Cyber Stalking

The definition of cyber stalking or cyber bullying is very simple it says that using the Internet or other electronic means to harass and intimidate certain victims. Common features include (but are not limited to) the classic “tracking” behavior tracking someone’s location and monitoring their online and real-world activities. As we all know, cyber stalkers install GPS devices in victims ‘cars, use relocation spyware on their phones, and obsessively track victims’ whereabouts through social media.

 Internet scanning can include other behaviors designed to intimidate victims or make their lives intolerable. For example, online stalkers can target victims on social media, tracking and sending threatening messages. They can hack emails and communicate with victims’ contacts, including friends and even employers. Social media tracking may include photo faking or threatening private information being sent. Often times, web stalkers spread malicious rumors and false accusations, and even produce and post retaliatory pornography. They can also participate in identity theft and create fake social media profiles or blogs about the victims.

There are some features that tells us about the cyber stalking

  • Although bullying has existed for decades, and many laws at the state and national levels prohibit such behavior and penalize violations, it can be said that cyber bullying is more likely to occur given the use of ubiquitous platforms and resources. Based on helping to achieve victimization. In fact, given the explosive growth of social media and 24/7 connections and the reality that stalkers will naturally extend their reach through online media, it is difficult to conceptually distinguish the two due to the undeniable overlap.
  • Another reason online tracking is more attractive to perpetrators is that they can easily pursue targets from geographically distant locations, making it exponentially more difficult to identify, locate and process them. With just internet access and a mobile phone, tablet or laptop, the stalker can go online and threaten his target from another city, state or continent, and even block or hide his location. This can cause people to fear and worry about what the perpetrator might do next and whether the person is too close or far away.

There are certain tips and with the help of that we can secure yourself from cyber stalking-

  •  Do not allow your Social media to post your address or phone number. You might even want to set up a separate email address for social media.
  • Only accept friend requests from people you have met in person. Set your social network to only accept friend requests from friends of friends.
  • If you use an online dating service, please do not provide your full identification on the website or by email. Only give your phone number to people you have actually met and who don’t mind meeting again. The best safety tip is that you don’t even provide your full name online, just your name.
  • Be careful with public Wi-Fi networks, it is easy to get hacked. If you need to log into Starbucks or a hotel, it is best to use a virtual private network (VPN) to prevent someone from spying on your communications. No matter where you are, Kaspersky VPN can provide you with a secure connection.
  • Use anti-spyware software to detect any wrong activity. Delete it, or better yet, back up your data and then restore factory settings to make sure the spyware is completely eradicated. Kaspersky antivirus software is available in PC and Android versions to ensure the security of all your devices.

So incase if you ever been cyber stalked you have to do all those things which are given below

  1. Make it clear to the cyber bully that you do not want to be contacted. Write it down and warn them, if they continue, you will call the police. Once they have issued this warning, do not interact with them.
  2. Do not hesitate to take all measures allowed by law, especially those provided by network services. If the tools are there, stop anyone who wants to stop listening, even if the messages are just plain annoying and don’t pose a threat yet. Only you can decide when to go over this limit.
  3. In the case of social media harassment, use your privacy settings to block the person, and then report the abuse to the network. You can easily learn how to report cyber bullying on most social media help and support pages.
  4. If you think your actions are illegal or worry about your safety, you should contact the police and report cyber bullying. Even if they do not have enough information or evidence for them to deal with it immediately, the report will be recorded, and if the perpetrator insists, the police can advise on what to do.

Aishwarya Says:

I have always been against Glorifying Over Work and therefore, in the year 2021, I have decided to launch this campaign “Balancing Life”and talk about this wrong practice, that we have been following since last few years. I will be talking to and interviewing around 1 lakh people in the coming 2021 and publish their interview regarding their opinion on glamourising Over Work.

If you are interested in participating in the same, do let me know.

Do follow me on FacebookTwitter  Youtube and Instagram.

The copyright of this Article belongs exclusively to Ms. Aishwarya Sandeep. Reproduction of the same, without permission will amount to Copyright Infringement. Appropriate Legal Action under the Indian Laws will be taken.

If you would also like to contribute to my website, then do share your articles or poems at

We also have a Facebook Group Restarter Moms for Mothers or Women who would like to rejoin their careers post a career break or women who are enterpreneurs.

We are also running a series Inspirational Women from January 2021 to March 31,2021, featuring around 1000 stories about Indian Women, who changed the world. #choosetochallenge

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.