Cyberstalking and Cyberbullying: Effects and Prevention Measures
Cyberstalking and Cyberbullying: Effects and Prevention Measures
Cyberstalking and Cyberbullying: Effects and Prevention Measures
to know how severely such acts impact the victim. People who spend a lot of time on the
Sometimes the victims get so depressed that they Internet
might consider committing suicide or taking revenge People who’ve attempted to break up with
on the attacker in the cruelest means possible. The someone or divorce them
victim might lose his/her own mental stability. So, Employers (by fired ex-employees)
there is high need of incorporating a system which People who know or have been introduced
detects online harassment like cyberstalking and to or who have worked with mentally ill
cyberstalking. With the presence of such systems individuals (who often form unhealthy or
these issues can be highly reduced. abnormal obsessions or liking for someone
else).
Seven Types of Cyberbullying and Cyberstalking are While most cases are considered to be
briefed below cyberbullying, some teens argue that most events are
simply drama. Percentage of where the teens are
1. Trolling and Flaming: This category includes being Cyberbulled is shoen in figure 1. For example,
posting mean spirited, rude or angry messages Danah Boyd writes, “teens regularly used that word
2. Excluding: For malicious reasons leaving [drama] to describe various forms of interpersonal
someone out of an online group. conflict that ranged from insignificant joking around
3. Masquerading: Creating media profiles in to serious jealousy-driven relational aggression.
Facebook, Twitter or other social networking sites as Whereas adults might have labeled many of these
someone else in order to damage the reputation of practices as bullying, teens saw them as
the victim. drama. Drama among teens has existed for years but
4. Mobbing: A group of people forming a gang now that it is easier to share information through
and sending hundreds of text messages to the social media, it seems that simple drama gets out of
victim’s system. This is similar to the Denial of control”[5].
Service problem.
5. Denigrating: Posting or sending some cruel
and embarrassing material like personal text, photos,
etc. about the individual to others and demeaning the
person in other’s view.
6. Outing: With the intent of embarrassing or
harming a person, posting or sending out private
information about someone without that person’s
permission.
7. Harassing: Repeatedly sending unwanted
messages to another person.
Cyber stalking can touch anyone, including adults.
Children, however, are popular victims. Other people
who might be victims of cyberstalking include:
Handicapped persons Fig. 1: Percentage of the teens being Cyberbulled
The elderly
Stalker (Bob) and a Monitor see Figure 2. Bob and the focus of research in these disciplines. What
Alice are linked by a communication channel which characterizes all three problems is their adversarial
can be accessed by the Monitor. The goal of Bob is nature. In the Cyberstalker's problem the Stalker is
to harass Alice while the goal of the Monitor is to the adversary and the other two collaborate to detect
record any such activity. In the traditional and record any harassment.
cryptographic terminology, Bob wants to establish a
(virtual) harassment channel, while the Monitor
wants to track it and record its content.
replace the agent by a closed-circuit television storage device (see Figure 7). The storage device has
camera and a recorder to monitor the sessions see two modules.
Figure 5. Although both these solutions provide
evidence of stalking, they offer only a weak binding
of the stalker to the session. To strengthen the link,
evidence from the actual TCP/IP packets received
could be helpful.
not alter them in any way. Keep electronic [5].Machine Learning Solutions for controlling
copies, not just print-outs. Cyberbullying and Cyberstalking by Zinnar Ghasem, Ingo
3. Save any information that suggests a violent Frommholz, Carsten Maple, University of Bedfordshire.
threat and contact law enforcement. [6]. ICT Penetration and Cybercrime in India: A Review
4. If the harassment continues, contact the
By Anand Kumar Shrivastav Research Scholar,
harasser's Internet service provider[32]. The Department of Computer Science, Mewar University,
ISPs prohibit using their service for abusive Chittorgarh, India Dr. Ekata, Associate Professor, Deptt.
purposes. An ISP can often intervene by of Applied Science, Krishna Institute of Technology,
directly contacting the stalker or closing his Ghaziabad, India
account.
[7].Cyberstalking: an exploratory study of students at a
5. Keep a record of your contacts with ISP mid-atlantic university.
officials or law enforcement officials.
6. When contacting police, provide specific [8].A.M.Chandrashekhar and K. Raghuveer, “Fusion of
details such as any tangible evidence you've Multiple Data Mining Techniques for Effective Network
Intrusion Detection – A Contemporary Approach”,
collected. In cases of a serious threat, police
Proceedings of The 5th International Conference on
can refer the matter to state or federal Security of Information and Networks (SIN 2012), 2012,
authorities for investigation. The stalker pp 33-37.
may be prosecuted in court.
7. If the target is afraid to act, find help [9].A.M.Chandrashekhar and K. Raghuveer , “Intrusion
Detection Technique by using K-means, Fuzzy Neural
through other resources, such as Wired
Network and SVM classifiers”, 2013 IEEE International
Safety [33]. Conference on Computer Communication and Informatics
(ICCCI -2013), 4~06,Jan2013, IEEE Catalog Number:
4. Conclusion CFP1308R-ART, ISBN Number: 978-1-4673-2907-1.
Cyberstalking and cyberbullying is a crime. This [10].A.M.Chandrashekhar and K. Raghuveer, “An
can mentally and physically affect the victim and Effective Technique for Intrusion Detection using Neuro-
there can be dangerous consequences to such Fuzzy and Radial SVM Classifier”, The Fourth
harassment. These online harassments are felonies if International Conference on Networks &
they involve a “credible threat”. If the victim is in Communications (NetCom-2012), 22~24, Dec-
fear for his/her own safety or the safety of his/her 2012.
family members then it is called a credible threat. [11].Tracking cyberstalkers: a cryptographic approach by
The threat is made with the obvious intention to Mike Burmester, Peter Henry, Leo S. Kermes, Department
perform the threat and cause harm. It does not matter of Computer Science, Florida State University, Tallahassee
whether the person who made the threat actually
[12].A.M.Chandrashekhar and K. Raghuveer,
intended to carry it out or not. Cyberstalking and “Confederation of FCM Clustering, ANN and SVM
cyberbullying is becoming an increasingly Techniques of Data mining to Implement Hybrid NIDS
significant problem for schools and society in Using Corrected KDD Cup Dataset”, IEEE International
general. Therefore this paper outlines the nature and Conference on Communication and Signal Processing
extent to which these problems are prevalent in (ICCSP),2014, pp 672-676.
today's society and provides solutions to put a brake [13].A.M.Chandrashekhar and K.Raghuveer, “Hard
to such online harassment. The society should be Clustering Vs. Soft Clustering: A Close Contest for
more aware of the existence of such problems and Attaining Supremacy in Hybrid NIDS Development”,
take measures in order to not fall prey to cyber Proceedings of International Conference on
stalkers and bullies. Communication and Computing (ICC - 2014), Elsevier
science and Technology Publications.
REFERENCES: [14].A.M.Chandrashekhar and K.Raghuveer,
“Amalgamation of K-means clustering algorithem with
[1]. Cyberbullying A school psychology by Nicole M.
standard MLP and SVM based neural networks to
Aune
implement network intrusion detection system”, Advanced
[2]. Cyberbullies on Campus by Darby Dickerson Computing, Networking, and Informatics –Volume 2(June
2014), Volume 28 of the series Smart Inovation, Systems
[3]. Bullying in the new playground: Research into and Technologies pp 273-283.
cyberbullying and cyber victimization Qing Li, University
of Calgary [15].A.M.Chandrashekhar and K.Raghuveer, “Diverse and
Conglomerate Modi-operandi for Anomaly Intrusion
[4].Cyberstalking: Dangers on the Information Detection Systems”, International Journal of Computer
Superhighway By: Trudy M. Gregorie, Director of Application (IJCA) Special Issue on “Network Security
Training, National Center for Victims of Crime, 2001 and Cryptography (NSC)”, 2011.