Stalking was defined by Meloy (1996) as obsessional following in which “a person engages in an abnormal or long-term pattern of threat or harassment directed toward a specific individual” (p. 148). Obsessional refers to a persistent, pervasive, imposing and unrequested presence of a self in the space of another person. Following here implies an unwanted pursuit of a victim. The consequences of this invasive attitude combined with this pattern of “obsessive relational intrusions” (Spitzberg & Cupach, 1994) are numerous, but share a feature among victims: the sense of a naked threat and an overwhelming fear.It may be useful to recognise that the force of fantasy as a central component of intense emotion and inexplicable behavior (Person, 1995) is the first step in understanding the psychology of stalking and cyberstalking, and further research is necessary to the develop knowing how to intervene efficiently and effectively. Pursuit patterns by stalkers are multiple, and vary, with new methods that evolve as technological innovation in communication develops.
Cyberstalking
Zara, Georgia
2018-01-01
Abstract
Stalking was defined by Meloy (1996) as obsessional following in which “a person engages in an abnormal or long-term pattern of threat or harassment directed toward a specific individual” (p. 148). Obsessional refers to a persistent, pervasive, imposing and unrequested presence of a self in the space of another person. Following here implies an unwanted pursuit of a victim. The consequences of this invasive attitude combined with this pattern of “obsessive relational intrusions” (Spitzberg & Cupach, 1994) are numerous, but share a feature among victims: the sense of a naked threat and an overwhelming fear.It may be useful to recognise that the force of fantasy as a central component of intense emotion and inexplicable behavior (Person, 1995) is the first step in understanding the psychology of stalking and cyberstalking, and further research is necessary to the develop knowing how to intervene efficiently and effectively. Pursuit patterns by stalkers are multiple, and vary, with new methods that evolve as technological innovation in communication develops.File | Dimensione | Formato | |
---|---|---|---|
g zara_cyberstalking_the-sage-encyclopedia-of-surveillance-security-privacy_2018.pdf
Accesso riservato
Tipo di file:
PDF EDITORIALE
Dimensione
124.37 kB
Formato
Adobe PDF
|
124.37 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.