Weitere Artikel dieser Ausgabe durch Wischen aufrufen
Cyberstalking is a significant challenge in the era of Internet and technology. When dealing with cyberstalking, institutions and governments struggle in how to manage it and where to allocate resources. Therefore, it is important to understand how individuals feel about the problem of cyberstalking and how it can be managed. In this paper, we use Nissenbaum’s (Wash L Rev 79(1):119–158, 2004) contextual integrity as a theoretical framework for applying Keeney’s (Manag Sci 45: 533–542, 1999) value-focused thinking technique to develop actionable objectives aimed at the prevention of cyberstalking. By systematically interviewing over 100 individuals, we extract 20 objectives based on the underlying norms of distribution and appropriateness relevant to the context of cyberstalking. The objectives ensure that contextual integrity is maintained and cyberstalking prevented. Organizations can benefit from the objectives developed in this research since they are a means for developing an ethical policy regarding cyberstalking. Therefore, they help to ensure an ethical engagement with society at large by organizations when dealing with cyberstalking. Researchers can use these objectives to explore the best means for their implementation by organizations and institutions. Additionally they can explore the network mapping of fundamental and means objectives to determine relationships and their strengths in the cyberstalking context.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Akkermans, H., & Van Helden, K. (2002). Vicious and virtuous cycles in ERP implementation: A case study of interrelations between critical success factors. European Journal of Information Systems,11(1), 35–46. CrossRef
Alexy, Eileen M. (2005). Perceptions of cyberstalking among college students. Brief Treatment and Crisis Intervention,5(3), 279. CrossRef
Al-Khateeb, H. M., & Epiphaniou, G. (2016). How technology can mitigate and counteract cyber-stalking and online grooming. Computer Fraud and Security,2016(1), 14–18. CrossRef
Allen, A. L. (2003). Why privacy isn’t everything: Feminist reflections on personal accountability. Lanham: Rowman & Littlefield.
Barth, A., Datta, A., Mitchell, J. C., & Nissenbaum, H. (2006). Privacy and contextual integrity: Framework and applications. In Proceedings of IEEE symposium on security and privacy.
Bauer, T. (2014), The responsibilities of social networking companies: Applying political CSR theory to Google, Facebook and Twitter. In R. Tench, W. Sun, B. Jones (Eds.), Communicating corporate social responsibility: Perspectives and practice (critical studies on corporate responsibility, governance and sustainability (Vol 6, pp. 259–282). Emerald Group Publishing Limited, Bingley.
Carroll, A. B. (1991). The pyramid of corporate social responsibility: Toward the moral management of organizational stakeholders. Business Horizons,34(4), 39–48. CrossRef
Chik, W. (2008). Harassment through the digital medium-a cross jurisdictional comparative analysis of the law on cyberstalking. Journal of International Commercial Law and Technology,3, 13.
Crump, J. (2011). What are the police doing on twitter? Social media, the police and the public. Policy and Internet,3(4), 1–27. CrossRef
Cupach, W., & Spitzberg, B. (1998). Obsessive relational intrusion and stalking. In B. Spitzberg & W. Cupach (Eds.), The dark side of close relationships (pp. 233–263). Hillsdale, NJ: Erlbaum.
Cupach, W., & Spitzberg, B. (2001). Obsessive relational intrusion: incidence, perceived severity, and coping. Violence and Victims,15(1), 1–16.
Dematteo, D., Wagage, S., & Fairfax-Columbo, J. (2017). Cyberstalking: Are we on the same (web)page? A comparison of statutes, case law, and public perception. Journal of Aggression, Conflict and Peace Research,9(2), 83–94. CrossRef
Dhillon, G., & Torkzadeh, G. (2006). Value-focused assessment of information system security in organizations. Information Systems Journal,16(3), 293–314. CrossRef
Dreßing, H., Bailer, J., Anders, A., Wagner, H., & Gallas, C. (2014). Cyberstalking in a large sample of social network users: prevalence, characteristics, and impact upon victims. Cyberpsychology, Behavior, and Social Networking,17(2), 61–67. CrossRef
Freestone, O., & Mitchell, V. (2004). Generation Y attitudes towards e-ethics and internet-related misbehaviours. Journal of Business Ethics,54(2), 121–128. CrossRef
Goodno, N. H. (2007). Cyberstalking, a new crime: Evaluating the effectiveness of current state and federal laws. Missouri Law Review, 72 (1), 1–74.
Hazelwood, S., & Koon-Magnin, S. (2013). Cyber stalking and cyber harassment legislation in the United States: A qualitative analysis. International Journal of Cyber Criminology,7(2), 155–168.
Hinduja, Sameer, & Patchin, Justin W. (2007). Offline consequences of online victimization: School violence and delinquency. Journal of School Violence,6(3), 89–112. CrossRef
Hopkinson, C. (2013) Trolling in online discussions: From provocation to community-building. Brno Studies in English, 39(1), 5–24. CrossRef
Hunter, M. G. (1997). The use of RepGrids to gather data about information systems analysts. Information Systems Journal,7, 67–81. CrossRef
Joyner, B. E., & Payne, D. (2002). Evolution and implementation: A study of values, business ethics and corporate social responsibility. Journal of Business Ethics,41(4), 297–311. CrossRef
Kahan, Dan M. (1997). Social influence, social meaning, and deterrence. Virginia Law Review,83(2), 349–395. CrossRef
Keeney, R. L. (1992). Value-focused thinking. Cambridge, MA: Harvard University Press.
Keeney, R. L. (1994a). Creativity in decision making with value-focused thinking. Sloan Management Review,35, 33–41.
Keeney, R. L. (1994b). Using values in operations research. Operations Research,42(5), 793–813. CrossRef
Keeney, R. L. (1996). Value-focused thinking: Identifying decision opportunities and creating alternatives. European Journal of Operational Research,92(3), 537–549. CrossRef
Keeney, R. L. (1999). The value of internet commerce to the customer. Management Science,45, 533–542. CrossRef
Keeney, R. L., & Mcdaniels, T. L. (1992). Value-focused thinking about strategic decisions at BC hydro. Interfaces,22(6), 94–109. CrossRef
Keeney, R. L., Winterfeldt, D. V., & Eppel, T. (1990). Eliciting public values for complex policy decisions. Management Science,36(9), 1011–1030. CrossRef
Klein, H. K., & Myers, M. D. (1999). A set of principles for conducting and evaluating interpretive field studies in information systems. MIS Quarterly,23, 67–94. CrossRef
Lindgreen, A., & Swaen, V. (2009). Corporate social responsibility. International Journal of Management Reviews,12(1), 1–7. CrossRef
Livingstone, S., Bober, M., & Helsper, E. J. (2005). Internet literacy among children and young people. Findings from the UK Children Go Online project. London: London School of Economics and Political Science. http://www.children-go-online.net.
Livingstone, S., & Helsper, E. (2010). Balancing opportunities and risks in teenagers’ use of the Internet: The role of online skills and internet self-efficacy. New Media & Society,12(2), 309–329. CrossRef
May, J., Dhillon, G., & Caldeira, M. (2013). Defining value-based objectives for ERP systems planning. Decision Support Systems,55(1), 98–109. CrossRef
McFarlane, L., & Bocij, P. (2005). An exploration of predatory behavior in cyberspace: Towards a typology of cyberstalkers. First Monday, 8. Retrieved Feb 18, 2006, from http://firstmonday.org/issues/issues8_9/mcfarlane/index.html.
Melissa, J. R. (2009) Why social media is vital to corporate social responsibility. http://mashable.com/2009/11/06/social-responsibility/#lL17q023Caqh.
Merrick, J. R., Parnell, G. S., Barnett, J., & Garcia, M. (2005). A multiple-objective decision analysis of stakeholder values to identify watershed improvement needs. Decision Analysis,2(1), 44–57. CrossRef
Moores, T. T., & Dhillon, G. (2003). Do privacy seals in e-commerce really work? Communications of the ACM,46(12), 265–271. CrossRef
Niemz, K., Griffiths, M., & Banyard, P. (2005). Prevalence of pathological Internet use among university students and correlations with self-esteem, the General Health Questionnaire (GHQ), and disinhibition. CyberPsychology and Behavior,8(6), 562–570. CrossRef
Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review,79(1), 119–158.
Nobles, M. R., Reyns, B. W., Fox, K. A., & Fisher, B. S. (2012). Protection against pursuit: A conceptual and empirical comparison of cyberstalking and stalking victimization among a national sample. Justice Quarterly,31(6), 986–1014. CrossRef
Orlikowski, W. J., & Gash, D. C. (1994). Technological frames: making sense of information technology in organisations. ACM Transactions on Information Systems,12, 174–207. CrossRef
Pal, R., Golubchik, L., Psounis, K., & Hui, P. (2014). Will cyber-insurance improve network security? A market analysis. In INFOCOM, 2014 proceedings IEEE (pp. 235–243). IEEE.
Pereira, F., & Matos, M. (2015). Cyber-stalking victimization: What predicts fear among portuguese adolescents? European Journal on Criminal Policy and Research, 22(2), 253–270. CrossRef
Phythian, G. J., & King, M. (1992). Developing an expert system for tender enquiry evaluation: A case study. European Journal of Operational Research,56, 15–29. CrossRef
Pinsonneault, A., & Kraemer, K. (1993). Survey research methodology in management information systems: An assessment. Journal of Management Information Systems,10(2), 75–105. CrossRef
Power, D. J., & Sharda, R. (2007). Model-driven decision support systems: Concepts and research directions. Decision Support Systems,43(3), 1044–1061. CrossRef
Reyns, B. W. (2010) Being pursued online: Extent and nature of cyberstalking victimization from a lifestyle/routine activities perspective. A Dissertation Submitted to the: Graduate School of the University of Cincinnati.
Reyns, B., Henson, B., & Fisher, B. (2011). Applying cyberlifestyle–routine activities theory to cyberstalking victimization. Criminal Justice and Behavior,38(11), 1149–1169. CrossRef
Roberts, L. (2008). Jurisdictional and definitional concerns with computer-mediated interpersonal crimes: An analysis on cyber stalking. International Journal of Cyber Criminology,2(1), 271–285.
Sen, S., & Bhattacharya, C. (2001). Does doing good always lead to doing better? Consumer reactions to corporate social responsibility. Journal of Marketing Research,38(2), 225–243. CrossRef
Simpson, B., & Wilson, M. (1999). Shared cognition: Mapping commonality and individuality. Advances in Qualitative Organizational Research,2, 73–96.
Slonje, R., & Smith, P. K. (2008). Cyberbullying: Another main type of bullying? Scandinavian Journal of Psychology,49(2), 147–154. CrossRef
Smoker, M., & March, E. (2017). Predicting perpetration of intimate partner cyberstalking: Gender and the Dark Tetrad. Computers in Human Behavior,72, 390–396. CrossRef
Sovern, Jeff. (1999). Opting in, opting out, or no options at all: The fight for control of personal information. Washington Law Review,74, 1033.
Spitzberg, B. H., & Hoobler, G. (2002). Cyberstalking and the technologies of interpersonal terrorism. New Media and Society,4(1), 67–92. CrossRef
Spitzberg, B., Marshall, L., & Cupach, W. (2001). Obsessive relational intrusion, coping, and sexual coercion victimization. Communication Reports,14(1), 19–30. CrossRef
Spitzberg, B., Nicastro, A., & Cousins, A. (1998). Exploring the interactional phenomenon of stalking and obsessive relational intrusion. Communication Reports,11(1), 33–48. CrossRef
Spitzberg, B., & Rhea, J. (1999). Obsessive relational intrusion and sexual coercion victimization. Journal of Interpersonal Violence,14(1), 3–20. CrossRef
Story, L. & Stone, B. (2007); Facebook retreats on online tracking. www.nytimes.com.
Tavani, H., & Grodzinsky, F. (2002). Cyberstalking, personal privacy, and moral responsibility. Ethics and Information Technology,4, 123–132. CrossRef
Torkzadeh, G., & Dhillon, G. (2002). Measuring factors that influence the success of internet commerce. Information Systems Research,13, 187–204. CrossRef
Tufekci, Zeynep. (2008). Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science, Technology and Society,28, 20–36. CrossRef
US Attorney General (1999) Cyberstalking: A new challenge for law enforcement and industry. Report from the Attorney General to the Vice President.
Walsham, G. (1995). Interpretive case studies in IS research: nature and method. European Journal of Information Systems,4, 74–81. CrossRef
- Defining Objectives for Preventing Cyberstalking
Kane J. Smith
- Springer Netherlands
- Journal of Business Ethics
Print ISSN: 0167-4544
Elektronische ISSN: 1573-0697
Neuer Inhalt/© Stellmach, Neuer Inhalt/© BBL, Neuer Inhalt/© Maturus, Pluta Logo/© Pluta, Neuer Inhalt/© hww, Neuer Inhalt/© julien tromeur | Fotolia