Feeds

'Being cyber-stalked is as bad as being raped, or in a war'

Amazing claim from, erm, a new cyberstalk research centre

Choosing a cloud hosting partner with confidence

A new survey into the phenomenon of cyber-stalking has made the remarkable claim that many victims of online or other electronic harassment suffer from Post Traumatic Stress Disorder (PTSD) in very much the same way as soldiers who have been in combat or people who have been raped.

The new report, "Cyberstalking in the United Kingdom", has just been put out by the new National Centre for Cyberstalking Research at Bedfordshire uni. It is the work of computing profs Carsten Marple and Antony Brown, and trick-cyclist Emma Short, and a final draft copy can be read here in PDF (38-page/3.1MB). It draws on survey data to deliver various statistics and claims, but the headliner is this one (our emphasis):

The results indicate that the prevalence of PTSD following cyber-stalking exceeds the occurrence in a general population following trauma and is comparable to other extreme specific traumatic events such as sexual assault and combat ... the victims' reactions are of a negative nature and include fear, stress, anxiety, as well as an erosion of trust in the self and other people.

"The psychological effects can be devastating, producing verifiable psychological trauma and damage, regardless of whether the victim ever actually meets their harasser," write the authors, all of whom work at the National Centre for Cyberstalking Research.

"One clear message from the data collected is that many of the victims of cyber harassment are frustrated with the lack of help and support they feel is available," they add. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
Google's whois results say it's a lousy smut searcher
Run whois google.com or whois microsoft.com. We dare you, you PIG◙◙◙◙ER
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.