Skip to main content
Full access
Professional News
Published Online: 5 January 2001

E-Mail’s Beauty Releases Beast in Some People

John Lion, M.D.: “People with impaired social judgment are prone to the temptations of the keyboard.”
E-mail’s ease of use and speed sometimes prompt aggrieved workers and spurned suitors, among others, to say things they might not otherwise say. E-mail’s anonymity also boosts its potential for exploitation of others, according to Baltimore forensic psychiatrist John Lion, M.D.
When assessing threatening or criminal behavior, a clinician should routinely review the person’s e-mail, said Lion at the annual meeting of the American Academy of Psychiatry and the Law in Vancouver in October.
After one college student shot and killed another, for example, college officials learned the two had exchanged hundreds of e-mails over several months, sometimes several in a single day. As one withdrew from the relationship, the other expressed outrage, disappointment, and increasing desperation. While none of the messages included overt threats, Lion said, their volume and the crescendo of betrayal in the eventual perpetrator’s notes, in retrospect, might have drawn attention to the unhealthy relationship.
Electronic stalking cases often follow this pattern, said Lion, a clinical professor of psychiatry at the University of Maryland School of Medicine. The stalker initially pleads for contact, displaying mounting anger and despair when the other person refuses those requests. Though the person who writes “You brushed me away like I was worthless” may appear to be more vulnerable to harm than the receiver, Lion said, “the vector of violence can shift suddenly.” The perpetrator in the above case was deemed criminally responsible and sentenced to prison for 30 years.
College administrators need to caution students to watch what they say in their e-mails, he said, and remind them that e-mail messages are public documents.
In another instance, a professor e-mailed a protest note to a journal editor who had rejected his paper, saying, “Perhaps I should send you a letter bomb.” The editor contacted the professor’s dean. The faculty member acknowledged his error and apologized profusely, citing marital stress that he felt had precipitated his outburst.
After receiving increasingly unfavorable job evaluations, a worker resigned from his job. He then set up a Web site cataloging complaints against his former employer, particularly his supervisor, whom he threatened to sue for treating him unfairly. The employer worried about the man’s potential for committing physical violence. But in threatening legal action, Lion said, the man translated his rage into socially acceptable—albeit irritating—behavior. He never did file a lawsuit.
“People with impaired social judgment are prone to the temptations of the keyboard,” Lion said. Because people write e-mail quickly, he added, their messages, along with their Web sites, offer windows into their thought processes the clinician might not otherwise see.
People compose e-mail when they’re alone, making the experience conducive to a fantasy of privacy. But e-mail is more akin to shouting through a megaphone, he said, than to ordinary letter writing. To send a letter by regular mail, you have to compose it, print it, address an envelope, put a stamp on it, and take it to a mailbox. The process takes effort and time that permit cooler thoughts to surface.
E-mail also lacks feedback that ordinarily shapes interpersonal relationships. When talking face to face, people typically utilize eye contact, facial expression, tone of voice, body language, and so on to guide what they say and do. “Some people find such demands burdensome,” Lion said. “E-mail relieves them of this pressure.”
Real-time interaction occurs on the Internet in chat rooms. People with predatory instincts, Lion said, often gravitate to sexual chat rooms. In one, an older man struck up a conversation with a chat room visitor who identified herself as a 14-year-old girl. The man quickly began to ask sexual questions and describe behaviors in which the girl expressed interest but no commitment, actually saying very little. The two made plans to meet at a food court in a shopping mall. When the man showed up, he was arrested. The “girl” was an FBI agent. On searching the man’s car, FBI agents found an assortment of sexual paraphernalia, including films, handcuffs, and a blindfold.
In another case involving exploitation of a minor, Lion said, the FBI found the perpetrator had more than 10,000 photographs of various types of sexual activities, all catalogued. “I’m amazed that the victims do not show more suspiciousness,” Lion said, “and that perpetrators do not show more wariness. When caught, the perpetrator often says, ‘I was a fool. What was I thinking?’”
Clinicians should ask about computer use, Lion said, when they evaluate or treat people who are unable to express emotions, such as those with schizoid personalities or people predisposed to poor impulse control, including those with histrionic personalities or organic dysfunction. People who are mentally compromised should be restrained from using e-mail, he asserted, in the same way that patients in psychiatric hospitals who abuse phone privileges lose them.
Victims of stalkers often wonder whether to change their phone number or e-mail address, Lion said, or keep it so the stalker can be located. If a stalker is using the phone, he said, one generally tries to put impediments between that person and the victim. An answering machine, for example, provides evidence that may be used later in court. With e-mail, he said, the clinician should encourage the victim to save messages and try to identify words that have charged value or special significance. Analyzing the e-mails also may help some victims confront their own denial of the dangers of continuing a relationship with the person harassing them. ▪

Information & Authors

Information

Published In

History

Published online: 5 January 2001
Published in print: January 5, 2001

Authors

Affiliations

Metrics & Citations

Metrics

Citations

Export Citations

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

For more information or tips please see 'Downloading to a citation manager' in the Help menu.

Format
Citation style
Style
Copy to clipboard

There are no citations for this item

View Options

View options

Get Access

Login options

Already a subscriber? Access your subscription through your login credentials or your institution for full access to this article.

Personal login Institutional Login Open Athens login

Not a subscriber?

Subscribe Now / Learn More

PsychiatryOnline subscription options offer access to the DSM-5-TR® library, books, journals, CME, and patient resources. This all-in-one virtual library provides psychiatrists and mental health professionals with key resources for diagnosis, treatment, research, and professional development.

Need more help? PsychiatryOnline Customer Service may be reached by emailing [email protected] or by calling 800-368-5777 (in the U.S.) or 703-907-7322 (outside the U.S.).

Media

Figures

Other

Tables

Share

Share

Share article link

Share