THE WHATIS.COM WORD-OF-THE-DAY   
November 25, 2002

cyberstalking 
______________
TODAY'S SPONSOR: NetIQ WebTrends 

Free White Paper:  The Executive Pocket Guide to Smarter Marketing

Myth: The Web will never be a significant piece of the media mix.
Fact: Your Web site is already a critical part of the blend.

Break down the myths and get smarter about how the Web changes
the marketing principles you already know. You can't afford 
to lose on the Web. So get your free copy of "Winning on the
Web: The Executive Pocket Guide to Smarter Marketing"
from NetIQ WebTrends today!
http://WhatIs.com/r/0,,7779,00.htm?freewhitepaper 

______________   
TODAY'S WORD: cyberstalking 

See our definition with hyperlinks at 
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci865159,00.html

Cyberstalking is a crime in which the attacker harasses a victim
using electronic communication, such as e-mail or instant messaging
(IM), or messages posted to a Web site or a discussion group. A
cyberstalker relies upon the anonymity afforded by the Internet to
allow them to stalk their victim without being detected.
Cyberstalking messages differ from ordinary spam in that a
cyberstalker targets a specific victim with often threatening
messages, while the spammer targets a multitude of recipients with
simply annoying messages. 

WHOA (Working to Halt Online Abuse), an online organization dedicated
to the cyberstalking problem, reported that in 2001 58% of
cyberstalkers were male and 32% female (presumably in some cases the
perpetrator's gender is unknown). In a variation known as corporate
cyberstalking, an organization stalks an individual. Corporate
cyberstalking (which is not the same thing as corporate monitoring of
e-mail) is usually initiated by a high-ranking company official with
a grudge, but may be conducted by any number of employees within the
organization. Less frequently, corporate cyberstalking involves an
individual stalking a corporation. 

WHOA reported that, in 2001, cyberstalking began with e-mail messages
most often, followed by message boards and forums messages, and less
frequently with chat. In some cases, cyberstalking develops from a
real-world stalking incident and continues over the Internet.
However, cyberstalking is also sometimes followed by stalking in the
physical world, with all its attendant dangers. According to former
U.S. Attorney General Janet Reno, cyberstalking is often "a prelude
to more serious behavior, including physical violence." In 1999, a
New Hampshire woman was murdered by the cyberstalker who had
threatened her in e-mail messages and posted on his Web site that he
would kill her. 

There are a number of simple ways to guard against cyberstalking. One
of the most useful precautions is to stay anonymous yourself, rather
than having an identifiable online presence: Use your primary e-mail
account only for communicating with people you trust and set up an
anonymous e-mail account, such as Yahoo or Hotmail, to use for all
your other communications. Set your e-mail program's filtering
options to prevent delivery of unwanted messages. When choosing an
online name, make it different from your name and gender-neutral.
Don't put any identifying details in online profiles. 

Should you become the victim of a cyberstalker, the most effective
course of action is to report the offender to their Internet service
provider (ISP). Should that option be impossible, or ineffective, the
best thing to do is to change your own ISP and all your online names.
WHOA reports that over 80% of cases reported in 2001 and 2002 were
resolved by these methods, while 17% were reported to law enforcement
officials. 

Cyberstalking, cybersquatting, and cyberterrorism are among the
growing number of new computer and Internet-related crimes, sometimes
referred to collectively as cybercrime. 

RELATED TERMS:

cybersquatting
http://searchwebservices.techtarget.com/sDefinition/0,,sid26_gci213900,00.html

cyberterrorism
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci771061,00.html

______________________
SELECTED LINKS

The U.S. Department of Justice offers a report, "Cyberstalking: A New
Challenge for Law Enforcement and Justice." 
http://www.usdoj.gov/criminal/cybercrime/cyberstalking.htm 

InfoToday describes cases of cyberstalking and provides safety tips. 
http://www.infotoday.com/lu/jul00/hitchcock.htm 

The WHOA Web site offers more information. 
http://www.haltabuse.org/ 

The First Monday Journal offers more information about corporate
cyberstalking. 
http://www.firstmonday.dk/issues/current_issue/bocij/ 

______________________
QUIZ #32 | Securing Your Network

How much do you know about network security? Take our latest quiz and
find out.

>> Take the quiz
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci857673,00.html 

______________________
CROSSWORD PUZZLE #6 | Wireless 

Improve your flexible thinking skills. Print out the puzzle and keep
it nearby to work on throughout your day!
http://whatis.techtarget.com/definition/0,,sid9_gci861329,00.html

______________________
REAL-LIFE CHALLENGE #19 | XP Pro or Win2k Pro?

It's upgrade time. The branch office manager at Company X would like
his staff to have "the best", which he thinks is XP Pro. The head of
IT thinks that Win2k Pro is a better choice, but admits he's never
worked with XP. Can you advise?
http://whatis.discussions.techtarget.com/WebX?[EMAIL PROTECTED]@.1dcfae0e/169

______________________________ 
RECENT ADDITIONS AND UPDATES 

[1] matter 
http://whatis.techtarget.com/definition/0,,sid9_gci865252,00.html

[2] core router 
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci865184,00.html

[3] vertical interval time code 
http://whatis.techtarget.com/definition/0,,sid9_gci865178,00.html

[4] plasma  
http://whatis.techtarget.com/definition/0,,sid9_gci864603,00.html

[5] instruction 
http://whatis.techtarget.com/definition/0,,sid9_gci212356,00.html

____________________________________________________________________
:::::::::::::::::::  WHATIS.COM CONTACTS   :::::::::::::::::::

LOWELL THING, Site Editor ([EMAIL PROTECTED])
____________________________________________________________________

MARGARET ROUSE, Associate Editor ([EMAIL PROTECTED])
___________________________________________________________________
::::::::::::::::::::  ABOUT THIS NEWSLETTER   :::::::::::::::::::::

Published by TechTarget (http://www.techtarget.com)
 TechTarget - The Most Targeted IT Media
 Copyright 2002, All Rights Reserved.

If you would like to sponsor this or any TechTarget newsletter,
please contact Gabrielle DeRussy at [EMAIL PROTECTED]

Unsubscribe from 'Word of the Day'
 - Simply Reply to this Email with REMOVE within the Body or Subject
>  or
 - Go to: http://WhatIs.techtarget.com/register
 - Log in to edit your profile.
 - Click on the link to Edit email subscriptions.
 - Uncheck the box next to the newsletter you wish 
   to unsubscribe from.
 - When finished, click "Save Changes to My Profile."


Reply via email to