SlideShare a Scribd company logo
Cyber Stalking
What is Cyber Stalking ?
Cyberstalking is the use of the Internet or other electronic means to
stalk or harass an individual. It may include false accusations,monitoring,
identity theft, threats, solicitation for sex, or gathering information that
may be used to threaten or harass.
Who are the most likely victims and
offenders of cyberstalking?
• Anyone can be a victim of cyberstalking.
• However, females are more likely to become victimized than males.
• Educational institution are also a very likely target for cyberstalking.
What do they do ?
Gender ofVictims
Male- 13%
Female- 87%
Age of Victims
41 and Over – 19%
18 – 30 – 54%
31 – 40 – 27%
Cyber StalkingVictims
Where does cyberstalking occurs?
• Email
• News Groups/ Message Boards
• Internet Sites
• Chat Rooms
• Third Party Instant Messages
• Service User Profiles
Email
• In this form of cyberstalking, the cyberstalking sends email to the
victim that may be threatening, alarming, or anything of a harassing
nature. This is the most commonly used form of cyberstalking.
Message boards
• This type of cyberstalking usually occurs when the offender post
threatening statements that are directed toward a specific group of
people or an individual.
Internet
• In this form of cyberstalking, the offender can post very alarming or
threatening comments to a web site. The cyberstalker could also
create a website that contains defamatory, personal, and degrading
things about a person.
Chat Room
• In this form of cyberstalking, the offender has the capability to send
threatening material directly to the victim and real time, and anyone
else in the chat room is allowed to view it.
Third Party instant Messages
• This form of cyberstalking occurs when the offenders has software that
tracks when the victim logs onto a messenger service, and then
proceeds to harass the victim in real time.
How Does harassment begin
• Auction, Offline – 1%
• Virus, Personal ad – 3%
• Web site- 8%
• Newsgroup, Message Board – 9%
• Instant Message – 12%
• Chat – 15%
• Email – 39%
Stalking: psychological reasons
• Jealousy
• Obsession
• attraction
• Revenge
Cyber-stalking: case studies
Perth: Man charged with cyber-stalking
• 29 year old man in Armadale, Perth
• Stalker sent naked pictures of victims in the shower
• Threatening to post the photos on the internet if she reported to the police
• 128 charges, including:
- unlawfully installing optical surveillance equipment,
- indecently dealing with a child and stalking
Cyber-stalking: case studies
Illinois: ex-boyfriend cyber-stalking former lover
• “Hacker X”
• tampering and stalking ex-girlfriend online
• stealing identities and altering passwords
• Threatening her with physical harm
• 20 year sentence in jail
•Effects of Harassment
• Changes in Sleeping and eating patterns
• Nightmares
• Anxiety
• Helplessness
• Fear for safety
• Shock and disbelief
So is social media SAFE ?
Tips to prevent Cyber Stalking
• Never reveal your home address.
• Password protect all accounts.
• Conduct an internet search using your name and phone number.
• Be suspicious of any incoming emails, telephone calls or texts that ask
you for your identifying information.
Tips to prevent Cyber Stalking
• Never give out your Social Security Number
• If you are leaving a partner, spouse or boyfriend or girlfriend- reset every
single password on all of your accounts to something they cannot guess.
• If you think you're a target, have your PC checked by a professional.
Questions ?
ThankYou..
• Rishabh kataria (1031340003)
• Palash Patidar (1031340008)

More Related Content

What's hot

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Darshan Vithani
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
Kandarp Shah
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Mahabubur Rahman
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
yazad dumasia
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
Nikolaos Georgitsopoulos
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
Online
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
Tapan Khilar
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)rayarren06
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
FCA - Future Chartered Accountants
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
DINESH KAMBLE
 

What's hot (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 

Viewers also liked

Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
Raza_Abidi
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
arpit.arp
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
Akmal Hussain
 
Representation of Women in Disney
Representation of Women in DisneyRepresentation of Women in Disney
Representation of Women in Disney
Department of English MKBU
 
Outfoxed
OutfoxedOutfoxed
Outfoxedbganter
 
Representation slideshare
Representation slideshareRepresentation slideshare
Representation slideshare
Jersey College for Girls
 
Unit 1 Representations
Unit 1 RepresentationsUnit 1 Representations
Unit 1 Representations
colesmedia
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
Bennet Kelley
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
Sowjanya Sampathkumar
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
Tejesh Dhaypule
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
izzul
 
Cyber laws
Cyber lawsCyber laws
Cyber lawsmadhu190
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
Pina Parmar
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
josiebrookeday
 
Agenda Setting Theory
Agenda Setting TheoryAgenda Setting Theory
Agenda Setting TheoryTaylerEaston
 
Representation of gender and stereotypes
Representation of gender and stereotypesRepresentation of gender and stereotypes
Representation of gender and stereotypesLiz Davies
 

Viewers also liked (20)

Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 
Denail of Service
Denail of ServiceDenail of Service
Denail of Service
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
 
Representation of Women in Disney
Representation of Women in DisneyRepresentation of Women in Disney
Representation of Women in Disney
 
Outfoxed
OutfoxedOutfoxed
Outfoxed
 
Representation slideshare
Representation slideshareRepresentation slideshare
Representation slideshare
 
Unit 1 Representations
Unit 1 RepresentationsUnit 1 Representations
Unit 1 Representations
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Dystopian Genre
Dystopian GenreDystopian Genre
Dystopian Genre
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Agenda Setting Theory
Agenda Setting TheoryAgenda Setting Theory
Agenda Setting Theory
 
Representation of gender and stereotypes
Representation of gender and stereotypesRepresentation of gender and stereotypes
Representation of gender and stereotypes
 

Similar to cyber stalking

Media power point 3
Media power point 3Media power point 3
Media power point 3
kelsietune
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
Shipat Bhuiya
 
Perils of social media
Perils of social mediaPerils of social media
Perils of social media
Inderjeet Singh
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
stevewrightco
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
autumnowens25
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet Safety
JVGAJJAR
 
Cyrenne Madlangsakay
Cyrenne MadlangsakayCyrenne Madlangsakay
Cyrenne Madlangsakay
Cyrenne Madlangsakay
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
Yash Jain
 
Online defamation
Online defamationOnline defamation
Online defamation
Apostolos Syropoulos
 
Online safety
Online safetyOnline safety
Online safety
Veronica Alejandro
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
kschermerhorn
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big Problem
Gail Rebuck
 
How to stay safe online p2
How to stay safe online p2How to stay safe online p2
How to stay safe online p2Typho8000
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Marian Merritt
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.katnaylan
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
katnaylan
 

Similar to cyber stalking (20)

Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Media power point 3
Media power point 3Media power point 3
Media power point 3
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet Safety
 
Cyrenne Madlangsakay
Cyrenne MadlangsakayCyrenne Madlangsakay
Cyrenne Madlangsakay
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Online defamation
Online defamationOnline defamation
Online defamation
 
Online safety
Online safetyOnline safety
Online safety
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big Problem
 
How to stay safe online p2
How to stay safe online p2How to stay safe online p2
How to stay safe online p2
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 

Recently uploaded

Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 

Recently uploaded (20)

Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 

cyber stalking

  • 2. What is Cyber Stalking ? Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual. It may include false accusations,monitoring, identity theft, threats, solicitation for sex, or gathering information that may be used to threaten or harass.
  • 3. Who are the most likely victims and offenders of cyberstalking? • Anyone can be a victim of cyberstalking. • However, females are more likely to become victimized than males. • Educational institution are also a very likely target for cyberstalking.
  • 5. Gender ofVictims Male- 13% Female- 87% Age of Victims 41 and Over – 19% 18 – 30 – 54% 31 – 40 – 27%
  • 7. Where does cyberstalking occurs? • Email • News Groups/ Message Boards • Internet Sites • Chat Rooms • Third Party Instant Messages • Service User Profiles
  • 8. Email • In this form of cyberstalking, the cyberstalking sends email to the victim that may be threatening, alarming, or anything of a harassing nature. This is the most commonly used form of cyberstalking.
  • 9. Message boards • This type of cyberstalking usually occurs when the offender post threatening statements that are directed toward a specific group of people or an individual.
  • 10. Internet • In this form of cyberstalking, the offender can post very alarming or threatening comments to a web site. The cyberstalker could also create a website that contains defamatory, personal, and degrading things about a person.
  • 11. Chat Room • In this form of cyberstalking, the offender has the capability to send threatening material directly to the victim and real time, and anyone else in the chat room is allowed to view it.
  • 12. Third Party instant Messages • This form of cyberstalking occurs when the offenders has software that tracks when the victim logs onto a messenger service, and then proceeds to harass the victim in real time.
  • 13. How Does harassment begin • Auction, Offline – 1% • Virus, Personal ad – 3% • Web site- 8% • Newsgroup, Message Board – 9% • Instant Message – 12% • Chat – 15% • Email – 39%
  • 14. Stalking: psychological reasons • Jealousy • Obsession • attraction • Revenge
  • 15. Cyber-stalking: case studies Perth: Man charged with cyber-stalking • 29 year old man in Armadale, Perth • Stalker sent naked pictures of victims in the shower • Threatening to post the photos on the internet if she reported to the police • 128 charges, including: - unlawfully installing optical surveillance equipment, - indecently dealing with a child and stalking
  • 16. Cyber-stalking: case studies Illinois: ex-boyfriend cyber-stalking former lover • “Hacker X” • tampering and stalking ex-girlfriend online • stealing identities and altering passwords • Threatening her with physical harm • 20 year sentence in jail
  • 17. •Effects of Harassment • Changes in Sleeping and eating patterns • Nightmares • Anxiety • Helplessness • Fear for safety • Shock and disbelief
  • 18. So is social media SAFE ?
  • 19. Tips to prevent Cyber Stalking • Never reveal your home address. • Password protect all accounts. • Conduct an internet search using your name and phone number. • Be suspicious of any incoming emails, telephone calls or texts that ask you for your identifying information.
  • 20. Tips to prevent Cyber Stalking • Never give out your Social Security Number • If you are leaving a partner, spouse or boyfriend or girlfriend- reset every single password on all of your accounts to something they cannot guess. • If you think you're a target, have your PC checked by a professional.
  • 22. ThankYou.. • Rishabh kataria (1031340003) • Palash Patidar (1031340008)