SlideShare a Scribd company logo
1 of 12
Cyberstalking
What is Cyberstalking?


A technologically-based “attack” on one person
who has been targeted specifically for that attack
for reasons of anger, revenge or control.



Cyberstalking can take many forms, including:
harassment, embarrassment and humiliation of
the victim
emptying bank accounts or other economic
control such as ruining the victim's credit score
harassing family, friends and employers to
isolate the victim
scare tactics to instill fear and more.
What is Cyberstalking?


The term can also apply to a “traditional” stalker who
uses technology to trace and locate their victim and their
movements more easily (e.g. using Facebook
notifications to know what party they are attending).



A true cyberstalker’s intent is to harm their intended
victim using the anonymity and untraceable distance of
technology. In many situations, the victims never
discover the identity of the cyberstalkers who hurt them,
despite their lives being completely by the perpetrator.



The actions of a cyberstalker are deliberate and focused
on the consequences to the victim.
How can Cyberstalking affect you?
What does a cyberstalker do?


False accusations: Many cyberstalkers try to damage
the reputation of their victim and turn other people
against them. They post false information about them on
websites. They may set up their own websites, blogs or
user pages for this purpose. They post allegations about
the victim to newsgroups, chat rooms, or other sites that
allow public contributions.



Attempts to gather information about the victim.
Cyberstalkers may approach their victim's friends,
family, and work colleagues to obtain personal
information. They may advertise for information on the
Internet, or hire a private detective.



Monitoring their target's online activities and attempting
to trace their IP address in an effort to gather more
information about their victims.
What does a cyberstalker do?
Encouraging

others to harass the victim. Many
cyberstalkers try to involve third parties in the
harassment. They may claim the victim has harmed
the stalker or his/her family in some way, or may post
the victim's name and telephone number in order to
encourage others to join the pursuit.
False

victimization. The cyberstalker will claim that
the victim is harassing him/her. This phenomenon
has been noted in a number of well-known cases.
Attacks

on data and equipment. They may try to
damage the victim's computer by sending viruses.
What does a cyberstalker do?


Ordering goods and services. They order
items or subscribe to magazines in the
victim's name. These often involve
subscriptions to pornography or ordering sex
toys then having them delivered to the victim's
workplace.



Arranging to meet. Young people face a
particularly high risk of having cyberstalkers
try to set up meetings between them.



Cyberstalking is a form of cyberbullying.
How did the cyberstalker find me?
How did the cyberstalker find me?


Cyberstalkers find their victims by using search engines, online
forums, bulletin and discussion boards, chat rooms, and more
recently, through social networking sites, such as MySpace,
Facebook, Bebo, Friendster, Twitter, and Indymedia, a media
outlet known for self-publishing. They may engage in live chat
harassment or flaming or they may send electronic viruses and
unsolicited e-mails. Cyberstalkers may research individuals to
feed their obsessions and curiosity. Conversely, the acts of
cyberstalkers may become more intense, such as repeatedly
instant messaging their targets.



More commonly they will post defamatory or derogatory
statements about their stalking target on web pages, message
boards, and in guest books designed to get a reaction or
response from their victim, thereby initiating contact. In some
cases, they have been known to create fake blogs in the name
of the victim containing defamatory or pornographic content.
How did the cyberstalker find me?


When prosecuted, many stalkers have unsuccessfully attempted
to justify their behavior based on their use of public forums, as
opposed to direct contact. Once they get a reaction from the
victim, they will typically attempt to track or follow the victim's
internet activity. Classic cyberstalking behavior includes the
tracing of the victim's IP address in an attempt to verify their
home or place of employment.



Some cyberstalking situations do evolve into physical stalking,
and a victim may experience abusive and excessive phone
calls, vandalism, threatening or obscene mail, trespassing, and
physical assault. Moreover, many physical stalkers will use
cyberstalking as another method of harassing their victims.



A 2007 study led by Paige Padgett from the University of Texas
Health Science Center found that there was a false degree of
safety assumed by women looking for love online.
What can I do to protect myself?
References:





Youtube.com
About.com (by cyberstalking expert
Alexis A. Moore, founder of the national
advocacy group Survivors in Action)
Wikipedia.org

More Related Content

What's hot

Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
bolan1jt
 

What's hot (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Similar to Cyberstalking

Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
Digital-identity
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
ijtsrd
 

Similar to Cyberstalking (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
 
123.pptx
123.pptx123.pptx
123.pptx
 
Cyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
Cyber security ATTACK on Retired Personnel, MITIGATION and Best PracticesCyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
Cyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
E-Tech_Lesson2.pptx
E-Tech_Lesson2.pptxE-Tech_Lesson2.pptx
E-Tech_Lesson2.pptx
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
 
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER SAFETY.pptx
CYBER SAFETY.pptxCYBER SAFETY.pptx
CYBER SAFETY.pptx
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
 
Cyrenne Madlangsakay
Cyrenne MadlangsakayCyrenne Madlangsakay
Cyrenne Madlangsakay
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for Individuals
 
Edp 279 unit 2.4
Edp 279 unit 2.4Edp 279 unit 2.4
Edp 279 unit 2.4
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 

Recently uploaded

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Recently uploaded (20)

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

Cyberstalking

  • 2. What is Cyberstalking?  A technologically-based “attack” on one person who has been targeted specifically for that attack for reasons of anger, revenge or control.  Cyberstalking can take many forms, including: harassment, embarrassment and humiliation of the victim emptying bank accounts or other economic control such as ruining the victim's credit score harassing family, friends and employers to isolate the victim scare tactics to instill fear and more.
  • 3. What is Cyberstalking?  The term can also apply to a “traditional” stalker who uses technology to trace and locate their victim and their movements more easily (e.g. using Facebook notifications to know what party they are attending).  A true cyberstalker’s intent is to harm their intended victim using the anonymity and untraceable distance of technology. In many situations, the victims never discover the identity of the cyberstalkers who hurt them, despite their lives being completely by the perpetrator.  The actions of a cyberstalker are deliberate and focused on the consequences to the victim.
  • 4. How can Cyberstalking affect you?
  • 5. What does a cyberstalker do?  False accusations: Many cyberstalkers try to damage the reputation of their victim and turn other people against them. They post false information about them on websites. They may set up their own websites, blogs or user pages for this purpose. They post allegations about the victim to newsgroups, chat rooms, or other sites that allow public contributions.  Attempts to gather information about the victim. Cyberstalkers may approach their victim's friends, family, and work colleagues to obtain personal information. They may advertise for information on the Internet, or hire a private detective.  Monitoring their target's online activities and attempting to trace their IP address in an effort to gather more information about their victims.
  • 6. What does a cyberstalker do? Encouraging others to harass the victim. Many cyberstalkers try to involve third parties in the harassment. They may claim the victim has harmed the stalker or his/her family in some way, or may post the victim's name and telephone number in order to encourage others to join the pursuit. False victimization. The cyberstalker will claim that the victim is harassing him/her. This phenomenon has been noted in a number of well-known cases. Attacks on data and equipment. They may try to damage the victim's computer by sending viruses.
  • 7. What does a cyberstalker do?  Ordering goods and services. They order items or subscribe to magazines in the victim's name. These often involve subscriptions to pornography or ordering sex toys then having them delivered to the victim's workplace.  Arranging to meet. Young people face a particularly high risk of having cyberstalkers try to set up meetings between them.  Cyberstalking is a form of cyberbullying.
  • 8. How did the cyberstalker find me?
  • 9. How did the cyberstalker find me?  Cyberstalkers find their victims by using search engines, online forums, bulletin and discussion boards, chat rooms, and more recently, through social networking sites, such as MySpace, Facebook, Bebo, Friendster, Twitter, and Indymedia, a media outlet known for self-publishing. They may engage in live chat harassment or flaming or they may send electronic viruses and unsolicited e-mails. Cyberstalkers may research individuals to feed their obsessions and curiosity. Conversely, the acts of cyberstalkers may become more intense, such as repeatedly instant messaging their targets.  More commonly they will post defamatory or derogatory statements about their stalking target on web pages, message boards, and in guest books designed to get a reaction or response from their victim, thereby initiating contact. In some cases, they have been known to create fake blogs in the name of the victim containing defamatory or pornographic content.
  • 10. How did the cyberstalker find me?  When prosecuted, many stalkers have unsuccessfully attempted to justify their behavior based on their use of public forums, as opposed to direct contact. Once they get a reaction from the victim, they will typically attempt to track or follow the victim's internet activity. Classic cyberstalking behavior includes the tracing of the victim's IP address in an attempt to verify their home or place of employment.  Some cyberstalking situations do evolve into physical stalking, and a victim may experience abusive and excessive phone calls, vandalism, threatening or obscene mail, trespassing, and physical assault. Moreover, many physical stalkers will use cyberstalking as another method of harassing their victims.  A 2007 study led by Paige Padgett from the University of Texas Health Science Center found that there was a false degree of safety assumed by women looking for love online.
  • 11. What can I do to protect myself?
  • 12. References:    Youtube.com About.com (by cyberstalking expert Alexis A. Moore, founder of the national advocacy group Survivors in Action) Wikipedia.org