scholarly journals Cyberstalking victimization

Temida ◽  
2013 ◽  
Vol 16 (1) ◽  
pp. 151-162
Author(s):  
Vida Vilic

Global social networks contributed to the creation of new, inconspicuous, technically perfect shape of criminality which is hard to suppress because of its intangible characteristics. The most common forms of virtual communications? abuse are: cyberstalking and harassment, identity theft, online fraud, manipulation and misuse of personal information and personal photos, monitoring e-mail accounts and spamming, interception and recording of chat rooms. Cyberstalking is defined as persistent and targeted harassment of an individual by using electronic communication. The victim becomes insecure, frightened, intimidated and does not figure out the best reaction which will terminate the harassment. The aim of this paper is to emphasize the importance and necessity of studying cyberstalking and to point out its forms in order to find the best ways to prevent this negative social phenomenon. Basic topics that will be analyzed in this paper are the various definitions of cyberstalking, forms of cyberstalking, and the most important characteristics of victims and perpetators.

Author(s):  
Kevin Curran

Spam in the computer does not simply mean ads. Spam is any message, article, or ad that repeats itself an unacceptable number of times so that it causes annoyance. The content of the spam is of no importance. It could contain your simple “Make Money Fast” hyperlink or a beautiful piece of poetry, but if the message is continuously repeated it becomes spam. The term spam is thought to have been taken from a famous Monty Python sketch. In that sketch spam came with everything the people ordered and the waitress would be constantly saying the word spam. Therefore the meaning of spam is something that repeats itself causing much anger or annoyance. Spam can be categorized as follows: • Junk mail: Mass mailings from legitimate businesses that is unwanted. • Noncommercial spam: Mass mailings of unsolicited messages without an apparent commercial motive including chain letters, urban legends, and joke collections. • Offensive and pornographic spam: Mass mailings of “adult” advertisements or pornographic pictures. • Spam scams: Mass mailings of fraudulent messages or those designed to con people out of personal information for the purpose of identity theft and other criminal acts. • Virus spam: Mass mailings that contain viruses, Trojans, malicious scripts, and so forth. Spoofing (Schwartz & Garfinkel, 1998) is a technique often used by spammers to make them harder to trace. Trojan viruses embedded in e-mail messages also employ spoofing techniques to ensure the source of the message is more difficult to locate (Ishibashi, Yamai, Abe, & Matsuura, 2003). Spam filters and virus scanners can only eliminate a certain amount of spam and also risk catching legitimate e-mails. As the SoBig virus has demonstrated, virus scanners themselves actually add to the e-mail traffic through notification and bounceback messages. SMTP is flawed in that it allows these e-mail headers to be faked, and does not allow for the sender to be authenticated as the “real” sender of the message (Geer, 2004). This article looks at a new type of spam known as spam over Internet telephony (SPIT).


Author(s):  
Tijana Talić

The increasing use of electronic mail for identity theft and unsolicited marketing and frequent presence of viruses as well, reduced the credibility of email as a communication tool. Authentication of the sender is well known defense against such attacks. One of the methods to ensure that authentication, secure communication via e-mail, is the use of digital signature.


First Monday ◽  
2008 ◽  
Author(s):  
Byron Reeves ◽  
Simon Roy ◽  
Brian Gorman ◽  
Teresa Morley

The productivity of information workers is jeopardized by too much e-mail. A proposed solution to e-mail overload is the creation of an economy that uses a scarce synthetic currency that senders can use to signal the importance of information and receivers can use to prioritize messages. A test of the virtual economy with corporate information workers showed that people in a large company used different amounts of the currency when sending e-mails, and that the amount of currency attached to messages produced statistically significant differences in how quickly receivers opened the messages. An analysis of the network of virtual currency trades between workers showed the different roles that participants played in the communication network, and showed that relationships defined by currency exchanges uncovered social networks that are not apparent in analyses that only examine the frequency, as opposed to the value of interactions.


2018 ◽  
Vol 7 (3.3) ◽  
pp. 615
Author(s):  
Ms K. Karpaga Priyaa ◽  
Keerthipati Lahari ◽  
V Vasundhara ◽  
C Saranya

On-line Social Networks (OSNs) are progressively exerting consequences on the way communication takes place among people through sites such as Twitter, Facebook, Google+ and LinkedIn, possessing millions of users. The Online Social Networks’ (OSN) users face security-privacy threats such as Profile cloning, privacy breach and malware attacks. By these attacks, the fake user steals the virtual identity of the original user which they use to interact with other online users. To prevent these attacks, the proposed system uses Steganography which is the process of hiding information within other non-secret text or data. Our proposed system utilizes Steganography by implementing Watermarking technique which hides a secret text inside an image invisibly. Moreover the system avoids the leakage of personal information and prevents the creation of fake accounts. Experimental results show that the proposed technique can effectively detect and prevent creating malicious accounts in comparison with the techniques reported previously.  


Author(s):  
Jerry Pournelle

Whether you’re a compulsive gadget freak, an eBay addict, or a restrained occasional buyer, the Internet is a shopper’s paradise—open 24/7, offering unlimited choices, and giving us the luxury of shopping—through sleet and snow or summer heat—from our own homes. But at no time have caveats been more important for emptors than now. Devious and ingenious scam artists are just waiting to pounce on anyone who doesn’t take appropriate precautions. A few sound practices can help assure that you get what you pay for, get it on time, and don’t lose your shirt in the bargain. 1. Use a secure browser—Believe it or not, you can’t take browsers for granted. Be sure that you have the latest version of yours, including the latest updates and security patches, and that you’ve set your browser to notify you when you are entering or leaving a secure site. Be sure as well that it complies, as major browsers do (e.g., Netscape and Internet Explorer), with common industry security standards, like SSL and SET technology (see 2 just below). 2. Check out your vendor—Try to use vendors you’re familiar with. Many well-known bricks-and-mortar stores are now “clicks-and-mortar” operations, with both physical stores and sites on the Internet. If you must buy from a place you don’t know, check the site’s security. A secure site will use VeriSign’s Secure Sockets Layer technology (SSL), displaying a locked padlock at the bottom of the screen, Secure Electronic Transaction technology (SET), which shows an unbroken key, or a VeriSign logo indicating that you are at a secure Site. These are not just decorative icons. They are intended to ensure that all personal information you submit to the site will be scrambled en route through the ether and decrypted only when it reaches the licensed merchant. However, this is just the first step. Particularly if you clicked on an ad or a URL sent to you in an e-mail, and therefore did not type the URL in the address bar yourself, you should verify the security certificate (see How to Protect yourself from Frauds, Scams, and Identity Theft, p. 130).


Author(s):  
Ranaganayakulu Dhanalakshmi ◽  
Chenniappan Chellappan

Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain. In spite of the different possible attacks discussed in later chapters, this chapter can focus on phishing attacks – a form of indirect attacks– such as an act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. Phishing attacks use ‘spoofed’ e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, social security numbers, et cetera. The vulnerabilities on various phishing methods such as domain name spoofing, URL obfuscation, susceptive e-mails, spoofed DNS and IP addresses, and cross site scripting are analyzed, and the chapter concludes that an integrated approach is required to mitigate phishing attacks.


Author(s):  
Pragati Dnyaneshwar Bharsakle

In the current era of massive knowledge, high volumes of valuable knowledge is simply collected and generated. Social networks square measure samples of generating sources of those huge knowledge. Users in these social networks square measure usually coupled by some interdependency like friendly relationship. As these huge social networks continue to grow, there square measure things during which Associate in Nursing individual user needs to seek out common teams of friends so he will suggest a similar teams to alternative users. Many users of social Network are not aware about the number of security risks in networks such as identity theft, privacy violations, sexual harassment etc,. Recent studies says that most of the social network users expose their personal information like their date of birth, email address, phone number, relationship status. If this type of data reached to the wrong person, then person used that information to harm the users. If the children are users of social network, then these risks become serious. In this paper we present an alternative data analytic solution by using pattern matching solution.


2010 ◽  
Vol 25 (2) ◽  
pp. 109-125 ◽  
Author(s):  
Hanna Krasnova ◽  
Sarah Spiekermann ◽  
Ksenia Koroleva ◽  
Thomas Hildebrand

On online social networks such as Facebook, massive self-disclosure by users has attracted the attention of Industry players and policymakers worldwide. Despite the Impressive scope of this phenomenon, very little Is understood about what motivates users to disclose personal Information. Integrating focus group results Into a theoretical privacy calculus framework, we develop and empirically test a Structural Equation Model of self-disclosure with 259 subjects. We find that users are primarily motivated to disclose Information because of the convenience of maintaining and developing relationships and platform enjoyment. Countervailing these benefits, privacy risks represent a critical barrier to information disclosure. However, users’ perception of risk can be mitigated by their trust in the network provider and availability of control options. Based on these findings, we offer recommendations for network providers.


Sign in / Sign up

Export Citation Format

Share Document