Cyberstalking and Harassment on The Internet

Cyberstalking and Harassment on The Internet

Length: 548 words (1.6 double-spaced pages)

Rating: Excellent

Open Document

Essay Preview

More ↓
The World Wide Web and Internet are great places to study, work, or even play. But there is an ugly side of cyberspace. Cyberspace reflects the real world and some people tend to forget that. Cyberstalking and harassment are problems that a large number of people (especially women) are realizing. (Jenson, 1996, p.1)
Just because an individual owns a computer and has an Internet account do not assume that person is considerate or respectful. There are just as many stalkers in cyberspace as anywhere else. It’s just that their methods have changed. Some stalkers might harass you by following you through live channels not being able to take no for an answer and bothering you with email messages. In some cases this harassment may become a systematic campaign against you; where your harasser bombards you with threatening messages of hate and obscenities. (1996, p.3) The stalker may even trace your home address and telephone number, causing not only emotional distress but possibly physical danger. It should come as no surprise to you that the stalkers are making use of this technology to harass people and prey on the innocent.
There have been many examples of cyberstalking crossing over in to real life stalking. And those users who have been victims of cyberstalking, tell a similar story, that no one took the harassment serious until it became real life stalking. Cyberstalking can be a devastating experience for a person online. But in cyberspace people say things like “well just turn off your computer” and “ you can’t be hurt on the Internet, it’s just words”. (Laughren, 1998, p.1) The online stalking is just as frightening and distressing as off-line stalking, and just as illegal.
Anyone can be stalked online, but statistics show that the majority of victims are women. Women are the minority of the internet population, which means their attention is generally fierce competition between male users. (Jenson, 1996, p.3) Cyberstalking and online harassment are easy to practice than real life stalking. In cyberspace, a stalker can harass their victim without ever having to leave the comfort of their own home, or have any witnesses to the crime.
Online users are vulnerable to stalking in the following three areas. Live chat rooms or IRC, this is the most common place for cyberstaking. Message boards and Newsgroups, and Email box; a user has the ability to write anything and even attach files to the email.

How to Cite this Page

MLA Citation:
"Cyberstalking and Harassment on The Internet." 123HelpMe.com. 26 Jan 2020
    <https://www.123helpme.com/view.asp?id=131823>.

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Essay about Cyberstalking and Abuse

- Cyberstalking is the act of “using the Internet to harass, threaten, or intimidate another person” according to Chuck Easttom (2012). The following provides a synopsis of five recent cases where people have been convicted of cyberstalking or Internet fraud. Each case is analyzed for its relevance in contemporary legal issues, as well as any laws that pertain to the case. Cyberstalking Abuse and Fraud Cases According to John de Leon (2013), on December 17th 2013, a Seattle police detective name David Blackmer pleaded guilty to charges of cyberstalking and domestic violence....   [tags: harassment through the internet]

Research Papers
693 words (2 pages)

Taking a Look at Cyberstalking Essay

- Cyberstalking is a form of electronic crime by way of internet to harass or stalk their victim. Such acts can target an individual, groups, and even organizations.Cyberstalking can be carried out by a number of different electronic and digital threats. Most commonly cyberstalking is known for its malicious intent to attack a victim through email, online chat forums and social media. However, “It may include the making of false accusations or statements of fact (as in defamation), monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information that may be used to harass.” ”Cyberstalking shares important characteristics wit...   [tags: electronic crimes, using the internet to harass]

Research Papers
790 words (2.3 pages)

Cyber Criminology: The Prevalence of Cyberstalking, Online Harrassment and Bullying

- The internet has put the world literally at anyone’s fingertips with a vast quantity of information is a mouse-click away. Information that was once only available in obscure reference libraries or card catalogs can be accessed by everyone. Unfortunately the internet is an equal opportunity tool, and those with virtuous as well as nefarious intentions can use this open resource to further their efforts to levels heretofore unheard of. The internet is also soapbox for free speech that epitomizes the intentions of the founding fathers to allow everyone the same opportunity to have their opinions aired....   [tags: internet, cyber bullying, cyberbullying]

Research Papers
2023 words (5.8 pages)

Essay on Bullying And Harassment Are Often Thrown Out

- Definition: The words bullying and harassment are often thrown out, yet a good majority of the time, the context that the vocabulary is used in is incorrect. Bullying and harassment are similar in context and idea, but have several key differences. Bullying is the act of actively and purposefully going out of one’s way to cause either physical or emotional harm to another individual. The victim of bullying is the ‘weaker’ of the two - referring to physicality or an imbalance of power that the victim does not see reason in fighting back in the vast majority of occurrences....   [tags: Abuse, Bullying, Harassment, Psychological abuse]

Research Papers
1445 words (4.1 pages)

Essay on Bullying And Harassment At The Ford Vs. Chevy Debate

- acquaintances, harassment can happen anywhere with anyone at any time. The thing with harassment is that there is equal power and an equal playing field. However, the victim usually doesn’t stand up for themselves, but if they do then that’s where the harassing usually stops. The goal of harassment is essentially to isolate, intimidate, embarrass or even belittle ONE person. There are so many things that harassment is, but there still is a list of things that harassment is not. Bullying and harassment are not when people disagree over beliefs, politics, or any other opinion based thought....   [tags: Abuse, Bullying, Cyberstalking]

Research Papers
1363 words (3.9 pages)

CyberCrime Committed on the Internet Essay

- Cyber Crime Committed on the Internet Cyber crime is an issue that has been prevalent in this nation ever since the creation of the massive thing we like to call the Internet. The Internet has opened up so many things to all of its users: including online shopping, news, weather, email, online games, and just about anything. From this recent invention creating all of these new things for us, it seems like the Internet could be nothing but great for our society. Yet, what some of us failed to realize was the fact that the door swings both ways....   [tags: Internet Crime, Cyber Crime Essays]

Research Papers
656 words (1.9 pages)

Essay on Cyber Stalking: Ethics in Science and Technology

- People are social creatures and because of that we think of our relationships as very important aspects of our own being. Some have many friends while others have those they call their BFF (a.k.a.: Best Friend Forever). We all long for strong relationships at some level. Maybe we’re looking for the one we’ll go through life with or even be lucky enough to find our soul mate. It’s also human nature that if we form a relationship with another, we want for nothing to ever change that feeling of happiness we have acquired much less let anything come between it....   [tags: cyberstalking, relationships, stalkers]

Research Papers
1038 words (3 pages)

Cyber Criminals: Cyber-Crime and Cyberstalking Essay

- People want to feel safe. If someone owns a precious object it is stored in a safe hidden in their house. To further protect a house the front doors have handle locks and dead-bolts. To keep personal items safe items like wallet chains are used to stop criminals in their tracks. In the case of cars where they cannot always be watched, car alarms were made to protect from thieves. All of these systems are in place to keep people and their possessions safe. There is an area in people’s lives that is not heavily inspected for weaknesses, however....   [tags: Cyber-Crime Essays]

Research Papers
1424 words (4.1 pages)

Essay on The Internet And Other Telecommunications Technologies

- Introduction The internet and other telecommunications technologies are encouraging advances in virtually every feature of society and all over the world. For instance, promoting commerce, improving education and health care, fostering participating in democracy in the United States and abroad, and facilitating communications among family and friends, whether in the neighborhood or around the globe. Regrettably, may of the attributes of this technology, low cost, ease of use, and anonymous nature, among others, make it an appealing medium for fraudulent scams, child sexual exploitation, and increasingly, a new concern referred as cyberstalking....   [tags: Stalking, Abuse, Victim, The Victim]

Research Papers
1000 words (2.9 pages)

Dangers Involved with Internet Usage Essay example

- Dangers Involved with Internet Usage The Internet today is constantly advancing and expanding. Over the last several years it has changed the way that we learn, communicate, shop and conduct business. Although there are many advantages to the Internet, there are also many serious problems that occur with Internet use. Some of the problems of the Internet include, cyberstalking and identity theft and Internet addiction. Although the Internet cannot be blamed for the creation of these problems, using the Internet as a tool has made these problems bigger....   [tags: Computers]

Research Papers
1033 words (3 pages)

Another common area regarding cyberstalking is at the “edu” sites, which are educational institutes, such as colleges and universities. One user might know another user personally and interacts on the internet anonymously starting the cybertalk. One student can enter the internet as easily as another student, therefor not letting his or her true identity be known.
If you are being harassed online by a cyberstalker, the chances are you are not the first person they have stalked. Cyberstakers, like other predators, are opportunists. They know what they are looking for and know how to get it. Stalking is a power crime, the stalker has the power to make you suffer and enjoys that power. (Laughren, 1998, p.4) A stalker’s self-esteem rises when they attack your self-esteem. The more pain and suffering they can cause, the better they feel about themselves. The best protection against becoming a target of stalking is not to reveal anything personal that you might have in common. Often, stalkers are mentally unstable, paranoid, delusional, and extremely jealous, and have extremely low self-esteem. Stalking is a form of obsession. The difference between a normal cyber harasser and a cyberstalker, is the harasser moves on to others and forgets you and a stalker will come back to stalk you another day. (Jenson, 1996, p.5)
The Internet enables the stalker, his powers, in most cases, merely knowledge of the technology is all that’s required to stalk another person online. Note that educated, smooth talking, responsible people can also be stalkers, appearing to be a perfect gentlemen or lady with perfect manners. A major clue to cyberstalking is when the stalker pushes for information regarding your personal life, private life, or life away from the net. A simple rule of thumb is to never give any personal information over the Internet.
Return to 123HelpMe.com