Enhancing Privacy Over The Internet Research Paper

PAGES
2
WORDS
665
Cite

Stalking in the Computer Age In the last two decades, there has been an increase in knowledge of computers and other provisions of the technology. Notably, with the increase in the knowledge regarding the use of the computers criminals have found an opportunity for the criminal acts (Reyns et al., 2012). For example, there is an increase in the number of spammers, and cyber stalkers hence increase in the number of crimes. This following study elucidates the concept of cyberstalking and the ways of avoiding it.

Cyberstalking is a computer crime that involves the use of electronics or internet means to cause harassment (al-Khateeb et al., 2015). Cyberstalker may target an individual, group of people or and enterprise. The harassment may come in a form of emails or instant messaging to a specific person or a group. At some instances, the criminal may decide to attack an organization by posting messages on the website of the organization or a group. Often, the messages posted by the Cyberstalker are annoying or threatening the victims. Cyberstalker is different from the spammer concerning the target.

Notably, spammer target many recipients with aims of annoying whereas the Cyberstalker targets a specific group, individual, or organization with threatening information (Loftus, 2016). Cyberstalker...

...

Their knowledge of computer helps them to evade the identity from the victims. Notably, the Cyberstalker utilizes the inability of the Internet to detect and track their real identities. Often, the stalker knows the victims and the victim know the stalker, yet they utilize anonymity of the internet. Research reveals the intentions of the Cyberstalker are not for real material gain but crime. For example, following a criminal confession in the past, their aim is to intimidate, control, or influence the victim.
Cyberstalking takes different forms depending on the intentions of the Cyberstalker. Examples of cyber stalking involve stalking by strangers, close partner, celebrities and public persons, anonymous internet mobs, and the corporate stalking (Loftus, 2016). Partners who were initially in romantic relationships are likely to be victims of cyber stalking. One of the partners may decide to harass or humiliate the other party through emails and messages. Additionally, strangers may decide to intimidate an individual or an organization for personal reasons. Moreover, cyberstalking may target a celebrity where the anonymous individual decides to post-allegation or annoying messages to the website or the…

Sources Used in Documents:

References

al-Khateeb, H., Alhaboby, Z. A., Barnes, J., Brown, A., Brown, R., Cobley, P., ... & Shukla, M. (2015). A Practical Guide to Coping with Cyberstalking.

Reyns, B. W., Henson, B., & Fisher, B. S. (2012). Stalking in the Twilight Zone: Extent of Cyber-stalking Victimization and Offending Among College Students. Deviant Behavior, 33(1), 1-25.

Loftus, M. (2016). The Anti-Social Network: Cyber-stalking Victimization among College Students. Journal of the American Academy of Child & Adolescent Psychiatry, 55(4), 340-341.


Cite this Document:

"Enhancing Privacy Over The Internet" (2016, April 10) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/enhancing-privacy-over-the-internet-2158907

"Enhancing Privacy Over The Internet" 10 April 2016. Web.26 April. 2024. <
https://www.paperdue.com/essay/enhancing-privacy-over-the-internet-2158907>

"Enhancing Privacy Over The Internet", 10 April 2016, Accessed.26 April. 2024,
https://www.paperdue.com/essay/enhancing-privacy-over-the-internet-2158907

Related Documents

Internet Privacy for High School Students The unrestrained stream of information is conceived necessary for democracies and market-based economies. The capability of the Internet to make available the vast quantity of information to practically everyone, irrespective of their locations thus entails large benefits. The Internet provides access to the greatest libraries of the world to the students even in the smallest towns and permit the medical specialists to analyze the patients

Privacy in the Information Age Privacy has never been as problematic an issue as it has been as a result of the information age. Because of lightning fast developments in information systems and technology, the mere use of a password has long ceased to be sufficient to ensure privacy when using the computer. Similarly information systems are used for surveillance of citizens while on any expedition outside of their home, from

Internet Security, risks internet security presents field information technology implementing solutions address challenges. The paper 15 pages length ( including title reference page). 1. Title Page: Include, paper title, title, instructor's, date. Internet security In today's advanced technological world, online users are faced with a myriad of problems and risks. Any online user is vulnerable to Trojans, viruses, worms, spyware, and malware. The user is exposed to sniffers, spoofing software, and phishing.

At the bottom line, the issue at hand is with the sanctity and safety of the students and the responsibility of the university to preserve and develop that. Moreover, many of these students are dallying into multi-dimensional virtual worlds that are beginning to closely resemble the physical world and that are having their own ethical issues arise (Wankel & Malleck, 2010). Universities need to educate themselves as to what those

Internet Censorship The internet came to prominence as a tool and pursuit of the masses starting in the early 1990's. The capabilities, depth and breadth of what the internet has to offer have increased exponentially over the ensuing two decades. Such expansion has greatly eased the spread of information (Palfrey, 2010). The ease in which people communicate and disseminate information has created a cause for concern among many different parties that

Trust alleviates the apprehensions of insecurity that crop up when the retailer is not known, or the way the company will deliver the goods or services purchased. Building trust in e-commerce necessitates a clear indication of rigorous standards of security, data safeguard, transparency of data use, etc. (The effect of IT-based security on feedback mechanisms and trust building in online auction settings) Morgan and Hunt during 1994 indicate that trust