SlideShare a Scribd company logo
1 of 8
Due to Australia’s first social networking related conviction occurring last month, now
more than ever social media users need education on the potential damaging effects
                          of material posted on online platforms.
The study conducted primarily at the University of New South Wales in
Kensington has revealed social media platforms are raising huge issues in
   terms of privacy, copyright, employment, bullying and harassment
The Director of the Cyberspace Law and Policy Community at
UNSW, Alana Maurushat believes cybercrime education should start at
year one, so young Australians can learn the responsibilities of posting
                            material online
Alec Christie, a partner at law firm DLA Piper confirms a way to check if your
content is suitable to be posted online is through the ‘front page test’. ‘If you are
  going to go online and publish something online, you need to test it against
 would I be able to publish this on the front page of the Sydney Morning Herald
                                     tomorrow’.
David Vaile from the Cyberspace Law and Policy Centre from UNSW
 emphasises the importance for users of the Internet to understand that the
  law applies to online platforms just as it applies in the traditional world.
'Because it’s not a physical thing, people just think it's just moving a file, it's
                  just posting a photograph’ Vaile explains.
Problems lie with Internet users as they are unaware of the definition of
   ‘indecent’. Alec Christie puts it simply ‘There are no hard and fast
           rules, but it’s what would make you and I blush'.
Joanne, a Criminology student at the University of New South Wales has
   experienced cybercrime problems involving her brother, as he faces
bullying over Facebook. ‘He doesn’t know what to do, he just hates school
                                  now’.
Despite a Law Reform Commission Report being produced four years ago
  based on privacy concerns, no laws have been changed or altered with
regards to an individuals right to privacy which is affecting the legal systems
                       ability to deal with cybercrime.

More Related Content

What's hot

Artifact 2 cyberbullying
Artifact 2 cyberbullyingArtifact 2 cyberbullying
Artifact 2 cyberbullying
hgraffam
 
Teachingdigitalresponsibility
TeachingdigitalresponsibilityTeachingdigitalresponsibility
Teachingdigitalresponsibility
kgehres
 
Wingate copyright critique portfolio
Wingate copyright critique portfolioWingate copyright critique portfolio
Wingate copyright critique portfolio
Nicole Wingate
 

What's hot (17)

URMA Conference 2009
URMA Conference 2009URMA Conference 2009
URMA Conference 2009
 
Artifact 2 cyberbullying
Artifact 2 cyberbullyingArtifact 2 cyberbullying
Artifact 2 cyberbullying
 
Teachingdigitalresponsibility
TeachingdigitalresponsibilityTeachingdigitalresponsibility
Teachingdigitalresponsibility
 
How will killing Net Neutrality impact education?
How will killing Net Neutrality impact education?How will killing Net Neutrality impact education?
How will killing Net Neutrality impact education?
 
Public Computer Services At CPL
Public Computer Services At CPLPublic Computer Services At CPL
Public Computer Services At CPL
 
Public Computer Services At CPL
Public Computer Services At CPLPublic Computer Services At CPL
Public Computer Services At CPL
 
Wingate copyright critique portfolio
Wingate copyright critique portfolioWingate copyright critique portfolio
Wingate copyright critique portfolio
 
Social Media Policy
Social Media PolicySocial Media Policy
Social Media Policy
 
Making the connection
Making the connectionMaking the connection
Making the connection
 
Wingate Policy Paper
Wingate Policy PaperWingate Policy Paper
Wingate Policy Paper
 
Staying legal: the law surrounding Web2.0
Staying legal: the law surrounding Web2.0Staying legal: the law surrounding Web2.0
Staying legal: the law surrounding Web2.0
 
Cyberethics accompanying text
Cyberethics accompanying text Cyberethics accompanying text
Cyberethics accompanying text
 
Digiteen and Digiteacher
Digiteen and DigiteacherDigiteen and Digiteacher
Digiteen and Digiteacher
 
The Promise of Networks: How Social Connections = Social Impact
The Promise of Networks: How Social Connections = Social ImpactThe Promise of Networks: How Social Connections = Social Impact
The Promise of Networks: How Social Connections = Social Impact
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
The Impact of Social Media on Reputation Management – navigating a new legal ...
The Impact of Social Media on Reputation Management – navigating a new legal ...The Impact of Social Media on Reputation Management – navigating a new legal ...
The Impact of Social Media on Reputation Management – navigating a new legal ...
 
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic DialogueNL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
 

Viewers also liked

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
SlideShare
 

Viewers also liked (8)

Facebook
FacebookFacebook
Facebook
 
Cyber-Crime e Social Media
Cyber-Crime e Social MediaCyber-Crime e Social Media
Cyber-Crime e Social Media
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
 
Instant Checkmate Background Check Glossary
Instant Checkmate Background Check GlossaryInstant Checkmate Background Check Glossary
Instant Checkmate Background Check Glossary
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
 

Similar to Cyber Crime and Social Media

Edge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingEdge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullying
Dr. Conrath
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
ITIIIndustries
 
Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)
Professor Mary Aiken
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
andrewdyoung
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write up
victoriahoo
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
todd521
 
Running head FINAL PAPER .docx
 Running head FINAL PAPER                                      .docx Running head FINAL PAPER                                      .docx
Running head FINAL PAPER .docx
MARRY7
 
SummaryReport-TitleIXandCampusSexualAssaultSomos-2
SummaryReport-TitleIXandCampusSexualAssaultSomos-2SummaryReport-TitleIXandCampusSexualAssaultSomos-2
SummaryReport-TitleIXandCampusSexualAssaultSomos-2
Claudia Wald
 

Similar to Cyber Crime and Social Media (20)

Edge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingEdge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullying
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
 
Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write up
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Internet Law Primer
Internet Law PrimerInternet Law Primer
Internet Law Primer
 
Encyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety PresentationEncyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety Presentation
 
Age Verification / “Doing the Right Thing”
Age Verification / “Doing the Right Thing”Age Verification / “Doing the Right Thing”
Age Verification / “Doing the Right Thing”
 
Jacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o scriptJacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o script
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
 
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
 
It’s time to talk about privacy
It’s time to talk about privacyIt’s time to talk about privacy
It’s time to talk about privacy
 
Running head FINAL PAPER .docx
 Running head FINAL PAPER                                      .docx Running head FINAL PAPER                                      .docx
Running head FINAL PAPER .docx
 
SummaryReport-TitleIXandCampusSexualAssaultSomos-2
SummaryReport-TitleIXandCampusSexualAssaultSomos-2SummaryReport-TitleIXandCampusSexualAssaultSomos-2
SummaryReport-TitleIXandCampusSexualAssaultSomos-2
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber path
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
Coalition 2013 election policy – enhance online safety final
Coalition 2013 election policy – enhance online safety   finalCoalition 2013 election policy – enhance online safety   final
Coalition 2013 election policy – enhance online safety final
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Cyber Crime and Social Media

  • 1. Due to Australia’s first social networking related conviction occurring last month, now more than ever social media users need education on the potential damaging effects of material posted on online platforms.
  • 2. The study conducted primarily at the University of New South Wales in Kensington has revealed social media platforms are raising huge issues in terms of privacy, copyright, employment, bullying and harassment
  • 3. The Director of the Cyberspace Law and Policy Community at UNSW, Alana Maurushat believes cybercrime education should start at year one, so young Australians can learn the responsibilities of posting material online
  • 4. Alec Christie, a partner at law firm DLA Piper confirms a way to check if your content is suitable to be posted online is through the ‘front page test’. ‘If you are going to go online and publish something online, you need to test it against would I be able to publish this on the front page of the Sydney Morning Herald tomorrow’.
  • 5. David Vaile from the Cyberspace Law and Policy Centre from UNSW emphasises the importance for users of the Internet to understand that the law applies to online platforms just as it applies in the traditional world. 'Because it’s not a physical thing, people just think it's just moving a file, it's just posting a photograph’ Vaile explains.
  • 6. Problems lie with Internet users as they are unaware of the definition of ‘indecent’. Alec Christie puts it simply ‘There are no hard and fast rules, but it’s what would make you and I blush'.
  • 7. Joanne, a Criminology student at the University of New South Wales has experienced cybercrime problems involving her brother, as he faces bullying over Facebook. ‘He doesn’t know what to do, he just hates school now’.
  • 8. Despite a Law Reform Commission Report being produced four years ago based on privacy concerns, no laws have been changed or altered with regards to an individuals right to privacy which is affecting the legal systems ability to deal with cybercrime.