Pittaro (2007) concluded that cyberstalking generally refers to the use of the Internet, email, or other electronic communication devices to create a criminal level of intimidation, harassment, and fear for victims (Petrocelli, 2005; Reno, 1999). Cyberstalking is a form of stalking that relies on the Internet and other electronic communication devices to harass, threaten, and intimidate victims (Pittaro, 2007).
In the physical world, stalking behaviors are limited to the stalker approaching the victim in a public or private place, workplace, or residence. However, the internet has caused a new form of stalking to emerge: cyberstalking. With cyberstalking, people can stalk their victims via the Internet. The Internet is not limited by geographic boundaries. Anyone with access to the Internet has the ability to cyberstalk an individual (Maxwell, 2001).
Ellison (1999) proposed that cyberstalking can be classified as a type of electronic communication that can either be direct or indirect. The most common type of cyberstalking is direct cyberstalking, because it resembles offline stalking (Wallace, 2000). It is also the most common way in which cyberstalking begins. Direct cyberstalking includes the use of pagers, cell phones and email to send hateful messages, threats, or obscenities in order to intimidate the victim. It may include the sending of unwanted e-mails, which are abusive, threatening, or obscene. It can also involve sending the victim thousands of junk e-mail messages, commonly known as spamming, or sending viruses (Ellison & Akdeniz, 1998).
Indirect cyberstalking includes the use of the internet to display hateful messages or threats. (Ellison & Akdeniz, 1998). It can also involve the stalker impersonating the victim online by sending e-mails or spams in the victim’s name. It can include posting false information about someone on a social networking site, message board, or chat room (Ellison & Akdeniz, 1998; Maxwell, 2001).
ReferencesEllison. L., & Akdeniz, Y., “Cyberstalking: the Regulation of Harassment on the Internet,” [1998]Criminal Law Review, December Special Edition: Crime, Criminal Justice and the Internet, Pp 29-48
Ellison, L. (1999). Cyberspace 1999: Crime, Criminal Justice and the Internet. 14th BILETA Conference. York. England.
Maxwell, A. (2001). Cyberstalking. Department of Psychology: Auckland University
Petrocelli, J. (2005). Cyber stalking. Law & Order, 53(12), 56-58.
Pittaro, M. (2007). Cyber stalking: an analysis of online harassment and intimidation. International Journal of Cyber Criminology, 1(2), 180-197.
Reno, J. (1999). 1999 report on cyber stalking: A new challenge for law enforcement and industry.
Wallace, B. (2000). Stalkers Find a New Tool – the Internet. Email is increasingly used to threaten and harass, authorities say. SF Gate News.
Ellison, L. (1999). Cyberspace 1999: Crime, Criminal Justice and the Internet. 14th BILETA Conference. York. England.
Maxwell, A. (2001). Cyberstalking. Department of Psychology: Auckland University
Petrocelli, J. (2005). Cyber stalking. Law & Order, 53(12), 56-58.
Pittaro, M. (2007). Cyber stalking: an analysis of online harassment and intimidation. International Journal of Cyber Criminology, 1(2), 180-197.
Reno, J. (1999). 1999 report on cyber stalking: A new challenge for law enforcement and industry.
Wallace, B. (2000). Stalkers Find a New Tool – the Internet. Email is increasingly used to threaten and harass, authorities say. SF Gate News.
No comments:
Post a Comment