blog




  • Essay / A look at cyberstalking - 790

    Cyberstalking is a form of electronic crime via the Internet aimed at harassing or stalking its victim. Such acts can target an individual, groups and even organizations. Cyberbullying can be perpetrated by a number of different electronic and digital threats. Most commonly, cyberbullying is known for its malicious intent to attack a victim through email, online chat rooms, and social media. However, "this may include making false accusations or statements (as in defamation), surveillance, threats, impersonation, damaging data or equipment, soliciting minors for sexual purposes or the collection of information that could be used for sexual purposes. harass. » “Cyberbullying shares important characteristics with offline bullying; Many stalkers – online or offline – are motivated by a desire to control their victims. it can also be very damaging due to its anonymity. With online advantages, the perpetrator may be able to extract personal data from the victim in just a few clicks. Online information can provide phone numbers, profiles, date of birth, social security numbers, residence photos and even directions. This criminal act, although it seems rather controlled and less harmful due to the lack of physical interaction, actually poses a greater threat. Since the primary use by cyberstalkers to commit the crime is online activity, it is much more difficult to track down the individual behind the act. “The true identity of a cyberstalker can be concealed by using different Internet service providers and adopting different pseudonyms.” "...... middle of paper ......g is a crime on the rise. Unfortunately, lack of law enforcement training and expertise, anonymity and jurisdictional limitations represent a huge burden and frustration for the victim as well as the law enforcement agencies themselves. As more cases come to light, more investigations can uncover criminal acts, preventing them. that others occur and provide evidence to enforce stricter laws away from such threats Nolta, Brandon: Penn Foster, 2012 “Cyberharassment Laws December 5.” 2013. National Conference of State Legislatures December 16, 2013berharassment-laws.aspx> http://www.leg.state.fl.us/statutes/index.cfm?App_mode=Display_Statute&Search_String=&URL=0700-079 9/0784. /Sections/0784.048.htmlhttp://www.crime-reseah.org/library /Cyberharacèlement.htm