Cyber harassment ppt umt

125 views
112 views

Published on

Presentation Title: Cyber Harassment
Group members:
Eman anjum
Zil e huma nisar
Maheen asif
Shafia fahim
Maida haroon
This presentation was presented by the students of Mass communication on 30th Sept, 2013 at University Management and Technology.
Teacher’s Remarks
Main ideas: unambiguous
Background information: Satisfactory
Audience attention: maximum
Accent: Good
Eye contact with the audience: Encouraging.
Voice: strong and clear, not a monotone.
Others: Easy to read, and have impact, Gestures are natural.
Teacher: Muhammad Ahmad Sheikh

ideas: unambiguous
Background information: Satisfactory
Audience attention: maximum
Accent: Good
Eye contact with the audience: Encouraging.
Voice: strong and clear, not a monotone.
Others: Easy to read, and have impact, Gestures are natural.
Teacher: Muhammad Ahmad Sheikh

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
125
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cyber harassment ppt umt

  1. 1. BASICS OF SOCIAL MEDIA
  2. 2. Group Members • EMAN ANJUM • ZIL E HUMA NISAR • MAHEEN ASIF • SHAFIA FAHIM • MAIDA HAROON
  3. 3. CYBER HARASSMENT
  4. 4. INTRODUCTION Cyber harassment is the use of the Internet or other electronic means to harass an individual, a group of individuals, or an organization.
  5. 5.  Cyber harassment first received attention by legislators in mid 1980s. When a young person uses the Internet or technology to o Harass o threaten o embarrass or o target another person, this person is called a CYBER BULLY
  6. 6. • Typically, Cyber bullying involves tweens and teens. • If an adult is involved, it is considered cyber-harassment or Cyber stalking.
  7. 7. TYPES DIRECT HARASSMENT include:  Threats bullying or intimidating messages sent directly to the victim.  Via e-mail or other Internet communications mediums.  The use of technological means to interfere with a victim’s use of the Internet, such as hacking or denial of services attacks
  8. 8. • • •.
  9. 9. INDIRECT HARASSMENT not limited to spreading rumors about the victim, it includes:  Various Internet discussion forums.  Subscribing the victim to unwanted online services.  Posting information about the victim in online dating, sex services, or sending messages to others in the victim’s name.
  10. 10. WAYS OF CYBER HARASSEMENT Harassing Someone  Using text messaging  Posting rumors, threats or embarrassing information on social networking sites such As Face book and Twitter.
  11. 11. Engaging in ‘warning wars’ Participating in text wars or text attacks.
  12. 12. IMPERSONATING SOMEONE Developing a screen name that is similar to the victim’s screen name. Stealing the victim’s password and chatting with other people while pretending to be the victim and changing the target's online profile Taking degrading pictures of the victim and then posting them on photo sharing sites
  13. 13. USING PHOTOGRAPHS   Taking degrading pictures of the victim and then posting them on photo sharing sites Threatening to share embarrassing photos as a way of controlling or blackmailing the victim. Sending mass emails or text messages The photos can be distributed to hundreds of people within a seconds
  14. 14. CREATING WEBSITES , BLOGS, POLLS Creating a blog about the victim that is embarrassing, insulting or humiliating. Using information that was shared in confidence and making it public. Conducting an Internet poll about the victim.
  15. 15. Questions in the poll may vary including everything about that. Posting rude, mean or insulting comments about the victim via the chat option of online gaming sites. Sending virus , spyware , or hacking programs to the victim in order to spy on the victim or control his or her computer remotely.
  16. 16. Participating In “Happy Slapping”  Using a camera phone to videotape a bullying incident  Downloading the videotaped bullying incident and posting it to YouTube in order to allow a larger audience to view the incident.
  17. 17. Sharing a videotaped bullying incident via mass e-mail or text messaging to humiliate and embarrass the victim.
  18. 18. Rise of Cyber Bullying • Day by day its becoming the most important social disturbance issues
  19. 19. CULTURAL ASPECT Due to different culture conflicts takes place and give a new start to cyber harassment
  20. 20. PSYCHOLOGIICAL ASPECT Due to psychological factors To take out there frustration or just to have fun
  21. 21. POLITICAL ASPECT  Interest in different political party  making propaganda against the opposite party
  22. 22. • Rise after 9/11
  23. 23. CYBER LAWS The legal issues related to use of communication technology , particular cyber space.  It is an intersection of many legal fields  Cyber laws is an attempt to apply laws
  24. 24. CYBER LAWS IN THE WORLD  Electronic Commerce Act (Ireland) Electronic Transactions Act ( UK, USA , AUSTRALIA , NEW ZEALAND & SINGAPORE)  Electronic Transactions Ordinance ( Hong Kong)  Information Technology Act (INDIA)  Information Communication Technology Act Draft (BANGLADESH)
  25. 25. LAWS  On January 5, 2006, President Bush signed Section 113 of the Violence Against Women Act into law.  By fines up to $50,000 or imprisonment for up to two years
  26. 26. CYBER LAWS IN PAKISTAN  There are different laws promulgated in Pakistan but are not implemented Two of them are most known Electronic Transaction Ordinance 2002 Electronic / Cyber bill 2007
  27. 27. VICTIMS VICTIMS oAn 18-year-old Indian girl studying in the Siliguri Government Polytechnic College committed suicide. oPhoebe Prince was a 15-year-old Irish immigrant. oHis last words, posted onto his Facebook profile about 10 minutes before he died, were: "Jumping off the GW bridge sorry.“ oAmanda Todd 1996 – 2012 oRyan Halligan 1989 - 2003
  28. 28. CONCLUSION 2007 SUNFULL movement  CHOI – JIN- SIL SUCIDE  Impact of positive comments  Work with schools and business to positive comments
  29. 29. Things That We Find Can Really Hurt Somebody THANKYOU 
  30. 30. Any ?

×