by adjusting funeral rituals.

(1m)

And third, minimising the risk of contacting EVD through avoiding the

handling of hunted meat and contact with bats.

Solution 5: Supportive

medical care Vaccines and anti-viral treatment must be developed and distributed

quickly.

Page 26: Sem4 ulab english utm

(1m)

Solution 6: Setting-up

systems.

(1m)

Implement Global Health Security Agenda, with the objective of giving

better protection to the public from outbreaks and epidemics.

(Total 8 marks)

Page 27: Sem4 ulab english utm

ANSWER KEY FOR TEXT 2

1. What is the author’s main argument about the African travel ban?

ANSWER:

American government should not impose a travel ban or restrictions on Ebola affected

regions. (Paragraph II, line 1)

(Total 2 marks)

2. What solution did the author propose to stop the Ebola epidemic? Why?

ANSWER:

Isolation of people with symptoms. (1 mark) He claimed that this method has always

been successful in containing previous outbreaks. (1 mark) (Paragraph V, lines 1 to 3)

(Total 2 marks)

3. State the arguments made by the author by completing the table below

Argument 1: Travel ban will have little impact on Americans, but will have worse impact for

West Africa.

Ebola epidemic poses minimal risk to Americans.

Travel ban will worsen the situation inLiberia, Guinea, & Sierra Leone.

Argument 2: Ebola is not that highly contagious to warrant a travel ban(1mark)

America did not impose travel ban on more contagious diseases like measles and

influenza.

Argument 3 : The benefits of not imposing travel ban far outweighs the harm (1mark)

Trade can continue or People can travel to work / invest / see family and

friends( 1 mark)

Argument 4: Travel ban will only delay the disease and not stop it from arriving.(1mark)

Sealing off USA from rest of the world is a ridiculous solution.

Argument 5 : Travel ban will incur major economic losses, especially for Ebola affected

countries(1mark)

Two-thirdsof GDP was lost due to the cost of people keeping away from infection by

not travelling.

(Total 5 marks)

4. Do you support travel ban as a means of preventing epidemics? Justify your answer.

Accept any logical answer. (Total 3 marks)