Another deviant behavior that has come up in recent times is cyber stalking. Roberts (2008) defines cyber stalking as “stalking activities conducted in cyberspace”. Individuals who stalk others using the Internet are taking part in cyber stalking. These individuals can use a variety of tools in order to stalk the person they want. They can use email, chat rooms, instant messaging etc. in order to stalk someone online. In a study done by D’ovidio and Doyler (2003), they found that the most common form of cyber stalking was email and instant messaging. They also found that the four different types of cyber stalking activities were threats, harm to reputation, damage to data, and attempts to access any confidential information. So what facilitates cyber stalking activities? Roberts (2008) argues that the Internet and access to information from other individuals help facilitate these activities. Cyber stalkers can simply go on Google, type in the name of the person they want, and get important information about them. The Internet also allows for a so-called bigger “pool” of potential victims. Roberts (2008) briefly mentioned a preliminary study that was done showing that more than four out of ten respondents did not know the identity of their cyber stalker. The reason for that is because the anonymity the Internet provides allows cyber stalkers to get away with it. Cyber stalkers can easily misrepresent themselves online when compared to face-to-face interaction. The victim does not know exactly who they are talking to and the detection of this deception is very unlikely due to anonymity. The Internet provides a wall of protection for these cyber stalkers. Robert (2008) states, “The anonymity provided may reduce social inhibitions, restraints on behavior and accountability for actions”. The anonymity of cyber stalking allows for this deviant behavior to occur without feeling guilty or responsible for the actions committed. Robert (2008) also states that cyber stalkers can use many different forms to disguise themselves from their victims. With the advancement in technology, it is now possible to send text messages online, as well as create as many email accounts as you want etc. With this availability, cyber stalkers are presented with ways to stay anonymous while also making sure not to use personal accounts. Cyber stalkers are also able to destroy any evidence that might trace them to the act, which again enhances the anonymity of the deviant act.