sem4 ulab english utm
TRANSCRIPT
UNIVERSITI TEKNOLOGI MALAYSIA
EXAMPLE FINAL EXAMINATION SEMESTER I
2014/2015 SESSION
COURSE CODE : ULAB 2122 COURSE : ADVANCED ENGLISH
ACADEMIC SKILLS
PROGRAMME : ALL PROGRAMMES
DURATION : 2 HOURS DATE : DECEMBER 2014
MARKS : 30
NAME : _____________________________________
SECTION NO. : _____________________________________
LECTURER’S NAME : _____________________________________
INSTRUCTIONS TO CANDIDATES:
Read Texts 1 and 2 and answer all questions.
THIS EXAMINATION PAPER CONSISTS OF 11 PRINTED PAGES
(INCLUDING THIS PAGE).
2
Instruction: Read the text below and answer all questions.
Text 1
Cyberstalking
I
II
III
Stalking is a pattern of behaviour that is measured over time in which an
individual seeks to gain access to, or control, an unwilling victim. Cyberstalking is
defined as making these advances through online and other computer
communication arenas. These behaviours can range from benign longing for the
victim to malicious, sexual attacks which cause emotional distress and physical
harm to the victim. As technology grows on a daily basis the "arenas" where
stalking can take place grows at the same rate. Cyberstalking has created new
challenges for the detection, prevention, and prosecution of stalkers in the virtual
world and traditional methods of detection and enforcement often are inadequate.
Thus, the best way to prevent cyberstalking is for technology users to be educated
on cyberstalking and take preventative measures to avoid a stalker in cyberspace.
In this paper we discuss the differences between stalking and cyberstalking, the
physiology of a stalker, current law enforcement measures and most importantly,
how to prevent becoming a victim of cyberstalking. In 1990, California was the
first state to pass laws that criminalized offline stalking. By the end of the
twentieth century, all fifty states outlawed stalking. However, cyberstalking laws
are in their infancy. The law is behind in combating cyberstalking and law
enforcement authorities are not properly trained or equipped to handle
cyberstalking cases. Due to this, it is very difficult for law enforcement authorities
to arrest cyberstalkers before any physical harm has been caused.
Cyberstalking was covered extensively in a Department of Justice report entitled,
"Cyberstalking: A New Challenge for Law Enforcement and Industry". The report
argued that easier access to the personally identifiable information of internet
users has made cyberstalking easier for predators. The evolution of personal blogs
and social networking websites has provided more locations for internet users to
share information such as their name, location and their phone number. The article
also makes a strong connection between cyberstalking and offline stalking.
Cyberstalking can serve as a way to gather information about a victim. That
personal information can be taken off of the internet and can allow a predator to
stalk victims offline as well. This can lead to physical confrontations and more
serious crimes such as rape and murder.
There are many similarities and differences between offline and online stalking.
Although cyberstalkers may prey upon total strangers, stalking victims normally
know who their predator is and have had personal contact with the predator in the
past. Just like offline stalking, evidence has shown that the majority of stalkers are
men and that most of the victims are women. In offline and cyberstalking, the
main motive of the predator is to control and dominate the victim. In the case of
strictly offline stalking, victims have to be within the vicinity of the stalker. This
is not the case for cyberstalking. Through the use of computer technology and
social networking sites such as Facebook, cyberstalkers have the potential to prey
upon victims who live hundreds of miles away. Unlike offline stalking,
3
IV
V
VI
VII
VIII
cyberstalkers do not have to reveal their identity to have an effect on their victims.
Furthermore, they do not have to physically confront the person to stalk them.
With the rise of the technology and cyberstalking, there has been a rise in the
importance to catch these predators. The penalty for this crime is very severe and
should not be taken lightly. Everyone has heard about the Dateline NBC cases as
documented by Chris Hanson. Most of the people caught on the show faced large
fines, but some faced multiple years in prison based on the extent of the
stalking/sexual solicitation. The first person charged with cyberstalking was
Robert James Murphy. He violated Title 47 of the U.S. Code 223 which prohibits
the use of telecommunications to annoy, abuse, threaten or harass anyone. Murphy
was sending obscene messages and pictures to his ex-girlfriend for more than 4
years. The woman, Joelle Ligon, was deleting these e-mails at first but then started
collecting them as evidence. Murphy pleaded guilty to two counts of
cyberstalking.
In 1999, a 50 year old security guard used the Internet to solicit rape of a 28 year
old woman. This was the first prosecution under California's new cyberstalking
law. The defendant impersonated the victim in chat rooms and online bulletins
where he gave out her contact information and posted messages of how she had a
fantasy of being raped. The reason the defendant was doing this was because the
woman rejected the man's sexual advances. The fake messages posted online led
to random men knocking on the woman's door saying how they wanted to rape
her. The defendant pleaded guilty in April of 1999 to one count of stalking and
three counts of solicitation of sexual assault. He was sentenced to six years in
prison.
The penalties for cyberstalking can be very severe ranging from fines to many
years in prison. This can mean different things for different people. For a person
involved in some sort of cyberstalking, they might want to think about the
consequences before doing anything drastic. It may not seem like a big deal at the
time to be sending out multiple e-mails or pretending to be someone you are not,
but it could turn out very badly. Also, a lot of people seem to think that they are
invisible behind a computer screen and feel that nothing will happen to them
because of this. These cases prove this theory wrong as someone of this nature
could be spending the next 6 years behind bars.
The penalties for cyberstalking are very severe and if someone is being
cyberstalked, they should let the authorities know about it. Victims of
cyberstalkers should report their case to the authorities and let them determine the
seriousness of the crime that is being committed. Cyberstalking is fairly new so a
victim may not know how serious the law enforcement is and may take matters
into her own hands. This is not a good idea hence they should let the authorities
deal with the situation.
Cyberstalking is a growing problem and should not be taken lightly. With the
improvements of technology and the use of computers, cyberstalking has
increased. The popularity of social networking sites has also led to the increase in
cyberstalking as more and more people are posting personal information on these
websites. This makes it very easy for a stalker to obtain this information and use it
in negative ways towards individuals. The use of the Internet makes it very easy
4
IX
X
XI
for stalkers to harass and threaten. Furthermore, law enforcement is increasing,
but is still behind the times. It seems that the stalkers are one step ahead of the
authorities. This is because it is much easier to hide identities online and people
being cyberstalked are not informed on what to do if this is happening. Most
people feel invincible behind their computer screen and think that something of
this nature could never happen to them.
As easy as it is to become a victim of cyberstalking, it is just as easy to prevent it.
A person can prevent this from happening by not posting contact and personal
information on public websites. Nowadays pretty much every teenager and young
adult has a Facebook page where they post all sorts of this information. They
should refrain from doing this and if they feel the need to do so they need to
educate themselves of how to use the websites security features. There are ways to
make certain information private on Facebook as well as other social networking
websites. If a person is being stalked there are many things that the victim can do
which are listed on the prevention page. If you decide you want to post
information about yourself online, do it in a smart way. Research the websites,
chat clients, and their privacy settings. Most websites such as Facebook or
Instagram have options for you to make certain information invisible to the
general public. Take the extra time to find these settings and learn how to utilize
them. This will make sure that only those you wish to view your information have
access to it.
The Protection from Harassment Act 1997 may also be invoked in cases of online
harassment. This Act provides a combination of civil and criminal measures to
deal with stalking. It creates two criminal offences, the summary offence of
criminal harassment and an indictable offence involving fear of violence. Under
section 2 it is an offence to pursue a course of conduct which amounts to the
harassment of another where the accused knew or ought to have known that the
course of conduct amounts to harassment. A person commits an offence under
section 4 if he pursues a course of conduct which causes another to fear, on at
least two occasions, that violence will be used against him. It is sufficient that the
accused ought to have known that his course of conduct would cause the other to
so fear on each of those occasions. The Act also gives courts the power to impose
restraining orders on convicted defendants, prohibiting them from further conduct
which may be injurious to the victim. Breach of such an order carries a potential
sentence of five years imprisonment.
The dangers of cyberstalking are severe and it is only going to get worse as
technology increases. It is up to you to educate yourself about the dangers of
posting information online so that you do not become a victim of cyberstalking.
Adapted from:
Ellison, L., & Akdeniz, Y. (1998). Cyber-stalking: the Regulation of Harassment on the Internet.
Criminal Law Review, 29, 29-48.
5
Based on your reading of Text 1 and your background knowledge, answer the questions
below.
1. Define cyberstalking based on the text.
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
(2 marks)
2. Describe the seriousness of cyberstalking problem.
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
(2 marks)
3. What are the factors that lead to cyberstalking?
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
(2 marks)
6
4. In your opinion, what is the best way to avoid being a victim of cyberstalking? Justify
your answer.
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
(3 marks)
7
5. The following is part of a Literature Synthesis Matrix of the solutions for minimising
incidences of cyberstalking. Complete the matrix, using your own words wherever
possible.
Solution 1: _________
__________________
__________________
__________________
(1 m)
Impose a jail term of up to six years as punishment for serious
cyberstalking crime. (paragraph IV)
__________________________________________________
__________________________________________________
_________________________________________________
(1 m)
__________________________________________________
__________________________________________________
_________________________________________________
(1 m)
Solution 2: _________
__________________
__________________
__________________
(1 m)
Internet and smartphone users need to be educated on the subject
of cyberstalking (paragraph 1)
__________________________________________________
__________________________________________________
_________________________________________________
(1 m)
__________________________________________________
__________________________________________________
_________________________________________________
(1 m)
Cyberstalking victims should report their case to authorities.
Solution 3: Educate
technology users. __________________________________________________
__________________________________________________
_________________________________________________
(1 m)
__________________________________________________
__________________________________________________
_________________________________________________
(1 m)
(8 marks)
8
Instruction: Read the text below and answer all questions.
Text 2
Cyber-stalkers escape the net
I
II
III
IV
V
VI
VII
A new stalking law that comes into force today offers no protection against victims
being harassed and intimidated online, the Government was warned last night.
The new law came into force following a high-profile campaign organised by the
first independent parliamentary inquiry of its kind – the Independent Parliamentary
Inquiry into Stalking Law Reform, chaired by Elfyn Llwyd MP. The advisors to the
inquiry were Laura Richards and Harry Fletcher and the researcher was Delyth
Jewell. Over the course of six months, the group took written and oral evidence
from practitioners, victims and their families, legal professionals and academics on
whether the Protection from Harassment Act (1997) needed to be reformed.
On 7th February 2012 the group published a report with detailed recommendations
(as well as a draft bill). On 8th March 2012 (International Women’s Day), the
Prime Minister announced that the government would be implementing the main
recommendation of the group – that is, that a specific offence of “stalking” should
be introduced. Amendments to the 1997 Act were drafted and passed within a
record 11 days of this announcement.
The new offences were, firstly, a new “2A” offence of stalking (which would
involve two or more incidents) which is triable in the Magistrates court only, as
well as a second, more serious “4A” offence which is applicable if the victim can
be proven to have experienced serious alarm, distress or fear of violence and if the
perpetrator’s behaviour can be proven to have had a substantial and adverse effect
on the victim’s day to day activities. The less serious “2A” offence carries a
maximum sentence of 51 weeks in prison, whilst anyone convicted under the new
“4A” offence could face a maximum of 5 years in prison.
For the first time stalking is being treated as a crime, punishable by up to five years
in prison. However, it does not prevent perpetrators from continuing their reign of
terror on the internet by sending obscene and menacing messages via Facebook or
Twitter.
The Sunday Express has revealed a disturbing rise in cyberstalking and bullying
over the past four years. According to the Ministry of Justice, 1,286 people were
convicted of sending offensive or indecent messages last year. That equates to 24 a
week and is nearly double the 2008 total of 693.
Online bullying by so-called internet “trolls” is covered by the Communications
Act and offenders can be jailed for up to six months and fined a maximum of
£5,000. Only a handful, however, have been convicted.
9
VIII
IX
X
Now one of those who helped bring in the new stalking law has warned that more
needs to be done to protect victims of online abuse. Harry Fletcher, assistant
general secretary of Napo (National Association of Probation Officers), said:
“There is still no code of conduct for social media providers. The new law does not
go far enough in terms of stamping out cyber-stalking or Twitter trolls”.
He further stated that while much is being done to stop stalkers intimidating their
victims in the street or at work, little is being done to stop them from doing the
same via their computers. “At the moment there is no duty for social media
providers to co-operate with police investigations, which I find extraordinary. Sites
such as Facebook or Twitter operate on a self-regulatory basis. That needs to
change.”
Critics say the police are too slow to prosecute and the penalties are too weak. For
example, last November internet stalker Shane Webber was jailed for just four
months for subjecting his girlfriend Ruth Jeffrey to a three-year campaign of abuse
which left her suicidal. Webber, 23, from Nottingham, assumed Miss Jeffrey’s
identity and used social networking sites to send naked pictures of her to family and
friends as well as inviting men to knock on her door for sex. Within days of his
release in January, however, Webber committed a series of online sexual offences
against two 15-year-old girls and was jailed again in September, this time for three
years.
Adapted from:
Fielding, J., & Davis, M. (2012, November 25). Cyber-stalkers escape the net. Retrieved
November 30, 2014, from http://www.express.co.uk/news/uk/360333/Cyber-stalkers-
escape-the-net
10
Based on Text 2 and your background knowledge, answer the questions below.
1. What is the authors’ main argument about the new stalking law?
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
(1 mark)
2. In your opinion, are the authorities to be blamed for the uncontrolled cases of
cyberstalking? Justify your answer.
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
(2 marks)
3. State the arguments made by the author by completing the table below
Argument 1: _______________________________________________________________
__________________________________________________________________________
(1 m)
Support
It does not prevent perpetrators from continuing their reign of terror on the internet.
(paragraph I)
____________________________________________________________________
_____________________________________________________________________
(1 m)
____________________________________________________________________
_____________________________________________________________________
(1 m)
11
Argument 2: _______________________________________________________________
__________________________________________________________________________
(1 m)
Support
There is still no code of conduct for social media provider (paragraph IX)
____________________________________________________________________
____________________________________________________________________
(1 m)
____________________________________________________________________
____________________________________________________________________
(1 m)
Argument 3 : Current penalties are too weak and do not deter the criminal from repeating the
offense (1 m)
Support
____________________________________________________________________
____________________________________________________________________
( 1 m)
(6 marks)
4. Paragraphs VIII and IX talks about the inadequate roles played by social media
providers. In your opinion, what more should be done and who should be responsible
to improve the situation? Give examples to explain your answer.
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
(4 marks)
UNIVERSITITEKNOLOGIMALAYSIA
EXAMPLE FINALEXAMINATIONSEMESTERI
2014/2015SESSION
COURSECODE : ULAB2122 COURSE : ADVANCEDENGLISH
ACADEMIC SKILLS
PROGRAMME : ALLPROGRAMMES
DURATION : 2HOURS DATE : DECEMBER 2014
MARKS : 30
NAME : _____________________________________
SECTION NO. : _____________________________________
LECTURER’S NAME : _____________________________________
INSTRUCTIONSTOCANDIDATES:
Read Texts 1 and 2 and answer all questions.
THISEXAMINATION PAPERCONSISTS OF 11PRINTEDPAGES
(INCLUDINGTHISPAGE).
2
Instruction:Read the text below and answer all questions.
Text 1
Cyberstalking
I
II
III
Stalking is a pattern of behaviour that is measured over time in which an
individual seeks to gain access to, or control, an unwilling victim. Cyberstalking is
defined as making these advances through online and other computer
communication arenas. These behaviours can range from benign longing for the
victim to malicious, sexual attacks which cause emotional distress and physical
harm to the victim. As technology grows on a daily basis the "arenas" where
stalking can take place grows at the same rate. Cyberstalking has created new
challenges for the detection, prevention, and prosecution of stalkers in the virtual
world and traditional methods of detection and enforcement often are inadequate.
Thus, the best way to prevent cyberstalking is for technology users to be educated
on cyberstalking and take preventative measures to avoid a stalker in cyberspace.
In this paper we discuss the differences between stalking and cyberstalking, the
physiology of a stalker, current law enforcement measures and most importantly,
how to prevent becoming a victim of cyberstalking. In 1990, California was the
first state to pass laws that criminalized offline stalking. By the end of the
twentieth century, all fifty states outlawed stalking. However, cyberstalking laws
are in their infancy. The law is behind in combating cyberstalking and law
enforcement authorities are not properly trained or equipped to handle
cyberstalking cases. Due to this, it is very difficult for law enforcement authorities
to arrest cyberstalkers before any physical harm has been caused.
Cyberstalking was covered extensively in a Department of Justice report entitled,
"Cyberstalking: A New Challenge for Law Enforcement and Industry". The report
argued that easier access to the personally identifiable information of internet
users has made cyberstalking easier for predators. The evolution of personal blogs
and social networking websites has provided more locations for internet users to
share information such as their name, location and their phone number. The article
also makes a strong connection between cyberstalking and offline stalking.
Cyberstalking can serve as a way to gather information about a victim. That
personal information can be taken off of the internet and can allow a predator to
stalk victims offline as well. This can lead to physical confrontations and more
serious crimes such as rape and murder.
There are many similarities and differences between offline and online stalking.
Although cyberstalkers may prey upon total strangers, stalking victims normally
know who their predator is and have had personal contact with the predator in the
past. Just like offline stalking, evidence has shown that the majority of stalkers are
men and that most of the victims are women. In offline and cyberstalking, the
main motive of the predator is to control and dominate the victim. In the case of
strictly offline stalking, victims have to be within the vicinity of the stalker. This is
not the case for cyberstalking. Through the use of computer technology and social
networking sites such as Facebook, cyberstalkers have the potential to prey upon
victims who live hundreds of miles away. Unlike offline stalking, cyberstalkers do
not have to reveal their identity to have an effect on their victims. Furthermore,
3
IV
V
VI
VII
VIII
they do not have to physically confront the person to stalk them.
With the rise of the technology and cyberstalking, there has been a rise in the
importance to catch these predators. The penalty for this crime is very severe and
should not be taken lightly. Everyone has heard about the Dateline NBC cases as
documented by Chris Hanson. Most of the people caught on the show faced large
fines, but some faced multiple years in prison based on the extent of the
stalking/sexual solicitation. The first person charged with cyberstalking was
Robert James Murphy. He violated Title 47 of the U.S. Code 223 which prohibits
the use of telecommunications to annoy, abuse, threaten or harass anyone. Murphy
was sending obscene messages and pictures to his ex-girlfriend for more than 4
years. The woman, Joelle Ligon, was deleting these e-mails at first but then started
collecting them as evidence. Murphy pleaded guilty to two counts of
cyberstalking.
In 1999, a 50 year old security guard used the Internet to solicit rape of a 28 year
old woman. This was the first prosecution under California's new cyberstalking
law. The defendant impersonated the victim in chat rooms and online bulletins
where he gave out her contact information and posted messages of how she had a
fantasy of being raped. The reason the defendant was doing this was because the
woman rejected the man's sexual advances. The fake messages posted online led
to random men knocking on the woman's door saying how they wanted to rape
her. The defendant pleaded guilty in April of 1999 to one count of stalking and
three counts of solicitation of sexual assault. He was sentenced to six years in
prison.
The penalties for cyberstalking can be very severe ranging from fines to many
years in prison. This can mean different things for different people. For a person
involved in some sort of cyberstalking, they might want to think about the
consequences before doing anything drastic. It may not seem like a big deal at the
time to be sending out multiple e-mails or pretending to be someone you are not,
but it could turn out very badly. Also, a lot of people seem to think that they are
invisible behind a computer screen and feel that nothing will happen to them
because of this. These cases prove this theory wrong as someone of this nature
could be spending the next 6 years behind bars.
The penalties for cyberstalking are very severe and if someone is being
cyberstalked, they should let the authorities know about it. Victims of
cyberstalkers should report their case to the authorities and let them determine the
seriousness of the crime that is being committed. Cyberstalking is fairly new so a
victim may not know how serious the law enforcement is and may take matters
into her own hands. This is not a good idea hence they should let the authorities
deal with the situation.
Cyberstalking is a growing problem and should not be taken lightly. With the
improvements of technology and the use of computers, cyberstalking has
increased. The popularity of social networking sites has also led to the increase in
cyberstalking as more and more people are posting personal information on these
websites. This makes it very easy for a stalker to obtain this information and use it
in negative ways towards individuals. The use of the Internet makes it very easy
for stalkers to harass and threaten. Furthermore, law enforcement is increasing, but
4
IX
X
XI
is still behind the times. It seems that the stalkers are one step ahead of the
authorities. This is because it is much easier to hide identities online and people
being cyberstalked are not informed on what to do if this is happening. Most
people feel invincible behind their computer screen and think that something of
this nature could never happen to them.
As easy as it is to become a victim of cyberstalking, it is just as easy to prevent it.
A person can prevent this from happening by not posting contact and personal
information on public websites. Nowadays pretty much every teenager and young
adult has a Facebook page where they post all sorts of this information. They
should refrain from doing this and if they feel the need to do so they need to
educate themselves of how to use the websites security features. There are ways to
make certain information private on Facebook as well as other social networking
websites. If a person is being stalked there are many things that the victim can do
which are listed on the prevention page. If you decide you want to post
information about yourself online, do it in a smart way. Research the websites,
chat clients, and their privacy settings. Most websites such as Facebook or
Instagram have options for you to make certain information invisible to the
general public. Take the extra time to find these settings and learn how to utilize
them. This will make sure that only those you wish to view your information have
access to it.
The Protection from Harassment Act 1997 may also be invoked in cases of online
harassment. This Act provides a combination of civil and criminal measures to
deal with stalking. It creates two criminal offences, the summary offence of
criminal harassment and an indictable offence involving fear of violence. Under
section 2 it is an offence to pursue a course of conduct which amounts to the
harassment of another where the accused knew or ought to have known that the
course of conduct amounts to harassment. A person commits an offence under
section 4 if he pursues a course of conduct which causes another to fear, on at
least two occasions, that violence will be used against him. It is sufficient that the
accused ought to have known that his course of conduct would cause the other to
so fear on each of those occasions. The Act also gives courts the power to impose
restraining orders on convicted defendants, prohibiting them from further conduct
which may be injurious to the victim. Breach of such an order carries a potential
sentence of five years imprisonment.
The dangers of cyberstalking are severe and it is only going to get worse as
technology increases. It is up to you to educate yourself about the dangers of
posting information online so that you do not become a victim of cyberstalking.
Adapted from:
Ellison, L., &Akdeniz, Y. (1998). Cyber-stalking: the Regulation of Harassment on the Internet.
Criminal Law Review, 29, 29-48.
5
Based on your reading of Text 1 and your background knowledge, answer the questions
below.
1. Define cyberstalking based on the text.
Based on the text, cyberstalking is defined as a prolonged behaviour in which the
perpetrator tries to gain access to, or control, an unwilling victim through online
or other computer communication means. (paragraph I)
(2 marks)
2. Describe the seriousness of cyberstalking problem.
Cyberstalking is serious because it is hard to detect, prevent, and prosecute
stalkers on the virtual world and traditional methods of detection and enforcement
of cyberstalking crime are often inadequate. (Paragraph I)
OR
Cyberstalking can be considered serious as personal information can be taken off
of the internet and can allow a predator to stalk victims offline as well. This can
lead to physical confrontations and more serious crimes such as rape and murder.
(Paragraph II)
OR
Through the use of computer technology and social networking sites,
cyberstalkers have the potential to prey upon victims who live hundreds of miles
away and unlike offline stalking, cyberstalkers do not have to reveal their identity
or confront to have an effect on their victims. (Paragraph III)
Any one answer from above = 2 marks
(2 marks)
3. What are the factors that lead to cyberstalking?
Popularity of social networking sites and improvement of technology make it
easier access to the personally identifiable information of internet users has made
cyberstalking easier for predators (Paragraphs II & VIII).
The evolution of personal blogs and social networking websites has provided
more locations for internet users to share information such as their name, location
and their phone number which provide more chances for cyberstalking to occur.
The stalker’s intention to control and dominate the victim. (Paragraph III)
The stalker feels that they are invisible behind screen and feel that nothing will
happen to them if they commit cyberstalking. (Paragraph VI). / Stalkers do not
have to reveal their identity to have an effect on their victims. (Paragraph III).
Any two answers from above (2 x 1mark)
(2 marks)
6
4. In your opinion, what is the best way to avoid being a victim of cyberstalking?
Justify your answer.
a) Technology users should be educated on cyberstalking (1 m)
-don’t post contact and personal information on public websites (1 m)
-take the time to change privacy setting on social networking websites (1 m)
b) Take preventive measures to avoid from being cyberstalked (1 m)
- inform authorities if they are being cyberstalked (1 m)
Accept any other plausible answer. Maximum 3 marks.
(3 marks)
7
5. The following is part of a Literature Synthesis Matrix of the solutions for
minimising incidences of cyberstalking. Complete the matrix, using your own
words wherever possible.
Solution 1: Impose
severe punishment on
offenders
(1 m)
Impose a jail term of up to six years as punishment for serious
cyberstalking crime. (paragraph IV)
Potential cyberstalkers would think twice before committing
cyberstalking crime if the punishment is severe. (paragraph VI)
(1 m)
Impose restraining orders on convicted criminals and jail them
for up to five years if they breach the restraining order (paragraph
X)
(1 m)
Solution 2: Take
preventive measures
(1 m)
Internet and smartphone users need to be educated on the subject
of cyberstalking (paragraph 1)
Don’t post personal information on social network sites as
cyberstalkers can make use of this information in damaging
ways. (paragraph IX)
(1 m)
Internet users should educate themselves on the use of website
security features and use them to protect their privacy. (paragraph
IX)
(1 m)
Cyberstalking victims should report their case to authorities.
Solution 3: Educate
technology users. Since cyberstalking is a fairly new phenomena, a victim may not
be aware of the law enforcement which is available for this crime
and might take matters into her own hands. (paragraph VII)
(1 m)
Users should take time to learn how to utilize privacy settings on
social network sites such as Facebook and Instagram (paragraph
IX)
(1 m)
(8 marks)
8
Instruction: Read the text below and answer all questions.
Text 2
Cyber-stalkers escape the net
I
II
III
IV
V
VI
VII
A new stalking law that comes into force today offers no protection against victims
being harassed and intimidated online, the Government was warned last night.
The new law came into force following a high-profile campaign organised by the
first independent parliamentary inquiry of its kind – the Independent Parliamentary
Inquiry into Stalking Law Reform, chaired by ElfynLlwyd MP. The advisors to the
inquiry were Laura Richards and Harry Fletcher and the researcher was Delyth
Jewell. Over the course of six months, the group took written and oral evidence
from practitioners, victims and their families, legal professionals and academics on
whether the Protection from Harassment Act (1997) needed to be reformed.
On 7th February 2012 the group published a report with detailed recommendations
(as well as a draft bill). On 8th March 2012 (International Women’s Day), the
Prime Minister announced that the government would be implementing the main
recommendation of the group – that is, that a specific offence of “stalking” should
be introduced. Amendments to the 1997 Act were drafted and passed within a
record 11 days of this announcement.
The new offences were, firstly, a new “2A” offence of stalking (which would
involve two or more incidents) which is triable in the Magistrates court only, as
well as a second, more serious “4A” offence which is applicable if the victim can
be proven to have experienced serious alarm, distress or fear of violence and if the
perpetrator’s behaviour can be proven to have had a substantial and adverse effect
on the victim’s day to day activities. The less serious “2A” offence carries a
maximum sentence of 51 weeks in prison, whilst anyone convicted under the new
“4A” offence could face a maximum of 5 years in prison.
For the first time stalking is being treated as a crime, punishable by up to five years
in prison.However, it does not prevent perpetrators from continuing their reign of
terror on the internet by sending obscene and menacing messages via Facebook or
Twitter.
The Sunday Express has revealed a disturbing rise in cyberstalking and bullying
over the past four years. According to the Ministry of Justice, 1,286 people were
convicted of sending offensive or indecent messages last year.That equates to 24 a
week and is nearly double the 2008 total of 693.
Online bullying by so-called internet “trolls” is covered by the Communications
Act and offenders can be jailed for up to six months and fined a maximum of
£5,000.Only a handful, however, have been convicted.
9
VIII
IX
X
Now one of those who helped bring in the new stalking law has warned that more
needs to be done to protect victims of online abuse. Harry Fletcher, assistant
general secretary of Napo (National Association of Probation Officers), said:
“There is still no code of conduct for social media providers. The new law does not
go far enough in terms of stamping out cyber-stalking or Twitter trolls”.
He further stated that while much is being done to stop stalkers intimidating their
victims in the street or at work, little is being done to stop them from doing the
same via their computers. “At the moment there is no duty for social media
providers to co-operate with police investigations, which I find extraordinary.Sites
such as Facebook or Twitter operate on a self-regulatory basis. That needs to
change.”
Critics say the police are too slow to prosecute and the penalties are too weak. For
example, last November internet stalker Shane Webber was jailed for just four
months for subjecting his girlfriend Ruth Jeffrey to a three-year campaign of abuse
which left her suicidal.Webber, 23, from Nottingham, assumed Miss Jeffrey’s
identity and used social networking sites to send naked pictures of her to family and
friends as well as inviting men to knock on her door for sex.Within days of his
release in January, however, Webber committed a series of online sexual offences
against two 15-year-old girls and was jailed again in September, this time for three
years.
Adapted from:
Fielding, J., & Davis, M. (2012, November 25). Cyber-stalkers escape the net. Retrieved
November 30, 2014, from http://www.express.co.uk/news/uk/360333/Cyber-stalkers-
escape-the-net
10
Based on Text 2 and your background knowledge, answer the questions below.
1. What is the authors’ main argument about the new stalking law?
The authors’ main argument about the new stalking law is that it does not provide
protection for similar stalking crimes which is done on the virtual world such as the
internet and on mobile networks.
(1 mark)
2. In your opinion, are the authorities to be blamed for the uncontrolled cases of
cyberstalking? Justify your answer.
o Yes. Because the authorities have not setup enough infrastructure to tackle this
problem. Authorities should have cyber-cops to monitor criminal activities
online. They should set up offices which should be easily accessible to the
public to lodge reports or complaints about cyberstalking and other internet
crimes. They should put laws in place which could be used to swiftly take
action against cyberstalkers. Also the punishment for this crime must be
severe enough that it will deter future perpetrators. However, the authorities
are slow in doing all these. Therefore, they are mostly to blame for the rising
cases of cyberstalking.
OR
o No. The authorities are not to be blamed. Instead users who are careless with
their personal information are to be blamed. Users should be more careful
when they post any personal information over public websites. They should
educate themselves first on how to protect their personal information on the
internet. For example, social network websites such as Facebook and
Instagram have privacy or safety features which can be utilised by users in
order to protect their personal data. Users should know this and make use of
this. If they became victims of cyberstalking because of their carelessness in
managing their personal information, why blame it on anyone but themselves?
o Accept any other logical answer with adequate justification.
(2 marks)
11
3. State the arguments made by the authors by completing the table below
Argument 1: The current law against stalking does not offer protection to victims of
cyberstalking.(paragraph I)
(1 m)
Support
It does not prevent perpetrators from continuing their reign of terror on the internet.
(paragraph I)
There is a disturbing rise of cases of cyberstalking and cyberbullying over the years.
(paragraph VI)
(1 m)
Only a handful of the perpetrators have been convicted. (paragraph VII)
(1 m)
Argument 2: More needs to be done to protect victims of cyberstalking(1 m)
Support
There is still no code of conduct for social media provider (paragraph IX)
Little has been done to stop cyber stalkers from intimidating their victims through
computers (paragraph IX)
(1 m)
There is no duty for social media providers to cooperate with police. (paragraph IX)
(1 m)
Argument 3 : Current penalties are too weak and do not deter the criminal from repeating the
offense (1 m)
Support
Cyberstalker, Shane Webber, was jailed for just short period of time and continued
with the same crime after he was released. (paragraph X)
( 1 m)
(6 marks)
12
4. Paragraphs VIII and IX talks about the inadequate roles played by social media
providers. In your opinion, what more should be done and who should be
responsible to improve the situation? Give examples to explain your answer.
There are many more things which could be done in order to tackle the problem of
cyberstalking. On the part of social network providers, they must provide more
effective tools for their users to be able to protect their personal information.
Social network providers need to provide clear guidelines to their users on how to
guard their private information. They must also develop and incorporate tools on
their websites which would let users do this in a hassle-free way. The tools needs
to be simple to use so that (almost) everyone could use them with ease.
Another party who should be responsible is the authority. The authority should
make laws to require social media providers to be more vigilant about the safety
of their websites. The authority also must require social media providers to
comply with their requests for information about suspected cyberstalking cases in
a timely manner. Also, laws could also be made to hold social media providers
accountable for cyberstalking cases which happen due to their negligence in not
putting enough security measures on their websites.
Give marks for any other logical answers with adequate examples.
(4 marks)
kANSWER KEY FOR TEXT 1
1. Describe the seriousness of the current Ebola outbreak.
ANSWER:
By stating that the death toll from the current outbreak is far more than that of
previous outbreaks combined (paragraph I) OR
By stating that past outbreaks have not been as big or as persistant as the current
outbreak (paragraph I) OR
By stating that the outbreak is happening in a deadly populated area and is spreading
fast (paragraph 2)
o Award 2 marks for any one of the answers above. (Total 2 marks)
2. One of the preventive interventions suggested by the authors is related to adjusting
local funeral practices. However, the authors stated that “this is a culturally sensitive
issue that requires culturally appropriate outreach and education” (paragraph VIII,
lines 3-5). In your opinion, why is this a culturally sensitive issue? Give your own
example to support your answer.
ANSWER:
Because funeral rites and practices are conducted during a time of bereavement,
therefore people are more sensitive. Also funeral rites are tied to either religious
or age-old cultural practices which are very dear to the practitioners. Thus the
idea of ‘adjusting’ or changing this religious/cultural custom is a very sensitive
issue. Example : In Muslim and Chinese custom, the body is bathed and clothed.
This might expose the people conducting the bathing/clothing ceremony to be
infected by the disease.
o Accept any other logical answer. You may award partial marks for
incomplete answers. (Total 3 marks)
3. Based on your reading of paragraphs XII and XIII, why is it important to improve
global health security and what should be done in order to ensure that it is a success?
ANSWER:
It is important to improve global health security because in today’s world where global
travelling is a norm, an outbreak in any country can be easily spread to other countries
worldwide (1 mark). Therefore, governments all over the world must work together to
build strong systems which can ensure that cases can be identified and treated quickly,
and the response to the outbreaks is swift and effective. (1 mark)
(Total 2 marks)
4. The authors state that “EVD is a painful reminder that “an outbreak anywhere can
be a risk everywhere” (paragraph XIII, line 1). Explain the highlighted phrase.
Give your own example to support your answer.
ANSWER:
In today’s world where global travel is a norm, an outbreak in any country can spread
quickly to other countries when an undiagnosed infected person travels and come into
close contact with people from other countries.(2 marks)For example, a person who is
infected with EVD in Nigeria could have flown to United States and infect people there.
(1 mark)
o Accept any other logical answer. You may award partial marks for
incomplete answers. (Total 3 marks)
.
5. The following is part of a Literature Synthesis Matrix of the solutions for containing
the Ebola epidemic. Complete the matrix, using your own words wherever possible.
Solution 1: Thorough
case and contact
finding.
(1m)
Diagnostic and treatment facilities need to be readily available in order to
quickly detect infected people
Solution 2: Effective
responses to contacts
Once detected, the temperature of the contacts needs to be checked daily
for 21 days
People with fever need to be promptly quarantined and tested.
(1m)
If they tested positive, they must be interviewed in order to find their
contacts who will have to be quarantined and monitored for 21 days.
(1m)
Active involvement of the community and health education efforts which
is culturally sensitive are very important in determining the success of
identifying and tracking contacts.
Solution 3: Effective
responses to patients
and the community
Responding to patients includes the actions of segregating and treating
them, tracing their contacts, and monitoring these contacts continuously
for 21 days after exposure
Survival rate can be improved by giving patients good supportive
care which includes fluid and electrolyte management and treatment
of bacterial superinfections
(1m)
Solution 4 :
Preventive solutions
(1m)
The first is an exhaustive control of infection effort in chosen hospitals
and clinics.
Second, Prevent close contact with body fluids of people recently
deceased due to EVD by educating and supporting the community,
especially by adjusting funeral rituals.
(1m)
And third, minimising the risk of contacting EVD through avoiding the
handling of hunted meat and contact with bats.
Solution 5: Supportive
medical care Vaccines and anti-viral treatment must be developed and distributed
quickly.
(1m)
Solution 6: Setting-up
systems.
(1m)
Implement Global Health Security Agenda, with the objective of giving
better protection to the public from outbreaks and epidemics.
(Total 8 marks)
ANSWER KEY FOR TEXT 2
1. What is the author’s main argument about the African travel ban?
ANSWER:
American government should not impose a travel ban or restrictions on Ebola affected
regions. (Paragraph II, line 1)
(Total 2 marks)
2. What solution did the author propose to stop the Ebola epidemic? Why?
ANSWER:
Isolation of people with symptoms. (1 mark) He claimed that this method has always
been successful in containing previous outbreaks. (1 mark) (Paragraph V, lines 1 to 3)
(Total 2 marks)
3. State the arguments made by the author by completing the table below
Argument 1: Travel ban will have little impact on Americans, but will have worse impact for
West Africa.
Ebola epidemic poses minimal risk to Americans.
Travel ban will worsen the situation inLiberia, Guinea, & Sierra Leone.
Argument 2: Ebola is not that highly contagious to warrant a travel ban(1mark)
America did not impose travel ban on more contagious diseases like measles and
influenza.
Argument 3 : The benefits of not imposing travel ban far outweighs the harm (1mark)
Trade can continue or People can travel to work / invest / see family and
friends( 1 mark)
Argument 4: Travel ban will only delay the disease and not stop it from arriving.(1mark)
Sealing off USA from rest of the world is a ridiculous solution.
Argument 5 : Travel ban will incur major economic losses, especially for Ebola affected
countries(1mark)
Two-thirdsof GDP was lost due to the cost of people keeping away from infection by
not travelling.
(Total 5 marks)
4. Do you support travel ban as a means of preventing epidemics? Justify your answer.
Accept any logical answer. (Total 3 marks)