Show Me:

An Online Resource Library on Gender-Based Violence.

Stalking Content Topic Results

The results displayed below have been grouped first by VAWnet Special Collections - containing our most highly valued resources - then by individual related materials. Refine your search by category, types, author and/or publisher using the options provided. Sort by date published, date added, or alphabetically. For assistance in locating a resource, use our online contact form.
Results displayed are grouped first by VAWnet Special Collections then by individual related materials. For assistance in locating a resource, use our online contact form.
total results: 94  | date published date added a-z

Materials

Materials
  • General Material
September 2009

The Kentucky Civil Protective Order Study: A Rural and Urban Multiple Perspective Study of Protective Order Violation Consequences, Responses, & Costs

Author(s): Publisher(s):
This study addresses several gaps in the research literature on civil protective orders by examining protective order effectiveness, enforcement, and cost effectiveness.
Materials
  • General Material
  • General Material
June 2009

How to Start and Facilitate a Support Group for Victims of Stalking

Publisher(s):
A guide for victim service providers, volunteers, and other concerned community members on how to initiate and run a stalking support group in their agency or community.
Materials
  • General Material
January 2009

Website Safety: Tips For Advocacy Organizations

Publisher(s):
This handout covers 3 basic steps organizations can take if they work with survivors of sexual assault, domestic violence and stalking: (1) have safety alerts and an escape button on every page of your website; (2) post some general safety tips that alert survivors to risks without educating stalkers about new ways to abuse; and, (3) use web forms that promote informed consent.
Materials
  • General Material
January 2009

High-Tech Stalking

Publisher(s):
Stalkers are increasingly misusing a variety of telephone, surveillance, and computer technologies to harass, terrify, intimidate, coerce, and monitor former and current intimate partners. Perpetrators are also misusing technology to stalk before, during, and after perpetrating sexual violence.
Materials
  • General Material
January 2009

Domestic Abuse, Stalking and Harassment and Honour Based Violence (DASH, 2009) Risk Identification and Assessment and Management Model

Author(s): Publisher(s):
This document describes the DASH risk assessment tool that was designed for practitioners who work with victims of domestic abuse in the UK in order to help them identify those who are at high risk of harm.
Materials
  • General Material
January 2009

ABA Standards of Practice for Lawyers Representing Victims of Domestic Violence, Sexual Assault, and Stalking in Civil Protection Order Cases

Publisher(s):
This document offers guidelines as 'a reference tool' for legal service providers representing victims of domestic violence, sexual assault, and stalking in civil protection cases. The standards of practice cover a wide range of abuses, including elder abuse.
Materials
  • General Material
January 2009

CAADA Domestic Abuse, Stalking and 'Honour'-based Violence (DASH) Risk Identification Checklist

Author(s): Publisher(s):
This checklist is a consistent and simple to use tool for practitioners who work with victims of domestic abuse in order to help them identify those who are at high risk of harm and whose cases should be referred to a Multi-Agency Risk Assessment Conference (MARAC) meeting in order to manage the risk.
Materials
  • General Material
April 2008

First Response to Victims of Crime: A Guidebook for Law Enforcement Officers

Author(s): Publisher(s):
This guide book offers user-friendly information for law enforcement on how to respond to a wide range of victims. It attempts to highlight the most salient issues involved for victims of certain crimes and for certain populations of victims.
Materials
  • General Material
February 2008

Winning U Visas: Getting the Law Enforcement Certification

Author(s):
This paper describes the requirements for U visas and emphasizes the need for practitioners to establish a good working relationship with law enforcement officers and help build trust between immigrant survivors of domestic violence and the law enforcement system. The article provides strategies for collaborating with local law enforcement.
Materials
  • General Material
January 2008

Data Security Checklist to Increase Victim Safety & Privacy

Publisher(s):
For use by local domestic violence and rape crisis service programs and other community service providers, this checklist is a starting point in discussing client safety and data security for agencies. IMPORTANT NOTE: This checklist is not intended to replace intensive training. Please work with your State Domestic Violence and Sexual Assault Coalitions to increase your community's awareness of data security.
Materials
  • General Material
January 2008

Myths & Realities of Identity Change

Publisher(s):
This 2 page handout addresses common issues for victims who are considering changing their identity (e.g. name, U.S. social security number, birth certificate, etc.) as part of an attempt to remain safe and hidden from an abuser or stalker. It dispels seven common myths by describing realities of what can happen after an identity change and by providing introductory tips on protecting your identity.
Materials
  • General Material
January 2008

Technology Safety Planning with Survivors: Tips to discuss if someone you know is in danger

Publisher(s):
This handout provides some simple but critical tips about phone, computer, email, instant messaging and other technology use to discuss if someone you know is in danger. Available in English, Spanish, Chinese, Korean, Vietnamese, Somali, and Russian.