Wednesday, December 11, 2019

Cyberstalking Essay Example For Students

Cyberstalking Essay CYBERSTALKINGThe World Wide Web and Internet are great places to study, work, or even play. But there is an ugly side of cyberspace. Cyberspace reflects the real world and some people tend to forget that. Cyberstalking and harassment are problems that a large number of people (especially women) are realizing. (Jenson, 1996, p.1)Just because an individual owns a computer and has an Internet account do not assume that person is considerate or respectful. There are just as many stalkers in cyberspace as anywhere else. It’s just that their methods have changed. Some stalkers might harass you by following you through live channels not being able to take no for an answer and bothering you with email messages. In some cases this harassment may become a systematic campaign against you; where your harasser bombards you with threatening messages of hate and obscenities. (1996, p.3) The stalker may even trace your home address and telephone number, causing not only emotional distress but possibly physical danger. It should come as no surprise to you that the stalkers are making use of this technology to harass people and prey on the innocent. There have been many examples of cyberstalking crossing over in to real life stalking. And those users who have been victims of cyberstalking, tell a similar story, that no one took the harassment serious until it became real life stalking. Cyberstalking can be a devastating experience for a person online. But in cyberspace people say things like â€Å"well just turn off your computer† and â€Å" you can’t be hurt on the Internet, it’s just words†. (Laughren, 1998, p.1) The online stalking is just as frightening and distressing as off-line stalking, and just as illegal. Anyone can be stalked online, but statistics show that the majority of victims are women. Women are the minority of the internet population, which means their attention is generally fierce competition between male users. (Jenson, 1996, p.3) Cyberstalking and online harassment are easy to practice than real life stalking. In cyberspace, a stalker can harass their victim without ever having to leave the comfort of their own home, or have any witnesses to the crime. Online users are vulnerable to stalking in the following three areas. Live chat rooms or IRC, this is the most common place for cyberstaking. Message boards and Newsgroups, and Email box; a user has the ability to write anything and even attach files to the email. Another common area regarding cyberstalking is at the â€Å"edu† sites, which are educational institutes, such as colleges and universities. One user might know another user personally and interacts on the internet anonymously starting the cybertalk. One student can enter the internet as easily as another student, therefor not letting his or her true identity be known. If you are being harassed online by a cyberstalker, the chances are you are not the first person they have stalked. Cyberstakers, like other predators, are opportunists. They know what they are looking for and know how to get it. Stalking is a power crime, the stalker has the power to make you suffer and enjoys that power. (Laughren, 1998, p.4) A stalk er’s self-esteem rises when they attack your self-esteem. The more pain and suffering they can cause, the better they feel about themselves. The best protection against becoming a target of stalking is not to reveal anything personal that you might have in common. Often, stalkers are mentally unstable, paranoid, delusional, and extremely jealous, and have extremely low self-esteem. Stalking is a form of obsession. The difference between a normal cyber harasser and a cyberstalker, is the harasser moves on to others and forgets you and a stalker will come back to stalk you another day. (Jenson, 1996, p.5) The Internet enables the stalker, his powers, in most cases, merely knowledge of the technology is all that’s required to stalk another person online. Note that educated, smooth talking, responsible people can also be stalkers, appearing to be a perfect gentlemen or lady with perfect manners. A major clue to cyberstalking is when the stalker pushes for information regar ding your personal life, private life, or life away from the net. A simple rule of thumb is to never give any personal information over the Internet. .u789db4a5a546b168181c691749c5981a , .u789db4a5a546b168181c691749c5981a .postImageUrl , .u789db4a5a546b168181c691749c5981a .centered-text-area { min-height: 80px; position: relative; } .u789db4a5a546b168181c691749c5981a , .u789db4a5a546b168181c691749c5981a:hover , .u789db4a5a546b168181c691749c5981a:visited , .u789db4a5a546b168181c691749c5981a:active { border:0!important; } .u789db4a5a546b168181c691749c5981a .clearfix:after { content: ""; display: table; clear: both; } .u789db4a5a546b168181c691749c5981a { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u789db4a5a546b168181c691749c5981a:active , .u789db4a5a546b168181c691749c5981a:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u789db4a5a546b168181c691749c5981a .centered-text-area { width: 100%; position: relative ; } .u789db4a5a546b168181c691749c5981a .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u789db4a5a546b168181c691749c5981a .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u789db4a5a546b168181c691749c5981a .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u789db4a5a546b168181c691749c5981a:hover .ctaButton { background-color: #34495E!important; } .u789db4a5a546b168181c691749c5981a .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u789db4a5a546b168181c691749c5981a .u789db4a5a546b168181c691749c5981a-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u789db4a5a546b168181c691749c5981a:after { content: ""; display: block; clear: both; } READ: Technology affects educations EssayTechnology Essays

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.