National Centre for Cyberstalking Research 2013

Slides:



Advertisements
Similar presentations
Your Online Footprint. What is Facebook? Facebook is an online social networking site in which young adults can have discussions, connect with friends,
Advertisements

How to protect yourself, your computer, and others on the internet
Internet Safety and Cyber Bullying All info came from
Haygrove School – E Safety Induction E Safety Update #protecting your professional identity.
The aim of the week: Young people recognise and challenge bullying behaviour wherever it happens - whether face to face or in cyberspace.
FtbaKIYyg Article 29 (goals of education) Education must develop every child’s personality, talents and abilities to.
Stalking Awareness through education. By the end of the show you will... Be confident that you know exactly what stalking is Be knowledgeable of the key.
Purdue University Calumet Counseling Center Gyte
Cyberbullying.
The Grooming Process. Trafod Sexual Abuse and Trauma Centre.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Cyberbullying Donna Kozica, LCSW Social Work Department Chairperson.

Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Wiredsafety.org  The world’s largest online safety and help group, including: –WiredPatrol.org –WiredKids.org –Cyberlawenforcement.org  Provides education,
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
Cyber and Internet Safety El Rodeo School September 11, 2013.
Internet/Cyber Stalking AND HOW TO AVOID BEING A VICTIM.
Stalking Effects and what can be done to help. What’s covered Stalking-a recap The effects on the victim What you can do to help How the victim can be.
REVENGE PORN ROUNDTABLE 5 TH SEPTEMBER WHAT IS REVENGE PORN?  Revenge porn is when a partner or ex-partner shares images of sexual nature without.
Where does bullying occur? OFSTED Report % at school 55% at school 24% at home 24% at home 18% around where children live 18% around where children.
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.
How To Protect Your Privacy and Avoid Identity Theft Online.
Cyber Stalking By Samantha Brooks What Is Cyber Stalking? The simple definition: “the repeated use of electronic communications to harass or frighten.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
 What is Harassment?  Define, list terms, different types and/or examples of what you believe Harassment is.  Respond to Harassment Video 
Internet Safety Part II CyberBullying. Judson Independent School District … strives to provide a safe, positive learning environment for students in our.
Stalking Stalking is a serious crime that occurs when one person engages in actions directed at another person (the target) which causes this person to.
Hutton All Saints’ Online Risks and Dangers Workshop WEDNESDAY 19 TH NOVEMBER 2014.
Cyber Crimes.
Peter Johnson NetSmartz411 Project Manager National Center for Missing & Exploited Children.
How much do you know about stalking?. How many women in Britain are stalked at some point in their adult life? (between ages of 16 – 59) A) 1 in 3 B)
Question  What was the internet attended for?  What is the internet known as?  Ans. Information super high way.
CYBERBULLYING. What is it? Cyber bullying is bullying or harassment that happens online. It can happen in an , a text message, an online game, or.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Internet Safety Plan Sophomore Year. Essential Questions How will I know what risks I am exposing myself to when I make decisions online? How will I be.
Cyberbullying Online Social Aggression Guidelines for Educators.
Computers, Cell Phones & the Internet JOSE CANO AND SAMIE GIDDENS.
SEXTING. Is this ever ok? (click Yes, No or Maybe TWICE as applicable) 1. Sending a sexually explicit selfie at age Sending a sexually explicit.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Netiquette/Internet Safety Presentation VAHS Boys Swim Team.
Women and the Criminal Justice System Women and men have similar overall risks of victimization According to the 1999 General Social Survey (GSS) approximately.
What vulnerabilities do you face in cyberspace?  Cyberbullying  Cyberstalking  Racial hatred  Exposure to violent, disturbing and/or illegal material.
“REAL WORLD CRUSADES AGAINST CYBER BULLING” “This Ain’t No Bull”
Online Safety and Privacy Understanding online privacy and how your information is shared.
ThinkB4uClick A Smart Guide to Internet Safety. Dumb Ideas Stay off the Internet Don’t have a Facebook page Never use Twitter Don’t Never post.
DIGITAL LAW. SEXTING – A Modern Phenomena Sample scenario: A 17 yr old boy and a 15 yr old girl meet at a party. The girl sends a playful, but sexually.
Computer crimes.
CJ 333 Unit 9. Minneapolis Domestic Violence Experiment –Arrest the suspect –Order one party out of the residence –Advise couple how to solve their problems.
Cyberbullying and Cyberstalking BY MS. BARBARA WOOLLEY.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
CYBERBULLYING Bullying that takes place using electronic technology Bullying that takes place using electronic technology. Is an issue that need to be.
Sexting in Schools – How do we need to respond. Images or videos generated by children under the age of 18, or of children under the age of 18 that are.
Our Club: SUPPORTS Kids Is SAFE for Kids Is FUN for Kids.
70% were female; 30% were male 86% of offenders were people youth first “met” online 37% of incidents happened in chatrooms 40% in instant messages.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Cyber and Internet Safety (Parents’ Night)
Carroll County Schools Advisement
Appropriate Use of Technology
The Gloucestershire Stalking Response
Information Security Footprint.
Sexting What is meant by sexting?.
Paul Hopkins University of Hull
Presentation transcript:

National Centre for Cyberstalking Research 2013 Digital Stalking National Centre for Cyberstalking Research 2013

Cyberstalking Cyberstalking is generally considered to be harassment that originates online, however it is also recognised that other forms of pre-existing stalking can transfer into online environments

Occurrence of Cyberstalking Cyberstalking can be said to occur when there has been persistent and frequent unwanted contact from another individual/s The behaviour in question has caused fear and distress.

Types of attack Identity theft – controlling victim’s credentials Posting false profiles Posing as the victim and attacking others Discrediting in online communities Discrediting victim in workplace Direct threats through email/instant messaging Constructing websites targeting the victim Transferring attack to victim’s relatives Use of the victim’s image Provoking others to attack the victim Following the victim in cyberspace

Prevalence of Problem 2.1 million across the UK 1.2 million females 0.9 million males Number of male victims is growing

How Aggressors Obtain Information? Digital Footprints Personal information Financial information Internet usage Details of friends and family Daily activities Work Location and much more Social Networking Sites Facebook Twitter

Geo-Location “Foursquare” app Discover where your friends are “Girls Around Me” app- banned by Foursquare Merging Facebook and Foursquare information with Google Maps and real-time GPS location data Tells where nearby women are; allows to see their full name, photos, and send them messages Facebook Check-in where you are Add people you are with Add date

Risks Physical danger Identity theft Obtaining contact information Accounts takeover Post Traumatic Stress Disorder (PTSD)

Observation and Understanding The ECHO Study - Electronic Communication Harassment Observation Commissioned by the Network for Surviving Stalking Pilot study commenced in September 2010 Analysis of the survey to be published in May 2011 New extended study launched and will run for one year

Observation and Understanding The ECHO Study - Electronic Communication Harassment Observation The results indicated that 22.8% of cases (25.9% for males, 21.4% females) report that their harasser was a stranger 27.9% (21.2% males, 31.3% females) say the harasser was someone they dated/were married to

Transmission to other Environments The more fixated an individual is, the more likely they are to move from one online environment to another until the target’s online presence is fully intruded upon

Transmission to other Environments 73.55% of cases reported 2 or more mediums of harassment and 57.7% of cases reported that they had been harassed through more than 2 mediums (Phone calls, texts, e-mail, social networking sites, instant messages and physical environment)

The Psychological Impact Post Traumatic Stress Disorder 32.7% of respondents who reported experiencing harassment indicate symptoms of PTSD according to the clinical questionnaire. Respondents indicating PTSD were more likely to report more changes to their lives due to the harassment 50 % of people experiencing harassment electronically and physically (combined stalking) experience PTSD

Combined stalking victims Types of Traumas Cyberstalking victims 32.7% Combined stalking victims 50% Air crash survivors 22 - 40% RTA survivors 11% Sexual assault 22-50% Aid workers 30-50% Combat veterans 22-50% Bomb survivors 50%

Effectiveness of services and other interventions 53.4%(47.7% males, 54.9% females) reported their problem to some authority 10.8% (10.2% for Males, 11.3% for females) of the cases reported ended due to legal intervention (by police or Solicitors) 37.2% of harassed people (27.3% of Males, 40.7% of Females) received some form of help to cope with the harassment. Mostly friend

How to Protect Yourself? Assess what online information exists about you Change your e-mail and passwords for key online accounts and keep them safe Review all the privacy and security settings Avoid public forums Limit what you share Educate friends, family and work colleagues Gather evidence Report to police Seek help and support for the charities

Cyberstalking Forensics The majority of evidence is gathered from the victims immediate physical vicinity Cyberstalking Monitor applications can record and transmit interactions between offender & victim simultaneously to law enforcement officers Event log files from ISPs, Telecoms, employer network systems, etc., can correlate offender communications Existing technologies can assist with attribution & prosecution of offenders such as CCTV, GPS, etc.  

Bringing Cyberstalking ‘Out of the Shadows’ The problem is multidisciplinary and requires a multidisciplinary approach More research is required to understand the problem Initial indications are that the behaviours and composition of the online stalking population differ significantly from traditional stalking – opening diverse lines of enquiry for research and the development of effective interventions What it looks like

Legal Change The Internet is a conduit through which an increasing amount of interaction with society is conducted.  The impact on an individual of such communications is significantly greater than it was 10 years ago. Facebook, which now has over 600 million users (10% of the world's population), was only launched in 2004! 

Legal Change In recent years we have seen changes to legislation that recognise the impact of technology on society and the ease with which criminal offences can be committed.   Most notably, the Police and Justice Act of 2006 amended the Computer Misuse Act of 1990. One change was the length of maximum jail sentence.

Legal Change Malicious Communications Act of 1988 amended by the Criminal Justice and Police Act 2001 - ensure electronic communications were covered.  However, there should be reconsideration of whether the punishment currently legislated is sufficient.   

Legal Change Protection From Harassment Act 1997 - does not explicitly state electronic communications.  A clear statement of electronic communications would assist investigating police officers in seizing evidence in cases of Cyberstalking.   Current lack of power to seize evidence, and this only exacerbates the problem of attribution. 

Law Change Amendments have been made to the Protection of Freedoms Bill making stalking a specific offence in England and Wales. One of the amendments includes the ability for Police to have access to the use of the internet, email or any other form of electronic communication associated with stalking. The commencement order for the new law was 25th November 2012