Cyberstalking and Internet Predators Week 5 Spring 2014
Cyberstalking and Internet Predators Week 5 Spring 2014
Cyberstalking • Use of Internet (electronic means) to stalk or harass an individual, group of individuals, organizations. • May Include: – – – – False Accusations Monitoring Making threats Identity Theft Damage to data or equipment Solicitation of minors for sex Gathering information to harass
Cyberstalking • Different from spatial (offline) stalking; however, it can lead to offline stalking or can accompany it.
Cyberstalking Factors • False Accusations: – Try to damage reputation of victim and turn people against them – Post false information about others on websites – Post allegations about person to newsgroups, chat rooms, or other public contribution sites. Cyberstalking
Cyberstalking Factors • Attempts to Gather Information About Victim: – May approach victim’s friends, family, work colleagues to obtain personal information. – May advertise for information on Internet or hire private detective. – Often will monitor victim’s online activities and attempt to trace IP address in effort to gather information about victim.
Cyberstalking Factors • False Victimization: – Cyberstalker will claim victim is harassing him/her.
Cyberstalking Factors • Attacks on Data and Equipment: – May try to damage victim’s computer by sending viruses. • http: //www. commoncraft. com/video/protecting-reputations-online
Cyberstalking Factors • Ordering Goods and Services: – They order items or subscribe to magazines in victim’s name.
Cyberstalking Factors • Arranging to Meet: • Young people especially face high risk of cyberstalkers trying to set up meetings between them.
Cyberstalking of Women • Harassment and stalking of women online is common. • Can include threats of rape and threats of other violence, as well as posting of personal information. • Undermines woman’s autonomy, dignity, identity, and opportunities.
Cyberstalking of Intimate Partners • Online harassment of current or former romantic partner. • Form of domestic violence with purpose to control victim in order to encourage social isolation and create dependency. • May use internet to research and compile personal information about victim in order to harass him/her.
Cyberstalking by Anonymous Online Mobs • Online groups of anonymous people can selforganize and target individuals with online defamation, threats of violence and tech-based attacks. Including: – – Publishing lies and doctored photographs Threats of rape and other violence Posting sensitive personal information about victims E-mailing damaging statements about victims to employers – Manipulating search engines to make damaging material about victim more prominent Cyberstalking Video –GO TO 13: 00
Cyberstalking by Anonymous Online Mobs Cont’d • Victims usually women and minorities • Destructive nature of mobs attributed to group dynamics (groups with homogeneous views tend to become more extreme as members reinforce each other’s beliefs they lose personal identity and lose sense of personal responsibility.
Corporate Cyberstalking • When a company harasses an individual online, or an individual or group of individuals harasses an organization. • Motives are ideological or include a desire for financial gain or revenge.
Perpetrators Profile • Four types of cyberstalkers: – Vindictive cyberstalkers noted for ferocity of attacks – Composed cyberstalker who wants to annoy – Intimate cyberstalker who attempts to form relationship but turns on them if rebuffed – Collective cyberstalkers who are groups with motive
Perpetrators Profile • General profile of harasser is cold with little/no respect. • Stalker is a predator who waits for victims vulnerability to show, or may enjoy pursuing a particular person, whether personally familiar or unknown. • Enjoys and demonstrates power to pursue and psychologically damage victim.
Behaviors • Use search engines, online forums, bulletin and discussion boards, chat rooms, social networking sites to find victims. • May engage in live chat harassment or electronic viruses and unsolicited e-mails. • May research individuals to feed curiosity/obsession.
Behaviors Cont’d • Will post defamatory or derogatory statements about target on web pages, message boards and in guest books to get reactions and responses from victim (initiate contact). • Create fake blogs in name of victim containing vulgar content
Cyber Bullying • What is it? – Bullying that takes places using electronic technology: • • Cell phones Computers Tablets Social Media Sites Text Messages Chats Websites
Cyber Bullying • Persons who are cyber bullied are often bullied in person as well • Often harder to get away from cyber bullying • Can happen 24/7, day and night • Messages and images can be posted anonymously and distributed quickly • Can be difficult to track/trace the source • Difficult to delete inappropriate or harassing messages, texts, and pictures once posted
Cyber Bullying • Young people who are cyber bullied are more likely to: – Use alcohol and drugs – Skip school – Experience in-person bullying – Be unwilling to attend school – Receive poor grades – Have lower self-esteem – Have more health problems
- Slides: 21