Küberjälgimine: erinevus redaktsioonide vahel

Eemaldatud sisu Lisatud sisu
Saaremees (arutelu | kaastöö)
Resümee puudub
Saaremees (arutelu | kaastöö)
Resümee puudub
8. rida:
Jälitamine on pidev protsess, mis koosneb reast toimingutest, millest igaüks võib olla iseenesest täiesti seaduslik. Tehnoloogiaeetika professor Lambèr Royakkers määratleb küberjälgimise kellegi poolt, kellel pole ohvriga praegust suhet. Küberjälgimise kuritahtliku mõju kohta kirjutab ta, et:
<blockquote> Jälitamine on vaimse rünnaku vorm, kus vägivallatseja tungib korduvalt, soovimatult ja häirivalt ohvri elumaailma, kellega tal pole suhteid (või enam pole), motiividega, mis otseselt või kaudselt viivad mõjusfääri. Pealetükkivuse moodustavad eraldiseisvad toimingud iseenesest ei põhjustada vaimset väärkohtlemist, aga teevad seda koos (kumulatiivne mõju).
 
=== Identifitseerimine ja tuvastamine ===
[[CyberAngels]] on kirjutanud, kuidas tuvastada küberjälgimist:
 
<blockquote>Küberjälgimise tuvastamisel ja kaaludes, kas teatada sellest mis tahes õigusasutusele, võib tõelise küberjälitamise olukorra iseloomustamiseks pidada järgmisi funktsioone või funktsioonide kombinatsiooni: [[:wikt:malice|malice]], premeditation, repetition, [[Distress (medicine)|distress]], [[Fixation (psychology)|obsession]], [[Feud|vendetta]], no legitimate purpose, personally directed, disregarded warnings to stop, [[harassment]] and [[threats]].</blockquote>
 
A number of key factors have been identified in cyberstalking:
{{expand list|date=June 2014}}
* [[False accusations]]: Many cyberstalkers try to damage the reputation of their victim and turn other people against them. They post false information about them on websites. They may set up their own websites, blogs or user pages for this purpose. They post allegations about the victim to newsgroups, chat rooms, or other sites that allow public contributions such as Wikipedia or [[Amazon.com]].<ref>{{cite web |url=http://www.jahitchcock.com/cyberstalked/skippress.htm |title=Fighting Cyberstalking |publisher=ComputerEdge Online |author=Skip Press |access-date=2013-11-29 |archive-url=https://web.archive.org/web/20121028014650/http://www.jahitchcock.com/cyberstalked/skippress.htm |archive-date=October 28, 2012 |url-status=live}}</ref>
* Attempts to gather information about the victim: Cyberstalkers may approach their victim's friends, family and work colleagues to obtain personal information. They may advertise for information on the Internet, or hire a private detective.<ref>{{cite web|title=Violence & Domestic Abuse - Stalking |url=http://www.thewomenscenter.org/content.asp?contentid=555 |publisher=The Women's Center |access-date=2013-12-10 |url-status=dead |archive-url=https://web.archive.org/web/20131213210301/http://www.thewomenscenter.org/content.asp?contentid=555 |archive-date=2013-12-13 }}</ref>
* Monitoring their target's online activities and attempting to trace their [[IP address]] in an effort to gather more information about their victims.<ref>{{cite journal |url=http://firstmonday.org/ojs/index.php/fm/article/view/1076 |title=An exploration of predatory behavior in cyberspace: Towards a typology of cyberstalkers |journal=First Monday |author1=Leroy McFarlane |author2=Paul Bocij |volume=8 |issue=9 |date=2003-09-01 |access-date=2013-11-29 |doi=10.5210/fm.v8i9.1076}}</ref>
* Encouraging others to harass the victim: Many cyberstalkers try to involve third parties in the harassment. They may claim the victim has harmed the stalker or his/her family in some way, or may post the victim's name and telephone number in order to encourage others to join the pursuit.
* [[False victimization]]: The cyberstalker will claim that the victim is harassing him or her. Bocij writes that this phenomenon has been noted in a number of well-known cases.<ref name="Bocij2004">{{cite book|last=Bocij|first=Paul|title=Cyberstalking: Harassment in the Internet Age and how to Protect Your Family|url=https://books.google.com/books?id=q8NZLBE0sm0C&pg=PA12|year=2004|publisher=Greenwood Publishing Group|isbn=978-0-275-98118-1|pages=12–13}}</ref>
* Attacks on data and equipment: They may try to damage the victim's computer by sending [[Computer virus|viruses]].
* Ordering goods and services: They order items or subscribe to magazines in the victim's name. These often involve subscriptions to [[pornography]] or ordering sex toys then having them delivered to the victim's workplace.
* Arranging to meet: Young people face a particularly high risk of having cyberstalkers try to set up meetings between them.<ref name="Bocij2004"/>
* The posting of defamatory or derogatory statements: Using web pages and message boards to incite some response or reaction from their victim.<ref>{{cite book|url=https://books.google.com/books?id=n20iKDP88kQC&q=A+number+of+key+factors+have+been+identified+in+cyberstalking:&pg=PA46|title=Bash the Stock Bashers!|first=John E.|last=Lux|date=25 July 2010|publisher=Eagle Point Publishing|access-date=1 May 2017|via=Google Books|isbn=9781450728218}}</ref>