• Adult Children Exposed to Domestic Violence
  • Runaway & Homeless Youth Toolkit
  • Violence Against Women Resource Library
  • Domestic Violence Awareness Project
  • Building Comprehensive Solutions
  • National Resource Center on Domestic Violence
Home / Research / Technology-Assisted Abuse & Internet Crimes

Research: Technology-Assisted Abuse & Internet Crimes

The research highlighted in this area explores the ways that abusers and perpetrators use technology to harass, threaten, surveille, exploit, and violate their victim(s). Some technology-assisted abuse is also referred to as cyberstalking or cyberbullying.

If for any reason you cannot find what you're searching for, please send us a materials request via our online contact form.

February 2013
This fact sheet presents data from various studies to highlight emerging issues facing tweens and teens.
Authors: Futures Without Violence
Updated June 2011
This article offers information about cyberbullying, describing what it is, why it has become such a problem, and ways that individuals can protect themselves from cyberbullies.
Authors: Mindi McDowell
This study provides an in-depth look at the prevalence of digital abuse among young people. It was designed to quantify how young people are affected by and respond to issues like sexting, digital harassment and digital dating abuse.
Authors: Janice Gatti
October 2010
This publication, which was supported by the National Institute of Justice, discusses what partner stalking is and provides statistics.
Authors: T.K. Logan
June 22, 2010
This document addresses legal and practical issues related to the practice colloquially known as sexting. It discusses the statutory and constitutional framework for child pornography and obscenity, and reviews current and pending legislation meant to address sexting.
Authors: Dena Sacco, Rebecca Argudin, James Maguire, Kelly Tallong and Cyberlaw Clinic
This paper describes how the Internet has become a resource for sex traffickers to sell women and children for sexual exploitation while concealing their own identities and recommends the implementation of international human rights law explicitly criminalizing Internet-facilitated sex trafficking.
Authors: Erin I. Kunze
January 2009
This report presents findings on nonfatal stalking victimization in the United States, based on the largest data collection of such behavior to date.
Authors: Katrina Baum, Shannan Catalano, Michael Rand, and Kristina Rose
This article summarizes current research on online sexual victimization and compares it to media accounts.
Authors: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell, & Michele L. Ybarra
August 2007
This research note describes the use of a broad range of technologies in intimate partner stalking, including cordless and cellular telephones, fax machines, e-mail, Internet-based harassment, global positioning systems, spy ware, video cameras, and online databases.
Authors: Cynthia Southworth, Jerry Finn, Shawndell Dawson, Cynthia Fraser, and Sarah Tucker
November 2006
This U.S. Attorney's Bulletin contains articles dealing with establishing federal jurisdiction, evidence gathering, child victim issues, and other subjects related to internet pornography and child sexual exploitation.
Authors: United States Department of Justice