Cyberstalking in the UK: Analysis and Recommendations

The growth in the use of interconnected devices in the UK is well-documented. Society has embraced new technology allowing access to information, systems, and people; children are being described as digital natives and social networking, internet telephony, and accessing digital entertainment are a major part of their lives. However, whilst the ubiquitous nature of modern communication systems has brought many benefits, there exist a minority that uses the technology to harass others. This paper considers the phenomenon of Cyberstalking and presents an analysis of the problem and the responses provided on the first survey that addresses issue specifically. The paper discusses the nature of attacks, the victim-attacker relationship, the impact of the attacks and the actions taken to resolve the issue. The paper also considers both the legal and technological aspects and presents recommendations to help reduce the occurrence of Cyberstalking.

[1]  Brian H. Spitzberg,et al.  Cyberstalking and the technologies of interpersonal terrorism , 2002, New Media Soc..

[2]  B. Löwe,et al.  A brief measure for assessing generalized anxiety disorder: the GAD-7. , 2006, Archives of internal medicine.

[3]  Abbas Vafaei,et al.  Analysis and Evaluation of a New Algorithm Based Fault Tolerance for Computing Systems , 2012, Int. J. Grid High Perform. Comput..

[4]  L. Sheridan,et al.  Is cyberstalking different? , 2007 .

[5]  Edward Petch Anti-stalking laws and the Protection from Harassment Act 1997 , 2002 .

[6]  S Fullbrook,et al.  The Protection From Harassment Act. , 1998, The British journal of theatre nursing : NATNews : the official journal of the National Association of Theatre Nurses.

[7]  David Birchall,et al.  Collaborative e-Learning and ICT Tools to Develop SME Managers: An Italian Case , 2010 .

[8]  Jack Dongarra,et al.  Handbook of Research on Scalable Computing Technologies , 2009 .

[9]  Kimberly J. Mitchell,et al.  Inventory of problematic Internet experiences encountered in clinical practice. , 2005 .

[10]  Rajkumar Buyya,et al.  Architectural Elements of Resource Sharing Networks , 2010 .

[11]  Michael Weber,et al.  PrivacyJudge: Effective Privacy Controls for Online Published Information , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[12]  Ali Ahmadinia,et al.  Dynamically reconfigurable NoC for future heterogeneous multi-core architectures , 2010 .

[13]  Leroy McFarlane,et al.  Online harassment: towards a definition of cyberstalking , 2002 .

[14]  J Reid Meloy,et al.  Stalking: the state of the science. , 2007, Criminal behaviour and mental health : CBMH.

[15]  James G. Phillips,et al.  Psychological Predictors of Problem Mobile Phone Use , 2005, Cyberpsychology Behav. Soc. Netw..

[16]  Lorraine Sheridan,et al.  Stalker Typologies: Implications for Law Enforcement , 2008 .

[17]  P. Resick,et al.  The Impact of Severe Stalking Experienced by Acutely Battered Women: An Examination of Violence, Psychological Symptoms and Strategic Responding , 2000, Violence and Victims.

[18]  Paul E. Mullen,et al.  STALKERS and their victims: Assessing and managing the stalker , 2000 .

[19]  S. Smoyak,et al.  Perceptions of Cyberstalking Among College Students , 2005 .

[20]  P E Mullen,et al.  Same-gender stalking. , 2000, The journal of the American Academy of Psychiatry and the Law.

[21]  Merritt Rachel Baer Cyberstalking, and the Internet Landscape we Have Constructed , 2010 .

[22]  R. Purcell,et al.  Stalking: defining and prosecuting a new category of offending. , 2004, International journal of law and psychiatry.

[23]  Chris Bryden,et al.  I can see you: harassment and stalking on the Internet , 2009 .

[24]  Sousan Arafeh,et al.  Writing, Technology and Teens , 2008 .

[25]  Jih-Sheng Shen,et al.  Dynamic Reconfigurable Network-on-Chip Design - Innovations for Computational Processing and Communication , 2010 .

[26]  Edna B. Foa,et al.  The Posttraumatic Cognitions Inventory (PTCI): Development and validation. , 1999 .

[27]  Larry D. Rosen,et al.  The Relationship Between “Textisms” and Formal and Informal Writing Among Young Adults , 2010, Commun. Res..

[28]  Janis Wolak,et al.  Online victimization: A report on the nation’s youth. , 2000 .