Cyberstalking

= Cyberstalking  =

= = What is Cyberstalking? ** Watch Katie's true story on cyberstalking--[|You Tube]
 * 

 "Katie is now the WWK's Spokesperson & Ambassador to Youth. She shares her powerful first hand testimony with other young teens and parents so they know that what happened to her and her family can happen to them. She is sought after for television, radio and print interviews and has testified before state congressional hearings".

 
 * Definitions of Cyberstalking** 

"Although no universally accepted definition exists, it is generally considered  as use of the Internet, e-mail or other electronic communications device to stalk or harass a person. Stalking is defined as repeated harassing or threatening behavior". --Cyber Angels

According to Wikipedia; cyberstalking is a "continual process" that is characterized by; "malice, premeditation  , repetition, distress, obsession, vendetta, no legitimate purpose, personally directed, disregarded warnings to stop, harassment, and threats".


 * What are the Actions of a Cyberstalker? **



 This form of harassment comes in many ways. The following list gives us some ideas from Wikipedia.  <span style="font-family: 'Lucida Console',Monaco,monospace;"> 1. __False accusations__ - Many cyberstalkers try to damage the reputation of the victim and turn other people against them. They may set up their own websites, blogs or user pages for the purpose of spreading false information about their victim. Additionally they may post allegations about the victim to newsgroups, chat rooms or other sits that allow public contributions, such as Wikipedia or Amazon.com.

2. __Gather information-__ Cyberstalkers may approach heir victim's friends, family and work collegagus to obtain personal information. They will often monitor the victims online activities and attempt to rat their IP address in an effort to gather more information about their victims.

3. __Encouraging Others__- May cyberstakers try to involve thrid parties in the harassment. They may claim the victim has harmed the stalker or his/her family in some way, or may post the victim's name and telephone number in order to encourage others to join the pursuit.

4. __False victimizaion-__ The cyberstalker will claim that the victim is harassing him or her.

5. __Attacks on data an equipment-__ Stalkers may try to damage the victim's computer by sending viruses.

6. __Ordering for others-__ They order items or subscribe to magazines in the victim's name. These often involve subscriptions to pornography and other explicit material that is sent to the victim's home or workplace.

<span style="background-color: #87ca4e; display: block; font-family: 'Lucida Console',Monaco,monospace; font-size: 120%; text-align: center;"> Can I prevent this from happening to me? **
 * <span style="background-color: #87ca4e; display: block; font-family: 'Lucida Console',Monaco,monospace; font-size: 88%; text-align: center;">

<span style="background-color: #87ca4e; display: block; font-family: 'Lucida Console',Monaco,monospace; font-size: 147.84%; text-align: center;">

<span class="author-g-taez122zthfx95vpn9ax" style="background-color: #f9e9dc; font-family: 'Lucida Console',Monaco,monospace;"> <span style="background-color: #ffffff; font-family: 'Lucida Console',Monaco,monospace;">This form of harassment is not preventable but these simple procedures may help avoid this problem:

1. Don't write when you're angry. To avoid inflaming others do not vent on the Internet. Remember that what you post can be read by many hundreds of others and it can be altered in many forms.

2. Stay away from questionable chat rooms and blogs.

3. Avoid speaking to strangers online.

4. Make sure that none of your online profiles contain any personal identification such as; your age, sex, school, address, home and cell phone numbers, team or teams you play on, activities your participate in, and where you work.

5. Never reply back to any form of harassment with an angry reply. Simply tell them to leave you alone. <span class="author-g-taez122zthfx95vpn9ax" style="background-color: #ffffff; display: block; font-family: 'Lucida Console',Monaco,monospace; text-align: center;"> ** <span style="background-color: #ffffff; display: block; font-family: 'Lucida Console',Monaco,monospace; text-align: center;"> <span style="background-color: #87ca4e; display: block; font-family: 'Lucida Console',Monaco,monospace; font-size: 130%; text-align: center;">What I can do if I think I'm being stalked or harassed? ** <span style="background-color: #f0d87a; display: block; font-family: 'Lucida Console',Monaco,monospace; font-size: 130%; text-align: left;"> Contact an authority. Speak to your parents, teachers, administrators, and counselors. Save and print all forms of evidence Document times and sites where and when the incident occurred. <span style="background-color: #ffffff; display: block; font-family: 'Lucida Console',Monaco,monospace; font-size: 110%; text-align: center;"> These websites offer advice that may be helpful if you find yourself in this situation: <span style="background-color: #ffffff; display: block; font-family: 'Lucida Console',Monaco,monospace; text-align: center;">

Basic solutions [|Cyber Angels]

Watch this video for common solutions for adults 18 and older [|Wired Safety]

Report Form on cyberstaking, cyberbullying, and Harassment [|Wired Safety]

Legal Information and Law Enforcement [|Cyber Law Enforcement]

Stalking can escalate to genuine danger. If a stalker has made threats or crossed the line from online to offline contact, contact law enforcement. Do not disregard such behavior, hoping it will simply stop. This is a matter of your personal safety.

Online and Mobile Safety Tips **
 * <span style="background-color: #87ca4e; display: block; font-family: 'Lucida Console',Monaco,monospace; font-size: 120%; text-align: center;">

<span style="background-color: #ffffff; display: block; font-family: 'Lucida Console',Monaco,monospace; text-align: left;"> Cell phone safety- [|Wired Safety] Chat room safety- [|Wired Safety] Instant Messaging Safety- [|Wired Safety] Online gaming safety- [|Wired Safety]

<span style="background-color: #87ca4e; display: block; font-family: 'Lucida Console',Monaco,monospace; font-size: 130%; text-align: center;">**Resources for Students, Parents, and Schools**

<span style="background-color: #ffffff; display: block; font-family: 'Lucida Console',Monaco,monospace; text-align: left;"> **Schools** Schools information- Book seminars at your school with Teen Angels [|Teen Angels] Educators guide to cyberbullying and cyber threats [|WCS] Educators- Are we responsible to teach and model this subject? [|Doug Johnson] <span style="background-color: #ffffff; display: block; font-family: 'Lucida Console',Monaco,monospace; text-align: center;"> <span style="background-color: #ffffff; font-family: 'Lucida Console',Monaco,monospace;">**Parents** Parent questions on <span style="font-family: 'Lucida Console',Monaco,monospace;">"FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT" -[|Teen Angels] Parent tips on what cyberstaking is and how to prevent it. [|Symantec] <span style="font-family: 'Lucida Console',Monaco,monospace;">Internet safety awareness and statistics [|Web Wise] Internet safety agreement contract between parent and child - [|Safe Teens]

<span style="background-color: #ffffff; font-family: 'Lucida Console',Monaco,monospace;"> Cyberstalking and harassment handouts for students under 18- [|Wired Safety] Articles for teens on cyberstalking and harassment [|Safe Teens] The Internet and your social life (My Space, Ebo, Avitars, blogs, etc)--Watch this discussion by teens about teens-- [|You Tube and Web Wise]
 * Students**

<span style="background-color: #e5f3c3; color: #007000; display: block; font-family: 'Lucida Console',Monaco,monospace; font-size: 99%; text-align: center;"> At our Online Behavior Forum, you can share your own experiences or pose questions for others to consider. <span class="author-g-taez122zthfx95vpn9ax" style="background-color: #f9e9dc; font-family: 'Lucida Console',Monaco,monospace;">