Journal article Open Access

Cyber Stalking Threat to People or Bane to Technology

H. M. Shambhavee


MARC21 XML Export

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nam##2200000uu#4500</leader>
  <datafield tag="041" ind1=" " ind2=" ">
    <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">Law and management</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">Cyber-Stalking</subfield>
  </datafield>
  <controlfield tag="005">20200120152618.0</controlfield>
  <controlfield tag="001">3580166</controlfield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">888991</subfield>
    <subfield code="z">md5:f5d25046aadd160a5a2f8852e47b0929</subfield>
    <subfield code="u">https://zenodo.org/record/3580166/files/67 Cyber-Stalking Threat to People or Bane to Technology.pdf</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2019-02-27</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="p">openaire</subfield>
    <subfield code="o">oai:zenodo.org:3580166</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="4">
    <subfield code="c">350-355</subfield>
    <subfield code="n">2</subfield>
    <subfield code="p">International Journal of Trend in Scientific Research and Development</subfield>
    <subfield code="v">3</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="a">H. M. Shambhavee</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">Cyber Stalking Threat to People or Bane to Technology</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u">https://creativecommons.org/licenses/by/4.0/legalcode</subfield>
    <subfield code="a">Creative Commons Attribution 4.0 International</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="a">cc-by</subfield>
    <subfield code="2">opendefinition.org</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">&lt;p&gt;A day without the use of technology in our lives seems like an impossible mission. We have become entirely dependent on it in divergent ways. Technology has helped us in creating great ideas that we can communicate with people present anywhere on this earth. Apart from the fact that technology has made our lives easy, it also bought in a lot of difficulties. With the massive advancement of technology along with the evolution of time, the crime rate of cyber offences keeps increasing every day. One such cyber assault that requires immediate attention is cyber stalking. Cyber stalking involves continuous or persistent following of a person through electronic media with or without the person&amp;#39;s consent. Cyber stalking, unlike the offline stalking, is severe as the identity of the perpetrator is unknown and geographical proximity is no barrier. The severity of cyber talking has increased in the recent times as the current generation is found all the time surfing on their phones or laptops and being busy with social networking media like Facebook, Instagram, Whatsapp and many more. The reason why one may become a cyber stalker can be because of revenge, obsession, sadism, denial, insult and many more. The post effects of cyber stalking to a victim can be psychologically overwhelming that there are cases where the victims have committed suicide being incapable of coping with the psychological and emotional stress. Cyber stalking can be used to blackmail victims as well. It can also include morphing of the victim&amp;#39;s image with nude pictures and posting it on public and social websites thus destroying the reputation and dignity of the victim. One of the highly disadvantageous facts in cyber offences is that once such obscene picture of the victim is posted, the post gets shared to more and more people. Therefore even if the perpetrator is found and the origin where the obscene pictures were posted is deleted, it is difficult to find all places where the post has been shared. Thus it&amp;#39;s high time that more emphasis is laid on introducing effective and efficient laws in field of newly formed cyber offences such as cyber stalking. H. M. Shambhavee &amp;quot;Cyber-Stalking: Threat to People or Bane to Technology&amp;quot; Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21354.pdf&lt;/p&gt;</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.31142/ijtsrd21354</subfield>
    <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">article</subfield>
  </datafield>
</record>
59
44
views
downloads
Views 59
Downloads 44
Data volume 39.1 MB
Unique views 54
Unique downloads 43

Share

Cite as