Explore chapters and articles related to this topic
Other First Amendment Issues: Libel, Hate Speech, Cyberstalking, and Copyright
Published in Michael M. A. Mirabito, Barbara L. Morgenstern, Mitchell Kapor, The New Communications Technologies, 2004
Michael M. A. Mirabito, Barbara L. Morgenstern, Mitchell Kapor
For the latter, the language of Section 875 may appear to provide federal legal protection against cyberstalking: “whoever transmits in interstate commerce any communication containing any threat to kidnap any person or any threat to injure the person or another, shall be fined under this Title or imprisoned not more than 5 years or both.”68 But in reality, unless a specific, direct threat is made, the law does not apply. If the cyberstalker harasses or terrorizes the victim but does not make a specific, direct threat (e.g., I’m going to kill you), Section 875 cannot be used to protect the victim. Since most cyberstalking incidents fall into the harassment category, a comprehensive federal cyberstalking law is necessary.
Types of Cyberattacks
Published in Kutub Thakur, Al-Sakib Khan Pathan, Cybersecurity Fundamentals, 2020
Kutub Thakur, Al-Sakib Khan Pathan
Cyberstalking is a systematic approach of harassing done through email, phones, SMS, chats, and other forms of communication. The main components used in the communication to threaten the targeted entity include defaming, false allegations, slandering, and other forms of blackmailing.
Email-Based Cyberstalking Detection On Textual Data Using Multi-Model Soft Voting Technique Of Machine Learning Approach
Published in Journal of Computer Information Systems, 2023
Arvind Kumar Gautam, Abhishek Bansal
Although different authors give different definitions of cyberstalking but cyberstalking is a form of online harassment involving the use of technology to target individuals or groups. Cyberstalking and cyberbullying are two challenging issues of online abuse and are near to close in content and intent, which involve the same internet-based technology to harass, bully and undermine others in the online world. Cyberstalking is systematic, repeated, and numerous cyber-attacks and may occur on multiple occurrences.5–8 Cyberstalking may be classified into e-mail stalking, internet stalking, computer stalking, phone stalking, and automated stalking.8,9 Cyberstalking is a dangerous and convoluted cybercrime that affects and targets numerous people, communities, and organizations.10 Cybercriminals apply several approaches to target the victims, such as sending e-mails containing phishing, viruses, threatening, fraudulent, and harassing content, e-mail bombing as well as sharing the private information of victims, and finally, trying to hack the e-mail account. Cyberstalkers often utilize e-mail-based technology with predefined plans and agendas to insult, profanity, harassing the victim through repeated activities of sexism, racism, offensive, abuse, hate, and fake news from real or counterfeit accounts. However, such types of e-mail-based methods are mainly utilized for several other types of e-mail-based crimes, but the utilization of these e-mail-based methods in cyberstalking incidents can not be ignored. Some e-mail-based methods applied by cyberstalkers are presented in Figure 1.
Using norm activation model and theory of planned behaviour to understand the drivers of cyberharassment among university students
Published in Behaviour & Information Technology, 2023
Godwin Udo, Kallol Bagchi, Laura Trevino, Saini Das
Cyberharassment is a subgroup of cyberbullying (Mikkola, Ellonen, and Kaakinen 2022; Saleem et al. 2022). Piotrowski (2012) defines CH as an act of repeated or one-off malicious, unsolicited Internet behaviours against victims, which are intended to upset, disturb, or threaten other people. Hazelwood and Koon-Magnin (2013) defined CH as ‘Engaging in an act or behaviour that torments, annoys, terrorises, offends, or threatens an individual via email, instant messages, or other means such as social media, with the intention of [physically or mentally] harming that person’. On the other hand, Martínez-Monteagudo et al. (2020) define cyberbullying as aggressive, intentional, targeted, unwanted, unethical, improper, immoral, unaccepted, and rude behaviour among and towards people. More broadly, Li (2007a; Li 2007b) describes cyberbullying as involving the use of ICTs, such as cellphones, pager text messages, e-mail, instant messaging, defamatory personal websites, and defamatory online personal polling websites, to support deliberate, repeated, and hostile behaviour by an individual or group that is intended to harm other persons. For the purpose of this study, we identify more with Li’s definition though other definitions also accurately describe aspects of CH. Comparing CH to other types of cyberbullying, Lowry et al. (2019) indicate that CH is the most crucial because it often causes more direct and emotional damage to victims. In recognition of the severity of the danger of CH, the federal law, 18 U.S. Code Section 2261A which proscribes cyberstalking as, a federal crime, has been amended to include actions taken online to harass (i.e. CH), injure, harm, or intimidate a person.