Home / Research / Technology-Assisted Abuse & Internet Crimes

Research: Technology-Assisted Abuse & Internet Crimes

The research highlighted in this area explores the ways that abusers and perpetrators use technology to harass, threaten, surveille, exploit, and violate their victim(s). Some technology-assisted abuse is also referred to as cyberstalking or cyberbullying.

If for any reason you cannot find what you're searching for, please send us a materials request via our online contact form.

February 2013
This fact sheet presents data from various studies to highlight emerging issues facing tweens and teens.
Authors: Futures Without Violence
Updated June 2011
This article offers information about cyberbullying, describing what it is, why it has become such a problem, and ways that individuals can protect themselves from cyberbullies.
Authors: Mindi McDowell
2011
This study provides an in-depth look at the prevalence of digital abuse among young people. It was designed to quantify how young people are affected by and respond to issues like sexting, digital harassment and digital dating abuse.
Authors: Janice Gatti
June 22, 2010
This document addresses legal and practical issues related to the practice colloquially known as sexting. It discusses the statutory and constitutional framework for child pornography and obscenity, and reviews current and pending legislation meant to address sexting.
Authors: Dena Sacco, Rebecca Argudin, James Maguire, Kelly Tallong and Cyberlaw Clinic
2010
This paper describes how the Internet has become a resource for sex traffickers to sell women and children for sexual exploitation while concealing their own identities and recommends the implementation of international human rights law explicitly criminalizing Internet-facilitated sex trafficking.
Authors: Erin I. Kunze
January 2009
This report presents findings on nonfatal stalking victimization in the United States, based on the largest data collection of such behavior to date.
Authors: Katrina Baum, Shannan Catalano, Michael Rand, and Kristina Rose
2008
This article summarizes current research on online sexual victimization and compares it to media accounts.
Authors: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell, & Michele L. Ybarra
August 2007
This research note describes the use of a broad range of technologies in intimate partner stalking, including cordless and cellular telephones, fax machines, e-mail, Internet-based harassment, global positioning systems, spy ware, video cameras, and online databases.
Authors: Cynthia Southworth, Jerry Finn, Shawndell Dawson, Cynthia Fraser, and Sarah Tucker
November 2006
This U.S. Attorney's Bulletin contains articles dealing with establishing federal jurisdiction, evidence gathering, child victim issues, and other subjects related to internet pornography and child sexual exploitation.
Authors: United States Department of Justice
December 2005
The results of a study of 354 adult internet users, to measure their understanding and awareness of online security issues and examine their firewall settings, anti-virus software, potential virus infections, parental control software, and spyware.
Authors: Conducted by America Online and the National Cyber Security Alliance