2015
DOI: 10.1016/j.diin.2015.04.001
|View full text |Cite
|
Sign up to set email alerts
|

An investigation of anonymous and spoof SMS resources used for the purposes of cyberstalking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 22 publications
0
2
0
1
Order By: Relevance
“…38 Pročitati više kod Hooijdonk (2015) na https://www.richardvanhooijdonk.com/en/future-airforces-big-data/ 39 Saopštenje dato na godišnjoj konferenciji kompanije Teradata koja je u 2015. realizovala projekat za američke vazdušne snage. Više detalja dostupno na http://www.intelligent-aerospace.com/articles/2016/09/u-s-airforce-harnesses-data-management-and-analytics-platforms-to-enhance-aircraft-mro.html Troškovi grejanja, električne energije u smeštajnim vojnim kapacitetima se smanjuju efikasnim nadgledanjem zasnovanim na Big Data upotrebi.…”
Section: Primena Big Data U Vojnom Sektoruunclassified
“…38 Pročitati više kod Hooijdonk (2015) na https://www.richardvanhooijdonk.com/en/future-airforces-big-data/ 39 Saopštenje dato na godišnjoj konferenciji kompanije Teradata koja je u 2015. realizovala projekat za američke vazdušne snage. Više detalja dostupno na http://www.intelligent-aerospace.com/articles/2016/09/u-s-airforce-harnesses-data-management-and-analytics-platforms-to-enhance-aircraft-mro.html Troškovi grejanja, električne energije u smeštajnim vojnim kapacitetima se smanjuju efikasnim nadgledanjem zasnovanim na Big Data upotrebi.…”
Section: Primena Big Data U Vojnom Sektoruunclassified
“…Similar to traditional persecution, cyberstalking can be performed both by a stranger and someone who has or had contact with the victim before (Horsman & Conniss, 2015 ). However, the virtual version of the stalking seems to become common among acquaintances, especially between romantic partners.…”
Section: Introductionmentioning
confidence: 99%
“…Researching the issue of cyberstalking the authors define it as anti-social behaviours, potentially with extreme consequences including indirect or direct physical injury, emotional distress and/or financial loss (al-Khateeb/Epiphaniou/Alhaboby et al 2017). Digital stalking offences frequently termed as acts of cyberstalking (Horsman/Conniss 2015). Such harassments may include the following actions: offensive e-mails sending, personal data theft, equipment or data damage.…”
Section: Introductionmentioning
confidence: 99%