Glossary of Internet jargon

This is a list of common terms you will come across on this website.

Jump to:

C F G I K O P R S T U V

 

C

Catfishing

Catfishing is when a person creates a fake identity on a social networking service in order exploit another person by luring them into a false romantic relationship.

F

Firewall

Software to protect computers against hackers.

G

Grooming

This is when an individual tries to build a relationship with a young person so that they can sexually exploit them in some way. In some cases, paedophiles use online platforms to befriend a child or gain their confidence before arranging to meet them in person

I

ISP

ISP refers to internet service provider. These are organisations that provides services for accessing, using, or participating in the Internet.

K

Keylogging

Software/hardware to track keystrokes on a computer to gather passwords, credit card numbers etc.

 Back to top

O

Objectionable

The Films, Videos, and Publications Classification Act 1993 defines a publication as objectionable (banned) if it promotes or supports:

  • the sexual exploitation of children
  • sexual violence or coercion
  • torture or extreme violence
  • bestiality
  • sexual conduct involving the body of a dead person
  • the use of urine or excrement in association with degrading or sexual conduct.

Online Bullying

Online bullying (also known as cyberbullying) occurs when one person uses digital technology to send, post or publish content intended to cause harm another individual. to send, post or publish content intended to cause harm another individual. Online bullying can include:

  • abusive and hurtful messages, images or videos
  • repeated unwanted messages
  • spreading gossip and lies
  • fake accounts used to humiliate or harass someone
  • excluding others online
  • embarrassing pictures, videos, websites, or fake profiles.

P

Phishing

Fraudulent e-mails and pop-ups to fool you into revealing personal information for criminal gain. The most common phishing scam is one used to con people into handing over bank account details online.

R

Restricted

Restricted material refers to material that is legally age restricted and should only be made available to people who are over a certain age. Typically, this refers to R18 or Adult material similar to that which can be legally purchased from video or magazine outlets.

Rogue dialler

Software that installs itself on computers and changes settings to dial a premium rate number instead of usual dial-up account.

 Back to top

S

Scams

Software to protect computers against hackers.

Sexting

Sexting refers to the sending or receiving of nude images, videos or texts.

Social Networking

Communication and interaction with other people online through social media applications and websites

Spam

Unsolicited e-mails, often offering products or services in which you have no interest.

Spyware

Small programmes that secretly monitor sites visited, potentially violating privacy and slowing computers.

T

Trojan

Malicious software disguised as harmless programme. One of the most common net security threats, it hides in the background and can trigger programmes to run that steal personal information or details stored on that computer for instance.

U

URL

URL refers to the digital address of a World Wide Web page online. For example, the DIA URL is https://www.dia.govt.nz

V

Virus

Malicious programme designed to damage data; usually spread via infested e-mail attachments.

 Back to top