Skip to main content

Abstract

The advent of communication technologies has allowed for terrestrial forms of interpersonal victimization to move into cyberspace. One example of this is cyberstalking. The current chapter aims to synthesize the existing cyberstalking research published within the fields of criminology and victimology. Specifically, attention is first given to how cyberstalking has been defined in the legal and scholarly communities and the associated difficulties. The chapter continues with an exploration of the prevalence and patterns of both cyberstalking perpetration and victimization. In order to further understand who engages in cyberstalking perpetration and those who are cyberstalking victims, a review of the theoretical explanations is presented. An understudied, yet equally important, avenue in cyberstalking research is related to what occurs after the victimization. Thus, research on the reporting and help-seeking behaviors of cyberstalking victims is presented. The chapter concludes with a discussion of future directions for cyberstalking research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Alexy, E. M., Burgess, A. W., Baker, T., & Smoyak, S. A. (2005). Perceptions of cyberstalking among college students. Brief Treatment and Crisis Intervention, 5(3), 279–289.

    Article  Google Scholar 

  • Baum, K., Catalano, S., Rand, M., & Rose, K. (2009). Stalking victimization in the United States (NCJ 224527). Washington, DC: Bureau of Justice Statistics.

    Google Scholar 

  • Bocij, P. (2003). Victims of cyberstalking: An exploratory study of harassment perpetrated via the internet. First Monday, 8(10), 1–12.

    Google Scholar 

  • Bocij, P., Griffiths, M. D., & McFarlane, L. (2002). Cyberstalking: A new challenged for criminal law. The Criminal Lawyer, 122, 3–5.

    Google Scholar 

  • Boisvert, D., Wells, J., Armstrong, T., Lewis, R. H., Woeckener, M., & Nobles, M. R. (2017). Low resting heart rate and stalking perpetration. Journal of Interpersonal Violence. https://doi.org/10.1177/0886260517698823.

  • Brady, P. Q., & Nobles, M. R. (2017). The dark figure of stalking: Examining law enforcement response. Journal of Interpersonal Violence, 32, 3149–3173.

    Article  Google Scholar 

  • Catalano, S. (2012). Stalking victims in the United States – revised (NCJ 224527). Washington, DC: Bureau of Justice Statistics.

    Google Scholar 

  • Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588–608.

    Article  Google Scholar 

  • Cohen, L. E., Kluegel, J. R., & Land, K. C. (1981). Social inequality and predatory criminal victimization: An exposition and test of a formal theory. American Sociological Review, 46(5), 505–524.

    Article  Google Scholar 

  • D’Ovidio, R., & Doyle, J. (2003). A study on cyberstalking: Understanding investigative hurdles. FBI Law Enforcement Bulletin, 72, 10–17.

    Google Scholar 

  • Davis, K. E., Ace, A., & Andra, M. (2000). Stalking perpetrators and psychological maltreatment of partners: Anger-jealousy, attachment insecurity, need for control, and break-up context. Violence and Victims, 15, 407–425.

    Article  Google Scholar 

  • DeMatteo, D., Wagage, S., & Fairfax-Columbo, J. (2017). Cyberstalking: Are we on the same (web) page? A comparison of statutes, case law, and public perception. Journal of Aggression, Conflict and Peace Research, 9, 83–94.

    Article  Google Scholar 

  • Dietz, N. A., & Martin, P. Y. (2007). Women who are stalked: Questioning the fear standard. Violence Against Women, 13(7), 750–776.

    Article  Google Scholar 

  • Dreßing, H., Bailer, J., Anders, A., Wagner, H., & Gallas, C. (2014). Cyberstalking in a large sample of social network users: Prevalence, characteristics, and impact upon victims. Cyberpsychology, Behavior and Social Networking, 17, 61–67.

    Article  Google Scholar 

  • Duggan, M. (2017). Online harassment 2017. The Pew Research Center. Retrieved September, 11, 2018 from: http://www.pewinternet.org/2017/07/11/online-harassment-2017/

  • Dunn, J. L. (2002). Courting disaster: Intimate stalking, culture, and criminal justice. New York: Aldine de Gruyter.

    Google Scholar 

  • Fansher, A. K. (2017). Risky dating behaviors in the technological age: Consideration of a new pathway to victimization (Doctoral dissertation). Retrieved from http://hdl.handle.net/20.500.11875/2210

  • Finkelhor, D., & Asdigian, N. L. (1996). Risk factors for youth victimization: Beyond a lifestyles/routine activities theory approach. Violence and Victims, 11(1), 3–19.

    Article  Google Scholar 

  • Fisher, B. S., Cullen, F. T., & Turner, M. G. (2002). Being pursued: Stalking victimization in a national study of college women. Criminology and Public Policy, 1(2), 257–308.

    Article  Google Scholar 

  • Fissel, E. R. (2018). The reporting and help-seeking behaviors of cyberstalking victims. Journal of Interpersonal Violence. https://doi.org/10.1177/0886260518801942.

  • Fissel, E. R. (2019). Victimization of the 21st century: An examination of cyberstalking victimization using the target congruence approach (Doctoral dissertation).

    Google Scholar 

  • Fox, K. A., Gover, A. R., & Kaukinen, C. (2009). The effects of low self-control and childhood maltreatment on stalking victimization among men and women. American Journal of Criminal Justice, 34, 181.

    Article  Google Scholar 

  • Fox, K. A., Nobles, M. R., & Akers, R. L. (2011a). Is stalking a learned phenomenon? An empirical test of social learning theory. Journal of Criminal Justice, 39, 39–47.

    Article  Google Scholar 

  • Fox, K. A., Nobles, M. R., & Fisher, B. S. (2011b). Method behind the madness: An examination of stalking measurements. Aggression and Violent Behavior, 16(1), 74–84.

    Article  Google Scholar 

  • Fox, K. A., Nobles, M. R., & Fisher, B. S. (2016). A multi-theoretical framework to assess gendered stalking victimization: The utility of self-control, social learning, and control balance theories. Justice Quarterly, 33, 319–347.

    Article  Google Scholar 

  • Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Stanford: Stanford University Press.

    Google Scholar 

  • Henson, B., Reyns, B. W., & Fisher, B. S. (2011). Security in the 21st century: Examining the link between online social network activity, privacy, and interpersonal victimization. Criminal Justice Review, 36(3), 253–268.

    Article  Google Scholar 

  • Henson, B., Reyns, B. W., & Fisher, B. S. (2013). Does gender matter in the virtual world? Examining the effect of gender on the link between online social network activity, security and interpersonal victimization. Security Journal, 26(4), 315–330.

    Article  Google Scholar 

  • Hindelang, M. J., Gottfredson, M. R., & Garofalo, J. (1978). Victims of personal crime: An empirical foundation for a theory of personal victimization. Cambridge, MA: Ballinger.

    Google Scholar 

  • Jerin, R., & Dolinsky, B. (2001). You’ve got mail! You don’t want it: Cyber-victimization and on-line dating. Journal of Criminal Justice and Popular Culture, 9(1), 15–21.

    Google Scholar 

  • Kalaitzaki, A. (2017). Cyberstalking victimization and perpetration among Greek college students. In M. F. Wright (Ed.), Identity, sexuality, and relationships among emerging adults in the digital age (pp. 247–261). Hershey: IGI Global.

    Chapter  Google Scholar 

  • Kamphuis, J. H., & Emmelkamp, P. M. (2000). Stalking-A contemporary challenge for forensic and clinical psychiatry. The British Journal of Psychiatry, 176(3), 206–209.

    Article  Google Scholar 

  • Kraft, E., & Wang, J. (2010). An exploratory study of the cyberbullying and cyberstalking experiences and factors related to victimization of students at a public liberal arts college. International Journal of Technoethics, 1, 74–91.

    Article  Google Scholar 

  • Lee, R. K. (1998). Romantic and electronic stalking in a college context. William & Mary Journal of Women and Law, 4, 373.

    Google Scholar 

  • Lenhart, A., Ybarra, M., Zickuhr, K., & Price-Feeney, M. (2016). Online harassment, digital abuse, and cyberstalking in America. Data & Society. Retrieved September 14, 2018 from: https://datasociety.net/output/online-harassment-digital-abuse-cyberstalking/

  • Logan, T. K., & Walker, R. (2009). Civil protective order outcomes: Violations and perceptionsof effectiveness. Journal of Interpersonal Violence, 24, 675–692.

    Article  Google Scholar 

  • Logan, T. K., & Walker, R. T. (2010). Civil protective order effectiveness: Justice or just a pieceof paper? Violence and Victims, 25, 332–348.

    Article  Google Scholar 

  • Logan, T. K., Walker, R., Stewart, C., & Allen, J. (2006). Victim service and justice system representative responses about partner stalking: What do professionals recommend? Violence and Victims, 21, 49–66.

    Article  Google Scholar 

  • Lyndon, A., Bonds-Raacke, J., & Cratty, A. D. (2011). College students’ Facebook stalking of ex-partners. Cyberpsychology, Behavior and Social Networking, 14, 711–716.

    Article  Google Scholar 

  • Maple, C., Short, E., & Brown, A. (2011). Cyberstalking in the United Kingdom. An analysis of the ECHO pilot survey. Luton: National Centre for Cyberstalking Research, University of Bedfordshire.

    Google Scholar 

  • Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2014). Juveniles and cyber stalking in the United States: An analysis of theoretical predictors of patterns of online perpetration. International Journal of Cyber Criminology, 8, 47–56.

    Google Scholar 

  • Marcum, C. D., Higgins, G. E., & Nicholson, J. (2017). I’m watching you: Cyberstalking behaviors of university students in romantic relationships. American Journal of Criminal Justice, 42, 373–388.

    Article  Google Scholar 

  • Max, W., Rice, D. P., Finkelstein, E., Bardwell, R. A., & Leadbetter, S. (2004). The economic toll of intimate partner violence against women in the United States. Violence and Victims, 19(3), 259–272.

    Article  Google Scholar 

  • McFarlane, L., & Bocij, P. (2003). An exploration of predatory behaviour in cyberspace: Towards a typology of cyberstalkers. First Monday, 8, 1–10. https://doi.org/10.5210/fm.v8i9.1076.

  • Melton, H. C. (2000). Stalking: A review of the literature and direction for the future. Criminal Justice Review, 25, 246–262.

    Article  Google Scholar 

  • Ménard, K. S., & Pincus, A. L. (2012). Predicting overt and cyber stalking perpetration by male and female college students. Journal of Interpersonal Violence, 27, 2183–2207.

    Article  Google Scholar 

  • Mustaine, E. E., & Tewksbury, R. (1999). A routine activity theory explanation for women’s stalking victimizations. Violence Against Women, 5(1), 43–62.

    Article  Google Scholar 

  • National Center for Victims of Crime. (2019). Help for crime victims. Retrieved March 8, 2019 from: http://victimsofcrime.org/home

  • National Criminal Justice Association. (1993). Project to develop a model anti-stalking code for states. Washington, DC: Department of Justice, National Institutes of Justice.

    Google Scholar 

  • Navarro, J. N., Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2016). Addicted to the thrill of the virtual hunt: Examining the effects of internet addiction on the cyberstalking behaviors of juveniles. Deviant Behavior, 37, 893–903.

    Article  Google Scholar 

  • Ngo, F. T. (2018). Stalking: An examination of the correlates of subsequent police responses. Policing: An International Journal. https://doi.org/10.1108/PIJPSM-12-2017-0157.

    Article  Google Scholar 

  • Nobles, M. R., Reyns, B. W., Fox, K. A., & Fisher, B. S. (2014). Protection against pursuit: A conceptual and empirical comparison of cyberstalking and stalking victimization among anational sample. Justice Quarterly, 31, 986–1014.

    Article  Google Scholar 

  • Norton. (2019). How to protect yourself from cyberstalkers. Retrieved March 8, 2019 from: https://us.norton.com

  • Pathé, M. (2002). Surviving stalking. Cambridge, UK: Cambridge University Press.

    Book  Google Scholar 

  • Patton, C. L., Nobles, M. R., & Fox, K. A. (2010). Look who’s stalking: Obsessive pursuit and attachment theory. Journal of Criminal Justice, 38, 282–290.

    Article  Google Scholar 

  • Paullet, K. L., Rota, D. R., & Swan, T. T. (2009). Cyberstalking: An exploratory study of students at a mid-Atlantic university. Issues in Information Systems, 10, 640–649.

    Google Scholar 

  • Pew Research Center. (2018). Internet/broadband fact sheet. Retrieved September 10, 2018 from: http://www.pewinternet.org/fact-sheet/internet-broadband/

  • Pratt, T. C., & Cullen, F. T. (2000). The empirical status of Gottfredson and Hirschi’s general theory of crime: A meta-analysis. Criminology, 38, 931–964.

    Article  Google Scholar 

  • Pratt, T. C., Turanovic, J. J., Fox, K. A., & Wright, K. A. (2014). Self-control and victimization: A meta-analysis. Criminology, 52, 87–116.

    Article  Google Scholar 

  • Reyns, B. W. (2019). Online pursuit in the twilight zone: Cyberstalking perpetration by college students. Victims & Offenders, 14, 183–198.

    Article  Google Scholar 

  • Reyns, B. W., & Englebrecht, C. M. (2010). The stalking victim’s decision to contact the police: A test of Gottfredson and Gottfredson’s theory of criminal justice decision making. Journal of Criminal Justice, 38, 998–1005.

    Article  Google Scholar 

  • Reyns, B. W., & Englebrecht, C. M. (2013). The fear factor: Exploring predictors of fear among stalking victims throughout the stalking encounter. Crime & Delinquency, 59, 788–808.

    Article  Google Scholar 

  • Reyns, B. W., & Fisher, B. S. (2018). The relationship between offline and online stalking victimization: A gender-specific analysis. Violence and Victims, 33, 769–786.

    Article  Google Scholar 

  • Reyns, B. W., Henson, B., & Fisher, B. S. (2011). Being pursued online: Applying cyberlifestyle-routine activity theory to cyberstalking victimization. Criminal Justice and Behavior, 38(11), 1149–1169.

    Article  Google Scholar 

  • Reyns, B. W., Henson, B., & Fisher, B. S. (2012). Stalking in the twilight zone: Extent of cyberstalking victimization and offending among college students. Deviant Behavior, 33, 1–25.

    Article  Google Scholar 

  • Reyns, B. W., Burek, M. W., Henson, B., & Fisher, B. S. (2013). The unintended consequences of digital technology: Exploring the relationship between sexting and cybervictimization. Journal of Crime and Justice, 36(1), 1–17.

    Article  Google Scholar 

  • Reyns, B. W., Henson, B., & Fisher, B. S. (2016a). Guardians of the cyber galaxy: An empirical and theoretical analysis of the guardianship concept from routine activity theory as it applies to online forms of victimization. Journal of Contemporary Criminal Justice, 32, 148–168.

    Article  Google Scholar 

  • Reyns, B. W., Henson, B., Fisher, B. S., Fox, K. A., & Nobles, M. R. (2016b). A gendered lifestyle-routine activity approach to explaining stalking victimization in Canada. Journal of Interpersonal Violence, 31, 1719–1743.

    Article  Google Scholar 

  • Reyns, B. W., Fisher, B. S., & Randa, R. (2018). Explaining cyberstalking victimization against college women using a multitheoretical approach: Self-control, opportunity, and control balance. Crime & Delinquency, 64, 1742–1764.

    Article  Google Scholar 

  • Schreck, C. J. (1999). Criminal victimization and low self-control: An extension and test of a general theory of crime. Justice Quarterly, 16(3), 633–654.

    Article  Google Scholar 

  • Sheridan, L. P., & Grant, T. (2007). Is cyberstalking different? Psychology, Crime & Law, 13(6), 627–640.

    Article  Google Scholar 

  • Sims, B., Yost, B., & Abbott, C. (2005). Use and nonuse of victim services programs: Implications from a statewide survey of crime victims. Criminology & Public Policy, 4, 361–384.

    Article  Google Scholar 

  • Smith, S. G., Chen, J., Basile, K. C., Gilbert, L. K., Merrick, M. T., Patel, N., Walling, M., & Jain, A. (2017). The National Intimate Partner and Sexual Violence Survey (NISVS): 2010–2012 state report. Atlanta: National Center for Injury Prevention and Control, Centers for Disease Control and Prevention.

    Google Scholar 

  • Spitzberg, B. H., & Hoobler, G. (2002). Cyberstalking and the technologies of interpersonal terrorism. New Media Society, 4(1), 71–92.

    Article  Google Scholar 

  • Strawhun, J., Adams, N., & Huss, M. T. (2013). The assessment of cyberstalking: An expanded examination including social networking, attachment, jealousy, and anger in relation to violence and abuse. Violence and Victims, 28, 715–730.

    Article  Google Scholar 

  • Tjaden, P. (2009). Stalking policies and research in the United States: A twenty year retrospective. European Journal on Criminal Policy and Research, 15(3), 261–278.

    Article  Google Scholar 

  • Worsley, J. D., Wheatcroft, J. M., Short, E., & Corcoran, R. (2017). Victims’ voices: Understanding the emotional impact of cyberstalking and individuals’ coping responses. SAGE Open, 7, 1–13.

    Article  Google Scholar 

  • Yar, M. (2005). The novelty of ‘cybercrime’ an assessment in light of routine activity theory. European Journal of Criminology, 2(4), 407–427.

    Article  Google Scholar 

  • Zweig, J., & Yahner, J. (2014). Providing services to victims of crime. In R. C. Davis, A. J. Lurigio, & S. Herman (Eds.), Victims of crime (4th ed., pp. 325–348). Thousand Oaks: Sage.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bradford W. Reyns .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 The Author(s), under exclusive licence to Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Reyns, B.W., Fissel, E.R. (2019). Cyberstalking. In: The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-90307-1_57-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-90307-1_57-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Palgrave Macmillan, Cham

  • Print ISBN: 978-3-319-90307-1

  • Online ISBN: 978-3-319-90307-1

  • eBook Packages: Springer Reference Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences

Publish with us

Policies and ethics