Victims of cyberstalking: an exploratory study of harassment perpetrated via the Internet

Paul Bocij

Research output: Contribution to journalArticlepeer-review


This paper describes the first study to focus exclusively on the prevalence and impact of cyberstalking. A Web-based questionnaire was used to collect data from a group of respondents who were recruited by snowball sampling via e-mail. A total of 169 respondents completed the questionnaire. The results of the study found that approximately a third of respondents might be considered victims of cyberstalking. Furthermore, when asked to indicate the level of distress felt as a result of their experiences, almost a quarter of respondents chose a value of ten on a ten-point scale.
The study also suggests a number of differences between cyberstalking and offline stalking, for instance cyberstalking tends to take place over a shorter period of time than offline stalking and cyberstalking victims are less likely to know the identify of their harassers. These differences add weight to the argument that cyberstalking should be seen as a new form of deviant behaviour that can be distinguished from offline stalking. The work concludes by emphasising a need for further research.
Original languageEnglish
JournalFirst Monday
Issue number10
Publication statusPublished - Oct 2002

Bibliographical note

All of First Monday's current and archival content is available freely to anyone with Internet connectivity. First Monday's content is completely available in line with notions of open access as expressed in the Budapest Open Access Initiative and related statements and declarations. Authors retain the rights to their work published in First Monday and may freely make their papers available as they see fit. Contributors to First Monday are encouraged to dedicate their work to the public domain or to select a Creative Commons license. Further details can be found at


Dive into the research topics of 'Victims of cyberstalking: an exploratory study of harassment perpetrated via the Internet'. Together they form a unique fingerprint.

Cite this