Friday, May 29, 2009

Cyberstalking

Cyberstalking is the use of the Internet or other electronic means to stalk someone.

It has been defined as the use of information and communications technology, particularly the Internet, by an individual or group of individuals, to harass another individual, group of individuals, or organization. The behavior includes false accusations, monitoring, the transmission of threats, identity theft, damage to data or equipment, the solicitation of minors for sexual purposes, and gathering information for harassment purposes. The harassment must be such that a
reasonable person, in possession of the same information, would regard it as sufficient to cause another reasonable person distress.

CyberAngels has written about how to identify cyberstalking:

When identifying cyberstalking "in the field," and particularly when considering whether to report it to any kind of legal authority, the following features or combination of features can be considered to characterize a true stalking situation: malice, premeditation, repetition, distress, obsession, vendetta, no legitimate purpose, personally directed, disregarded warnings to stop, harassment, and threats.
A number of key factors have been identified:

False accusations. Many cyberstalkers try to damage the reputation of their victim and turn other people against them. They post false information about them on websites. They may set up their own websites, blogs or user pages for this purpose. They post allegations about the victim to newsgroups, chat rooms or other sites that allow public contributions, such as Wikipedia or Amazon.com.

Attempts to gather information about the victim. Cyberstalkers may approach their victim's friends, family and work colleagues to obtain personal information. They may advertise for information on the Internet, or hire a private detective. They often will monitor the victim's online activities and attempt to trace their IP address in an effort to gather more information about their victims.

Encouraging others to harass the victim. Many cyberstalkers try to involve third parties in the harassment. They may claim the victim has harmed the stalker or his/her family in some way, or may post the victim's name and telephone number in order to encourage others to join the pursuit.

False victimization. The cyberstalker will claim that the victim is harassing him/her. Bocij writes that this phenomenon has been noted in a number of well-known cases.

Attacks on data and equipment. They may try to damage the victim's computer by sending viruses.

Ordering goods and services. They order items or subscribe to magazines in the victim's name. These often involve subscriptions to pornography or ordering sex toys then having them delivered to the victim's workplace.

Arranging to meet. Young people face a particularly high risk of having cyberstalkers try to set up meetings between them.


MORE TO COME ON THIS SUBJECT INCLUDING ACTUAL CASE STUDIES OF THE IDIOTS WHO DO THIS SORT OF THING.

No comments:

Post a Comment

Thank you for participating. Your comment will be reviewed and we might decide to publish it if it is actually intelligent and/or amuses us.