MARC details
000 -LEADER |
fixed length control field |
03185nab a22003857a 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250625151729.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
2513s2025 ||||| |||| 00| 0 eng d |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
AFVC |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Weekes, Cassidy J. |
9 (RLIN) |
13970 |
245 ## - TITLE STATEMENT |
Title |
Cyberstalking perpetrators and their methods : |
Statement of responsibility, etc |
Cassidy J. Weekes, Jennifer E. Storey and Afroditi Pina |
Remainder of title |
a systematic literature review |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Name of publisher, distributor, etc |
Sage, |
Date of publication, distribution, etc |
2025 |
500 ## - GENERAL NOTE |
General note |
Trauma, Violence & Abuse, 2025, First published online, 24 April 2025 |
520 ## - SUMMARY, ETC. |
Summary, etc |
The existing body of research on cyberstalking has identified the prevalent nature of this behavior, and the detrimental impact that cyberstalking has on victims and society. This systematic review aims to summarize literature on the perpetration of cyberstalking with two research questions: (a) Who are the perpetrators of cyberstalking? and (b) What are the methods of cyberstalking? Two literature databases (SCOPUS and Web of Science) were searched for empirical research or literature reviews examining cyberstalking perpetration and/or methods. Following screening, 80 articles were identified and rated as highly relevant based on their applicability to the research questions. Perpetrators of cyberstalking were found to lack social skills, have low self-control, have experienced physical abuse victimization, endorsed stalking-related attitudes, and have higher rates of Internet use. Perpetrators were motivated by trying to reconcile a relationship, exact revenge, seek a relationship, or establish control over the victim. The most commonly reported methods of cyberstalking were unwanted and repeated online contact through email, social media, or text message. Other methods of cyberstalking include accessing the victim’s accounts, tracking their GPS location, posing as the victim online, or contacting friends/family of the victim. The findings of this review highlight precursors to, and patterns of, cyberstalking perpetration, and future research is required to explore how existing “offline” stalking risk assessments and typologies can be applied to cases of cyberstalking, which would allow authorities to develop effective case management strategies. (Authors' abstract). Record #9238 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
DOMESTIC VIOLENCE |
9 (RLIN) |
203 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
AROTAKENGA MĀTĀKŌRERO |
9 (RLIN) |
13587 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
HANGARAU MŌHIOHIO |
9 (RLIN) |
8779 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
INTIMATE PARTNER VIOLENCE |
9 (RLIN) |
431 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
ONLINE HARASSMENT |
9 (RLIN) |
5989 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
PAE PĀPĀHO PĀPORI |
9 (RLIN) |
6079 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
PERPETRATORS |
9 (RLIN) |
2644 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
SOCIAL MEDIA |
9 (RLIN) |
3663 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
STALKING |
9 (RLIN) |
3265 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
SYSTEMATIC REVIEWS |
9 (RLIN) |
3140 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
TANGATA HARA |
9 (RLIN) |
6912 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
TECHNOLOGY-FACILITATED ABUSE |
9 (RLIN) |
9831 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
TŪKINOTANGA Ā-WHĀNAU |
9 (RLIN) |
5382 |
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME |
Geographic name |
INTERNATIONAL |
9 (RLIN) |
3624 |
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME |
Geographic name |
UNITED KINGDOM |
9 (RLIN) |
2604 |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Storey, Jennifer E. |
9 (RLIN) |
13044 |
710 ## - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
Pina, Afroditi |
9 (RLIN) |
13971 |
773 0# - HOST ITEM ENTRY |
Title |
Trauma, Violence & Abuse, 2025, First published online, 24 April 2025 |
830 ## - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Trauma, Violence & Abuse |
9 (RLIN) |
4623 |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://doi.org/10.1177/15248380251333411">https://doi.org/10.1177/15248380251333411</a> |
Public note |
doi: 10.1177/15248380251333411 (Open access) |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Journal article |
Classification part |
news134 |