THE WHATIS.COM WORD-OF-THE-DAY November 25, 2002 cyberstalking ______________ TODAY'S SPONSOR: NetIQ WebTrends
Free White Paper: The Executive Pocket Guide to Smarter Marketing Myth: The Web will never be a significant piece of the media mix. Fact: Your Web site is already a critical part of the blend. Break down the myths and get smarter about how the Web changes the marketing principles you already know. You can't afford to lose on the Web. So get your free copy of "Winning on the Web: The Executive Pocket Guide to Smarter Marketing" from NetIQ WebTrends today! http://WhatIs.com/r/0,,7779,00.htm?freewhitepaper ______________ TODAY'S WORD: cyberstalking See our definition with hyperlinks at http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci865159,00.html Cyberstalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a Web site or a discussion group. A cyberstalker relies upon the anonymity afforded by the Internet to allow them to stalk their victim without being detected. Cyberstalking messages differ from ordinary spam in that a cyberstalker targets a specific victim with often threatening messages, while the spammer targets a multitude of recipients with simply annoying messages. WHOA (Working to Halt Online Abuse), an online organization dedicated to the cyberstalking problem, reported that in 2001 58% of cyberstalkers were male and 32% female (presumably in some cases the perpetrator's gender is unknown). In a variation known as corporate cyberstalking, an organization stalks an individual. Corporate cyberstalking (which is not the same thing as corporate monitoring of e-mail) is usually initiated by a high-ranking company official with a grudge, but may be conducted by any number of employees within the organization. Less frequently, corporate cyberstalking involves an individual stalking a corporation. WHOA reported that, in 2001, cyberstalking began with e-mail messages most often, followed by message boards and forums messages, and less frequently with chat. In some cases, cyberstalking develops from a real-world stalking incident and continues over the Internet. However, cyberstalking is also sometimes followed by stalking in the physical world, with all its attendant dangers. According to former U.S. Attorney General Janet Reno, cyberstalking is often "a prelude to more serious behavior, including physical violence." In 1999, a New Hampshire woman was murdered by the cyberstalker who had threatened her in e-mail messages and posted on his Web site that he would kill her. There are a number of simple ways to guard against cyberstalking. One of the most useful precautions is to stay anonymous yourself, rather than having an identifiable online presence: Use your primary e-mail account only for communicating with people you trust and set up an anonymous e-mail account, such as Yahoo or Hotmail, to use for all your other communications. Set your e-mail program's filtering options to prevent delivery of unwanted messages. When choosing an online name, make it different from your name and gender-neutral. Don't put any identifying details in online profiles. Should you become the victim of a cyberstalker, the most effective course of action is to report the offender to their Internet service provider (ISP). Should that option be impossible, or ineffective, the best thing to do is to change your own ISP and all your online names. WHOA reports that over 80% of cases reported in 2001 and 2002 were resolved by these methods, while 17% were reported to law enforcement officials. Cyberstalking, cybersquatting, and cyberterrorism are among the growing number of new computer and Internet-related crimes, sometimes referred to collectively as cybercrime. RELATED TERMS: cybersquatting http://searchwebservices.techtarget.com/sDefinition/0,,sid26_gci213900,00.html cyberterrorism http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci771061,00.html ______________________ SELECTED LINKS The U.S. Department of Justice offers a report, "Cyberstalking: A New Challenge for Law Enforcement and Justice." http://www.usdoj.gov/criminal/cybercrime/cyberstalking.htm InfoToday describes cases of cyberstalking and provides safety tips. http://www.infotoday.com/lu/jul00/hitchcock.htm The WHOA Web site offers more information. http://www.haltabuse.org/ The First Monday Journal offers more information about corporate cyberstalking. http://www.firstmonday.dk/issues/current_issue/bocij/ ______________________ QUIZ #32 | Securing Your Network How much do you know about network security? Take our latest quiz and find out. >> Take the quiz http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci857673,00.html ______________________ CROSSWORD PUZZLE #6 | Wireless Improve your flexible thinking skills. Print out the puzzle and keep it nearby to work on throughout your day! http://whatis.techtarget.com/definition/0,,sid9_gci861329,00.html ______________________ REAL-LIFE CHALLENGE #19 | XP Pro or Win2k Pro? It's upgrade time. The branch office manager at Company X would like his staff to have "the best", which he thinks is XP Pro. The head of IT thinks that Win2k Pro is a better choice, but admits he's never worked with XP. Can you advise? http://whatis.discussions.techtarget.com/WebX?[EMAIL PROTECTED]@.1dcfae0e/169 ______________________________ RECENT ADDITIONS AND UPDATES [1] matter http://whatis.techtarget.com/definition/0,,sid9_gci865252,00.html [2] core router http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci865184,00.html [3] vertical interval time code http://whatis.techtarget.com/definition/0,,sid9_gci865178,00.html [4] plasma http://whatis.techtarget.com/definition/0,,sid9_gci864603,00.html [5] instruction http://whatis.techtarget.com/definition/0,,sid9_gci212356,00.html ____________________________________________________________________ ::::::::::::::::::: WHATIS.COM CONTACTS ::::::::::::::::::: LOWELL THING, Site Editor ([EMAIL PROTECTED]) ____________________________________________________________________ MARGARET ROUSE, Associate Editor ([EMAIL PROTECTED]) ___________________________________________________________________ :::::::::::::::::::: ABOUT THIS NEWSLETTER ::::::::::::::::::::: Published by TechTarget (http://www.techtarget.com) TechTarget - The Most Targeted IT Media Copyright 2002, All Rights Reserved. If you would like to sponsor this or any TechTarget newsletter, please contact Gabrielle DeRussy at [EMAIL PROTECTED] Unsubscribe from 'Word of the Day' - Simply Reply to this Email with REMOVE within the Body or Subject > or - Go to: http://WhatIs.techtarget.com/register - Log in to edit your profile. - Click on the link to Edit email subscriptions. - Uncheck the box next to the newsletter you wish to unsubscribe from. - When finished, click "Save Changes to My Profile."