· Abuse Articles related to Abuse By means Abstract concepts Abuse reporting /Antisocial behavior Coercion / Crueldad Abuso de poder Persecución / Abuso ritual / Violencia Maltrato físico Tortura / Maltrato infantil Castigos corporales severos Violencia doméstica Maltrato psicológico Abandono infantil Humillación / Intimidación Mobbing / Intimidación Discurso de odio / Manipulación Acoso / Agresión relacional Alienación de los padres Tortura psicológica Control mental / Rechazo Efecto Cenicienta /Persuasión coercitiva Abuso verbal Abuso sexual Incesto / Abuso sexual infantil Violación / Acoso sexual Por víctima Mujeres maltratadas/Abuso infantil Abuso de ancianos / Violencia familiar Abuso de presos / Maltrato animal Maltrato de pareja / Abuso del paciente Abuso conyugal/acoso en el lugar de trabajo Este recuadro: view • talk • edit Cyberstalking is the use of the Internet messaging services or other electronic means to stalk someone. This term is used interchangeably with online harassment and online abuse. Contenido 1 Definitions 2 Techniques 3 Cyberstalking legislation 4 Cyberstalking law enforcement 5 Ver también 6 References & Bibliography 7 Textos clave 7.1 Libros 7.2 Papeles 8 Material adicional 8.1 Libros 8.2 Papeles 9 Notas 10 External links Definitions A cyberstalker follows the victim's online activity to gather information, initiate contact, make threats, or engage in other forms of verbal intimidation. Cyberstalkers target victims using online forums, bulletin boards, chat rooms, spyware, and spam. They may engage in live chat harassment or flaming or they may send electronic viruses and unsolicited e-mails. More commonly they will post defamatory or derrogatory statements about their stalking target on web pages, message boards and in guest books designed to trigger a reaction or response from their victim, thereby initiating contact. When prosecuted, many stalkers have unsuccessfully attempted to justify their behavior based on their use of public forums, as opposed to direct contact. Once they get a reaction from the victim, they will typically attempt to track or follow the victim's internet activity. Classic cyberstalking behavior includes the tracing of the victim's IP address in an attempt to verify their home or place of employment. According to Wayne Petherick (2005) cyberstalking is an extension of traditional stalking using the Internet as a new modus operandi. Stalking does not consist of single incidents, but is a continuous process. Similar to stalking off-line (physical stalking), cyberstalking can be a terrifying experience for victims, placing them at risk of psychological trauma, and possible physical harm. As Rokkers writes, "Stalking is a form of mental assault, in which the perpetrator repeatedly, unwantedly, and disruptively breaks into the life-world of the victim, with whom he has no relationship (or no longer has)....Además, the separated acts that make up the intrusion cannot by themselves cause the mental abuse, but do taken together (cumulative effect)." (For a list of effects, see Stalking) Some cyberstalking situations do evolve into physical stalking, and a victim may experience abusive and excessive phone calls, vandalism, threatening or obscene mail, trespassing, and physical assault. Además, many physical stalkers will use cyberstalking as another method of harassing their victims. Techniques Some cyberstalkers (and some private investigators) use web sites such as http://www.four11.com/, HTTP://www.switchboard.com/, and http://www.whowhere.com/ to track people. People who do not want to be tracked often can request removal of themselves from such sites. Cyberstalking legislation The first U.S. cyberstalking law went into effect in 1999 in California. Other states include prohibition against cyberstalking in their harassment or stalking legislation. In Florida, HB 479 was introduced in 2003 to ban cyberstalking. This was signed into law on October 2003. [Cómo hacer referencia y vincular a un resumen o texto] States in the U.S. have begun to address the use of computer equipment for stalking purposes: Alabama, Arizona, Connecticut, Hawaii, Illinois, New Hampshire and New York have included prohibitions against harassing electronic, computer or e-mail communications in their harassment legislation. Alaska, Oklahoma, Wyoming, and California, have incorporated electronically communicated statements as conduct constituting stalking in their anti-stalking laws. A few states have both stalking and harassment statutes that criminalize threatening and unwanted electronic communications. Other states have laws other than harassment or anti-stalking statutes that prohibit misuse of computer communications and e-mail, while others have passed laws containing broad language that can be interpreted to include cyberstalking behaviors Cyberstalking has also been addressed in recent U.S. federal law. Por ejemplo, the Violence Against Women Act, passed in 2000, made cyberstalking a part of the federal interstate stalking statute. Todavía, there remains a lack of legislation at the federal level to specifically address cyberstalking, leaving the majority of legislative prohibitions against cyberstalking at the state level.Cite error: Closing missing for tag In the United Kingdom, the Malicious Communications Act (1998) classified cyberstalking as a criminal offense. Most stalking laws require that the perpetrator make a credible threat of violence against the victim; others include threats against the victim's immediate family; and still others require the alleged stalker's course of conduct constitute an implied threat.(1) While some conduct involving annoying or menacing behavior might fall short of illegal stalking, such behavior may be a prelude to stalking and violence and should be treated seriously. Online identity stealth blurs the line on infringement of the rights of would-be victims to identify their perpetrators. We need to debate how internet use can be traced without infringing on protected civil liberties. Cyberstalking law enforcement Law enforcement has often not caught up with the times, and officials are in many cases simply telling the victims to avoid the websites where they are being harassed or having their privacy violated. Some assistance can be found by contacting the web host companies (if the material is on a website) or the ISP of the abuser. Many victims note that persistence is a key. At times the seriousness of the impact of this type of violation is not comprehended and the third party facilitators of cyberstalkers tell the victim to work it out with their harasser. [Cómo hacer referencia y vincular a un resumen o texto] See also Cyberspace Cyberbullying Cyberterrorism Harassment by computer Hate group Stalking References & Bibliography Key texts Books Bocij, Paul. Cyberstalking : Harassment in the Internet Age and How to Protect Your Family. Editores de Praeger, 2004. (ISBN 0-275-98118-5) Melodía, J. The Psychology of Stalking. Reid. Prensa Académica, 2000. (ISBN 0-12-490561-7) Mullen, Paul E.; Pathé, Michele; Purcell, Rosemary. Stalkers and Their Victims. Cambridge University Press, 2000. (ISBN 0-521-66950-2) Papers Adam, Un. (2001). Cyberstalking: Gender and computer ethics. In E. Green & A. Adán (Eds.), Virtual Gender: Tecnología, Consumption and Identity (páginas. 209-224). Londres: Routledge. Adán, Un. (2002). Cyberstalking and Internet pornography: Gender and the gaze. Ética y Tecnologías de la Información, 4, 133-142. Bocij, PAGS., Bocij, H., McFarlane, L. (2003). Cyberstalking: A case study of serial harassment in the UK. British Journal of Forensic Practice, 5(2), 25-32. Bocij, P. (2005). Reactive stalking: A new perspective on victimisation. British Journal of Forensic Practice, 7, 23-34. Ellison, L. (2003). Cyberstalking: Tackling harassment on the internet. En D. S. Wall (Ed.), Crime and the Internet, (páginas. 141-151). Londres, REINO UNIDO: Routledge. Spitsbergen, B. H., & Hoobler, G. (2002). Cyberstalking and the technologies of interpersonal terrorism. New Media & Society, 4, 71-92. Tavani, H. T., & Grodzinsky, F. S. (2002). Cyberstalking, personal privacy, and moral responsibility. Ética y Tecnologías de la Información, 4, 123-132. Additional material Books Papers Google Scholar PDF article on Cyberstalking in the United Kingdom Crime Library: Cyberstalking Cyber-Stalking Obsessional Pursuit and the Digital Criminal Petherick Wayne, 2005 Cyberstalking – Is it Covered by Current Anti-Stalking Laws? by Craig Lee and Patrick Lynch Notes ↑ Jump up to: 1.0 1.1 Cyberstalking ↑ Cyber-Stalking: Obsessional Pursuit and the Digital Criminal ↑ CyberStalking: menaced on the internet ↑ Types of Stalkers and Stalking Patterns ↑ Stalking/UK ↑ Cyberstalking: A New Challenge for Law Enforcement and Industry External links State Computer United States harassment or "Cyberstalking" Laws Cyberstalking - Menaced on the internet United States law and the Internet Cyberbullying The National Center for Victims of Crime US based CyberAngels Working to Halt Online Abuse (WHOA) Wired Safety Privacy Rights Clearinghouse 1999 Report on Cyberstalking: A New Challenge for Law Enforcement and Industry The National Center for Victims of Crime
Si quieres conocer otros artículos parecidos a Cyberstalking puedes visitar la categoría Pages with reference errors.