SlideShare una empresa de Scribd logo
1 de 69
e-Citizenship Learning Packets Slide 1
Cyberstalking
In this learning session, you
will discover strategies to
avoid cyberstalkers.
e-Citizenship Learning Packets Slide 2
Google Yourself
1 2 3 4 5 6 7 8 9 10 Next
See Mei Yuh
ALL IMAGES VIDEOS NEWS
Challenge!
e-Citizenship Learning Packets Slide 3
The challenge is for you to search the
Search
web for pieces of information
about yourself.
Google
e-Citizenship Learning Packets Slide 4
Launch an internet browser
on your computer.
e-Citizenship Learning Packets Slide 5
Settings
History
New private window
Turn on private browsing.
e-Citizenship Learning Packets Slide 6
Go to Google Web Search.
Type in:
www.google.com
e-Citizenship Learning Packets Slide 7
www.google.com
Search
Google
See Mei Yuh
Type the name you most often use online into
the search bar, and hit the search button.
e-Citizenship Learning Packets Slide 8
look for personal information and records
in the activity score sheet.
Go through the search results, and
of your online activities as listed
e-Citizenship Learning Packets Slide 9
Activity score sheet.
e-Citizenship Learning Packets Slide 10
beside every piece of personal
information that you find online.
Put a check on the box ( )
e-Citizenship Learning Packets Slide 11
4
5
3
Give yourself a score that
corresponds to the piece of
information you ticked off.
e-Citizenship Learning Packets Slide 12
Let’s start!
Search
Google
e-Citizenship Learning Packets Slide 13
Time’s up!
Search
Google
e-Citizenship Learning Packets Slide 14
4
5
3
12
Add your points to
get the total score.
e-Citizenship Learning Packets Slide 15e-Citizenship Learning Packets Slide 15
Analysis
e-Citizenship Learning Packets Slide 16
www.seameo-innotech.org
Challenge!
Google Yourself
ANALYSIS
What score did you get?
What do you think your score
implies?
e-Citizenship Learning Packets Slide 17
www.seameo-innotech.org
Challenge!
Google Yourself
ANALYSIS
Was it easy or difficult to look for
your personal details using
Google Web Search?
e-Citizenship Learning Packets Slide 18
www.seameo-innotech.org
Challenge!
Google Yourself
ANALYSIS
How do you feel about having
some of your personal information
publicly available online?
e-Citizenship Learning Packets Slide 19
www.seameo-innotech.org
Challenge!
Google Yourself
ANALYSIS
What do you think are the
dangers of having your personal
details available online?
e-Citizenship Learning Packets Slide 20
www.seameo-innotech.org
Challenge!
Google Yourself
ANALYSIS
With your personal information
available on the Internet, how
easy do you think would it be for a
stranger to get in touch with you?
e-Citizenship Learning Packets Slide 21
www.seameo-innotech.org
Challenge!
Google Yourself
ANALYSIS
How will it affect you if someone
persistently sends you unsolicited
messages and gives you
unwanted attention?
e-Citizenship Learning Packets Slide 22
www.seameo-innotech.org
Challenge!
Google Yourself
ANALYSIS
Have you ever come across a
suspicious character online? What
should you do if you think
someone is stalking you?
e-Citizenship Learning Packets Slide 23
www.seameo-innotech.org
Challenge!
Google Yourself
ANALYSIS
How can you avoid becoming a
cyberstalking victim?
e-Citizenship Learning Packets Slide 24
www.seameo-innotech.org
Challenge!
Google Yourself
ANALYSIS
Do your parents/guardians
monitor your online activities? If
they do, why do you think they do
such a thing and does it bother
you?
e-Citizenship Learning Packets Slide 25
www.seameo-innotech.org
Challenge!
Google Yourself
ANALYSIS
In what ways can you help your
friends, families, and relatives
protect themselves from
cyberstalking?
e-Citizenship Learning Packets Slide 26
What does your
score mean?
e-Citizenship Learning Packets Slide 27
Getting a low score (24 and
below) means…
• it may be more difficult for other people to get your
personal information and initiate contact with you;
and
• you are relatively safer from receiving unwanted
messages and attention.
e-Citizenship Learning Packets Slide 28
• other people may be able to easily access your
personal information and contact you.
TAKE STEPS IN ORDER TO TIGHTEN YOUR
PRIVACY AND SECURITY ON THE WEB.
Getting a high score (25 and
above) means…
e-Citizenship Learning Packets Slide 29
Time
Click on to play the video
Movie
Cyberstalking Statistics| – Search the Web
Let’s watch this!
e-Citizenship Learning Packets Slide 30e-Citizenship Learning Packets Slide 30
What is
cyberstalking?
e-Citizenship Learning Packets Slide 31e-Citizenship Learning Packets Slide 31
Cyberstalking
Cyberstalking refers to activities
where people repeatedly contact,
harass, and/or threaten others
online.
e-Citizenship Learning Packets Slide 32e-Citizenship Learning Packets Slide 32
Cyberstalking
Cyberstalking can happen in
social media, chat rooms, instant
messaging, email services, and
blogging sites, and it can occur
alongside stalking in the
conventional sense, which
happens in real life.
e-Citizenship Learning Packets Slide 33
Search
Examples of cyberstalking
www.seameo-innotech.org/mt4t
e-Citizenship Learning Packets Slide 34
Examples of cyberstalking
www.seameo-innotech.org/mt4t
Making unwanted contact by calling,
emailing, texting, messaging, or sending
offensive material
Sharing or threatening to share photos,
videos, personal information, or anything
that's humiliating or embarrassing
(Office of the eSafety Commissioner)
e-Citizenship Learning Packets Slide 35
Examples of cyberstalking
www.seameo-innotech.org/mt4t
Posting humiliating, abusive, or
[threatening] comments about
[someone] on social media
Accessing [someone’s] email or social
media accounts to find [ ] personal
information, read [ ] emails and
messages, or change [ ] passwords
(Office of the eSafety Commissioner)
e-Citizenship Learning Packets Slide 36
Examples of cyberstalking
www.seameo-innotech.org/mt4t
Impersonating [someone’s] online
identity in order to harm reputation or
relationships
Monitoring [someone’s] movements
using [global positioning system],
tracking apps, or spyware
(Office of the eSafety Commissioner)
e-Citizenship Learning Packets Slide 37
AnandK
.2016
...
Like Comment
www.seameo-innotech.org/mt4t
Common reasons
for cyberstalking
e-Citizenship Learning Packets Slide 38
AnandK
.2016
...
Like Comment
www.seameo-innotech.org/mt4t
Common reasons for cyberstalking
Gathering information to defame a person or an
organization out of prejudice
e-Citizenship Learning Packets Slide 39
AnandK
.2016
...
Like Comment
www.seameo-innotech.org/mt4t
Harassing an identified target in exchange for
money
Common reasons for cyberstalking
e-Citizenship Learning Packets Slide 40
AnandK
.2016
...
Like Comment
www.seameo-innotech.org/mt4t
Acting on personal hatred
Common reasons for cyberstalking
e-Citizenship Learning Packets Slide 41
AnandK
.2016
...
Like Comment
www.seameo-innotech.org/mt4t
Exacting revenge
Common reasons for cyberstalking
e-Citizenship Learning Packets Slide 42
AnandK
.2016
...
Like Comment
www.seameo-innotech.org/mt4t
Engaging in the act for fun
Common reasons for cyberstalking
e-Citizenship Learning Packets Slide 43
AnandK
.2016
...
Like Comment
www.seameo-innotech.org/mt4t
Ignorance (the stalker doesn’t know that he/
she is committing a crime)
Common reasons for cyberstalking
e-Citizenship Learning Packets Slide 44
PROTECT
YOURSELF FROM
CYBERSTALKING
e-Citizenship Learning Packets Slide 45e-Citizenship Learning Packets Slide 45
PROTECT
YOURSELF FROM
CYBERSTALKING
Never reveal home address/es online.
Password-protect all devices and online
accounts, and use secure passwords that
would be difficult for anyone to guess.
Regularly update your passwords.
Conduct an internet search using your name
and phone numbers to find out how much
information about you is publicly available
online.
How do you prevent being
cyberstalked?
(Moore, 2018)
e-Citizenship Learning Packets Slide 46e-Citizenship Learning Packets Slide 46
PROTECT
YOURSELF FROM
CYBERSTALKING
Be suspicious of any incoming email, phone
call, or message that asks for identifying
information.
Use web analytics* or other free registry
counters that will record all incoming traffic
to your online accounts (personal blogs and
websites included); that way, page visitors
are identified.
How do you prevent being
cyberstalked?
*Web analytics is the process of analyzing the behavior of
visitors to a Web site. (Rouse, n.d.)
(Moore, 2018)
e-Citizenship Learning Packets Slide 47e-Citizenship Learning Packets Slide 47
PROTECT
YOURSELF FROM
CYBERSTALKING
Ask an information technology (IT)
professional to check the security of the
computer devices you own, especially if
there are suspicions of being a target victim.
Take preventive measures right away when
you suspect that you are being cyberstalked.
Avoid inaction because you think you could
be overreacting or being paranoid; it’s
always best to err on the side of caution.
How do you prevent being
cyberstalked?
(Moore, 2018)
e-Citizenship Learning Packets Slide 48e-Citizenship Learning Packets Slide 48
PROTECT
YOURSELF FROM
CYBERSTALKING
Block the potential cyberstalker and record
incidents (date, time, and place).
Make it clear that the attention is unwanted.
Write once to the cyberstalker and document
it. Warn that further contact will result in a
police report.
Save copies of all communications. Take
screen-shots and back up evidence on a
Universal Serial Bus (USB) stick or an
external hard drive.
How do you respond to a
cyberstalking incident?
(Take Back The Tech, 2018)
e-Citizenship Learning Packets Slide 49e-Citizenship Learning Packets Slide 49
PROTECT
YOURSELF FROM
CYBERSTALKING
Report, block, or filter online
communications. Learn how to turn on
filtering and blocking capabilities of
messaging or email applications. Use built-in
reporting mechanisms.
Go to the authorities, and turn over pieces of
evidence. Having more evidence can help the
authorities resolve the case faster.
How do you respond to a
cyberstalking incident?
(Take Back The Tech, 2018)
e-Citizenship Learning Packets Slide 50e-Citizenship Learning Packets Slide 50
PROTECT
YOURSELF FROM
CYBERSTALKING
Get emotional support. Inform your family,
friends, and teachers about the incident of
cyberstalking.
Approach the authorities or the police to
clean up the damage if internet searches
reveal that the stalker published private
information.
How do you respond to a
cyberstalking incident?
(Take Back The Tech, 2018)
e-Citizenship Learning Packets Slide 51e-Citizenship Learning Packets Slide 51
REMEMBER
Cyberstalking refers to repeated
unwanted contact from someone on the
Internet. Often, this makes the victim
afraid or concerned about her or his
safety. In general, a cyberstalker’s
conduct induces fear and invades a
person’s right to privacy.
e-Citizenship Learning Packets Slide 52e-Citizenship Learning Packets Slide 52
REMEMBER
Reasons for cyberstalking include
gathering information that can be used
against a person or an organization,
harassing an identified target in
exchange for money, exacting revenge,
or simply cyberstalking someone for
fun. In some cases, people who
excessively stalk others online for fun
may not realize that what they’re doing
may be considered a crime.
e-Citizenship Learning Packets Slide 53e-Citizenship Learning Packets Slide 53
REMEMBER
Cyberstalking is a crime. Don’t be the
next victim. Inform your parents,
friends, teachers, and the authorities at
once about suspicious people you
encountered online.
Practice common sense and critical
thinking when interacting with other
people online. Remember not to give
away important personal information to
strangers. This includes your home
address, school, and phone number.
e-Citizenship Learning Packets Slide 54e-Citizenship Learning Packets Slide 54
REMEMBER
Learn about the privacy and security
features of the social networking and
blogging sites on which you have
existing accounts. This will allow you to
control the amount of information that
you share with people you actually
know and the general public. Doing so
will decrease your risk of being a target
of cyberstalkers.
e-Citizenship Learning Packets Slide 55e-Citizenship Learning Packets Slide 55
REMEMBER
When you find yourself in a
cyberstalking situation, immediately
seek help from friends, family, teachers,
and the authorities to resolve the issue.
Block the cyberstalker online at once,
and document all communications sent
to you and save copies for evidence.
More importantly, remain resilient and
exercise critical thinking as you deal
with the situation.
e-Citizenship Learning Packets Slide 56e-Citizenship Learning Packets Slide 56
REMEMBER
Exert conscious effort to be aware of
your online behavior to avoid
becoming an abuser yourself.
e-Citizenship Learning Packets Slide 57e-Citizenship Learning Packets Slide 57
Application
e-Citizenship Learning Packets Slide 58
APPLICATION
*** Check how strong
your password is at
www.passwordmeter.com
e-Citizenship Learning Packets Slide 59
APPLICATION
Set-up two factor
authentication on your
social media accounts
e-Citizenship Learning Packets Slide 60
APPLICATION
Watch these tutorial
videos to learn how!
Click on the social media
icons to access the videos
How to Enable 2 Step
Verification for Facebook
PC Shastra
2 Factor authentication for
Twitter
TwinBytes Inc
Google Authenticator App : Enable
Two-Step Verification in Gmail
Enam Alamin
e-Citizenship Learning Packets Slide 61
APPLICATION
Create an infographic
about cyberstalking
and some strategies to
safely deal with a
cyberstalking incident
e-Citizenship Learning Packets Slide 62e-Citizenship Learning Packets Slide 62
Assessment
e-Citizenship Learning Packets Slide 63
REFLECT
&
REVIEW
3 things you learned from
the lesson (1 minute)
2 questions still left hanging
in your mind (1 minute)
ASSESSMENT
e-Citizenship Learning Packets Slide 64
REFLECT
&
REVIEW
1 thing you promise to do to
remain safe from cyberstalkers
(1 minute)
1 personal commitment to share
what you learned with your
friends, families, and relatives to
help them protect themselves
from cyberstalking (1 minute)
ASSESSMENT
e-Citizenship Learning Packets Slide 65
References
Alexis A. Moore. (26 March 2018). 12 Crucial Tips to Protect Yourself from Cyberstalking.
Retrieved from the ThoughtCo. website: https://www.thoughtco.com/tips-to-protect-
yourself-from-cyberstalking-3534318.
AnandK. (23 May 2016). What is Cyberstalking? Examples, Prevention, Help. Retrieved from
The Windows Club website: https://www.thewindowsclub.com/cyberstalking-definition-
examples.
Commonwealth of Massachusetts. (2018). Cyber-stalking. Retrieved from the Mass.gov
website: http://www.mass.gov/ago/public-safety/cyber-crime-and-internet-safety/cyber-
crimes/cyber-stalking.html.
Cyberstalking [Def. 1]. (2018). In Merriam-Webster’s online dictionary. Retrieved from the
Merriam-Webster website: https://www.merriam-webster.com/legal/cyberstalking.
e-Citizenship Learning Packets Slide 66
References
Laura Riparbelli. (14 July 2011). 12-Year-Old Sentenced for Cyberstalking Classmate.
Retrieved from the ABC News website: https://abcnews.go.com/Technology/12-year-
sentenced-washington-cyberstalking-case/story?id=14072315.
Margaret Rouse. (n.d.). Two-Factor Authentication. Retrieved from The TechTarget website:
https://searchsecurity.techtarget.com/definition/two-factor-authentication.
Margaret Rouse. (n.d.). Web analytics. Retrieved from the TechTarget website:
https://searchcrm.techtarget.com/definition/Web-analytics.
Meg Barbor. (25 October 2017). Cyberstalking: 1 in 5 US Children Solicited for Sex Online.
Retrieved from the Medscape website: https://www.medscape.com/viewarticle/887592.
Office of the eSafety Commissioner. (n.d.). What is cyberstalking? Retrieved from the
Australia Government’s Office of the eSafety Commissioner’s website:
https://www.esafety.gov.au/women /take-control/cyberstalking/what-is-cyberstalking.
e-Citizenship Learning Packets Slide 67
References
Sameer Hinduja. (21 March 2018). Cyberstalking. Retrieved from the Cyberbullying Research
Center website: https://cyberbullying.org/cyberstalking.
Stalking [Def. 2]. (n.d.). In Urban Dictionary. Retrieved from the Urban Dictionary website:
https://www.urbandictionary.com/define.php?term=Stalking.
Take Back the Tech. (2018). Cyberstalking Strategies. Retrieved from the Take Back the Tech
website: https://www.takebackthetech.net/be-safe/cyberstalking-strategies.
Techopedia. (2019). Cyberstalking. Retrieved from the Techopedia website at
https://www.techopedia.com/definition/14326/cyberstalking.
The Lawyer Portal. (2018). Law Guides: Internet Trolling and Cyberbullying Law. Retrieved
from The Lawyer Portal website: https://www.thelawyerportal.com/2017/04/20/law-
guides-internet-trolling-cyberbullying-law/?cn-reloaded=1.
Working to Halt Online Abuse. (2013). 2013 Cyberstalking Statistics. Retrieved from the
WHOA website: http://www.haltabuse.org/resources/stats/2013Statistics.pdf.
e-Citizenship Learning Packets Slide 68
SEAMEO INNOTECH would like to acknowledge the
technical inputs of Bernadette Caraig in the
development of this learning packet.
All images used in this presentation are royalty-free
and are sourced from the following websites:
www.shutterstock.com
www.pixabay.com
www.pexels.com
www.unsplash.com
Icons are sourced from
www.thenounproject.com
Emojis are provided free by Emoji One at
www.emojione.com
This publication is licensed under Creative Commons
Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
(https://creativecommons.org/licences/by-nc-sa/4.0/)

Más contenido relacionado

La actualidad más candente

Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
sureshjogesh48
 

La actualidad más candente (20)

Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYING
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Digital Piracy
Digital PiracyDigital Piracy
Digital Piracy
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Spam
Spam Spam
Spam
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
امن المعلومات المحاضرة الخامسة
امن المعلومات المحاضرة الخامسةامن المعلومات المحاضرة الخامسة
امن المعلومات المحاضرة الخامسة
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 

Similar a Cyberstalking ppt 02.18.19

The Dark Side Of The Web
The Dark Side Of The WebThe Dark Side Of The Web
The Dark Side Of The Web
mshin
 
The Truth About Internet Safety
The Truth About Internet SafetyThe Truth About Internet Safety
The Truth About Internet Safety
Jessica Punke
 
ImageQuest_Newsletter_July_Milton copy
ImageQuest_Newsletter_July_Milton copyImageQuest_Newsletter_July_Milton copy
ImageQuest_Newsletter_July_Milton copy
Alisa Alvich
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
safetyseminar
 
MAKING ONE SELF SAFE IN THE CYBER WORLD.
MAKING ONE SELF SAFE IN THE CYBER WORLD.MAKING ONE SELF SAFE IN THE CYBER WORLD.
MAKING ONE SELF SAFE IN THE CYBER WORLD.
MaryConcepcion10
 
My Online Image
My Online ImageMy Online Image
My Online Image
aluthe
 

Similar a Cyberstalking ppt 02.18.19 (20)

Seric Security Meetup Aug slides19
Seric Security Meetup Aug slides19Seric Security Meetup Aug slides19
Seric Security Meetup Aug slides19
 
btNOG 9 Keynote Speech on Evolution of Social Engineering
btNOG 9 Keynote Speech on Evolution of Social EngineeringbtNOG 9 Keynote Speech on Evolution of Social Engineering
btNOG 9 Keynote Speech on Evolution of Social Engineering
 
Observations on Social Engineering presentation by Warren Finch for LkNOG 6
Observations on Social Engineering presentation by Warren Finch for LkNOG 6Observations on Social Engineering presentation by Warren Finch for LkNOG 6
Observations on Social Engineering presentation by Warren Finch for LkNOG 6
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
M13 presentation
M13 presentationM13 presentation
M13 presentation
 
The Dark Side Of The Web
The Dark Side Of The WebThe Dark Side Of The Web
The Dark Side Of The Web
 
M1 presentation2
M1 presentation2M1 presentation2
M1 presentation2
 
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
 
CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education Campaign
 
The Truth About Internet Safety
The Truth About Internet SafetyThe Truth About Internet Safety
The Truth About Internet Safety
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
ImageQuest_Newsletter_July_Milton copy
ImageQuest_Newsletter_July_Milton copyImageQuest_Newsletter_July_Milton copy
ImageQuest_Newsletter_July_Milton copy
 
Social Networking and Cyberbullying
Social Networking and CyberbullyingSocial Networking and Cyberbullying
Social Networking and Cyberbullying
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Cybersecurity and data privacy
Cybersecurity and data privacyCybersecurity and data privacy
Cybersecurity and data privacy
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
MAKING ONE SELF SAFE IN THE CYBER WORLD.
MAKING ONE SELF SAFE IN THE CYBER WORLD.MAKING ONE SELF SAFE IN THE CYBER WORLD.
MAKING ONE SELF SAFE IN THE CYBER WORLD.
 
My Online Image
My Online ImageMy Online Image
My Online Image
 

Más de Eddie San Peñalosa

Más de Eddie San Peñalosa (20)

AP Grade 10 Q1 Mod1
AP Grade 10 Q1 Mod1AP Grade 10 Q1 Mod1
AP Grade 10 Q1 Mod1
 
Ang mga Panahanang Pilipino
Ang mga Panahanang PilipinoAng mga Panahanang Pilipino
Ang mga Panahanang Pilipino
 
Daloy ng Ekonomiya
Daloy ng EkonomiyaDaloy ng Ekonomiya
Daloy ng Ekonomiya
 
Ang mga Tungkulin ng mga Pilipino
Ang mga Tungkulin ng mga PilipinoAng mga Tungkulin ng mga Pilipino
Ang mga Tungkulin ng mga Pilipino
 
Klasipikasyon ng mga Karapatan Ayon sa Konstitusyon
Klasipikasyon ng mga Karapatan Ayon sa KonstitusyonKlasipikasyon ng mga Karapatan Ayon sa Konstitusyon
Klasipikasyon ng mga Karapatan Ayon sa Konstitusyon
 
Mga Karapatan ng mga Pilipino
Mga Karapatan ng mga PilipinoMga Karapatan ng mga Pilipino
Mga Karapatan ng mga Pilipino
 
Ang Ibat Ibang Gawaing Pansibiko sa Pamayanan at Bansa
Ang Ibat Ibang Gawaing Pansibiko sa Pamayanan at BansaAng Ibat Ibang Gawaing Pansibiko sa Pamayanan at Bansa
Ang Ibat Ibang Gawaing Pansibiko sa Pamayanan at Bansa
 
Ang Kahulugan ng Sibiko at Pagkamamamayan
Ang Kahulugan ng Sibiko at PagkamamamayanAng Kahulugan ng Sibiko at Pagkamamamayan
Ang Kahulugan ng Sibiko at Pagkamamamayan
 
Changes in the Health Dimensions During Adolescence
Changes in the Health Dimensions During AdolescenceChanges in the Health Dimensions During Adolescence
Changes in the Health Dimensions During Adolescence
 
Mga Eksplorasyon
Mga EksplorasyonMga Eksplorasyon
Mga Eksplorasyon
 
Mga Dahilan ng mga Bansang Europeo sa Pagsasagawa ng Eksplorasyon
Mga Dahilan ng mga Bansang Europeo sa Pagsasagawa ng EksplorasyonMga Dahilan ng mga Bansang Europeo sa Pagsasagawa ng Eksplorasyon
Mga Dahilan ng mga Bansang Europeo sa Pagsasagawa ng Eksplorasyon
 
Ang Kontra Repormasyon
Ang Kontra RepormasyonAng Kontra Repormasyon
Ang Kontra Repormasyon
 
Protestantismo
ProtestantismoProtestantismo
Protestantismo
 
Ang Panahon ng Repormasyon
Ang Panahon ng RepormasyonAng Panahon ng Repormasyon
Ang Panahon ng Repormasyon
 
Pagsibol ng mga Larangan ng Renaissance
Pagsibol ng mga Larangan ng RenaissancePagsibol ng mga Larangan ng Renaissance
Pagsibol ng mga Larangan ng Renaissance
 
Ang Kilusang Humanismo at mga Humanista
Ang Kilusang Humanismo at mga HumanistaAng Kilusang Humanismo at mga Humanista
Ang Kilusang Humanismo at mga Humanista
 
Ang Pagsibol ng Renaissance
Ang Pagsibol ng RenaissanceAng Pagsibol ng Renaissance
Ang Pagsibol ng Renaissance
 
Relihiyong Zoroastrianismo
Relihiyong ZoroastrianismoRelihiyong Zoroastrianismo
Relihiyong Zoroastrianismo
 
Relihiyong Kristiyanismo
Relihiyong KristiyanismoRelihiyong Kristiyanismo
Relihiyong Kristiyanismo
 
Relihiyong Islam
Relihiyong IslamRelihiyong Islam
Relihiyong Islam
 

Último

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Último (20)

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 

Cyberstalking ppt 02.18.19

  • 1. e-Citizenship Learning Packets Slide 1 Cyberstalking In this learning session, you will discover strategies to avoid cyberstalkers.
  • 2. e-Citizenship Learning Packets Slide 2 Google Yourself 1 2 3 4 5 6 7 8 9 10 Next See Mei Yuh ALL IMAGES VIDEOS NEWS Challenge!
  • 3. e-Citizenship Learning Packets Slide 3 The challenge is for you to search the Search web for pieces of information about yourself. Google
  • 4. e-Citizenship Learning Packets Slide 4 Launch an internet browser on your computer.
  • 5. e-Citizenship Learning Packets Slide 5 Settings History New private window Turn on private browsing.
  • 6. e-Citizenship Learning Packets Slide 6 Go to Google Web Search. Type in: www.google.com
  • 7. e-Citizenship Learning Packets Slide 7 www.google.com Search Google See Mei Yuh Type the name you most often use online into the search bar, and hit the search button.
  • 8. e-Citizenship Learning Packets Slide 8 look for personal information and records in the activity score sheet. Go through the search results, and of your online activities as listed
  • 9. e-Citizenship Learning Packets Slide 9 Activity score sheet.
  • 10. e-Citizenship Learning Packets Slide 10 beside every piece of personal information that you find online. Put a check on the box ( )
  • 11. e-Citizenship Learning Packets Slide 11 4 5 3 Give yourself a score that corresponds to the piece of information you ticked off.
  • 12. e-Citizenship Learning Packets Slide 12 Let’s start! Search Google
  • 13. e-Citizenship Learning Packets Slide 13 Time’s up! Search Google
  • 14. e-Citizenship Learning Packets Slide 14 4 5 3 12 Add your points to get the total score.
  • 15. e-Citizenship Learning Packets Slide 15e-Citizenship Learning Packets Slide 15 Analysis
  • 16. e-Citizenship Learning Packets Slide 16 www.seameo-innotech.org Challenge! Google Yourself ANALYSIS What score did you get? What do you think your score implies?
  • 17. e-Citizenship Learning Packets Slide 17 www.seameo-innotech.org Challenge! Google Yourself ANALYSIS Was it easy or difficult to look for your personal details using Google Web Search?
  • 18. e-Citizenship Learning Packets Slide 18 www.seameo-innotech.org Challenge! Google Yourself ANALYSIS How do you feel about having some of your personal information publicly available online?
  • 19. e-Citizenship Learning Packets Slide 19 www.seameo-innotech.org Challenge! Google Yourself ANALYSIS What do you think are the dangers of having your personal details available online?
  • 20. e-Citizenship Learning Packets Slide 20 www.seameo-innotech.org Challenge! Google Yourself ANALYSIS With your personal information available on the Internet, how easy do you think would it be for a stranger to get in touch with you?
  • 21. e-Citizenship Learning Packets Slide 21 www.seameo-innotech.org Challenge! Google Yourself ANALYSIS How will it affect you if someone persistently sends you unsolicited messages and gives you unwanted attention?
  • 22. e-Citizenship Learning Packets Slide 22 www.seameo-innotech.org Challenge! Google Yourself ANALYSIS Have you ever come across a suspicious character online? What should you do if you think someone is stalking you?
  • 23. e-Citizenship Learning Packets Slide 23 www.seameo-innotech.org Challenge! Google Yourself ANALYSIS How can you avoid becoming a cyberstalking victim?
  • 24. e-Citizenship Learning Packets Slide 24 www.seameo-innotech.org Challenge! Google Yourself ANALYSIS Do your parents/guardians monitor your online activities? If they do, why do you think they do such a thing and does it bother you?
  • 25. e-Citizenship Learning Packets Slide 25 www.seameo-innotech.org Challenge! Google Yourself ANALYSIS In what ways can you help your friends, families, and relatives protect themselves from cyberstalking?
  • 26. e-Citizenship Learning Packets Slide 26 What does your score mean?
  • 27. e-Citizenship Learning Packets Slide 27 Getting a low score (24 and below) means… • it may be more difficult for other people to get your personal information and initiate contact with you; and • you are relatively safer from receiving unwanted messages and attention.
  • 28. e-Citizenship Learning Packets Slide 28 • other people may be able to easily access your personal information and contact you. TAKE STEPS IN ORDER TO TIGHTEN YOUR PRIVACY AND SECURITY ON THE WEB. Getting a high score (25 and above) means…
  • 29. e-Citizenship Learning Packets Slide 29 Time Click on to play the video Movie Cyberstalking Statistics| – Search the Web Let’s watch this!
  • 30. e-Citizenship Learning Packets Slide 30e-Citizenship Learning Packets Slide 30 What is cyberstalking?
  • 31. e-Citizenship Learning Packets Slide 31e-Citizenship Learning Packets Slide 31 Cyberstalking Cyberstalking refers to activities where people repeatedly contact, harass, and/or threaten others online.
  • 32. e-Citizenship Learning Packets Slide 32e-Citizenship Learning Packets Slide 32 Cyberstalking Cyberstalking can happen in social media, chat rooms, instant messaging, email services, and blogging sites, and it can occur alongside stalking in the conventional sense, which happens in real life.
  • 33. e-Citizenship Learning Packets Slide 33 Search Examples of cyberstalking www.seameo-innotech.org/mt4t
  • 34. e-Citizenship Learning Packets Slide 34 Examples of cyberstalking www.seameo-innotech.org/mt4t Making unwanted contact by calling, emailing, texting, messaging, or sending offensive material Sharing or threatening to share photos, videos, personal information, or anything that's humiliating or embarrassing (Office of the eSafety Commissioner)
  • 35. e-Citizenship Learning Packets Slide 35 Examples of cyberstalking www.seameo-innotech.org/mt4t Posting humiliating, abusive, or [threatening] comments about [someone] on social media Accessing [someone’s] email or social media accounts to find [ ] personal information, read [ ] emails and messages, or change [ ] passwords (Office of the eSafety Commissioner)
  • 36. e-Citizenship Learning Packets Slide 36 Examples of cyberstalking www.seameo-innotech.org/mt4t Impersonating [someone’s] online identity in order to harm reputation or relationships Monitoring [someone’s] movements using [global positioning system], tracking apps, or spyware (Office of the eSafety Commissioner)
  • 37. e-Citizenship Learning Packets Slide 37 AnandK .2016 ... Like Comment www.seameo-innotech.org/mt4t Common reasons for cyberstalking
  • 38. e-Citizenship Learning Packets Slide 38 AnandK .2016 ... Like Comment www.seameo-innotech.org/mt4t Common reasons for cyberstalking Gathering information to defame a person or an organization out of prejudice
  • 39. e-Citizenship Learning Packets Slide 39 AnandK .2016 ... Like Comment www.seameo-innotech.org/mt4t Harassing an identified target in exchange for money Common reasons for cyberstalking
  • 40. e-Citizenship Learning Packets Slide 40 AnandK .2016 ... Like Comment www.seameo-innotech.org/mt4t Acting on personal hatred Common reasons for cyberstalking
  • 41. e-Citizenship Learning Packets Slide 41 AnandK .2016 ... Like Comment www.seameo-innotech.org/mt4t Exacting revenge Common reasons for cyberstalking
  • 42. e-Citizenship Learning Packets Slide 42 AnandK .2016 ... Like Comment www.seameo-innotech.org/mt4t Engaging in the act for fun Common reasons for cyberstalking
  • 43. e-Citizenship Learning Packets Slide 43 AnandK .2016 ... Like Comment www.seameo-innotech.org/mt4t Ignorance (the stalker doesn’t know that he/ she is committing a crime) Common reasons for cyberstalking
  • 44. e-Citizenship Learning Packets Slide 44 PROTECT YOURSELF FROM CYBERSTALKING
  • 45. e-Citizenship Learning Packets Slide 45e-Citizenship Learning Packets Slide 45 PROTECT YOURSELF FROM CYBERSTALKING Never reveal home address/es online. Password-protect all devices and online accounts, and use secure passwords that would be difficult for anyone to guess. Regularly update your passwords. Conduct an internet search using your name and phone numbers to find out how much information about you is publicly available online. How do you prevent being cyberstalked? (Moore, 2018)
  • 46. e-Citizenship Learning Packets Slide 46e-Citizenship Learning Packets Slide 46 PROTECT YOURSELF FROM CYBERSTALKING Be suspicious of any incoming email, phone call, or message that asks for identifying information. Use web analytics* or other free registry counters that will record all incoming traffic to your online accounts (personal blogs and websites included); that way, page visitors are identified. How do you prevent being cyberstalked? *Web analytics is the process of analyzing the behavior of visitors to a Web site. (Rouse, n.d.) (Moore, 2018)
  • 47. e-Citizenship Learning Packets Slide 47e-Citizenship Learning Packets Slide 47 PROTECT YOURSELF FROM CYBERSTALKING Ask an information technology (IT) professional to check the security of the computer devices you own, especially if there are suspicions of being a target victim. Take preventive measures right away when you suspect that you are being cyberstalked. Avoid inaction because you think you could be overreacting or being paranoid; it’s always best to err on the side of caution. How do you prevent being cyberstalked? (Moore, 2018)
  • 48. e-Citizenship Learning Packets Slide 48e-Citizenship Learning Packets Slide 48 PROTECT YOURSELF FROM CYBERSTALKING Block the potential cyberstalker and record incidents (date, time, and place). Make it clear that the attention is unwanted. Write once to the cyberstalker and document it. Warn that further contact will result in a police report. Save copies of all communications. Take screen-shots and back up evidence on a Universal Serial Bus (USB) stick or an external hard drive. How do you respond to a cyberstalking incident? (Take Back The Tech, 2018)
  • 49. e-Citizenship Learning Packets Slide 49e-Citizenship Learning Packets Slide 49 PROTECT YOURSELF FROM CYBERSTALKING Report, block, or filter online communications. Learn how to turn on filtering and blocking capabilities of messaging or email applications. Use built-in reporting mechanisms. Go to the authorities, and turn over pieces of evidence. Having more evidence can help the authorities resolve the case faster. How do you respond to a cyberstalking incident? (Take Back The Tech, 2018)
  • 50. e-Citizenship Learning Packets Slide 50e-Citizenship Learning Packets Slide 50 PROTECT YOURSELF FROM CYBERSTALKING Get emotional support. Inform your family, friends, and teachers about the incident of cyberstalking. Approach the authorities or the police to clean up the damage if internet searches reveal that the stalker published private information. How do you respond to a cyberstalking incident? (Take Back The Tech, 2018)
  • 51. e-Citizenship Learning Packets Slide 51e-Citizenship Learning Packets Slide 51 REMEMBER Cyberstalking refers to repeated unwanted contact from someone on the Internet. Often, this makes the victim afraid or concerned about her or his safety. In general, a cyberstalker’s conduct induces fear and invades a person’s right to privacy.
  • 52. e-Citizenship Learning Packets Slide 52e-Citizenship Learning Packets Slide 52 REMEMBER Reasons for cyberstalking include gathering information that can be used against a person or an organization, harassing an identified target in exchange for money, exacting revenge, or simply cyberstalking someone for fun. In some cases, people who excessively stalk others online for fun may not realize that what they’re doing may be considered a crime.
  • 53. e-Citizenship Learning Packets Slide 53e-Citizenship Learning Packets Slide 53 REMEMBER Cyberstalking is a crime. Don’t be the next victim. Inform your parents, friends, teachers, and the authorities at once about suspicious people you encountered online. Practice common sense and critical thinking when interacting with other people online. Remember not to give away important personal information to strangers. This includes your home address, school, and phone number.
  • 54. e-Citizenship Learning Packets Slide 54e-Citizenship Learning Packets Slide 54 REMEMBER Learn about the privacy and security features of the social networking and blogging sites on which you have existing accounts. This will allow you to control the amount of information that you share with people you actually know and the general public. Doing so will decrease your risk of being a target of cyberstalkers.
  • 55. e-Citizenship Learning Packets Slide 55e-Citizenship Learning Packets Slide 55 REMEMBER When you find yourself in a cyberstalking situation, immediately seek help from friends, family, teachers, and the authorities to resolve the issue. Block the cyberstalker online at once, and document all communications sent to you and save copies for evidence. More importantly, remain resilient and exercise critical thinking as you deal with the situation.
  • 56. e-Citizenship Learning Packets Slide 56e-Citizenship Learning Packets Slide 56 REMEMBER Exert conscious effort to be aware of your online behavior to avoid becoming an abuser yourself.
  • 57. e-Citizenship Learning Packets Slide 57e-Citizenship Learning Packets Slide 57 Application
  • 58. e-Citizenship Learning Packets Slide 58 APPLICATION *** Check how strong your password is at www.passwordmeter.com
  • 59. e-Citizenship Learning Packets Slide 59 APPLICATION Set-up two factor authentication on your social media accounts
  • 60. e-Citizenship Learning Packets Slide 60 APPLICATION Watch these tutorial videos to learn how! Click on the social media icons to access the videos How to Enable 2 Step Verification for Facebook PC Shastra 2 Factor authentication for Twitter TwinBytes Inc Google Authenticator App : Enable Two-Step Verification in Gmail Enam Alamin
  • 61. e-Citizenship Learning Packets Slide 61 APPLICATION Create an infographic about cyberstalking and some strategies to safely deal with a cyberstalking incident
  • 62. e-Citizenship Learning Packets Slide 62e-Citizenship Learning Packets Slide 62 Assessment
  • 63. e-Citizenship Learning Packets Slide 63 REFLECT & REVIEW 3 things you learned from the lesson (1 minute) 2 questions still left hanging in your mind (1 minute) ASSESSMENT
  • 64. e-Citizenship Learning Packets Slide 64 REFLECT & REVIEW 1 thing you promise to do to remain safe from cyberstalkers (1 minute) 1 personal commitment to share what you learned with your friends, families, and relatives to help them protect themselves from cyberstalking (1 minute) ASSESSMENT
  • 65. e-Citizenship Learning Packets Slide 65 References Alexis A. Moore. (26 March 2018). 12 Crucial Tips to Protect Yourself from Cyberstalking. Retrieved from the ThoughtCo. website: https://www.thoughtco.com/tips-to-protect- yourself-from-cyberstalking-3534318. AnandK. (23 May 2016). What is Cyberstalking? Examples, Prevention, Help. Retrieved from The Windows Club website: https://www.thewindowsclub.com/cyberstalking-definition- examples. Commonwealth of Massachusetts. (2018). Cyber-stalking. Retrieved from the Mass.gov website: http://www.mass.gov/ago/public-safety/cyber-crime-and-internet-safety/cyber- crimes/cyber-stalking.html. Cyberstalking [Def. 1]. (2018). In Merriam-Webster’s online dictionary. Retrieved from the Merriam-Webster website: https://www.merriam-webster.com/legal/cyberstalking.
  • 66. e-Citizenship Learning Packets Slide 66 References Laura Riparbelli. (14 July 2011). 12-Year-Old Sentenced for Cyberstalking Classmate. Retrieved from the ABC News website: https://abcnews.go.com/Technology/12-year- sentenced-washington-cyberstalking-case/story?id=14072315. Margaret Rouse. (n.d.). Two-Factor Authentication. Retrieved from The TechTarget website: https://searchsecurity.techtarget.com/definition/two-factor-authentication. Margaret Rouse. (n.d.). Web analytics. Retrieved from the TechTarget website: https://searchcrm.techtarget.com/definition/Web-analytics. Meg Barbor. (25 October 2017). Cyberstalking: 1 in 5 US Children Solicited for Sex Online. Retrieved from the Medscape website: https://www.medscape.com/viewarticle/887592. Office of the eSafety Commissioner. (n.d.). What is cyberstalking? Retrieved from the Australia Government’s Office of the eSafety Commissioner’s website: https://www.esafety.gov.au/women /take-control/cyberstalking/what-is-cyberstalking.
  • 67. e-Citizenship Learning Packets Slide 67 References Sameer Hinduja. (21 March 2018). Cyberstalking. Retrieved from the Cyberbullying Research Center website: https://cyberbullying.org/cyberstalking. Stalking [Def. 2]. (n.d.). In Urban Dictionary. Retrieved from the Urban Dictionary website: https://www.urbandictionary.com/define.php?term=Stalking. Take Back the Tech. (2018). Cyberstalking Strategies. Retrieved from the Take Back the Tech website: https://www.takebackthetech.net/be-safe/cyberstalking-strategies. Techopedia. (2019). Cyberstalking. Retrieved from the Techopedia website at https://www.techopedia.com/definition/14326/cyberstalking. The Lawyer Portal. (2018). Law Guides: Internet Trolling and Cyberbullying Law. Retrieved from The Lawyer Portal website: https://www.thelawyerportal.com/2017/04/20/law- guides-internet-trolling-cyberbullying-law/?cn-reloaded=1. Working to Halt Online Abuse. (2013). 2013 Cyberstalking Statistics. Retrieved from the WHOA website: http://www.haltabuse.org/resources/stats/2013Statistics.pdf.
  • 68. e-Citizenship Learning Packets Slide 68 SEAMEO INNOTECH would like to acknowledge the technical inputs of Bernadette Caraig in the development of this learning packet. All images used in this presentation are royalty-free and are sourced from the following websites: www.shutterstock.com www.pixabay.com www.pexels.com www.unsplash.com Icons are sourced from www.thenounproject.com Emojis are provided free by Emoji One at www.emojione.com
  • 69. This publication is licensed under Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0). (https://creativecommons.org/licences/by-nc-sa/4.0/)