Realizing the Hidden Fear

Slides:



Advertisements
Similar presentations
Higher RMPS Lesson 4 Kantian ethics.
Advertisements

How to protect yourself, your computer, and others on the internet
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Cyber Stalking By Matthew Hall. What is cyber stalking? According to techarget.com, it is defined as a crime in which the attacker harasses a victim using.
Preventing and Overcoming Abuse
Domestic Violence 101. APC is committed to providing safe shelter, advocacy, and supportive services for victims of domestic violence, rape, sexual assault,
Cyber Bullying The newest form of bullying.. What is cyber bullying?  Being cruel to others by sending or posting harmful material using technological.
Cyberbullying: What Parents Need to Know. Technology is Here to Stay Technology has changed the world in many ways. Most of those changes have been positive;
Purdue University Calumet Counseling Center Gyte
STALKING AND CYBERSTALKING: When your life changes at some else's hands.
Cyberbullying.
 CLOSED ALL YOUR ACCOUNTS  STOLE ALL YOUR MONEY FROM YOUR BANK ACCOUNTS  HAD YOUR MEDICAL INSURANCE CANCELLED  MADE FALSE CLAIMS  DESTROYED YOUR.
Breaking Trust On The Internet
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
INTERNET SAFETY FOR STUDENTS
 Cyber stalking is harassing people by threatening, monitoring, stealing someone’s identity theft, etc.
Wiredsafety.org  The world’s largest online safety and help group, including: –WiredPatrol.org –WiredKids.org –Cyberlawenforcement.org  Provides education,
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
Cyber and Internet Safety El Rodeo School September 11, 2013.
The Internet is Forever
e-safety and cyber bullying
Internet/Cyber Stalking AND HOW TO AVOID BEING A VICTIM.
INTERNET SAFETY FOR STUDENTS
Cyber Bullying By Elizabeth Ward. What is Cyber Bullying? Cyber Bullying is when one minor is targeted by another minor through threats, torments, harassment,
Cyber Stalking By Samantha Brooks What Is Cyber Stalking? The simple definition: “the repeated use of electronic communications to harass or frighten.
By Kenrick 8B2. * Cyberbullying is defined in legal glossaries as * actions that use information and communication technologies to support deliberate,
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
Stalking Stalking is a serious crime that occurs when one person engages in actions directed at another person (the target) which causes this person to.
SEX OFFENDERS AND VICTIMIZATION IN OUR COMMUNITY Awareness, Support and Prevention San Diego County Sex Offender Management Council
Peter Johnson NetSmartz411 Project Manager National Center for Missing & Exploited Children.
How much do you know about stalking?. How many women in Britain are stalked at some point in their adult life? (between ages of 16 – 59) A) 1 in 3 B)
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
Two major things to Look for on the Internet  1. Predators. Predators  2. How to Target a PredatorHow to Target a Predator  3. How can Parents Minimize.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Internet Safety Mrs. Oliver Technology
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
Children and teens are bullied everyday through , instant messaging, social networking and text messaging. Cyber Bullying By:Olivia Martin.
Medway High School Health “Never be bullied into silence. Never allow yourself to be made a victim. Accept no one’s definition of your life, but define.
By Demi Gardiner 8P Who’s been on your computer??
ETHICS and COMPUTERS An Overview 23/04/2017.
Technology & Stalking. Every single datum about my life is private? That's silly," Scalia [said].
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Old Firehouse Teen Center.  Over two thirds of women with disabilities have been sexually or physically abused as children.  The more caregivers a girl.
Crimes against persons 7.3 Stalking, Cyberstalking and Hazing Forensics – November 12,
STALKING STALKING STALKINGSTALKING. What is Stalking? A course of conduct directed at a specific person that would cause a reasonable person to feel fear.
Stalking Definition: To follow or observe (a person) persistently, especially out of obsession or derangement.
ThinkB4uClick A Smart Guide to Internet Safety. Dumb Ideas Stay off the Internet Don’t have a Facebook page Never use Twitter Don’t Never post.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Title IX: Our Community’s Responsibility for a Safer SEU.
Special Project Cyber bullying Issues By: Abby Heim.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
What Parents and Students Need to Know Presented by Joan Reubens Pinellas County Schools, Prevention Office or Protect with.
CYBERBULLYING Bullying that takes place using electronic technology Bullying that takes place using electronic technology. Is an issue that need to be.
ASU DEPARTMENT OF PUBLIC SAFETY. Sexually Based Violence Course The Sexually based Violence Course is established to inform the public about serious issues.
 Cyber-bullying is "the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group,
The Nature of Revenge By: Maddy Baye Jocelyn Croxall Jordan St. Pierre.
Internet Safety. Online Concerns: Contact Content Conduct.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
Cybersafety 4 Kids: Smart Moves in an Online World.
1. Block the bully's access to your online accounts Perhaps the easiest way to stop cyber bullies is to block the bully's access to your online accounts.
GOSSIP and CYBERBULLYING
STALKING (Obsession Harassment)
Appropriate Use of Technology
Knowing the facts and consequences of cyber bullying
Preventing and Overcoming Abuse
Higher RMPS Lesson 4 Kantian ethics.
GOSSIP and CYBERBULLYING
What it is, how to spot it, and how to respond to it
Presentation transcript:

Realizing the Hidden Fear Cyberstalking

Overview Background of Cyberstalking Explanation of a Cyberstalker Ex. Facebook Federal Legislation Prevention Ethical Analysis

Background of Cyberstalking Cyberstalking - is the use of the Internet or other electronic means to stalk someone. Use this term interchangeably with online harassment or online abuse Paul Bocij states that CyberAngels has one of the most useful definitions: When identifying cyberstalking “in the field,” particularly when considering whether to report it to any kind of legal authority, the following features or combinations of features can be considered to characterize a true stalking situation: Malice, Premeditation, Repetition, Distress, Obsession, Vendetta, No Legitimate Purpose, Personally Directed, Disregarded Warnings to Stop, Harassment, and Threats

Background Continued Victims of cyberstalking might object to the definition from CyberAngels. Disregarded Warnings to Stop You cannot claim that you are being a victim of cyberstalking if you have never said “Leave me alone” to the stalker. One standard defense used by stalkers in court is to claim that you were encouraging their attentions and that you never said “NO.”

Background Continued… The majority of cyberstalkers are men and the majority of their victims are women but….. Jane A. Hitchcock, president of WHOA says, “The most surprising thing we've seen is the rise in female cyberstalkers - this increased from 27% in 2000 to 35% in 2002 to 38% in 2003.”

Background Continued…… According to the Working to Halt Online Abuse (WHOA) from 2000 to 2006, out of the total cases, 2036, of cyberstalking….

Explanation of a Cyberstalker P.E. Mullen describes six categories of cyberstalkers. The four most important types are: Rejected Stalker Resentful Stalker Predatory Stalker Intimacy Stalker

Rejected Stalker Most common, persistent, and intrusive Obsessed with someone who is a former romantic partner or friend, and who has ended their relationship, or indicates that he or she intends to end the relationship.

Resentful Stalker Looking for revenge against someone who has upset them--it could be someone known to the stalker or a complete stranger.    Their behaviors are meant to frighten and distress the victim

Predatory Stalker Least common Are a classic sexual predator whose plan is to physically or sexually attack the victim.   Their motivated purely by the desire for sexual gratification and power over their victim

Intimacy Stalker They seeks to establish an intimate, loving relationship with their victim.   The victim and himself were “meant to be together.” These types of people think that the victim owes them love and affection because of all the time and effort it took for the stalker to stalk them.

Example Is Facebook really private? News Feed and Mini-Feed Tracks activities of a user’s friends Highlights recent social activity Invasion of privacy has made critics bring up the idea that Facebook facilitated online stalking.

Federal Legislation “In 1990, California became the first state to enact a specific stalking law.” [1] An Important Cyberstalking Federal Law: 18 U.S.C. 875(c). Under 18 U.S.C. 875(c), it is a federal crime to transmit any communication in interstate or foreign commerce containing a threat to injure the person of another.

Federal Legislation Cont. Harry Valetk Consider that Arizona’s stalking statute only prohibits credible threats of violence against the victim, whereas California and South Carolina prohibits threats against the victim’s immediate family. In Maine, a stalker’s course of conduct can constitute an implied threat. But what legal standard applies to a cyberstalker from Maine, terrorizing an Arizona resident, using a California ISP?

Prevention Rule of Thumb: NEVER GIVE ANY PERSONAL INFORMATION ACROSS THE INTERNET! The more active a person is on the Internet, the more information becomes available to others to view about you.

Prevention Cont. Don’t share personal information online. Don’t fill out profiles or include personal information on websites. Don’t use a gender specific or provocative screen name or e-mail address. Don’t flirt or start an argument online unless you are prepared for the consequences. Don’t share your password with anyone. When cyberdating, set up a special e-mail address. Use a good anti-virus program and update daily.

Ethical Analysis Kantianism – decipher what is right or wrong First Categorical Imperative – ex. Facebook General Rule - I may use the new features of Facebook to stalk other people. Universalize Rule – Everyone uses Facebook’s new features to stalk other people. All society has done is create a website that helps people “stalk” others with the intention of causing them harm Thus, unethical.

Ethical Analysis Cont. Act Utilitarianism – based on the Principle of Utility. Is it ethical for parents to be able to stalk their children through the use of electronic means? Sounds ridiculous right? Cell Phones Motor Vehicles GPS

Ethical Analysis Cont.. Internet software - track their teenager's Internet use remotely and can copy instant messages and online chats into e- mails that will be sent to parents. Parents have the ability for the first time to keep constant tabs on their rebellious teens or their loyal teens. Thus, ethical.