Academic literature on the topic 'Cyber stalking'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber stalking.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cyber stalking"

1

Lee, Mu Seon. "A Study on the Actual Status and Countermeasures of Cyber Stalking." Korean Association of Criminal Psychology 19, no. 2 (June 30, 2023): 65–76. http://dx.doi.org/10.25277/kcpr.2023.19.2.65.

Full text
Abstract:
Recently, in September, 2022, the so-called Sindang Station Murder in which a man obsessed with love killed a woman cruelly has been arousing public resentment. Besides, these days, cyber stalking, stalking on SNSs, is occurring in many ways; therefore, it is urgent for us to come up with countermeasures for it. Of course, the Stalking Punishment Act has been in effect since the end of 2021; however, there are a lot of difficulties in punishing cyber stalking. Now is the time to discuss countermeasures for it. The purpose of this study is to examine the concept, trend, and actual status of cyber stalking and then figure out the problems and seek effective countermeasures for it. By conducting theoretical discussion, literature review, and status diagnosis on cyber stalking and then discussing the problems and countermeasures of cyber stalking, this researcher has reached the following conclusions. First, it is necessary to establish the exclusive law of cyber stalking. Second, it is needed to define cyber stalking and punish it severely. Third, it is necessary to provide preventive education on cyber stalking. Fourth, the use of cyber crisis management and consulting services is demanded.
APA, Harvard, Vancouver, ISO, and other styles
2

Halder, Debarati. "Cyber stalking victimisation of women: Evaluating the effectiveness of current laws in India from restorative justice and therapeutic jurisprudential perspectives." Temida 18, no. 3-4 (2015): 103–30. http://dx.doi.org/10.2298/tem1504103h.

Full text
Abstract:
Victimisation of women through cyber stalking is one of the most serious crimes against women. Many countries including India have developed laws regulating cyber stalking. This article argues that since both, restorative justice (RJ) and therapeutic jurisprudence (TJ) are victim oriented, the issue of cyber stalking of women may be dealt with by RJ process and the laws in this regard must be analysed by the legal actors with a background in RJ and TJ philosophy. India had earlier taken up therapeutic punishment policy to enforce rights of the accused. But the modern principles of TJ have still not been considered in the RJ background in cyber stalking cases. This article therefore examines whether RJ and TJ principles can replace retributive principles for cyber stalking victimisation. It also examines the Indian cyber stalking law from RJ and TJ perspectives to assess its effectiveness for victims.
APA, Harvard, Vancouver, ISO, and other styles
3

Bibi, Zainab, and Ambreen Abbasi. "Cyber Stalking: Sociological and Psychological Perspective." Global Sociological Review VII, no. I (March 30, 2022): 159–66. http://dx.doi.org/10.31703/gsr.2022(vii-i).15.

Full text
Abstract:
Cyber stalking is the intimidation or threat to cause distress by blackmailing through internet.Cyber stalking is considered to be a threat to the right to privacy while abusing freedom of information. To discuss the subject issue author has used empirical study methodology. The first part provides an explanation of cyber-stalking in detail while discussing its factors, classification and impacts. In the second part, while discussing the impacts of cyber-stalking, then further discussion provides glimpses of sociological and psychological perspectives and causes of cyber-stalking. Finally, the discussion concluded with recommendations intended to provide a way forward for future research.
APA, Harvard, Vancouver, ISO, and other styles
4

Stephen, Arunbaby. "Comparative Analysis of Cyber Stalking Legislations in UK, US and India." Christ University Law Journal 6, no. 2 (July 1, 2017): 61–76. http://dx.doi.org/10.12728/culj.11.4.

Full text
Abstract:
The Internet, with its vast connectivity and ample resources, provides an easy platform for committing crimes. Cyber stalking is one such offence, which has grown in the last two decades with the advent of cheap and fast internet connectivity. The Internet provides various means by which cyber stalking can occur. The lack of boundaries on the internet creates more risk for the users and as more and more people start using internet, the scope and complexity of this problem will only increase. More and more states are passing exclusive statutes for tackling Cyber Stalking, believing that their offline stalking statutes are not enough to handle different aspects of this issue. This paper analyses the different legislations passed across the world to tackle cyber stalking. With stalking itself being a comparatively fresh offence in India, it has been a late entry into the field of cyber stalking, with the first provision being made in 2013, in the form of Section 354 D of the Indian Penal Code. The article examines the shortfalls of this provision and the ways in which they can be tackled.
APA, Harvard, Vancouver, ISO, and other styles
5

Demir, Fatih. "Cyber obsessive obsession: A study in nurses department." JOURNAL OF AWARENESS 9, Special Issue/Özel Sayı (February 5, 2024): 79–90. http://dx.doi.org/10.26809/joa.2261.

Full text
Abstract:
Cyber obsessive stalking is a form of cyber violence that comprises a variety of unfavorable behavior patterns and is thought to be an extension of classic persistent stalking in online settings. Research shows that healthcare professionals are vulnerable to cyber-obsessive harassment due to the negative perception that patients are not satisfied with the service they receive and that their treatment processes are inadequately managed. The purpose of this study is to identify the experiences public and private sector nurses have had with cyber-obsessive stalking. In this cross-sectional study, 165 nurses who work in both the public and commercial sectors make up the study group. Data collecting techniques were the Personal Information Form and the Cyber Obsessive Stalking Scale. The scale, which asks how often cyber-obsessive stalking behaviors have been encountered, has 15 items and includes excessive closeness, threat, and transference components. A statistical package application was used to examine the data that were gathered online. According to the data of the analysis, 72.7% of the participants had at least one experience with cyber obsessive stalker behavior. While exposure to influence-oriented messages was the most frequent conduct, with a rate of 61.2%, exposure to auto, home, and office listening behavior was the least common cyber obsessive stalking behavior. The extreme closeness component of the scale had the highest mean score, while transference was the most prevalent activity. Healthcare professionals face risks such as patient dissatisfaction with the care they receive, societal perceptions of poorly managed treatment processes, and, in some cases, the possibility of patients engaging in cyber-obsessive tracking for emotional and/or sexual reasons. The results of this study show that cyber obsessive stalking behaviors are observed among the nurses participating in the study.
APA, Harvard, Vancouver, ISO, and other styles
6

Mubasher, Masooma, Asma Seemi Malik, and Amjad Mahmood. "GENDER DIFFERENCES IN EXPERIENCING CYBER-BULLYING AND CYBER-STALKING AMONG YOUNG ADULTS Masooma Mubasher." Pakistan Journal of Social Research 05, no. 02 (June 30, 2023): 632–43. http://dx.doi.org/10.52567/pjsr.v5i02.1145.

Full text
Abstract:
This research specifically aims to investigate the prevalence of online harassment among boys and girls. A study on the perception and experiences of young adults regarding online harassment victimization has been selected with the topic "Gender differences in experiencing cyber-bullying and cyber-stalking." It offers detailed insights into their experiences and behaviours concerning cyber bullying, as well as the impact of cyber bullying on their lives and their coping strategies. This qualitative study employs a purposive sampling technique, with 12 participants (6 males and 6 females) aged 19 to 30 from various colleges and universities engaging in in-depth interviews. Thematic analysis was utilized to transcribe and analyze the interviews. The findings reveal no significant gender differences in cyber bullying and cyber stalking experiences among young adults. Both boys and girls were found to be targets of online harassment, but they often refrained from reporting such incidents due to privacy concerns. The primary challenge for future cyber bullying prevention efforts will be keeping up with the rapid advancements in technology. Keywords: Cyber bullying, cyber-stalking, social networking sites, young adults, online moral disengagement.
APA, Harvard, Vancouver, ISO, and other styles
7

Hamin, Zaiton, and Wan Rosalili Wan Rosli. "Managing Cyber Stalking in Electronic Workplaces." Advanced Science Letters 23, no. 8 (August 1, 2017): 7895–99. http://dx.doi.org/10.1166/asl.2017.9603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fadilah, Andi, Renda Aranggraeni, and Sri Reski Putri. "Eksistensi Keamanan Siber terhadap Tindakan Cyberstalking dalam Sistem Pertanggungjawaban Pidana Cybercrime." Syntax Literate ; Jurnal Ilmiah Indonesia 6, no. 4 (April 20, 2021): 1555. http://dx.doi.org/10.36418/syntax-literate.v6i4.2524.

Full text
Abstract:
Kejahatan berkembang seiring dengan perkembangan peradaban manusia, dan dapat dikatakan bahwa kejahatan lahir bersama dengan lahirnya peradaban manusia. Perkembangan kejahatan juga diiringi dengan perkembangan pelaku tindak pidana. Oleh karena itu, perlu adanya pertanggungjawaban pidana yang tepat. Tuntutan perubahan serta adanya revolusi industri 4.0, membuat begitu banyak orang berlomba untuk dapat mengikuti arus zaman, terutama dalam hal pengembangan sistem informasi dan teknologi hal tersebut menunjukkan bahwa teknologi internet sudah menjadi keharusan yang digunakan untuk bersosialisasi dan melakukan bisnis di semua tingkat kalangan. Selain pertumbuhan pengguna internet ada juga tren kejahatan internet (cybercrime) seperti cyber stalking, Indonesia dianggap sebagai negara yang paling berisiko terhadap serangan keamanan teknologi informasi, karena hukum pidana Indonesia tidak mengenal khusus tindak pidana stalking. Sebagaimana kita ketahui saat ini banyak penggunaan media sosial yang tidak terarah, penggunaan oleh pihak-pihak yang tidak bertanggung jawab, berbagai kejahatan dapat terjadi di dunia maya yang saat ini juga dikenal istilah cybercrime. Metode yang digunakan dalam penulisan yaitu Doctrinal Research, mengenai kejahatan siber jika cyber stalking merupakan salah satu bentuk kejahatan cyber crime, pengaturan mengenai cyber stalking di Indonesia masih sangat awam dan minim penegakan, hal ini dikarenakan sulitnya ditemukan pelaku secara langsung karena mayoritas dari pelaku menggunakan akun anonim pada media sosial serta tidak jelasnya mengenai batasan persetujuan akan penggunaan akun media sosial berkaitan dengan peng-inputan/memasukkan data pribadi secara valid oleh pemilik akun.
APA, Harvard, Vancouver, ISO, and other styles
9

Shambhavee, H. M. "Cyber-Stalking: Threat to People or Bane to Technology." International Journal of Trend in Scientific Research and Development Volume-3, Issue-2 (February 28, 2019): 350–55. http://dx.doi.org/10.31142/ijtsrd21354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mosechkin, I. N. "Distant Psychological Violence: Prospects for Improvement of Criminal Legislation." Psychology and Law 11, no. 4 (2021): 64–76. http://dx.doi.org/10.17759/psylaw.2021110405.

Full text
Abstract:
The article researches the legal issues of protection from various forms of distant psychological violence arising in electronic communication. The study aims to assess the public danger of cyber-bullying, cyber-stalking and cyber-harassment among potential and real victims in order to develop recommendations for improvement of domestic legislature. The main results of the study have been obtained by surveying 207 individuals and by means of comparative review of domestic and foreign law. The results indicate that distant violence does take place, but its assessment by legislators and the public is highly controversial. Cyber-harassment is commonly seen as a more dangerous phenomenon than cyber-bullying or cyber-stalking, which raises a question of its criminalization in the law. This necessitates a correct definition of sexual harassment in distant form as there are risks of either intruding into the field of socially acceptable behavior or overlooking the socially unacceptable ones.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cyber stalking"

1

Gerhold, Sönke. "Das System des Opferschutzes im Bereich des Cyber- und Internetstalking : rechtliche Reaktionsmöglichkeiten der Betroffenen /." Baden-Baden : Nomos, 2010. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=018962906&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gerhold, Sönke. "Das System des Opferschutzes im Bereich des Cyber- und Internetstalking rechtliche Reaktionsmöglichkeiten der Betroffenen." Baden-Baden Nomos, 2009. http://d-nb.info/999355465/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cajigas, Julie Ann. "Facebook Anonymous Information Seeking (FAIS) Behaviors = Emerging Definitions and Conceptual Relationships." Cleveland State University / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=csu1312565052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dardis, Christina M. "An Integrative Theory Analysis of Real-Life and Cyber Unwanted Pursuit Perpetration Following Relationship Break-Up." Ohio University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1400764792.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Albar, Ali Aldroos. "Development of an Instrument to Measure the Level of Acceptability and Tolerability of Cyber Aggression: Mixed-Methods Research on Saudi Arabian Social Media Users." Thesis, University of North Texas, 2016. https://digital.library.unt.edu/ark:/67531/metadc849766/.

Full text
Abstract:
Cyber aggression came about as a result of advances in information communication technology and the aggressive usage of the technology in real life. Cyber aggression can take on many forms and facets. However, the main focus of this study is cyberbullying and cyberstalking through information sharing practices that might constitute digital aggressive acts. Human aggression has been extensively investigated. Studies focusing on understanding the causes and effects that can lead to physical and digital aggression have shown the prevalence of cyber aggression in different settings. Moreover, these studies have shown strong relationship between cyber aggression and the physiological and physical trauma on both perpetrators and their victims. Nevertheless, the literature shows a lack of studies that could measure the level of acceptance and tolerance of these dangerous digital acts. This study is divided into two main stages; Stage one is a qualitative pilot study carried out to explore the concept of cyber aggression and its existence in Saudi Arabia. In-depth interviews were conducted with 14 Saudi social media users to collect understanding and meanings of cyber aggression. The researcher followed the Colaizzi’s methods to analyze the descriptive data. A proposed model was generated to describe cyber aggression in social media applications. The results showed that there is a level of acceptance to some cyber aggression acts due to a number of factors. The second stage of the study is focused on developing scales with reliable items that could determine acceptability and tolerability of cyber aggression. In this second stage, the researcher used the factors discovered during the first stage as source to create the scales’ items. The proposed methods and scales were analyzed and tested to increase reliability as indicated by the Cronbach’s Alpha value. The scales were designed to measure how acceptable and tolerable is cyber-bullying, cyber-stalking in Saudi Arabia and the sharing of some information in social media applications. The results show a strong tolerance level of those activities. This study is a valuable resource for advanced-level students, educators, and researchers who focus on cyber security, cyber psychology, and cyber aggression in social network sites.
APA, Harvard, Vancouver, ISO, and other styles
6

Sissing, Kim Shandre. "A criminological exploration of cyber stalking in South Africa." Diss., 2014. http://hdl.handle.net/10500/13067.

Full text
Abstract:
The introduction of cyber technology, accompanied by its fast developing nature, has not only resulted in numerous advantages to its user and society as a whole but has also produced harmful consequences specifically impacting on cyber crime. One of these harmful effects is cyber stalking. Cyber stalking is the use of the Internet or any electronic medium to stalk, harass and pursue victims. This unwanted perusal has various negative implications for the victim, as cyber stalking can disrupt many aspects of an individual’s lifestyle. In this study, the occurrence, nature and the impact of cyber stalking among the victims of cyber stalking were explored. Additionally, protective measures available to victims of cyber stalking were examined as a way to facilitate the operational efficiency of related legislation. This was done through determining the occurrence, nature and the impact of cyber stalking as well as the extent of the usage of social networks in the commission of cyber stalking. Legislation specific to South Africa and the effectiveness of such legislation were examined. The study implemented a qualitative approach. Twelve research participants who met the requirements of the study were selected by means of purposive and snowball sampling methods. The study was publicised on the Internet through current popular social network sites. In conjunction to the cyber theme of the study, the research participants were requested to complete an online e-mail interview to share their personal cyber stalking victimisation experiences. Within the constraints of the e-mail interview, a semi-structured interview schedule was incorporated in order to guide the research participants in sharing their cyber stalking victimisation experiences. The findings of the study were extensive; ranging from emerged patterns to unique and exclusive experiences. In brief, the study concludes that cyber stalking is occurring in South Africa, its nature and impact is complex and although there are many common themes within cyber stalking, it is uniquely situated to individual cyber stalking incident(s). Although there is no current South African legislation specifically aimed at addressing cyber stalking, South African legislation comprehensively deals with addressing the problem of cyber stalking within various related legislation. It was determined that although cyber stalking is effectively addressed in the drafting of legislation, it is ineffectively administered at grass roots level, where the police act as the gatekeepers and vital role players in the reporting and intervention of crime. Based upon the findings, as guided by the aims and objectives of the study, recommendations for the prevention and intervention of cyber stalking as well as recommendations for future research were made. As derived from the research participants’ responses as well as from current literature, recommendations focused on all victims of cyber stalking while specifically paying attention to young victims and victims who are business users. Recommendations were also made to assist in dealing with cyber stalking as well as recommendations aimed at assisting professional role players. In the final chapter of the study, emphasis is placed on awareness and educational campaigns aimed at informing the cyber community of cyber stalking.
Criminal & Procedural Law
Masters of Arts (Criminology)
APA, Harvard, Vancouver, ISO, and other styles
7

Sissing, Shandre Kim. "A criminological exploration of cyber stalking in South Africa." Diss., 2013. http://hdl.handle.net/10500/13067.

Full text
Abstract:
The introduction of cyber technology, accompanied by its fast developing nature, has not only resulted in numerous advantages to its user and society as a whole but has also produced harmful consequences specifically impacting on cyber crime. One of these harmful effects is cyber stalking. Cyber stalking is the use of the Internet or any electronic medium to stalk, harass and pursue victims. This unwanted perusal has various negative implications for the victim, as cyber stalking can disrupt many aspects of an individual’s lifestyle. In this study, the occurrence, nature and the impact of cyber stalking among the victims of cyber stalking were explored. Additionally, protective measures available to victims of cyber stalking were examined as a way to facilitate the operational efficiency of related legislation. This was done through determining the occurrence, nature and the impact of cyber stalking as well as the extent of the usage of social networks in the commission of cyber stalking. Legislation specific to South Africa and the effectiveness of such legislation were examined. The study implemented a qualitative approach. Twelve research participants who met the requirements of the study were selected by means of purposive and snowball sampling methods. The study was publicised on the Internet through current popular social network sites. In conjunction to the cyber theme of the study, the research participants were requested to complete an online e-mail interview to share their personal cyber stalking victimisation experiences. Within the constraints of the e-mail interview, a semi-structured interview schedule was incorporated in order to guide the research participants in sharing their cyber stalking victimisation experiences. The findings of the study were extensive; ranging from emerged patterns to unique and exclusive experiences. In brief, the study concludes that cyber stalking is occurring in South Africa, its nature and impact is complex and although there are many common themes within cyber stalking, it is uniquely situated to individual cyber stalking incident(s). Although there is no current South African legislation specifically aimed at addressing cyber stalking, South African legislation comprehensively deals with addressing the problem of cyber stalking within various related legislation. It was determined that although cyber stalking is effectively addressed in the drafting of legislation, it is ineffectively administered at grass roots level, where the police act as the gatekeepers and vital role players in the reporting and intervention of crime. Based upon the findings, as guided by the aims and objectives of the study, recommendations for the prevention and intervention of cyber stalking as well as recommendations for future research were made. As derived from the research participants’ responses as well as from current literature, recommendations focused on all victims of cyber stalking while specifically paying attention to young victims and victims who are business users. Recommendations were also made to assist in dealing with cyber stalking as well as recommendations aimed at assisting professional role players. In the final chapter of the study, emphasis is placed on awareness and educational campaigns aimed at informing the cyber community of cyber stalking.
Criminal and Procedural Law
M. A. (Criminology)
APA, Harvard, Vancouver, ISO, and other styles
8

Wu, Yi-Hsuan, and 吳宜璇. "A Study on the Regulation of Cyber-stalking and harassment and its Constitutional Boundaries." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/kes38e.

Full text
Abstract:
碩士
國立政治大學
法律學系
106
Cyber-stalking and harassment is a social problem caused by the development of technology. The Internet not only increases the severity of the damage to the victims of stalking and harassment, but also raises the difficulty of defining cyber-stalking. The regulation of cyber-stalking and harassment involves the free speech interests of both the harasser and victim. The constitutionality of anti-cyber stalking and harassment law in the United States has been challenged on the ground of vagueness and over-breadth. Due to the characteristics of online speech, adding non-descriptive elements, such as “against the expressed will of the victim” and “continuity or repetition” may enhance the clarity of the law; it may also resolve the constitutional problem of the anti-cyber stalking and harassment law in U.S. In addition, considering the feature of Internet communication, “non-one-to-one harassment speech” should be restricted either. However, it should be prohibited only when the harasser is able to expect that the victim is likely to be exposed to that speech. Lastly, besides imposing liabilities on the harasser, since online speech needs to be transmitted by the Internet service providers(ISPs), ISPs are in a crucial position to prevent of cyber stalking and harassment. The ISP immunity provided by Section 230 of the Communications Decency Act fails to properly balance the free speech interests among different parties. The scope of the immunity should be overhauled. ISPs should be liable if they encourage or aide and abide the harasser. Moreover, ISPs should remove the speech when they receive the notification from the victims, unless they reasonably believed the speech is not against the law. As Taiwan’s legislature is preparing to enact similar anti-cyberstalking and harassment law, the suggestions mentioned in this thesis may help them to craft a better law.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cyber stalking"

1

Heintzelman, Brenda Irish. Haters: Cyber Stalking and Abuse Specific to the Case of Accused Killer Christopher Watts. Independently Published, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lozano, Kelly Lynn. Cyberbullying Survival Guide : Cracking the Code on Cyber Bullying, Harassment, and Stalking: A Quick and Easy How to EBook to EMPOWER and PROTECT Yourself from Cyberbullies and Trolls on Social Media. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Brison, Susan J., and Katharine Gelber, eds. Free Speech in the Digital Age. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190883591.001.0001.

Full text
Abstract:
This collection of thirteen new essays is the first to examine, from a range of disciplinary perspectives, how the new technologies and global reach of the internet are changing the theory and practice of free speech. The rapid expansion of online communication, as well as the changing roles of government and private organizations in monitoring and regulating the digital world, give rise to new questions, including: How do philosophical defenses of the right to freedom of expression, developed in the age of the town square and the printing press, apply in the digital age? Should search engines be covered by free speech principles? How should international conflicts over online speech regulations be resolved? Is there a right to be forgotten that is at odds with the right to free speech? How has the Internet facilitated new speech-based harms such as cyber-stalking, twitter-trolling, and “revenge” porn, and how should these harms be addressed? The contributors to this groundbreaking volume include philosophers, legal theorists, political scientists, communications scholars, public policy makers, and activists.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Cyber stalking"

1

van der Aa, Suzan. "International (Cyber)Stalking: Impediments to Investigation and Prosecution." In Studies in Global Justice, 191–213. Dordrecht: Springer Netherlands, 2010. http://dx.doi.org/10.1007/978-90-481-9020-1_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chan, Heng Choon (Oliver). "Stalking Perpetration and Victimisation among Adolescents." In Cyber and Face-to-Face Aggression and Bullying among Children and Adolescents, 32–48. London: Routledge, 2024. http://dx.doi.org/10.4324/9781003414933-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"Cyber Stalking: Typology, Etiology, and Victims." In Cyber Criminology, 313–34. Routledge, 2011. http://dx.doi.org/10.1201/b10718-22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"Legislative Response to Cyber Aggression." In Cyber Harassment and Policy Reform in the Digital Age, 52–78. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5285-7.ch003.

Full text
Abstract:
This chapter presents the federal and state-local legislative response to cyber aggression: stalking, harassment, and bullying. Along with other federal efforts, the federal Violence Against Women Act and its reauthorizations is identified as a cornerstone law in protecting the public on stalking and harassment. State-local laws have advanced in scope; yet, there are laggard states not yet entirely on board in passing legislation aligned with the advancement of technology used in cyber aggression. All three branches of government to some extent have had a voice in today's cyber policy. Judicial court cases have shaped policy decisions and several key cases are presented.
APA, Harvard, Vancouver, ISO, and other styles
5

McNeal, Ramona S., Susan M. Kunkle, and Mary Schmeida. "Legislative Response to Cyber Aggression." In Developing Safer Online Environments for Children, 206–29. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1684-3.ch009.

Full text
Abstract:
This chapter presents the federal and state-local legislative response to cyber aggression: stalking, harassment, and bullying. Along with other federal efforts, the federal Violence Against Women Act and its reauthorizations is identified as a cornerstone law in protecting the public on stalking and harassment. State-local laws have advanced in scope; yet, there are laggard states not yet entirely on board in passing legislation aligned with the advancement of technology used in cyber aggression. All three branches of government to some extent have had a voice in today's cyber policy. Judicial court cases have shaped policy decisions and several key cases are presented.
APA, Harvard, Vancouver, ISO, and other styles
6

Alonso de Escamilla, Avelina. "Answering the New Realities of Stalking." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 67–76. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6324-4.ch005.

Full text
Abstract:
This chapter aims mainly to carry out a study of a new type of harassment named stalking. After the study of its contents through the opinions of the most recognized specialist on it, the chapter defines the crime based on the expert's opinion. A study of comparative law is done, and this study focuses on the different ways stalking happens. This chapter offers a critical study of the inclusion of stalking as a felony in the criminal amendment Organic Criminal Law 10/1995 of 23 November, Criminal Law Code. To finish, this chapter proposes some improvements to that regulation and focuses on the new realities that bring about cyber stalking.
APA, Harvard, Vancouver, ISO, and other styles
7

Beech, Mark, and Jonathan Bishop. "Cyber-Stalking or Just Plain Talking?" In Advances in Psychology, Mental Health, and Behavioral Studies, 111–37. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8595-6.ch007.

Full text
Abstract:
In the United Kingdom there were a number of rape threats made to prominent public figures who identify feminists. It led to three people being jailed, namely Isabella Sorley, John Nimmo and Peter Nunn. This was at a time when the UK police had identified around 50,000 online sex offenders but said they could not all be prosecuted. This study investigates the use of rape threats and other threatening language based on those tweeted by these people to see the contexts in which they are used. The study finds that most rape and other threats made are done as a joke and not with any real malicious intent. The chapter recommends on the basis of the evidence necessary for the authorities to use the judgement in DPP v Chambers, which would mean the context of an alleged abusive message would be considered.
APA, Harvard, Vancouver, ISO, and other styles
8

Gashroo, Ovais Bashir, Saima Saleem, and Monica Mehrotra. "Trolling, Cyber-Stalking, Cyber-Bullying, and Identity Theft in OSNs." In Advances in Social Networking and Online Communities, 219–44. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-6909-5.ch010.

Full text
Abstract:
Before the development of information and communication technology, social connections were confined by narrow cultural borders. User-generated multimodal information, online social networks, and rich data related to human behavior have all undergone a revolution as a result of these social technologies. However, the abuse of social technology, such as social media platforms, has given rise to a brand-new type of cyber-crimes such as cyberbullying, cyberstalking, cyber trolling, identity theft, etc. Such crimes result in a breach of privacy, a security lapse, financial fraud, and harm to public mental health and property. This chapter discusses various automated methods and systems driven by machine learning, deep learning, and fuzzy-logic-based algorithms for tackling various types of cybercrimes on various social media platforms. It then highlights various issues and challenges pertaining to the existing methods, which offer new study avenues for researchers to investigate.
APA, Harvard, Vancouver, ISO, and other styles
9

Chan, Stephanie. "Hidden but Deadly: Stalkerware Usage in Intimate Partner Stalking." In Introduction to Cyber Forensic Psychology, 45–66. WORLD SCIENTIFIC, 2021. http://dx.doi.org/10.1142/9789811232411_0002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bossler, Adam M., and Thomas J. Holt. "Online Abuse." In Encyclopedia of Cyber Behavior, 911–17. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0315-8.ch075.

Full text
Abstract:
The development of computers, cell phones, and the Internet allows individuals to connect with one another with ease in a variety of ways in near real time. The beneficial impact of these resources, however, has been adulterated by some to engage in abusive communications while online. Specifically, individuals now use email, text messaging, and social networking sites to spread hurtful or malicious information about others. This entry summarizes the problem of online abuse via cyberbullying, online harassment, and stalking by discussing the prevalence of these phenomena as well as the prospective predictors of victimization.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cyber stalking"

1

Pandey, Shweta, Anita Gehlot, Anil Kumar Dixit, Rajat Balyan, Rajesh Singh, and Samta Kathuria. "Innovation Intervention: Cyber Stalking." In 2022 5th International Conference on Contemporary Computing and Informatics (IC3I). IEEE, 2022. http://dx.doi.org/10.1109/ic3i56241.2022.10072899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Haron, Haryani, and Farahidah Bt Mohd Yusof. "Cyber stalking: The social impact of social networking technology." In 2010 International Conference on Education and Management Technology (ICEMT). IEEE, 2010. http://dx.doi.org/10.1109/icemt.2010.5657665.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Miftha, Ameema, Marc Conrad, and Marcia Gibson. "CYBER STALKING IS A SOCIAL EVIL: FROM THE INDIAN WOMEN'S PERSPECTIVE." In 17th International Conference on e-Society 2019. IADIS Press, 2019. http://dx.doi.org/10.33965/es2019_201904r002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yunitasari, Yessi, Latjuba S. T. T. Sofyana, and Maria Ulfah Siregar. "Cyber Crime Identifying Using Machine Learning Techniques - Based Sentiment Analysis." In The 6th International Conference on Science and Engineering. Switzerland: Trans Tech Publications Ltd, 2024. http://dx.doi.org/10.4028/p-j46rcy.

Full text
Abstract:
Social media analytics is a form of information analytics that is quite important in today's cyber situation. Cybercrime is criminal behaviour based on computers and internet networks. Cybercriminals usually hack systems to obtain the personal information of victims. There are many types of cybercrimes. There are four types of cybercrimes: Phishing scams, Hacking, Cyber Stalking and Cyber Bullying. This research aims to help the process analysis by the Police or investigative institutions of the private sector in knowing the results of public sentiment on social media related to current cyber crimes. Ciber Crime identifying using machine learning techniques, based sentiment analysis. Method used for sentiment analysis related to cybercrime is Random Forest, Naïve Bayes, and KNN. The highest accuracy value of the three methods tried is the Naive Bayes algorithm of 99.45%. The highest precision value uses the Naive Bayes algorithm of 99.80%, and the highest recall value uses the random forest algorithm of 100%.
APA, Harvard, Vancouver, ISO, and other styles
5

Rosli, Wan Rosalili Wan. "The Scent Of A Woman: Governing The Gendered Crime Of Cyber Stalking." In ILC 2017 - 9th UUM International Legal Conference. Cognitive-Crcs, 2018. http://dx.doi.org/10.15405/epsbs.2018.12.03.50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography