The Internet has put the world literally at everyone's fingertips, with a wealth of information just a mouse click away. Information that was once available only in obscure reference libraries or paper catalogs is accessible to all. Unfortunately, the Internet is an equal opportunity tool, and those with virtuous as well as nefarious intentions can use this open resource to advance their efforts to hitherto unheard of levels. The Internet is also a place of free speech that embodies the intentions of the founding fathers to allow everyone the same opportunity to express their opinions. There's an often blurring line between legitimate and illegal behavior, when harsh criticism becomes bullying, when an expression of affection becomes harassment, and how authorities distinguish between someone seeking out an old classmate to rekindle a friendship and stalks an ex-girlfriend? who rejected their overtures. Constitutional protections of free speech and regulatory specificity requirements make it difficult to criminalize inappropriate behavior. The more than four decades that have passed since the first incarnations of the Internet and the exponential growth of the previous decade have outpaced the ability of federal and state governments to protect potential victims from harm by those seeking to abuse the world wide web. The term Cyberstalker has been assigned to individuals who use the resources of the Internet to stalk, harass, prey on, intimidate, or humiliate the targets of their attention, through difficult to define and sometimes legal means (Pittaro, 2007, p.180). The legality of some aspects of the crime and the difficulty in drawing a line between harmless and unenforceable...... middle of paper ......the delineation between legitimate and illegal intent is up to the individual engaged in the activity. In attempting to criminalize behavior, courts often err on the side of liberty. There are numerous laws that seek to protect individuals from stalkers, and the translation of these laws into cyberspace is an evolving process. Works Cited Jameson, S. (2008). Cyberharassment: Balancing free speech and privacy. Commlaw Conspectus, 17, 231-266. Gordon, S., & Ford, R. (2006). On the definition and classification of cybercrime. Journal of Computer Virology, 2, 13-20.Pittaro, M. (2007). Cyberstalking: An analysis of online harassment and intimidation. International Journal of Cyber Criminology, 1(2), 180-197. Szoka, B. & Thierer, A. (2009). Cyberbullying legislation: Why education is preferable to regulation. Progress on the point, 16(12), 1-26.
tags