Please use this identifier to cite or link to this item: https://anrows.intersearch.com.au/anrowsjspui/handle/1/12105
Record ID: 8a8cd22d-ace6-4c57-af34-81e17a6c9203
Full metadata record
DC FieldValueLanguage
dc.contributor.authorOgilvie, Emmaen
dc.date.accessioned2022-06-30T22:57:40Z-
dc.date.available2022-06-30T22:57:40Z-
dc.date.issued2000en
dc.identifier.citationNo. 166en
dc.identifier.isbn9780642241818en
dc.identifier.urihttps://anrows.intersearch.com.au/anrowsjspui/handle/1/12105-
dc.format6pen
dc.languageenen
dc.publisherAustralian Institute of Criminologyen
dc.subjectStalkingen
dc.subjectCyberstalking and digital technologyen
dc.titleCyberstalkingTrends and issues in crime and criminal justiceen
dc.typeJournal Articleen
dc.identifier.catalogid5543en
dc.identifier.urlhttp://www.aic.gov.au/documents/4/7/A/%7B47A7FA60-8EBF-498A-BB9E-D61BC512C053%7Dti166.pdfen
dc.subject.keywordNationalen
dc.subject.keywordnew_recorden
dc.subject.keywordElectronic publicationen
dc.subject.keywordJournal article/research paperen
dc.subject.keywordInvalid URLen
dc.relation.urlhttp://www.aic.gov.au/publications/current%20series/tandi/161-180/tandi166.aspxen
dc.description.notesCyberstalking is similar to ordinary stalking since it incorporates behaviours that instil apprehension and fear. However new forms have developed since the advent of the Internet e.g. email, Web and computer stalking. Email may include sending viruses and spamming if sent repeatedly and in a way intended to intimidate. Internet stalking includes posting false information on chat sites and distributing pornographic pictures on the Net with personal details. This is the most likely form to spill over into physical space because contact details are often posted on the Net. The last form is computer stalking whereby the stalker exploits the workings of the Internet and Windows operating system to take control of the computer of the target victim. This can occur whenever the target victim is on the Internet. The authors suggest three primary ways to counter cyberstalking: personal i.e. don’t provide personal details to strangers; technical fixes: e.g. filter programs that block unwanted messages and technological patches on your computer to prevent someone taking control; and legislative responses which is in a way the most difficult since existing legislation probably covers most of Australia except for NSW and WA which have very narrow definitions. There are also jurisdictional problems since Internet crime can be committed anywhere in the world. It is similar to ordinary stalking, however the Internet can magnify, distort and ignore attributes of the real world.en
dc.date.entered2006-08-22en
dc.publisher.placeCanberraen
dc.description.physicaldescription6 p.en
Appears in Collections:Journal Articles

Files in This Item:
There are no files associated with this item.


Items in ANROWS library are protected by copyright, with all rights reserved, unless otherwise indicated.

Google Media

Google ScholarTM

Who's citing