Abstract
PurposeCyberstalking is a growing threat to society, and policymakers should address it utilizing the input of constituents. For this, two key components are required: actionable objectives informed by the values of society and the means of implementation to maximize their potential benefits. The process should be guided by the constituent's values, requiring the elicitation of intrinsic values as individual preferences that are extrapolated to society at large.Design/methodology/approachThe authors utilize Keeney's (1990) public value forum and Sen's (1999) social choice theory (Sen, 1999) to elicit and convert these intrinsic values to serve as the basis for developing public policy to prevent cyberstalking.FindingsThe results demonstrate a strong desire by participants to have clear regulations, policies and procedures developed in concert with industry and enforced by the government that elucidate required protections against cyberstalking in combination with strong technical controls. These policies should guide technical control development and implementation, but leave ultimate control in the hands of technology users to decide what controls they want to utilize.Originality/valueThis study is the first to utilize Keeney's (1988) public value forum in the context of cyberstalking to develop quantitative measures regarding technology users' desired cybersecurity protections against cyberstalking. The authors provide a decision-making framework for policymakers to develop a new policy based on the input of their constituents in a manner that maximizes their potential utility and ultimate benefit.
Subject
Economics and Econometrics,Sociology and Political Science,Communication
Reference44 articles.
1. Vicious and virtuous cycles in ERP implementation: a case study of interrelations between critical success factors;European Journal of Information Systems,2002
2. Perceptions of cyberstalking among college students;Brief Treatment and Crisis Intervention,2005
3. Exploring cyber harassment among women who use social media;Universal Journal of Public Health,2015
4. Updating antiquated legal analysis: re-evaluating the need to prosecute cyberstalkers;Brigham Young University Prelaw Review,2016
5. An old crime in a new context: Maryland's need for a comprehensive cyberstalking statute;University of Maryland Law Journal on Race, Religion, Gender and Class,2017
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献