SlideShare une entreprise Scribd logo
1  sur  8
Cyberstalking Presentation by Dawid Kryniewski
WhatisCyberstalking? Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization.
How VictimsareStalked?
Types of Stalkers
How do CyberstalkersmeettheirTargets?
The Most Popular KeyFactors Ordering goods and services They order items or subscribe to magazines in the victim's name.  Encouraging others to harass the victim Many cyberstalkers try to involve third parties in the harassment.  Attempts to gather information about the victim Cyberstalkers may approach their victim's friends, family and work colleagues to obtain personal information
United States - The first U.S. cyberstalking law went into effect in 1999 in California. Australia - In Australia, the Stalking Amendment Act (1999) includes the use of any form of technology to harass a target as forms of "criminal stalking„ United Kingdom - In the United Kingdom, the Malicious Communications Act (1998) classified cyberstalking as a criminal offense. Cyberstalkinglegislation
ThankYou

Contenu connexe

Tendances

Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
pooja_doshi
 

Tendances (20)

Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Social engineering
Social engineering Social engineering
Social engineering
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Phishing
PhishingPhishing
Phishing
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Social engineering
Social engineeringSocial engineering
Social engineering
 

Similaire à Cyberstalking

Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
tamiuthomas
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
tamiuthomas
 
Digital law
Digital lawDigital law
Digital law
makylahh
 
A brief look at Cyber security
A brief look at Cyber securityA brief look at Cyber security
A brief look at Cyber security
Nabarun Sarkar
 
Printed by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docxPrinted by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docx
anitramcroberts
 
Us legislation authorizing wiretapping
Us legislation authorizing wiretappingUs legislation authorizing wiretapping
Us legislation authorizing wiretapping
Angela Strudwick
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
anilinvns
 

Similaire à Cyberstalking (20)

Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
ICT, the Self, and Society.pdf
ICT, the Self, and Society.pdfICT, the Self, and Society.pdf
ICT, the Self, and Society.pdf
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
A brief look at Cyber security
A brief look at Cyber securityA brief look at Cyber security
A brief look at Cyber security
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
Printed by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docxPrinted by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docx
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
 
Kinds of Cyber Crimes
Kinds of Cyber CrimesKinds of Cyber Crimes
Kinds of Cyber Crimes
 
Us legislation authorizing wiretapping
Us legislation authorizing wiretappingUs legislation authorizing wiretapping
Us legislation authorizing wiretapping
 
Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 

Cyberstalking

  • 1. Cyberstalking Presentation by Dawid Kryniewski
  • 2. WhatisCyberstalking? Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization.
  • 6. The Most Popular KeyFactors Ordering goods and services They order items or subscribe to magazines in the victim's name. Encouraging others to harass the victim Many cyberstalkers try to involve third parties in the harassment. Attempts to gather information about the victim Cyberstalkers may approach their victim's friends, family and work colleagues to obtain personal information
  • 7. United States - The first U.S. cyberstalking law went into effect in 1999 in California. Australia - In Australia, the Stalking Amendment Act (1999) includes the use of any form of technology to harass a target as forms of "criminal stalking„ United Kingdom - In the United Kingdom, the Malicious Communications Act (1998) classified cyberstalking as a criminal offense. Cyberstalkinglegislation