fbpx
Wikipedia

Cyberstalking

Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization.[1][2] It may include false accusations, defamation, slander and libel. It may also include monitoring, identity theft, threats, vandalism, solicitation for sex, doxing, or blackmail.[1] These unwanted behaviors are perpetrated online and cause intrusion into an individual's digital life as well as negatively impact a victim's mental and emotional well-being, as well as their sense of safety and security online. [3]

Cyberstalking is often accompanied by realtime or offline stalking.[4] In many jurisdictions, such as California, both are criminal offenses.[5] Both are motivated by a desire to control, intimidate or influence a victim.[6] A stalker may be an online stranger or a person whom the target knows. They may be anonymous and solicit involvement of other people online who do not even know the target.[7]

Cyberstalking is a criminal offense under various state anti-stalking, slander and harassment laws. A conviction can result in a restraining order, probation, or criminal penalties against the assailant, including jail.

Cyberstalking is often defined as unwanted behavior

Definitions and description

There have been a number of attempts by experts and legislators to define cyberstalking. It is generally understood to be the use of the Internet or other electronic means to stalk or harass an individual, a group, or an organization.[1] Cyberstalking is a form of cyberbullying; the terms are often used interchangeably in the media. Both may include false accusations, defamation, slander and libel.[4]

Cyberstalking may also include monitoring, identity theft, threats, vandalism, solicitation for sex, or gathering information that may be used to threaten or harass. Cyberstalking is often accompanied by real-time or offline stalking.[4] Both forms of stalking may be criminal offenses.[5]

Stalking is a continuous process, consisting of a series of actions, each of which may be entirely legal in itself. Technology ethics professor Lambèr Royakkers defines cyberstalking as perpetrated by someone without a current relationship with the victim. About the abusive effects of cyberstalking, he writes that:

[Stalking] is a form of mental assault, in which the perpetrator repeatedly, unwantedly, and disruptively breaks into the life-world of the victim, with whom he has no relationship (or no longer has), with motives that are directly or indirectly traceable to the affective sphere. Moreover, the separated acts that make up the intrusion cannot by themselves cause the mental abuse, but do taken together (cumulative effect).[8]

Distinguishing cyberstalking from other acts

There is a distinction between cyber-trolling and cyber-stalking. Research has shown that actions that can be perceived to be harmless as a one-off can be considered to be trolling, whereas if it is part of a persistent campaign then it can be considered stalking.

TM Motive Mode Gravity Description
1 Playtime Cyber-bantering Cyber-trolling In the moment and quickly regret
2 Tactical Cyber-trickery Cyber-trolling In the moment but do not regret and continue
3 Strategic Cyber-bullying Cyber-stalking Go out of way to cause problems, but without a sustained and planned long-term campaign
4 Domination Cyber-hickery Cyber-stalking Goes out of the way to create rich media to target one or more specific individuals

Cyberstalking author Alexis Moore separates cyberstalking from identity theft, which is financially motivated.[9] Her definition, which was also used by the Republic of the Philippines in their legal description, is as follows:[10]

Cyberstalking is a technologically-based "attack" on one person who has been targeted specifically for that attack for reasons of anger, revenge or control. Cyberstalking can take many forms, including:

  1. harassment, embarrassment and humiliation of the victim
  2. emptying bank accounts or other economic control such as ruining the victim's credit score
  3. harassing family, friends and employers to isolate the victim
  4. scare tactics to instill fear and more[9]

Identification and detection

CyberAngels has written about how to identify cyberstalking:[11]

When identifying cyberstalking "in the field," and particularly when considering whether to report it to any kind of legal authority, the following features or combination of features can be considered to characterize a true stalking situation: malice, premeditation, repetition, distress, obsession, vendetta, no legitimate purpose, personally directed, disregarded warnings to stop, harassment and threats.

A number of key factors have been identified in cyberstalking:

  • False accusations: Many cyberstalkers try to damage the reputation of their victim and turn other people against them. They post false information about them on websites. They may set up their own websites, blogs or user pages for this purpose. They post allegations about the victim to newsgroups, chat rooms, or other sites that allow public contributions such as Wikipedia or Amazon.com.[12]
  • Attempts to gather information about the victim: Cyberstalkers may approach their victim's friends, family and work colleagues to obtain personal information. They may advertise for information on the Internet, or hire a private detective.[13]
  • Monitoring their target's online activities and attempting to trace their IP address in an effort to gather more information about their victims.[14]
  • Encouraging others to harass the victim: Many cyberstalkers try to involve third parties in the harassment. They may claim the victim has harmed the stalker or his/her family in some way, or may post the victim's name and telephone number in order to encourage others to join the pursuit.
  • False victimization: The cyberstalker will claim that the victim is harassing him or her. Bocij writes that this phenomenon has been noted in a number of well-known cases.[15]
  • Attacks on data and equipment: They may try to damage the victim's computer by sending viruses.
  • Ordering goods and services: They order items or subscribe to magazines in the victim's name. These often involve subscriptions to pornography or ordering sex toys then having them delivered to the victim's workplace.
  • Arranging to meet: Young people face a particularly high risk of having cyberstalkers try to set up meetings between them.[15]
  • The posting of defamatory or derogatory statements: Using web pages and message boards to incite some response or reaction from their victim.[16]

Prevalence and impact

According to Law Enforcement Technology, cyberstalking has increased with the growth of new technology and new ways to stalk victims. "Disgruntled employees pose as their bosses to post explicit messages on social network sites; spouses use GPS to track their mates' every move. Even police and prosecutors find themselves at risk, as gang members and other organized criminals find out where they live — often to intimidate them into dropping a case."[17]

In January 2009, the Bureau of Justice Statistics in the United States released the study "Stalking Victimization in the United States," which was sponsored by the Office on Violence Against Women. The report, based on supplemental data from the National Crime Victimization Survey, showed that one in four stalking victims had been cyberstalked as well, with the perpetrators using internet-based services such as email, instant messaging, GPS, or spyware. The final report stated that approximately 1.2 million victims had stalkers who used technology to find them.[17] The Rape, Abuse and Incest National Network (RAINN), in Washington D.C. has released statistics that there are 3.4 million stalking victims each year in the United States. Of those, one in four reported experiencing cyberstalking.[18]

According to Robin M. Kowalski, a social psychologist at Clemson University, cyberbullying has been shown to cause higher levels of anxiety and depression for victims than normal bullying. Kowalksi states that much of this stems from the anonymity of the perpetrators, which is a common feature of cyberstalking as well. According to a study by Kowalksi, of 3,700 bullied middle-school students, a quarter had been subjected to a form of online harassment.[19]

Types

Stalking by strangers

According to Joey Rushing, a District Attorney of Franklin County, Alabama, there is no single definition of a cyberstalker - they can be either strangers to the victim or have a former/present relationship. "[Cyberstalkers] come in all shapes, sizes, ages and backgrounds. They patrol Web sites looking for an opportunity to take advantage of people."[18]

Gender-based stalking

Harassment and stalking because of gender online, also known as online gender-based violence, is common, and can include rape threats[20] and other threats of violence, as well as the posting of the victim's personal information.[21] It is blamed for limiting victims' activities online or driving them offline entirely, thereby impeding their participation in online life and undermining their autonomy, dignity, identity, and opportunities.[22]

Of intimate partners

Cyberstalking of intimate partners is the online harassment of a current or former romantic partner. It is a form of domestic violence, and experts say its purpose is to control the victim in order to encourage social isolation and create dependency. Harassers may send repeated insulting or threatening e-mails to their victims, monitor or disrupt their victims' e-mail use, and use the victim's account to send e-mails to others posing as the victim or to purchase goods or services the victim does not want. They may also use the Internet to research and compile personal information about the victim, to use in order to harass him or her.[23]

Of celebrities and public persons

Profiling of stalkers shows that almost always they stalk someone they know or, via delusion, think they know, as is the case with stalkers of celebrities or public persons in which the stalkers feel they know the celebrity even though the celebrity does not know them.[24] As part of the risk they take for being in the public eye, celebrities and public figures are often targets of lies or made-up stories in tabloids as well as by stalkers, some even seeming to be fans.

In one noted case in 2011, actress Patricia Arquette quit Facebook after alleged cyberstalking. In her last post, Arquette explained that her security warned her Facebook friends to never accept friend requests from people they do not actually know. Arquette stressed that just because people seemed to be fans did not mean they were safe. The media issued a statement that Arquette planned to communicate with fans exclusively through her Twitter account in the future.[25]

By anonymous online mobs

Web 2.0 technologies have enabled online groups of anonymous people to self-organize to target individuals with online defamation, threats of violence and technology-based attacks. These include publishing lies and doctored photographs, threats of rape and other violence, posting sensitive personal information about victims, e-mailing damaging statements about victims to their employers, and manipulating search engines to make damaging material about the victim more prominent.[26] Victims frequently respond by adopting pseudonyms or going offline entirely.[27]

Experts attribute the destructive nature of anonymous online mobs to group dynamics, saying that groups with homogeneous views tend to become more extreme. As members reinforce each others' beliefs, they fail to see themselves as individuals and lose a sense of personal responsibility for their destructive acts. In doing so they dehumanize their victims, becoming more aggressive when they believe they are supported by authority figures. Internet service providers and website owners are sometimes blamed for not speaking out against this type of harassment.[27]

A notable example of online mob harassment was the experience of American software developer and blogger Kathy Sierra. In 2007 a group of anonymous individuals attacked Sierra, threatening her with rape and strangulation, publishing her home address and Social Security number, and posting doctored photographs of her. Frightened, Sierra cancelled her speaking engagements and shut down her blog, writing "I will never feel the same. I will never be the same."[27]

Corporate cyberstalking

Corporate cyberstalking is when a company harasses an individual online, or an individual or group of individuals harasses an organization.[28] Motives for corporate cyberstalking are ideological, or include a desire for financial gain or revenge.[28]

Perpetrators

Motives and profile

Mental profiling of digital criminals has identified psychological and social factors that motivate stalkers as: envy; pathological obsession (professional or sexual); unemployment or failure with own job or life; intention to intimidate and cause others to feel inferior; the stalker is delusional and believes they "know" the target; the stalker wants to instill fear in a person to justify his/her status; belief they can get away with it (anonymity); intimidation for financial advantage or business competition; revenge over perceived or imagined rejection.[29][30]

Four types of cyberstalkers

Preliminary work by Leroy McFarlane and Paul Bocij has identified four types of cyberstalkers: the vindictive cyberstalkers noted for the ferocity of their attacks; the composed cyberstalker whose motive is to annoy; the intimate cyberstalker who attempts to form a relationship with the victim but turns on them if rebuffed; and collective cyberstalkers, groups with a motive.[31] According to Antonio Chacón Medina, author of Una nueva cara de Internet, El acoso ("A new face of the Internet: stalking"), the general profile of the harasser is cold, with little or no respect for others. The stalker is a predator who can wait patiently until vulnerable victims appear, such as women or children, or may enjoy pursuing a particular person, whether personally familiar to them or unknown. The harasser enjoys and demonstrates their power to pursue and psychologically damage the victim.[32]

Behaviors

Cyberstalkers find their victims by using search engines, online forums, bulletin and discussion boards, chat rooms, and more recently, through social networking sites,[33] such as MySpace, Facebook, Bebo, Friendster, Twitter, and Indymedia, a media outlet known for self-publishing. They may engage in live chat harassment or flaming or they may send electronic viruses and unsolicited e-mails.[34] Cyberstalkers may research individuals to feed their obsessions and curiosity. Conversely, the acts of cyberstalkers may become more intense, such as repeatedly instant messaging their targets.[35] More commonly they will post defamatory or derogatory statements about their stalking target on web pages, message boards, and in guest books designed to get a reaction or response from their victim, thereby initiating contact.[34] In some cases, they have been known to create fake blogs in the name of the victim containing defamatory or pornographic content.

When prosecuted, many stalkers have unsuccessfully attempted to justify their behavior based on their use of public forums, as opposed to direct contact. Once they get a reaction from the victim, they will typically attempt to track or follow the victim's internet activity. Classic cyberstalking behavior includes the tracing of the victim's IP address in an attempt to verify their home or place of employment.[34] Some cyberstalking situations do evolve into physical stalking, and a victim may experience abusive and excessive phone calls, vandalism, threatening or obscene mail, trespassing, and physical assault.[34] Moreover, many physical stalkers will use cyberstalking as another method of harassing their victims.[36][37]

A 2007 study led by Paige Padgett from the University of Texas Health Science Center found that there was a false degree of safety assumed by women looking for love online.[38][39]

Cyberstalking legislation

Legislation on cyberstalking varies from country to country. Cyberstalking and cyberbullying are relatively new phenomena, but that does not mean that crimes committed through the network are not punishable under legislation drafted for that purpose. Although there are often existing laws that prohibit stalking or harassment in a general sense, legislators sometimes believe that such laws are inadequate or do not go far enough, and thus bring forward new legislation to address this perceived shortcoming. The point overlooked is that enforcing these laws can be a challenge in these virtual communities. The reason being, these issues are very unique to law enforcement agencies who have never faced cases related to cyberstalking.[40] In the United States, for example, nearly every state has laws that address cyberstalking, cyberbullying, or both.[41]

In countries such as the US, in practice, there is little legislative difference between the concepts of "cyberbullying" and "cyberstalking." The primary distinction is one of age; if adults are involved, the act is usually termed cyberstalking, while among children it is usually referred to as cyberbullying. However, as there have not been any formal definitions of the terms, this distinction is one of semantics and many laws treat bullying and stalking as much the same issue.[42]

Australia

In Australia, the Stalking Amendment Act (1999) includes the use of any form of technology to harass a target as forms of "criminal stalking."

Canada

In 2012, there was a high-profile investigation into the death of Amanda Todd, a young Canadian student who had been blackmailed and stalked online before committing suicide. The Royal Canadian Mounted Police were criticized in the media for not naming one of her alleged stalkers as a person of interest.[43]

Philippines

In the Fifteenth Congress of the Republic of the Philippines, a cyberstalking bill was introduced by Senator Manny Villar. The result was to "urge the Senate Committees on Science and Technology, and Public Information and Mass Media to conduct an inquiry, in aid of legislation, on the increasing occurrence of cyber stalking cases and the modus operandi adopted in the internet to perpetuate crimes with the end in view of formulating legislation and policy measures geared towards curbing cyber stalking and other cyber crimes and protect online users in the country."[10]

United States

History, current legislation

Cyberstalking is a criminal offense under American anti-stalking, slander, and harassment laws.

A conviction can result in a restraining order, probation, or criminal penalties against the assailant, including jail.[44] Cyberstalking specifically has been addressed in recent U.S. federal law. For example, the Violence Against Women Act, passed in 2000, made cyberstalking a part of the federal interstate stalking statute.[34] The current US Federal Anti-Cyber-Stalking law is found at 47 U.S.C. § 223.[45]

Still, there remains a lack of federal legislation to specifically address cyberstalking, leaving the majority of legislative at the state level.[34] A few states have both stalking and harassment statutes that criminalize threatening and unwanted electronic communications.[46] The first anti-stalking law was enacted in California in 1990, and while all fifty states soon passed anti-stalking laws, by 2009 only 14 of them had laws specifically addressing "high-tech stalking."[17] The first U.S. cyberstalking law went into effect in 1999 in California.[47] Other states have laws other than harassment or anti-stalking statutes that prohibit misuse of computer communications and e-mail, while others have passed laws containing broad language that can be interpreted to include cyberstalking behaviors, such as in their harassment or stalking legislation.[citation needed]

Sentences can range from 18 months in prison and a $10,000 fine for a fourth-degree charge to ten years in prison and a $150,000 fine for a second-degree charge.[48]

States with cyberstalking legislation
  • Alabama, Arizona, Connecticut, Hawaii, Illinois, New Hampshire, and New York have included prohibitions against harassing electronic, computer or e-mail communications in their harassment legislation.
  • Alaska, Florida, Oklahoma, Wyoming, and California, have incorporated electronically communicated statements as conduct constituting stalking in their anti-stalking laws.
  • Texas enacted the Stalking by Electronic Communications Act, 2001.
  • Missouri revised its state harassment statutes to include stalking and harassment by telephone and electronic communications (as well as cyber-bullying) after the Megan Meier suicide case of 2006. In one of the few cases where a cyberstalking conviction was obtained the cyberstalker was a woman, which is also much rarer that male cyberstalkers.[49] The conviction was overturned in on appeal in 2009 however.[50]
  • In Florida, HB 479 was introduced in 2003 to ban cyberstalking. This was signed into law on October 2003.[51]

Age, legal limitations

While some laws only address online harassment of children, there are laws that protect adult cyberstalking victims. While some sites specialize in laws that protect victims age 18 and under, current and pending cyberstalking-related United States federal and state laws offer help to victims of all ages.[52]

Most stalking laws require that the perpetrator make a credible threat of violence against the victim; others include threats against the victim's immediate family; and still others require the alleged stalker's course of conduct constitute an implied threat. While some conduct involving annoying or menacing behavior might fall short of illegal stalking, such behavior may be a prelude to stalking and violence and should be treated seriously.[53]

Online identity stealth blurs the line on infringement of the rights of would-be victims to identify their perpetrators. There is a debate on how internet use can be traced without infringing on protected civil liberties.[citation needed]

Specific cases

There have been a number of high-profile legal cases in the United States related to cyberstalking, many of which have involved the suicides of young students.[19][54] In thousands of other cases, charges either were not brought for the cyber harassment or were unsuccessful in obtaining convictions.[55] As in all legal instances, much depends on public sympathy towards the victim, the quality of legal representation and other factors that can greatly influence the outcome of the crime – even if it will be considered a crime.[56]

In the case of a fourteen-year-old student in Michigan, for instance, she pressed charges against her alleged rapist, which resulted in her being cyberstalked and cyberbullied by fellow students. After her suicide in 2010 all charges were dropped against the man who allegedly raped her, on the basis that the only witness was dead. This is the despite the fact that statutory rape charges could have been pressed.[57]

In another case of cyberstalking, college student Dharun Ravi secretly filmed his roommate's sexual liaison with another man, then posted it online. After the victim committed suicide,[58][failed verification] Ravi was convicted in of bias intimidation and invasion of privacy in New Jersey v. Dharun Ravi. In 2012 he was sentenced to 30 days in jail, more than $11,000 in restitution and three years of probation. The judge ruled that he believes Ravi acted out of "colossal insensitivity, not hatred."[59]

Europe

See also

References

  1. ^ a b c . Oxford University Press. Archived from the original on 2016-06-14. Retrieved 2013-12-10.
  2. ^ Reyns, Bradford W.; Henson, Billy; Fisher, Bonnie S. (2011-09-21). "Being Pursued Online: Applying Cyberlifestyle–Routine Activities Theory to Cyberstalking Victimization". Criminal Justice and Behavior. 38 (11): 1149–1169. doi:10.1177/0093854811421448. ISSN 0093-8548. S2CID 143775040.
  3. ^ Wilson, Chanelle; Sheridan, Lorraine; Garratt-Reed, David (2021). "What is Cyberstalking? A Review of Measurements". Journal of Interpersonal Violence. 37 (11–12): NP9763–NP9783. doi:10.1177/0886260520985489. ISSN 0886-2605.
  4. ^ a b c Spitzberg, Brian H.; Hoobler, Gregory (February 2002). (PDF). New Media & Society. 1. 4: 71–92. doi:10.1177/14614440222226271. S2CID 27102356. Archived from the original (PDF) on 14 January 2012. Retrieved 14 June 2011.
  5. ^ a b Smith, Kevin (2 September 2016). "Tougher California laws protect victims of digital harassment". San Gabriel Valley Tribune. Retrieved 3 July 2017.
  6. ^ Cyberstalking Crime research
  7. ^ "Cyberstalkers: Tools, Tactics and Threats". United States Cybersecurity Magazine. 2018-10-18. Retrieved 2021-09-04.
  8. ^ Lambèr Royakkers (October 2000). (PDF). California Criminal Law Review. 3. Archived from the original (PDF) on 7 November 2013. Retrieved 10 December 2013.
  9. ^ a b Moore, Alexis A. . About.com. Archived from the original on 2016-05-05. Retrieved 2014-01-12.
  10. ^ a b "Cyberstalking Bill: Introduced by Senator Villar" (PDF). Fifteenth Congress of the Republic of the Philippines. Retrieved 2014-01-12.
  11. ^ Paul Bocij (2004). Cyberstalking: Harassment in the Internet Age and How to Protect Your Family. Praeger. pp. 9–10.
  12. ^ Skip Press. "Fighting Cyberstalking". ComputerEdge Online. from the original on October 28, 2012. Retrieved 2013-11-29.
  13. ^ . The Women's Center. Archived from the original on 2013-12-13. Retrieved 2013-12-10.
  14. ^ Leroy McFarlane; Paul Bocij (2003-09-01). "An exploration of predatory behavior in cyberspace: Towards a typology of cyberstalkers". First Monday. 8 (9). doi:10.5210/fm.v8i9.1076. Retrieved 2013-11-29.
  15. ^ a b Bocij, Paul (2004). Cyberstalking: Harassment in the Internet Age and how to Protect Your Family. Greenwood Publishing Group. pp. 12–13. ISBN 978-0-275-98118-1.
  16. ^ Lux, John E. (25 July 2010). Bash the Stock Bashers!. Eagle Point Publishing. ISBN 9781450728218. Retrieved 1 May 2017 – via Google Books.
  17. ^ a b c Miller, Christa (April 30, 2009). "High-Tech Stalking". Law Enforcement Technology. Officer.com. Retrieved 12 January 2014.
  18. ^ a b Smith, Tom (February 28, 2010). "Criminals use technology to track victims". Times Daily. Retrieved 2014-01-12.
  19. ^ a b "Alexis Pilkington Facebook Horror: Cyber Bullies Harass Teen Even After Suicide". Huffington Post. 25 May 2011. Retrieved 2013-08-15.
  20. ^ K.K. Cole (2015). "It's Like She's Eager to be Verbally Abused": Twitter, Trolls, and (En) Gendering Disciplinary Rhetoric. Feminist Media Studies, 15(2), 356-358.
  21. ^ R.S. Mathews, S. Aghili, D. Lindskog (2013) A Study of Doxing, its Security Implications and Mitigation Strategies for Organizations.
  22. ^ Citron, Danielle Keats (October 2009). "Law's Expressive Value in Combating Cyber Gender Harassment". Michigan Law Review. 108: 373. SSRN 1352442.
  23. ^ Southworth, Cynthia; Finn, Jerry; Dawson, Shawndell; Fraser, Cynthia; Tucker, Sarah (2007). "Intimate Partner Violence, Technology, and Stalking". Violence Against Women. 8. 13 (8): 842–856. doi:10.1177/1077801207302045. PMID 17699114. S2CID 21299375.
  24. ^ . Baddteddy.com. Archived from the original on 19 July 2013. Retrieved 10 December 2013.
  25. ^ Justin Harp (7 October 2012). "Patricia Arquette quits Facebook after alleged cyberstalking". Digital Spy. Retrieved 10 December 2013.
  26. ^ Lipika (13 May 2016). "What is a Web 2.0 technology?". Retrieved 17 December 2018.
  27. ^ a b c Citron, Danielle Keats (February 2009). (PDF). Boston University Law Review. 61. 89: 61–125. Archived from the original (PDF) on 1 November 2013. Retrieved 10 December 2013.
  28. ^ a b Paul Bocij (4 November 2002). "Corporate Cyberstalking". First Monday. 7 (11). doi:10.5210/fm.v7i11.1002. ISSN 1396-0466. Retrieved 10 December 2013.
  29. ^ Wayne Petherick. . Archived from the original on 9 February 2009. Retrieved 10 December 2013.
  30. ^ Quit Stalking Me (28 July 2011). . Quitstalkingme.com. Archived from the original on 12 December 2013. Retrieved 10 December 2013.
  31. ^ Leroy McFarlane, Paul Bocij (1 September 2003). . First Monday. 8 (9). doi:10.5210/fm.v8i9.1076. ISSN 1396-0466. Archived from the original on 4 April 2012. Retrieved 10 December 2013. A typology of cyberstalkers was developed.
  32. ^ (PDF) (in Spanish). 2003. Archived from the original (PDF) on November 22, 2007. Retrieved December 29, 2010.
  33. ^ Pikul, Corrie (19 August 2010). . Elle.com. Archived from the original on 23 June 2011. Retrieved 2011-03-12.
  34. ^ a b c d e f . The National Center For Victims of Crime. 2003. Archived from the original on 17 June 2004.
  35. ^ Howes, Oliver D. (September 2006). "Compulsions in Depression: Stalking by Text Message". The American Journal of Psychiatry. 163 (9): 1642. doi:10.1176/appi.ajp.163.9.1642. PMID 16946195. Archived from the original on 2013-01-13.
  36. ^ "Types of Stalkers and Stalking Patterns". Sexualharrassmentsupport.com. Archived from the original on 2006-04-09. Retrieved 2013-12-10.
  37. ^ . CrimeLibrary.com. Archived from the original on 2006-08-31.
  38. ^ Bonnie Zylbergold. . National Sexuality Resource Center. American Sexuality Magazine. Archived from the original on June 18, 2007.
  39. ^ Paige M. Padgett (June 2007). "Personal Safety and Sexual Safety for Women Using Online Personal Ads". Sexuality Research and Social Policy: National Sexuality Resource Center. 4 (2): 27–37. doi:10.1525/srsp.2007.4.2.27. (Abstract only; full text requires subscription)
  40. ^ King, Ruby (2017-05-01). "Digital Domestic Violence: Are Victims of Intimate Partner Cyber Harassment". Victoria University of Wellington Law Review. 48 (1): 29–54. doi:10.26686/vuwlr.v48i1.4770. ISSN 1171-042X.
  41. ^ Legislatures, National Conference of State. . www.ncsl.org. Archived from the original on June 13, 2009. Retrieved 27 March 2018.
  42. ^ H. A. Hosani, M. Yousef, S. A. Shouq, F. Iqbal and D. Mouheb, "A Comparative Analysis of Cyberbullying and Cyberstalking Laws in the UAE, US, UK and Canada," 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA), Abu Dhabi, United Arab Emirates, 2019, pp. 1-7, doi: 10.1109/AICCSA47632.2019.9035368.
  43. ^ Hoffberger, Chase (13 November 2012). ""The Daily Capper" exposes alleged culprit in Amanda Todd suicide". The Daily Dot. Retrieved 2013-08-15.
  44. ^ "18 U.S. Code § 2261(b)". Legal Information Institute. from the original on 2012-02-21.
  45. ^ "Cybertelecom :: 47 USC 233". Cybertelecom. Retrieved 2013-12-10.
  46. ^ "Working to Halt Online Abuse". Working to Halt Online Abuse.
  47. ^ Miller, Greg; Maharaj, Davan (Jan 22, 1999). "N. Hollywood Man Charged in 1st Cyber-Stalking Case". Los Angeles Times.
  48. ^ Blessman, Stuart (2016). "Doxing What to look for. How to prevent it". Officer.com.
  49. ^ Perry, Elizabeth (2 July 2008). "Blunt signs cyberbullying bill". St. Louis Post-Dispatch. Stltoday.com. Retrieved 2011-06-18.
  50. ^ Zetter, Kim (November 20, 2009). "Prosecutors Drop Plans to Appeal Lori Drew Case". Wired News.
  51. ^ . Florida Computer Crime Center. Archived from the original on 2007-02-05.
  52. ^ . Working to Halt Online Abuse. Archived from the original on 2018-09-12. Retrieved 2013-12-10.
  53. ^ . Justice.gov. The United States Department of Justice. August 1999. Archived from the original on February 25, 2010. Retrieved 2013-11-29.
  54. ^ Carlin Miller (11 November 2010). . CBS News. Archived from the original on July 25, 2013. Retrieved 2013-08-15.
  55. ^ Julia Dahl (12 April 2013). . CBS News. Archived from the original on April 13, 2013. Retrieved 2013-12-10.
  56. ^ Neil Katz (12 November 2010). . CBS News. Archived from the original on November 14, 2010. Retrieved 2013-08-15.
  57. ^ Mary M. Chapman (13 November 2010). "Samantha Kelly Suicide: Rape Charges Dropped, Mother Speaks Up". The Daily Beast. Retrieved 2013-08-15.
  58. ^ Frank Bruni (23 May 2012). "More Thoughts on the Ravi/Clementi Case". The New York Times.
  59. ^ "Live blog: Dharun Ravi sentenced to 30 days in jail". NJ.com. 2012-05-21. Retrieved 2013-12-05.
  60. ^ Piotr Wołkowicki (14 June 2011). ['Stalking' in Polish criminal law]. Blogi prawne i podatkowe (in Polish). Archived from the original on 1 May 2015. Retrieved 22 November 2013.
  61. ^ . www.gdt.GuardiaCivil.es (in Spanish). Archived from the original on 29 January 2011. Retrieved 1 May 2017.
  62. ^ . Policia.es (in Spanish). Archived from the original on 24 February 2008. Retrieved 1 May 2017.
  63. ^ "Protegeles" (in Spanish). Protegeles. 26 August 1997. Retrieved 29 November 2013.

Further reading

  • Bocij, Paul (2004). Cyberstalking: Harassment in the Internet Age and how to Protect Your Family. Greenwood Publishing Group. ISBN 0-275-98118-5
  • Ellison, Louise; Akdeniz, Yaman. Criminal Law Review. December 1998 Special Edition: Crime, Criminal Justice and the Internet. pp. 29–48.
  • Meloy, J. (2000). The Psychology of Stalking. Reid. Academic Press. ISBN 0-12-490561-7
  • Mullen, Paul E.; Pathé, Michele; Purcell, Rosemary (2000). Stalkers and Their Victims. Cambridge University Press. ISBN 0-521-66950-2
  • Hitchcock, J.A. (2006). Net Crimes & Misdemeanors: Outmaneuvering the Spammers, Swindlers, and Stalkers Who Are Targeting You Online. CyberAge Books. ISBN 0-910965-72-2
  • (PDF). Archived from the original (PDF) on March 15, 2007. Retrieved August 7, 2006.
  • . Archived from the original on February 3, 2019. Retrieved January 4, 2017.
  • Cyberstalking – Is it Covered by Current Anti-Stalking Laws? by Craig Lee and Patrick Lynch

External links

  • Privacy Rights Clearinghouse
Academic and government studies
  • United States Law and the Internet: Georgia State University College of Law 2021-03-08 at the Wayback Machine (2001)
  • "Cybertelecom :: Cyberstalking Federal Internet Law & Regulation". from the original on November 21, 2010. Retrieved December 10, 2013.
  • at the Wayback Machine (archive index), Minnesota Center Against Violence and Abuse (2002)
  • . Archived from the original on March 1, 2010. Retrieved November 29, 2013. United States Department of Justice (August 1999).
  • Cyber stalking: An Analysis of Online Harassment and Intimidation by Cyber Crime Journal
Blogs, stories
  • Surviving the Extinct Marsuplial: [sic] An ongoing blog by several victims of a single stalker documenting his activities
  • , FBI (2013)

cyberstalking, cyberstalker, redirects, here, lifetime, film, cyberstalker, film, internet, other, electronic, means, stalk, harass, individual, group, organization, include, false, accusations, defamation, slander, libel, also, include, monitoring, identity, . Cyberstalker redirects here For the Lifetime TV film see Cyberstalker film Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual group or organization 1 2 It may include false accusations defamation slander and libel It may also include monitoring identity theft threats vandalism solicitation for sex doxing or blackmail 1 These unwanted behaviors are perpetrated online and cause intrusion into an individual s digital life as well as negatively impact a victim s mental and emotional well being as well as their sense of safety and security online 3 Cyberstalking is often accompanied by realtime or offline stalking 4 In many jurisdictions such as California both are criminal offenses 5 Both are motivated by a desire to control intimidate or influence a victim 6 A stalker may be an online stranger or a person whom the target knows They may be anonymous and solicit involvement of other people online who do not even know the target 7 Cyberstalking is a criminal offense under various state anti stalking slander and harassment laws A conviction can result in a restraining order probation or criminal penalties against the assailant including jail Cyberstalking is often defined as unwanted behavior Contents 1 Definitions and description 1 1 Distinguishing cyberstalking from other acts 1 2 Identification and detection 2 Prevalence and impact 3 Types 3 1 Stalking by strangers 3 2 Gender based stalking 3 3 Of intimate partners 3 4 Of celebrities and public persons 3 5 By anonymous online mobs 3 6 Corporate cyberstalking 4 Perpetrators 4 1 Motives and profile 4 2 Behaviors 5 Cyberstalking legislation 5 1 Australia 5 2 Canada 5 3 Philippines 5 4 United States 5 4 1 History current legislation 5 4 2 Age legal limitations 5 4 3 Specific cases 5 5 Europe 6 See also 7 References 8 Further reading 9 External linksDefinitions and descriptionSee also Doxing and Cyberbullying There have been a number of attempts by experts and legislators to define cyberstalking It is generally understood to be the use of the Internet or other electronic means to stalk or harass an individual a group or an organization 1 Cyberstalking is a form of cyberbullying the terms are often used interchangeably in the media Both may include false accusations defamation slander and libel 4 Cyberstalking may also include monitoring identity theft threats vandalism solicitation for sex or gathering information that may be used to threaten or harass Cyberstalking is often accompanied by real time or offline stalking 4 Both forms of stalking may be criminal offenses 5 Stalking is a continuous process consisting of a series of actions each of which may be entirely legal in itself Technology ethics professor Lamber Royakkers defines cyberstalking as perpetrated by someone without a current relationship with the victim About the abusive effects of cyberstalking he writes that Stalking is a form of mental assault in which the perpetrator repeatedly unwantedly and disruptively breaks into the life world of the victim with whom he has no relationship or no longer has with motives that are directly or indirectly traceable to the affective sphere Moreover the separated acts that make up the intrusion cannot by themselves cause the mental abuse but do taken together cumulative effect 8 Distinguishing cyberstalking from other acts There is a distinction between cyber trolling and cyber stalking Research has shown that actions that can be perceived to be harmless as a one off can be considered to be trolling whereas if it is part of a persistent campaign then it can be considered stalking TM Motive Mode Gravity Description 1 Playtime Cyber bantering Cyber trolling In the moment and quickly regret 2 Tactical Cyber trickery Cyber trolling In the moment but do not regret and continue 3 Strategic Cyber bullying Cyber stalking Go out of way to cause problems but without a sustained and planned long term campaign 4 Domination Cyber hickery Cyber stalking Goes out of the way to create rich media to target one or more specific individuals Cyberstalking author Alexis Moore separates cyberstalking from identity theft which is financially motivated 9 Her definition which was also used by the Republic of the Philippines in their legal description is as follows 10 Cyberstalking is a technologically based attack on one person who has been targeted specifically for that attack for reasons of anger revenge or control Cyberstalking can take many forms including harassment embarrassment and humiliation of the victim emptying bank accounts or other economic control such as ruining the victim s credit score harassing family friends and employers to isolate the victim scare tactics to instill fear and more 9 Identification and detection CyberAngels has written about how to identify cyberstalking 11 When identifying cyberstalking in the field and particularly when considering whether to report it to any kind of legal authority the following features or combination of features can be considered to characterize a true stalking situation malice premeditation repetition distress obsession vendetta no legitimate purpose personally directed disregarded warnings to stop harassment and threats A number of key factors have been identified in cyberstalking This list is incomplete you can help by adding missing items June 2014 False accusations Many cyberstalkers try to damage the reputation of their victim and turn other people against them They post false information about them on websites They may set up their own websites blogs or user pages for this purpose They post allegations about the victim to newsgroups chat rooms or other sites that allow public contributions such as Wikipedia or Amazon com 12 Attempts to gather information about the victim Cyberstalkers may approach their victim s friends family and work colleagues to obtain personal information They may advertise for information on the Internet or hire a private detective 13 Monitoring their target s online activities and attempting to trace their IP address in an effort to gather more information about their victims 14 Encouraging others to harass the victim Many cyberstalkers try to involve third parties in the harassment They may claim the victim has harmed the stalker or his her family in some way or may post the victim s name and telephone number in order to encourage others to join the pursuit False victimization The cyberstalker will claim that the victim is harassing him or her Bocij writes that this phenomenon has been noted in a number of well known cases 15 Attacks on data and equipment They may try to damage the victim s computer by sending viruses Ordering goods and services They order items or subscribe to magazines in the victim s name These often involve subscriptions to pornography or ordering sex toys then having them delivered to the victim s workplace Arranging to meet Young people face a particularly high risk of having cyberstalkers try to set up meetings between them 15 The posting of defamatory or derogatory statements Using web pages and message boards to incite some response or reaction from their victim 16 Prevalence and impactAccording to Law Enforcement Technology cyberstalking has increased with the growth of new technology and new ways to stalk victims Disgruntled employees pose as their bosses to post explicit messages on social network sites spouses use GPS to track their mates every move Even police and prosecutors find themselves at risk as gang members and other organized criminals find out where they live often to intimidate them into dropping a case 17 In January 2009 the Bureau of Justice Statistics in the United States released the study Stalking Victimization in the United States which was sponsored by the Office on Violence Against Women The report based on supplemental data from the National Crime Victimization Survey showed that one in four stalking victims had been cyberstalked as well with the perpetrators using internet based services such as email instant messaging GPS or spyware The final report stated that approximately 1 2 million victims had stalkers who used technology to find them 17 The Rape Abuse and Incest National Network RAINN in Washington D C has released statistics that there are 3 4 million stalking victims each year in the United States Of those one in four reported experiencing cyberstalking 18 According to Robin M Kowalski a social psychologist at Clemson University cyberbullying has been shown to cause higher levels of anxiety and depression for victims than normal bullying Kowalksi states that much of this stems from the anonymity of the perpetrators which is a common feature of cyberstalking as well According to a study by Kowalksi of 3 700 bullied middle school students a quarter had been subjected to a form of online harassment 19 TypesStalking by strangers According to Joey Rushing a District Attorney of Franklin County Alabama there is no single definition of a cyberstalker they can be either strangers to the victim or have a former present relationship Cyberstalkers come in all shapes sizes ages and backgrounds They patrol Web sites looking for an opportunity to take advantage of people 18 Gender based stalking Harassment and stalking because of gender online also known as online gender based violence is common and can include rape threats 20 and other threats of violence as well as the posting of the victim s personal information 21 It is blamed for limiting victims activities online or driving them offline entirely thereby impeding their participation in online life and undermining their autonomy dignity identity and opportunities 22 Of intimate partners Cyberstalking of intimate partners is the online harassment of a current or former romantic partner It is a form of domestic violence and experts say its purpose is to control the victim in order to encourage social isolation and create dependency Harassers may send repeated insulting or threatening e mails to their victims monitor or disrupt their victims e mail use and use the victim s account to send e mails to others posing as the victim or to purchase goods or services the victim does not want They may also use the Internet to research and compile personal information about the victim to use in order to harass him or her 23 Of celebrities and public persons Profiling of stalkers shows that almost always they stalk someone they know or via delusion think they know as is the case with stalkers of celebrities or public persons in which the stalkers feel they know the celebrity even though the celebrity does not know them 24 As part of the risk they take for being in the public eye celebrities and public figures are often targets of lies or made up stories in tabloids as well as by stalkers some even seeming to be fans In one noted case in 2011 actress Patricia Arquette quit Facebook after alleged cyberstalking In her last post Arquette explained that her security warned her Facebook friends to never accept friend requests from people they do not actually know Arquette stressed that just because people seemed to be fans did not mean they were safe The media issued a statement that Arquette planned to communicate with fans exclusively through her Twitter account in the future 25 By anonymous online mobs See also Networked harassment Web 2 0 technologies have enabled online groups of anonymous people to self organize to target individuals with online defamation threats of violence and technology based attacks These include publishing lies and doctored photographs threats of rape and other violence posting sensitive personal information about victims e mailing damaging statements about victims to their employers and manipulating search engines to make damaging material about the victim more prominent 26 Victims frequently respond by adopting pseudonyms or going offline entirely 27 Experts attribute the destructive nature of anonymous online mobs to group dynamics saying that groups with homogeneous views tend to become more extreme As members reinforce each others beliefs they fail to see themselves as individuals and lose a sense of personal responsibility for their destructive acts In doing so they dehumanize their victims becoming more aggressive when they believe they are supported by authority figures Internet service providers and website owners are sometimes blamed for not speaking out against this type of harassment 27 A notable example of online mob harassment was the experience of American software developer and blogger Kathy Sierra In 2007 a group of anonymous individuals attacked Sierra threatening her with rape and strangulation publishing her home address and Social Security number and posting doctored photographs of her Frightened Sierra cancelled her speaking engagements and shut down her blog writing I will never feel the same I will never be the same 27 Corporate cyberstalking Corporate cyberstalking is when a company harasses an individual online or an individual or group of individuals harasses an organization 28 Motives for corporate cyberstalking are ideological or include a desire for financial gain or revenge 28 PerpetratorsMotives and profile Mental profiling of digital criminals has identified psychological and social factors that motivate stalkers as envy pathological obsession professional or sexual unemployment or failure with own job or life intention to intimidate and cause others to feel inferior the stalker is delusional and believes they know the target the stalker wants to instill fear in a person to justify his her status belief they can get away with it anonymity intimidation for financial advantage or business competition revenge over perceived or imagined rejection 29 30 Four types of cyberstalkers Preliminary work by Leroy McFarlane and Paul Bocij has identified four types of cyberstalkers the vindictive cyberstalkers noted for the ferocity of their attacks the composed cyberstalker whose motive is to annoy the intimate cyberstalker who attempts to form a relationship with the victim but turns on them if rebuffed and collective cyberstalkers groups with a motive 31 According to Antonio Chacon Medina author of Una nueva cara de Internet El acoso A new face of the Internet stalking the general profile of the harasser is cold with little or no respect for others The stalker is a predator who can wait patiently until vulnerable victims appear such as women or children or may enjoy pursuing a particular person whether personally familiar to them or unknown The harasser enjoys and demonstrates their power to pursue and psychologically damage the victim 32 Behaviors Cyberstalkers find their victims by using search engines online forums bulletin and discussion boards chat rooms and more recently through social networking sites 33 such as MySpace Facebook Bebo Friendster Twitter and Indymedia a media outlet known for self publishing They may engage in live chat harassment or flaming or they may send electronic viruses and unsolicited e mails 34 Cyberstalkers may research individuals to feed their obsessions and curiosity Conversely the acts of cyberstalkers may become more intense such as repeatedly instant messaging their targets 35 More commonly they will post defamatory or derogatory statements about their stalking target on web pages message boards and in guest books designed to get a reaction or response from their victim thereby initiating contact 34 In some cases they have been known to create fake blogs in the name of the victim containing defamatory or pornographic content When prosecuted many stalkers have unsuccessfully attempted to justify their behavior based on their use of public forums as opposed to direct contact Once they get a reaction from the victim they will typically attempt to track or follow the victim s internet activity Classic cyberstalking behavior includes the tracing of the victim s IP address in an attempt to verify their home or place of employment 34 Some cyberstalking situations do evolve into physical stalking and a victim may experience abusive and excessive phone calls vandalism threatening or obscene mail trespassing and physical assault 34 Moreover many physical stalkers will use cyberstalking as another method of harassing their victims 36 37 A 2007 study led by Paige Padgett from the University of Texas Health Science Center found that there was a false degree of safety assumed by women looking for love online 38 39 Cyberstalking legislationMain article Cyberstalking legislation Legislation on cyberstalking varies from country to country Cyberstalking and cyberbullying are relatively new phenomena but that does not mean that crimes committed through the network are not punishable under legislation drafted for that purpose Although there are often existing laws that prohibit stalking or harassment in a general sense legislators sometimes believe that such laws are inadequate or do not go far enough and thus bring forward new legislation to address this perceived shortcoming The point overlooked is that enforcing these laws can be a challenge in these virtual communities The reason being these issues are very unique to law enforcement agencies who have never faced cases related to cyberstalking 40 In the United States for example nearly every state has laws that address cyberstalking cyberbullying or both 41 In countries such as the US in practice there is little legislative difference between the concepts of cyberbullying and cyberstalking The primary distinction is one of age if adults are involved the act is usually termed cyberstalking while among children it is usually referred to as cyberbullying However as there have not been any formal definitions of the terms this distinction is one of semantics and many laws treat bullying and stalking as much the same issue 42 Australia In Australia the Stalking Amendment Act 1999 includes the use of any form of technology to harass a target as forms of criminal stalking Canada In 2012 there was a high profile investigation into the death of Amanda Todd a young Canadian student who had been blackmailed and stalked online before committing suicide The Royal Canadian Mounted Police were criticized in the media for not naming one of her alleged stalkers as a person of interest 43 Philippines In the Fifteenth Congress of the Republic of the Philippines a cyberstalking bill was introduced by Senator Manny Villar The result was to urge the Senate Committees on Science and Technology and Public Information and Mass Media to conduct an inquiry in aid of legislation on the increasing occurrence of cyber stalking cases and the modus operandi adopted in the internet to perpetuate crimes with the end in view of formulating legislation and policy measures geared towards curbing cyber stalking and other cyber crimes and protect online users in the country 10 United States History current legislation Cyberstalking is a criminal offense under American anti stalking slander and harassment laws A conviction can result in a restraining order probation or criminal penalties against the assailant including jail 44 Cyberstalking specifically has been addressed in recent U S federal law For example the Violence Against Women Act passed in 2000 made cyberstalking a part of the federal interstate stalking statute 34 The current US Federal Anti Cyber Stalking law is found at 47 U S C 223 45 Still there remains a lack of federal legislation to specifically address cyberstalking leaving the majority of legislative at the state level 34 A few states have both stalking and harassment statutes that criminalize threatening and unwanted electronic communications 46 The first anti stalking law was enacted in California in 1990 and while all fifty states soon passed anti stalking laws by 2009 only 14 of them had laws specifically addressing high tech stalking 17 The first U S cyberstalking law went into effect in 1999 in California 47 Other states have laws other than harassment or anti stalking statutes that prohibit misuse of computer communications and e mail while others have passed laws containing broad language that can be interpreted to include cyberstalking behaviors such as in their harassment or stalking legislation citation needed Sentences can range from 18 months in prison and a 10 000 fine for a fourth degree charge to ten years in prison and a 150 000 fine for a second degree charge 48 States with cyberstalking legislation Alabama Arizona Connecticut Hawaii Illinois New Hampshire and New York have included prohibitions against harassing electronic computer or e mail communications in their harassment legislation Alaska Florida Oklahoma Wyoming and California have incorporated electronically communicated statements as conduct constituting stalking in their anti stalking laws Texas enacted the Stalking by Electronic Communications Act 2001 Missouri revised its state harassment statutes to include stalking and harassment by telephone and electronic communications as well as cyber bullying after the Megan Meier suicide case of 2006 In one of the few cases where a cyberstalking conviction was obtained the cyberstalker was a woman which is also much rarer that male cyberstalkers 49 The conviction was overturned in on appeal in 2009 however 50 In Florida HB 479 was introduced in 2003 to ban cyberstalking This was signed into law on October 2003 51 Age legal limitations While some laws only address online harassment of children there are laws that protect adult cyberstalking victims While some sites specialize in laws that protect victims age 18 and under current and pending cyberstalking related United States federal and state laws offer help to victims of all ages 52 Most stalking laws require that the perpetrator make a credible threat of violence against the victim others include threats against the victim s immediate family and still others require the alleged stalker s course of conduct constitute an implied threat While some conduct involving annoying or menacing behavior might fall short of illegal stalking such behavior may be a prelude to stalking and violence and should be treated seriously 53 Online identity stealth blurs the line on infringement of the rights of would be victims to identify their perpetrators There is a debate on how internet use can be traced without infringing on protected civil liberties citation needed Specific cases There have been a number of high profile legal cases in the United States related to cyberstalking many of which have involved the suicides of young students 19 54 In thousands of other cases charges either were not brought for the cyber harassment or were unsuccessful in obtaining convictions 55 As in all legal instances much depends on public sympathy towards the victim the quality of legal representation and other factors that can greatly influence the outcome of the crime even if it will be considered a crime 56 In the case of a fourteen year old student in Michigan for instance she pressed charges against her alleged rapist which resulted in her being cyberstalked and cyberbullied by fellow students After her suicide in 2010 all charges were dropped against the man who allegedly raped her on the basis that the only witness was dead This is the despite the fact that statutory rape charges could have been pressed 57 In another case of cyberstalking college student Dharun Ravi secretly filmed his roommate s sexual liaison with another man then posted it online After the victim committed suicide 58 failed verification Ravi was convicted in of bias intimidation and invasion of privacy in New Jersey v Dharun Ravi In 2012 he was sentenced to 30 days in jail more than 11 000 in restitution and three years of probation The judge ruled that he believes Ravi acted out of colossal insensitivity not hatred 59 Europe Poland Stalking including cyberstalking was made a criminal offence under the Polish Criminal Code on 6 June 2011 60 Spain In Spain it is possible to provide information about cyber crime in an anonymous way to four safety bodies Grupo de Delitos Telematicos 61 of the Civil Guard Spain in Spanish Brigada de Investigacion Tecnologica 62 of the National Police Corps of Spain in Spanish Mossos d Esquadra in Catalonia and Ertzaintza in Euskadi It is also possible to provide information to a non governmental organization 63 United Kingdom In the United Kingdom the Protection from Harassment Act 1997 contains an offence of stalking covering cyber stalking which was introduced into the act through the Protection of Freedoms Act 2012 See alsoComputer crime Convention on cybercrime Cyberbullying Cyberspace Cyberterrorism DecorMyEyes Harassment by computer Hate group Internet fraud Online dating Online predator Stalking The Psycho Ex Wife ToS violationReferences a b c Cyberstalking Oxford University Press Archived from the original on 2016 06 14 Retrieved 2013 12 10 Reyns Bradford W Henson Billy Fisher Bonnie S 2011 09 21 Being Pursued Online Applying Cyberlifestyle Routine Activities Theory to Cyberstalking Victimization Criminal Justice and Behavior 38 11 1149 1169 doi 10 1177 0093854811421448 ISSN 0093 8548 S2CID 143775040 Wilson Chanelle Sheridan Lorraine Garratt Reed David 2021 What is Cyberstalking A Review of Measurements Journal of Interpersonal Violence 37 11 12 NP9763 NP9783 doi 10 1177 0886260520985489 ISSN 0886 2605 a b c Spitzberg Brian H Hoobler Gregory February 2002 Cyberstalking and the technologies of interpersonal terrorism PDF New Media amp Society 1 4 71 92 doi 10 1177 14614440222226271 S2CID 27102356 Archived from the original PDF on 14 January 2012 Retrieved 14 June 2011 a b Smith Kevin 2 September 2016 Tougher California laws protect victims of digital harassment San Gabriel Valley Tribune Retrieved 3 July 2017 Cyberstalking Crime research Cyberstalkers Tools Tactics and Threats United States Cybersecurity Magazine 2018 10 18 Retrieved 2021 09 04 Lamber Royakkers October 2000 The Dutch Approach to Stalking Laws PDF California Criminal Law Review 3 Archived from the original PDF on 7 November 2013 Retrieved 10 December 2013 a b Moore Alexis A What is cyberstalking About com Archived from the original on 2016 05 05 Retrieved 2014 01 12 a b Cyberstalking Bill Introduced by Senator Villar PDF Fifteenth Congress of the Republic of the Philippines Retrieved 2014 01 12 Paul Bocij 2004 Cyberstalking Harassment in the Internet Age and How to Protect Your Family Praeger pp 9 10 Skip Press Fighting Cyberstalking ComputerEdge Online Archived from the original on October 28 2012 Retrieved 2013 11 29 Violence amp Domestic Abuse Stalking The Women s Center Archived from the original on 2013 12 13 Retrieved 2013 12 10 Leroy McFarlane Paul Bocij 2003 09 01 An exploration of predatory behavior in cyberspace Towards a typology of cyberstalkers First Monday 8 9 doi 10 5210 fm v8i9 1076 Retrieved 2013 11 29 a b Bocij Paul 2004 Cyberstalking Harassment in the Internet Age and how to Protect Your Family Greenwood Publishing Group pp 12 13 ISBN 978 0 275 98118 1 Lux John E 25 July 2010 Bash the Stock Bashers Eagle Point Publishing ISBN 9781450728218 Retrieved 1 May 2017 via Google Books a b c Miller Christa April 30 2009 High Tech Stalking Law Enforcement Technology Officer com Retrieved 12 January 2014 a b Smith Tom February 28 2010 Criminals use technology to track victims Times Daily Retrieved 2014 01 12 a b Alexis Pilkington Facebook Horror Cyber Bullies Harass Teen Even After Suicide Huffington Post 25 May 2011 Retrieved 2013 08 15 K K Cole 2015 It s Like She s Eager to be Verbally Abused Twitter Trolls and En Gendering Disciplinary Rhetoric Feminist Media Studies 15 2 356 358 R S Mathews S Aghili D Lindskog 2013 A Study of Doxing its Security Implications and Mitigation Strategies for Organizations Citron Danielle Keats October 2009 Law s Expressive Value in Combating Cyber Gender Harassment Michigan Law Review 108 373 SSRN 1352442 Southworth Cynthia Finn Jerry Dawson Shawndell Fraser Cynthia Tucker Sarah 2007 Intimate Partner Violence Technology and Stalking Violence Against Women 8 13 8 842 856 doi 10 1177 1077801207302045 PMID 17699114 S2CID 21299375 How to Put Stalkers in Jail Baddteddy com Archived from the original on 19 July 2013 Retrieved 10 December 2013 Justin Harp 7 October 2012 Patricia Arquette quits Facebook after alleged cyberstalking Digital Spy Retrieved 10 December 2013 Lipika 13 May 2016 What is a Web 2 0 technology Retrieved 17 December 2018 a b c Citron Danielle Keats February 2009 Cyber Civil Rights PDF Boston University Law Review 61 89 61 125 Archived from the original PDF on 1 November 2013 Retrieved 10 December 2013 a b Paul Bocij 4 November 2002 Corporate Cyberstalking First Monday 7 11 doi 10 5210 fm v7i11 1002 ISSN 1396 0466 Retrieved 10 December 2013 Wayne Petherick Cyber Stalking Obsessional Pursuit and the Digital Criminal Archived from the original on 9 February 2009 Retrieved 10 December 2013 Quit Stalking Me 28 July 2011 Ten Reasons Why Someone is Stalking You Online Quitstalkingme com Archived from the original on 12 December 2013 Retrieved 10 December 2013 Leroy McFarlane Paul Bocij 1 September 2003 An exploration of predatory behaviour in cyberspace Towards a typology of cyberstalkers First Monday 8 9 doi 10 5210 fm v8i9 1076 ISSN 1396 0466 Archived from the original on 4 April 2012 Retrieved 10 December 2013 A typology of cyberstalkers was developed Una nueva cara de Internet PDF in Spanish 2003 Archived from the original PDF on November 22 2007 Retrieved December 29 2010 Pikul Corrie 19 August 2010 Confessions of a Facebook Stalker Elle com Archived from the original on 23 June 2011 Retrieved 2011 03 12 a b c d e f Cyberstalking The National Center For Victims of Crime 2003 Archived from the original on 17 June 2004 Howes Oliver D September 2006 Compulsions in Depression Stalking by Text Message The American Journal of Psychiatry 163 9 1642 doi 10 1176 appi ajp 163 9 1642 PMID 16946195 Archived from the original on 2013 01 13 Types of Stalkers and Stalking Patterns Sexualharrassmentsupport com Archived from the original on 2006 04 09 Retrieved 2013 12 10 Cyber Stalking Obsessional Pursuit and the Digital Criminal CrimeLibrary com Archived from the original on 2006 08 31 Bonnie Zylbergold Look Who s Googling New acquaintances and secret admirers may already know all about you National Sexuality Resource Center American Sexuality Magazine Archived from the original on June 18 2007 Paige M Padgett June 2007 Personal Safety and Sexual Safety for Women Using Online Personal Ads Sexuality Research and Social Policy National Sexuality Resource Center 4 2 27 37 doi 10 1525 srsp 2007 4 2 27 Abstract only full text requires subscription King Ruby 2017 05 01 Digital Domestic Violence Are Victims of Intimate Partner Cyber Harassment Victoria University of Wellington Law Review 48 1 29 54 doi 10 26686 vuwlr v48i1 4770 ISSN 1171 042X Legislatures National Conference of State Legislative News Studies and Analysis National Conference of State Legislatures www ncsl org Archived from the original on June 13 2009 Retrieved 27 March 2018 H A Hosani M Yousef S A Shouq F Iqbal and D Mouheb A Comparative Analysis of Cyberbullying and Cyberstalking Laws in the UAE US UK and Canada 2019 IEEE ACS 16th International Conference on Computer Systems and Applications AICCSA Abu Dhabi United Arab Emirates 2019 pp 1 7 doi 10 1109 AICCSA47632 2019 9035368 Hoffberger Chase 13 November 2012 The Daily Capper exposes alleged culprit in Amanda Todd suicide The Daily Dot Retrieved 2013 08 15 18 U S Code 2261 b Legal Information Institute Archived from the original on 2012 02 21 Cybertelecom 47 USC 233 Cybertelecom Retrieved 2013 12 10 Working to Halt Online Abuse Working to Halt Online Abuse Miller Greg Maharaj Davan Jan 22 1999 N Hollywood Man Charged in 1st Cyber Stalking Case Los Angeles Times Blessman Stuart 2016 Doxing What to look for How to prevent it Officer com Perry Elizabeth 2 July 2008 Blunt signs cyberbullying bill St Louis Post Dispatch Stltoday com Retrieved 2011 06 18 Zetter Kim November 20 2009 Prosecutors Drop Plans to Appeal Lori Drew Case Wired News Florida Statute 784 048 Florida Computer Crime Center Archived from the original on 2007 02 05 Current and pending cyberstalking related United States federal and state laws Working to Halt Online Abuse Archived from the original on 2018 09 12 Retrieved 2013 12 10 Cyberstalking A New Challenge for Law Enforcement and Industry Justice gov The United States Department of Justice August 1999 Archived from the original on February 25 2010 Retrieved 2013 11 29 Carlin Miller 11 November 2010 Samantha Kelly Bullied to Death Mich 14 Year Old s Suicide Followed Harassment After Rape Claim Crimesider CBS News Archived from the original on July 25 2013 Retrieved 2013 08 15 Julia Dahl 12 April 2013 Audrie Pott Rehtaeh Parsons suicides show sexual cyber bullying is pervasive and getting worse expert says Crimesider CBS News Archived from the original on April 13 2013 Retrieved 2013 12 10 Neil Katz 12 November 2010 Samantha Kelly 14 Cyberbullied Even After Suicide HealthPop CBS News Archived from the original on November 14 2010 Retrieved 2013 08 15 Mary M Chapman 13 November 2010 Samantha Kelly Suicide Rape Charges Dropped Mother Speaks Up The Daily Beast Retrieved 2013 08 15 Frank Bruni 23 May 2012 More Thoughts on the Ravi Clementi Case The New York Times Live blog Dharun Ravi sentenced to 30 days in jail NJ com 2012 05 21 Retrieved 2013 12 05 Piotr Wolkowicki 14 June 2011 Stalking w polskim prawie karnym Stalking in Polish criminal law Blogi prawne i podatkowe in Polish Archived from the original on 1 May 2015 Retrieved 22 November 2013 GDT Grupo de Delitos Telematicos www gdt GuardiaCivil es in Spanish Archived from the original on 29 January 2011 Retrieved 1 May 2017 Brigada de Investigacion Tecnologica Policia es in Spanish Archived from the original on 24 February 2008 Retrieved 1 May 2017 Protegeles in Spanish Protegeles 26 August 1997 Retrieved 29 November 2013 Further readingBocij Paul 2004 Cyberstalking Harassment in the Internet Age and how to Protect Your Family Greenwood Publishing Group ISBN 0 275 98118 5 Ellison Louise Akdeniz Yaman Cyber stalking the Regulation of Harassment on the Internet Criminal Law Review December 1998 Special Edition Crime Criminal Justice and the Internet pp 29 48 Meloy J 2000 The Psychology of Stalking Reid Academic Press ISBN 0 12 490561 7 Mullen Paul E Pathe Michele Purcell Rosemary 2000 Stalkers and Their Victims Cambridge University Press ISBN 0 521 66950 2 Hitchcock J A 2006 Net Crimes amp Misdemeanors Outmaneuvering the Spammers Swindlers and Stalkers Who Are Targeting You Online CyberAge Books ISBN 0 910965 72 2 PDF article on Cyberstalking in the United Kingdom PDF Archived from the original PDF on March 15 2007 Retrieved August 7 2006 Crime Library Cyberstalking Archived from the original on February 3 2019 Retrieved January 4 2017 Cyberstalking Is it Covered by Current Anti Stalking Laws by Craig Lee and Patrick LynchExternal links nbsp Wikimedia Commons has media related to Cyberstalking Privacy Rights Clearinghouse Academic and government studies United States Law and the Internet Georgia State University College of Law Archived 2021 03 08 at the Wayback Machine 2001 Cybertelecom Cyberstalking Federal Internet Law amp Regulation Archived from the original on November 21 2010 Retrieved December 10 2013 Stalking Laws and Implementation Practices A National Review for Policymakers and Practitioners Full Report at the Wayback Machine archive index Minnesota Center Against Violence and Abuse 2002 Cyberstalking A New Challenge for Law Enforcement and Industry A Report from the Attorney General to the Vice President Archived from the original on March 1 2010 Retrieved November 29 2013 United States Department of Justice August 1999 Cyber stalking An Analysis of Online Harassment and Intimidation by Cyber Crime Journal Blogs stories Surviving the Extinct Marsuplial sic An ongoing blog by several victims of a single stalker documenting his activities Cautionary tale of online romance and revenge FBI 2013 Retrieved from https en wikipedia org w index php title Cyberstalking amp oldid 1219659589, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.