11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

126 cyberstalking <strong>and</strong> harassmentThe Future <strong>of</strong> CyberspaceBy the end <strong>of</strong> the 1990s, the face <strong>of</strong> cyberspace was nolonger that <strong>of</strong> text screens but that <strong>of</strong> the World Wide Webwith its graphical pages. Multiplayer games now <strong>of</strong>ten featuregraphics <strong>and</strong> even real-time voice communication ispossible. With ubiquitous digital cameras, the boundarybetween cyberspace <strong>and</strong> physical space has become fluid,with people able to enter into each other’s physical environmentsin realistic ways. Meanwhile, the development<strong>of</strong> virtual reality techniques has made computer-generatedworlds much more vivid <strong>and</strong> realistic (see virtual reality).As more people are linked continually to the networkby broadb<strong>and</strong> <strong>and</strong> wireless connections, cyberspace mayeventually disappear as a separate reality, having mergedwith physical space.Further ReadingBell, David. An Introduction to Cybercultures. New York: Routledge,2001.Bell, David, <strong>and</strong> Barbara M. Kennedy, eds. The CyberculturesReader. New York: Routledge, 2007.Jenkins, Henry. Convergence Culture: Where Old <strong>and</strong> New MediaCollide. New York: New York University Press, 2006.Resource Center for Cyberculture Studies. Available online. URL:http://rccs.usfca.edu/default.asp. Accessed July 1, 2007.Silver, David, <strong>and</strong> Adrienne Massari, eds. Critical CybercultureStudies. New York: New York University Press, 2006.Wired magazine. Available online. URL: http://www.wired.com.Accessed July 1, 2007.cyberstalking <strong>and</strong> harassmentCyberstalking <strong>and</strong> harassment or “cyber bullying” involvethe use <strong>of</strong> online communications <strong>and</strong> facilities (such asinstant messaging, chat rooms, e-mail, or Web sites) tostalk, harass, or otherwise abuse a person or group. Theseactivities may be carried on entirely online or in connectionwith physical stalking or harassment.Stalking <strong>and</strong> threatening a person has been a crime inthe physical world for some time, <strong>and</strong> similar principlesapply to online stalking. Generally, to be guilty <strong>of</strong> stalking, aperson must repeatedly harass or threaten the victim, <strong>of</strong>tenfollowing him or her <strong>and</strong> intruding or violating privacy.Cyberstalkers take advantage <strong>of</strong> the fact that there isa great deal <strong>of</strong> information about many people online.(Indeed, the popularity <strong>of</strong> sites such as MySpace meansthat many users can unwittingly provide that informationin well-organized, easy-to-access form—see social networking.)The stalker can also use search engines to finde-mail or even physical addresses <strong>and</strong> phone numbers, orcan join chat rooms used by the prospective victim,Motives for stalking can range from sexual obsession toanger at some real or imagined slight, to more idiosyncraticreasons. As with physical stalking in an earlier generation,law enforcement agencies were <strong>of</strong>ten slow to acknowledgethe potential seriousness <strong>of</strong> the crime or to develop effectiveways to deal with it.This began to change with the tragic <strong>and</strong> highly publicizedcase <strong>of</strong> Amy Boyer, who had been found onlinethrough a data broker, stalked, harassed, <strong>and</strong> ultimatelymurdered. In 1999 California became the first state to passa law against cyberstalking, <strong>and</strong> in 2000 cyberstalking wasmade part <strong>of</strong> the federal Violence against Women Act.CyberbullyingLike traditional bullying in schools or other settings, cyberbullyinginvolves harassment, sometimes organized, <strong>of</strong>people considered to be weak or different in some way.However, the ability to hide or disguise one’s identity online(see anonymity <strong>and</strong> the Internet) facilitates cyberbullyingby making it harder for victims to identify <strong>and</strong> confrontor report their tormentors. Media for cyberbullying includetext <strong>and</strong> instant messaging, photos or videos, blogs, <strong>and</strong>increasingly, pages on social networking sites. Contents caninclude threats, racial or other slurs, <strong>and</strong> unwelcome sexualsolicitations.In March 2007 a number <strong>of</strong> organizations joined withthe U.S. Department <strong>of</strong> Justice in a public service advertisingcampaign to educate young people about cyberbullying<strong>and</strong> what they can do to prevent it. Some schools are adoptinganti-cyberbullying policies <strong>and</strong> programs.Besides potentially serious psychological trauma to victims,cyberbullying can sometimes lead victims to lash out,<strong>and</strong> in extreme cases, cyberbullying may play a role in campusshootings.Further ReadingBocij, Paul. Cyberstalking: Harassment in the Internet Age <strong>and</strong> Howto Protect Your Family. Westport, Conn.: Praeger, 2004.Bolton, Jose, <strong>and</strong> Stan Graeve, eds. No Room for Bullies: From theClassroom to Cyberspace: Teaching Respect, Stopping Abuse,<strong>and</strong> Rewarding Kindness. Boys Town, Nebr.: Boys Town Press,2005.“Cyberbullying: Identifying the Causes <strong>and</strong> Consequences <strong>of</strong>Online Harassment” [news <strong>and</strong> resources]. Available online.URL: http://www.cyberbullying.us/. Accessed September 10,2007.Cyberbullying.org. Available online. URL: http://www.cyberbullying.org/. Accessed September 10, 2007.Henderson, Harry. Internet Predators (Library in a Book). NewYork: Facts On File, 2005.Widhalm, Shelley. “New Teen Bullies.” Washington Times, September10, 2007. Available online. URL: http://washingtontimes.com/article/20070910/METRO/109100038/1004. Accessed September10, 2007.Willard, Nancy E. Cyberbullying <strong>and</strong> Cyberthreats: Responding tothe Challenge <strong>of</strong> Online Social Aggression, Threats, <strong>and</strong> Distress.Champaign, Ill.: Research Press, 2007.cyberterrorismCyberterrorism can include several types <strong>of</strong> activities:the promotion <strong>of</strong> terrorist or militant groups on the Web(including propag<strong>and</strong>a <strong>and</strong> recruitment), the coordinationor facilitation <strong>of</strong> terrorist activities, <strong>and</strong> actual attacks onWeb sites or other information infrastructure.Terrorists on the WebThere is little doubt that terrorist groups are increasinglycomputer savvy <strong>and</strong> willing to use the technology to furthertheir purposes. Many groups have Web sites that are

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!