2021
DOI: 10.1177/0886260520985489
|View full text |Cite
|
Sign up to set email alerts
|

What is Cyberstalking? A Review of Measurements

Abstract: The absence of a widely accepted definition of cyberstalking has resulted in studies operationalizing it in various ways, reducing the comparability and generalizability of findings. The present work examined the most common behaviors and criteria used to operationalize cyberstalking within the quantitative literature. The definitions employed by the studies were evaluated in respect of (a) whether they included a minimum requirement for the number of times the behaviors needed to be repeated in order to be co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0
4

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(26 citation statements)
references
References 40 publications
0
13
0
4
Order By: Relevance
“…Stalkers also engage in unwanted contact or behavior that occurs in close proximity to the victim, such as following them, loitering where they know the victim will be, and directly approaching or accosting the victim (Sheridan et al, 2019). Online stalking can involve hacking personal accounts, impersonating the victim, or using the internet to tarnish their reputation (Cavezza & McEwan, 2014; Wilson et al, 2021). Secondary targets such as family members, friends, or colleagues are also frequently harassed as part of the stalking campaign, using similar kinds of behaviors (McEwan, Simmons, et al, 2020; McEwan et al, 2017).…”
Section: Stalking In the General Communitymentioning
confidence: 99%
“…Stalkers also engage in unwanted contact or behavior that occurs in close proximity to the victim, such as following them, loitering where they know the victim will be, and directly approaching or accosting the victim (Sheridan et al, 2019). Online stalking can involve hacking personal accounts, impersonating the victim, or using the internet to tarnish their reputation (Cavezza & McEwan, 2014; Wilson et al, 2021). Secondary targets such as family members, friends, or colleagues are also frequently harassed as part of the stalking campaign, using similar kinds of behaviors (McEwan, Simmons, et al, 2020; McEwan et al, 2017).…”
Section: Stalking In the General Communitymentioning
confidence: 99%
“…iki 85,2 proc. (Wilson et al, 2020). To-kius skirtingus statistinius rezultatus iš esmės lemia tai, jog iki šiol nėra vieningo sutarimo, kas yra kibernetinis persekiojimas ir kokie pagrindiniai jo požymiai (Wilson et al, 2020).…”
Section: įVadasunclassified
“…(Wilson et al, 2020). To-kius skirtingus statistinius rezultatus iš esmės lemia tai, jog iki šiol nėra vieningo sutarimo, kas yra kibernetinis persekiojimas ir kokie pagrindiniai jo požymiai (Wilson et al, 2020). Vieningo požiūrio dėl kibernetinio persekiojimo nebuvimas lemia ne tik tai, jog nėra tikslių statistinių duomenų apie šio reiškinio paplitimą, bet ir tai, jog trūksta konkretesnių šio pobūdžio nusikalstamų veikų tyrimo gairių bei tikslingos pagalbos priemonių kibernetinio persekiojimo aukoms.…”
Section: įVadasunclassified
See 2 more Smart Citations