Cyberbullying Services

What is Cyberbullying?Cyberbullying

Cyberbullying is the use of Information Technology to harm or harass other people in a deliberate, repeated, and hostile manner. Information technology includes devices and equipment such as cell phones, computers, and tablets in addition to, communication tools including social media sites, text messages, chat, and websites.

With the increase in use of these technologies, Cyberbullying has become increasingly common, especially among teenagers. Cyberbullying has a psychological and emotional effect on the victim that scars an individual for life, impacts their social profile and life, and may potentially lead to consideration of self-harm, depression, aggression, and/or suicide.

 

Cyberbullying Criminology

Criminology refers to the scientific behavioural study (sociology and psychology) of the nature, causation, correction and prevention of a crime.  It’s about theories that suggest why crimes are committed.  Cyberbullying and cybestalking  crimes are committed with the use of technology, typically through the internet; therefore, an understanding of the differences between societies and cultures plays a role in determining what is criminal activity and what is not. Criminology is also concerned with the social impact and reactions to the crime from the public, as well as from the criminal.

 

Cyberbullying Victimology

Victimology  is the  in-depth study of all information related to the victim.  This not only refers to physical characteristics (sex, age, height, weight, etc.) but personal traits (education, employment, residence, etc.) and information on their lifestyle (habits, hobbies, medical history, family, etc.).  Determining the victim’s characteristics can assist investigators in identifying and revealing a cyberstalker and why they chose a specific victim, as well as the risks the offender is willing to take to stalk the victim.  It’s this stage in an investigation where the victim-offender relationship is established and determination of where additional digital evidence may be discovered.

 

Our Techniques and MethodologyInfotransec lock

At InfoTransec, we have developed Standard Operating Procedures (SOP) for the acquisition, authentication, and analysis of digital evidence (AAA) following criteria specified by the Scientific Working Group on Digital Evidence (SWGDE) as well as, following International Organization on Computer Evidence (IOCE) principles. 

Digital evidence begins with the acquisition of information and/or physical items collected or stored for examination purposes. At InfoTransec, the acquisition of data is the first stage of a proper and successful investigation.  We use standard tools that can intercept the communications between an alleged victim and their cyberstalker.  The information collected can be emailed to the parents if the victim is a minor or directly to the victim’s email account.

Our expert Digital Investigation  (DI) team can then authenticate the evidence acquired directly from live or offline devices following computer forensics rules and regulations resulting in fully admissible digital evidence investigation and report in any North American justice system. We are well established to undertake any type of investigation you require.

Our services are ideal for clients including:
  • Private Individuals
  • Legal Firms
  • Government Services including Police and education
  • Human Resources Departments
Contact us today for a free consultation.