This is my personal page that gets about 1 hit per day, which is when I write the entry.
(If you expect to find something great here, please move on. There's nothing here.)
No point apologizing, the damage is already done.
http://en.wikipedia.org/wiki/Cyberstalking#cite_ref-4
http://en.wikipedia.org/wiki/Cyber-bullying
From those two sources:
Stalking is a continuous process, consisting of a series of actions, each of which may be entirely legal in itself. Lambèr Royakkers writes that:
"Stalking is a form of mental assault, in which the perpetrator repeatedly, unwantedly, and disruptively breaks into the life-world of the victim, with whom he has no relationship (or no longer has), with motives that are directly or indirectly traceable to the affective sphere. Moreover, the separated acts that make up the intrusion cannot by themselves cause the mental abuse, but do taken together (cumulative effect)."[2]
CyberAngels has written about how to identify cyberstalking:
When identifying cyberstalking "in the field," and particularly when considering whether to report it to any kind of legal authority, the following features or combination of features can be considered to characterize a true stalking situation: malice, premeditation, repetition, distress, obsession, vendetta, no legitimate purpose, personally directed, disregarded warnings to stop, harassment, and threats.[3]
A number of key factors have been identified:
* False accusations. Many cyberstalkers try to damage the reputation of their victim and turn other people against them. They post false information about them on websites. They may set up their own websites, blogs or user pages for this purpose. They post allegations about the victim to newsgroups, chat rooms or other sites that allow public contributions, such as Wikipedia or Amazon.com.[4]
* Attempts to gather information about the victim. Cyberstalkers may approach their victim's friends, family and work colleagues to obtain personal information. They may advertise for information on the Internet, or hire a private detective. They often will monitor the victim's online activities and attempt to trace their IP address in an effort to gather more information about their victims. [5]
* Encouraging others to harass the victim. Many cyberstalkers try to involve third parties in the harassment. They may claim the victim has harmed the stalker or his/her family in some way, or may post the victim's name and telephone number in order to encourage others to join the pursuit.
* False victimization. The cyberstalker will claim that the victim is harassing him/her. Bocij writes that this phenomenon has been noted in a number of well-known cases.
* Attacks on data and equipment. They may try to damage the victim's computer by sending viruses.
* Ordering goods and services. They order items or subscribe to magazines in the victim's name. These often involve subscriptions to pornography or ordering sex toys then having them delivered to the victim's workplace.
* Arranging to meet. Young people face a particularly high risk of having cyberstalkers try to set up meetings between them.[6]
* Attempts to gather information about the victim. <-- teh intarwebz!
* Encouraging others to harass the victim. <-- teh blogz and teh slashdotz
* False victimization. <-- this shows that I'm doing the stalking, isn't it?
* Attacks on data and equipment. <-- this is where I lost my cool. I can't do a thing to protest online with a screwed-up boot sector, can I?
* Arranging to meet. <-- this is where I lost my patience, after much relenting and "give them one more chance".
From: http://en.wikipedia.org/wiki/Cyber-bullying
Cyber-bullying (predominantly spelled cyberbullying by many researchers) is when someone repeatedly makes fun of another person online or repeatedly picks on another person through emails or text messages, or uses online forums and postings online intended to harm, damage, humiliate or isolate another person that they don't like.[2]
The National Crime Prevention Council criterion of what constitutes cyber-bullying is "when the Internet, cell phones, or other devices are used to send or post text or images intended to hurt or embarrass another person."[3]
Cyber-bullying can be as simple as continuing to send e-mail to someone who has said they want no further contact with the sender, but it may also include threats, sexual remarks, pejorative labels (i.e., hate speech), ganging up on victims by making them the subject of ridicule in forums, and posting false statements gossip as fact aimed at humiliation.
Comparison to traditional bullying
Certain characteristics inherent in online technologies increase the likelihood that they will be exploited for deviant purposes.[4] Unlike physical bullying, electronic bullies can remain virtually anonymous using temporary email accounts, pseudonyms in chat rooms, instant messaging programs, cell-phone text messaging, and other Internet venues to mask their identity; this perhaps frees them from normative and social constraints on their behavior.
Furthermore, cyber-bullies might be emboldened when using electronic means to carry out their antagonistic agenda because it takes less energy and courage to express hurtful comments using a keypad or a keyboard than with one's voice.
Additionally, electronic forums often lack supervision. While chat hosts regularly observe the dialog in some chat rooms in an effort to police conversations and evict offensive individuals, personal messages sent between users (such as electronic mail or text messages) are viewable only by the sender and the recipient, thereby outside the regulatory reach of such authorities. In addition, when teenagers know more about computers and cellular phones than their parents or guardians, they are therefore able to operate the technologies without concern that a parent will discover their experience with bullying (whether as a victim or offender).
Another factor is the inseparability of a cellular phone from its owner, making that person a perpetual target for victimization. Users often need to keep their phone turned on for legitimate purposes, which provides the opportunity for those with malicious intentions to engage in persistent unwelcome behavior such as harassing telephone calls or threatening and insulting statements via the cellular phone's text messaging capabilities. Cyber-bullying thus penetrates the walls of a home, traditionally a place where victims could seek refuge from other forms of bullying.
One possible advantage for victims of cyber-bullying over traditional bullying is that they may sometimes be able to avoid it simply by avoiding the site/chat room in question. Email addresses and phone numbers can be changed; in addition, most e-mail accounts now offer services that will automatically filter out messages from certain senders before they even reach the inbox, and phones offer similar caller ID functions.
Unfortunately, this obviously does not protect against all forms of cyber bullying; publishing of defamatory material about a person on the internet is extremely difficult to prevent and once it is posted, millions of people can potentially download it before it is removed. Some perpetrators may post victims' photos, or victims' edited photos like defaming captions or pasting victims' faces on nude bodies. Examples of famous forums for disclosing personal data or photos to "punish" the "enemies" include the Hong Kong Golden Forum, Live Journal, and more recently JuicyCampus. Despite policies that describe cyber-bullying as a violation of the terms of service, many social networking Web sites have been used to that end.[15]
Harmful effects
Research had demonstrated a number of serious consequences of cyber-bullying victimization.[4][6][7][8] For example, victims have lower self-esteem, increased suicidal ideation, and a variety of emotional responses, cyberbullying back, being scared, frustrated, angry, and depressed.[6]
One of the most damaging effects is that a victim begins to avoid friends and activities, often the very intention of the cyber-bully.
The content and effects of ridicule in cyber-bullying messages are sometimes so strong that victims have committed suicide. There are at least four examples in the United States where cyber-bullying has been linked to the suicide of a teenager.[6] One example of suicide from being a victim of cyber-bullying is the suicide of Megan Meier.
Intimidation, emotional damage, suicide
The reluctance youth have in telling an authority figure about instances of cyber-bullying has led to fatal outcomes. At least three children between the ages of 12 and 13 have committed suicide due depression brought on by cyber-bullying, according to reports by USA Today and the Baltimore Examiner.
Lost revenue, threatened earnings, defamation
Studies are being conducted by large companies to gauge loss of revenue through malicious false postings. Cyberstalkers seek to damage their victim's earnings, employment, reputation, or safety. A 2008 High Court ruling determined that, generally speaking, slander is when a defamatory statement has been made orally without justification. Libelous statements are those that are recorded with some degree of permanence. This would include statements made by email or on online bulletin boards.[20]
Adults and the workplace
Cyber-bullying is not limited to personal attacks or children. Cyberharassment, referred to as cyberstalking when involving adults, takes place in the workplace or on company web sites, blogs or product reviews.
A survey of 1,072 workers by the Dignity and Work Partnership found that one in five had been bullied at work by e-mail and research has revealed 1 in 10 UK employees believes cyber-bullying is a problem in their workplace.[21]
Cyber-bullying also is rampant on Wikipedia entries, Amazon.com and iTunes, where product reviews along with other consumer-generated data are being more closely monitored and flagged for content that is deemed malicious and biased as these sites have become tools to cyberbully by way of malicious requests for deletion of articles, vandalism, abuse of administrative positions, and ganging up on products to post "false" reviews and vote products down.
Cyberstalkers use posts, forums, journals and other online means to present a victim in a false and unflattering light. If the cyberstalker is distressed by the content of an author's book, for example, he or she will design a cyberstalking strategy that assumes control of how the public views the book and / or diverts the author from marketing practices.[22]
False negative reviews and bully-organized vote-downs to give low popularity ratings have become a major concern for retailers, authors and publishers because they can affect credibility and potential sales.
The question of liability for harassment and character assassination is particularly salient to legislative protection since the original authors of the offending material are, more often than not, not only anonymous, but untraceable. Nevertheless, abuse should be consistently brought to company staffers' attention.
Recognition of adult and workplace cyber-bullying tactics
Common tactics used by cyberstalkers is to vandalize a search engine or encyclopedia, to threaten a victim's earnings, employment, reputation, or safety. Various companies provide Cases of cyber-stalking (involving adults) follow the pattern of repeated actions against a target. While motives vary, whether romantic, a business conflict of interest, or personal dislike, the target is commonly someone whose life the stalker sees or senses elements lacking in his or her own life. Web-based products or services leveraged against cyberstalkers in the harassment or defamation of their victims.
The source of the defamation seems to come from four types of online information purveyors: Weblogs, industry forums or boards, and commercial Web sites. Studies reveal that while some motives are personal dislike, there is often direct economic motivation by the cyberstalker, including conflict of interest, and investigations reveal the responsible party is an affiliate or supplier of a competitor, or the competitor itself.
Note these words: "to someone who has said they want no further contact with the sender,"
As the Great Nuisance said: "You dont worry about it..."
Right, I dont worry about it, I just die from it.
Sadly, Karma doesn't apply to you, only to the rest of us, isn't it?
I guess you are capable of publishing this, of course, without putting out my side of the story.
Whatever, I'm not interested in a public trial of my private life.
Case closed.
Once again, lest you use your Karmic theories, I must emphasize that this is a page that NOBODY READS, as of yet.
I'll be lucky if just *one* other person reads this page.
This is a minimal protest and you cannot found any theories of treason or fickleness or me "not being dependable" based on this entry.
Specifically, what you CANNOT claim is that I defamed you by writing this because NO ONE READS THIS PAGE.
Go on, edit out this last para and post it to the front page, you cheat.