Type a new keyword(s) and press Enter to search

Cyber Victimization

 

The reasons for this are many and varied, though include the fact that the victim may not consider the behavior to be dangerous, they may not know they are being stalked or they may believe that little can be done about the problem. .
             To appreciate the possible breadth of this problem, we must realize that the Internet reaches into literally millions of homes, in hundreds of countries. The same networks as those used for the transmission of information, business transactions, banking and gaming also provide a virtual backdrop from which individuals may conduct electronic crimes of varying natures. The nature and extent of cyber stalking is perhaps more difficult to assess than its terrestrial cousin, given the anonymity and breath of electronic communications.
             While the differences between the two forms of stalking must be acknowledged, it is most important to acknowledge that cyber stalking is fundamentally an extension of the physical act. Casey (1999) cautions:the overarching message here is that we should concentrate on the details, the uniqueness and complexity of a case rather than get caught up on typologies, terminology or the fact that we are dealing with a different medium?. .
             One could not be blamed for assuming that to become the victim of such behavior, that access to a personal computer and the Internet would be a requisite. The following example though, illustrates how these two tools are not a requirement, and the inability to access either technology does not necessarily protect one from the reaches of the Cyber stalker. It also illustrates rather well how the stalker would transverse both the physical and the virtual realms.
             The victim met the perpetrator at church, and continually rejected his romantic attempts. The perpetrator, a fifty-year-old security guard, retaliated to her rejection by posting her particulars on the Internet. These included her physical description, address and telephone number, and even including details about how one could bypass her home security system.


Essays Related to Cyber Victimization