TFV Flashcards
Cyberstalking
The use of technology to stalk, sometimes called “cyberstalking,” involves using the Internet, email, or other electronic communications to stalk someone. Stalking is against the law. Stalking and cyberstalking can lead to sleeping problems or problems at work or school.
Impersonation
the act of attempting to deceive someone by pretending that you are another person
Non Consensual distribution of intimate imagens
This may include the publication, advertisement, distribution, transmission or making available of an intimate image to another person. Further, the distribution of the images, in whatever form, would be done without the consent of the person depicted in the image.
Organized networked harassment
In morally motivated networked harassment, a member of a social network or online community accuses a target of violating their network’s norms, triggering moral outrage. Network members send harassing messages to the target, reinforcing their adherence to the norm and signaling network membership.
voyeurism
the practice of gaining sexual pleasure from watching others when they are naked or engaged in sexual activity.
online gender based violence
OGBV can take various forms, from sexual harassment, doxing, and the non-consensual dissemination of intimate images to cyber-stalking and threats of rape. In many cases, OGBV and offline GBV are on a continuum, with online harassment transitioning into actual physical violence.
Physically threatened online
Same as the terms online harassment or online abuse, which we define as the “pervasive or severe targeting of an individual or group online through harmful behavior.
Blackmailed online
Online blackmail is when someone threatens to share private information, images or videos of a person unless something is done for them. Young people sometimes send nude pictures or videos to flirt, or have fun with people they like online
monitor, spy or track online
Spyware is becoming more widespread as online attackers and traditional criminals use it as a
tool for crimes against individuals, businesses, and governments. Statutes banning spyware exist
in a number of states and Congress is considering national legislation.
Spyware can lead to financial loss, as in identity theft and credit card fraud, and it can also
reduce consumers’ confidence in online safety and their willingness to participate in modern
electronic commerce.
someone acessing your devices or social media accounts beloging to them without permission
Hacking is a form of intrusion targeted at computers, including mobile phones and personal tablet devices. It is the unauthorised use of, or access into, computers or networks by exploiting identified security vulnerabilities.
Called discriminatory names or derrogatory cultural terms
Discrimination is less favourable treatment which is unlawful and which is not objectively
justified. It applies in employment and in the provision of goods and services.
unwanted sexual images send to them
a situation where nudes are sent to someone that didn’t consent to receiving them
Doxing
the action or process of searching for and publishing private or identifying information about a particular individual on the internet, typically with malicious intent.
Defamation
the action of damaging the good reputation of someone; slander or libel.
online impersonation
Online impersonation is when a malicious actor steals someone’s online identity in order to cause damage – financial or reputational, or by intimidating, harassing, or threatening their victim.