Weekes et al., 2025 - Google Patents
Cyberstalking perpetrators and their methods: a systematic literature reviewWeekes et al., 2025
View PDF- Document ID
- 9406972184452836386
- Author
- Weekes C
- Storey J
- Pina A
- Publication year
- Publication venue
- Trauma, Violence, & Abuse
External Links
Snippet
The existing body of research on cyberstalking has identified the prevalent nature of this behavior, and the detrimental impact that cyberstalking has on victims and society. This systematic review aims to summarize literature on the perpetration of cyberstalking with two …
- 238000000034 method 0 title abstract description 71
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/01—Customer relationship, e.g. warranty
- G06Q30/018—Business or product certification or verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Graham et al. | Willingness to report crime to the police: Traditional crime, cybercrime, and procedural justice | |
| Cavezza et al. | Cyberstalking versus off-line stalking in a forensic sample | |
| Nyoni et al. | Privacy and user awareness on Facebook | |
| US11134097B2 (en) | Automated social account removal | |
| Bernal | Data gathering, surveillance and human rights: recasting the debate | |
| US9336388B2 (en) | Method and system for thwarting insider attacks through informational network analysis | |
| US8490197B2 (en) | Sdi-scam | |
| Hand et al. | The use of information and communication technologies to coerce and control in domestic violence and following separation | |
| Nurse et al. | Smart insiders: exploring the threat from insiders using the internet-of-things | |
| Whitty | Developing a conceptual model for insider threat | |
| Weekes et al. | Cyberstalking perpetrators and their methods: a systematic literature review | |
| Steinmetz | The identification of a model victim for social engineering: a qualitative analysis | |
| Brunton-Smith et al. | Explaining young people’s involvement in online piracy: An empirical assessment using the offending crime and justice survey in England and Wales | |
| Brown et al. | “Can I just share my story?” Experiences of technology-facilitated abuse among Aboriginal and Torres Strait Islander women in regional and remote Australia | |
| Sawyers | For geofences: An originalist approach to the Fourth Amendment | |
| US10868824B2 (en) | Organizational social threat reporting | |
| Reynald | Guardianship and informal social control | |
| Vakhitova | Cyber-Routine Activity Theory | |
| Pina et al. | Technology-Facilitated Intimate Partner Violence: A multidisciplinary examination of prevalence, methods used by perpetrators and the impact of COVID-19 | |
| Lee et al. | The internet and intimate partner violence: technology changes, abuse doesn't | |
| Phillips et al. | Terrorism watch lists, suspect ranking and decision-making biases | |
| Moses et al. | Technology-facilitated domestic and family violence: Protecting the privacy and safety of victim-survivors | |
| Vallejo et al. | Kids and parents privacy exposure in the internet of things: How to protect personal information? | |
| Pina | Cyberstalking Perpetrators and Their Methods: A Systematic Literature | |
| Ayiku | Comparative Analysis: The increase in phishing activities |