Image from Coce

Cyberstalking : harassment in the Internet age and how to protect your family / Paul Bocij.

By: Material type: TextTextPublisher: Westport, Conn. : Praeger, 2004Description: xiv, 268 pages ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 0275981185
  • 9780275981181
Subject(s): DDC classification:
  • 613.66 22
LOC classification:
  • HV6773 .B63 2004
Contents:
1. What is cyberstalking? -- 2. Stalking or cyberstalking? -- 3. The incidence and prevalance of cyberstalking -- 4. Who are the cyberstalkers? -- 5. Who are the victims of cyberstalkers? -- 6. What motivates cyberstalkers? -- 7. Threats to young people -- 8. Cyberstalking and organizations -- 9. Cyberstalking and the law -- 10. Dealing with cyberstalking.
Review: "Cyberstalking is an entirely new form of deviant behavior that uses technology to harass others in a variety of ways. Although cyberstalking usually involves one person pursuing another, this is not always the case. As the behavior has evolved, it has come to include such acts as stock market fraud, identity theft, sexual harassment, data theft, impersonation, consumer fraud, computer monitoring, and attacks by political groups on government agencies. Bocij carefully delineates the boundaries of cyberstalking, providing real-life examples, guidance for avoiding the pitfalls, and suggestions for what to do if you fall victim."--BOOK JACKET.
Tags from this library: No tags from this library for this title. Log in to add tags.

Includes bibliographical references (pages 243-262) and index.

1. What is cyberstalking? -- 2. Stalking or cyberstalking? -- 3. The incidence and prevalance of cyberstalking -- 4. Who are the cyberstalkers? -- 5. Who are the victims of cyberstalkers? -- 6. What motivates cyberstalkers? -- 7. Threats to young people -- 8. Cyberstalking and organizations -- 9. Cyberstalking and the law -- 10. Dealing with cyberstalking.

"Cyberstalking is an entirely new form of deviant behavior that uses technology to harass others in a variety of ways. Although cyberstalking usually involves one person pursuing another, this is not always the case. As the behavior has evolved, it has come to include such acts as stock market fraud, identity theft, sexual harassment, data theft, impersonation, consumer fraud, computer monitoring, and attacks by political groups on government agencies. Bocij carefully delineates the boundaries of cyberstalking, providing real-life examples, guidance for avoiding the pitfalls, and suggestions for what to do if you fall victim."--BOOK JACKET.

Machine converted from AACR2 source record.

There are no comments on this title.

to post a comment.