Your SlideShare is downloading. ×
0
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Cyber harassment ppt umt
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Cyber harassment ppt umt

95

Published on

Presentation Title: Cyber Harassment …

Presentation Title: Cyber Harassment
Group members:
Eman anjum
Zil e huma nisar
Maheen asif
Shafia fahim
Maida haroon
This presentation was presented by the students of Mass communication on 30th Sept, 2013 at University Management and Technology.
Teacher’s Remarks
Main ideas: unambiguous
Background information: Satisfactory
Audience attention: maximum
Accent: Good
Eye contact with the audience: Encouraging.
Voice: strong and clear, not a monotone.
Others: Easy to read, and have impact, Gestures are natural.
Teacher: Muhammad Ahmad Sheikh

ideas: unambiguous
Background information: Satisfactory
Audience attention: maximum
Accent: Good
Eye contact with the audience: Encouraging.
Voice: strong and clear, not a monotone.
Others: Easy to read, and have impact, Gestures are natural.
Teacher: Muhammad Ahmad Sheikh

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
95
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. BASICS OF SOCIAL MEDIA
  • 2. Group Members • EMAN ANJUM • ZIL E HUMA NISAR • MAHEEN ASIF • SHAFIA FAHIM • MAIDA HAROON
  • 3. CYBER HARASSMENT
  • 4. INTRODUCTION Cyber harassment is the use of the Internet or other electronic means to harass an individual, a group of individuals, or an organization.
  • 5.  Cyber harassment first received attention by legislators in mid 1980s. When a young person uses the Internet or technology to o Harass o threaten o embarrass or o target another person, this person is called a CYBER BULLY
  • 6. • Typically, Cyber bullying involves tweens and teens. • If an adult is involved, it is considered cyber-harassment or Cyber stalking.
  • 7. TYPES DIRECT HARASSMENT include:  Threats bullying or intimidating messages sent directly to the victim.  Via e-mail or other Internet communications mediums.  The use of technological means to interfere with a victim’s use of the Internet, such as hacking or denial of services attacks
  • 8. • • •.
  • 9. INDIRECT HARASSMENT not limited to spreading rumors about the victim, it includes:  Various Internet discussion forums.  Subscribing the victim to unwanted online services.  Posting information about the victim in online dating, sex services, or sending messages to others in the victim’s name.
  • 10. WAYS OF CYBER HARASSEMENT Harassing Someone  Using text messaging  Posting rumors, threats or embarrassing information on social networking sites such As Face book and Twitter.
  • 11. Engaging in ‘warning wars’ Participating in text wars or text attacks.
  • 12. IMPERSONATING SOMEONE Developing a screen name that is similar to the victim’s screen name. Stealing the victim’s password and chatting with other people while pretending to be the victim and changing the target's online profile Taking degrading pictures of the victim and then posting them on photo sharing sites
  • 13. USING PHOTOGRAPHS   Taking degrading pictures of the victim and then posting them on photo sharing sites Threatening to share embarrassing photos as a way of controlling or blackmailing the victim. Sending mass emails or text messages The photos can be distributed to hundreds of people within a seconds
  • 14. CREATING WEBSITES , BLOGS, POLLS Creating a blog about the victim that is embarrassing, insulting or humiliating. Using information that was shared in confidence and making it public. Conducting an Internet poll about the victim.
  • 15. Questions in the poll may vary including everything about that. Posting rude, mean or insulting comments about the victim via the chat option of online gaming sites. Sending virus , spyware , or hacking programs to the victim in order to spy on the victim or control his or her computer remotely.
  • 16. Participating In “Happy Slapping”  Using a camera phone to videotape a bullying incident  Downloading the videotaped bullying incident and posting it to YouTube in order to allow a larger audience to view the incident.
  • 17. Sharing a videotaped bullying incident via mass e-mail or text messaging to humiliate and embarrass the victim.
  • 18. Rise of Cyber Bullying • Day by day its becoming the most important social disturbance issues
  • 19. CULTURAL ASPECT Due to different culture conflicts takes place and give a new start to cyber harassment
  • 20. PSYCHOLOGIICAL ASPECT Due to psychological factors To take out there frustration or just to have fun
  • 21. POLITICAL ASPECT  Interest in different political party  making propaganda against the opposite party
  • 22. • Rise after 9/11
  • 23. CYBER LAWS The legal issues related to use of communication technology , particular cyber space.  It is an intersection of many legal fields  Cyber laws is an attempt to apply laws
  • 24. CYBER LAWS IN THE WORLD  Electronic Commerce Act (Ireland) Electronic Transactions Act ( UK, USA , AUSTRALIA , NEW ZEALAND & SINGAPORE)  Electronic Transactions Ordinance ( Hong Kong)  Information Technology Act (INDIA)  Information Communication Technology Act Draft (BANGLADESH)
  • 25. LAWS  On January 5, 2006, President Bush signed Section 113 of the Violence Against Women Act into law.  By fines up to $50,000 or imprisonment for up to two years
  • 26. CYBER LAWS IN PAKISTAN  There are different laws promulgated in Pakistan but are not implemented Two of them are most known Electronic Transaction Ordinance 2002 Electronic / Cyber bill 2007
  • 27. VICTIMS VICTIMS oAn 18-year-old Indian girl studying in the Siliguri Government Polytechnic College committed suicide. oPhoebe Prince was a 15-year-old Irish immigrant. oHis last words, posted onto his Facebook profile about 10 minutes before he died, were: "Jumping off the GW bridge sorry.“ oAmanda Todd 1996 – 2012 oRyan Halligan 1989 - 2003
  • 28. CONCLUSION 2007 SUNFULL movement  CHOI – JIN- SIL SUCIDE  Impact of positive comments  Work with schools and business to positive comments
  • 29. Things That We Find Can Really Hurt Somebody THANKYOU 
  • 30. Any ?

×