Cyberstalking Research Paper

Improved Essays
Cyberstalking in this day and age
In our world today, technology is getting more and more advanced from various pieces of equipment like newer computers with hundreds of new functions to faster ways of communicating to other people like the internet. However this newer and more advanced technology comes with a price. One of these disadvantages that come with these advances is cyberstalking. According to about.com “Cyberstalking is a technologically-based ‘attack’ on one person who has been targeted specifically for that attack for reasons of anger, revenge or control” (Moore). This is a very dangerous new disadvantage that comes with the advanced technology we have today. One of these is the phenomenon of cyberstalking which has become very prominent in the world today because of this digital age we live in where just anyone can access a computer with internet. This phenomenon is especially dangerous for women because according to cyber.law.harvard.edu “Women are far more likely to be the victims of
…show more content…
This can be seen in the crime-research.org, “The suspect terrorized his 28-year-old victim by impersonating her in various Internet chat rooms and online bulletin boards where he posted, along with her telephone number and address, messages that she fantasized about being raped. On at least six occasions, sometimes in the middle of the night, men knocked on the woman's door saying they wanted to rape her.” (Petitinari) This led to serious trauma for that woman and put her in harm’s way all because of the cyberstalking done. It can lead to mental breakdowns and physical abuse if not stopped and can scar the target for life. This shows that even though the person on the internet is not physically in contact with the woman in question the girl may still be affected physically same as when stalked

Related Documents

  • Superior Essays

    Because of how easy it is to fake an identity online, there is immense potential for harm. Even though connecting with people is a must, you never know who you are connecting with. Child predators and paedophiles have the freedom online to fake their identities and lure people into harmful situations. The internet and how people use it make being safe online nearly impossible. People are able to pursue immoral ideas such as trapping children, luring unsuspecting people, and scamming millions of dollars.…

    • 1172 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Stat. §784.048 (2015). Cyberstalking is “a course of conduct through electronic mail or electronic communication, directed at a specific person, causing substantial emotional distress to that person serving no legitimate purpose,” Leach v. Kersey, 162 So.3d at 1106. Cyberstalking is not found where the electronic messages are, “not directed at a specific person.” Horowitz v. Horowitz, 160 So.3d 531,531 (Fla. Dist.…

    • 749 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Dahler, Don. “12-year-old's suicide spotlights cyber-bullying threat.” CBS Evening News. CBS Interactive Inc. 2013. Web.…

    • 894 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    1. As noted in table 1 of Hensen et al. , the dependent variables are: • fear of cyberstalking by intimate partners • fear of cyberstalking by friends/acquaintances • fear of cyberstalking by strangers 2. The age coefficient in regarding fear of cyberstalking by an intimate partner as noted on table 2 is –0.11. Furthermore, the value associated with age in the section of intimate partner is noted with a single *…

    • 589 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The world wide web is used in many ways. All the while the web is used for research, mild happiness/interesting thing, back-and-forth writing,and thuis scratches the surface of the common uses. With more people on the web, there is also an increase in online issues. A typical issue online is digital (teasing and threatening over and over again in a mean way) or computer bullying. Computer (teasing and threatening over and over again in a mean way) or torturing is the (act of showing or proving) of annoying, bothering, very harmful or (treating or using in a very mean, unfair way) a person or a group of people on the web.…

    • 515 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Hacking Epidemic The U.S. shouldn’t retaliate in the cyber war because the people that try and retaliate may get hurt or blackmailed by the hackers. Another reason the U.S. shouldn’t retaliate is that it would be hard to live normally because a disaster would fall. Also they shouldn’t retaliate because the war could get so bad that families would have to move out of the U.S. I have one reason the U.S. should retaliate is because is a hacker helped you try and fix something like your computer or any other electronics you have that person could get all your information and could hack you. Some measures you can take at home to prevent someone from hacking in your computer is you can update your software.…

    • 161 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Cyber Crime Research Paper

    • 1158 Words
    • 5 Pages

    Cybercrime: The Easy Way to Commit a Crime Cybercriminals are able to commit detrimentals crimes with a click of a few buttons. Cybercrime is the “unauthorized use or disruption of computer files... the theft of an electronic identity...the use of a computer to facilitate or carry out a traditional crime (Engdahl 100).” According to the author of the article “Cybersecurity,” cyber attacks are becoming more and more common.…

    • 1158 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Online identity theft is a crime whereby criminals impersonate others using information about an individual gathered from the internet, typically for financial gain. If a thief is able to access your personal information, he or she can use it to commit fraud in your name, either online or in the physical world. Online identity theft is an issue of ethics as we all have a right to privacy, and online identity theft is a serious violation of this right. The thief now has the ability to gain access to a number of the victim’s personal information including financial and banking records.…

    • 702 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    So let’s begin with what is the definition of Cyberstalking? Well, a Cyberstalking are often described as an interchangeably to refer to…

    • 1361 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Bullying can be traumatizing and the effects can be devastating. As technology today improves, cyberbullying becomes more and more common. Cyberbullying is repeated and hostile, and has “severe intent to threaten, embarrass, or harass”. Now with all of the new technology this harassment is virtually inescapable. Because of the negative effects that cyberbullying creates, it has become a largely debated issue whether an individual’s actions online should be prosecuted.…

    • 981 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    As modern lifestyles become increasingly intertwined with technology, criminal investigations have done so as well. The new field of cyber forensics has arisen to meet the need to gather information that has been increasingly hidden from investigators through the criminal use of technology. While businesses often have difficulties implementing effective information security policies, new challenges arise when they are confronted with the potential for cyber investigations which may jeopardize the security of corporate information. This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information.…

    • 1554 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Cyber bullying Thesis statement – cyber bullying is the act that occurs using electronic technology. It may include different forms of devices like computers cell phones and also tablets and any other means of social media communication tools. Cyber bullying is a problem known globally. Sometimes it may be unnoticed most of the times when it happens, but cyber bullying can be very destructive and most of the times are very lethal to those people who are being bullied.…

    • 829 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Now a day’s internet is a back bone of the society. One can use internet from anywhere and anytime and is easily accessible. The growing dependency on internet world is termed as cyber world. The augmentation in the usage of internet has enabled an increase in the volume of cybercrime activities because there is no longer a requirement of the criminal to physically present when committing a crime.…

    • 1830 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    What Is Cybercrime?

    • 858 Words
    • 4 Pages

    Including false allegations, monitoring, creating threats, identity theft, damage to data or equipment, or gathering information in order to harass. Action cyberstalking can be very dangerous and frightening, especially for children and adolescents. This is because the person's personal identity information is not known on the Internet to provide opportunities for the stalker (talker) to roam freely carry out the action. Cyberstalker (perpetrators cyberstalking) even often take extreme measures because they feel can not be arrested or punished for difficult to…

    • 858 Words
    • 4 Pages
    Improved Essays