{"id":12345,"date":"2024-03-01T18:16:00","date_gmt":"2024-03-01T18:16:00","guid":{"rendered":"https:\/\/www.permessonegato.it\/2024\/03\/01\/cyberstalking\/"},"modified":"2025-08-29T11:09:27","modified_gmt":"2025-08-29T11:09:27","slug":"cyberstalking","status":"publish","type":"post","link":"https:\/\/www.permessonegato.it\/en\/2024\/03\/01\/cyberstalking\/","title":{"rendered":"Cyberstalking"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">When stalking becomes virtual. <\/h2>\n\n<p><strong><em>Cyberstalking<\/em>, or computer <em>stalking<\/em>,<\/strong> is a form of <strong>harassment<\/strong> that occurs via the internet or other digital technologies. It consists of <strong>repetitive and invasive behaviors<\/strong>, such as sending threatening messages, sharing private information, or constant surveillance, which cause fear or distress to the victim. The origins of <em>cyberstalking<\/em> are closely linked to the evolution of the internet and digital communication technologies.<\/p>\n\n<p>With the rise of online communication, new forms of social interaction have emerged, but also new opportunities for abusive behavior. <em>Cyberstalking<\/em> was born as an extension of traditional <em>stalking<\/em>, taking advantage of the <strong>anonymity<\/strong> and ease of access offered by the internet.<\/p>\n\n<p>With the rise of <strong>social media<\/strong>, <em>cyberstalking<\/em> has become more <strong>pervasive<\/strong>: the various platforms available have allowed <em>cyberstalkers<\/em> to obtain personal information about victims, track them more easily, and contact them directly.<br\/><em>Cyberstalkers<\/em> use various tools to monitor their victims, including social media, online forums, messaging apps, and even smartphone GPS.<\/p>\n\n<p><br\/>Numerous <strong>support groups<\/strong> and resources have been established to help victims of <em>cyberstalking<\/em>. These include helplines, online safety guides, and legal support. Major social media platforms have begun implementing measures to combat <em>cyberstalking<\/em>, such as tools to report abuse, block users, and improve privacy settings.<br\/>Responding to this problem requires a multi-pronged approach, including appropriate legislation, public education, victim support, and prevention and protection technologies.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When stalking becomes virtual. Cyberstalking, or computer stalking, is a form of harassment that occurs via the internet or other digital technologies. It consists of repetitive and invasive behaviors, such as sending threatening messages, sharing private information, or constant surveillance, which cause fear or distress to the victim. The origins of cyberstalking are closely linked [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":10102,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"give_campaign_id":0,"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[62],"tags":[60],"class_list":["post-12345","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-glossary","tag-glossary"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberstalking - PermessoNegato<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.permessonegato.it\/en\/2024\/03\/01\/cyberstalking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberstalking - PermessoNegato\" \/>\n<meta property=\"og:description\" content=\"When stalking becomes virtual. Cyberstalking, or computer stalking, is a form of harassment that occurs via the internet or other digital technologies. It consists of repetitive and invasive behaviors, such as sending threatening messages, sharing private information, or constant surveillance, which cause fear or distress to the victim. The origins of cyberstalking are closely linked [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.permessonegato.it\/en\/2024\/03\/01\/cyberstalking\/\" \/>\n<meta property=\"og:site_name\" content=\"PermessoNegato\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-01T18:16:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-29T11:09:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.permessonegato.it\/wp-content\/uploads\/2025\/05\/Cyberstalking-1080px.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"giulia.valmacco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"giulia.valmacco\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.permessonegato.it\\\/en\\\/2024\\\/03\\\/01\\\/cyberstalking\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.permessonegato.it\\\/en\\\/2024\\\/03\\\/01\\\/cyberstalking\\\/\"},\"author\":{\"name\":\"giulia.valmacco\",\"@id\":\"https:\\\/\\\/www.permessonegato.it\\\/en\\\/#\\\/schema\\\/person\\\/5c44df68907c0ad24a82225d25d49a56\"},\"headline\":\"Cyberstalking\",\"datePublished\":\"2024-03-01T18:16:00+00:00\",\"dateModified\":\"2025-08-29T11:09:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.permessonegato.it\\\/en\\\/2024\\\/03\\\/01\\\/cyberstalking\\\/\"},\"wordCount\":224,\"image\":{\"@id\":\"https:\\\/\\\/www.permessonegato.it\\\/en\\\/2024\\\/03\\\/01\\\/cyberstalking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.permessonegato.it\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Cyberstalking-1080px.jpg\",\"keywords\":[\"Glossary\"],\"articleSection\":[\"Glossary\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.permessonegato.it\\\/en\\\/2024\\\/03\\\/01\\\/cyberstalking\\\/\",\"url\":\"https:\\\/\\\/www.permessonegato.it\\\/en\\\/2024\\\/03\\\/01\\\/cyberstalking\\\/\",\"name\":\"Cyberstalking - PermessoNegato\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.permessonegato.it\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.permessonegato.it\\\/en\\\/2024\\\/03\\\/01\\\/cyberstalking\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.permessonegato.it\\\/en\\\/2024\\\/03\\\/01\\\/cyberstalking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.permessonegato.it\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Cyberstalking-1080px.jpg\",\"datePublished\":\"2024-03-01T18:16:00+00:00\",\"dateModified\":\"2025-08-29T11:09:27+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.permessonegato.it\\\/en\\\/#\\\/schema\\\/person\\\/5c44df68907c0ad24a82225d25d49a56\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.permessonegato.it\\\/en\\\/2024\\\/03\\\/01\\\/cyberstalking\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.permessonegato.it\\\/en\\\/2024\\\/03\\\/01\\\/cyberstalking\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.permessonegato.it\\\/en\\\/2024\\\/03\\\/01\\\/cyberstalking\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.permessonegato.it\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Cyberstalking-1080px.jpg\",\"contentUrl\":\"https:\\\/\\\/www.permessonegato.it\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Cyberstalking-1080px.jpg\",\"width\":1080,\"height\":540},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.permessonegato.it\\\/en\\\/2024\\\/03\\\/01\\\/cyberstalking\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.permessonegato.it\\\/en\\\/home-page\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberstalking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.permessonegato.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.permessonegato.it\\\/en\\\/\",\"name\":\"PermessoNegato\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.permessonegato.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.permessonegato.it\\\/en\\\/#\\\/schema\\\/person\\\/5c44df68907c0ad24a82225d25d49a56\",\"name\":\"giulia.valmacco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29ac608ff8403d3e0d70b9a6145534b677298977ccb15f16d545d5cbe4c154b4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29ac608ff8403d3e0d70b9a6145534b677298977ccb15f16d545d5cbe4c154b4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29ac608ff8403d3e0d70b9a6145534b677298977ccb15f16d545d5cbe4c154b4?s=96&d=mm&r=g\",\"caption\":\"giulia.valmacco\"},\"url\":\"https:\\\/\\\/www.permessonegato.it\\\/en\\\/author\\\/giulia-valmacco\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberstalking - PermessoNegato","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.permessonegato.it\/en\/2024\/03\/01\/cyberstalking\/","og_locale":"en_US","og_type":"article","og_title":"Cyberstalking - PermessoNegato","og_description":"When stalking becomes virtual. Cyberstalking, or computer stalking, is a form of harassment that occurs via the internet or other digital technologies. It consists of repetitive and invasive behaviors, such as sending threatening messages, sharing private information, or constant surveillance, which cause fear or distress to the victim. The origins of cyberstalking are closely linked [&hellip;]","og_url":"https:\/\/www.permessonegato.it\/en\/2024\/03\/01\/cyberstalking\/","og_site_name":"PermessoNegato","article_published_time":"2024-03-01T18:16:00+00:00","article_modified_time":"2025-08-29T11:09:27+00:00","og_image":[{"width":1080,"height":540,"url":"https:\/\/www.permessonegato.it\/wp-content\/uploads\/2025\/05\/Cyberstalking-1080px.jpg","type":"image\/jpeg"}],"author":"giulia.valmacco","twitter_card":"summary_large_image","twitter_misc":{"Written by":"giulia.valmacco","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.permessonegato.it\/en\/2024\/03\/01\/cyberstalking\/#article","isPartOf":{"@id":"https:\/\/www.permessonegato.it\/en\/2024\/03\/01\/cyberstalking\/"},"author":{"name":"giulia.valmacco","@id":"https:\/\/www.permessonegato.it\/en\/#\/schema\/person\/5c44df68907c0ad24a82225d25d49a56"},"headline":"Cyberstalking","datePublished":"2024-03-01T18:16:00+00:00","dateModified":"2025-08-29T11:09:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.permessonegato.it\/en\/2024\/03\/01\/cyberstalking\/"},"wordCount":224,"image":{"@id":"https:\/\/www.permessonegato.it\/en\/2024\/03\/01\/cyberstalking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.permessonegato.it\/wp-content\/uploads\/2025\/05\/Cyberstalking-1080px.jpg","keywords":["Glossary"],"articleSection":["Glossary"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.permessonegato.it\/en\/2024\/03\/01\/cyberstalking\/","url":"https:\/\/www.permessonegato.it\/en\/2024\/03\/01\/cyberstalking\/","name":"Cyberstalking - PermessoNegato","isPartOf":{"@id":"https:\/\/www.permessonegato.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.permessonegato.it\/en\/2024\/03\/01\/cyberstalking\/#primaryimage"},"image":{"@id":"https:\/\/www.permessonegato.it\/en\/2024\/03\/01\/cyberstalking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.permessonegato.it\/wp-content\/uploads\/2025\/05\/Cyberstalking-1080px.jpg","datePublished":"2024-03-01T18:16:00+00:00","dateModified":"2025-08-29T11:09:27+00:00","author":{"@id":"https:\/\/www.permessonegato.it\/en\/#\/schema\/person\/5c44df68907c0ad24a82225d25d49a56"},"breadcrumb":{"@id":"https:\/\/www.permessonegato.it\/en\/2024\/03\/01\/cyberstalking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.permessonegato.it\/en\/2024\/03\/01\/cyberstalking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.permessonegato.it\/en\/2024\/03\/01\/cyberstalking\/#primaryimage","url":"https:\/\/www.permessonegato.it\/wp-content\/uploads\/2025\/05\/Cyberstalking-1080px.jpg","contentUrl":"https:\/\/www.permessonegato.it\/wp-content\/uploads\/2025\/05\/Cyberstalking-1080px.jpg","width":1080,"height":540},{"@type":"BreadcrumbList","@id":"https:\/\/www.permessonegato.it\/en\/2024\/03\/01\/cyberstalking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.permessonegato.it\/en\/home-page\/"},{"@type":"ListItem","position":2,"name":"Cyberstalking"}]},{"@type":"WebSite","@id":"https:\/\/www.permessonegato.it\/en\/#website","url":"https:\/\/www.permessonegato.it\/en\/","name":"PermessoNegato","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.permessonegato.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.permessonegato.it\/en\/#\/schema\/person\/5c44df68907c0ad24a82225d25d49a56","name":"giulia.valmacco","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/29ac608ff8403d3e0d70b9a6145534b677298977ccb15f16d545d5cbe4c154b4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/29ac608ff8403d3e0d70b9a6145534b677298977ccb15f16d545d5cbe4c154b4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/29ac608ff8403d3e0d70b9a6145534b677298977ccb15f16d545d5cbe4c154b4?s=96&d=mm&r=g","caption":"giulia.valmacco"},"url":"https:\/\/www.permessonegato.it\/en\/author\/giulia-valmacco\/"}]}},"_links":{"self":[{"href":"https:\/\/www.permessonegato.it\/en\/wp-json\/wp\/v2\/posts\/12345","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.permessonegato.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.permessonegato.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.permessonegato.it\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.permessonegato.it\/en\/wp-json\/wp\/v2\/comments?post=12345"}],"version-history":[{"count":1,"href":"https:\/\/www.permessonegato.it\/en\/wp-json\/wp\/v2\/posts\/12345\/revisions"}],"predecessor-version":[{"id":12346,"href":"https:\/\/www.permessonegato.it\/en\/wp-json\/wp\/v2\/posts\/12345\/revisions\/12346"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.permessonegato.it\/en\/wp-json\/wp\/v2\/media\/10102"}],"wp:attachment":[{"href":"https:\/\/www.permessonegato.it\/en\/wp-json\/wp\/v2\/media?parent=12345"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.permessonegato.it\/en\/wp-json\/wp\/v2\/categories?post=12345"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.permessonegato.it\/en\/wp-json\/wp\/v2\/tags?post=12345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}