The use of digital technology has become an integral part of our lives. Any technology can be used for constructive or destructive purposes. Misuse of information and communication technology is an important ingredient of Cyber Crime.
Among many offensive acts in cyberspace, online abuse/ harassment is a common phenomenon that directly or indirectly affects cyberspace users of diverse age groups.
Cyber Harassment is defined as a repeated, unsolicited, hostile behaviour by a person through cyberspace with a intent to terrify, intimidate, humiliate, threaten, harass or stalk someone.
Any harassment caused through electronic media is considered to have a similar impact as traditional offence of harassment. It can be done through various means of ICT as depicted.
Based on the severity of Online Harassment and the modus operandi, the Department of Justice (DOJ) of USA and ACPO (Association of Chief Police Officers) in the UK and other international agencies have broadly classified Cyber Harassment into 10 categories, as shown.
Cyberbullying is an act of sending, posting or sharing negative, harmful, false or demeaning content regarding others. Sharing personal or private information which could cause embarrassment or humiliation to others too falls under the ambit of Cyberbullying. It takes place through digital devices such as cell phones, computers, and tablets via services such as SMS, texts, Apps, social media platforms, online forumsand gaming where people can view, participate or share content.
Modus operandi used:
Hacking someone’s e-mail, other social media accounts and/or sending/posting embarrassing content whilst pretending to be the victim whose account has been hacked. Table 1 below shows the various means, motives and targets of Cyberbullying.
Type | Means of ICT used in the crime | Motive behind the commission of crime | General Targets |
Cyber Bullying |
|
|
|
Cyber teasing is an attitude, a mindset, a pattern of behaviour and/or actions that are construed as an insult and an act of humiliation to the target. Generally, it is the harassment of women by strangers in public places, streets and public transport but when a similar crime occurs using means of ICT then it is called Cyber Teasing.
Modus operandi used:
Type | Means of ICT used in the crime | Motive behind the commission of crime | General Targets |
Cyber Teasing |
|
|
|
Cyberstalking is the usage of Information and Communications Technology (ICT) to stalk, control, manipulate or habitually threaten a minor, an adult or a business group. Cyberstalking is both an online assailant tactic and typology of psychopathological ICT users. Cyberstalking includes direct or implied threats of physical harm, habitual surveillance and gathering information to manipulate and control a target. Table 3 describes the various means of ICT, motives behind their usage and the various targets.
Modus operandi used:
Type | Means of ICT used in the crime | Motive behind the commission of crime | General Targets |
Cyber Teasing |
|
|
|
Cyber defamation is the act of publishing defamatory content using electronic devices and the internet. If someone publishes some defamatory statement and/or sends e-mails containing defamatory content to other people to defame the victim then this would be considered as an act of cyber defamation. Table 4 describes the various means of ICT, motives behind their usage and the various targets.
Modus operandi used:
Impact of Cyber Defamation:
Type | Means of ICT used in the crime | Motive behind the commission of crime | General Targets |
Cyber Defamation |
|
|
|
Identity theft is the act of using other’s Personal Identity information such as name, identification number, or credit card number, without their permission, to commit fraud. Table 5 lists the means of ICT, motives and general targets.
Modus operandi used:
Type | Means of ICT used in the crime | Motive behind the commission of crime | General Targets |
Identity Theft |
|
|
|
Catfishing is a type of deceptive activity where a person creates a fake identity on a social network account, usually targeting a specific victim for abuse, deception, fraud and various other gains. Table 6 lists the means of ICT, motives and general targets.
Modus operandi used:
Type | Means of ICT used in the crime | Motive behind the commission of crime | General Targets |
Catfishing |
|
|
|
Doxing is the process of retrieving, hacking and publishing other people’s information such as names, addresses or phone numbers and/or credit/debit card details. Doxing may be targeted toward a specific person or an organization. Table 7 lists the means of ICT, motives and general targets.
Modus operandi used:
Type | Means of ICT used in the crime | Motive behind the commission of crime | General Targets |
Doxing |
|
|
|
Swatting refers to a harassment technique most often perpetrated by members of the online gaming community. Online gamers make a hoax call, wherein they dial authorities and give them some false information diverting the police and emergency service response team to another person’s address. Table 8 lists the means of ICT, motives and general targets.
Modus operandi used:
Swatters generally do this by making phone calls to emergency numbers like 100 and falsely reporting a violent emergency, such as a shooting or hostage-like situation.
Type | Means of ICT used in the crime | Motive behind the commission of crime | General Targets |
Swatting |
|
|
|
Cyber trolling is a deliberate act of making random unsolicited and/or controversial comments on various internet forums with the intent to provoke an emotional response from the readers to engage them in a fight or argument which may be just for amusement or for other specific gains. Now that almost anyone can comment on a status update, reply to a tweet, converse in a community thread or send an anonymous question, trolling is everywhere that people interact. Table 9 lists the means of ICT, motives and general targets.
Modus operandi used:
Type | Means of ICT used in the crime | Motive behind the commission of crime | General Targets |
Trolling |
|
|
|
Revenge porn or revenge pornography is the distribution of sexually explicit images or videos of individuals to bring disgrace and damage their reputation. The sexually explicit images or videos may be made by a partner of an intimate relationship with or without the knowledge and consent of the subject. Table 10 lists the means of ICT, motives and general targets.
Modus operandi used:
The possession of the material may be used by the perpetrators to blackmail the subjects into performing other sex acts or to coerce them into continuing a relationship or to punish them for ending the relationship or to threaten them.
Type | Means of ICT used in the crime | Motive behind the commission of crime | General Targets |
Revenge Porn |
|
|
|
Last Modified : 6/29/2024
This topic provides information about cyber safety...
This section covers about Computer Threats, Attack...
This topic provides information about Legal implic...
This topic provides information related to online ...