Show simple item record



Item Description

dc.contributor.author Tokunaga, Robert S en_US
dc.date.accessioned 2011-07-22T00:14:48Z en_US
dc.date.available 2011-07-22T00:14:48Z en_US
dc.date.issued 2007 en_US
dc.identifier.uri http://hdl.handle.net/10125/20905 en_US
dc.description Thesis (M.A.)--University of Hawaii at Manoa, 2007. en_US
dc.description Includes bibliographical references (leaves 78-84). en_US
dc.description viii, 84 leaves, bound ill. 29 cm en_US
dc.description.abstract The current study explored how victims of Internet-related stalking crimes cope with relational intrusions. Using a communication privacy management framework, research questions examined strategies that victims used in response to the relational pursuit, the effectiveness of these strategies, and the relationship between the coping strategies and the online obsessive relational intrusion behaviors. Participants were either college students who were victims of online pursuits or victims who were directed to an online survey from a support website for cyberstalking victims. The results indicated that victims used eight coping strategies, of which ignore/avoidance, technological disassociation/disengagement, and help-seeking, were the most common. A technological privacy maintenance strategy was perceived as the most effective of all the strategies. The association between the eight coping strategies and 19 online relationally intrusive behaviors, and implications for the broader domain of privacy management and mediated communication are discussed. en_US
dc.language.iso en-US en_US
dc.relation Theses for the degree of Master of Arts (University of Hawaii at Manoa). Speech; no. 3428 en_US
dc.rights All UHM dissertations and theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission from the copyright owner. en_US
dc.subject Cyberstalking en_US
dc.title Cyber-intrusions : strategies of coping with online obsessive relational intrusion en_US
dc.type Thesis en_US
dc.type.dcmi Text en_US

Item File(s)

Description Files Size Format View
Restricted for viewing only M.A.CB5.H3_3428_r.pdf 2.264Mb PDF View/Open
For UH users only M.A.CB5.H3_3428_uh.pdf 2.258Mb PDF View/Open

This item appears in the following Collection(s)

Show simple item record

Search


Advanced Search

Browse

My Account

Statistics

About