top of page

From Bracelets to Boundaries: Where Taylor Swift Fandom Ends and Stalking Begins


Introduction

Taylor Swift is a prime example of modern celebrity fandom's complexity. Her extensive international influence, pervasive media presence, and highly interactive fan community offer valuable insights into the dynamics of modern fan engagement at an unparalleled scale. As distinctions between admiration and problematic behavior become increasingly ambiguous, it is important to critically assess the boundaries that separate enthusiastic participation from actions that may constitute boundary violations or stalking. Setting clear constraints helps ensure safety and guides how digital platforms manage fan interactions.

 

To provide additional insights into these matters, the article applies a behavioral threat assessment and management (BTAM) framework to examine Swift's fandom. This approach systematically examines patterns of fan behavior along a continuum, from healthy admiration to concerning fixation and, in rare cases, intrusive or threatening acts. By using BTAM principles, the discussion explores early warning signs, identifies risk factors for escalation, and emphasizes the importance of proactive interventions to safeguard both celebrities and fans. The BTAM lens also informs how structured assessment and targeted management strategies can help set appropriate boundaries and prevent unwanted pursuit or harassment in digital fan communities.

 

Defining Key Concepts in Fan Engagement

To provide a foundation for this discussion, it is important to define several terms. Understanding these concepts helps differentiate healthy admiration from problematic over-involvement.

 

  • Fandom refers to ongoing admiration and community participation, typically expressed through intended, public channels (Tsay-Vogel & Sanders, 2017).

  • Fixation describes an intense focus or preoccupation with a person, product, or interest that is not inherently harmful but can become concerning when paired with pursuit behaviors or functional impairment (Talbot & Dias, 2025).

  • Obsession typically refers to persistent, intrusive thoughts or repetitive behaviors that may significantly disrupt an individual's daily activities.

  • Celebrity worship is a research construct that captures varying degrees of involvement with a public figure, from benign interest to more intense, identity-linked attachment (Zsila et al., 2018).

  • Identification in this context is when a fan adopts aspects of a public figure’s image or traits as part of their own identity. While this can be positive, such as providing inspiration or motivation, it becomes concerning if the fan’s self-image relies on access to, recognition by, or reciprocity from the celebrity.

  • Parasocial interaction refers to the one-sided connections that fans may develop with celebrities. Although these bonds are not reciprocated, they can significantly shape fans’ perceptions and behaviors toward the public figures they admire (Maxwell et al., 2026).

  • Boundaries, the importance of consent and the characterization of unwanted pursuit, are central to this analysis. Understanding where boundaries lie, respecting consent, and recognizing the onset of unwanted or intrusive behaviors are crucial for differentiating positive engagement from harmful actions.

 

A continuum model shows how fan engagement can escalate from interest to fixation, active pursuit, and, in rare cases, intrusion. Since this process is gradual rather than impulsive, early awareness and intervention are important to prevent problematic outcomes.

 

When Fandom Crosses into Stalking: Illustrative Cases

Incidents often follow a pattern: public appreciation and respectful distance can turn into unwanted pursuit, persistent boundary-crossing, and escalating behavior. This shift highlights the need to understand how fandom can progress into stalking. The progression from healthy fandom to dangerous stalking is vividly illustrated through several high-profile cases. These examples highlight the escalation from admiration and fixation to intrusive and, in some instances, deadly behavior:

 

Madonna (Mid-1990s): Stalking with Explicit Threats and Attempted Proximity

Madonna's experience with stalking during the mid-1990s is frequently cited in discussions of celebrity-targeted harassment. The perpetrator engaged in repeated intrusions, issued coercive statements, and made persistent attempts to breach physical proximity. Addressing this threat required significant security measures and highlights the blend of intrusion and intimidation that can characterize celebrity stalking cases (Saunders, 1998, pp. 25–49).


Björk (1996): Fixation Escalating to an Attempted Mailed Attack

The case involving musician Björk in 1996 is a stark example of fixation evolving into planned action. A stalker, after a prolonged period of obsessive focus, orchestrated an attempted attack by mailing a dangerous device. The device was intercepted before reaching its target, but the case underscores how sustained preoccupation can progress into concrete and hazardous attempts to act on fantasy (ABC News, 2003).

 

Christina Grimmie (2016): Fan-to-Attacker at a Meet-and-Greet

In 2016, singer Christina Grimmie was tragically shot and killed by an obsessed fan during a post-concert meet-and-greet event in Orlando. This incident demonstrates how approach behaviors, even in seemingly controlled, semi-accessible settings, can become lethal when boundaries are breached, and obsession turns violent (Parfitt, 2023).

 

Ariana Grande (2021): Repeated Trespass, Burglary, and Stalking Adjudication

The case involved repeated intrusions and escalation by the subject, who allegedly broke into Grande’s Hollywood-area residence 92 times in 2021, including incidents where he brandished a knife and threatened security, leading to a restraining order that he later violated. In June 2022, he broke into her Montecito home, reportedly disabling security and cutting alarm and phone lines; police responded and found him hiding in a crawlspace. Investigators also reported he possessed over 2,000 images of Grande and sent Instagram messages indicating an intent to harm her. Grande’s stalker was sentenced to 3 years and 8 months in state prison after pleading guilty (Jan. 11, 2024) to multiple offenses tied to stalking Ariana Grande(Berston, 2024).

 

Taylor Swift (2017-2025): Boundary Crossing in Multiple Forms

Taylor Swift’s high visibility has made her a frequent stalking target, providing a unique lens through which to examine various stalking profiles. The diversity and persistence of these threats underscore the need for vigilant security and comprehensive threat management. She has experienced persistent stalking, with multiple individuals breaking into her homes, making threatening approaches, and being convicted of stalking-related crimes between 2017 and 2020. These incidents have included obsessive communication, unauthorized entry, possession of dangerous items, and attempts to forcibly access her property, highlighting ongoing security concerns. Taylor Swift was recently granted a temporary restraining order against a man who repeatedly visited her Los Angeles home, claimed a delusional relationship with her, and made statements disconnected from reality, including the belief that Swift was the mother of his child. His actions, which included one incident where he allegedly held a potential weapon, led Swift to fear for her safety (Beaumont-Thomas, 2025).

 

Mechanisms Driving Fandom Intensity

Fandom intensity is driven by psychological and social factors. Processes of identity formation (Hammond et al., 2022) and narrative construction (Margulis et al., 2022) are key factors. Many individuals develop a personal connection with the narratives, underlying themes, and genuine qualities present in artists' works such as those of Swift. Her “Eras” framework provides a clear narrative structure that lets listeners see their own life experiences reflected in her music and public life. This process strengthens fans’ sense of identification with Swift and deepens their emotional investment.

 

Social belonging motivates fans by providing community, shared rituals, and reinforcement through group acceptance. Variable rewards, such as surprise song releases and gamified activities, sustain engagement. Fandom also helps with emotion regulation, offering comfort and stress relief that deepen connections among fans and artists.


Parasocial Interaction vs. Erotomania: Key Differences and Implications

While both parasocial interactions and erotomania may appear similar due to an intense preoccupation with a public figure, they differ significantly both clinically and operationally. Understanding these differences is essential for assessing potential risk and guiding appropriate responses:


  • Parasocial Interaction: Parasocial interaction refers to a feeling of closeness that fans develop toward a celebrity or public figure through repeated exposure and emotional connection. Unlike delusions, people in parasocial relationships usually retain a sense of reality, knowing the celebrity isn't personally aware of them and sticking to appropriate boundaries.

  • Erotomania: Erotomania is a psychiatric disorder where someone staunchly believes that another person, frequently a celebrity or someone of higher social status, is in love with them. They maintain this belief even when there is no evidence for this belief or if there is evidence disproving their belief. What sets erotomanic delusions apart is that the person often interprets rejection as proof of requited adoration.

 

A Pathway to Boundary Crossing

While most fans appreciate and respect boundaries with performers, a small percentage demonstrate an observable progression from admiration to unwanted pursuit or stalking. This section examines how the Pathway to Violence framework sheds light on the shift from an engaged, prosocial fan to a boundary-crossing fanatic, demonstrating this gradual progression (Calhoun & Weston, 2003; Talbot & Dias, 2025). This application allows for a structured, prevention-oriented framework to identify when interest intensifies to access-seeking or when related patterns emerge that necessitate coordinated threat management. Mapping intervals along this pathway helps identify chances for early intervention, setting boundaries, and reducing harm before safety becomes a concern:

 

Interval 0: Baseline (Usual) Behavior

Fans often admire, enjoy, and connect with others through content and events. To maintain safety, clear norms about respect and boundaries help ensure everyone understands the limits of their interactions.

 

Interval 1: Identification Intensification

At this interval, a fan’s connection becomes a core part of their identity. Their dedication grows and boundaries may be perceived as threatening. Though not necessarily harmful, this identification can intensify reactions if the fan faces rejection or humiliation.

 

Interval 2: Precipitating Stressors/Grievance Formation

A fan may feel unjustly excluded, shifting from admiration to resentment and blaming others for limited access. Enforcing boundaries can worsen these feelings if seen as rejection. The best approach is to consistently maintain boundaries, avoid reinforcing fixation, keep structured reporting, and ensure coordinated messaging.

 

Interval 3: Ideation

At this interval, a fan shifts from admiration to craving direct contact or recognition from the artist. They may develop a sense of entitlement, believing the artist must respond to them, and often imagine personal interactions. This marks the transition from appreciation to problematic behavior driven by a perceived issue.

 

Interval 4: Research and Planning

At this point, the person shifts from casual interest to actively seeking information to get closer to the artist. They may track the artist's schedule, seek private details, and contact people close to the artist, aiming to facilitate direct contact or proximity. This reflects an important transition from thought to action, and elevated indication of a commitment to act.

 

Interval 5: Preparation, Probing and Breaching

As the pursuit escalates, the person starts seeking private contact with the artist, disregarding boundaries and becoming more intrusive by entering restricted areas or involving others. This shift from persistence to intrusion calls for active risk management, with formal safety protocols and coordinated responses among all parties to ensure protection.

 

Interval 6: Harm and Violence

At this interval, a person's actions may cause harm through fear, disruption, threats, property damage, or assault. Stalking itself can be the primary cause of psychological harm, with physical violence sometimes occurring. Managing this risk requires measures such as containment, protection, legal action, clinical intervention if needed, and continuous monitoring.

 

Detecting When Fandom Has Shifted to Stalking

Fandom involves admiration within accepted boundaries, while stalking is persistent, unwanted attention that crosses personal limits and causes distress or fear. The main difference lies in the pattern of behavior over time. This distinction is clearer when four main factors are considered:

 

  1. Consent and intended access
    1. Appropriate Fandom: Engages only via public or official channels.

    2. Boundary violation or Stalking: Seeks access through private, restricted, or indirect means.


  2. Persistence after rejection or non-response
    1. Appropriate Fandom: Accepts one-way relationships with celebrities.

    2. Boundary violation or Stalking: Views lack of response, blocking, or refusals as obstacles to overcome.


  3. Escalation pattern
    1. Appropriate Fandom: Intensity typically does not escalate to surveillance or direct approach.

    2. Boundary violation or Stalking: Involves increasing contact, proximity, and varied methods over time.


  4. Impact and distress

    1. Appropriate Fandom: Does not disturb or frighten the celebrity.

    2. Boundary violation or Stalking: Causes safety concerns, routine disruption, or significant emotional distress, even if framed as affection.

 

Risk Indicators and Warning Behaviors

Common stalking behavioral indicators (non-exhaustive list) include:

 

Unwanted Contact Attempts

Stalking-related behavior often manifests as persistent efforts to contact the target across multiple channels, including DMs or comments, frequent calls, and ongoing emails or letters. A key indicator is persistence after clear non-response or blocking, sometimes including the creation of new accounts or alternate methods to reinitiate contact.

 

Surveillance and Information-Gathering

Another frequently observed behavior includes tracking a target’s whereabouts and routine, as well as seeking out confidential details not meant for the public. Sometimes, this escalates into “crowdsourced surveillance,” where others are asked to provide, verify, or spread real-time location updates about the person which broadens exposure and intensifies privacy violations.

 

Approach Behaviors

An indicator of escalating risk may be when a fan repeatedly attempts to physically approach the target outside structured, managed contexts such as sanctioned artist meet and greets. Rather than attending public appearances in a typical way, the person personalizes the relationship and continues with attempts to create direct contact or proximity. This blurs the boundary between respectful participation and intrusive pursuit or stalking.

 

Coercion, Intimidation, and Retaliation: Higher Concern Behaviors

Behaviors that involve coercion, intimidation, or retaliation are considered particularly concerning within the context of stalking and boundary violations. These actions can trigger marked fear and distress for the target, and often represent an escalation from less direct forms of intrusiveness:

 

  • Implicit or Explicit Threats: Individuals may make statements or take actions that suggest harm or negative consequences for the target, either directly or indirectly. These threats can be verbal, written, or conveyed through other means, and contribute to a heightened sense of risk for the person being targeted.

  • Harassment Campaigns: Persistent and coordinated efforts to harass an individual, often involving repeated unwanted contact or attempts to undermine the target’s reputation, are a serious form of boundary violation.

  • Doxxing: The act of publicly sharing private or sensitive information about the target without their consent is a significant violation of privacy. Doxxing is often used to intimidate or punish individuals.

  • Impersonation: In some cases, individuals may assume the identity of the target or someone close to them, with the intent to deceive, manipulate, or gain access to information or people. Impersonation can lead to confusion, mistrust, and further emotional distress.

  • Contacting Associates, Employees, or Family Members: Attempts to reach the target through their network, such as associates, colleagues, employees, or family, are another concerning behavior. These efforts are often made to bypass barriers or deliver messages indirectly, further invading the target’s privacy and expanding the scope of the harassment.

 

Escalation Points That May Signal Elevated Danger

Sudden changes in baseline behavior may indicate intensifying risk. The following are escalation warning signs that usually require closer monitoring and quicker action:

 

  • Boundary Violations and Offline Contact

    When a clear boundary is established, such as being blocked, denied access, removed from an area, or explicitly warned, the concerning individual may respond by immediately intensifying their efforts. This intensification can manifest in several ways:


    • The person may escalate the frequency of their attempts to make contact.

    • Switch to alternative communication channels.

    • Increase the number of attempts to physically approach or be near the target.

 

These behaviors reflect an unwillingness to respect boundaries and a determination to circumvent any limits set by the target or those around them.

 

  • Shift from Online Fixation to Offline Pursuit

    A major escalation occurs when someone moves from online engagement with a target to repeated, uninvited in-person encounters. This shift from remote attention to direct contact signals increased risk and boundary violations.

 

  • Expansion of Targets or Methods

    Sometimes, the individual tries to reach the target by contacting third parties like staff, friends, or venues. This method, called third-party contact, expands their tactics. The person may also impersonate others or have messages relayed, making the situation more complex.

 

  • Leakage and “Specialness” Claims

    Statements about a unique or “special” connection or entitlement to the target often appear in public messages expressing an intent to confront or gain attention. These claims can indicate increased risk and changing boundaries.

 

  • Threatening, Retaliatory, or Grievance-Fueled Language

    Signs of escalation can include threatening or retaliatory statements, such as expressions of anger over rejection, feelings of humiliation, or phrases like “they made me do this,” all of which point to growing hostility. Such messages typically reflect heightened emotional intensity and could signal the potential for direct aggression. While these indicators do not necessarily mean violence will occur, they highlight the importance of conducting careful risk assessments and taking appropriate action.


Harm and Operational Impact

Boundary violations in fan-celebrity interactions can lead to major consequences. Public figures and their teams face greater safety risks and disruptions to daily life, as repeated privacy invasions undermine their boundaries and security. These violations also affect communities and organizations, making fan spaces less safe and welcoming. Event organizers must continually adapt to address these risks and maintain a secure environment for everyone.

 

Boundary-Setting by Design

It is recommended that platforms, venues, and management teams proactively design systems and procedures that facilitate clear boundary-setting. By embedding boundary-setting into the design of interactions, these entities can better manage relationships and ensure that engagement remains appropriate and safe. For example:

 

Explicit Codes of Conduct

Platforms and event organizers can establish and prominently display codes of conduct that clearly outline acceptable and unacceptable behaviors in fan-celebrity interactions, ensuring everyone knows the boundaries in advance.

 

Pre-Event Communication

Venues can send participants clear guidelines about expected conduct and boundaries prior to events and provide reminders on-site through signage or digital notifications.

 

Moderation Tools

Online platforms can implement moderation tools that allow for automatic flagging of boundary-crossing behaviors (such as doxxing, harassment, or inappropriate messaging) and provide users with options to block or report concerning interactions easily.

 

Structured Meet & Greet / Q&A Sessions

During live events, management teams can moderate Q&A sessions, requiring participants to submit questions in advance, which are then screened for appropriateness, ensuring respectful engagement with public figures.

 

Clear Reporting Mechanisms

Both online and in-person settings can offer straightforward, confidential ways for individuals to report boundary violations, ensuring that concerns are addressed promptly and without fear of retaliation.

 

Designated Safe Spaces

At conventions or meet-and-greets, venues might designate specific areas for interactions with clear rules and staff present to facilitate respectful and safe exchanges.


Implications for BTAM Professionals

From a BTAM perspective, celebrity-focused stalking presents unique challenges. These cases often exist at the intersection of fixation, access, and opportunity, making early detection and coordinated management essential for effective intervention.

 

Reframing Cases Around Behaviors and Trajectories

BTAM teams are encouraged to avoid relying on simplistic labels such as “superfan,” “mentally ill,” or “harmless.” Instead, the central organizing question should focus on the individual's behavioral patterns, their evolution over time, and their response to established boundaries. This approach enables teams to better assess risk by focusing on observable actions and changes rather than preconceived categories.

 

Use of Structured Professional Judgment Tools

When appropriate, teams should employ stalking-specific Structured Professional Judgment (SPJ) tools, such as the Stalking Risk Profile (SRP) (McEwan, 2019). These tools are designed to facilitate risk reasoning across domains including violence, persistence, recurrence, and psychosocial harm. It is important to note that these tools require appropriate training and competence, as they are not simple checklists but structured frameworks for professional judgment.


Development of a Coordinated Response Blueprint

BTAM strategies should include a well-defined and coordinated response architecture. Key components often involve a single intake channel for reporting incidents, consistent criteria for triage, and centralized documentation of all incidents (including dates, content and context). Communication should be coordinated among security personnel, legal teams, platform moderators, and local law enforcement when certain thresholds are met. Additionally, safety planning should prioritize the victim or target, ensuring that protective measures do not inadvertently amplify the pursuer’s perceived relationship with the public figure.

 

Integrated Intervention for Fixation Cases

In cases involving fixation, risk reduction may necessitate a combination of protective measures and clinical intervention. Specialized models, such as joint police and mental health approaches, can be particularly effective when dealing with individuals who target public figures. These integrated strategies acknowledge the need for both care and control to achieve optimal outcomes for all parties involved.

 

Third-Party Consultant Retention

Organizations that support high-visibility individuals (executives, clinicians, public figures, campus leaders, creators) can materially improve prevention and response by maintaining qualified third-party consultants on retainer who specialize in stalking, fixation, and boundary-violating pursuit. This is less about “outsourcing safety” and more about ensuring rapid access to niche expertise when escalation is time sensitive. Operationally, the value is speed, consistency, and defensibility. Pre-established consultants can be activated quickly, work from agreed protocols, and help keep responses aligned, documented, and proportionate. This also reduces “ad hoc” decision-making that can unintentionally escalate risk (for example, inconsistent boundary setting or engagement that reinforces persistence).

 

Ethical Considerations and Limitations

Since this topic covers psychology, public safety, and online communities, analysis should note limited generalizability from single cases, possible sample bias, varying laws, and complex causes. These ethical constraints ensure the article remains focused on prevention, prioritizes victims, and maintains transparency about its conclusions.

 

Ethical considerations
  • Do not pathologize fandom: focus on behavior, consent, persistence, and impact.

  • Avoid remote diagnoses: use non-clinical, descriptive terms for public cases.

  • Victim-centered approach: address stalking by focusing on perpetrator actions and boundary violations, not on victim behavior.

  • Protect privacy: remove identifying details and avoid sensationalism when referencing incidents.

 

Article Limitations
  • Case-study generalizability: Taylor Swift’s unique fame means some findings may not apply to other fan groups.

  • Visibility bias: media often focuses on rare extreme events, overlooking typical positive fandom experiences.

  • Definition variability: Stalking and harassment are defined differently across regions and legal frameworks.

  • Causality constraints: factors like parasocial ties, loneliness, or social media algorithms contribute but don’t fully explain rare boundary violations.

  • Ecosystem change: ongoing changes in platforms, moderation, and security limit the lasting relevance of platform-specific observations.

 

Conclusion

Taylor Swift’s fanbase shows how celebrity culture can both foster strong connections and, for a small minority, lead to boundary-crossing behaviors that present real safety risks. The same factors that make fandom so engaging, like feeling close to the celebrity, identifying with their public image, and finding community, can also create situations where some fans feel justified in trying to access the celebrity, take rejection personally, or mistake persistence for devotion.

 

For those working to prevent problems on platforms, at venues, or within organizations, the focus should not be on criticizing fandom, but on preventing rare cases from escalating from healthy enthusiasm into intrusion. A BTAM-informed approach recognizes that escalation is typically gradual and can be addressed early. Effective intervention involves monitoring visible patterns, reducing encouragement and information leaks, making unwanted contact more difficult, and consistently enforcing boundaries with clear reporting processes. Fan communities can contribute by promoting respect as core to being a true fan and discouraging privacy breaches or attention-seeking behavior.

 

This example illustrates that today’s fandom exists in an always-connected world, intensifying feelings of closeness, reinforcing shared norms, and sometimes blurring relationship boundaries. The goal is to protect privacy, safety, and dignity without diminishing the enjoyment or sense of community in fandom. By focusing on actions and harm reduction rather than labels or fear, we allow fandom to flourish through connection, creativity, and community, while better managing the rare instances when admiration becomes problematic.

 

About the Author

Dr. Matt Talbot, PhD, LCSW, CFMHE, CCFC, CTM, is a subject matter expert in behavioral threat assessment, violence risk assessment, forensic mental health, and workplace violence prevention. He has helped develop violence prevention programs for Fortune 50 corporations, major healthcare institutions, and K–12 schools and created the first collegiate certificate in behavioral threat assessment and engagement at Alliant International University. Dr. Talbot previously served as President of the South Central Chapter of the Association of Threat Assessment Professionals and is a renowned public and keynote speaker. He holds a PhD in Forensic Psychology, is a clinically licensed social worker in several states, and is a Certified Threat Manager, Certified Forensic Mental Health Evaluator, and Clinically Certified Forensic Counselor.

 

References

  • ABC News. (2003, Dec 11). Inside the Mind of a Celebrity Stalker. Retrieved from https://abcnews.go.com/Primetime/story?id=132422&page=1

  • Beaumont-Thomas, B. (2025, Jun 10). Taylor Swift granted restraining order against alleged stalker. https://www.theguardian.com/music/2025/jun/10/taylor-swift-granted-restraining-order-against-alleged-stalker

  • Berston, Z. (2024, May 3). Ariana Grande's stalker sentenced to 3 years and 8 months in state prison. Retrieved from https://www.ksby.com/news/local-news/ariana-grandes-stalker-sentenced-to-three-years-and-eight-months-in-state-prison 

  • Calhoun, F. & Weston, S. (2003). Contemporary Threat Management: A Practical Guide for Identifying, Assessing, and Managing Individuals of Violent Intent. Specialized Training Services.

  • Hammond, A. B., Johnson, S. K., Weiner, M. B., & Lerner, J. V. (2024). From Taylor Swift to MLK: Understanding adolescents’ famous character role models. Journal of Moral Education, 53(1), 157–175. https://doi.org/10.1080/03057240.2022.2041409

  • Kropp, P.R., Hart, S. & Lyon, D. (2024). Guidelines for Stalking Assessment and Management, Version 2. Protect International.

  • Margulis, E., Williams, J., Simchy-Gross, R., & Mcauley, J. (2022). When did that happen? The dynamic unfolding of perceived musical narrative. Cognition. 226. 10.1016/j.cognition.2022.105180

  • Maxwell, L. C., Tefertiller, A. C., & Neese, C. (2026). “It’s you and me, there’s nothing like this”: Parasocial relationships, fear of missing out, and how fans consume the products in Taylor Swift’s media empire. Psychology of Popular Media, 15(1), 90–99. https://doi.org/10.1037/ppm0000588

  • McEwan, T. (2019). Stalking risk profile (srp). In The SAGE encyclopedia of criminal psychology (Vol. 4, pp. 1444-1446). SAGE Publications, Inc., https://doi.org/10.4135/9781483392240.n468

  • Parfitt, R. (2023). Christina Grimmie, the forgotten murder. How do we detect and stop deranged fans: A case study for threat assessment. Journal of Threat Assessment and Management, 10(1), 18–31. https://doi.org/10.1037/tam0000181 

  • Saunders, R. (1998). The legal perspective on stalking. In J. R. Meloy (Ed.), The psychology of stalking: Clinical and forensic perspectives (pp. 25–49). Academic Press.

  • Talbot, M. & Dias, B. (2025). Predators, Posers & Pained Personalities: Defensible and Effective Strategies to Prevent Targeted Violence and Manage Malevolent Behaviors. Key Operational Insights, LLC.

  • Tsay-Vogel, M., & Sanders, M. S. (2017). Fandom and the search for meaning: Examining communal involvement with popular media beyond pleasure. Psychology of Popular Media Culture, 6(1), 32–47. https://doi.org/10.1037/ppm0000085

  • Zsila, Á., Mccutcheon, L. E., & Demetrovics, Z. (2018). The association of celebrity worship with problematic Internet use, maladaptive daydreaming, and desire for fame. Journal of Behavioral Addictions, 7(3), 654–664. https://doi.org/10.1556/2006.7.2018.76

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page