SlideShare uma empresa Scribd logo
1 de 18
Topic
Cyber
Stalking BY: HIRA KHALID
www.linkdln.com/in/hira-khalid
What is Cyber Stalking
Cyberstalking is the use of the Internet or other electronic
means to Stalk or Harass an individual, Group of
individuals or an organization.
Cyber Stalking Forms
 Cyberstalking can take many forms, including:
 harassment, embarrassment and humiliation of the victim
 emptying bank accounts or other economic control such as ruining
the victim's credit score
 harassing family, friends and employers to isolate the victim
 scare tactics to instill fear and more.
Who are
the most
likely
victims ?
Anyone can be a victim
of cyberstalking.
However, females are
more likely to become
victimized than males.
Educational institution
are also a very likely
target for cyberstalking.
Types of Cyberstalker
• They are noted for the ferocity of their
attacks.
Vindictive
Cyberstalker
• Their only motive is to annoy
Composed
Cyberstalker
• They’re attempt is to form a relationship with
the victim but turns on them if rebuffed
Intimate
Cyberstalker
• Groups with motive.
Collective
Cyberstalker
How do Cyberstalkers meet theirTargets?
Search Engines Online Forum Chat Room
Online Communities
Bulletins &
Discussion Boards
Social Networks
HowVictims are Stalked?
False Accusations
Many cyberstalker try to damage the reputation of their victim
and turn other people against them. They post false
information about them on websites. They may set up their
own websites, blogs or user pages for this purpose. They post
allegations about the victim to newsgroups, chat rooms, or
other sites that allow public contributions.
Making Threats
Attempts to gather information about the victim. Cyberstalker
may approach their victim's friends, family, and work
colleagues to obtain personal information. They may advertise
for information on the Internet, or hire a private detective.
Monitoring their target's online activities and attempting to trace their IP
address in an effort to gather more information about their victims.
Monitoring
Many cyberstalkers try to involve third parties in the harassment. They
may claim the victim has harmed the stalker or his/her family in some way,
or may post the victim's name and telephone number in order to
encourage others to join the pursuit.
Encouraging others to harass the victim
They order items or subscribe to magazines in the victim's name.
These often involve subscriptions to pornography
Cyberstalking is a form of cyberbullying.
Ordering goods and services
Cyber Stalking Reasons
Jealousy Obsession Attraction
Revenge
Effects of Cyber stalking
• Placing victim at risk of psychological trauma.
• Shock and disbelief.
• Changes in sleeping and eating patterns.
• Physical and emotional reactions
• Nightmares
• Anxiety
• Helplessness
• Fear for safety
Cyber Stalking in Pakistan
Cyber harassment has been generally
accepted as a routine part of Pakistani
women’s daily lives.
Cultural norms and the idea of “honor” may
be a reason for victims not to seek help
and report harassment.
PUNISHMENT UNDER NEW
CYBER LAW
If you try to get into a relation with someone online through internet website, email,
chat rooms, discussion forum, Message board, even SMS, phone or any
communication tool despite there is disinterest from the other party then you can be
jailed for THREE YEARS or imposed a fine which may extend to ONE MILLION
RUPEES or with both
Examples:
• You repeatedly call someone, despite the other party asks you to not to
• You send emails with no interest shown by the other party
• You do something in a manner that other party is harassed out of your actions
If you call, chat with someone and other party has no issues with that then its all cool,
nothing to worry about.
If victim of the cyber stalking is a minor the punishment may extend
to FIVE YEARS or with hue which may extend to TEN MILLION
RUPEES or with both.
Cyber stalking offences include:
• Making contact in a manner that minor is harassed
• Taking photographs, making videos and distributing them without
consent
• Blackmailing
• Spying on minors
PUNISHMENT UNDER NEW CYBER LAW
Anonymous
yourself.
Use primary
e-mail
account for
communicate
only.
Set e-mail
program's
filtering
options.
Report the
offender to
their Internet
service
provider (ISP).
Preventions
Never reveal
your home
address.
Password
protect all
accounts.
Conduct an
internet search
using your name
and phone
number.
Be suspicious of
any incoming
emails, telephone
calls or texts that
ask you for your
identifying
information.
Never give out
your Social
Security
Number
If you are leaving a
partner, spouse or
boyfriend or
girlfriend- reset
every single
password on all of
your accounts to
something they
cannot guess.
If you think
you're a target,
have your PC
checked by a
professional.
Do not share
your activities
on social media
Preventions

Mais conteúdo relacionado

Mais procurados (20)

Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
Section 66 of Information Technology Act.
Section 66 of Information Technology Act.Section 66 of Information Technology Act.
Section 66 of Information Technology Act.
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Difference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptxDifference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptx
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Email bombing
Email bombingEmail bombing
Email bombing
 
Trends in cyber crime
Trends in cyber crimeTrends in cyber crime
Trends in cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 

Semelhante a Cyber stalking

Semelhante a Cyber stalking (20)

Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cabatian & Estrada 1
Cabatian & Estrada 1Cabatian & Estrada 1
Cabatian & Estrada 1
 
Cyrenne Madlangsakay
Cyrenne MadlangsakayCyrenne Madlangsakay
Cyrenne Madlangsakay
 
Geek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingGeek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® Cyberbullying
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By Anamika
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
cyber bulling
 cyber bulling cyber bulling
cyber bulling
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Cyberbullying and Internet Addiction
Cyberbullying and Internet AddictionCyberbullying and Internet Addiction
Cyberbullying and Internet Addiction
 
Week7assgn2KwanHoY
Week7assgn2KwanHoYWeek7assgn2KwanHoY
Week7assgn2KwanHoY
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Week7 assgn2suphaphonp
Week7 assgn2suphaphonpWeek7 assgn2suphaphonp
Week7 assgn2suphaphonp
 
Online defamation
Online defamationOnline defamation
Online defamation
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
Olmv cyberbullying
Olmv cyberbullyingOlmv cyberbullying
Olmv cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
 

Último

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Último (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Cyber stalking

  • 1. Topic Cyber Stalking BY: HIRA KHALID www.linkdln.com/in/hira-khalid
  • 2. What is Cyber Stalking Cyberstalking is the use of the Internet or other electronic means to Stalk or Harass an individual, Group of individuals or an organization.
  • 3. Cyber Stalking Forms  Cyberstalking can take many forms, including:  harassment, embarrassment and humiliation of the victim  emptying bank accounts or other economic control such as ruining the victim's credit score  harassing family, friends and employers to isolate the victim  scare tactics to instill fear and more.
  • 4. Who are the most likely victims ? Anyone can be a victim of cyberstalking. However, females are more likely to become victimized than males. Educational institution are also a very likely target for cyberstalking.
  • 5. Types of Cyberstalker • They are noted for the ferocity of their attacks. Vindictive Cyberstalker • Their only motive is to annoy Composed Cyberstalker • They’re attempt is to form a relationship with the victim but turns on them if rebuffed Intimate Cyberstalker • Groups with motive. Collective Cyberstalker
  • 6. How do Cyberstalkers meet theirTargets? Search Engines Online Forum Chat Room Online Communities Bulletins & Discussion Boards Social Networks
  • 7.
  • 8.
  • 9. HowVictims are Stalked? False Accusations Many cyberstalker try to damage the reputation of their victim and turn other people against them. They post false information about them on websites. They may set up their own websites, blogs or user pages for this purpose. They post allegations about the victim to newsgroups, chat rooms, or other sites that allow public contributions. Making Threats Attempts to gather information about the victim. Cyberstalker may approach their victim's friends, family, and work colleagues to obtain personal information. They may advertise for information on the Internet, or hire a private detective.
  • 10. Monitoring their target's online activities and attempting to trace their IP address in an effort to gather more information about their victims. Monitoring Many cyberstalkers try to involve third parties in the harassment. They may claim the victim has harmed the stalker or his/her family in some way, or may post the victim's name and telephone number in order to encourage others to join the pursuit. Encouraging others to harass the victim
  • 11. They order items or subscribe to magazines in the victim's name. These often involve subscriptions to pornography Cyberstalking is a form of cyberbullying. Ordering goods and services
  • 12. Cyber Stalking Reasons Jealousy Obsession Attraction Revenge
  • 13. Effects of Cyber stalking • Placing victim at risk of psychological trauma. • Shock and disbelief. • Changes in sleeping and eating patterns. • Physical and emotional reactions • Nightmares • Anxiety • Helplessness • Fear for safety
  • 14. Cyber Stalking in Pakistan Cyber harassment has been generally accepted as a routine part of Pakistani women’s daily lives. Cultural norms and the idea of “honor” may be a reason for victims not to seek help and report harassment.
  • 15. PUNISHMENT UNDER NEW CYBER LAW If you try to get into a relation with someone online through internet website, email, chat rooms, discussion forum, Message board, even SMS, phone or any communication tool despite there is disinterest from the other party then you can be jailed for THREE YEARS or imposed a fine which may extend to ONE MILLION RUPEES or with both Examples: • You repeatedly call someone, despite the other party asks you to not to • You send emails with no interest shown by the other party • You do something in a manner that other party is harassed out of your actions If you call, chat with someone and other party has no issues with that then its all cool, nothing to worry about.
  • 16. If victim of the cyber stalking is a minor the punishment may extend to FIVE YEARS or with hue which may extend to TEN MILLION RUPEES or with both. Cyber stalking offences include: • Making contact in a manner that minor is harassed • Taking photographs, making videos and distributing them without consent • Blackmailing • Spying on minors PUNISHMENT UNDER NEW CYBER LAW
  • 17. Anonymous yourself. Use primary e-mail account for communicate only. Set e-mail program's filtering options. Report the offender to their Internet service provider (ISP). Preventions
  • 18. Never reveal your home address. Password protect all accounts. Conduct an internet search using your name and phone number. Be suspicious of any incoming emails, telephone calls or texts that ask you for your identifying information. Never give out your Social Security Number If you are leaving a partner, spouse or boyfriend or girlfriend- reset every single password on all of your accounts to something they cannot guess. If you think you're a target, have your PC checked by a professional. Do not share your activities on social media Preventions