000 03185nab a22003857a 4500
999 _c9238
_d9238
005 20250625151729.0
008 2513s2025 ||||| |||| 00| 0 eng d
040 _aAFVC
100 _aWeekes, Cassidy J.
_913970
245 _aCyberstalking perpetrators and their methods :
_cCassidy J. Weekes, Jennifer E. Storey and Afroditi Pina
_ba systematic literature review
260 _bSage,
_c2025
500 _aTrauma, Violence & Abuse, 2025, First published online, 24 April 2025
520 _aThe existing body of research on cyberstalking has identified the prevalent nature of this behavior, and the detrimental impact that cyberstalking has on victims and society. This systematic review aims to summarize literature on the perpetration of cyberstalking with two research questions: (a) Who are the perpetrators of cyberstalking? and (b) What are the methods of cyberstalking? Two literature databases (SCOPUS and Web of Science) were searched for empirical research or literature reviews examining cyberstalking perpetration and/or methods. Following screening, 80 articles were identified and rated as highly relevant based on their applicability to the research questions. Perpetrators of cyberstalking were found to lack social skills, have low self-control, have experienced physical abuse victimization, endorsed stalking-related attitudes, and have higher rates of Internet use. Perpetrators were motivated by trying to reconcile a relationship, exact revenge, seek a relationship, or establish control over the victim. The most commonly reported methods of cyberstalking were unwanted and repeated online contact through email, social media, or text message. Other methods of cyberstalking include accessing the victim’s accounts, tracking their GPS location, posing as the victim online, or contacting friends/family of the victim. The findings of this review highlight precursors to, and patterns of, cyberstalking perpetration, and future research is required to explore how existing “offline” stalking risk assessments and typologies can be applied to cases of cyberstalking, which would allow authorities to develop effective case management strategies. (Authors' abstract). Record #9238
650 _aDOMESTIC VIOLENCE
_9203
650 _aAROTAKENGA MĀTĀKŌRERO
_913587
650 _aHANGARAU MŌHIOHIO
_98779
650 _aINTIMATE PARTNER VIOLENCE
_9431
650 _aONLINE HARASSMENT
_95989
650 _aPAE PĀPĀHO PĀPORI
_96079
650 _aPERPETRATORS
_92644
650 _aSOCIAL MEDIA
_93663
650 _aSTALKING
_93265
650 _aSYSTEMATIC REVIEWS
_93140
650 _aTANGATA HARA
_96912
650 _aTECHNOLOGY-FACILITATED ABUSE
_99831
650 _aTŪKINOTANGA Ā-WHĀNAU
_95382
651 _aINTERNATIONAL
_93624
651 _aUNITED KINGDOM
_92604
700 _aStorey, Jennifer E.
_913044
710 _aPina, Afroditi
_913971
773 0 _tTrauma, Violence & Abuse, 2025, First published online, 24 April 2025
830 _aTrauma, Violence & Abuse
_94623
856 _uhttps://doi.org/10.1177/15248380251333411
_zdoi: 10.1177/15248380251333411 (Open access)
942 _2ddc
_cARTICLE
_hnews134