Please use this identifier to cite or link to this item:
Cyber-intrusions : strategies of coping with online obsessive relational intrusion
|M.A.CB5.H3_3428_uh.pdf||Version for UH users||2.31 MB||Adobe PDF||View/Open|
|M.A.CB5.H3_3428_r.pdf||Version for non-UH users. Copying/Printing is not permitted||2.32 MB||Adobe PDF||View/Open|
|Title:||Cyber-intrusions : strategies of coping with online obsessive relational intrusion|
|Authors:||Tokunaga, Robert S.|
|Abstract:||The current study explored how victims of Internet-related stalking crimes cope with relational intrusions. Using a communication privacy management framework, research questions examined strategies that victims used in response to the relational pursuit, the effectiveness of these strategies, and the relationship between the coping strategies and the online obsessive relational intrusion behaviors. Participants were either college students who were victims of online pursuits or victims who were directed to an online survey from a support website for cyberstalking victims. The results indicated that victims used eight coping strategies, of which ignore/avoidance, technological disassociation/disengagement, and help-seeking, were the most common. A technological privacy maintenance strategy was perceived as the most effective of all the strategies. The association between the eight coping strategies and 19 online relationally intrusive behaviors, and implications for the broader domain of privacy management and mediated communication are discussed.|
|Description:||Thesis (M.A.)--University of Hawaii at Manoa, 2007.|
Includes bibliographical references (leaves 78-84).
viii, 84 leaves, bound ill. 29 cm
|Rights:||All UHM dissertations and theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission from the copyright owner.|
|Appears in Collections:||
M.A. - Speech|
M.A. - Communicology
Please email firstname.lastname@example.org if you need this content in ADA-compliant format.
Items in ScholarSpace are protected by copyright, with all rights reserved, unless otherwise indicated.