<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Machine Learning Framework to Detect And Document Text-based Cyberstalking</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Zinnar Ghasem</string-name>
          <email>zinnar.ghasem@beds.ac.uk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ingo Frommholz</string-name>
          <email>ingo.frommholz@beds.ac.uk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Carsten Maple</string-name>
          <email>carsten.maple@warwick.ac.uk</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Bedfordshire</institution>
          ,
          <country country="UK">UK</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Warwick</institution>
          ,
          <country country="UK">UK</country>
        </aff>
      </contrib-group>
      <fpage>348</fpage>
      <lpage>355</lpage>
      <abstract>
        <p>Cyberstalking is becoming a social and international problem, where cyberstalkers utilise the Internet to target individuals and disguise themselves without fear of any consequences. Several technologies, methods, and techniques are used by perpetrators to terrorise victims. While spam email ltering systems have been e ective by applying various statistical and machine learning algorithms, utilising text categorization and ltering to detect text- and email-based cyberstalking is an interesting new application. There is also the need to gather evidence by the victim. To this end we discuss a framework to detect cyberstalking in messages; short message service, multimedia messaging service, chat, instance messaging and emails, and as well as to support documenting evidence. Our framework consists of ve main modules: a detection module which detects cyberstalking using message categorisation; an attacker identi cation module based on cyberstalkers' previous messages history, personalisation module, aggregator module and messages and evidence collection module. We discuss our ongoing work and how di erent text categorization and machine learning approaches can be applied to identify cyberstalkers.</p>
      </abstract>
      <kwd-group>
        <kwd>Cyberstalking</kwd>
        <kwd>digital forensics</kwd>
        <kwd>email ltering</kwd>
        <kwd>data mining</kwd>
        <kwd>cyberharassment</kwd>
        <kwd>machine learning</kwd>
        <kwd>text categorisation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        With the proliferation of the use of the Internet, cyber security has become a
major concern for users and businesses alike. While communication technologies
have undoubtedly positively changed the way we communicate, it also provides
cybercriminals with methods and techniques to be used for illegitimate purposes
such as the distribution of o ensive and threatening materials [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ], spamming,
phishing, cyberbullying, viruses, harassment and cyberstalking [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ].
Cyberstalking is a complicated and pervasive problem, which a ects and targets a huge
number of individuals [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], and unlike many other cybercrimes, cyberstalking
does not occur on a single occasion [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], rather victims experience repeated,
systematic and multiple attacks. Cyberstalking has been identi ed as a growing
social problem [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], and a global issue [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], to an extent in which it is envisaged
that almost twenty percent of people at one stages of their lives will become
a victim of cyberstalking, where women will more likely become a victim than
men [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] Maple et al. have de ned cyberstalking as a \course of actions
that involves more than one incident perpetrated through or utilising electronic
means that cause distress, fear or alarm". There is evidence that cyberstalking
will increase in both frequency and intensity [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>
        While cybercriminals such as cyberstalkers utilise an array of technologies,
tools and techniques like chat rooms, bulletin boards, newsgroups, instant
messaging (IM ), short message service (SMS ), multimedia messaging service (MMS ),
and trojans, email is one of the most commonly used methods of
cyberstalking [
        <xref ref-type="bibr" rid="ref13 ref15 ref20 ref21">21, 13, 20, 15</xref>
        ]. A cyberstalker can send emails, SMS, IM, MMS, and chat to
threaten, insult, harass, or disrupt e-mail communications by ooding a victim's
e-mail inbox with unwanted mail [
        <xref ref-type="bibr" rid="ref22 ref23">23, 22</xref>
        ] anywhere at any time anonymously
or pseudonymously, without fear of prosecution. This creates a new challenge
for law enforcement and in digital forensic investigation. Anonymity in
communication is one of the main issues exploited by cybercriminals [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Therefore,
cyberstalkers could easily disguise themselves by spoo ng email, and creating
di erent pseudonym accounts mostly from free web mail providers. Similarly
web based gateways are utilised to spoof SMS [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], and di erent anonymous chat
IDs are easily created.
      </p>
      <p>
        These techniques, coupled with the availability of remailers, unauthorised
networks, public library's computers, internet cafs, and free anonymous
communications through websites, in addition to free and unregistered mobile SIM
cards, inexpensive and unregistered mobile handsets, give an upper hand to
cyberstalkers in their attack and complicate the investigation of cyberstalking
cases [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. Cyberstalking prevention with text messages ltering might not be
as e ective as required, because it does not always hold cyberstalkers
accountable for their misuse of emails, and other text-based messages communication.
Therefore identifying the original sender of emails, SMS, MMS, and chat is an
important factor in the prosecution of an attacker [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ].
      </p>
      <p>The discussion so far shows that it is imperative to deal with cyberstalking
on the very earliest stage. We will therefore in the remainder of the paper discuss
a framework to detect cyberstalking in text-based messages and to support the
collection of evidence for law enforcement. Text categorization and analysis plays
a crucial role in our framework.</p>
      <p>The Need to Detect and Document Text-based
Cyberstalking
Text-based cyberstalking includes sending abusive, hate, threatening, harassing
and obscene emails, SMS, chats, MMS, IM, including video and photo;
sending email or MMS with the intention to spread viruses to a victim's device,
either with attachments containing viruses or directing victims to a malicious
website through a hyperlink; taking over victim's email account; sending high
volumes of junk emails, SMS, MMS, Chat and IM. To minimise the e ect of
textbased cyberstalking, we propose a system that monitors, detects, captures and
documents evidence. Such a system requires that we provide means to analyse
textual documents like messages and gather some information from this analysis,
for instance to determine the true authorship of emails when we cannot trust
any email header information. We therefore discuss how text categorization and
processing can be utilized for several aspects of this task.</p>
      <p>
        Our work is inspired by [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] where the authors propose a system that simply
records data within a session, that is duration of victim's computer connection to
and disconnection from Internet. However, their system has major limitations in
handling text-based cyberstalking. We therefore propose a framework to detect
and lter messages and to collect and analyse evidence.
      </p>
      <p>
        A further aim of our system is to assist the victims in documenting evidence
for the initial complain process, as well as to help law enforcement in early stages
of their investigation. In order to persuade authorities to investigate or
prosecute a cyberstalker, the responsibility is often on the victim to produce such
evidence [
        <xref ref-type="bibr" rid="ref21 ref3">21, 3</xref>
        ], thus, it is imperative that the victims save and keep all copies
of communication whether email or other communications and with all their
headers available and readable to be given to law enforcement [
        <xref ref-type="bibr" rid="ref14 ref8">8, 14</xref>
        ]. Such
documentation will clearly demonstrate the course of incident and provide valuable
information for both the investigation and prosecution process [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
      </p>
      <p>
        Therefore an automated system will not only make the initial complaint
process and investigation easier but will also speedup investigations with less e ort.
Furthermore it will encourage victims to come forward and complain to
prosecute a cyberstalker, because \cyberstalking and stalking's victim reporting is an
important consideration for the criminal justice system, not only to guarantee
that o enders are held accountable for their actions, but also to ensure that
crime victims receive the support and services needed"[
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
3
      </p>
    </sec>
    <sec id="sec-2">
      <title>The ACTS Framework</title>
      <p>Our proposed framework is called Anti Cyberstalking Text-based System (ACTS).
To the best of our knowledge it is the rst framework that specialises on the
automatic detection and evidence documentation of text-based cyberstalking. A
prototypical implementation of the framework is under development, and the
data collection process is ongoing. ACTS will, e.g., run on a user's device to
Messages
Emails
MMS
SMS
Chat
IM</p>
      <p>Message</p>
      <p>ID
unwanted
messages</p>
      <p>Legitamate
messages
Personalisation
Module λ
Detection β
Module
Attacker α
Identification
&amp;WPrritoefpilerisnts
Database</p>
      <p>Code
Dictionary
Aggregator
Messages and evidence
col ection Module
0
?
1</p>
      <p>The proposed system utilises text mining, statistical analysis, text
categorization and machine learning to combat cyberstalking. It consists of ve main
modules: detection, attacker identi cation, personalisation, Aggregator and
messages and evidence collection.</p>
      <p>ACTS rst tries to detect cyberstalking based on a message ID list (the
lists is optional for users and initially empty), which is automatically updated
by the system. Messages whose IDs do not appear in the list are examined by
the identi cation, personalisation, and detection modules; the results from three
modules are passed to the aggregator for nal decision.</p>
      <p>Similar to some text categorization based email detection systems which can
identify unwanted email, the detection module is employed to detect potential
cyberstalking text based on their content. The received message is preprocessed
by appying tokenisation, stop-word removal, stemming and presentation. Text
mining techniques are utilised to extract required patterns from the message; a
corresponding supervised algorithm like neural network/support vector machines
is employed to detect and categorise emails to compute a value based on three
outputs, labelled as (00) not cyberstalking, (10) cyberstalking, and (01) grey
email.</p>
      <p>
        The attacker identi cation module is employed to identify whether received
anonymous or pseudonymous messages are written by a cyberstalker or not, and
to detect those messages from cyberstalkers where the message does not contain
any known unwanted words. For this purpose, cyberstalker's writeprints
including lexical, syntactic, structural and content-speci c features [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] will be utilised.
Unfortunately, due to character limitation of short messages like Twitter tweets,
for e.g. SMS is limited to 160 characters per message, writeprints might not
always provide enough information to identify the author of the message.
Nevertheless, because of their characters limitation, people tend to use unstandardised
and informal language abbreviations and other symbols, which mostly depend
on user's choice, subject of discussion and communities [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], where some of these
abbreviations and symbols could provide valuable information in identify the
sender. Thus to overcome this shortcoming and to enhance the identi cation
process, we combines cyberstalker's writeprints with cyberstalker's pro le
including linguistic and behavioural pro les, utilising the existing cyberstalker's
writeprints and pro les history in database.
      </p>
      <p>Above considerations are based on the premise that, by de nition, the victim
must receive more than one attack to constitute cyberstalking. Thus there exist
n messages where n 2 CE fm1; ::::mng and n &gt; 2 which will be used to check
any new arriving message. Intuitively CE will increase as the attack continues.
A number of supervised algorithms have been used in authorship identi cation,
where both authors and a set of their work are known prior to the identi cation
process. Unfortunately, this is not the case in our approach. Identifying
attackers is more challenging, rstly, because it will be implemented on user's device
to detect messages, secondly, because we need to identify and detect the sender
without prior knowledge. The system needs to decide whether a received message
is written by a cyberstalker or not, thus supervised algorithms are not
applicable. For this purpose, principal component analysis (PCA) could be employed
to detect messages based on stylometrics and pro les; the new message's data is
projected on PCA, and compared to the data matrix of all cyberstalking
messages in CE . The result is represented by the value based on three outputs: not
cyberstalking ( r2 ), cyberstalking ( r1 ) and grey (r1 &lt; &lt;r2 ). The
value is passed to the aggregator component. r1 and r2 are pre-de ned threshold
values in attacker identi cation (which have to be determined experimentally).</p>
      <p>
        We also have to take into account that cyberstalking is often highly
personalised; a bare word(s) or a phrase(s) of a message might have no inclination
whatsoever towards bad feeling almost to anyone, but it might cause fear and
distress to a cyberstalking victim. For instance, sending child birthday wishes
may commonly be considered as positive, but not in case of somebody who lost
their child or had undergone abortion. This complicates the process of
developing a general tool to combat text-based cyberstalking. For this reason we de ne
a personalisation module which is employed to enhance overall victim's control
over incoming messages, where each victim can outline and de ne their own rule
preferences. Therefore the personalisation module consists of rule based
components and a code dictionary. The rule based component is optional, where rules
are de ned based on words, date and phrases provided by the user. A typical rule
could be if ((dateA&lt;today&lt;dateB) ^ (message contains "abc")) return true. A
code dictionary is created from sentiment and a ect word(s) or phrases, which
are commonly used in cyberstalking. Furthermore, the code dictionary could
also be updated by the user. The received message would be preprocessed, for
this purpose k-shingling [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] could be utilised. Where each k-length shingle is
run against the dictionary, probabilistic disambiguation[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] is another possible
method to be used; both the dictionary's returned result and rule-based result
are represented by the value : either cyberstalking (1) or not cyberstalking (0)
(when both returned results are negative).
      </p>
      <p>The nal decision whether a received message is cyberstalking or not is made
in the aggregator module, utilising the outcome from the previous modules. ,
and are the nal calculated result values for each individual received email by
the attacker identi er and detection module, respectively. Messages are identi ed
as either grey (?), cyberstalking (1) or not cyberstalking (0) based on ( ; ; )
as follows
80 if ( = 00 ^ (
&gt;
( ; ; ) = &lt;</p>
      <p>1 if ( = 10 _
&gt;:? if ( = 01 ^ (r1 &lt;
r2) ^ (
r1 _</p>
      <p>= 0) ) ;
= 1));
&lt; r2) ^
= 0).</p>
      <p>The nal module is the messages and evidence collection module, which
collects evidence from a newly arriving cyberstalking message, for instance, in the
case of email the c source IP address or, if it is not available, the next server relay
in the path, and the domain name (both addresses are automatically submitted
to WHOIS and other IP geolocation website). The information with timestamp
and email headers is saved for instance in the evidence database on the victims'
device. The module also regularly updates and adds stylometrics, pro les and
related information of the cyberstalking message to the database. Furthermore it
will utilise statistical methods like multivariate Gaussian distribution and PCA
to analyse the writeprint and pro les of cyberstalking, and text mining to
extract similar features, attacker behavioural, greeting, farewell, etc, speci cally
between anonymous message and non anonymous message. The integrity and
authenticity of a cyberstalking message, gathered evidence information whether
saved on computer or through transmission are preserved using hash functions
and asymmetric encryption keys.
4</p>
    </sec>
    <sec id="sec-3">
      <title>Conclusions and Future Work</title>
      <p>Combating cyberstalking is a challenging task, where technical solutions are a
cornerstone in its prevention and mitigation. We therefore presented the ACTS
framework that lters, detect and documents text-based cyberstalking. In the
context of our framework we in particular discussed the potential use of textual
machine learning approaches and discussed the di erence to classical email
categorization. The aim of our solution is not only to mitigate cyberstalking, but also
to help victims in documenting evidence, which is required for law enforcement.
Future work includes the implementation and evaluation of ACTS, in particular
by measuring the e ectiveness of the proposed text categorization methods in
this emerging problem area.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>A.</given-names>
            <surname>Abbasi</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Chen</surname>
          </string-name>
          .
          <article-title>A ect Intensity Analysis of Dark Web Forums</article-title>
          .
          <source>In Intelligence and Security Informatics</source>
          ,
          <year>2007</year>
          IEEE, pages
          <volume>282</volume>
          {
          <fpage>288</fpage>
          . IEEE,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>S.</given-names>
            <surname>Aggarwal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Burmester</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Henry</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Kermes</surname>
          </string-name>
          , and
          <string-name>
            <surname>J. Mulholland.</surname>
          </string-name>
          <article-title>AntiCyberstalking: The Predator and Prey Alert ( PAPA ) System</article-title>
          . In Systematic Approaches to Digital Forensic Engineering,
          <year>2005</year>
          . First International Workshop, number iv, pages
          <fpage>195</fpage>
          |-
          <lpage>205</lpage>
          . IEEE-CPS,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>T. K.</surname>
          </string-name>
          <article-title>and</article-title>
          et al Logan.
          <source>Research on Partner Stalking: Putting the Pieces Together. Lexington, KY: Department of Behavioral Science and Center on Drug and Alcohol Research</source>
          , University of Kentucky, pages
          <volume>1</volume>
          {
          <fpage>27</fpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>M.</given-names>
            <surname>Baer</surname>
          </string-name>
          .
          <article-title>Cyberstalking and the Internet Landscape We Have Constructed</article-title>
          .
          <source>Virginia Journal of Law &amp; Technology</source>
          ,
          <volume>15</volume>
          (
          <issue>154</issue>
          ):
          <volume>153</volume>
          |-
          <fpage>227</fpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>A.</given-names>
            <surname>Bose</surname>
          </string-name>
          and
          <string-name>
            <given-names>K. G.</given-names>
            <surname>Shin</surname>
          </string-name>
          .
          <article-title>On mobile viruses exploiting messaging and Bluetooth services</article-title>
          .
          <source>In 2006 Securecomm and Workshops</source>
          , pages
          <fpage>1</fpage>
          <lpage>{</lpage>
          10. IEEE,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>M.</given-names>
            <surname>Chang</surname>
          </string-name>
          and
          <string-name>
            <given-names>C. K.</given-names>
            <surname>Poon</surname>
          </string-name>
          .
          <article-title>Using phrases as features in email classi cation</article-title>
          .
          <source>The Journal of Systems &amp; Software</source>
          ,
          <volume>82</volume>
          (
          <issue>6</issue>
          ):
          <volume>1036</volume>
          {
          <fpage>1045</fpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>B. L.</given-names>
            <surname>Ellison</surname>
          </string-name>
          and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Akdeniz</surname>
          </string-name>
          .
          <article-title>Cyber-stalking: the Regulation of Harassment on the Internet</article-title>
          .
          <source>Criminal Law Review</source>
          ,
          <volume>29</volume>
          :
          <fpage>29</fpage>
          {
          <fpage>48</fpage>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>J.</given-names>
            <surname>Finn</surname>
          </string-name>
          .
          <article-title>A survey of online harassment at a university campus</article-title>
          .
          <source>Journal of interpersonal violence</source>
          ,
          <volume>19</volume>
          :
          <fpage>468</fpage>
          {
          <fpage>483</fpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>J. M. Gomez Hidalgo</surname>
            ,
            <given-names>G. C.</given-names>
          </string-name>
          <string-name>
            <surname>Bringas</surname>
            ,
            <given-names>E. P.</given-names>
          </string-name>
          <string-name>
            <surname>Sanz</surname>
            , and
            <given-names>F. C.</given-names>
          </string-name>
          <string-name>
            <surname>Garc</surname>
          </string-name>
          <article-title>a. Content based SMS spam ltering</article-title>
          .
          <source>In Proceedings of the 2006 ACM symposium on Document engineering - DocEng '06</source>
          , pages
          <fpage>1</fpage>
          <article-title>{8</article-title>
          . ACM,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>R.</given-names>
            <surname>Hadjidj</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Debbabi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Lounis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Iqbal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Szporer</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Benredjem</surname>
          </string-name>
          .
          <article-title>Towards an integrated e-mail forensic analysis framework</article-title>
          .
          <source>Digital Investigation</source>
          ,
          <volume>5</volume>
          (
          <issue>3</issue>
          - 4):
          <volume>124</volume>
          {
          <fpage>137</fpage>
          ,
          <string-name>
            <surname>Mar</surname>
          </string-name>
          .
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>D. A.</given-names>
            <surname>Jurgens</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. D.</given-names>
            <surname>Turney</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K. J.</given-names>
            <surname>Holyoak</surname>
          </string-name>
          . SemEval
          <article-title>-2012 Task 2: Measuring Degrees of Relational Similarity</article-title>
          .
          <source>In Proceedings of the First Joint Conference on Lexical and Computational Semantics-Volume</source>
          <volume>1</volume>
          , pages
          <fpage>356</fpage>
          {
          <fpage>364</fpage>
          . Association for Computational Linguistics,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>C. Maple</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Short</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Brwon</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Bryden</surname>
            , and
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Salter</surname>
          </string-name>
          .
          <article-title>Cyberstalking in the UK: Analysis and Recommendations</article-title>
          .
          <source>International Journal of Distributed Systems and Technologies</source>
          ,
          <volume>3</volume>
          (
          <issue>4</issue>
          ):
          <volume>34</volume>
          {
          <fpage>51</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>A.</given-names>
            <surname>Maxwell</surname>
          </string-name>
          . Cyberstalking.
          <source>Technical Report 7</source>
          , Auckland University,
          <year>July 2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>R.</given-names>
            <surname>Mccall</surname>
          </string-name>
          .
          <article-title>Online Harassment and Cyberstalking: Victim Access to Crisis , Referral and Support Services in Canada Concepts and Recommendations</article-title>
          . Canada: Victim Assistance Online Resources, page
          <volume>17</volume>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>E. Ogilvie.</surname>
          </string-name>
          <article-title>The internet and cyberstalking</article-title>
          .
          <source>(December)</source>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16. N.
          <article-title>Parsons-pollard and</article-title>
          <string-name>
            <given-names>L. J.</given-names>
            <surname>Moriarty</surname>
          </string-name>
          . Cyberstalking:
          <article-title>Utilizing What We do Know</article-title>
          .
          <source>Victims and O enders</source>
          ,
          <volume>4</volume>
          (
          <issue>4</issue>
          ):
          <volume>435</volume>
          {
          <fpage>441</fpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <given-names>D. A.</given-names>
            <surname>Pinals</surname>
          </string-name>
          . Stalking, Psychiatric Prespective and
          <string-name>
            <given-names>Practical</given-names>
            <surname>Approach</surname>
          </string-name>
          .
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <given-names>K.</given-names>
            <surname>Reynolds</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kontostathis</surname>
          </string-name>
          , and
          <string-name>
            <surname>L. Edwards.</surname>
          </string-name>
          <article-title>Using Machine Learning to Detect Cyberbullying</article-title>
          .
          <source>In Proceedings ICMLA</source>
          <year>2011</year>
          , pages
          <fpage>241</fpage>
          {
          <fpage>244</fpage>
          . IEEE, Dec.
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <given-names>B. W.</given-names>
            <surname>Reyns</surname>
          </string-name>
          and
          <string-name>
            <given-names>C. M.</given-names>
            <surname>Englebrecht</surname>
          </string-name>
          .
          <article-title>The stalking victim's decision to contact the police: A test of Gottfredson and Gottfredson's theory of criminal justice decision making</article-title>
          .
          <source>Journal of Criminal Justice</source>
          ,
          <volume>38</volume>
          (
          <issue>5</issue>
          ):
          <volume>998</volume>
          {
          <fpage>1005</fpage>
          ,
          <string-name>
            <surname>Sept</surname>
          </string-name>
          .
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <given-names>D.</given-names>
            <surname>Robert</surname>
          </string-name>
          and
          <string-name>
            <surname>J. Doyle.</surname>
          </string-name>
          <article-title>Study on Cyberstalking: Understanding Investigative Hurdles</article-title>
          .
          <source>FBI Law Enforcement Bulletin</source>
          ,
          <volume>72</volume>
          (
          <issue>3</issue>
          ):
          <volume>10</volume>
          {
          <fpage>17</fpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <given-names>L.</given-names>
            <surname>Roberts</surname>
          </string-name>
          . Jurisdictional and
          <article-title>de nitional concerns with computer-mediated interpersonal crimes: An Analysis on Cyber Stalking</article-title>
          .
          <source>International Journal of Cyber Criminology</source>
          ,
          <volume>2</volume>
          (
          <issue>1</issue>
          ):
          <volume>271</volume>
          {
          <fpage>285</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <given-names>L. L.</given-names>
            <surname>Sheridan</surname>
          </string-name>
          and
          <string-name>
            <given-names>T. D.</given-names>
            <surname>Grant</surname>
          </string-name>
          . Is cyberstalking di erent? Psychology, Crime &amp; Law,
          <volume>13</volume>
          (
          <issue>6</issue>
          ):
          <volume>627</volume>
          {
          <fpage>640</fpage>
          ,
          <string-name>
            <surname>Dec</surname>
          </string-name>
          .
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>C. Southworth</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Finn</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Dawson</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Fraser</surname>
            , and
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Tucker</surname>
          </string-name>
          .
          <article-title>Intimate partner violence, technology, and stalking</article-title>
          .
          <source>Violence against women</source>
          ,
          <volume>13</volume>
          (
          <issue>8</issue>
          ):
          <volume>842</volume>
          {
          <fpage>56</fpage>
          ,
          <string-name>
            <surname>Aug</surname>
          </string-name>
          .
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <given-names>J. L.</given-names>
            <surname>Truman</surname>
          </string-name>
          .
          <article-title>Examining intimate partner stalking and use of technology in stalking victimization</article-title>
          .
          <source>PhD thesis</source>
          , University of Central Florida Orlando, Florida,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>O. D. Vel</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Anderson</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Corney</surname>
            , and
            <given-names>G.</given-names>
          </string-name>
          <string-name>
            <surname>Mohay. Mining</surname>
          </string-name>
          E
          <article-title>-mail Content for Author Identi cation Forensics</article-title>
          .
          <source>ACM Sigmod Record</source>
          ,
          <volume>30</volume>
          (
          <issue>4</issue>
          ):
          <volume>55</volume>
          {
          <fpage>64</fpage>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <given-names>R.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Chen</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Z.</given-names>
            <surname>Huang</surname>
          </string-name>
          .
          <article-title>A Framework for Authorship Identi cation of Online Messages: Writing-Style Features and Classi cation Techniques</article-title>
          .
          <source>JASIST</source>
          ,
          <volume>57</volume>
          (
          <issue>3</issue>
          ):
          <volume>378</volume>
          {
          <fpage>393</fpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>