Tech Abuse and Online Stalking Research
10 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Research on tech abuse has mainly focused on common internet-connected devices such as smartphones and laptops, and has shown that they have been used routinely for online stalking, harassment and ______.

abuse

Preparators may exploit the location tracking features of certain apps (such as Apple’s ‘Find My’ function) in order to track their ______.

victims

Spyware (also known as ‘stalkerware’) refers to software or apps that are designed to covertly monitor and gather information about a device, allowing a perpetrator to look at a victim’s messages and photographs, access the device’s cameras, record screen activity and track its ______, usually without the victim’s consent or knowledge.

location

Cyber security company Kaspersky reported that the number of people who discovered a stalkerware installation attempt on their device increased by 35% in the first 8 months of 2019, compared with the same period in ______.

<p>2018</p> Signup and view all the answers

Technology has expanded the ways in which sexual abuse can be perpetrated, for example, it can facilitate the non-consensual creation and/or sharing of sexual ______.

<p>images</p> Signup and view all the answers

Researchers from University College London’s Gender and IoT research project have highlighted some of the ways in which IoT systems could pose a risk to victims of domestic ______.

<p>abuse</p> Signup and view all the answers

Experts have said that when technology is used to facilitate domestic ______, it is likely to be the perpetrator who sets up and manages the devices used.

<p>abuse</p> Signup and view all the answers

In some cases, the device’s ability to monitor and collect data may be ______, meaning the victim could be unaware they are being observed.

<p>disguised</p> Signup and view all the answers

Conversely, a perpetrator may tell a victim that a device has functionality that it actually does not have, in order to ______ and frighten them.

<p>intimidate</p> Signup and view all the answers

Studies have also shown that abusers may use technologies to create a feeling of constantly being present in a victim’s life, making them feel like they have no privacy or ______.

<p>safety</p> Signup and view all the answers

More Like This

Tech Titans Quote Match
5 questions

Tech Titans Quote Match

BeautifulWatermelonTourmaline avatar
BeautifulWatermelonTourmaline
Tech Acronyms Quiz
5 questions
Tech Titans Quiz
5 questions

Tech Titans Quiz

PhenomenalDravite avatar
PhenomenalDravite
Use Quizgecko on...
Browser
Browser