Verified Document

Enhancing Privacy Over The Internet Research Paper

Stalking in the Computer Age In the last two decades, there has been an increase in knowledge of computers and other provisions of the technology. Notably, with the increase in the knowledge regarding the use of the computers criminals have found an opportunity for the criminal acts (Reyns et al., 2012). For example, there is an increase in the number of spammers, and cyber stalkers hence increase in the number of crimes. This following study elucidates the concept of cyberstalking and the ways of avoiding it.

Cyberstalking is a computer crime that involves the use of electronics or internet means to cause harassment (al-Khateeb et al., 2015). Cyberstalker may target an individual, group of people or and enterprise. The harassment may come in a form of emails or instant messaging to a specific person or a group. At some instances, the criminal may decide to attack an organization by posting messages on the website of the organization or a group. Often, the messages posted by the Cyberstalker are annoying or threatening the victims. Cyberstalker is different from the spammer concerning the target.

Notably, spammer target many recipients with aims of annoying whereas the Cyberstalker targets a specific group, individual, or organization with threatening information (Loftus, 2016). Cyberstalker...

Their knowledge of computer helps them to evade the identity from the victims. Notably, the Cyberstalker utilizes the inability of the Internet to detect and track their real identities. Often, the stalker knows the victims and the victim know the stalker, yet they utilize anonymity of the internet. Research reveals the intentions of the Cyberstalker are not for real material gain but crime. For example, following a criminal confession in the past, their aim is to intimidate, control, or influence the victim.
Cyberstalking takes different forms depending on the intentions of the Cyberstalker. Examples of cyber stalking involve stalking by strangers, close partner, celebrities and public persons, anonymous internet mobs, and the corporate stalking (Loftus, 2016). Partners who were initially in romantic relationships are likely to be victims of cyber stalking. One of the partners may decide to harass or humiliate the other party through emails and messages. Additionally, strangers may decide to intimidate an individual or an organization for personal reasons. Moreover, cyberstalking may target a celebrity where the anonymous individual decides to post-allegation or annoying messages to the website or the…

Sources used in this document:
References

al-Khateeb, H., Alhaboby, Z. A., Barnes, J., Brown, A., Brown, R., Cobley, P., ... & Shukla, M. (2015). A Practical Guide to Coping with Cyberstalking.

Reyns, B. W., Henson, B., & Fisher, B. S. (2012). Stalking in the Twilight Zone: Extent of Cyber-stalking Victimization and Offending Among College Students. Deviant Behavior, 33(1), 1-25.

Loftus, M. (2016). The Anti-Social Network: Cyber-stalking Victimization among College Students. Journal of the American Academy of Child & Adolescent Psychiatry, 55(4), 340-341.
Cite this Document:
Copy Bibliography Citation

Related Documents

Information Age Has Created Privacy Problems for All Citizens
Words: 895 Length: 3 Document Type: Term Paper

Privacy in the Information Age Privacy has never been as problematic an issue as it has been as a result of the information age. Because of lightning fast developments in information systems and technology, the mere use of a password has long ceased to be sufficient to ensure privacy when using the computer. Similarly information systems are used for surveillance of citizens while on any expedition outside of their home, from

Internet Security, Risks Internet Security Presents Field
Words: 4724 Length: 15 Document Type: Essay

Internet Security, risks internet security presents field information technology implementing solutions address challenges. The paper 15 pages length ( including title reference page). 1. Title Page: Include, paper title, title, instructor's, date. Internet security In today's advanced technological world, online users are faced with a myriad of problems and risks. Any online user is vulnerable to Trojans, viruses, worms, spyware, and malware. The user is exposed to sniffers, spoofing software, and phishing.

Internet Governance by US Government
Words: 1763 Length: 6 Document Type: Research Paper

Internet Governance by U.S. Government An amateurish video, "Innocence of Muslims," posted on YouTube in September 2012 was the catalyst for a string of anti-American protests and riots throughout the Islamic world. The short trailer, promoting an anti-Muslim film, was attributed to a motley crew of right-wing Christians in America (Sengupta, 2012). Angry mobs in Egypt were the first to react to the video on September 11 when they breached the

Internet Privacy for High School Students
Words: 12595 Length: 40 Document Type: Term Paper

Internet Privacy for High School Students The unrestrained stream of information is conceived necessary for democracies and market-based economies. The capability of the Internet to make available the vast quantity of information to practically everyone, irrespective of their locations thus entails large benefits. The Internet provides access to the greatest libraries of the world to the students even in the smallest towns and permit the medical specialists to analyze the patients

Internet Policy
Words: 1358 Length: 5 Document Type: Term Paper

Internet Policy Diane Silversmith Internet Use Policy This memo provides justification for providing Internet access primarily as a business tool, but permitting incidental personal use at America West Finance. Extensive research uncovered significant issues related to Internet misuse that require immediate action. Further, the application of electronic surveillance was found to be an industry best practice that in necessary to protect a company's best interest. An evaluation of all Internet use options is

Consumer's Privacy Bill of Rights
Words: 1482 Length: 5 Document Type: Term Paper

This is achieved by forcing them to maintain a list of individuals who do not wish to be conducted about purchasing a variety of products and services. Furthermore, these protections were enacted to ensure that businesses are not engaging in tactics that are abusive by limiting the times when they can call and what they can say. (Caudill, 2000) In contrast with the Consumer Privacy Bill of Rights, the proposed

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now