Paul Bocij
University of Nottingham
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Paul Bocij.
The Police Journal | 2003
Paul Bocij; Leroy McFarlane
This article discusses the emergence of cyberstalking as a means of victimising individuals and minority groups. However, rather than focusing on the activities of far-right groups, we discuss how technology can encourage individuals to harass others. The central argument made is that technology both enables and invites participation in criminal or antisocial behaviour from individuals who would not normally take part in such activities. One way in which this can be explained is by suggesting that some of the social and technological characteristics of the Internet act together in order to lower inhibitions and establish new norms. For instance, the anonymity offered by the Internet enables people to participate in activities such as encouraging violence against others with little fear of retaliation. In addition, by allowing a cyberstalker to harm another person at a distance, the victim is effectively depersonalised. In this way it can be argued that some of those who sympathise with the goals of far-right organisations may be reluctant to act in the offline world but more willing to act in the online world.
The British Journal of Forensic Practice | 2003
Paul Bocij; Helen Bocij; Leroy McFarlane
This paper presents the first academic case study of a UK cyberstalking incident that involved an individual known to have harassed at least four victims. The case study describes how the harasser selected victims, his use of technology to gather confidential information about them and his use of multiple personalities as part of the process of harassment. The discussion section of the paper raises a broad range of issues, including whether the case represents a genuine cyberstalking incident, how technology was used to assist the harassers activities and how the harasser attempted to avoid detection
The Police Journal | 2003
Paul Bocij; Leroy McFarlane
The Internet poses a number of threats to the safety of young people. Using numerous examples, this article discusses a wide range of such threats, including: cyberstalking; the ‘grooming’ of potential victims of sexual abuse; a new ‘wish list’ scene (where teenagers encourage contact with potential abusers); the creation and distribution of child pornography; and the emergence of services that create child pornography to order. It is suggested that the last has provided individuals with the ability to inflict sexual abuse on young people from a distance, an act the authors have termed virtual sex tourism. The final section of the article suggests that paedophiles and pornographers have been quick to adopt new technology as a means of concealing their activities. The article concludes by warning of the danger of overestimating or underestimating the threats described.
The British Journal of Forensic Practice | 2005
Paul Bocij
Although much has been learnt about the psychological and physical harm caused to victims of stalking and cyberstalking, relatively little is known about the impact of stalking on social behaviour and relationships. This paper argues that victims of stalking sometimes go on to employ stalking behaviours against others. Although often arising from an instinctive need for self-protection, such reactive stalking can be defensive or offensive in nature. Those who engage in such behaviour may do so from a need to assert control over their lives, or from fear of further victimisation. In pursuing this argument, a case study is used to illustrate the behaviours described. The case study focuses on the experiences of three stalking victims and describes attempts to victimise the author during his research. The article also discusses some of the implications of reactive stalking for the criminal justice system and the way in which victims receive support.
Safer Communities | 2003
Paul Bocij; Leroy McFarlane
The advent of the internet has led to the new phenomenon of ‘cyberstalking’. This paper examines the extent of this problem. It is argued that all of the estimates commonly cited are flawed because they rely on inaccurate or outdated information or are based on a number of unproven assumptions. Although some estimates suggest that there may be as many as 10 million victims in the United States and Canada alone, available evidence supports a far smaller estimate. It is concluded that additional research is needed to arrive at more accurate and reliable estimates
The Information Society | 2004
Paul Bocij
An audio signal processor forms gaps or guard bands in sequences of blocks conveying encoded audio information and time aligns the guard bands with video information. The guard bands are formed to allow for variations in processing or circuit delays so that the routing or switching of different streams of video information with embedded audio information does not result in a loss of any encoded audio blocks.
Archive | 2002
Dave Chaffey; Simon Hickie; Andrew Greasley; Paul Bocij
Archive | 2008
Paul Bocij; Andrew Greasley; Simon Hickie
Archive | 2004
Paul Bocij
Journal on Educational Technology | 1999
Paul Bocij; Andrew Greasley