Cyberstalking in the UK: Analysis and Recommendations
نویسندگان
چکیده
The growth in the use of interconnected devices in the UK is well-documented. Society has embraced new technology allowing access to information, systems, and people; children are being described as digital natives and social networking, internet telephony, and accessing digital entertainment are a major part of their lives. However, whilst the ubiquitous nature of modern communication systems has brought many benefits, there exist a minority that uses the technology to harass others. This paper considers the phenomenon of Cyberstalking and presents an analysis of the problem and the responses provided on the first survey that addresses issue specifically. The paper discusses the nature of attacks, the victim-attacker relationship, the impact of the attacks and the actions taken to resolve the issue. The paper also considers both the legal and technological aspects and presents recommendations to help reduce the occurrence of Cyberstalking. DOI: 10.4018/jdst.2012100104 International Journal of Distributed Systems and Technologies, 3(4), 34-51, October-December 2012 35 Copyright © 2012, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. a report for the Australian Institute of Criminology entitled “Stalking: crime of the 90’s” (Goode, 1995). In the UK, efforts to address the growing problem resulted in the introduction of new stalking legislation in the form of the Protection from Harassment Act 1997 (PfHA, 1997). Though the act does not offer an exact definition of stalking or harassment, it “prohibits conduct that has a particular effect on the victim” (Petch, 2002). In the US, stalking is defined differently in each state, though again they each consider the fear a reasonable person might experience. Some states require that the course of conduct causes the victim actual fear, others only require that the behavior would cause a reasonable person to feel fear. There also exist states that require that the victim experience actual fear and also proof that a reasonable person would also feel fear. Definitions of Stalking Stalking, or harassment, is distinctive in law since the offending behaviour is said to occur only when the victim reports themselves to be distressed as a result of the behaviour of another whom they believe to be threatening. The “victim’s” perception of the offending behavior and its effects are therefore pivotal in providing criteria on which to make a charge. The Protection from Harassment Act states that “a person must not pursue a course of conduct which amounts to harassment of another, and which he knows or ought to know amounts to harassment of the other” (PfHA, 1997, Section 1). In parallel, the psychiatric literature has defined stalking as a course of conduct by which one person repeatedly inflicts on another unwanted intrusions to such an extent that the recipient fears for his or her safety (Mullen, Pathé, & Purcell, 2004). Repetition and persistence are also characteristics of this behavior. In an attempt to define when repeated intrusion becomes problematic behaviour, an accepted cut-off point for “normal /abnormal” contact is suggested by Pathé, Mullen, and Purcell’s (2000) criteria for persistence and repetition (over four weeks and /or more than 10 occasions). Due to the subjectivity of the legal definition this paper refers to research that has drawn on Pathé et al.’s (2000) definition as well as research where respondents are self-defined stalking victims. Technology and the Emergence of Cyberstalking The rapid rate of advancement of information and communications technology has resulted in a proliferation of faster, cheaper, smaller, interconnected devices: in the first quarter of 2011, ARM, the industry’s leading provider of 32-bit embedded microprocessors shipped over 1 billion chips, most of which went into mobile devices. The use of electronic communications has had wide appeal, and in August 2008 for example, Barack Obama announced by text message that Joseph Biden was to be his vice presidential running mate (Rosen et al., 2010). People of all ages are embracing communications technology: Lenhart et al. (2008) found that in 2007, “85% of teens ages 12-17 engage at least occasionally in some form of electronic personal communication, which includes text messaging, sending email or instant messages, or posting comments on social networking sites.” CTIA’s 2010 survey (CTIA, 2010) reports that in 2005 there were 1,495 billion minutes of talk across the networks, 81 billion text messages, and 1 billion MMS messages; in 2010 the figures were 2,241 billion, 2,052 billion and 57 billion respectively. This represented only a 50% growth in talk minutes compared to 2433% increase in text message and 5600% growth in MMS messages. In 2005 the ratio of minutes of talk to text messages was 18.46:1, in 2010 the ratio was 1.09:1. The growth in these new modes of communication has greatly advanced society in areas such as community, education, health and commerce. However, with these benefits there have also been drawbacks. The amount of electronic data and communication has given opportunity for areas of society to act unethically, immorally or even unlawfully. One area that has given 16 more pages are available in the full version of this document, which may be purchased using the "Add to Cart" button on the publisher's webpage: www.igi-global.com/article/cyberstalking-analysisrecommendations/70768
منابع مشابه
Perceptions of Cyberstalking Among College Students
This article contributes to a growing body of research investigating the phenomenon of cyberstalking. Participants consisted of 100 students from a state university and 656 students from a large private university. Data were gathered from students about responses to a cyberstalking scenario and their use and experiences with the Internet. Furthermore, an analysis and comparison of students who ...
متن کاملThe Sociological Study of Cyberstalking Victimization among University Students
Currently, Cyberstalking victimization is a problem all over the world which has been increasing in Iran as well. The present study, based on Routine Activities Theory, examines the causes of the Cyberstalking victimization among Mazandaran University students. The research method of the current study is survey using a questionnaire as a data collection tool. A total of 374 students of Mazandar...
متن کاملCyberstalking in a Large Sample of Social Network Users: Prevalence, Characteristics, and Impact Upon Victims
The aim of this study was to determine the prevalence of cyberstalking victimization, characteristics of victims and offenders, and the impact of cyberstalking on the victims' well-being and mental health. An online survey of 6,379 participants was carried out, involving users of the German social network StudiVZ. Subjective mental health status was assessed with the WHO-5 well-being index. The...
متن کاملMoving Towards Accountability for Reasonableness – A Systematic Exploration of the Features of Legitimate Healthcare Coverage Decision-Making Processes Using Rare Diseases and Regenerative Therapies as a Case Study
Background The accountability for reasonableness (A4R) framework defines 4 conditions for legitimate healthcare coverage decision processes: Relevance, Publicity, Appeals, and Enforcement. The aim of this study was to reflect on how the diverse features of decision-making processes can be aligned with A4R conditions to guide decisio...
متن کاملExploring 70 Years of the British National Health Service through Anniversary Documents
The British National Health Service (NHS) celebrates its 70th birthday on July 5, 2018. This article examines this anniversary through the lens of previous anniversaries. It examines seven documents close to each anniversary over a period of some 60 years, drawing on interpretive content analysis, based on the narrative dimensions of context (structure and finance); success or achievements; pro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJDST
دوره 3 شماره
صفحات -
تاریخ انتشار 2012