•  
  •  
 

Prior Publisher

The Association of Digital Forensics, Security and Law (ADFSL)

Abstract

The interaction between disjunctive interpersonal relationships, those where the parties to the relationship disagree on the goals of the relationship, and the use of computer mediated communications channels is a relatively unexplored domain. Bargh (2002) suggests that CMC channels can amplify the development of interpersonal relationships, and notes that the effect is not constant across communications activities. This proposal suggests a line of research that explores the interaction between computer mediated communications (CMC) and stalking, which is a common form of disjunctive relationships. Field data from cyberstalking cases will be used to look at the effects of CMC channels on stalking case severity, and exploring the relative impacts of CMC channel characteristics on such cases. To accomplish this, a ratio scaled measure of stalking case severity is proposed for use in exploring the relationship between case severity and CMC media characteristics, anonymity, and the prior relationship between the stalker and the victim. Expected results are identified, and follow-up research is proposed.

References

Adams, D. A., Todd, P. A. and Nelson, R. R. (1993). "A comparative evaluation of the impact of electronic and voice mail on organizational communication." Information & Management 24(1): 9-21.

Alexy, E. M., Burgess, A. W., Baker, T. and Smoyak, S. A. (2005). "Perceptions of Cyberstalking Among College Students." Brief Treat Crisis Intervention 5(3): 279-289.

Bargh, J. A. (2002). "Beyond Simple Truths: The Human-Internet Interaction." Journal of Social Issues 58(1): 1-8.

Bargh, J. A., McKenna, K. Y. A. and Fitzsimons, G. M. (2002). "Can You See the Real Me? Activation and Expression of the "True Self" on the Internet." Journal of Social Issues 58(1): 33-48.

Berthold, O., Federrath, H. and Köhntopp, M. (2000). "Project “anonymity and unobservability in the Internet”." Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions, Toronto ON, ACM Press New York, NY, USA.

Bocij, P. (2002). "Cyberstalking: A New Challenge for Criminal Law." http://www.stalkingresearch.org.uk/index.php?Section=articles&Page=articles Retrieved May 4, 2006.

Brenner, S. W. (2004). "U.S. Cybercrime Law: Defining Offenses." Information Systems Frontiers 6(2): 115-132.

Brewster, M. P. (2000). "Stalking by former intimates: verbal threats and other predictors of physical violence." Violence and Victims 15(1): 41-54.

Carlson, J. R. (1995). 'Channel expansion theory: A dynamic view of media and information richness perceptions'. ProQuest Dissertations and Theses, Florida State University. Tallahassee FL, Unpublished Ph.D Thesis.

Connolly, T., Jessup, L. M. and Valacich, J. S. (1990). "Effects of Anonymity and Evaluative Tone on Idea Generation in Computer-Mediated Groups." Management Science 36(6): 689.

Cupach, W. R. and Spitzberg, B. H. (1998). Obsessive relational intrusions and stalking. The dark side of close relationships. Spitzberg, B. H. and Cupach, W. R. Mahwah, NJ, Lawrence Erlbaum: 233-263.

Cupach, W. R. and Spitzberg, B. H. (2004). The dark side of relationship pursuit : from attraction to obsession and stalking. Lawrence Erlbaum Associates, Mahwah, N.J.

D'Ovidio, R. and Doyle, J. (2003). "A Study on Cyberstalking Understanding Investigative Hurdles." FBI Law Enforcement Bulletin 72(3): 10-17.

Daft, R. L. and Lengel, R. H. (1986). "Organizational Information Requirements, Media Richness and Structural Design." Management Science 32(5): 554.

Dennis, A. R. and Kinney, S. T. (1998). "Testing media richness theory in the new media: The effects of cues, feedback, and task equivocality." Information Systems Research 9(3): 256-274.

Dziegielewski, S. and Roberts, A. R. (1995). Stalking Victims and survivors: Identification, legal remedies and crisis treatment. Crisis intervention and time-limited cognitive treatment. Roberts, A. R. Thousand Oaks, Sage Publications: 73-90. Ellison, L. and Akdeniz, Y.

Ellison, L. and Akdeniz, Y. (1998). "Cyber-stalking: the Regulation of Harassment on the Internet." Criminal Law Review, http://www.cyberrights.org/documents/stalking_article.pdf Retrieved May 23, 2006.

Emerson, R. M., Ferris, K. O. and Gardner, C. B. (1998). "On Being Stalked." Social Problems 45(3): 289-314.

Finn, J. (2004). "A Survey of Online Harassment at a University Campus." Journal of Interpersonal Violence 19(4): 468-483.

Glaser, J., Dixit, J. and Green, D. P. (2002). "Studying Hate Crime with the Internet: What Makes Racists Advocate Racial Violence?" Journal of Social Issues 58(1): 177-193.

Goldberg, D. and Hillier, V. F. (1979). "A Scaled Version of the General Health Questionnaire." Psychological Medicine 9: 139-145.

Goode, M. (1995). "Stalking: The Crime of the Nineties?" Criminal Law Journal 19(1): 215-234.

Harmon, R. B., Rosner, R. and Owens, H. (1995). "Obsessional harassment and erotomania in a criminal court population." Journal of Forensic Sciences 40(2): 188-196.

Hian, L. B., Chuan, S. L., Trevor, T. M. K. and Detenber, B. H. (2004). "Getting to know you: exploring the development of relational intimacy in computer-mediated communication." Journal of Computer-Mediated Communication 9(3).

Horowitz, M., Wilner, N. and Alvarez, W. (1979). "Impact of Event Scale: A Measure of Subjective Stress." Psychosomatic Medicine 41: 209-218.

Kock, N. (2004). "The Psychobiological Model: Towards a New Theory of Computer-Mediated Communication Based on Darwinian Evolution." Organization Science 15(3): 327.

Kraut, R., Kiesler, S., Boneva, B., Cummings, J., Helgeson, V. and Crawford, A. (2002). "Internet Paradox Revisited." Journal of Social Issues 58(1): 49- 74.

McKenna, K. Y. A., Green, A. S. and Gleason, M. E. J. (2002). "Relationship Formation on the Internet: What's the Big Attraction?" Journal of Social Issues 58(1): 9-31.

Miceli, S. L., Santana, S. A. and Fisher, B. S. (2001). "Cyberaggression: Safety and Security Issues for Women Worldwide." Security Journal 14(2): 11- 27

Miller, G. (1999). N. Hollywood Man Charged in 1st Cyber-Stalking Case. Los Angles Times. Los Angles, CA: 1.

Phillips, L., Quirk, R., Rosenfeld, B. and O'Connor, M. (2004). "Is it Stalking?: Perceptions of Stalking among College Undergraduates." Criminal Justice and Behavior 31(1): 73-96.

Purcell, R., Pathe, M. and Mullen, P. E. (2004). "Editorial: When do repeated intrusions become stalking?" Journal of Forensic Psychiatry and Psychology 15(4): 571-583.

Roberts, A. R. and Dziegielewski, S. F. (2006). "Changing Stalking Patterns and Prosecutorial Decisions: Bridging the Present to the Future." Victims & Offenders 1(1): 47-60.

Rosenfeld, B. (2004). "Violence Risk Factors in Stalking and Obsessional Harassment: A Review and Preliminary Meta-Analysis." Criminal Justice and Behavior 31(1): 9-36.

Rosenfeld, B. and Harmon, R. (2002). "Factors Associated With Violence in Stalking and Obsessional Harassment Cases." Criminal Justice and Behavior 29(6): 671-691.

Saaty, T. L. and Vargas, L. G. (2001). Models, methods, concepts & applications of the analytic hierarchy process. Kluwer Academic Publishers, Boston.

Sheridan, L., Davies, G. and Boon, J. (2001a). "The Course and Nature of Stalking: A Victim Perspective." The Howard Journal 40(3): 215-234.

Sheridan, L., Davies, G. and Boon, J. (2001b). "Stalking: Perceptions and Prevalence." Journal of Interpersonal Violence 16: 151-167.

Sheridan, L., Gillett, R. and Davies, G. (2002). "Perceptions and Prevalence of Stalking in a Male Sample." Psychology, Crime and Law 8(4): 289-310.

Spears, R., Postmes, T., Lea, M. and Wolbert, A. (2002). "When Are Net Effects Gross Products? Communication." Journal of Social Issues 58(1): 91-107.

Spitzberg, B. H. (2002). "The Tactical Topography of Stalking Victimization and Management." Trauma Violence Abuse 3(4): 261-288.

Spitzberg, B. H. and Hoobler, G. (2002). "Cyberstalking and the technologies of interpersonal terrorism." New Media Society 4(1): 71-92.

Taylor, B. W. (2004). Introduction to Management Science 8th ed. Pearson Prentice Hall, Upper Saddle River NJ.

Te'eni, D. (2001). "Review: A Cognitive-Affective Model of Organizational Communication for Designing IT." MIS Quarterly 25(2): 251-312.

Thompson, L. and Nadler, J. (2002). "Negotiating via Information Technology: Theory and Application." Journal of Social Issues 58(1): 109-124.

Tjaden, P. G. and Thoennes, N. (1998). Stalking in America: findings from the National Violence Against Women Survey. NCJ 169592 National Institute of Justice and Centers for Disease Control and Prevention. Washington, DC: 19 pgs.

Tjaden, P. G. and Thoennes, N. (2000). Full Report of the Prevalence, Incidence, and Consequences of Violence Against Women: Findings From the National Violence Against Women Survey. NCJ 183781 US Department of Justice, National Institute of Justice. Washington DC: 74 pgs.

Tyler, T. R. (2002). "Is the Internet Changing Social Life? It Seems the More Things Change, the More They Stay the Same." Journal of Social Issues 58(1): 195-205.

Walther, J. B. (1996). "Computer-mediated communication: Impersonal, interpersonal, and hyperpersonal interaction." Communication Research 23(1): 3-43.

Zigurs, I. and Buckland, B. K. (1998). "A theory of task/technology fit and group support systems effectiveness." MIS Quarterly 22(3): 313-334.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.