MetaTOC stay on top of your field, easily

Cyber-Defense: A Taxonomy of Tactics for Managing Cyberstalking

,

Journal of Interpersonal Violence

Published online on

Abstract

Cyberstalking research has revealed information about who is perpetrating what offense to whom. This study adds to research on cyberstalking by exploring how victims respond to the unwanted pursuit. The reflections of cyberstalking victims were content analyzed to answer research questions about different risk management behaviors, their effectiveness, and their relationship with specific cyberstalking behaviors. Findings indicated that victims used seven general management tactics of which ignore/avoidance, active technological disassociation, and help seeking were the most common. Using technology to move away from pursuers was reported as the most effective tactic for managing the unwanted relational pursuit. The results also suggested that victims’ management responses were associated with the type of behaviors experienced.