cyber harassment ppt umt

Post on 06-Sep-2014

260 Views

Category:

Technology

13 Downloads

Preview:

Click to see full reader

DESCRIPTION

Presentation Title: Cyber Harassment Group members: Eman anjum Zil e huma nisar Maheen asif Shafia fahim Maida haroon This presentation was presented by the students of Mass communication on 30th Sept, 2013 at University Management and Technology. Teacher’s Remarks Main ideas: unambiguous Background information: Satisfactory Audience attention: maximum Accent: Good Eye contact with the audience: Encouraging. Voice: strong and clear, not a monotone. Others: Easy to read, and have impact, Gestures are natural. Teacher: Muhammad Ahmad Sheikh ideas: unambiguous Background information: Satisfactory Audience attention: maximum Accent: Good Eye contact with the audience: Encouraging. Voice: strong and clear, not a monotone. Others: Easy to read, and have impact, Gestures are natural. Teacher: Muhammad Ahmad Sheikh

TRANSCRIPT

BASICS OF SOCIAL MEDIA

Group Members • EMAN ANJUM• ZIL E HUMA NISAR• MAHEEN ASIF• SHAFIA FAHIM• MAIDA HAROON

CYBER HARASSMENT

INTRODUCTION

Cyber harassment is the use

of the Internet or other

electronic means

to harass an individual, a

group of individuals, or an

organization.

Cyber harassment first received attention by legislators in mid 1980s.

When a young person uses the Internet or technology to o Harasso threateno embarrass or o target another person, this person is called a CYBER BULLY

• Typically, Cyber bullying involves tweens and teens.

• If an adult is involved, it is considered cyber-harassment or

Cyber stalking.

TYPES DIRECT HARASSMENT include:

Threats bullying or intimidating messages sent directly to the victim.

Via e-mail or other Internet communications mediums.

The use of technological means to interfere with a victim’s use of the Internet, such as hacking or denial of services attacks

• •.

INDIRECT HARASSMENT not limited to spreading rumors about the victim, it includes:

Various Internet discussion forums.

Subscribing the victim to unwanted online services.

Posting information about the victim in online dating, sex services, or sending messages to others in the victim’s name.

WAYS OF CYBER HARASSEMENT

Harassing Someone

Using text messaging

Posting rumors, threats or embarrassing information onsocial networking sites suchAs Face book and Twitter.

Engaging in ‘warning wars’

Participating in text wars or text attacks.

IMPERSONATING SOMEONE Developing a screen name that is

similar to the victim’s screen name.Stealing the victim’s password and chatting with other people while pretending to be the victim and changing the target's online profileTaking degrading pictures of the victim and then posting them on photo sharing sites

USING PHOTOGRAPHS  

Taking degrading pictures of the victim and then posting them on photo sharing sites

Threatening to share embarrassing photos as a way of controlling or blackmailing the victim.

Sending mass emails or text messages

The photos can be distributed to hundreds of people within a seconds

CREATING WEBSITES , BLOGS, POLLS

Creating a blog about the victim that is embarrassing, insulting or humiliating.

Using information that was shared in confidence and making it public.

Conducting an Internet poll about the victim.

Questions in the poll may vary including everything about that.

Posting rude, mean or insulting comments about the victim via the chat option of online gaming sites.

Sending virus , spyware , or hacking programs to the victim in order to spy on the victim or control his or her computer remotely.

Participating In “Happy Slapping”

Using a camera phone to videotape a bullying incident

Downloading the videotaped bullying incident and posting it to YouTube in order to allow a larger audience to view the incident.

Sharing a videotaped bullying incident via mass e-mail or text messaging to humiliate and embarrass the victim.

Rise of Cyber Bullying

• Day by day its becoming the most important social disturbance issues

CULTURAL ASPECT

Due to different culture conflicts takes place and give a new start to cyber harassment

PSYCHOLOGIICAL ASPECT

Due to psychological factors To take out there frustration or just to have fun

POLITICAL ASPECT Interest in different

political party making propaganda against the opposite party

• Rise after 9/11

CYBER LAWS

The legal issues related to use of communication technology , particular cyber space.

It is an intersection of many legal fields

Cyber laws is an attempt to apply laws

CYBER LAWS IN THE WORLD Electronic Commerce Act (Ireland)

Electronic Transactions Act ( UK, USA , AUSTRALIA , NEW ZEALAND & SINGAPORE)

Electronic Transactions Ordinance ( Hong Kong)

Information Technology Act (INDIA)

Information Communication Technology Act Draft (BANGLADESH)

LAWS

On January 5, 2006, President Bush signed Section 113 of the Violence Against Women Act into law.

By fines up to $50,000 or imprisonment for up to two years

CYBER LAWS IN PAKISTAN

There are different laws promulgated in Pakistan but are not implemented

Two of them are most known

Electronic Transaction Ordinance 2002

Electronic / Cyber bill 2007

VICTIMS

VICTIMSoAn 18-year-old Indian girl studying in the Siliguri Government Polytechnic College committed suicide.

oPhoebe Prince was a 15-year-old Irish immigrant.

oHis last words, posted onto his Facebook profile about 10 minutes before he died, were: "Jumping off the GW bridge sorry.“

oAmanda Todd 1996 – 2012

oRyan Halligan 1989 - 2003

CONCLUSION

2007 SUNFULL movement

CHOI – JIN- SIL SUCIDE

Impact of positive comments

Work with schools and business to positive comments

Things That We Find Can Really Hurt Somebody

THANKYOU

Any ?

top related