SlideShare uma empresa Scribd logo
1 de 22
Cyber Stalking
What is Cyber Stalking ?
Cyberstalking is the use of the Internet or other electronic means to
stalk or harass an individual. It may include false accusations,monitoring,
identity theft, threats, solicitation for sex, or gathering information that
may be used to threaten or harass.
Who are the most likely victims and
offenders of cyberstalking?
• Anyone can be a victim of cyberstalking.
• However, females are more likely to become victimized than males.
• Educational institution are also a very likely target for cyberstalking.
What do they do ?
Gender ofVictims
Male- 13%
Female- 87%
Age of Victims
41 and Over – 19%
18 – 30 – 54%
31 – 40 – 27%
Cyber StalkingVictims
Where does cyberstalking occurs?
• Email
• News Groups/ Message Boards
• Internet Sites
• Chat Rooms
• Third Party Instant Messages
• Service User Profiles
Email
• In this form of cyberstalking, the cyberstalking sends email to the
victim that may be threatening, alarming, or anything of a harassing
nature. This is the most commonly used form of cyberstalking.
Message boards
• This type of cyberstalking usually occurs when the offender post
threatening statements that are directed toward a specific group of
people or an individual.
Internet
• In this form of cyberstalking, the offender can post very alarming or
threatening comments to a web site. The cyberstalker could also
create a website that contains defamatory, personal, and degrading
things about a person.
Chat Room
• In this form of cyberstalking, the offender has the capability to send
threatening material directly to the victim and real time, and anyone
else in the chat room is allowed to view it.
Third Party instant Messages
• This form of cyberstalking occurs when the offenders has software that
tracks when the victim logs onto a messenger service, and then
proceeds to harass the victim in real time.
How Does harassment begin
• Auction, Offline – 1%
• Virus, Personal ad – 3%
• Web site- 8%
• Newsgroup, Message Board – 9%
• Instant Message – 12%
• Chat – 15%
• Email – 39%
Stalking: psychological reasons
• Jealousy
• Obsession
• attraction
• Revenge
Cyber-stalking: case studies
Perth: Man charged with cyber-stalking
• 29 year old man in Armadale, Perth
• Stalker sent naked pictures of victims in the shower
• Threatening to post the photos on the internet if she reported to the police
• 128 charges, including:
- unlawfully installing optical surveillance equipment,
- indecently dealing with a child and stalking
Cyber-stalking: case studies
Illinois: ex-boyfriend cyber-stalking former lover
• “Hacker X”
• tampering and stalking ex-girlfriend online
• stealing identities and altering passwords
• Threatening her with physical harm
• 20 year sentence in jail
•Effects of Harassment
• Changes in Sleeping and eating patterns
• Nightmares
• Anxiety
• Helplessness
• Fear for safety
• Shock and disbelief
So is social media SAFE ?
Tips to prevent Cyber Stalking
• Never reveal your home address.
• Password protect all accounts.
• Conduct an internet search using your name and phone number.
• Be suspicious of any incoming emails, telephone calls or texts that ask
you for your identifying information.
Tips to prevent Cyber Stalking
• Never give out your Social Security Number
• If you are leaving a partner, spouse or boyfriend or girlfriend- reset every
single password on all of your accounts to something they cannot guess.
• If you think you're a target, have your PC checked by a professional.
Questions ?
ThankYou..
• Rishabh kataria (1031340003)
• Palash Patidar (1031340008)

Mais conteúdo relacionado

Mais procurados

Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 

Mais procurados (20)

Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Hacking
HackingHacking
Hacking
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Social engineering
Social engineering Social engineering
Social engineering
 

Destaque

Outfoxed
OutfoxedOutfoxed
Outfoxed
bganter
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
madhu190
 
Agenda Setting Theory
Agenda Setting TheoryAgenda Setting Theory
Agenda Setting Theory
TaylerEaston
 
Representation of gender and stereotypes
Representation of gender and stereotypesRepresentation of gender and stereotypes
Representation of gender and stereotypes
Liz Davies
 

Destaque (20)

Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 
Denail of Service
Denail of ServiceDenail of Service
Denail of Service
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
 
Representation of Women in Disney
Representation of Women in DisneyRepresentation of Women in Disney
Representation of Women in Disney
 
Outfoxed
OutfoxedOutfoxed
Outfoxed
 
Representation slideshare
Representation slideshareRepresentation slideshare
Representation slideshare
 
Unit 1 Representations
Unit 1 RepresentationsUnit 1 Representations
Unit 1 Representations
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Dystopian Genre
Dystopian GenreDystopian Genre
Dystopian Genre
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Agenda Setting Theory
Agenda Setting TheoryAgenda Setting Theory
Agenda Setting Theory
 
Representation of gender and stereotypes
Representation of gender and stereotypesRepresentation of gender and stereotypes
Representation of gender and stereotypes
 

Semelhante a cyber stalking

Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
rayarren06
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
stevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
stevewrightco
 
How to stay safe online p2
How to stay safe online p2How to stay safe online p2
How to stay safe online p2
Typho8000
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
katnaylan
 

Semelhante a cyber stalking (20)

Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 
Media power point 3
Media power point 3Media power point 3
Media power point 3
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet Safety
 
Cyrenne Madlangsakay
Cyrenne MadlangsakayCyrenne Madlangsakay
Cyrenne Madlangsakay
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Online defamation
Online defamationOnline defamation
Online defamation
 
Online safety
Online safetyOnline safety
Online safety
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big Problem
 
How to stay safe online p2
How to stay safe online p2How to stay safe online p2
How to stay safe online p2
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 

cyber stalking

  • 2. What is Cyber Stalking ? Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual. It may include false accusations,monitoring, identity theft, threats, solicitation for sex, or gathering information that may be used to threaten or harass.
  • 3. Who are the most likely victims and offenders of cyberstalking? • Anyone can be a victim of cyberstalking. • However, females are more likely to become victimized than males. • Educational institution are also a very likely target for cyberstalking.
  • 5. Gender ofVictims Male- 13% Female- 87% Age of Victims 41 and Over – 19% 18 – 30 – 54% 31 – 40 – 27%
  • 7. Where does cyberstalking occurs? • Email • News Groups/ Message Boards • Internet Sites • Chat Rooms • Third Party Instant Messages • Service User Profiles
  • 8. Email • In this form of cyberstalking, the cyberstalking sends email to the victim that may be threatening, alarming, or anything of a harassing nature. This is the most commonly used form of cyberstalking.
  • 9. Message boards • This type of cyberstalking usually occurs when the offender post threatening statements that are directed toward a specific group of people or an individual.
  • 10. Internet • In this form of cyberstalking, the offender can post very alarming or threatening comments to a web site. The cyberstalker could also create a website that contains defamatory, personal, and degrading things about a person.
  • 11. Chat Room • In this form of cyberstalking, the offender has the capability to send threatening material directly to the victim and real time, and anyone else in the chat room is allowed to view it.
  • 12. Third Party instant Messages • This form of cyberstalking occurs when the offenders has software that tracks when the victim logs onto a messenger service, and then proceeds to harass the victim in real time.
  • 13. How Does harassment begin • Auction, Offline – 1% • Virus, Personal ad – 3% • Web site- 8% • Newsgroup, Message Board – 9% • Instant Message – 12% • Chat – 15% • Email – 39%
  • 14. Stalking: psychological reasons • Jealousy • Obsession • attraction • Revenge
  • 15. Cyber-stalking: case studies Perth: Man charged with cyber-stalking • 29 year old man in Armadale, Perth • Stalker sent naked pictures of victims in the shower • Threatening to post the photos on the internet if she reported to the police • 128 charges, including: - unlawfully installing optical surveillance equipment, - indecently dealing with a child and stalking
  • 16. Cyber-stalking: case studies Illinois: ex-boyfriend cyber-stalking former lover • “Hacker X” • tampering and stalking ex-girlfriend online • stealing identities and altering passwords • Threatening her with physical harm • 20 year sentence in jail
  • 17. •Effects of Harassment • Changes in Sleeping and eating patterns • Nightmares • Anxiety • Helplessness • Fear for safety • Shock and disbelief
  • 18. So is social media SAFE ?
  • 19. Tips to prevent Cyber Stalking • Never reveal your home address. • Password protect all accounts. • Conduct an internet search using your name and phone number. • Be suspicious of any incoming emails, telephone calls or texts that ask you for your identifying information.
  • 20. Tips to prevent Cyber Stalking • Never give out your Social Security Number • If you are leaving a partner, spouse or boyfriend or girlfriend- reset every single password on all of your accounts to something they cannot guess. • If you think you're a target, have your PC checked by a professional.
  • 22. ThankYou.. • Rishabh kataria (1031340003) • Palash Patidar (1031340008)