{"guid":"4db8970f-bbfe-4541-90a8-31a05d599ffb","title":"(Cyber-)Stalking: Wenn Grenzen verschwimmen","subtitle":null,"slug":"35c3-10027-cyber-_stalking_wenn_grenzen_verschwimmen","link":"https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10027.html","description":"\u003cp\u003eVon unerwünschten Nachrichten über Bedrohungen bis hin zum Intimizid. Allein im Jahr 2017 wurden rund 18.483 Fälle von Stalking polizeilich erfasst, die Dunkelziffer wird auf 600.000-800.000 Betroffene geschätzt. Unter dem Begriff Stalking wird allgemein das „wiederholte, widerrechtliche Verfolgen und Belästigen eines Menschen, so dass dessen Sicherheit bedroht und er/sie in seiner/ihrer Lebensgestaltung schwerwiegend beeinträchtig wird“ verstanden. Die Ausführungsformen und Intensität des Stalkings oder Cyberstalkings sind sehr heterogen, sodass sich oft die Frage nach der Grenze zur Strafbarkeit stellt.\u003c\\p\u003e\n\n\u003cp\u003eNeben einer kurzen Einführung in den Phänomenbereich werden die Ursachen und Typologien des Stalkings skizziert, sowie Internventionsmöglichkeiten präsentiert: Welche psychotherapeutischen Unterstützungsmaßnahmen gibt es für Betroffene und Ausführende? Welche juristischen Möglichkeiten gibt es?  \u003c\\p\u003e\n\u003cp\u003eDa rund jeder zwölfte Mensch in Deutschland in seinem Leben von Stalking betroffen ist und der/die Ausführende zumeist aus dem Nahbereich der/des Betroffenen stammt, kann sich auch im eigenen Freundeskreis die Frage stellen: Wie kann ich einer/m Stalking-Betroffen/m unterstützen und helfen? Oder wie spreche ich eine/n vermutlichen Stalking-Ausführende/n auf sein/ihr Verhalten an?\u003c\\p\u003e\n","original_language":"deu","persons":["Jan Kalbitzer","Korina Winter "],"tags":["35c3","10027","Ethics, Society \u0026 Politics"],"view_count":3328,"promoted":false,"date":"2018-12-27T00:00:00.000+01:00","release_date":"2018-12-27T01:00:00.000+01:00","updated_at":"2026-01-21T06:30:07.178+01:00","length":2378,"duration":2378,"thumb_url":"https://static.media.ccc.de/media/congress/2018/10027-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2018/10027-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2018/10027-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2018/10027-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/35c3-10027-cyber-_stalking_wenn_grenzen_verschwimmen","url":"https://api.media.ccc.de/public/events/4db8970f-bbfe-4541-90a8-31a05d599ffb","conference_title":"35C3: Refreshing Memories","conference_url":"https://api.media.ccc.de/public/conferences/35c3","related":[{"event_id":6378,"event_guid":"15f4e5c5-40e1-4c73-8da0-4cc2a773ab13","weight":231},{"event_id":6379,"event_guid":"9dde571b-4d49-4b44-8329-42e354bcc24b","weight":115},{"event_id":6380,"event_guid":"e9095f5f-a38a-48da-b3d7-20da141b8b14","weight":102},{"event_id":6383,"event_guid":"7177142b-6f15-4fac-af62-c45df7a377a9","weight":361},{"event_id":6389,"event_guid":"c8b34953-b60f-4ed0-8784-dc20153e0725","weight":236},{"event_id":6390,"event_guid":"6a5007f4-e7d6-4c63-9a10-26dd48a6eb6c","weight":134},{"event_id":6391,"event_guid":"1601bf3b-ce4a-44c9-993f-7d28fa65168d","weight":308},{"event_id":6392,"event_guid":"65563dfd-db48-41ea-85a9-e889dd673d09","weight":115},{"event_id":6397,"event_guid":"51ede2da-0f9b-4984-bd58-659c556d20c9","weight":101},{"event_id":6399,"event_guid":"a5de31e6-0223-4b1f-953c-558e2fd39bd9","weight":335},{"event_id":6400,"event_guid":"527b56af-8d56-4edb-9027-9ca60767c742","weight":140},{"event_id":6401,"event_guid":"f0d70663-0769-4462-ad27-bc516d9cb141","weight":110},{"event_id":6406,"event_guid":"686c1387-e761-4df6-b395-f9ddf92d46e7","weight":232},{"event_id":6408,"event_guid":"ffdc92f3-1a39-4931-9409-f8bfabe9f628","weight":94},{"event_id":6410,"event_guid":"a12d17e9-3758-4fa0-b612-0c6ba22ea773","weight":179},{"event_id":6411,"event_guid":"42650545-4394-4455-a5f5-9efad111fedc","weight":142},{"event_id":6413,"event_guid":"a9c0c28c-4f40-4d06-99da-d73fbb2655c4","weight":143},{"event_id":6421,"event_guid":"1a28630d-985e-409b-be4a-b6679ecc83c3","weight":184},{"event_id":6423,"event_guid":"ea7c532f-cc2d-4cb1-8f15-1933df7fd523","weight":141},{"event_id":6430,"event_guid":"462f9320-3a0e-4785-82de-15343803c2ba","weight":174},{"event_id":6462,"event_guid":"23e85d7a-9645-4ae2-9954-63b71abc08d4","weight":111},{"event_id":6474,"event_guid":"f58a2b6d-bde0-483b-a8db-043ea9371cb6","weight":98},{"event_id":6499,"event_guid":"a750228d-a37d-43c0-8e2f-d46137a991dc","weight":108},{"event_id":6511,"event_guid":"4f6f4278-1cfb-4e8d-935d-ec0ac2adefc5","weight":100},{"event_id":6543,"event_guid":"48ed6dea-e67d-4866-8c35-318e9d892363","weight":105}],"recordings":[{"size":null,"length":null,"mime_type":"application/x-subrip","language":"deu","filename":"35c3-10027-deu-eng-Cyber-_Stalking_Wenn_Grenzen_verschwimmen.de.srt","state":"complete","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2021-02-21T17:47:23.463+01:00","recording_url":"https://cdn.media.ccc.de/congress/2018/35c3-10027-deu-eng-Cyber-_Stalking_Wenn_Grenzen_verschwimmen.de.srt","url":"https://api.media.ccc.de/public/recordings/44547","event_url":"https://api.media.ccc.de/public/events/4db8970f-bbfe-4541-90a8-31a05d599ffb","conference_url":"https://api.media.ccc.de/public/conferences/35c3"},{"size":330,"length":2378,"mime_type":"video/mp4","language":"deu","filename":"35c3-10027-deu-Cyber-_Stalking_Wenn_Grenzen_verschwimmen.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2018-12-27T19:40:34.205+01:00","recording_url":"https://cdn.media.ccc.de/congress/2018/h264-hd/35c3-10027-deu-Cyber-_Stalking_Wenn_Grenzen_verschwimmen.mp4","url":"https://api.media.ccc.de/public/recordings/30836","event_url":"https://api.media.ccc.de/public/events/4db8970f-bbfe-4541-90a8-31a05d599ffb","conference_url":"https://api.media.ccc.de/public/conferences/35c3"},{"size":330,"length":2378,"mime_type":"video/mp4","language":"eng","filename":"35c3-10027-eng-Cyber-_Stalking_Wenn_Grenzen_verschwimmen.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2018-12-27T19:40:46.053+01:00","recording_url":"https://cdn.media.ccc.de/congress/2018/h264-hd/35c3-10027-eng-Cyber-_Stalking_Wenn_Grenzen_verschwimmen.mp4","url":"https://api.media.ccc.de/public/recordings/30837","event_url":"https://api.media.ccc.de/public/events/4db8970f-bbfe-4541-90a8-31a05d599ffb","conference_url":"https://api.media.ccc.de/public/conferences/35c3"},{"size":397,"length":2378,"mime_type":"video/mp4","language":"deu-eng","filename":"35c3-10027-deu-eng-Cyber-_Stalking_Wenn_Grenzen_verschwimmen_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2018-12-27T19:40:57.704+01:00","recording_url":"https://cdn.media.ccc.de/congress/2018/h264-hd/35c3-10027-deu-eng-Cyber-_Stalking_Wenn_Grenzen_verschwimmen_hd.mp4","url":"https://api.media.ccc.de/public/recordings/30838","event_url":"https://api.media.ccc.de/public/events/4db8970f-bbfe-4541-90a8-31a05d599ffb","conference_url":"https://api.media.ccc.de/public/conferences/35c3"},{"size":106,"length":2378,"mime_type":"video/mp4","language":"deu-eng","filename":"35c3-10027-deu-eng-Cyber-_Stalking_Wenn_Grenzen_verschwimmen_hd-slides.mp4","state":"new","folder":"slides-h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2018-12-27T20:24:38.893+01:00","recording_url":"https://cdn.media.ccc.de/congress/2018/slides-h264-hd/35c3-10027-deu-eng-Cyber-_Stalking_Wenn_Grenzen_verschwimmen_hd-slides.mp4","url":"https://api.media.ccc.de/public/recordings/30880","event_url":"https://api.media.ccc.de/public/events/4db8970f-bbfe-4541-90a8-31a05d599ffb","conference_url":"https://api.media.ccc.de/public/conferences/35c3"},{"size":140,"length":2378,"mime_type":"video/mp4","language":"deu-eng","filename":"35c3-10027-deu-eng-Cyber-_Stalking_Wenn_Grenzen_verschwimmen_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2018-12-27T20:25:09.407+01:00","recording_url":"https://cdn.media.ccc.de/congress/2018/h264-sd/35c3-10027-deu-eng-Cyber-_Stalking_Wenn_Grenzen_verschwimmen_sd.mp4","url":"https://api.media.ccc.de/public/recordings/30881","event_url":"https://api.media.ccc.de/public/events/4db8970f-bbfe-4541-90a8-31a05d599ffb","conference_url":"https://api.media.ccc.de/public/conferences/35c3"},{"size":36,"length":2378,"mime_type":"audio/mpeg","language":"deu","filename":"35c3-10027-deu-Cyber-_Stalking_Wenn_Grenzen_verschwimmen_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2018-12-28T00:40:05.919+01:00","recording_url":"https://cdn.media.ccc.de/congress/2018/mp3/35c3-10027-deu-Cyber-_Stalking_Wenn_Grenzen_verschwimmen_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/31029","event_url":"https://api.media.ccc.de/public/events/4db8970f-bbfe-4541-90a8-31a05d599ffb","conference_url":"https://api.media.ccc.de/public/conferences/35c3"},{"size":531,"length":2378,"mime_type":"video/webm","language":"deu-eng","filename":"35c3-10027-deu-eng-Cyber-_Stalking_Wenn_Grenzen_verschwimmen_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2018-12-28T00:53:22.001+01:00","recording_url":"https://cdn.media.ccc.de/congress/2018/webm-hd/35c3-10027-deu-eng-Cyber-_Stalking_Wenn_Grenzen_verschwimmen_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/31037","event_url":"https://api.media.ccc.de/public/events/4db8970f-bbfe-4541-90a8-31a05d599ffb","conference_url":"https://api.media.ccc.de/public/conferences/35c3"},{"size":23,"length":2378,"mime_type":"audio/opus","language":"deu","filename":"35c3-10027-deu-Cyber-_Stalking_Wenn_Grenzen_verschwimmen_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2018-12-28T00:53:24.854+01:00","recording_url":"https://cdn.media.ccc.de/congress/2018/opus/35c3-10027-deu-Cyber-_Stalking_Wenn_Grenzen_verschwimmen_opus.opus","url":"https://api.media.ccc.de/public/recordings/31038","event_url":"https://api.media.ccc.de/public/events/4db8970f-bbfe-4541-90a8-31a05d599ffb","conference_url":"https://api.media.ccc.de/public/conferences/35c3"},{"size":220,"length":2378,"mime_type":"video/webm","language":"deu-eng","filename":"35c3-10027-deu-eng-Cyber-_Stalking_Wenn_Grenzen_verschwimmen_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2018-12-28T02:52:40.330+01:00","recording_url":"https://cdn.media.ccc.de/congress/2018/webm-sd/35c3-10027-deu-eng-Cyber-_Stalking_Wenn_Grenzen_verschwimmen_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/31093","event_url":"https://api.media.ccc.de/public/events/4db8970f-bbfe-4541-90a8-31a05d599ffb","conference_url":"https://api.media.ccc.de/public/conferences/35c3"}]}