Cyber-stalking is relatively a new problem that our new generations are facing
|
Internet has become a broad connection available for everyone, giving positive results such as a communication tool for business people, and connection for families.
The use of social media has become a preferred method for coming in contact with friends and family. Meanwhile, in the other side, the broad availability of its use has made it difficult for authorities to track and control threatening situations. |
Anonymity while surfing on the web has become an easy way to stalk and harass people involved in the social media. Most of us, internet users, are unaware of the extreme situations that the cyber-stalking problem has reached. It is a fact that the lack of law enforcement is an important factor that contributes to the increased number of cases dealing with cyber-stalking. |
For more information ...
Bocij, P. (2004). Cyberstalking: Harassment in the Internet Age and How to Protect Your Family. USA: Praeger.
On the introduction of his book “Cyberstalking”, Bocij started naming all the advantages of being involved on the technological world. Immediately, he states the dangerous part of the internet creating a notable contrast. Through the beginning book, he explores the some of the most common behaviors associated with stalking and cyberstalking, as well as the differences between those two. With the support of different books and articles of professionals, he mentions the most common fallacies about cyberstalking in order to consider it “as a unique form of deviant behavior” (2004, p21). After supporting these fallacies with examples of real events, he has the necessity of going deeper on the behavior of the stalkers. He makes references to two main factors: technological and social. The author makes emphasize on a different chapter of how this phenomena is affecting young people, as well as adults and organizations. To conclude, he suggests the audience to have a strict control over their personal information, learn how to behave on the social network, and install a firewall to reduce the risk of intrusion.
On the introduction of his book “Cyberstalking”, Bocij started naming all the advantages of being involved on the technological world. Immediately, he states the dangerous part of the internet creating a notable contrast. Through the beginning book, he explores the some of the most common behaviors associated with stalking and cyberstalking, as well as the differences between those two. With the support of different books and articles of professionals, he mentions the most common fallacies about cyberstalking in order to consider it “as a unique form of deviant behavior” (2004, p21). After supporting these fallacies with examples of real events, he has the necessity of going deeper on the behavior of the stalkers. He makes references to two main factors: technological and social. The author makes emphasize on a different chapter of how this phenomena is affecting young people, as well as adults and organizations. To conclude, he suggests the audience to have a strict control over their personal information, learn how to behave on the social network, and install a firewall to reduce the risk of intrusion.
Bocij, P. (2006). The dark side of the internet: protecting yourself and your family from online criminals. USA: Praeger.
On the book “The dark side of the internet” written by Bocij, the author explains in detail the different abuses of the internet. Cyberterror, viruses, spyware, theft, fraud, and, cyberstalking are the main topics. Bocij knows that Internet has had a big impact on the human relationships. Acts of harassment have moved forward to social media. He considers cyberstalking as “a relatively new phenomenon” (2006, p159), even though it has been around since the 1990s. Technology has become an extension of offline stalking. It could also be considered as a new form of crime that is still evolving. The statistics presented show the process of the cyberstalking development and their more common victims, which are females. He listed examples from all over the world of how people involved on cyberstalking and cyberbulling had been arrested. To conclude, he ends giving some safety and prevention tips for business users, individuals and, families.
On the book “The dark side of the internet” written by Bocij, the author explains in detail the different abuses of the internet. Cyberterror, viruses, spyware, theft, fraud, and, cyberstalking are the main topics. Bocij knows that Internet has had a big impact on the human relationships. Acts of harassment have moved forward to social media. He considers cyberstalking as “a relatively new phenomenon” (2006, p159), even though it has been around since the 1990s. Technology has become an extension of offline stalking. It could also be considered as a new form of crime that is still evolving. The statistics presented show the process of the cyberstalking development and their more common victims, which are females. He listed examples from all over the world of how people involved on cyberstalking and cyberbulling had been arrested. To conclude, he ends giving some safety and prevention tips for business users, individuals and, families.
King-Ries, A. (2011). Teens, Technology, and cyberstalking: the domestic violence wave of the future? Texas Journal of Women and the Law, Vol. 20 Issue 2, p131-164. Retrieved from http://encore.utep.edu:50080/ebsco-web/ehost/detail?sid=44ffcf42-3949-41d7-b235-30405a112e91%40sessionmgr104&vid=1&hid=128&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#db=a9h&AN=67663942
On this journal, the author expresses his concern about the unhealthy relationships among teenagers by the use of technology and how ineffectively the law is being enforced on cyberstalking. As technology has increased, authorities have less control over it and find difficult to investigate and apply the law over stalking on the web. “Unfortunately, authorities–both parents and law enforcement-tend to minimize the seriousness of violence within adolescent relationships and to minimize the seriousness of stalking. In addition, given the prevalence and embrace of technology by teenagers, criminalizing “normal” teenage behavior seems counter-productive.”(2011, p133) The author mentions that both, physical and verbal abuse, still considered violence, and with the board use of technology, violence has taken a step forward. King argues that stalkers (online or off) experience a desire to have full control over their victims. By describing high percentage from different statistics related to stalking and technology, King knows that the statistics underestimate the power of cyberstalking. Until authorities start to take more serious this problem, the law will start to work on adequate training and resources for investigation to fight against it.
On this journal, the author expresses his concern about the unhealthy relationships among teenagers by the use of technology and how ineffectively the law is being enforced on cyberstalking. As technology has increased, authorities have less control over it and find difficult to investigate and apply the law over stalking on the web. “Unfortunately, authorities–both parents and law enforcement-tend to minimize the seriousness of violence within adolescent relationships and to minimize the seriousness of stalking. In addition, given the prevalence and embrace of technology by teenagers, criminalizing “normal” teenage behavior seems counter-productive.”(2011, p133) The author mentions that both, physical and verbal abuse, still considered violence, and with the board use of technology, violence has taken a step forward. King argues that stalkers (online or off) experience a desire to have full control over their victims. By describing high percentage from different statistics related to stalking and technology, King knows that the statistics underestimate the power of cyberstalking. Until authorities start to take more serious this problem, the law will start to work on adequate training and resources for investigation to fight against it.
Cyberstalking. Marshall University. Retrieved on March 01, 2013, from http://www.marshall.edu/wpmu/wcenter/stalking/cyberstalking/
The Women’s Center from Marshall University tries to create awareness through their website of the cyberstalking program. After describing the common mistakes that causes the problem and what it really is, the unknown author also describes the physical, emotional, and psychological trauma that a victim could present. People think that cyberstalking is not as threatening as stalking, since it does not involve physical contact. But the truth is that it is as dangerous as being face to face to your stalker. The article gives easy guidelines of how to react on an online abuse situation. The most important advice to consider are to contact local rape crisis center or domestic violence shelter to develop a safety plan, create new email account, change passwords and pin numbers, and ask about your records and date that could be published on the internet. At the end, the author gives a kit of tips to prevent the problem. Tips such as: use a gender-neutral screen name, never share address or phone number, do not respond to an email from a stranger, among others.
The Women’s Center from Marshall University tries to create awareness through their website of the cyberstalking program. After describing the common mistakes that causes the problem and what it really is, the unknown author also describes the physical, emotional, and psychological trauma that a victim could present. People think that cyberstalking is not as threatening as stalking, since it does not involve physical contact. But the truth is that it is as dangerous as being face to face to your stalker. The article gives easy guidelines of how to react on an online abuse situation. The most important advice to consider are to contact local rape crisis center or domestic violence shelter to develop a safety plan, create new email account, change passwords and pin numbers, and ask about your records and date that could be published on the internet. At the end, the author gives a kit of tips to prevent the problem. Tips such as: use a gender-neutral screen name, never share address or phone number, do not respond to an email from a stranger, among others.