Subtopic Deep Dive

Risk Factors for Stalking Perpetration
Research Guide

What is Risk Factors for Stalking Perpetration?

Risk factors for stalking perpetration are empirically identified characteristics, histories, and traits that predict an individual's likelihood of engaging in stalking behaviors.

Researchers examine perpetrator profiles including prior violence, personality disorders, attachment issues, and situational triggers using case-control studies and recidivism analyses (Rosenfeld, 2003; Rosenfeld, 2004). Over 20 papers in the provided corpus address violence risk and recidivism, with Barry Rosenfeld's works cited 147-107 times. Regression tree models predict violence risk in stalking cases (Rosenfeld & Lewis, 2005).

15
Curated Papers
3
Key Challenges

Why It Matters

Identifying risk factors enables targeted prevention programs for at-risk individuals, such as those with obsessional harassment histories (Rosenfeld, 2004). Courts use these predictors for bail decisions and recidivism risk assessment in 148 stalking offender cases (Rosenfeld, 2003). Mental health interventions address unique stalking violence markers like threat content and victim fear levels (Rosenfeld, 2004). Programs reduce recidivism by intervening on prior violence and personality traits (Rosenfeld & Lewis, 2005).

Key Research Challenges

Measuring Recidivism Accurately

Stalking recidivism studies face challenges in tracking repeat offenses across jurisdictions, as seen in analyses of 148 offenders (Rosenfeld, 2003). Self-reports underestimate perpetration due to denial. Longitudinal designs are rare due to ethical constraints.

Isolating Stalking-Specific Risks

Distinguishing stalking-unique factors from general violence predictors requires subgroup models (Rosenfeld & Lewis, 2005). Confounds like substance abuse overlap with broader criminality (Rosenfeld, 2004). Case-control designs struggle with matched samples.

Predicting Cyberstalking Escalation

Digital vectors complicate risk assessment, as social media amplifies youth violence exposure (Patton et al., 2014). Victim surveys show underreporting of cyber elements (Reep-van den Bergh & Junger, 2018). Models lag behind platform evolution.

Essential Papers

1.

Social media as a vector for youth violence: A review of the literature

Desmond U. Patton, Jun Sung Hong, Megan L. Ranney et al. · 2014 · Computers in Human Behavior · 232 citations

Homicide is the second leading cause of death for young people, and exposure to violence has a negative impact on youth mental health, academic performance, and relationships. We demonstrate that y...

2.

Violence Risk Factors in Stalking and Obsessional Harassment

Barry Rosenfeld · 2004 · Criminal Justice and Behavior · 147 citations

The fear of violence is among the most common and debilitating concerns faced by stalking victims. This review summarizes the extant literature on stalking-related violence, highlighting risk facto...

3.

Could we have known? A qualitative analysis of data from women who survived an attempted homicide by an intimate partner

Christina Nicolaidis, Mary Ann Curry, Yvonne Ulrich et al. · 2003 · Journal of General Internal Medicine · 130 citations

4.

Recidivism in stalking and obsessional harassment.

Barry Rosenfeld · 2003 · Law and Human Behavior · 107 citations

Despite the rapidly growth of mental health attention focused on the phenomenon of stalking, no empirical research to date has attempted to assess the frequency of repeat offending or attempted to ...

5.

Victims of cybercrime in Europe: a review of victim surveys

Carin M. M. Reep-van den Bergh, Marianne Junger · 2018 · Crime Science · 95 citations

Abstract Objectives Review the evidence provided by victim surveys in order to provide a rough estimate of the personal crime prevalence of the main types of cybercrime. Methods We performed a sear...

6.

Cyberbullying and the law: A review of psychological and legal challenges

Aiman El Asam, Muthanna Samara · 2016 · Computers in Human Behavior · 88 citations

7.

"Revenge Porn" Reform: a View From the Front Lines

Mary Anne Franks · 2016 · University of Miami School of Law Institutional Repository (University of Miami) · 86 citations

The legal and social landscape of "revenge porn" has changed dramatically in the last few years. Before 2013, only three states criminalized the unauthorized disclosure of sexually explicit images ...

Reading Guide

Foundational Papers

Start with Rosenfeld (2004) for core violence risk factors in stalking, then Rosenfeld (2003) for recidivism in 148 cases, and Rosenfeld & Lewis (2005) for regression tree prediction methods.

Recent Advances

Study Patton et al. (2014, 232 cites) on social media as violence vector relevant to cyberstalking perpetration, and Reep-van den Bergh & Junger (2018) for cybercrime victim data informing perpetrator risks.

Core Methods

Core techniques include case-control designs (Rosenfeld, 2003), regression trees for risk stratification (Rosenfeld & Lewis, 2005), and literature reviews synthesizing unique stalking predictors (Rosenfeld, 2004).

How PapersFlow Helps You Research Risk Factors for Stalking Perpetration

Discover & Search

PapersFlow's Research Agent uses searchPapers to query 'stalking perpetration risk factors recidivism' yielding Rosenfeld (2003) as top hit with 107 citations, then citationGraph reveals Rosenfeld's cluster (2003-2005 papers), and findSimilarPapers expands to violence risk analogs. exaSearch surfaces Patton et al. (2014) linking social media to youth perpetration risks.

Analyze & Verify

Analysis Agent applies readPaperContent to extract recidivism predictors from Rosenfeld (2003), verifies claims via verifyResponse (CoVe) against 148-offender dataset summaries, and runs PythonAnalysis to compute GRADE scores for risk factor evidence strength (e.g., prior violence OR=2.5). Statistical verification flags weak predictors like demographics.

Synthesize & Write

Synthesis Agent detects gaps in cyberstalking risk models post-Rosenfeld era, flags contradictions between general violence (Patton et al., 2014) and stalking-specific risks (Rosenfeld, 2004). Writing Agent uses latexEditText for risk factor tables, latexSyncCitations for Rosenfeld refs, latexCompile for PDF, and exportMermaid for recidivism decision trees.

Use Cases

"What prior violence history predicts stalking recidivism?"

Research Agent → searchPapers('stalking recidivism predictors') → readPaperContent (Rosenfeld 2003) → runPythonAnalysis (extract OR ratios from tables) → GRADE B evidence: prior threats double risk.

"Generate LaTeX review of stalking risk factors with citations."

Synthesis Agent → gap detection (cyberstalking gaps) → Writing Agent → latexEditText (intro + factors) → latexSyncCitations (Rosenfeld 2003-2005) → latexCompile → PDF with regression tree figure.

"Find code for violence risk prediction models in stalking papers."

Research Agent → paperExtractUrls (Rosenfeld & Lewis 2005) → paperFindGithubRepo (regression tree impls) → githubRepoInspect → runPythonAnalysis (replicate CART model on sample data).

Automated Workflows

Deep Research workflow conducts systematic review: searchPapers (50+ stalking papers) → citationGraph (Rosenfeld cluster) → DeepScan (7-step verify on recidivism data) → structured report with risk factor meta-analysis. Theorizer generates theory: analyze Rosenfeld (2004) risks + Patton (2014) social media → hypothesize cyberstalking escalation model. DeepScan verifies claims chain-of-verification on every risk factor predictor.

Frequently Asked Questions

What is the definition of risk factors for stalking perpetration?

Risk factors are empirically validated predictors like prior violence, threats, and personality traits that increase stalking likelihood (Rosenfeld, 2004).

What methods identify these risk factors?

Case-control studies, recidivism tracking in 148 offenders, and regression tree models assess violence risk (Rosenfeld, 2003; Rosenfeld & Lewis, 2005).

What are key papers?

Rosenfeld (2004, 147 cites) reviews stalking violence risks; Rosenfeld (2003, 107 cites) analyzes recidivism predictors; Rosenfeld & Lewis (2005, 74 cites) use regression trees.

What open problems exist?

Predicting cyberstalking perpetration from social media lacks validated models beyond youth violence links (Patton et al., 2014). Longitudinal digital risk data is scarce.

Research Stalking, Cyberstalking, and Harassment with AI

PapersFlow provides specialized AI tools for Social Sciences researchers. Here are the most relevant for this topic:

See how researchers in Social Sciences use PapersFlow

Field-specific workflows, example queries, and use cases.

Social Sciences Guide

Start Researching Risk Factors for Stalking Perpetration with AI

Search 474M+ papers, run AI-powered literature reviews, and write with integrated citations — all in one workspace.

See how PapersFlow works for Social Sciences researchers