Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Paul Bocij is active.

Publication


Featured researches published by Paul Bocij.


The Police Journal | 2003

Cyberstalking: the technology of hate

Paul Bocij; Leroy McFarlane

This article discusses the emergence of cyberstalking as a means of victimising individuals and minority groups. However, rather than focusing on the activities of far-right groups, we discuss how technology can encourage individuals to harass others. The central argument made is that technology both enables and invites participation in criminal or antisocial behaviour from individuals who would not normally take part in such activities. One way in which this can be explained is by suggesting that some of the social and technological characteristics of the Internet act together in order to lower inhibitions and establish new norms. For instance, the anonymity offered by the Internet enables people to participate in activities such as encouraging violence against others with little fear of retaliation. In addition, by allowing a cyberstalker to harm another person at a distance, the victim is effectively depersonalised. In this way it can be argued that some of those who sympathise with the goals of far-right organisations may be reluctant to act in the offline world but more willing to act in the online world.


The British Journal of Forensic Practice | 2003

Cyberstalking: a case study of serial harassment in the UK

Paul Bocij; Helen Bocij; Leroy McFarlane

This paper presents the first academic case study of a UK cyberstalking incident that involved an individual known to have harassed at least four victims. The case study describes how the harasser selected victims, his use of technology to gather confidential information about them and his use of multiple personalities as part of the process of harassment. The discussion section of the paper raises a broad range of issues, including whether the case represents a genuine cyberstalking incident, how technology was used to assist the harassers activities and how the harasser attempted to avoid detection


The Police Journal | 2003

The internet:a discussion of some new and emerging threats to young people

Paul Bocij; Leroy McFarlane

The Internet poses a number of threats to the safety of young people. Using numerous examples, this article discusses a wide range of such threats, including: cyberstalking; the ‘grooming’ of potential victims of sexual abuse; a new ‘wish list’ scene (where teenagers encourage contact with potential abusers); the creation and distribution of child pornography; and the emergence of services that create child pornography to order. It is suggested that the last has provided individuals with the ability to inflict sexual abuse on young people from a distance, an act the authors have termed virtual sex tourism. The final section of the article suggests that paedophiles and pornographers have been quick to adopt new technology as a means of concealing their activities. The article concludes by warning of the danger of overestimating or underestimating the threats described.


The British Journal of Forensic Practice | 2005

Reactive stalking:a new perspective on victimisation

Paul Bocij

Although much has been learnt about the psychological and physical harm caused to victims of stalking and cyberstalking, relatively little is known about the impact of stalking on social behaviour and relationships. This paper argues that victims of stalking sometimes go on to employ stalking behaviours against others. Although often arising from an instinctive need for self-protection, such reactive stalking can be defensive or offensive in nature. Those who engage in such behaviour may do so from a need to assert control over their lives, or from fear of further victimisation. In pursuing this argument, a case study is used to illustrate the behaviours described. The case study focuses on the experiences of three stalking victims and describes attempts to victimise the author during his research. The article also discusses some of the implications of reactive stalking for the criminal justice system and the way in which victims receive support.


Safer Communities | 2003

Cyberstalking: a matter for community safety but the numbers do not add up

Paul Bocij; Leroy McFarlane

The advent of the internet has led to the new phenomenon of ‘cyberstalking’. This paper examines the extent of this problem. It is argued that all of the estimates commonly cited are flawed because they rely on inaccurate or outdated information or are based on a number of unproven assumptions. Although some estimates suggest that there may be as many as 10 million victims in the United States and Canada alone, available evidence supports a far smaller estimate. It is concluded that additional research is needed to arrive at more accurate and reliable estimates


The Information Society | 2004

Dot.cons: Crime, Deviance and Identity on the Internet, edited by Yvonne Jewkes. Devon: Willan Publishing, 2002. 256 pp.

Paul Bocij

An audio signal processor forms gaps or guard bands in sequences of blocks conveying encoded audio information and time aligns the guard bands with video information. The guard bands are formed to allow for variations in processing or circuit delays so that the routing or switching of different streams of video information with embedded audio information does not result in a loss of any encoded audio blocks.


Archive | 2002

29.95 (paper). ISBN 1-843-92000-X

Dave Chaffey; Simon Hickie; Andrew Greasley; Paul Bocij


Archive | 2008

Business Information Systems: Technology, Development and Management for the E-Business

Paul Bocij; Andrew Greasley; Simon Hickie


Archive | 2004

Business information systems : technology, development and management

Paul Bocij


Journal on Educational Technology | 1999

Cyberstalking: Harassment in the Internet Age and How to Protect Your Family

Paul Bocij; Andrew Greasley

Collaboration


Dive into the Paul Bocij's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dania Comparcini

University of Chieti-Pescara

View shared research outputs
Top Co-Authors

Avatar

Giancarlo Cicolini

University of Chieti-Pescara

View shared research outputs
Top Co-Authors

Avatar

Valentina Simonetti

University of Chieti-Pescara

View shared research outputs
Researchain Logo
Decentralizing Knowledge