{"id":"https://openalex.org/W1527007252","doi":"https://doi.org/10.15394/jdfsl.2007.1025","title":"An Exploratory Analysis of Computer Mediated Communications on Cyberstalking Severity","display_name":"An Exploratory Analysis of Computer Mediated Communications on Cyberstalking Severity","publication_year":2007,"publication_date":"2007-01-01","ids":{"openalex":"https://openalex.org/W1527007252","doi":"https://doi.org/10.15394/jdfsl.2007.1025","mag":"1527007252"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.15394/jdfsl.2007.1025","pdf_url":"https://commons.erau.edu/cgi/viewcontent.cgi?article=1025&context=jdfsl","source":{"id":"https://openalex.org/S2764592663","display_name":"\u0098The \u009cjournal of digital forensics, security and law","issn_l":"1558-7215","issn":["1558-7215","1558-7223"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310316352","host_organization_name":"Association of Digital Forensics, Security and Law","host_organization_lineage":["https://openalex.org/P4310316352"],"host_organization_lineage_names":["Association of Digital Forensics, Security and Law"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://commons.erau.edu/cgi/viewcontent.cgi?article=1025&context=jdfsl","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011003263","display_name":"Stephen Barnes","orcid":"https://orcid.org/0000-0001-6837-1674"},"institutions":[{"id":"https://openalex.org/I115475287","display_name":"Oklahoma State University","ror":"https://ror.org/01g9vbr38","country_code":"US","type":"funder","lineage":["https://openalex.org/I115475287"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Stephen Barnes","raw_affiliation_strings":["Spears School of Business#R##N#Oklahoma State University"],"affiliations":[{"raw_affiliation_string":"Spears School of Business#R##N#Oklahoma State University","institution_ids":["https://openalex.org/I115475287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078080387","display_name":"David Biros","orcid":null},"institutions":[{"id":"https://openalex.org/I115475287","display_name":"Oklahoma State University","ror":"https://ror.org/01g9vbr38","country_code":"US","type":"funder","lineage":["https://openalex.org/I115475287"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Biros","raw_affiliation_strings":["Spears School of Business#R##N#Oklahoma State University"],"affiliations":[{"raw_affiliation_string":"Spears School of Business#R##N#Oklahoma State University","institution_ids":["https://openalex.org/I115475287"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":0,"currency":"USD","value_usd":0},"apc_paid":{"value":0,"currency":"USD","value_usd":0},"fwci":0.845,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":4,"citation_normalized_percentile":{"value":0.836365,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":76,"max":78},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T13582","display_name":"Stalking, Cyberstalking, and Harassment","score":1.0,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T13582","display_name":"Stalking, Cyberstalking, and Harassment","score":1.0,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12335","display_name":"Sexuality, Behavior, and Technology","score":0.9959,"subfield":{"id":"https://openalex.org/subfields/3203","display_name":"Clinical Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9902,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stalking","display_name":"Stalking","score":0.9569129},{"id":"https://openalex.org/keywords/computer-mediated-communication","display_name":"Computer-Mediated Communication","score":0.43993393}],"concepts":[{"id":"https://openalex.org/C2778030639","wikidata":"https://www.wikidata.org/wiki/Q163942","display_name":"Stalking","level":2,"score":0.9569129},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.6868287},{"id":"https://openalex.org/C164850336","wikidata":"https://www.wikidata.org/wiki/Q3685487","display_name":"Interpersonal communication","level":2,"score":0.6836513},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5444837},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.5173599},{"id":"https://openalex.org/C91034043","wikidata":"https://www.wikidata.org/wiki/Q223642","display_name":"Interpersonal relationship","level":2,"score":0.51148546},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.49329394},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.44956043},{"id":"https://openalex.org/C109778625","wikidata":"https://www.wikidata.org/wiki/Q796573","display_name":"Computer-mediated communication","level":3,"score":0.43993393},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.39181197},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32291955},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.13147664},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.12992641},{"id":"https://openalex.org/C73484699","wikidata":"https://www.wikidata.org/wiki/Q161733","display_name":"Criminology","level":1,"score":0.10560259},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10252893},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.092690885},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.15394/jdfsl.2007.1025","pdf_url":"https://commons.erau.edu/cgi/viewcontent.cgi?article=1025&context=jdfsl","source":{"id":"https://openalex.org/S2764592663","display_name":"\u0098The \u009cjournal of digital forensics, security and law","issn_l":"1558-7215","issn":["1558-7215","1558-7223"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310316352","host_organization_name":"Association of Digital Forensics, Security and Law","host_organization_lineage":["https://openalex.org/P4310316352"],"host_organization_lineage_names":["Association of Digital Forensics, Security and Law"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://doaj.org/article/6b65060865154d1ca8f5f74c97ca1a4a","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://commons.erau.edu/jdfsl/vol2/iss3/1","pdf_url":null,"source":{"id":"https://openalex.org/S4377196356","display_name":"Scholarly Commons (Embry\u2013Riddle Aeronautical University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I84475105","host_organization_name":"Embry\u2013Riddle Aeronautical University","host_organization_lineage":["https://openalex.org/I84475105"],"host_organization_lineage_names":["Embry\u2013Riddle Aeronautical University"],"type":"repository"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.15394/jdfsl.2007.1025","pdf_url":"https://commons.erau.edu/cgi/viewcontent.cgi?article=1025&context=jdfsl","source":{"id":"https://openalex.org/S2764592663","display_name":"\u0098The \u009cjournal of digital forensics, security and law","issn_l":"1558-7215","issn":["1558-7215","1558-7223"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310316352","host_organization_name":"Association of Digital Forensics, Security and Law","host_organization_lineage":["https://openalex.org/P4310316352"],"host_organization_lineage_names":["Association of Digital Forensics, Security and Law"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.76,"display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":65,"referenced_works":["https://openalex.org/W1008827052","https://openalex.org/W116938071","https://openalex.org/W121592505","https://openalex.org/W1495133141","https://openalex.org/W1496596930","https://openalex.org/W1497289281","https://openalex.org/W1506366602","https://openalex.org/W1513789147","https://openalex.org/W1555602166","https://openalex.org/W1562024601","https://openalex.org/W1571750337","https://openalex.org/W1662240627","https://openalex.org/W1966343781","https://openalex.org/W1990474114","https://openalex.org/W1991234859","https://openalex.org/W1992838205","https://openalex.org/W1997564913","https://openalex.org/W2000219962","https://openalex.org/W2002619618","https://openalex.org/W2010169953","https://openalex.org/W2015476624","https://openalex.org/W2020213850","https://openalex.org/W2021843428","https://openalex.org/W2023532130","https://openalex.org/W2023945620","https://openalex.org/W2029408962","https://openalex.org/W2050803532","https://openalex.org/W2053541123","https://openalex.org/W2059889410","https://openalex.org/W2062866147","https://openalex.org/W2066358461","https://openalex.org/W2074591739","https://openalex.org/W2084947779","https://openalex.org/W2090608843","https://openalex.org/W2094407083","https://openalex.org/W2099992083","https://openalex.org/W2104081895","https://openalex.org/W2105205336","https://openalex.org/W2108752510","https://openalex.org/W2115722080","https://openalex.org/W2131191147","https://openalex.org/W2134157044","https://openalex.org/W2134750673","https://openalex.org/W2137192220","https://openalex.org/W2139115720","https://openalex.org/W2150054279","https://openalex.org/W2157093800","https://openalex.org/W2163319264","https://openalex.org/W2168250407","https://openalex.org/W2168853343","https://openalex.org/W2170434746","https://openalex.org/W2171235727","https://openalex.org/W2303841070","https://openalex.org/W235804046","https://openalex.org/W2476065884","https://openalex.org/W2490837405","https://openalex.org/W252698731","https://openalex.org/W2576297379","https://openalex.org/W2611228377","https://openalex.org/W2908934668","https://openalex.org/W3002103217","https://openalex.org/W3094202663","https://openalex.org/W3142757386","https://openalex.org/W3154522589","https://openalex.org/W4231223972"],"related_works":["https://openalex.org/W3048968805","https://openalex.org/W2563120717","https://openalex.org/W2381515849","https://openalex.org/W2373901468","https://openalex.org/W2369624109","https://openalex.org/W2352062312","https://openalex.org/W2349430399","https://openalex.org/W2137183245","https://openalex.org/W2111782739","https://openalex.org/W2072855285"],"abstract_inverted_index":{"The":[0],"interaction":[1,67],"between":[2,68,134,146],"disjunctive":[3,81],"interpersonal":[4,44],"relationships,":[5,45],"those":[6],"where":[7],"the":[8,11,15,18,21,41,49,66,94,105,132,143,147,150],"parties":[9],"to":[10,91],"relationship":[12,133,145],"disagree":[13],"on":[14,99,112],"goals":[16],"of":[17,23,43,62,80,96,108,122],"relationship,":[19],"and":[20,46,73,103,137,142,149,156],"use":[22,129],"computer":[24,69],"mediated":[25,70],"communications":[26,55,71],"channels":[27,38,98],"is":[28,51,76,126,159],"a":[29,60,77,118],"relatively":[30],"unexplored":[31],"domain.":[32],"Bargh":[33],"(2002)":[34],"suggests":[35,59],"that":[36,48,64],"CMC":[37,97,109,138],"can":[39],"amplify":[40],"development":[42],"notes":[47],"effect":[50],"not":[52],"constant":[53],"across":[54],"activities.":[56],"This":[57],"proposal":[58],"line":[61],"research":[63,158],"explores":[65],"(CMC)":[72],"stalking,":[74],"which":[75],"common":[78],"form":[79],"relationships.":[82],"Field":[83],"data":[84],"from":[85],"cyberstalking":[86],"cases":[87],"will":[88],"be":[89],"used":[90],"look":[92],"at":[93],"effects":[95],"stalking":[100,123],"case":[101,124,135],"severity,":[102],"exploring":[104,131],"relative":[106],"impacts":[107],"channel":[110],"characteristics":[111],"such":[113],"cases.":[114],"To":[115],"accomplish":[116],"this,":[117],"ratio":[119],"scaled":[120],"measure":[121],"severity":[125,136],"proposed":[127],"for":[128],"in":[130],"media":[139],"characteristics,":[140],"anonymity,":[141],"prior":[144],"stalker":[148],"victim.":[151],"Expected":[152],"results":[153],"are":[154],"identified,":[155],"follow-up":[157],"proposed.":[160]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1527007252","counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-03-17T09:54:19.406788","created_date":"2016-06-24"}