If the info the stalker needs is not accessible via the Internet, he or she may try to get by manipulating a person via:
Whether the stalker is a stranger, acquaintance, or intimate partner, he or she will need a great deal of info to maintain the control desired over his victim. These are opportunities to thwart the stalker, especially when he or she is trying to get info from the people in his victim's life.
Victims can protect their privacy in every way possible, such as using P.O. boxes and unlisted telephone numbers but they also have to be aware of info leakage from their family, friends, workplace, school, neighbors, and so on.
It is essential for a victim to share details of the stalker's patterns, description, along with a photo with everyone in his or her circle, from closest confidante to the security guard at work.
Based on this capstone research project, the proposal is this:
Help victims, potential victims, and those who care about IPV and stalking in general be aware that almost all stalkers use multiple forms of social engineering to break into their victims lives,
Forewarned is forearmed.
Develop rebuttals to requests for inappropriate requests for information and provide these and scenarios to common info inadvertent leakage spots such as receptionists, neighbors, and family members anxious for the victim to marry.
Stalkers often look and sound normal and even attractive so it can be difficult for the well-meaning to protect the victim's info unless rehearsed and privy to why.
This proposal is in response to the low level of satisfaction that victims have with restraining orders and the way IPV stalking diminishes their sense of control over their lives.
This is a way for victims to strengthen their support system and to prevent leakage of private information about their addresses, routines, vacation plans, and virtually every detail that anyone close to them could know and accidentally be tricked into repeating.
There is no harm in being careful about sharing one's information with strangers or watching out for phishing emails. Even if conversations about stalking are difficult, not having them can be tragic.
No one has published results or studied the impact of social engineering on stalking / IPV victims or the impact of education about social engineering on stalking / IPV levels.
Pursue employment in threat assessment field.
Achieve rank ATAP threat assessment professional.
Specialize in stalking, social engineering, IPV, violence, and violence prevention
Academic studies to test hypotheses that disruption of info-seeking will disrupt violence in addition to others discussed.
Enhanced website to provide more details of the impact social engineering has on info gathering of routines, addresses, phone numbers, and work place especially plus how to broach the subject of better maintaining privacy, scenarios, actual cases with info leakage for the hard-to-convince.
Workbook to help victims and support system role-play scenarios and become comfortable with rebuttals.
CDC distribution of empowerment public service ads, posters, and short-circuiting robot themed stickers to help victims and their support systems remember to protect privacy from stalking by short-circuiting social engineers.
Interviews with stalkers to gain inside view of social engineering and to fine-tune theories.
Presentations to groups who might benefit as well as educators.
Panel discussions with others concerned about IPV prevalence.
Continue to improve theory based on study data and field observations.