2007
DOI: 10.1177/1077801207302045
|View full text |Cite
|
Sign up to set email alerts
|

Intimate Partner Violence, Technology, and Stalking

Abstract: This research note describes the use of a broad range of technologies in intimate partner stalking, including cordless and cellular telephones, fax machines, e-mail, Internet-based harassment, global positioning systems, spy ware, video cameras, and online databases. The concept of "stalking with technology" is reviewed, and the need for an expanded definition of cyberstalking is presented. Legal issues and advocacy-centered responses, including training, legal remedies, public policy issues, and technology in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

3
162
0
12

Year Published

2012
2012
2022
2022

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 204 publications
(177 citation statements)
references
References 12 publications
3
162
0
12
Order By: Relevance
“…While most states do not have cyberstalking statutes per se, cyberstalking can be and has been prosecuted under existing stalking and harassment statutes (Goodno, 2007;Fox et al, 2011b). In general, cyberstalking can be defined as repeated pursuit involving electronic or Internet-capable devices, such as mobile phones, laptop computers, or electronic tablets (Goodno, 2007;Parsons-Pollard & Moriarty, 2009;Reyns et al, 2012;Southworth, Finn, Dawson, Fraser, & Tucker, 2007;U. S. Attorney General, 1999).…”
Section: Legal and Conceptual Definitions Of Stalking And Cyberstalkingmentioning
confidence: 99%
“…While most states do not have cyberstalking statutes per se, cyberstalking can be and has been prosecuted under existing stalking and harassment statutes (Goodno, 2007;Fox et al, 2011b). In general, cyberstalking can be defined as repeated pursuit involving electronic or Internet-capable devices, such as mobile phones, laptop computers, or electronic tablets (Goodno, 2007;Parsons-Pollard & Moriarty, 2009;Reyns et al, 2012;Southworth, Finn, Dawson, Fraser, & Tucker, 2007;U. S. Attorney General, 1999).…”
Section: Legal and Conceptual Definitions Of Stalking And Cyberstalkingmentioning
confidence: 99%
“…At each step, the predictor with the largest statistic whose p-value was less than .05 was added to the model. [35][36][37][38][39][40] Neither GSE nor CSE differed significantly by victimization or perpetration status (Table 1 & 2). A trend was found in the correlation between victimization and CSE (r=-.262, p =.064).As CSE increased, victimization decreased.…”
Section: Methodsmentioning
confidence: 99%
“…Concerns about batterers' use of the Internet and wireless technologies to control and harass their partners were raised in 2002 by a long-established leader in innovative violence-related education, research, and Internet publishing 33 and expanded upon by others. 34 Unfortunately, the concerns remain largely unaddressed by agencies a decade later.…”
Section: Servicementioning
confidence: 99%