Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Cyberstalking

Encyclopedia of Information Science and Technology, Fourth Edition
Repetitive and personally invasive surveillance and monitoring of a target or victim, often with unsettling forms of unwanted contact. Cyberstalking is often associated with adult behaviors more than those of children or young adults ( Kamali, 2015 ).
Published in Chapter:
Cyber Bullying
Jo Ann Oravec (University of Wisconsin – Whitewater, USA)
DOI: 10.4018/978-1-5225-2255-3.ch148
Abstract
“Cyberbullying” comprises a wide spectrum of behaviors that have negative and often devastating impacts upon their targets (or “victims”). This article is intended to analyze research trends on cyberbullying as well as related concerns involving online harassment, online reputational damage, and cyberstalking. Its focuses are as follows: (1) analyze the conceptual work and research that have emerged on the technological and social aspects of the issues, with an emphasis on social media scenarios; (2) present insights as to how cyberbullying and reputational damage can best be mitigated, given current mental health insights and technological know-how; and (3) discuss why cyberbullying is of continuing importance to business, government, non-profit, and educational audiences. The article includes reflections about the moral and personal dimensions of cyberbullying. Cyberbullies can often combine anonymous interactions with personally-identifiable ones to make it appear that more than one individual is participating, potentially intensifying the negative social impacts involved.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Cyberstalking: The New Threat on the Internet
A obsessive persecution or harassment of another person using IKT.
Full Text Chapter Download: US $37.50 Add to Cart
Cyberbullying Issues
Harassment that include threats of harm or is highly intimidating.
Full Text Chapter Download: US $37.50 Add to Cart
An Exploration of Intrusive Mobile Phone Behavior
Persistent threatening behavior or unwanted intrusions directed at another using the internet and other forms of computer communications conducted to such an extent that the recipient fears for his or her safety.
Full Text Chapter Download: US $37.50 Add to Cart
Mobile Technology and Cyberbullying
Cyberstalking is one type of cyberbullying, where cyberbullies menace victims via threatening communications using digital tools. It “consists of threats of harm, intimidation, and/or offensive comments sent through personal communication channels”. Frequently, cyberstalking “entails a threat, or at least a belief, that the virtual stalking could become real stalking” ( Bamford, 2004 , as cited in Sabella, 2009 , p. 5).
Full Text Chapter Download: US $37.50 Add to Cart
Explicit Content: An Investigation of Online Sexual Harassment
Repeated unwanted, either known or unknown, communication with or following of an individual through computer-mediated channels such as monitoring location or more directly through continuous unsolicited messages.
Full Text Chapter Download: US $37.50 Add to Cart
International Cooperation and Legal Response to Cybercrime in Pakistan
The use of information and communication technology to frighten or harass an individual or group.
Full Text Chapter Download: US $37.50 Add to Cart
Welcome to Academia, Expect Cyberbullying: Contrapower and Incivility in Higher Education
The use of electronic forms of communication to stalk an individual with threatening or malicious behaviors that communicate a credible threat of physical harm.
Full Text Chapter Download: US $37.50 Add to Cart
Psychosocial Aspects of Cybercrime Victimization in Pakistan
The use of Information and Communication Technology to frighten or harass an individual or group.
Full Text Chapter Download: US $37.50 Add to Cart
Answering the New Realities of Stalking
Abusive behaviour or repetitive harassment without the victims consent, using any tools that the Internet provides us as can be email, chat, texts, whatsapp, social networks like facebook or twitter, web pages, etc.
Full Text Chapter Download: US $37.50 Add to Cart
Workplace Cyberbullying and Its Impact on Productivity
This mode of cyberbullying is done by the perpetrator to threaten the victims physically to harm the victim, which at times can be done to a child also, and the act includes monitoring, false accusations, threats, including offline stalking.
Full Text Chapter Download: US $37.50 Add to Cart
Cyberbullying in the Workplace
A form of harassment where the cyberbully makes continuous threats and sends inappropriate messages to an individual in the form of text messages, instant messaging, social media, emails.
Full Text Chapter Download: US $37.50 Add to Cart
The Vulnerability of Children in Cyberspace
This kind of cybercrime involves online harassment where the user is subjected to a plethora of online messages and emails. Typically, cyberstalkers use social media, websites, and search engines to intimidate a user and instill fear. Usually, the cyberstalker knows their victim and makes the person feel afraid or concerned for their safety.
Full Text Chapter Download: US $37.50 Add to Cart
Conceptualizing Causative Factors of Workplace Cyberbullying on Working Women
Kind of bullying that happens when any form of bullying or harassing with the use of electronic communication and it is used for threatening a victim.
Full Text Chapter Download: US $37.50 Add to Cart
The Rise of Cyberstalking
Cyberstalking occurs when an individual(s) becomes obsessively fixated with another and pursues them through a course of action that involves more than one incident perpetrated through or utilising electronic means that cause distress or fear.
Full Text Chapter Download: US $37.50 Add to Cart
Leave Me Alone!: Sexual Bullying at Work
A form of harassment where the cyberbully makes continuous threats and sends inappropriate messages to an individual in the form of text messages, instant messaging, social media, emails.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR