To see the other types of publications on this topic, follow the link: Cyber stalking.

Journal articles on the topic 'Cyber stalking'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cyber stalking.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lee, Mu Seon. "A Study on the Actual Status and Countermeasures of Cyber Stalking." Korean Association of Criminal Psychology 19, no. 2 (2023): 65–76. http://dx.doi.org/10.25277/kcpr.2023.19.2.65.

Full text
Abstract:
Recently, in September, 2022, the so-called Sindang Station Murder in which a man obsessed with love killed a woman cruelly has been arousing public resentment. Besides, these days, cyber stalking, stalking on SNSs, is occurring in many ways; therefore, it is urgent for us to come up with countermeasures for it. Of course, the Stalking Punishment Act has been in effect since the end of 2021; however, there are a lot of difficulties in punishing cyber stalking. Now is the time to discuss countermeasures for it. The purpose of this study is to examine the concept, trend, and actual status of cyb
APA, Harvard, Vancouver, ISO, and other styles
2

Halder, Debarati. "Cyber stalking victimisation of women: Evaluating the effectiveness of current laws in India from restorative justice and therapeutic jurisprudential perspectives." Temida 18, no. 3-4 (2015): 103–30. http://dx.doi.org/10.2298/tem1504103h.

Full text
Abstract:
Victimisation of women through cyber stalking is one of the most serious crimes against women. Many countries including India have developed laws regulating cyber stalking. This article argues that since both, restorative justice (RJ) and therapeutic jurisprudence (TJ) are victim oriented, the issue of cyber stalking of women may be dealt with by RJ process and the laws in this regard must be analysed by the legal actors with a background in RJ and TJ philosophy. India had earlier taken up therapeutic punishment policy to enforce rights of the accused. But the modern principles of TJ have stil
APA, Harvard, Vancouver, ISO, and other styles
3

Bibi, Zainab, and Ambreen Abbasi. "Cyber Stalking: Sociological and Psychological Perspective." Global Sociological Review VII, no. I (2022): 159–66. http://dx.doi.org/10.31703/gsr.2022(vii-i).15.

Full text
Abstract:
Cyber stalking is the intimidation or threat to cause distress by blackmailing through internet.Cyber stalking is considered to be a threat to the right to privacy while abusing freedom of information. To discuss the subject issue author has used empirical study methodology. The first part provides an explanation of cyber-stalking in detail while discussing its factors, classification and impacts. In the second part, while discussing the impacts of cyber-stalking, then further discussion provides glimpses of sociological and psychological perspectives and causes of cyber-stalking. Finally, the
APA, Harvard, Vancouver, ISO, and other styles
4

Stephen, Arunbaby. "Comparative Analysis of Cyber Stalking Legislations in UK, US and India." Christ University Law Journal 6, no. 2 (2017): 61–76. http://dx.doi.org/10.12728/culj.11.4.

Full text
Abstract:
The Internet, with its vast connectivity and ample resources, provides an easy platform for committing crimes. Cyber stalking is one such offence, which has grown in the last two decades with the advent of cheap and fast internet connectivity. The Internet provides various means by which cyber stalking can occur. The lack of boundaries on the internet creates more risk for the users and as more and more people start using internet, the scope and complexity of this problem will only increase. More and more states are passing exclusive statutes for tackling Cyber Stalking, believing that their o
APA, Harvard, Vancouver, ISO, and other styles
5

Zaiton, Hamin, and Rosalili Wan Rosli Wan. "Cloaked By Cyber Space: A Legal Response to the Risks of Cyber Stalking in Malaysia." International Journal of Cyber Criminology 12, no. 1 (2018): 316–32. https://doi.org/10.5281/zenodo.1467931.

Full text
Abstract:
<em>Cyber stalking generally involves unwarranted, repeated and threatening conduct of the offender via the Internet or social media platforms, which causes fear, distress or alarm to the victim. A qualitative study on the perception of cyber stalking and the adequacy of the anti-stalking law to regulate such crime in </em><em>Malaysia</em><em> is somewhat scarce. Hence, this paper seeks to examine cyber stalking risks and the sufficiency of laws to govern such crime and the legal protection afforded to victims. This paper adopts a qualitative methodology, where the data is obtained from eight
APA, Harvard, Vancouver, ISO, and other styles
6

Demir, Fatih. "Cyber obsessive obsession: A study in nurses department." JOURNAL OF AWARENESS 9, Special Issue/Özel Sayı (2024): 79–90. http://dx.doi.org/10.26809/joa.2261.

Full text
Abstract:
Cyber obsessive stalking is a form of cyber violence that comprises a variety of unfavorable behavior patterns and is thought to be an extension of classic persistent stalking in online settings. Research shows that healthcare professionals are vulnerable to cyber-obsessive harassment due to the negative perception that patients are not satisfied with the service they receive and that their treatment processes are inadequately managed. The purpose of this study is to identify the experiences public and private sector nurses have had with cyber-obsessive stalking. In this cross-sectional study,
APA, Harvard, Vancouver, ISO, and other styles
7

Ihtaram, Ul Haq, and Muhammad Zarkoon Shah. "Cyber Stalking: A Critical Analysis of Prevention of Electronic Crimes Act-2016 and Its Effectiveness in Combating Cyber Crimes, A Perspective from Pakistan." Pakistan's Multidisciplinary Journal for Arts & Science 4, no. 3 (2023): 43–62. https://doi.org/10.5281/zenodo.10450177.

Full text
Abstract:
<em>The number of cybercrimes in Pakistan is growing rapidly. The study analyzed and described cybercrimes and all the elements that contribute to them. It covered all the common methods by which cyber criminals commit crimes. This study discusses how cyber stalking is a great threat to the world. Cyber stalking means to "stalk or harass" an individual, organization, or organization over the internet or other forms of electronic communication. More broadly, cyber stalking includes defamation, discrimination, demeaning others, and baseless allegations. Stalking has been recognized as a major pr
APA, Harvard, Vancouver, ISO, and other styles
8

H., M. Shambhavee. "Cyber Stalking Threat to People or Bane to Technology." International Journal of Trend in Scientific Research and Development 3, no. 2 (2019): 350–55. https://doi.org/10.31142/ijtsrd21354.

Full text
Abstract:
A day without the use of technology in our lives seems like an impossible mission. We have become entirely dependent on it in divergent ways. Technology has helped us in creating great ideas that we can communicate with people present anywhere on this earth. Apart from the fact that technology has made our lives easy, it also bought in a lot of difficulties. With the massive advancement of technology along with the evolution of time, the crime rate of cyber offences keeps increasing every day. One such cyber assault that requires immediate attention is cyber stalking. Cyber stalking involves c
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Jae-Han. "A Study on the Countermeasures for the Prevention of Stalking Crimes." K Association of Education Research 9, no. 4 (2024): 181–96. https://doi.org/10.48033/jss.9.4.10.

Full text
Abstract:
Stalking crimes break away from general and traditional criminal phenomena, andhas a high incidence of crimes caused by the perpetrator's abnormal psychology. In particular,stalking, which maintains an intimate relationship through favor between the opposite sex anddevelops into obsession in the process of interest and courtship, eventually leads to seriouscrimes such as assault or murder. To solve these problems, stalking punishment laws havebeen enacted and implemented, but the risks are increasing due to the increase in retaliatorycrimes against people around the victim and the evolution in
APA, Harvard, Vancouver, ISO, and other styles
10

Mubasher, Masooma, Asma Seemi Malik, and Amjad Mahmood. "GENDER DIFFERENCES IN EXPERIENCING CYBER-BULLYING AND CYBER-STALKING AMONG YOUNG ADULTS Masooma Mubasher." Pakistan Journal of Social Research 05, no. 02 (2023): 632–43. http://dx.doi.org/10.52567/pjsr.v5i02.1145.

Full text
Abstract:
This research specifically aims to investigate the prevalence of online harassment among boys and girls. A study on the perception and experiences of young adults regarding online harassment victimization has been selected with the topic "Gender differences in experiencing cyber-bullying and cyber-stalking." It offers detailed insights into their experiences and behaviours concerning cyber bullying, as well as the impact of cyber bullying on their lives and their coping strategies. This qualitative study employs a purposive sampling technique, with 12 participants (6 males and 6 females) aged
APA, Harvard, Vancouver, ISO, and other styles
11

Hamin, Zaiton, and Wan Rosalili Wan Rosli. "Managing Cyber Stalking in Electronic Workplaces." Advanced Science Letters 23, no. 8 (2017): 7895–99. http://dx.doi.org/10.1166/asl.2017.9603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Fadilah, Andi, Renda Aranggraeni, and Sri Reski Putri. "Eksistensi Keamanan Siber terhadap Tindakan Cyberstalking dalam Sistem Pertanggungjawaban Pidana Cybercrime." Syntax Literate ; Jurnal Ilmiah Indonesia 6, no. 4 (2021): 1555. http://dx.doi.org/10.36418/syntax-literate.v6i4.2524.

Full text
Abstract:
Kejahatan berkembang seiring dengan perkembangan peradaban manusia, dan dapat dikatakan bahwa kejahatan lahir bersama dengan lahirnya peradaban manusia. Perkembangan kejahatan juga diiringi dengan perkembangan pelaku tindak pidana. Oleh karena itu, perlu adanya pertanggungjawaban pidana yang tepat. Tuntutan perubahan serta adanya revolusi industri 4.0, membuat begitu banyak orang berlomba untuk dapat mengikuti arus zaman, terutama dalam hal pengembangan sistem informasi dan teknologi hal tersebut menunjukkan bahwa teknologi internet sudah menjadi keharusan yang digunakan untuk bersosialisasi d
APA, Harvard, Vancouver, ISO, and other styles
13

Aslan, Mahi, and Hatice Saddiki. "A field study on cyber stalking among university students." JOURNAL OF AWARENESS 9, Special Issue/Özel Sayı (2024): 61–66. http://dx.doi.org/10.26809/joa.2257.

Full text
Abstract:
Internet and technology devices not only connected people around the world but also opened new ways of cybercrime including cyberstalking. Ease in accessibility of social media brought criminals to the online world and facilitated the opportunities to do crimes in the cyber world. As the internet and social media are becoming inseparable parts of human life, it is important to make these environments safe for everyone, especially youth who are driven by social media the most. Understanding the prevalence of cyberstalking will help in finding ways to combat it and also to make a safer cyber env
APA, Harvard, Vancouver, ISO, and other styles
14

Mosechkin, I. N. "Distant Psychological Violence: Prospects for Improvement of Criminal Legislation." Psychology and Law 11, no. 4 (2021): 64–76. http://dx.doi.org/10.17759/psylaw.2021110405.

Full text
Abstract:
The article researches the legal issues of protection from various forms of distant psychological violence arising in electronic communication. The study aims to assess the public danger of cyber-bullying, cyber-stalking and cyber-harassment among potential and real victims in order to develop recommendations for improvement of domestic legislature. The main results of the study have been obtained by surveying 207 individuals and by means of comparative review of domestic and foreign law. The results indicate that distant violence does take place, but its assessment by legislators and the publ
APA, Harvard, Vancouver, ISO, and other styles
15

Shambhavee, H. M. "Cyber-Stalking: Threat to People or Bane to Technology." International Journal of Trend in Scientific Research and Development Volume-3, Issue-2 (2019): 350–55. http://dx.doi.org/10.31142/ijtsrd21354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Al-Rahmi, Waleed Mugahed, Noraffandy Yahaya, Mahdi M. Alamri, Nada Ali Aljarboa, Yusri Bin Kamin, and Muhammad Sukri Bin Saud. "How Cyber Stalking and Cyber Bullying Affect Students’ Open Learning." IEEE Access 7 (2019): 20199–210. http://dx.doi.org/10.1109/access.2019.2891853.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Lyndon, Amy, Jennifer Bonds-Raacke, and Alyssa D. Cratty. "College Students' Facebook Stalking of Ex-Partners." Cyberpsychology, Behavior, and Social Networking 14, no. 12 (2011): 711–16. http://dx.doi.org/10.1089/cyber.2010.0588.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Wykes, Maggie. "Constructing crime: Culture, stalking, celebrity and cyber." Crime, Media, Culture: An International Journal 3, no. 2 (2007): 158–74. http://dx.doi.org/10.1177/1741659007078541.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Power, Richard, and Dario Forte. "Stalking “cyber terrorists” in Sofia – event report." Computer Fraud & Security 2006, no. 11 (2006): 4–8. http://dx.doi.org/10.1016/s1361-3723(06)70439-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Cook, Sarah Gibbard. "Gossip on Steroids: Cyber-Bullying, Stalking, Harassing." Women in Higher Education 19, no. 7 (2010): 18–19. http://dx.doi.org/10.1002/whe.10077.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Bidin, Asiah binti, Shariffah Nuridah Aishah binti Syed Nong Mohamad, and Akmal binti Mohamad. "Intipan Siber: Jenayah Baru dalam Masyarakat Kontemporari [Cyber Types: New Crime in a Contemporary Society]." Jurnal Islam dan Masyarakat Kontemporari 11 (October 1, 2015): 10–21. http://dx.doi.org/10.37231/jimk.2015.11.3.134.

Full text
Abstract:
Innovation and technological advancement nowadays had produced several web-based products. These include social networking sites (SNS) which are dominating Internet usage among consumers. Although the site is able to connect friendship without limits and become a very effective means of communication in cyberspace, the negative impact should not be under-estimated. This article concludes that the use of social networking sites gives the risk of the crime of cyber stalking. An analysis on the legislative framework in Malaysia in relation to the crime shows that there is lacuna in legal provisio
APA, Harvard, Vancouver, ISO, and other styles
22

houng, Wan. "A Study on Legal Regulations of Cyber Stalking." Kyung Hee Law Journal 56, no. 3 (2021): 477–505. http://dx.doi.org/10.15539/khlj.56.3.15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Franco, Elio. "I crimini di genere sul web 2.0: cyber-stalking, cyber-molestia e cyber-violenza sessuale." SICUREZZA E SCIENZE SOCIALI, no. 3 (March 2018): 44–57. http://dx.doi.org/10.3280/siss2017-003005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

N, Parmesh. "Increasing Vulnerability of the user Data at Cyberspace." International Journal of Trend in Scientific Research and Development 4, no. 2 (2020): 1104–6. https://doi.org/10.5281/zenodo.3855014.

Full text
Abstract:
Cyber Stalking is a burgeoning concept where a person is vigiled by another using electronic media without consent. Using the pragmatic stealthiness of networking tactics, a stalker intrudes into the privacy of the victim causing him harm either coming in physical contact or by inflicting mental agony my the means of misusing the information collected online via stalking. The stalker may demand for money in exchange of sparing his her dignity or put across unreasonable demands such as to have intimate relationship with him. It can be noticed very often that a victim is left with no option othe
APA, Harvard, Vancouver, ISO, and other styles
25

Pittaro, M. L. "Cyber stalking: An Analysis of Online Harassment and Intimidation." International Journal of Cyber Criminology 1, no. 2 (2007): 180–97. https://doi.org/10.5281/zenodo.18794.

Full text
Abstract:
<strong>Abstract</strong> <em>Our society has come to rely on the sheer size, technological power, and lightening fast speed of the Internet to seek out immeasurable pages of information, explore the unknown, and communicate with virtually anyone, anywhere, and at anytime across the globe. Conversely, the Internet has opened windows of previously unknown criminal opportunities that not only challenge, but also transcend all physical boundaries, borders, and limitations to detect, punish, and diminish what appears to be a mounting problem of global proportion. As such, the Internet has literall
APA, Harvard, Vancouver, ISO, and other styles
26

Herath, Thilini B. G., Prashant Khanna, and Monjur Ahmed. "Cybersecurity Practices for Social Media Users: A Systematic Literature Review." Journal of Cybersecurity and Privacy 2, no. 1 (2022): 1–18. http://dx.doi.org/10.3390/jcp2010001.

Full text
Abstract:
In this paper, we present secondary research on recommended cybersecurity practices for social media users from the user’s point of view. Through following a structured methodological approach of the systematic literature review presented, aspects related to cyber threats, cyber awareness, and cyber behavior in internet and social media use are considered in the study. The study presented finds that there are many cyber threats existing within the social media platform, such as loss of productivity, cyber bullying, cyber stalking, identity theft, social information overload, inconsistent perso
APA, Harvard, Vancouver, ISO, and other styles
27

Pereira, Filipa, and Marlene Matos. "Cyber-Stalking Victimization: What Predicts Fear Among Portuguese Adolescents?" European Journal on Criminal Policy and Research 22, no. 2 (2015): 253–70. http://dx.doi.org/10.1007/s10610-015-9285-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Popovic-Citic, Branislava. "Cyber space bullying." Temida 12, no. 3 (2009): 43–62. http://dx.doi.org/10.2298/tem0903043p.

Full text
Abstract:
Cyber space bullying is a relatively new phenomenon that has received increased attention by scientists, researchers and practitioners in recent years. It is usually defined as an intentionally and repeatedly expression of aggression towards other people through information and communication technologies. Cyber space bullying is characterized by all the primary characteristics of traditional bullying and some specifics ones that clearly differ it from other forms of bullying. In addition to the analysis of characteristics and specifics of cyber space bullying, the paper describes the basic for
APA, Harvard, Vancouver, ISO, and other styles
29

Qirosi, Hana Mulyana, and Arin Khairunnisa. "PERAN MEDIA SOSIAL DALAM CYBER BULLYING." SENTRI: Jurnal Riset Ilmiah 3, no. 7 (2024): 3233–37. http://dx.doi.org/10.55681/sentri.v3i7.3112.

Full text
Abstract:
Salah satu perkembangan dalam teknologi informasi dan komunikasi adalah media sosial, atau medsos. Media sosial memberi pengguna kesempatan untuk berkomunikasi dan mengasah kemampuan mental dan kognitif mereka dengan hal-hal yang hanya terlihat di layar. Penggunaan teknologi informasi yang merugikan atau menyakiti dan melecehkan orang lain dengan sengaja disebut cyberbullying. Cyber bullying dapat terjadi baik pada kelompok orang yang saling kenal maupun pada kelompok orang yang tidak kenal. Cyber bullying dapat berkembang menjadi cyber stalking atau cyber harassment, sebuah kejahatan yang dap
APA, Harvard, Vancouver, ISO, and other styles
30

Kanwal, Farah, Sadia Iqbal, and Asma Javed. "Stalking and Relationship Satisfaction among Partners." Summer 2023 4, no. 3 (2023): 31–42. http://dx.doi.org/10.55737/qjssh.053741734.

Full text
Abstract:
The goal of the current study, which included gender as a moderator, was to assess the effect of Facebook stalking on romantic partners' satisfaction with their relationships. Online A-priori statistics were used to justify the sample (Soper, 2018). Purposive sampling was used to select 320 university students from Punjab, Pakistan's four public and private universities (University of Central Punjab, Bahauddin Zakariya University, The Islamia University of Bahawalpur and Rahim Yar Khan Campuses). The Relationship Assessment Scale created by Hendrick et al. (1998) and the Cyber-Obsessional Purs
APA, Harvard, Vancouver, ISO, and other styles
31

Udit, Agnihotri Udit Agnihotri. "The Legal Dimensions of Cyber Staking in India: An Analytical Study." RECENT RESEARCHES IN SOCIAL SCIENCES & HUMANITIES 10, no. 4 (2023): 5–10. https://doi.org/10.5281/zenodo.10371796.

Full text
Abstract:
A new type of crime is emerging in cyberspace, when a person repeatedly attempts to get in touch withanother, creating a sense of menace in the other person's head. People refer to this new crime as "internetstalking." Cyberstalking is characterised as a criminal act in which stalkers utilise the internet or anyother electronic gadget to follow a target. Cyberstalking is often associated with online abuse andharassment. It entails continuously intimidating or harassing a specific person. There are several waysto stalk someone, including following them to their house or place of business, damag
APA, Harvard, Vancouver, ISO, and other styles
32

Desai, Varsha P., Dr K. S. Oza, and Dr P. G. Naik. "Data Mining Approach for Cyber Security." International Journal of Computer Applications Technology and Research 10, no. 01 (2021): 035–41. http://dx.doi.org/10.7753/ijcatr1001.1007.

Full text
Abstract:
Use of internet and communication technologies plays significant role in our day to day life. Data mining capability is leveraged by cybercriminals as well as security experts. Data mining applications can be used to detect future cyber-attacks by analysis, program behavior, browsing habits and so on. Number of internet users are gradually increasing so there is huge challenges of security while working in the cyber world. Malware, Denial of Service, Sniffing, Spoofing, cyber stalking these are the major cyber threats. Data mining techniques are provides intelligent approach for threat detecti
APA, Harvard, Vancouver, ISO, and other styles
33

Jun, Ji-Yun. "Kritische Überprüfung über die Voraussetzungen einer Stalkingstat nach dem Anti-Stalkingsgesetz und ihre Reformvorschläge." Institute for Legal Studies Chonnam National University 42, no. 4 (2022): 171–210. http://dx.doi.org/10.38133/cnulawreview.2022.42.4.171.

Full text
Abstract:
Seit den späten 1990er Jahren hat sich Stalking zu einem ernsthaften sozialen Problem entwickelt, und seit 1999 wurden der Nationalversammlung viele Gesetzentwürfe zur Bestrafung von Stalking vorgelegt. Nachdem man sich aber nur auf das Bestrafung im Prinzip geeinigt und konkrete Details besprochen hatte, wurde schließlich im Nachgang zum ‚Nowon-Mordfall an Muttern und Töchtern‘ am 20. März 20210 . das Anti-Stalkingsgesetz erlassen und trat sechs Monate später am 21. Oktober 2021 in Kraft. Der Anstieg der 112-Anzeigen nach Inkrafttreten des Anti- Stalkingsgesetzes wird gewertet, um die Erwartu
APA, Harvard, Vancouver, ISO, and other styles
34

Dr. IbtIsam Al Saleh, Dr Fahad Alkasasbeh,. "The Legislative Confrontation Of The Cyber Stalking Crime: A Comparative Study." Psychology and Education Journal 58, no. 1 (2021): 833–43. http://dx.doi.org/10.17762/pae.v58i1.835.

Full text
Abstract:
This study examined the legislative confrontation of the cyber stalking crime and focused on how the Jordanian legislator and the comparative regulations confront this modern crime. In addition, the study used the descriptive methodology that relies on describing the legal texts of the legal framework and it also used the analytical methodology in order to reach a correct adaptation of this crime. On the other hand, the study used the comparative methodology when conducting comparison among the comparative legal texts. Accordingly, due to the severe impact of harassment on man and the fact tha
APA, Harvard, Vancouver, ISO, and other styles
35

al-Khateeb, Haider M., and Gregory Epiphaniou. "How technology can mitigate and counteract cyber-stalking and online grooming." Computer Fraud & Security 2016, no. 1 (2016): 14–18. http://dx.doi.org/10.1016/s1361-3723(16)30008-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Khan, Dr Imtiaz Ahmad, Samra Irshad, and H. Shah Jalal Ud Din. "Cyber Harassment and Online Violence Against Women:A Critical Analysis of Women Protection Law Regime in Pakistan." Journal of Law & Social Studies 7, no. 1 (2025): 12–25. https://doi.org/10.52279/jlss.07.01.1225.

Full text
Abstract:
It is a reality that in contemporary times women are more vulnerable to cyber harassment and online violence. This research provides a recourse to explore cyber harassment laws and online violence against women in Pakistan with argumentation that women with advancement of technology need special protection. This piece of study is constricted to the extent of addressing online violence and cyber harassment and argues for the adoption and regulation of emerging online crimes against women such as cyber stalking, cyber bullying, fake ID, nude pictures/videos and deepfakes. This research culminate
APA, Harvard, Vancouver, ISO, and other styles
37

Westbrook, Lynn. "Internet access and use in domestic violence shelters: Policy, capacity, and management barriers." Journal of Social Work 13, no. 1 (2012): 30–53. http://dx.doi.org/10.1177/1468017311435184.

Full text
Abstract:
• Summary: Domestic violence agency administrators struggle to incorporate the Internet safely and effectively into their intimate partner violence (IPV) services. This study utilizes two data gathering tools to identify administrative concerns and web content in the 91 Texas shelters. The first research stage employed a mixed-methods questionnaire (89% response rate) to identify managers’ Internet use patterns and managerial needs. In the second stage, all shelter web sites (65) were submitted to a multi-context content analysis. • Findings: Overall, findings indicate that administrators see
APA, Harvard, Vancouver, ISO, and other styles
38

Hotragn, Pettugani. "Navigating the Digital Realm: Exploring the Risk Management Lifecycle in Information Security and the Ongoing Thoughts on Cyber-Crime and Cyber-Stalking." International Journal of Research Publication and Reviews 4, no. 12 (2023): 1300–1304. http://dx.doi.org/10.55248/gengpi.4.1223.123411.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Jenna, Cripps, and Stermac Lana. "Cyber-Sexual Violence and Negative Emotional States among Women in a Canadian University." International Journal of Cyber Criminology 12, no. 1 (2018): 171–86. https://doi.org/10.5281/zenodo.1467891.

Full text
Abstract:
<em>Cyber-sexual violence refers to a form of harmful sexually aggressive behaviors committed with the facilitation of digital technologies. Such harmful behaviors can include non-consensual pornography and other image-based sexual exploitation, online sexual harassment, cyber-stalking, online gender-based hate speech, and the use of a carriage service to arrange/attempt to arrange a victim</em><em>&rsquo;</em><em>s sexual assault. This article examines the cyber-sexual violence experiences reported by a sample of women on university campuses in </em><em>Ontario</em><em>, </em><em>Canada</em><
APA, Harvard, Vancouver, ISO, and other styles
40

Shweta, Shweta Srivastava. "Cyber-Crimes against Women: Statutory Law Foundations and Judicial Response in India." RECENT RESEARCHES IN SOCIAL SCIENCES & HUMANITIES 10, no. 4 (2023): 41–48. https://doi.org/10.5281/zenodo.10444907.

Full text
Abstract:
Due to technology advancement, ratio of cybercrimes against women is on the rise. At present it isarising as a major challenge for government. To address this issue government has taken manyinitiatives like, the Indian government has amended the Information Technology Act, the IndianPenal Code (IPC), and the Protection of Women from Domestic Violence Act (PWDVA). These lawsdefine cybercrimes especially in reference to women, and tried to give protection to victims of thesecrimes. In addition, the Indian judiciary has taken a number of steps to resist cybercrimes againstwomen, such as establish
APA, Harvard, Vancouver, ISO, and other styles
41

Ménard, Kim S., and Aaron L. Pincus. "Predicting Overt and Cyber Stalking Perpetration by Male and Female College Students." Journal of Interpersonal Violence 27, no. 11 (2011): 2183–207. http://dx.doi.org/10.1177/0886260511432144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Raj CA, Riya. "A Review on the Application of Lifestyle-Routine Activity Theory in Cyber Criminology." International Journal of Forensic Sciences 9, no. 3 (2024): 1–4. http://dx.doi.org/10.23880/ijfsc-16000401.

Full text
Abstract:
In an age dominated by technology across all facets of living, the rise of cybercrime emerges as a significant issue for the individuals. The integration of lifestyle-routine activity theory (L-RAT) in the field of cyber criminology offers a robust framework for understanding the dynamics of online victimization. This review paper explores how L-RAT can be useful in detecting the unique characteristics of cybercrime. By examining the key components of L-RAT like motivated offenders, suitable targets and the absence of capable guardians by demonstrating its relevance in digital context. This re
APA, Harvard, Vancouver, ISO, and other styles
43

Prastiyo, Wawan Edi, and I. Dewa Made Suartha. "Debt Collection Violations in Financial Technology in a Cyber-ethic and Legal Perspective." Jurnal Komunikasi Ikatan Sarjana Komunikasi Indonesia 6, no. 1 (2021): 13–21. http://dx.doi.org/10.25008/jkiski.v6i1.510.

Full text
Abstract:
The presence of financial technology (Fintech) on the one hand makes it easy for people to obtain credit, while on the other hand, it creates various problems. In this study, two issues will be discussed, namely the application of cyber-ethic in protecting personal data and legal issues in collecting debt on Fintech. This research is a qualitative research. Data in the study were collected by means of literature study and presented descriptively and analytically. Cyber-ethic is implemented by protecting personal data. It is a transformation of traditional ethics in cyberspace. The cyber-ethic
APA, Harvard, Vancouver, ISO, and other styles
44

Ming-Li, Hsieh, and Kevin Wang Shun-Yung. "Routine Activities in a Virtual Space: A Taiwanese Case of an ATM Hacking Spree." International Journal of Cyber Criminology 12, no. 1 (2018): 333–52. https://doi.org/10.5281/zenodo.1467935.

Full text
Abstract:
<em>Routine activity theory (RAT) was initially proposed to explain shifts in urban crime rates in the late 1970s, and has subsequently been applied to predictions of predatory criminal or victimization events. Despite a number of studies attempting to apply RAT to the vast array of crimes now taking place in a virtual environment such as phishing, fraud, malware infection, identify theft, computer viruses and cyber stalking on the Internet in Western countries, little is known about whether RAT could address automatic teller machine (ATM) hacking in an Asian setting. The current study applies
APA, Harvard, Vancouver, ISO, and other styles
45

Patil, Dr. Manjusha Manoj, and Prof. Sayali Swapnil Dhawale. "Cyber security and digital inclusion." International Journal of Advance and Applied Research 6, no. 25(C) (2025): 87–89. https://doi.org/10.5281/zenodo.15322642.

Full text
Abstract:
<strong>Abstract:</strong> The use of Digital platforms has revolutionized the way our life in different aspects like &ndash; living standard, work culture, and modern ways of communication. However, it&rsquo;s increased connectivity of people effectively. Like other inventions of the century, digital inclusion in life, is a miracle that has overwhelmed the overall lifestyle of society. It is nothing but a Digital Computer Based Technology which is specifically used for sharing the innovative ideas, thoughts, emotions and information in the form message and videos to a maximum number of people
APA, Harvard, Vancouver, ISO, and other styles
46

Dar, Showkat Ahmad, and Dolly Nagrath. "Are Women a Soft Target for Cyber Crime in India." Journal of Information Technology and Computing 3, no. 1 (2022): 23–31. http://dx.doi.org/10.48185/jitc.v3i1.503.

Full text
Abstract:
A growing global issue that might have significant social and economic repercussions is cyber violence against women. This is due to the growing popularity of social media, the spread of information via mobile devices, and the growth of the internet. Any form of sexual or gender-based violence against women that takes place through ICTs like the Internet, mobile devices, and video games is referred to as cyber violence. These technologies are ideal for using as weapons against women for a variety of reasons these include cyber stalking, sexual abuse (including sending sexually explicit or porn
APA, Harvard, Vancouver, ISO, and other styles
47

Wełyczko, Sylwia. "Zniesławienie na Facebooku." Themis Polska Nova 9, no. 2 (2015): 192–215. http://dx.doi.org/10.15804/tpn2015.2.11.

Full text
Abstract:
The article examines the mechanisms of defamation in the internet space, social media and Facebook in particular. Human dignity is protected both as a constitutional value and as an individual right, though in everyday practice law-enforcement bodies usually tend to be unwilling to react to violations of human dignity, while appropriate legal provisions are often not in place to be implemented. Actions taken by the police in investigating appropriate cases do not always manage to identify perpetrators or bring them to justice. Most internet or cyber crime occurs across international borders an
APA, Harvard, Vancouver, ISO, and other styles
48

Baratov, Abror Baktiyarovich, Almas Rysbekov, Malcolm Lorein, Merei Amangeldy, Shahzoda Mamedalieva, and Nasiba Raimova. "STALKING: MAIN PRINCIPLES OF IDENTIFIFCATION STALKERS IN A FIELD OF CYBER AREA SECURITY SYSTEM." Theoretical & Applied Science 109, no. 05 (2022): 438–44. http://dx.doi.org/10.15863/tas.2022.05.109.46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

McMillan, Iris F., Victoria O’Connor, Fallon Richie, and Jennifer Langhinrichsen-Rohling. "Look Who's Lurking." Partner Abuse 13, no. 1 (2022): 123.1–143. http://dx.doi.org/10.1891/pa-2021-0030.

Full text
Abstract:
Cyber psychological abuse and social media surveillance of ex-partners are relatively common virtual forms of behavior linked with intimate partner violence (Pineda, Galán, Martínez-Martínez, Campagne, &amp; Piqueras, 2021) as well as on-going and dangerous intimate partner stalking (Logan &amp; Langhinrichsen-Rohling, 2021). While both forms of behavior are concerning, especially after the dissolution of a romantic relationship, transdiagnostic shared and unique predictors of each are relatively unknown. In the current study, we examined the associations between intolerance of uncertainty and
APA, Harvard, Vancouver, ISO, and other styles
50

Kuzmenko, O., H. Yarovenko, and L. Skrynka. "ANALYSIS OF MATHEMATICAL MODELS FOR COUNTERING CYBER FRAUD IN BANKS." Vìsnik Sumsʹkogo deržavnogo unìversitetu 2022, no. 2 (2022): 111–20. http://dx.doi.org/10.21272/1817-9215.2022.2-13.

Full text
Abstract:
The article is devoted to the current topic of analysis of mathematical models for countering cyber fraud in banks. This problem is due to the security risks growth in the banking system, which are formed by fraudsters' cyberattacks and cybercrimes implementation. Therefore, the priority task for cyberbanking security is the application of modern mathematical methods to analyse the sources of cyber attacks, identify threats and losses in the banking services market, identify cyber-attacks and assess the scenario of potential cyber risk, etc. The article analyses the most widespread types of cy
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!