Skip to main content icon/video/no-internet

The term cyberstalking is used to describe stalking behaviors that (a) involve repeated threats and/or harassment, (b) use electronic mail or other information technology-based communication, or (c) would cause a reasonable person to be afraid or concerned for his or her safety. Cyberstalkers most commonly harass their victims through email, but may also use Web sites, chat rooms, discussion forums, and open publishing Web sites (e.g., blogs and online journals). Cyberstalking may involve direct harassment of a victim or may use indirect means such as email to employers or postings in online newsgroups. Cyberstalking may be part of a systemic pattern of online harassment and may include sending repeated email or instant messages that may or may not directly threaten the recipient; flooding a victim's email box with unwanted mail; sending the victim files with a virus; using a victim's email address to subscribe her or him to multiple listservs or to purchase books, magazines, or other services in her or his name; sending misinformation and false messages to chat rooms, Usenet groups, listservs, or places of the victim's employment; stealing a person's online identity to post false information; sending a victim's demographic information and/or picture to sexually oriented or pornographic sites; or seeking and compiling various information that a victim may have posted on newsgroups with the intent to locate personal information and then use this information to harass, threaten, and intimidate the victim, either online or in the real world.

Reasons for Cyberstalking

Stalking has been viewed by some theorists as aberrant behavior involving obsessive behavior or personality disorder. Feminists, however, view stalking and cyberstalking as related to sexism, a means to gain power and control over a victim. Others believe stalking has a long history among the general public and is rooted in the romantic tradition in which a reluctant female must be wooed from “no” to “yes” by a persistent suitor. In any case, cyberstalking is an extension of the traditional stalking methods of following, making telephone calls, and writing letters. As with stalking in the physical world, cyberstalking can result from an attempt to initiate a relationship, to repair a relationship, or to threaten and traumatize a person. Recent research, however, found differences between real-world and cyberstalking. Cyberstalking is more likely to involve strangers and to take place over a shorter period of time than real-world stalking. In addition, cyberstalkers are more likely not to know their victims, to have multiple victims, and to have no history of criminality, substance abuse, or restraining orders.

The Internet medium itself may contribute to cyberstalking. The online environment can promote a false sense of intimacy and misunderstanding of intentions. People may feel in proximity to each other when they are online despite the actual physical distance involved. In addition, emotionally intensified interactions often develop in online communication. The limited nonverbal, historical, and contextual information available in online contexts may enable potential cyberstalkers to develop idealized perceptions of those with whom they communicate online and to misjudge the intentions of the messages they receive. In addition, the relative anonymity, the lack of social status cues, and the propensity for disinhibited behavior in the online environment may promote greater risk taking and asocial behavior by a greater number of people. The availability of free email and Web site space, as well as the anonymity provided by some chat rooms and newsgroups, has contributed to the increase of cyberstalking as a form of harassment. Finally, the ease of using a search engine to find someone's alias, real name, or email address contributes to cyberstalking.

...

  • Loading...
locked icon

Sign in to access this content

Get a 30 day FREE TRIAL

  • Watch videos from a variety of sources bringing classroom topics to life
  • Read modern, diverse business cases
  • Explore hundreds of books and reference titles

Sage Recommends

We found other relevant content for you on other Sage platforms.

Loading