SlideShare a Scribd company logo
1 of 41
ATIF KHAN NIAZI
NFC- Institute of Engineering and Technology Multan,Pakistan
Social Media
&
Cyber Crime
WHAT IS SOCIAL MEDIA?
 Social media are online communications in
which individuals
 shift flexibly between the role of audience and
author.
 To do this, they use social software that
enables anyone without
 knowledge of html coding, to create,
comment on, and share
 content and to form communities around
shared interests.
WHAT IS SOCIAL MEDIA?
 • Social networking sites (Facebook,
LinkedIn, Twitter)
 • Photos/Video/Music (flickr, YouTube,
last.fm)
WHAT IS FACEBOOK?
WHAT IS TWITTER?
FACEBOOK
OVERVIEW
 “the facebook.com” – 2004, Mark
Zuckerberg
 Winklevosses’ lawsuit
 2006 – everyone over the age of 13
 800 million active users
OVERVIEW
 #1 visited website
worldwide
 Free account
 Access to networks
 Control own privacy
settings
 Communication –
pictures, videos, blog
feeds, groups
OTHER FACEBOOK FEATURES
 Facebook Chat
 “Like” button
 Ticker
 Events
 Facebook Mobile
BENEFITS
 Enhancing communication
 Reconnect with old friends/family
 Networking
 Promoting events
 Easier to send media
 Education and news
BENEFITS, CONT.
 Marketing for businesses
 Brand image/reputation
 Viral effect
 Pagemodo – user friendly “Welcome” page tab
RISKS
 Spam on newsfeeds
 The rise of other social
networks
 Twitter, Google+
 Reports of a “Facebook
Depression”
 Provides a skewed view of
what is really going on
 It has been banned in many
countries and workplaces
 50% of British employers in
May 2011 banned it from
workplace
 Children under 13 use it
despite the Children’s Online
Privacy Protection Act
 Harms Communication Skills
 Students score lower in
school when using
Facebook while studying
 Decreases need for face-to-
face communication
 Affects college acceptance
and job hiring
Mobile Phone:
Report:
 Some research reveals that there are 4.8 billion mobile
users but only 4.2 billion people with a toothbrush.
Use of Mobile Phone By Students:
 Students’ Facebook addictions weren’t bad enough
when they were limited to the computer, now they have
portable social media devices in their pockets. Across
the board, students with smartphones use social media
apps, including Facebook & Twitter.
It surveyed 100 students to get an insight on their
mobile phone habits and usage.
 Do you have a
smartphone?
 Do you regularly use the
internet on your phone?
 Have you ever used your
phone to search for a
job?
 Yes – 82% / No – 18%
 Yes – 84% / No – 16%
 Yes – 37% / No – 63%
Role of Electronic Media…?
 Voice of Public
 Country Image
 Cultural Representation
Negative Role of Electronic Media:
 Personal Interest.
 People Likes.
 No Rules and Regulation of Media.
SOCIAL MEDIA:
The best thing is you can trust the facts on social media
like Facebook, twitter any many other popular social
network.
Why Social Media…?
 No Personal Interest.
 Best Source of Sharing News.
 Keep In Touch With Each Other.
 Social Media Is Very Easy For Real
Updating.
Electronic Media Is Exposed By
Social Media:
Check The Status of Any
Politician:
The Power of Social Media:
Facebook, YouTube and Twitter that, for the
First Time, Gave Voice to The People of
Egypt.
Cyber Crime
&
Cyber Laws
Cyber Crime
 Activity in which computers or networks are a
tool, a target, or a place of criminal activity.
 Cyber crime also stated as any use of a
computer as an instrument to further illegal
ends, such as
 Committing fraud
 Stealing identities
 Violating privacy
 It is also include traditional crimes in which
computers or networks are used to enable
the illicit activity.
 As the computer has become central to
commerce, entertainment, and government.
 Cyber crime has grown in importance.
 Examples:
 E-mail account of a Federal Minister was hacked.
 Credit cards frauds reach to an alarming level.
 Financial institutions are the favorite targets of
Cyber criminals --- worst effecting the
technological and progress in the area of e –
Commerce.
Cyber Laws
 The legal issues related to use of communications
technology, particularly "cyberspace", i.e. the
Internet.
 It is an intersection of many legal fields, like:
 Intellectual property,
 Privacy
 Cyber laws is an attempt to apply laws designed for
the physical world to human activity on the Internet
Cyber Laws in Pakistan
 There are different law are promulgated in Pakistan.
 These laws not only deal with crime of Internet
 These deal with all dimensions related to computer
& networks.
 Two of them are most known.
 They are:
 Electronic Transaction Ordinance 2002
 Electronic / Cyber Crime Bill 2007
Electronic Transaction Ordinance 2002
 Overview
 The Electronic Transactions Ordinance (ETO), 2002,
was the first IT-relevant legislation created by national
lawmakers.
 A first step and a solid foundation for legal sanctity
and protection for Pakistani e-Commerce locally and
globally.
 Laid the foundation for comprehensive Legal
Infrastructure.
 It is heavily taken from foreign law related to cyber
crime.
Electronic/Cyber Crime Bill 2007
Overview
 “Prevention of Electronic Crimes Ordinance, 2007″
is in force now
 It was promulgated by the President of Pakistan on
the 31st December, 2007
 The bill deals with the electronic crimes included:
 Cyber terrorism
 Data damage
 Electronic fraud
 Unauthorized access to code
 Cyber stalking
 Cyber Spaming
 It offers penalties ranging from six months
imprisonment to capital punishment for 17
types of cyber crimes
 It will apply to every person who commits an
offence, irrespective of his nationality or
citizenship.
 It gives exclusive powers to the Federal
Investigation Agency (FIA) to investigate and
charge cases against such crimes.
Punishments
 Under this law there are defined punishment
for the offence.
 Every respective offence under this law has
its distinctive punishment which can be
imprisonment or fine.

More Related Content

What's hot

Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

What's hot (20)

History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Viewers also liked

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Social media ppt
Social media pptSocial media ppt
Social media ppt
Ryan Parker
 
Representational Issues
Representational IssuesRepresentational Issues
Representational Issues
ioji1
 
Wjec AS media studies representation of issues - immigration
Wjec AS media studies representation of issues - immigrationWjec AS media studies representation of issues - immigration
Wjec AS media studies representation of issues - immigration
Amanda Simmons
 

Viewers also liked (20)

Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Social media ppt
Social media pptSocial media ppt
Social media ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Social networking PPT
Social networking PPTSocial networking PPT
Social networking PPT
 
BULK IEEE 2014-15 PROJECTS LIST FOR NS2
 BULK IEEE 2014-15  PROJECTS LIST FOR NS2 BULK IEEE 2014-15  PROJECTS LIST FOR NS2
BULK IEEE 2014-15 PROJECTS LIST FOR NS2
 
Social Issue
Social IssueSocial Issue
Social Issue
 
Representational Issues
Representational IssuesRepresentational Issues
Representational Issues
 
Immigration as a Controversial Issue in the Media
Immigration as a Controversial Issue in the MediaImmigration as a Controversial Issue in the Media
Immigration as a Controversial Issue in the Media
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
2014 Business report writing
2014 Business  report writing2014 Business  report writing
2014 Business report writing
 
Early Detection of Malicious Flux Networks via Large Scale Passive DNS Traffi...
Early Detection of Malicious Flux Networks via Large Scale Passive DNS Traffi...Early Detection of Malicious Flux Networks via Large Scale Passive DNS Traffi...
Early Detection of Malicious Flux Networks via Large Scale Passive DNS Traffi...
 
Wjec AS media studies representation of issues - immigration
Wjec AS media studies representation of issues - immigrationWjec AS media studies representation of issues - immigration
Wjec AS media studies representation of issues - immigration
 
8th Semester Computer Science (2013-June) Question Papers
8th Semester Computer Science (2013-June) Question Papers8th Semester Computer Science (2013-June) Question Papers
8th Semester Computer Science (2013-June) Question Papers
 
Representation issues
Representation issuesRepresentation issues
Representation issues
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Fashion (why fashion is social issue)
Fashion (why fashion is social issue)Fashion (why fashion is social issue)
Fashion (why fashion is social issue)
 
Social issue
Social issueSocial issue
Social issue
 

Similar to Social media & cyber crime

Freedom in the Days of the Internet
Freedom in the Days of the InternetFreedom in the Days of the Internet
Freedom in the Days of the Internet
thinkingeurope2011
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in i
Hassan Nasir
 
digital media and society.pptx
digital media and society.pptxdigital media and society.pptx
digital media and society.pptx
catherinviscom
 
Legal issues in applied technology power point
Legal issues in applied technology power pointLegal issues in applied technology power point
Legal issues in applied technology power point
stephanieprovitt
 
Legal issues in applied technology power point
Legal issues in applied technology power pointLegal issues in applied technology power point
Legal issues in applied technology power point
stephanieprovitt
 

Similar to Social media & cyber crime (20)

Impact of technology
Impact of technology Impact of technology
Impact of technology
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
Freedom in the Days of the Internet
Freedom in the Days of the InternetFreedom in the Days of the Internet
Freedom in the Days of the Internet
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in i
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
At The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianAt The Brink of Digital Authoritarian
At The Brink of Digital Authoritarian
 
Cyber crime in Pakistan
Cyber crime in PakistanCyber crime in Pakistan
Cyber crime in Pakistan
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber path
 
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
 
digital media and society.pptx
digital media and society.pptxdigital media and society.pptx
digital media and society.pptx
 
Legal issues in applied technology power point
Legal issues in applied technology power pointLegal issues in applied technology power point
Legal issues in applied technology power point
 
Legal issues in applied technology power point
Legal issues in applied technology power pointLegal issues in applied technology power point
Legal issues in applied technology power point
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 

Recently uploaded

Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
eliklein8
 
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
Cara Menggugurkan Kandungan 087776558899
 
TERSEDIA OBAT PENGGUGUR KANDUNGAN MAKASSAR KLINIK ABORSI MAKASSAR 087776558899
TERSEDIA OBAT PENGGUGUR KANDUNGAN MAKASSAR KLINIK ABORSI MAKASSAR 087776558899TERSEDIA OBAT PENGGUGUR KANDUNGAN MAKASSAR KLINIK ABORSI MAKASSAR 087776558899
TERSEDIA OBAT PENGGUGUR KANDUNGAN MAKASSAR KLINIK ABORSI MAKASSAR 087776558899
Obat Cytotec
 
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdfSociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
SocioCosmos
 
Jual obat aborsi Asli Taiwan ( 085657271886 ) Cytote pil telat bulan penggugu...
Jual obat aborsi Asli Taiwan ( 085657271886 ) Cytote pil telat bulan penggugu...Jual obat aborsi Asli Taiwan ( 085657271886 ) Cytote pil telat bulan penggugu...
Jual obat aborsi Asli Taiwan ( 085657271886 ) Cytote pil telat bulan penggugu...
Klinik kandungan
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdf
eliklein8
 

Recently uploaded (20)

Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
 
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
 
TERSEDIA OBAT PENGGUGUR KANDUNGAN MAKASSAR KLINIK ABORSI MAKASSAR 087776558899
TERSEDIA OBAT PENGGUGUR KANDUNGAN MAKASSAR KLINIK ABORSI MAKASSAR 087776558899TERSEDIA OBAT PENGGUGUR KANDUNGAN MAKASSAR KLINIK ABORSI MAKASSAR 087776558899
TERSEDIA OBAT PENGGUGUR KANDUNGAN MAKASSAR KLINIK ABORSI MAKASSAR 087776558899
 
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdfSociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
 
Content strategy : Content empire and cash in
Content strategy : Content empire and cash inContent strategy : Content empire and cash in
Content strategy : Content empire and cash in
 
Call Girls In Goa Calangute Beach ₰9971646499₰ Escorts In Goa Cash On Delivery
Call Girls In Goa Calangute Beach ₰9971646499₰ Escorts In Goa Cash On DeliveryCall Girls In Goa Calangute Beach ₰9971646499₰ Escorts In Goa Cash On Delivery
Call Girls In Goa Calangute Beach ₰9971646499₰ Escorts In Goa Cash On Delivery
 
Neemuch Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Neemuch Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsNeemuch Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Neemuch Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
Kodaikanal Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Kodaikanal Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsKodaikanal Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Kodaikanal Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
Lucknow ❤️ CALL GIRL 9241412435 ❤️ CALL GIRLS IN Lucknow ESCORT SERVICE ❤️ CA...
Lucknow ❤️ CALL GIRL 9241412435 ❤️ CALL GIRLS IN Lucknow ESCORT SERVICE ❤️ CA...Lucknow ❤️ CALL GIRL 9241412435 ❤️ CALL GIRLS IN Lucknow ESCORT SERVICE ❤️ CA...
Lucknow ❤️ CALL GIRL 9241412435 ❤️ CALL GIRLS IN Lucknow ESCORT SERVICE ❤️ CA...
 
Enhancing Consumer Trust Through Strategic Content Marketing
Enhancing Consumer Trust Through Strategic Content MarketingEnhancing Consumer Trust Through Strategic Content Marketing
Enhancing Consumer Trust Through Strategic Content Marketing
 
Rameswaram Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Rameswaram Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsRameswaram Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Rameswaram Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
Jhunjhunu Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Jhunjhunu Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsJhunjhunu Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Jhunjhunu Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
Coorg Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Coorg Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsCoorg Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Coorg Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
Jual obat aborsi Asli Taiwan ( 085657271886 ) Cytote pil telat bulan penggugu...
Jual obat aborsi Asli Taiwan ( 085657271886 ) Cytote pil telat bulan penggugu...Jual obat aborsi Asli Taiwan ( 085657271886 ) Cytote pil telat bulan penggugu...
Jual obat aborsi Asli Taiwan ( 085657271886 ) Cytote pil telat bulan penggugu...
 
Dhar Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Dhar Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsDhar Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Dhar Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIRBVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
 
Marketing Plan - Social Media. The Sparks Foundation
Marketing Plan -  Social Media. The Sparks FoundationMarketing Plan -  Social Media. The Sparks Foundation
Marketing Plan - Social Media. The Sparks Foundation
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdf
 
Kayamkulam Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Kayamkulam Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsKayamkulam Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Kayamkulam Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdfSEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
 

Social media & cyber crime

  • 1. ATIF KHAN NIAZI NFC- Institute of Engineering and Technology Multan,Pakistan
  • 3. WHAT IS SOCIAL MEDIA?  Social media are online communications in which individuals  shift flexibly between the role of audience and author.  To do this, they use social software that enables anyone without  knowledge of html coding, to create, comment on, and share  content and to form communities around shared interests.
  • 4. WHAT IS SOCIAL MEDIA?  • Social networking sites (Facebook, LinkedIn, Twitter)  • Photos/Video/Music (flickr, YouTube, last.fm)
  • 8. OVERVIEW  “the facebook.com” – 2004, Mark Zuckerberg  Winklevosses’ lawsuit  2006 – everyone over the age of 13  800 million active users
  • 9. OVERVIEW  #1 visited website worldwide  Free account  Access to networks  Control own privacy settings  Communication – pictures, videos, blog feeds, groups
  • 10. OTHER FACEBOOK FEATURES  Facebook Chat  “Like” button  Ticker  Events  Facebook Mobile
  • 11. BENEFITS  Enhancing communication  Reconnect with old friends/family  Networking  Promoting events  Easier to send media  Education and news
  • 12. BENEFITS, CONT.  Marketing for businesses  Brand image/reputation  Viral effect  Pagemodo – user friendly “Welcome” page tab
  • 13. RISKS  Spam on newsfeeds  The rise of other social networks  Twitter, Google+  Reports of a “Facebook Depression”  Provides a skewed view of what is really going on  It has been banned in many countries and workplaces  50% of British employers in May 2011 banned it from workplace  Children under 13 use it despite the Children’s Online Privacy Protection Act  Harms Communication Skills  Students score lower in school when using Facebook while studying  Decreases need for face-to- face communication  Affects college acceptance and job hiring
  • 15. Report:  Some research reveals that there are 4.8 billion mobile users but only 4.2 billion people with a toothbrush.
  • 16. Use of Mobile Phone By Students:  Students’ Facebook addictions weren’t bad enough when they were limited to the computer, now they have portable social media devices in their pockets. Across the board, students with smartphones use social media apps, including Facebook & Twitter.
  • 17. It surveyed 100 students to get an insight on their mobile phone habits and usage.  Do you have a smartphone?  Do you regularly use the internet on your phone?  Have you ever used your phone to search for a job?  Yes – 82% / No – 18%  Yes – 84% / No – 16%  Yes – 37% / No – 63%
  • 18.
  • 19.
  • 20. Role of Electronic Media…?  Voice of Public  Country Image  Cultural Representation
  • 21. Negative Role of Electronic Media:  Personal Interest.  People Likes.  No Rules and Regulation of Media.
  • 22.
  • 23. SOCIAL MEDIA: The best thing is you can trust the facts on social media like Facebook, twitter any many other popular social network.
  • 24. Why Social Media…?  No Personal Interest.  Best Source of Sharing News.  Keep In Touch With Each Other.  Social Media Is Very Easy For Real Updating.
  • 25. Electronic Media Is Exposed By Social Media:
  • 26.
  • 27. Check The Status of Any Politician:
  • 28. The Power of Social Media:
  • 29. Facebook, YouTube and Twitter that, for the First Time, Gave Voice to The People of Egypt.
  • 30.
  • 32. Cyber Crime  Activity in which computers or networks are a tool, a target, or a place of criminal activity.  Cyber crime also stated as any use of a computer as an instrument to further illegal ends, such as  Committing fraud  Stealing identities  Violating privacy
  • 33.  It is also include traditional crimes in which computers or networks are used to enable the illicit activity.  As the computer has become central to commerce, entertainment, and government.  Cyber crime has grown in importance.
  • 34.  Examples:  E-mail account of a Federal Minister was hacked.  Credit cards frauds reach to an alarming level.  Financial institutions are the favorite targets of Cyber criminals --- worst effecting the technological and progress in the area of e – Commerce.
  • 35. Cyber Laws  The legal issues related to use of communications technology, particularly "cyberspace", i.e. the Internet.  It is an intersection of many legal fields, like:  Intellectual property,  Privacy  Cyber laws is an attempt to apply laws designed for the physical world to human activity on the Internet
  • 36. Cyber Laws in Pakistan  There are different law are promulgated in Pakistan.  These laws not only deal with crime of Internet  These deal with all dimensions related to computer & networks.  Two of them are most known.  They are:  Electronic Transaction Ordinance 2002  Electronic / Cyber Crime Bill 2007
  • 37. Electronic Transaction Ordinance 2002  Overview  The Electronic Transactions Ordinance (ETO), 2002, was the first IT-relevant legislation created by national lawmakers.  A first step and a solid foundation for legal sanctity and protection for Pakistani e-Commerce locally and globally.  Laid the foundation for comprehensive Legal Infrastructure.  It is heavily taken from foreign law related to cyber crime.
  • 39. Overview  “Prevention of Electronic Crimes Ordinance, 2007″ is in force now  It was promulgated by the President of Pakistan on the 31st December, 2007  The bill deals with the electronic crimes included:  Cyber terrorism  Data damage  Electronic fraud  Unauthorized access to code  Cyber stalking  Cyber Spaming
  • 40.  It offers penalties ranging from six months imprisonment to capital punishment for 17 types of cyber crimes  It will apply to every person who commits an offence, irrespective of his nationality or citizenship.  It gives exclusive powers to the Federal Investigation Agency (FIA) to investigate and charge cases against such crimes.
  • 41. Punishments  Under this law there are defined punishment for the offence.  Every respective offence under this law has its distinctive punishment which can be imprisonment or fine.