Presentation Title: Cyber Harassment
Group members:
Eman anjum
Zil e huma nisar
Maheen asif
Shafia fahim
Maida haroon
This presentation was presented by the students of Mass communication on 30th Sept, 2013 at University Management and Technology.
Teacher’s Remarks
Main ideas: unambiguous
Background information: Satisfactory
Audience attention: maximum
Accent: Good
Eye contact with the audience: Encouraging.
Voice: strong and clear, not a monotone.
Others: Easy to read, and have impact, Gestures are natural.
Teacher: Muhammad Ahmad Sheikh
ideas: unambiguous
Background information: Satisfactory
Audience attention: maximum
Accent: Good
Eye contact with the audience: Encouraging.
Voice: strong and clear, not a monotone.
Others: Easy to read, and have impact, Gestures are natural.
Teacher: Muhammad Ahmad Sheikh
5. INTRODUCTION
Cyber harassment is the use of
the Internet or other electronic
means to harass an individual,
a group of individuals, or an
organization.
6. Cyber harassment first received
attention by legislators in mid 1980s.
When a young person uses the Internet
or technology to
o Harass
o threaten
o embarrass or
o target another person,
this person is called a CYBER BULLY
7. • Typically, Cyber bullying involves
tweens and teens.
• If an adult is involved, it is
considered cyber-harassment or
Cyber stalking.
8.
9. TYPES
DIRECT HARASSMENT include:
Threats bullying or intimidating messages
sent directly to the victim.
Via e-mail or other Internet
communications mediums.
The use of technological means to
interfere with a victim’s use of the Internet,
such as
hacking or denial of services attacks
11. INDIRECT HARASSMENT not
limited to spreading rumors about
the victim, it includes:
Various Internet discussion
forums.
Subscribing the victim to
unwanted online services.
Posting information about the
victim in online dating, sex services,
or sending messages to others in
the victim’s name.
12. WAYS OF CYBER HARASSEMENT
Harassing Someone
Using text messaging
Posting rumors, threats or
embarrassing information on
social networking sites such
As Face book and Twitter.
14. IMPERSONATING SOMEONE
Developing a screen name that is similar
to the victim’s screen name.
Stealing the victim’s password
and chatting with other people
while pretending to be the
victim and changing the
target's online profile
Taking degrading pictures
of the victim and then
posting them on photo sharing
sites
15. USING PHOTOGRAPHS
Taking degrading pictures of the victim and
then posting them on photo sharing sites
Threatening to share embarrassing photos as
a way of controlling or blackmailing the victim.
Sending mass emails or
text messages
The photos can be distributed
to hundreds of people within a seconds
16.
17. CREATING WEBSITES , BLOGS,
POLLS
Creating a blog about the victim that is
embarrassing, insulting or humiliating.
Using information that was shared in
confidence and making it public.
Conducting an Internet poll
about the victim.
18. Questions in the poll may vary including
everything about that.
Posting rude, mean or insulting comments
about the victim via the chat option of
online gaming sites.
Sending virus , spyware , or hacking
programs to the victim in order to spy on
the victim or
control his or her computer remotely.
19.
20. Participating In
“Happy Slapping”
Using a camera phone to
videotape a bullying incident
Downloading the videotaped bullying
incident and posting it to YouTube
in order to allow a larger
audience to view the incident.
21. Sharing a videotaped bullying
incident via mass e-mail or text
messaging to humiliate and
embarrass the victim.
22. Rise of Cyber Bullying
• Day by day its becoming
the most important
social disturbance issues
23. CULTURAL ASPECT
Due to different culture
conflicts takes place and give
a new start to cyber
harassment
27. CYBER LAWS
The legal issues related to use of
communication technology , particular cyber
space.
It is an intersection of many legal fields
Cyber laws is an attempt to apply laws
28. CYBER LAWS IN THE WORLD
Electronic Commerce Act (Ireland)
Electronic Transactions Act ( UK, USA ,
AUSTRALIA , NEW ZEALAND & SINGAPORE)
Electronic Transactions Ordinance
( Hong Kong)
Information Technology Act (INDIA)
Information Communication Technology Act
Draft (BANGLADESH)
29. LAWS
On January 5, 2006, President Bush
signed Section 113 of the Violence
Against Women Act into law.
By fines up to $50,000 or
imprisonment for up to two years
30. CYBER LAWS IN PAKISTAN
There are different laws promulgated in
Pakistan but are not implemented
Two of them are most known
Electronic Transaction Ordinance 2002
Electronic / Cyber bill 2007
31.
32. VICTIMS
VICTIMS
oAn 18-year-old Indian girl studying in the Siliguri
Government Polytechnic College committed suicide.
oPhoebe Prince was a 15-year-old Irish immigrant.
oHis last words, posted onto his Facebook profile
about 10 minutes before he died, were: "Jumping
off the GW
bridge sorry.“
oAmanda Todd 1996 – 2012
oRyan Halligan 1989 - 2003
33. CONCLUSION
2007 SUNFULL movement
CHOI – JIN- SIL SUCIDE
Impact of positive comments
Work with schools and business to positive
comments