Professional Documents
Culture Documents
aspx
↑
7. Asher Flynn, Anastasia Powell and Sophie Hindes, Technology-Facilitated Abuse: A
Survey of Support Services Stakeholders (Research Report No 2, ANROWS, July
2021) 10.
10. The Office of the eSafety Commissioner is Australia’s independent regulator for
online safety.
17. For example, location sharing and tracking features that show a user’s live location
can be used for stalking.
18. For example, running a person’s photo through Google’s image search function to find
where else the photo appears online, including other websites or platforms that contain
personal information.
↑
20. Ibid.
23. Victorian Law Reform Commission, Stalking (Consultation Paper, June 2021) 60. See
also Office of the eSafety Commissioner (Cth), ESafety for Women from Culturally
and Linguistically Diverse Backgrounds (Summary Report, 18 February 2019)
26. Department of Justice and Community Safety (Vic), ‘What Is Brodie’s Law’, Bullying
—Brodie’s Law (Web Page, 13 August 2021)
<https://www.justice.vic.gov.au/saynotobullying>; Crimes Act 1958 (Vic) s 21A(2).
↑
27. Submission 65 (Code Black Threat Management); Erica R Fissel and Bradford W
Reyns, ‘The Aftermath of Cyberstalking: School, Work, Social, and Health Costs of
Victimization’ (2020) 45(1) American Journal of Criminal Justice 70, 71; Puneet Kaur
et al, ‘A Systematic Literature Review on Cyberstalking. An Analysis of Past
Achievements and Future Promises’ (2021) 163 Technological Forecasting and Social
Change 120426:1–15, 2.
31. Office of the eSafety Commissioner (Cth), ESafety for Women from Culturally and
Linguistically Diverse Backgrounds (Summary Report, 18 February 2019).
32. See, eg, Hadeel Al-Alosi, ‘Cyber-Violence: Digital Abuse in the Context of Domestic
Violence’ (2017) 40(4) UNSW Law Journal 1573; Nicola Henry et al, ‘Technology-
Facilitated Domestic Violence against Immigrant and Refugee Women: A Qualitative
Study’ [2021] Journal of Interpersonal Violence 10.1177/08862605211001465:1–27;
Delanie Woodlock, ‘The Abuse of Technology in Domestic Violence and Stalking’
(2017) 23(5) Violence Against Women 584; Royal Commission into Family Violence:
Report and Recommendations (Final Report, March 2016) vol 1, ch 2.
33. Cristina Cavezza and Troy E McEwan, ‘Cyberstalking versus Off-Line Stalking in a
Forensic Sample’ (2014) 20(10) Psychology, Crime and Law 955, 956; Puneet Kaur et
al, ‘A Systematic Literature Review on Cyberstalking. An Analysis of Past
Achievements and Future Promises’ (2021) 163 Technological Forecasting and Social
Change 120426:1–15; Catherine D Marcum and George E Higgins, ‘A Systematic
Review of Cyberstalking Victimization and Offending Behaviors’ (2021)
46(6) American Journal of Criminal Justice 882; Chanelle Wilson, Lorraine Sheridan
and David Garratt-Reed, ‘What Is Cyberstalking? A Review of Measurements’ (2022)
37(11–12) Journal of Interpersonal Violence NP9763, NP9778–9.
36. Cristina Cavezza and Troy E McEwan, ‘Cyberstalking versus Off-Line Stalking in a
Forensic Sample’ (2014) 20(10) Psychology, Crime and Law 955, 956.
39. For example, keeping track of the victim survivor’s movements and interactions;
maintaining unwanted contact or hacking the victim survivor’s personal accounts:
Asher Flynn, Anastasia Powell and Sophie Hindes, Technology-Facilitated Abuse: A
Survey of Support Services Stakeholders (Research Report No 2, ANROWS, July
2021) 21.
42. Office of the eSafety Commissioner (Cth), ‘Domestic and Family Violence’, ESafety
Commissioner (Web Page) <https://www.esafety.gov.au/key-issues/domestic-family-
violence>.
47. Ibid, citing W Spencer Scott, ‘Electronic Boundary Violations Among Gay and
Bisexual Men’ (Doctoral Project, Roosevelt University, 2016).
49. Anastasia Powell, Adrian J Scott and Nicola Henry, ‘Digital Harassment and Abuse:
Experiences of Sexuality and Gender Minority Adults’ (2020) 17(2) European Journal
of Criminology 199.
51. Nicola Henry et al, ‘Technology-Facilitated Domestic Violence against Immigrant and
Refugee Women: A Qualitative Study’ [2021] Journal of Interpersonal
Violence 10.1177/08862605211001465:1–27, 17–18.
↑
54. Laura Fazio, ‘Young People and Cyberspace: Introduction’ (2016) 22(2) European
Journal on Criminal Policy and Research 211, 211.
56. Laura Fazio, ‘Young People and Cyberspace: Introduction’ (2016) 22(2) European
Journal on Criminal Policy and Research 211, 211.
↑
58. Ibid 211.
60. House of Representatives Select Committee on Social Media and Online Safety,
Parliament of the Commonwealth of Australia, Social Media and Online
Safety (Report, March 2022) 28.
62. Submissions 56 (Derryn Hinch’s Justice Party), 104 (Alannah and Madeline
Foundation); Consultation 23 (Cyberstalking roundtable).
↑
67. See, eg, Telecommunications (Interception and Access) Act 1979 (Cth) s 105.
68. Adult cyber abuse material is ‘the most severely abusive material’ intended to cause
serious harm and be menacing, harassing or offensive. This includes material that is
realistically threatening and unrelenting, including in situations of cyberstalking:
Consultation 8 (eSafety Commissioner); Office of the eSafety Commissioner
(Cth), Adult Cyber Abuse Scheme (Regulatory Guidance No eSC RG 3, December
2021) 3.
72. Ibid pt 6. Image-based abuse means sharing online, or threatening to share, an intimate
image without the consent of the person shown: Office of the eSafety Commissioner
(Cth), Image-Based Abuse Scheme (Regulatory Guidance No eSC RG 2, November
2021) 4 <https://www.esafety.gov.au/about-us/who-we-are/regulatory-
schemes#cyberbullying-scheme>.
77. Office of the eSafety Commissioner (Cth), ‘What You Can Report to
ESafety’, ESafety Commissioner (Web Page)
<https://www.esafety.gov.au/report/what-you-can-report-to-esafety>.
80. Submissions 56 (Derryn Hinch’s Justice Party), 115 (Victoria Police); Consultation 23
(Cyberstalking roundtable).
↑
81. Wei-Jung Chang, ‘Cyberstalking and Law Enforcement’ (2020) 176 Procedia
Computer Science 1188, 1192.
84. Ibid. Victoria Police pointed to its earlier submission to our sexual offences inquiry, in
which it discussed jurisdictional issues that can arise where online providers are based
overseas, and stated: ‘Victoria Police would welcome consideration of a place-of-
consumption approach, whereby statutory obligations are automatically imposed on all
providers which choose to make their platforms available to Victorian consumers …
With this, requirements for providers to verify the identity of individuals creating
profiles on these platforms, and to retain this information, would be both necessary
and appropriate’.
87. Participants in a roundtable discussion stated that there may be critical work required
around the Privacy and Data Protection Act 2014 (Vic) that can strengthen these safety
reforms: Consultation 23 (Cyberstalking roundtable).
↑
88. Asher Flynn, Anastasia Powell and Sophie Hindes, Technology-Facilitated Abuse: A
Survey of Support Services Stakeholders (Research Report No 2, ANROWS, July
2021) 5.
91. Consultation 12 (Domestic Violence Victoria and Domestic Violence Resource Centre
Victoria).
↑
96. Consultation 23 (Cyberstalking roundtable); Asher Flynn, Anastasia Powell and
Sophie Hindes, Technology-Facilitated Abuse: A Survey of Support Services
Stakeholders (Research Report No 2, ANROWS, July 2021) 13–14.
99. Submissions 41 (Djirra), 98 (Law Institute of Victoria), 104 (Alannah and Madeline
Foundation); Consultation 10 (Victorian Aboriginal Legal Service).
↑
103. Victorian Law Reform Commission, Stalking: Summary of Responses to
Online Feedback Form from People with Experience of Stalking (Report, August
2021).
107. Natalie Hendry, Jenny Walsh and Sharyn Leahy Hatton, The YeS
Project (Workshop Handbook, Office of the eSafety Commissioner (Cth), 2018) 46.
108. Consultation 29 (Alannah & Madeline Foundation). See also Puneet Kaur et al,
‘A Systematic Literature Review on Cyberstalking. An Analysis of Past Achievements
and Future Promises’ (2021) 163 Technological Forecasting and Social
Change 120426:1–15, 7.
↑
110. Alannah & Madeline Foundation, ‘Cyber and Digital Literacy
Resources’, ESmart (Web Page, 2022)
<https://www.esmart.org.au/esmart-libraries/cyber-and-digital-literacy-resources/>.
↑
117. Consultation 12 (Domestic Violence Victoria and Domestic Violence Resource
Centre Victoria).
119. Ibid.
122. Ibid.
↑
126. Victorian Law Reform Commission, Stalking: Summary of Responses to
Online Feedback Form from People with Experience of Stalking (Report, August
2021).
128. These services detect and remove surveillance devices or software, such as
spyware, tracking devices or vulnerabilities to hacking.
132. Ibid.
135. Ibid.
↑
143. Wei-Jung Chang, ‘Cyberstalking and Law Enforcement’ (2020) 176 Procedia
Computer Science 1188; Joanne D Worsley et al, ‘Victims’ Voices: Understanding the
Emotional Impact of Cyberstalking and Individuals’ Coping Responses’ (2017)
7(2) SAGE Open 10.1177/215824401771029:1–13, 10.
145. Ibid.
146. Ibid.
150. Submission 32 (Centre for Forensic Behavioural Science). See also Holly
Taylor-Dunn, Erica Bowen and Elizabeth A Gilchrist, ‘Reporting Harassment and
Stalking to the Police: A Qualitative Study of Victims’ Experiences’ (2021) 36(11–
12) Journal of Interpersonal Violence 10.1177/0886260518811423:1–29, 8.
↑
157. Submissions 55 (Springvale Monash Legal Service), 65 (Code Black Threat
Management), 97 (Federation of Community Legal Centres); Consultations 10
(Victorian Aboriginal Legal Service), 13 (Victoria Legal Aid), 20 (Law Institute of
Victoria); Luke Bartlett and Annabel Chan, ‘Hashtag You’re It: Limitations of
Psycho‐Legal Responses to Online Interpersonal Harm’ in Heng Choon Chan and
Lorraine Sheridan (eds), Psycho-Criminological Approaches to Stalking Behavior: An
International Perspective (John Wiley and Sons, 2020) 287, 298–9.
↑
162. Consultation 8 (eSafety Commissioner).
↑
171. Submission 97 (Federation of Community Legal Centres).
173. Submission 32 (Centre for Forensic Behavioural Science); Chris Todd, Joanne
Bryce and Virginia NL Franqueira, ‘Technology, Cyberstalking and Domestic
Homicide: Informing Prevention and Response Strategies’ (2021) 31(1) Policing and
Society 82, 92.
175. For the elements of the stalking offence with the most obvious connection to
online behaviour (and therefore cyberstalking):
178. John Silvester, ‘Cyber-Crime: How Police Are Rebooting Methods for a New
Era’, The Age (online, 15 October 2021)
<https://www.theage.com.au/national/victoria/cyber-cops-the-new-frontier-20211014-
p58zuv.html>.
https://www.lawreform.vic.gov.au/publication/stalking-final-report/3-responses-to-
cyberstalking/
https://www.lawreform.vic.gov.au/publication/stalking-final-report/3-responses-to-
cyberstalking/