SlideShare a Scribd company logo
1 of 35
BASICS OF SOCIAL
MEDIA
Group Members
• EMAN ANJUM
• ZIL E HUMA NISAR
• MAHEEN ASIF
• SHAFIA FAHIM
• MAIDA HAROON
CYBER HARASSMENT
INTRODUCTION
Cyber harassment is the use of
the Internet or other electronic
means to harass an individual,
a group of individuals, or an
organization.
 Cyber harassment first received
attention by legislators in mid 1980s.
When a young person uses the Internet
or technology to
o Harass
o threaten
o embarrass or
o target another person,
this person is called a CYBER BULLY
• Typically, Cyber bullying involves
tweens and teens.
• If an adult is involved, it is
considered cyber-harassment or
Cyber stalking.
TYPES
DIRECT HARASSMENT include:
 Threats bullying or intimidating messages
sent directly to the victim.
 Via e-mail or other Internet
communications mediums.
 The use of technological means to
interfere with a victim’s use of the Internet,
such as
hacking or denial of services attacks
•
•
•.
INDIRECT HARASSMENT not
limited to spreading rumors about
the victim, it includes:
 Various Internet discussion
forums.
 Subscribing the victim to
unwanted online services.
 Posting information about the
victim in online dating, sex services,
or sending messages to others in
the victim’s name.
WAYS OF CYBER HARASSEMENT
Harassing Someone
 Using text messaging
 Posting rumors, threats or
embarrassing information on
social networking sites such
As Face book and Twitter.
Engaging in ‘warning wars’
Participating in text wars
or text attacks.
IMPERSONATING SOMEONE
Developing a screen name that is similar
to the victim’s screen name.
Stealing the victim’s password
and chatting with other people
while pretending to be the
victim and changing the
target's online profile
Taking degrading pictures
of the victim and then
posting them on photo sharing
sites
USING PHOTOGRAPHS
 
Taking degrading pictures of the victim and
then posting them on photo sharing sites
Threatening to share embarrassing photos as
a way of controlling or blackmailing the victim.
Sending mass emails or
text messages
The photos can be distributed
to hundreds of people within a seconds
CREATING WEBSITES , BLOGS,
POLLS
Creating a blog about the victim that is
embarrassing, insulting or humiliating.
Using information that was shared in
confidence and making it public.
Conducting an Internet poll
about the victim.
Questions in the poll may vary including
everything about that.
Posting rude, mean or insulting comments
about the victim via the chat option of
online gaming sites.
Sending virus , spyware , or hacking
programs to the victim in order to spy on
the victim or
control his or her computer remotely.
Participating In
“Happy Slapping”
 Using a camera phone to
videotape a bullying incident
 Downloading the videotaped bullying
incident and posting it to YouTube
in order to allow a larger
audience to view the incident.
Sharing a videotaped bullying
incident via mass e-mail or text
messaging to humiliate and
embarrass the victim.
Rise of Cyber Bullying
• Day by day its becoming
the most important
social disturbance issues
CULTURAL ASPECT
Due to different culture
conflicts takes place and give
a new start to cyber
harassment
PSYCHOLOGIICAL ASPECT
Due to psychological factors
To take out there frustration or just to
have fun
POLITICAL ASPECT
 Interest in different
political party
 making propaganda
against the opposite party
• Rise after 9/11
CYBER LAWS
The legal issues related to use of
communication technology , particular cyber
space.
 It is an intersection of many legal fields
 Cyber laws is an attempt to apply laws
CYBER LAWS IN THE WORLD
 Electronic Commerce Act (Ireland)
Electronic Transactions Act ( UK, USA ,
AUSTRALIA , NEW ZEALAND & SINGAPORE)
 Electronic Transactions Ordinance
( Hong Kong)
 Information Technology Act (INDIA)
 Information Communication Technology Act
Draft (BANGLADESH)
LAWS
 On January 5, 2006, President Bush
signed Section 113 of the Violence
Against Women Act into law.
 By fines up to $50,000 or
imprisonment for up to two years
CYBER LAWS IN PAKISTAN
 There are different laws promulgated in
Pakistan but are not implemented
Two of them are most known
Electronic Transaction Ordinance 2002
Electronic / Cyber bill 2007
VICTIMS
VICTIMS
oAn 18-year-old Indian girl studying in the Siliguri
Government Polytechnic College committed suicide.
oPhoebe Prince was a 15-year-old Irish immigrant.
oHis last words, posted onto his Facebook profile
about 10 minutes before he died, were: "Jumping
off the GW
bridge sorry.“
oAmanda Todd 1996 – 2012
oRyan Halligan 1989 - 2003
CONCLUSION
2007 SUNFULL movement
 CHOI – JIN- SIL SUCIDE
 Impact of positive comments
 Work with schools and business to positive
comments
Things That We Find
Can Really Hurt Somebody
THANKYOU 
Any ?

More Related Content

What's hot

Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security Arah Louise
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace Karnika Seth
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crimeDheeraj Dani
 
Crimes against economics and political order, white collar and corporate crime
Crimes against economics and political order, white collar and corporate crimeCrimes against economics and political order, white collar and corporate crime
Crimes against economics and political order, white collar and corporate crimeLeen Gultia
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and securitynikunjandy
 

What's hot (20)

Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Cyber crimes presentation
Cyber crimes presentationCyber crimes presentation
Cyber crimes presentation
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Cyberstalking ppt 02.18.19
Cyberstalking ppt   02.18.19Cyberstalking ppt   02.18.19
Cyberstalking ppt 02.18.19
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Crimes against economics and political order, white collar and corporate crime
Crimes against economics and political order, white collar and corporate crimeCrimes against economics and political order, white collar and corporate crime
Crimes against economics and political order, white collar and corporate crime
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 

Viewers also liked

Health communication.ppt by sana
Health communication.ppt by sanaHealth communication.ppt by sana
Health communication.ppt by sanaMuhammad Ahmad
 
Social media vs electronic media
Social media vs electronic mediaSocial media vs electronic media
Social media vs electronic mediaMuhammad Ahmad
 
Presentation new media-landscape
Presentation new media-landscapePresentation new media-landscape
Presentation new media-landscapeMuhammad Ahmad
 
Broadcast dialer
Broadcast dialer Broadcast dialer
Broadcast dialer TelOnline
 
Presentation naila, milha john bmc 7
Presentation naila, milha john bmc 7Presentation naila, milha john bmc 7
Presentation naila, milha john bmc 7Muhammad Ahmad
 
Presentation types of communication medium bs (h) pu 2013
Presentation types of communication medium bs (h) pu 2013Presentation types of communication medium bs (h) pu 2013
Presentation types of communication medium bs (h) pu 2013Muhammad Ahmad
 
Presentation on paper umt jan 2013
Presentation on paper umt jan 2013Presentation on paper umt jan 2013
Presentation on paper umt jan 2013Muhammad Ahmad
 
Presentation seato and cento presentation (1)
Presentation seato and cento presentation (1)Presentation seato and cento presentation (1)
Presentation seato and cento presentation (1)Muhammad Ahmad
 
Mode of writing (mmc 2)b,cast media 2
Mode of writing (mmc 2)b,cast media 2Mode of writing (mmc 2)b,cast media 2
Mode of writing (mmc 2)b,cast media 2Muhammad Ahmad
 
Facsys fax Server Solution
Facsys fax Server SolutionFacsys fax Server Solution
Facsys fax Server SolutionTelOnline
 
Presentation. bias in the news (2)
Presentation. bias in the news (2)Presentation. bias in the news (2)
Presentation. bias in the news (2)Muhammad Ahmad
 
Presentation.. media and challenges of global corruption slideshare
Presentation.. media and challenges of global corruption slidesharePresentation.. media and challenges of global corruption slideshare
Presentation.. media and challenges of global corruption slideshareMuhammad Ahmad
 
Digium buyers guide
Digium buyers guideDigium buyers guide
Digium buyers guideTelOnline
 

Viewers also liked (15)

Health communication.ppt by sana
Health communication.ppt by sanaHealth communication.ppt by sana
Health communication.ppt by sana
 
Social media vs electronic media
Social media vs electronic mediaSocial media vs electronic media
Social media vs electronic media
 
Presentation new media-landscape
Presentation new media-landscapePresentation new media-landscape
Presentation new media-landscape
 
Broadcast dialer
Broadcast dialer Broadcast dialer
Broadcast dialer
 
Presentation naila, milha john bmc 7
Presentation naila, milha john bmc 7Presentation naila, milha john bmc 7
Presentation naila, milha john bmc 7
 
Presentation types of communication medium bs (h) pu 2013
Presentation types of communication medium bs (h) pu 2013Presentation types of communication medium bs (h) pu 2013
Presentation types of communication medium bs (h) pu 2013
 
Acronyms
AcronymsAcronyms
Acronyms
 
Presentation on paper umt jan 2013
Presentation on paper umt jan 2013Presentation on paper umt jan 2013
Presentation on paper umt jan 2013
 
Presentation seato and cento presentation (1)
Presentation seato and cento presentation (1)Presentation seato and cento presentation (1)
Presentation seato and cento presentation (1)
 
Writing for broadcast
Writing for broadcastWriting for broadcast
Writing for broadcast
 
Mode of writing (mmc 2)b,cast media 2
Mode of writing (mmc 2)b,cast media 2Mode of writing (mmc 2)b,cast media 2
Mode of writing (mmc 2)b,cast media 2
 
Facsys fax Server Solution
Facsys fax Server SolutionFacsys fax Server Solution
Facsys fax Server Solution
 
Presentation. bias in the news (2)
Presentation. bias in the news (2)Presentation. bias in the news (2)
Presentation. bias in the news (2)
 
Presentation.. media and challenges of global corruption slideshare
Presentation.. media and challenges of global corruption slidesharePresentation.. media and challenges of global corruption slideshare
Presentation.. media and challenges of global corruption slideshare
 
Digium buyers guide
Digium buyers guideDigium buyers guide
Digium buyers guide
 

Similar to Cyber harassment ppt umt

Cyber Sexual Violence and Understanding
Cyber Sexual Violence and UnderstandingCyber Sexual Violence and Understanding
Cyber Sexual Violence and Understandingssusere22fb9
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technologyijtsrd
 
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfLEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfRegineManuel2
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxJoelGautham
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimesNilendra Kumar
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullyingZiar Khan
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their preventionAnsar Gill
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their preventionTejasvi Bhatia
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
NETS5003 Policy Primer: Cyber harassment
NETS5003 Policy Primer: Cyber harassmentNETS5003 Policy Primer: Cyber harassment
NETS5003 Policy Primer: Cyber harassmentSamara Williams
 

Similar to Cyber harassment ppt umt (20)

Cyber Sexual Violence and Understanding
Cyber Sexual Violence and UnderstandingCyber Sexual Violence and Understanding
Cyber Sexual Violence and Understanding
 
Riza 9 a
Riza   9 aRiza   9 a
Riza 9 a
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
 
Oula 9 a
Oula   9 aOula   9 a
Oula 9 a
 
Cyber safety
Cyber  safetyCyber  safety
Cyber safety
 
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfLEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Facebook
FacebookFacebook
Facebook
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Kinds of Cyber Crimes
Kinds of Cyber CrimesKinds of Cyber Crimes
Kinds of Cyber Crimes
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Boushrat 9 a
Boushrat   9 aBoushrat   9 a
Boushrat 9 a
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
NETS5003 Policy Primer: Cyber harassment
NETS5003 Policy Primer: Cyber harassmentNETS5003 Policy Primer: Cyber harassment
NETS5003 Policy Primer: Cyber harassment
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Cyber harassment ppt umt

  • 1.
  • 3. Group Members • EMAN ANJUM • ZIL E HUMA NISAR • MAHEEN ASIF • SHAFIA FAHIM • MAIDA HAROON
  • 5. INTRODUCTION Cyber harassment is the use of the Internet or other electronic means to harass an individual, a group of individuals, or an organization.
  • 6.  Cyber harassment first received attention by legislators in mid 1980s. When a young person uses the Internet or technology to o Harass o threaten o embarrass or o target another person, this person is called a CYBER BULLY
  • 7. • Typically, Cyber bullying involves tweens and teens. • If an adult is involved, it is considered cyber-harassment or Cyber stalking.
  • 8.
  • 9. TYPES DIRECT HARASSMENT include:  Threats bullying or intimidating messages sent directly to the victim.  Via e-mail or other Internet communications mediums.  The use of technological means to interfere with a victim’s use of the Internet, such as hacking or denial of services attacks
  • 11. INDIRECT HARASSMENT not limited to spreading rumors about the victim, it includes:  Various Internet discussion forums.  Subscribing the victim to unwanted online services.  Posting information about the victim in online dating, sex services, or sending messages to others in the victim’s name.
  • 12. WAYS OF CYBER HARASSEMENT Harassing Someone  Using text messaging  Posting rumors, threats or embarrassing information on social networking sites such As Face book and Twitter.
  • 13. Engaging in ‘warning wars’ Participating in text wars or text attacks.
  • 14. IMPERSONATING SOMEONE Developing a screen name that is similar to the victim’s screen name. Stealing the victim’s password and chatting with other people while pretending to be the victim and changing the target's online profile Taking degrading pictures of the victim and then posting them on photo sharing sites
  • 15. USING PHOTOGRAPHS   Taking degrading pictures of the victim and then posting them on photo sharing sites Threatening to share embarrassing photos as a way of controlling or blackmailing the victim. Sending mass emails or text messages The photos can be distributed to hundreds of people within a seconds
  • 16.
  • 17. CREATING WEBSITES , BLOGS, POLLS Creating a blog about the victim that is embarrassing, insulting or humiliating. Using information that was shared in confidence and making it public. Conducting an Internet poll about the victim.
  • 18. Questions in the poll may vary including everything about that. Posting rude, mean or insulting comments about the victim via the chat option of online gaming sites. Sending virus , spyware , or hacking programs to the victim in order to spy on the victim or control his or her computer remotely.
  • 19.
  • 20. Participating In “Happy Slapping”  Using a camera phone to videotape a bullying incident  Downloading the videotaped bullying incident and posting it to YouTube in order to allow a larger audience to view the incident.
  • 21. Sharing a videotaped bullying incident via mass e-mail or text messaging to humiliate and embarrass the victim.
  • 22. Rise of Cyber Bullying • Day by day its becoming the most important social disturbance issues
  • 23. CULTURAL ASPECT Due to different culture conflicts takes place and give a new start to cyber harassment
  • 24. PSYCHOLOGIICAL ASPECT Due to psychological factors To take out there frustration or just to have fun
  • 25. POLITICAL ASPECT  Interest in different political party  making propaganda against the opposite party
  • 27. CYBER LAWS The legal issues related to use of communication technology , particular cyber space.  It is an intersection of many legal fields  Cyber laws is an attempt to apply laws
  • 28. CYBER LAWS IN THE WORLD  Electronic Commerce Act (Ireland) Electronic Transactions Act ( UK, USA , AUSTRALIA , NEW ZEALAND & SINGAPORE)  Electronic Transactions Ordinance ( Hong Kong)  Information Technology Act (INDIA)  Information Communication Technology Act Draft (BANGLADESH)
  • 29. LAWS  On January 5, 2006, President Bush signed Section 113 of the Violence Against Women Act into law.  By fines up to $50,000 or imprisonment for up to two years
  • 30. CYBER LAWS IN PAKISTAN  There are different laws promulgated in Pakistan but are not implemented Two of them are most known Electronic Transaction Ordinance 2002 Electronic / Cyber bill 2007
  • 31.
  • 32. VICTIMS VICTIMS oAn 18-year-old Indian girl studying in the Siliguri Government Polytechnic College committed suicide. oPhoebe Prince was a 15-year-old Irish immigrant. oHis last words, posted onto his Facebook profile about 10 minutes before he died, were: "Jumping off the GW bridge sorry.“ oAmanda Todd 1996 – 2012 oRyan Halligan 1989 - 2003
  • 33. CONCLUSION 2007 SUNFULL movement  CHOI – JIN- SIL SUCIDE  Impact of positive comments  Work with schools and business to positive comments
  • 34. Things That We Find Can Really Hurt Somebody THANKYOU 
  • 35. Any ?