The DIVA Dictionary

A comprehensive glossary of terms related to online safety and abuse.

TermDefinitionCategory
Technology-Facilitated Abuse (TFA)The overarching term for any form of abuse, harassment, or control that uses digital technology as a tool.Core Concepts
Technology-Facilitated Gender-Based Violence (TFGBV)A specific form of TFA that targets individuals based on their gender, often using misogynistic narratives and tactics.Core Concepts
Technology-Facilitated Violence Against Women and Girls (TFVAWG)A subset of TFGBV focusing specifically on the experiences of women and girls.Core Concepts
Cyberviolence Against Women and Girls (CVAWG)A specific form of Technology-Facilitated Gender-Based Violence (TFGBV) focusing on the experiences of women and girls.Core Concepts
Online Gender-Based Violence (OGBV)Violence directed at individuals based on their gender that occurs online.Core Concepts
Digital ViolenceA general, often interchangeable term for harmful behaviors conducted using technology.Core Concepts
Cyber ViolenceA general, often interchangeable term for harmful behaviors conducted using technology.Core Concepts
Online AbuseA general term for any form of abuse, harassment, or control that uses digital technology as a tool.Core Concepts
Cyber AbuseA general term for any form of abuse, harassment, or control that uses digital technology as a tool.Core Concepts
Tech-Enabled AbuseA general term for any form of abuse, harassment, or control that uses digital technology as a tool.Core Concepts
Tech-Based AbuseA general term for any form of abuse, harassment, or control that uses digital technology as a tool.Core Concepts
Digital AbuseA general term for any form of abuse, harassment, or control that uses digital technology as a tool.Core Concepts
Online HarmsA broad term used by governments and platforms to describe a wide range of negative online content and behaviors.Legal & Policy
Technology-Facilitated Coercive ControlUsing technology to monitor, control, and isolate a current or former partner.Core Concepts
Technology-Facilitated Domestic AbuseThe use of technology as part of a pattern of domestic abuse.Core Concepts
Digital Coercive ControlUsing technology to monitor, control, and isolate a current or former partner. Also known as Technology-Facilitated Coercive Control.Core Concepts
CyberstalkingThe use of the internet or other electronic means to stalk or harass an individual, often involving monitoring their online activity, location, and communications.Core Concepts
Online StalkingThe use of the internet or other electronic means to stalk or harass an individual.Core Concepts
CyberbullyingThe use of digital technology to threaten, harass, embarrass, or target another person. It can occur on social media, in games, or through messaging apps.Youth-Focused
Online HarassmentA broad category of behaviors that use technology to target and distress an individual. Also known as Digital Harassment or Electronic Harassment.Core Concepts
Digital HarassmentA broad category of behaviors that use technology to target and distress an individual. Also known as Online Harassment or Electronic Harassment.Core Concepts
Electronic HarassmentA broad category of behaviors that use technology to target and distress an individual. Also known as Online Harassment or Digital Harassment.Core Concepts
Image-Based AbuseThe non-consensual creation, sharing, or threat of sharing of intimate or nude images. Also known as Image-Based Sexual Abuse (IBSA).Core Concepts
Non-Consensual Intimate Image SharingA specific form of Image-Based Abuse where intimate images are shared without the consent of the person pictured. Also known as NCII.Legal & Policy
Non-Consensual PornographyA term for sharing intimate images without the consent of the person pictured. See also Image-Based Abuse.Legal & Policy
Revenge PornAn outdated term for sharing intimate images without the consent of the person pictured. The motive is not always revenge, which is why terms like Image-Based Abuse are now preferred.Legal & Policy
SextortionA form of blackmail where a perpetrator threatens to distribute a victim's intimate images unless they provide more images, money, or sexual favors.Core Concepts
Sexual Image ExploitationUsing technology to sexually exploit someone, which can include grooming, sextortion, or human trafficking.Youth-Focused
DoxingShort for 'dropping docs,' this is the act of researching and broadcasting private or identifying information about an individual or organization to the public without their permission, often with malicious intent.Core Concepts
DoxxingAn alternative spelling for 'Doxing.'Core Concepts
Online ImpersonationCreating a fake profile or accessing someone's real account to pretend to be them, often to damage their reputation or trick others.Core Concepts
Digital ImpersonationCreating a fake profile or accessing someone's real account to pretend to be them, often to damage their reputation or trick others.Core Concepts
Identity MisuseStealing someone's identity not for financial gain, but to use it to harass them or others.Core Concepts
Deepfake AbuseUsing artificial intelligence to create realistic but fake explicit videos or images of a person without their consent. Also known as Deepfake Pornography, Synthetic Image Abuse, or AI-Generated Sexual Abuse.AI & Emerging Tech
Deepfake PornographyUsing artificial intelligence to create realistic but fake explicit videos or images of a person without their consent. Also known as Deepfake Pornography, Synthetic Image Abuse, or AI-Generated Sexual Abuse.AI & Emerging Tech
Synthetic Image AbuseUsing artificial intelligence to create realistic but fake explicit videos or images of a person without their consent. See also Deepfake Abuse.AI & Emerging Tech
AI-Generated Sexual AbuseUsing artificial intelligence to create realistic but fake explicit videos or images of a person without their consent. See also Deepfake Abuse.AI & Emerging Tech
CyberflashingSending someone sexually explicit images or videos they did not ask for or consent to receiving.Core Concepts
Unsolicited Explicit ImagesSending someone sexually explicit images or videos they did not ask for or consent to receiving. See also Cyberflashing.Core Concepts
Online Hate SpeechPublicly directing abusive or threatening speech at individuals or groups.Core Concepts
Gendered Hate SpeechPublicly directing abusive or threatening speech at individuals or groups, specifically targeting them based on their gender.Core Concepts
Online ThreatsMaking explicit threats of violence against someone online.Core Concepts
Digital ThreatsMaking explicit threats of violence against someone online.Core Concepts
Rape Threats OnlineThreats of rape made against LGBTQ+ individuals with the stated aim of "correcting" their sexual orientation or gender identity.LGBTQIA+ Specific
Death Threats OnlineMaking explicit threats of violence against someone online.Core Concepts
Harassment via MessagingOverwhelming a person with a large volume of unwanted messages. Also known as Abusive Text Bombing or Message Flooding.Platform-Specific
Abusive Text BombingOverwhelming a person with a large volume of unwanted messages. Also known as Abusive Text Bombing or Message Flooding.Platform-Specific
Message FloodingOverwhelming a person with a large volume of unwanted messages. Also known as Abusive Text Bombing.Platform-Specific
DogpilingWhen a large group of people coordinate to harass a single target online. Also known as Pile-On Harassment or Coordinated Harassment.Core Concepts
Pile-On HarassmentWhen a large group of people coordinate to harass a single target online. Also known as Dogpiling.Core Concepts
Coordinated HarassmentWhen a large group of people coordinate to harass a single target online. Also known as Dogpiling or Pile-On Harassment.Core Concepts
Targeted Harassment CampaignsCoordinated efforts by a group to harass a specific individual online.Core Concepts
DefamationSpreading false information about someone online to damage their reputation. Also known as Online Defamation, Cyber Defamation, Reputation Attacks, or Smear Campaigns.Core Concepts
Online DefamationSpreading false information about someone online to damage their reputation. Also known as Online Defamation, Cyber Defamation, Reputation Attacks, or Smear Campaigns.Core Concepts
Cyber DefamationSpreading false information about someone online to damage their reputation. Also known as Online Defamation, Cyber Defamation, Reputation Attacks, or Smear Campaigns.Core Concepts
Reputation AttacksSpreading false information about someone online to damage their reputation. Also known as Online Defamation, Cyber Defamation, Reputation Attacks, or Smear Campaigns.Core Concepts
Smear CampaignsA coordinated effort to damage someone's reputation by spreading false and malicious information online.Core Concepts
Cyber HateThe expression of hatred towards individuals or groups online.Core Concepts
Gendered DisinformationSpreading false or misleading information specifically designed to harm women or promote misogynistic ideas.Core Concepts
Malicious Rumour SpreadingIntentionally spreading false and harmful rumors about someone online.Core Concepts
Slut-Shaming OnlineAttacking and shaming women and girls for their real or perceived sexual behavior.Core Concepts
Victim-Blaming OnlineBlaming the victim of an attack or crime for what happened to them, rather than the perpetrator.Core Concepts
TrollingThe act of deliberately posting inflammatory or off-topic comments with the main goal of provoking an emotional response or disrupting a conversation for the troll's amusement.Core Concepts
Gendered TrollingA form of trolling that specifically uses misogynistic or gender-based insults to provoke a reaction.Core Concepts
FlamingThe act of posting inflammatory or offensive comments to provoke an emotional response, often as part of Trolling.Core Concepts
Cyber MobbingA coordinated effort by a group to harass a specific individual online.Core Concepts
Stalking via Location TrackingUsing technology like GPS or location-sharing apps to monitor someone's movements without their consent.Core Concepts
Digital SurveillanceUsing technology like GPS or location-sharing apps to monitor someone's movements without their consent.Core Concepts
Intimate Partner SurveillanceUsing technology to monitor a current or former partner's location, communications, or online activity without consent.Core Concepts
GPS Tracking AbuseUsing technology like GPS or location-sharing apps to monitor someone's movements without their consent.Core Concepts
Location Tracking AbuseUsing technology like GPS or location-sharing apps to monitor someone's movements without their consent.Core Concepts
SpywareSoftware secretly installed on a person's device to monitor their activity, including calls, messages, location, and app usage. Also known as Stalkerware.Platform-Specific
StalkerwareSoftware secretly installed on a person's device to monitor their activity. A form of spyware often used in cases of intimate partner surveillance.Platform-Specific
Tracking AppsSoftware secretly installed on a person's device to monitor their activity, including calls, messages, location, and app usage. Also known as Stalkerware.Platform-Specific
Hidden Tracking DevicesUsing small physical devices like Apple AirTags or Tiles to secretly track a person's location.Platform-Specific
Account Monitoring Without ConsentGaining access to and monitoring someone's email, social media, or other online accounts without their permission. Also known as Unauthorized Account Access.Core Concepts
Unauthorized Account AccessGaining access to and monitoring someone's email, social media, or other online accounts without their permission.Core Concepts
IoT AbuseUsing internet-connected "smart" devices (like speakers, thermostats, or locks) to control, harass, or monitor someone. Also known as Smart Home Abuse.Platform-Specific
Smart Home AbuseUsing internet-connected "smart" devices (like speakers, thermostats, or locks) to control, harass, or monitor someone. Also known as IoT Abuse.Platform-Specific
Connected Device AbuseUsing internet-connected "smart" devices (like speakers, thermostats, or locks) to control, harass, or monitor someone. Also known as IoT (Internet of Things) Abuse or Smart Home Abuse.Platform-Specific
Access Control AbuseUsing technology to monitor, control, and isolate a current or former partner.Core Concepts
Password CoercionForcing someone to hand over their passwords. A form of Forced Account Access.Core Concepts
Password TheftStealing someone's password to gain unauthorized access to their accounts.Core Concepts
Forced Account AccessForcing someone to hand over their passwords or stealing them to gain control of their digital life.Core Concepts
Digital IsolationUsing technology to cut someone off from their friends, family, and support networks.Core Concepts
Communication BlockingUsing technology to cut someone off from their friends, family, and support networks. A form of Digital Isolation.Core Concepts
Social Media IsolationUsing social media to cut someone off from their friends and support networks. A form of Digital Isolation.Core Concepts
Information and Communication Technologies Abuse (ICT Abuse)A formal term for using any information or communication technology for abusive purposes.Legal & Policy
Platform-Facilitated AbuseAbuse that is enabled or made easier by the features of a specific social media platform or app.Platform-Specific
App-Based AbuseA general term for abuse that occurs through a specific mobile application.Platform-Specific
Online Privacy InvasionThe unauthorized collection, use, or sharing of someone's personal data.Core Concepts
Digital Privacy ViolationsThe unauthorized collection, use, or sharing of someone's personal data.Core Concepts
Data-Enabled AbuseUsing data collected about a person, even if they don't have a profile on a platform, to target them with abuse.Platform-Specific
Digital CoercionUsing technology to pressure or force someone into doing something they don't want to do.Core Concepts
Online CoercionUsing technology to pressure or force someone into doing something they don't want to do.Core Concepts
Offline Escalation of Online AbuseWhen online threats or harassment lead to real-world violence or stalking.Core Concepts
Algorithmic HarassmentWhen a platform's algorithms unintentionally promote and spread harassing content, making it more visible. Also known as Algorithmic Harassment.AI & Emerging Tech
Algorithmic Amplification of AbuseWhen a platform's algorithms unintentionally promote and spread harassing content, making it more visible. Also known as Algorithmic Harassment.AI & Emerging Tech
Online Dating AbuseAbusive or harassing behavior that occurs on or is facilitated by dating apps.Platform-Specific
Dating App HarassmentAbusive or harassing behavior that occurs on or is facilitated by dating apps.Platform-Specific
Digital Power and ControlThe use of technology to exert power and control over another person, a key element of domestic abuse.Core Concepts
Tech-Enabled ControlThe use of technology to exert power and control over another person, a key element of domestic abuse.Core Concepts
Online GroomingBuilding an emotional connection with a young person online to gain their trust for the purpose of sexual exploitation.Youth-Focused
Sexual Grooming OnlineBuilding an emotional connection with a young person online to gain their trust for the purpose of sexual exploitation.Youth-Focused
Online Defamation CampaignsCoordinated efforts to destroy someone's reputation online using false information.Core Concepts
Non-Consensual Distribution of Intimate ContentA formal term for sharing intimate images or videos without consent.Legal & Policy
Threatened Distribution of Intimate ImagesThreatening to share someone's private images, a common tactic in sextortion and coercive control.Core Concepts
Sexual Exploitation via ICTUsing technology to sexually exploit someone, which can include grooming, sextortion, or human trafficking.Youth-Focused
Online Sexual ExploitationUsing technology to sexually exploit someone, which can include grooming, sextortion, or human trafficking.Youth-Focused
Psychological Abuse OnlineUsing technology to cause emotional or psychological harm.Core Concepts
Emotional Abuse via TechnologyUsing technology to cause emotional or psychological harm.Core Concepts
Economic Abuse via TechnologyUsing technology to control someone's finances, such as by restricting access to online banking or running up debt in their name. A form of Economic Abuse.Core Concepts
Financial Control Through TechUsing technology to control someone's finances, such as by restricting access to online banking or running up debt in their name. A form of Economic Abuse.Core Concepts
Technological HarassmentA general term for harassment using any form of technology.Core Concepts
Account TakeoverGaining unauthorized control of someone's online account. Also known as Account Hijacking or Profile Hacking.Platform-Specific
Account HijackingGaining unauthorized control of someone's online account. Also known as Account Takeover or Profile Hacking.Platform-Specific
Profile HackingGaining unauthorized control of someone's online account. Also known as Account Takeover.Platform-Specific
Forced Surveillance of ChildrenUsing tracking apps to excessively monitor a teenager's movements and activities after school.Youth-Focused
Fake Online ProfilesCreating a fake online identity to deceive someone, often for a relationship or financial gain. See also Catfishing.Core Concepts
CatfishingThe act of creating a fake online identity to deceive someone into a relationship. This is often done for personal gain, to cause emotional distress, or for malicious purposes.Core Concepts
Malicious Sharing of Private MessagesScreenshotting and sharing private conversations without consent to embarrass or harm someone.Platform-Specific
Threat to Publish Personal DataThreatening to reveal private information or doxing them. Also known as Dox-Threats.Core Concepts
OutingThe act of revealing private information about someone, such as their sexual orientation, without their consent.LGBTQIA+ Specific
Dox-ThreatsThreatening to reveal private information or doxing them. Also known as Dox-Threats.Core Concepts
Platform Algorithm AbuseExploiting platform algorithms to specifically target an individual with a barrage of negative content or harassment.AI & Emerging Tech
Cybersex TraffickingA form of human trafficking that uses technology to recruit, groom, and sexually exploit victims online.Legal & Policy
Livestreamed Sexual ExploitationBroadcasting sexual exploitation in real-time online.Youth-Focused
Malware-Based SurveillanceSoftware secretly installed on a person's device to monitor their activity, including calls, messages, location, and app usage. Also known as Stalkerware.Platform-Specific
Device CompromiseGaining unauthorized control of someone's computer or phone to terrorize or surveil them. Also known as Device Takeover.Platform-Specific
Online Abuse LegislationLaws and statutes designed to address various forms of online abuse.Legal & Policy
Digital Rights ViolationsActions online that violate a person's established rights, such as the right to privacy or freedom from harassment.Legal & Policy
Data Protection ViolationsBreaches of laws that are designed to protect an individual's privacy from intrusion by state or private actors.Legal & Policy
Cybercrime Against IndividualsLaws that deal with crimes that are committed on the internet or a computer network.Legal & Policy
Platform Safety PolicyThe features provided by platforms to help users stay safe, such as blocking and reporting tools.Platform-Specific
Content Moderation AbuseCoordinated campaigns to falsely report a user's account to get it suspended. Also known as Mass Reporting Attacks.Platform-Specific
Platform Reporting EvasionTactics used by abusers to avoid being detected or penalized by a platform's content moderation systems.Platform-Specific
Safety by DesignAn approach to building apps and platforms where user safety is a core consideration from the very beginning of the design process.Platform-Specific
Digital Harm MetricsA broad term used by governments and platforms to describe a wide range of negative online content and behaviors.Legal & Policy
Online Abuse PrevalenceA broad term used by governments and platforms to describe a wide range of negative online content and behaviors.Legal & Policy
Intersectional Online AbuseAbuse that targets an individual based on multiple, intersecting aspects of their identity (e.g., race, gender, and sexual orientation).Cultural & Regional
Digital Abuse ContinuumA broad category of behaviors that use technology to target and distress an individual. Also known as Online Harassment or Electronic Harassment.Core Concepts
Online MisogynyOnline abuse that is rooted in the hatred of women. Also known as Cybersexism.Core Concepts
CybersexismOnline abuse that is rooted in the hatred of women. Also known as Online Misogyny.Core Concepts
Online Gender TrollingA form of trolling that specifically uses misogynistic or gender-based insults to provoke a reaction.Core Concepts
Digital Patriarchal AbuseA specific form of TFA that targets individuals based on their gender, often using misogynistic narratives and tactics.Core Concepts
Sexual Identity Harassment OnlineForms of online abuse targeting individuals based on their sexual or gender identity.LGBTQIA+ Specific
Transphobic Online AbuseForms of online abuse targeting individuals based on their gender identity.LGBTQIA+ Specific
Homophobic Cyber AbuseForms of online abuse targeting individuals based on their sexual orientation.LGBTQIA+ Specific
Racist Online AbuseForms of online abuse targeting individuals based on their race.Cultural & Regional
Gendered Online RidiculeMocking or ridiculing someone online in a way that specifically targets their gender.Core Concepts
Algorithmic Bias in Abuse SpreadHow algorithms can be biased and unintentionally spread abuse targeting certain groups more than others.AI & Emerging Tech
Geo-location ExploitationUsing the location data (geotags) in photos or posts to find and harass a person in the real world.Platform-Specific
Platform ExploitationAbuse that is enabled or made easier by the features of a specific social media platform or app.Platform-Specific
Online Psychological ManipulationUsing technology to cause emotional or psychological harm.Core Concepts
Gaslighting via TechnologyUsing technology to manipulate someone into questioning their own sanity or reality.Core Concepts
Identity Theft for AbuseStealing someone's identity not for financial gain, but to use it to harass them or others.Core Concepts
Threat Messaging Across ChannelsHarassing a target across multiple different platforms simultaneously.Platform-Specific
Cross-Platform HarassmentHarassing a target across multiple different platforms simultaneously.Platform-Specific
Image Manipulation AbuseAltering someone's photo to be humiliating or sexually explicit, often known as "Photoshopped" sexual images.AI & Emerging Tech
Photoshopped Sexual ImagesAltering someone's photo to be humiliating or sexually explicit. A form of Image Manipulation Abuse.AI & Emerging Tech
Non-Consensual Identity SharingRevealing someone's personal details without their consent.Core Concepts
Digital ExclusionThe act of deliberately and publicly leaving someone out of an online group, conversation, or event, causing them to feel isolated. Also known as Exclusion or Online Shunning.Core Concepts
Online ShunningDeliberately excluding someone from online social groups. A form of Digital Exclusion.Core Concepts
Mobile Device AbuseUsing a person's mobile phone as a tool for abuse, such as by monitoring it or controlling their access to it.Platform-Specific
Digital Surveillance CultureThe gradual expansion of AI-powered surveillance into more areas of public and private life.AI & Emerging Tech
Digital Safety PlanningThe process of creating a plan to increase one's safety online, especially when experiencing abuse.Core Concepts
Online Safety ToolsThe features provided by platforms to help users stay safe, such as blocking and reporting tools.Platform-Specific
Platform Blocking ToolsThe features provided by platforms to help users stay safe, such as blocking and reporting tools.Platform-Specific
Online Reporting SystemsThe features provided by platforms to help users stay safe, such as blocking and reporting tools.Platform-Specific
Digital Literacy for SafetyEducation focused on providing the skills and knowledge needed to navigate the digital world safely. Also known as ICT Safety Education.Youth-Focused
ICT Safety EducationEducation focused on providing the skills and knowledge needed to navigate the digital world safely. Also known as ICT Safety Education.Youth-Focused
Legal Remedies for Online AbuseNon-criminal legal options for victims of online abuse, such as suing for damages or seeking an injunction.Legal & Policy
Digital ResilienceThe ability to cope with and recover from negative experiences online.Core Concepts
Behavioral Tracking AbuseMisusing advertising technology or behavioral tracking for stalking or harassment.Workplace & Professional
Ad Tech MisuseMisusing advertising technology or behavioral tracking for stalking or harassment.Workplace & Professional
Fake News HarassmentSpreading false or misleading information specifically designed to harm women or promote misogynistic ideas.Core Concepts
Disinformation for HarassmentSpreading false or misleading information specifically designed to harm women or promote misogynistic ideas.Core Concepts
Coercive MessagingUsing messaging apps to control or coerce someone.Core Concepts
Data Misuse for HarmThe unauthorized collection, use, or sharing of someone's personal data.Core Concepts
Content Manipulation AbuseAltering content to be harmful or misleading.AI & Emerging Tech
User Profile HijackingTaking control of someone's user profile.Platform-Specific
Unwanted Sexual SolicitationRepeatedly sending unwanted sexual messages or requests.Core Concepts
Networked HarassmentHarassment that leverages a network of people or accounts.Core Concepts
Bot-Driven HarassmentUsing automated bots to send large volumes of harassing messages. Also known as Automated Abuse.AI & Emerging Tech
Automated AbuseUsing automated bots to send large volumes of harassing messages. Also known as Bot-Driven Harassment.AI & Emerging Tech
Social Engineering AbuseThe psychological manipulation of people into performing actions or divulging confidential information. Phishing and baiting are common forms.General & Technical
Phishing for AbuseA social engineering tactic where a scammer tricks someone into giving up their login details, which are then used to take over accounts for abuse rather than financial gain.General & Technical
Encoded ThreatsSending threats hidden in coded language, memes, or emojis.Core Concepts
Threat AmplificationUsing social media to make a threat more visible and widespread.Platform-Specific
Public Records AbuseUsing publicly available records to find information for doxing or harassment.Core Concepts
Platform Policy EvasionTactics used by abusers to avoid being detected or penalized by a platform's content moderation systems.Platform-Specific
Anonymous AbuseUsing anonymity to send abusive or threatening content, often to evade platform policies.Core Concepts
Anonymous ThreateningUsing anonymity to send abusive or threatening content, often to evade platform policies.Core Concepts
Cross-Border Online AbuseInternational agreements and cooperation between law enforcement agencies to tackle cybercrime that spans multiple countries.Legal & Policy
Peer-to-Peer Abuse SharingAbuse that occurs between peers, often in a school or social context, using digital technology.Youth-Focused
Media StalkingStalking someone by obsessively monitoring their media appearances, interviews, and social media.Core Concepts
Digital ExtortionThreatening to release embarrassing or compromising deepfake videos or images unless a ransom is paid.AI & Emerging Tech
Account CloningCreating a copy of someone's social media profile to trick their friends or damage their reputation. Also known as Profile Cloning.Platform-Specific
Profile CloningCreating a copy of someone's social media profile to trick their friends or damage their reputation. Also known as Account Cloning.Platform-Specific
Online Reputation SabotageA deliberate campaign to ruin someone's reputation online.Workplace & Professional
Persistent Identity HarassmentA deliberate campaign to ruin someone's reputation online.Workplace & Professional
Shadow Profile AbuseUsing data collected about a person, even if they don't have a profile on a platform, to target them with abuse.Platform-Specific
Platform Algorithm ExploitationExploiting platform algorithms to specifically target an individual with a barrage of negative content or harassment.AI & Emerging Tech
Device TakeoverGaining remote control of someone's computer or phone to terrorize or surveil them. Also known as Device Takeover.Platform-Specific
Remote Device Control AbuseGaining remote control of someone's computer or phone to terrorize or surveil them. Also known as Device Takeover.Platform-Specific
Non-Consensual RecordingRecording or capturing someone's conversations or activities without their consent. Also known as Voyeuristic Recording or Eavesdropping Abuse.Core Concepts
Voyeuristic RecordingRecording or capturing someone's conversations or activities without their consent.Core Concepts
Eavesdropping AbuseRecording or capturing someone's conversations or activities without their consent.Core Concepts
Screen Capture AbuseCapturing images or video of someone's screen without their consent.Core Concepts
Cloud Storage AbuseGaining unauthorized access to someone's cloud storage (like Google Drive or iCloud) to steal private files.Platform-Specific
Shared Network AbuseAbusing a shared Wi-Fi network to monitor or intercept another user's traffic.Core Concepts
Child Sexual Abuse Material DistributionThe illegal sharing of child sexual abuse material (CSAM).Youth-Focused
Online Child GroomingUsing a fake identity or false pretences to groom a child online.Youth-Focused
Solicitation Under False PretencesUsing a fake identity or false pretences to groom a child online.Youth-Focused
Threatened Disclosure of CommunicationsThreatening to share someone's private images, a common tactic in sextortion and coercive control.Core Concepts
Public Exposure of Private InformationThe act of revealing private information about someone, such as their sexual orientation, without their consent.LGBTQIA+ Specific
Coordinated Account Reporting AbuseCoordinated campaigns to falsely report a user's account to get it suspended. Also known as Mass Reporting Attacks.Platform-Specific
Mass Reporting AttacksCoordinated campaigns to falsely report a user's account to get it suspended. Also known as Coordinated Account Reporting Abuse.Platform-Specific
Privileged Account MisuseUsing legitimate access to a system (e.g., as a system administrator) to abuse or harass someone.Workplace & Professional
Impersonation for BlackmailImpersonating someone to gather information that can then be used for blackmail.Core Concepts
Unauthorized Cloud AccessGaining unauthorized access to someone's cloud storage.Platform-Specific
Unauthorized Device LinkingLinking a new device to someone's account without their permission in order to gain access.Platform-Specific
Biometric Data AbuseMisusing someone's biometric data, like their fingerprint or face, for malicious purposes.AI & Emerging Tech
Facial Recognition AbuseMisusing facial recognition technology for malicious purposes, such as stalking or harassment.AI & Emerging Tech
Deepfake Voice AbuseUsing AI to clone a person's voice for harassment, fraud, or creating fake audio evidence.AI & Emerging Tech
Synthetic Voice ScamsUsing AI to clone someone's voice for harassment or scams. Also known as Deepfake Voice Abuse.AI & Emerging Tech
Virtual Reality HarassmentHarassment that takes place in virtual reality environments, often involving unwanted virtual touching or sexual advances towards a user's avatar.AI & Emerging Tech
Metaverse Sexual HarassmentHarassment that takes place in virtual reality environments, often involving unwanted virtual touching or sexual advances towards a user's avatar.AI & Emerging Tech
Avatar-Based HarassmentHarassment that takes place in virtual reality environments, often involving unwanted virtual touching or sexual advances towards a user's avatar.AI & Emerging Tech
Emoji Threat MessagingUsing emojis in a combination that implies a violent threat.Platform-Specific
Meme-Based HarassmentCreating and spreading memes to mock, harass, or spread disinformation about a person.Platform-Specific
Hashtag Harassment CampaignsHijacking a hashtag or creating a new one to coordinate harassment against a target.Platform-Specific
Livestream HarassmentHarassing someone during a live video stream.Platform-Specific
SwattingDeceiving emergency services into sending a police and emergency service response team to another person's address, a dangerous and illegal form of harassment.Platform-Specific
Digital VigilantismWhen online mobs publicly shame a person they believe has done something wrong, often without due process.Cultural & Regional
Crowdsourced HarassmentWhen a large group of people coordinate to harass a single target online. Also known as Dogpiling or Pile-On Harassment.Core Concepts
Online Incitement to ViolenceUsing online platforms to encourage others to commit acts of violence.Core Concepts
Gendered Cyber IncitementUsing online platforms to encourage others to commit acts of violence.Core Concepts
Digital Stalking TrailsThe use of the internet or other electronic means to stalk or harass an individual, often involving monitoring their online activity, location, and communications.Core Concepts
Metadata AbuseUsing the metadata in files (data about data, such as when a photo was taken) and posts to track and stalk someone.Core Concepts
Data Scraping for HarassmentAutomatically collecting large amounts of data from social media profiles to use for harassment.AI & Emerging Tech
Contact List AbuseGaining access to someone's contact list and harassing their friends, family, or colleagues.Core Concepts
Subscription BombingSigning a person up for thousands of unwanted email lists, text messages, or services to overwhelm their inbox and notifications.Platform-Specific
Email BombingSigning a person up for thousands of unwanted email lists or services to overwhelm their inbox. A form of Subscription Bombing.Platform-Specific
Notification BombingSigning a person up for thousands of unwanted services to overwhelm their notifications. A form of Subscription Bombing.Platform-Specific
Ride-Share Tracking AbuseAbusing features in ride-sharing apps to track a person's movements.Platform-Specific
AirTag StalkingUsing small physical devices like Apple AirTags or Tiles to secretly track a person's location.Platform-Specific
Bluetooth Tracking AbuseUsing small physical tracking devices that use Bluetooth (like AirTags) to secretly track a person's location.Platform-Specific
AI-Enabled AbuseUsing artificial intelligence to automate, scale, or enhance abusive behaviors online.AI & Emerging Tech
AI-Facilitated Gender-Based ViolenceThe use of AI tools to perpetrate violence targeting individuals based on their gender.AI & Emerging Tech
AI-Generated Intimate ImagesCreating non-consensual explicit images of individuals using generative AI. Also known as Synthetic Sexual Imagery.AI & Emerging Tech
Synthetic Sexual ImageryFake explicit images created with AI, often of real people without their consent.AI & Emerging Tech
Deepfake Image AbuseUsing deepfake technology to create abusive or harmful images of a person.AI & Emerging Tech
Deepfake Video AbuseUsing deepfake technology to create abusive or harmful videos of a person.AI & Emerging Tech
Voice Cloning HarassmentHarassing someone by using an AI-cloned version of their voice.AI & Emerging Tech
Synthetic Media AbuseThe use of any AI-generated or manipulated media (video, audio, image) for abusive purposes.AI & Emerging Tech
Generative AI HarassmentUsing generative AI models (like text or image generators) to create and disseminate harassing content.AI & Emerging Tech
AI ImpersonationUsing AI to mimic someone's writing style, voice, or likeness to impersonate them online.AI & Emerging Tech
AI Identity FraudUsing AI to create fake identities or steal real ones for fraudulent purposes.AI & Emerging Tech
Chatbot-Enabled GroomingUsing conversational AI to engage in grooming behaviors with a young person.AI & Emerging Tech
AI-Assisted SextortionUsing AI-generated explicit images as leverage in sextortion schemes.AI & Emerging Tech
Automated Intimate Image GenerationUsing AI bots or scripts to automatically generate non-consensual intimate images of people.AI & Emerging Tech
Text-to-Image AbuseUsing text prompts in AI image generators to create harmful, harassing, or non-consensual images.AI & Emerging Tech
Text-to-Voice ImpersonationUsing text-to-speech AI to clone and impersonate a person's voice.AI & Emerging Tech
Synthetic Nude GenerationThe use of AI to create fake nude images of individuals. Also known as "undress AI abuse".AI & Emerging Tech
Undress AI AbuseUsing AI applications to digitally remove clothing from images of people, creating non-consensual fake nudes.AI & Emerging Tech
AI-Driven DoxingUsing AI tools to rapidly collect and publish someone's private information.AI & Emerging Tech
AI-Enhanced SurveillanceUsing AI to analyze data from multiple sources for the purpose of large-scale surveillance.AI & Emerging Tech
Predictive Tracking AbuseUsing AI to predict a person's future location or behavior for the purpose of stalking.AI & Emerging Tech
Facial Recognition StalkingUsing facial recognition technology to identify and stalk individuals from images or videos.AI & Emerging Tech
Facial Recognition DoxingUsing facial recognition to identify a person from an image and then publishing their personal information.AI & Emerging Tech
Emotion Recognition ExploitationUsing AI to analyze and exploit a person's emotional state for manipulation or abuse.AI & Emerging Tech
AI Profiling for HarassmentUsing AI to create detailed profiles of individuals to enable more effective and targeted harassment.AI & Emerging Tech
Algorithmic Targeting AbuseExploiting platform algorithms to specifically target an individual with a barrage of negative content or harassment.AI & Emerging Tech
Recommender System AbuseManipulating recommendation algorithms to promote harmful content or harass individuals.AI & Emerging Tech
AI-Powered Harassment BotsUsing automated bots to send large volumes of harassing messages. Also known as Automated Abuse.AI & Emerging Tech
Conversational AI GroomingUsing chatbots or conversational AI to simulate relationships and groom individuals, especially minors.AI & Emerging Tech
Virtual Companion ManipulationExploiting the emotional bond a user has with an AI companion for manipulative or abusive purposes.AI & Emerging Tech
AI-Generated Revenge PornUsing AI to create fake explicit images or videos of an ex-partner for revenge.AI & Emerging Tech
Synthetic Child Sexual Abuse MaterialThe creation of AI-generated images or videos depicting child sexual abuse. This is illegal and harmful.AI & Emerging Tech
AI-Assisted BlackmailUsing artificial intelligence to create convincing fake evidence (e.g., images, videos, audio) for blackmail purposes.AI & Emerging Tech
AI Voice Scam TargetingUsing a cloned voice in a scam, for example, to impersonate a family member in distress to ask for money.AI & Emerging Tech
Deepfake ExtortionThreatening to release embarrassing or compromising deepfake videos or images unless a ransom is paid.AI & Emerging Tech
AI Content ManipulationUsing AI to alter content in a way that changes its meaning to be harmful or misleading.AI & Emerging Tech
Synthetic Evidence FabricationCreating fake AI-generated evidence (e.g., screenshots, audio) to use in a dispute or legal case.AI & Emerging Tech
AI-Altered ScreenshotsUsing AI to manipulate screenshots of conversations or posts to create a false narrative.AI & Emerging Tech
AI Chat ImpersonationTraining an AI to mimic a person's chat style and then using it to impersonate them in conversations.AI & Emerging Tech
Hologram HarassmentA future-facing term for harassment using realistic, AI-generated holographic projections of a person.AI & Emerging Tech
Virtual Avatar ImpersonationCreating a virtual avatar that closely resembles another person to impersonate them in a metaverse or virtual world.AI & Emerging Tech
AI-Generated Threat MessagesUsing AI text generators to create threatening messages, potentially to evade detection systems that look for human patterns.AI & Emerging Tech
Automated Abuse ScalingUsing AI to massively scale up abuse campaigns, sending thousands of harassing messages simultaneously.AI & Emerging Tech
AI-Based Image Morphing AbuseUsing AI to seamlessly merge one person's face onto another body, often for creating non-consensual explicit content.AI & Emerging Tech
Synthetic Identity AbuseCreating a completely fabricated but realistic online identity using AI-generated photos, text, and voice for malicious purposes.AI & Emerging Tech
AI-Powered Romance ScamsUsing AI-generated profiles and conversational AI to carry out romance scams at a large scale.AI & Emerging Tech
AI-Based Social EngineeringUsing AI to analyze a target's online presence and craft highly personalized social engineering attacks.AI & Emerging Tech
Large Language Model ImpersonationFine-tuning a large language model (LLM) on a person's writings to impersonate them with a high degree of accuracy.AI & Emerging Tech
AI-Generated DefamationUsing AI to generate and spread false and defamatory statements about an individual or group.AI & Emerging Tech
AI-Assisted CatfishingUsing AI tools to create more convincing fake profiles and maintain conversations for catfishing.AI & Emerging Tech
AI Face Swap AbuseUsing AI to swap a person's face into a compromising or harmful video or image.AI & Emerging Tech
Biometric Spoofing AbuseUsing AI to create synthetic biometric data (like a fingerprint or face) to bypass security systems.AI & Emerging Tech
AI Surveillance CreepThe gradual expansion of AI-powered surveillance into more areas of public and private life.AI & Emerging Tech
Emotion AI CoercionUsing AI that claims to detect emotions to coerce or manipulate individuals based on their inferred emotional state.AI & Emerging Tech
Synthetic Media-Based GaslightingUsing AI-generated media to make someone doubt their own memory or sanity.AI & Emerging Tech
AI Reputation ManipulationUsing AI to either artificially boost or destroy an individual's or company's online reputation.AI & Emerging Tech
AI-Generated False AllegationsCreating fake AI-generated evidence (e.g., screenshots, audio) to use in a dispute or legal case.AI & Emerging Tech
Automated Deepfake DistributionUsing bots and AI to automatically spread deepfake content across multiple platforms.AI & Emerging Tech
AI-Assisted StalkingUsing AI tools to track, monitor, and gather information about a stalking victim.AI & Emerging Tech
AI Behavioral Prediction AbuseUsing AI to predict a person's behavior and then using those predictions for manipulative or harmful purposes.AI & Emerging Tech
Technology-Facilitated Abuse LegislationLaws specifically designed to address abuse and violence that is perpetrated using technology.Legal & Policy
Cybercrime LawLaws that deal with crimes that are committed on the internet or a computer network.Legal & Policy
Image-Based Abuse LawLegislation that criminalizes the non-consensual creation and distribution of intimate images.Legal & Policy
Non-Consensual Intimate Image LawSpecific laws targeting the sharing of private, intimate images without the consent of the person depicted.Legal & Policy
Revenge Porn LegislationLaws criminalizing the act of sharing sexually explicit images of a person without their consent, often after a breakup.Legal & Policy
Coercive Control LawLaws that recognize a pattern of controlling or coercive behavior within a domestic setting as a criminal offense.Legal & Policy
Digital Coercive Control RecognitionThe application of coercive control laws to behaviors that use technology, such as monitoring, isolation, and control.Legal & Policy
Electronic Communications Harassment LawLaws that criminalize harassment conducted through electronic means, like emails, texts, or social media.Legal & Policy
Cyberstalking LawLaws specifically criminalizing the use of the internet and electronic communications to stalk an individual.Legal & Policy
Online Harassment OffenceA specific criminal offence that covers a course of conduct amounting to harassment online.Legal & Policy
Malicious Communications OffenceAn offence that covers the sending of communications that are indecent, grossly offensive, or contain a threat.Legal & Policy
Threats via Electronic CommunicationSpecific laws covering the act of making threats of violence through digital channels.Legal & Policy
Intimate Image Protection LawLegislation aimed at protecting individuals from the non-consensual sharing of their intimate images.Legal & Policy
Voyeurism Offence (Digital)Laws that extend voyeurism offences to cover digital acts, such as using a hidden camera and distributing the footage.Legal & Policy
Upskirting and Downblousing LawsSpecific legislation making it illegal to take non-consensual photos or videos under a person's clothing.Legal & Policy
Deepfake CriminalisationThe process of making the creation and distribution of malicious deepfakes a specific criminal offence.Legal & Policy
Synthetic Media RegulationRules and laws governing the creation and use of AI-generated media, including requirements for labeling.Legal & Policy
Online Hate Crime LawLaws that apply hate crime statutes to offenses committed online, with enhanced penalties.Legal & Policy
Gender-Based Online Hate CrimeRecognizing online hate speech that is specifically motivated by misogyny or hatred based on gender identity.Legal & Policy
Digital Evidence ProtectionRules and procedures for the lawful collection, preservation, and presentation of digital evidence in court.Legal & Policy
Data Protection Law MisuseWhen data protection laws are used maliciously, for example, to demand the takedown of legitimate journalism.Legal & Policy
Privacy Law ViolationsBreaches of laws that are designed to protect an individual's privacy from intrusion by state or private actors.Legal & Policy
Surveillance Law AbuseThe unlawful use of surveillance technologies in a way that violates established legal frameworks.Legal & Policy
Stalkerware CriminalisationThe act of making it illegal to create, sell, or use software designed for stalking.Legal & Policy
Unlawful Device TrackingThe illegal use of GPS trackers or other technologies to monitor a person's location without their consent.Legal & Policy
Electronic Monitoring AbuseThe misuse of electronic monitoring technologies (like those used in probation) for purposes of harassment or control.Legal & Policy
Identity Theft LegislationLaws that criminalize the act of stealing and using another person's personal information.Legal & Policy
Impersonation Offence (Online)A specific crime related to impersonating another individual online for the purpose of harm or fraud.Legal & Policy
Fraud by Digital DeceptionCommitting fraud through deceptive practices online, such as phishing or creating fake websites.Legal & Policy
Online Defamation LawThe area of law that deals with reputational damage caused by false statements published online.Legal & Policy
Platform Duty of CareA legal requirement for online platforms to take reasonable steps to protect their users from harm.Legal & Policy
Intermediary LiabilityThe legal principle that determines whether an online platform is liable for the content posted by its users.Legal & Policy
Safe Harbour ProvisionsLegal provisions that shield online platforms from liability for user-generated content, provided they meet certain requirements.Legal & Policy
Notice-and-Takedown ProceduresThe process by which platforms must remove infringing or illegal content after being notified of its existence.Legal & Policy
Right to be ForgottenA legal principle that allows individuals to request the removal of personal data from search engine results under certain circumstances.Legal & Policy
Digital Restraining OrdersCourt orders that prohibit an individual from contacting or harassing another person through digital means.Legal & Policy
Electronic Protection OrdersA type of restraining order that specifically covers electronic communication and contact.Legal & Policy
Online Non-Molestation OrdersA UK-specific court order to prevent a partner or ex-partner from harassing or threatening someone, extended to online behavior.Legal & Policy
Cyber Protection OrdersA type of court order aimed at preventing online harassment and stalking.Legal & Policy
Technology Abuse Risk AssessmentA formal assessment to evaluate the risk of an individual using technology to perpetrate abuse.Legal & Policy
Digital Safety OrdersCourt orders focused on restricting an abuser's use of technology to ensure the victim's safety.Legal & Policy
Platform Accountability RegulationGovernment regulation designed to hold social media and other platforms accountable for the content they host.Legal & Policy
Algorithmic Accountability LawLegislation requiring transparency and fairness in the algorithms used by platforms and AI systems.Legal & Policy
AI Safety RegulationLaws and rules aimed at ensuring the safe development and deployment of artificial intelligence.Legal & Policy
AI Risk GovernanceThe frameworks and processes for managing the risks associated with artificial intelligence.Legal & Policy
Automated Decision-Making OversightRegulatory oversight of systems that make important decisions about people automatically using AI.Legal & Policy
Children’s Online Safety LawLegislation specifically designed to protect minors from online harms.Legal & Policy
Age-Appropriate Design CodeA UK code of practice that requires online services to provide better privacy protections for children.Legal & Policy
Duty to Report Online AbuseA legal or professional obligation for certain individuals or organizations to report suspected cases of online abuse.Legal & Policy
Mandatory Reporting of CSAMA legal requirement for platforms to report any detected Child Sexual Abuse Material to the authorities.Legal & Policy
Online Exploitation StatutesLaws that specifically criminalize various forms of online exploitation.Legal & Policy
Cross-Border Cybercrime CooperationInternational agreements and cooperation between law enforcement agencies to tackle cybercrime that spans multiple countries.Legal & Policy
Budapest Convention on CybercrimeThe first international treaty seeking to address Internet and computer crime by harmonizing national laws and improving investigative techniques.Legal & Policy
Digital Human RightsThe concept that human rights, such as freedom of speech and privacy, apply in the digital world.Legal & Policy
Right to Online SafetyThe emerging principle that individuals have a right to be reasonably safe from harm when using online services.Legal & Policy
Freedom from Digital ViolenceThe right to participate in the digital world without facing violence or abuse.Legal & Policy
Technology-Facilitated Abuse in Family LawThe consideration of tech-based abuse as a factor in family court proceedings, such as custody battles.Legal & Policy
Evidentiary Use of Digital AbuseThe use of digital evidence, such as threatening texts or emails, in court cases.Legal & Policy
Admissibility of Digital EvidenceThe rules governing whether digital evidence can be presented in a court of law.Legal & Policy
Forensic Analysis of DevicesThe expert examination of computers, phones, and other devices to recover data for an investigation.Legal & Policy
Digital Chain of CustodyThe chronological documentation of the seizure, control, transfer, analysis, and disposition of digital evidence.Legal & Policy
Victim Protection in Cybercrime CasesMeasures to protect the identity and privacy of victims throughout the investigation and trial of a cybercrime.Legal & Policy
Online Witness Protection MeasuresSteps taken to protect witnesses in online crime cases from intimidation or harm.Legal & Policy
Platform Transparency RequirementsLegal requirements for online platforms to be transparent about their content moderation policies and actions.Legal & Policy
Content Moderation RegulationGovernment rules that oversee how platforms moderate the content generated by their users.Legal & Policy
Harmful Online Communications LawLegislation that criminalizes various forms of harmful online speech and communication.Legal & Policy
Electronic Abuse Protection OrdersCourt orders designed to prevent abuse that is conducted through electronic means.Legal & Policy
Digital Harassment Sentencing EnhancementsLegal provisions that allow for tougher sentences for crimes that involve digital harassment.Legal & Policy
Gender-Based Violence Online RecognitionThe formal recognition in law and policy that online abuse can be a form of gender-based violence.Legal & Policy
Tech Abuse Survivor ProtectionsLegal and practical protections specifically for survivors of technology-facilitated abuse.Legal & Policy
Civil Remedies for Online AbuseNon-criminal legal options for victims of online abuse, such as suing for damages or seeking an injunction.Legal & Policy
Tort of Misuse of Private InformationA civil action in the UK for the misuse of private information.Legal & Policy
Intentional Infliction of Emotional Distress (Online)A civil action for extreme and outrageous conduct online that causes severe emotional distress.Legal & Policy
Civil Harassment Restraining OrdersNon-criminal court orders to prevent harassment.Legal & Policy
Digital Cease and Desist OrdersA formal demand to stop a particular online activity, often as a precursor to legal action.Legal & Policy
Platform Ban Evasion OffenceThe act of circumventing a platform ban, which may be a violation of terms of service and in some cases a legal issue.Legal & Policy
Criminal Threats via InternetThe crime of making a threat to harm someone, transmitted via the internet.Legal & Policy
Extortion Using Intimate Images LawLaws that specifically criminalize sextortion.Legal & Policy