Results for ' cyberstalking'

11 found
Order:
  1.  44
    Tracking cyberstalkers: a cryptographic approach.Mike Burmester, Peter Henry & Leo S. Kermes - 2005 - Acm Sigcas Computers and Society 35 (3):2.
    Stalking is a pattern of behavior over time in which a stalker seeks to gain access to, or control over, an unwilling victim. Such actions range from the benign to the malicious and may cause emotional distress or harm to the victim. With the widespread adoption of new technologies, new forums of Internet-mediated discourse now exist which offer stalkers unprecedented scope to locate and exert influence over victims. Cyberstalking, the convergence of stalking and cyberspace, has created new challenges for (...)
    No categories
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  2. Cyberstalking, personal privacy, and moral responsibility.Herman T. Tavani & Frances S. Grodzinsky - 2002 - Ethics and Information Technology 4 (2):123-132.
    This essay examines some ethical aspects of stalkingincidents in cyberspace. Particular attention is focused on the Amy Boyer/Liam Youens case of cyberstalking, which has raised a number of controversial ethical questions. We limit our analysis to three issues involving this particular case. First, we suggest that the privacy of stalking victims is threatened because of the unrestricted access to on-linepersonal information, including on-line public records, currently available to stalkers. Second, we consider issues involving moral responsibility and legal liability for (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  3. Cyberstalking and internet pornography: Gender and the gaze. [REVIEW]Alison Adam - 2002 - Ethics and Information Technology 4 (2):133-142.
    This paper is based on the premise that the analysis of some cyberethics problems would benefit from a feminist treatment. It is argued that both cyberstalking and Internet child pornography are two such areas which have a `gendered' aspect which has rarely been explored in the literature. Against a wide ranging feminist literature of potential relevance, the paper explores a number of cases through a focused approach which weaves together feminist concepts of privacy and the gaze.
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  4.  43
    Some ethical reflections on cyberstalking.Frances S. Grodzinsky & Herman T. Tavani - 2002 - Acm Sigcas Computers and Society 32 (1):22-32.
    The present study examines a range of moral issues associated with recent cyberstalking cases. Particular attention is centered on the Amy Boyer/ Liam Youens case of cyberstalking, which raises a host of considerations that we believe have a significant impact for ethical behavior on the Internet. Among the questions we consider are those having to do with personal privacy and the use of certain kinds of Internet search facilities to stalk individuals in cyberspace. Also considered are questions having (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  5.  22
    Defining Objectives for Preventing Cyberstalking.Gurpreet Dhillon & Kane J. Smith - 2019 - Journal of Business Ethics 157 (1):137-158.
    Cyberstalking is a significant challenge in the era of Internet and technology. When dealing with cyberstalking, institutions and governments struggle in how to manage it and where to allocate resources. Therefore, it is important to understand how individuals feel about the problem of cyberstalking and how it can be managed. In this paper, we use Nissenbaum’s :119–158, 2004) contextual integrity as a theoretical framework for applying Keeney’s value-focused thinking technique to develop actionable objectives aimed at the prevention (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  6. The uniqueness debate in computer ethics: What exactly is at issue, and why does it matter? [REVIEW]Herman T. Tavani - 2002 - Ethics and Information Technology 4 (1):37-54.
    The purpose of this essay is to determinewhat exactly is meant by the claimcomputer ethics is unique, a position thatwill henceforth be referred to as the CEIUthesis. A brief sketch of the CEIU debate is provided,and an empirical case involving a recentincident of cyberstalking is briefly consideredin order to illustrate some controversialpoints of contention in that debate. To gain aclearer understanding of what exactly isasserted in the various claims about theuniqueness of computer ethics, and to avoidmany of the confusions (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   26 citations  
  7.  25
    Exploring the value of feminist theory in understanding digital crimes: Gender and cybercrime types.Suleman Lazarus, Mark Button & Richard Kapend - 2022 - Howard Journal of Crime and Justice 1 (1):1-18.
    Do men and women perceive cybercrime types differently? This article draws on the distinction between socio-economic and psychosocial cybercrime proposed by Lazarus (2019) to investigate whether men and women hold different perceptions of digital crimes across these two dimensions. Informed by the synergy between feminist theory and the Tripartite Cybercrime Framework (TCF), our survey examined respondents’ differential perceptions of socio-economic cybercrime (online fraud) and psychosocial cybercrime (cyberbullying, revenge porn, cyberstalking, online harassment) among men and women in the United Kingdom. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  8.  14
    ‘We Attempted to Deliver Your Package’: Forensic Translation in the Fight Against Cross-Border Cybercrime.Rui Sousa-Silva - forthcoming - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique:1-27.
    Cybercrime has increased significantly, recently, as a result of both individual and group criminal practice, and is now a threat to individuals, organisations, and democratic systems worldwide. However, cybercrime raises two main challenges for legal systems: firstly, because cybercriminals operate online, cybercrime spans beyond the boundaries of specific jurisdictions, which constrains the operation of the police and, subsequently, the conviction of the perpetrators; secondly, since cybercriminals can operate from anywhere in the world, law enforcement agencies struggle to identify the origin (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  11
    The Spread of Digital Intimate Partner Violence: Ethical Challenges for Business, Workplaces, Employers and Management.Jeff Hearn, Matthew Hall, Ruth Lewis & Charlotta Niemistö - 2023 - Journal of Business Ethics 187 (4):695-711.
    In recent decades, huge technological changes have opened up possibilities and potentials for new socio-technological forms of violence, violation and abuse, themselves intersectionally gendered, that form part of and extend offline intimate partner violence (IPV). Digital IPV (DIPV)—the use of digital technologies in and for IPV—takes many forms, including: cyberstalking, internet-based abuse, non-consensual intimate imagery, and reputation abuse. IPV is thus now in part digital, and digital and non-digital violence may merge and reinforce each other. At the same time, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  10.  10
    Defining Online Hating and Online Haters.W. P. Malecki, Marta Kowal, Małgorzata Dobrowolska & Piotr Sorokowski - 2021 - Frontiers in Psychology 12.
    According to a view widely held in the media and in public discourse more generally, online hating is a social problem on a global scale. However, thus far there has been little scientific literature on the subject, and, to our best knowledge, there is even no established scholarly definition of online hating and online haters in the first place. The purpose of this manuscript is to provide a new perspective on online hating by, first, distinguishing online hating from the phenomena (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  6
    Crossing the Line: Online Violence.Wanda Teays - 2019 - In Analyzing Violence Against Women. Springer. pp. 225-237.
    The Internet has a dark side that disproportionately affects women. In this chapter I will look at three forms of online abuse: Posting non-consensual nude photographs or videos, Cyberstalking, and Doxing—publishing private information that could lead to identity theft. The result can be loss of jobs, electronic surveillance, threatened rape or murder, scare tactics and being targeted for unwanted attention. I discuss the sorts of problems—and harms—of each of these and note some of the steps that have been taken (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark