In today’s interconnected society, high profile examples of online victimization abound. Cyber-bullies, stalkers and harassers launch attacks on the less powerful, causing a variety of harms. Recent scholarship has identified some of the more salient damage, including reputational harms, severe emotional distress, loss of employment, and physical assault. Extreme cases of online abuse have resulted in death through suicide or as a result of targeted attacks. This article makes two major contributions to the cyber-victimization literature. It proposes specific reforms to criminal and tort laws to address this conduct more effectively. Further, it situates those reforms within a new multi-modal regulatory framework. This new approach ...
Most Internet users are familiar with trolling—aggressive, foul-mouthed posts designed to elicit ang...
On October 17, 2006, Megan Meier, a thirteen-year-old girl in Dardenne Prairie, Missouri, who had be...
This project examines the protection methods suggested by hackers to guard against online victimizat...
In today’s interconnected digital society, high profile examples of online abuses abound. Cyberbull...
This short piece will take a step back and give an overhead view of the problem of cyber harassment ...
This Note examines online harassment and online stalking throughout the world, including the current...
Digital abuse is on the rise. People increasingly use technology to perpetrate and exacerbate abusiv...
Although harassment and bullying have always existed, when such behavior is conducted online, the co...
Over the recent years, we have seen an immense increase in technology. Though the Internet can be co...
This short paper will provide an overview of the impressive pieces included in this issue of the Int...
This short paper will provide an overview of the impressive pieces included in this issue of the Int...
Social networking sites and blogs have increasingly become breeding grounds for anonymous online gro...
The online harassment of women exemplifies twenty-first century behavior that profoundly harms women...
Cyberstalking is practiced by Internet abusers to harass, victimize and to mock peers, teachers, co-...
States are not being held accountable for the vast majority of their harmful cyberoperations, largel...
Most Internet users are familiar with trolling—aggressive, foul-mouthed posts designed to elicit ang...
On October 17, 2006, Megan Meier, a thirteen-year-old girl in Dardenne Prairie, Missouri, who had be...
This project examines the protection methods suggested by hackers to guard against online victimizat...
In today’s interconnected digital society, high profile examples of online abuses abound. Cyberbull...
This short piece will take a step back and give an overhead view of the problem of cyber harassment ...
This Note examines online harassment and online stalking throughout the world, including the current...
Digital abuse is on the rise. People increasingly use technology to perpetrate and exacerbate abusiv...
Although harassment and bullying have always existed, when such behavior is conducted online, the co...
Over the recent years, we have seen an immense increase in technology. Though the Internet can be co...
This short paper will provide an overview of the impressive pieces included in this issue of the Int...
This short paper will provide an overview of the impressive pieces included in this issue of the Int...
Social networking sites and blogs have increasingly become breeding grounds for anonymous online gro...
The online harassment of women exemplifies twenty-first century behavior that profoundly harms women...
Cyberstalking is practiced by Internet abusers to harass, victimize and to mock peers, teachers, co-...
States are not being held accountable for the vast majority of their harmful cyberoperations, largel...
Most Internet users are familiar with trolling—aggressive, foul-mouthed posts designed to elicit ang...
On October 17, 2006, Megan Meier, a thirteen-year-old girl in Dardenne Prairie, Missouri, who had be...
This project examines the protection methods suggested by hackers to guard against online victimizat...