1
Cyberstalking, Harassment, and Bullying: Characteristics of Perpetrators of Online Abuse Cristina A. Aakre, M.A. & Kristine M. Jacquin, Ph.D. Cyberstalking Cases Introduction American College of Forensic Psychology 2019 Cyberstalkers Forensic Implications Bullying is an intentional, repeated, hostile act that is carried out over a period of time, typically involving a power disparity between the bully and the victim. Cyberstalking can be defined as repeated aggressive behavior towards another person on an online or computer-based format that makes a reasonable person fear for their safety (Finn, 2004). Cyberbullying can take multiple forms, including harassment, defamation, denigration, impersonation, exclusion, or cyberstalking (Samara et al., 2017) The internet provides a sense of anonymity for perpetrators to use in harassing victims, even though most digital input leads a trail back to the stalker. Eventually the identity of the stalker is known (Baum et al., 2009). Stalkers use the internet to collect information about their victims and to post destructive data about them, sometimes even impersonating the victim (Baum et al., 2009) Stalkers use information they have collected to cause extreme stress and destruction on the victim’s life (Baum et al., 2009) Cyber victims have been found to have low self esteem, symptoms of depression, and emotional and peer difficulties (Samara et al., 2017) Cyberstalkers choose their victims and terrorize them based on a variety of factors including age, race, gender, sexual orientation, or religious preference (Alexy, Burgess, Baker, & Smoyak, 2005). Research has shown that stalking has effects on the emotional and mental health of the victims in an offline setting (Kamphuis & Emmelkamp, 2001). Victimization rates for cyberstalking have been noted from as low as 5% to as high as 85% of the population (Alexy, Burgess, Baker, & Smoyak, 2005; Bocij, Bocij, & McFarlane, 2003). Researchers have examined attachment, violence, anger, and jealousy as possible explanations for the behaviors of cyberstalking perpetrators (Strawhun, Adams, & Huss, 2013). As the use of digital technology increased over the years so has cyberstalking. Anti-stalking laws added provisions to include electronic communication (Fraser, Olsen, Lee, Southworth, & Tucker, 2010). Stalking was prevalent before the digital age but the danger includes giving the perpetrator more tools to engage with. Cyberstalking is also much more invasive for the victim (Fraser, Olsen, Lee, Southworth, & Tucker, 2010) One in four victims report the stalker uses technology (Baum et al., 2009). Technology is an inexpensive way for stalkers to instill fear and harass their victims (Baum et al., 2009). Some technologies enable the collection of evidence while others make it hard to prove the identity of the perpetrator. This can lead harassment and stalking to continue for months before law enforcement is able to pursue action (Baum et al., 2009). Elements of stalking cases might focus on other charges without ever pursuing a stalking charge due to the complexity of some cases (Baum et al., 2009). Law enforcement has a small window of time to collect evidence in stalking cases. When taking legal action, law enforcement should look at all applicable laws that may have been broken. If stalking criteria are not met for the crime, computer crime laws may be applicable. Almost all computer crimes laws can be charged as federal crimes in the US because they can cross state lines in transmission (Baum et al., 2009). Legal protection orders may prevent perpetrators from contacting and impersonating the victim in the future (Baum et al., 2009). Many victims benefit from psychological help. More research is needed to evaluate bullying and cyberstalking of victims. Alexy, E. M., Burgess, A. W., Baker, T., & Smoyak, S. A. (2005). Perceptions of cyberstalking among college students. Brief Treatment and Crisis Intervention, 5, 279-289. Baum, K., Catalano, S., Rand, M., & Rose, K. (2009). Stalking Victimization in the United States. Bureau of Justice Statistics Special Report. NCJ 224527, 1-15. Washington, DC: U.S. Department of Justice, Office of Justice Programs. Bocij, P., Bocij, H., & McFarlane L. (2003). Cyberstalking: A case study of serial harassment in the UK. British Journal of Forensic Practice, 5, 25- 32. Drebing, H., Bailer, J., Anders, A., Wagner, H., & Gallas, C. (2014). Cyberstalking in a large sample of social network users: Prevalence, characteristics, and impact upon victims. Cyberpsychology, Behavior, and Social Networking, 17(2), 61-67. doi: 10.1089/cyber.2012.0231 Finn, J. (2004). A survey of online harassment at a university campus. Journal of Interpersonal Violence, 19, 468-483. Fraser, C., Olsen, E. , Lee, K., Southworth, C., &Tucker, S. (2010). The new age of stalking: Technological implications for stalking. Juvenile and Family Court Journal, 61, 39-55. doi:10.1111/j.1755-6988.2010.01051.x Kamphuis, J. H., & Emmelkamp P. M. (2001). Traumatic distress among support-seeking female victims of stalking. American Journal of Psychiatry,158, 795-798. Samara, M., Burbidge, V., El Asam, A., Foody, M., Smith, P., & Morsi, H. (2017). Bullying and cyberbullying: Their legal status and use in psychological assessment. International Journal of Environmental Research and Public Health, 14(12), 1449. doi:10.3390/ijerph14121449 Strawhun, J., Adams, N., & Huss, M. T., (2013). The assessment of cyberstalking: An expanded examination including social networking, attachment, jealousy, and anger in relation to violence and abuse. Violence and Victims, 28(4), 715-730. References 83% 35% 46% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Stalking Using Email Stalking Using Instant Messaging Hiding Camera to Watch Victim Stalking Using Technology, as Reported by Victims

Cyberstalking, Harassment, and Bullying: Characteristics ... · Cyberstalking, Harassment, and Bullying: Characteristics of Perpetrators of Online Abuse Cristina A. Aakre, M.A. &

  • Upload
    others

  • View
    24

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cyberstalking, Harassment, and Bullying: Characteristics ... · Cyberstalking, Harassment, and Bullying: Characteristics of Perpetrators of Online Abuse Cristina A. Aakre, M.A. &

Cyberstalking, Harassment, and Bullying: Characteristics of Perpetrators of Online Abuse

Cristina A. Aakre, M.A. & Kristine M. Jacquin, Ph.D.

Cyberstalking CasesIntroduction

American College of Forensic Psychology 2019

Cyberstalkers Forensic Implications

• Bullying is an intentional, repeated, hostile act that is carried out over a period of time, typically involving a power disparity between the bully and the victim.

• Cyberstalking can be defined as repeated aggressive behavior towards another person on an online or computer-based format that makes a reasonable person fear for their safety (Finn, 2004).

• Cyberbullying can take multiple forms, including harassment, defamation, denigration, impersonation, exclusion, or cyberstalking (Samara et al., 2017)

• The internet provides a sense of anonymity for perpetrators to use in harassing victims, even though most digital input leads a trail back to the stalker.

• Eventually the identity of the stalker is known (Baum et al., 2009).

• Stalkers use the internet to collect information about their victims and to post destructive data about them, sometimes even impersonating the victim (Baum et al., 2009)

• Stalkers use information they have collected to cause extreme stress and destruction on the victim’s life (Baum et al., 2009)

• Cyber victims have been found to have low self esteem, symptoms of depression, and emotional and peer difficulties (Samara et al., 2017)

• Cyberstalkers choose their victims and terrorize them based on a variety of factors including age, race, gender, sexual orientation, or religious preference (Alexy, Burgess, Baker, & Smoyak, 2005).

• Research has shown that stalking has effects on the emotional and mental health of the victims in an offline setting (Kamphuis & Emmelkamp, 2001).

• Victimization rates for cyberstalking have been noted from as low as 5% to as high as 85% of the population (Alexy, Burgess, Baker, & Smoyak, 2005; Bocij, Bocij, & McFarlane, 2003).

• Researchers have examined attachment, violence, anger, and jealousy as possible explanations for the behaviors of cyberstalking perpetrators (Strawhun, Adams, & Huss, 2013).

• As the use of digital technology increased over the years so has cyberstalking.

• Anti-stalking laws added provisions to include electronic communication (Fraser, Olsen, Lee, Southworth, & Tucker, 2010).

• Stalking was prevalent before the digital age but the danger includes giving the perpetrator more tools to engage with.

• Cyberstalking is also much more invasive for the victim (Fraser, Olsen, Lee, Southworth, & Tucker, 2010)

• One in four victims report the stalker uses technology (Baum et al., 2009).

• Technology is an inexpensive way for stalkers to instill fear and harass their victims (Baum et al., 2009).

• Some technologies enable the collection of evidence while others make it hard to prove the identity of the perpetrator.

• This can lead harassment and stalking to continue for months before law enforcement is able to pursue action (Baum et al., 2009).

• Elements of stalking cases might focus on other charges without ever pursuing a stalking charge due to the complexity of some cases (Baum et al., 2009).

• Law enforcement has a small window of time to collect evidence in stalking cases. When taking legal action, law enforcement should look at all applicable laws that may have been broken.

• If stalking criteria are not met for the crime, computer crime laws may be applicable.

• Almost all computer crimes laws can be charged as federal crimes in the US because they can cross state lines in transmission (Baum et al., 2009).

• Legal protection orders may prevent perpetrators from contacting and impersonating the victim in the future (Baum et al., 2009).

• Many victims benefit from psychological help.• More research is needed to evaluate bullying

and cyberstalking of victims.

Alexy, E. M., Burgess, A. W., Baker, T., & Smoyak, S. A. (2005). Perceptions of cyberstalking among college students. Brief Treatment and Crisis Intervention, 5, 279-289.

Baum, K., Catalano, S., Rand, M., & Rose, K. (2009). Stalking Victimization in the United States. Bureau of Justice Statistics Special Report. NCJ 224527, 1-15. Washington, DC: U.S. Department of Justice, Office of Justice Programs.

Bocij, P., Bocij, H., & McFarlane L. (2003). Cyberstalking: A case study of serial harassment in the UK. British Journal of Forensic Practice, 5, 25-32.

Drebing, H., Bailer, J., Anders, A., Wagner, H., & Gallas, C. (2014). Cyberstalking in a large sample of social network users: Prevalence, characteristics, and impact upon victims. Cyberpsychology, Behavior, and Social Networking, 17(2), 61-67. doi: 10.1089/cyber.2012.0231

Finn, J. (2004). A survey of online harassment at a university campus. Journal of Interpersonal Violence, 19, 468-483.

Fraser, C., Olsen, E. , Lee, K., Southworth, C., &Tucker, S. (2010). The new age of stalking: Technological implications for stalking. Juvenile and Family Court Journal, 61, 39-55. doi:10.1111/j.1755-6988.2010.01051.x

Kamphuis, J. H., & Emmelkamp P. M. (2001). Traumatic distress among support-seeking female victims of stalking. American Journal of Psychiatry,158, 795-798.

Samara, M., Burbidge, V., El Asam, A., Foody, M., Smith, P., & Morsi, H. (2017). Bullying and cyberbullying: Their legal status and use in psychological assessment. International Journal of Environmental Research and Public Health, 14(12), 1449. doi:10.3390/ijerph14121449

Strawhun, J., Adams, N., & Huss, M. T., (2013). The assessment of cyberstalking: An expanded examination including social networking, attachment, jealousy, and anger in relation to violence and abuse.Violence and Victims, 28(4), 715-730.

References

83%

35%

46%

0% 10% 20% 30% 40% 50% 60% 70% 80% 90%

StalkingUsing Email

StalkingUsing Instant

Messaging

HidingCamera to

Watch Victim

Stalking Using Technology, as Reported by Victims