CFP last date
20 December 2024
Reseach Article

Online Harassment and Digital Stalking

by Thaier Hamid, Carsten Maple
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 76 - Number 12
Year of Publication: 2013
Authors: Thaier Hamid, Carsten Maple
10.5120/13296-8928

Thaier Hamid, Carsten Maple . Online Harassment and Digital Stalking. International Journal of Computer Applications. 76, 12 ( August 2013), 1-6. DOI=10.5120/13296-8928

@article{ 10.5120/13296-8928,
author = { Thaier Hamid, Carsten Maple },
title = { Online Harassment and Digital Stalking },
journal = { International Journal of Computer Applications },
issue_date = { August 2013 },
volume = { 76 },
number = { 12 },
month = { August },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume76/number12/13296-8928/ },
doi = { 10.5120/13296-8928 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:45:41.056809+05:30
%A Thaier Hamid
%A Carsten Maple
%T Online Harassment and Digital Stalking
%J International Journal of Computer Applications
%@ 0975-8887
%V 76
%N 12
%P 1-6
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cyberstalking is generally considered to be harassment that originates online; however it is also recognised that other forms of pre-existing stalking can transfer into online environments. Cellular phones are now owned by the vast majority of adults (91% in 2010/2011) in the United Kingdom. It is believed that this number will approach, and probably reach, 95% within the near future. The World Wide Web and Internet are great places to study, work or even play, but there is an unpleasant side to cyberspace. Cyberspace reflects the real world and some people tend not to remember that. Cyberstalking and harassment affect a large number of people (especially women). It should not be assumed that just because an individual owns the technology and has an Internet account that person is ethical. There are just as many stalkers in cyberspace as anywhere else; it is just that their methods have changed. In some cases, this harassment may become an organised operation, where stalkers attack with intimidating messages of hate and indecencies. In this paper we study the different aspects of the technologies used in stalking and some methodologies to reduce the impact in relation to our own safety and security.

References
  1. Belsey, B. (2005). Cyberbullying: An emerging threat to the "always on" generation. Retrieved January 16, 2007 from http://www. cyberbullying. ca/pdf/feature_dec2005. pdf E. W. Dijkstra. A Discipline of Programming. Prentice Hall, Upper Saddle River, NJ, USA, 1976.
  2. Stern, Susannah R. 2004. "Studying Adolescents Online: A Consideration of Ethical Issues. " Pp. 274-287 in Readings in Virtual Research Ethics: Issues and Controversies, edited by Elizabeth A. Buchanan. Hershey, PA: Information Science. B. Schneier. Attack trees: Modelling security threats. Dr. Dobb's Journal, December 1999.
  3. 2011 Cyberstalking Statistics, 1997-2012 WHOA from http://www. haltabuse. org/about/about. shtml visited on 05/12/2012.
  4. Federal Bureau of Investigation, "Crime in the United States, 2010," (Washington, DC: GPO, 2011), Table 1, http://www. fbi. gov/about-us/cjis/ucr/crime-in-the-u. s/2010/crime-in-the-u. s. -2010/tables/10tbl01. xls (accessed 05/12/2012).
  5. Y. Zhao, "Mobile Phone Location Determination and Its Impact on Intelligent Transportation Systems," IEEE Transactions on Intelligent Transportation Systems, vol. 1, no. 1, pp. 55-64, Mar. 2000.
  6. "Facebook, 1 billion active people fact sheet". https://s3. amazonaws. com/OneBillionFB/Facebook+1+Billion+Stats. docx. Retrieved 05/12/2012.
  7. Japan Electronics and Information Technology Industries Association, Exchangeable image file format for digital still cameras: Exif Version 2. 2, 2002.
  8. November 20, 2012. Olanoff, Drew. "Foursquare Adds "Recently Opened" Feature To Its Explore Section For iOS, To Promote New Businesses. " http://techcrunch. com/2012/11/20/foursquare-adds-recently-opened-section-to-its-ios-app-to-promote-new-businesses/.
  9. Please Rob me website, raising awareness about over-sharing, http://pleaserobme. com/ (accessed 06/12/2012).
  10. http://www. cps. gov. uk/legal/s_to_u/stalking_and_harassment/ Visited on 13/06/13.
Index Terms

Computer Science
Information Sciences

Keywords

Cyberstalking Technology Internet Social Network Facebook.