1 / 19

CYBER STALKING

CYBER STALKING. PREPARED BY : SITI NUR ASHIKIN BINTI ABU BAKAR. WHAT IS CYBER STALKING ?. Cyber stalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail  or  instant messaging  (IM), or messages posted to a Web site or a  discussion group.

rocco
Download Presentation

CYBER STALKING

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CYBER STALKING PREPARED BY : SITI NUR ASHIKIN BINTI ABU BAKAR

  2. WHAT IS CYBER STALKING ? • Cyber stalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a Web site or a discussion group. •  It may include false accusations, monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information in order to harass. • Cyber stalking is different from spatial or offline stalking.  • In the other word, stalking is a continuous process, consisting of a series of actions, each of which may be entirely legal in itself. 

  3. TYPES OF CYBER STALKING

  4. HARASSING • THREATENING • INTIMIDATING • IMPERSONATING PROFILE

  5. FACTORS CONTRIBUTING TO CYBER STALKING

  6. Flirting • Revenge • Love obsession • Love affairs

  7. BEHAVIOR OF CYBER STALKING

  8. Cyber stalkers find their victims by using search engines, online forums, bulletin and discussion boards, chat rooms, and more recently, through social networking sites, such as MySpace, Facebook, Bebo, Friendster, Twitter. •  They may engage in live chat harassment or flaming or they may send electronic viruses and unsolicited e-mails. • Cyber stalkers may research individuals to feed their obsessions and curiosity. Conversely, they may become more intense, such as repeatedly instant messaging their targets.

  9. They will post defamatory or derogatory statements about their stalking target on web pages, message boards and in guest books designed to get a reaction or response from their victim. • Create fake blogs in the name of the victim containing defamatory or pornographic content. • When prosecuted, many stalkers have unsuccessfully attempted to justify their behavior based on their use of public forums, as opposed to direct contact. • Once they get a reaction from the victim, they will typically attempt to track or follow the victim's internet activity. • They includes the tracing of the victim's IP address in an attempt to verify their home or place of employment.

  10. Some situations, they do physical stalking, and a victim may experience abusive and excessive phone calls, vandalism, threatening or obscene mail, trespassing, and physical assault. • Moreover, many physical stalkers will use cyber stalking as another method of harassing their victims.

  11. EFFECTS OF CYBER STALKING

  12. Anxiety • Fear • Nightmares • shock and disbelief • Helplessness • hyper-vigilance

  13. changes in eating • changes in sleeping patterns • high levels of stress • feeling of being out of control • sense of the loss of personal safety

  14. Tips To Protect Yourself From Cyber stalking

  15. Never reveal your home address • Password protect all accounts including cell phones, land lines, e-mails, banking and credit cards with a secure password that would be difficult for anyone to guess. Change it offently. • Be suspicious of any incoming emails, telephone calls or texts that ask you for your identifying information. • Never give out your Social Security Number. • Utilize stat counters or other free registry counters that will record all incoming traffic to your blogs and web sites. With a stat counter you can identify who is viewing your site or blog easily because the registry records the IP address, date, time, city, state and internet service provider.

  16. Check your credit report status regularly, especially if you're a business professional or individual who is in the public. • If you think you have a cyber stalker, move fast. Lots of people don't take action because they think they're "crazy" or imagining things. Record incidents, time, place, event. • If you think you're a target, have your PC checked by a professional. If you are already experiencing cyber stalking incidents, your computer may already be compromised. • If you encounter something suspicious, a weird phone call or an emptied account that can't be explained by your bank. It could be a cyber stalker so act accordingly. Change all your accounts, and ideally change banks. Check your credit report. Note anything else that appears strange.

  17. THANK YOU

More Related