1 of 69

Cyberstalking

In this learning session, you

will discover strategies to

avoid cyberstalkers.

e-Citizenship Learning Packets

Slide 1

2 of 69

Google Yourself

1 2 3 4 5 6 7 8 9 10 Next

See Mei Yuh

ALL IMAGES VIDEOS NEWS

Challenge!

e-Citizenship Learning Packets

Slide 2

3 of 69

The challenge is for you to search the

Search

web for pieces of information

about yourself.

Google

e-Citizenship Learning Packets

Slide 3

4 of 69

Launch an internet browser

on your computer.

e-Citizenship Learning Packets

Slide 4

5 of 69

Settings

History

New private window

Turn on private browsing.

e-Citizenship Learning Packets

Slide 5

6 of 69

Go to Google Web Search.

Type in:

www.google.com

e-Citizenship Learning Packets

Slide 6

7 of 69

www.google.com

Search

Google

See Mei Yuh

Type the name you most often use online into

the search bar, and hit the search button.

e-Citizenship Learning Packets

Slide 7

8 of 69

look for personal information and records

in the activity score sheet.

Go through the search results, and

of your online activities as listed

e-Citizenship Learning Packets

Slide 8

9 of 69

Activity score sheet.

e-Citizenship Learning Packets

Slide 9

10 of 69

beside every piece of personal

information that you find online.

Put a check on the box ( )

e-Citizenship Learning Packets

Slide 10

11 of 69

4

5

3

Give yourself a score that

corresponds to the piece of

information you ticked off.

e-Citizenship Learning Packets

Slide 11

12 of 69

Let’s start!

Search

Google

e-Citizenship Learning Packets

Slide 12

13 of 69

Time’s up!

Search

Google

e-Citizenship Learning Packets

Slide 13

14 of 69

4

5

3

12

Add your points to

get the total score.

e-Citizenship Learning Packets

Slide 14

15 of 69

Analysis

e-Citizenship Learning Packets

Slide 15

e-Citizenship Learning Packets

Slide 15

16 of 69

What score did you get?

What do you think your score implies?

www.seameo-innotech.org

Challenge!

Google Yourself

ANALYSIS

e-Citizenship Learning Packets

Slide 16

17 of 69

Was it easy or difficult to look for your personal details using Google Web Search?

www.seameo-innotech.org

Challenge!

Google Yourself

ANALYSIS

e-Citizenship Learning Packets

Slide 17

18 of 69

How do you feel about having some of your personal information publicly available online?

www.seameo-innotech.org

Challenge!

Google Yourself

ANALYSIS

e-Citizenship Learning Packets

Slide 18

19 of 69

What do you think are the dangers of having your personal details available online?

www.seameo-innotech.org

Challenge!

Google Yourself

ANALYSIS

e-Citizenship Learning Packets

Slide 19

20 of 69

With your personal information available on the Internet, how easy do you think would it be for a stranger to get in touch with you?

www.seameo-innotech.org

Challenge!

Google Yourself

ANALYSIS

e-Citizenship Learning Packets

Slide 20

21 of 69

How will it affect you if someone persistently sends you unsolicited messages and gives you unwanted attention?

www.seameo-innotech.org

Challenge!

Google Yourself

ANALYSIS

e-Citizenship Learning Packets

Slide 21

22 of 69

Have you ever come across a suspicious character online? What should you do if you think someone is stalking you?

www.seameo-innotech.org

Challenge!

Google Yourself

ANALYSIS

e-Citizenship Learning Packets

Slide 22

23 of 69

How can you avoid becoming a cyberstalking victim?

www.seameo-innotech.org

Challenge!

Google Yourself

ANALYSIS

e-Citizenship Learning Packets

Slide 23

24 of 69

Do your parents/guardians monitor your online activities? If they do, why do you think they do such a thing and does it bother you?

www.seameo-innotech.org

Challenge!

Google Yourself

ANALYSIS

e-Citizenship Learning Packets

Slide 24

25 of 69

In what ways can you help your friends, families, and relatives protect themselves from cyberstalking?

www.seameo-innotech.org

Challenge!

Google Yourself

ANALYSIS

e-Citizenship Learning Packets

Slide 25

26 of 69

What does your

score mean?

e-Citizenship Learning Packets

Slide 26

27 of 69

Getting a low score (24 and below) means…

  • it may be more difficult for other people to get your personal information and initiate contact with you; and

  • you are relatively safer from receiving unwanted messages and attention.

e-Citizenship Learning Packets

Slide 27

28 of 69

  • other people may be able to easily access your personal information and contact you.

TAKE STEPS IN ORDER TO TIGHTEN YOUR

PRIVACY AND SECURITY ON THE WEB.

Getting a high score (25 and above) means…

e-Citizenship Learning Packets

Slide 28

29 of 69

Time

Click on to play the video

Movie

Cyberstalking Statistics| – Search the Web

Let’s watch this!

e-Citizenship Learning Packets

Slide 29

30 of 69

What is

cyberstalking?

e-Citizenship Learning Packets

Slide 30

e-Citizenship Learning Packets

Slide 30

31 of 69

Cyberstalking

Cyberstalking refers to activities where people repeatedly contact, harass, and/or threaten others online.

e-Citizenship Learning Packets

Slide 31

e-Citizenship Learning Packets

Slide 31

32 of 69

Cyberstalking

Cyberstalking can happen in social media, chat rooms, instant messaging, email services, and blogging sites, and it can occur alongside stalking in the conventional sense, which happens in real life.

e-Citizenship Learning Packets

Slide 32

e-Citizenship Learning Packets

Slide 32

33 of 69

www.seameo-innotech.org/mt4t

Search

Examples of cyberstalking

e-Citizenship Learning Packets

Slide 33

34 of 69

Making unwanted contact by calling, emailing, texting, messaging, or sending offensive material

Sharing or threatening to share photos, videos, personal information, or anything that's humiliating or embarrassing

(Office of the eSafety Commissioner)

Examples of cyberstalking

www.seameo-innotech.org/mt4t

e-Citizenship Learning Packets

Slide 34

35 of 69

Posting humiliating, abusive, or [threatening] comments about [someone] on social media

Accessing [someone’s] email or social media accounts to find [ ] personal information, read [ ] emails and messages, or change [ ] passwords

(Office of the eSafety Commissioner)

Examples of cyberstalking

www.seameo-innotech.org/mt4t

e-Citizenship Learning Packets

Slide 35

36 of 69

Impersonating [someone’s] online identity in order to harm reputation or relationships

Monitoring [someone’s] movements using [global positioning system], tracking apps, or spyware

(Office of the eSafety Commissioner)

Examples of cyberstalking

www.seameo-innotech.org/mt4t

e-Citizenship Learning Packets

Slide 36

37 of 69

Common reasons for cyberstalking

AnandK

.

2016

...

Like

Comment

www.seameo-innotech.org/mt4t

e-Citizenship Learning Packets

Slide 37

38 of 69

Common reasons for cyberstalking

Gathering information to defame a person or an

organization out of prejudice

AnandK

.

2016

...

Like

Comment

www.seameo-innotech.org/mt4t

e-Citizenship Learning Packets

Slide 38

39 of 69

Harassing an identified target in exchange for

money

Common reasons for cyberstalking

AnandK

.

2016

...

Like

Comment

www.seameo-innotech.org/mt4t

e-Citizenship Learning Packets

Slide 39

40 of 69

Acting on personal hatred

Common reasons for cyberstalking

AnandK

.

2016

...

Like

Comment

www.seameo-innotech.org/mt4t

e-Citizenship Learning Packets

Slide 40

41 of 69

Exacting revenge

Common reasons for cyberstalking

AnandK

.

2016

...

Like

Comment

www.seameo-innotech.org/mt4t

e-Citizenship Learning Packets

Slide 41

42 of 69

Engaging in the act for fun

Common reasons for cyberstalking

AnandK

.

2016

...

Like

Comment

www.seameo-innotech.org/mt4t

e-Citizenship Learning Packets

Slide 42

43 of 69

Ignorance (the stalker doesn’t know that he/

she is committing a crime)

Common reasons for cyberstalking

AnandK

.

2016

...

Like

Comment

www.seameo-innotech.org/mt4t

e-Citizenship Learning Packets

Slide 43

44 of 69

PROTECT

YOURSELF FROM

CYBERSTALKING

e-Citizenship Learning Packets

Slide 44

45 of 69

  • Never reveal home address/es online.
  • Password-protect all devices and online accounts, and use secure passwords that would be difficult for anyone to guess. Regularly update your passwords.
  • Conduct an internet search using your name and phone numbers to find out how much information about you is publicly available online.

How do you prevent being cyberstalked?

(Moore, 2018)

e-Citizenship Learning Packets

Slide 45

PROTECT

YOURSELF FROM

CYBERSTALKING

e-Citizenship Learning Packets

Slide 45

46 of 69

  • Be suspicious of any incoming email, phone call, or message that asks for identifying information.
  • Use web analytics* or other free registry counters that will record all incoming traffic to your online accounts (personal blogs and websites included); that way, page visitors are identified.

How do you prevent being cyberstalked?

*Web analytics is the process of analyzing the behavior of visitors to a Web site. (Rouse, n.d.)

(Moore, 2018)

e-Citizenship Learning Packets

Slide 46

PROTECT

YOURSELF FROM

CYBERSTALKING

e-Citizenship Learning Packets

Slide 46

47 of 69

  • Ask an information technology (IT) professional to check the security of the computer devices you own, especially if there are suspicions of being a target victim.
  • Take preventive measures right away when you suspect that you are being cyberstalked.
  • Avoid inaction because you think you could be overreacting or being paranoid; it’s always best to err on the side of caution.

How do you prevent being cyberstalked?

(Moore, 2018)

e-Citizenship Learning Packets

Slide 47

PROTECT

YOURSELF FROM

CYBERSTALKING

e-Citizenship Learning Packets

Slide 47

48 of 69

  • Block the potential cyberstalker and record incidents (date, time, and place).
  • Make it clear that the attention is unwanted. Write once to the cyberstalker and document it. Warn that further contact will result in a police report.
  • Save copies of all communications. Take screen-shots and back up evidence on a Universal Serial Bus (USB) stick or an external hard drive.

How do you respond to a cyberstalking incident?

(Take Back The Tech, 2018)

e-Citizenship Learning Packets

Slide 48

PROTECT

YOURSELF FROM

CYBERSTALKING

e-Citizenship Learning Packets

Slide 48

49 of 69

  • Report, block, or filter online communications. Learn how to turn on filtering and blocking capabilities of messaging or email applications. Use built-in reporting mechanisms.
  • Go to the authorities, and turn over pieces of evidence. Having more evidence can help the authorities resolve the case faster.

How do you respond to a cyberstalking incident?

(Take Back The Tech, 2018)

e-Citizenship Learning Packets

Slide 49

PROTECT

YOURSELF FROM

CYBERSTALKING

e-Citizenship Learning Packets

Slide 49

50 of 69

  • Get emotional support. Inform your family, friends, and teachers about the incident of cyberstalking.
  • Approach the authorities or the police to clean up the damage if internet searches reveal that the stalker published private information.

How do you respond to a cyberstalking incident?

(Take Back The Tech, 2018)

e-Citizenship Learning Packets

Slide 50

PROTECT

YOURSELF FROM

CYBERSTALKING

e-Citizenship Learning Packets

Slide 50

51 of 69

REMEMBER

Cyberstalking refers to repeated unwanted contact from someone on the Internet. Often, this makes the victim afraid or concerned about her or his safety. In general, a cyberstalker’s conduct induces fear and invades a person’s right to privacy.

e-Citizenship Learning Packets

Slide 51

e-Citizenship Learning Packets

Slide 51

52 of 69

REMEMBER

Reasons for cyberstalking include gathering information that can be used against a person or an organization, harassing an identified target in exchange for money, exacting revenge, or simply cyberstalking someone for fun. In some cases, people who excessively stalk others online for fun may not realize that what they’re doing may be considered a crime.

e-Citizenship Learning Packets

Slide 52

e-Citizenship Learning Packets

Slide 52

53 of 69

REMEMBER

Cyberstalking is a crime. Don’t be the next victim. Inform your parents, friends, teachers, and the authorities at once about suspicious people you encountered online.

Practice common sense and critical thinking when interacting with other people online. Remember not to give away important personal information to strangers. This includes your home address, school, and phone number.

e-Citizenship Learning Packets

Slide 53

e-Citizenship Learning Packets

Slide 53

54 of 69

REMEMBER

Learn about the privacy and security features of the social networking and blogging sites on which you have existing accounts. This will allow you to control the amount of information that you share with people you actually know and the general public. Doing so will decrease your risk of being a target of cyberstalkers.

e-Citizenship Learning Packets

Slide 54

e-Citizenship Learning Packets

Slide 54

55 of 69

REMEMBER

When you find yourself in a cyberstalking situation, immediately seek help from friends, family, teachers, and the authorities to resolve the issue. Block the cyberstalker online at once, and document all communications sent to you and save copies for evidence. More importantly, remain resilient and exercise critical thinking as you deal with the situation.

e-Citizenship Learning Packets

Slide 55

e-Citizenship Learning Packets

Slide 55

56 of 69

REMEMBER

Exert conscious effort to be aware of your online behavior to avoid becoming an abuser yourself.

e-Citizenship Learning Packets

Slide 56

e-Citizenship Learning Packets

Slide 56

57 of 69

Application

e-Citizenship Learning Packets

Slide 57

e-Citizenship Learning Packets

Slide 57

58 of 69

***

Check how strong your password is at

www.passwordmeter.com

APPLICATION

e-Citizenship Learning Packets

Slide 58

59 of 69

Set-up two factor authentication on your social media accounts

APPLICATION

e-Citizenship Learning Packets

Slide 59

60 of 69

Watch these tutorial videos to learn how!

Click on the social media icons to access the videos

How to Enable 2 Step Verification for Facebook

PC Shastra

2 Factor authentication for Twitter

TwinBytes Inc

Google Authenticator App : Enable Two-Step Verification in Gmail

Enam Alamin

APPLICATION

e-Citizenship Learning Packets

Slide 60

61 of 69

Create an infographic about cyberstalking and some strategies to safely deal with a cyberstalking incident

APPLICATION

e-Citizenship Learning Packets

Slide 61

62 of 69

Assessment

e-Citizenship Learning Packets

Slide 62

e-Citizenship Learning Packets

Slide 62

63 of 69

  • 3 things you learned from the lesson (1 minute)

  • 2 questions still left hanging in your mind (1 minute)

ASSESSMENT

REFLECT

&

REVIEW

e-Citizenship Learning Packets

Slide 63

64 of 69

  • 1 thing you promise to do to remain safe from cyberstalkers (1 minute)

  • 1 personal commitment to share what you learned with your friends, families, and relatives to help them protect themselves from cyberstalking (1 minute)

ASSESSMENT

REFLECT

&

REVIEW

e-Citizenship Learning Packets

Slide 64

65 of 69

Alexis A. Moore. (26 March 2018). 12 Crucial Tips to Protect Yourself from Cyberstalking. Retrieved from the ThoughtCo. website: https://www.thoughtco.com/tips-to-protect-yourself-from-cyberstalking-3534318.

AnandK. (23 May 2016). What is Cyberstalking? Examples, Prevention, Help. Retrieved from The Windows Club website: https://www.thewindowsclub.com/cyberstalking-definition-examples.

Commonwealth of Massachusetts. (2018). Cyber-stalking. Retrieved from the Mass.gov website: http://www.mass.gov/ago/public-safety/cyber-crime-and-internet-safety/cyber-crimes/cyber-stalking.html.

Cyberstalking [Def. 1]. (2018). In Merriam-Webster’s online dictionary. Retrieved from the Merriam-Webster website: https://www.merriam-webster.com/legal/cyberstalking.

References

e-Citizenship Learning Packets

Slide 65

66 of 69

Laura Riparbelli. (14 July 2011). 12-Year-Old Sentenced for Cyberstalking Classmate. Retrieved from the ABC News website: https://abcnews.go.com/Technology/12-year-sentenced-washington-cyberstalking-case/story?id=14072315.

Margaret Rouse. (n.d.). Two-Factor Authentication. Retrieved from The TechTarget website: https://searchsecurity.techtarget.com/definition/two-factor-authentication.

Margaret Rouse. (n.d.). Web analytics. Retrieved from the TechTarget website: https://searchcrm.techtarget.com/definition/Web-analytics.

Meg Barbor. (25 October 2017). Cyberstalking: 1 in 5 US Children Solicited for Sex Online. Retrieved from the Medscape website: https://www.medscape.com/viewarticle/887592.

Office of the eSafety Commissioner. (n.d.). What is cyberstalking? Retrieved from the Australia Government’s Office of the eSafety Commissioner’s website: https://www.esafety.gov.au/women /take-control/cyberstalking/what-is-cyberstalking.

References

e-Citizenship Learning Packets

Slide 66

67 of 69

Sameer Hinduja. (21 March 2018). Cyberstalking. Retrieved from the Cyberbullying Research Center website: https://cyberbullying.org/cyberstalking.

Stalking [Def. 2]. (n.d.). In Urban Dictionary. Retrieved from the Urban Dictionary website: https://www.urbandictionary.com/define.php?term=Stalking.

Take Back the Tech. (2018). Cyberstalking Strategies. Retrieved from the Take Back the Tech website: https://www.takebackthetech.net/be-safe/cyberstalking-strategies.

Techopedia. (2019). Cyberstalking. Retrieved from the Techopedia website at https://www.techopedia.com/definition/14326/cyberstalking.

The Lawyer Portal. (2018). Law Guides: Internet Trolling and Cyberbullying Law. Retrieved from The Lawyer Portal website: https://www.thelawyerportal.com/2017/04/20/law-guides-internet-trolling-cyberbullying-law/?cn-reloaded=1.

Working to Halt Online Abuse. (2013). 2013 Cyberstalking Statistics. Retrieved from the WHOA website: http://www.haltabuse.org/resources/stats/2013Statistics.pdf.

References

e-Citizenship Learning Packets

Slide 67

68 of 69

SEAMEO INNOTECH would like to acknowledge the technical inputs of Bernadette Caraig in the development of this learning packet.

All images used in this presentation are royalty-free and are sourced from the following websites:

www.shutterstock.com

www.pixabay.com

www.pexels.com

www.unsplash.com

Icons are sourced from

www.thenounproject.com

Emojis are provided free by Emoji One at

www.emojione.com

e-Citizenship Learning Packets

Slide 68

69 of 69

This publication is licensed under Creative Commons

Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

(https://creativecommons.org/licences/by-nc-sa/4.0/)

e-Citizenship Learning Packets

Slide 69