• Bipolar Disorder
  • Therapy Center
  • When To See a Therapist
  • Types of Therapy
  • Best Online Therapy
  • Best Couples Therapy
  • Best Family Therapy
  • Managing Stress
  • Sleep and Dreaming
  • Understanding Emotions
  • Self-Improvement
  • Healthy Relationships
  • Student Resources
  • Personality Types
  • Guided Meditations
  • Verywell Mind Insights
  • 2023 Verywell Mind 25
  • Mental Health in the Classroom
  • Editorial Process
  • Meet Our Review Board
  • Crisis Support

Cyberstalking: Definition, Signs, Examples, and Prevention

Sherri Gordon, CLC is a published author, certified professional life coach, and bullying prevention expert. She's also the former editor of Columbus Parent and has countless years of experience writing and researching health and social issues.

cyber stalking introduction essay

Karen Cilli is a fact-checker for Verywell Mind. She has an extensive background in research, with 33 years of experience as a reference librarian and educator.

cyber stalking introduction essay

Fizkes / iStockphoto

  • Consequences

Cyberstalking Laws

Cyberstalking refers to the use of the internet and other technologies to harass or stalk another person online, and is potentially a crime in the United States. This online harassment, which is an extension of cyberbullying and in-person stalking, can take the form of e-mails, text messages, social media posts, and more and is often methodical, deliberate, and persistent.

Most of the time, the interactions do not end even if the recipient expresses their displeasure or asks the person to stop. The content directed at the target is often inappropriate and sometimes even disturbing, which can leave the person feeling fearful, distressed, anxious, and worried.

What's more, cyberstalking is a growing problem. According to the Pew Research Center 4 out of 10 Americans have experienced online harassment and 62% of them consider it a significant issue.

While some of the online harassment that people in the survey experienced was just nuisance behaviors, nearly 1 in 5 Americans said they had experienced severe forms of online harassment. These actions included physical threats, sexual harassment, and stalking.

Signs of Cyberstalking

Some signs that you are experiencing cyberstalking include someone sending you too many messages, a person sending you inappropriate messages, liking all of your old posts on social media, manipulating you into interacting with them online, or trolling you. Online impersonality, GPS tracking, threatening messages, catfishing, and doxing are also behavior associated with cyberstalking.

Examples of Cyberstalking

When it comes to cyberstalking, those who engage in this behavior use a variety of tactics and techniques to harass, humiliate, intimidate, and control their targets. In fact, many of those who engage in cyberstalking are technologically savvy as well as creative and come up with a multitude of ways to torment and harass their targets.

So what is considered cyberstalking? Here are some examples of things people who cyberstalk might do:

  • Post rude, offensive, or suggestive comments online
  • Follow the target online by joining the same groups and forums
  • Send threatening, controlling, or lewd messages or emails to the target
  • Use technology to threaten or blackmail the target
  • Tag the target in posts excessively, even if they have nothing to do with them
  • Comment on or like everything the target posts online
  • Create fake accounts to follow the target on social media
  • Message the target repeatedly
  • Hack into or hijack the target's online accounts
  • Attempt to extort sex or explicit photos
  • Send unwanted gifts or items to the target
  • Release confidential information online
  • Post or distribute real or fake photos of the target
  • Bombard the target with sexually explicit photos of themselves
  • Create fake posts designed to shame the victim
  • Track the target's online movements by installing tracking devices
  • Hack into the target's camera on their laptop or smartphone as a way to secretly record them
  • Continue the harassing behavior even after being asked to stop

What are the main types of cyberstalking?

Cyberstalking often falls into four main types: vindictive, composed, intimate, and collective. Vindictive cyberstalking involves threats, composed cyberstalking involves annoyance and harassment, intimate involves exes or people infatuated with the victim, and collective involves a person being cyber stalked by a group of individuals.

Consequences of Cyberstalking

Just like stalking, cyberstalking has the potential to cause a wide range of physical and emotional consequences for those who are targeted. For instance, it's not uncommon for those who are being harassed online to experience anger, fear, and confusion. They also might have trouble sleeping and even complain of stomach trouble.

The consequences of cyberstalking also impact a person's mental health and overall wellbeing. Frequently, people who have been a target of cyberstalking experience distress, anxiety , and depression .

There are even reports that targets of cyberstalking may experience post traumatic stress disorder and suicidal ideation . If you are experiencing cyberstalking, it's important that you reach out for help. You can contact the National Center for Victims of Crime at 1-855-4-VICTIM (1-855-484-2846). And, if you or a loved one are in immediate danger be sure to call 911 right way.

You also should consider getting help from a mental health professional. They can help you process your feelings as well as provide support and guidance for what you're experiencing.

How to Prevent Cyberstalking

When it comes to preventing cyberstalking, it's important that you take the necessary precautions to protect yourself online. Although it's not possible to completely prevent cyberstalking from occurring, there are steps you can take to increase your security and reduce the likelihood of it happening.

Make Security a Priority

The first step in preventing cyberstalking is to ensure that your devices and your online accounts are as secure as possible. Here are some steps you should consider taking.

  • Create strong passwords . Make sure you have strong passwords for all your online accounts as well as strong passwords for your devices. Then, set a reminder on your phone to regularly change your passwords. Choose passwords that would be difficult to guess but are easy for you to remember.
  • Be sure to log out every time . It may seem like a pain, but make sure you log out of email, social media accounts, and other online accounts after using them. This way, if someone were able to get into your device they would not have easy access to your accounts.
  • Keep track of your devices . Don't leave your phone sitting on your desk at work or walk away from an open laptop. It only takes a minute or two for someone to install a tracking device or hack your device. So, make sure you keep these things in your possession or that you secure them in some way.
  • Use caution on public wifi . Recognize the fact that if you use public wifi at hotels or at the local coffee shop, you are putting yourself at risk for hacking. Try to refrain from using public wifi or invest in VPN.
  • Practice online safety habits . In other words, make it a priority to only accept friend requests from people you know and keep your posts private. You also should consider having one email address that is specifically for your online activity. Use this email when you do your online shopping or join loyalty programs.

Practice Good Digital Hygiene

In order to protect yourself from cyberstalking, it's important to practice good digital hygiene. What this means, is that you are aware of the digital footprints you're creating online and you're taking steps to protect your accounts and your identity. Here are some things you should be doing on a regular basis.

  • Take advantage of security settings . Go through each of your online accounts—especially your social media accounts—and ensure that you are using the strongest privacy settings as possible. You can even establish settings where people cannot tag you or post pictures of you without your approval first.
  • Create generic screen names . Rather than using your full name online, consider developing a gender-neutral screen name or pseudonym. By doing so, you are making it harder for people to find you online. You also should leave the optional sections, like your date of birth or your hometown, blank.
  • Keep locations secure . Consider disabling the geolocation settings in photos. You also should refrain from posting your location in real time and instead post photos showing where you have been after the fact.
  • Be careful with online dating sites . Refrain from using your full name on online dating sites . You also should avoid giving out personal information like your last name, address, email, and telephone number until you have met in person and established a level of trust.
  • Perform a social media audit . It's always a good idea to go through your social media accounts and remove photos or posts that provide too much information about you or that create an image you don't want out there. Keep in mind, too, that even if you have blocked someone on social media, they may be able to still see your account by using another person's account or by creating a fake profile.

How to Cope With Cyberstalking

Online anonymity makes it challenging to trace cyberstalking back to a particular person, but there are still things you can do to increase your safety and combat what you're experiencing. Here's everything you need to know about dealing with cyberstalking.

Set Up Roadblocks

The first step to addressing the cyberstalking you're experiencing is to do what you can to put an end to the interactions with the person cyberstalking you. While they may still find other ways to reach you, you can at least make it harder for them to contact you. Try to set up these roadblocks to cyberstalking.

  • Tell the person to stop . Respond only once to the person cyberstalking you and tell them to stop contacting you. You don't need to say anything specific or explain your answer, just ask them to never contact you again.
  • Block the person . Make sure you block the person cyberstalking you from all your accounts. You should block them on social media and on your smartphone.
  • Refuse to respond to any contact . If the person cyberstalking continues to find ways to contact you, do not respond to anything they post or send you.
  • Change email address and screen names . Consider getting a new email address and changing your online screen names to make it harder for the person cyberstalking you to reach you.

Increase Security

It's important to remember that people who engage in cyberstalking are already crossing a number of personal boundaries in order to make contact with you. For this reason, you need to do everything you can to increase your safety.

You also should prepare yourself for the possibility that their online harassment could escalate to in-person stalking . So, make sure you're also taking steps to keep yourself safe at home, school, and work. It may even help to create a safety plan . Here are some other things you can do:

  • Change passwords . Even if your accounts have not been breeched you should change all your passwords and continue to change them on a regular basis.
  • Consider suspending online accounts . If you are able, you should consider suspending your social media accounts or at least taking a break for them for a while. If you are not active online, it's harder for the person cyberstalking you to reach you.
  • Get your devices checked . Before you use your devices again you should have them checked out by a professional to ensure the person harassing you did not install tracking devices or hack your computer in some way.

Take Action

If you have asked the person cyberstalking you to stop and their behavior continues, it's important to take action against them. This includes contacting the appropriate authorities and collecting evidence of their actions. You also may want to consider talking with an attorney.

Here are the key points that will need addressed when taking action. Your local law enforcement can let you know if there is anything else you can do in order to stay safe.

  • Save evidence of everything . Even though you may feel like destroying everything, it's important to keep copies of everything the person cyberstalking you has sent. Make a copy for yourself and a copy for law enforcement.
  • Notify your local police . It's important to notify the police and file an official complaint if you're being cyberstalked. Even if they cannot do anything right away, having an official complaint on file is important if the behavior persists or escalates.
  • Report them to the site or service they used . If the person cyberstalking you harassed you through Facebook, Instagram, Twitter, Snapchat, YouTube, Gmail, or some other method, let the appropriate authorities know what you're experiencing. Many times, these organizations take complaints of cyberstalking seriously and will address the matter.

Even though there is not a specific federal law against cyberstalking, there are laws that can be used to prosecute those who engage in cyberstalking. Cyberstalking is a serious crime and it can result in serious consequences for those who engage in this behavior.

For instance, the federal law against stalking is often used in these cases. This law states that anyone who uses electronic communications technology to engage in conduct that causes a person reasonable fear of death or serious bodily injury or “causes, attempts to cause, or would be reasonably expected to cause substantial emotional distress to a person," could face imprisonment.

There are other federal laws that could be applied to cyberstalking cases as well. The Computer Fraud and Abuse Act could be used to charge someone if the target has been secretly recorded using their own computer or in situations where the perpetrator gained access to sexual photos or videos through unauthorized access to the target's computer.

Likewise, a person may be charged with extortion if they publish or threaten to publish private photos or videos of another person with the intention of forcing them to do something they don't want to do, especially if they communicated through interstate commerce channels like phones, computers, or the internet.

There also is a statute that indicates that it is a crime to use a telephone, the internet, or any other telecommunications device to annoy, abuse, harass, or threaten another person. Meanwhile, anyone who engages in caller ID spoofing—meaning they disguise the number that appears on the target's caller ID— could be charged with a crime.

As for state laws, those vary from state to state. If you are curious about your state's cyberstalking laws, contact your local police department. They should be able to tell you what laws your state has to address cyberstalking.

Pew Research Center. Online harassment 2017 .

Begotti T, Acquadro Maran D. Characteristics of cyberstalking behavior, consequences, and coping strategies: a cross-sectional study in a sample of Italian university students .  Future Internet . 2019;11(5):120. doi:10.3390/fi11050120

Short E, Linford S, Wheatcroft JM, Maple C. The impact of cyberstalking: the lived experience - a thematic analysis . Stud Health Technol Inform . 2014;199:133-7.

Cyberbullying Research Center. Cyberstalking .

Privacy Rights Clearinghouse. Online harassment and cyberstalking .

By Sherri Gordon Sherri Gordon, CLC is a published author, certified professional life coach, and bullying prevention expert. She's also the former editor of Columbus Parent and has countless years of experience writing and researching health and social issues.

Internet Crimes: Cyberstalking Essay

Introduction, cyberstalking, location and pursue of victims, laws and other methods of preventing cyberstalking, effects of cyber stalking, identify theft, laws and other methods of curbing internet identity theft.

How would a person feel if he or she wakes up one morning to find his or her identity stolen along with their money? Why would someone ever think of doing such a thing? It is noteworthy that criminals engage in different types of Internet crimes. As a result, there are plenty of criminals out there that would have no sympathy for their victims. Unfortunately, there are many places criminals can locate their victims without their knowledge.

Although social networking websites such as Facebook, MySpace and Tweeter have become very popular, these websites have also become the preferred places for criminals to find and hunt new victims. As these sites give criminals the opportunity to stalk, locate, probably pursue their victims and in some cases steal their identities.

Cyberstalking is considered a form of Internet crime that occurs when an individual’s safety, personal life, and freedom are taken away by anonymous methods or covert, then pursued and monitored, causing paranoia and fear. This is done by use of any forms of online, Internet or communication using a computer. Thus, it is performed by a group of individuals or an individual not known to the victim (Bocij, 8).

Cyberstalking is rather a new trend. With the declining price, thus augmented the accessibility of online services and computers, more persons are acquiring computers and accessing the Internet. This eventually increases susceptibility to abuse by Internet criminals such as stalkers (Bocij, 9). It is noteworthy that underage children have also fallen victim of cyberstalking. As a result, the criminals might use the children to commit such crimes on their behalf.

Cyberstalkers meet their victims in electronic mail, online chat sessions, communication board, and debate sites. Also, this crime has acquired many forms such as sending of the obscene or frightening e-mail, abuse in chat rooms, posting offensive messages on communication boards, transfer of electronic viruses, tracing and monitoring of an individual’s Internet activity, and identity theft.

Cyberstalking in children involves exposing them to pornography sites. Hence, Cyberstalking is a horrifying occurrence for victims (Siegel, 448).

Many cyberstalking activities develop into off-line stalking as the stalker can locate the victim. They achieve this by use of the personal information posted on the Internet sites by the victims (Jaishankar, 549). This is because; in most online chat rooms, the victims post their actual details on their profile page.

These include their real names, cellular phone numbers, physical address, and details of their family members. As a result, a victim may receive offensive and excessive phone calls, damage to property, intimidating or pornographic mail, trespass, and physical attack (Jaishankar, 549).

Cyber Stalkers use their technological links to pursue their victims through a variety of ways that are not restricted to; phony claims, obsessive monitoring, bootlegging of the victim’s unique ideas, gathering information for potential assault, soliciting for sexual activities and cracking computer access codes to hack or get IP address (Jaishankar, 549).

It is noteworthy that cyberstalking incidents are on the rise; above all, the victims themselves fan these indecent activities as they keep responding, to the numerous messages and attention they receive from these criminals. Thus, the stalkers develop an interest in the victims thereby continuing to pursue them (Jaishankar, 549).

It is noteworthy that personal information is becoming readily accessible to many people, who use the Internet and other sophisticated technology; thus, state legislators are dealing with the trouble of stalkers who pester and intimidate their victims over the Internet. Stalking laws and other statutes illegalizing stalking deeds presently in effect in many states may by now deal with this crime (Bocij, 163).

States have started to address the use of electronic equipment for stalking purposes by implementing conditions barring such action in both anti-stalking and harassment legislation. Furthermore, few states, such as Arizona, Alabama, Illinois, New York, Connecticut, Hawaii, and New Hampshire have added ban against any form of irritating electronic contact in harassment laws.

Similarly, Oklahoma, Alaska, Wyoming, and lately, California, have included electronically converse messages as demeanor comprising stalking in their laws that fight anti-stalking. However, some states have enacted both laws (Bocij, 163). Similarly, other states have put in place laws that forbid all internet crimes. Thus, identity theft is constituted in these laws.

Recent federal law has established measures to deal with cyberstalking, as well. For example, the act protecting women against the violence that was enacted in 2000 placed cyberstalking as a constituent of federal laws. Similarly, other federal legislation that deals with cyberstalking has been set up lately, but no such actions have yet been endorsed. Consequently, there is a deficiency of legislation at the federal level to address this crime, leaving the bulk of legislative embargo against cyberstalking at the state level (Bocij, 163).

Apart from the laws enacted, there are other methods of preventing cyberstalking. These are the Internet user based solutions and Internet provider based solutions. Internet user based solutions involve Internet users who employ chat rooms to communicate with strangers. Thus, such Internet users should seize from posting their actual details on the profile pages. Above all, information like names, phone number, physical address, and family information should be confidential, thus only given to the people one knows (Pittaro, 2007).

Internet provider based solutions involve Internet users purchasing soft wares from Internet providers. It is notable that these soft wares are used to block redundant electronic contact. It is thus advisable to seek help from the Internet provider. As a result, there exist online agreement policies restricting such misuse of service (Pittaro, 2007).

Victims experience emotional and physical instabilities in life, as well as a mental disturbance. Some of these include fear for one’s safety, anxiety, hyper vigilance, and nightmares. As a result, the victims might consider seeking professional assistance like counseling. Also, family and friends support is needed.

Identity theft is a crime that occurs when one’s details are stolen and used without his consent. As a result, it can be used to commit a crime or steal money from the victim. Personal details are used when individuals want to access certain services.

Thus, with such information, a criminal can steal money from the victims without their knowledge, whereby they can run up their victims existing credit card account (May, 10). It is evident that these activities take place without the victim’s knowledge. At times, these criminals can go as far as wiping out their victim’s bank accounts by authorizing electronic transactions in their victim’s name (May, 10).

The Internet is providing avenues through which these criminals can access an individual’s personal information. Hence, they accomplish this by using online chat sessions and soft wares that crash key loggers on the computer, thus transmitting personal details stored in the computers. Online businesses store clients personal details on their web sites. As a result, such details are easily accessed by criminals.

These Internet criminals may set up a counterfeit organization website to trick the clients into submitting their personal information. Further more, these are information which the legitimate organization already possesses.

Internet identity theft has discouraged individuals from engaging in online monetary transactions as they consider it an unsafe mode of fiscal transaction basing on the recent cases of Internet identity theft (May, 10).

Identity fraud has become rampant in the United States, as a result, in 1998, there was the ratification of the Identity Theft and Assumption Deterrence Act (ITADA) meant to bring justice to the criminals and protection of the victim. More often, Internet identity theft constitutes online transactions, and criminals are always unknown. Thus, tracing of the criminals is tedious but not impossible.

The ITADA considers Internet identity theft as it comes with a 30-year jail sentence. Two states of Wisconsin and California have established a privacy protection office that encourages citizens to seize from engaging in identity theft and help victims recover.

States have enacted laws that deal with identity theft; similarly, in some, identity theft is dealt with in the attorney generals office. Essentially, Identity theft laws are quite new. Thus more amendments are required (May, 13).

Other than the laws enacted to fight identity theft, users must also take care of themselves. As everyone is susceptible to Internet identity theft, the same way, an individual walks along dangerous back streets in town with their wallet. The only difference is that one can not physically see Internet criminals. Thus, the best way to avoid these criminals is for Internet users to apply caution when submitting their details to people and organizations online.

Clients who bank online are advised to employ protection devices that detect any attempts to use their password. Thus, there are banks that offer free downloadable detection devices to clients.

Above all, those who purchase goods online must first confirm the security mark displayed on the screen before submitting their account details. As a result, the use of a debit card is preferred when making online, fiscal transactions. Hence, even when criminals get hold of the information, their expenditure is limited. As a result, they can not put an individual into debt.

It is advisable for individuals to open a different account for transacting online purchases and maintain the other account other functions. This will prevent hackers from accessing details of the other accounts as they are not anywhere on the Internet. Most importantly, one should not engage in online monetary transactions that raise doubts. This is considered the best way to curb Internet criminals (May, 23).

There is no professional and truthful company that will ever ask for clients’ information via an electronic mail. Thus, Individuals are supposed to think before passing over personal details to any company on the Internet (May, 23). After all, the relevant banks or companies already have the details if one uses pay pal. It is recommended that the internet users delete all the cache in their computers. Also, temporary internet files should be deleted, as criminals use them as to getting ways to hack into computers.

Internet users are advised to make sure; they include those people they trust as friends in the online chat rooms. Furthermore, individuals should not leave their computers unattended to or with strangers. As this will make the criminals access their personal information. Above all, Individuals are also advised not to tolerate the criminals in the chat rooms. Also, the Internet connection should always be terminated when not in use as leaving the connection in idle mode will make hackers gain remote access to computers.

Cyberstalking is a crime on the rampage in the United States. Thus, many citizens fall victim, resulting in psychological trauma and fear. On the other hand, identity theft has also taken a new course, with criminals upgrading their means of conducting fraud. As a result, citizens may lose money and acquire debts. Hence, the rising cases of cyberstalking and identity theft have made different states enact laws that fight this crime.

Since the enactment of laws to fight internet crimes, it has been noted that these crimes have reduced significantly. However, there are some criminals who continue to engage in this vise. It is so sad and disappointing as children have also fallen victims of these internet crimes. It is noteworthy that criminals exploit them without their knowledge.

Bocij, Paul. Cyber stalking: harassment in the Internet age and how to protect your family . New York: Greenwood Publishing Group, 2004 Pp 8-177.

Jaishankar, K. International Perspectives on Crime and Justice . London. Cambridge scholars publishing. 2009 Pp 549.

May, Johnny. Johnny May’s Guide to Preventing Identity Theft . Security Resources Unlimited, LLC, 2004 Pp 10-27.

Pittaro, Michael. Cyber stalking : an analysis of online harassment and intimidation . Open access. 2007. Web.

Siegel, Larry. Criminology. California: Cengage Learning, 2008 Pp 448.

  • Chicago (A-D)
  • Chicago (N-B)

IvyPanda. (2022, May 2). Internet Crimes: Cyberstalking. https://ivypanda.com/essays/internet-crimes/

"Internet Crimes: Cyberstalking." IvyPanda , 2 May 2022, ivypanda.com/essays/internet-crimes/.

IvyPanda . (2022) 'Internet Crimes: Cyberstalking'. 2 May.

IvyPanda . 2022. "Internet Crimes: Cyberstalking." May 2, 2022. https://ivypanda.com/essays/internet-crimes/.

1. IvyPanda . "Internet Crimes: Cyberstalking." May 2, 2022. https://ivypanda.com/essays/internet-crimes/.

Bibliography

IvyPanda . "Internet Crimes: Cyberstalking." May 2, 2022. https://ivypanda.com/essays/internet-crimes/.

  • Victimization of Individuals Online: Cyber-Stalking and Prostitution
  • The Effects of Cyber-Bullying and Cyber-Stalking on the Society
  • Cyberstalking and Cyberbullying Laws in Kentucky
  • Ethical Issues Associated with Social Media
  • Cybercrime and Law Enforcement Challenges
  • Social Networking Threats for Children
  • Cyber Law, Cyber Compliance and Information Assurance
  • Bullying and Cyberbullying in Modern Society
  • Psychological Disorders Problem
  • What Is Stalking?
  • American Police Community Relations
  • Criminal Justice Workplace Management
  • Organizational Behavior Concepts in the Criminal Justice
  • Criminology: Critique of the Current Rehabilitation Options
  • Prisons and Jails: Learning the Difference

Talk to our experts

1800-120-456-456

  • Cyber Crime Essay

ffImage

Essay on Cyber Crime

Cyber crime is the most discussed issue of the 21st century. The technology sector world wide is witnessing  a boom in the consumer of smartphones and the internet which is raising concerns with regard to the privacy and security of the users. Owing to this reason, it is highly essential for all the users to know about cyber crime  & security.  As a result, thi topic has become the most favorite topic of the examiner and can often be seen asked in the exams.  In this view, students must have information on cyber crime and stay prepared to tackle such topics in the essay question in the English paper.

Introduction

Cybercrime is a dangerous attack a company or an individual may face. There are many cases where the cyber attack has brought massive loss to the company and individuals due to the data hack. We live in a technology-driven era, and every piece of information is now fed on computers. Cybercrime involves an attack on computers and digital devices. These cyber-attacks can prove hazardous not just for the organization, but also for the nation. To date, there are many digital attack cases in India and global, pushing for more security measures. These attacks are also affecting the economy of the country if not controlled in the initial stage.

What is Cybercrime?

Cybercrime or attack is defined as the systematic criminal activity occurring digitally

and done by attackers. There are many examples of cybercrime, including fraud,

malware viruses, cyberstalking and others. Due to these, government agencies and

companies are investing more in the maintenance and hiring of cybercrime experts. 

Earlier, cybercrime was committed only by individuals or by small groups. However, now a highly complex cybercriminals network work on attacking the system for data

collection.

Three groups of cybercrimes-

This is the form of cyberstalking, trafficking, and grooming. Over the years, this

This type of cybercrime has been taken seriously by law enforcement agencies. It is

now keeping a track over every such attack on an individual.

Similar to the real world where criminals steal the property, in the cyber world,

attackers steal data. Here, the attacker steals a person's bank details and

misuse the credit card for online purchase. By using malicious software, the

attacker attacks the property to disrupt the system of the organization.

These types of crimes are denoted as cyber terrorism. This can be a terror because

the attacker can get hold of essential documents related to government

projects. An enemy nation or terrorist usually makes such attacks. There are

many cases globally where a terrorist hacks government data.

Apart from these, there is a financial crime where the hacker steals the money of the

user account holder. Moreover, they steal company data and finance.

In this type, the computer system of the person is hacked to get personal

information. In many countries, including India, hacking is a punishable act.

It is quite different from ethical hacking. In normal hacking, illegal use

different types of software to enter the system of the target person. Hacker is

then able to monitor every activity done by the person.

This Cybercrime is about violating copyright and downloading music or movies. In

India, many movies before their releases are leaked on the movie download

sites. In other words , theft is also called privacy, which can bring a huge

loss to the organization.

Cyber Stalking

It is online harassment by an individual or a group of people. Normally, these

stalkers target an individual and harass online. There are many cases of

cyberstalking in India, resulting in the target person ending up taking

Malicious Software

These are computer-based cybercrimes where virus-based software is installed in the

target people or organization computers. This is to damage the system and

corrupt the data of the target.

Laws Related to Cybercrime

In India, there are many cybercrime laws enacted to stop this threat. Be it for

the individual or the organization; these laws help to either bring down the

number of cases or eliminate these digital crimes.

Apart from these laws, as an individual, you also need to take steps to stop these

crimes. Like, not providing your login details, installing trust anti-virus

software and keeping your online profile private can help to act against such

Cybercrime is a significant threat that can bring huge loss to the individual and the

organization. It is essential to follow basic online rules to ensure the safety

of self and the organization.

Benefits of Cyber Crime Essay in English provided by Vedantu

The essay on cybercrime provided by Vedantu is prepared by highly qualified teachers which makes it a reliable source of information. This information could be utilized for a variety of reasons. Being a reliable piece of information the essay will benefit everyone curious to know about the topic.

Following are the highlights of its benefits:

Reliable information 

Adaptive to the context 

Precise language

Fulfills the requirements of the students for english exam questions 

Comprehensive and analytical. The  article digs in the depth of the issue and analyzes it through a 360 degree perspective.

The essay could also be used by the students for preparing themselves for the essay question in the English paper. This essay is an excellent guide to understand what the examiner is looking for in the exam. Moreover, the topic of cybercrime is quite a recurrent one in the exam. So the students use this essay to deal with the same topic.

The Essay on Cyber Crime is an excellent guide on averting any possibilities of a cyber attack. On today's date, one is mostly on the internet for a variety of reasons. It becomes essential for one to know important tips that can keep one safe from cyberbullies, thieves, or blackmailers. It is also important for one to understand the right course of actions to be taken in an eventuality of such an incident.

Download the cybercrime essay for students in English on the Vedantu website.

arrow-right

FAQs on Cyber Crime Essay

1. How Does Cybercrime Work?

Group of people or an individual commits most of these cyber-crimes. These criminals use a systematic process to hack and commit these acts. These criminal communities share strategies and tools to launch attacks. Some of the cybercrime techniques

Fast Flux - In this method, the hacker moves data quickly among computers in a botnet, making it challenging to find the right source.

Social Engineering - This method includes using lies and manipulation to trick people into revealing their personal information.

Skimmers - This involves installing a skimming tool in an ATM and stealing the information. You may find such skimming devices in ATMs.

There are some digital criminals targeting organizations to steal personal information.

2. How Cybercrime Affects Society?

Cybercrime can hugely affect society. In 2018, the US faced a loss of $600 billion. As consumers are increasingly allowing technologies to get into their lives, cyber attackers are getting better access. Some of the essential information available are-

Personal health data, sleep schedules, and geo-locations Shopping history, account information, and passive conversations noticed voice-controlled devices, Private conversations on social media accounts.

Your entire life is now available on social media, making it vulnerable to hack or cyber-attack. Attackers use different techniques including- installing malware, virus, phishing, cyberstalking, etc. These can certainly bring loss of lives and data for individuals and organizations. For society, this is a significant loss in the long run.  One needs to be very careful when presenting himself socially.

3. How to stay secure in times of cybercrime?

Cybercrime is a real threat posing to society. It is the 21st-century version of theft and blackmailing. There are certain ways one should adopt to prevent any possibilities of cybercrime. Do not disclose the banking details to random people or fill the CVV of your debit or credit cards on an unknown and unverified website. Keep your passwords always discrete. The camera of the laptop should always be covered.

4. Where can I get a cybercrime essay?

One can find a good quality cyber crime essay on Vedantu's website. The essay which is prepared by the expert teachers describes everything that one needs to know about cybercrime. It is the one-stop solution for all your requirements on the topic. Their essay is available in PDF format on the website and could be downloaded on any device. One downloaded essay could be used in offline mode too. If one finds it feasible, the printout of the PDF could also be taken out.

U.S. flag

An official website of the United States government, Department of Justice.

Here's how you know

Official websites use .gov A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS A lock ( Lock A locked padlock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NCJRS Virtual Library

Cyber stalking: an analysis of online harassment and intimidation, additional details, availability, related topics.

Advertisement

Advertisement

A Systematic Review of Cyberstalking Victimization and Offending Behaviors

  • Published: 10 November 2021
  • Volume 46 , pages 882–910, ( 2021 )

Cite this article

  • Catherine D. Marcum 1 &
  • George E. Higgins 2  

1633 Accesses

8 Citations

Explore all metrics

A systematic review of literature investigating cyberstalking offending and victimization was conducted, considering multiple key words and phrases used to label the behavior: cyberstalking, cyber dating abuse, cybervictimization, Internet, interpersonal electronic surveillance, and victimization. The following electronic databases, with the indication of peer-reviewed journal articles as a requirement, were searched: Academic Search Complete, Criminal Justice Database (ProQuest), Google, JSTOR and PsychInfo. After sorting through the studies using the inclusion and exclusion criteria, 31 studies remained for review. Correlates of the behaviors were discussed for each categorization, with main themes including negative characteristics of relationship behaviors, and social media and online use as main predictors of victimization and offending. There is a strong need for further research utilizing older age groups and individuals who are married, as well as a need for longitudinal research.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price includes VAT (Russian Federation)

Instant access to the full article PDF.

Rent this article via DeepDyve

Institutional subscriptions

Similar content being viewed by others

cyber stalking introduction essay

Cyberstalking: Prevalence, Characteristics, and Impact

cyber stalking introduction essay

  • Cyberstalking

cyber stalking introduction essay

The criminology/criminal justice journals included the following: American Journal of Criminal Justice, Crime & Delinquency, Deviant Behavior, European Journal of Criminal Policy and Research, International Journal of Cyber Criminology, Journal of Interpersonal Violence, SAGE Open, Victims & Offenders, Violence & Victims, and Youth & Society.

The psychology journals included the following: Current Psychology, Cyberpsychology, Behavior & Social Networking, Journal of Family Issues, Journal of Family Violence, Journal of Social & Personal Relationships, Journal of Youth and Adolescence, Personality and Individual Differences, Psychological Reports: Relationships & Communications, Psychology, Crime & Law, The American Journal of Family Violence, and Violence Against Women.

The communication/computer science journals included the following: Computers in Human Behavior, Social Science Computer Review and Surveillance and Society.

The medical journals included the following: The Journal of School Nursing.

As techniques of offending rapidly change in the field of cybercrime based on technological adaptations, the authors felt as if inclusion of research published within the past 10 years would have the most contemporary and accurate findings of predictors of the behavior.

Ahlgrim, B. & Terrance, C. (2021). Perceptions of cyberstalking: Impact of perpetrator gender and cyberstalker/victim relationships. Journal of Interpersonal Violence, 36(7–8) .

Bennet, D., Guran, E., Ramos, M., & Margolin, G. (2011). College students’ electronic victimization in friendships and dating relationships: Anticipated distress and associations with risky behaviors. Violence and Victims, 4 , 410–429.

Article   Google Scholar  

Bocij, P., & McFarlane, L. (2003). Cyberstalking: The technology of hate. The Police Journal, 76 , 204–221.

Borrajo, E., Gamez-Guadix, M., & Calvete, E. (2015). Cyber dating abuse: Prevalence, context, and relationship with offline dating aggression. Psychological Reports, 116 (2), 565–585. https://doi.org/10.2466/21.16.PR0.116k22w4

Brem, M. J., Stuart, G. L., Cornelius, T. L., & Shorey, R. C. (2019a). A longitudinal examination of alcohol problems and cyber, psychological, and physical dating abuse: The moderating role of emotion dysregulation. Journal of Interpersonal Violence , 1-21. https://doi.org/10.1177/0886260519876029

Brem, M. J., Romero, G., Garner, A. R., Grigorian, H., & Stuart, G. L. (2019b). Alcohol problems, jealousy, and cyber dating abuse perpetration among men and women: Toward a conceptual model. Journal of Interpersonal Violence , 1-24. https://doi.org/10.1177/0886260519873333

Burke, S., Wallen, M., Vail-Smith, K., & Knox, D. (2011). Using technology to control intimate partners: An exploratory study of college undergraduates. Computers in Human Behavior, 27 , 1162–1167.

Cava, M. J., Martínez-Ferrer, B., Buelga, S., & Carrascosa, L. (2020). Sexist attitudes, romantic myths, and offline dating violence as predictors of cyber dating violence perpetration in adolescents. Computers in Human Behavior., 111 , 1–11. https://doi.org/10.1016/j.chb.2020.106449

Cavezza, C. & McEwan, T. (2014). Cyberstalking versus off-linestalking in a forensic sample. Psychology, Crime & Law, 20 (10), 2–16.

Curry, T., & Zavala, E. (2020). A multi-theoretical perspective on cyber dating abuse victimization and perpetration within intimate relationships: A test of general strain, social learning, and self-control theories. Victims and Offenders, 15 (4), 1–21. https://doi.org/10.1080/15564886.2020.1734996

Deans, H., & Bhogal, M. S. (2019). Perpetrating cyber dating abuse: A brief report on the role of aggression, romantic jealousy and gender. Current Psychology, 38 , 1077–1082. https://doi.org/10.1007/s12144-017-9715-4

DeKeseredy, W. S., Schwartz, M. D., Harris, B., Woodlock, D., Nolan, J., & Hall-Sanchez, A. (2019). Technology-facilitated stalking and unwanted sexual messages/images in a college campus community: The role of negative peer support. SAGE Open , 1-12. https://doi.org/10.1177/2158244019828231

Duerksen, K. N., & Woodin, E. M. (2019). Cyber dating abuse victimization: Links with psychosocial functioning. Journal of Interpersonal Violence , 1-29. https://doi.org/10.1177/0886260519872982

Elphinston, R. & Noller, P. (2011) Time to face it! Facebook intrusion and implication for romantic jealousy and relationship satisfaction. Cyberpsychology, Behavior & Social Networking, 17, 3–7.

Fissel, E. (2021). Victims’ perceptions of cyberstalking: An examination of perceived offender motivation. American Journal of Criminal Justice . https://doi.org/10.1007/s12103-021-09607-x

Fissel, E., Fisher, N., & Nedelec, J. (2021). Cyberstalking perpetration among young adults: An assessment of the effects of low self-control and moral disengagement. Crime & Delinquency, 1–27.

Fissel, E., Graham, A., Butler, L., & Fisher, B. (2021). A new frontier: The development and validation of the intimate partner cyber abuse instruments. Social Science Computer Review, 1–20.

Fissel, E. R., & Reyns, B. W. (2020). The aftermath of cyberstalking: School, work, social, and health costs of victimization. American Journal of Criminal Justice, 45 (1), 70–87.

Fox, J., Osborn, J., & Warber, K. (2014). Relational dialectics and social networking sites: The role of Facebook in romantic relationship escalation, maintenance, conflict and dissolution. Computers in Human Behavior, 35 , 527–534. https://doi.org/10.1016/j.chb.2014.02.031

Henson, B., Reyns, B., & Fisher, B. (2013). Fear of crime online? Examining the effect of risk, previous victimization and exposure on fear of online interpersonal victimization. Journal of Contemporary Criminal Justice, 29 (4), 475–497.

Hernández-Santaolalla, V., & Hermida, A. (2020). Malicious social surveillance and negative implications in romantic relationships among undergraduates. Surveillance and Society, 18 (3), 387–399. https://doi.org/10.24908/ss.v18i3.13149

Hertlein, K. M., & van Dyck, L. E. (2020). Predicting engagement in electronic surveillance in romantic relationships. Cybersecurity, Behavior, and Social Networking, 23 (9), 604–610. https://doi.org/10.1089/cyber.2019.0424

Hinduja, S. & Patchin, J. (2011). Electronic dating violence: A brief for educators and parents. Cyberbullying Research Center. Retrieved January 15, 2020 from http: www.cyberbullying.us

Kellerman, I., Margolin, G., Borofsky, L., Baucom, B., & Iturralde, E. (2013). Electronic aggression among emerging adults: Motivations and contextual factors. Emerging Adulthood, 1 (4), 293–304.

Kircaburuna, K., Jonason, P. K., & Griffiths, M. D. (2020). The dark tetrad traits and problematic social media use: The mediating role of cyberbullying and cyberstalking. Personality and Individual Differences, 135 , 264–269. https://doi.org/10.1016/j.paid.2018.07.034

Lancaster, M., Seibert, G. S., Cooper, A. N., May, R. W., & Fincham, F. (2020). Relationship quality in the context of cyber dating abuse: The role of attachment. Journal of Family Issues, 41 (6), 739–758. https://doi.org/10.1177/0192513X19881674

Lara, L. (2020). Cyber dating abuse: Assessment, prevalence, and relationship with offline violence in young Chileans. Journal of Personal and Social Relationships, 37 (5), 1681–1699.

Lyndon, A., Bonds-Raacke, J., & Cratty, A. (2011). College students’ Facebook stalking of ex-partners. Cyberpsychology, Behavior, and Social Networking, 13 , 263–268.

Google Scholar  

Marcha, E., Litten, V., Sullivan, D. H., & Ward, L. (2020). Somebody that I (used to) know: Gender and dimensions of dark personality traits as predictors of intimate partner cyberstalking. Personality and Individual Differences, 163 , 1–6. https://doi.org/10.1016/j.paid.2020.110084

Marcum, C. D., Higgins, G. E., & Nicholson, J. (2017). I’m watching you: Cyberstalking behaviors of university students in romantic relationships. American Journal of Criminal Justice., 42 , 373–388. https://doi.org/10.1007/s12103-016-9358-2

Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2014). Juveniles and cyber stalking in the United States: An analysis of theoretical predictors of patterns of online perpetration. International Journal of Cyber Criminology, 8 (1), 47–57. http://www.cybercrimejournal.com/marcumetalijcc2014vol8issue1.pdf

Marcum, C. D., Higgins, G. E., & Nicholson, J. (2018). Crossing boundaries online in romantic relationships: An exploratory study of the perceptions of impact on partners by cyberstalking offenders. Deviant Behavior, 39 (6), 716–731. https://doi.org/10.1080/01639625.2017.1304801

Marshall, T. (2012). Facebook surveillance of former romantic partners: Associations with post breakup recovery and personal growth. Cyberpsychology, Behavior, & Social Networking, 15 , 521–526.

Mosley, M. & Lancaster, M. (2019). Affection and abuse: Technology use in adolescent romantic relationships. American Journal of Family Therapy, 47 (11), 1–15.

Navarro, J. N., Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2016). Addicted to the thrill of the virtual hunt: Examining the effects of internet addiction on the cyberstalking behaviors of juveniles. Deviant Behavior, 37 (8), 893–903. https://doi.org/10.1080/01639625.2016.1153366

Nobles, M., Reyns, B., Fox, K., & Fisher, B. (2014). Protection against pursuit: A conceptual and empirical comparison of cyberstalking and stalking victimization among a national sample. Justice Quarterly, 31 (6), 986–1014.

Novo, F., Pereira, F., & Matos, M. (2014). Cyber-aggression among Portuguese adolescents: A study on perpetration, victim offender overlap and parental supervision. International Journal of Cyber Criminology, 8 (2), 94–110.

Pereira, F., & Matos, M. (2016). Cyber-stalking victimization: What predicts fear among Portuguese adolescents? European Journal of Criminal Policy and Research, 22 , 253–270.

Peskin, M. F., Markham, C. M., Shegog, R., Temple, J. R., Baumler, E. R., Addy, R. C., Hernandez, B., Cuccaro, P., Gabay, E. K., Thiel, M., & Emery, S. T. (2017). Prevalence and correlates of the perpetration of cyber dating abuse among early adolescents. Journal of Youth and Adolescence, 46 , 358–375. https://doi.org/10.1007/s10964-016-0568-1

Prospero, M. (2007). Mental health symptoms among male victims of partner violence. American Journal of Men’s Health, 1 (4), 269–277. https://doi.org/10.1177/1557988306297794

Reyns, B. (2019). Online pursuit in the twilight zone: Cyberstalking perpetration by college students. Victims & Offenders, 14 , 183–195.

Reyns, B. W., Fisher, B. S., & Randa, R. (2018). Explaining cyberstalking victimization against college women using a multitheoretical approach: Self-control, opportunity, and control balance. Crime & Delinquency, 64 (13), 1724–1764. https://doi.org/10.1177/0011128717753116

Reyns, B. W., Henson, B., & Fisher, B. S. (2012). Stalking in the Twilight Zone: Extent of cyberstalking victimization and offending among college students. Deviant Behavior, 33 (1), 1–25.

Reyns, B. W., Henson, B., & Fisher, B. S. (2016). Guardians of the cyber galaxy: An empirical and theoretical analysis of the guardianship concept from Routine Activity Theory as it applies to online forms of victimization. Journal of Contemporary Criminal Justice, 32 (2), 148–168.

Shorey, R., Febres, J., Brasfield, H., & Stuart, G. (2012). Male dating violence victimization and adjustment the moderating role of coping. American Journal of Men’s Health, 6 (3), 218–228. https://doi.org/10.1177/1557988311429194

Shorey, R., Sherman, A., Kivisto, A., Elkins, S., Rhatigan, D., & Moore, T. (2011). Gender differences in depression and anxiety among victims of intimate partner violence: The moderating effect of shame-proneness. Journal of Interpersonal Violence, 26 , 1834–1850. https://doi.org/10.1177/0886260510372949

Stonard, K. E. (2020). “Technology was designed for this”: Adolescents’ perceptions of the role and impact of the use of technology in cyber dating violence. Computers in Human Behavior, 105 , 1–14. https://doi.org/10.1016/j.chb.2019.106211

Strawhun, J., Adams, N., & Huss, M. T. (2013). The assessment of cyberstalking: An expanded examination including social networking, attachment, jealousy, and anger in relation to violence and abuse. Violence and Victims, 28 (4), 715–730. https://doi.org/10.1891/0886-6708.11-00145

Temple, J. R., Choi, H. J., Brem, M., Wolford-Clevenger, C., Stuart, G. L., Peskin, M. F., & Elmquist, J. (2016). The temporal association between traditional and cyber dating abuse among adolescents. Journal of Youth and Adolescence, 45 , 340–349. https://doi.org/10.1007/s10964-015-0380-3

Tokunaga, R. S. (2011). Social networking site or social surveillance site? Understanding the use of interpersonal electronic surveillance in romantic relationships. Computers in Human Behavior, 27 (2), 705–713. https://doi.org/10.1016/j.chb.2010.08.014

Tokunaga, R. S. (2015). Interpersonal surveillance over social network sites: Applying a theory of negative relational maintenance and the investment model. Journal of Social and Personal Relationships, 33 (2), 171–190. https://doi.org/10.1177/0265407514568749

Tokunaga, R., & Gustafson, A. (2014). Seeking interpersonal information over the Internet: An application of the theory of motivated information management to Internet use. Journal of Social & Personal Relationships, 31 , 1019–1039.

Toplu-Demirtas, E., Akcabozan-Kayabol, N. B., Araci-Iyiaydin, A., & Fincham, F. D. (2020). Unraveling the roles of distrust, suspicion of infidelity, and jealousy in cyber dating abuse perpetration: An attachment theory perspective. Journal of Interpersonal Violence, 1-31. https://doi.org/10.1177/0886260520927505

Van Baak, C., & Hayes, B. E. (2018). Correlates of cyberstalking victimization and perpetration among college students. Violence and Victims, 33 (6), 1036–1054. https://doi.org/10.1891/0886-6708.VV-D-17-00073

Van Ouytsel, J., Ponnet, K., & Walrave, M. (2018). Cyber dating abuse victimization among secondary school students from a lifestyle-routine activities theory perspective. Journal of Interpersonal Violence, 33 (17), 2767–2776. https://doi.org/10.1177/0886260516629390

Van Ouytsel, J., Ponnet, K., & Walrave, M. (2020). Cyber dating abuse: Investigating digital monitoring behaviors among adolescents from a social learning perspective. Journal of Interpersonal Violence, 35 (23–24), 1557–5178. https://doi.org/10.1177/0886260517719538

Van Ouytsel, J., Torres, E., Choi, H. J., Ponnet, K., Walrave, M., & Temple, J. R. (2017). The associations between substance use, sexual behaviors, bullying, deviant behaviors, health, and cyber dating abuse perpetration. The Journal of School Nursing, 33 (2), 116–122. https://doi.org/10.1177/1059840516683229

Zweig, J. M., Dank, M., Yahner, J., & Lachman, P. (2013). The rate of cyber dating abuse among teens and how it relates to other forms of teen dating violence. Journal of Youth and Adolescence, 42 , 1063–1077. https://doi.org/10.1007/s10964-013-9922-8

Zweig, J. M., Dank, M., Yahner, J., & Lachman, P. (2014). Correlates of cyber dating abuse among teens. Journal of Youth and Adolescence, 43 , 1306–1321. https://doi.org/10.1007/s10964-013-0047-x

Download references

Author information

Authors and affiliations.

Department of Government and Justice Studies, Appalachian State University, PO Box 32107, Boone, NC, 28608, USA

Catherine D. Marcum

Department of Administration of Justice, University of Louisville, 2301 South 3rd Street, 208 Brigman Hall, Louisville, KY, 40292, USA

George E. Higgins

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Catherine D. Marcum .

Additional information

Publisher's note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Marcum, C.D., Higgins, G.E. A Systematic Review of Cyberstalking Victimization and Offending Behaviors. Am J Crim Just 46 , 882–910 (2021). https://doi.org/10.1007/s12103-021-09653-6

Download citation

Received : 12 December 2020

Accepted : 19 June 2021

Published : 10 November 2021

Issue Date : December 2021

DOI : https://doi.org/10.1007/s12103-021-09653-6

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Victimization
  • Find a journal
  • Publish with us
  • Track your research

Home — Essay Samples — Social Issues — Cyber Bullying — Cyber Bullying Essay Introduction

test_template

Cyber Bullying Essay Introduction

  • Categories: Cyber Bullying

About this sample

close

Words: 557 |

Published: Mar 5, 2024

Words: 557 | Page: 1 | 3 min read

Image of Dr. Oliver Johnson

Cite this Essay

Let us write you an essay from scratch

  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours

Get high-quality help

author

Dr. Heisenberg

Verified writer

  • Expert in: Social Issues

writer

+ 120 experts online

By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy . We’ll occasionally send you promo and account related email

No need to pay just yet!

Related Essays

1 pages / 569 words

3 pages / 1482 words

3 pages / 1297 words

3 pages / 1286 words

Remember! This is just a sample.

You can get your custom paper by one of our expert writers.

121 writers online

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

Related Essays on Cyber Bullying

Cyberbullying has become a prevalent issue in today's society, with the rise of technology and social media platforms. This essay will explore the history of cyberbullying, the debates surrounding this topic, and how these [...]

The issue of police brutality and racism has been a longstanding and contentious one in the United States. The tragic deaths of numerous black individuals at the hands of law enforcement officers have sparked protests and calls [...]

Bullying is a serious issue that affects individuals of all ages, backgrounds, and walks of life. It can have long-lasting negative effects on the mental and emotional well-being of those who experience it. In this essay, we [...]

The usage of data and communication technology has not just carried points of interest to humankind. The rise and emergence of cyberbullying in schools has become a huge problem. Affecting all things considered, instructors and [...]

While current school-based anti-cyberbullying programs have made significant strides in raising awareness and encouraging reporting, there is room for improvement. By incorporating comprehensive social and emotional learning, [...]

The psychology of cyberbullies is a multifaceted issue that demands a comprehensive understanding of motives and psychological profiles. By exploring the power dynamics, motives, and psychological characteristics underlying [...]

Related Topics

By clicking “Send”, you agree to our Terms of service and Privacy statement . We will occasionally send you account related emails.

Where do you want us to send this sample?

By clicking “Continue”, you agree to our terms of service and privacy policy.

Be careful. This essay is not unique

This essay was donated by a student and is likely to have been used and submitted before

Download this Sample

Free samples may contain mistakes and not unique parts

Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

Please check your inbox.

We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

Get Your Personalized Essay in 3 Hours or Less!

We use cookies to personalyze your web-site experience. By continuing we’ll assume you board with our cookie policy .

  • Instructions Followed To The Letter
  • Deadlines Met At Every Stage
  • Unique And Plagiarism Free

cyber stalking introduction essay

  • My Shodhganga
  • Receive email updates
  • Edit Profile

Shodhganga : a reservoir of Indian theses @ INFLIBNET

  • Shodhganga@INFLIBNET
  • K.R. Mangalam University, Gurgaon
  • Department of Legal Studies

Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Shodhganga

IMAGES

  1. Cyber Stalking and Cyber Security Free Essay Example

    cyber stalking introduction essay

  2. Cyber-Stalking Essay Example

    cyber stalking introduction essay

  3. Cyber Stalking Infographic

    cyber stalking introduction essay

  4. Cyber Stalking Infographic

    cyber stalking introduction essay

  5. Cyberstalking: Know the signs and protect yourself

    cyber stalking introduction essay

  6. Cyberbullying essay sample (400 Words)

    cyber stalking introduction essay

COMMENTS

  1. Cyberstalking: Definition, Signs, Examples, and Prevention

    Cyberstalking: Definition, Signs, Examples, and Prevention. Cyberstalking refers to the use of the internet and other technologies to harass or stalk another person online, and is potentially a crime in the United States. This online harassment, which is an extension of cyberbullying and in-person stalking, can take the form of e-mails, text ...

  2. A systematic literature review on cyberstalking. An analysis of past

    Appropriate keywords for this SLR were identified by executing a preliminary search on Google Scholar for the keyword "cyberstalking." The first 50 search results, sorted based on relevance, were reviewed, and the variant terms "Internet stalking," "online stalking," "cyberstalking" and "cyber-stalking" were also found.

  3. Cyberstalking: Prevalence, Characteristics, and Impact

    When defining cyberstalking, a prominent debate in the literature is its association with or distinction from stalking (Kaur et al., 2021; Reyns & Fissel, 2020; Sheridan & Grant, 2007).Specifically, there is contention as to whether cyberstalking is independent from stalking, whether it is related to stalking or whether cyberstalking is simply a form of stalking (Nobles et al., 2014).

  4. Cyber Stalking and Its Effect on People

    Introduction. To harass a group, individual, or an organization by the use of computers or other electronic devices is called cyber stalking. Cyber stalking is creating the same victim experiences to individuals both offline and online, thus making it illegal in 14 states in 1999.

  5. PDF A Systematic Review of Cyberstalking Victimization and Offending Behaviors

    A systematic review of literature investigating cyberstalking ofending and victimi-zation was conducted, considering multiple key words and phrases used to label the behavior: cyberstalking, cyber dating abuse, cybervictimization, Internet, interper-sonal electronic surveillance, and victimization.

  6. PDF Behind the Screens: an Analysis on Cyberstalking Teresa Nguyen

    Introduction Stalking has become a prominent threat in the modern era. More recently, with the rise of social media, a new form of stalking, cyberstalking, has come into play as individuals develop their online presence. Cyberstalking can be defined as "the use of electronic communication to

  7. Stalking

    Stalking - Cyberstalking: The explosive growth of social media in the early 21st century resulted in the creation of a new frontier in stalking behaviour. As social interaction increasingly took place in the digital world, traditional definitions of stalking failed to keep pace with the advance of technology. In addition, services such as text messaging, instant messaging, and e-mail provided ...

  8. (PDF) A systematic literature review on cyberstalking ...

    stalking perpetrated by female ex-intimate partners (Fissel and Reyns, 2019 ), as such females may be more mentally unstable than a stranger ( Ahlgrim and Terrance, 2018 ).

  9. Cyberstalking

    Stalking. The first anti-stalking law was passed in the USA in California in 1990, and by the turn of the century, all 50 states as well as the federal government had criminalized stalking (Tjaden 2009).While it is now widely accepted that stalking is a criminal offense, there remain some misconceptions regarding what stalking actually entails, as legal statutes vary across states.

  10. Defining Objectives for Preventing Cyberstalking

    The paper is organized into five sections: introduction, literature pertinent to cyberstalking, the theoretical and methodological aspects of this research, the fundamental and means objectives for minimizing cyberstalking and finally in the limitations and future research directions. ... A study that analyzes cyber stalking crimes, legislative ...

  11. Cyber Stalking as a Form of Cybercrime

    Introduction. Cyber law in general refers to a law that regulates how people use the Internet. It applies to people using the Internet, World Wide Web and related technologies. ... Analysis Of The Four Types Of Cyber-stalking Essay. Cyber-Stalking is becoming a larger issue with the drive of social networking and "is a form of repeated ...

  12. Prevention of Cyberstalking: A Review of the Literature

    Prevention Strategies. A review of 12 research articles found information on cyberstalking prevention strategies. These strategies included information about victim internet usage, victimization research and education, legal policies, and enforcement practices. The first step to prevention is often education.

  13. Internet Crimes: Cyberstalking

    Cyberstalking. Cyberstalking is considered a form of Internet crime that occurs when an individual's safety, personal life, and freedom are taken away by anonymous methods or covert, then pursued and monitored, causing paranoia and fear. This is done by use of any forms of online, Internet or communication using a computer.

  14. What is Cyberstalking? A Review of Measurements

    She has been researching and publishing on stalking since 1997 and provides input on the assessment and management of stalking cases to the police, public figures, and government agencies. David Garratt-Reed , is a clinical psychologist and senior lecturer in the School of Psychology at Curtin University.

  15. Cyber stalking: An Analysis of Online Harassment and Intimidation

    The term cyber. stalking generally refers to the use of th e Internet, email, or other electronic. communication device to create a criminal le vel of intimidation, harassment, and fear in. one or ...

  16. Understanding the Impact of Stalking: [Essay Example], 1627 words

    Celebrity stalking is an example of this category. (Knowll & Resnick, 2007) Erotomania is a delusional disorder when the predator does not know the victim personally or has had little contact with them previously. They tend to be obsessive, excessive, unwanted or have delusional love (Howitt, 2009). Resentful Stalkers aim is to distress and ...

  17. Cyber Crime Essay

    Essay on Cyber Crime. Cyber crime is the most discussed issue of the 21st century. The technology sector world wide is witnessing a boom in the consumer of smartphones and the internet which is raising concerns with regard to the privacy and security of the users. Owing to this reason, it is highly essential for all the users to know about ...

  18. Cyber stalking: An Analysis of Online Harassment and Intimidation

    Part I of the paper compares online stalking with traditional offline stalking, noting that to some extent cyber stalking is an extension of traditional stalking, with the distinction being that the stalker uses the Internet as a tool for harassing, threatening, and fear-inducing textual and image communications. Further, both cyber stalkers ...

  19. A Systematic Review of Cyberstalking Victimization and Offending

    A systematic review of literature investigating cyberstalking offending and victimization was conducted, considering multiple key words and phrases used to label the behavior: cyberstalking, cyber dating abuse, cybervictimization, Internet, interpersonal electronic surveillance, and victimization. The following electronic databases, with the indication of peer-reviewed journal articles as a ...

  20. Social Sciences

    Using a sample of 376 young adults (18- to 25-year-olds) who had been cyberstalked in the previous 12 months, the current study attempts to (1) understand the self-identified reasons behind cyberstalking victims' choice to not report their experiences to law enforcement and (2) determine if there are gender or racial differences associated with the reasons for not reporting.

  21. Cyber-Stalking and Online Harassment: Internet Impact: Free Essay

    The offence of Cyber-Stalking involves the usage of means of electronic nature which includes the internet in order to stalk a person or harass a person or a group of individuals. It includes many acts such as threats, accosting someone for sex, false accusations, defamation, slander, libel, identity theft, and vandalism.

  22. Cyber Bullying Essay Introduction

    Cyber Bullying Essay Introduction. Cyberbullying is a growing concern in today's digital age, with the rise of social media and online communication platforms. This essay will explore the history and debates surrounding cyberbullying, discuss the development of the topic, and ultimately come to a resolution on how to address this issue effectively.

  23. Shodhganga@INFLIBNET: A Comparative Analysis of Cyber Stalking in

    A relatively modern form newlineof cybercrime is cyber stalking. newlineThe study focuses about the meaning, nature, typology and history of cyber newlinestalking.. This thesis compares the law relating to cyber stalking in India with newlinedifferent foreign countries. This thesis also discussed about the reported cases of newlinecyber ...