অসমীয়া   বাংলা   बोड़ो   डोगरी   ગુજરાતી   ಕನ್ನಡ   كأشُر   कोंकणी   संथाली   মনিপুরি   नेपाली   ଓରିୟା   ਪੰਜਾਬੀ   संस्कृत   தமிழ்  తెలుగు   ردو

Cyber Harassment

Overview of Cyber Harassment cases

The use of digital technology has become an integral part of our lives. Any technology can be used for constructive or destructive purposes. Misuse of information and communication technology is an important ingredient of Cyber Crime.

Among many offensive acts in cyberspace, online abuse/ harassment is a common phenomenon that directly or indirectly affects cyberspace users of diverse age groups.

Cyber Harassment is defined as a repeated, unsolicited, hostile behaviour by a person through cyberspace with a intent to terrify, intimidate, humiliate, threaten, harass or stalk someone.

Any harassment caused through electronic media is considered to have a similar impact as traditional offence of harassment. It can be done through various means of ICT as depicted.

Categories of Cyber Harassment

Based on the severity of Online Harassment and the modus operandi, the Department of Justice (DOJ) of USA and ACPO (Association of Chief Police Officers) in the UK and other international agencies have broadly classified Cyber Harassment into 10 categories, as shown.

Cyber Bullying

Cyberbullying is an act of sending, posting or sharing negative, harmful, false or demeaning content regarding others. Sharing personal or private information which could cause embarrassment or humiliation to others too falls under the ambit of Cyberbullying. It takes place through digital devices such as cell phones, computers, and tablets via services such as SMS, texts, Apps, social media platforms, online forumsand gaming where people can view, participate or share content.

Modus operandi used:

  • Posting nasty or humiliating content or comments about an individual online
  • Publishing an embarrassing or demeaning photo or video
  • Creating a fake profile of another individual
  • Online threats provoking an individual to harm/kill himself or hurt someone else
  • Triggering religious, racial, regional, ethnic or political vitriol online by posting hate comments or content
  • Using other’s identity online to ask for or post personal or fake, demeaning, embarrassing information about someone
  • Repeatedly harming a player’s character, asking for monetary exchange, ganging up on a player or using personal information to make direct threats
  • Posting online stories, pictures, jokes, or cartoons that are intended to embarrass or humiliate others.

Hacking someone’s e-mail, other social media accounts and/or sending/posting embarrassing content whilst pretending to be the victim whose account has been hacked. Table 1 below shows the various means, motives and targets of Cyberbullying.

Type Means of ICT used in the crime Motive behind the commission of crime General Targets
Cyber Bullying
  • E-mail
  • Social Media/Networking (Facebook, Instagram, WhatsApp, Twitter, YouTube etc.)
  • Website
  • Instant Messages
  • Web-based SMS
  • MMS
  • Online Games
  • To gain popularity and influence within the dominant social circle
  • Sometimes bullies do it to take revenge
  • Many cyberbullies perform their actions for pure entertainment
  • To isolate the victim
  • School kids
  • Teenagers
  • Women
  • Colleagues 

Cyber Teasing

Cyber teasing is an attitude, a mindset, a pattern of behaviour and/or actions that are construed as an insult and an act of humiliation to the target. Generally, it is the harassment of women by strangers in public places, streets and public transport but when a similar crime occurs using means of ICT then it is called Cyber Teasing.

Modus operandi used:

  • Sending, sharing, posting vulgar/defamatory/ embarrassing/ harmful/ false messages or information via the below means:
  • Social Media (Facebook, Instagram, Snapchat, Twitter etc.)
  • SMS (text messages from the cellular network)
  • Instant Message Services (WhatsApp, Facebook Messenger, Instant Message etc.)
  • E-mail
Type Means of ICT used in the crime Motive behind the commission of crime General Targets
Cyber Teasing
  • E-mail
  • Social Media/Networking (Facebook, Instagram, WhatsApp, Twitter, YouTube etc.)
  • Website
  • Instant Messages
  • Web-based SMS
  • MMS
  • For gaining sexual attention
  • Exacerbate feeling of shame and humiliation
  • Out of revenge
  • Women
  • Teenage Girls

Cyber Stalking

Cyberstalking is the usage of Information and Communications Technology (ICT) to stalk, control, manipulate or habitually threaten a minor, an adult or a business group. Cyberstalking is both an online assailant tactic and typology of psychopathological ICT users. Cyberstalking includes direct or implied threats of physical harm, habitual surveillance and gathering information to manipulate and control a target. Table 3 describes the various means of ICT, motives behind their usage and the various targets.

Modus operandi used:

  • Leaving harassing or threatening messages in the guestbook, on the victim’s website, social media profile, or blog.
  • Sending inappropriate electronic greeting cards to the victim
  • Posting personal advertisements in the victim’s name
  • Creating websites, profiles, or other accounts that contain messages to threaten or harass the victim or creating circumstances as if the victim created a particular website that contains provocative or pornographic photographs
  • Hate speech, i.e. the language that denigrates, insults, threatens or targets an individual based on their identity and other traits (such as sexual orientation or disability or religion etc.)
  • Accessing the victim’s e-mail or social media accounts to find the victim’s personal information, read e-mails and messages, or change passwords
  • Impersonating the victim’s online identity to harm reputation or relationships.
  • Monitoring the victim’s movements using GPS, tracking apps or spyware
  • Ordering goods or services: Ordering items or subscribe to magazines in the victim’s name. These often involve subscriptions to pornography or ordering sex toys and having them delivered to the victim’s workplace
Type Means of ICT used in the crime Motive behind the commission of crime General Targets
Cyber Teasing
  • E-mail
  • Social Media/Networking (Facebook, Instagram, WhatsApp, Twitter, YouTube etc.)
  • Website
  • Messages (SMS)
  • Postal letters
  • Telephone/cell phone conversations
  • Jealousy
  • Obsession and attraction
  • Erotomania
  • Sexual Harassment
  • Revenge and hatred
  • Young women
  • Teenagers
  • Ex-girlfriend or boyfriend
  • Colleagues
  • Unknown victims
  • Celebrities or famous personalities 

Cyber Defamation

Cyber defamation is the act of publishing defamatory content using electronic devices and the internet. If someone publishes some defamatory statement and/or sends e-mails containing defamatory content to other people to defame the victim then this would be considered as an act of cyber defamation. Table 4 describes the various means of ICT, motives behind their usage and the various targets.

Modus operandi used:

  • Publishing/posting derogatory remarks against individual(s)/organization(s) on websites.
  • Publishing/posting derogatory remarks againstindividual/ organization on social media/ networking.
  • Spreading false information against individual/organization through e-mails.

Impact of Cyber Defamation:

  • Loss of reputation of individual/organization
  • Loss of business in case organization is defamed
Type  Means of ICT used in the crime Motive behind the commission of crime General Targets
Cyber Defamation
  • E-mail
  • Social Media/Networking (Facebook, Instagram, WhatsApp, Twitter, YouTube etc.)
  • Website/Blogs
  • To defame an individual/ organization
  • To take revenge from an individual/organization
  • Political motivation can be the reason to defame public figure/ organization
  • Individuals
  • Organizations
  • Public/Political figures

Identity Theft

Identity theft is the act of using other’s Personal Identity information such as name, identification number, or credit card number, without their permission, to commit fraud. Table 5 lists the means of ICT, motives and general targets.

Modus operandi used:

  • Phishing
  • Skimming
  • Data Breach
  • Phone scams
Type Means of ICT used in the crime Motive behind the commission of crime General Targets
Identity Theft
  • E-mail
  • Social Media
  • POS (point of sale device)
  • Mobile phones
  • For Financial gains
  • To Commit frauds using other identities
  • To harass an individual
  • Individuals
  • Organizations
  • Public/Political figure

Catfishing

Catfishing is a type of deceptive activity where a person creates a fake identity on a social network account, usually targeting a specific victim for abuse, deception, fraud and various other gains. Table 6 lists the means of ICT, motives and general targets.

Modus operandi used:

  • Harassing someone by creating a fake social media profile in the name of others or to impersonate someone else.
  • Catfishing is often employed for romance scams on dating websites.
  • Catfishing may be used for financial gain, to compromise a victim in some way, or simply as a form of trolling or wish fulfilment.
Type Means of ICT used in the crime Motive behind the commission of crime General Targets
Catfishing
  • E-mail
  • Social Media/networking (Facebook, Instagram, WhatsApp, Twitter, YouTube etc.)
  • Website/blogs/forums
  • Low self-esteem and build a fictitious online persona to interact with people
  • Seek money, and build a fake relationship with their victims to get it.
  • Revenge from others
  • Young women
  • Teenagers
  • Ex-girlfriends/boyfriends
  • Celebrities or famous personalities

Doxing

Doxing is the process of retrieving, hacking and publishing other people’s information such as names, addresses or phone numbers and/or credit/debit card details. Doxing may be targeted toward a specific person or an organization. Table 7 lists the means of ICT, motives and general targets.

Modus operandi used:

  • Collecting publicly available information and compiling it as a dossier and publishing it online. Social engineering techniques can be used to collect information.
  • Publishing someone’s personal information such as phone number, e-mail id, credit card information etc. publicly.
  • Hacking someone’s system or account, to steal important information and publish the same online.
Type Means of ICT used in the crime Motive behind the commission of crime General Targets
Doxing
  • E-mail
  • Social Media/Networking (Facebook, Instagram, WhatsApp, Twitter, YouTube etc.)
  • Website/blogs/forums
  • Harassment of individual/Public figure/ Organization
  • To extort individual for financial gains
  • To take revenge
  • To threat individual
  • Individuals
  • Public/Political figures
  • Organizations

Swatting

Swatting refers to a harassment technique most often perpetrated by members of the online gaming community. Online gamers make a hoax call, wherein they dial authorities and give them some false information diverting the police and emergency service response team to another person’s address. Table 8 lists the means of ICT, motives and general targets.

Modus operandi used:

Swatters generally do this by making phone calls to emergency numbers like 100 and falsely reporting a violent emergency, such as a shooting or hostage-like situation.

Type Means of ICT used in the crime Motive behind the commission of crime General Targets
Swatting
  • E-mail
  • Phone call
  • Social media
  • Harassment
  • To take revenge
  • To extort individual for financial gains
  • Teens
  • Kids
  • Online gamers

Cyber Trolling

Cyber trolling is a deliberate act of making random unsolicited and/or controversial comments on various internet forums with the intent to provoke an emotional response from the readers to engage them in a fight or argument which may be just for amusement or for other specific gains. Now that almost anyone can comment on a status update, reply to a tweet, converse in a community thread or send an anonymous question, trolling is everywhere that people interact. Table 9 lists the means of ICT, motives and general targets.

Modus operandi used:

  • YouTube video Comments: People troll through comments on YouTube videos.
  • Comments on Blogs particularly on some popular blog and/or news sites. Trolls include acts like cursing, name-calling etc.
  • E-mail: There are lots of trolls who actively spend time and energy to write horrible e-mail messages/comments in response to people they disagree with, feel offended by, or just to get a thrill for no significant reason at all.
  • Social Networking websites - Tweets, Retweets, comments, posts are a few of the activities. 
Type Means of ICT used in the crime Motive behind the commission of crime General Targets
Trolling
  • E-mail
  • Social Media/Networking (Facebook, Instagram, WhatsApp, Twitter, YouTube etc.)
  • Website/blogs/forums
  • To make others feel low selfesteemed or disgraced
  • To take revenge on others
  • Ideological differences
  • Religious discontentment
  • Gender biases
  • Individuals
  • Public/Political figures
  • Celebrities
  • Specific communities

Revenge Porn

Revenge porn or revenge pornography is the distribution of sexually explicit images or videos of individuals to bring disgrace and damage their reputation. The sexually explicit images or videos may be made by a partner of an intimate relationship with or without the knowledge and consent of the subject. Table 10 lists the means of ICT, motives and general targets.

Modus operandi used:

The possession of the material may be used by the perpetrators to blackmail the subjects into performing other sex acts or to coerce them into continuing a relationship or to punish them for ending the relationship or to threaten them. 

Type Means of ICT used in the crime Motive behind the commission of crime General Targets
Revenge Porn
  • E-mail
  • Website
  • Social Media
  • MMS
  • To Take revenge
  • To humiliate and intimidate
  • To blackmail
  • Young Women
  • Children

Source : Bureau of Police Research & Development, New Delhi

Last Modified : 6/29/2024



© C–DAC.All content appearing on the vikaspedia portal is through collaborative effort of vikaspedia and its partners.We encourage you to use and share the content in a respectful and fair manner. Please leave all source links intact and adhere to applicable copyright and intellectual property guidelines and laws.
English to Hindi Transliterate