SlideShare a Scribd company logo
1 of 9
HATE SPEECH
 Hate speech is defined by Cambridge Dictionary as "public speech that
expresses hate or encourages violence towards a person or group based on
something such as race, religion, sex, or sexual orientation".
Impacts on young people
 Young people as targets of recruitment:
 • Internet is a learning space for easy ideas
 •Hate patterns reach out for youth involvement
 • Emotional risk Young people as victims:
 • Sensitive identity and personality
 • Emotiional or psychological harm
 • Social harm
 • Physical harm
 • Suicide (in extreme situations)
HACKTIVISM
 Derived from combining the words ‘Hack’ and ‘Activism’, hacktivism is the
act of hacking, or breaking into a computer system, for politically or socially
motivated purposes.
 The individual who performs an act of hacktivism is said to be a hacktivist.
 Hacktivism is the act of misusing a computer system or network for a socially
or politically motivated reason.
Hacktivism defined
 • Hacking to promote
 – Political
 Religious
 – Social ideology
 • Human rights
 • Free speech
 • Freedom of information
 • The morality is subjective
HACKTIVISM IS A HUGE CHALLENGE
 In Internet activism, hacktivism (a portmanteau of hack and activism) is the use
of technology to promote a political agenda or a social change.
 With roots in hacker culture and hacker ethics, its ends are often related to the
free speech, human rights, or freedom of information movements.
Who Do Hacktivists Target?
 Common targets for hacktivists include government agencies, multinational
corporations, or any other entity perceived as ‘bad’ or ‘wrong’ by the hacktivist
group or individual
 . Of course, gaining unauthorized access to any organisation’s assets through
such activities is a criminal act, no matter what the intention might be.
HACKTIVISM IN THE NEWS
 Anonymous has been behind some of the largest hacktivist attacks in
recent history, with 2011 seeing a major surge in acts committed
against the threat to internet transparency and also saw the group
successfully break into a number of corporations and security agency
servers, disable government security sites, steal sensitive information
such as credit card details, and deface commercial websites.
 They were not carrying out these acts for their perpetrator’s own
financial or personal gain however for the greater good in showing
opposition against internet censorship and control.
 In 2012, the WikiLeaks political whistle blower site retaliated against Amazon,
PayPal, Visa and Mastercard who had been pressure by the US government to
halt services in order to prevent its supporters from donating to the hacktivist
organization.
 The retaliation came in the form of DDoS attacks that shut down these sites
and caused large scale company losses.
“ Despite global government efforts, hacktivism has become a force to be
reckoned with and still holds the ability to cause mass disruption.”
hate speech

More Related Content

What's hot

eCrypt Technologies
eCrypt TechnologieseCrypt Technologies
eCrypt TechnologiesChuck Brooks
 
EDTEC 685 9-11 Commission findings
EDTEC 685 9-11 Commission findingsEDTEC 685 9-11 Commission findings
EDTEC 685 9-11 Commission findingsKathleen Wooley
 
Social media Big Data and Privacy
Social media Big Data and PrivacySocial media Big Data and Privacy
Social media Big Data and PrivacyAnnaliseKnudson
 
Social media Big Data and Privacy
Social media Big Data and PrivacySocial media Big Data and Privacy
Social media Big Data and PrivacyAnnaliseKnudson
 
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsPrivacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsDavid Wood
 

What's hot (8)

The Future Of Social Networks
The Future Of Social Networks The Future Of Social Networks
The Future Of Social Networks
 
eCrypt Technologies
eCrypt TechnologieseCrypt Technologies
eCrypt Technologies
 
EDTEC 685 9-11 Commission findings
EDTEC 685 9-11 Commission findingsEDTEC 685 9-11 Commission findings
EDTEC 685 9-11 Commission findings
 
Social media Big Data and Privacy
Social media Big Data and PrivacySocial media Big Data and Privacy
Social media Big Data and Privacy
 
Social media Big Data and Privacy
Social media Big Data and PrivacySocial media Big Data and Privacy
Social media Big Data and Privacy
 
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsPrivacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable Claims
 
R41674
R41674R41674
R41674
 
Enterprise 2.0
Enterprise 2.0Enterprise 2.0
Enterprise 2.0
 

Similar to hate speech

Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESJenny O'Meara
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxwhittemorelucilla
 
Briefly define cyber-terrorism. Define hacktivism. Illustrate ex.docx
Briefly define cyber-terrorism. Define hacktivism. Illustrate ex.docxBriefly define cyber-terrorism. Define hacktivism. Illustrate ex.docx
Briefly define cyber-terrorism. Define hacktivism. Illustrate ex.docxjackiewalcutt
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
The psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxThe psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxoreo10
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its DiscontentsMsifry
 
COVID 19 lockdown! A breeding ground for online radicalization to violent ext...
COVID 19 lockdown! A breeding ground for online radicalization to violent ext...COVID 19 lockdown! A breeding ground for online radicalization to violent ext...
COVID 19 lockdown! A breeding ground for online radicalization to violent ext...Belayneh Zelelew
 
Some Perspective on Hackers
Some Perspective on HackersSome Perspective on Hackers
Some Perspective on HackersRandi Lovelett
 
Capstone_SingleSpaced
Capstone_SingleSpacedCapstone_SingleSpaced
Capstone_SingleSpacedCameron Banks
 
As computer and internet technologies have advanced and become m.docx
As computer and internet technologies have advanced and become m.docxAs computer and internet technologies have advanced and become m.docx
As computer and internet technologies have advanced and become m.docxssusera34210
 
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdfBriefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdfarchanaemporium
 
Data and society media manipulation and disinformation online
Data and society media manipulation and disinformation onlineData and society media manipulation and disinformation online
Data and society media manipulation and disinformation onlineAlejandro Sánchez Marín
 
A View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterA View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterJulie Davis
 

Similar to hate speech (20)

Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
Briefly define cyber-terrorism. Define hacktivism. Illustrate ex.docx
Briefly define cyber-terrorism. Define hacktivism. Illustrate ex.docxBriefly define cyber-terrorism. Define hacktivism. Illustrate ex.docx
Briefly define cyber-terrorism. Define hacktivism. Illustrate ex.docx
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
Hacktivism.pdf
Hacktivism.pdfHacktivism.pdf
Hacktivism.pdf
 
The psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxThe psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docx
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its Discontents
 
COVID 19 lockdown! A breeding ground for online radicalization to violent ext...
COVID 19 lockdown! A breeding ground for online radicalization to violent ext...COVID 19 lockdown! A breeding ground for online radicalization to violent ext...
COVID 19 lockdown! A breeding ground for online radicalization to violent ext...
 
What is cyber fraud?
What is cyber fraud?What is cyber fraud?
What is cyber fraud?
 
Some Perspective on Hackers
Some Perspective on HackersSome Perspective on Hackers
Some Perspective on Hackers
 
Polinter06
Polinter06Polinter06
Polinter06
 
Capstone_SingleSpaced
Capstone_SingleSpacedCapstone_SingleSpaced
Capstone_SingleSpaced
 
As computer and internet technologies have advanced and become m.docx
As computer and internet technologies have advanced and become m.docxAs computer and internet technologies have advanced and become m.docx
As computer and internet technologies have advanced and become m.docx
 
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdfBriefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
 
Data and society media manipulation and disinformation online
Data and society media manipulation and disinformation onlineData and society media manipulation and disinformation online
Data and society media manipulation and disinformation online
 
A View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterA View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years Later
 
The Largest Democracy - India
The Largest Democracy - IndiaThe Largest Democracy - India
The Largest Democracy - India
 
Polinter07
Polinter07Polinter07
Polinter07
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 

hate speech

  • 1. HATE SPEECH  Hate speech is defined by Cambridge Dictionary as "public speech that expresses hate or encourages violence towards a person or group based on something such as race, religion, sex, or sexual orientation".
  • 2. Impacts on young people  Young people as targets of recruitment:  • Internet is a learning space for easy ideas  •Hate patterns reach out for youth involvement  • Emotional risk Young people as victims:  • Sensitive identity and personality  • Emotiional or psychological harm  • Social harm  • Physical harm  • Suicide (in extreme situations)
  • 3. HACKTIVISM  Derived from combining the words ‘Hack’ and ‘Activism’, hacktivism is the act of hacking, or breaking into a computer system, for politically or socially motivated purposes.  The individual who performs an act of hacktivism is said to be a hacktivist.  Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason.
  • 4. Hacktivism defined  • Hacking to promote  – Political  Religious  – Social ideology  • Human rights  • Free speech  • Freedom of information  • The morality is subjective
  • 5. HACKTIVISM IS A HUGE CHALLENGE  In Internet activism, hacktivism (a portmanteau of hack and activism) is the use of technology to promote a political agenda or a social change.  With roots in hacker culture and hacker ethics, its ends are often related to the free speech, human rights, or freedom of information movements.
  • 6. Who Do Hacktivists Target?  Common targets for hacktivists include government agencies, multinational corporations, or any other entity perceived as ‘bad’ or ‘wrong’ by the hacktivist group or individual  . Of course, gaining unauthorized access to any organisation’s assets through such activities is a criminal act, no matter what the intention might be.
  • 7. HACKTIVISM IN THE NEWS  Anonymous has been behind some of the largest hacktivist attacks in recent history, with 2011 seeing a major surge in acts committed against the threat to internet transparency and also saw the group successfully break into a number of corporations and security agency servers, disable government security sites, steal sensitive information such as credit card details, and deface commercial websites.  They were not carrying out these acts for their perpetrator’s own financial or personal gain however for the greater good in showing opposition against internet censorship and control.
  • 8.  In 2012, the WikiLeaks political whistle blower site retaliated against Amazon, PayPal, Visa and Mastercard who had been pressure by the US government to halt services in order to prevent its supporters from donating to the hacktivist organization.  The retaliation came in the form of DDoS attacks that shut down these sites and caused large scale company losses. “ Despite global government efforts, hacktivism has become a force to be reckoned with and still holds the ability to cause mass disruption.”