2021
DOI: 10.3390/electronics10141670
|View full text |Cite
|
Sign up to set email alerts
|

Cyberstalking Victimization Model Using Criminological Theory: A Systematic Literature Review, Taxonomies, Applications, Tools, and Validations

Abstract: Cyberstalking is a growing anti-social problem being transformed on a large scale and in various forms. Cyberstalking detection has become increasingly popular in recent years and has technically been investigated by many researchers. However, cyberstalking victimization, an essential part of cyberstalking, has empirically received less attention from the paper community. This paper attempts to address this gap and develop a model to understand and estimate the prevalence of cyberstalking victimization. The mo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 166 publications
0
6
0
Order By: Relevance
“…DL algorithms were used with skill to examine various aspects of URLs and web pages. Paradoxically, the author in [14] presented a unique technique that focuses on accurate and successful phishing website identification using URL analysis. We define our novel neural network (NN) architecture in terms of many parallel components, the first of which is the removal of surface-level URL characteristics.…”
Section: Related Workmentioning
confidence: 99%
“…DL algorithms were used with skill to examine various aspects of URLs and web pages. Paradoxically, the author in [14] presented a unique technique that focuses on accurate and successful phishing website identification using URL analysis. We define our novel neural network (NN) architecture in terms of many parallel components, the first of which is the removal of surface-level URL characteristics.…”
Section: Related Workmentioning
confidence: 99%
“…Because they are ashamed of their actions or think they can manage the matter on their own, victims frequently put off reporting cybercrimes to the police. Law enforcement's capacity to gather pertinent evidence is hampered by the extended interval between the incident and reporting [28][29][30]. Law enforcement faces jurisdictional issues due to the internet and the transnational nature of cybercrime, which can involve offenses that transcend several regional boundaries [29,31].…”
Section: Conceptsmentioning
confidence: 99%
“…Law enforcement's capacity to gather pertinent evidence is hampered by the extended interval between the incident and reporting [28][29][30]. Law enforcement faces jurisdictional issues due to the internet and the transnational nature of cybercrime, which can involve offenses that transcend several regional boundaries [29,31]. Organizations can bolster their cybersecurity stance using time-related metrics, enhance their capacity to respond to incidents, and proactively confront ever-changing cyber threats.…”
Section: Conceptsmentioning
confidence: 99%
“…Energy management emerges as a pivotal field in which optimization, sustainability, and re-silience are paramount. Central to the smart city paradigm are cloud computing and the Internet of Things, which function as neural networks that empower municipalities to comprehend, assess, and intelligently respond [1], [3]. The IoT, by means of interconnected sensors and devices, supplies smart cities with real-time data that is vital, whereas cloud computing provides the necessary infrastructure and processing capabilities to analyze the enormous datasets produced by IoT devices [3].…”
Section: Introductionmentioning
confidence: 99%
“…Central to the smart city paradigm are cloud computing and the Internet of Things, which function as neural networks that empower municipalities to comprehend, assess, and intelligently respond [1], [3]. The IoT, by means of interconnected sensors and devices, supplies smart cities with real-time data that is vital, whereas cloud computing provides the necessary infrastructure and processing capabilities to analyze the enormous datasets produced by IoT devices [3]. These technologies have a significant impact on energy management by improving bidirectional connectivity and real-time monitoring for smart meters, smart grids, and Advanced Metering Infrastructure (AMI) [4].…”
Section: Introductionmentioning
confidence: 99%