To see the other types of publications on this topic, follow the link: Cyber stalking.

Journal articles on the topic 'Cyber stalking'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cyber stalking.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lee, Mu Seon. "A Study on the Actual Status and Countermeasures of Cyber Stalking." Korean Association of Criminal Psychology 19, no. 2 (June 30, 2023): 65–76. http://dx.doi.org/10.25277/kcpr.2023.19.2.65.

Full text
Abstract:
Recently, in September, 2022, the so-called Sindang Station Murder in which a man obsessed with love killed a woman cruelly has been arousing public resentment. Besides, these days, cyber stalking, stalking on SNSs, is occurring in many ways; therefore, it is urgent for us to come up with countermeasures for it. Of course, the Stalking Punishment Act has been in effect since the end of 2021; however, there are a lot of difficulties in punishing cyber stalking. Now is the time to discuss countermeasures for it. The purpose of this study is to examine the concept, trend, and actual status of cyber stalking and then figure out the problems and seek effective countermeasures for it. By conducting theoretical discussion, literature review, and status diagnosis on cyber stalking and then discussing the problems and countermeasures of cyber stalking, this researcher has reached the following conclusions. First, it is necessary to establish the exclusive law of cyber stalking. Second, it is needed to define cyber stalking and punish it severely. Third, it is necessary to provide preventive education on cyber stalking. Fourth, the use of cyber crisis management and consulting services is demanded.
APA, Harvard, Vancouver, ISO, and other styles
2

Halder, Debarati. "Cyber stalking victimisation of women: Evaluating the effectiveness of current laws in India from restorative justice and therapeutic jurisprudential perspectives." Temida 18, no. 3-4 (2015): 103–30. http://dx.doi.org/10.2298/tem1504103h.

Full text
Abstract:
Victimisation of women through cyber stalking is one of the most serious crimes against women. Many countries including India have developed laws regulating cyber stalking. This article argues that since both, restorative justice (RJ) and therapeutic jurisprudence (TJ) are victim oriented, the issue of cyber stalking of women may be dealt with by RJ process and the laws in this regard must be analysed by the legal actors with a background in RJ and TJ philosophy. India had earlier taken up therapeutic punishment policy to enforce rights of the accused. But the modern principles of TJ have still not been considered in the RJ background in cyber stalking cases. This article therefore examines whether RJ and TJ principles can replace retributive principles for cyber stalking victimisation. It also examines the Indian cyber stalking law from RJ and TJ perspectives to assess its effectiveness for victims.
APA, Harvard, Vancouver, ISO, and other styles
3

Bibi, Zainab, and Ambreen Abbasi. "Cyber Stalking: Sociological and Psychological Perspective." Global Sociological Review VII, no. I (March 30, 2022): 159–66. http://dx.doi.org/10.31703/gsr.2022(vii-i).15.

Full text
Abstract:
Cyber stalking is the intimidation or threat to cause distress by blackmailing through internet.Cyber stalking is considered to be a threat to the right to privacy while abusing freedom of information. To discuss the subject issue author has used empirical study methodology. The first part provides an explanation of cyber-stalking in detail while discussing its factors, classification and impacts. In the second part, while discussing the impacts of cyber-stalking, then further discussion provides glimpses of sociological and psychological perspectives and causes of cyber-stalking. Finally, the discussion concluded with recommendations intended to provide a way forward for future research.
APA, Harvard, Vancouver, ISO, and other styles
4

Stephen, Arunbaby. "Comparative Analysis of Cyber Stalking Legislations in UK, US and India." Christ University Law Journal 6, no. 2 (July 1, 2017): 61–76. http://dx.doi.org/10.12728/culj.11.4.

Full text
Abstract:
The Internet, with its vast connectivity and ample resources, provides an easy platform for committing crimes. Cyber stalking is one such offence, which has grown in the last two decades with the advent of cheap and fast internet connectivity. The Internet provides various means by which cyber stalking can occur. The lack of boundaries on the internet creates more risk for the users and as more and more people start using internet, the scope and complexity of this problem will only increase. More and more states are passing exclusive statutes for tackling Cyber Stalking, believing that their offline stalking statutes are not enough to handle different aspects of this issue. This paper analyses the different legislations passed across the world to tackle cyber stalking. With stalking itself being a comparatively fresh offence in India, it has been a late entry into the field of cyber stalking, with the first provision being made in 2013, in the form of Section 354 D of the Indian Penal Code. The article examines the shortfalls of this provision and the ways in which they can be tackled.
APA, Harvard, Vancouver, ISO, and other styles
5

Demir, Fatih. "Cyber obsessive obsession: A study in nurses department." JOURNAL OF AWARENESS 9, Special Issue/Özel Sayı (February 5, 2024): 79–90. http://dx.doi.org/10.26809/joa.2261.

Full text
Abstract:
Cyber obsessive stalking is a form of cyber violence that comprises a variety of unfavorable behavior patterns and is thought to be an extension of classic persistent stalking in online settings. Research shows that healthcare professionals are vulnerable to cyber-obsessive harassment due to the negative perception that patients are not satisfied with the service they receive and that their treatment processes are inadequately managed. The purpose of this study is to identify the experiences public and private sector nurses have had with cyber-obsessive stalking. In this cross-sectional study, 165 nurses who work in both the public and commercial sectors make up the study group. Data collecting techniques were the Personal Information Form and the Cyber Obsessive Stalking Scale. The scale, which asks how often cyber-obsessive stalking behaviors have been encountered, has 15 items and includes excessive closeness, threat, and transference components. A statistical package application was used to examine the data that were gathered online. According to the data of the analysis, 72.7% of the participants had at least one experience with cyber obsessive stalker behavior. While exposure to influence-oriented messages was the most frequent conduct, with a rate of 61.2%, exposure to auto, home, and office listening behavior was the least common cyber obsessive stalking behavior. The extreme closeness component of the scale had the highest mean score, while transference was the most prevalent activity. Healthcare professionals face risks such as patient dissatisfaction with the care they receive, societal perceptions of poorly managed treatment processes, and, in some cases, the possibility of patients engaging in cyber-obsessive tracking for emotional and/or sexual reasons. The results of this study show that cyber obsessive stalking behaviors are observed among the nurses participating in the study.
APA, Harvard, Vancouver, ISO, and other styles
6

Mubasher, Masooma, Asma Seemi Malik, and Amjad Mahmood. "GENDER DIFFERENCES IN EXPERIENCING CYBER-BULLYING AND CYBER-STALKING AMONG YOUNG ADULTS Masooma Mubasher." Pakistan Journal of Social Research 05, no. 02 (June 30, 2023): 632–43. http://dx.doi.org/10.52567/pjsr.v5i02.1145.

Full text
Abstract:
This research specifically aims to investigate the prevalence of online harassment among boys and girls. A study on the perception and experiences of young adults regarding online harassment victimization has been selected with the topic "Gender differences in experiencing cyber-bullying and cyber-stalking." It offers detailed insights into their experiences and behaviours concerning cyber bullying, as well as the impact of cyber bullying on their lives and their coping strategies. This qualitative study employs a purposive sampling technique, with 12 participants (6 males and 6 females) aged 19 to 30 from various colleges and universities engaging in in-depth interviews. Thematic analysis was utilized to transcribe and analyze the interviews. The findings reveal no significant gender differences in cyber bullying and cyber stalking experiences among young adults. Both boys and girls were found to be targets of online harassment, but they often refrained from reporting such incidents due to privacy concerns. The primary challenge for future cyber bullying prevention efforts will be keeping up with the rapid advancements in technology. Keywords: Cyber bullying, cyber-stalking, social networking sites, young adults, online moral disengagement.
APA, Harvard, Vancouver, ISO, and other styles
7

Hamin, Zaiton, and Wan Rosalili Wan Rosli. "Managing Cyber Stalking in Electronic Workplaces." Advanced Science Letters 23, no. 8 (August 1, 2017): 7895–99. http://dx.doi.org/10.1166/asl.2017.9603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fadilah, Andi, Renda Aranggraeni, and Sri Reski Putri. "Eksistensi Keamanan Siber terhadap Tindakan Cyberstalking dalam Sistem Pertanggungjawaban Pidana Cybercrime." Syntax Literate ; Jurnal Ilmiah Indonesia 6, no. 4 (April 20, 2021): 1555. http://dx.doi.org/10.36418/syntax-literate.v6i4.2524.

Full text
Abstract:
Kejahatan berkembang seiring dengan perkembangan peradaban manusia, dan dapat dikatakan bahwa kejahatan lahir bersama dengan lahirnya peradaban manusia. Perkembangan kejahatan juga diiringi dengan perkembangan pelaku tindak pidana. Oleh karena itu, perlu adanya pertanggungjawaban pidana yang tepat. Tuntutan perubahan serta adanya revolusi industri 4.0, membuat begitu banyak orang berlomba untuk dapat mengikuti arus zaman, terutama dalam hal pengembangan sistem informasi dan teknologi hal tersebut menunjukkan bahwa teknologi internet sudah menjadi keharusan yang digunakan untuk bersosialisasi dan melakukan bisnis di semua tingkat kalangan. Selain pertumbuhan pengguna internet ada juga tren kejahatan internet (cybercrime) seperti cyber stalking, Indonesia dianggap sebagai negara yang paling berisiko terhadap serangan keamanan teknologi informasi, karena hukum pidana Indonesia tidak mengenal khusus tindak pidana stalking. Sebagaimana kita ketahui saat ini banyak penggunaan media sosial yang tidak terarah, penggunaan oleh pihak-pihak yang tidak bertanggung jawab, berbagai kejahatan dapat terjadi di dunia maya yang saat ini juga dikenal istilah cybercrime. Metode yang digunakan dalam penulisan yaitu Doctrinal Research, mengenai kejahatan siber jika cyber stalking merupakan salah satu bentuk kejahatan cyber crime, pengaturan mengenai cyber stalking di Indonesia masih sangat awam dan minim penegakan, hal ini dikarenakan sulitnya ditemukan pelaku secara langsung karena mayoritas dari pelaku menggunakan akun anonim pada media sosial serta tidak jelasnya mengenai batasan persetujuan akan penggunaan akun media sosial berkaitan dengan peng-inputan/memasukkan data pribadi secara valid oleh pemilik akun.
APA, Harvard, Vancouver, ISO, and other styles
9

Shambhavee, H. M. "Cyber-Stalking: Threat to People or Bane to Technology." International Journal of Trend in Scientific Research and Development Volume-3, Issue-2 (February 28, 2019): 350–55. http://dx.doi.org/10.31142/ijtsrd21354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mosechkin, I. N. "Distant Psychological Violence: Prospects for Improvement of Criminal Legislation." Psychology and Law 11, no. 4 (2021): 64–76. http://dx.doi.org/10.17759/psylaw.2021110405.

Full text
Abstract:
The article researches the legal issues of protection from various forms of distant psychological violence arising in electronic communication. The study aims to assess the public danger of cyber-bullying, cyber-stalking and cyber-harassment among potential and real victims in order to develop recommendations for improvement of domestic legislature. The main results of the study have been obtained by surveying 207 individuals and by means of comparative review of domestic and foreign law. The results indicate that distant violence does take place, but its assessment by legislators and the public is highly controversial. Cyber-harassment is commonly seen as a more dangerous phenomenon than cyber-bullying or cyber-stalking, which raises a question of its criminalization in the law. This necessitates a correct definition of sexual harassment in distant form as there are risks of either intruding into the field of socially acceptable behavior or overlooking the socially unacceptable ones.
APA, Harvard, Vancouver, ISO, and other styles
11

Aslan, Mahi, and Hatice Saddiki. "A field study on cyber stalking among university students." JOURNAL OF AWARENESS 9, Special Issue/Özel Sayı (February 5, 2024): 61–66. http://dx.doi.org/10.26809/joa.2257.

Full text
Abstract:
Internet and technology devices not only connected people around the world but also opened new ways of cybercrime including cyberstalking. Ease in accessibility of social media brought criminals to the online world and facilitated the opportunities to do crimes in the cyber world. As the internet and social media are becoming inseparable parts of human life, it is important to make these environments safe for everyone, especially youth who are driven by social media the most. Understanding the prevalence of cyberstalking will help in finding ways to combat it and also to make a safer cyber environment. Aim: The study aims to examine the prevalence level of cyberstalking in university students between the ages of 18-30. This study will also assess the difference of cyber stalking prevalence between men and women. Materials and Methods: A preliminary investigation was made on the prevalence level of cyber stalking in university students between the age of 18-30. Cyber ​​Obsessive Stalking Scale (Siber Obsesif Takip Ölçeği (SOTÖ)) was used to examine the stalking behaviours that people are exposed to while using electrical devices. While examining research participants, their age, gender, their anxiety about cyberstalking and if they had experienced cyberstalking or seen this behaviour in people around them were taken into account. Conclusion: Developing technology has caused criminals to move to the online world. The severity of the situation will be brought to light by revealing the prevalence of victimization through studies. The prevalence level can direct researchers and technology developers to create safer online environments.
APA, Harvard, Vancouver, ISO, and other styles
12

Al-Rahmi, Waleed Mugahed, Noraffandy Yahaya, Mahdi M. Alamri, Nada Ali Aljarboa, Yusri Bin Kamin, and Muhammad Sukri Bin Saud. "How Cyber Stalking and Cyber Bullying Affect Students’ Open Learning." IEEE Access 7 (2019): 20199–210. http://dx.doi.org/10.1109/access.2019.2891853.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Lyndon, Amy, Jennifer Bonds-Raacke, and Alyssa D. Cratty. "College Students' Facebook Stalking of Ex-Partners." Cyberpsychology, Behavior, and Social Networking 14, no. 12 (December 2011): 711–16. http://dx.doi.org/10.1089/cyber.2010.0588.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Wykes, Maggie. "Constructing crime: Culture, stalking, celebrity and cyber." Crime, Media, Culture: An International Journal 3, no. 2 (August 2007): 158–74. http://dx.doi.org/10.1177/1741659007078541.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Power, Richard, and Dario Forte. "Stalking “cyber terrorists” in Sofia – event report." Computer Fraud & Security 2006, no. 11 (November 2006): 4–8. http://dx.doi.org/10.1016/s1361-3723(06)70439-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Cook, Sarah Gibbard. "Gossip on Steroids: Cyber-Bullying, Stalking, Harassing." Women in Higher Education 19, no. 7 (July 2010): 18–19. http://dx.doi.org/10.1002/whe.10077.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Bidin, Asiah binti, Shariffah Nuridah Aishah binti Syed Nong Mohamad, and Akmal binti Mohamad. "Intipan Siber: Jenayah Baru dalam Masyarakat Kontemporari [Cyber Types: New Crime in a Contemporary Society]." Jurnal Islam dan Masyarakat Kontemporari 11 (October 1, 2015): 10–21. http://dx.doi.org/10.37231/jimk.2015.11.3.134.

Full text
Abstract:
Innovation and technological advancement nowadays had produced several web-based products. These include social networking sites (SNS) which are dominating Internet usage among consumers. Although the site is able to connect friendship without limits and become a very effective means of communication in cyberspace, the negative impact should not be under-estimated. This article concludes that the use of social networking sites gives the risk of the crime of cyber stalking. An analysis on the legislative framework in Malaysia in relation to the crime shows that there is lacuna in legal provisions pertaining to the issue. Keywords: social networking sites, cyber stalking, crimes, Malaysian law Inovasi dan kemajuan teknologi masa kini telah menghasilkan beberapa produk berasaskan web. Antaranya ialah laman rangkaian sosial yang sedang mendominasi penggunaan Internet dalam kalangan pengguna. Walaupun laman ini mampu menghubungkan persahabatan tanpa batasan dan merupakan alat komunikasi di dunia maya yang sangat efektif, kesan negatifnya juga tidak boleh dipandang ringan. Artikel ini membincangkan penggunaan laman rangkaian sosial dan risiko terhadap jenayah intipan siber (cyber stalking). Selain itu, bagaimana jenayah intipan siber berlaku turut dibincangkan. Akhir sekali kerangka perundangan di Malaysia berkaitan jenayah intipan siber diutarakan bagi menilai sama ada ia sudah memadai dalam menangani jenayah ini. Kata kunci: Laman rangkaian sosial, intipan siber, jenayah, undang-undang Malaysia.
APA, Harvard, Vancouver, ISO, and other styles
18

houng, Wan. "A Study on Legal Regulations of Cyber Stalking." Kyung Hee Law Journal 56, no. 3 (September 30, 2021): 477–505. http://dx.doi.org/10.15539/khlj.56.3.15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Franco, Elio. "I crimini di genere sul web 2.0: cyber-stalking, cyber-molestia e cyber-violenza sessuale." SICUREZZA E SCIENZE SOCIALI, no. 3 (March 2018): 44–57. http://dx.doi.org/10.3280/siss2017-003005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Herath, Thilini B. G., Prashant Khanna, and Monjur Ahmed. "Cybersecurity Practices for Social Media Users: A Systematic Literature Review." Journal of Cybersecurity and Privacy 2, no. 1 (January 20, 2022): 1–18. http://dx.doi.org/10.3390/jcp2010001.

Full text
Abstract:
In this paper, we present secondary research on recommended cybersecurity practices for social media users from the user’s point of view. Through following a structured methodological approach of the systematic literature review presented, aspects related to cyber threats, cyber awareness, and cyber behavior in internet and social media use are considered in the study. The study presented finds that there are many cyber threats existing within the social media platform, such as loss of productivity, cyber bullying, cyber stalking, identity theft, social information overload, inconsistent personal branding, personal reputation damage, data breach, malicious software, service interruptions, hacks, and unauthorized access to social media accounts. Among other findings, the study also reveals that demographic factors, for example age, gender, and education level, may not necessarily be influential factors affecting the cyber awareness of the internet users.
APA, Harvard, Vancouver, ISO, and other styles
21

Popovic-Citic, Branislava. "Cyber space bullying." Temida 12, no. 3 (2009): 43–62. http://dx.doi.org/10.2298/tem0903043p.

Full text
Abstract:
Cyber space bullying is a relatively new phenomenon that has received increased attention by scientists, researchers and practitioners in recent years. It is usually defined as an intentionally and repeatedly expression of aggression towards other people through information and communication technologies. Cyber space bullying is characterized by all the primary characteristics of traditional bullying and some specifics ones that clearly differ it from other forms of bullying. In addition to the analysis of characteristics and specifics of cyber space bullying, the paper describes the basic forms of cyber space bullying (flaming, harassment, denigration, impersonation, outing, trickery, exclusion, stalking and happy slapping), as well as, the types of cyber space bullies (vengeful angel, power-hungry, revenge of the nerd, mean girls and inadvertent). The main goal of this paper is to provide initial theoretical guidelines for designing future empirical research on the complex phenomenon of cyber space bullying.
APA, Harvard, Vancouver, ISO, and other styles
22

Pereira, Filipa, and Marlene Matos. "Cyber-Stalking Victimization: What Predicts Fear Among Portuguese Adolescents?" European Journal on Criminal Policy and Research 22, no. 2 (August 5, 2015): 253–70. http://dx.doi.org/10.1007/s10610-015-9285-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Kanwal, Farah, Sadia Iqbal, and Asma Javed. "Stalking and Relationship Satisfaction among Partners." Summer 2023 4, no. 3 (September 30, 2023): 31–42. http://dx.doi.org/10.55737/qjssh.053741734.

Full text
Abstract:
The goal of the current study, which included gender as a moderator, was to assess the effect of Facebook stalking on romantic partners' satisfaction with their relationships. Online A-priori statistics were used to justify the sample (Soper, 2018). Purposive sampling was used to select 320 university students from Punjab, Pakistan's four public and private universities (University of Central Punjab, Bahauddin Zakariya University, The Islamia University of Bahawalpur and Rahim Yar Khan Campuses). The Relationship Assessment Scale created by Hendrick et al. (1998) and the Cyber-Obsessional Pursuit Scale created by Spitzberg and Cupach (1999) were both used to gather the data. To analyze the data, SPSS (24.0) was used.
APA, Harvard, Vancouver, ISO, and other styles
24

Desai, Varsha P., Dr K. S. Oza, and Dr P. G. Naik. "Data Mining Approach for Cyber Security." International Journal of Computer Applications Technology and Research 10, no. 01 (January 6, 2021): 035–41. http://dx.doi.org/10.7753/ijcatr1001.1007.

Full text
Abstract:
Use of internet and communication technologies plays significant role in our day to day life. Data mining capability is leveraged by cybercriminals as well as security experts. Data mining applications can be used to detect future cyber-attacks by analysis, program behavior, browsing habits and so on. Number of internet users are gradually increasing so there is huge challenges of security while working in the cyber world. Malware, Denial of Service, Sniffing, Spoofing, cyber stalking these are the major cyber threats. Data mining techniques are provides intelligent approach for threat detections by monitoring abnormal system activities, behavioral and signatures patterns. This paper highlights data mining applications for threat analysis and detection with special approach for malware and denial of service attack detection with high precision and less time.
APA, Harvard, Vancouver, ISO, and other styles
25

Jun, Ji-Yun. "Kritische Überprüfung über die Voraussetzungen einer Stalkingstat nach dem Anti-Stalkingsgesetz und ihre Reformvorschläge." Institute for Legal Studies Chonnam National University 42, no. 4 (November 30, 2022): 171–210. http://dx.doi.org/10.38133/cnulawreview.2022.42.4.171.

Full text
Abstract:
Seit den späten 1990er Jahren hat sich Stalking zu einem ernsthaften sozialen Problem entwickelt, und seit 1999 wurden der Nationalversammlung viele Gesetzentwürfe zur Bestrafung von Stalking vorgelegt. Nachdem man sich aber nur auf das Bestrafung im Prinzip geeinigt und konkrete Details besprochen hatte, wurde schließlich im Nachgang zum ‚Nowon-Mordfall an Muttern und Töchtern‘ am 20. März 20210 . das Anti-Stalkingsgesetz erlassen und trat sechs Monate später am 21. Oktober 2021 in Kraft. Der Anstieg der 112-Anzeigen nach Inkrafttreten des Anti- Stalkingsgesetzes wird gewertet, um die Erwartungen der Opfer an Schutzmaßnahmen durch die Polizei und Bestrafung der Täter widerzuspiegeln. Als solches gibt es positive Aspekte des Anti-Stalkingsgesetzes in einer Situation, in der das Anti-Stalkingsgesetz vor nicht allzu langer Zeit erlassen wurde, aber andererseits Änderungen eingereicht wurden, bevor das Gesetz in Reaktion auf die aufgezeigten Probleme mit dem Gesetz erlassen wurde. Dementsprechend wurde in diesem Papier ein Reformvorschlag erstellt, indem die in unserem Anti-Stalkingsgesetz festgelegten Voraussetzungen für die Feststellung eines Stalking-Delikts kritisch geprüft und mit ausländischen Stalking-Delikten verglichen wurden. Die Ergebnisse dieser Überprüfungen lassen sich wie folgt zusammenfassen: Erstens sieht das Strafgesetz vor, dass die Verfolgung eine Handlung ist, die der Art der Verfolgung entspricht, wie z. B. die Verfolgung oder Beobachtung der anderen Person oder ihres Mitwohners oder ihrer Familie, gegen den Willen der anderen Partei. Unter den fünf hier geregelten Stalking-Arten ist das Stalking wie das Abhören aufzunehmen und die in Nr.5 beschriebene Stalking-Art „Beschädigung von in Häusern platzierten Gegenständen etc.“ zu streichen. Zweitens gibt es Kontroversen darüber, ob Stalking-Verbrechen als Verletzungsdelikt oder Gefährdungsdelikt angesehen werden. In dem Sinne, dass der Artikel ausdrücklich in Form eines Verletzungsdelikts beschrieben wird, sollte er als Verletzungsdelikt angesehen werden, und die Anerkennung als Gefährdungsdelikter ist eine erweiterte Interpretation, die für den Angeklagten ungünstig ist und gegen das Prinzip nulla poena sine lege verstößt. Drittens, selbst wenn ein Stalking-Verbrechen unter einen Verletzungsdelikt fällt, ist es zum Schutz des Opfers nicht angemessen, es so zu lassen, wie es ist. Daher ist es notwendig, es als Gefährdungsdelikt zu ändern, und insbesondere wurde ein Plan zur Überarbeitung vorgeschlagen, damit es dem Cyber-Stalking gemäß dem Gesetz über Informations- und Kommunikationsnetze entspricht. Viertens bezieht sich die Stalking-Kriminalität auf das kontinuierliche oder wiederholte Stalking. Da der Begriff der Kontinuität hier jedoch ein quantitativer Begriff ist, der die Zeit fortsetzt, ist es schwierig, ihn eindeutig zu bestätigen, und in dieser Hinsicht ist es schwierig, ausländische Gesetzgebungsbeispiele zu finden, die Kontinuität bei der Feststellung eines Stalking- Verbrechens fordern. Da Stalking im Allgemeinen bedeutet, eine bestimmte Handlung mehrmals auszuführen, wird der Begriff „kontinuierlich“ weggelassen und der Begriff „wiederholt“ ist ausreichend. Fünftens ist das einzige erschwerende Tatbestand des Anti-Stalkingsgesetzes das spezielle Stalking, bei dem ein Stalking-Verbrechen durch das Tragen oder Verwenden einer Waffe oder gefährliche Sache begangen wird. Es ist jedoch notwendig, vielfältigere Erschwerungstatbestände oder qualifiziertes Erfolgsdelikte zu regeln. Hier schlagen wir eine Änderung vor, um die Strafe für Stalking, Herbeiführen des Todes, der schweren Gesundheitsschädigungen oder Gesundheitsschädigung eines Opfers, oder Stalking eines Minderjährigen zu erhöhen. Sechstens wurde in Bezug auf das Strafverfahren für Stalking-Verbrechen, als viele Länder Strafen für Stalking erließen, das Verbrechen als eine Form der Anklage definiert und Vorschriften
APA, Harvard, Vancouver, ISO, and other styles
26

Dr. IbtIsam Al Saleh, Dr Fahad Alkasasbeh,. "The Legislative Confrontation Of The Cyber Stalking Crime: A Comparative Study." Psychology and Education Journal 58, no. 1 (January 29, 2021): 833–43. http://dx.doi.org/10.17762/pae.v58i1.835.

Full text
Abstract:
This study examined the legislative confrontation of the cyber stalking crime and focused on how the Jordanian legislator and the comparative regulations confront this modern crime. In addition, the study used the descriptive methodology that relies on describing the legal texts of the legal framework and it also used the analytical methodology in order to reach a correct adaptation of this crime. On the other hand, the study used the comparative methodology when conducting comparison among the comparative legal texts. Accordingly, due to the severe impact of harassment on man and the fact that it is considered the most common and widespread phenomenon after the emergence of information technology, many western legislations have been interested in confronting and criminalizing it in contrast to the Jordanian legislator and the comparative Arab legislations that have not yet examined the text of this crime and the threat is represented mostly in such act. The act threat of harassment that we deal with including the newly developed Arab legislations regarding is concerned in combating cybercrime.
APA, Harvard, Vancouver, ISO, and other styles
27

al-Khateeb, Haider M., and Gregory Epiphaniou. "How technology can mitigate and counteract cyber-stalking and online grooming." Computer Fraud & Security 2016, no. 1 (January 2016): 14–18. http://dx.doi.org/10.1016/s1361-3723(16)30008-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Hotragn, Pettugani. "Navigating the Digital Realm: Exploring the Risk Management Lifecycle in Information Security and the Ongoing Thoughts on Cyber-Crime and Cyber-Stalking." International Journal of Research Publication and Reviews 4, no. 12 (December 9, 2023): 1300–1304. http://dx.doi.org/10.55248/gengpi.4.1223.123411.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Westbrook, Lynn. "Internet access and use in domestic violence shelters: Policy, capacity, and management barriers." Journal of Social Work 13, no. 1 (February 21, 2012): 30–53. http://dx.doi.org/10.1177/1468017311435184.

Full text
Abstract:
• Summary: Domestic violence agency administrators struggle to incorporate the Internet safely and effectively into their intimate partner violence (IPV) services. This study utilizes two data gathering tools to identify administrative concerns and web content in the 91 Texas shelters. The first research stage employed a mixed-methods questionnaire (89% response rate) to identify managers’ Internet use patterns and managerial needs. In the second stage, all shelter web sites (65) were submitted to a multi-context content analysis. • Findings: Overall, findings indicate that administrators see a serious need for basic administrative support tools (e.g. policies and training materials) and the development of cyber-safety resources (e.g. online stalking tips). Administrators view the Internet’s potential for increasing staff efficiency and clients’ sense of self-efficacy as worthwhile. Questionnaire findings indicate that 66 percent of directors need a means of helping clients learn to do their own information-seeking, only 54 percent have a written policy, and 46 percent have no in-house training at all. Web site findings indicate that 61 percent of the sites lacked minimal cyber-safety information despite administrative concerns about cyber-stalking. • Applications: IPV shelter administrators’ two Internet utility criteria, service priorities and resources, privilege implementation barriers and ignore the embedded expectations of communication and resource support. By shifting from a shelter-based Internet perspective to a user-generated perspective, administrators can integrate clients’ expectations with the shelter’s options. The resultant conceptual framework for Internet integration posits the lived information experience as managers’ basis for shaping social communication, resource generation, information seeking, and decision-making.
APA, Harvard, Vancouver, ISO, and other styles
30

Ménard, Kim S., and Aaron L. Pincus. "Predicting Overt and Cyber Stalking Perpetration by Male and Female College Students." Journal of Interpersonal Violence 27, no. 11 (December 26, 2011): 2183–207. http://dx.doi.org/10.1177/0886260511432144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Prastiyo, Wawan Edi, and I. Dewa Made Suartha. "Debt Collection Violations in Financial Technology in a Cyber-ethic and Legal Perspective." Jurnal Komunikasi Ikatan Sarjana Komunikasi Indonesia 6, no. 1 (June 15, 2021): 13–21. http://dx.doi.org/10.25008/jkiski.v6i1.510.

Full text
Abstract:
The presence of financial technology (Fintech) on the one hand makes it easy for people to obtain credit, while on the other hand, it creates various problems. In this study, two issues will be discussed, namely the application of cyber-ethic in protecting personal data and legal issues in collecting debt on Fintech. This research is a qualitative research. Data in the study were collected by means of literature study and presented descriptively and analytically. Cyber-ethic is implemented by protecting personal data. It is a transformation of traditional ethics in cyberspace. The cyber-ethic is very necessary in the business world. The application of cyber-ethic in the world of Fintech is carried out by protecting the personal data of both borrowers and third parties. Cyber-ethic violations have implications for breaking the law. Some of the billing violations on the Fintech business are sexual harassment, defamation, threats and stalking. Borrowing customers are powerless to face debt collectors’ behavior, because the debt collectors use the borrowers’ personal data to exert psychological pressure on the debtors to pay according to the bills determined unilaterally by Fintech. This condition usually occurs in illegal Fintechs that are not registered with the Financial Services Authority.
APA, Harvard, Vancouver, ISO, and other styles
32

Dar, Showkat Ahmad, and Dolly Nagrath. "Are Women a Soft Target for Cyber Crime in India." Journal of Information Technology and Computing 3, no. 1 (June 30, 2022): 23–31. http://dx.doi.org/10.48185/jitc.v3i1.503.

Full text
Abstract:
A growing global issue that might have significant social and economic repercussions is cyber violence against women. This is due to the growing popularity of social media, the spread of information via mobile devices, and the growth of the internet. Any form of sexual or gender-based violence against women that takes place through ICTs like the Internet, mobile devices, and video games is referred to as cyber violence. These technologies are ideal for using as weapons against women for a variety of reasons these include cyber stalking, sexual abuse (including sending sexually explicit or pornographic emails to the victim), cyber extortion, cyber bullying, cybersex trafficking, and phishing. Even if there are more crimes against women overall, a woman can find that experiencing a cybercrime is the most upsetting thing that has ever happened to her. More so in India, where women are devalued and cybercrimes aren't even given significant legal consideration. India's legal system's current rules and practises are shown to have gaps in Cyber Crimes against Women, as well as what can be done to keep individuals secure online. In this essay, I'd want to discuss the various cybercrimes that can affect women and how they can harm them. I also briefly discuss new laws that are being introduced in this field, such as the Criminal Amendment Bill, as well as the many statutes that protect women in these circumstances, such as the Information Technology Act of 2000. (2013). to reach a conclusion, I consider a number of well-known cybercrime cases. Additionally, we need to consider a couple of answers for the rising frequency of cyber crimes against ladies in India. At the end, we talk about the choices accessible to casualties of cyber crime and the changes that should be made to the overall set of laws to battle the rising tide of cyber crimes.
APA, Harvard, Vancouver, ISO, and other styles
33

Wełyczko, Sylwia. "Zniesławienie na Facebooku." Themis Polska Nova 9, no. 2 (2015): 192–215. http://dx.doi.org/10.15804/tpn2015.2.11.

Full text
Abstract:
The article examines the mechanisms of defamation in the internet space, social media and Facebook in particular. Human dignity is protected both as a constitutional value and as an individual right, though in everyday practice law-enforcement bodies usually tend to be unwilling to react to violations of human dignity, while appropriate legal provisions are often not in place to be implemented. Actions taken by the police in investigating appropriate cases do not always manage to identify perpetrators or bring them to justice. Most internet or cyber crime occurs across international borders and can be committed anonymously. There are certain types of defamatory statements that are considered to harm the reputation of the victim. Libel in the internet involves cyberbullying, online harassment, cyber-stalking, and, most of all, internet trolls. Trolling is any deliberate and intentional attempt to disrupt the credibility of others, often involving petty arguments. People tend to lose control of their emotions when they go online. An explosion of raw and unbridled emotions follows, standards wane, and eventually some internet users lose their touch with reality. Cyber violence and online harassment are punishable crimes and are subject to criminal prosecution: defamation, libel and online threats. Stalking and vulgar language in public places are offences subject to public prosecution and the provisions of the Petty Offences Procedure Code. . Generally, a defamatory statement published to third parties has to be proved and it has to be proved that the publisher knew or should have known that the statement that they made which harmed the reputation was false. The good name or reputation of another can be damaged, or even totally destroyed, in a number of ways. To calumniate another is certainly to ruin a person’s or a company their good name and so to do them an injustice. The number of criminal offences under Article 212 has increased four times over the past ten years.
APA, Harvard, Vancouver, ISO, and other styles
34

Baratov, Abror Baktiyarovich, Almas Rysbekov, Malcolm Lorein, Merei Amangeldy, Shahzoda Mamedalieva, and Nasiba Raimova. "STALKING: MAIN PRINCIPLES OF IDENTIFIFCATION STALKERS IN A FIELD OF CYBER AREA SECURITY SYSTEM." Theoretical & Applied Science 109, no. 05 (May 30, 2022): 438–44. http://dx.doi.org/10.15863/tas.2022.05.109.46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

McMillan, Iris F., Victoria O’Connor, Fallon Richie, and Jennifer Langhinrichsen-Rohling. "Look Who's Lurking." Partner Abuse 13, no. 1 (January 1, 2022): 123.1–143. http://dx.doi.org/10.1891/pa-2021-0030.

Full text
Abstract:
Cyber psychological abuse and social media surveillance of ex-partners are relatively common virtual forms of behavior linked with intimate partner violence (Pineda, Galán, Martínez-Martínez, Campagne, & Piqueras, 2021) as well as on-going and dangerous intimate partner stalking (Logan & Langhinrichsen-Rohling, 2021). While both forms of behavior are concerning, especially after the dissolution of a romantic relationship, transdiagnostic shared and unique predictors of each are relatively unknown. In the current study, we examined the associations between intolerance of uncertainty and emotion dysregulation and the perpetration of post-breakup cyber psychological abuse and social media surveillance. We asked college students (n = 284) to report on their intolerance of uncertainty, emotion dysregulation difficulties (particularly difficulties engaging in goal directed behavior, impulse control difficulties, and lack of emotional clarity), and behaviors towards their ex-partner associated with the perpetration of cyber psychological abuse and social media surveillance. Participants reported engaging in an average of 2.4 (SD = 2.17) post-breakup behaviors associated with cyber psychological abuse and 4.47 (SD = 3.60) different acts of social media surveillance. Mediation models supported the premise that intolerance of uncertainty is predictive of emotion dysregulation, which, in turn, mediated the association between intolerance of uncertainty and both cyber psychological abuse and social media surveillance. Subscale analyses specifically highlighted difficulties engaging in goal-directed behavior as an important mediator of both behaviors. Taken together, this suggests that intolerance of uncertainty and poor emotion regulation after a relationship breakup are potential drivers of unhealthy ex-partner focused behaviors on social media and other electronic mediums of communication.
APA, Harvard, Vancouver, ISO, and other styles
36

Kuzmenko, O., H. Yarovenko, and L. Skrynka. "ANALYSIS OF MATHEMATICAL MODELS FOR COUNTERING CYBER FRAUD IN BANKS." Vìsnik Sumsʹkogo deržavnogo unìversitetu 2022, no. 2 (2022): 111–20. http://dx.doi.org/10.21272/1817-9215.2022.2-13.

Full text
Abstract:
The article is devoted to the current topic of analysis of mathematical models for countering cyber fraud in banks. This problem is due to the security risks growth in the banking system, which are formed by fraudsters' cyberattacks and cybercrimes implementation. Therefore, the priority task for cyberbanking security is the application of modern mathematical methods to analyse the sources of cyber attacks, identify threats and losses in the banking services market, identify cyber-attacks and assess the scenario of potential cyber risk, etc. The article analyses the most widespread types of cyber fraud: social engineering, phishing, stalking, farming, DoS attacks, online fraud, potentially unwanted programs, etc. The study also considered a model of cognitive computing and detection of suspicious transactions in banking cyber-physical systems based on quantum computing in BCPS for the post-quantum era. The advantages, disadvantages and results of the model are defined. Predictive modelling is proposed to detect fraud in real-time by analysing incoming bank transactions with payment cards. Within the framework of this method, such models are used for the classification of fraud detection as logistic regression, a decision tree, and a narrower technique - a random forest decision tree. The study also considered using the harmonic search algorithm in neural networks to improve fraud detection in the banking system. It is found that although this model has the advantage of learning ability based on past behaviour, there are difficulties in the long-term processing of many neural networks. The stages of model implementation are also given. In addition, the modelling of credit card fraud detection is based on using two types of models: supervised and unsupervised. Supervised models include logistic regression, K-nearest neighbours, and extreme gradient boosting. The one-class support vector model, restricted Boltzmann model, and generative-competitive network are considered among uncontrolled generative models.
APA, Harvard, Vancouver, ISO, and other styles
37

Sugow, Abdulmalik, Zalo Margret, and Isaac Rutenbeg. "Appraising the Impact of Kenya’s Cyber-Harassment Law on the Freedom of Expression." Journal of Intellectual Property and Information Technology Law (JIPIT) 1, no. 1 (June 4, 2021): 91–114. http://dx.doi.org/10.52907/jipit.v1i1.67.

Full text
Abstract:
Kenya’s Computer Misuse and Cybercrimes Act makes it an offence, in Section 27, for a person to communicate with another a message that they know or ought to know would cause the recipient fear; is indecent or offensive in nature; or would detrimentally affect the recipient. This offence carries a penalty of either a 20 million shilling fine or a 10-year term of imprisonment or—discretionarily—both. While the offence is termed ‘cyber-harassment’, its wording appears to exclude a number of offences that would count as cyber-harassment such as cyber-stalking, doxing or impersonation. In fact, its wording is vague and overbroad, using undefined terms such as ‘detrimentally affect’ which require subjective interpretation. Cyber-harassment laws constitute a limitation on the freedom of expression and as such, ought to conform to the limitations of human rights test as provided in Article 24 of the Constitution. Where the aim sought is legitimate in a democratic society and other conditions such as legality are met, this limitation is valid. This paper reviews Kenya’s law that was recently upheld by the High Court in Bloggers Association of Kenya (BAKE) v Attorney General & Three others; Article 19 East Africa & another and finds that it fails to meet the limitations test prescribed under Article 24 of the Constitution. It argues that Section 27 of the Computer Misuse and Cybercrimes Act is therefore overbroad and has the potential to be used as a tool for the unconstitutional suppression of legitimate criticism.
APA, Harvard, Vancouver, ISO, and other styles
38

Octora, Rahel. "PROBLEMATIKA PENGATURAN CYBERSTALKING (PENGUNTITAN DI DUNIA MAYA) DENGAN MENGGUNAKAN ANNONYMOUS ACCOUNT PADA SOSIAL MEDIA." Dialogia Iuridica: Jurnal Hukum Bisnis dan Investasi 11, no. 1 (November 19, 2019): 77–96. http://dx.doi.org/10.28932/di.v11i1.1902.

Full text
Abstract:
The internet is a new world where humans interact, without limitation of distance and time. In the real world, as legal subjects, everyone must have a clear identity, proof of identification, so that the state can recognize it and the law can be upheld against it, as well as the law can protect their rights. Social media which is currently developing, allows everyone to appear and interact in cyberspace either by showing their true identity, or by using fake identities, or even interacting without identity (annonymous). Easily each person can create more than one e-mail account, which can be used to create more than one social media account. Although the creation of e-mail and social media accounts is through the cell phone number verification stage, this does not solve the problem because anyone can easily have multiple cellphone numbers. A person in cyber world can be an anonymous subject and take various actions that harm others, including stalking others. Stalking, done by the person behind an anonymous account is an annoying action, has not been regulated clearly in Indonesian. This paper is the result of a normative juridical study. Result of this research is: criminal law regulation system in Indonesia regulated cyberstalking as long as the action consist of delivery of illegal contents such as threats, obscene content and insults. Further regulation is still needed, especially regarding law enforcement mechanisms for perpetrators that are difficult to reach due to the use of the anonymous account.
APA, Harvard, Vancouver, ISO, and other styles
39

Prasetya, Eska Perdana. "ANALISIS SOSIOPRAGMATIK TINDAK TUTUR CYBERBULLYING DI GRUP WHATSAPP PADA PESERTA DIDIK SEKOLAH DASAR KELAS 6." Abdi Dosen : Jurnal Pengabdian Pada Masyarakat 5, no. 3 (August 26, 2021): 484. http://dx.doi.org/10.32832/abdidos.v5i3.933.

Full text
Abstract:
Bullying itu adalah sesuatu perilaku kekerasan dengan adanya pemaksaan secara psikologis, sosial, dan akademik, jenis-jenis bullying itu bisa dikategorikan sebagai berikut: Bullying fisik, Bullying Lisan , Bullying Relasional Bullying Elektronik atau Cyberbullying . Cyberbulling itu adalah suatu fenomena bullying yang terjadi di media sosial dengan menggunakan teknologi informasi. Sembilan macam tipe cyberbullying: Flaming, Online harassment, Identity theft/impersonation, Outing, Exclusion/ostracism, Misinformation/Denigration, Cyber stalking, Happy slapping, and Sexting. Penelitian ini menggunakan metode kualitatif dengan observasi,wawancara dan elastase sebagai instrumennya. sosiopragmatik adalah studi tentang bentuk-bentuk ujaran dalam kaitannya dengan konteks sosial penutur, seperti jenis kelamin, karier, latar belakang budaya, etnis, konvensi, perilaku, atau gaya. Ciri karakteristik peserta didik anak SD sebagai berikut: minat terhadap kehidupan praktis sehari-hari, ingin tahu dan belajar, ada minat terhadap pelajaran khusus, berusaha menyelesaikan sendiri, memandang nilai rapor sebagai prestasi sekolah, dan gemar membentuk kelompok sebaya. Kalimat yang sering dilontarkan di cyber bullying adalah tentang hinaan fisik, atau body shaming, menyebarkan kebohongan tentang temannya, menuliskan yang memalukan/menyakitkan, dan suatu pengacaman. Namun faktor yang paling penting dalam cyberbullying adalah peran dari orangtua dan guru. Peran orangtua adalah epndamping dan pemberi nasehat ketika anaknya mendapat bullying. Sebagai guru harus mempunyai peran serta sebagai pengawas dan pemberi semangat.
APA, Harvard, Vancouver, ISO, and other styles
40

Ķinis, Uldis. "CRIMINAL DELINQUENCY – CYBERSTALKING: CHARACTERISTICS OF OBJECT AND OBJECTIVE SIDE." Administrative and Criminal Justice 2, no. 83 (September 20, 2018): 45. http://dx.doi.org/10.17770/acj.v2i83.3469.

Full text
Abstract:
On January 2018 significant amendments to the Criminal Law and the Law On the Procedure for Application of the Criminal Law came into force in Latvia. These changes not only in the first time introduce the criminal responsibility for the emotional violence, but also determine the procedure for assessing emotional disparity, equating the effects to telepathic injuries.In the article, the author reviews a modality of crime “persecution” - cyber-persecution. Although the legislator in the annotation of the law provides that the article also shall be applicable to acts committed in cyberspace, at the same time, the author indicates some problems that may arise due to the narrow interpretation of the law by the law enforcement. The purpose of the article is to study the object (protected legitimate interest) and the objective side (actus reus) of the offense - cyber-stalking. For purposes of research, several methods have been used. The method of comparative analysis, for examination and comparison of external and international regulations. Methods of legal interpretation used to disclose the differences between the understanding of the written text of the definition of the crime and what ought to be understood in the meaning of the norm. Finally, the author presents the conclusions and proposals on the application of the norm.
APA, Harvard, Vancouver, ISO, and other styles
41

Tade, Oludayo, and Oluronke Dorcas Popoola. "‘…her aim was to ruin my reputation’: Cyberstalking Victimization Experiences among University Students in Nigeria." Nigerian Journal of Sociology and Anthropology 19, no. 2 (November 10, 2021): 56–67. http://dx.doi.org/10.36108/njsa/1202.91.0240.

Full text
Abstract:
While global knowledge about cyberstalking is growing, intellectual engagement of the phenomenon in Nigeria is still at infancy and focused mainly on awareness. Scanty attention has however been paid to the nature of victimization experiences and its effects on victims. Against this background, this study investigated the nature and effects of cyberstalking among victims at the University of Ibadan. Using purposive and snowball sampling techniques, 30 victims of cyber stalking were subjected to indepth interview. Results indicated that their active online activities and the anonymity guaranteed in cyberspace contributed to their victimization. While one of the social and psychological effects of cyberstalking is social estrangement of victims, most victims failed to report to the Police owing to fear of repeat victimization and lack of trust in the policing institution. Instead, they accessed informal coping mechanisms from friends and family.
APA, Harvard, Vancouver, ISO, and other styles
42

Arora, Pradeep Hariom. "Deep Tech Wireless Synthetic Telepathic Technology, Remote Neural Monitoring, Mind Controller, Voice to Skull [V 2 K], Neurotechnology and Wireless Direct Energy Weapon, Psychotronic Cyber Crime Technics." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (April 30, 2024): 1395–409. http://dx.doi.org/10.22214/ijraset.2024.60044.

Full text
Abstract:
Abstract: Electronic torture, Electromagnetic torture, or Psychotronic torture are terms used by individuals who are targeted by this Wireless Synthetic telepathic technology. Satellite surveillance criminal operators, often actors or often government employees, agents or crime syndicates, use transmitted electromagnetic radiation (Such as microwave listening effects), satellite technology, and surveillance techniques. And bring sounds and thoughts into people's minds, affect people's bodies and make people sick and disturb people Individuals who experience this call themselves "targeted individuals" (TIs). And they share their experiences of being harassed and victims of stalking gangs.
APA, Harvard, Vancouver, ISO, and other styles
43

Hey Tow, William Newk-Fon, Peter Dell, and John Venable. "Understanding Information Disclosure Behaviour in Australian Facebook Users." Journal of Information Technology 25, no. 2 (June 2010): 126–36. http://dx.doi.org/10.1057/jit.2010.18.

Full text
Abstract:
The advent of social networking websites presents further opportunities for criminals to obtain information for use in identity theft, cyber-stalking, and worse activities. This paper presents research investigating why users of social networking websites willingly disclose personal information and what sorts of information they provide (or not). The study employed an ethnographic approach of participation in the online community and interviews of community members, combined with a quantitative survey. The findings show that users are often simply not aware of the issues or feel that the risk to them personally is very low. The paper develops a preliminary theoretical model to explain the information disclosure phenomenon. It further recommends that government agencies or social networking websites themselves conduct campaigns to inform the public of these issues and that social networking websites consider removing some facilities. The study was conducted in an Australian context and focussed on the popular Facebook website.
APA, Harvard, Vancouver, ISO, and other styles
44

Mironova, Svetlana, and Svetlana Simonova. "Protection of the Rights and Freedoms of Minors in the Digital Space." Russian Journal of Criminology 14, no. 2 (March 30, 2020): 234–41. http://dx.doi.org/10.17150/2500-4255.2020.14(2).234-241.

Full text
Abstract:
The problem of ensuring information security is currently urgent for the Russian Federation as well as for the whole world. The number of cyber-threats is increasing at a great speed, and they concern not only private citizens, but also organizations, the community and the state. Special attention should be paid to the information security of children and teenagers. Minors are most susceptible to negative influences on the Internet, they risk becoming victims of cyberbullying, fraud and illegal access to personal data. Common threats to the information security of minors include a constant increase in the number of sites with aggressive or illegal content, including those inciting to suicide or abuse of drugs and psychoactive substances, as well as cyber-stalking or virtual sexual harassment. The information security of minors in the digital space is a complex issue, whose successful solution requires a consolidation of legal and information resources. The article analyzes Russian and foreign experience of ensuring the information security of minors. The authors summarize research approaches to solving the problem of protecting minors on the Internet. They present a classification of the most urgent cyber-threats: software-technical (intentional dissemination of viruses and Trojan software), economic (theft and sale of credit card details, phishing-attacks, hacking of payment accounts), and content (public dissemination of any materials, including illegal ones, on the Internet). The authors also examine legal, social and technical measures of ensuring the information security of minors and suggest changes to the current legislation which regulates the information security of minors. The authors also study specific methods of solving this task and outline a number of measures aimed at protecting the rights and freedoms of minors in the digital space (thematic prevention classes for minors, development of special information protection software).
APA, Harvard, Vancouver, ISO, and other styles
45

Zunic, Natalija, and Vida Vilic. "Internet and female victimization." Temida 21, no. 2 (2018): 229–47. http://dx.doi.org/10.2298/tem1802229z.

Full text
Abstract:
The subject of this paper is a gender analysis of female victimization in the cyberspace. Since the Internet appears as a global network, it gives a global dimension to the virtual space, connecting any two points on the planet through a cyberspace. From this dimension, the cyberspace is also perceived as a social space. Namely, the Internet and social networks provide a continuous and unlimited place for users? gathering and contact, indicating that, potentially, each user is a potential victim. When analyzing victimization in the cyberspace it is important to notice that anonymity encourages perpetrators and increases insecurity of the victim. Research findings indicate that sexist and misogynistic attitudes towards women on social networks result in their exclusion, marginalization and/or victimization on the internet. The feminist criticism also points out that not only matters whether something is considered to be legal or illegal behaviour, but that cyber victimization is a continuous manifestation of misogynistic attitudes that are part of the dominant gender and cultural ideologies. The aim of this paper is to present the basic phenomenological and etiological characteristics of gender dimensions of the use/misuse of information technologies and to show that virtual communication, according to its social consequences, is not gender neutral and that cyber violence has its own gender implications. The data indicates that in the digital world, the privacy of women is significantly compromised and associated with new and terrifying forms of on-line violence. Feminist researchers warn that ?the Internet is only the culture accelerator, to which we are all accustomed, and its name is the patriarchate.? From this cognitive perspective, victimization of women on social networks mainly depends on the level of the patriarchal ideology of gender in a society, the influence of the media and the protection of women? s rights. Women can experience various forms of violence and privacy violations on the social networks, such as hate speech, spreading lies, stalking, photo montage, creating of false user profiles, the continuation of family violence, threats and blackmail, etc. The main topics discussed in this paper relate to general approach to the phenomenon of cyberspace and cyber violence; various types of cyber violence; cultural context and gender dimension of on-line victimization; various forms of cyber violence against women; specific characteristics of female victimization in on-line communication and the perception of preventing female victimization on the Internet, in the context of spreading gender- sensitive social norms and values through legal standardization and socialization of women? s rights.
APA, Harvard, Vancouver, ISO, and other styles
46

Hamin, Zaiton, and Wan Rosalili Wan Rosli. "Whither the Protection for Cyberstalking Victims? Some evidence from Malaysia." Environment-Behaviour Proceedings Journal 5, SI1 (June 1, 2020): 53–58. http://dx.doi.org/10.21834/ebpj.v5isi1.2297.

Full text
Abstract:
Cyberstalking leads to a chain of reactions such as identity theft, rape, and even murder. Despite the severe ramifications of cyberstalking, the perception of the adequacy of the law and the legal protection for victims remain ambiguous. This paper aims at examining the perception of the criminalisation of such crime, the gendered nature of such crime and the attendant legal protection for its victims. This paper adopts a qualitative methodology. The preliminary findings revealed that such crime is not considered as a gendered crime and there exists ambivalence on the perception of the crime and the legal protection of victims. Keywords: Cyber Stalking, Criminalisation, Gender, Secondary Victimisation, Victim-Blaming Mentality. eISSN: 2398-4287 © 2020. The Authors. Published for AMER ABRA cE-Bs by e-International Publishing House, Ltd., UK. This is an open access article under the CC BYNC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). Peer–review under responsibility of AMER (Association of Malaysian Environment-Behaviour Researchers), ABRA (Association of Behavioural Researchers on Asians) and cE-Bs (Centre for Environment-Behaviour Studies), Faculty of Architecture, Planning & Surveying, Universiti Teknologi MARA, Malaysia.DOI: https://doi.org/10.21834/ebpj.v5iSI1.2297
APA, Harvard, Vancouver, ISO, and other styles
47

Lee, Moo Song, and Dae Gyung Kwack. "Effect of neglect of children and adolescents on cyberbullying victims: Verification of the mediating effect of depression." Korean Association of Criminal Psychology 18, no. 3 (September 30, 2022): 65–80. http://dx.doi.org/10.25277/kcpr.2022.18.3.65.

Full text
Abstract:
Existing previous studies that investigated stalking perception focused on investigating specific age groups such as Cyber bullying, which has recently occurred, appears to be a more serious form than school violence, which has mainly occurred offline in the past. Cyberbullying is a serious social problem that not only children and adolescents but also adults are experiencing. In particular, in the case of cyberbullying experienced by children and adolescents, victims experience negative emotions such as frustration, anger, and sadness, leading to serious suicidal thoughts. described as a type of crime. A lot of research has been done so far to elucidate the causes of cyberbullying damage. In particular, factors such as parents' level of intervention in using cyber media are explained as factors related to cyberbullying damage. The level of parental intervention in cyber media use starts from the parents' interest in their children. Parental neglect, an independent variable used in this study, is explained as one of the types of child abuse in which parental guidance and supervision are remarkably reduced, in which parents neglect their children and neglect them. Parental neglect is difficult to detect because it has the characteristic of invisibility, unlike other types of abuse. However, there have been recent cases of child deaths due to neglect, which is a very serious abuse. In addition, children and adolescents who are not protected by their parents due to neglect can become victims of various crimes, and the depression experienced by children and adolescents as a result of neglect affects crime damage, aggression, and suicide. Therefore, in this study, the mediating effect of depression on the relationship between parental neglect and cyberbullying damage was verified in order to present an academic basis for preventing cyberbullying damage, which is currently one of the serious social problems. As a result of the study, parental neglect had a positive (+) effect on the victims of cyberbullying among children and adolescents, and depression had a positive (+) effect on cyberbullying victims and mediates the relationship between parental neglect and cyberbullying victims. Therefore, in order to prevent cyberbullying damage through the research results, methods to prevent parental neglect and specific measures to manage depression in children and adolescents were presented. Neglect measures are presented.
APA, Harvard, Vancouver, ISO, and other styles
48

Formoso, Joved Xander V., Marc Ernel S. Lumacad, Gernel S. Lumacad, Dale Roshan D. Dacer, Kirstenn Kelly D. Taldo, and Arron Guian L. Gaylo. "Uncovering Cyberbullying Themes from Unconsented Facebook Pitik Post Through Text Mining Techniques." European Journal of Humanities and Social Sciences 3, no. 3 (June 18, 2023): 102–10. http://dx.doi.org/10.24018/ejsocial.2023.3.3.459.

Full text
Abstract:
Pitik, referred as street photography; is a colloquial phrase for taking random photographs, arbitrarily from people without permission and/or consent. Empirically, numerous comments circulating in Facebook Pitik posts containing words related to humiliation, embarrassment, shaming, stalking, and bullying. There are yet no studies conducted to confirm or prove the existence and extent of cyberbullying themes in Facebook Pitik trends. Cyberbullying is not new to social media environments and as technologies and trends change over time, the medium of cyberbullying also changes. We show in this study the proofs of the existence and the extents of cyber bullying themes in Facebook Pitik posts. In this study, we utilized methods of natural language processing – specifically text mining and emotion polarity computation, also known as sentiment analysis. Using Facepager software, 68,000 documents/comments are collected from select Facebook pages of photographers involved in the trend of Pitik posting. Results showed that the collected documents contain 26.29 % pertaining to harassment; 35.48% to flaming; and 19.45% to denigration. The existence of negative emotions is also seen from collected documents including anger, uncertainty, constraining, fear, sadness, and disgust. Findings may help policy makers to enhance the Facebook community standards making its app safer and free from issues relating to cyberbullying, especially in unconsented Pitik posts.
APA, Harvard, Vancouver, ISO, and other styles
49

Ajmal Khan Mandokhail, Wali Khan Mandokhail, and Ali Raza. "Socioeconomic Factors Causing Domestic Violence Against Women and Its Legal Consequences: A Study of Quetta, Pakistan." Contemporary Issues in Social Sciences and Management Practices 2, no. 1 (March 31, 2023): 11–26. http://dx.doi.org/10.61503/cissmp.v2i1.27.

Full text
Abstract:
Due to the impunity, concealment, stigma, and shame surrounding it, violence against women and girls (VAWG) is one of the most pervasive, ongoing, destructive, and systemic human rights abuses in our time. This paper describes the phenomenon and factors of domestic violence among women living in Balochistan. The current research was carried out on the studies and cases related to Quetta, Balochistan, Pakistan. For this study, secondary data has been organized and analyzed by systematic review analysis technique to present a concise picture of domestic violence in Quetta. The study concludes that violence generally takes the form of physical, sexual, and psychological abuse, including intimate partner violence (battery, psychological abuse, marital rape, femicide), sexual violence and harassment (rape, forced sexual acts, unwanted sexual advances, child sexual abuse, forced marriage, street harassment, stalking, and cyber-harassment). It occurs everywhere, regardless of a person's age, race, religion, or socioeconomic level. There is a strong desire to mobilize society's sectors to formulate domestic violence policy. Both women and men need to promote non-violent relationships in private and public life. Moreover, there is a need to assure the implication of The Domestic Violence (Prevention and Protection) Act of 2012 in related institutions to avoid violence against women.
APA, Harvard, Vancouver, ISO, and other styles
50

DeMatteo, David, Suraji Wagage, and Jaymes Fairfax-Columbo. "Cyberstalking: are we on the same (web)page? A comparison of statutes, case law, and public perception." Journal of Aggression, Conflict and Peace Research 9, no. 2 (April 10, 2017): 83–94. http://dx.doi.org/10.1108/jacpr-06-2016-0234.

Full text
Abstract:
Purpose As society becomes more technology oriented, cyberstalking is becoming an increasing concern. The purpose of this paper is to compare US state and federal statutory and case law to a survey of public perception of cyberstalking to examine if cyberstalking laws reflect public opinion. Design/methodology/approach A national sample of 303 participants ranging in age from 18 to 69 years (M=33.35, SD=10.45) completed a novel cyberstalking survey and demographic questionnaire. The survey encompassed participants’ perceptions about the scope of cyberstalking as a crime, views on punishment of cyberstalking, and behaviors they have engaged in online or experienced from others that could constitute cyberstalking. Findings Findings indicated numerous areas of disagreement between public perception and statutory case law, such as a public preference that cyberstalking be treated as a separate offense from stalking, that a threat of violence is not required for behavior to constitute cyberstalking, and that there should be a private civil cause of action for cyberstalking. Findings also indicated that a substantial minority of participants had engaged in or been the victim of cyber actions that could be considered cyberstalking, and that the public preferred sanctions other than incarceration for cyberstalking. Originality/value This is the first study to examine whether cyberstalking policy in the USA reflects public perception of cyberstalking.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography