SlideShare a Scribd company logo
A presentation by REMMY NWEKE, Lead Strategist at DigitalSENSE Africa Media Ltd to the
Young Catholic Workers at St. Jude Mafoluku-Lagos, December, 17, 2016.
1
Topic:
Drug Effects on Cyber Crimes @Work Place
1) Prelude
2) The Objective
3) What is Drugs and its kinds @Work Place
4) Drug Use by young adults
5) What is Cyber Crime
6) Defining CyberStalking-Harassment @Work Place
7) What Nigerian CyberCrime Act 2015 said
8) Why drugs @ Work Place
9) Recommendations
10)Q & A
Drug Effects on Cyber Crimes @Work Place
Prelude: Thanks to the organisers and managment of DigitalSENSE Africa Media group for the
opportunity to share some thoughts with members of this group, today.
The Objective:
The essence of this presentation and discussion around it is to highlight the dangers in doing drugs
by the youth or better still young workers as well as likely implications which include engaging in
unholy businesses of cyber-stalking/harassment of other citizens and actually involvement in
hacking peoples online identity for a ransom or just for the fun of it, especially at the work place.
What is Drug:
A medicine or other substance which has a physiological effect when ingested or otherwise
introduced into the body. But the drug as far as this gathering seems concerned is for those who use
drugs other than as may have been recommended by the medical professionals and invariably
obtained from the authorised shops or medicine stores.
Statistics have shown that most people first try drugs in their teenage years. In fact, of more than
three million new drug users in 2011 alone, (US) more than half were under 18. While more than
half of these users tried marijuana first, prescription pain relievers, inhalants, tranquilizers were
also quite popular among this demographic. Inhalant use was most prevalent among younger teens,
a statistic that is not at all questionable considering how easy it is for people in this age group to
access sharpies, hairspray, and bath salts.
Sharpies:
This is a brand of set of pens in the US, just like Bic here which usually have inks instilled in the
writing tube. Experts say that to inhale this could be dangerous and in in fact, contain volatile
solvents—and when inhaled these solvents can produce a "high." The effects of inhalants (including
A presentation by REMMY NWEKE, Lead Strategist at DigitalSENSE Africa Media Ltd to the
Young Catholic Workers at St. Jude Mafoluku-Lagos, December, 17, 2016.
2
Sharpies) can be similar to those of alcohol, and include slurred speech, lack of coordination,
euphoria, and dizziness.
Hairspray:
Propellant gases used as inhalants include Freon and compressed hydro fluorocarbons, which are
used in various household and office products that come in aerosol spray cans, such as air
freshener, computer keyboard cleaner spray (gas dusters, sometimes erroneously called "canned
air"), non-stick cooking spray, aerosol .
Bath Salts (Synthetic Cathinones):
Bath salts is a term used in North America and Europe to describe a number of recreational
designer drugs. Also known as Bloom, Cloud Nine, Flakka, Vanilla Sky, White Lightning, and
Scarface. “Bath salts” is the name given to a class of drugs that have one or more of these attributes.
Inhalants:
Inhalants are chemicals found in ordinary household or workplace products that people inhale on
purpose to get “high.” Because many inhalants can be found around the house, people often don’t
realize that inhaling their fumes, even just once, can be very harmful to the brain and body and can
lead to death. In fact, the chemicals found in these products can change the way the brain works
and cause other problems in the body.
Although different inhalants cause different effects, but they generally fall into one of four
categories;
1. Volatile solvents are liquids that become a gas at room temperature. They are found in:
Paint thinner, nail polish remover, degreaser, dry-cleaning fluid, gasoline, and contact cement
Some art or office supplies, such as correction fluid, felt-tip marker fluid, and electronic
contact cleaner
2. Aerosols are sprays that contain propellants and solvents. They include: Spray paint, hair
spray, deodorant spray, vegetable oil sprays, and fabric protector spray
3. Gases may be in household or commercial products, or used in the medical field to provide
pain relief. They are found in: Butane lighters, propane tanks, whipped cream dispensers, and
refrigerant gases
4. Anesthesia, including ether, chloroform, halothane, and nitrous oxide (commonly called
“laughing gas”).
NB: Nitrites are a class of inhalants used mainly to enhance sexual experiences. Organic nitrites
include amyl, butyl, and cyclohexyl nitrites and other related compounds. Amyl nitrite was used in
the past by doctors to help with chest pain and is sometimes used today to diagnose heart
problems. Nitrites now are prohibited by the Consumer Product Safety Commission but can still be
found, sold in small bottles labeled as “video head cleaner,” “room odorizer,” “leather cleaner,” or
“liquid aroma.”
NB: People also inhale toilet, burn tyres, take Indian Hemps (Igbo) etc.
A presentation by REMMY NWEKE, Lead Strategist at DigitalSENSE Africa Media Ltd to the
Young Catholic Workers at St. Jude Mafoluku-Lagos, December, 17, 2016.
3
Drug Use by young adults
Drug use also continues to be high among young adults, aged 18 and above; in 2011, an estimated
23.8 percent of people in this age group had used an illicit drug in the previous month. “Pharming”
among young adults is popular, with prescription drugs like Ritalin, Adderall, and DXM often
abused. While individuals may see these drugs as harmless because they help them focus, their
long-term use can have serious debilitating effects.
What is CyberCrime: – Criminal activities carried out by means of computers or/on the Internet.
Defining CyberBullying? This entails the use of electronic communication to bully a person,
typically by sending messages of an intimidating or threatening nature.
Although children may be reluctant to admit to being the victims of cyberbullying, researchers have
identified them as very vulnerable, according to StopCyberbulling.org.
Further, the organization, says "Cyberbullying" is when a child, preteen or teen is tormented,
threatened, harassed, humiliated, embarrassed or otherwise targeted by another child,
preteen or teen using the Internet, interactive and digital technologies or mobile phones. It has
to have a minor on both sides, or at least have been instigated by a minor against another
minor.
Once adults become involved, it is plain and simple cyber-harassment or cyberstalking. Adult cyber-
harassment or cyberstalking is NEVER called cyberbullying.
It isn't when adult are trying to lure children into offline meetings, that is called sexual exploitation
or luring by a sexual predator. But sometimes when a minor starts a cyberbullying campaign it
involves sexual predators who are intrigued by the sexual harassment or even ads posted by the
cyberbullying offering up the victim for sex.
The methods used are limited only by the child's imagination and access to technology. And the
cyberbully one moment may become the victim the next. The kids often change roles, going from
victim to bully and back again.
Defining Cyber Stalking:
The repeated use of electronic communications to harass or frighten someone, for example by
sending threatening emails.
CyberStalk and get 10-yrs imprisonment:
In the Nigerian CyberCrime Prohibition, Prevention etc Act 2015 (Nigeria Cybercriminal Act 2015),
the subsection 24 on (CyberStalking - Harassment) is the only place ‘bullying’ appeared in the Act,
just once, which thus states, as follows;
24. Any person who knowingly or intentionally sends a message or other matter by means of
computer systems or network that -
(a) is grossly offensive, pornographic or of an indecent, obscene or menacing
A presentation by REMMY NWEKE, Lead Strategist at DigitalSENSE Africa Media Ltd to the
Young Catholic Workers at St. Jude Mafoluku-Lagos, December, 17, 2016.
4
character or causes any such message or matter to be so sent; or
(b) he knows to be false, for the purpose of causing annoyance, inconvenience
danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, ill will
or needless anxiety to another or causes such a message to be sent:
commits an offence under this Act and shall be liable on conviction to a fine of
not more than N7,000,000.00 or imprisonment for a term of not more than 3
years or to both such fine and imprisonment.
(2) Any person who knowingly or intentionally transmits or causes the transmission
of any communication through a computer system or network -
(a) to bully, threaten or harass another person, where such communication
places another person in fear of death, violence or bodily harm or to another
person;
(b) containing any threat to kidnap any person or any threat to harm the
person of another, any demand or request for a ransom for the release of any
kidnapped person, to extort from any person, firm, association or
corporation, any money or other thing of value; or
(c)containing any threat to harm the property or reputation of the addressee
or of another or the reputation of a deceased person or any threat to accuse
the addressee or any other person of a crime, to extort from any person, firm,
association, or corporation, any money or other thing of value:
commits an offence under this Act and shall be liable on conviction-
(i)in the case of paragraphs (a) and (b) of this subsection to imprisonment
for a term of 10 years and/or a minimum fine of N25,000,000.00; and
(ii)in the case of paragraph (c) and (d) of this subsection, to imprisonment
for a term of 5 years and/or a minimum fine of N15,000,000.00.
(3) A court sentencing or otherwise dealing with a person convicted of an
offence under subsections (1) and (2) may also make an order, which may,
for the purpose of protecting the victim or victims of the offence, or any
other person mentioned in the order, from further conduct which-
(a) amounts to harassment; or
(b) will cause fear of violence, death or bodily harm; prohibit the defendant
from doing anything described/specified in the order.
(4) A defendant who does anything which he is prohibited from doing by an
order under this section, commits an offence and shall be liable on conviction
to a fine of not more than N10,000,000.00 or imprisonment for a term of not
more than 3 years or to both such fine and imprisonment.
A presentation by REMMY NWEKE, Lead Strategist at DigitalSENSE Africa Media Ltd to the
Young Catholic Workers at St. Jude Mafoluku-Lagos, December, 17, 2016.
5
(5) The order made under subsection (3) of this section may have effect for a
specified period or until further order and the defendant or any other person
mentioned in the order may apply to the court which made the order for it to
be varied or discharged by a further order.
(6)Notwithstanding the powers of the court under subsections (3) and (5),
the court may make an interim order for the protection of victim(s) from
further exposure to the alleged offences.
Stalking in the workplace
Stalking in the workplace can have severe consequences for the victim and their colleagues.
Although fortunately rare, this can even result in serious or fatal injury for anyone present at the
time. While research into stalking victimisation in the workplace has primarily focused on mental
health professionals, it is clear that stalking affects victims in all types of workplaces. The
importance of supportive and appropriate measures to assist victims and ensure the overall safety
of any workplace cannot be over emphasised.
Workplace stalking can arise from many different contexts, including: Stalking intruding into the
workplace from victimisation outside work, Clients stalking staff, Clients stalking other clients, and
Staff stalking co-workers
Occupational Damage:
Stalking in the workplace can have a detrimental impact on work performance not only for the
victim, but also those they work with. To reduce the effect that stalking may have on productivity, it
is important to understand the reasons why job performance may deteriorate and then look to
ways that your organisation can help employees to overcome these problems. The workplace can
be impacted in a number of ways:
Time off work:
Sick leave – the victim and third parties with psychological symptoms
Frightened to leave the house
Attending to legal matters
Avoiding work if the stalker is a co-worker
Deteriorating work performance and relations
Unable to concentrate on work when in attendance
Difficulty catching up after missed days
Time lost due to stalking intruding on the workplace e.g. phone calls, approaches etc
A presentation by REMMY NWEKE, Lead Strategist at DigitalSENSE Africa Media Ltd to the
Young Catholic Workers at St. Jude Mafoluku-Lagos, December, 17, 2016.
6
Tension in the workplace arising from allegations made against the victim that they have somehow
encouraged the stalker or are over reacting
Prevention
Stalking is a crime in most jurisdictions, and all workplaces have an ethical and legal obligation to
manage stalking behaviour and support those who are affected. Many victims state that they are
reluctant to speak with managers and co-workers about being stalked out of embarrassment
and/or fear.
It is up to the employer to create an environment where victims feel safe to report this behaviour.
Central to this is making it clear that stalking victims are not to blame for their predicament, even if
the victim was previously in a relationship with the stalker.
Employers should also ensure that other employees are made aware of stalking situations when
they have a role in managing the risks.
A very real danger for many stalking victims is that fellow employees are often unaware of the
dangers of stalking, particularly receptionists and others responsible for entry into a business. The
most effective way to reduce the impact of stalking is to determine how the victim and other
employees can be supported.
Preventative measures:
The best way to reduce the possibility of harassment in the workplace is to ensure that all
employees understand how to deal effectively with potential problems that may result in a stalking
situation. Stalking situations are more effectively managed when employees are aware of exactly
what they need to do under such circumstances and therefore feel better equipped to deal with the
problem. The impact of conflict is reduced when organisations:
develop and enforce strong policies on what constitutes inappropriate contact and harassment at
work, either by clients or co-workers.
develop policies that detail the process for dealing with aggressive or agitated individuals and for
reporting complaints, suspicious behaviour and critical incidents.
review policies on a regular basis and ensure amendments are made following any critical incident.
educate management and employees about bullying and stalking behaviours and what they need to
do if such a situation arises. It is crucial that employees do not feel that they will be judged as
overreacting if they report something that they think might be trivial. It is better to praise the
individual for being alert, rather than try to repair the damage that may arise if incidents are not
reported.
have policies and procedures in place that provide for the support of victims and employees should
an adverse event occur.
A presentation by REMMY NWEKE, Lead Strategist at DigitalSENSE Africa Media Ltd to the
Young Catholic Workers at St. Jude Mafoluku-Lagos, December, 17, 2016.
7
When stalking occurs:
Everyone who may have contact with the stalker should be informed about the situation and have a
refresher on the policy and procedures for dealing with harassing behaviour. This should be
tailored to the specific situation and victim/s. Staff can become frightened when such a situation is
discussed, so the issue should be broached in a calm manner, emphasising that there are policies
and procedures in place to deal with the situation. It is important to explain that remaining calm
and following procedures is the best way to prevent the escalation of any adverse situations.
General Measures for Managing Stalking Situations:
Ensure that the victim understands that they have your support and that they can talk about their
concerns. This will place you in a better position to understand the issues involved and then plan
the best approach to protect the victim and other employees. You need to know if a restraining
order is in place, so encourage the victim to disclose the relevant information regarding the
worksite.
Review the relevant security issues e.g. site access, car park lighting, bushes that provide hiding
places
Try to provide a safe car-park for the victim. Have someone walk the victim to their car.
If possible, allow the victim to work flexible hours so that they can vary the time that they arrive
and leave work.
Ensure that staff apply necessary precautions such as screening phone calls and people that come
to the office.
If a co-worker receives a call from the stalker or has seen them around the workplace, ensure they
know to report it immediately to management and document it.
If a restraining order prohibits the stalker from the workplace, call the police immediately and file a
report, should he/she appear.
Ensure that no one gives out any information e.g. days or hours of work, phone numbers etc.
The better your company understands stalking, the better protection you and your fellow
employees will have.
Drugs @ Work Place:
Everyone here, one way or the other relates with the airport and its important to note that in recent
past, several workers have been involved in drug trafficking and one remarkable thing about this, is
that they may claim first timer when caught by the Law, but definitely they do drugs locally and
were attracted to do more or even earn more to be able to live up to their new life style.
We may not be alien to stories of those working at the airport that are caught almost, always.
A presentation by REMMY NWEKE, Lead Strategist at DigitalSENSE Africa Media Ltd to the
Young Catholic Workers at St. Jude Mafoluku-Lagos, December, 17, 2016.
8
Recommendations:
1. Uncontrollable attitude should be watched and avoided by all means.
2. Be discipline in the use of even prescribed drugs
3. Nigerian employers should have workplace policy against doing drugs and cyberstalking
4. Continuous anti-drug education, even beyond workplace beginning from primary schools to
all higher institutions
5. There is need to consistently conduct enlightenment on cyber-stalking, especially in the
work place.
6. Statistical data required for people/Nigerians with drug related cases
7. Doing a background check on potential employees is not a bad idea and repeating
periodically is encouraged.
8. Working class people should know the kind of friends they keep, even at work place.
9. All situations of harassment in the workplace need to be addressed by management, not
only in an attempt to de-escalate the situation, but also to reduce the impact on all parties
personally, professionally and from the organisation’s perspective. To do so it is important
to adhere to some conducts:
10. Always maintain the dignity of both parties by listening to both sides and explaining why
decisions are being made.
11. Do not rationalise or excuse stalking behaviour.
12. Reinforce policies that prohibit harassment, and emphasise the consequences of breaches.
13. Do not attempt mediation unless the victim is willing to do so. It is crucial that the victim
does not feel pressured into a mediation process simply because the harassment has
occurred in the workplace. Be sensitive to the victim’s feelings and avoid facilitating
continued traumatisation of the victim.
14. If the stalker has a grievance, suggest appropriate means of addressing the problem (e.g.,
complaints procedures or mediation), but do not collude with the inappropriate behaviour
or inadvertently provide alternative avenues of harassment.
15. Contact the police if necessary
16. Theorem of Two glasses when induced or the urge comes.
17. Remember life is short and take control of it
18. Power of prayers for those already on drugs should be encouraged
19. Realisation that with God all things are possible in Jesus Christ, name, Amen
20. Thank you.
Q & A

More Related Content

Similar to Drug Effects on Cyber Crimes

Response Essay Structure. How To Write A Response
Response Essay Structure. How To Write A ResponseResponse Essay Structure. How To Write A Response
Response Essay Structure. How To Write A Response
Aaron Anyaakuu
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber path
Profsdetchana Murthy
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
Gerwin Ocsena
 
Ethicsincyberspace (3)
Ethicsincyberspace (3)Ethicsincyberspace (3)
Ethicsincyberspace (3)
Maria Obaidi
 
cyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spearcyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spear
NIST, berhampur
 
Cybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community PeaceCybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community Peace
Mubarak Al Hadadi
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
Christine Hui Jun Zhong
 
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Michelle Ferrier
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
ayerssaa
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rohitha Sankar
 
012 College Application Essay Examples About Yo
012 College Application Essay Examples About Yo012 College Application Essay Examples About Yo
012 College Application Essay Examples About Yo
Lisa Muthukumar
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
DominicCaling
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
Vanessa Assumpção
 
Raised Line Paper (Pack Of 50) - Assistive Technology
Raised Line Paper (Pack Of 50) - Assistive TechnologyRaised Line Paper (Pack Of 50) - Assistive Technology
Raised Line Paper (Pack Of 50) - Assistive Technology
Melissa Grant
 
Cyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfCyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdf
Rahil Foundation
 
Why Am I In College Essay. Why I Am Going To Colleg
Why Am I In College Essay. Why I Am Going To CollegWhy Am I In College Essay. Why I Am Going To Colleg
Why Am I In College Essay. Why I Am Going To Colleg
Trina Jackson
 
Impact of Cyber Crime Issues and Challenges
Impact of Cyber Crime Issues and ChallengesImpact of Cyber Crime Issues and Challenges
Impact of Cyber Crime Issues and Challenges
ijtsrd
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
Can R. PAHALI
 
28 Lined Paper Templates. Online assignment writing service.
28 Lined Paper Templates. Online assignment writing service.28 Lined Paper Templates. Online assignment writing service.
28 Lined Paper Templates. Online assignment writing service.
Serena Faye
 
Content Happy Frog - Letter Writing Paper Set 2
Content Happy Frog - Letter Writing Paper Set 2Content Happy Frog - Letter Writing Paper Set 2
Content Happy Frog - Letter Writing Paper Set 2
Alison Carias
 

Similar to Drug Effects on Cyber Crimes (20)

Response Essay Structure. How To Write A Response
Response Essay Structure. How To Write A ResponseResponse Essay Structure. How To Write A Response
Response Essay Structure. How To Write A Response
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber path
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Ethicsincyberspace (3)
Ethicsincyberspace (3)Ethicsincyberspace (3)
Ethicsincyberspace (3)
 
cyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spearcyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spear
 
Cybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community PeaceCybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community Peace
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
012 College Application Essay Examples About Yo
012 College Application Essay Examples About Yo012 College Application Essay Examples About Yo
012 College Application Essay Examples About Yo
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
Raised Line Paper (Pack Of 50) - Assistive Technology
Raised Line Paper (Pack Of 50) - Assistive TechnologyRaised Line Paper (Pack Of 50) - Assistive Technology
Raised Line Paper (Pack Of 50) - Assistive Technology
 
Cyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfCyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdf
 
Why Am I In College Essay. Why I Am Going To Colleg
Why Am I In College Essay. Why I Am Going To CollegWhy Am I In College Essay. Why I Am Going To Colleg
Why Am I In College Essay. Why I Am Going To Colleg
 
Impact of Cyber Crime Issues and Challenges
Impact of Cyber Crime Issues and ChallengesImpact of Cyber Crime Issues and Challenges
Impact of Cyber Crime Issues and Challenges
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
28 Lined Paper Templates. Online assignment writing service.
28 Lined Paper Templates. Online assignment writing service.28 Lined Paper Templates. Online assignment writing service.
28 Lined Paper Templates. Online assignment writing service.
 
Content Happy Frog - Letter Writing Paper Set 2
Content Happy Frog - Letter Writing Paper Set 2Content Happy Frog - Letter Writing Paper Set 2
Content Happy Frog - Letter Writing Paper Set 2
 

More from Remmy Nweke, mNGE, mNUJ, mGOCOP

[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS by Remmy NWEK...
[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS  by Remmy NWEK...[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS  by Remmy NWEK...
[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS by Remmy NWEK...
Remmy Nweke, mNGE, mNUJ, mGOCOP
 
[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS by Remmy NWEK...
[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS  by Remmy NWEK...[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS  by Remmy NWEK...
[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS by Remmy NWEK...
Remmy Nweke, mNGE, mNUJ, mGOCOP
 
Know Your IT for Digital Publishers by Remmy Nweke 
Know Your IT for Digital Publishers by Remmy Nweke Know Your IT for Digital Publishers by Remmy Nweke 
Know Your IT for Digital Publishers by Remmy Nweke 
Remmy Nweke, mNGE, mNUJ, mGOCOP
 
Overview of Communicating Nutrition & Social Media Best Practices in Nigeria ...
Overview of Communicating Nutrition & Social Media Best Practices in Nigeria ...Overview of Communicating Nutrition & Social Media Best Practices in Nigeria ...
Overview of Communicating Nutrition & Social Media Best Practices in Nigeria ...
Remmy Nweke, mNGE, mNUJ, mGOCOP
 
The UN Decade of Action on Nutrition: Connecting the Dots for Nigeria by Remm...
The UN Decade of Action on Nutrition: Connecting the Dots for Nigeria by Remm...The UN Decade of Action on Nutrition: Connecting the Dots for Nigeria by Remm...
The UN Decade of Action on Nutrition: Connecting the Dots for Nigeria by Remm...
Remmy Nweke, mNGE, mNUJ, mGOCOP
 
Evidence based stem reporting techniques for technology adoption and commerci...
Evidence based stem reporting techniques for technology adoption and commerci...Evidence based stem reporting techniques for technology adoption and commerci...
Evidence based stem reporting techniques for technology adoption and commerci...
Remmy Nweke, mNGE, mNUJ, mGOCOP
 
Media as catalyst for change in dns industry 26 7-19
Media as catalyst for change in dns industry 26 7-19Media as catalyst for change in dns industry 26 7-19
Media as catalyst for change in dns industry 26 7-19
Remmy Nweke, mNGE, mNUJ, mGOCOP
 
Building A Sustainable Future for MeCAM
Building A Sustainable Future for MeCAMBuilding A Sustainable Future for MeCAM
Building A Sustainable Future for MeCAM
Remmy Nweke, mNGE, mNUJ, mGOCOP
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Remmy Nweke, mNGE, mNUJ, mGOCOP
 
"Building a Sustainable Future for NiRA – The Communication & Publicity Path
"Building a Sustainable Future for NiRA – The Communication & Publicity Path"Building a Sustainable Future for NiRA – The Communication & Publicity Path
"Building a Sustainable Future for NiRA – The Communication & Publicity Path
Remmy Nweke, mNGE, mNUJ, mGOCOP
 
How media practitioners can take advantage of nigeria dns industry 2-02-15
How media practitioners can take advantage of nigeria dns industry 2-02-15How media practitioners can take advantage of nigeria dns industry 2-02-15
How media practitioners can take advantage of nigeria dns industry 2-02-15
Remmy Nweke, mNGE, mNUJ, mGOCOP
 
Positive Use of Internet and Mobile Devices
Positive Use of Internet and Mobile DevicesPositive Use of Internet and Mobile Devices
Positive Use of Internet and Mobile Devices
Remmy Nweke, mNGE, mNUJ, mGOCOP
 
Nigerian students, technology education and cyber crime
Nigerian students, technology education and cyber crimeNigerian students, technology education and cyber crime
Nigerian students, technology education and cyber crime
Remmy Nweke, mNGE, mNUJ, mGOCOP
 

More from Remmy Nweke, mNGE, mNUJ, mGOCOP (13)

[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS by Remmy NWEK...
[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS  by Remmy NWEK...[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS  by Remmy NWEK...
[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS by Remmy NWEK...
 
[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS by Remmy NWEK...
[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS  by Remmy NWEK...[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS  by Remmy NWEK...
[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS by Remmy NWEK...
 
Know Your IT for Digital Publishers by Remmy Nweke 
Know Your IT for Digital Publishers by Remmy Nweke Know Your IT for Digital Publishers by Remmy Nweke 
Know Your IT for Digital Publishers by Remmy Nweke 
 
Overview of Communicating Nutrition & Social Media Best Practices in Nigeria ...
Overview of Communicating Nutrition & Social Media Best Practices in Nigeria ...Overview of Communicating Nutrition & Social Media Best Practices in Nigeria ...
Overview of Communicating Nutrition & Social Media Best Practices in Nigeria ...
 
The UN Decade of Action on Nutrition: Connecting the Dots for Nigeria by Remm...
The UN Decade of Action on Nutrition: Connecting the Dots for Nigeria by Remm...The UN Decade of Action on Nutrition: Connecting the Dots for Nigeria by Remm...
The UN Decade of Action on Nutrition: Connecting the Dots for Nigeria by Remm...
 
Evidence based stem reporting techniques for technology adoption and commerci...
Evidence based stem reporting techniques for technology adoption and commerci...Evidence based stem reporting techniques for technology adoption and commerci...
Evidence based stem reporting techniques for technology adoption and commerci...
 
Media as catalyst for change in dns industry 26 7-19
Media as catalyst for change in dns industry 26 7-19Media as catalyst for change in dns industry 26 7-19
Media as catalyst for change in dns industry 26 7-19
 
Building A Sustainable Future for MeCAM
Building A Sustainable Future for MeCAMBuilding A Sustainable Future for MeCAM
Building A Sustainable Future for MeCAM
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
 
"Building a Sustainable Future for NiRA – The Communication & Publicity Path
"Building a Sustainable Future for NiRA – The Communication & Publicity Path"Building a Sustainable Future for NiRA – The Communication & Publicity Path
"Building a Sustainable Future for NiRA – The Communication & Publicity Path
 
How media practitioners can take advantage of nigeria dns industry 2-02-15
How media practitioners can take advantage of nigeria dns industry 2-02-15How media practitioners can take advantage of nigeria dns industry 2-02-15
How media practitioners can take advantage of nigeria dns industry 2-02-15
 
Positive Use of Internet and Mobile Devices
Positive Use of Internet and Mobile DevicesPositive Use of Internet and Mobile Devices
Positive Use of Internet and Mobile Devices
 
Nigerian students, technology education and cyber crime
Nigerian students, technology education and cyber crimeNigerian students, technology education and cyber crime
Nigerian students, technology education and cyber crime
 

Recently uploaded

Netter's Atlas of Human Anatomy 7.ed.pdf
Netter's Atlas of Human Anatomy 7.ed.pdfNetter's Atlas of Human Anatomy 7.ed.pdf
Netter's Atlas of Human Anatomy 7.ed.pdf
BrissaOrtiz3
 
Top-Vitamin-Supplement-Brands-in-India List
Top-Vitamin-Supplement-Brands-in-India ListTop-Vitamin-Supplement-Brands-in-India List
Top-Vitamin-Supplement-Brands-in-India List
SwisschemDerma
 
Histopathology of Rheumatoid Arthritis: Visual treat
Histopathology of Rheumatoid Arthritis: Visual treatHistopathology of Rheumatoid Arthritis: Visual treat
Histopathology of Rheumatoid Arthritis: Visual treat
DIVYANSHU740006
 
CHEMOTHERAPY_RDP_CHAPTER 6_Anti Malarial Drugs.pdf
CHEMOTHERAPY_RDP_CHAPTER 6_Anti Malarial Drugs.pdfCHEMOTHERAPY_RDP_CHAPTER 6_Anti Malarial Drugs.pdf
CHEMOTHERAPY_RDP_CHAPTER 6_Anti Malarial Drugs.pdf
rishi2789
 
The Electrocardiogram - Physiologic Principles
The Electrocardiogram - Physiologic PrinciplesThe Electrocardiogram - Physiologic Principles
The Electrocardiogram - Physiologic Principles
MedicoseAcademics
 
TEST BANK For Community Health Nursing A Canadian Perspective, 5th Edition by...
TEST BANK For Community Health Nursing A Canadian Perspective, 5th Edition by...TEST BANK For Community Health Nursing A Canadian Perspective, 5th Edition by...
TEST BANK For Community Health Nursing A Canadian Perspective, 5th Edition by...
Donc Test
 
TEST BANK For Community and Public Health Nursing: Evidence for Practice, 3rd...
TEST BANK For Community and Public Health Nursing: Evidence for Practice, 3rd...TEST BANK For Community and Public Health Nursing: Evidence for Practice, 3rd...
TEST BANK For Community and Public Health Nursing: Evidence for Practice, 3rd...
Donc Test
 
CHEMOTHERAPY_RDP_CHAPTER 2 _LEPROSY.pdf1
CHEMOTHERAPY_RDP_CHAPTER 2 _LEPROSY.pdf1CHEMOTHERAPY_RDP_CHAPTER 2 _LEPROSY.pdf1
CHEMOTHERAPY_RDP_CHAPTER 2 _LEPROSY.pdf1
rishi2789
 
Cardiac Assessment for B.sc Nursing Student.pdf
Cardiac Assessment for B.sc Nursing Student.pdfCardiac Assessment for B.sc Nursing Student.pdf
Cardiac Assessment for B.sc Nursing Student.pdf
shivalingatalekar1
 
Top Effective Soaps for Fungal Skin Infections in India
Top Effective Soaps for Fungal Skin Infections in IndiaTop Effective Soaps for Fungal Skin Infections in India
Top Effective Soaps for Fungal Skin Infections in India
SwisschemDerma
 
Osteoporosis - Definition , Evaluation and Management .pdf
Osteoporosis - Definition , Evaluation and Management .pdfOsteoporosis - Definition , Evaluation and Management .pdf
Osteoporosis - Definition , Evaluation and Management .pdf
Jim Jacob Roy
 
Does Over-Masturbation Contribute to Chronic Prostatitis.pptx
Does Over-Masturbation Contribute to Chronic Prostatitis.pptxDoes Over-Masturbation Contribute to Chronic Prostatitis.pptx
Does Over-Masturbation Contribute to Chronic Prostatitis.pptx
walterHu5
 
Ear and its clinical correlations By Dr. Rabia Inam Gandapore.pptx
Ear and its clinical correlations By Dr. Rabia Inam Gandapore.pptxEar and its clinical correlations By Dr. Rabia Inam Gandapore.pptx
Ear and its clinical correlations By Dr. Rabia Inam Gandapore.pptx
Dr. Rabia Inam Gandapore
 
Chapter 11 Nutrition and Chronic Diseases.pptx
Chapter 11 Nutrition and Chronic Diseases.pptxChapter 11 Nutrition and Chronic Diseases.pptx
Chapter 11 Nutrition and Chronic Diseases.pptx
Earlene McNair
 
Post-Menstrual Smell- When to Suspect Vaginitis.pptx
Post-Menstrual Smell- When to Suspect Vaginitis.pptxPost-Menstrual Smell- When to Suspect Vaginitis.pptx
Post-Menstrual Smell- When to Suspect Vaginitis.pptx
FFragrant
 
Complementary feeding in infant IAP PROTOCOLS
Complementary feeding in infant IAP PROTOCOLSComplementary feeding in infant IAP PROTOCOLS
Complementary feeding in infant IAP PROTOCOLS
chiranthgowda16
 
Diabetic nephropathy diagnosis treatment
Diabetic nephropathy diagnosis treatmentDiabetic nephropathy diagnosis treatment
Diabetic nephropathy diagnosis treatment
arahmanzai5
 
vonoprazan A novel drug for GERD presentation
vonoprazan A novel drug for GERD presentationvonoprazan A novel drug for GERD presentation
vonoprazan A novel drug for GERD presentation
Dr.pavithra Anandan
 
LOOPS in orthodontics t loop bull loop vertical loop mushroom loop stop loop
LOOPS in orthodontics t loop bull loop vertical loop mushroom loop stop loopLOOPS in orthodontics t loop bull loop vertical loop mushroom loop stop loop
LOOPS in orthodontics t loop bull loop vertical loop mushroom loop stop loop
debosmitaasanyal1
 
Abortion PG Seminar Power point presentation
Abortion PG Seminar Power point presentationAbortion PG Seminar Power point presentation
Abortion PG Seminar Power point presentation
AksshayaRajanbabu
 

Recently uploaded (20)

Netter's Atlas of Human Anatomy 7.ed.pdf
Netter's Atlas of Human Anatomy 7.ed.pdfNetter's Atlas of Human Anatomy 7.ed.pdf
Netter's Atlas of Human Anatomy 7.ed.pdf
 
Top-Vitamin-Supplement-Brands-in-India List
Top-Vitamin-Supplement-Brands-in-India ListTop-Vitamin-Supplement-Brands-in-India List
Top-Vitamin-Supplement-Brands-in-India List
 
Histopathology of Rheumatoid Arthritis: Visual treat
Histopathology of Rheumatoid Arthritis: Visual treatHistopathology of Rheumatoid Arthritis: Visual treat
Histopathology of Rheumatoid Arthritis: Visual treat
 
CHEMOTHERAPY_RDP_CHAPTER 6_Anti Malarial Drugs.pdf
CHEMOTHERAPY_RDP_CHAPTER 6_Anti Malarial Drugs.pdfCHEMOTHERAPY_RDP_CHAPTER 6_Anti Malarial Drugs.pdf
CHEMOTHERAPY_RDP_CHAPTER 6_Anti Malarial Drugs.pdf
 
The Electrocardiogram - Physiologic Principles
The Electrocardiogram - Physiologic PrinciplesThe Electrocardiogram - Physiologic Principles
The Electrocardiogram - Physiologic Principles
 
TEST BANK For Community Health Nursing A Canadian Perspective, 5th Edition by...
TEST BANK For Community Health Nursing A Canadian Perspective, 5th Edition by...TEST BANK For Community Health Nursing A Canadian Perspective, 5th Edition by...
TEST BANK For Community Health Nursing A Canadian Perspective, 5th Edition by...
 
TEST BANK For Community and Public Health Nursing: Evidence for Practice, 3rd...
TEST BANK For Community and Public Health Nursing: Evidence for Practice, 3rd...TEST BANK For Community and Public Health Nursing: Evidence for Practice, 3rd...
TEST BANK For Community and Public Health Nursing: Evidence for Practice, 3rd...
 
CHEMOTHERAPY_RDP_CHAPTER 2 _LEPROSY.pdf1
CHEMOTHERAPY_RDP_CHAPTER 2 _LEPROSY.pdf1CHEMOTHERAPY_RDP_CHAPTER 2 _LEPROSY.pdf1
CHEMOTHERAPY_RDP_CHAPTER 2 _LEPROSY.pdf1
 
Cardiac Assessment for B.sc Nursing Student.pdf
Cardiac Assessment for B.sc Nursing Student.pdfCardiac Assessment for B.sc Nursing Student.pdf
Cardiac Assessment for B.sc Nursing Student.pdf
 
Top Effective Soaps for Fungal Skin Infections in India
Top Effective Soaps for Fungal Skin Infections in IndiaTop Effective Soaps for Fungal Skin Infections in India
Top Effective Soaps for Fungal Skin Infections in India
 
Osteoporosis - Definition , Evaluation and Management .pdf
Osteoporosis - Definition , Evaluation and Management .pdfOsteoporosis - Definition , Evaluation and Management .pdf
Osteoporosis - Definition , Evaluation and Management .pdf
 
Does Over-Masturbation Contribute to Chronic Prostatitis.pptx
Does Over-Masturbation Contribute to Chronic Prostatitis.pptxDoes Over-Masturbation Contribute to Chronic Prostatitis.pptx
Does Over-Masturbation Contribute to Chronic Prostatitis.pptx
 
Ear and its clinical correlations By Dr. Rabia Inam Gandapore.pptx
Ear and its clinical correlations By Dr. Rabia Inam Gandapore.pptxEar and its clinical correlations By Dr. Rabia Inam Gandapore.pptx
Ear and its clinical correlations By Dr. Rabia Inam Gandapore.pptx
 
Chapter 11 Nutrition and Chronic Diseases.pptx
Chapter 11 Nutrition and Chronic Diseases.pptxChapter 11 Nutrition and Chronic Diseases.pptx
Chapter 11 Nutrition and Chronic Diseases.pptx
 
Post-Menstrual Smell- When to Suspect Vaginitis.pptx
Post-Menstrual Smell- When to Suspect Vaginitis.pptxPost-Menstrual Smell- When to Suspect Vaginitis.pptx
Post-Menstrual Smell- When to Suspect Vaginitis.pptx
 
Complementary feeding in infant IAP PROTOCOLS
Complementary feeding in infant IAP PROTOCOLSComplementary feeding in infant IAP PROTOCOLS
Complementary feeding in infant IAP PROTOCOLS
 
Diabetic nephropathy diagnosis treatment
Diabetic nephropathy diagnosis treatmentDiabetic nephropathy diagnosis treatment
Diabetic nephropathy diagnosis treatment
 
vonoprazan A novel drug for GERD presentation
vonoprazan A novel drug for GERD presentationvonoprazan A novel drug for GERD presentation
vonoprazan A novel drug for GERD presentation
 
LOOPS in orthodontics t loop bull loop vertical loop mushroom loop stop loop
LOOPS in orthodontics t loop bull loop vertical loop mushroom loop stop loopLOOPS in orthodontics t loop bull loop vertical loop mushroom loop stop loop
LOOPS in orthodontics t loop bull loop vertical loop mushroom loop stop loop
 
Abortion PG Seminar Power point presentation
Abortion PG Seminar Power point presentationAbortion PG Seminar Power point presentation
Abortion PG Seminar Power point presentation
 

Drug Effects on Cyber Crimes

  • 1. A presentation by REMMY NWEKE, Lead Strategist at DigitalSENSE Africa Media Ltd to the Young Catholic Workers at St. Jude Mafoluku-Lagos, December, 17, 2016. 1 Topic: Drug Effects on Cyber Crimes @Work Place 1) Prelude 2) The Objective 3) What is Drugs and its kinds @Work Place 4) Drug Use by young adults 5) What is Cyber Crime 6) Defining CyberStalking-Harassment @Work Place 7) What Nigerian CyberCrime Act 2015 said 8) Why drugs @ Work Place 9) Recommendations 10)Q & A Drug Effects on Cyber Crimes @Work Place Prelude: Thanks to the organisers and managment of DigitalSENSE Africa Media group for the opportunity to share some thoughts with members of this group, today. The Objective: The essence of this presentation and discussion around it is to highlight the dangers in doing drugs by the youth or better still young workers as well as likely implications which include engaging in unholy businesses of cyber-stalking/harassment of other citizens and actually involvement in hacking peoples online identity for a ransom or just for the fun of it, especially at the work place. What is Drug: A medicine or other substance which has a physiological effect when ingested or otherwise introduced into the body. But the drug as far as this gathering seems concerned is for those who use drugs other than as may have been recommended by the medical professionals and invariably obtained from the authorised shops or medicine stores. Statistics have shown that most people first try drugs in their teenage years. In fact, of more than three million new drug users in 2011 alone, (US) more than half were under 18. While more than half of these users tried marijuana first, prescription pain relievers, inhalants, tranquilizers were also quite popular among this demographic. Inhalant use was most prevalent among younger teens, a statistic that is not at all questionable considering how easy it is for people in this age group to access sharpies, hairspray, and bath salts. Sharpies: This is a brand of set of pens in the US, just like Bic here which usually have inks instilled in the writing tube. Experts say that to inhale this could be dangerous and in in fact, contain volatile solvents—and when inhaled these solvents can produce a "high." The effects of inhalants (including
  • 2. A presentation by REMMY NWEKE, Lead Strategist at DigitalSENSE Africa Media Ltd to the Young Catholic Workers at St. Jude Mafoluku-Lagos, December, 17, 2016. 2 Sharpies) can be similar to those of alcohol, and include slurred speech, lack of coordination, euphoria, and dizziness. Hairspray: Propellant gases used as inhalants include Freon and compressed hydro fluorocarbons, which are used in various household and office products that come in aerosol spray cans, such as air freshener, computer keyboard cleaner spray (gas dusters, sometimes erroneously called "canned air"), non-stick cooking spray, aerosol . Bath Salts (Synthetic Cathinones): Bath salts is a term used in North America and Europe to describe a number of recreational designer drugs. Also known as Bloom, Cloud Nine, Flakka, Vanilla Sky, White Lightning, and Scarface. “Bath salts” is the name given to a class of drugs that have one or more of these attributes. Inhalants: Inhalants are chemicals found in ordinary household or workplace products that people inhale on purpose to get “high.” Because many inhalants can be found around the house, people often don’t realize that inhaling their fumes, even just once, can be very harmful to the brain and body and can lead to death. In fact, the chemicals found in these products can change the way the brain works and cause other problems in the body. Although different inhalants cause different effects, but they generally fall into one of four categories; 1. Volatile solvents are liquids that become a gas at room temperature. They are found in: Paint thinner, nail polish remover, degreaser, dry-cleaning fluid, gasoline, and contact cement Some art or office supplies, such as correction fluid, felt-tip marker fluid, and electronic contact cleaner 2. Aerosols are sprays that contain propellants and solvents. They include: Spray paint, hair spray, deodorant spray, vegetable oil sprays, and fabric protector spray 3. Gases may be in household or commercial products, or used in the medical field to provide pain relief. They are found in: Butane lighters, propane tanks, whipped cream dispensers, and refrigerant gases 4. Anesthesia, including ether, chloroform, halothane, and nitrous oxide (commonly called “laughing gas”). NB: Nitrites are a class of inhalants used mainly to enhance sexual experiences. Organic nitrites include amyl, butyl, and cyclohexyl nitrites and other related compounds. Amyl nitrite was used in the past by doctors to help with chest pain and is sometimes used today to diagnose heart problems. Nitrites now are prohibited by the Consumer Product Safety Commission but can still be found, sold in small bottles labeled as “video head cleaner,” “room odorizer,” “leather cleaner,” or “liquid aroma.” NB: People also inhale toilet, burn tyres, take Indian Hemps (Igbo) etc.
  • 3. A presentation by REMMY NWEKE, Lead Strategist at DigitalSENSE Africa Media Ltd to the Young Catholic Workers at St. Jude Mafoluku-Lagos, December, 17, 2016. 3 Drug Use by young adults Drug use also continues to be high among young adults, aged 18 and above; in 2011, an estimated 23.8 percent of people in this age group had used an illicit drug in the previous month. “Pharming” among young adults is popular, with prescription drugs like Ritalin, Adderall, and DXM often abused. While individuals may see these drugs as harmless because they help them focus, their long-term use can have serious debilitating effects. What is CyberCrime: – Criminal activities carried out by means of computers or/on the Internet. Defining CyberBullying? This entails the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature. Although children may be reluctant to admit to being the victims of cyberbullying, researchers have identified them as very vulnerable, according to StopCyberbulling.org. Further, the organization, says "Cyberbullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. It has to have a minor on both sides, or at least have been instigated by a minor against another minor. Once adults become involved, it is plain and simple cyber-harassment or cyberstalking. Adult cyber- harassment or cyberstalking is NEVER called cyberbullying. It isn't when adult are trying to lure children into offline meetings, that is called sexual exploitation or luring by a sexual predator. But sometimes when a minor starts a cyberbullying campaign it involves sexual predators who are intrigued by the sexual harassment or even ads posted by the cyberbullying offering up the victim for sex. The methods used are limited only by the child's imagination and access to technology. And the cyberbully one moment may become the victim the next. The kids often change roles, going from victim to bully and back again. Defining Cyber Stalking: The repeated use of electronic communications to harass or frighten someone, for example by sending threatening emails. CyberStalk and get 10-yrs imprisonment: In the Nigerian CyberCrime Prohibition, Prevention etc Act 2015 (Nigeria Cybercriminal Act 2015), the subsection 24 on (CyberStalking - Harassment) is the only place ‘bullying’ appeared in the Act, just once, which thus states, as follows; 24. Any person who knowingly or intentionally sends a message or other matter by means of computer systems or network that - (a) is grossly offensive, pornographic or of an indecent, obscene or menacing
  • 4. A presentation by REMMY NWEKE, Lead Strategist at DigitalSENSE Africa Media Ltd to the Young Catholic Workers at St. Jude Mafoluku-Lagos, December, 17, 2016. 4 character or causes any such message or matter to be so sent; or (b) he knows to be false, for the purpose of causing annoyance, inconvenience danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, ill will or needless anxiety to another or causes such a message to be sent: commits an offence under this Act and shall be liable on conviction to a fine of not more than N7,000,000.00 or imprisonment for a term of not more than 3 years or to both such fine and imprisonment. (2) Any person who knowingly or intentionally transmits or causes the transmission of any communication through a computer system or network - (a) to bully, threaten or harass another person, where such communication places another person in fear of death, violence or bodily harm or to another person; (b) containing any threat to kidnap any person or any threat to harm the person of another, any demand or request for a ransom for the release of any kidnapped person, to extort from any person, firm, association or corporation, any money or other thing of value; or (c)containing any threat to harm the property or reputation of the addressee or of another or the reputation of a deceased person or any threat to accuse the addressee or any other person of a crime, to extort from any person, firm, association, or corporation, any money or other thing of value: commits an offence under this Act and shall be liable on conviction- (i)in the case of paragraphs (a) and (b) of this subsection to imprisonment for a term of 10 years and/or a minimum fine of N25,000,000.00; and (ii)in the case of paragraph (c) and (d) of this subsection, to imprisonment for a term of 5 years and/or a minimum fine of N15,000,000.00. (3) A court sentencing or otherwise dealing with a person convicted of an offence under subsections (1) and (2) may also make an order, which may, for the purpose of protecting the victim or victims of the offence, or any other person mentioned in the order, from further conduct which- (a) amounts to harassment; or (b) will cause fear of violence, death or bodily harm; prohibit the defendant from doing anything described/specified in the order. (4) A defendant who does anything which he is prohibited from doing by an order under this section, commits an offence and shall be liable on conviction to a fine of not more than N10,000,000.00 or imprisonment for a term of not more than 3 years or to both such fine and imprisonment.
  • 5. A presentation by REMMY NWEKE, Lead Strategist at DigitalSENSE Africa Media Ltd to the Young Catholic Workers at St. Jude Mafoluku-Lagos, December, 17, 2016. 5 (5) The order made under subsection (3) of this section may have effect for a specified period or until further order and the defendant or any other person mentioned in the order may apply to the court which made the order for it to be varied or discharged by a further order. (6)Notwithstanding the powers of the court under subsections (3) and (5), the court may make an interim order for the protection of victim(s) from further exposure to the alleged offences. Stalking in the workplace Stalking in the workplace can have severe consequences for the victim and their colleagues. Although fortunately rare, this can even result in serious or fatal injury for anyone present at the time. While research into stalking victimisation in the workplace has primarily focused on mental health professionals, it is clear that stalking affects victims in all types of workplaces. The importance of supportive and appropriate measures to assist victims and ensure the overall safety of any workplace cannot be over emphasised. Workplace stalking can arise from many different contexts, including: Stalking intruding into the workplace from victimisation outside work, Clients stalking staff, Clients stalking other clients, and Staff stalking co-workers Occupational Damage: Stalking in the workplace can have a detrimental impact on work performance not only for the victim, but also those they work with. To reduce the effect that stalking may have on productivity, it is important to understand the reasons why job performance may deteriorate and then look to ways that your organisation can help employees to overcome these problems. The workplace can be impacted in a number of ways: Time off work: Sick leave – the victim and third parties with psychological symptoms Frightened to leave the house Attending to legal matters Avoiding work if the stalker is a co-worker Deteriorating work performance and relations Unable to concentrate on work when in attendance Difficulty catching up after missed days Time lost due to stalking intruding on the workplace e.g. phone calls, approaches etc
  • 6. A presentation by REMMY NWEKE, Lead Strategist at DigitalSENSE Africa Media Ltd to the Young Catholic Workers at St. Jude Mafoluku-Lagos, December, 17, 2016. 6 Tension in the workplace arising from allegations made against the victim that they have somehow encouraged the stalker or are over reacting Prevention Stalking is a crime in most jurisdictions, and all workplaces have an ethical and legal obligation to manage stalking behaviour and support those who are affected. Many victims state that they are reluctant to speak with managers and co-workers about being stalked out of embarrassment and/or fear. It is up to the employer to create an environment where victims feel safe to report this behaviour. Central to this is making it clear that stalking victims are not to blame for their predicament, even if the victim was previously in a relationship with the stalker. Employers should also ensure that other employees are made aware of stalking situations when they have a role in managing the risks. A very real danger for many stalking victims is that fellow employees are often unaware of the dangers of stalking, particularly receptionists and others responsible for entry into a business. The most effective way to reduce the impact of stalking is to determine how the victim and other employees can be supported. Preventative measures: The best way to reduce the possibility of harassment in the workplace is to ensure that all employees understand how to deal effectively with potential problems that may result in a stalking situation. Stalking situations are more effectively managed when employees are aware of exactly what they need to do under such circumstances and therefore feel better equipped to deal with the problem. The impact of conflict is reduced when organisations: develop and enforce strong policies on what constitutes inappropriate contact and harassment at work, either by clients or co-workers. develop policies that detail the process for dealing with aggressive or agitated individuals and for reporting complaints, suspicious behaviour and critical incidents. review policies on a regular basis and ensure amendments are made following any critical incident. educate management and employees about bullying and stalking behaviours and what they need to do if such a situation arises. It is crucial that employees do not feel that they will be judged as overreacting if they report something that they think might be trivial. It is better to praise the individual for being alert, rather than try to repair the damage that may arise if incidents are not reported. have policies and procedures in place that provide for the support of victims and employees should an adverse event occur.
  • 7. A presentation by REMMY NWEKE, Lead Strategist at DigitalSENSE Africa Media Ltd to the Young Catholic Workers at St. Jude Mafoluku-Lagos, December, 17, 2016. 7 When stalking occurs: Everyone who may have contact with the stalker should be informed about the situation and have a refresher on the policy and procedures for dealing with harassing behaviour. This should be tailored to the specific situation and victim/s. Staff can become frightened when such a situation is discussed, so the issue should be broached in a calm manner, emphasising that there are policies and procedures in place to deal with the situation. It is important to explain that remaining calm and following procedures is the best way to prevent the escalation of any adverse situations. General Measures for Managing Stalking Situations: Ensure that the victim understands that they have your support and that they can talk about their concerns. This will place you in a better position to understand the issues involved and then plan the best approach to protect the victim and other employees. You need to know if a restraining order is in place, so encourage the victim to disclose the relevant information regarding the worksite. Review the relevant security issues e.g. site access, car park lighting, bushes that provide hiding places Try to provide a safe car-park for the victim. Have someone walk the victim to their car. If possible, allow the victim to work flexible hours so that they can vary the time that they arrive and leave work. Ensure that staff apply necessary precautions such as screening phone calls and people that come to the office. If a co-worker receives a call from the stalker or has seen them around the workplace, ensure they know to report it immediately to management and document it. If a restraining order prohibits the stalker from the workplace, call the police immediately and file a report, should he/she appear. Ensure that no one gives out any information e.g. days or hours of work, phone numbers etc. The better your company understands stalking, the better protection you and your fellow employees will have. Drugs @ Work Place: Everyone here, one way or the other relates with the airport and its important to note that in recent past, several workers have been involved in drug trafficking and one remarkable thing about this, is that they may claim first timer when caught by the Law, but definitely they do drugs locally and were attracted to do more or even earn more to be able to live up to their new life style. We may not be alien to stories of those working at the airport that are caught almost, always.
  • 8. A presentation by REMMY NWEKE, Lead Strategist at DigitalSENSE Africa Media Ltd to the Young Catholic Workers at St. Jude Mafoluku-Lagos, December, 17, 2016. 8 Recommendations: 1. Uncontrollable attitude should be watched and avoided by all means. 2. Be discipline in the use of even prescribed drugs 3. Nigerian employers should have workplace policy against doing drugs and cyberstalking 4. Continuous anti-drug education, even beyond workplace beginning from primary schools to all higher institutions 5. There is need to consistently conduct enlightenment on cyber-stalking, especially in the work place. 6. Statistical data required for people/Nigerians with drug related cases 7. Doing a background check on potential employees is not a bad idea and repeating periodically is encouraged. 8. Working class people should know the kind of friends they keep, even at work place. 9. All situations of harassment in the workplace need to be addressed by management, not only in an attempt to de-escalate the situation, but also to reduce the impact on all parties personally, professionally and from the organisation’s perspective. To do so it is important to adhere to some conducts: 10. Always maintain the dignity of both parties by listening to both sides and explaining why decisions are being made. 11. Do not rationalise or excuse stalking behaviour. 12. Reinforce policies that prohibit harassment, and emphasise the consequences of breaches. 13. Do not attempt mediation unless the victim is willing to do so. It is crucial that the victim does not feel pressured into a mediation process simply because the harassment has occurred in the workplace. Be sensitive to the victim’s feelings and avoid facilitating continued traumatisation of the victim. 14. If the stalker has a grievance, suggest appropriate means of addressing the problem (e.g., complaints procedures or mediation), but do not collude with the inappropriate behaviour or inadvertently provide alternative avenues of harassment. 15. Contact the police if necessary 16. Theorem of Two glasses when induced or the urge comes. 17. Remember life is short and take control of it 18. Power of prayers for those already on drugs should be encouraged 19. Realisation that with God all things are possible in Jesus Christ, name, Amen 20. Thank you. Q & A