Academic literature on the topic 'Cyber stalking'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber stalking.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cyber stalking"
Lee, Mu Seon. "A Study on the Actual Status and Countermeasures of Cyber Stalking." Korean Association of Criminal Psychology 19, no. 2 (June 30, 2023): 65–76. http://dx.doi.org/10.25277/kcpr.2023.19.2.65.
Full textHalder, Debarati. "Cyber stalking victimisation of women: Evaluating the effectiveness of current laws in India from restorative justice and therapeutic jurisprudential perspectives." Temida 18, no. 3-4 (2015): 103–30. http://dx.doi.org/10.2298/tem1504103h.
Full textBibi, Zainab, and Ambreen Abbasi. "Cyber Stalking: Sociological and Psychological Perspective." Global Sociological Review VII, no. I (March 30, 2022): 159–66. http://dx.doi.org/10.31703/gsr.2022(vii-i).15.
Full textStephen, Arunbaby. "Comparative Analysis of Cyber Stalking Legislations in UK, US and India." Christ University Law Journal 6, no. 2 (July 1, 2017): 61–76. http://dx.doi.org/10.12728/culj.11.4.
Full textDemir, Fatih. "Cyber obsessive obsession: A study in nurses department." JOURNAL OF AWARENESS 9, Special Issue/Özel Sayı (February 5, 2024): 79–90. http://dx.doi.org/10.26809/joa.2261.
Full textMubasher, Masooma, Asma Seemi Malik, and Amjad Mahmood. "GENDER DIFFERENCES IN EXPERIENCING CYBER-BULLYING AND CYBER-STALKING AMONG YOUNG ADULTS Masooma Mubasher." Pakistan Journal of Social Research 05, no. 02 (June 30, 2023): 632–43. http://dx.doi.org/10.52567/pjsr.v5i02.1145.
Full textHamin, Zaiton, and Wan Rosalili Wan Rosli. "Managing Cyber Stalking in Electronic Workplaces." Advanced Science Letters 23, no. 8 (August 1, 2017): 7895–99. http://dx.doi.org/10.1166/asl.2017.9603.
Full textFadilah, Andi, Renda Aranggraeni, and Sri Reski Putri. "Eksistensi Keamanan Siber terhadap Tindakan Cyberstalking dalam Sistem Pertanggungjawaban Pidana Cybercrime." Syntax Literate ; Jurnal Ilmiah Indonesia 6, no. 4 (April 20, 2021): 1555. http://dx.doi.org/10.36418/syntax-literate.v6i4.2524.
Full textShambhavee, H. M. "Cyber-Stalking: Threat to People or Bane to Technology." International Journal of Trend in Scientific Research and Development Volume-3, Issue-2 (February 28, 2019): 350–55. http://dx.doi.org/10.31142/ijtsrd21354.
Full textMosechkin, I. N. "Distant Psychological Violence: Prospects for Improvement of Criminal Legislation." Psychology and Law 11, no. 4 (2021): 64–76. http://dx.doi.org/10.17759/psylaw.2021110405.
Full textDissertations / Theses on the topic "Cyber stalking"
Gerhold, Sönke. "Das System des Opferschutzes im Bereich des Cyber- und Internetstalking : rechtliche Reaktionsmöglichkeiten der Betroffenen /." Baden-Baden : Nomos, 2010. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=018962906&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.
Full textGerhold, Sönke. "Das System des Opferschutzes im Bereich des Cyber- und Internetstalking rechtliche Reaktionsmöglichkeiten der Betroffenen." Baden-Baden Nomos, 2009. http://d-nb.info/999355465/04.
Full textCajigas, Julie Ann. "Facebook Anonymous Information Seeking (FAIS) Behaviors = Emerging Definitions and Conceptual Relationships." Cleveland State University / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=csu1312565052.
Full textDardis, Christina M. "An Integrative Theory Analysis of Real-Life and Cyber Unwanted Pursuit Perpetration Following Relationship Break-Up." Ohio University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1400764792.
Full textAlbar, Ali Aldroos. "Development of an Instrument to Measure the Level of Acceptability and Tolerability of Cyber Aggression: Mixed-Methods Research on Saudi Arabian Social Media Users." Thesis, University of North Texas, 2016. https://digital.library.unt.edu/ark:/67531/metadc849766/.
Full textSissing, Kim Shandre. "A criminological exploration of cyber stalking in South Africa." Diss., 2014. http://hdl.handle.net/10500/13067.
Full textCriminal & Procedural Law
Masters of Arts (Criminology)
Sissing, Shandre Kim. "A criminological exploration of cyber stalking in South Africa." Diss., 2013. http://hdl.handle.net/10500/13067.
Full textCriminal and Procedural Law
M. A. (Criminology)
Wu, Yi-Hsuan, and 吳宜璇. "A Study on the Regulation of Cyber-stalking and harassment and its Constitutional Boundaries." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/kes38e.
Full text國立政治大學
法律學系
106
Cyber-stalking and harassment is a social problem caused by the development of technology. The Internet not only increases the severity of the damage to the victims of stalking and harassment, but also raises the difficulty of defining cyber-stalking. The regulation of cyber-stalking and harassment involves the free speech interests of both the harasser and victim. The constitutionality of anti-cyber stalking and harassment law in the United States has been challenged on the ground of vagueness and over-breadth. Due to the characteristics of online speech, adding non-descriptive elements, such as “against the expressed will of the victim” and “continuity or repetition” may enhance the clarity of the law; it may also resolve the constitutional problem of the anti-cyber stalking and harassment law in U.S. In addition, considering the feature of Internet communication, “non-one-to-one harassment speech” should be restricted either. However, it should be prohibited only when the harasser is able to expect that the victim is likely to be exposed to that speech. Lastly, besides imposing liabilities on the harasser, since online speech needs to be transmitted by the Internet service providers(ISPs), ISPs are in a crucial position to prevent of cyber stalking and harassment. The ISP immunity provided by Section 230 of the Communications Decency Act fails to properly balance the free speech interests among different parties. The scope of the immunity should be overhauled. ISPs should be liable if they encourage or aide and abide the harasser. Moreover, ISPs should remove the speech when they receive the notification from the victims, unless they reasonably believed the speech is not against the law. As Taiwan’s legislature is preparing to enact similar anti-cyberstalking and harassment law, the suggestions mentioned in this thesis may help them to craft a better law.
Books on the topic "Cyber stalking"
Heintzelman, Brenda Irish. Haters: Cyber Stalking and Abuse Specific to the Case of Accused Killer Christopher Watts. Independently Published, 2018.
Find full textLozano, Kelly Lynn. Cyberbullying Survival Guide : Cracking the Code on Cyber Bullying, Harassment, and Stalking: A Quick and Easy How to EBook to EMPOWER and PROTECT Yourself from Cyberbullies and Trolls on Social Media. Independently Published, 2021.
Find full textBrison, Susan J., and Katharine Gelber, eds. Free Speech in the Digital Age. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190883591.001.0001.
Full textBook chapters on the topic "Cyber stalking"
van der Aa, Suzan. "International (Cyber)Stalking: Impediments to Investigation and Prosecution." In Studies in Global Justice, 191–213. Dordrecht: Springer Netherlands, 2010. http://dx.doi.org/10.1007/978-90-481-9020-1_8.
Full textChan, Heng Choon (Oliver). "Stalking Perpetration and Victimisation among Adolescents." In Cyber and Face-to-Face Aggression and Bullying among Children and Adolescents, 32–48. London: Routledge, 2024. http://dx.doi.org/10.4324/9781003414933-4.
Full text"Cyber Stalking: Typology, Etiology, and Victims." In Cyber Criminology, 313–34. Routledge, 2011. http://dx.doi.org/10.1201/b10718-22.
Full text"Legislative Response to Cyber Aggression." In Cyber Harassment and Policy Reform in the Digital Age, 52–78. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5285-7.ch003.
Full textMcNeal, Ramona S., Susan M. Kunkle, and Mary Schmeida. "Legislative Response to Cyber Aggression." In Developing Safer Online Environments for Children, 206–29. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1684-3.ch009.
Full textAlonso de Escamilla, Avelina. "Answering the New Realities of Stalking." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 67–76. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6324-4.ch005.
Full textBeech, Mark, and Jonathan Bishop. "Cyber-Stalking or Just Plain Talking?" In Advances in Psychology, Mental Health, and Behavioral Studies, 111–37. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8595-6.ch007.
Full textGashroo, Ovais Bashir, Saima Saleem, and Monica Mehrotra. "Trolling, Cyber-Stalking, Cyber-Bullying, and Identity Theft in OSNs." In Advances in Social Networking and Online Communities, 219–44. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-6909-5.ch010.
Full textChan, Stephanie. "Hidden but Deadly: Stalkerware Usage in Intimate Partner Stalking." In Introduction to Cyber Forensic Psychology, 45–66. WORLD SCIENTIFIC, 2021. http://dx.doi.org/10.1142/9789811232411_0002.
Full textBossler, Adam M., and Thomas J. Holt. "Online Abuse." In Encyclopedia of Cyber Behavior, 911–17. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0315-8.ch075.
Full textConference papers on the topic "Cyber stalking"
Pandey, Shweta, Anita Gehlot, Anil Kumar Dixit, Rajat Balyan, Rajesh Singh, and Samta Kathuria. "Innovation Intervention: Cyber Stalking." In 2022 5th International Conference on Contemporary Computing and Informatics (IC3I). IEEE, 2022. http://dx.doi.org/10.1109/ic3i56241.2022.10072899.
Full textHaron, Haryani, and Farahidah Bt Mohd Yusof. "Cyber stalking: The social impact of social networking technology." In 2010 International Conference on Education and Management Technology (ICEMT). IEEE, 2010. http://dx.doi.org/10.1109/icemt.2010.5657665.
Full textMiftha, Ameema, Marc Conrad, and Marcia Gibson. "CYBER STALKING IS A SOCIAL EVIL: FROM THE INDIAN WOMEN'S PERSPECTIVE." In 17th International Conference on e-Society 2019. IADIS Press, 2019. http://dx.doi.org/10.33965/es2019_201904r002.
Full textYunitasari, Yessi, Latjuba S. T. T. Sofyana, and Maria Ulfah Siregar. "Cyber Crime Identifying Using Machine Learning Techniques - Based Sentiment Analysis." In The 6th International Conference on Science and Engineering. Switzerland: Trans Tech Publications Ltd, 2024. http://dx.doi.org/10.4028/p-j46rcy.
Full textRosli, Wan Rosalili Wan. "The Scent Of A Woman: Governing The Gendered Crime Of Cyber Stalking." In ILC 2017 - 9th UUM International Legal Conference. Cognitive-Crcs, 2018. http://dx.doi.org/10.15405/epsbs.2018.12.03.50.
Full text