Cyber Stalking Research Paper

Superior Essays
With the new technologies available in society today, it was just a matter of time before that technology would be used to commit crimes. Internet and networking are common terms in today’s society; some use it for business, to communicate with family and friends or to even find a date, but for some it is a new way to commit crimes and it has become a field of study in itself. Cyber criminals rely on the internet to commit their crimes and as technology changes it only stands to reason that the nature of cybercrimes will change with it. Anyone can be anyone or anything they want to be when they are online as the majority of it is anonymous as people can hide behind any screen name and can make up identities as they see fit or that will …show more content…
adults” (Vakhitova, Reynald & Townsley, 2016 p. 170 para.2) will experience some type of cyber stalking once in their lives and “more than 70% witnessed someone else being subjected to it” (Vakhitova, Reynald & Townsley, 2016 p. 170 para.2). Cyber stalking can resemble stalking in the real world because it involves the pursuit of the person that is being stalked, the victim is harassed and the stalkers contact the victim in “unsolicited fashion initially via the Internet and e-mail” (NIJ, 2007 para. 3). A lot of the times those that commit cyber stalking crimes against another person are bitter exes, who are trying to get back at the other because of a bad break up or those that feel they need to get revenge on another person, a co- worker who is upset over a work related issue, or even someone who is on a power trip and use stalking to boost their own ego. Online stalking unfortunately is made somewhat easy to get away with due to the “anonymity of the Internet allows the cyber stalker to easily conceal one’s identity” (Pittaro, 2007 p.185) because they can create multiple accounts online to use in order to send emails or create multiple screen names in order to post on social media sites. Due to the fact that cyber stalkers may not be someone a person actually knows, but rather someone in another state “cyber stalking crimes present a unique challenge to law enforcement” (Pittaro, 2007 p.191) however, all 50 states have laws against cyber stalking. Solutions to help prevent cyber stalking

Related Documents

  • Superior Essays

    Bullying in the World I am sure that people are aware that not everyone gets a great start to life, like Jeanette Walls in The Glass Castle. Many people across the world struggle with all kinds of hardships. Others think they understand these hardships, but I believe that no one can ever truly understand until they go through it themselves. People who grow up in a better situation could never really know the feeling of being in such a poor situation. One of the major causes of these hardships nowadays is bullying.…

    • 1304 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Student’s Name Professor’s Name Course Date Essay 13 Cyber Stalking According to the statute 784.048 cyber stalking is intentionally using electronic medium channels to communicate through words, language, and images that are offensive to the other party (Beane 213). The messages could either be sexual, intimidating or simply harassment to the recipient and they have no legitimate purpose.…

    • 378 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    The internet is a rapidly expanding technology and is a global phenomenon utilizing a medium for sharing forms of digital communication. Underground classes of criminals leverage cyber technology in furtherance of their criminal goals while investigators attempt to parry by detecting and apprehending these criminals – this through a constant state of leveraging existing techniques or creating new ones. Developing investigative techniques requires experience and the ability to evolve – a reactive learning curve following behind the wake of a technocratic society. In United States v. Anthony V. Mangione, the defendant, Mangione, was sentenced to 70 months in prison after pleading guilty to one count of transportation of child pornography.…

    • 1462 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    The fact that victims have to demonstrate that they were noncompliant and did not provoke the defendant to stalk them places the crime of intimate stalking in a category with other gender violence, such as rape and domestic violence (Dunn 4). Understanding that the way that victims respond to stalking is not always a conscious, personal choice can go a long way in seeking justice and peace for the victim. What we see as avoidance, help-seeking, compliant, or resistant depends on what the victim perceives as courting, surveillance, threatening, or violent. And, there is always the possibility that these gestures could be misconstrued as…

    • 1007 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Computer technology progressed rapidly since the 1900’s. Computers are no longer scarcely around, many people have them and use them on a daily basis. They have also become an important source of evidence in criminal activities. Computers are very helpful for homicide investigators, because they can discover whether methods on how to murder were researched on the internet, if anything suspicious can be found in emails, or if threats were made towards the victim prior to the murder. Since children can easily get on the computer to use the internet, it gives sexual predators an opportunity to seek out child victims online.…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Per the United States Department of Justice, “Stalking is a pattern of repeated and unwanted attention, harassment, contact, or any other course of conduct directed at a specific person that would cause a reasonable person to feel fear. Stalking can include: Repeated, unwanted, intrusive, and frightening communications from the perpetrator by phone, mail, and/or email. Repeatedly leaving or sending victim unwanted items, presents, or flowers. Following or lying in wait for the victim at places such as home, school, work, or recreation place.…

    • 622 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Technology and Happiness Individuals can achieve many goals in their life as long as they work hard except happiness. Happiness is difficult to achieve since it can not only rely on hard working. However, people still work hard and try to get better life to be happy. Happiness become the super replicator of life to give people a motivation and to stable the society. In the article “Reporting Live from Tomorrow” written by Daniel Gilbert, the author mentions that belief or thinking can become super replicators just like genes pass to others even though sometimes it might be inaccurate information.…

    • 1214 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    We live in a time where technology has become a huge requirement in our everyday lives. Everyone from preteens and even the elderly (old and old- old) seems to have their own smart phone, laptop, and even tablets. I think technology, including the internet is essentially good because it helps us communication, our education, navigation, and many other things that we need help with on a daily basis. If we compare and contrast the technology from twenty years ago and today, there are many things that have changed for the better.…

    • 1081 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Stalking Behavior

    • 1126 Words
    • 5 Pages

    The legal construct of stalking has been a point of academic and societal controversy in part because what is considered illegal stalking behavior, such as persistent attempts at communication and expressions of desire or commitment, is often difficult to distinguish from normal courtship processes (Anderson, 2009; Cupach & Spitzberg, 2005, Dunn, 2002; Emerson, Ferris, &Gardner, 1998). It is likely that human societies have always experienced forms of stalking(Dan & Kornreich, 2000; Finch, 2001; Kamir, 2001). Such overlaps between the cultural constructions of courtship and the prohibitions of threatening and harassing activities represent a problematic intersection. There has been reluctance on the part of the criminal justice system to view stalking as a serious issue (Kim & Spitzberg, 2012; Spitzberg, 2002a); and when the system does confront it, efforts seem “more focused on physical rather than psychological harm, thus leading to the minimization of the terror that stalking causes as well as stalking as a crime” (Logan & Walker, 2010, p.…

    • 1126 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    Connectivity and Its Discontents As society develops, using phones, emails are some of the popular ways for people to interact with friends. However, Sherry Turkle argues problems of continuing use technologies as the way for communicating in her article “Connectivity and Its Discontents.” Turkle summarizes three key reasons based on her real experience and her observations. First, people are allowed to perform multiple tasks on their computers. It means that they probably not only focus on their online communication.…

    • 1211 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    There has been much discussion on whether our school should take part in “Shut Down Your Screen Week.” While contemplating if this is a good idea or not it is important to take into consideration all the pros and cons of the situation. No great decision is made without going through all of the deciding factors that go into deciding if we should or should not take part in this. First, we are going to go over the good things that technology has provided for us. “Because of cellphones and social media, those we depend on are more accessible today than at any point since we lived in small, village-like settlements.”…

    • 1221 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Introduction When it comes to digital crimes, various methods are used to commit such acts. These include: Hacking, malicious software as well as cyber stalking, to name a few takes place day in and day out. The names that are attached to these crimes in fact explains the what and now, the why has to be explained. In this body of work however, it will be discussed theories surrounding digital crimes. Space Transition Theory and Social Learning Theory will provide detail and insight as to the why factor: why was the crime committed, the rationale of the response, how it relates to crime in general.…

    • 795 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Bullying can be traumatizing and the effects can be devastating. As technology today improves, cyberbullying becomes more and more common. Cyberbullying is repeated and hostile, and has “severe intent to threaten, embarrass, or harass”. Now with all of the new technology this harassment is virtually inescapable. Because of the negative effects that cyberbullying creates, it has become a largely debated issue whether an individual’s actions online should be prosecuted.…

    • 981 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cyber bullying Thesis statement – cyber bullying is the act that occurs using electronic technology. It may include different forms of devices like computers cell phones and also tablets and any other means of social media communication tools. Cyber bullying is a problem known globally. Sometimes it may be unnoticed most of the times when it happens, but cyber bullying can be very destructive and most of the times are very lethal to those people who are being bullied.…

    • 829 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Mobile Jammers Essay

    • 1007 Words
    • 5 Pages

    At least 65% of adults now use social networking sites, a nearly tenfold jump in the past decade (Andrew) and according to CNN nearly 80% of teens check their phone hourly 72% feel the need to respond immediately (Kelly Wallace). I agree that the use of Mobile Jammers to cut of signal from our electronic device is very essential because we have allowed these electronic devices and social media to interfere with our daily lives. There are different ways mobile jammers will save mankind from the chains of cellular devices and social media. First, the use of mobile jammers in schools during lectures will improve the communication between teachers and students.…

    • 1007 Words
    • 5 Pages
    Improved Essays