SlideShare a Scribd company logo
1 of 35
BASICS OF SOCIAL
MEDIA
Group Members
• EMAN ANJUM
• ZIL E HUMA NISAR
• MAHEEN ASIF
• SHAFIA FAHIM
• MAIDA HAROON
CYBER HARASSMENT
INTRODUCTION
Cyber harassment is the use of
the Internet or other electronic
means to harass an individual,
a group of individuals, or an
organization.
 Cyber harassment first received
attention by legislators in mid 1980s.
When a young person uses the Internet
or technology to
o Harass
o threaten
o embarrass or
o target another person,
this person is called a CYBER BULLY
• Typically, Cyber bullying involves
tweens and teens.
• If an adult is involved, it is
considered cyber-harassment or
Cyber stalking.
TYPES
DIRECT HARASSMENT include:
 Threats bullying or intimidating messages
sent directly to the victim.
 Via e-mail or other Internet
communications mediums.
 The use of technological means to
interfere with a victim’s use of the Internet,
such as
hacking or denial of services attacks
•
•
•.
INDIRECT HARASSMENT not
limited to spreading rumors about
the victim, it includes:
 Various Internet discussion
forums.
 Subscribing the victim to
unwanted online services.
 Posting information about the
victim in online dating, sex services,
or sending messages to others in
the victim’s name.
WAYS OF CYBER HARASSEMENT
Harassing Someone
 Using text messaging
 Posting rumors, threats or
embarrassing information on
social networking sites such
As Face book and Twitter.
Engaging in ‘warning wars’
Participating in text wars
or text attacks.
IMPERSONATING SOMEONE
Developing a screen name that is similar
to the victim’s screen name.
Stealing the victim’s password
and chatting with other people
while pretending to be the
victim and changing the
target's online profile
Taking degrading pictures
of the victim and then
posting them on photo sharing
sites
USING PHOTOGRAPHS
 
Taking degrading pictures of the victim and
then posting them on photo sharing sites
Threatening to share embarrassing photos as
a way of controlling or blackmailing the victim.
Sending mass emails or
text messages
The photos can be distributed
to hundreds of people within a seconds
CREATING WEBSITES , BLOGS,
POLLS
Creating a blog about the victim that is
embarrassing, insulting or humiliating.
Using information that was shared in
confidence and making it public.
Conducting an Internet poll
about the victim.
Questions in the poll may vary including
everything about that.
Posting rude, mean or insulting comments
about the victim via the chat option of
online gaming sites.
Sending virus , spyware , or hacking
programs to the victim in order to spy on
the victim or
control his or her computer remotely.
Participating In
“Happy Slapping”
 Using a camera phone to
videotape a bullying incident
 Downloading the videotaped bullying
incident and posting it to YouTube
in order to allow a larger
audience to view the incident.
Sharing a videotaped bullying
incident via mass e-mail or text
messaging to humiliate and
embarrass the victim.
Rise of Cyber Bullying
• Day by day its becoming
the most important
social disturbance issues
CULTURAL ASPECT
Due to different culture
conflicts takes place and give
a new start to cyber
harassment
PSYCHOLOGIICAL ASPECT
Due to psychological factors
To take out there frustration or just to
have fun
POLITICAL ASPECT
 Interest in different
political party
 making propaganda
against the opposite party
• Rise after 9/11
CYBER LAWS
The legal issues related to use of
communication technology , particular cyber
space.
 It is an intersection of many legal fields
 Cyber laws is an attempt to apply laws
CYBER LAWS IN THE WORLD
 Electronic Commerce Act (Ireland)
Electronic Transactions Act ( UK, USA ,
AUSTRALIA , NEW ZEALAND & SINGAPORE)
 Electronic Transactions Ordinance
( Hong Kong)
 Information Technology Act (INDIA)
 Information Communication Technology Act
Draft (BANGLADESH)
LAWS
 On January 5, 2006, President Bush
signed Section 113 of the Violence
Against Women Act into law.
 By fines up to $50,000 or
imprisonment for up to two years
CYBER LAWS IN PAKISTAN
 There are different laws promulgated in
Pakistan but are not implemented
Two of them are most known
Electronic Transaction Ordinance 2002
Electronic / Cyber bill 2007
VICTIMS
VICTIMS
oAn 18-year-old Indian girl studying in the Siliguri
Government Polytechnic College committed suicide.
oPhoebe Prince was a 15-year-old Irish immigrant.
oHis last words, posted onto his Facebook profile
about 10 minutes before he died, were: "Jumping
off the GW
bridge sorry.“
oAmanda Todd 1996 – 2012
oRyan Halligan 1989 - 2003
CONCLUSION
2007 SUNFULL movement
 CHOI – JIN- SIL SUCIDE
 Impact of positive comments
 Work with schools and business to positive
comments
Things That We Find
Can Really Hurt Somebody
THANKYOU 
Any ?

More Related Content

What's hot

Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationpamelazuley
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!Asma Hossain
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crimeatifkhanniazi
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointshannonmf
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying caitlynx48
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentationclifforddyyy
 

What's hot (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Human trafficking
Human traffickingHuman trafficking
Human trafficking
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Cyber crime-in-bangladesh
Cyber crime-in-bangladesh Cyber crime-in-bangladesh
Cyber crime-in-bangladesh
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Human trafficking
Human trafficking Human trafficking
Human trafficking
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
 

Viewers also liked

Health communication.ppt by sana
Health communication.ppt by sanaHealth communication.ppt by sana
Health communication.ppt by sanaMuhammad Ahmad
 
Social media vs electronic media
Social media vs electronic mediaSocial media vs electronic media
Social media vs electronic mediaMuhammad Ahmad
 
Presentation new media-landscape
Presentation new media-landscapePresentation new media-landscape
Presentation new media-landscapeMuhammad Ahmad
 
Broadcast dialer
Broadcast dialer Broadcast dialer
Broadcast dialer TelOnline
 
Presentation naila, milha john bmc 7
Presentation naila, milha john bmc 7Presentation naila, milha john bmc 7
Presentation naila, milha john bmc 7Muhammad Ahmad
 
Presentation types of communication medium bs (h) pu 2013
Presentation types of communication medium bs (h) pu 2013Presentation types of communication medium bs (h) pu 2013
Presentation types of communication medium bs (h) pu 2013Muhammad Ahmad
 
Presentation on paper umt jan 2013
Presentation on paper umt jan 2013Presentation on paper umt jan 2013
Presentation on paper umt jan 2013Muhammad Ahmad
 
Presentation seato and cento presentation (1)
Presentation seato and cento presentation (1)Presentation seato and cento presentation (1)
Presentation seato and cento presentation (1)Muhammad Ahmad
 
Mode of writing (mmc 2)b,cast media 2
Mode of writing (mmc 2)b,cast media 2Mode of writing (mmc 2)b,cast media 2
Mode of writing (mmc 2)b,cast media 2Muhammad Ahmad
 
Facsys fax Server Solution
Facsys fax Server SolutionFacsys fax Server Solution
Facsys fax Server SolutionTelOnline
 
Presentation. bias in the news (2)
Presentation. bias in the news (2)Presentation. bias in the news (2)
Presentation. bias in the news (2)Muhammad Ahmad
 
Presentation.. media and challenges of global corruption slideshare
Presentation.. media and challenges of global corruption slidesharePresentation.. media and challenges of global corruption slideshare
Presentation.. media and challenges of global corruption slideshareMuhammad Ahmad
 
Digium buyers guide
Digium buyers guideDigium buyers guide
Digium buyers guideTelOnline
 

Viewers also liked (15)

Health communication.ppt by sana
Health communication.ppt by sanaHealth communication.ppt by sana
Health communication.ppt by sana
 
Social media vs electronic media
Social media vs electronic mediaSocial media vs electronic media
Social media vs electronic media
 
Presentation new media-landscape
Presentation new media-landscapePresentation new media-landscape
Presentation new media-landscape
 
Broadcast dialer
Broadcast dialer Broadcast dialer
Broadcast dialer
 
Presentation naila, milha john bmc 7
Presentation naila, milha john bmc 7Presentation naila, milha john bmc 7
Presentation naila, milha john bmc 7
 
Presentation types of communication medium bs (h) pu 2013
Presentation types of communication medium bs (h) pu 2013Presentation types of communication medium bs (h) pu 2013
Presentation types of communication medium bs (h) pu 2013
 
Acronyms
AcronymsAcronyms
Acronyms
 
Presentation on paper umt jan 2013
Presentation on paper umt jan 2013Presentation on paper umt jan 2013
Presentation on paper umt jan 2013
 
Presentation seato and cento presentation (1)
Presentation seato and cento presentation (1)Presentation seato and cento presentation (1)
Presentation seato and cento presentation (1)
 
Writing for broadcast
Writing for broadcastWriting for broadcast
Writing for broadcast
 
Mode of writing (mmc 2)b,cast media 2
Mode of writing (mmc 2)b,cast media 2Mode of writing (mmc 2)b,cast media 2
Mode of writing (mmc 2)b,cast media 2
 
Facsys fax Server Solution
Facsys fax Server SolutionFacsys fax Server Solution
Facsys fax Server Solution
 
Presentation. bias in the news (2)
Presentation. bias in the news (2)Presentation. bias in the news (2)
Presentation. bias in the news (2)
 
Presentation.. media and challenges of global corruption slideshare
Presentation.. media and challenges of global corruption slidesharePresentation.. media and challenges of global corruption slideshare
Presentation.. media and challenges of global corruption slideshare
 
Digium buyers guide
Digium buyers guideDigium buyers guide
Digium buyers guide
 

Similar to Cyber harassment ppt umt

Cyber Sexual Violence and Understanding
Cyber Sexual Violence and UnderstandingCyber Sexual Violence and Understanding
Cyber Sexual Violence and Understandingssusere22fb9
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technologyijtsrd
 
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfLEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfRegineManuel2
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxJoelGautham
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimesNilendra Kumar
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullyingZiar Khan
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their preventionAnsar Gill
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their preventionTejasvi Bhatia
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
NETS5003 Policy Primer: Cyber harassment
NETS5003 Policy Primer: Cyber harassmentNETS5003 Policy Primer: Cyber harassment
NETS5003 Policy Primer: Cyber harassmentSamara Williams
 

Similar to Cyber harassment ppt umt (20)

Cyber Sexual Violence and Understanding
Cyber Sexual Violence and UnderstandingCyber Sexual Violence and Understanding
Cyber Sexual Violence and Understanding
 
Riza 9 a
Riza   9 aRiza   9 a
Riza 9 a
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
 
Oula 9 a
Oula   9 aOula   9 a
Oula 9 a
 
Cyber safety
Cyber  safetyCyber  safety
Cyber safety
 
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfLEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Facebook
FacebookFacebook
Facebook
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Kinds of Cyber Crimes
Kinds of Cyber CrimesKinds of Cyber Crimes
Kinds of Cyber Crimes
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Boushrat 9 a
Boushrat   9 aBoushrat   9 a
Boushrat 9 a
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
NETS5003 Policy Primer: Cyber harassment
NETS5003 Policy Primer: Cyber harassmentNETS5003 Policy Primer: Cyber harassment
NETS5003 Policy Primer: Cyber harassment
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Cyber harassment ppt umt

  • 1.
  • 3. Group Members • EMAN ANJUM • ZIL E HUMA NISAR • MAHEEN ASIF • SHAFIA FAHIM • MAIDA HAROON
  • 5. INTRODUCTION Cyber harassment is the use of the Internet or other electronic means to harass an individual, a group of individuals, or an organization.
  • 6.  Cyber harassment first received attention by legislators in mid 1980s. When a young person uses the Internet or technology to o Harass o threaten o embarrass or o target another person, this person is called a CYBER BULLY
  • 7. • Typically, Cyber bullying involves tweens and teens. • If an adult is involved, it is considered cyber-harassment or Cyber stalking.
  • 8.
  • 9. TYPES DIRECT HARASSMENT include:  Threats bullying or intimidating messages sent directly to the victim.  Via e-mail or other Internet communications mediums.  The use of technological means to interfere with a victim’s use of the Internet, such as hacking or denial of services attacks
  • 11. INDIRECT HARASSMENT not limited to spreading rumors about the victim, it includes:  Various Internet discussion forums.  Subscribing the victim to unwanted online services.  Posting information about the victim in online dating, sex services, or sending messages to others in the victim’s name.
  • 12. WAYS OF CYBER HARASSEMENT Harassing Someone  Using text messaging  Posting rumors, threats or embarrassing information on social networking sites such As Face book and Twitter.
  • 13. Engaging in ‘warning wars’ Participating in text wars or text attacks.
  • 14. IMPERSONATING SOMEONE Developing a screen name that is similar to the victim’s screen name. Stealing the victim’s password and chatting with other people while pretending to be the victim and changing the target's online profile Taking degrading pictures of the victim and then posting them on photo sharing sites
  • 15. USING PHOTOGRAPHS   Taking degrading pictures of the victim and then posting them on photo sharing sites Threatening to share embarrassing photos as a way of controlling or blackmailing the victim. Sending mass emails or text messages The photos can be distributed to hundreds of people within a seconds
  • 16.
  • 17. CREATING WEBSITES , BLOGS, POLLS Creating a blog about the victim that is embarrassing, insulting or humiliating. Using information that was shared in confidence and making it public. Conducting an Internet poll about the victim.
  • 18. Questions in the poll may vary including everything about that. Posting rude, mean or insulting comments about the victim via the chat option of online gaming sites. Sending virus , spyware , or hacking programs to the victim in order to spy on the victim or control his or her computer remotely.
  • 19.
  • 20. Participating In “Happy Slapping”  Using a camera phone to videotape a bullying incident  Downloading the videotaped bullying incident and posting it to YouTube in order to allow a larger audience to view the incident.
  • 21. Sharing a videotaped bullying incident via mass e-mail or text messaging to humiliate and embarrass the victim.
  • 22. Rise of Cyber Bullying • Day by day its becoming the most important social disturbance issues
  • 23. CULTURAL ASPECT Due to different culture conflicts takes place and give a new start to cyber harassment
  • 24. PSYCHOLOGIICAL ASPECT Due to psychological factors To take out there frustration or just to have fun
  • 25. POLITICAL ASPECT  Interest in different political party  making propaganda against the opposite party
  • 27. CYBER LAWS The legal issues related to use of communication technology , particular cyber space.  It is an intersection of many legal fields  Cyber laws is an attempt to apply laws
  • 28. CYBER LAWS IN THE WORLD  Electronic Commerce Act (Ireland) Electronic Transactions Act ( UK, USA , AUSTRALIA , NEW ZEALAND & SINGAPORE)  Electronic Transactions Ordinance ( Hong Kong)  Information Technology Act (INDIA)  Information Communication Technology Act Draft (BANGLADESH)
  • 29. LAWS  On January 5, 2006, President Bush signed Section 113 of the Violence Against Women Act into law.  By fines up to $50,000 or imprisonment for up to two years
  • 30. CYBER LAWS IN PAKISTAN  There are different laws promulgated in Pakistan but are not implemented Two of them are most known Electronic Transaction Ordinance 2002 Electronic / Cyber bill 2007
  • 31.
  • 32. VICTIMS VICTIMS oAn 18-year-old Indian girl studying in the Siliguri Government Polytechnic College committed suicide. oPhoebe Prince was a 15-year-old Irish immigrant. oHis last words, posted onto his Facebook profile about 10 minutes before he died, were: "Jumping off the GW bridge sorry.“ oAmanda Todd 1996 – 2012 oRyan Halligan 1989 - 2003
  • 33. CONCLUSION 2007 SUNFULL movement  CHOI – JIN- SIL SUCIDE  Impact of positive comments  Work with schools and business to positive comments
  • 34. Things That We Find Can Really Hurt Somebody THANKYOU 
  • 35. Any ?