Introduction
To begin with, cyberstalking is a kind of harassment that originates online. Today, the number of people with access to cellular phones has greatly increased. For instance, approximately 91% of Americans own cellular phones, and it is estimated that the number will rise to 95% within the next few years. Additionally, most people today have gained access to the internet as well as the World Wide Web, a platform that has highly encouraged cyberstalking. Consequently, most people have taken advantage of technological advancement and used it as a way of harassing and cyberstalking other people.
How do these technological advances enable cyberstalkers to capture and use personal information about potential victims?
As mentioned above, cyberstalking can be defined as the application and utilization of information and communication technology devices for example laptops, personal computers, personal data assistants, cell phones and generally any device that can be linked to the internet. Other gadgets that can be used include, voice recorders, cameras, and the global positioning system (Burgess & Baker, 2002).
Within the contemporary world, technology is developing at a very fast rate thus creating endless opportunities for people. The internet, for instance, can provide fast information, quick or instant answers to questions as well as limitless avenues for exploration. Additionally, social networking has made it a lot easier to link contacts through mobile devices, computers and personal data assistants. Nonetheless, technology can take people down a dark road is they do not have the proper instructions required to navigate through real-life experiences. Cyberstalkers may use emails, chat rooms in the case of social networks, discussion boards, message boards, video games, or listening devices to target their innocent victims (Basu & Jones, 2007).
Today, stalkers are using modern technology to torment and monitor their victims. Research conducted in recent years shows that one out of every four reports received is a form reporting done of cyberstalking and this may be in the form of instant messaging or threatening emails. Usually, the majority of the cyberstalkers are often men and the victim's women.
In what ways are you and/or your loved ones using such technologies that could make you vulnerable to cyber attack?
As mentioned above, there exist different kinds of technologies that are often used for cyberstalking. Among these, my friends and loved ones often use platforms such as Facebook and Twitter to share knowledge. Additionally, they can use these platforms for a human to human interaction. Often as an individual, I use social media to share my thoughts, upload videos, and photos, curate content participates in assorted lively discussions and form groups. The advantage of using these platforms is that they are built around the user, whereby the interests of the users and their social circles are of utmost importance (Alexy et.al, 2005).
Secondly, some of my friends and family who are in business often utilize these platforms to reach their target audiences through advertisements. This way, the platforms enable them to reach out to large and diverse communities. The advertisers have the option of renting the permission to interact with different kinds of people based on the goals they have for their business as well as their target markets. Additionally, they use platforms such as Facebook to find potential business partners and customers through build connections or hashtags and groups on Twitter (Spitzberg & Hoobler, 2002).
Also, regarding business, my people have utilized the internet for research purposes. In details, the social networking platform is often a great avenue for one to conduct customer research as well as identify conversations around specific terms. This way, they can understand and serve their customers better.
On a personal level, I am fond of visual content for instance illustrations, infographics, and images that capture people imaginations, hearts, and eyes. Such platforms include snapchat, Instagram and imgur. These are specifically designed to enable people to share images and photos that they feel the word should see. Using these platforms, I can curate and share unique photos from my school, or from an event I attended, or even from vacation.
More often than not, their photos spark different kinds of conversations with my peers and in the long run, speak for themselves. By sharing these photos, I believe I create inspiration for other people. The simple act of sharing a photo from a visit to the museum can inspire many people, create a bond over the same image and engage people over a common interest.
Since the creation of YouTube, millions of videos have been uploaded. This revolutionized and changed the way we create, think and watch videos. Since its inception, people have found it so much easier to access most kinds of videos on YouTube. This includes tutorials, stand-up comedy, and music videos.
YouTube has therefore enabled most of my friends to create and put together valuable and educative content and share it via YouTube, a platform that has been well optimized for streaming. The accessibility of these videos thus makes the platform one of the most widely used medium in video sharing.
Also, YouTube as a video hosting site enables creators to build informative content and share it with the rest of the world. This way, using the comment section that appears after every video, the users can participate in an active conversation where they can share their thoughts and even offer positive criticism. This also acts as a source of motivation for the video creator as he is assured that people will be able to view his content.
What changes could you make in your own and/or your loved ones' use of these technologies to enhance your and your loved ones' safety from cyberstalking?
There are several changes however that could be employed to enhance the security of loved ones and protect them from becoming victims of cyberbullying. The first tactic is to stop posting too much personal information (Ogilvie, 2000) This way, cyberstalkers may not have enough data to use on you. Secondly, one ought to conduct an internet search on his /her name regularly. This way, if any unexpected information is discovered, one can be able to report and have the content taken down before it goes viral (Reyns, 2011)
The third option is to be mindful of one's passwords. Leaving accounts logged in in other people's computers may pose a huge risk to the safety of a person, and even make them ideal victims of cyberstalking. Therefore, it is always important to be careful with passwords while ensuring you log out of your accounts on other people computers (Sheridan & Grant, 2007).
Lastly, we get emails, phone calls and text messages that ask for passwords and logging credential. If one provides passwords to unknown people, they become prone to cyberstalking. It is therefore always important to protect passwords by every mean possible
References
Alexy, E. M., Burgess, A. W., Baker, T., & Smoyak, S. A. (2005). Perceptions of cyberstalking among college students. Brief treatment and crisis intervention, 5(3), 279.
Basu, S., & Jones, R. (2007). Regulating cyberstalking. Journal of information, Law and Technology, 2(1), 1-30.
Burgess, A. W., & Baker, T. (2002). Cyberstalking. Stalking and Psychosexual Obsession: Psychological Perspectives for Prevention, Policing and Treatment, 201-219.
D'Ovidio, R., & Doyle, J. (2003). A study on Cyberstalking: Understanding Investigative Hurdles. FBI L. Enforcement Bull., 72, 10.
Ogilvie, E. (2000). Cyberstalking. Trends and Issues in Crime and Criminal Justice/Australian Institute of Criminology, (166), 1.
Reyns, B. W., Henson, B., & Fisher, B. S. (2011). Being pursued online: Applying cyberlifestyle-routine activities theory to cyberstalking victimization. Criminal Justice and Behavior, 38(11), 1149-1169.
Sheridan, L. P., & Grant, T. (2007). Is Cyberstalking Different?. Psychology, Crime & Law, 13(6), 627-640.
Spitzberg, B. H., & Hoobler, G. (2002). Cyberstalking and the Technologies of Interpersonal Terrorism. New Media & Society, 4(1), 71-92.
Cite this page
Essay Sample on Cybercrimes/Cybersecurity. (2022, Nov 19). Retrieved from https://proessays.net/essays/essay-sample-on-cybercrimes-cybersecurity
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Paper Example on John Locke's Theory of Natural Rights
- Research Paper on Psychopathy and Crimes
- Essay Sample on Violation of Human Rights
- Research Paper on The Implication of Brown Versus the Board of Education to Modern Education
- Lesser Included Offenses: Court Judgment & Reasons for Conviction - Essay Sample
- Free Report Sample on Criminal Intelligence Agency: Leveraging Math Models to Improve Decision-Making
- Essay Sample on Canadian Immigrant's Tragic Descent: Menhaz Zaman Murders Family