22 resultados para cyberstalking


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dissertação apresentada à Universidade Fernando Pessoa como parte dos requisitos para obtenção do grau de Mestre em Psicologia Jurídica

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Repository contains an animation related to privacy along with the poster for the resource in both jpeg and pdf format.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Presentation slides + mini quiz on the topic of cybercrime.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This Article examines a problem in cybercrime law that is both persistent and pervasive. What counts as “communication” on the Internet? Defining the term is particularly important for crimes such as cyberstalking, cyberharassment, and cyberbullying, where most statutes require a showing that the alleged perpetrator “communicated” with the victim or impose a similar requirement through slightly different language. This Article takes up the important task of defining communication. As a foundation to our discussion, we provide the first comprehensive survey of state statutes and case law relating to cyberstalking, cyberharassment, and cyberbullying. We then examine the realities of the way people use the Internet to develop a definition of “communication” that reflects those realities. That is, we aim to provide effective tools by which prosecutors can address wrongful conduct without punishing innocuous behavior or chilling speech. We conclude by proposing a model statute that appropriately defines “communication.” We recommend that state legislatures adopt the statute or modify existing laws to match it in pertinent part and demonstrate how the statute would apply in a range of situations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over the last few years governments, law enforcement agencies, and the media have noted increases of online harassment. Although there has been a great deal of research into 'offline stalking', at this moment in time there has been no formal research that attempts to classify cyberstalkers. This study aimed to identify a classification of cyberstalkers by interviewing victims. Twenty-four participants were interviewed and their responses logged on a 76-item Cyberstalking Incident Checklist. A typology of cyberstalkers was developed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Although much has been learnt about the psychological and physical harm caused to victims of stalking and cyberstalking, relatively little is known about the impact of stalking on social behaviour and relationships. This paper argues that victims of stalking sometimes go on to employ stalking behaviours against others. Although often arising from an instinctive need for self-protection, such reactive stalking can be defensive or offensive in nature. Those who engage in such behaviour may do so from a need to assert control over their lives, or from fear of further victimisation. In pursuing this argument, a case study is used to illustrate the behaviours described. The case study focuses on the experiences of three stalking victims and describes attempts to victimise the author during his research. The article also discusses some of the implications of reactive stalking for the criminal justice system and the way in which victims receive support.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Internet poses a number of threats to the safety of young people. Using numerous examples, this article discusses a wide range of such threats, including: cyberstalking; the 'grooming' of potential victims of sexual abuse; a new 'wish list' scene (where teenagers encourage contact with potential abusers); the creation and distribution of child pornography; and the emergence of services that create child pornography to order. It is suggested that the latter has provided individuals with the ability to inflict sexual abuse on young people from a distance, an act the authors have termed virtual sex tourism. The final section of the article suggests that paedophiles and pornographers have been quick to adopt new technology as a means of concealing their activities. The article concludes by warning of the danger of overestimating or underestimating the threats described.