7. e-Citizenship Learning Packets Slide 7
www.google.com
Search
Google
See Mei Yuh
Type the name you most often use online into
the search bar, and hit the search button.
8. e-Citizenship Learning Packets Slide 8
look for personal information and records
in the activity score sheet.
Go through the search results, and
of your online activities as listed
16. e-Citizenship Learning Packets Slide 16
www.seameo-innotech.org
Challenge!
Google Yourself
ANALYSIS
What score did you get?
What do you think your score
implies?
17. e-Citizenship Learning Packets Slide 17
www.seameo-innotech.org
Challenge!
Google Yourself
ANALYSIS
Was it easy or difficult to look for
your personal details using
Google Web Search?
18. e-Citizenship Learning Packets Slide 18
www.seameo-innotech.org
Challenge!
Google Yourself
ANALYSIS
How do you feel about having
some of your personal information
publicly available online?
19. e-Citizenship Learning Packets Slide 19
www.seameo-innotech.org
Challenge!
Google Yourself
ANALYSIS
What do you think are the
dangers of having your personal
details available online?
20. e-Citizenship Learning Packets Slide 20
www.seameo-innotech.org
Challenge!
Google Yourself
ANALYSIS
With your personal information
available on the Internet, how
easy do you think would it be for a
stranger to get in touch with you?
21. e-Citizenship Learning Packets Slide 21
www.seameo-innotech.org
Challenge!
Google Yourself
ANALYSIS
How will it affect you if someone
persistently sends you unsolicited
messages and gives you
unwanted attention?
22. e-Citizenship Learning Packets Slide 22
www.seameo-innotech.org
Challenge!
Google Yourself
ANALYSIS
Have you ever come across a
suspicious character online? What
should you do if you think
someone is stalking you?
23. e-Citizenship Learning Packets Slide 23
www.seameo-innotech.org
Challenge!
Google Yourself
ANALYSIS
How can you avoid becoming a
cyberstalking victim?
24. e-Citizenship Learning Packets Slide 24
www.seameo-innotech.org
Challenge!
Google Yourself
ANALYSIS
Do your parents/guardians
monitor your online activities? If
they do, why do you think they do
such a thing and does it bother
you?
25. e-Citizenship Learning Packets Slide 25
www.seameo-innotech.org
Challenge!
Google Yourself
ANALYSIS
In what ways can you help your
friends, families, and relatives
protect themselves from
cyberstalking?
27. e-Citizenship Learning Packets Slide 27
Getting a low score (24 and
below) means…
• it may be more difficult for other people to get your
personal information and initiate contact with you;
and
• you are relatively safer from receiving unwanted
messages and attention.
28. e-Citizenship Learning Packets Slide 28
• other people may be able to easily access your
personal information and contact you.
TAKE STEPS IN ORDER TO TIGHTEN YOUR
PRIVACY AND SECURITY ON THE WEB.
Getting a high score (25 and
above) means…
29. e-Citizenship Learning Packets Slide 29
Time
Click on to play the video
Movie
Cyberstalking Statistics| – Search the Web
Let’s watch this!
31. e-Citizenship Learning Packets Slide 31e-Citizenship Learning Packets Slide 31
Cyberstalking
Cyberstalking refers to activities
where people repeatedly contact,
harass, and/or threaten others
online.
32. e-Citizenship Learning Packets Slide 32e-Citizenship Learning Packets Slide 32
Cyberstalking
Cyberstalking can happen in
social media, chat rooms, instant
messaging, email services, and
blogging sites, and it can occur
alongside stalking in the
conventional sense, which
happens in real life.
34. e-Citizenship Learning Packets Slide 34
Examples of cyberstalking
www.seameo-innotech.org/mt4t
Making unwanted contact by calling,
emailing, texting, messaging, or sending
offensive material
Sharing or threatening to share photos,
videos, personal information, or anything
that's humiliating or embarrassing
(Office of the eSafety Commissioner)
35. e-Citizenship Learning Packets Slide 35
Examples of cyberstalking
www.seameo-innotech.org/mt4t
Posting humiliating, abusive, or
[threatening] comments about
[someone] on social media
Accessing [someone’s] email or social
media accounts to find [ ] personal
information, read [ ] emails and
messages, or change [ ] passwords
(Office of the eSafety Commissioner)
36. e-Citizenship Learning Packets Slide 36
Examples of cyberstalking
www.seameo-innotech.org/mt4t
Impersonating [someone’s] online
identity in order to harm reputation or
relationships
Monitoring [someone’s] movements
using [global positioning system],
tracking apps, or spyware
(Office of the eSafety Commissioner)
37. e-Citizenship Learning Packets Slide 37
AnandK
.2016
...
Like Comment
www.seameo-innotech.org/mt4t
Common reasons
for cyberstalking
38. e-Citizenship Learning Packets Slide 38
AnandK
.2016
...
Like Comment
www.seameo-innotech.org/mt4t
Common reasons for cyberstalking
Gathering information to defame a person or an
organization out of prejudice
39. e-Citizenship Learning Packets Slide 39
AnandK
.2016
...
Like Comment
www.seameo-innotech.org/mt4t
Harassing an identified target in exchange for
money
Common reasons for cyberstalking
40. e-Citizenship Learning Packets Slide 40
AnandK
.2016
...
Like Comment
www.seameo-innotech.org/mt4t
Acting on personal hatred
Common reasons for cyberstalking
41. e-Citizenship Learning Packets Slide 41
AnandK
.2016
...
Like Comment
www.seameo-innotech.org/mt4t
Exacting revenge
Common reasons for cyberstalking
42. e-Citizenship Learning Packets Slide 42
AnandK
.2016
...
Like Comment
www.seameo-innotech.org/mt4t
Engaging in the act for fun
Common reasons for cyberstalking
43. e-Citizenship Learning Packets Slide 43
AnandK
.2016
...
Like Comment
www.seameo-innotech.org/mt4t
Ignorance (the stalker doesn’t know that he/
she is committing a crime)
Common reasons for cyberstalking
45. e-Citizenship Learning Packets Slide 45e-Citizenship Learning Packets Slide 45
PROTECT
YOURSELF FROM
CYBERSTALKING
Never reveal home address/es online.
Password-protect all devices and online
accounts, and use secure passwords that
would be difficult for anyone to guess.
Regularly update your passwords.
Conduct an internet search using your name
and phone numbers to find out how much
information about you is publicly available
online.
How do you prevent being
cyberstalked?
(Moore, 2018)
46. e-Citizenship Learning Packets Slide 46e-Citizenship Learning Packets Slide 46
PROTECT
YOURSELF FROM
CYBERSTALKING
Be suspicious of any incoming email, phone
call, or message that asks for identifying
information.
Use web analytics* or other free registry
counters that will record all incoming traffic
to your online accounts (personal blogs and
websites included); that way, page visitors
are identified.
How do you prevent being
cyberstalked?
*Web analytics is the process of analyzing the behavior of
visitors to a Web site. (Rouse, n.d.)
(Moore, 2018)
47. e-Citizenship Learning Packets Slide 47e-Citizenship Learning Packets Slide 47
PROTECT
YOURSELF FROM
CYBERSTALKING
Ask an information technology (IT)
professional to check the security of the
computer devices you own, especially if
there are suspicions of being a target victim.
Take preventive measures right away when
you suspect that you are being cyberstalked.
Avoid inaction because you think you could
be overreacting or being paranoid; it’s
always best to err on the side of caution.
How do you prevent being
cyberstalked?
(Moore, 2018)
48. e-Citizenship Learning Packets Slide 48e-Citizenship Learning Packets Slide 48
PROTECT
YOURSELF FROM
CYBERSTALKING
Block the potential cyberstalker and record
incidents (date, time, and place).
Make it clear that the attention is unwanted.
Write once to the cyberstalker and document
it. Warn that further contact will result in a
police report.
Save copies of all communications. Take
screen-shots and back up evidence on a
Universal Serial Bus (USB) stick or an
external hard drive.
How do you respond to a
cyberstalking incident?
(Take Back The Tech, 2018)
49. e-Citizenship Learning Packets Slide 49e-Citizenship Learning Packets Slide 49
PROTECT
YOURSELF FROM
CYBERSTALKING
Report, block, or filter online
communications. Learn how to turn on
filtering and blocking capabilities of
messaging or email applications. Use built-in
reporting mechanisms.
Go to the authorities, and turn over pieces of
evidence. Having more evidence can help the
authorities resolve the case faster.
How do you respond to a
cyberstalking incident?
(Take Back The Tech, 2018)
50. e-Citizenship Learning Packets Slide 50e-Citizenship Learning Packets Slide 50
PROTECT
YOURSELF FROM
CYBERSTALKING
Get emotional support. Inform your family,
friends, and teachers about the incident of
cyberstalking.
Approach the authorities or the police to
clean up the damage if internet searches
reveal that the stalker published private
information.
How do you respond to a
cyberstalking incident?
(Take Back The Tech, 2018)
51. e-Citizenship Learning Packets Slide 51e-Citizenship Learning Packets Slide 51
REMEMBER
Cyberstalking refers to repeated
unwanted contact from someone on the
Internet. Often, this makes the victim
afraid or concerned about her or his
safety. In general, a cyberstalker’s
conduct induces fear and invades a
person’s right to privacy.
52. e-Citizenship Learning Packets Slide 52e-Citizenship Learning Packets Slide 52
REMEMBER
Reasons for cyberstalking include
gathering information that can be used
against a person or an organization,
harassing an identified target in
exchange for money, exacting revenge,
or simply cyberstalking someone for
fun. In some cases, people who
excessively stalk others online for fun
may not realize that what they’re doing
may be considered a crime.
53. e-Citizenship Learning Packets Slide 53e-Citizenship Learning Packets Slide 53
REMEMBER
Cyberstalking is a crime. Don’t be the
next victim. Inform your parents,
friends, teachers, and the authorities at
once about suspicious people you
encountered online.
Practice common sense and critical
thinking when interacting with other
people online. Remember not to give
away important personal information to
strangers. This includes your home
address, school, and phone number.
54. e-Citizenship Learning Packets Slide 54e-Citizenship Learning Packets Slide 54
REMEMBER
Learn about the privacy and security
features of the social networking and
blogging sites on which you have
existing accounts. This will allow you to
control the amount of information that
you share with people you actually
know and the general public. Doing so
will decrease your risk of being a target
of cyberstalkers.
55. e-Citizenship Learning Packets Slide 55e-Citizenship Learning Packets Slide 55
REMEMBER
When you find yourself in a
cyberstalking situation, immediately
seek help from friends, family, teachers,
and the authorities to resolve the issue.
Block the cyberstalker online at once,
and document all communications sent
to you and save copies for evidence.
More importantly, remain resilient and
exercise critical thinking as you deal
with the situation.
56. e-Citizenship Learning Packets Slide 56e-Citizenship Learning Packets Slide 56
REMEMBER
Exert conscious effort to be aware of
your online behavior to avoid
becoming an abuser yourself.
60. e-Citizenship Learning Packets Slide 60
APPLICATION
Watch these tutorial
videos to learn how!
Click on the social media
icons to access the videos
How to Enable 2 Step
Verification for Facebook
PC Shastra
2 Factor authentication for
Twitter
TwinBytes Inc
Google Authenticator App : Enable
Two-Step Verification in Gmail
Enam Alamin
61. e-Citizenship Learning Packets Slide 61
APPLICATION
Create an infographic
about cyberstalking
and some strategies to
safely deal with a
cyberstalking incident
63. e-Citizenship Learning Packets Slide 63
REFLECT
&
REVIEW
3 things you learned from
the lesson (1 minute)
2 questions still left hanging
in your mind (1 minute)
ASSESSMENT
64. e-Citizenship Learning Packets Slide 64
REFLECT
&
REVIEW
1 thing you promise to do to
remain safe from cyberstalkers
(1 minute)
1 personal commitment to share
what you learned with your
friends, families, and relatives to
help them protect themselves
from cyberstalking (1 minute)
ASSESSMENT
65. e-Citizenship Learning Packets Slide 65
References
Alexis A. Moore. (26 March 2018). 12 Crucial Tips to Protect Yourself from Cyberstalking.
Retrieved from the ThoughtCo. website: https://www.thoughtco.com/tips-to-protect-
yourself-from-cyberstalking-3534318.
AnandK. (23 May 2016). What is Cyberstalking? Examples, Prevention, Help. Retrieved from
The Windows Club website: https://www.thewindowsclub.com/cyberstalking-definition-
examples.
Commonwealth of Massachusetts. (2018). Cyber-stalking. Retrieved from the Mass.gov
website: http://www.mass.gov/ago/public-safety/cyber-crime-and-internet-safety/cyber-
crimes/cyber-stalking.html.
Cyberstalking [Def. 1]. (2018). In Merriam-Webster’s online dictionary. Retrieved from the
Merriam-Webster website: https://www.merriam-webster.com/legal/cyberstalking.
66. e-Citizenship Learning Packets Slide 66
References
Laura Riparbelli. (14 July 2011). 12-Year-Old Sentenced for Cyberstalking Classmate.
Retrieved from the ABC News website: https://abcnews.go.com/Technology/12-year-
sentenced-washington-cyberstalking-case/story?id=14072315.
Margaret Rouse. (n.d.). Two-Factor Authentication. Retrieved from The TechTarget website:
https://searchsecurity.techtarget.com/definition/two-factor-authentication.
Margaret Rouse. (n.d.). Web analytics. Retrieved from the TechTarget website:
https://searchcrm.techtarget.com/definition/Web-analytics.
Meg Barbor. (25 October 2017). Cyberstalking: 1 in 5 US Children Solicited for Sex Online.
Retrieved from the Medscape website: https://www.medscape.com/viewarticle/887592.
Office of the eSafety Commissioner. (n.d.). What is cyberstalking? Retrieved from the
Australia Government’s Office of the eSafety Commissioner’s website:
https://www.esafety.gov.au/women /take-control/cyberstalking/what-is-cyberstalking.
67. e-Citizenship Learning Packets Slide 67
References
Sameer Hinduja. (21 March 2018). Cyberstalking. Retrieved from the Cyberbullying Research
Center website: https://cyberbullying.org/cyberstalking.
Stalking [Def. 2]. (n.d.). In Urban Dictionary. Retrieved from the Urban Dictionary website:
https://www.urbandictionary.com/define.php?term=Stalking.
Take Back the Tech. (2018). Cyberstalking Strategies. Retrieved from the Take Back the Tech
website: https://www.takebackthetech.net/be-safe/cyberstalking-strategies.
Techopedia. (2019). Cyberstalking. Retrieved from the Techopedia website at
https://www.techopedia.com/definition/14326/cyberstalking.
The Lawyer Portal. (2018). Law Guides: Internet Trolling and Cyberbullying Law. Retrieved
from The Lawyer Portal website: https://www.thelawyerportal.com/2017/04/20/law-
guides-internet-trolling-cyberbullying-law/?cn-reloaded=1.
Working to Halt Online Abuse. (2013). 2013 Cyberstalking Statistics. Retrieved from the
WHOA website: http://www.haltabuse.org/resources/stats/2013Statistics.pdf.
68. e-Citizenship Learning Packets Slide 68
SEAMEO INNOTECH would like to acknowledge the
technical inputs of Bernadette Caraig in the
development of this learning packet.
All images used in this presentation are royalty-free
and are sourced from the following websites:
www.shutterstock.com
www.pixabay.com
www.pexels.com
www.unsplash.com
Icons are sourced from
www.thenounproject.com
Emojis are provided free by Emoji One at
www.emojione.com
69. This publication is licensed under Creative Commons
Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
(https://creativecommons.org/licences/by-nc-sa/4.0/)