Reason, relativity, and responsibility in computer ethics
ACM SIGCAS Computers and Society
A Progress Report on Subliminal-Free Channels
Proceedings of the First International Workshop on Information Hiding
Practical Cryptography
Malicious Cryptography: Exposing Cryptovirology
Malicious Cryptography: Exposing Cryptovirology
Anti-Cyberstalking: The Predator and Prey Alert (PAPA) System
SADFE '05 Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering on Systematic Approaches to Digital Forensic Engineering
Designing Information Systems Which Manage or Avoid Privacy Incidents
EuroISI '08 Proceedings of the 1st European Conference on Intelligence and Security Informatics
Hi-index | 0.00 |
Stalking is a pattern of behavior over time in which a stalker seeks to gain access to, or control over, an unwilling victim. Such actions range from the benign to the malicious and may cause emotional distress or harm to the victim. With the widespread adoption of new technologies, new forums of Internet-mediated discourse now exist which offer stalkers unprecedented scope to locate and exert influence over victims. Cyberstalking, the convergence of stalking and cyberspace, has created new challenges for the prevention, detection, and prosecution of this new phenomenon as the traditional methods of detection by witnesses and enforcement through physical restraining orders often are inadequate.In this paper we suggest a cryptographic approach for tracking cyberstalkers. We first define the threat model in terms of the profile of a cyberstalker, as well as legal and law enforcement constraints. We then describe a monitoring system that addresses the basic admissibility requirements of our threat model, by capturing and verifying circumstantial evidence for use in cyberstalking investigations.