NCJ Number
189018
Journal
Crime & Justice International Volume: 17 Issue: 50 Dated: March 2001 Pages: 9-10,26-28,29
Date Published
March 2001
Length
6 pages
Annotation
This paper examines "cyberstalking" as an example of a crime that is both amenable and resistant to traditional forms of legislation, depending on the way in which the possibilities of the Internet are exploited.
Abstract
Cyberstalking is analogous to traditional forms of stalking in that it incorporates persistent behavior that instills apprehension and fear; however, with the advent of new technologies, traditional stalking has taken on new forms through mediums such as e-mail and the Internet. Although to date there has been no empirical research to determine the incidence of cyberstalking, it has been argued that such incidents may be more common than traditional forms of stalking. This is because the basic apparatus of the Internet, including free e-mail and chat rooms, facilitate contact with an immense field of potential victims. The manner in which cyberstalking is conducted depends on the particular use of the Internet being exploited. There are three primary ways in which cyberstalking is conducted: e-mail stalking, which involves direct communication through e-mail; Internet stalking, which involves global communication through the Internet; and computer stalking, which involves unauthorized control. In countering cyberstalking, there are three primary strategies, each of which has varying degrees of success: personal protection, technical fixes, and legislation. Although some of the traditional strategies will remain applicable in addressing cyberstalking, new and innovative legislative, technical, and investigative countermeasures will be necessary. 25 references