{"id":4715,"date":"2017-09-15T19:37:09","date_gmt":"2017-09-15T19:37:09","guid":{"rendered":"http:\/\/www.safehorizon.org\/?p=4715"},"modified":"2025-06-10T13:38:32","modified_gmt":"2025-06-10T17:38:32","slug":"ibm-safe-horizon-address-cyberstalking","status":"publish","type":"post","link":"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/","title":{"rendered":"IBM &#038; Safe Horizon Partner to Address CyberStalking"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4719\" src=\"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2017\/09\/IBM-and-Safe-Horizon-Partner-to-Address-CyberStalking.png\" alt=\"IBM and Safe Horizon Partner to Address CyberStalking\" width=\"768\" height=\"432\" srcset=\"https:\/\/safehorizon.wpenginepowered.com\/wp-content\/uploads\/2017\/09\/IBM-and-Safe-Horizon-Partner-to-Address-CyberStalking.png 768w, https:\/\/safehorizon.wpenginepowered.com\/wp-content\/uploads\/2017\/09\/IBM-and-Safe-Horizon-Partner-to-Address-CyberStalking-300x169.png 300w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><\/p>\n<p><em>By Dr. Amanda M. Stylianou<\/em><br \/>\n<em>September 15, 2017<\/em><\/p>\n<p>In today\u2019s world, businesses and individuals both express concerns over the ways in which technology affects their privacy. Businesses spend millions of dollars investing in online security, while individuals express concerns over social media privacy. However, there\u2019s another kind of privacy concern which impacts individuals across the nation \u2013 <strong>cyberstalking, or\u00a0<\/strong><strong>technology-facilitated stalking<\/strong>.<\/p>\n<p>Stalking is &#8220;a pattern of repeated and unwanted attention, harassment, contact, or any other course of conduct directed at a specific person that would cause a reasonable person to feel fear&#8221; (United States Department of Justice, 2016).<\/p>\n<p>According to the Center for Disease and Control, <strong>6.6 million people are stalked every year in the United States <\/strong>(CDC; Black et al. 2011). 1 in 6 women and 1 in 19 men experience stalking at some point in their lifetime (CDC; Black et al., 2011). For both female and male victims, <strong>stalking is most often committed by people they know<\/strong>.<\/p>\n<p>In a recent Supplemental Victimization Survey (SVS) to the National Crime Victimization Survey, <strong>of those individuals that reported being stalked, 26.1 percent also reported experiencing some form of cyberstalking<\/strong> during the course of the incident (Baum, Catalano &amp; Rand, 2009).<\/p>\n<p>Cyberstalking is defined as \u201cthe use of the Internet, email, or other electronic communications to stalk, and generally refers to a pattern of threatening or malicious behaviors,\u201d involving a \u201ccredible threat to harm.\u201d National Conference of State Legislatures, \u201cState Cyberstalking and Cyberharassment Laws\u201d (Jan. 12, 2015).<\/p>\n<p>Cyberstalking includes a variety of behaviors that involve repeated threats and\/or harassment, by the use of electronic or technological means that would make a reasonable person afraid or concerned for his\/her safety.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Common cyberstalking behaviors include:<\/strong><\/span><\/p>\n<ul>\n<li>Monitoring the victim\u2019s email, either directly on the victim\u2019s computer, or remotely<\/li>\n<li>Sending threatening emails to the victim and\/or the victim\u2019s friends, family, or colleagues<\/li>\n<li>Using the internet to access information online on the victim through social media outlets or websites<\/li>\n<li>Breaking into the victim\u2019s social media, email, online banking accounts, or other private internet accounts<\/li>\n<li>Using the victim\u2019s email or social media accounts to send false messages to other people or to purchase goods and services<\/li>\n<li>Using car, computer, or phone tracking devices to monitor and locate the victim<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4720\" src=\"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2017\/09\/IBM-Logo.jpg\" alt=\"IBM Logo\" width=\"391\" height=\"174\" srcset=\"https:\/\/safehorizon.wpenginepowered.com\/wp-content\/uploads\/2017\/09\/IBM-Logo.jpg 391w, https:\/\/safehorizon.wpenginepowered.com\/wp-content\/uploads\/2017\/09\/IBM-Logo-300x134.jpg 300w\" sizes=\"auto, (max-width: 391px) 100vw, 391px\" \/><\/p>\n<p>In a world of ever-changing technology, advocates in the field of crime and violence need to be prepared to support survivors of cyberstalking to increase their safety. In order to accomplish this, <a href=\"https:\/\/www.safehorizon.org\">Safe Horizon<\/a> partnered with <a href=\"https:\/\/www.ibm.com\/ibm\/responsibility\/citizenship\/\">IBM\u2019s Corporate Citizenship &amp; Corporate Affairs<\/a> to train 36 Safe Horizon staff on <em>Understanding and Protecting your Online Identity<\/em>.<\/p>\n<p>The cyberstalking training, created by IBM and delivered by IBM Senior Managing Consultant for Security and Privacy Kevin Addington, focused on how to support survivors to identify potential technology risks and review online safety options. The cyberstalking training was provided through the <a href=\"https:\/\/www.ibm.com\/ibm\/responsibility\/initiatives\/grant_programs.html\">IBM Impact Grant<\/a>s program, which deploys consulting expertise and software to support educational and not-for-profit organizations. The training was accompanied by the provision of concrete tools that will aid Safe Horizon staff in supporting clients to increase their internet and social media safety. The training was a major success and Safe Horizon found the specialized training allowed staff to find ways to better support clients, to identify their potential technology risks, and to develop safety plans to address those risks.<\/p>\n<p>At Safe Horizon, we provide a range of services to support victims of stalking and cyberstalking. From our <a href=\"https:\/\/www.safehorizon.org\/hotlines\/\">24\/7 hotline<\/a> to our <a href=\"https:\/\/www.safehorizon.org\/our-services\/legal-and-court-help\/family-court-programs\/\">Family Court Programs<\/a> and <a href=\"https:\/\/www.safehorizon.org\/our-services\/legal-and-court-help\/criminal-court-programs\/\">Criminal Court Programs<\/a> to our <a href=\"https:\/\/www.safehorizon.org\/community-programs\/\">Community Programs<\/a>, we offer a comprehensive continuum of care to assist victims in identifying safety plans and resources that will best support them in increasing their safety. <a href=\"https:\/\/www.safehorizon.org\/get-informed\/stalking-statistics-facts\/#our-programs\/\">Learn more about what we do to support victims of stalking<\/a>.<\/p>\n<p>Thank you, <a href=\"https:\/\/www.ibm.com\/ibm\/responsibility\/citizenship\/\" target=\"_blank\" rel=\"noopener noreferrer\">IBM\u2019s Corporate Citizenship &amp; Corporate Affairs<\/a> team for your incredible expertise and guidance!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How can we support survivors of cyberstalking? We&#8217;ve partnered with IBM to help identify technology risks and review online safety to help address this new form of stalking.<\/p>\n","protected":false},"author":13,"featured_media":{"id":4757,"alt_text":"IBM Safe Horizon 2017_Final","caption":"","description":"","media_type":"image","media_details":{"width":353,"height":299,"file":"2017\/09\/IBM-Safe-Horizon-2017_Final.jpg","sizes":{"thumbnail":{"file":"IBM-Safe-Horizon-2017_Final-150x150.jpg","width":150,"height":150,"mime-type":"image\/jpeg","source_url":"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2017\/09\/IBM-Safe-Horizon-2017_Final-150x150.jpg"},"medium":{"file":"IBM-Safe-Horizon-2017_Final-300x254.jpg","width":300,"height":254,"mime-type":"image\/jpeg","source_url":"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2017\/09\/IBM-Safe-Horizon-2017_Final-300x254.jpg"}},"image_meta":{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"1","keywords":[]}},"post":4715,"source_url":"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2017\/09\/IBM-Safe-Horizon-2017_Final.jpg"},"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2015],"tags":[485,635],"class_list":["post-4715","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-safe-blog","tag-cyberstalking","tag-technology-facilitated-stalking","issue-stalking","issue-victims-of-other-abuse"],"acf":{"page_header_title":"","page_header_image":false,"original_url":"","related_initiative_title":"Are you a victim of stalking?","related_initiative_link":"https:\/\/www.safehorizon.org\/get-help\/stalking\/","related_initiative_link_text":"Get help now","featured_posts":[{"ID":4213,"post_author":"13","post_date":"2017-03-31 15:18:15","post_date_gmt":"2017-03-31 15:18:15","post_content":"<em>By Jill Reyes<\/em>\r\n<em>March 31, 2017<\/em>\r\n\r\nSafe Horizon leads efforts to increase stalking awareness for teens and young adults. This includes online stalking behaviors, known as cyberstalking. Abusers can often use modern technology and social networking to intimidate and coerce their partners. To address growing concerns around cyberstalking for teens and young adults, we partnered with the Bronx Borough President\u2019s Office, Bronx District Attorney\u2019s Office, Bronx Family Justice Center, and New York City Department of Probation (DOP) to create the following stalking infographic that was supported with funding through the Department of Justice (DOJ):\r\n\r\n<img class=\"aligncenter size-large wp-image-4214\" src=\"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2017\/03\/Stalking-Information-for-Social-Media-and-Electronics-Users-410x1024.png\" alt=\"Stalking Information for Social Media and Electronics Users\" width=\"410\" height=\"1024\" \/>\r\n\r\n&nbsp;\r\n\r\nThe stalking infographic is a simple way to help teens and young adults identify controlling or negative behavior in the context of technology and social media. It proposes steps they can take if they feel that these stalking behaviors apply to their situation.\r\n<h1>Information for Stalking<\/h1>\r\nWhile some people are stalked by strangers, most stalking is committed by someone known to the victim, such as an intimate partner or acquaintance. Stalking can get more serious over time and can happen to anyone regardless of race, culture, gender identity, age, or sexual orientation.\r\n<h1>Help for Stalking<\/h1>\r\nStalking is against the law in every state, however, the crime of stalking is defined differently in all 50 states, the District of Columbia, and on tribal and federal lands.\r\n\r\nIf you, or a teen you know, is experiencing any of the harmful behaviors mentioned in the stalking infographic, please read or share the following infographic. You can also use and share our <a href=\"https:\/\/www.safehorizon.org\/tech-and-cyber-safety\/\">Tech Safety<\/a> page as a guide, visit our <a href=\"https:\/\/www.safehorizon.org\/get-help\/domestic-violence\/\">domestic violence page<\/a>, <a href=\"https:\/\/www.safehorizon.org\/get-help\/stalking\/\">stalking page<\/a>, or call one of our <a href=\"https:\/\/www.safehorizon.org\/hotlines\/\">Hotlines<\/a>.\r\n\r\n&nbsp;","post_title":"Stalking Information for Social Media and Electronics Users","post_excerpt":"This stalking information for technology and social media users including teens and young adults can help identify controlling or negative behaviors in relationships.","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"stalking-information-social-media-electronics","to_ping":"","pinged":"","post_modified":"2025-06-10 13:06:45","post_modified_gmt":"2025-06-10 17:06:45","post_content_filtered":"","post_parent":0,"guid":"http:\/\/www.safehorizon.org\/?p=4213","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":3707,"post_author":"13","post_date":"2017-01-01 14:36:15","post_date_gmt":"2017-01-01 14:36:15","post_content":"<em>By Dr. Amanda Stylianou<\/em>\r\n<em>January 1, 2017<\/em>\r\n\r\nTo raise awareness and speak about stalking, I will discuss the impact stalking has on individuals and the resources and tools available to support survivors.\r\n<h1>Natalia\u2019s Story<\/h1>\r\n*Natalia was experiencing stalking from her son\u2019s father when she came to the Safe Horizon Bronx Family Court Program to obtain an order of protection.\r\n\r\n<em>\u201cMy son\u2019s father he\u2019s been really aggressive\u2026He\u2019s been coming to my house, he\u2019s been having me followed. My boyfriend and I, he\u2019s been following us. He\u2019s making threats\u2026.I\u2019m being threatened and he\u2019s threatening my boyfriend and contacting my family and things like that. It\u2019s just uncalled for and I don\u2019t feel safe\u2026He has threatened to murder me\u2026He has threatened to, to also cause harm to my family if I guess we go against whatever he is trying to do\u2026He has taken my son out of state and refused to bring him back until he was ready\u2026I\u2019m a woman. I cannot protect myself against a man, you know, but so far or but so much. And it\u2019s just something I don\u2019t think I should have to worry about\u2026He makes references that, you know, like he sees me, he sees me doing this, or he sees me at this place\u2026and it\u2019s just like the only way you could be at all these places, that you know, I\u2019m here is if you\u2019re following me\u2026<strong>It\u2019s just enough is enough.\u201d<\/strong><\/em>\r\n\r\nAnd at Safe Horizon, we hear stories like Natalia\u2019s every day of the year.\r\n<h1>Learn More About Stalking<\/h1>\r\nStalking is a pattern of repeated and unwanted attention, harassment, contact, or any other course of conduct directed at a specific person that would cause a reasonable person to feel fear. Stalking can include a vast array of behaviors including:\r\n<ul>\r\n \t<li>Repeated, unwanted, invasive, and fear-provoking communications via the phone, mail, email, texts, or social media;<\/li>\r\n \t<li>Following the victim and\/or waiting outside of the victim's home, school, or work;<\/li>\r\n \t<li>Making direct or indirect threats to harm the victim, the victim's children, relatives, friends, or pets;<\/li>\r\n \t<li>Obtaining personal information about the victim through public records, internet searches, social media, hiring private\/ investigators, following the victim, or contacting the victim's friends, family, coworkers, or neighbors;<\/li>\r\n \t<li>Entering the victim's home, car, or work and doing something to scare the victim and let the victim know the perpetrator has been there.<\/li>\r\n<\/ul>\r\nAnd every year in the United States <strong>7.5 million people are stalked<\/strong>. Approximately <strong>1 in 6 women<\/strong> and <strong>1 in 19 <\/strong>men have experienced stalking at some point in their lifetime. And for both male and female victims of stalking, the perpetrator is most often someone known to the victim.\r\n<ul>\r\n \t<li>Two thirds of the female victims of stalking (66.2%) reported stalking by a current or former intimate partner and nearly a quarter (24.0%) reported stalking by an acquaintance, whereas only 1 in 8 female victims (13.2%) reported stalking by a stranger.<\/li>\r\n \t<li>4 in 10 male stalking victims (41.4%) reported stalking by an intimate partner and 4 in 10 male stalking victims (40.0%) reported they had been stalked by an acquaintance, whereas only one-fifth (19.0%) reported stalking by a stranger and 5.3% reported being stalked by a family member.\r\n<ul>\r\n \t<li><a href=\"https:\/\/www.safehorizon.org\/get-informed\/stalking-statistics-facts\/\">Read more about stalking statistics<\/a><\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\nAt Safe Horizon, we provide a range of services to support victims of stalking. From our 24\/7 hotline to our Family and Criminal Court Programs to our Community Programs, we offer a comprehensive continuum of care to support victims in identifying safety plans and resources that will best support clients increase their safety. To learn more about what we do to support victims of stalking, <a href=\"https:\/\/www.safehorizon.org\/get-informed\/stalking-statistics-facts\/#our-programs\/\">click here<\/a>.\r\n\r\n<em>* Client names and identifying information have been changed to protect their privacy. Images used are representations of Safe Horizon\u2019s clients.<\/em>","post_title":"What You Should Know About Stalking","post_excerpt":"Dr. Amanda M. Stylianou, senior director of research and program development at Safe Horizon, discusses the impact stalking has on individuals and the resources and tools available to support survivors.","post_status":"publish","comment_status":"open","ping_status":"open","post_password":"","post_name":"stalking-what-you-should-know","to_ping":"","pinged":"","post_modified":"2025-06-10 13:05:37","post_modified_gmt":"2025-06-10 17:05:37","post_content_filtered":"","post_parent":0,"guid":"http:\/\/www.safehorizon.org\/?p=3707","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"authors":[{"author_name":"Dr. Amanda M. Stylianou, Associate Vice President of Quality and Program Development"}],"page_header_excerpt":"","show_author_bio":true,"create_custom_authors":true},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.5 (Yoast SEO v26.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IBM &amp; Safe Horizon Partner to Address CyberStalking | Safe Horizon<\/title>\n<meta name=\"description\" content=\"How can we support survivors of cyberstalking? Read about how we&#039;ve partnered with IBM to help address this new form of stalking.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IBM &amp; Safe Horizon Partner to Address CyberStalking\" \/>\n<meta property=\"og:description\" content=\"How can we support survivors of cyberstalking? Read about how we&#039;ve partnered with IBM to help address this new form of stalking.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/\" \/>\n<meta property=\"og:site_name\" content=\"Safe Horizon\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/safehorizon\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-15T19:37:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-10T17:38:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2017\/09\/IBM-and-Safe-Horizon-Partner-to-Address-CyberStalking.png\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Dana R\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@safehorizon\" \/>\n<meta name=\"twitter:site\" content=\"@safehorizon\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dana R\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/\"},\"author\":{\"name\":\"Dana R\",\"@id\":\"https:\/\/www.safehorizon.org\/#\/schema\/person\/863b8a4420ccb4b37ec21128f674a50a\"},\"headline\":\"IBM &#038; Safe Horizon Partner to Address CyberStalking\",\"datePublished\":\"2017-09-15T19:37:09+00:00\",\"dateModified\":\"2025-06-10T17:38:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/\"},\"wordCount\":634,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.safehorizon.org\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2017\/09\/IBM-Safe-Horizon-2017_Final.jpg\",\"keywords\":[\"Cyberstalking\",\"technology-facilitated stalking\"],\"articleSection\":[\"Safe Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/\",\"url\":\"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/\",\"name\":\"IBM & Safe Horizon Partner to Address CyberStalking | Safe Horizon\",\"isPartOf\":{\"@id\":\"https:\/\/www.safehorizon.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2017\/09\/IBM-Safe-Horizon-2017_Final.jpg\",\"datePublished\":\"2017-09-15T19:37:09+00:00\",\"dateModified\":\"2025-06-10T17:38:32+00:00\",\"description\":\"How can we support survivors of cyberstalking? Read about how we've partnered with IBM to help address this new form of stalking.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/#primaryimage\",\"url\":\"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2017\/09\/IBM-Safe-Horizon-2017_Final.jpg\",\"contentUrl\":\"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2017\/09\/IBM-Safe-Horizon-2017_Final.jpg\",\"width\":353,\"height\":299,\"caption\":\"IBM Safe Horizon 2017_Final\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Safe Blog\",\"item\":\"https:\/\/www.safehorizon.org\/.\/safe-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IBM &#038; Safe Horizon Partner to Address CyberStalking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.safehorizon.org\/#website\",\"url\":\"https:\/\/www.safehorizon.org\/\",\"name\":\"Safe Horizon\",\"description\":\"Safety. Connection. Healing.\",\"publisher\":{\"@id\":\"https:\/\/www.safehorizon.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.safehorizon.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.safehorizon.org\/#organization\",\"name\":\"Safe Horizon\",\"url\":\"https:\/\/www.safehorizon.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.safehorizon.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2025\/04\/safe-logo-square.png\",\"contentUrl\":\"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2025\/04\/safe-logo-square.png\",\"width\":696,\"height\":696,\"caption\":\"Safe Horizon\"},\"image\":{\"@id\":\"https:\/\/www.safehorizon.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/facebook.com\/safehorizon\",\"https:\/\/x.com\/safehorizon\",\"https:\/\/www.instagram.com\/safehorizon\/\",\"https:\/\/www.linkedin.com\/company\/safe-horizon\",\"https:\/\/www.youtube.com\/user\/SafeHorizonNY\",\"https:\/\/en.wikipedia.org\/wiki\/Safe_Horizon\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.safehorizon.org\/#\/schema\/person\/863b8a4420ccb4b37ec21128f674a50a\",\"name\":\"Dana R\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.safehorizon.org\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/607834255dfd8abe6829e83748106c53942138baa872e2d858fbb3da6978e5c0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/607834255dfd8abe6829e83748106c53942138baa872e2d858fbb3da6978e5c0?s=96&d=mm&r=g\",\"caption\":\"Dana R\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IBM & Safe Horizon Partner to Address CyberStalking | Safe Horizon","description":"How can we support survivors of cyberstalking? Read about how we've partnered with IBM to help address this new form of stalking.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/","og_locale":"en_US","og_type":"article","og_title":"IBM & Safe Horizon Partner to Address CyberStalking","og_description":"How can we support survivors of cyberstalking? Read about how we've partnered with IBM to help address this new form of stalking.","og_url":"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/","og_site_name":"Safe Horizon","article_publisher":"http:\/\/facebook.com\/safehorizon","article_published_time":"2017-09-15T19:37:09+00:00","article_modified_time":"2025-06-10T17:38:32+00:00","og_image":[{"width":768,"height":432,"url":"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2017\/09\/IBM-and-Safe-Horizon-Partner-to-Address-CyberStalking.png","type":"image\/png"}],"author":"Dana R","twitter_card":"summary_large_image","twitter_creator":"@safehorizon","twitter_site":"@safehorizon","twitter_misc":{"Written by":"Dana R","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/#article","isPartOf":{"@id":"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/"},"author":{"name":"Dana R","@id":"https:\/\/www.safehorizon.org\/#\/schema\/person\/863b8a4420ccb4b37ec21128f674a50a"},"headline":"IBM &#038; Safe Horizon Partner to Address CyberStalking","datePublished":"2017-09-15T19:37:09+00:00","dateModified":"2025-06-10T17:38:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/"},"wordCount":634,"commentCount":0,"publisher":{"@id":"https:\/\/www.safehorizon.org\/#organization"},"image":{"@id":"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2017\/09\/IBM-Safe-Horizon-2017_Final.jpg","keywords":["Cyberstalking","technology-facilitated stalking"],"articleSection":["Safe Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/","url":"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/","name":"IBM & Safe Horizon Partner to Address CyberStalking | Safe Horizon","isPartOf":{"@id":"https:\/\/www.safehorizon.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/#primaryimage"},"image":{"@id":"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2017\/09\/IBM-Safe-Horizon-2017_Final.jpg","datePublished":"2017-09-15T19:37:09+00:00","dateModified":"2025-06-10T17:38:32+00:00","description":"How can we support survivors of cyberstalking? Read about how we've partnered with IBM to help address this new form of stalking.","breadcrumb":{"@id":"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/#primaryimage","url":"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2017\/09\/IBM-Safe-Horizon-2017_Final.jpg","contentUrl":"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2017\/09\/IBM-Safe-Horizon-2017_Final.jpg","width":353,"height":299,"caption":"IBM Safe Horizon 2017_Final"},{"@type":"BreadcrumbList","@id":"https:\/\/www.safehorizon.org\/safe-blog\/ibm-safe-horizon-address-cyberstalking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Safe Blog","item":"https:\/\/www.safehorizon.org\/.\/safe-blog\/"},{"@type":"ListItem","position":2,"name":"IBM &#038; Safe Horizon Partner to Address CyberStalking"}]},{"@type":"WebSite","@id":"https:\/\/www.safehorizon.org\/#website","url":"https:\/\/www.safehorizon.org\/","name":"Safe Horizon","description":"Safety. Connection. Healing.","publisher":{"@id":"https:\/\/www.safehorizon.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.safehorizon.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.safehorizon.org\/#organization","name":"Safe Horizon","url":"https:\/\/www.safehorizon.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.safehorizon.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2025\/04\/safe-logo-square.png","contentUrl":"https:\/\/www.safehorizon.org\/wp-content\/uploads\/2025\/04\/safe-logo-square.png","width":696,"height":696,"caption":"Safe Horizon"},"image":{"@id":"https:\/\/www.safehorizon.org\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/facebook.com\/safehorizon","https:\/\/x.com\/safehorizon","https:\/\/www.instagram.com\/safehorizon\/","https:\/\/www.linkedin.com\/company\/safe-horizon","https:\/\/www.youtube.com\/user\/SafeHorizonNY","https:\/\/en.wikipedia.org\/wiki\/Safe_Horizon"]},{"@type":"Person","@id":"https:\/\/www.safehorizon.org\/#\/schema\/person\/863b8a4420ccb4b37ec21128f674a50a","name":"Dana R","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.safehorizon.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/607834255dfd8abe6829e83748106c53942138baa872e2d858fbb3da6978e5c0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/607834255dfd8abe6829e83748106c53942138baa872e2d858fbb3da6978e5c0?s=96&d=mm&r=g","caption":"Dana R"}}]}},"taxonomies":{"categories":[{"term_id":2015,"name":"Safe Blog","slug":"safe-blog","term_group":0,"term_taxonomy_id":2015,"taxonomy":"category","description":"","parent":0,"count":149,"filter":"raw","cat_ID":2015,"category_count":149,"category_description":"","cat_name":"Safe Blog","category_nicename":"safe-blog","category_parent":0}],"tags":[{"term_id":485,"name":"Cyberstalking","slug":"cyberstalking","term_group":0,"term_taxonomy_id":485,"taxonomy":"post_tag","description":"","parent":0,"count":3,"filter":"raw"},{"term_id":635,"name":"technology-facilitated stalking","slug":"technology-facilitated-stalking","term_group":0,"term_taxonomy_id":635,"taxonomy":"post_tag","description":"","parent":0,"count":2,"filter":"raw"}],"issue":[{"term_id":19,"name":"Stalking","slug":"stalking","term_group":0,"term_taxonomy_id":19,"taxonomy":"issue","description":"Survivors of stalking are provided with a place to discuss their safety options, counseling, as well as advocacy with the police and courts.","parent":0,"count":94,"filter":"raw","acf":{"color":"#F9C300"}},{"term_id":21,"name":"Victims of Other Abuse","slug":"victims-of-other-abuse","term_group":0,"term_taxonomy_id":21,"taxonomy":"issue","description":"We help victims of all types of crime and abuse including: robbery, assault, harassment, elder abuse, gang violence, community violence, and families affected by homicide move from crisis to confidence.","parent":0,"count":253,"filter":"raw","acf":{"color":"#868B1A"}}]},"_links":{"self":[{"href":"https:\/\/www.safehorizon.org\/wp-json\/wp\/v2\/posts\/4715","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.safehorizon.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.safehorizon.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.safehorizon.org\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.safehorizon.org\/wp-json\/wp\/v2\/comments?post=4715"}],"version-history":[{"count":0,"href":"https:\/\/www.safehorizon.org\/wp-json\/wp\/v2\/posts\/4715\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.safehorizon.org\/wp-json\/wp\/v2\/media\/4757"}],"wp:attachment":[{"href":"https:\/\/www.safehorizon.org\/wp-json\/wp\/v2\/media?parent=4715"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.safehorizon.org\/wp-json\/wp\/v2\/categories?post=4715"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.safehorizon.org\/wp-json\/wp\/v2\/tags?post=4715"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}