Cyberstalking

From SI410
Revision as of 08:24, 18 December 2011 by Thomarol (Talk | contribs) (Examples of cyberstalking cases)

Jump to: navigation, search

(back to index)

Cyberstalking is the use of the Internet and other forms of online and computer technologies to stalk, harass, and threaten a person, group or organization. The action of cyberstalking can include but is not limited to threatening behavior, unwanted advances, monitoring, identity theft, soliciting sex to minors and the gathering of information to use to stalk. In all cases, the victim(s) can be aware or not aware that such activities are even occurring. Cyberstalking can also be accompanied by or lead to in-person stalking and even cause death to the victim(s) involved.

Background

Facebook and other social networking sites can be used to cyberstalk.

As a relatively new trend due to the rise of technology used within our society, cyberstalking can be done by anyone that can use a computer and log onto the Internet. Cyberstalking includes sending unwanted, threatening, or obscene email, posting obscene or threatening messages in discussions or forums, using the internet to gather private information, tracking somebody’s Internet activity, and more. Cyberstalkers may or may not know their victims. Cyberstalking can is harmful to victims and can potentially cause them death and other related injuries.

If they do not know their victim, then they can find their targets through social media, chatrooms, discussion threads and many other methods online. Some people believe that more and more people are getting involved in cyberstalking due to the ease of anonymity. Some of these people would not have engaged in offline stalking for fear of being caught.

Who is involved

Perpetrators

Cyberstalkers can be anybody. They may know their victim or they could be completely random. Leroy McFarlane and Paul Bocij [1] recognize five types of cyberstalkers:

  • The Rejected Stalker had an relationship with the victim at some point, either romantically or as a friend or family member. They are motivated by seeking both revenge and reconciliation.
  • The Intimacy Seeker tries to achieve a relationship with the victim who has peaked their interest and whom they might have mistakenly believed to think returns that interest.
  • The Incompetent Suitor wants to develop a relationship but cannot seem to do so within the normal social rules of courtship. They are often intellectually and/or socially incompetent.
  • The Resentful Stalker wants to payback their victim for some supposed injury or humiliation they have caused.
  • The Predatory Stalker gathers information for the purposes of preparing for an attack.

Victims

Anybody can be a victim of cyberstalking. In fact, in a study about cyberstalking victims, over 82% of the respondents had experienced cyberstalking in one form or another [2]. Common types of victims include but are not limited to women, children and teenagers, or past/present intimate partners.

Ethical implications

There is much debate on whether cyberstalking is considered unique to in-person stalking, or if it is just under the umbrella term of stalking regardless of what in what context the stalking was taking place—online or offline. This debate falls under a large theme of whether computer ethics are considered unique or not. In the case of cyberstalking, traditionalists would argue that stalking is stalking no matter if it was done online or offline, while philosophers would argue that there are some aspects of cyberstalking that are unique, such as the new scope at which stalking can now be carried out online and the ease at which personal information can now be found online [3].

The ease with which "stalking" has been incorporated as an acceptable activity for users on various social media sites (specifically Facebook) is an alarming fact that raises the question whether ethical norms have been changed in the online environment.

For more information see, Uniqueness of Computer Ethics.

Is there a difference?

Cyberstalking and the law

The US Federal Anti-Cyberstalking laws include 47 USC 223, 18 USC 2261A and the Violence Against Women Act, pertain to any cyberstalking cases crossing state lines. Otherwise, state cyberstalking laws are considered.

However, not every state has a specific cyberstalking law. The National Conference of State Legislatures keeps a complete list on which states have cyberstalking, cyberharassment, and or cyberbullying laws [4].

Examples of cyberstalking cases

Amy Boyer

Main articles: The Amy Boyer Case.

Amy Boyer, 21, was murdered in October 199 by Liam Youens who had stalked her online. Youens used the Internet to find information out about Boyer such as where she lived, where she worked, what type of car she drove, and other such personal, confidential information. He even went so far to obtain her Social Security number through an agent. Youens also created two websites concerning her: one site detailed Boyer's personal information and the other detailed his plans to murder her [3].

Joelle Ligon

Joelle Ligon was cyberstalked for six years by James Murphy, and ex-boyfriend. Murphy sent Ligo emails from an alias email accounts that started out as unwanted and later turned pornographic. Murphy also posted Ligon’s phone number in discussion threads and chatrooms that led to Ligon getting phone calls from men asking for sex. During the time cyberstalking was not yet outlawed in Washington State, where Ligon lived and worked, so the police said there was nothing they could do. Ligon then sought help from the FBI. After a long process, Murphy plead guilty to two counts of Internet harassment [5].

Chris Armstrong

In 2010, the University of Michigan's first openly gay president of their student government was the subject of an anonymous blog called ChrisArmstrongWatch, dedicated to exposing the allegedly homosexual agenda he was purported to be enacting at UM[6]. The author of the blog was revealed to be Michigan Assistant Attorney General Andrew Shirvell, who had been appearing at UM student government meetings to protest Armstrong's presidency[7] as well as videotaping Armstrong's off-campus residence during parties that he would go on to characterize as "gay dorm orgies," taking innocuous comments from other UM students off of Armstrong's Facebook page to corroborate his story[8]. Armstrong has pursued legal action[6] and Shrivell has been dismissed from his jon with the state of Michigan[9].

Preventing cyberstalking

There are many different ways to prevent cyberstalking from occurring: [10]

  1. Do not share private information, such as your name, birthdate, address, or social security number, in a public online space or with someone you do not know.
  2. Be very careful when interacting with others online whom you have not met before. While your interactions may seem safe, you may be talking to someone who is misrepresenting themselves.
  3. Do not put your credit card information or any other form of online payment into an unsecured system. While the site may look legitimate, it may in reality be a farce.
  4. Change your passwords semi-regularly so as to keep your accounts as secure as possible. When creating your passwords, do not use your birthdate, dog's name, or any other piece of information that is relatively easy to find.
  5. If you believe you are being cyberstalked, do not hesitate to contact the authorities. Save all conversations, transactions, and engagements with your stalker as they will be important for finding the stalker.

See also

References

  1. McFarlane, L. An exploration of predatory behaviour in cyberspace: towards a typology of cyberstalkers. First Monday 8.9 01 Sep 2003: unknown-unknown. University of Illinois, Chicago, in cooperation with the University Library.
  2. Bocji, P. Victims of cyberstalking: an exploratory study of harassment perpetrated via the Internet. First Monday 8.10 01 Oct 2003: unknown-unknown. University of Illinois, Chicago, in cooperation with the University Library.
  3. 3.0 3.1 Tavani, Herman T. The uniqueness debate in computer ethics: What exactly is at issue, and why does it matter?. Ethics and information technology 4.1 01 Mar 2002: 37-54. Kluwer Academic Publishers.
  4. "Cyberstalking, Cyberharassment and Cyberbullying Laws." NCSL Home. 26 Jan. 2011. Web. <http://www.ncsl.org/default.aspx?tabid=13495>.
  5. Ho, Vanessa. "Cyberstalker Enters Guilty Plea." Seattle Post. 29 July 2004. Web. <http://www.seattlepi.com/local/article/Cyberstalker-enters-guilty-plea-1150519.php>.
  6. 6.0 6.1 http://abovethelaw.com/tag/chris-armstrong/
  7. http://www.michigandaily.com/content/armstrong-says-he-will-not-back-down-criticism
  8. http://www.thedailyshow.com/watch/mon-november-1-2010/look-who-s-stalking
  9. http://www.annarbor.com/news/andrew-shirvell-fired-from-job-at-attorney-generals-office/
  10. http://www.boston.com/ae/books/gallery/cyber_safety/

External links

(back to index)