1/30
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is stalking (general)?
The persistent and unwanted pursuit or communication (calls, emails, following) that causes fear or emotional distress to the victim.
What is cyberstalking?
The repeated use of digital technologies—email, social media, GPS, or messaging—to harass, threaten, or monitor another person.
How is cyberstalking related to offline stalking?
It is an online extension of traditional stalking behaviors, with similar motives but greater anonymity and global reach.
What are the main forms of cyberstalking?
Harassing messages, doxxing, identity theft, online surveillance, impersonation, and threats made through electronic means.
What is online harassment?
Repeated, unwanted digital communication intended to distress, threaten, or harm another person.
What distinguishes cyberstalking from general online harassment?
Cyberstalking is persistent and targeted, involving monitoring or threats, while harassment is broader and less personal.
What makes cyberstalking easier than traditional stalking?
The internet allows anonymity, false identities, and continuous access without physical proximity to the victim.
What role does anonymity play in cyberstalking?
It conceals offenders’ identities, enabling them to act without accountability and making detection harder.
Who are common victims of cyberstalking?
Women, public figures, ex-partners, and minority groups are disproportionately targeted, often due to gender-based or personal motives.
What are the psychological effects of cyberstalking?
Anxiety, depression, fear, and social withdrawal—many victims feel violated and unsafe both online and offline.
What is the continuum of stalking behavior?
Cyberstalking and offline stalking often overlap, as many offenders use both digital and physical means of harassment.
What does moral panic refer to in this context?
Public overreaction that frames cyberstalking as an uncontrollable epidemic rather than a measurable social problem.
What evidence shows cyberstalking is not a moral panic?
Research (e.g., Brady et al., 2016) demonstrates consistent victimization trends, continuity with offline abuse, and tangible harm.
What role does gender play in cyberstalking?
Women experience more frequent and severe forms, often linked to relationship dynamics and power imbalance.
What is cyber intimate partner violence (cyber IPV)?
The use of technology to control, monitor, threaten, or abuse a current or former romantic partner.
What technologies are commonly used in cyberstalking?
Social media, GPS tracking, spyware, hidden cameras, fake profiles, and compromised emails or cloud accounts.
What is the main challenge for law enforcement in cyberstalking cases?
Limited digital evidence, jurisdictional barriers, and insufficient officer training in cyber investigations.
What was the first U.S. law against cyberstalking?
The 1996 amendment to the Violence Against Women Act (VAWA), which made online threats and harassment a federal offense.
What do state laws typically cover?
Most states prohibit electronic threats, harassment, and stalking, allowing restraining orders and criminal penalties.
What is “course of conduct” in cyberstalking law?
A series of two or more actions showing a pattern of harassment or intimidation that causes emotional distress.
What does the UK Protection from Harassment Act (1997) prohibit?
Both offline and online harassment that causes fear or distress, even without explicit threats.
What is the Malicious Communications Act (UK, 1988)?
It makes it illegal to send indecent, threatening, or offensive messages intended to cause distress via electronic means.
How do international differences affect enforcement?
Varying privacy laws and definitions of harassment create difficulties in cross-border investigations.
What are common policing challenges?
Jurisdictional gaps, limited digital forensics, inconsistent victim support, and balancing free speech with public safety.
What do victims often experience with police response?
They frequently feel dismissed or that online threats are not taken as seriously as physical ones.
What reforms are recommended for addressing cyberstalking?
Improved officer training, better victim support, cross-border cooperation, and clearer digital evidence laws.
What does “blurring of boundaries” mean in this context?
Online spaces merge public and private life, making it difficult to separate legitimate communication from harassment.
What is the relationship between cyberstalking and technology design?
Platforms often lack adequate moderation tools, enabling offenders to continue harassment despite reports.
What is secondary victimization?
The added trauma victims experience when law enforcement or institutions mishandle or minimize their reports.
What is the role of social media companies in prevention?
They must remove abusive content, flag offenders, and cooperate with law enforcement to enhance user safety.
What ethical tensions exist in preventing cyberstalking?
Balancing privacy, free expression, and the need for monitoring or surveillance to protect victims.