Tech Abuse and Online Stalking Research

IrresistibleHouston avatar
IrresistibleHouston
·
·
Download

Start Quiz

Study Flashcards

10 Questions

Research on tech abuse has mainly focused on common internet-connected devices such as smartphones and laptops, and has shown that they have been used routinely for online stalking, harassment and ______.

abuse

Preparators may exploit the location tracking features of certain apps (such as Apple’s ‘Find My’ function) in order to track their ______.

victims

Spyware (also known as ‘stalkerware’) refers to software or apps that are designed to covertly monitor and gather information about a device, allowing a perpetrator to look at a victim’s messages and photographs, access the device’s cameras, record screen activity and track its ______, usually without the victim’s consent or knowledge.

location

Cyber security company Kaspersky reported that the number of people who discovered a stalkerware installation attempt on their device increased by 35% in the first 8 months of 2019, compared with the same period in ______.

2018

Technology has expanded the ways in which sexual abuse can be perpetrated, for example, it can facilitate the non-consensual creation and/or sharing of sexual ______.

images

Researchers from University College London’s Gender and IoT research project have highlighted some of the ways in which IoT systems could pose a risk to victims of domestic ______.

abuse

Experts have said that when technology is used to facilitate domestic ______, it is likely to be the perpetrator who sets up and manages the devices used.

abuse

In some cases, the device’s ability to monitor and collect data may be ______, meaning the victim could be unaware they are being observed.

disguised

Conversely, a perpetrator may tell a victim that a device has functionality that it actually does not have, in order to ______ and frighten them.

intimidate

Studies have also shown that abusers may use technologies to create a feeling of constantly being present in a victim’s life, making them feel like they have no privacy or ______.

safety

Explore research findings on tech abuse and online stalking, focusing on common internet-connected devices like smartphones and laptops. Learn about how perpetrators exploit location tracking features and use spyware to monitor and track victims.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Tech-Enabled Crime Solving
5 questions
Tech Titans Quote Match
5 questions

Tech Titans Quote Match

BeautifulWatermelonTourmaline avatar
BeautifulWatermelonTourmaline
Tech Trivia
8 questions

Tech Trivia

PraisingPelican avatar
PraisingPelican
Tech Startup Spotlight
10 questions

Tech Startup Spotlight

AccommodativeSparrow avatar
AccommodativeSparrow
Use Quizgecko on...
Browser
Browser