Chapter 14: Cyberstalking and Online Harassment

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/30

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

31 Terms

1
New cards

What is stalking (general)?

The persistent and unwanted pursuit or communication (calls, emails, following) that causes fear or emotional distress to the victim.

2
New cards

What is cyberstalking?

The repeated use of digital technologies—email, social media, GPS, or messaging—to harass, threaten, or monitor another person.

3
New cards

How is cyberstalking related to offline stalking?

It is an online extension of traditional stalking behaviors, with similar motives but greater anonymity and global reach.

4
New cards

What are the main forms of cyberstalking?

Harassing messages, doxxing, identity theft, online surveillance, impersonation, and threats made through electronic means.

5
New cards

What is online harassment?

Repeated, unwanted digital communication intended to distress, threaten, or harm another person.

6
New cards

What distinguishes cyberstalking from general online harassment?

Cyberstalking is persistent and targeted, involving monitoring or threats, while harassment is broader and less personal.

7
New cards

What makes cyberstalking easier than traditional stalking?

The internet allows anonymity, false identities, and continuous access without physical proximity to the victim.

8
New cards

What role does anonymity play in cyberstalking?

It conceals offenders’ identities, enabling them to act without accountability and making detection harder.

9
New cards

Who are common victims of cyberstalking?

Women, public figures, ex-partners, and minority groups are disproportionately targeted, often due to gender-based or personal motives.

10
New cards

What are the psychological effects of cyberstalking?

Anxiety, depression, fear, and social withdrawal—many victims feel violated and unsafe both online and offline.

11
New cards

What is the continuum of stalking behavior?

Cyberstalking and offline stalking often overlap, as many offenders use both digital and physical means of harassment.

12
New cards

What does moral panic refer to in this context?

Public overreaction that frames cyberstalking as an uncontrollable epidemic rather than a measurable social problem.

13
New cards

What evidence shows cyberstalking is not a moral panic?

Research (e.g., Brady et al., 2016) demonstrates consistent victimization trends, continuity with offline abuse, and tangible harm.

14
New cards

What role does gender play in cyberstalking?

Women experience more frequent and severe forms, often linked to relationship dynamics and power imbalance.

15
New cards

What is cyber intimate partner violence (cyber IPV)?

The use of technology to control, monitor, threaten, or abuse a current or former romantic partner.

16
New cards

What technologies are commonly used in cyberstalking?

Social media, GPS tracking, spyware, hidden cameras, fake profiles, and compromised emails or cloud accounts.

17
New cards

What is the main challenge for law enforcement in cyberstalking cases?

Limited digital evidence, jurisdictional barriers, and insufficient officer training in cyber investigations.

18
New cards

What was the first U.S. law against cyberstalking?

The 1996 amendment to the Violence Against Women Act (VAWA), which made online threats and harassment a federal offense.

19
New cards

What do state laws typically cover?

Most states prohibit electronic threats, harassment, and stalking, allowing restraining orders and criminal penalties.

20
New cards

What is “course of conduct” in cyberstalking law?

A series of two or more actions showing a pattern of harassment or intimidation that causes emotional distress.

21
New cards

What does the UK Protection from Harassment Act (1997) prohibit?

Both offline and online harassment that causes fear or distress, even without explicit threats.

22
New cards

What is the Malicious Communications Act (UK, 1988)?

It makes it illegal to send indecent, threatening, or offensive messages intended to cause distress via electronic means.

23
New cards

How do international differences affect enforcement?

Varying privacy laws and definitions of harassment create difficulties in cross-border investigations.

24
New cards

What are common policing challenges?

Jurisdictional gaps, limited digital forensics, inconsistent victim support, and balancing free speech with public safety.

25
New cards

What do victims often experience with police response?

They frequently feel dismissed or that online threats are not taken as seriously as physical ones.

26
New cards

What reforms are recommended for addressing cyberstalking?

Improved officer training, better victim support, cross-border cooperation, and clearer digital evidence laws.

27
New cards

What does “blurring of boundaries” mean in this context?

Online spaces merge public and private life, making it difficult to separate legitimate communication from harassment.

28
New cards

What is the relationship between cyberstalking and technology design?

Platforms often lack adequate moderation tools, enabling offenders to continue harassment despite reports.

29
New cards

What is secondary victimization?

The added trauma victims experience when law enforcement or institutions mishandle or minimize their reports.

30
New cards

What is the role of social media companies in prevention?

They must remove abusive content, flag offenders, and cooperate with law enforcement to enhance user safety.

31
New cards

What ethical tensions exist in preventing cyberstalking?

Balancing privacy, free expression, and the need for monitoring or surveillance to protect victims.