Cyberstalking: Harassment in the Internet Age and how to Protect Your Family

Front Cover
Greenwood Publishing Group, 2004 - Health & Fitness - 268 pages
3 Reviews

Cyberstalking is an entirely new form of deviant behavior that uses technology to harass others in a variety of ways. In less than a decade, our reliance on the Internet, email, instant messaging, chat rooms, and other communications technologies has made cyberstalking a growing social problem that can affect computer users anywhere in the world. This is the first book devoted entirely to an examination of cyberstalking, providing an overview of the problem, its causes and consequences, and practical advice for protecting yourself and your loved ones.

New technologies have enriched our lives in countless ways. Yet these technologies can easily be misused to frighten, intimidate, coerce, harass, and victimize unsuspecting users. Cyberstalking is an entirely new form of deviant behavior that uses technology to harass others in a variety of ways. In less than a decade, our reliance on the Internet, email, instant messaging, chat rooms, and other communications technologies has made cyberstalking a growing social problem that can affect computer users anywhere in the world. This is the first book devoted entirely to an examination of cyberstalking, providing an overview of the problem, its causes and consequences, and practical advice for protecting yourself and your loved ones.

Although cyberstalking usually involves one person pursuing another, this is not always the case. As the behavior has evolved, it has come to include such acts as stock market fraud, identity theft, sexual harassment, data theft, impersonation, consumer fraud, computer monitoring, and attacks by political groups on government services. More disturbingly, pornographers and pedophiles have begun to use cyberstalking as a way of locating new victims. While cyberstalking has become a worldwide problem, most cases originate in the United States, making Americans the most vulnerable group of targets. Bocij carefully delineates the boundaries of cyberstalking, providing real-life examples, guidance for avoiding the pitfalls, and suggestions for what to do if you fall victim.

  

What people are saying - Write a review

User Review - Flag as inappropriate

Excellent educational book and feasible to understand. It places emphasis on every aspect of cyber-stalking that needs it and goes to show that cyber-stalking started almost immediately along with the public disbursement of the internet. If this is how it was in the beginning, imagine how it is today? 

User Review - Flag as inappropriate

6/29/2008
NOTICE OF LIBEL SUIT
Update on "Cyberstalking: harassment in the internet age and how to protect your family".
In May 2008 I requested that Greenwood publisher and Mr. Bocij withdraw this book from the market because of the libel contained within it. In spite of pointing out the specific false allegations within this book, both the pubisher and Mr. Bocij refused to correct it. I am now forced to file a lawsuit against both of them.
I notified Google books last week about this matter and I requested that they take down the excerpt regarding me.
Diana Napolis, Pro Per
http://diananapolis.wordpress.com
 

Contents

What Is Cyberstalking?
1
Stalking or Cyberstalking?
19
The Incidence and Prevalence of Cyberstalking
33
Who Are the Cyberstalkers?
49
Who Are the Victims of Cyberstalkers?
71
What Motivates Cyberstalkers?
89
Threats to Young People
107
Cyberstalking and Organizations
137
Cyberstalking and the Law
163
Dealing with Cyberstalking
177
Further Readings
205
Notes
217
Glossary
229
Bibliography
243
Index
263
Copyright

Common terms and phrases

References to this book

All Book Search results »

About the author (2004)

PAUL BOCIJ is a former university lecturer who now works as a professional writer and consultant. He has written or contributed to more than twenty books and has authored numerous articles, magazine columns, training guides and other materials related to information systems and information technology.

Bibliographic information