close
test_template

Analysis of The Four Types of Cyber-stalking

About this sample

About this sample

close

Words: 973 |

Pages: 2|

5 min read

Published: Oct 25, 2021

Words: 973|Pages: 2|5 min read

Published: Oct 25, 2021

Cyber-Stalking is becoming a larger issue with the drive of social networking and “is a form of repeated harassment that involves the Internet and methods of electronic communication like email, online chat and instant message” (Cross, 2014, pg. 164). A cyberstalker targets a specific victim through the internet to allow them to anonymously send threatening messages without being detected. There are four types of cyber-stalking, these being “harassing, threatening, intimidating and impersonating profiles”. The four different types of Cyber-Stalking are stepping stones, the more invested the stalker is the harder they will try to infiltrate the victims life using any means necessary.

'Why Violent Video Games Shouldn't Be Banned'?

The first is Harassing, the notion of harassing is subjecting the victim to aggressive pressure and intimidation. This is a common technique that stalkers use in order to engage with the victim and to make them feel threatened, stalkers would do this by writing hostile messages on a public forum such as the victims Facebook page. “offline, harassers have to target one individual or a handful at a time; online, images, comments, and memes can be spread in next to no time across dozens of accounts and websites”. Since a stalker offline has one victim while an online stalker it allows them to further harass the victim to do what they want. This is a starting point for stalkers, this could be them writing rude comments to being a traumatic event where they are threats of physical and emotional violence. This would happen repeatedly until the victim feels that there is no other option but to comply to what the stalker wants; at this stage it would be for intimate pictures and the gratification of knowing that they are ruining someone emotionally. This first stage could also be considered Cyber-bullying, and it can get a lot worse through the other stages for the victim.

The second form of Cyber-Stalking is Threatening, threatening behaviour is construed as expressing a threat of something unfriendly or violent. Stalkers could have a personal relationship to their victims so therefore have an easy access to chat histories and intimate pictures that were sent in confidence. These are then used to threaten and harass victims to do what they want so the stalker can get gratification. “threatening communications and violent behaviour can utilize a fear-appeal strategy to shift a would-be attacker’s attitudes” (Chauvin, 2011, pg. 54). If the stalker is able to illicit fear from their victim their attitude may shift to get further information and therefore gain more fear from their victim. One of the main issues of Cyber-Stalking and the ideal of threatening is the ease of being able to screenshot conversations, this means stalkers can hold personal pictures and private messages against the victims, some social networking websites are trying to combat this. The large social networking app, Snapchat is the front runner for combating unwanted screenshots, within Snapchat you can screenshot stories that others have put up and it would not notify the user as they choose to put the picture on their own story as public. However, if it is an individual conversation it will notify the user.

The third form of Cyber-Stalking is Intimidating. The stalker would intimidate the victim through making them feel frightened or afraid of what the stalker may do. “The cyber stalker truly believes that a relationship exists even through the victim may have innocently responded to an offender’s question in a chat room or discussion board” (Pittaro, 2017, pg. 187). Through the stalker believing in the relationship the escalation of the stalker would be to further intimidate the victim. The stalker would intimidate them to send more intimate pictures or important personal information such as bank details both of these would humiliate the victim. Some stalkers feel a personal connection to their victims and therefore would tend to escalate their intimidation tactics when confronting their victims online.

The fourth and final type is Impersonating Profiles. This could be considered the most dangerous type of Cyber-Stalking due to the notion that stalkers can create “fake profiles, where malicious users present themselves in profiles impersonating fictitious or real persons”. If the stalker is creating a fake profile of the person that they are targeting it means that they could gain extra traction on blackmailing the victim as the stalker could befriend the victims’ family and friends online to learn more about them as the family and friends would know more intimate details and would not think twice about sharing the information with the victim. However, the more malicious way that the stalker can target the victim is by pretending to be someone else online and befriend the victim. Since the stalker has some previous knowledge of the victim, they are able to forge a personal connection to them via the persona of someone else. In more recent years this has been called Catfishing, “individuals deceive others and play on their vulnerability”. Some people Catfish to make themselves look more attractive to others by pretending to be someone that they are not whether that be looks or at an intellectual levels but other such as stalkers would do it to further their intimidation and strong hold against the victim to make them suffer.

Get a custom paper now from our expert writers.

Cyber-Stalking is a growing phenomenon, with the increasing emergence of social networking and more users becoming less interested with privacy it allows for stalkers to have a greater access to the individual they are targeting. Due to Cyber-Stalking being online there is a notion of not being able to fully pinpoint where the stalker is due to the changing of IP addresses and the fact that it is likely that they are using a laptop which means that they can move around freely using free Wi-Fi and hotspots. If not combatted Cyber-Stalking could lead to more and more users of social networking being exploited for wanting to share their lives online. 

Works Cited

  1. Chauvin, C. (2011). Cyberstalking: Clarifying the concept. Western Criminology Review, 12(2), 52-67.
  2. Cross, C. (2014). A state-by-state comparison of cyber stalking statutes. Journal of the Institute of Justice and International Studies, 14(1), 163-175.
  3. Klausner, L. (2012). Cyberstalking and the technologies of interpersonal terrorism. Violence and Victims, 27(5), 748-765.
  4. Lalani, F. (2015). Cyberstalking: The technological “enfant terrible” of the 21st century. Journal of Internet Law, 19(3), 3-12.
  5. Ménard, K. S., & Pincus, M. (2019). The effect of stalking and cyberstalking victimization on self-esteem: A longitudinal study. Journal of Interpersonal Violence, 34(9), 1817-1838.
  6. Pittaro, M. L. (2017). Criminal investigation: A method for reconstructing the past. Jones & Bartlett Learning.
  7. Ryan, K. M., & Eichenberg, C. (2018). Cyberstalking victimization in a national sample of online Canadians: Prevalence, characteristics, and the interplay with offline victimization. Journal of Interpersonal Violence, 33(14), 2229-2253.
  8. Short, E. L., & Nunnally, E. W. (2018). The role of social support in the prevention of cyberstalking victimization. Journal of Interpersonal Violence, 33(20), 3237-3262.
  9. Stewart, M. (2019). The effectiveness of UK cyberstalking laws: A critical examination of the Protection from Harassment Act 1997. Journal of Cyber Policy, 4(1), 35-51.
  10. Tjaden, P., & Thoennes, N. (2000). Prevalence and consequences of male-to-female and female-to-male intimate partner violence as measured by the National Violence Against Women Survey. Violence Against Women, 6(2), 142-161.
Image of Dr. Oliver Johnson
This essay was reviewed by
Dr. Oliver Johnson

Cite this Essay

Analysis Of The Four Types Of Cyber-stalking. (2021, October 25). GradesFixer. Retrieved March 28, 2024, from https://gradesfixer.com/free-essay-examples/analysis-of-the-four-types-of-cyber-stalking/
“Analysis Of The Four Types Of Cyber-stalking.” GradesFixer, 25 Oct. 2021, gradesfixer.com/free-essay-examples/analysis-of-the-four-types-of-cyber-stalking/
Analysis Of The Four Types Of Cyber-stalking. [online]. Available at: <https://gradesfixer.com/free-essay-examples/analysis-of-the-four-types-of-cyber-stalking/> [Accessed 28 Mar. 2024].
Analysis Of The Four Types Of Cyber-stalking [Internet]. GradesFixer. 2021 Oct 25 [cited 2024 Mar 28]. Available from: https://gradesfixer.com/free-essay-examples/analysis-of-the-four-types-of-cyber-stalking/
copy
Keep in mind: This sample was shared by another student.
  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours
Write my essay

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

close

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.

    close

    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts

    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

    clock-banner-side

    Get Your
    Personalized Essay in 3 Hours or Less!

    exit-popup-close
    We can help you get a better grade and deliver your task on time!
    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now