Cover image for Cyberstalking : harassment in the Internet age and how to protect your family
Title:
Cyberstalking : harassment in the Internet age and how to protect your family
Author:
Bocij, Paul.
Personal Author:
Publication Information:
Westport, Conn. : Praeger, 2004.
Physical Description:
xiv, 268 pages ; 25 cm
Language:
English
Contents:
What is cyberstalking? -- Stalking or cyberstalking? -- The incidence and prevalence of cyberstalking -- Who are the cyberstalkers? -- Who are the victims of cyberstalkers? -- What motivates cyberstalkers? -- Threats to young people -- Cyberstalking and organizations -- Cyberstalking and the law -- Dealing with cyberstalking.
ISBN:
9780275981181
Format :
Book

Available:*

Library
Call Number
Material Type
Home Location
Status
Item Holds
Searching...
HV6773 .B63 2004 Adult Non-Fiction Non-Fiction Area
Searching...
Searching...
HV6773 .B63 2004 Adult Non-Fiction Open Shelf
Searching...

On Order

Summary

Summary

Cyberstalking is an entirely new form of deviant behavior that uses technology to harass others in a variety of ways. In less than a decade, our reliance on the Internet, email, instant messaging, chat rooms, and other communications technologies has made cyberstalking a growing social problem that can affect computer users anywhere in the world. This is the first book devoted entirely to an examination of cyberstalking, providing an overview of the problem, its causes and consequences, and practical advice for protecting yourself and your loved ones.

New technologies have enriched our lives in countless ways. Yet these technologies can easily be misused to frighten, intimidate, coerce, harass, and victimize unsuspecting users. Cyberstalking is an entirely new form of deviant behavior that uses technology to harass others in a variety of ways. In less than a decade, our reliance on the Internet, email, instant messaging, chat rooms, and other communications technologies has made cyberstalking a growing social problem that can affect computer users anywhere in the world. This is the first book devoted entirely to an examination of cyberstalking, providing an overview of the problem, its causes and consequences, and practical advice for protecting yourself and your loved ones.

Although cyberstalking usually involves one person pursuing another, this is not always the case. As the behavior has evolved, it has come to include such acts as stock market fraud, identity theft, sexual harassment, data theft, impersonation, consumer fraud, computer monitoring, and attacks by political groups on government services. More disturbingly, pornographers and pedophiles have begun to use cyberstalking as a way of locating new victims. While cyberstalking has become a worldwide problem, most cases originate in the United States, making Americans the most vulnerable group of targets. Bocij carefully delineates the boundaries of cyberstalking, providing real-life examples, guidance for avoiding the pitfalls, and suggestions for what to do if you fall victim.


Author Notes

Paul Bocij is a former university lecturer who now works as a professional writer and consultant. He has written or contributed to more than 20 books and has authored numerous articles, magazine columns, training guides, and other materials related to information systems and information technology.


Reviews 1

Booklist Review

Stalking as a criminal offense is relatively new (the first antistalking legislation in the U.S. was enacted in 1990). Yet already there is a variation: cyberstalking, in which the perpetrator uses information and communications technology (ICT) to usurp a victim's identity. The author explains that cyberstalkers use ICT to find out the most intimate personal information about their victims and then use that information in ways that can destroy the victims' lives. Whereas an offline stalker (the kind that follows his or her victim around) harasses the victim, cyberstalkers impersonate their prey electronically, sometimes using chat rooms to lure new victims. This is an extremely alarming book that focuses on the dark side of the Internet and makes it clear that we are all potential victims of cyberstalkers. Luckily, there are things we can do to protect ourselves; the text reviews what those things are and what can be done even after an individual has been targeted. The book's price is steep, but it's certain to be popular in libraries. --David Pitt Copyright 2004 Booklist


Table of Contents

Acknowledgmentsp. ix
Introductionp. xi
1 What Is Cyberstalking?p. 1
2 Stalking or Cyberstalking?p. 19
3 The Incidence and Prevalence of Cyberstalkingp. 33
4 Who Are the Cyberstalkers?p. 49
5 Who Are the Victims of Cyberstalkers?p. 71
6 What Motivates Cyberstalkers?p. 89
7 Threats to Young Peoplep. 107
8 Cyberstalking and Organizationsp. 137
9 Cyberstalking and the Lawp. 163
10 Dealing with Cyberstalkingp. 177
Further Readingsp. 205
Notesp. 217