SlideShare a Scribd company logo
1 of 35
BASICS OF SOCIAL
MEDIA
Group Members
• EMAN ANJUM
• ZIL E HUMA NISAR
• MAHEEN ASIF
• SHAFIA FAHIM
• MAIDA HAROON
CYBER HARASSMENT
INTRODUCTION
Cyber harassment is the use of
the Internet or other electronic
means to harass an individual,
a group of individuals, or an
organization.
 Cyber harassment first received
attention by legislators in mid 1980s.
When a young person uses the Internet
or technology to
o Harass
o threaten
o embarrass or
o target another person,
this person is called a CYBER BULLY
• Typically, Cyber bullying involves
tweens and teens.
• If an adult is involved, it is
considered cyber-harassment or
Cyber stalking.
TYPES
DIRECT HARASSMENT include:
 Threats bullying or intimidating messages
sent directly to the victim.
 Via e-mail or other Internet
communications mediums.
 The use of technological means to
interfere with a victim’s use of the Internet,
such as
hacking or denial of services attacks
•
•
•.
INDIRECT HARASSMENT not
limited to spreading rumors about
the victim, it includes:
 Various Internet discussion
forums.
 Subscribing the victim to
unwanted online services.
 Posting information about the
victim in online dating, sex services,
or sending messages to others in
the victim’s name.
WAYS OF CYBER HARASSEMENT
Harassing Someone
 Using text messaging
 Posting rumors, threats or
embarrassing information on
social networking sites such
As Face book and Twitter.
Engaging in ‘warning wars’
Participating in text wars
or text attacks.
IMPERSONATING SOMEONE
Developing a screen name that is similar
to the victim’s screen name.
Stealing the victim’s password
and chatting with other people
while pretending to be the
victim and changing the
target's online profile
Taking degrading pictures
of the victim and then
posting them on photo sharing
sites
USING PHOTOGRAPHS
 
Taking degrading pictures of the victim and
then posting them on photo sharing sites
Threatening to share embarrassing photos as
a way of controlling or blackmailing the victim.
Sending mass emails or
text messages
The photos can be distributed
to hundreds of people within a seconds
CREATING WEBSITES , BLOGS,
POLLS
Creating a blog about the victim that is
embarrassing, insulting or humiliating.
Using information that was shared in
confidence and making it public.
Conducting an Internet poll
about the victim.
Questions in the poll may vary including
everything about that.
Posting rude, mean or insulting comments
about the victim via the chat option of
online gaming sites.
Sending virus , spyware , or hacking
programs to the victim in order to spy on
the victim or
control his or her computer remotely.
Participating In
“Happy Slapping”
 Using a camera phone to
videotape a bullying incident
 Downloading the videotaped bullying
incident and posting it to YouTube
in order to allow a larger
audience to view the incident.
Sharing a videotaped bullying
incident via mass e-mail or text
messaging to humiliate and
embarrass the victim.
Rise of Cyber Bullying
• Day by day its becoming
the most important
social disturbance issues
CULTURAL ASPECT
Due to different culture
conflicts takes place and give
a new start to cyber
harassment
PSYCHOLOGIICAL ASPECT
Due to psychological factors
To take out there frustration or just to
have fun
POLITICAL ASPECT
 Interest in different
political party
 making propaganda
against the opposite party
• Rise after 9/11
CYBER LAWS
The legal issues related to use of
communication technology , particular cyber
space.
 It is an intersection of many legal fields
 Cyber laws is an attempt to apply laws
CYBER LAWS IN THE WORLD
 Electronic Commerce Act (Ireland)
Electronic Transactions Act ( UK, USA ,
AUSTRALIA , NEW ZEALAND & SINGAPORE)
 Electronic Transactions Ordinance
( Hong Kong)
 Information Technology Act (INDIA)
 Information Communication Technology Act
Draft (BANGLADESH)
LAWS
 On January 5, 2006, President Bush
signed Section 113 of the Violence
Against Women Act into law.
 By fines up to $50,000 or
imprisonment for up to two years
CYBER LAWS IN PAKISTAN
 There are different laws promulgated in
Pakistan but are not implemented
Two of them are most known
Electronic Transaction Ordinance 2002
Electronic / Cyber bill 2007
VICTIMS
VICTIMS
oAn 18-year-old Indian girl studying in the Siliguri
Government Polytechnic College committed suicide.
oPhoebe Prince was a 15-year-old Irish immigrant.
oHis last words, posted onto his Facebook profile
about 10 minutes before he died, were: "Jumping
off the GW
bridge sorry.“
oAmanda Todd 1996 – 2012
oRyan Halligan 1989 - 2003
CONCLUSION
2007 SUNFULL movement
 CHOI – JIN- SIL SUCIDE
 Impact of positive comments
 Work with schools and business to positive
comments
Things That We Find
Can Really Hurt Somebody
THANKYOU 
Any ?

More Related Content

What's hot (20)

Data breach
Data breachData breach
Data breach
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
School bullying presentation
School bullying presentationSchool bullying presentation
School bullying presentation
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
 
Identifying And Addressing A Gang Problem
Identifying And Addressing A Gang ProblemIdentifying And Addressing A Gang Problem
Identifying And Addressing A Gang Problem
 
Bullying slideshow
Bullying slideshowBullying slideshow
Bullying slideshow
 
Bullying Among Youth krh Powerpoint Presentation
Bullying Among Youth krh Powerpoint PresentationBullying Among Youth krh Powerpoint Presentation
Bullying Among Youth krh Powerpoint Presentation
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Human Trafficking
Human TraffickingHuman Trafficking
Human Trafficking
 
Anti-bullying presentation #4
Anti-bullying presentation #4Anti-bullying presentation #4
Anti-bullying presentation #4
 
A presentation on child pornography
A presentation on child pornographyA presentation on child pornography
A presentation on child pornography
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Bullying
BullyingBullying
Bullying
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Human Trafficking Policy-2
Human Trafficking Policy-2Human Trafficking Policy-2
Human Trafficking Policy-2
 

Viewers also liked

Health communication.ppt by sana
Health communication.ppt by sanaHealth communication.ppt by sana
Health communication.ppt by sanaMuhammad Ahmad
 
Social media vs electronic media
Social media vs electronic mediaSocial media vs electronic media
Social media vs electronic mediaMuhammad Ahmad
 
Presentation new media-landscape
Presentation new media-landscapePresentation new media-landscape
Presentation new media-landscapeMuhammad Ahmad
 
Broadcast dialer
Broadcast dialer Broadcast dialer
Broadcast dialer TelOnline
 
Presentation naila, milha john bmc 7
Presentation naila, milha john bmc 7Presentation naila, milha john bmc 7
Presentation naila, milha john bmc 7Muhammad Ahmad
 
Presentation types of communication medium bs (h) pu 2013
Presentation types of communication medium bs (h) pu 2013Presentation types of communication medium bs (h) pu 2013
Presentation types of communication medium bs (h) pu 2013Muhammad Ahmad
 
Presentation on paper umt jan 2013
Presentation on paper umt jan 2013Presentation on paper umt jan 2013
Presentation on paper umt jan 2013Muhammad Ahmad
 
Presentation seato and cento presentation (1)
Presentation seato and cento presentation (1)Presentation seato and cento presentation (1)
Presentation seato and cento presentation (1)Muhammad Ahmad
 
Mode of writing (mmc 2)b,cast media 2
Mode of writing (mmc 2)b,cast media 2Mode of writing (mmc 2)b,cast media 2
Mode of writing (mmc 2)b,cast media 2Muhammad Ahmad
 
Facsys fax Server Solution
Facsys fax Server SolutionFacsys fax Server Solution
Facsys fax Server SolutionTelOnline
 
Presentation. bias in the news (2)
Presentation. bias in the news (2)Presentation. bias in the news (2)
Presentation. bias in the news (2)Muhammad Ahmad
 
Presentation.. media and challenges of global corruption slideshare
Presentation.. media and challenges of global corruption slidesharePresentation.. media and challenges of global corruption slideshare
Presentation.. media and challenges of global corruption slideshareMuhammad Ahmad
 
Digium buyers guide
Digium buyers guideDigium buyers guide
Digium buyers guideTelOnline
 

Viewers also liked (15)

Health communication.ppt by sana
Health communication.ppt by sanaHealth communication.ppt by sana
Health communication.ppt by sana
 
Social media vs electronic media
Social media vs electronic mediaSocial media vs electronic media
Social media vs electronic media
 
Presentation new media-landscape
Presentation new media-landscapePresentation new media-landscape
Presentation new media-landscape
 
Broadcast dialer
Broadcast dialer Broadcast dialer
Broadcast dialer
 
Presentation naila, milha john bmc 7
Presentation naila, milha john bmc 7Presentation naila, milha john bmc 7
Presentation naila, milha john bmc 7
 
Presentation types of communication medium bs (h) pu 2013
Presentation types of communication medium bs (h) pu 2013Presentation types of communication medium bs (h) pu 2013
Presentation types of communication medium bs (h) pu 2013
 
Acronyms
AcronymsAcronyms
Acronyms
 
Presentation on paper umt jan 2013
Presentation on paper umt jan 2013Presentation on paper umt jan 2013
Presentation on paper umt jan 2013
 
Presentation seato and cento presentation (1)
Presentation seato and cento presentation (1)Presentation seato and cento presentation (1)
Presentation seato and cento presentation (1)
 
Writing for broadcast
Writing for broadcastWriting for broadcast
Writing for broadcast
 
Mode of writing (mmc 2)b,cast media 2
Mode of writing (mmc 2)b,cast media 2Mode of writing (mmc 2)b,cast media 2
Mode of writing (mmc 2)b,cast media 2
 
Facsys fax Server Solution
Facsys fax Server SolutionFacsys fax Server Solution
Facsys fax Server Solution
 
Presentation. bias in the news (2)
Presentation. bias in the news (2)Presentation. bias in the news (2)
Presentation. bias in the news (2)
 
Presentation.. media and challenges of global corruption slideshare
Presentation.. media and challenges of global corruption slidesharePresentation.. media and challenges of global corruption slideshare
Presentation.. media and challenges of global corruption slideshare
 
Digium buyers guide
Digium buyers guideDigium buyers guide
Digium buyers guide
 

Similar to Cyber harassment ppt umt

Cyber Sexual Violence and Understanding
Cyber Sexual Violence and UnderstandingCyber Sexual Violence and Understanding
Cyber Sexual Violence and Understandingssusere22fb9
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technologyijtsrd
 
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfLEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfRegineManuel2
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxJoelGautham
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullyingZiar Khan
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their preventionAnsar Gill
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their preventionTejasvi Bhatia
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
NETS5003 Policy Primer: Cyber harassment
NETS5003 Policy Primer: Cyber harassmentNETS5003 Policy Primer: Cyber harassment
NETS5003 Policy Primer: Cyber harassmentSamara Williams
 
Digital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyDigital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyMann Rentoy
 

Similar to Cyber harassment ppt umt (20)

Cyber Sexual Violence and Understanding
Cyber Sexual Violence and UnderstandingCyber Sexual Violence and Understanding
Cyber Sexual Violence and Understanding
 
Riza 9 a
Riza   9 aRiza   9 a
Riza 9 a
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
 
Oula 9 a
Oula   9 aOula   9 a
Oula 9 a
 
Cyber safety
Cyber  safetyCyber  safety
Cyber safety
 
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfLEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Facebook
FacebookFacebook
Facebook
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Kinds of Cyber Crimes
Kinds of Cyber CrimesKinds of Cyber Crimes
Kinds of Cyber Crimes
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Boushrat 9 a
Boushrat   9 aBoushrat   9 a
Boushrat 9 a
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
NETS5003 Policy Primer: Cyber harassment
NETS5003 Policy Primer: Cyber harassmentNETS5003 Policy Primer: Cyber harassment
NETS5003 Policy Primer: Cyber harassment
 
Digital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyDigital Citizenship by Mann Rentoy
Digital Citizenship by Mann Rentoy
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

Cyber harassment ppt umt

  • 1.
  • 3. Group Members • EMAN ANJUM • ZIL E HUMA NISAR • MAHEEN ASIF • SHAFIA FAHIM • MAIDA HAROON
  • 5. INTRODUCTION Cyber harassment is the use of the Internet or other electronic means to harass an individual, a group of individuals, or an organization.
  • 6.  Cyber harassment first received attention by legislators in mid 1980s. When a young person uses the Internet or technology to o Harass o threaten o embarrass or o target another person, this person is called a CYBER BULLY
  • 7. • Typically, Cyber bullying involves tweens and teens. • If an adult is involved, it is considered cyber-harassment or Cyber stalking.
  • 8.
  • 9. TYPES DIRECT HARASSMENT include:  Threats bullying or intimidating messages sent directly to the victim.  Via e-mail or other Internet communications mediums.  The use of technological means to interfere with a victim’s use of the Internet, such as hacking or denial of services attacks
  • 11. INDIRECT HARASSMENT not limited to spreading rumors about the victim, it includes:  Various Internet discussion forums.  Subscribing the victim to unwanted online services.  Posting information about the victim in online dating, sex services, or sending messages to others in the victim’s name.
  • 12. WAYS OF CYBER HARASSEMENT Harassing Someone  Using text messaging  Posting rumors, threats or embarrassing information on social networking sites such As Face book and Twitter.
  • 13. Engaging in ‘warning wars’ Participating in text wars or text attacks.
  • 14. IMPERSONATING SOMEONE Developing a screen name that is similar to the victim’s screen name. Stealing the victim’s password and chatting with other people while pretending to be the victim and changing the target's online profile Taking degrading pictures of the victim and then posting them on photo sharing sites
  • 15. USING PHOTOGRAPHS   Taking degrading pictures of the victim and then posting them on photo sharing sites Threatening to share embarrassing photos as a way of controlling or blackmailing the victim. Sending mass emails or text messages The photos can be distributed to hundreds of people within a seconds
  • 16.
  • 17. CREATING WEBSITES , BLOGS, POLLS Creating a blog about the victim that is embarrassing, insulting or humiliating. Using information that was shared in confidence and making it public. Conducting an Internet poll about the victim.
  • 18. Questions in the poll may vary including everything about that. Posting rude, mean or insulting comments about the victim via the chat option of online gaming sites. Sending virus , spyware , or hacking programs to the victim in order to spy on the victim or control his or her computer remotely.
  • 19.
  • 20. Participating In “Happy Slapping”  Using a camera phone to videotape a bullying incident  Downloading the videotaped bullying incident and posting it to YouTube in order to allow a larger audience to view the incident.
  • 21. Sharing a videotaped bullying incident via mass e-mail or text messaging to humiliate and embarrass the victim.
  • 22. Rise of Cyber Bullying • Day by day its becoming the most important social disturbance issues
  • 23. CULTURAL ASPECT Due to different culture conflicts takes place and give a new start to cyber harassment
  • 24. PSYCHOLOGIICAL ASPECT Due to psychological factors To take out there frustration or just to have fun
  • 25. POLITICAL ASPECT  Interest in different political party  making propaganda against the opposite party
  • 27. CYBER LAWS The legal issues related to use of communication technology , particular cyber space.  It is an intersection of many legal fields  Cyber laws is an attempt to apply laws
  • 28. CYBER LAWS IN THE WORLD  Electronic Commerce Act (Ireland) Electronic Transactions Act ( UK, USA , AUSTRALIA , NEW ZEALAND & SINGAPORE)  Electronic Transactions Ordinance ( Hong Kong)  Information Technology Act (INDIA)  Information Communication Technology Act Draft (BANGLADESH)
  • 29. LAWS  On January 5, 2006, President Bush signed Section 113 of the Violence Against Women Act into law.  By fines up to $50,000 or imprisonment for up to two years
  • 30. CYBER LAWS IN PAKISTAN  There are different laws promulgated in Pakistan but are not implemented Two of them are most known Electronic Transaction Ordinance 2002 Electronic / Cyber bill 2007
  • 31.
  • 32. VICTIMS VICTIMS oAn 18-year-old Indian girl studying in the Siliguri Government Polytechnic College committed suicide. oPhoebe Prince was a 15-year-old Irish immigrant. oHis last words, posted onto his Facebook profile about 10 minutes before he died, were: "Jumping off the GW bridge sorry.“ oAmanda Todd 1996 – 2012 oRyan Halligan 1989 - 2003
  • 33. CONCLUSION 2007 SUNFULL movement  CHOI – JIN- SIL SUCIDE  Impact of positive comments  Work with schools and business to positive comments
  • 34. Things That We Find Can Really Hurt Somebody THANKYOU 
  • 35. Any ?