{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T13:06:35Z","timestamp":1775826395077,"version":"3.50.1"},"reference-count":48,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,1]]},"abstract":"<jats:p>Within the UK, cyber-harassment is a criminal act and perpetrators can be prosecuted if the crime is reported to the police. Cyber-harassment has a detrimental impact and causes psychological distress to victims but due to its online nature, complaints made may not be taken seriously and the impact may not be fully acknowledged. Police officers' perceptions of this crime and its victims are crucial as this will impact on how the crime is investigated and whether perpetrators are prosecuted. The present exploratory study aimed to gain insight into how cyber-harassment is investigated and identify issues and barriers. Eight police officers based in the United Kingdom were recruited using a snowball technique to participate in semi-structured interviews. The data were analyzed using thematic analysis and three themes were identified: online accessibility, threat, and the unhelpful victim. Each theme is discussed in relation to theory, policy and legislation within the UK.<\/jats:p>","DOI":"10.4018\/ijt.2017010107","type":"journal-article","created":{"date-parts":[[2017,2,23]],"date-time":"2017-02-23T16:24:08Z","timestamp":1487867048000},"page":"87-102","source":"Crossref","is-referenced-by-count":13,"title":["UK-Based Police Officers' Perceptions of, and Role in Investigating, Cyber-Harassment as a Crime"],"prefix":"10.4018","volume":"8","author":[{"given":"Catherine M","family":"Millman","sequence":"first","affiliation":[{"name":"Public Health Agency, Belfast, Ireland"}]},{"given":"Belinda","family":"Winder","sequence":"additional","affiliation":[{"name":"Department of Psychology, Nottingham Trent University, Nottingham, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8880-6524","authenticated-orcid":true,"given":"Mark D.","family":"Griffiths","sequence":"additional","affiliation":[{"name":"International Gaming Research Unit, Psychology Division, Nottingham Trent University, Nottingham, UK"}]}],"member":"2432","reference":[{"key":"IJT.2017010107-0","doi-asserted-by":"publisher","DOI":"10.1177\/146879410100100307"},{"key":"IJT.2017010107-1","article-title":"Regulating cyberstalking","author":"S.Basu","year":"2007","journal-title":"Crimes of the Internet"},{"key":"IJT.2017010107-2","doi-asserted-by":"publisher","DOI":"10.1177\/0886260502017001004"},{"key":"IJT.2017010107-3","author":"P.Bocij","year":"2004","journal-title":"Cyberstalking: Harassment in the Internet Age and How to Protect Your Family"},{"key":"IJT.2017010107-4","first-page":"3","article-title":"Cyberstalking: A new challenge for criminal law.","volume":"122","author":"P.Bocij","year":"2002","journal-title":"The Criminal Lawyer"},{"key":"IJT.2017010107-5","first-page":"26","article-title":"Cyberstalking: A matter for community safety \u2013 but the numbers do not add up.","volume":"2","author":"P.Bocij","year":"2003","journal-title":"Community Safety Journal"},{"key":"IJT.2017010107-6","doi-asserted-by":"crossref","unstructured":"boyd, d. (2006). Friends, friendsters, and top 8: writing community into being on social network sites. First Monday, 11. Retrieved from http:\/\/www.firstmonday.org\/htbin\/cgiwrap\/bin\/ojs\/index.phplfm\/article\/view\/1418\/1336","DOI":"10.5210\/fm.v11i12.1418"},{"key":"IJT.2017010107-7","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"IJT.2017010107-8","doi-asserted-by":"publisher","DOI":"10.1080\/15388220.2013.879367"},{"key":"IJT.2017010107-9","author":"H.Brown","year":"2000","journal-title":"Stalking and Other Forms of Harassment: An Investigator\u2019s Guide. Metropolitan Police Service"},{"key":"IJT.2017010107-10","author":"T.Budd","year":"2000","journal-title":"The extent and nature of stalking: Findings from the 1998 British Crime Survey. (Home Office Research, Research Study No. 210)"},{"key":"IJT.2017010107-11","doi-asserted-by":"publisher","DOI":"10.1002\/9780470713037.ch12"},{"key":"IJT.2017010107-12","doi-asserted-by":"publisher","DOI":"10.1177\/088626097012003007"},{"key":"IJT.2017010107-13","author":"W. R.Cupach","year":"2004","journal-title":"The Dark Side of Relationship Pursuit: From Attraction to Obsession and Stalking"},{"key":"IJT.2017010107-14","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.32.5.554"},{"key":"IJT.2017010107-15","doi-asserted-by":"publisher","DOI":"10.1080\/016128499248448"},{"key":"IJT.2017010107-16","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2012.0231"},{"key":"IJT.2017010107-17","author":"W.Dutton","year":"2007","journal-title":"The Internet in Britain: 2007"},{"key":"IJT.2017010107-18","doi-asserted-by":"publisher","DOI":"10.1177\/0886260503262083"},{"key":"IJT.2017010107-19","doi-asserted-by":"publisher","DOI":"10.1520\/JFS14178J"},{"key":"IJT.2017010107-20","doi-asserted-by":"publisher","DOI":"10.1007\/s10433-008-0083-7"},{"key":"IJT.2017010107-21","doi-asserted-by":"publisher","DOI":"10.1002\/j.1556-6678.2004.tb00325.x"},{"key":"IJT.2017010107-22","first-page":"687","article-title":"Cyberstalking: A cause for police concern?","volume":"163","author":"M.Griffiths","year":"1999","journal-title":"Justice of the Peace"},{"key":"IJT.2017010107-23","doi-asserted-by":"publisher","DOI":"10.1177\/026455059804500303"},{"key":"IJT.2017010107-24","doi-asserted-by":"publisher","DOI":"10.1080\/13218719809524927"},{"key":"IJT.2017010107-25","year":"1997","journal-title":"Protection from Harassment Act 1997"},{"key":"IJT.2017010107-26","year":"2012","journal-title":"Protection of Freedoms Act 2012"},{"key":"IJT.2017010107-27","doi-asserted-by":"publisher","DOI":"10.1002\/ejsp.36"},{"key":"IJT.2017010107-28","doi-asserted-by":"publisher","DOI":"10.1207\/s15327752jpa8202_5"},{"key":"IJT.2017010107-29","doi-asserted-by":"publisher","DOI":"10.17148\/IJARCCE.2016.5106"},{"key":"IJT.2017010107-30","first-page":"293","article-title":"Combining qualitative and quantitative methods in research practice: Purposes and advantages.","volume":"3","author":"U.Kelle","year":"2006","journal-title":"Qualitative Research in Psychology"},{"key":"IJT.2017010107-31","doi-asserted-by":"publisher","DOI":"10.1177\/0146167201275002"},{"key":"IJT.2017010107-32","author":"M.Miles","year":"1994","journal-title":"Qualitative Data Analysis: An expanded sourcebook"},{"key":"IJT.2017010107-33","author":"S.Morris","year":"2002","journal-title":"Stalking and Harassment in Scotland. Research Findings No. 67\/2002"},{"key":"IJT.2017010107-34","author":"R.O\u2019Connell","year":"2004","journal-title":"Cyberstalking, Abusive Cyber Sex and Online Grooming"},{"key":"IJT.2017010107-35","doi-asserted-by":"publisher","DOI":"10.1016\/S1359-1789(96)00011-0"},{"key":"IJT.2017010107-36","doi-asserted-by":"publisher","DOI":"10.1177\/1525822X02239569"},{"key":"IJT.2017010107-37","doi-asserted-by":"publisher","DOI":"10.1080\/13600830902812830"},{"key":"IJT.2017010107-38","doi-asserted-by":"publisher","DOI":"10.1080\/10683160701340528"},{"key":"IJT.2017010107-39","doi-asserted-by":"publisher","DOI":"10.11114\/smc.v3i2.970"},{"key":"IJT.2017010107-40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2011.09.009"},{"key":"IJT.2017010107-41","first-page":"253","article-title":"Computer-mediated communication and social identity","author":"R.Spears","year":"2007","journal-title":"The Oxford Handbook of Internet Psychology"},{"key":"IJT.2017010107-42","author":"P.Tjaden","year":"1998","journal-title":"Stalking in America: Findings from the National Violence Against Women Survey. No. 93-IJ-CX-0012"},{"key":"IJT.2017010107-43","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2008.00409.x"},{"key":"IJT.2017010107-44","doi-asserted-by":"publisher","DOI":"10.1080\/13600869855397"},{"key":"IJT.2017010107-45","doi-asserted-by":"publisher","DOI":"10.1177\/1748895807082064"},{"key":"IJT.2017010107-46","author":"M. T.Whitty","year":"2009","journal-title":"Truth, Lies and Trust on the Internet"},{"key":"IJT.2017010107-47","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.425"}],"container-title":["International Journal of Technoethics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=178535","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T00:08:45Z","timestamp":1651795725000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJT.2017010107"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2017,1]]},"references-count":48,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.4018\/ijt.2017010107","relation":{},"ISSN":["1947-3451","1947-346X"],"issn-type":[{"value":"1947-3451","type":"print"},{"value":"1947-346X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1]]}}}