Enhancing Privacy Over the Internet Research Paper

Total Length: 665 words ( 2 double-spaced pages)

Total Sources: 2

Page 1 of 2

Stalking in the Computer Age

In the last two decades, there has been an increase in knowledge of computers and other provisions of the technology. Notably, with the increase in the knowledge regarding the use of the computers criminals have found an opportunity for the criminal acts (Reyns et al., 2012). For example, there is an increase in the number of spammers, and cyber stalkers hence increase in the number of crimes. This following study elucidates the concept of cyberstalking and the ways of avoiding it.

Cyberstalking is a computer crime that involves the use of electronics or internet means to cause harassment (al-Khateeb et al., 2015). Cyberstalker may target an individual, group of people or and enterprise. The harassment may come in a form of emails or instant messaging to a specific person or a group. At some instances, the criminal may decide to attack an organization by posting messages on the website of the organization or a group. Often, the messages posted by the Cyberstalker are annoying or threatening the victims. Cyberstalker is different from the spammer concerning the target.

Notably, spammer target many recipients with aims of annoying whereas the Cyberstalker targets a specific group, individual, or organization with threatening information (Loftus, 2016).

Stuck Writing Your "Enhancing Privacy Over the Internet" Research Paper?

Cyberstalker is cunning and uses false accusations, labels, threats, and defamations to harass the victim. Their knowledge of computer helps them to evade the identity from the victims. Notably, the Cyberstalker utilizes the inability of the Internet to detect and track their real identities. Often, the stalker knows the victims and the victim know the stalker, yet they utilize anonymity of the internet. Research reveals the intentions of the Cyberstalker are not for real material gain but crime. For example, following a criminal confession in the past, their aim is to intimidate, control, or influence the victim.

Cyberstalking takes different forms depending on the intentions of the Cyberstalker. Examples of cyber stalking involve stalking by strangers, close partner, celebrities and public persons, anonymous internet mobs, and the corporate stalking (Loftus, 2016). Partners who were initially in romantic relationships are likely to be victims of cyber stalking. One of the partners may decide to harass or humiliate the other party through emails and messages. Additionally, strangers may decide to intimidate an individual or an organization for personal reasons. Moreover, cyberstalking may target a celebrity where the anonymous individual decides to post-allegation or annoying messages to….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Enhancing Privacy Over The Internet" (2016, April 10) Retrieved May 21, 2024, from
https://www.aceyourpaper.com/essays/enhancing-privacy-internet-2158907

Latest MLA Format (8th edition)

Copy Reference
"Enhancing Privacy Over The Internet" 10 April 2016. Web.21 May. 2024. <
https://www.aceyourpaper.com/essays/enhancing-privacy-internet-2158907>

Latest Chicago Format (16th edition)

Copy Reference
"Enhancing Privacy Over The Internet", 10 April 2016, Accessed.21 May. 2024,
https://www.aceyourpaper.com/essays/enhancing-privacy-internet-2158907