ABSTRACT

Introduction .................................................................................................. 161 The Stalking Law and Changes Accommodating Cyberstalking............... 162 Stalking Statistics .......................................................................................... 163 Obsessional Relationship Intrusion to Stalking Typologies ...................... 164 Cybercrime .................................................................................................... 170 Cyberstalking................................................................................................. 171 Stalking Law Legislation and the Internet .................................................. 181

The Liam Youens Case ........................................................................ 182 Uniqueness of Cyberspace............................................................................ 187 Cyberstalkers and Fantasy ............................................................................ 188

The Jeffrey Nelson Case ...................................................................... 190 Conclusion..................................................................................................... 193 Bibliography .................................................................................................. 194 Appendix 8.1: Chapter Definitions and Terminology Related

to Cyberstalking................................................................................... 201 Appendix 8.2: Internet Resource Sites Related to Stalking and

Victim Assistance Research on the Web ............................................ 203 About the Contributing Author .................................................................. 204

Cyberspace, the Global Internet System, or World Wide Web (a.k.a. cyberspace, Web, Net, or WWW) is an international system of new technology for communications in cyberspace. Not only is it profitable for private industry,

businesses, and government agencies, it has opened up the door for a new type of crime, cybercrime, which has unlimited daunting consequences on a personal and global scale. Privacy and security are vulnerable as they are easily invaded by cybercriminals, who have the capability of maliciously hacking (McClure et al., 1999) into systems and software, presenting a challenge to network managers, security professionals, and high-tech computer investigators and crime units, which are now taking a prominent place in our law enforcement agencies. Crimes such as computer hacking, fraudulent business scams, spamming, e-mail bombing, releasing destructive viruses, child pornography, pedophilia, hate crimes, and cyberstalking now abound (Deirmenjian, 1999) (see Appendix 8.1).