Cyberstalking

Stalking ◽  
2007 ◽  
Author(s):  
Graham D. Glancy ◽  
Alan W. Newman

Cyberstalking involves the use of the Internet or other electronic communication to stalk another person. Already common, it is likely to become more common as the use of the Internet continues to grow. The characteristics of online stalkers and their victims have some differences from those of the offline stalker. Mullen, Pathé, Purcell, and Stuart’s (1999) classification may apply to cyberstalkers except for the apparently common phenomenon of child luring that may be a new category. The methods of cyberstalking, as described in this chapter, are particularly ingenious. We know little about the effect on victims, but postulate that it is similar to offline stalking. We make some suggestions that may prevent cyberstalking, as well as offer some steps to bear in mind once cyberstalking occurs. The proliferation of personal computers with Internet access in the last decade has raised concerns about a new phenomenon known as cyberstalking. The Internet can be used to annoy and harass large numbers of victims in a generic manner by disseminating computer viruses, Internet scams, and “spamming” people with unsolicited e-mail. In 1999 Janet Reno, the attorney general of the United States, defined cyberstalking as the use of the Internet, e-mail, or other electronic communications devices to stalk another person (Reno, 1999). Barak (2005) looked at the issue of sexual harassment on the Internet. He characterizes cyberstalking as one type of sexual coercion. He notes that online behavior is characterized by disinhibition, openness, venture, and bravado—an atmosphere characterized by typical masculine attitudes. He argues that the lack of legal boundaries or enforcement vehicles encourage people to do what they would not have done in offline situations. He notes the near impossibility of implementation of legal procedures on a large scale. In this chapter we will discuss what is known about the prevalence of this phenomenon, the types of cyberstalking, and what is known about the perpetrators. In addition, we will generate some hypotheses about the comparison between online and offline stalkers. We will also discuss the effects on victims and current thoughts and resources for dealing with cyberstalking.

Author(s):  
Edward J. Szewczak

The collection of personal information by electronic technology (e-technology) and the possibility of misuse of that information are primary reasons why people limit their use of the Internet and are even limiting the success of e-commerce (Szewczak, 2004). Various uses of e-technology that collect and/or disseminate personal information include corporate and government databases, e-mail, wireless communications, clickstream tracking, and PC software. The main challenge to personal information privacy is the surreptitious monitoring of user behavior on the Internet without the user’s consent and the possible misuse of the collected information resulting in financial and personal harm to the user. Our focus is primarily on Internet use in the United States of America, though clearly e-technology is global in nature and poses challenges and issues for societies around the world.


Author(s):  
Edward J. Szewczak

Concerns about the collection of personal information by Internet technology and the possibility of misuse of that information are a primary reason why people limit their use of the Internet and are even limiting the success of e-commerce (Szewczak, 2004). Various uses of technology that collect and/or disseminate personal information include corporate and government databases, e-mail, wireless communications, clickstream tracking, hardware and software watermarks, and biometric devices. The main challenge to personal information privacy is the surreptitious monitoring of user behavior on the Internet without the user’s consent and the possible misuse of the collected information resulting in financial and personal harm to the user. Our focus is primarily on Internet use in the United States of America, though clearly the technology is global in nature and poses challenges and issues for societies around the world.


2010 ◽  
pp. 1771-1779
Author(s):  
Karen S. Nantz ◽  
Norman A. Garrett

Education over the Internet is going to be so big it is going to make e-mail usage look like a rounding error. John Chambers, Cisco Systems, New York Times, November 17, 1990 Web-based courses (Mesher, 1999) are defined as those where the entire course is taken on the Internet. In some courses, there may be an initial meeting for orientation. Proctored exams may also be given, either from the source of the Web-based course or off-site at a testing facility. The Internet-based course becomes a virtual classroom with a syllabus, course materials, chat space, discussion list, and e-mail services (Resmer, 1999). Navarro (2000) provides a further definition: a fully interactive, multimedia approach. Current figures indicate that 12% of Internet users in the United States use the Internet to take an online course for credit toward a degree of some kind (Horrigan, 2006). That number is indicative of the rapid proliferation of online courses over the past several years. The Web-enhanced course is a blend with the components of the traditional class while making some course materials available on a Web site, such as course syllabi, assignments, data files, and test reviews. Additional elements of a Web-enhanced course can include online testing, a course listserver, instructor-student e-mail, collaborative activities using RSS feeds and related technologies, and other activities on the Internet. One of the biggest concerns about Web-based courses is that users will become socially isolated. The Pew Internet and America Life Project found that online communities provide a vibrant social community (Horrigan, Rainie, & Fox, 2001). Clearly, students are not concerned or feel that other benefits outweigh the potential drawbacks. According to government research (Waits and Lewis, 2003), during the 2000-2001 academic year alone, an estimated 118,100 different credit courses were offered via distance education (with the bulk of that using Internet-based methods) by 2- and 4-year institutions in the United States. Over 3 million students were registered in these courses. Navarro (2000) suggests that faculty members are far more likely to start by incorporating Internet components into a traditional course rather than directly offering Web-based courses. These Web-enhanced courses might be considered the transition phase to the new paradigm of Internet-based courses. Rich learning environments are being created, with a shift from single tools to the use of multiple online tools, both to enhance traditional courses and to better facilitate online courses (Teles, 2002).


Author(s):  
Christopher McConnell ◽  
Joseph Straubhaar

Digital-inclusion policy in the United States has historically emphasized home broadband access as both its policy priority and goal. Supplying households with broadband access may not do much to improve the ability of individuals to make meaningful use of the Internet, however, since it provides Internet access with little social context beyond the family. Drawing on Bourdieu's concepts of disposition, habitus, and multiple forms of capital, this paper endeavors to situate Internet use in its broader social context and explores the importance of institutional access, Internet use at work or school, in developing the dispositions and competencies needed to use the Internet in instrumental ways, such as applying for educational programs or communicating with governments. Through descriptive statistics, it identifies which segments of a US city lack institutional access, and, using multivariate analysis, it highlights the role institutional access plays in developing these abilities and its role in further inequality.


2011 ◽  
pp. 2159-2163 ◽  
Author(s):  
Simpson Poon

The use of the Internet for business purposes among small businesses started quite early in the e-commerce evolution. In the beginning, innovative and entrepreneurial owners of small businesses attempted to use rudimentary Internet tools such as electronic mail (e-mail) and file transfer protocol (FTP) to exchange messages and documents. While primitive, it fulfilled much of the business needs at the time. Even to date, e-mail and document exchange, according to some of the latest research findings, are still the most commonly used tools despite the fact that tools themselves have become more sophisticated.


Author(s):  
Kenneth R. Walsh

Norwel Equipment Co. Limited Partnership (L.P.) is a Louisiana business retailer of construction equipment specializing in John Deere heavy-equipment and has secured exclusive John Deere rights for most of the State of Louisiana. Founded in 1972, Norwel is the sixth largest John Deere construction equipment dealer in the United States. This case illustrates business and technology issues facing Norwel. In mid-1999, the October 1st deadline for John Deeres requirement to communicate by e-mail was approaching and the response time of the Norwels primary computers system, an AS/400, was increasing to the point where users were not satisfied with performance. Also users were requesting new computing services such as e-mail, document sharing, and Internet access. For example, the Parts Operations Manger suggested selling parts online and the Manager of the Used Equipment Division suggest supporting the sales staff through Internet connections. Managing Partner, Richard Hevey decided an upgrade to the networks and a connection to the Internet were needed. He is faced with both short-term and long-term decisions about Norwels infrastructure.


2009 ◽  
pp. 1729-1735
Author(s):  
Myungsook Klassen ◽  
Russell Stockard

The issue of the underrepresentation of women in the information technology workforce has been the subject of a number of studies and the gender gap was an issue when the digital divide dominated discourse about women’s and minority groups’ use of the Internet However, a broader view is needed. That perspective would include the relation of women and IT in the communities in which they live as well as the larger society. The information society that has emerged includes the United States and the globalized economy of which it is an integral part. Women and minorities such as African Americans and Latinos are underrepresented in computer science (CS) and other information technology positions in the United States. In addition, while they areno longer numerically underrepresented in access to computers and the Internet – as of 2000, (Gorski, 2001) - they continue to enjoy fewer benefits available through the medium than white boys and men. The following article explores the diversity within women from the perspectives of race, ethnicity and social class in North America, mainly United States. The technology gender and racial gap persists in education and in the IT workforce. A broader and deeper look at women’s position in relation to the increasingly techno-centric society reveals that women may have reached equality in access, but not equity in academic study and job opportunities.


Author(s):  
Jack Goldsmith ◽  
Tim Wu

If you had met Jon Postel in 1998, you might have been surprised to learn that you were in the presence of one of the Internet’s greatest living authorities. He had a rambling, ragged look, living in sandals and a large, unkempt beard. He lived like a modern-day Obi-Wan Kenobi, an academic hermit who favored solitary walks on the Southern California beach. When told once by a reporter that readers were interested in learning more about his personal life, he answered: “If we tell them, they won’t be interested anymore.” Yet this man was, and had been for as long as anyone could remember, the ultimate authority for assignment of the all-important Internet Protocol (IP) numbers that are the essential feature of Internet membership. Like the medallions assigned to New York City taxicabs, each globally unique number identifies a computer on the Net, determining who belongs and who doesn’t. “If the Net does have a God,” wrote the Economist in 1997, “he is probably Jon Postel.” Jon Postel was a quiet man who kept strong opinions and sometimes acted in surprising ways. The day of January 28, 1998, provided the best example. On that day Postel wrote an e-mail to the human operators of eight of the twelve “name servers” around the globe. Name servers are the critical computers that are ultimately responsible for making sure that when you type a name like google.com you reach the right address (123.23.83.0). On that day Postel asked the eight operators, all personally loyal to Postel, to recognize his computer as the “root,” or, in essence, the master computer for the whole Internet. The operators complied, pointing their servers to Postel’s computer instead of the authoritative root controlled by the United States government. The order made the operators nervous—Paul Vixie, one of the eight, quietly arranged to have someone look after his kids in case he was arrested. Postel was playing with fire. His act could have divided the Internet’s critical naming system into two gigantic networks, one headed by himself, the other headed by the United States. He engineered things so that the Internet continued to run smoothly. But had he wanted to during this critical time, he might have created chaos.


Author(s):  
Peter L. Stenberg ◽  
Mitchell Morehart

The Internet became enmeshed in U.S. businesses management practices over the last decade. During this period access and use of the Internet increased for all regions of the United States, most types of work places, and all income groups. In this study we examine Internet use by farm and rural workers and proprietors using descriptive statistics and market demand analysis. In our market demand analysis approach, the primary methodology we use is categorical dependent variable analysis. The results indicate income is a critical element, though other factors such as age of proprietor and rural-urban location are also significant in market demand determination.


2012 ◽  
Vol 44 (3) ◽  
pp. 323-334 ◽  
Author(s):  
Chris Jeffcoat ◽  
Alison F. Davis ◽  
Wuyang Hu

Since the Internet's inception its impact has been felt across the United States, but the distribution and adoption of the Internet has not necessarily been uniform geographically. As more consumers and businesses rely on the Internet to access information, the data transmission requirements have also increased. Consequently, access to broadband has become increasingly more important since dial-up cannot realistically handle the increased requirements. The use of broadband in agriculture can provide better access to price, weather, and management information while also opening new markets. However, many rural communities lag behind urban areas in broadband access and adoption rates. This study evaluates, through the use of a producer survey, the level of broadband Internet use, motivations for its use, degree of access to broadband, and willingness-to-pay (WTP) to fund broadband infrastructure investments. Results from the producer survey suggested farmers utilize the Internet primarily for accessing weather reports, e-mail, market reports, and agricultural news. Notably, the survey's WTP questions allowed for the use of an interval regression to calculate producer WTP for varying demographics. The results suggested that producers who were younger, farmed larger farms, and those who currently use the Internet but do not have broadband access were WTP more in property taxes to support broadband infrastructure investments than those of a differing demographic. Because WTP levels varied drastically depending on the underlying demographics, it becomes difficult to pinpoint a WTP level for a one-time payment in property taxes that would be acceptable from a policy standpoint.


Sign in / Sign up

Export Citation Format

Share Document