skip navigation

LIBRARY

Abstract Database

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

To download this abstract, check the box next to the NCJ number then click the "Back To Search Results" link. Then, click the "Download" button on the Search Results page. Also see the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 213232 
Title: Cyber-Harassment in the Workplace (From Workplace Violence: Issues, Trends, Strategies, P 248-262, 2005, Vaughan Bowie, Bonnie S. Fisher, et al. eds. -- See NCJ-213221)
Author(s): Monica T. Whitty; Adrian N. Carr
Date Published: 2005
Page Count: 15
Sponsoring Agency: Willan Publishing
Portland, OR 97213-3644
Sale Source: Willan Publishing
c/o ISBS, 5804 N.E. Hassalo Street
Portland, OR 97213-3644
United States of America
Publisher: http://www.isbs.com/ 
Type: Issue Overview
Format: Book Chapter
Language: English
Country: United States of America
Annotation: After defining "cyberstalking" and "cyberterrorism" in the workplace, this chapter suggests ways to counter it.
Abstract: "Stalking" is the "repeated uninvited monitoring and/or intrusion into the life and activities of a victim that is usually, but not always, undertaken for the purpose of frightening or intimidating the victim or those around the victim" (McGrath and Casey (2002). "Cyberstalking" refers to the mechanism of stalking that uses the Internet to obtain information on, monitor, and/or contact the victim. Cyberstalking occurs in the workplace when electronic contact with and harassment of the victim occurs while the victim is at work or when the offender is at his/her workplace. "Cyberterrorism" refers to the use of computers and associated electronic media to commit what some would perceive as terrorist attacks, such as hacking into and disrupting infrastructure operations or security systems, producing serious harm to masses of people. Employees may not only become the targets of cyberstalking and cyberterrorism while they are in the workplace, they may also be perpetrators through the electronic systems of their workplace. The challenge for government, individual employees, and their employers is to define specific behaviors that constitute cyberstalking and cyberterrorism, identify the various methods used to perpetrate these crimes, and then develop countermeasures that will prevent the crime and apprehend the offender. 26 references
Main Term(s): Criminology
Index Term(s): Computer abuse; Computer related crime; Counter-terrorism tactics; Cyber Terrorism; Stalkers; Terrorist tactics; Violence in the workplace; Workplace Violence
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=234726

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.