Cyberstalking and Harassment on The Internet
- Length: 548 words (1.6 double-spaced pages)
- Rating: Excellent
The World Wide Web and Internet are great places to study, work, or even play. But there is an ugly side of cyberspace. Cyberspace reflects the real world and some people tend to forget that. Cyberstalking and harassment are problems that a large number of people (especially women) are realizing. (Jenson, 1996, p.1)
Just because an individual owns a computer and has an Internet account do not assume that person is considerate or respectful. There are just as many stalkers in cyberspace as anywhere else. It’s just that their methods have changed. Some stalkers might harass you by following you through live channels not being able to take no for an answer and bothering you with email messages. In some cases this harassment may become a systematic campaign against you; where your harasser bombards you with threatening messages of hate and obscenities. (1996, p.3) The stalker may even trace your home address and telephone number, causing not only emotional distress but possibly physical danger. It should come as no surprise to you that the stalkers are making use of this technology to harass people and prey on the innocent.
There have been many examples of cyberstalking crossing over in to real life stalking. And those users who have been victims of cyberstalking, tell a similar story, that no one took the harassment serious until it became real life stalking. Cyberstalking can be a devastating experience for a person online. But in cyberspace people say things like “well just turn off your computer” and “ you can’t be hurt on the Internet, it’s just words”. (Laughren, 1998, p.1) The online stalking is just as frightening and distressing as off-line stalking, and just as illegal.
Anyone can be stalked online, but statistics show that the majority of victims are women. Women are the minority of the internet population, which means their attention is generally fierce competition between male users. (Jenson, 1996, p.3) Cyberstalking and online harassment are easy to practice than real life stalking. In cyberspace, a stalker can harass their victim without ever having to leave the comfort of their own home, or have any witnesses to the crime.
Online users are vulnerable to stalking in the following three areas. Live chat rooms or IRC, this is the most common place for cyberstaking. Message boards and Newsgroups, and Email box; a user has the ability to write anything and even attach files to the email.
How to Cite this Page
| Essay about Cyberstalking and Abuse - Cyberstalking is the act of “using the Internet to harass, threaten, or intimidate another person” according to Chuck Easttom (2012). The following provides a synopsis of five recent cases where people have been convicted of cyberstalking or Internet fraud. Each case is analyzed for its relevance in contemporary legal issues, as well as any laws that pertain to the case. Cyberstalking Abuse and Fraud Cases According to John de Leon (2013), on December 17th 2013, a Seattle police detective name David Blackmer pleaded guilty to charges of cyberstalking and domestic violence.... [tags: harassment through the internet]|
:: 6 Works Cited
| Taking a Look at Cyberstalking Essay - Cyberstalking is a form of electronic crime by way of internet to harass or stalk their victim. Such acts can target an individual, groups, and even organizations.Cyberstalking can be carried out by a number of different electronic and digital threats. Most commonly cyberstalking is known for its malicious intent to attack a victim through email, online chat forums and social media. However, “It may include the making of false accusations or statements of fact (as in defamation), monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information that may be used to harass.” ”Cyberstalking shares important characteristics wit... [tags: electronic crimes, using the internet to harass]|
:: 3 Works Cited
| Cyber Criminology: The Prevalence of Cyberstalking, Online Harrassment and Bullying - The internet has put the world literally at anyone’s fingertips with a vast quantity of information is a mouse-click away. Information that was once only available in obscure reference libraries or card catalogs can be accessed by everyone. Unfortunately the internet is an equal opportunity tool, and those with virtuous as well as nefarious intentions can use this open resource to further their efforts to levels heretofore unheard of. The internet is also soapbox for free speech that epitomizes the intentions of the founding fathers to allow everyone the same opportunity to have their opinions aired.... [tags: internet, cyber bullying, cyberbullying]|
:: 3 Works Cited
| CyberCrime Committed on the Internet Essay - Cyber Crime Committed on the Internet Cyber crime is an issue that has been prevalent in this nation ever since the creation of the massive thing we like to call the Internet. The Internet has opened up so many things to all of its users: including online shopping, news, weather, email, online games, and just about anything. From this recent invention creating all of these new things for us, it seems like the Internet could be nothing but great for our society. Yet, what some of us failed to realize was the fact that the door swings both ways.... [tags: Internet Crime, Cyber Crime Essays]|
:: 5 Works Cited
| Essay on Cyber Stalking: Ethics in Science and Technology - People are social creatures and because of that we think of our relationships as very important aspects of our own being. Some have many friends while others have those they call their BFF (a.k.a.: Best Friend Forever). We all long for strong relationships at some level. Maybe we’re looking for the one we’ll go through life with or even be lucky enough to find our soul mate. It’s also human nature that if we form a relationship with another, we want for nothing to ever change that feeling of happiness we have acquired much less let anything come between it.... [tags: cyberstalking, relationships, stalkers]|
:: 5 Works Cited
| Cyber Criminals: Cyber-Crime and Cyberstalking Essay - People want to feel safe. If someone owns a precious object it is stored in a safe hidden in their house. To further protect a house the front doors have handle locks and dead-bolts. To keep personal items safe items like wallet chains are used to stop criminals in their tracks. In the case of cars where they cannot always be watched, car alarms were made to protect from thieves. All of these systems are in place to keep people and their possessions safe. There is an area in people’s lives that is not heavily inspected for weaknesses, however.... [tags: Cyber-Crime Essays]|
:: 5 Works Cited
| Dangers Involved with Internet Usage Essay example - Dangers Involved with Internet Usage The Internet today is constantly advancing and expanding. Over the last several years it has changed the way that we learn, communicate, shop and conduct business. Although there are many advantages to the Internet, there are also many serious problems that occur with Internet use. Some of the problems of the Internet include, cyberstalking and identity theft and Internet addiction. Although the Internet cannot be blamed for the creation of these problems, using the Internet as a tool has made these problems bigger.... [tags: Computers]|
:: 5 Works Cited
|The Pros and Cons of the Internet Essays - The internet as we all know is probably the most useful resource known to man in this day of age. Not only is the internet easy to access its easy to use. Nearly everyone owns a computer and nearly all of which have access to the internet. But isn't that a good thing. Millions of people having the ability to access and share all the information anybody could ever want. The internet can be used for a number of things such as: Research Finding and or sharing information Sending messages to friends or family Chatting to people Playing games and killing time And much more But can having this kind of power be a bad thing.... [tags: Pro Con Essays]||1286 words|
| Essay on Race After The Internet by Lisa Nakamura and Peter Chow-White - ... Websites such as Facebook, Twitter, and Tumblr all have the feature where the user is able to have all the power they desire at their fingertips. With this power users feel more hidden so they feel free to say more racist comments because of the fact that they feel “hidden” with a separate identity versus how they are in real life. It may not be because the user it actually racist but could be trying to get others to laugh and make them more likable by posting racist memes or stereotypes. The problem with this is that since users seem to believe to think that since they aren't actually face to face with someone they are discriminating against then it’s not as bad, thus being okay.... [tags: racial profiling, discrimination]|
:: 5 Works Cited
| Internet Essay - Online Anonymity and Cyberspace Crime - Online Anonymity and Cyberspace Crime The 90's internet boom gave rise to new ways of writing in through access to cyberspace. What used to be printed or handwritten on physical surfaces such as paper, cardboard, or bulletin boards has changed to 0's and 1's, bits and bytes of digitized information that can be displayed thru the projections of computer screens. Moreover, the internet has made the process of publishing one's works, writing letters, or chatting with one another much easier and convenient for everyone around the globe.... [tags: Exploratory Essays Research Papers]|
:: 5 Works Cited
Another common area regarding cyberstalking is at the “edu” sites, which are educational institutes, such as colleges and universities. One user might know another user personally and interacts on the internet anonymously starting the cybertalk. One student can enter the internet as easily as another student, therefor not letting his or her true identity be known.
If you are being harassed online by a cyberstalker, the chances are you are not the first person they have stalked. Cyberstakers, like other predators, are opportunists. They know what they are looking for and know how to get it. Stalking is a power crime, the stalker has the power to make you suffer and enjoys that power. (Laughren, 1998, p.4) A stalker’s self-esteem rises when they attack your self-esteem. The more pain and suffering they can cause, the better they feel about themselves. The best protection against becoming a target of stalking is not to reveal anything personal that you might have in common. Often, stalkers are mentally unstable, paranoid, delusional, and extremely jealous, and have extremely low self-esteem. Stalking is a form of obsession. The difference between a normal cyber harasser and a cyberstalker, is the harasser moves on to others and forgets you and a stalker will come back to stalk you another day. (Jenson, 1996, p.5)
The Internet enables the stalker, his powers, in most cases, merely knowledge of the technology is all that’s required to stalk another person online. Note that educated, smooth talking, responsible people can also be stalkers, appearing to be a perfect gentlemen or lady with perfect manners. A major clue to cyberstalking is when the stalker pushes for information regarding your personal life, private life, or life away from the net. A simple rule of thumb is to never give any personal information over the Internet.
484 Words2 Pages
Stalking Since the beginning of time, people have been following people. Some people do it for the sake of escaping their own life. Some people do it for the love of the hunt. All in all, stalking someone can be satisfying, fun, entertaining, and sometimes lucrative. Step one is to select a person and find basic information on them. One should try to select a person based on what you would get out of stalking them. Potential success, and convenience. If you are stalking for the sheer fun of stalking them, I would suggest finding people using a phone book. A phone book contains hundreds of people including their addresses and phone numbers. If you choose to stalk someone that you already know, you may obtain his or her personal…show more content…
Which brings me to step three, which is home surveillance. This step is one of the most important. Stalking a person without learning about how they act in their everyday life and in private would be useless. Two vital pieces of equipment would be the phone tap and the hidden camera. These will be your ears and eyes into the world of the person you are stalking. This equipment can be constructed using parts found at your local Radio Shack and application may be difficult based on how the devices are built. Keep in mind that the smaller you build the devices, the less likely they will be discovered. These need to be invisible and stay invisible. To install these devices, you will need to refer to the schedule you recorded of the individual in step two and find a suitable time period in which the person will not be home long enough for you to slip inside, install the devices, and get out undetected. You MAY install some at one time and finish up at a later time, as long as you get all devices necessary to follow the person at all times. Step three is to follow and document. This process is what all of your work has been leading up to. In this step you will simply follow, watch, listen, and document any important information. This step's length can be as long as you see fit, as long as you get sufficient satisfaction out of it. Step four is an optional one This one involves making your presence known. This step is in no way