- High-Tech Stalkers
- "How I Stalked My Girlfriend"
- The Victim's Side
- Identity Assumption
- The Wild, Wild Web
- Sticks and Stones
- The "Stalker" E-Card
- Cyber Stalking and the Law
- Cyber Stalking Facts
- Lethality Assessment Tools
- If You Think You Are Being Cyber Stalked
- Teen/Tech Stalking
- Online GamesThe New Stalker's Ground
- Online Gaming and Malware
- Would You Say It to My Face?
- National School Board Survey
- Women as Perpetrators
Identity Assumption
Unlike identity theft, which is usually focused on perpetrating fraud, identity assumption is more commonly used to destroy someone's reputation.
Falsely posting comments in a public forum that specifically digresses from someone's known beliefs is identity assumption in its mildest form. Imagine someone's picture getting uploaded to the tens of thousands of pornography websites. Imagine having a pornographic website created in your own name along with compromising pictures of yourself. And by the way, those pictures can easily be created using image-editing programs such as Photoshop. This is the same software used by magazine and print editors to make teeth whiter, remove an inch or two from waistlines, and so on. A face from one photo can easily be placed on another or edited using commonly available software.