Professional Documents
Culture Documents
“Comparative Analysis of Legal Approaches to Cyberstalking and Online Harassment: India, the US, and
the UK”
Review of Literature
Objectives:
The objectives of this research paper are :
to carry out a comparative legal examination of the methods used by the US, UK, and
India to define and control online harassment and cyberstalking, with an emphasis on
finding differences and similarities in their respective legal systems.
to assess and contrast, taking into account the efficacy, efficiency, and resources
allotted to these initiatives, the reporting procedures and the law enforcement reaction
to cyberstalking and online harassment in each jurisdiction.
To analyze the legal defenses that people accused of cyberstalking and online
harassment can employ in India, the US, and the UK, emphasizing the variations and
convergences in legal safeguards and procedural protections.
To evaluate the legal ramifications for offenders and their implications for deterrence,
as well as the differences and similarities between the sentencing guidelines and
punishments for cyberstalking and online harassment in different jurisdictions.
to evaluate the victim support programs offered in each jurisdiction, taking into
account safety and privacy precautions for victims, in order to determine the level and
suitability of the help offered.
To examine the extent of global collaboration in tackling incidents of cross-border
cyberstalking and online harassment, as well as the effects of recent legislative
advancements, such as modifications, overhauls, and new advances.
To offer a thorough comparative study of the legal systems in the US, UK, and India,
highlighting similarities and differences in legal definitions, enforcement procedures,
legal defenses, punishments, and victim assistance.
Hypothesis
The hypothesis claims that disparities in legal definitions, enforcement procedures, and
victim support systems pertaining to cyberstalking and online harassment throughout India,
the United States, and the United Kingdom would lead to varying degrees of efficacy in
tackling these transgressions. The aforementioned inconsistencies will be evident in the form
of discrepancies in the prosecution, legal handling, and prevention of cyberstalking and
online harassment. This underscores the importance of international collaboration and the
alignment of legal approaches to successfully address these issues in the era of digital
technology.
Research Questions
This research paper's research questions are as follows:
What are the fundamental disparities in the legal definitions and frameworks
pertaining to cyberstalking and online harassment in India, the United States, and the
United Kingdom?
In what ways do the efficaciousness and resource availability of procedures for
reporting and law enforcement responses to cyberstalking and online harassment
differ among jurisdictions?
What legal defenses are available for those accused of online harassment and
cyberstalking, and how do they vary or match amongst different nations?
What are the differences and similarities among the sentencing guidelines and
sanctions for cyberstalking and online harassment in the US, UK, and India, and how
do they affect the deterrent effect?
How different are these countries' victim assistance programs and privacy laws from
one another, and how effective are these programs for victims?
What effect does international collaboration have on the management of international
cases involving cyberstalking and online harassment, and how are these cases
affected by current legal developments?
In what ways may legal frameworks and remedies be strengthened to more efficiently
tackle the issues of cyberstalking and online harassment?
Methodology
The methodology employed in this study is doing a comparative legal analysis of the
measures taken to address the issues of cyberstalking and online harassment in India, the
United States, and the United Kingdom. The analysis will involve the examination of
primary sources, which encompass legal documents, legislation, case law, and government
reports. Additionally, secondary sources such as academic papers and reports will be
considered. The research methodology used for this study is qualitative content analysis,
which will be utilized to discern differences and similarities in legal definitions, enforcement
procedures, legal defenses, punishments, and victim support systems. The analysis will be
guided by a comparative perspective, while ethical issues will be duly respected. The
research will culminate in providing suggestions for enhancing legal frameworks and
promoting international cooperation in tackling these digital transgressions.
Introduction
The internet's inherent lack of borders has enabled these transgressions to transcend physical
boundaries, frequently spanning across many nations. As a result, the emergence of this
problem has generated the need for global cooperation in tackling the complex array of
obstacles presented by cyberstalking and online harassment. Hence, the primary objective of
this study is to examine and contrast the legal structures of India, the United States, and the
United Kingdom in relation to this significant matter. The intention is to identify the
divergences and similarities in the legal strategies employed by these jurisdictions 2.
The research has relevance not alone in its potential to enhance comprehension of legal
reactions to cyberstalking and online harassment, but also in its capacity to shed light on the
necessity for international collaboration and harmonization in tackling these digital
transgressions. The findings of this research have significant consequences for the protection
of individual rights, the promotion of justice, and the establishment of legal frameworks that
can adequately address the complex issues associated with digital harassment. The primary
objective of this project is to contribute to global initiatives in safeguarding persons,
mitigating digital abuse, and ensuring accountability for cyberstalking and online harassment.
This will be achieved by an analysis of how different legal systems address a common
1
Shambhavee, H. M. "Cyber-Stalking: Threat to People or Bane to Technology." Int. J. Trend Sci. Res. Dev 3
(2019): 350-355
2
Cassie Cox, Protecting Victims of Cyberstalking, Cyberharassment, and Online Impersonation through
Prosecutions and Effective Laws, 54 Jurimetrics 277 (2014), http://www.jstor.org/stable/24395601.
challenge in the context of the digital era
Different types of cyberstalking
Email stalking;
Internet stalking;
Computer stalking.
Email Stalking
The act of email stalking refers to the persistent and intrusive monitoring of an individual's
electronic communications, namely through the unauthorized access and surveillance
Similar to other types of stalking, such as making phone calls, sending letters, and engaging
in physical surveillance, the prevalence of email stalking has increased in the physical realm.
In contrast, cyberstalking can manifest in several manifestations. Unsolicited electronic mail,
also known as spam, constitutes a very pervasive form of harassment characterized by the
transmission of abusive, offensive, or potentially hazardous communications.
Internet Stalking
The phenomenon commonly referred to as "internet stalking" is a form of intrusive behavior
that involves the persistent and unwanted pursuit of an individual
There exists a tangible likelihood that those engaging in stalking behavior will utilize the
internet extensively as a means to disseminate unfounded information about their targets, so
exposing them to potential harm. In several instances, the phenomenon of cyberstalking
transcends its individual implications and has a broader societal significance. The
phenomenon of online stalking is particularly concerning due to its perceived propensity for
manifesting in offline contexts.
Traditional stalking methods, such as persistent phone calls, graffiti, threatening letters, and
even physical assaults, occasionally go hand in hand with cyberstalking. The disparities in
the encounters between an individual subjected to long-distance stalking spanning 2,000
miles and another individual who frequently finds themselves in close proximity to their
stalker, within bullet range, are considerable.3
. The phenomenon of internet stalking persists in its focus on causing emotional anguish,
dread, and anxiety, despite the presence of empirical and practical data that establishes a
connection between stalking and domestic violence as well as feticide. This statement does
not diminish the necessity of imposing penalties on individuals who deliberately instigate
fear and worry.4
Computer Stalking
The act of monitoring or tracking an individual's online activities without their knowledge or
consent, sometimes referred to as "computer stalking," is
Computer stalking, as a distinct kind of cyberstalking, pertains to the unauthorized
infiltration of a victim's Windows personal computer using the victim's web browser. It is not
well known that any Windows personal computer that is connected to the Internet has the
potential to be remotely located and connected to another computer. Through this established
link, the hacker possesses the ability to assume command of the targeted individual's
computer system, unimpeded by any external entities.
The cyberstalker can start direct communication with the victim when a victim's computer
establishes an Internet connection. The best course of action for a victim to save themselves
in the event that a stalker has gained unauthorized access to their computer would be to stop
using the Internet and change their IP address.
In the United Kingdom, there is currently no dedicated legislation specifically addressing the
issue of internet stalking. There exist three primary legislative measures employed to address
instances of harassment, which are also applicable in situations of stalking. The subject of
stalking, including cyber stalking, is addressed via the utilization of three prominent statutes:
the Telecommunications Act of 1984, the Malicious Communications Act of 1988, and the
Protection from Harassment Act of 1997.5
Section 1 of the Protection from Harassment Act 1997 stipulates that individuals are
prohibited from engaging in conduct that can be classified as harassment towards another
person, or conduct that they are aware of or should be aware of as constituting harassment
towards another person. As per the provisions outlined under Section 2A of the Act, the act
of stalking necessitates the satisfaction of three specific circumstances.
1) Course of Conduct
The Harassment Act does not make an explicit effort to provide a definition for stalking.
Rather, Section 2A (3) of the Act enumerates many behaviors that might be seen as
constituting stalking.
5
Munasinghe, Paramie, and Kushanthi Harasgama. "A Comparative Analysis of Cyberstalking Legislations in UK,
Singapore and Sri Lanka." SSRN, August 12, 2021. https://ssrn.com/abstract=3903800.
6
Maple, Carsten, Emma Short, and Antony Brown. Cyberstalking in the United Kingdom: An analysis of the ECHO
pilot survey. University of Bedfordshire, 2011.
• An individual who is being stalked
• The act of disseminating any declaration or other content that is relevant or seemingly
connected to an individual.
7
Brown, Antony, Marcia Gibson, and Emma Short. "Modes of Cyberstalking and Cyberharassment: Measuring the
negative effects in the lives of victims in the UK." (2017).
R v. Burstow
The accused in Burstow was convicted by the Crown Court for inflicting severe bodily
damage upon the victim through a sustained series of silent phone calls. The offender was
attributed with causing the depression experienced by the victim.
R v. Ireland
In the case of R v. Ireland, the Court of Appeals expanded the interpretation of the offense of
assault by ruling that a sequence of phone calls followed by silence might be seen as
constituting an attack. Assault typically occurs when the capacity to exert force
instantaneously is present, although the Irish Court has introduced the possibility of remote
attacks.
R v. Johnson
In the case of R v. Johnson, the Court of Appeal upheld the appellant's conviction for public
nuisance, which was established via the appellant's persistent engagement in making obscene
telephone calls over a duration of five and a half years.
2.United States of America
The issue of stalking in the United States is addressed through a combination of state and
federal legislation, which is attributed to the federal character of the country 8. State laws
can be categorized into three major classifications:
The state legislation that does not encompass provisions for cyber stalking are those that
specifically mandate physical pursuit criteria or fail to acknowledge the act of stalking using
electronic communication technologies. An illustrative instance may be found in the anti-
stalking Act of Maryland, which imposes certain criteria pertaining to the physical pursuit of
individuals.
Certain states may possess legislation pertaining to telephone harassment that proves to be
sufficient in addressing instances of internet stalking. Certain states have made efforts to
tackle this matter by modifying their current state legislation to encompass internet
communication.9
The second group of laws pertains to legislation that addresses specific aspects of
cyberbullying. The inclusion of electronic communication under stalking legislation is
observed; nonetheless, these laws exhibit limitations in adequately addressing concerns like
third-party harassment and communications that are not directly transmitted to the targeted
individual. The New York state legislation effectively handles the matter of electronic device
stalking, but it lacks provisions to address two distinct scenarios:
where the stalker disseminates information through a blog post or website rather than
directly targeting the victim
8
Goodno, Naomi Harlin. "Cyberstalking, a new crime: Evaluating the effectiveness of current state and federal
laws." Mo. L. Rev. 72 (2007): 125.
9
Gray, David, et al. "Fighting Cybercrime after 'United States v. Jones.'" The Journal of Criminal Law and
Criminology (1973-), vol. 103, no. 3, 2013, pp. 745–801. JSTOR, http://www.jstor.org/stable/43895378.
where the stalker encourages third parties to engage in harassment against the victim.
In addition, several pieces of legislation mandate the satisfaction of the "credible threat"
criterion in order to establish the conduct of stalking. In both Louisiana and North Carolina,
there is state legislation that mandates the recipient of harassing electronic communication to
be the victim. The statutes in Florida and Mississippi also provide concern since they
necessitate that the message be specifically targeted at an individual. The existing legislation
lacks provisions that adequately address the issue of third-party harassment in the form of
stalking.10
The third classification of state statutes includes legislative measures that pertain to various
facets of cyber stalking. The states of Washington, Ohio, and Rhode Island have enacted
legislation specifically addressing the issue of third-party harassment arising from online
stalking. Despite the presence of distinct provisions for offline stalking, three states have
enacted legislation specifically addressing online stalking.
Civil protection orders may be obtained against those engaged in cyber stalking, contingent
upon the specific provisions outlined in state legislation regulating civil protection orders.
Protection orders serve to restrict the stalker from engaging in any kind of communication,
holding firearms, engaging in acts of harassment and abuse, and any other directives that the
Court deems appropriate. In the event of a violation, the Court has the authority to commence
contempt of court proceedings against the individual who committed the violation.11
Additionally, there are three prominent federal laws that address the issue of harassing
behavior. The individual laws in question are:
The Interstate Communications Act serves as a legal framework that forbids the transmission
of interstate threats with the intention of causing harm to another individual. However, it is
10
D'Ovidio, Robert, and James Doyle. "A study on cyberstalking: Understanding investigative hurdles." FBI L.
Enforcement Bull. 72 (2003): 10.
11
Smith, Alison M. Protection of Children Online: Federal and State Laws Addressing Cyberstalking,
Cyberharassment, and Cyberbullying. Congressional Research Service, 2009.
imperative that the threat in question involve the intention to cause harm or abduct an
individual. The manner of communication should be such that an individual of sound
judgment would perceive it to be of a significant and grave character. However, the current
legislation does not adequately cover the issue of cyber stalking, which involves persistent
harassment without any explicit threat of physical harm.
The Federal Telephone Harassment Statute, which was initially enacted in 1934, underwent
an amendment in 2006 to specifically target the issue of cyber stalking. The scope of
telecommunication devices has been broadened to encompass any device or program that
facilitates communication through the utilization of the internet. The legislation stipulates a
penalty of a two-year jail sentence for the act of utilizing telecommunication equipment with
the intent to harass, mistreat, or intimidate an individual. Nevertheless, the Act has some
significant limitations. One significant aspect is the necessity of communication to maintain
anonymity. Furthermore, it should be noted that the Act specifically applies to instances of
direct communication and does not adequately address the issue of third-party harassment
that may be incited by the cyberstalker.12
The Federal Interstate Stalking Punishment and Prevention Act of 1996 has provisions that
expressly address the issue of cyber stalking. The aforementioned provision disallows the
utilization of interactive computer devices by those who possess the intention to inflict harm,
cause fatality, engage in harassment, or induce significant emotional distress. The original
requirement stipulated that the defendant must have crossed state lines, but a 2006
amendment removed this restriction. In comparison to other federal laws, the aforementioned
act is more effective because it doesn't require a serious threat level and can be used for more
than just anonymous texts. Nevertheless, the current legislation seems inadequate in
addressing instances of harassment perpetrated by individuals not directly involved in the
situation.13
12
McCall, Jamie M., and Shawn A. Weede. "United States v. Matusiewicz: Lessons Learned from the First Federal
Prosecution of Cyberstalking Resulting in Death." US Att'ys Bull. 64 (2016): 17.
13
Marcum, Catherine D., and George E. Higgins. "A systematic review of cyberstalking victimization and offending
behaviors." American journal of criminal justice 46 (2021): 882-910.
Indian Legal System
The conventional depiction of stalkers as a male individual donning a black coat, who
pursues a female subject within dimly lit alleyways during inclement weather conditions, has
undergone transformation during the passage of time. Stalking encompasses more than just
the act of unwelcome pursuit, as it also includes the repetitive nature of making phone calls
or mailing unsolicited letters. 14The emergence of technical developments has led to the
expansion and diversification of stalking, manifesting in the contemporary phenomenon
known as cyber stalking. The phenomenon is distinguished by recurrent instances of
victimization. 15The majority of developed nations have implemented laws that explicitly or
implicitly classify this act as a criminal offense. The case of State (Cyber Cell) v Yogesh
Pandurang Prabhu16 provided a precise and accurate definition of cyber stalking.
"Cyber stalking refers to a criminal act when an individual engages in persistent harassment
of a target by electronic means, such as email, instant messaging, or posting messages on
websites or online forums. A cyberstalker capitalizes on the inherent anonymity provided by
the Internet to engage in stalking behavior towards their target while evading detection."
Prior to the year 2013, the legal framework in India did not have a specific and legally
binding delineation of the terms "stalking" or "cyber-stalking." The recognition of stalking as
a criminal offense in India occurred subsequent to the enactment of the 2013 Criminal Law
Amendment Act, wherein Section 354D was included in the Indian Penal Code (IPC).
16
C.C. NO. 3700686/PS/2009
in cases when the individual engaging in stalking behavior actively attempts to hide or
obscure their true identity.
The definition of obscenity may be found in Section 292 of the Indian Penal Code (IPC). The
act of transmitting explicit materials to the target via a social media platform, electronic mail,
or text messaging aligns with the parameters including cyberstalking. The individual
engaging in stalking behavior can be deemed culpable for a violation as per Section 292 of
the Indian Penal Code, provided that they attempt to corrupt the moral values of the targeted
individual by transmitting explicit material over online means, with the specific intention of
ensuring that the recipient perceives, observes, or listens to the content included therein.
The Information Technology Act of 2000 is a legislation that was enacted in India with the
aim of providing legal recognition to electronic transactions and promoting electronic
governance.
This section is an exact replication of Section 292A as stated in the Indian Penal Code. This
section pertains to the electronic manifestation of explicit content. Consequently, this part
pertains to the topic of internet stalking. In the event that an individual engaged in stalking
behavior attempts to disseminate explicit content pertaining to the targeted individual using
digital platforms, namely in electronic format, with the intention of subjecting the victim to
harassment, legal consequences may be imposed upon the perpetrator under Section 67 of the
Information Technology Act.
This section pertains to the topic of cyberstalking. The inclusion of this provision occurred
subsequent to the revision made in 2008. According to the stipulations outlined in the
legislation, if an individual engaged in stalking behavior attempts to disseminate any sort of
sexually explicit content by electronic means, such as emails, messages, or social media
platforms, they will be subject to legal prosecution under Section 67A of the Information
Technology Act. Consequently, they will face appropriate punitive measures as prescribed by
the law.
The inclusion of this section was introduced by the Amendment Act of 2008, marking its
inaugural appearance. This section pertains to those who engage in stalking behaviors
specifically targeting minors below the age of 18. These stalkers distribute explicit content
portraying minors involved in sexual activities with the intention of instilling fear and
distress in their victims.
Section 66E of the Information Technology Act, 2000 and Section 354C of the Indian Penal
Code
In order to instill feelings of despair and vulnerability inside the targeted individual, the
perpetrator may engage in unauthorized access to the victim's online account, thereafter
disseminating personal photographs of the victim on various social media platforms. Both
aforementioned clauses seek to establish legal prohibitions against the publication or
capturing of photos of an individual's private actions without their explicit agreement.
Section 66E has a broader scope since it uses the term "any person" to refer to the victim, in
contrast to Section 345C which is gender-specific. As per the stipulations outlined in section
354C, it is imperative that the individual subjected to harm or mistreatment meets the criteria
of being identified as a female.
Section 354C of the Indian Penal Code encompasses the phenomenon of voyeurism. The
clause's scope is restricted since it requires the individual affected to specifically identify as a
"woman" in order to qualify. In contrast, Section 66E of the Information Technology Act
encompasses voyeurism to a greater extent than Section 354C of the Indian Penal Code. In
Section 66E, the term "any individual" is used to denote the victim. Consequently, justice can
be pursued under this article irrespective of the gender of the victim. In the event that the
aggrieved party is male, he possesses the legal recourse to initiate legal proceedings under
Section 66E of the Information Technology Act of 2000.
Loopholes in current Scenario
The matter of territorial jurisdiction remains inadequately resolved within the framework of the
Information Technology Act of 2000 and the subsequent Information Technology Amendment
Act of 2008. The subject of jurisdiction is addressed in several parts of the document, including
parts 46, 48, 57, and 61, which discuss the adjudication process and the appeal procedure.
Section 80 of the legislation delineates the authority bestowed upon police officers to lawfully
enter and perform searches on public premises, specifically pertaining to matters involving
cyber-crime and related offenses. Cybercrimes refer to criminal activities that are facilitated by
the use of computers. In instances when an individual unlawfully gains access to another person's
email account, particularly when the victim is located in a different state or nation, the
identification of the appropriate jurisdiction responsible for addressing the offense might provide
challenges. In circumstances involving jurisdictional issues, police officials often strive to evade
acknowledgment of complaints made by victims. Given the absence of geographical constraints
on cybercrimes, it becomes imperative to address the matter of jurisdiction and identify the
pertinent factors that must be taken into account in such circumstances. Further clarification is
required about the allocation of jurisdiction to a certain state for the handling of cybercrime
matters. 17
A significant issue occurs when the legal frameworks of one nation are incongruous with those
of another one. There may be instances whereby the actions of an individual engaging in stalking
behavior might be subject to legal consequences in one nation, but not necessarily constituting a
criminal offense in another jurisdiction. This phenomenon is commonly referred to as a
jurisdictional issue. In instances of this nature, the issue of enforcement further emerges. In this
particular scenario, it is imperative to foster collaboration between the two nations. Extradition
policies are relevant in this context.
17
Smith, Kane J., Gurpreet Dhillon, and Ella Kolkowska. "Important Issues for Preventing Cyberstalking in India."
(2019).
The provision of 'equality before law' is enshrined in Article 14 of the Constitution of India. The
examination of our Constitution reveals the presence of clauses guaranteeing equality; yet, a
careful analysis of the legislative framework exposes a significant degree of gender
discrimination. The provisions exhibit a greater inclination towards the protection of women,
perceiving them as a vulnerable segment of society. However, it should be noted that gender
inequity is not applicable in the current context. Currently, the sole provision within the Indian
Penal Code that bears some direct relevance to the offense of cyber stalking is Section 354D.
The clause clearly demonstrates that its primary focus is the protection of women. 18
Based on the analysis of the reading section, it can be observed that the lawmakers have made
the assumption that "man" is always the perpetrator or stalker, while "woman" is consistently the
victim in all cases. Section 509 of the Indian Penal Code specifically deals with the matter of
violating the modesty of a woman. This particular section could be rephrased using the term "any
person" instead of "woman". A woman who engages in stalking behavior has the capacity to
violate a man's sense of modesty by transmitting explicit content via the internet, including
emails or texts. Therefore, it is imperative for lawmakers to endeavor to safeguard both men and
women, rather than just focusing on the protection of women, from the detrimental consequences
of cyber stalking.
Vague Definition
The inclusion of a proviso in Section 354D has resulted in the exclusion of some behaviors from
being categorized as stalking under its meaning. The exclusions mentioned are derived from
Section 1(3) of the Protection from Harassment Act 1997, a piece of law in the United Kingdom
that addresses the issue of harassment. However, the validity of the wide wording of the
exemption, particularly the last clause that implicitly permits breaches of privacy and
confidentiality under the condition of reasonableness and justification in the given
circumstances, is still to be determined. This section is characterized by the limitation of
specificity and grants law enforcement agencies discretionary powers to encroach upon an
individual's privacy.
Recommendations
18
Miftha, Ameema, Marc Conrad, and Marcia Gibson. "CYBERSTALKING IN INDIA: CHALLENGES ON THE
SOCIAL SIDE AND THE UNDERLYING CONTRADICTIONS."
Self-Regulation
The practice of self-regulation among computer and internet users. The use of self-regulation
strategies might potentially serve as an effective approach in mitigating the incidence of cyber
stalking. The process of establishing a robust code of conduct involves the adoption of a policy
of self-restraint by both computer users and service providers. The implementation of self-
regulatory measures by Internet Service Providers (ISPs) can significantly contribute to the
mitigation of online criminal activities. To start, Internet Service Providers (ISPs) have the
capacity to construct a unified ethical code of conduct that governs their provision of internet
services and facilities to customers. Users may also establish the conditions by means of a
written agreement that mandates their abstention from participating in unlawful conduct.
Additionally, it is possible for the contract to include a provision stating that any breach of these
conditions would lead to the discontinuation of internet services.
The concept of a universal legal regulatory mechanism refers to a system or framework that is
applicable and enforceable across different jurisdictions and legal systems. This mechanism aims
to provide a set of universally accepted rules and standards that govern
The mitigation of issues stemming from divergent legal frameworks and procedural systems
across nations might be significantly alleviated with the universal recognition and integration of
substantial cybercrimes into the criminal legislation of all countries. The implementation of this
approach would provide uniformity in the classification of various forms of cybercrimes. Given
the extensive ramifications associated with these offenses, it is imperative that stringent and
perhaps exceptional sanctions be imposed upon cyber offenders as a means of deterring their
involvement in cybercrime.
Currently, there are only two sections within the discourse that address the topic of
cyberstalking. However, it is important to note that only section 354D makes an attempt to
provide a definition for cyberstalking. Nevertheless, this definition is insufficient as it solely
states that cyberstalking involves the act of monitoring a woman through the internet. It fails to
specify the duration of time an individual must spend viewing another person's online profile in
order to be classified as engaging in stalking behavior. Given the present state of technology
advancements, it is feasible to monitor user behavior in cases where individuals have been
reported, provided that there are suitable standards and the support of social media applications
to facilitate such monitoring by the government.
Conclusion
A comparison of the legislative methods to cyberstalking and online harassment in India, the
United States, and the United Kingdom finds substantial disparities in the techniques and
processes used by these nations to tackle the rising threat of online abuse. In India, cyberstalking
and online harassment are largely governed by the Information Technology Act of 2000 and the
Indian Penal Code, with a focus on penalizing the sending of offensive or frightening
communications. However, opponents contend that the Indian legal framework is vague and
incomplete, making it impossible to properly combat new kinds of online harassment. The
United States, on the other hand, has a more decentralized approach, with different federal and
state laws, such as the Computer Fraud and Abuse Act and state-specific acts, covering aspects
of cyberstalking and harassment. While this technique allows for some flexibility, it can lead to
discrepancies and differences in cyber harassment legislation enforcement among countries.
In contrast, the United Kingdom has enacted more extensive and centralized regulation, such as
the Communications Act 2003, which criminalizes the use of electronic communication
networks for harassment. In addition, the United Kingdom has taken a systematic strategy to
combating online abuse, involving law enforcement, internet service providers, and civil society
groups. Despite these distinctions, all three nations confront similar issues in terms of
enforcement, public awareness, and the need for law change to keep up with the ever-changing
nature of cyberstalking and online harassment. The comparative research emphasizes the
significance of finding a balance between free expression and protecting individuals from online
abuse, as well as the ongoing need to update and revise legislative frameworks in order to
successfully manage this complex issue in the digital era.
Bibliography
Katyal, Neal Kumar. "Criminal Law in Cyberspace." University of Pennsylvania Law Review,
vol. 149, no. 4, 2001, pp. 1003–114. JSTOR, https://doi.org/10.2307/3312990.
Kaur, Puneet, et al. "A systematic literature review on cyberstalking. An analysis of past
achievements and future promises." Technological Forecasting and Social Change 163 (2021):
120426.
Munasinghe, Paramie, and Kushanthi Harasgama. "A Comparative Analysis of Cyberstalking
Legislations in UK, Singapore and Sri Lanka." SSRN, August 12, 2021.
https://ssrn.com/abstract=3903800.
Maple, Carsten, Emma Short, and Antony Brown. Cyberstalking in the United Kingdom: An
analysis of the ECHO pilot survey. University of Bedfordshire, 2011.
Brown, Antony, Marcia Gibson, and Emma Short. "Modes of Cyberstalking and
Cyberharassment: Measuring the negative effects in the lives of victims in the UK." (2017).
Goodno, Naomi Harlin. "Cyberstalking, a new crime: Evaluating the effectiveness of current state
and federal laws." Mo. L. Rev. 72 (2007): 125.
Gray, David, et al. "Fighting Cybercrime after 'United States v. Jones.'" The Journal of Criminal
Law and Criminology (1973-), vol. 103, no. 3, 2013, pp. 745–801. JSTOR,
http://www.jstor.org/stable/43895378.
D'Ovidio, Robert, and James Doyle. "A study on cyberstalking: Understanding investigative
hurdles." FBI L. Enforcement Bull. 72 (2003): 10.
Smith, Alison M. Protection of Children Online: Federal and State Laws Addressing
Cyberstalking, Cyberharassment, and Cyberbullying. Congressional Research Service, 2009.
McCall, Jamie M., and Shawn A. Weede. "United States v. Matusiewicz: Lessons Learned from
the First Federal Prosecution of Cyberstalking Resulting in Death." US Att'ys Bull. 64 (2016): 17.
Marcum, Catherine D., and George E. Higgins. "A systematic review of cyberstalking
victimization and offending behaviors." American journal of criminal justice 46 (2021): 882-910.
Keswani, H. "Cyberstalking: A critical study." Bharti Law Rev (2017): 131-48.
Sakshi, M., & Vashishth, A. (2022). An analysis of cybercrime with special reference to cyber
stalking. Journal of Positive School Psychology, 1279-1287.