<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.essentialbusinessbehaviors.com/blogs/tag/cyber-harassment/feed" rel="self" type="application/rss+xml"/><title>Essential Business Behaviors - Healing the Toxic Organization #Cyber-harassment</title><description>Essential Business Behaviors - Healing the Toxic Organization #Cyber-harassment</description><link>https://www.essentialbusinessbehaviors.com/blogs/tag/cyber-harassment</link><lastBuildDate>Fri, 13 Feb 2026 02:23:44 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Cyber-bullying and Cyber-Stalking Are on the Rise]]></title><link>https://www.essentialbusinessbehaviors.com/blogs/post/cyber-bullying-and-cyber-stalking-are-on-the-rise</link><description><![CDATA[<img align="left" hspace="5" src="https://www.essentialbusinessbehaviors.com/images/Cyberstalker.jpeg"/>This blog follows my introduction to bullying in Silicon Valley, California and then explores the cyberbullying and cyberstalking that has grown in tandem with the expansion of communication technology in our lives.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_yTqrAUMNQvKv-oLh9cfHZw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_xVkPAJG7TNigEdejnGLB4A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_bBrQIPiZQh-Pl-la_rnoAA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_zUXPMhDmQzSHvtyiipN4zg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zUXPMhDmQzSHvtyiipN4zg"].zpelem-text { font-family:'Times New Roman', serif; font-size:14px; font-weight:400; line-height:19px; } [data-element-id="elm_zUXPMhDmQzSHvtyiipN4zg"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ font-family:'Times New Roman', serif; font-size:14px; font-weight:400; line-height:19px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div><p style="color:inherit;text-indent:0.5in;"><span style="font-size:16px;font-weight:400;">My introduction to workplace bullying was in the late 1990s in Silicon Valley. During the initial Internet &quot;dot.com&quot; expansion into commerce, I supervised a secretarial service pool in a large law firm that operated 24/7 to keep up with the work. The workplace bullying followed what is now a recognized pattern: An inexperienced department manager replaced a highly experienced manager who left for another job. The new manager developed allies who believed they deserved more than they were getting. They started pushing out perceived rivals and blocking work for &quot;unliked&quot; supervisors to obtain more. A fellow supervisor who should have been promoted to the department manager position was targeted for removal. When a part-time weekend secretary passed away due to overwork and high doses of Fen-Phen, this supervisor was blamed. Chaos ensued. Gossip and loyalties tore apart a once cohesive and supportive secretarial service pool. Workers became fearful and departed, leaving the department short-staffed.</span></p></div></blockquote><div><p style="color:inherit;text-indent:0.5in;"><span style="font-weight:400;"><br/></span></p></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div><p style="color:inherit;text-indent:0.5in;"><span style="font-weight:400;"><span style="font-size:16px;">The off-hours phone calls from crying secretaries sent me back to college. I thought adding letters behind my name would help others believe me when I spoke about the anti-business behavior I had experienced. It did not. When I moved on to academia, I learned firsthand that the horror and denial of workplace bullying existed outside law firms. Earning a degree with honors did not protect me. Instead, it made me a naïve target for sabotage by a manipulative boss gaming the system. The professor blocked me from working for nine years after deliberately overworking and underpaying me in a bait-and-switch scheme. The stress from the overwork scheme made me so sick I could not work for over three years. As one of the continuously disappearing financial analysts, I was number nine over the 15 years of her tenure. Because of these two experiences, I became an anti-bullying advocate. I wrote a book on the bullying cycle. I co-authored another book with a union steward for union stewards in California. I have supported and coached targets through the workplace bullying cycle for over 20 years.</span></span></p></div><div><p style="color:inherit;text-indent:0.5in;"><span style="font-weight:400;"><br/></span></p></div><div><p style="color:inherit;text-indent:0.5in;"><span style="font-size:16px;font-weight:400;">Recently, I became reacquainted with the trajectory of cyber-bullying in Silicon Valley's startup culture. Cyberbullying is defined &quot;as an aggressive, intentional act carried out by a group or individual, using electronic forms of contact, repeatedly and over time against a victim who cannot easily defend him or herself&quot; (Smith et al., 2008, p. 376). The difference is that work tools become the source of trauma workers must face whenever they attempt to conduct business. Like in-person bullying, the outcomes for the target replicate face-to-face bullying in the work environment, leaving an adverse impact on an individual's physical and mental health (Rao &amp; Rao, 2021). Symptoms of being cyber-bullied include depression, insomnia, loss of productivity and engagement, lowered job satisfaction, and job loss. Organizational outcomes result in formal complaints with regulatory agencies and lawsuits against the offending company.</span></p></div><div><p style="color:inherit;text-indent:0.5in;"><span style="font-weight:400;"><br/></span></p></div><div><p style="color:inherit;text-indent:0.5in;"><span style="font-size:16px;font-weight:400;">The young woman who contacted me was cyberstalked after working at a startup AI robotics company – one of many new ventures taking over the Valley. Cyberstalking involves the repeated and deliberate use of the Internet and electronic communication tools to frighten, intimidate or harass someone&quot; (Brown et al., 2017, p. 57). This woman had been doxed and received cryptic messages indicating journalists were writing about her. Simultaneously, she continually received messages from other unknown individuals that her home security and computer cameras had been hacked. After law enforcement came and went, she received more messages that calling the police would accomplish nothing. Her crime was refusing a date request sent by email. </span></p></div></blockquote><div><p style="color:inherit;text-indent:0.5in;"><span style="font-weight:400;"><br/></span></p></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div><p style="color:inherit;text-indent:0.5in;"><span style="font-size:16px;font-weight:400;">This notice of cyber-stalling preceded several more women suddenly posting about this problem in my response to my posts on LinkedIn and SafeHarbor, a support community for targets that I moderate. The women told a similar story of stalkers trolling on dating and support forums, attempting to establish relationships that quickly turned sour. They all complained about the impossibility of stopping this technology-enabled harassment that followed them everywhere. </span></p></div><div><p style="color:inherit;text-indent:0.5in;"><span style="font-weight:400;"><br/></span></p></div><div><p style="color:inherit;text-indent:0.5in;"><span style="font-weight:400;"><span style="font-size:16px;">What is particularly disturbing and terrorizing is the community of like-minded allies the cyberstalker recruits to support the cyberstalking project on Internet forums like 8chan, 4chan, Anonymous, and KiwiFarms (Cross, 2019; Nieborg &amp; Foxman, 2018). On these forum sites, the original complainant can create a profile of the target, establish a justification for revenge, and recruit and challenge followers to take up the cause against the target. If you are female, the language in messages becomes increasingly sexualized and denigrating, while challenges issued by the original stalker to help stalk the target increasingly feel like a game reminiscent of the sub-culture of feminist and anti-trans animosity organized around #Gamergate in 2014 and 2015 (Cross, 2019; Nieborg &amp; Foxman, 2018). The technological sophistication of these group attacks means the stalking can appear through home security and computer cameras, social media sites, and doxing -- spreading private information online without the target's knowledge or permission.) Unfortunately, ongoing engagement in online incel forums affected participants' changes in their emotional experiences and online radicalization about women through the development of hate echo chambers (de Roos et al., 2024). Internet use disorder has also been studied as a precursor to cyberstalking behavior (Floros &amp; Mylona, 2022).</span></span></p></div><div><p style="color:inherit;text-indent:0.5in;"><span style="font-weight:400;"><br/></span></p></div><div><p style="color:inherit;text-indent:0.5in;"><span style="font-weight:400;"><span style="font-size:16px;">According to SafeHome.org, 7.5 million people experience cyberstalking yearly, and 80% of victims are tracked using technology. Cyberstalkers (61%) use everyday communication tools like smartphones, text messaging, and email. Less than a third of cyberstalking is reported because most actions to halt cyberstalking appear ineffective. Instead, 69% of victims suffer emotional distress and can repeat the tale of job disruption and loss originally expressed by that young woman from Silicon Valley. Additionally, while the problem can follow someone home, the 2024 Workplace Bullying Institute survey on the state of workplace bullying found that 51% of hybrid (remote and onsite combined) workers represented the highest category for bullied workers in the United States.</span></span></p></div></blockquote><div><p style="color:inherit;text-indent:0.5in;"><span style="font-weight:400;"><br/></span></p><p style="color:inherit;"><b><span style="text-decoration-line:underline;font-size:18px;">Call to Action</span></b></p><p style="color:inherit;"><b><br/></b></p></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div><p style="color:inherit;margin-bottom:8pt;text-indent:0.5in;"><span style="font-weight:400;font-size:16px;">The first woman who contacted me relayed that the EEOC moderator's impression of the company's representatives was that they were more interested in knowing how well the stalking worked as opposed to stopping the harassment. Due to this attitude, establishing a safer technological environment using reliable legislation and strengthened EEOC laws on cyber-harassment and cyber-stalking should be a primary concern. Cyber Bullying Research, an online nonprofit studying cyber abuse, reports that 47 states have some form of law against electronic or digital abuse. However, only six state laws use the term &quot;cyberstalking.&quot; (Cyberbullying.org, accessed November 12, 2024). Organizations should also ensure workers have a safer work environment along with mechanisms for oversite to ensure stalking can be stopped. If you are being stalked, you should connect with the following organizations to seek help:&nbsp;</span></p></div><blockquote style="margin-left:40px;border:none;"><p style="color:inherit;"><span style="font-size:16px;font-weight:400;">·&nbsp; Victim Connect Resource Center <a href="https://victimconnect.org/" title="https://victimconnect.org/" target="_blank" rel="">https://victimconnect.org/</a></span></p></blockquote><blockquote style="margin-left:40px;border:none;"><p style="color:inherit;"><span style="font-size:16px;font-weight:400;">·&nbsp; National Domestic Violence Hotline <a href="https://www.thehotline.org/" title="https://www.thehotline.org/" target="_blank" rel="">https://www.thehotline.org/</a></span></p></blockquote><blockquote style="margin-left:40px;border:none;"><blockquote style="margin-left:40px;border:none;"><p style="color:inherit;"><span style="font-size:16px;font-weight:400;">·&nbsp; RAINN – National Sexual Assault Hotline&nbsp; <a href="https://rainn.org/" title="https://rainn.org/" target="_blank" rel="">https://rainn.org/</a></span></p><p style="color:inherit;">·&nbsp; <span style="font-size:16px;">Social Media&nbsp;Victims Law Center <a href="https://socialmediavictims.org/" title="https://socialmediavictims.org/" target="_blank" rel="">https://socialmediavictims.org/</a></span><a href="https://socialmediavictims.org/" title="https://socialmediavictims.org/" target="_blank" rel=""><br/></a></p><p style="color:inherit;"><br/></p></blockquote></blockquote><blockquote style="margin-left:40px;border:none;"><div><p style="color:inherit;"><span style="font-weight:400;font-size:16px;">If you are female, you can share your harassment story with others on Right to Be. </span></p></div></blockquote><blockquote style="margin-left:40px;border:none;"><div><p style="color:inherit;"><span style="font-weight:400;font-size:16px;">https://righttobe.org/</span></p></div></blockquote></blockquote><blockquote style="margin-left:40px;border:none;"><p style="color:inherit;"><span style="font-weight:400;font-size:16px;"><br/></span></p></blockquote><div><p style="color:inherit;margin-bottom:8pt;"><span style="font-size:16px;font-weight:bold;">More resources, tips, and information can be found at:</span></p></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin-left:40px;border:none;"><p style="color:inherit;"><span style="font-size:16px;font-weight:400;">·&nbsp; Cyber Bullying Research at <a href="https://cyberbullying.org/" title="https://cyberbullying.org/" target="_blank" rel="">https://cyberbullying.org/</a></span></p></blockquote><blockquote style="margin-left:40px;border:none;"><p style="color:inherit;"><span style="font-size:16px;font-weight:400;">·&nbsp; CyberHelp Online at: <a href="https://www.thecyberhelpline.com/" title="https://www.thecyberhelpline.com/" target="_blank" rel="">https://www.thecyberhelpline.com/</a></span></p></blockquote><blockquote style="margin-left:40px;border:none;"><p style="color:inherit;"><span style="font-size:16px;font-weight:400;">·&nbsp; <strong>Stalking Prevention, Awareness, &amp; Resource Center (SPARC)&nbsp;</strong><strong>at </strong><a href="https://www.stalkingawareness.org/" title="https://www.stalkingawareness.org/" target="_blank" rel="">https://www.stalkingawareness.org/</a></span></p></blockquote></blockquote><blockquote style="margin-left:40px;border:none;"><p style="color:inherit;"><span style="font-weight:400;font-size:16px;"><br/></span></p></blockquote><div style="line-height:2;"><p style="color:inherit;"><b style="color:inherit;"><span style="font-size:16px;">Dictionary of cyber-bullying terms:</span></b></p></div><blockquote style="margin-left:40px;border:none;"><div style="line-height:2;"><p style="color:inherit;"><span style="font-size:16px;"><span style="font-weight:bold;">Denigration</span><span> – spreading malicious information to damage a victim's reputation </span></span></p></div><div style="line-height:2;"><p style="color:inherit;"><span style="font-size:16px;"><span style="font-weight:bold;">Doxxing </span><span>–collecting and then spreading personal information online</span></span></p></div><div style="line-height:2;"><p style="color:inherit;"><span style="font-size:16px;"><span style="font-weight:bold;">Flaming </span><span>– a perpetrator uses foul and violent language as cyberbullying in discussion rooms or chat and comment fields because specific individuals or groups convey angry and disrespectful messages online </span></span></p></div><div style="line-height:2;"><p style="color:inherit;"><span style="font-size:16px;"><span style="font-weight:bold;">#GamerGate </span><span>– GamerGate occurred during 2014-2015 when a community of online gamers harassed three feminists critical of game elements denigrating women</span></span></p></div><div style="line-height:2;"><p style="color:inherit;"><span style="font-size:16px;"><span style="font-weight:bold;">Masquerading</span><span> – pretending to be someone else, usually the victim </span></span></p></div><div style="line-height:2;"><p style="color:inherit;"><span style="font-size:16px;"><span style="font-weight:bold;">Outing</span><span>– outing is a form of doxing – sharing your personal information online</span></span></p></div><div style="line-height:2;"><p style="color:inherit;"><span style="font-size:16px;"><span style="font-weight:bold;">Swatting</span><span> – Using personal information to file reports or emergency responses from the police on a targeted individual</span></span></p></div><div style="line-height:2;"><p style="color:inherit;"><span style="font-size:16px;font-weight:bold;">Trolling</span><span style="font-size:16px;font-weight:400;"> – fishing for a reaction online by leaving negative comments</span></p></div></blockquote><div style="line-height:2;"><div><span style="font-size:12px;font-weight:400;"><br/></span></div><span style="font-size:12px;"><p style="color:inherit;"><span style="font-size:18px;">&nbsp;<span style="color:inherit;font-weight:bold;">References</span></span></p></span></div><blockquote style="margin-left:40px;border:none;"><div style="line-height:2;"><ul><li style="text-align:left;"><span style="font-size:12px;font-weight:400;">Brown, A., Gibson, M. &amp; Short, M. (2017). Modes of cyberstalking and cyberharassment: Measuring the negative effects in the lives of victims in the UK. Annual Review of Cybertherapy and Telemedicine, 57-63.</span></li><li style="text-align:left;"><span style="font-size:12px;font-weight:400;">Cross, K. (2019). Toward a formal sociology of online harassment. Human Technology, 15(3), 326-346. DOI: 10.17011/ht/urn.201911265023</span></li><li style="text-align:left;"><span style="font-size:12px;font-weight:400;">Cyber Bullying Research Center (2024). https://cyberbullying.org/</span></li><li style="text-align:left;"><span style="font-size:12px;font-weight:400;">de Roos, M.S., Veldhuizen-Ochodnicanova’, &amp; Hanna, A. (2014). The angry echo chamber: A study of extremist and emotional language changes in incel communities over time. Journal of Interpersonal Violence, 39(21-22), 4573-4597</span></li><li style="text-align:left;"><span style="font-size:12px;font-weight:400;">Floros, G. &amp; Mylona, I. (2022). Association of cyberbullying and Internet use disorder. Current Addiction Reports, (, 575-588. <a href="https://doi.org/10.1007/s40429-022-00440-9" title="https://doi.org/10.1007/s40429-022-00440-9" target="_blank" rel="">https://doi.org/10.1007/s40429-022-00440-9</a></span></li><li style="text-align:left;"><span style="font-size:12px;font-weight:400;">Niebor, D. &amp; Foxman, M. (2018). Chapter 6. Mainstreaming misogyny: The beginning of the end and the end of the beginning in Gamergate coverage. In J.R. Vickery, T. Everbach, (2018). Mediating misogyny. <a href="https://doi.org/10.1007/978-3-319-72917-6_6" title="https://doi.org/10.1007/978-3-319-72917-6_6" target="_blank" rel="">https://doi.org/10.1007/978-3-319-72917-6_6</a></span></li><li style="text-align:left;"><span style="font-size:12px;">Piotrowski, C. (2012). From workplace bullying to cyberbullying: The enigma of e-harassment in modern organizations. Organization Development Journal, 30(4), 44-53.</span></li><li style="text-align:left;"><span style="font-size:12px;">Rao, M. E. &amp; Rao, D. M. (2021). The mental health of high school students during the COVID-19 PANDEMIC. Frontiers in Education, 6, 719539. DOI: 10.3389/feduc.2021.719539</span></li><li style="text-align:left;"><span style="font-size:12px;">Sheridan, M. (2024, October 1). The latest cyberstalking statistics for 2024. SafeHome.org </span></li><li style="text-align:left;"><span style="font-size:12px;">Smith, P.K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S. and Tippett, N. (2008), Cyberbullying: its nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry, 49: 376-385.&nbsp;<a href="https://doi.org/10.1111/j.1469-7610.2007.01846.x" title="https://doi.org/10.1111/j.1469-7610.2007.01846.x" target="_blank" rel="">https://doi.org/10.1111/j.1469-7610.2007.01846.x</a></span></li><li style="text-align:left;"><span style="font-size:12px;">Workplace Bullying Institute (2024). 2024 Workplace Bullying Survey, https://workplacebullying.org/wbi-research/</span></li></ul></div></blockquote></div>
</div><div data-element-id="elm_NVjUxNQYSJKH_VdSVbxdmA" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 07 Jan 2025 05:18:41 +0000</pubDate></item></channel></rss>