Tracking cyberstalkers: a cryptographic approach

Acm Sigcas Computers and Society 35 (3):2 (2005)
  Copy   BIBTEX

Abstract

Stalking is a pattern of behavior over time in which a stalker seeks to gain access to, or control over, an unwilling victim. Such actions range from the benign to the malicious and may cause emotional distress or harm to the victim. With the widespread adoption of new technologies, new forums of Internet-mediated discourse now exist which offer stalkers unprecedented scope to locate and exert influence over victims. Cyberstalking, the convergence of stalking and cyberspace, has created new challenges for the prevention, detection, and prosecution of this new phenomenon as the traditional methods of detection by witnesses and enforcement through physical restraining orders often are inadequate.In this paper we suggest a cryptographic approach for tracking cyberstalkers. We first define the threat model in terms of the profile of a cyberstalker, as well as legal and law enforcement constraints. We then describe a monitoring system that addresses the basic admissibility requirements of our threat model, by capturing and verifying circumstantial evidence for use in cyberstalking investigations.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 93,774

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Some ethical reflections on cyberstalking.Frances S. Grodzinsky & Herman T. Tavani - 2002 - Acm Sigcas Computers and Society 32 (1):22-32.
Defining Objectives for Preventing Cyberstalking.Gurpreet Dhillon & Kane J. Smith - 2019 - Journal of Business Ethics 157 (1):137-158.
Digital Forensics.Stefan Meier - 2018 - In Wolff Heintschel von Heinegg, Robert Frau & Tassilo Singer (eds.), Dehumanization of Warfare: Legal Implications of New Weapon Technologies. Springer Verlag. pp. 129-145.
Cyberstalking and internet pornography: Gender and the gaze. [REVIEW]Alison Adam - 2002 - Ethics and Information Technology 4 (2):133-142.
All hands on deck for ACM Ethics.Bo Brinkman, Don Gotterbarn, Keith W. Miller & Marty J. Wolf - 2016 - Acm Sigcas Computers and Society 46 (3):5-8.
Digital Evidence: The Admissibility of Leaked and Hacked Evidence in Arbitration Proceedings.Daniel Brantes Ferreira & Elizaveta A. Gromova - 2024 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 37 (3):903-922.

Analytics

Added to PP
2013-10-30

Downloads
45 (#107,894)

6 months
11 (#1,140,922)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

Reason, relativity, and responsibility in computer ethics.James H. Moor - 1998 - Acm Sigcas Computers and Society 28 (1):14-21.

Add more references