A Practical Guide to Coping with Cyberstalking by National Centre for Cyberstalking Research
Author:National Centre for Cyberstalking Research
Language: eng
Format: epub
Tags: Stalking, cyberstalking, cyberbullying, online addiction PTSD, digital forensics, cyber security, online security, social engineering, health and well-being, self help, police
ISBN: 9781785381737
Publisher: Andrews UK Limited 2015
Published: 2015-04-20T00:00:00+00:00
Chapter 8
A Structured Approach for Locating and Removing Your Personal Information from the World Wide Web
Marcia Gibson & Antony Brown
As we have seen, controlling your online presence is an important part of keeping yourself safe and this chapter will take you through practical steps to help you in finding out what information about you is already available on the Web and what you can do about it. It is important to note, if you are already receiving online threats or harassment, before taking the steps in this chapter, you should first contact the police (see the other chapters in this book for guidance on what to do in these situations). However, you may simply want to reduce the risk of becoming the target of online abuse in the outset, or want to be able to limit the spread and impact of attacks that are already being directed toward you. After reading the scenarios in the previous chapter 7, perhaps you have done some digging and have found there is more information available about you online than you are comfortable with or that outdated information about you is listed that you would prefer to be removed.
Locating information about yourself
The easiest way to do this is to use search engines to look for yourself. It is important to remember that most people will share their name with a number of people around the world, so when searching try adding additional details to make sure you are only getting results that actually relate to you. Search for your name and add another piece of information such as the town you live in, the place you work, your address, email or your phone number. This will give you an idea of the information that is available to other people searching for you.
A useful tool to aid in determining your online presence is provided by Google, in the form of a Google Alert. You can set this up at: https://www.google.com/alerts
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6850)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6848)
Running Windows Containers on AWS by Marcio Morales(6375)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5075)
Combating Crime on the Dark Web by Nearchos Nearchou(4650)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4625)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4339)
The Age of Surveillance Capitalism by Shoshana Zuboff(3981)
Python for Security and Networking - Third Edition by José Manuel Ortega(3900)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3559)
Learn Wireshark by Lisa Bock(3539)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3356)
Blockchain Basics by Daniel Drescher(3327)
