Cyberstalking FS06

Cyberstalking FS06 - Cyberstalking and On-line Harassment...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Cyberstalking and On-line Harassment Computer Crime Professor Holt
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 On-line Abuse Abuse and harassment frequently occurs off- line Recently noted on-line Is this computer assisted or focused? The behaviors individuals engage in can take multiple forms cyberstalking cyber-bullying
Background image of page 2
3 Cyberstalking There is no single accepted definition for cyberstalking Often encapsulated under regular stalking legislation because it adapts tech to a common criminal problem Stalking is generally defined as the willful or intentional commission of a series of acts that would cause a reasonable person to fear death or serious bodily injury and places them at risk for this type of harm
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Cyberstalking There is a somewhat comprehensive definition generated by Bocij and McFarlane for cyberstalking A group of behaviors where people use information technology and communications technology to harass individuals Harassment is a course of action that a reasonable person would think causes another reasonable person to suffer emotional distress
Background image of page 4
5 Features Of Stalking Not all instances of stalking lead to violence There are several features to true stalking situations Malice - Premeditation Repetition - Distress Obsession - Vendetta Personally directed - No legitimate purpose Disregarded warnings to stop Harassment of various forms Threats
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 Impact of Technology Computer technology may facilitate stalking in cyberspace for several reasons Anonymity Lowered inhibitions in on-line settings Lack of body language Less significance given to on-line communication Gender differentials in on-line use
Background image of page 6
7 Tools There are myriad tools at the cyberstalker’s disposal E-mails and instant messaging systems are most often used Threats in chatrooms Enticing others to attack or harass the individual Ordering goods or services on behalf of the individual Damaging your system through various attacks False websites Posing as another to various ends Tracking through cell phones Spyware and adware
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8 Why? Stalkers typically want a relationship with the victim If they cannot have one, they will take negative impacts Emotional drives Revenge, hate, anger, jealousy Obsession Stalker may have no previous relationship with victim, but believe they are going to improve their life by connecting with others Mental illness Desire to frighten or embarrass the harassment victim To teach a lesson or change behavior Political or terrorist stalking Person is in a bad mood
Background image of page 8
9 Motives
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 11/08/2009 for the course CJUS 4000 taught by Professor Dr.holt during the Spring '09 term at UNC Charlotte.

Page1 / 31

Cyberstalking FS06 - Cyberstalking and On-line Harassment...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online