Stalking Content Topic Results
The results displayed below have been grouped first by VAWnet Special Collections - containing our most highly valued resources - then by individual related materials. Refine your search by category, types, author and/or publisher using the options provided. Sort by date published, date added, or alphabetically. For assistance in locating a resource, use our online contact form.
Results displayed are grouped first by VAWnet Special Collections then by individual related materials. For assistance in locating a resource, use our online contact form.
Materials
Materials
- General Material
September 2009
The Kentucky Civil Protective Order Study: A Rural and Urban Multiple Perspective Study of Protective Order Violation Consequences, Responses, & Costs
Publisher(s):This study addresses several gaps in the research literature on civil protective orders by examining protective order effectiveness, enforcement, and cost effectiveness.
Materials
- General Material
June 2009
How to Start and Facilitate a Support Group for Victims of Stalking
Publisher(s):A guide for victim service providers, volunteers, and other concerned community members on how to initiate and run a stalking support group in their agency or community.
Materials
- General Material
January 2009
Domestic Abuse, Stalking and Harassment and Honour Based Violence (DASH, 2009) Risk Identification and Assessment and Management Model
Publisher(s):This document describes the DASH risk assessment tool that was designed for practitioners who work with victims of domestic abuse in the UK in order to help them identify those who are at high risk of harm.
Materials
- General Material
January 2009
High-Tech Stalking
Publisher(s):Stalkers are increasingly misusing a variety of telephone, surveillance, and computer technologies to harass, terrify, intimidate, coerce, and monitor former and current intimate partners. Perpetrators are also misusing technology to stalk before, during, and after perpetrating sexual violence.
Materials
- General Material
January 2009
CAADA Domestic Abuse, Stalking and 'Honour'-based Violence (DASH) Risk Identification Checklist
Publisher(s):This checklist is a consistent and simple to use tool for practitioners who work with victims of domestic abuse in order to help them identify those who are at high risk of harm and whose cases should be referred to a Multi-Agency Risk Assessment Conference (MARAC) meeting in order to manage the risk.
Materials
- General Material
January 2009
Website Safety: Tips For Advocacy Organizations
Publisher(s):This handout covers 3 basic steps organizations can take if they work with survivors of sexual assault, domestic violence and stalking: (1) have safety alerts and an escape button on every page of your website; (2) post some general safety tips that alert survivors to risks without educating stalkers about new ways to abuse; and, (3) use web forms that promote informed consent.
Materials
- General Material
April 2008
First Response to Victims of Crime: A Guidebook for Law Enforcement Officers
Publisher(s):This guide book offers user-friendly information for law enforcement on how to respond to a wide range of victims. It attempts to highlight the most salient issues involved for victims of certain crimes and for certain populations of victims.
Materials
- General Material
February 2008
Winning U Visas: Getting the Law Enforcement Certification
This paper describes the requirements for U visas and emphasizes the need for practitioners to establish a good working relationship with law enforcement officers and help build trust between immigrant survivors of domestic violence and the law enforcement system. The article provides strategies for collaborating with local law enforcement.
Materials
- General Material
January 2008
Myths & Realities of Identity Change
Publisher(s):This 2 page handout addresses common issues for victims who are considering changing their identity (e.g. name, U.S. social security number, birth certificate, etc.) as part of an attempt to remain safe and hidden from an abuser or stalker. It dispels seven common myths by describing realities of what can happen after an identity change and by providing introductory tips on protecting your identity.
Materials
- General Material
January 2008
Technology Safety Planning with Survivors: Tips to discuss if someone you know is in danger
Publisher(s):This handout provides some simple but critical tips about phone, computer, email, instant messaging and other technology use to discuss if someone you know is in danger. Available in English, Spanish, Chinese, Korean, Vietnamese, Somali, and Russian.
Materials
- General Material
January 2008
Data Security Checklist to Increase Victim Safety & Privacy
Publisher(s):For use by local domestic violence and rape crisis service programs and other community service providers, this checklist is a starting point in discussing client safety and data security for agencies.
IMPORTANT NOTE: This checklist is not intended to replace intensive training. Please work with your State Domestic Violence and Sexual Assault Coalitions to increase your community's awareness of data security.
Materials
- General Material
January 2008
Tech Savvy Teens: Choosing Who Gets To See Your Info
Publisher(s):This 2 page handout for teens and students discusses important choices they can make about who gets to access their personal information.