TFV Flashcards
Cyberstalking
The use of technology to stalk, sometimes called “cyberstalking,” involves using the Internet, email, or other electronic communications to stalk someone. Stalking is against the law. Stalking and cyberstalking can lead to sleeping problems or problems at work or school.
Impersonation
the act of attempting to deceive someone by pretending that you are another person
Non Consensual distribution of intimate imagens
This may include the publication, advertisement, distribution, transmission or making available of an intimate image to another person. Further, the distribution of the images, in whatever form, would be done without the consent of the person depicted in the image.
Organized networked harassment
In morally motivated networked harassment, a member of a social network or online community accuses a target of violating their network’s norms, triggering moral outrage. Network members send harassing messages to the target, reinforcing their adherence to the norm and signaling network membership.
voyeurism
the practice of gaining sexual pleasure from watching others when they are naked or engaged in sexual activity.
online gender based violence
OGBV can take various forms, from sexual harassment, doxing, and the non-consensual dissemination of intimate images to cyber-stalking and threats of rape. In many cases, OGBV and offline GBV are on a continuum, with online harassment transitioning into actual physical violence.
Physically threatened online
Same as the terms online harassment or online abuse, which we define as the “pervasive or severe targeting of an individual or group online through harmful behavior.
Blackmailed online
Online blackmail is when someone threatens to share private information, images or videos of a person unless something is done for them. Young people sometimes send nude pictures or videos to flirt, or have fun with people they like online
monitor, spy or track online
Spyware is becoming more widespread as online attackers and traditional criminals use it as a
tool for crimes against individuals, businesses, and governments. Statutes banning spyware exist
in a number of states and Congress is considering national legislation.
Spyware can lead to financial loss, as in identity theft and credit card fraud, and it can also
reduce consumers’ confidence in online safety and their willingness to participate in modern
electronic commerce.
someone acessing your devices or social media accounts beloging to them without permission
Hacking is a form of intrusion targeted at computers, including mobile phones and personal tablet devices. It is the unauthorised use of, or access into, computers or networks by exploiting identified security vulnerabilities.
Called discriminatory names or derrogatory cultural terms
Discrimination is less favourable treatment which is unlawful and which is not objectively
justified. It applies in employment and in the provision of goods and services.
unwanted sexual images send to them
a situation where nudes are sent to someone that didn’t consent to receiving them
Doxing
the action or process of searching for and publishing private or identifying information about a particular individual on the internet, typically with malicious intent.
Defamation
the action of damaging the good reputation of someone; slander or libel.
online impersonation
Online impersonation is when a malicious actor steals someone’s online identity in order to cause damage – financial or reputational, or by intimidating, harassing, or threatening their victim.
repeatedly contacted by someone they do not want to be contacted by.
This situations where someone is repeatedly contacting you in an annoying or upsetting way.
This contact might involve messages, calls, emails, or social media posts, and may involve unwanted sexual advances, questions or images.
Network harassment
can be defined as the use of information and communication technologies by an individual or group to repeatedly cause harm to another person. This may involve threats, embarrassment, or humiliation in an online setting.
Trolling
Trolling is when someone post or comments online to deliberately upset others. In short: Trolling is when someone deliberately tries to upset others online. Trolling can lead to a pile on, when others join in the attack.
Cyberbulling
the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
Grooming
Grooming is when someone builds a relationship, trust and emotional connection with a child or young person so they can manipulate, exploit and abuse them. Children and young people who are groomed can be sexually abused, exploited or trafficked. Anybody can be a groomer, no matter their age, gender or race.
Sextortion
Sextortion is when an online predator tricks someone into giving them nude images or videos, and then demands money, more images, or makes other demands—threatening to share the images with the victim’s friends and family if they don’t comply.
Hate speech
speech expressing hatred of a particular group of people