The IT Law Wiki
Tag: sourceedit
mNo edit summary
Tag: sourceedit
Line 4: Line 4:
   
 
{{Quote|[t]echnique of performing [[online]] [[information gathering]] and [[reconnaissance]] on a particular target.<ref>[[Markets for Cybercrime Tools and Stolen Data]], at 48.</ref>}}
 
{{Quote|[t]echnique of performing [[online]] [[information gathering]] and [[reconnaissance]] on a particular target.<ref>[[Markets for Cybercrime Tools and Stolen Data]], at 48.</ref>}}
  +
  +
== Overview ==
  +
  +
The methods employed to acquire this [[information]] include [[search]]ing publicly available [[database]]s and [[social media]] [[website]]s (like [[Facebook]]), [[hacking]], and [[social engineering]]. It is closely related to [[internet]] [[vigilantism]] and [[hacktivism]].
  +
  +
Doxing may be carried out for various reasons, including to aid law enforcement, business analysis, [[extortion]], coercion, [[harassment]], [[online shaming]] and vigilante justice.
   
 
== References ==
 
== References ==
 
<references />
 
<references />
  +
  +
  +
{{Wikipedia|Doxing}}
 
[[Category:Definition]]
 
[[Category:Definition]]
 
[[Category:Data]]
 
[[Category:Data]]

Revision as of 05:57, 4 February 2016

Definition

Document tracing (doxing or doxxing) is a

[t]echnique of performing online information gathering and reconnaissance on a particular target.[1]

Overview

The methods employed to acquire this information include searching publicly available databases and social media websites (like Facebook), hacking, and social engineering. It is closely related to internet vigilantism and hacktivism.

Doxing may be carried out for various reasons, including to aid law enforcement, business analysis, extortion, coercion, harassment, online shaming and vigilante justice.

References


This page uses Creative Commons Licensed content from Wikipedia (view authors). Smallwikipedialogo.png