Preview

Cyberstalking: Identity Theft and Online Community Websites

Better Essays
Open Document
Open Document
1263 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyberstalking: Identity Theft and Online Community Websites
Cyberstalking
Jeff Worrell
Waubonsee Community College

Technology is getting more advanced in today’s world, but with it comes new problems and dangers; cyberstalking is no exception. Cyberstalking is a new way of stalking or harassing an individual that spawned from the use of the Internet (Cyberstalking, 2010). The Internet has given any user the ability to gain access to other peoples’ information, contact a person or group, or even damage another person’s computer or equipment. Along with the evolution of technology, laws have been created and/or revised to regulate wrongful activities or behavior that are spawning from the new technology. Cyberstalking was to be considered normal stalking when it first sprouted, but many problems that came with the new technology weren’t covered by the definition. According to Legaldefinitions.us, “Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include false accusations, monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information in order to harass.” Although computers are common tools in cyberstalking, the laws are not limited to them. Fax machines, cell phones, or anything that can provide communication services is included (Bocij, 2004). Cyberstalking has been on a boom with the recent advancement in technology. With online community websites like Myspace and Facebook, users are allowed to see other person’s profiles. Profiles may contain personal information about the user: such as age, gender, hometown, where they work, etc. Contact information may also be found on profiles, such as email address and phone numbers. People may even post pictures of themselves up on their profiles for the world to see. If anyone wanted to know anything about a person (friend or not), they can look it up on the Internet. A



References: 720 ILCS 5/12‑7.5. (n.d.). Retrieved November 15, 2010, from http://www.ilga.gov/legislation/ilcs/documents/072000050k12-7.5.htm Bocij, P. (2004). Cyberstalking: harassment in the Internet age and how to protect your family. Westport: Praeger. Retrieved November 15, 2010, from http://books.google.com/ Cyberstalking definition. (2010). In Legal Definition. Retrieved November 15, 2010, from http://legaldefinition.us/cyberstalking.html Moore, A. A. (2009, January 8). Cyberstalking and women - facts and statistics. Retrieved November 15, 2010, from http://womensissues.about.com/od/violenceagainstwomen/a/CyberstalkingFS.htm Report from attorney general to the vice president. (1999, August). Retrieved November 15, 2010, from http://www.justice.gov/criminal/cybercrime/cyberstalking.htm State of Illinois Crime & Punishment Chart (2000, January). In Crime and punishment. Retrieved November 15, 2010, from http://www.crimeandpunishment.net/IL/

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In, People of the State of California (Plaintiff) v. George Samuel Bronk (Defendant), the defendant used various software, tools, and methods to commit the felonies for which he was charged. He initially used a computer with access to the Internet to take over the email accounts of individuals who he located using the popular social media website, Facebook. Mr. Bronk located his victims by searching random Facebook profiles that had personal email addresses available to the public. Once he had the email addresses he tried to access emails accounts, by attempting to reset the passwords for said email accounts, by guessing at the security questions. Once he was able to gain access to the emails accounts, he went back to the Facebook profiles and took over the Facebook profiles as well.…

    • 455 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Physical crimes never cease to draw our attention. Victims, bloodiness, drama, motives, psychological issues and conflicts: they are at the heart of most physical crimes. Cyber crimes are not viewed as dramatic and pervasive by many, but its consequences can be even bloodier within seconds: hundreds of millions of victims and billions of dollars can be rapidly caused with two elements, a criminal mind and one computer. We are not safe from either bloody crimes or cyber crimes such as cyberstalking, cyberbullying, and financial theft. In fact, “cybercrime affects everyone-business, governments, and citizens.” (2). Wealth, a safe neighborhood, or bodyguards…

    • 1487 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Watched By Cj Lyons Essay

    • 805 Words
    • 4 Pages

    This book explains the dangers of capping and blackmail even better than many articles and nonfiction books. It describes the horrors of the Internet and how ruthless these capers can be in a way that the teenagers can understand. This subject of “Cyberbullying is a timely and important topic…

    • 805 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Many victims of misogynistic cyber-bullying believe that they are not protected by the law due to past publicized instances of misogynistic cyber-attacks and the lack of action from law officials, which is linked to social biases toward women. One example of law officials not acting to pursue a misogynistic cyber-bullying case answers the question of why victims hesitate to report such attacks when one woman tries to report cyber-harassment; “An officer said her ex had the right to publish her nude photos and video next to her name and the suggestion that she “liked cock” and “masturbated for her students” because she shared the images with him.…

    • 275 Words
    • 2 Pages
    Good Essays
  • Better Essays

    According to researchers, “ the term cyberbullying or cyberstalking has been assigned to individuals that use the resources of the internet to follow, harass, prey upon, intimidate or humiliate the targets of their intentions, through means that are hard to define and sometimes legal” (Pittaro,2007,p.180).The legality of some aspects of the crime and difficulty in drawing a line between harmless and inappropriate behavior is amplified when trying to expand the concept of inappropriate to illegal. The effort to send an unwanted advance via a note in class is simplified when sending an email, or ten or even one hundred emails, and similar to crumpling a note and throwing it away and unwanted email can readily…

    • 1423 Words
    • 6 Pages
    Better Essays
  • Good Essays

    In the current generation, electronics are practically everywhere and it is so simple to be attacked or attack another person. The U.S. definition of cyberbullying is the use of informational technology to repeatedly harm or harass other people in a deliberate manner. Cyber harassment is when is when someone posts rumors and gossips about a person to bring hatred to others mind’s. In his article, What is Cyber Harassment, R. Stamm gives the intentions of the cyber harasser when he states, “A stalker or harasser often will post comments to the victim that are intended to cause distress and will try to incite others to do the same”. This means that cyber harassers are directly attacking someone to make the victim feel isolated and rejected. There are six different types of cyber harassment. All of these types of harassment attack a person and try to make them feel…

    • 1639 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Stalking Research Paper

    • 753 Words
    • 4 Pages

    An intimate stalker may want the victim to accept some kind of reconciliation between the two, and if the victim refuses he/she may threat the victim. Stalking has its levels of severity. Some stalkers may not stalked the victim on a daily basis while others may on an extreme level. Stalking can be done through emails, texts, phone calls, social media, letters, and so on. Cyberstalking can be going through the victim's personal documents such as emails and photos, tracking where the victim's location, or taking…

    • 753 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    FINAL DRAFT CYBERCRIME CJ

    • 667 Words
    • 3 Pages

    This paper was prepared and submitted for CJ360 Cybercrime Fall 2014, taught by Professor Alecia Schmidt.…

    • 667 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Investigative Programs, Cyber Investigations: Operation "Web Snare". (2005). Federal Bureau of Investigation Website. Retrieved November 12, 2005 from, www.fbi.gov/cyberinvest/websmare.htm…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Cyberstalking

    • 908 Words
    • 3 Pages

    There are several stages to investigating a cyberstalking case. These stages assume that the identity of the cyberstalker is unknown. Even if the victim suspects an individual, investigators are advised to explore alternative possibilities and suspects. Although past research suggests that most stalkers have prior relationships with victims, this may not apply when the Internet is involved since stranger stalking is easier. Therefore, consider the possibility that the victim knows the stalker, but do not assume that this is the case:…

    • 908 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Burgess-Proctor, A., Patchin, J. W., & Hinduja, S. (2009). Cyberbullying and online harassment: Reconceptualizing the victimization of adolescent girls. In V. Garcia and J. Clifford [Eds.]. Female crime victims: Reality reconsidered. Upper Saddle River, NJ: Prentice Hall. In Print.…

    • 384 Words
    • 2 Pages
    Best Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Podgor, Ellen. (n.d.). COMPUTER CRIME. encyclopedia of crime and justice entries. Retrieved (2010, May 6) from http://www.highbeam.com/doc/1G2-3403000048.html…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    Cyberbullying In Canada

    • 1966 Words
    • 8 Pages

    It has been a routine that when someone needs something, he or she can proceed to the Internet for his or her need to be catered. But on the other side of the Internet, crimes after crimes spread. Anything that takes place in cyberspace, or all electronic or internet means of communication can potentially produce cyber victims. A Cybercriminal use the computer as their object…

    • 1966 Words
    • 8 Pages
    Powerful Essays