To see the other types of publications on this topic, follow the link: Cyberstalking.

Journal articles on the topic 'Cyberstalking'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cyberstalking.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Paullet, Karen, and Adnan Chawdhry. "Cyberstalking." International Journal of Cyber Research and Education 2, no. 2 (July 2020): 1–8. http://dx.doi.org/10.4018/ijcre.2020070101.

Full text
Abstract:
The internet has become a medium for people to communicate locally or globally in business, education, and their social lives. The increased use of the internet has created an impact on the number of online harassing/cyberstalking cases. This exploratory study of 121 undergraduate students seeks to examine the extent to which cyberstalking is prevalent. This study argues that cyberstalking and harassment will only decrease when the extent of the problem is fully understood and potential victims and law enforcement understand the protections necessary under the law.
APA, Harvard, Vancouver, ISO, and other styles
2

Dreßing, H., U. Klein, J. Bailer, P. Gass, and C. Gallas. "Cyberstalking." Der Nervenarzt 80, no. 7 (June 20, 2009): 833–36. http://dx.doi.org/10.1007/s00115-009-2732-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hanewald, Bernd, Julia Marterer-Stingl, Oliver Vogelbusch, Bernd Gallhofer, and Markus Stingl. "Cyberstalking." Psychotherapeut 63, no. 4 (October 24, 2017): 301–5. http://dx.doi.org/10.1007/s00278-017-0248-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

DeMatteo, David, Suraji Wagage, and Jaymes Fairfax-Columbo. "Cyberstalking: are we on the same (web)page? A comparison of statutes, case law, and public perception." Journal of Aggression, Conflict and Peace Research 9, no. 2 (April 10, 2017): 83–94. http://dx.doi.org/10.1108/jacpr-06-2016-0234.

Full text
Abstract:
Purpose As society becomes more technology oriented, cyberstalking is becoming an increasing concern. The purpose of this paper is to compare US state and federal statutory and case law to a survey of public perception of cyberstalking to examine if cyberstalking laws reflect public opinion. Design/methodology/approach A national sample of 303 participants ranging in age from 18 to 69 years (M=33.35, SD=10.45) completed a novel cyberstalking survey and demographic questionnaire. The survey encompassed participants’ perceptions about the scope of cyberstalking as a crime, views on punishment of cyberstalking, and behaviors they have engaged in online or experienced from others that could constitute cyberstalking. Findings Findings indicated numerous areas of disagreement between public perception and statutory case law, such as a public preference that cyberstalking be treated as a separate offense from stalking, that a threat of violence is not required for behavior to constitute cyberstalking, and that there should be a private civil cause of action for cyberstalking. Findings also indicated that a substantial minority of participants had engaged in or been the victim of cyber actions that could be considered cyberstalking, and that the public preferred sanctions other than incarceration for cyberstalking. Originality/value This is the first study to examine whether cyberstalking policy in the USA reflects public perception of cyberstalking.
APA, Harvard, Vancouver, ISO, and other styles
5

acquadro maran, daniela, and tatiana begotti. "Prevalence of Cyberstalking and Previous Offline Victimization in a Sample of Italian University Students." Social Sciences 8, no. 1 (January 21, 2019): 30. http://dx.doi.org/10.3390/socsci8010030.

Full text
Abstract:
Cyberstalking has been defined as the use of electronic communication devices (including the Internet and email) to stalk another person. The aim of this study was to compare the effects of cyberstalking between victims of cyberstalking and victims of cyberstalking and previous offline victimization in their lifetimes. Our hypothesis was that cyberstalking had an impact on victims’ wellbeing and contributed to increases in physical and emotional symptoms, anxiety and depression, and that those symptoms increased in victims who had suffered previous offline victimization. In an effort to investigate the effects of cyberstalking, a questionnaire was self-administered to 229 Italian students. A total of 107 participants (46.7%) indicated that they had been victims of cyberstalking. Seventy-two of them (67.3%) were victims of both cyberstalking and other forms of offline victimization in their lifetimes. Overall, our findings showed that the prevalence of cyberstalking in our sample was higher than in previous investigations. With regard to consequences, victims indicated higher scores for depression and anxiety than non-victims. In particular, victims of cyberstalking and previous offline victimization in their lifetimes experienced more depression and symptoms of trait anxiety than victims of cyberstalking only and non-victims. This investigation suggests the importance of preventing cyberstalking and offering support to victims of cyberstalking.
APA, Harvard, Vancouver, ISO, and other styles
6

van Baak, Carlijn, and Brittany E. Hayes. "Correlates of Cyberstalking Victimization and Perpetration Among College Students." Violence and Victims 33, no. 6 (December 2018): 1036–54. http://dx.doi.org/10.1891/0886-6708.33.6.1036.

Full text
Abstract:
Few studies have examined theoretical predictors of cyberstalking victimization and offending. The current study, guided by self-control theory and a feminist framework, analyzed predictors of cyberstalking victimization and offending among undergraduate college students (N = 662). College women were at increased risk of cyberstalking victimization, but were also more likely to report having engaged in cyberstalking perpetration. Higher levels of self-control reduced the likelihood of cyberstalking victimization and offending. While Greek life membership and holding adversarial heterosexual beliefs did not affect cyberstalking victimization and offending, gender stereotyping decreased the odds of experiencing cyberstalking victimization. Implications for future research and practice are discussed.
APA, Harvard, Vancouver, ISO, and other styles
7

Abu-Ulbeh, Waheeb, Maryam Altalhi, Laith Abualigah, Abdulwahab Ali Almazroi, Putra Sumari, and Amir H. Gandomi. "Cyberstalking Victimization Model Using Criminological Theory: A Systematic Literature Review, Taxonomies, Applications, Tools, and Validations." Electronics 10, no. 14 (July 13, 2021): 1670. http://dx.doi.org/10.3390/electronics10141670.

Full text
Abstract:
Cyberstalking is a growing anti-social problem being transformed on a large scale and in various forms. Cyberstalking detection has become increasingly popular in recent years and has technically been investigated by many researchers. However, cyberstalking victimization, an essential part of cyberstalking, has empirically received less attention from the paper community. This paper attempts to address this gap and develop a model to understand and estimate the prevalence of cyberstalking victimization. The model of this paper is produced using routine activities and lifestyle exposure theories and includes eight hypotheses. The data of this paper is collected from the 757 respondents in Jordanian universities. This review paper utilizes a quantitative approach and uses structural equation modeling for data analysis. The results revealed a modest prevalence range is more dependent on the cyberstalking type. The results also indicated that proximity to motivated offenders, suitable targets, and digital guardians significantly influences cyberstalking victimization. The outcome from moderation hypothesis testing demonstrated that age and residence have a significant effect on cyberstalking victimization. The proposed model is an essential element for assessing cyberstalking victimization among societies, which provides a valuable understanding of the prevalence of cyberstalking victimization. This can assist the researchers and practitioners for future research in the context of cyberstalking victimization.
APA, Harvard, Vancouver, ISO, and other styles
8

Strawhun, Jenna, Natasha Adams, and Matthew T. Huss. "The Assessment of Cyberstalking: An Expanded Examination Including Social Networking, Attachment, Jealousy, and Anger in Relation to Violence and Abuse." Violence and Victims 28, no. 4 (2013): 715–30. http://dx.doi.org/10.1891/0886-6708.11-00145.

Full text
Abstract:
Because the first antistalking statute was enacted in California in 1990, stalking research has been expanded immensely, yet been largely confined to exploring traditional pursuit tactics. This study instead examined the prevalence and correlates of cyberstalking behaviors while examining the phenomenon in a more inclusive manner than previous studies focusing on cyberstalking by including social networking avenues. In addition to a measure assessing cyberstalking-related behaviors, questionnaires assessing pathological aspects of personality, including attachment style, interpersonal jealousy, interpersonal violence, and anger were also provided to participants. Results indicate that, given preliminary evidence, cyberstalking-related behaviors are related to past measures of traditional stalking and cyberstalking, although prior attachment, jealousy, and violence issues within relationships are significant predictors of cyberstalking-related behaviors. In addition, unexpected gender differences emerged. For example, women admitted greater frequencies of cyberstalking perpetration than males, signaling that further research on frequency and motivation for cyberstalking among the sexes is necessary.
APA, Harvard, Vancouver, ISO, and other styles
9

Begotti, Tatiana, and Daniela Acquadro Maran. "Characteristics of Cyberstalking Behavior, Consequences, and Coping Strategies: A Cross-Sectional Study in a Sample of Italian University Students." Future Internet 11, no. 5 (May 22, 2019): 120. http://dx.doi.org/10.3390/fi11050120.

Full text
Abstract:
Aims: The aim of this study was to compare victims of one type of cyberstalking (OneType) with victims of more than one type of cyberstalking (MoreType) regarding (1) the impact of cyberstalking and (2) attitudes related to telling someone about the experience of cyberstalking and the coping strategies used by victims. Methods: A self-administered questionnaire was distributed to over 250 students at the University of Torino. Results: About half of the participants experienced at least one incident of cyberstalking. Among them, more than half experienced more than one type of cyberstalking. Victims suffered from depression more than those who had never experienced cyberstalking. No statistically significant difference emerged for anxiety. The coping strategies used by MoreType were more varied than those used by OneType victims of cyberstalking. Moreover, MoreType victims told someone about their victimization more than OneType victims. Conclusion: The work presented suggests implications for health care professionals, police officers, and government. For example, our suggestion is to pay attention to cyberstalking victims and provide flyers in schools, universities, and cafeterias that explain the risk of certain online behaviors and their consequences in physical and emotional spheres.
APA, Harvard, Vancouver, ISO, and other styles
10

Vilic, Vida. "Cyberstalking victimization." Temida 16, no. 1 (2013): 151–62. http://dx.doi.org/10.2298/tem1301151v.

Full text
Abstract:
Global social networks contributed to the creation of new, inconspicuous, technically perfect shape of criminality which is hard to suppress because of its intangible characteristics. The most common forms of virtual communications? abuse are: cyberstalking and harassment, identity theft, online fraud, manipulation and misuse of personal information and personal photos, monitoring e-mail accounts and spamming, interception and recording of chat rooms. Cyberstalking is defined as persistent and targeted harassment of an individual by using electronic communication. The victim becomes insecure, frightened, intimidated and does not figure out the best reaction which will terminate the harassment. The aim of this paper is to emphasize the importance and necessity of studying cyberstalking and to point out its forms in order to find the best ways to prevent this negative social phenomenon. Basic topics that will be analyzed in this paper are the various definitions of cyberstalking, forms of cyberstalking, and the most important characteristics of victims and perpetators.
APA, Harvard, Vancouver, ISO, and other styles
11

Kovacevic-Lepojevic, Marina, and Borko Lepojevic. "Victims of cyberstalking in Serbia." Temida 12, no. 3 (2009): 89–108. http://dx.doi.org/10.2298/tem0903089k.

Full text
Abstract:
The aim of this paper is to present research findings on prevalence and characteristics of cyberstalking in Serbia. A web-based questionnaire was used to collect data from a group of respondents who were recruited by snowball sampling via e-mail. A total of 237 respondents completed the online questionnaire. The aim of the first part of this paper is to determine the notion of cyberstalking as well as, to review research about the prevalence and the nature of stalking. The main results are the following: 39,6 % of respondents reported stalking; every fourth stalking victim is a victims of cyberstalking; mostly, cyberstalking victims were female and perpetrators were male. Victims were stalked by: persistent sending of unwanted e-mails and telephone calls, spreading rumors, abusive and negative comments and threats, encouraged other users to harass, threaten or insult, manipulating with victim's personal data, sending malicious programs and files, etc. In Serbia, cyberstalking is not criminalized yet and there are no organizations to whom victims may appeal and ask for help. We are hoping that this research will raise the awareness on cyberstalking and serve as a base for further research and legal reforms regarding cyberstalking victimization in Serbia.
APA, Harvard, Vancouver, ISO, and other styles
12

Reyns, Bradford W., Bonnie S. Fisher, and Ryan Randa. "Explaining Cyberstalking Victimization Against College Women Using a Multitheoretical Approach: Self-Control, Opportunity, and Control Balance." Crime & Delinquency 64, no. 13 (January 20, 2018): 1742–64. http://dx.doi.org/10.1177/0011128717753116.

Full text
Abstract:
The foci of the present study are to estimate the extent of cyberstalking victimization, and develop, specify, and test a theoretically based model of cyberstalking victimization among college women. A pursuit- and fear-based measure of victimization was utilized, and three leading theories—self-control, opportunity, and control balance—were tested as explanations of cyberstalking victimization. Key concepts from each theoretical perspective were operationalized using primary survey data from a probability sample of college women ( N = 1,987) from two large universities. Results show that approximately 3.4% of female students were victims of cyberstalking during the academic year. Findings from a path model revealed significant direct effects for opportunity and having a control deficit on cyberstalking. The effects of self-control were indirect through these two measures, whereas having a control surplus was not related to victimization risk. Overall, findings support the application of these three theoretical approaches to predicting and explaining cyberstalking victimization.
APA, Harvard, Vancouver, ISO, and other styles
13

Sharf, Atiya, Saeed Akhtar, Swera Sharf, and Muhammad Asif. "Ethical Issues of Cyberstalking and Personal Privacy in Pakistan: A Literature Survey." Indonesian Journal of Multidiciplinary Research 1, no. 2 (September 11, 2021): 357–62. http://dx.doi.org/10.17509/ijomr.v1i2.37900.

Full text
Abstract:
Electronic media is the fastest-growing technology of the modern era. Our society is relying on technological powers and lighting the fast speed of the internet to get maximum information about everything anywhere in the world. It plays a significant role in providing various facilities to the users but at the same time, personal privacy and cyberstalking issues must face. Cyberstalking is considering a major arising challenge to the modern world currently. Modification of technologies has a direct relationship with increase crimes of cyberstalking. This article represents a glimpse of unexpected activities like ethical dimensions of privacy, cyberstalking, and cyber harassment in Pakistan. Furthermore, the strategies associated with cyberstalking crimes, judicial involvement measures, and preventative proposals are also reported minimizing this emerging global crime.
APA, Harvard, Vancouver, ISO, and other styles
14

Zaki, Muhammad Maulana. "Aspek Pidana Cyberstalking Sebagai Salah Satu Bentuk Cybercrime." Jurist-Diction 5, no. 3 (May 30, 2022): 973–88. http://dx.doi.org/10.20473/jd.v5i3.35790.

Full text
Abstract:
Abstract Technology is developing, the pattern of interaction between humans is also changing. Internet is a new world where humans interact, without the limitations of distance and time. but the internet cannot be separated from dangerous actions, one of which is Cyberstalking. An act of cybercrime that is usually not considered dangerous but if it harms the victim it can potentially become a criminal act and the absence of rule causing the legality problem Based on this background, the purpose of this study is emphasizing criminal aspect by qualifying cyberstalking as maliciuos act. Continued by analyzing the criminal responsibilty of the perpetrators and the legal evidence of Cyberstalking. The research method used is a legal doctrinal method with a statutory approach, conceptual approach and comparative approach. Keywords: Cyberstalking; Criminal aspect; Cybercrime. Abstrak Teknologi berkembang, pola interaksi antar manusia juga berubah. Internet adalah hal baru dunia tempat manusia berinteraksi, tanpa batasan jarak dan waktu. namun internet tidak lepas dari tindakan-tindakan yang berbahaya, salah satunya adalah Cyberstalking yangsebuah tindakancybercrime yang biasanya tidak dianggap berbahaya namun jika merugikan korban maka dapat berpotensi menjadi tindakan kriminal dan kekosongan aturannya menimbulkan problematika dalam legalitasnyaBerdasarkan dari latar belakang tersebut tujuan penelitian ini adalah menitikberatkanaspek pidana nya yakni dengan menganalisis kualifikasi cyberstalking sebagai tindakan yang dicela. Dilanjutkan pertanggungjawaban dan pembuktian dari pelaku kejahatan Cyberstalking. Metode penilitian yang digunakan adalah hukum normatif dengan pendekatan perundang-undangan, pendekatan konseptual, dan pendekatan perbandingan Kata Kunci: Cyberstalking; Aspek Pidana; Cybercrime.
APA, Harvard, Vancouver, ISO, and other styles
15

Waszkiewicz, Paulina. "Informacje udostępniane publicznie w mediach społecznościowych a cyberstalking. Studium przypadku." Zarządzanie Mediami 10, no. 1 (2022): 75–87. http://dx.doi.org/10.4467/23540214zm.22.005.16927.

Full text
Abstract:
This article will discuss the topic of cyberstalking, which currently does not have a clear legal definition, neither scientific nor linguistic. Nowadays, various behaviors may be referred to as cyberstalking, which undoubtedly does not make it easier for law enforcement authorities to catch potential perpetrators. The text will analyze the behavior of a Polish TikToker nicknamed Diskorolka in terms of criminal liability for cyberstalking. Using primarily the dogmatic-legal method, i.e. through the interpretation of legal acts and jurisprudence of the authors’criminal law, analyzes in the text of the behavior. In the article, the author will also refer to statistics on cyberstalking.
APA, Harvard, Vancouver, ISO, and other styles
16

Sheridan, L. P., and T. Grant. "Is cyberstalking different?" Psychology, Crime & Law 13, no. 6 (December 2007): 627–40. http://dx.doi.org/10.1080/10683160701340528.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Bahrir, Ainun Jaryah. "Studi Desktiptif: Persepsi Mahasiswa Ilmu Forensik terhadap Konsep Cyberstalking." PERSPEKTIF 9, no. 2 (May 9, 2020): 219–27. http://dx.doi.org/10.31289/perspektif.v9i2.3428.

Full text
Abstract:
Cyberstalking is behavior that leads to repeated invasion of one's privacy by electronic mail or computer-based communication with a view to controlling, coercing, intimidating, harassing, or threatening. The purpose of this study is to describe the understanding of forensic science students about the concept of cyberstalking; the object criteria of this study are forensic science students who are still active and have taken cybercrime courses. This research method uses descriptive quantitative. Subjects in this study were obtained through purposive sampling with a total of 36 students. The technique of collecting research data is by distributing closed questionnaires. Research data analysis technique is a descriptive analysis technique, describing data obtained using tables and graphs. The results of this study indicate that forensic science students already have the correct perception of cyberstalking. The majority of students can distinguish statements with indications of cyberstalking and not cyberstalking.
APA, Harvard, Vancouver, ISO, and other styles
18

Tokunaga, Robert S., and Krystyna S. Aune. "Cyber-Defense: A Taxonomy of Tactics for Managing Cyberstalking." Journal of Interpersonal Violence 32, no. 10 (June 16, 2015): 1451–75. http://dx.doi.org/10.1177/0886260515589564.

Full text
Abstract:
Cyberstalking research has revealed information about who is perpetrating what offense to whom. This study adds to research on cyberstalking by exploring how victims respond to the unwanted pursuit. The reflections of cyberstalking victims were content analyzed to answer research questions about different risk management behaviors, their effectiveness, and their relationship with specific cyberstalking behaviors. Findings indicated that victims used seven general management tactics of which ignore/avoidance, active technological disassociation, and help seeking were the most common. Using technology to move away from pursuers was reported as the most effective tactic for managing the unwanted relational pursuit. The results also suggested that victims’ management responses were associated with the type of behaviors experienced.
APA, Harvard, Vancouver, ISO, and other styles
19

Silva, Tarcizo Junio Alves da, and Andréia Alves de Almeida. "CYBERCRIMES: A (IN)EFICÁCIA DA LEGISLAÇÃO BRASILEIRA NO COMBATE AO CRIME DE STALKING E CYBERSTALKING NA INTERNET." Revista Ibero-Americana de Humanidades, Ciências e Educação 10, no. 5 (May 23, 2024): 4479–99. http://dx.doi.org/10.51891/rease.v10i5.14197.

Full text
Abstract:
No mundo globalizado verifica-se um aumento dos usuários que utilizam o meio digital, surgindo assim novos crimes dentre os quais o cyberstalking merece destaque. Assim, este artigo visa compreender a relevância da discussão sobre o cyberstalking, no que diz respeito à sua eficácia na legislação brasileira no ambiente virtual. A problemática será analisar a nova tipificação do crime de perseguição (stalking), recepcionado pelo Código Penal, e seus efeitos no mundo jurídico para proteger os usuários na internet contra os crimes de cyberstalking. O objetivo central será a análise da nova tipificação trazida pela lei 14.132/2021, que inseriu o art. 147-A no Código Penal. Já os objetivos específicos concentram-se na análise das diferenças entre os crimes de perseguição: stalking e cyberstalking. Utilizando o método dedutivo e descritivo, com base em fundamentos teóricos encontrados em pesquisas bibliográficas, como documentos públicos, livros, artigos científicos e dados da internet. Os resultados da pesquisa indicaram que as leis atuais não são suficientes para enfrentar e coibir o problema do cyberstalking.
APA, Harvard, Vancouver, ISO, and other styles
20

Maran, Daniela Acquadro, and Tatiana Begotti. "Cyberstalking and Previous Offline Victimization in Italian Young Adults: The Role of Coping Strategies." Social Sciences 11, no. 12 (November 26, 2022): 549. http://dx.doi.org/10.3390/socsci11120549.

Full text
Abstract:
The aim of this study was to examine the association between different coping strategies and physical and emotional consequences, depressive symptoms, state anxiety, and trait anxiety, distinguishing between victims with previous offline victimization experiences (e.g., bullying, domestic violence) and those without such experiences. A self-administered questionnaire was distributed in a snowball system to more than 700 young adults in Italy. A total of 689 individuals completed the instrument. Of these, 305 participants (44%) reported having been victims of at least one form of cyberstalking. A total of 201 participants (66% of victims) reported having experienced both cyberstalking and other forms of victimization in their lifetime, while 89 (29% of victims) reported having experienced only cyberstalking. Overall, the results of this study show that victims with previous victimization had significantly higher scores on physical, emotional, depressive, and anxiety symptoms than victims who had never been victimized. In addition, results showed that victims who have been victimized before are more likely to use all three strategies (proactive, avoidant, passive) to stop cyberstalking than victims who have never been victimized. The results of this study may be useful in developing interventions to mitigate the effects of cyberstalking and prevent future victimization.
APA, Harvard, Vancouver, ISO, and other styles
21

Gao, Minghui, Xu Zhao, and Mark McJunkin. "Adolescents' Experiences of Cyberbullying." International Journal of Cyber Behavior, Psychology and Learning 6, no. 4 (October 2016): 13–27. http://dx.doi.org/10.4018/ijcbpl.2016100102.

Full text
Abstract:
This paper reports a multi-method study that investigated adolescents' experiences of cyberbullying. Sixty-one students (grades 10-12) responded to a survey that requires answers of both quantitative and qualitative nature. Quantitative data were statistically analyzed to understand frequencies and compare gender and grade differences. Qualitative data were coded to identify themes. Results suggest that a substantial portion of adolescents have experienced cyberbullying of various types. Significant gender differences exist in cyberstalking, with girls being more likely than boys to be subject to cyberstalking. Significant grade related differences exist in cyberstalking and exclusion, with 12th graders more likely to be victims of cyberstalking and exclusion than 10th and 11th graders. The majority of adolescents are unwilling to report cyberbullying experiences to adults due to reasons including lack of awareness or underestimating the negative effect of cyberbullying, fear of adults' overreaction, and the desire to deal with the problem by themselves.
APA, Harvard, Vancouver, ISO, and other styles
22

Kobets, Peter, and Kristina Krasnova. "Cyberstalking: public danger, key factors and prevention." Przegląd Wschodnioeuropejski 9, no. 2 (November 30, 2019): 43–53. http://dx.doi.org/10.31648/pw.3001.

Full text
Abstract:
Cyberstalking has become a new form of crime and deviant behaviour. The authors research the problem of cyberstalking and intimidation via the Internet in details. These concepts are used interchangeably because all forms of stalking are threatening or have the purpose of distressing the victim (victim stress exhaustion). The authors tried to draw attention and show the interconnectcion between the social danger of cyberstalking and the violation of private life boundaries. The consequences of such interference can cause the significant harm to man interests, material harm; threaten the physical and mental health of a person. The authors in this article draw attention to the activities of people who use the Internet to threaten (intimidate) others. The phenomenon of cyberstalking constitutes one of the main aims of the analysis because it includes a rather large area of behavior performance (starting with the expression of threats to the theft of personal data). The main question of this research is simple: what makes an intelligent and law-abiding person in the offline world (outside the Internet), take part in anti-social or criminal activities online? The basic reason is the fact that the combination of technological and social factors encourages people to participate in crime or antisocial acts, such as incitement to violence against other people. The originality of the study is that the authors analyzed the public danger of cyberstalking and the consequences of privacy infringement by the negative impact on a person through the Internet. Authors highlight trends and developments, and give recommendations on how cyberstalking prevention matters can be improved.
APA, Harvard, Vancouver, ISO, and other styles
23

Resett, Santiago, Pablo Christian González Caino, and Evita March. "Psychometric properties of the Intimate Partner Cyberstalking Scale in Argentinean adults." Revista de Psicopatología y Psicología Clínica 28, no. 3 (November 30, 2023): 187–201. http://dx.doi.org/10.5944/rppc.36970.

Full text
Abstract:
Intimate partner cyberstalking is associated with significant psychosocial, economic, and legal costs for both victims and perpetrators. However, despite these significant negative outcomes, there is a paucity in instruments designed to measure this behavior. Further, many of the measures lack validation and psychometric exploration. Thus, the objective of this study was to evaluate the psychometric properties of the Intimate Partner Cyberstalking Scale (IPCS; Smoker & March, 2017). For this purpose, 595 adults of both genders (32% male; Mage = 30.08) were recruited in Argentina. Participants completed the IPCS-scale, a measure of internet trolling behavior, Dark Triad Personality scale, questions regarding use of new technologies, and demographic items. Both exploratory factor and confirmatory analyses yielded an adequate two-factor structure of the IPCS - scale (a dimension of indirect-direct cyberstalking and a dimension of indirect behaviors) with adequate internal consistency (Cronbach's alphas were .85 and 89, respectively). McDonald’s consistency and composite reliability were satisfactory as well. Concurrent validity was established with measures of trolling and the use of new technologies. Also, it was detected that these variables, along with gender and dark personality, were predictors of cyberstalking. Overall, results of the current project indicate the IPCS-scale is a valid and reliable measure of assessing both direct and indirect intimate partner cyberstalking behavior in Argentina.
APA, Harvard, Vancouver, ISO, and other styles
24

Maple, Carsten, Emma Short, Antony Brown, Chris Bryden, and Michael Salter. "Cyberstalking in the UK." International Journal of Distributed Systems and Technologies 3, no. 4 (October 2012): 34–51. http://dx.doi.org/10.4018/jdst.2012100104.

Full text
Abstract:
The growth in the use of interconnected devices in the UK is well-documented. Society has embraced new technology allowing access to information, systems, and people; children are being described as digital natives and social networking, internet telephony, and accessing digital entertainment are a major part of their lives. However, whilst the ubiquitous nature of modern communication systems has brought many benefits, there exist a minority that uses the technology to harass others. This paper considers the phenomenon of Cyberstalking and presents an analysis of the problem and the responses provided on the first survey that addresses issue specifically. The paper discusses the nature of attacks, the victim-attacker relationship, the impact of the attacks and the actions taken to resolve the issue. The paper also considers both the legal and technological aspects and presents recommendations to help reduce the occurrence of Cyberstalking.
APA, Harvard, Vancouver, ISO, and other styles
25

Azhari, Muhammad Redha. "ASPEK PIDANA MAYANTARA (CYBERSTALKING)." Badamai Law Journal 4, no. 1 (March 1, 2019): 150. http://dx.doi.org/10.32801/damai.v4i1.9234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Chang, Wei-Jung. "Cyberstalking and Law Enforcement." Procedia Computer Science 176 (2020): 1188–94. http://dx.doi.org/10.1016/j.procs.2020.09.115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Hancock, Bill. "Cyberstalking on the Rise." Computers & Security 19, no. 4 (April 2000): 307–8. http://dx.doi.org/10.1016/s0167-4048(00)04013-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

MORI, Takemi, and Rinako OKABE. "Cyberstalking among collage students." Proceedings of the Annual Convention of the Japanese Psychological Association 76 (September 11, 2012): 2EVD05. http://dx.doi.org/10.4992/pacjpa.76.0_2evd05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Anisah, Amelia Putri, and Eko Nurisman. "Cyberstalking: Kejahatan Terhadap Perlindungan Data Pribadi Sebagai Pemicu Tindak Pidana." KRTHA BHAYANGKARA 16, no. 1 (April 11, 2022): 163–76. http://dx.doi.org/10.31599/krtha.v16i1.1047.

Full text
Abstract:
Perkembangan yang pesat ditandai dengan perubahan teknologi telekomunikasi dan teknologi komputer. Kecanggihan teknologi memunculkan berbagai macam kejahatan yang ditujukan pada komunitas cyber, salah satu bentuk kejahatan yang terjadi berupa cyberstalking. Berdasarkan fenomena tersebut perlu dijabarkan beberapa pengaturan yang dijadikan sebagai landasan dalam mengatasi pesatnya aksi cyberstalking. Penelitian ini menggunakan metode pendekatan yuridis normatif yang bersumber dari sumber penelitian berupa bahan hukum. Bahan hukum yang digunakan dalam penelitian ini adalah bahan hukum primer dan bahan hukum sekunder. Bahan hukum primer diperoleh dari Undang-Undang Nomor 19 Tahun 2016 tentang Informasi dan Transaksi Elektronik (UU ITE) perubahan atas Undang-Undang Nomor 11 Tahun 2008 tentang Informasi dan Transaksi Elektronik (UU ITE). Sedangkan bahan hukum sekunder diperoleh dari kajian kepustakaan (Library Research), seperti: buku, jurnal hukum, internet dan pendapat para ahli. Hasil penelitian ini menunjukkan bahwa tidak ada pengaturan khusus dalam menanggulangi kejahatan cyberstalking. Regulasi terkait cyberstalking masih mengadopsi pengaturan dalam UU ITE Nomor 19 Tahun 2016 Perubahan atas UU ITE Nomor 11 Tahun 2008
APA, Harvard, Vancouver, ISO, and other styles
30

Nurul Isnaini and Annisa Azzahro. "Cyberstalking on social media, how does Islam view it?" IQTIDA : Journal of Da'wah and Communication 3, no. 2 (December 13, 2023): 136–43. http://dx.doi.org/10.28918/iqtida.v3i2.2157.

Full text
Abstract:
With the development of information technology and the internet, social media has replaced real social relations with virtual ones. However, virtual social relations carry risks, one of which is Cyberstalking (Rohman & Sugeng 2022) Cyberstalking is a dangerous cybercrime and targets many people, communities, and organizations (Baer, 2020) As a crime, cyberstalking fulfills the elements of a criminal act which results in disruption of social order (Wall, 2007). Thus, cyberstalking is contrary to Islamic principles because it creates an insecure atmosphere. This research is library research using library materials in the form of books, journals, magazines, and other library sources as study material (Sukmadinata, 2010). Researchers will use a descriptive qualitative approach. Cyberstalking is a term used to describe various behaviors that involve repeated threats and/or harassment using electronic mail or other computer-based communications that will make people afraid or concerned for their safety (Gopalan, R.T. 2020). In Islam, these actions are prohibited acts because they contain elements of harassment, threats, harassment, or coercion. In interacting, Islam puts forward the concept of "rahmatan lil alamin" which means being a source of mercy and benefit for all creation (Rouzi, K.S., Suud, F.M., & Chaer, M.T. 2021), emphasizing values such as tolerance, discipline, social care, responsibility answer, and love peace (Nasir, M.S., & Khalilurrahman 2022). These values can be applied to the concept of privacy, encouraging individuals to respect the boundaries and personal space of others. The Qur'an teaches that stalking and harassment are prohibited by Allah, and humans need to be careful when engaging in such activities. In conclusion, cyberstalking is a form of harassment that violates Islamic principles and can cause harm to individuals and society.
APA, Harvard, Vancouver, ISO, and other styles
31

BEZHEVETS, A., and K. SHAH. "Cyberbullying and cyberstalking in the Internet environment: comparative legal analysis of concepts." INFORMATION AND LAW, no. 3(42) (September 20, 2022): 49–54. http://dx.doi.org/10.37750/2616-6798.2022.3(42).270100.

Full text
Abstract:
This article explores different types of crimes such as cyberbullying and cyberstalking, highlighting the problems associated with protecting victims and their psychological state after these crimes. We studied the experience of other countries in combating these phenomena and proposed a method of combating cyberstalking in Ukraine.
APA, Harvard, Vancouver, ISO, and other styles
32

Rohman, Adi Nur, and Sugeng. "EDUKASI HUKUM BAGI PESERTA DIDIK SMK FADILAH TANGERANG SELATAN DALAM UPAYA PENCEGAHAN DAN PENANGGULANGAN CYBERSTALKING DAN CYBERBULLYING DI KALANGAN PELAJAR." Abdi Bhara 1, no. 2 (December 11, 2022): 77–84. http://dx.doi.org/10.31599/abhara.v1i2.1573.

Full text
Abstract:
Cyberstalking dan cyberbullying menjadi salah satu dampak laten dari kemajuan teknologi yang demikian cepat. Kemunculan berbagai media sosial yang tidak diimbangi dengan kecakapan dalam memanfaatkannya, menciptakan celah transformasi kejahatan seperti tindakan penguntitan (stalking) dan perundungan (bullying). Sejauh ini, tindakan penguntitan dan perundungan via jejaring sosial di Indonesia masih dianggap hal yang sepele meski sebenarnya berdampak yang sangat serius terhadap perkembangan dan psikologis seseorang khususnya kalangan remaja. Mitra dari kegiatan pengabdian ini adalah SMK Fadilah yang berlokasi di wilayah Tangerang Selatan. Di antara permasalahan yang dihadapi mitra adalah minimnya pengetahuan terkait jenis dan dampak yang ditimbulkan akibat tindakan cyberstalking dan cyberbullying. Selain itu, mitra juga dihadapkan pada permasalahan minimnya pemahamanya terkait aspek hukum siber pada tindakan cyberstalking dan cyberbullying. Kegiatan pengabdian ini menawarkan solusi dalam bentuk seminar dan edukasi konsep dan regulasi terkait hukum siber dan teknologi informasi, dengan luaran peningkatan pemahaman peserta terkait identifikasi, pencegahan dan penanggulangan cyberstalking dan cyberbullying. Solusi kedua dengan penyelenggaraan pendampingan bagi peserta didik untuk bisa lebih memahamkan secara langsung akan materi yang telah disampaikan.
APA, Harvard, Vancouver, ISO, and other styles
33

Aslan, Mahi, and Hatice Saddiki. "A field study on cyber stalking among university students." JOURNAL OF AWARENESS 9, Special Issue/Özel Sayı (February 5, 2024): 61–66. http://dx.doi.org/10.26809/joa.2257.

Full text
Abstract:
Internet and technology devices not only connected people around the world but also opened new ways of cybercrime including cyberstalking. Ease in accessibility of social media brought criminals to the online world and facilitated the opportunities to do crimes in the cyber world. As the internet and social media are becoming inseparable parts of human life, it is important to make these environments safe for everyone, especially youth who are driven by social media the most. Understanding the prevalence of cyberstalking will help in finding ways to combat it and also to make a safer cyber environment. Aim: The study aims to examine the prevalence level of cyberstalking in university students between the ages of 18-30. This study will also assess the difference of cyber stalking prevalence between men and women. Materials and Methods: A preliminary investigation was made on the prevalence level of cyber stalking in university students between the age of 18-30. Cyber ​​Obsessive Stalking Scale (Siber Obsesif Takip Ölçeği (SOTÖ)) was used to examine the stalking behaviours that people are exposed to while using electrical devices. While examining research participants, their age, gender, their anxiety about cyberstalking and if they had experienced cyberstalking or seen this behaviour in people around them were taken into account. Conclusion: Developing technology has caused criminals to move to the online world. The severity of the situation will be brought to light by revealing the prevalence of victimization through studies. The prevalence level can direct researchers and technology developers to create safer online environments.
APA, Harvard, Vancouver, ISO, and other styles
34

Leite, Ângela, Susana Cardoso, and Ana Paula Monteiro. "Dark Personality Traits and Online Behaviors: Portuguese Versions of Cyberstalking, Online Harassment, Flaming and Trolling Scales." International Journal of Environmental Research and Public Health 20, no. 12 (June 15, 2023): 6136. http://dx.doi.org/10.3390/ijerph20126136.

Full text
Abstract:
The main objective of this study is to assess moderation effects of online behaviors between personality traits and addiction to Internet. To this end, four instruments were validated for Portuguese version through confirmatory factor analysis and exploratory factor analysis (Study 1) Multiple regression analysis was applied to examine the personality predictors of specific online behaviors while controlling for gender and age; and moderation effects were assessed (Study 2). Results showed good psychometric properties for the four validated scales. Machiavellianism is positively associated with all the dimensions of this study. Psychopathy is positively associated with total Cyberstalking, Cyberstalking Control, Flaming and Trolling. Narcissism is positively associated with all the dimensions, except Online Harassment and Flaming. Machiavellianism is positively associated with Addiction to Internet through Cyberstalking, Flaming and Trolling. Psychopathy is positively associated with Addiction to Internet through Cyberstalking Control and Flaming. Narcissism is also positively associated with Addiction to Internet through Cyberstalking and Trolling. This study demonstrates that dimensions of the dark triad of personality play an important role in Internet addiction through online behaviors. The results of this study have theoretical and practical implications: on the one hand, they reinforces the findings of other studies showing that dimensions of the dark personality triad play an important role in Internet and social network addition, contributing to the literature; and, on the other hand, on a practical level, they allow to conduct awareness campaigns in communities, schools, and work to understand that one can be exposed to unpleasant situations due to behaviors that some people with personality traits of Machiavellianism, narcissism and/or psychopathy that may cause problems affecting the mental, emotional and psychological health of others.
APA, Harvard, Vancouver, ISO, and other styles
35

KARYEV, I., and V. FURASHEV. "Cyberstalking: reflection in national legislation." INFORMATION AND LAW, no. 1(36) (March 11, 2021): 29–34. http://dx.doi.org/10.37750/2616-6798.2021.1(36).238176.

Full text
Abstract:
The article is devoted to cyberstalking – a type of specific cybercrime in which psychological pressure on the victim occurs with the help of IT-technologies, and its reflection in national legislation.
APA, Harvard, Vancouver, ISO, and other styles
36

Bocij, Paul, and Leroy McFarlane. "Cyberstalking: The Technology of Hate." Police Journal: Theory, Practice and Principles 76, no. 3 (September 2003): 204–21. http://dx.doi.org/10.1350/pojo.76.3.204.19442.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Mathieson, SA. "Cyberstalking in the urban jungle." Infosecurity Today 2, no. 2 (March 2005): 34–36. http://dx.doi.org/10.1016/s1742-6847(05)70183-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Grodzinsky, Frances S., and Herman T. Tavani. "Some ethical reflections on cyberstalking." ACM SIGCAS Computers and Society 32, no. 1 (March 2002): 22–32. http://dx.doi.org/10.1145/511134.511138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Dhillon, Gurpreet, and Kane J. Smith. "Defining Objectives for Preventing Cyberstalking." Journal of Business Ethics 157, no. 1 (September 18, 2017): 137–58. http://dx.doi.org/10.1007/s10551-017-3697-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Tade, Oludayo, and Oluronke Dorcas Popoola. "‘…her aim was to ruin my reputation’: Cyberstalking Victimization Experiences among University Students in Nigeria." Nigerian Journal of Sociology and Anthropology 19, no. 2 (November 10, 2021): 56–67. http://dx.doi.org/10.36108/njsa/1202.91.0240.

Full text
Abstract:
While global knowledge about cyberstalking is growing, intellectual engagement of the phenomenon in Nigeria is still at infancy and focused mainly on awareness. Scanty attention has however been paid to the nature of victimization experiences and its effects on victims. Against this background, this study investigated the nature and effects of cyberstalking among victims at the University of Ibadan. Using purposive and snowball sampling techniques, 30 victims of cyber stalking were subjected to indepth interview. Results indicated that their active online activities and the anonymity guaranteed in cyberspace contributed to their victimization. While one of the social and psychological effects of cyberstalking is social estrangement of victims, most victims failed to report to the Police owing to fear of repeat victimization and lack of trust in the policing institution. Instead, they accessed informal coping mechanisms from friends and family.
APA, Harvard, Vancouver, ISO, and other styles
41

Arvind, Kumar Gautam, and Bansal Abhishek. "Impact analysis of feature selection techniques on cyberstalking detection." i-manager’s Journal on Image Processing 9, no. 4 (2022): 21. http://dx.doi.org/10.26634/jip.9.4.19138.

Full text
Abstract:
Internet-based applications are making the habitual society and exploring new ways to perform online-based crimes. Numerous cybercriminals are engaged in the different platforms of the internet-based virtual world, carrying out cybercrimes according to predetermined and preplanned agendas. As technology advances, cyberstalking, cyberbullying, and other forms of cyber harassment are growing on social media, email, and other online platforms. Cyberstalking uses internet-based technology to harass, intimidate, and undermine individuals online with different approaches. In order to examine the impact of feature selection strategies for improving model performance, this paper proposes a machine learning-based cyberstalking detection model. The proposed model used the Term Frequency-Inverse Document Frequency (TF-IDF) feature extraction method to extract features, and three distinct approaches, TF-IDF + Chi-Square Test, and TF-IDF + Information Gain, were used to select the different numbers of relevant features. In the cyberstalking detection model, a Support Vector Machine (SVM) was employed for classification purposes. Based on the SVM classifier's performance, each feature selection approach's impact on the various feature sets was assessed. According to experimental findings, the TF-IDF + Chi-Square Test outperformed other applied approaches and improved detection mode performance. Additionally, experimental findings demonstrate that the TFIDF + Chi-Square Test approach also performs better in a small collection of relevant features than other approaches that have been utilized.
APA, Harvard, Vancouver, ISO, and other styles
42

Belerhrib, K., S. Ettanani, and F. Manoudi. "LES ADOLESCENTS AUTEURS DU CYBER HARCELEMENT ET PATHOLOGIE MENTALE : QUELS LIENS ?" International Journal of Advanced Research 11, no. 03 (March 31, 2023): 510–12. http://dx.doi.org/10.21474/ijar01/16454.

Full text
Abstract:
Introduction: Cyberstalking is a relatively recent phenomenon that particularly affects adolescents. Several studies have focused on victims of cyberstalking, but few studies have focused on perpetrators, which is why it is important to examine the psychiatric disorders of perpetrators or even their psychiatric profile. Purpose: To identify the psychiatric characteristics of adolescent cyberstalkers. Methods: Review of the literature on adolescent cyberstalkers Results and Discussion: Several studies show that youth involved in cyberstalking have significantly more behavioral problems than youth who are not involved. Cyberstalkers are distinguished by heteroaggressive behavior in general, as well as frequent acts of transgression and anti-social behavior, and troubled relationships with caregivers. As the severity, frequency and duration of cyberbullying increase, so do the difficulties in emotional and social relationships. In terms of schooling, there are repercussions in terms of performance, behaviour in class and well-being at school. In addition, studies have revealed various psychosomatic manifestations on these harassers, especially headaches, abdominal pain and sleep disorders. Paradoxically, being a cyber-stalker also puts one at high risk of becoming a cyber-victim, especially if the aggression is frequent, which can lead to more psychosocial difficulties. Conclusion: Cyberstalking has a real impact on the mental health of young adolescents, both perpetrators and victims, which requires health professionals to pay attention to this increasingly frequent phenomenon.
APA, Harvard, Vancouver, ISO, and other styles
43

Kraft, Ellen, and Jinchang Wang. "An Exploratory Study of the Cyberbullying and Cyberstalking Experiences and Factors Related to Victimization of Students at a Public Liberal Arts College." International Journal of Technoethics 1, no. 4 (October 2010): 74–91. http://dx.doi.org/10.4018/jte.2010100106.

Full text
Abstract:
This article shows the results of a study of the cyberbullying and cyberstalking experiences of students at a public liberal arts college. A survey was administered online to sophomores, juniors, seniors, and graduate students at the college. The prevalence rates were 10% for cyberbullying and 9% for cyberstalking, shown in the sample of 471 respondents. Traditional college students under 25 years of age were experiencing and participating in cyberbullying at higher rates than older college students. Prior experience as a victim of cyberbullying in high school was a significant risk factor for cyberbullying and cyberstalking in college, which implies that students’ roles in cyberbullying are maintained from high school to college. The majority of college students are handling cyberbullying incidents themselves rather than utilizing campus resources, but two-thirds of respondents would be more likely to consider reporting an incident if there was a central e-mail address available for reporting incidents.
APA, Harvard, Vancouver, ISO, and other styles
44

Juditha, Christiany. "Cyberstalking di Twitter @triomacan2000 pada Pemilu 2014." Jurnal Penelitian Komunikasi 18, no. 1 (July 15, 2015): 15–28. http://dx.doi.org/10.20422/jpk.v18i1.17.

Full text
Abstract:
The use of Twitter is open up the space for freedom of expression and opinion. But also raised a new phenomenon called cyberstalking (bullying). Acts of bullying (violence/intimidation) are also occur in cyberspace. People are free to commit violence and intimidate others without either use a personal account, institutional and anonymous. Especially when the Election arrives. This action is more intense uncontrolled. This study was carried out to get an overview of the phenomenon of cyberstalking on Twitter in 2014 elections that carried the account @ TrioMacan2000. The method used is a qualitative content analysis of the unit of analysis is the whole message (tweet) on account @ TrioMacan2000 during the legislative election campaign period opens March 16 to April 5, 2014. The study concluded that most of the tweets are also pictures posted on the account @ TrioMacan2000 throughout the campaign period of election legislation, cyberstalking entered in all categories studied, namely the desire to hurt; post power imbalance; repetition, as well as the pleasure that is felt by the perpetrators.
APA, Harvard, Vancouver, ISO, and other styles
45

Mellor, Jody. "Cyberstalking: Harrassment in the Internet Age." Sociological Research Online 10, no. 1 (June 2005): 198–99. http://dx.doi.org/10.1177/136078040501000109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Parsons-Pollard, Nicolle, and Laura J. Moriarty. "Cyberstalking: Utilizing What We do Know." Victims & Offenders 4, no. 4 (September 30, 2009): 435–41. http://dx.doi.org/10.1080/15564880903227644.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Pietkiewicz, Michał, and Malwina Treder. "Cyberstalking in social media – Polish view." Journal of Modern Science 38, no. 3 (October 26, 2018): 29–40. http://dx.doi.org/10.13166/jms/99217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Alexy, Eileen M., Ann W. Burgess, Timothy Baker, and Shirley A. Smoyak. "Perceptions of Cyberstalking Among College Students." Brief Treatment and Crisis Intervention 5, no. 3 (2005): 279–89. http://dx.doi.org/10.1093/brief-treatment/mhi020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Park, Moo-Won. "Criminal Control on Cyberstalking in U.S." Korean Journal of Comparative Criminal Law 13, no. 1 (July 2011): 239–68. http://dx.doi.org/10.23894/kjccl.2011.13.1.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Morris, Matthew C., Brooklynn Bailey, and Ernesto Ruiz. "Pain in the Acute Aftermath of Stalking: Associations With Posttraumatic Stress Symptoms, Depressive Symptoms, and Posttraumatic Cognitions." Violence Against Women 26, no. 11 (July 30, 2019): 1343–61. http://dx.doi.org/10.1177/1077801219857829.

Full text
Abstract:
This longitudinal study examined whether posttraumatic stress and depressive symptoms, posttraumatic cognitions, and ongoing cyberstalking exposures were independently associated with changes in pain outcomes among 82 young adult women with recent exposure to stalking. Multilevel models indicated that higher sensory pain intensity and pain-related interference were associated with more negative cognitions about the self. Higher affective pain intensity was associated with higher posttraumatic stress and depressive symptoms. Cyberstalking exposures were not associated with pain intensity or pain-related interference. Results reveal persistent pain complaints in recent stalking victims and highlight distinct psychological risk factors for pain intensity and pain-related interference.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography