 CLOSED ALL YOUR ACCOUNTS  STOLE ALL YOUR MONEY FROM YOUR BANK ACCOUNTS  HAD YOUR MEDICAL INSURANCE CANCELLED  MADE FALSE CLAIMS  DESTROYED YOUR.

Slides:



Advertisements
Similar presentations
Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Advertisements

Cyber Stalking By Matthew Hall. What is cyber stalking? According to techarget.com, it is defined as a crime in which the attacker harasses a victim using.
Cyber Safety Assessment Review
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Definition Is when a child, preteen is tormented, threatened, harassed, humiliated, embarrassed, or otherwise targeted by another child, preteen, or teen.
Realizing the Hidden Fear
Purdue University Calumet Counseling Center Gyte
Working With Stalking Victims Victim Advocates. What is Stalking? A course of conduct directed at a specific person that would cause a reasonable person.
STALKING AND CYBERSTALKING: When your life changes at some else's hands.
Cyberbullying.
Breaking Trust On The Internet
Today’s Quiz 1. The most popular social networking site among young people is Twitter. 2. Nothing is private once it is posted on the Internet. 3. Teens.
 Cyber stalking is harassing people by threatening, monitoring, stealing someone’s identity theft, etc.
Internet/Cyber Stalking AND HOW TO AVOID BEING A VICTIM.
Boston and Kesling Middle School  Bullying means overt, repeated acts or gestures including verbal or written communications transmitted;
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
By: Sophia Dermouche & Maheen Khalid
Bullying and Harassment Sian Jackson Semester 2, 2010.
Stalking Stalking is a serious crime that occurs when one person engages in actions directed at another person (the target) which causes this person to.
Digital Citizenship Project
How much do you know about stalking?. How many women in Britain are stalked at some point in their adult life? (between ages of 16 – 59) A) 1 in 3 B)
Warrior Wednesday DIGITAL CITIZENSHIP.
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
Question  What was the internet attended for?  What is the internet known as?  Ans. Information super high way.
Ashley Counce. What is Cyber Bullying?  Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. By definition,
How can I adjust my behavior and choices in order to improve the learning environment to represent SMS?
Digital Citizenship Texting vs. Sexting Cyberbullying.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
DIGITAL CITIZENSHIP/CYBER BULLYING.  Privacy - Protect Personal Information  Respect – Avoiding Cyberbullying, Plagiarism, Downloading Music Appropriately.
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
Tucker High School Football DeKalb County School District’s Hazing Policy August 1, 2015.
Shelby Foster. Cyber Stalking- Use of internet or electronic devices to harass an individual or organization “Cyber stalking usually involves a course.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
Digital Citizenship By Lori Gray.
STALKING STALKING STALKINGSTALKING. What is Stalking? A course of conduct directed at a specific person that would cause a reasonable person to feel fear.
Stalking Awareness Month
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Stalking Definition: To follow or observe (a person) persistently, especially out of obsession or derangement.
PGHS Advocacy Digital Citizenship Lesson 2
ThinkB4uClick A Smart Guide to Internet Safety. Dumb Ideas Stay off the Internet Don’t have a Facebook page Never use Twitter Don’t Never post.
DIGITAL CITIZENSHIP. Digital Citizenship covers 9 areas according to Mike Ribble, an expert in the field.  Etiquette  Communication  Literacy  Access.
Internet Safety and Cyber-Bullying Presented by: Bartlett Yancey High School Counselors Mrs. L. Lassiter, CTE Coordinator & Department Chair Mrs. J. Sartin,
SEXUAL HARASSMENT. Equal Opportunities Commission Sexual harassment is any unwanted or uninvited sexual behaviors which a reasonable person regards as.
Protecting Your Assets By Preventing Identity Theft 1.
RESOLVING CONFLICT & PREVENTING VIOLENCE Chapter 9.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
What Parents and Students Need to Know Presented by Joan Reubens Pinellas County Schools, Prevention Office or Protect with.
PROTECT YOURSELF Cyberbullying. Why do you think people cyberbully? How does your school deal with cyberbullying? Have you ever sent a mean message because.
Virginia RULES Teens Learn & Live the Law Crimes Against Persons.
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
 Cyber-bullying is "the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group,
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Delete CyberBullying Boston Public Schools Cyber Safety Campaign.
Prevent and Report Sexual Misconduct
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
GOSSIP and CYBERBULLYING
Chelsea, Kimi, Stephanie, Eh-den
Appropriate Use of Technology
Warrior Wednesday DIGITAL CITIZENSHIP.
Personal Safety- Bullying
GOSSIP and CYBERBULLYING
Cyber Bullying.
Bullying BOE Policies   Prohibition Against Discrimination, Harassment, and Bullying   Discrimination, Harassment and Bullying.
Resolving Conflict & Preventing Violence
Presentation transcript:

 CLOSED ALL YOUR ACCOUNTS  STOLE ALL YOUR MONEY FROM YOUR BANK ACCOUNTS  HAD YOUR MEDICAL INSURANCE CANCELLED  MADE FALSE CLAIMS  DESTROYED YOUR CREDIT RATING

Moore maintains a blog at her website alexisamoore.com where she covers issues related to cyberstalking, privacy protection, identity theft and public safety.alexisamoore.com ALEXIS MOORE ONE WOMANS’ STORY OF SURVIVAL AND ADVOCACY

CYBERSTALKING STALKING  Cyberstalking is a technologically-based “attack” targeting a specific person to attack for reasons of anger, revenge or control.  Victims often feel harassed, embarrassed, and humiliated.  Cyberstalking can involve the harassment of family, friends, and employers while using scare tactics to isolate victims.  Stalking is characterized by repeated harassment or threatening behavior toward an individual. › All of the following can be examples of types of stalking: › following a person › appearing at a person's home or place of business › making harassing phone calls › leaving written messages or objects › vandalizing a person's property

18 U.S.C. 875(c), it is a federal crime, punishable by up to five years in prison and a fine of up to $250,000, to transmit any communication in interstate or foreign commerce containing a threat to injure the person of another. 47 U.S.C. § 223 : US Code - Section 223: Obscene or harassing telephone calls in the District of Columbia or in interstate or foreign communications

The first person charged with cyberstalking was Robert James Murphy. He violated Title 47 of the U.S. Code 223 which prohibits the use of telecommunications to annoy, abuse, threaten or harass anyone. Murphy was sending obscene messages and pictures to his ex-girlfriend for more than 4 years. The woman, Joelle Ligon, was deleting these s at first but then started collecting them as evidence. Murphy pleaded guilty to two counts of cyberstalking.

EASY ACCESS TO TECHNOGOGY TODAY’S STUDENTS ARE MORE TECH SAVVY WI-FI, INTERNET CAFÉ’S, DORM ROOMS, ETC. OFFER OPPORTUNITY FOR PRIVACY TO STALK VARIETY OF TYPES OF TECHNOLOGY AVAILABLE

AVOID OVER-SHARING OF YOUR PERSONAL INFORMATION PROVIDING TOO MUCH INFORMATION ONLY AIDS CYBERSTALKERS AND PUTS YOU AT RISK

DID YOU KNOW? ONCE YOU PLACE SOMETHING ON THE INTERNET, IT’S OUT THERE FOREVER  NAME  ADDRESS  PHONE #  CREDIT CARD #  SOCIAL SECURITY #  PERSONAL AND PROFESSIONAL IDEAS

WHEN YOU OR SOMEONE YOU LOVE EXPERIENCE 3 OR MORE INSTANCES OF UNWANTED, INTIMIDATING, THREATENING, OR ANNOYING BEHAVIOR FROM THE SAME INDIVIDUAL IT’S TIME TO REACH OUT FOR HELP

OBTAINING A RESTRAINING ORDER OR ORDER FOR PROTECTION Stalking and cyberstalking require a repeated course of conduct, amongst other elements, in order to be classified as stalking or cyberstalking…

women men YOU

WHAT MOTIVATES A STALKER? OBSESSION? STRESS? COMPETITION? POWER AND CONTROL? ANXIETY? HATRED?

EFFECTS OF STALKING o FEAR - WORRY - STRESS o INABLILITY TO CONCENTRATE o INCREASED USE OF ALCOHOL AND OTHER DRUGS o DIFFICUTLY WITH JOB, SCHOOL WORK, SPORTS, SOCIAL ACTIVITIES o DROPPING OUT OF SCHOOL AND LIFE o LOSS OF INCOME o LOSS OF JOBS AND INTERNSHIPS o LOSS OR CONFLICT WITH RELATIONSHIPS

 DOCUMENT THE CONTACTS  DATES, TIMES, PLACES, WHAT IS SAID, WHAT IS DONE, NAMES AND ADDRESSES OF WITNESSES  CHANGE YOUR PASSWORDS, IDENTIFYING INFORMATION, PHONE NUMBERS, LOCKS, ETC.  REDUCE CONTACT WITH STALKER BY CUTTING OFF THEIR ACCESS: STRICTER SECURITY ON FACEBOOK OR OTHER INTERNET SITE  ALTER YOUR ROUTINE  CONTACT LAW ENFORCEMENT EVERYTIME THE STALKER MAKES CONTACT WITH YOU  TELL FAMILY & FRIENDS WHERE YOU’RE GOING  DON’T ACCEPT THE BLAME FOR THE STALKERS BEHAVIOR  TRUST YOUR INSTINCTS

RESOURCE LIST RESOURCES DON’T EXIST IN THE U.S.

Founder and president of Survivors in Action, a national advocacy group that provides individual assistance to victims of abuse, including victims who have experienced cyberstalking, stalking and cyberbullying. As a expert, consultant, speaker, advocate and author Moore travels extensively to educate and empower the public. She provides expert testimony at Senate and Assembly Public Safety Hearings and has contributed to legislation around the globe. Through her program “High-Tech Self Defense for the 21st Century," she teaches audiences about high-tech crimes such as identity theft and cyberstalking and how to protect yourself.Survivors in Action