Skip to main content

Cyber Stalking: A Socio-legal Study


P. Bociji correctly states, “The Internet is a reflection of society, including some of its darker aspects, such as crime”. Chasing and intruding on someone else’s computer or digital data make stalking a crime. Nearly a decade of prominent criminological research - concrete, concise and universally accepted definitions are still not available in this area.

Cyberstalking, like traditional offline stalking, is fueled by rage, power, control, and anger that may have been precipitated by the victim’s action or, in some cases, the victim’s inaction. Stalking incidents are increasing due to the wrongdoer’s anonymous identity. No legislation or technical assistance has been fully made practical in this area. It seems to be a unique challenge to law enforcement. Law enforcement at the local level is at a particular disadvantage as a result of jurisdictional limits.

There are many examples. One anonymous account keeps sending a woman’s posted photos personally, where the recipients were not having any kind of connections. An intention to misuse the snaps posted in their official account is completely evident. Even reported no actions taken.

In India, there is no proper legislation to tackle the above-said problems, even the Indian Penal Code did not mention stalking as an offence. Then who is the one who has the power to take up the cases, can it be only an intermediary’s liability no state nor the country have the responsibility for it?

On a surface level, stalking is explained in IPC Sec 354D where both physical and cyberstalking is included, but it only states if the offence is against a woman. We cannot categorize cyberstalking concerning the sexual orientation of a victim. No legislation had distinct theft separately for men and women then why come a man as an excluded category here.

Sec 67, 67A, 67B, 67C of Information Technology Act, 2000 came up with a new improvement on cyberstalking which punishes publishing obscene materials. Sec 66E explains voyeurism which means if the stalker uses an unauthorized way to get a certain post of the victim and posting in social media, therefore, bringing a sense of threat. But it is not at all-sufficient.

Possible Psychological explanation to stalking has been made by many experts are:

  • According to Bociji & McFarlane 2003, the stalkers suffer from de Clerambault’s syndrome, an erotomanic type of delusional disorder.

  • Other studies suggest it is a mental disorder but rather a behavioural disorder that stems from various psychopathological conditions including paranoid and delusional disorder. The problem lies in the fact that these individuals often become obsessed or infatuated with the victims.

Findings related with stalkers and recidivism state treatments to the above said the psychological problem should be addressed. Victims always seek the damages, but simply settling the problem will not cure the root cause. Prior Counselling sessions in divorce cases fixed many of the marital relations, a parallel mechanism in the cyberstalking case will make a very good preventive method from the further commission.

Negligence to file cases against cyberstalking may lead to the growing cyberstalking more prevalent. Not only that, but the stalkers also try to mobilize their actions to more grievous crimes. 

Whenever we reach to law enforcement officials for a helping hand for a remedy they always suggest preventing being a victim. Most importantly try to be more cautious when meeting with an individual online. Secure ourselves with proper preventive methods. Legislations all are in their primary stage its execution is lagging by lack of expertise. Cooperative partnership with ISPs with law enforcement officers will make a big change. For the same reason, Kerala Cyber Cell initiated an innovative idea by collaborating cyber expertise to assist law enforcement authority as Cyber dome.


Have you also become a cyber victim & needs counselling as your mental health is drained or disturbed?  

You aren’t alone! 

WORLD CYBER SECURITY FORUM is happy to help you as we possess a team of qualified psychologists who will solve all your concerns!. Please feel free to drop us a Whatsapp message on: +91 9315049547 & we promise to keep your identity safe.

By: Sara John

(Legal Intern, WCSF)


For more updates, please visit: www.worldcybersecurities.com 


Comments

Popular posts from this blog

UNESCO Guidelines on Generative AI in Schools

The advent of artificial intelligence has assumed prominence amongst all industries and various facets of people's personal lives. The integration of AI in education has been inevitable, given the significance and role of information, knowledge production and administration in the sector. This is especially so as its capabilities entail replicating higher-order thinking. Besides assisting in the education process, it also brings the element of real-life relevance, allowing education to be imparted against the backdrop of the evolving world due to the same AI. It tends to have implications on the subject matter that needs to be imparted, which tends to be something that constantly needs to answer the question of "Why and how is this particular subject matter relevant for learning?".  This induces policy-makers and educational institutions to rethink what they need to impart as knowledge, the area of matter, and the manner of thinking to be emphasised. This is because educa...

Dark Web: Safe or unsafe? Truth Revealed!

  The dark web is the part of the internet that is not visible to search engines. With the advancement in technology, digitization has resulted in different types of attacks. We can talk to anyone as long as we have an internet connection. The main concern is with privacy and anonymity in mind.  A team of computer scientists and mathematicians working for one branch of the US navy which is known as the Naval Research laboratory (NRL), developed a new technology known as Onion Routing. It allows anonymous communication where the source and destination cannot be determined by the third party. A network using the Onion Routing technique is classified as Darknet. The NRL released the Onion Routing Technique and it became The Onion Router, also known as TOR. Advantages of Dark Web  Humans are allowed to hold privacy and express their views freely. Privacy is considered to be critical for honest persons through the different criminals and stalkers.  The growing tendency of...

India's Cybersecurity Landscape: New Rules, Rising Threats, and Government Response

The recent interaction of the newly reappointed Union IT Minister with journalists has sparked significant interest within the IT Industry and among privacy enthusiasts. Ashwini Vaishnaw announced on June 15 that the MEITY will soon release the rules under the Digital Personal Data Protection (DPDP) Act, a development of immense significance for India's cybersecurity landscape. [1] 's Acts. It holds immense significance for the country, especially with the increasing number of internet users.  Of 2023 for public consultation. The rules hold immense significance for a country like India, with 751.5 million internet users at the commencement of 2024 [2] . With the continuous surge in internet usage across India, the volume of personal data shared online is also on the rise. This occurs either voluntarily, such as an individual providing personal information to a social media platform to access its services, or involuntarily, as a consequence of falling victim to a cybercrime inci...