A computer system is a collection of hardware and software components designed to provide an effective tool for computation. Computer system are used in every walk of life to assist us in the various tasks we perform. The wide availability of the internet has enhance the use of computer for information sharing and communication. Computer system allows us to store, process, display and communicate information. In any modern computer system even a simple one, in general needs several different programs in order to accomplish its various functions.

Tuesday, November 12, 2019

What is cyberstalking?

The Internet has undergone rapid growth in this millennium in that it has promoted advances in just about every aspect of society and is available and accessible in practically every corner of the globe. The Internet has literally become a fertile breeding ground for an entirely new and unique type of criminal offender hereafter known as the cyber stalker.

The cyber stalker is one who uses the Internet as a weapon or tool of sorts to prey upon, harass, threaten, and generate fear and trepidation in his or her victims through sophisticated stalking tactics, which for the most part, are largely misunderstood and in some cases, legal.

The action is to annoy, alarm, and emotionally abuse another person. Perpetrators utilize social media accounts, publicly accessible information and sometimes illegally accessed information to learn more about their targets. The perpetrators may also spread rumors and misinformation to discredit or intimidate them.

It is also worth pointing out that many of the techniques used by cyberstalkers were not possible until quite recently. Identity theft, for example, involves impersonating another person in order to carry out various acts, such as making fraudulent purchases.

The term cyber stalking generally refers to the use of the Internet, email, or other electronic communication device to create a criminal level of intimidation, harassment, and fear in one or more victims.

Cyberstalkers may obtain personal information about their victims (e.g.,home address, phone number) from the Internet and utilize this information to meet their victims in person. They can use any of a number of methods available online to assist them in their endeavors, including downloading keystroke logger software to capture the information necessary to obtain private information from their intended victim and using social media to monitor and/or harass their victims.

The motivations behind cyberstalking can be very different to those behind offline stalking. Corporate cyberstalking involves an individual, a group or an organization pursuing another individual, group or organization. Sometimes, the motive behind corporate cyber-stalking can be political, for profit or for competitive advantage.
What is cyberstalking?
Related Posts Plugin for WordPress, Blogger...

The Most Popular Posts

  • Fruits and vegetables are consumed at all times, and due to their convenient size; they are an excellent between-meal snack. They are relatively low in cal...
  • The tradition that ranks the sense of taste as among the lowlier attributes of human beings has roots that run long and deep into the history of philosophy...