Verified Document

Enhancing Privacy Over The Internet Research Paper

Stalking in the Computer Age In the last two decades, there has been an increase in knowledge of computers and other provisions of the technology. Notably, with the increase in the knowledge regarding the use of the computers criminals have found an opportunity for the criminal acts (Reyns et al., 2012). For example, there is an increase in the number of spammers, and cyber stalkers hence increase in the number of crimes. This following study elucidates the concept of cyberstalking and the ways of avoiding it.

Cyberstalking is a computer crime that involves the use of electronics or internet means to cause harassment (al-Khateeb et al., 2015). Cyberstalker may target an individual, group of people or and enterprise. The harassment may come in a form of emails or instant messaging to a specific person or a group. At some instances, the criminal may decide to attack an organization by posting messages on the website of the organization or a group. Often, the messages posted by the Cyberstalker are annoying or threatening the victims. Cyberstalker is different from the spammer concerning the target.

Notably, spammer target many recipients with aims of annoying whereas the Cyberstalker targets a specific group, individual, or organization with threatening information (Loftus, 2016). Cyberstalker...

Their knowledge of computer helps them to evade the identity from the victims. Notably, the Cyberstalker utilizes the inability of the Internet to detect and track their real identities. Often, the stalker knows the victims and the victim know the stalker, yet they utilize anonymity of the internet. Research reveals the intentions of the Cyberstalker are not for real material gain but crime. For example, following a criminal confession in the past, their aim is to intimidate, control, or influence the victim.
Cyberstalking takes different forms depending on the intentions of the Cyberstalker. Examples of cyber stalking involve stalking by strangers, close partner, celebrities and public persons, anonymous internet mobs, and the corporate stalking (Loftus, 2016). Partners who were initially in romantic relationships are likely to be victims of cyber stalking. One of the partners may decide to harass or humiliate the other party through emails and messages. Additionally, strangers may decide to intimidate an individual or an organization for personal reasons. Moreover, cyberstalking may target a celebrity where the anonymous individual decides to post-allegation or annoying messages to the website or the…

Sources used in this document:
References

al-Khateeb, H., Alhaboby, Z. A., Barnes, J., Brown, A., Brown, R., Cobley, P., ... & Shukla, M. (2015). A Practical Guide to Coping with Cyberstalking.

Reyns, B. W., Henson, B., & Fisher, B. S. (2012). Stalking in the Twilight Zone: Extent of Cyber-stalking Victimization and Offending Among College Students. Deviant Behavior, 33(1), 1-25.

Loftus, M. (2016). The Anti-Social Network: Cyber-stalking Victimization among College Students. Journal of the American Academy of Child & Adolescent Psychiatry, 55(4), 340-341.
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now