Made with Love

Cyberstalking

Status
Not open for further replies.
Blissful said:
images


I need to watch what I eat so this is more like it.....:wink2:

you gonna eat that cute little hamster? omg
 
HOF said:
Doesn't matter had sex! and you will never get my cash!

dude I dont want your cash - even if you paid me, ten fold :biggrin2: I'd rather not be traumatized for the rest of my life :shout:
 
HoneyBee said:
dude I dont want your cash - even if you paid me, ten fold :biggrin2: I'd rather not be traumatized for the rest of my life :shout:

Dude stop traumatizing the board with your avatar! The rest of your life so you're about 94 now, how much longer do you think you'll be around?Hmmmmmm
 
HOF said:
Dude stop traumatizing the board with your avatar! The rest of your life so you're about 94 now, how much longer do you think you'll be around?Hmmmmmm

you keep getting your ass whooped and still come back for more...those are not even insults, you're too weak, I think it's time for you to crawl back in your hole POSTER BWOY
 
HoneyBee said:
you don't need bait ...stalking is your fav past time..you're well experienced, you've been doing it for years ;/Waving://


wow you get this aggressive because I question the price of mix-breed dogs.

Kinda sucks to be like that but hey it is your life.
 
papasmerf said:
wow you get this aggressive because I question the price of mix-breed dogs.

Kinda sucks to be like that but hey it is your life.

I don't see a question mark - just a rude popshot

papasmerf said:
cute puppies

but 600 bucks for a mutt seems 550 buck high


It's not your business to price my puppies. I found good homes for the last litter at $700 a pup. If you want to buy a puppy for $50 I suggest you contact someone who is selling them at that price, as opposed to repeatedly cyberstalking me.
 
HoneyBee said:
I don't see a question mark - just a rude popshot




It's not your business to price my puppies. I found good homes for the last litter at $700 a pup. If you want to buy a puppy for $50 I suggest you contact someone who is selling them at that price!

I have not got the time for a puppy but thanks for the offer
 
HoneyBee said:
you gonna eat that cute little hamster? omg

Well in some South American Countries they eat them......
BBQ Hamster Party at Madman......Guido no pasta.....
Papa bring the Scotch....HoneyBee bring the smokes....I will bring the Hamster.....:rofl!:
 
Blissful said:
Well in some South American Countries they eat them......
BBQ Hamster Party at Madman......Guido no pasta.....
Papa bring the Scotch....HoneyBee bring the smokes....I will bring the Hamster.....:rofl!:


thank god..............I was afraid you were going to cook the hamster Madman and Peace share
 
papasmerf said:
I have not got the time for a puppy but thanks for the offer

HoneyBee said:
I don't see a question mark - just a rude popshot

It's not your business to price my puppies. I found good homes for the last litter at $700 a pup. If you want to buy a puppy for $50 I suggest you contact someone who is selling them at that price, as opposed to repeatedly cyberstalking me.

unless as you are as dumb-fuck as you are making yourself sound ; I DID NOT OFFER YOU A PUPPY

Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include the making of false accusations or statements of fact (as in defamation), monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information that may be used to harass. The definition of "harassment" must meet the criterion that a reasonable person, in possession of the same information, would regard it as sufficient to cause another reasonable person distress.[SUP][1][/SUP] Cyberstalking is different from spatial or offline stalking in that it occurs through the use of electronic communications technology such as the internet. However, it sometimes leads to it, or is accompanied by it.[SUP][2][/SUP] Both are criminal offenses.[SUP][3][/SUP] Cyberstalking shares important characteristics with offline stalking. Many stalkers - online or off - are motivated by a desire to control their victims.[SUP][4][/SUP]
A cyberstalker may be an online stranger or a person whom the target knows. A cyberstalker may be anonymous and may solicit involvement of other people online who do not even know the target.
Cyberstalking is a criminal offenses that comes into play under state anti-stalking laws, slander laws, and harassment laws. A cyberstalking conviction can result in a restraining order, probation, or even criminal penalties against the assailant, including jail.
Definitions

Further information: Stalking
Stalking is a continuous process, consisting of a series of actions, each of which may be entirely legal in itself. Technology ethics professor Lambèr Royakkers writes that:
"Stalking is a form of mental assault, in which the perpetrator repeatedly, unwantedly, and disruptively breaks into the life-world of the victim, with whom he has no relationship (or no longer has), with motives that are directly or indirectly traceable to the affective sphere. Moreover, the separated acts that make up the intrusion cannot by themselves cause the mental abuse, but do taken together (cumulative effect)."[SUP][5][/SUP]
CyberAngels has written about how to identify cyberstalking:
When identifying cyberstalking "in the field," and particularly when considering whether to report it to any kind of legal authority, the following features or combination of features can be considered to characterize a true stalking situation: malice, premeditation, repetition, distress, obsession, vendetta, no legitimate purpose, personally directed, disregarded warnings to stop, harassment, and threats.[SUP][6][/SUP]
A number of key factors have been identified:


  • False accusations. Many cyberstalkers try to damage the reputation of their victim and turn other people against them. They post false information about them on websites. They may set up their own websites, blogs or user pages for this purpose. They post allegations about the victim to newsgroups, chat rooms or other sites that allow public contributions, such as Wikipedia or Amazon.com.[SUP][7][/SUP]
  • Attempts to gather information about the victim. Cyberstalkers may approach their victim's friends, family and work colleagues to obtain personal information. They may advertise for information on the Internet, or hire a private detective.
  • Monitoring their target's online activities and attempting to trace their IP address in an effort to gather more information about their victims. [SUP][8][/SUP]
  • Encouraging others to harass the victim. Many cyberstalkers try to involve third parties in the harassment. They may claim the victim has harmed the stalker or his/her family in some way, or may post the victim's name and telephone number in order to encourage others to join the pursuit.
  • False victimization. The cyberstalker will claim that the victim is harassing him/her. Bocij writes that this phenomenon has been noted in a number of well-known cases.
  • Attacks on data and equipment. They may try to damage the victim's computer by sending viruses.
  • Ordering goods and services. They order items or subscribe to magazines in the victim's name. These often involve subscriptions to pornography or ordering sex toys then having them delivered to the victim's workplace.
  • Arranging to meet. Young people face a particularly high risk of having cyberstalkers try to set up meetings between them.[SUP][9][/SUP]


Cyberstalking is a form of cyberbullying.
Further information: Cyberbullying
Motives

Mental profiling of digital criminals has identified factors that motivate stalkers as: envy; pathological obsession (professional or sexual); unemployment or failure with own job or life; intention to intimidate and cause others to feel inferior; the stalker is delusional and believes he/she "knows" the target; the stalker wants to instill fear in a person to justify his/her status; belief they can get away with it (anonymity); intimidation for financial advantage or business competition; revenge over perceived or imagined rejection.[SUP][10][/SUP][SUP][11][/SUP]
Types

Of women

Harassment and stalking of women online is common, and can include rape threats and other threats of violence, as well as the posting of women's personal information. It is blamed for limiting victims' activities online or driving them offline entirely, thereby impeding their participation in online life and undermining their autonomy, dignity, identity and opportunities.[SUP][12][/SUP]
Of intimate partners

Cyberstalking of intimate partners is the online harassment of a current or former romantic partner. It is a form of domestic violence, and experts say its purpose is to control the victim in order to encourage social isolation and create dependency. Harassers may send repeated insulting or threatening e-mails to their victims, monitor or disrupt their victims' e-mail use, and use the victim's account to send e-mails to others posing as the victim or to purchase good or services the victim doesn't want. They may also use the internet to research and compile personal information about the victim, to use in order to harass her.[SUP][13][/SUP]
Of celebrities and public persons

Profiling of stalkers shows that almost always they stalk someone they know or, via delusion, think they know, as is the case with stalkers of celebrities or public persons in which the stalkers feel they know the celebrity even though the celebrity doesn't know them.[SUP][14][/SUP] As part of the risk they take for being in the public eye, celebrities and public figures are often targets of lies or made-up stories in tabloids as well as by stalkers, some even seeming to be fans. In one noted case in 2011, actress Patricia Arquette quit Facebook after alleged cyberstalking. In her last post, Arquette explained that her security guys chewed her out and warned her Facebook friends to never accept friend requests from people they do not actually know. Arquette stressed the importance of differentiating that just because people were on her page or seemed to be friends or fans did not really mean they were safe. "I'm going to say it again because it is important," the actress wrote about persons on her page, "it doesn't mean they are safe." The media issued a statement that Arquette planned to communicate with fans exclusively through her Twitter account in the future.[SUP][15][/SUP]
By anonymous online mobs

Web 2.0 technologies have enabled online groups of anonymous people to self-organize to target individuals with online defamation, threats of violence and technology-based attacks. These include publishing lies and doctored photographs, threats of rape and other violence, posting sensitive personal information about victims, e-mailing damaging statements about victims to their employers, and manipulating search engines to make damaging material about the victim more prominent. Victims are often women and minorities.[SUP][citation needed][/SUP] They frequently respond by adopting pseudonyms or going offline entirely.[SUP][16][/SUP] A notable example of online mob harassment was the experience of American software developer and blogger Kathy Sierra. In 2007, a group of anonymous individuals attacked Sierra, threatening her with rape and strangulation, publishing her home address and Social Security number, and posting doctored photographs of her. Frightened, Sierra cancelled her speaking engagements and shut down her blog, writing “I will never feel the same. I will never be the same.”[SUP][17][/SUP]
Experts attribute the destructive nature of anonymous online mobs to group dynamics, saying that groups with homogeneous views tend to become more extreme as members reinforce each other's beliefs, they fail to see themselves as individuals, so they lose a sense of personal responsibility for their destructive acts, they dehumanize their victims, which makes them more willing to behave destructively, and they become more aggressive when they believe they are supported by authority figures. Internet service providers and website owners are sometimes blamed for not speaking out against this type of harassment.[SUP][18][/SUP]
Corporate cyberstalking

Corporate cyberstalking is when a company harasses an individual online, or an individual or group of individuals harasses an organization. Motives for corporate cyberstalking are ideological, or include a desire for financial gain or revenge.[SUP][19][/SUP]
Perpetrators

Profile

Preliminary work by Leroy McFarlane and Paul Bocij has identified four types of cyberstalkers: the vindictive cyberstalkers noted for the ferocity of their attacks; the composed cyberstalker whose motive is to annoy; the intimate cyberstalker who attempts to form a relationship with the victim but turns on them if rebuffed; and collective cyberstalkers, groups with motive.[SUP][20][/SUP] According to Antonio Chacón Medina, author of Una nueva cara de Internet, El acoso ("A new face of the Internet: stalking"), the general profile of the harasser is cold, with little or no respect for others. The stalker is a predator who can wait patiently until vulnerable victims appear, such as women or children, or may enjoy pursuing a particular person, whether personally familiar to them or unknown. The harasser enjoys and demonstrates their power to pursue and psychologically damage the victim.[SUP][21][/SUP]
Behaviors

Cyberstalkers find their victims by using search engines, online forums, bulletin and discussion boards, chat rooms, and more recently, through social networking sites,[SUP][22][/SUP] such as MySpace, Facebook, Bebo, Friendster, Twitter, and Indymedia, a media outlet known for self-publishing. They may engage in live chat harassment or flaming or they may send electronic viruses and unsolicited e-mails.[SUP][23][/SUP] Cyberstalkers may research individuals to feed their obsessions and curiosity. Conversely, the acts of cyberstalkers may become more intense, such as repeatedly instant messaging their targets.[SUP][24][/SUP]
More commonly they will post defamatory or derogatory statements about their stalking target on web pages, message boards and in guest books designed to get a reaction or response from their victim, thereby initiating contact.[SUP][23][/SUP] In some cases, they have been known to create fake blogs in the name of the victim containing defamatory or pornographic content.

When prosecuted, many stalkers have unsuccessfully attempted to justify their behavior based on their use of public forums, as opposed to direct contact. Once they get a reaction from the victim, they will typically attempt to track or follow the victim's internet activity. Classic cyberstalking behavior includes the tracing of the victim's IP address in an attempt to verify their home or place of employment.[SUP][23][/SUP]
Some cyberstalking situations do evolve into physical stalking, and a victim may experience abusive and excessive phone calls, vandalism, threatening or obscene mail, trespassing, and physical assault.
[SUP][23][/SUP] Moreover, many physical stalkers will use cyberstalking as another method of harassing their victims.
 
I think PapaS is too smart to ever pay over a couple of hundred bucks for a mixed breed!:wink2:
 
papasmerf said:
thank god..............I was afraid you were going to cook the hamster Madman and Peace share

I do but they do not know what they are eating....Shhhh don't tell them....they are cheap and multiply
quickly....:-Cool/"
 
awesome...dont need a pair of reading glases!

HoneyBee said:
unless as you are as dumb-fuck as you are making yourself sound ; I DID NOT OFFER YOU A PUPPY

Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include the making of false accusations or statements of fact (as in defamation), monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information that may be used to harass. The definition of "harassment" must meet the criterion that a reasonable person, in possession of the same information, would regard it as sufficient to cause another reasonable person distress.[SUP][1][/SUP] Cyberstalking is different from spatial or offline stalking in that it occurs through the use of electronic communications technology such as the internet. However, it sometimes leads to it, or is accompanied by it.[SUP][2][/SUP] Both are criminal offenses.[SUP][3][/SUP] Cyberstalking shares important characteristics with offline stalking. Many stalkers - online or off - are motivated by a desire to control their victims.[SUP][4][/SUP]
A cyberstalker may be an online stranger or a person whom the target knows. A cyberstalker may be anonymous and may solicit involvement of other people online who do not even know the target.
Cyberstalking is a criminal offenses that comes into play under state anti-stalking laws, slander laws, and harassment laws. A cyberstalking conviction can result in a restraining order, probation, or even criminal penalties against the assailant, including jail.
Definitions

Further information: Stalking
Stalking is a continuous process, consisting of a series of actions, each of which may be entirely legal in itself. Technology ethics professor Lambèr Royakkers writes that:
"Stalking is a form of mental assault, in which the perpetrator repeatedly, unwantedly, and disruptively breaks into the life-world of the victim, with whom he has no relationship (or no longer has), with motives that are directly or indirectly traceable to the affective sphere. Moreover, the separated acts that make up the intrusion cannot by themselves cause the mental abuse, but do taken together (cumulative effect)."[SUP][5][/SUP]
CyberAngels has written about how to identify cyberstalking:
When identifying cyberstalking "in the field," and particularly when considering whether to report it to any kind of legal authority, the following features or combination of features can be considered to characterize a true stalking situation: malice, premeditation, repetition, distress, obsession, vendetta, no legitimate purpose, personally directed, disregarded warnings to stop, harassment, and threats.[SUP][6][/SUP]
A number of key factors have been identified:


  • False accusations. Many cyberstalkers try to damage the reputation of their victim and turn other people against them. They post false information about them on websites. They may set up their own websites, blogs or user pages for this purpose. They post allegations about the victim to newsgroups, chat rooms or other sites that allow public contributions, such as Wikipedia or Amazon.com.[SUP][7][/SUP]
  • Attempts to gather information about the victim. Cyberstalkers may approach their victim's friends, family and work colleagues to obtain personal information. They may advertise for information on the Internet, or hire a private detective.
  • Monitoring their target's online activities and attempting to trace their IP address in an effort to gather more information about their victims. [SUP][8][/SUP]
  • Encouraging others to harass the victim. Many cyberstalkers try to involve third parties in the harassment. They may claim the victim has harmed the stalker or his/her family in some way, or may post the victim's name and telephone number in order to encourage others to join the pursuit.
  • False victimization. The cyberstalker will claim that the victim is harassing him/her. Bocij writes that this phenomenon has been noted in a number of well-known cases.
  • Attacks on data and equipment. They may try to damage the victim's computer by sending viruses.
  • Ordering goods and services. They order items or subscribe to magazines in the victim's name. These often involve subscriptions to pornography or ordering sex toys then having them delivered to the victim's workplace.
  • Arranging to meet. Young people face a particularly high risk of having cyberstalkers try to set up meetings between them.[SUP][9][/SUP]


Cyberstalking is a form of cyberbullying.
Further information: Cyberbullying
Motives

Mental profiling of digital criminals has identified factors that motivate stalkers as: envy; pathological obsession (professional or sexual); unemployment or failure with own job or life; intention to intimidate and cause others to feel inferior; the stalker is delusional and believes he/she "knows" the target; the stalker wants to instill fear in a person to justify his/her status; belief they can get away with it (anonymity); intimidation for financial advantage or business competition; revenge over perceived or imagined rejection.[SUP][10][/SUP][SUP][11][/SUP]
Types

Of women

Harassment and stalking of women online is common, and can include rape threats and other threats of violence, as well as the posting of women's personal information. It is blamed for limiting victims' activities online or driving them offline entirely, thereby impeding their participation in online life and undermining their autonomy, dignity, identity and opportunities.[SUP][12][/SUP]
Of intimate partners

Cyberstalking of intimate partners is the online harassment of a current or former romantic partner. It is a form of domestic violence, and experts say its purpose is to control the victim in order to encourage social isolation and create dependency. Harassers may send repeated insulting or threatening e-mails to their victims, monitor or disrupt their victims' e-mail use, and use the victim's account to send e-mails to others posing as the victim or to purchase good or services the victim doesn't want. They may also use the internet to research and compile personal information about the victim, to use in order to harass her.[SUP][13][/SUP]
Of celebrities and public persons

Profiling of stalkers shows that almost always they stalk someone they know or, via delusion, think they know, as is the case with stalkers of celebrities or public persons in which the stalkers feel they know the celebrity even though the celebrity doesn't know them.[SUP][14][/SUP] As part of the risk they take for being in the public eye, celebrities and public figures are often targets of lies or made-up stories in tabloids as well as by stalkers, some even seeming to be fans. In one noted case in 2011, actress Patricia Arquette quit Facebook after alleged cyberstalking. In her last post, Arquette explained that her security guys chewed her out and warned her Facebook friends to never accept friend requests from people they do not actually know. Arquette stressed the importance of differentiating that just because people were on her page or seemed to be friends or fans did not really mean they were safe. "I'm going to say it again because it is important," the actress wrote about persons on her page, "it doesn't mean they are safe." The media issued a statement that Arquette planned to communicate with fans exclusively through her Twitter account in the future.[SUP][15][/SUP]
By anonymous online mobs

Web 2.0 technologies have enabled online groups of anonymous people to self-organize to target individuals with online defamation, threats of violence and technology-based attacks. These include publishing lies and doctored photographs, threats of rape and other violence, posting sensitive personal information about victims, e-mailing damaging statements about victims to their employers, and manipulating search engines to make damaging material about the victim more prominent. Victims are often women and minorities.[SUP][citation needed][/SUP] They frequently respond by adopting pseudonyms or going offline entirely.[SUP][16][/SUP] A notable example of online mob harassment was the experience of American software developer and blogger Kathy Sierra. In 2007, a group of anonymous individuals attacked Sierra, threatening her with rape and strangulation, publishing her home address and Social Security number, and posting doctored photographs of her. Frightened, Sierra cancelled her speaking engagements and shut down her blog, writing “I will never feel the same. I will never be the same.”[SUP][17][/SUP]
Experts attribute the destructive nature of anonymous online mobs to group dynamics, saying that groups with homogeneous views tend to become more extreme as members reinforce each other's beliefs, they fail to see themselves as individuals, so they lose a sense of personal responsibility for their destructive acts, they dehumanize their victims, which makes them more willing to behave destructively, and they become more aggressive when they believe they are supported by authority figures. Internet service providers and website owners are sometimes blamed for not speaking out against this type of harassment.[SUP][18][/SUP]
Corporate cyberstalking

Corporate cyberstalking is when a company harasses an individual online, or an individual or group of individuals harasses an organization. Motives for corporate cyberstalking are ideological, or include a desire for financial gain or revenge.[SUP][19][/SUP]
Perpetrators

Profile

Preliminary work by Leroy McFarlane and Paul Bocij has identified four types of cyberstalkers: the vindictive cyberstalkers noted for the ferocity of their attacks; the composed cyberstalker whose motive is to annoy; the intimate cyberstalker who attempts to form a relationship with the victim but turns on them if rebuffed; and collective cyberstalkers, groups with motive.[SUP][20][/SUP] According to Antonio Chacón Medina, author of Una nueva cara de Internet, El acoso ("A new face of the Internet: stalking"), the general profile of the harasser is cold, with little or no respect for others. The stalker is a predator who can wait patiently until vulnerable victims appear, such as women or children, or may enjoy pursuing a particular person, whether personally familiar to them or unknown. The harasser enjoys and demonstrates their power to pursue and psychologically damage the victim.[SUP][21][/SUP]
Behaviors

Cyberstalkers find their victims by using search engines, online forums, bulletin and discussion boards, chat rooms, and more recently, through social networking sites,[SUP][22][/SUP] such as MySpace, Facebook, Bebo, Friendster, Twitter, and Indymedia, a media outlet known for self-publishing. They may engage in live chat harassment or flaming or they may send electronic viruses and unsolicited e-mails.[SUP][23][/SUP] Cyberstalkers may research individuals to feed their obsessions and curiosity. Conversely, the acts of cyberstalkers may become more intense, such as repeatedly instant messaging their targets.[SUP][24][/SUP]
More commonly they will post defamatory or derogatory statements about their stalking target on web pages, message boards and in guest books designed to get a reaction or response from their victim, thereby initiating contact.[SUP][23][/SUP] In some cases, they have been known to create fake blogs in the name of the victim containing defamatory or pornographic content.

When prosecuted, many stalkers have unsuccessfully attempted to justify their behavior based on their use of public forums, as opposed to direct contact. Once they get a reaction from the victim, they will typically attempt to track or follow the victim's internet activity. Classic cyberstalking behavior includes the tracing of the victim's IP address in an attempt to verify their home or place of employment.[SUP][23][/SUP]
Some cyberstalking situations do evolve into physical stalking, and a victim may experience abusive and excessive phone calls, vandalism, threatening or obscene mail, trespassing, and physical assault.
[SUP][23][/SUP] Moreover, many physical stalkers will use cyberstalking as another method of harassing their victims.
 
Status
Not open for further replies.
Back
Top Bottom