7 resultados para Stalking victims
em Aston University Research Archive
Resumo:
Although much has been learnt about the psychological and physical harm caused to victims of stalking and cyberstalking, relatively little is known about the impact of stalking on social behaviour and relationships. This paper argues that victims of stalking sometimes go on to employ stalking behaviours against others. Although often arising from an instinctive need for self-protection, such reactive stalking can be defensive or offensive in nature. Those who engage in such behaviour may do so from a need to assert control over their lives, or from fear of further victimisation. In pursuing this argument, a case study is used to illustrate the behaviours described. The case study focuses on the experiences of three stalking victims and describes attempts to victimise the author during his research. The article also discusses some of the implications of reactive stalking for the criminal justice system and the way in which victims receive support.
Resumo:
Very little empirical work exists on cyberstalking. The current study analysed detailed questionnaires completed by 1051 self-defined stalking victims. Almost half (47.5%) reported harassment via the Internet, but only 7.2% of the sample was judged to have been cyberstalked. Ordinal regression analyses of four groups of victims, categorized according to degree of cyber involvement in their victimization, revealed a general picture of similarity between the groups in terms of the stalking process, responses to being stalked, and the effects on victims and third parties. It was concluded that cyberstalking does not fundamentally differ from traditional, proximal stalking, that online harassment does not necessarily hold broad appeal to stalkers, and that those who target ex-intimates remain the most populous stalker type.
Resumo:
This paper describes the first study to focus exclusively on the prevalence and impact of cyberstalking. A Web-based questionnaire was used to collect data from a group of respondents who were recruited by snowball sampling via e-mail. A total of 169 respondents completed the questionnaire. The results of the study found that approximately a third of respondents might be considered victims of cyberstalking. Furthermore, when asked to indicate the level of distress felt as a result of their experiences, almost a quarter of respondents chose a value of ten on a ten-point scale. The study also suggests a number of differences between cyberstalking and offline stalking, for instance cyberstalking tends to take place over a shorter period of time than offline stalking and cyberstalking victims are less likely to know the identify of their harassers. These differences add weight to the argument that cyberstalking should be seen as a new form of deviant behaviour that can be distinguished from offline stalking. The work concludes by emphasising a need for further research.
Resumo:
In this chapter, we discuss the interviewing of adult witnesses and victims with reference to how the extant psychological and linguistic literature has contributed to understanding and informing interview practice over the past 20 years and how it continues to support practical and procedural improvements. We have only scratched the surface of this important and complex topic, but throughout this chapter we have directed readers to many in-depth reviews and some of the most contemporary research literature currently available in this domain. We have introduced the PEACE model and described the Cognitive Interview procedure and its development. We have also discussed rapport building, question types and communication style, all with reference to witness memory and practical interviewing. Finally, we highlight areas that would benefit from research, for example conducting interviews with interpreters, and how new training initiatives are seeking to improve interview procedures and interviewer practice.
Resumo:
Over the last few years governments, law enforcement agencies, and the media have noted increases of online harassment. Although there has been a great deal of research into 'offline stalking', at this moment in time there has been no formal research that attempts to classify cyberstalkers. This study aimed to identify a classification of cyberstalkers by interviewing victims. Twenty-four participants were interviewed and their responses logged on a 76-item Cyberstalking Incident Checklist. A typology of cyberstalkers was developed.
Resumo:
Cyberstalking has recently emerged as a new and growing problem and is an area that will probably receive a higher profile within criminal law as more cases reach court (see Griffiths, 1999; Griffiths, Rogers and Sparrow, 1998; Bojic and McFarlane, 2002a; 2002b). For the purposes of this article we define cyberstalking as the use of information and communications technology (in particular the Internet) in order to harass individuals. Such harassment may include actions such as the transmission of offensive e-mail messages, identity theft and damage to data or equipment. Whilst a more comprehensive definition has been presented elsewhere (Bocij and McFarlane, 2002), it is hoped that the definition here is sufficient for those unfamiliar with this field. The stereotypical stalker conjures up images of someone harassing a victim who is the object of their affection. However, not all stalking incidents are motivated by unrequited love. Stalking can also be motivated by hate, a need for revenge, a need for power and/or racism. Similarly, cyberstalking can involve acts that begin with the issuing of threats and end in physical assault. We also make distinctions between conventional stalking and cyberstalking. Whilst some may view cyberstalking as an extension of conventional stalking, we believe cyberstalking should be regarded as an entirely new form of deviant behaviour. It is not surprising that cyberstalking is sometimes thought of as a trivial problem. A number of writers and researchers have suggested that cyberstalking and associated activities are of little genuine concern. Koch (2000), for example, goes as far as accusing those interested in cyberstalking as promoting hysteria over a problem that may be minuscule or even imaginary. The impression gained is that cyberstalking represents a relatively small problem where victims seldom suffer any real harm. Whilst there are no genuinely reliable statistics that can be used to determine how common cyberstalking incidents are, a great deal of evidence is available to show that cyberstalking is a significant and growing problem (Griffiths et al, 1998). For instance, CyberAngels (a well-known Internet safety organization) receives some 500 complaints of cyberstalking each day, of which up to 100 represent legitimate cases (Dean, 2000). Another Internet safety organization (Working to Halt Online Abuse) reports receiving an average of 100 cases per week (WHOA, 2001). To highlight the types of cyberstalking behaviours that take place and some of the major issues facing criminal law, we briefly examine four high profile cases of cyberstalking (adapted from Bocij and MacFarlane, 2002b).