- A number of key factors have been identified in cyberstalking:
Attempts to gather information about the victim. Cyberstalkers may approach their victim's friends, family and work colleagues to obtain personal information. They may advertise for information on the Internet, or hire a private detective.
Monitoring their target's online activities and attempting to trace their IP address in an effort to gather more information about their victims.
Encouraging others to harass the victim. Many cyberstalkers try to involve third parties in the harassment. They may claim the victim has harmed the stalker or his/her family in some way, or may post the victim's name and telephone number in order to encourage others to join the pursuit.
False victimization. The cyberstalker will claim that the victim is harassing him or her. Bocij writes that this phenomenon has been noted in a number of well-known cases.
The posting of defamatory or derogatory statements. Using web pages and message boards to incite some response or reaction from their victim.
Leave a comment