Cyberstalking perpetrators and their methods : (Record no. 9238)

MARC details
000 -LEADER
fixed length control field 03185nab a22003857a 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250625151729.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 2513s2025 ||||| |||| 00| 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency AFVC
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Weekes, Cassidy J.
9 (RLIN) 13970
245 ## - TITLE STATEMENT
Title Cyberstalking perpetrators and their methods :
Statement of responsibility, etc Cassidy J. Weekes, Jennifer E. Storey and Afroditi Pina
Remainder of title a systematic literature review
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc Sage,
Date of publication, distribution, etc 2025
500 ## - GENERAL NOTE
General note Trauma, Violence & Abuse, 2025, First published online, 24 April 2025
520 ## - SUMMARY, ETC.
Summary, etc The existing body of research on cyberstalking has identified the prevalent nature of this behavior, and the detrimental impact that cyberstalking has on victims and society. This systematic review aims to summarize literature on the perpetration of cyberstalking with two research questions: (a) Who are the perpetrators of cyberstalking? and (b) What are the methods of cyberstalking? Two literature databases (SCOPUS and Web of Science) were searched for empirical research or literature reviews examining cyberstalking perpetration and/or methods. Following screening, 80 articles were identified and rated as highly relevant based on their applicability to the research questions. Perpetrators of cyberstalking were found to lack social skills, have low self-control, have experienced physical abuse victimization, endorsed stalking-related attitudes, and have higher rates of Internet use. Perpetrators were motivated by trying to reconcile a relationship, exact revenge, seek a relationship, or establish control over the victim. The most commonly reported methods of cyberstalking were unwanted and repeated online contact through email, social media, or text message. Other methods of cyberstalking include accessing the victim’s accounts, tracking their GPS location, posing as the victim online, or contacting friends/family of the victim. The findings of this review highlight precursors to, and patterns of, cyberstalking perpetration, and future research is required to explore how existing “offline” stalking risk assessments and typologies can be applied to cases of cyberstalking, which would allow authorities to develop effective case management strategies. (Authors' abstract). Record #9238
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element DOMESTIC VIOLENCE
9 (RLIN) 203
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element AROTAKENGA MĀTĀKŌRERO
9 (RLIN) 13587
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element HANGARAU MŌHIOHIO
9 (RLIN) 8779
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element INTIMATE PARTNER VIOLENCE
9 (RLIN) 431
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element ONLINE HARASSMENT
9 (RLIN) 5989
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element PAE PĀPĀHO PĀPORI
9 (RLIN) 6079
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element PERPETRATORS
9 (RLIN) 2644
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element SOCIAL MEDIA
9 (RLIN) 3663
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element STALKING
9 (RLIN) 3265
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element SYSTEMATIC REVIEWS
9 (RLIN) 3140
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element TANGATA HARA
9 (RLIN) 6912
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element TECHNOLOGY-FACILITATED ABUSE
9 (RLIN) 9831
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element TŪKINOTANGA Ā-WHĀNAU
9 (RLIN) 5382
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME
Geographic name INTERNATIONAL
9 (RLIN) 3624
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME
Geographic name UNITED KINGDOM
9 (RLIN) 2604
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Storey, Jennifer E.
9 (RLIN) 13044
710 ## - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element Pina, Afroditi
9 (RLIN) 13971
773 0# - HOST ITEM ENTRY
Title Trauma, Violence & Abuse, 2025, First published online, 24 April 2025
830 ## - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Trauma, Violence & Abuse
9 (RLIN) 4623
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1177/15248380251333411">https://doi.org/10.1177/15248380251333411</a>
Public note doi: 10.1177/15248380251333411 (Open access)
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Journal article
Classification part news134
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Vine library Vine library 13/05/2025   Online ON25050020 13/05/2025 13/05/2025 Access online