• Login
    View Item 
    •   Home
    • IRAC Institute for Research in Applicable Computing - to April 2016
    • Centre for Research in Distributed Technologies (CREDIT)
    • View Item
    •   Home
    • IRAC Institute for Research in Applicable Computing - to April 2016
    • Centre for Research in Distributed Technologies (CREDIT)
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of UOBREPCommunitiesTitleAuthorsIssue DateSubmit DateSubjectsPublisherJournalDepartmentThis CollectionTitleAuthorsIssue DateSubmit DateSubjectsPublisherJournalDepartment

    My Account

    LoginRegister

    About

    AboutLearning ResourcesResearch Graduate SchoolResearch InstitutesUniversity Website

    Statistics

    Display statistics

    How technology can mitigate and counteract cyber-stalking and online grooming

    • CSV
    • RefMan
    • EndNote
    • BibTex
    • RefWorks
    Thumbnail
    Name:
    Publisher version
    View Source
    Access full-text PDFOpen Access
    View Source
    Check access options
    Check access options
    Authors
    al-Khateeb, Haider
    Epiphaniou, Gregory
    Affiliation
    National Centre for Cyberstalking Research
    Issue Date
    2016-01
    Subjects
    cyberstalking
    online harassment
    online grooming
    
    Metadata
    Show full item record
    Abstract
    With the virtual world becoming part of the social lives of adults and minors alike, new attack vectors emerged to increase the severity of human-related attacks to a level the community have not experience before. This article investigates and shares an outline on how technology could emerge further to counteract and mitigate the damage caused by online perpetrators. The review encourages approaching online harassment, stalking, bullying, grooming and their likes with an Incident Response methodology in mind. This includes a detection phase utilising automated methods to identify and classify such attacks, conduct digital forensic investigations to analyse the nature of the offence and reserve evidence, taking preventive measures as part of the reaction towards the problem such as filtering unwanted communications and finally looking at how we can rely on applicable computing to support and educate the victims.
    Citation
    al-Khateeb, H. M., Epiphaniou, G. (2016), ‘How technology can mitigate and counteract cyber-stalking and online grooming’, Computer Fraud & Security, Volume 2016, Issue 1, January 2016, Pages 14-18, ISSN 1361-3723, http://dx.doi.org/10.1016/S1361-3723(16)30008-2.
    Publisher
    Elsevier
    Journal
    Computer Fraud & Security
    URI
    http://hdl.handle.net/10547/596569
    DOI
    10.1016/S1361-3723(16)30008-2
    Additional Links
    http://www.sciencedirect.com/science/article/pii/S1361372316300082
    Type
    Article
    Language
    en
    ae974a485f413a2113503eed53cd6c53
    10.1016/S1361-3723(16)30008-2
    Scopus Count
    Collections
    Centre for Research in Distributed Technologies (CREDIT)

    entitlement

     
    DSpace software (copyright © 2002 - 2021)  DuraSpace
    Quick Guide | Contact Us
    Open Repository is a service operated by 
    Atmire NV
     

    Export search results

    The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

    By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

    To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

    After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.