WOMEN

The increasing reach of the internet, the rapid spread of mobile information, and the widespread use of social media, coupled with the existing pandemic of violence against women and girls (VAWG), has led to the emergence of cyber VAWG as a growing global problem with potentially significant economic and societal

Frequently Asked Questions

  • Women
  • What's cyberstalking?

    Cyberstalking  involves the use of information and communications technology (ICT) to perpetrate more than one incident intended to repeatedly harass, annoy, attack, threaten, frighten, and/or verbally abuse individuals.

    Perpetrators can engage in cyberstalking directly by emailing, instant messaging, calling, texting, or utilizing other forms of electronic communications to communicate obscene, vulgar, and/or defamatory comments and/or threats to the victim and/or the victim's family, partner, and friends, and use technologies to monitor, survey and follow the victim's movements.

    Perpetrators can also engage in cyberstalking indirectly by causing damage to the victim's digital device (by, for example, infecting the victim's computer with malware and using this malware to surreptitiously monitor the victim and/or steal information about the victim) or by posting false, malicious, and offensive information about the victim online or setting up a fake account in the victim's name to post material online (social media, chat rooms, discussion forums, websites, etc.).

     
  • What is catfishing?
    Catfishing is a form of fraud or abuse where someone creates a fake online identity to target a particular victim. Catfishers may lure their victims into providing intimate photos or videos, then blackmail them, or may develop a relationship and then ask for money for a sudden emergency
  • Tips for protecting yourself from cyberstalkers
    • Make your posts 'friends only' so that only people you know get to see them.
    • Don't let social networks post your address or phone number publicly. (You might even want to have a separate email address for social media)
    • If you need to share your phone number or other private information with a friend, do so in a private message - not in a public post
    • Use a gender-neutral screen name or pseudonym for your social media accounts — not your real name.
    • Leave optional fields in social media profiles, like your date of birth, blank.
    • Only accept friend requests from people you have actually met in person. Set your social networks to accept friend requests only from friends of friends.
    • Disable geolocation settings. You may want to also disable GPS on your phone.
  • What is Cyberharassment?

    Cyberharassment involves the use of ICT to intentionally humiliate, annoy, attack, threaten, alarm, offend, and/or verbally abuse individuals. Only one incident is needed for cyberharassment to occur; however, it can involve more than one incident.

    Cyberharassment may also involve targeted harassment, where one or more persons work together to repeatedly harass their target online over a finite period (often a brief period) to cause distress, humiliation, and/or to silence the target. The perpetrators of cyberharassment can hack into the victim's account and steal the victim's personal information, images, and videos.

    Cyberharassment can also involve the posting or other distribution of false information or rumors about an individual to damage the victim's social standing, interpersonal relationships, and/or reputation (i.e., a form of cybersmearing). This false information is posted on websites, chat rooms, discussion forums, social media, and other online sites to damage the reputations of people and businesses. Offenders can also impersonate victims by creating accounts with similar names and, by making use of existing images of the victims, use these accounts to send friend and/or follower requests to victims' friends and family members to deceive them into accepting these requests (a form of online impersonation).

  • What is sextortion?
    It is a form of cyber extortion. It occurs when individuals demand their victims provide them with sexual images, sexual favors, or other things of value. There is no specific federal sextortion offense, but it falls under the federal cyberstalking law.
  • Where to report cyberstalking
    Submit an Internet crime complaint with the Internet Crime Complaint Center - IC3. Complaints filed via the IC3 website are processed and may be referred to federal, state, local or international law enforcement or regulatory agencies for possible investigation.  
  • ADVERTISEMENT

    BOOKS

    ADVERTISEMENT

    COURSES & EDUCATION

    ADVERTISEMENT

    DEFINITIONS

    ADVERTISEMENT

    DOCUMENTS

    The increasing reach of the internet, the rapid spread of mobile information, and the widespread use of social media, coupled with the existing pandemic of violence against women and girls (VAWG), has led to the emergence of cyber VAWG as a growing global problem with potentially significant economic and societal...

    Read more
    ADVERTISEMENT

    ENTERTAINMENT

    ADVERTISEMENT

    QUOTES

    TIPS

    Welcome Back!

    Login to your account below

    Retrieve your password

    Please enter your username or email address to reset your password.

    Add New Playlist