438 research outputs found

    Eliciting Societal Values About Cyberstalking Policy Decisions

    Get PDF
    Cyberstalking is a significant challenge in the era of Internet and technology. When dealing with cyberstalking, institutions and governments alike have a problem in how to manage it and where to allocate resources. Hence, it is important to understand how individuals feel about the problem of cyberstalking so it can be managed in the context of cybersecurity. To do this the problem question is twofold: First, what objectives are important based on the values of the general public with regard to the prevention of cyberstalking. Second, what are the possible scenarios for the implementation of these objectives that organizations, governments and society at large can look to that will guide their decision making process. In this paper we utilize Keeney’s (1990) public value forum to elicit public values which can form the basis for the decision making process in preventing cyberstalking so institutions and governments can allocate resources prudently

    A systematic literature review on cyberstalking. An analysis of past achievements and future promises

    Get PDF
    Individuals’ excessive use of technology-enabled communication platforms, such as social media, has led to scholarly recognition of rising incidences of cyberstalking. Despite considerable studies directed at its examination, the current research on cyberstalking is limited by a lack of clarity on its characterization and prevalence, coupled with a fragmented research focus. To address this limitation, a Systematic Literature Review (SLR) on cyberstalking has been undertaken. Rigorous protocols were applied to identify 49 empirical studies via Scopus and Web of Science, based on specific keywords and article selection criteria. Findings reveal four emergent research themes on characteristics and roles of cyberstalkers, victims, parents, social media, and online service providers, as well as reporting, coping, and prevention strategies discussed in prior studies. Findings imply the need for temporal and cross-cultural validation of measurement scales and prior results by developing sophisticated, theoretically-grounded frameworks. Based on study findings, a research framework is proposed to assist researchers in future examinations of under-investigated associations and constructs. Implications arise for studying potential pre-emptive factors to address cyberstalking at a societal level by disseminating appropriate information to the general public. There is a need to develop stringent legislation and to induce service providers' active participation to prevent cyberstalking.publishedVersio

    Monitoring Employee E-Mail: Efficient Workplaces vs. Employee Privacy

    Get PDF
    Employer monitoring of electronic mail constitutes an emerging area of the law that is clearly unsettled at this point in time. This iBrief demonstrates that the privacy rights of non public-sector employees are relatively unprotected by the federal and state constitutions, broad judicial interpretations of enacted privacy legislation favor legitimate employer-monitoring practices, and many of the elements of common law claims are difficult for employees to prove

    Technology-facilitated intimate partner violence in Italy: the role of education in preventing abusive behaviours in intimate relationships

    Get PDF
    openThis thesis develops around the phenomenon of technology-facilitated intimate partner violence, by offering a theoretical, conceptual, and contextual framework to better understand its prevalence, impact, causes, and consequences, with a specific focus on Italy. Technology-facilitated intimate partner violence (TFIPV) is a specific form of intimate partner violence perpetrated within the context of dating or an intimate relationship by current or former partners through the use of ICT means. Although TFIPV research has been increasing and developing in recent years, not much is known about the scope and magnitude of this issue, especially due to its nature that transcends temporal and geographical boundaries. After a general introduction and analysis of the phenomenon, firstly by placing it within the broader framework of online GBV, the second part of this research will focus specifically on the Italian national context. A literature review of some already existing Italian studies will be presented, to show the state-of-art of research on the issue. Finally, the third part will reflect on the role of education in preventing TFIPV, particularly by presenting some prevention programs, as well as a number of interviews with experts in the field, to stress the need to educate people, especially young people, on what constitutes a healthy and respectful relationship and what betrays a dysfunctional, problematic and toxic one.This thesis develops around the phenomenon of technology-facilitated intimate partner violence, by offering a theoretical, conceptual, and contextual framework to better understand its prevalence, impact, causes, and consequences, with a specific focus on Italy. Technology-facilitated intimate partner violence (TFIPV) is a specific form of intimate partner violence perpetrated within the context of dating or an intimate relationship by current or former partners through the use of ICT means. Although TFIPV research has been increasing and developing in recent years, not much is known about the scope and magnitude of this issue, especially due to its nature that transcends temporal and geographical boundaries. After a general introduction and analysis of the phenomenon, firstly by placing it within the broader framework of online GBV, the second part of this research will focus specifically on the Italian national context. A literature review of some already existing Italian studies will be presented, to show the state-of-art of research on the issue. Finally, the third part will reflect on the role of education in preventing TFIPV, particularly by presenting some prevention programs, as well as a number of interviews with experts in the field, to stress the need to educate people, especially young people, on what constitutes a healthy and respectful relationship and what betrays a dysfunctional, problematic and toxic one

    Threading the First Amendment Needle: Anonymous Speech, Online Harassment, and Washington\u27s Cyberstalking Statute

    Get PDF
    This Comment examines the constitutionality of Washington’s cyberstalking statute, RCW 9.61.260, and its treatment of anonymous online speech. While the statute was drafted to ensure that women are free from domestic and gender-based violence, the statute as currently written and enforced infringes on the constitutionally protected right to free speech. There has only been one action, Moriwaki v. Rynearson, enforcing the provision of the statute related to anonymous speech. The court ultimately overturned the stalking protection order, which the plaintiff brought to halt political speech, on First Amendment grounds. While the Moriwaki court concluded that the stalking protection order there was an unconstitutional application of the law, RCW 9.61.260 is likely facially invalid under the First Amendment and incapable of withstanding strict scrutiny analysis. Faced with these issues, Washington has several options. Washington courts could narrowly construct RCW 9.61.260(1)(b). In so doing, courts could differentiate between anonymous speech that is ordinarily protected by the First Amendment and speech that is unprotected. The courts could also overturn the entire statute as unconstitutional on First Amendment grounds. This Comment argues that the legislature should return to the drawing board and redraft RCW 9.61.260 so that it can pass muster under the First Amendment. This Comment also proposes model legislation on which the Washington legislature could base a new law. Regardless of what Washington decides to do, the importance of preventing violence against women and preserving free speech online are too great to sacrifice to sloppy legislative drafting

    A qualitative enquiry into the threshold of acceptable behaviour on the internet: perceptions of police officers and prosecutors on the barriers to successful investigation and prosecution of cyberstalkers

    Get PDF
    Cyberstalking is a cyber-enabled crime which can be difficult to investigate and prosecute because offenders engage in the conduct in cyber space. The purpose of this study is to highlight the difficulties which police officers and prosecutors perceive hinder them in the investigation and prosecution of cyberstalkers. The study identifies solutions to the perceived difficulties and makes recommendations. The research participants consisted of 50 London prosecutors and 25 police officers. Participants provided data on the topic under investigation in their roles as the primary law enforcement officials who investigate and prosecute cyberstalkers. A Member of Parliament, probation official and Northern Ireland government policy adviser were also interviewed because they provided data from the perspectives of government and probation officials. The qualitative research method of Interpretative Phenomenological Analysis was considered most appropriate because the study investigated the lived human experiences of the participants and their perceptions of the topic under investigation. Emergent themes were identified from the numerous interview transcripts and analysed to explore the experiences of the participants in relation to the research questions. The research identified various perceived thresholds for distinguishing rudeness, abuse and unpleasant comments on the internet from cyberstalking. Additionally, the study 6 perceived law enforcement issues which frustrate police officers and prosecutors in the investigation and prosecution of cyberstalkers were identified. The research further revealed that lack of resources, lack of knowledge and evidential difficulties are perceived to impede the investigation and prosecution of cyberstalkers. Importantly, the study found that factors such as shortage of manpower, heavy caseloads, anonymity of cyberstalkers and victim behaviour can prevent police officers from risk assessing victims. The thesis therefore makes recommendations for the recruitment of additional staff, the regular training of police officers and prosecutors on cyberstalking and the education of victims by police officers of the risks posed by cyberstalkers and the implications of not supporting the prosecution of offenders. Importantly, the thesis recommends that police officers should be trained on how to identify, monitor and manage the risks posed by anonymous and mentally ill cyberstalkers. The recommendation for the CPS is based on the researcher’s personal view of the research. The researcher concedes that the research was conducted at a specific time and that a limited number of prosecutors were interviewed for the research. The researcher acknowledges that there has been a lot of training of prosecutors by both the prosecution college and the central training team subsequent to the conclusion of this research. The researcher also recognises that the department is in the process of actively recruiting more prosecutors

    Online content moderation and the challenge of conceptualizing cyberbullying

    Get PDF
    Cyberbullying has become a serious threat to the safety of online social communities. With the increasing growth of cyberbullying incidents, online communities rely on content moderation systems to mitigate this problem. Despite the important role of human moderators to maintain the online interactions healthy, there is a notable absence of research investigating cyberbullying within this profession. To address this gap, this study aims to comprehend moderators’ understanding of cyberbullying in order to develop better and more effective intervention strategies. Using a focus group method, we explored moderators’ opinions about the definitions given to cyberbullying in the scientific literature. The findings of this study highlight the importance of a message’s context to detect cyberbullying rather than only considering its content. Additionally, this study indicates the role of online space factors that facilitate the occurrence of cyberbullying and the importance of clear guidelines to combat cyberbullying
    • …
    corecore