5 Sep 2022

82

Cyberstalking and Cyber Harassment

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 909

Pages: 4

Downloads: 0

With increasing access to the internet, cyber-crimes have been on the rise, as reported by Fortune 1000 companies survey (Bag chi & Udo, 2003). Cyberstalking is a cyber-attack that happens when a computer user or victim harassed through electronic communications through platforms such as email, instant messenger, and social media networks towards a specific person. Stalking someone involves monitoring his or her daily activities by following each action to manipulate that person. But in the computer world, the monitoring activities include the use of electronic media either to gather information of a specific individual to use the information against that person. 

Stalking Using Technology 

Stalking may take various ways that are stalking by strangers, as pointed out by Smith and Tom (2010). It mostly happens from past or current relationships where the stalkers monitor the victims' social media platform activities. The attacker in this case can be a hired or doing for his or personal gains spying someone else. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Also, cyberstalking can be gender-based, where victims are trolled online (Cole, 2015), which includes sending rape threats and sharing of victims’ personal information online. This happens when a popular person messes up in the public and the social media platforms goes viral against the individuals. These can include the things someone does in his or her private life and this cause an uproar in social media platforms like Facebook and twitter against the gender of that particular individual. 

Cyberstalking can also take the form of spouse monitoring the other spouse movements using GPS tracker (Cynthia, Finn and Frasier 2007). It a form of domestic violence, especially when the is a mistrust between the two partners, which pushes the other partner to monitor his or her moments using a GPS tracker. Also, cyberstalking can take the form of profiling celebrities by fans as in for the instance of Patricia Arquette, who blocks her Facebook account because of cyberstalking (Harp, 2012). 

Technology has facilitated cyberstalking mainly through spying and eavesdropping. With the advancement in technology, cyberstalking has to take various ways, which includes email stalking, computer stalking, and mobile stalking. With the revolution of mobile phones, they have been so powerful that hidden applications can be installed in the victim's devices with his or her consent. The hidden installed applications enable the attacker to gather information about the victim. Moreover, the attacker can hack into the victim’s computer and gain some personal information about the victim (Cox & Speziale, 2009). 

Also, technology has facilitated cyber stalker's anonymity on the internet to hid their activities on the internet (Wykes, 2007; Harrison, 2006). It has enabled the cyberstalker to enjoy the long crime time since he or she cannot easily be found. As reported by Catteneo (2011), 22 out of 82 women said having received unknown email and text messages. With powerful technology such as virtual private networks that provide full anonymity on the internet, it has enabled cyberstalkers to enjoy privacy while causing harassment to the victim. 

Examples of cyberstalking is the case of software developer and blogger Kathy Sierra, where she was cyberstalked and cyber bullied by an anonymous group in 2007. Sierra received attackers’ threats of raping her and sharing her personal home address and social security number over the internet. With such threats and attacks Sierra was forced to close her blog and also cancel a seminar in which she was supposed to give a talk (Citron & Keats, 2009). 

Laws and Policies 

Laws and policies that protect victims from cyberstalking and harassment have been limited in the past. Since stalking was never considered as a crime until 2012 when the protection of Freedoms Act 2012 was introduced, which inserted two new sections 2A and 4A into the PHA 1997, even though, two sections inserted into the law is not directly related to cyberstalking it gives prosecutors guidelines on how such criminals should be prosecuted. Again, the legal definition of stalking in section 2A of the PHA 1997 clearly defines the acts that should be omitted and at what circumstances stalking should be considered a crime. 

Laws and policies to protect victims against cyberstalking have been laid down in the following Acts: Protection from Harassment Act 1997, Offenses Against the Person Act 1861, the Sexual Offences Act 2003, and the Malicious Communications Act 1988. These Acts provide protection to victims of stalking from various offenses. I any point when a victim reports about crimes against cyberstalking and harassment, they are laws and policies that protect them from such threats. 

Many cases of cyberstalking have been reported, which includes a matter of a minor who pressed charges against a rapist, which turns out the minor be cyber stalked and cyberbullied by classmates. Which pushed the minor to commit suicide (Chapman, 2010)? 

Also, another reported case of cyberstalking is a college student who recorded a video of his roommate's sexual intimacy with another man and shared it on the internet. The roommate who was posted that is the victim committed suicide. The college student was sentenced with the invasion of privacy (Bruni, 2012) 

Preventive measures 

The preventive measure that every user can take to avoid cyberstalking is many. This includes being keen and careful with personal information he or she shares online in platforms such as emails, social networks like Facebook, Instagram, Twitter, YouTube, chat rooms. Such online platforms provide an easy way to gather personal information like residence, people you care about, places you like to go, and photos. With such information, it easy for an attacker to target a user. Thus it very crucial to control the amount of data that every user share s online. 

Also, to avoid being a victim of cyberstalking, every user should have different email addresses and accounts for registering on social media platforms. Since a single address used for logging, all the social media accounts it easy for an attacker to link up the email address from all the social accounts. And also to avoid spam and reveal most of your activities online. 

References 

Bocij, P. T. (2002). Corporate Cyberstalking: An Invitation to Build Theory.  First Monday 7 (11). doi:10.5210/fm. v7i11.1002 

Cyberstalking. (2004, March 23). Retrieved from https://en.wikipedia.org/wiki/Cyberstalking#cite_note-citron61-24 

Cyberstalking. (2004, March 23). Retrieved from https://en.wikipedia.org/wiki/Cyberstalking#cite_note-Paul_2002-25 

Cyberstalking. (2004, March 23). Retrieved from https://en.wikipedia.org/wiki/Cyberstalking#cite_note-52 

Online Harassment & Cyberstalking. (n.d.). Retrieved from https://privacyrights.org/consumer-guides/online-harassment-cyberstalking 

Samantha Kelly Suicide: Rape Charges Dropped, Mother Speaks Up. (2010, November 13). Retrieved from http://www.thedailybeast.com/articles/2010/11/13/samantha-kelly-suicide-sex-miconduct-charges-dropped-as-an-alleged-assailant-walks-free.html 

Stalking and Harassment. (n.d.). Retrieved from https://www.cps.gov.uk/legal-guidance/stalking-and-harassment 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). Cyberstalking and Cyber Harassment .
https://studybounty.com/cyberstalking-and-cyber-harassment-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Criminal Justice

Research in Criminal Justice

Research is the primary tool for progressing knowledge in different fields criminal justice included. The results of studies are used by criminal justice learners, scholars, criminal justice professionals, and...

Words: 250

Pages: 1

Views: 166

17 Sep 2023
Criminal Justice

The Art of Taking and Writing Notes in Law Enforcement

Every individual must seek adequate measures to facilitate input for appropriate output in daily engagements. For law enforcement officers, the work description involving investigations and reporting communicates the...

Words: 282

Pages: 1

Views: 183

17 Sep 2023
Criminal Justice

Justice System Issues: The Joseph Sledge Case

The Joseph Sledge case reveals the various issues in the justice system. The ethical issues portrayed in the trial include the prosecutor's misconduct. To begin with, the prosecution was involved in suppressing...

Words: 689

Pages: 2

Views: 252

17 Sep 2023
Criminal Justice

Victim Advocacy: Date Rape

General practice of law requires that for every action complained of there must be probable cause and cogent evidence to support the claim. Lack thereof forces the court to dismiss the case or acquit the accused. It...

Words: 1247

Pages: 4

Views: 76

17 Sep 2023
Criminal Justice

New Rehabilitation and Evaluation

Introduction The rate of recidivism has been on the rise in the United States over the past two decades. Due to mass incarceration, the number of people in American prisons has been escalating. While people...

Words: 2137

Pages: 8

Views: 140

17 Sep 2023
Criminal Justice

Justification of Reflections and Recommendations

Credible understanding and application of criminal justice require adequacy of techniques in analyzing the crime scene, documenting the shooting scene, and analysis of ballistic evidence. The approaches used in...

Words: 351

Pages: 1

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration