SlideShare una empresa de Scribd logo
1 de 53
Social
Media 0
Assignment
Topic:
Social Media
Group Members:
Isma Khalid Roll No. BS-IAS-31-R-F18
Iqra Ashfaq Roll No. BS-IAS-38-R-F18
Hamda Shahid Roll No. BS-IAS-48-R-F18
Asad Khalil Roll No. BS-IAS-44-R-F18
Maha Sarfraz Roll No. BS-IAS-41-R-F18
Section:
A
Submitted to:
Mam Madiha Malik
Social
Media 0
Table of Contents
1.1 Introduction to Social Media and Theoretical Perspectives..............................................................
IntroductiontoSocial Media……………………………………………………………………………………………………………….2
Functionalist Perspective on Social Media.........................................................................................5
ConflictPerspective onSocial Media …………………………………………………………………………………………………..9
InteractionistPerspective onSocial Media………………………………………………………………………………………11
FeministPerspectiveonSocial Media………………………………………………………………………………………………12
Audience &It’sbehavior………………………………………………………………………………………………………………….13
1.2 Social Media Addiction............................................................................................................... 14
Symptoms ....................................................................................................................................16
Effects.......................................................................................................................................... 18
Effectof Dopamine…………………………………………………………………………………………………………………………….20
1.3 Statistics of Pakistani Users …………………………………………………………………………………………………………...22
Cure to Addiction………………………………………………………………………………………………………………………………26
Why we todayneedmotivationalspeeches?........................................................................................28
1.4 A Sociological Study of differenttypesofCyber Crimes…………………………………………………………………29
CyberTerrorism…………………………………………………………………………………………………………………………….31
CyberBullying………………………………………………………………………………………………………………………………32
CyberFraud…………………………………………………………………………………………………………………………………36
1.5 Laws against CyberCrime…..…………………………………………………………………………………………………………..38
Role of PTA………………………………………………………………………………………………………………………………………48
Implementation……………………………………………………………………………………………………………………………….
Social
Media 1
1.1 Media
In general, "media" refers to various means of communication. For example, television, radio,
and the newspaper are different types of media. The term can also be used as a collective noun
for the press or news reporting agencies. In the computer world, "media" is also used as a
collective noun, but refers to different types of data storage options.
Types of Media:
There are five types of media:
1-Newspaper
2-Magazines
3-Radio
4-Television
5-InternetNewspaper & magazines are part of Print media while Radio, Television and internet
are part of Electronic Media.
Media
Newspaper Magazines Television Radio Internet
Social
Media 2
Evolution of Media:
Newspapers were vital during the Revolutionary War. Later, in the party press era, party loyalty
governed coverage. At the turn of the twentieth century, investigative journalism and
muckraking appeared, and newspapers began presenting more professional, unbiased
information. The modern print media have fought to stay relevant and cost-efficient, moving
online to do so.
Most families had radios by the 1930s, making it an effective way for politicians, especially
presidents, to reach out to citizens. While the increased use of television decreased the popularity
of radio, talk radio still provides political information. Modern presidents also use television to
rally people in times of crisis, although social media and the Internet now offer a more direct
way for them to communicate. While serious newscasts still exist, younger viewers prefer soft
news as a way to become informed.
Introduction to Social Media
 What is social media?
Virtual communities where users can create individual public profiles, interact with real-
life friends, and meet other people based on shared interests.i Any website that enables
social interaction by users is considered a social media site.
 Types of Social Media:
Following are four types of social media:
1) Social networking (Facebook, LinkedIn, Google+).
2) Microblogging (Twitter, Tumblr).
3) Photo sharing (Instagram, Snapchat, Pinterest).
4) Video sharing (YouTube, Facebook Live, Periscope, Vimeo).
Social
Media 3
 Background :
The ease of internet access worldwide has made it one of the most popular medium of seeking
information and for communication (Ramamohanarao et al, 2007ii). The internet is now very
vital in the modern world. It has become an important instrument in education and social life
such that it is gradually becoming indispensable in the daily life of many people (Pew Internet
Research, 2004).iii The internet is a highly enlightening and entertaining medium, therefore
people engage in several activities on it; some of which may be potentially addictive. One of
such activities is the use of social media (Kuss & Griffiths 2011).iv
The introduction of social media in the last decade has largely attracted many people. This has
therefore shifted their focus from mainly using just traditional media and traditional forms of
social networking for social interaction (globalwebindex, 2015).v The mass appeal of social
media could be an issue of concern, especially with regards to the steady increase in the time
users spend online. Also, the qualities of social media make it a desirable escape for many of
these people increasing their dependency on it; thereby contributing to the growth of the social
media addiction phenomenon worldwide (Brewer, 2013).vi
 Overview:
Social media has become a global phenomenon and a very important means of
communication among peers, families and all manner of persons. Social media sites such as
Facebook, Twitter, Instagram, LinkedIn and mobile instant messaging services (IM) such
as WhatsApp, Viber and IMO and video calling services like Skype have become a popular
means of communication in the past few years .Statistics show that Internet active users
percentage has increased from 1,966 million (28.7%) to 4,208 million (55.1%) from year
2010-2018. The increase in number of these social media sites, combined with the fast
growth and advancement of mobile device technology in the last few years, coupled with the
ease of access to broadband and mobile data services have created a major avenue for daily
social interaction; encouraging regular profile
updates and replies to comments and messages in real time. People are now logging on to
social media on mobile devices everywhere, at any time and on the go; making it a common
everyday activity .The number of social media users worldwide in 2018 is 3.196 billion, up
Social
Media 4
13 percent year-on-year. The level of popularity and use of social media has increased greatly
over the years since it was first introduced.
vii
In Pakistan also, the number of internet users is increasing .According to 2018 statistics , the
estimated total population of Pakistan was 200,813,818, out of which 44,608,065 were
internet users .viii
Total Population of
Pakistan (2018)
Internet Users(2000) Internet Users(2018) Facebook
Users
Users
%age
Asia
200,813,818 133,900 44,608,065 32,000,000 2.2%
Lahore among the top cities by Pakistani users on Facebook with approximately 5.2 million users
that contributes about 21% of total Pakistani Facebook audience.
Social
Media 5
Functionalist Perspective on Social Media:
Functionalist perspective sees that social media contributes to society in a positive way.
When using social media, different cultures are expanded all around the world. Culture is
taught more by people putting their beliefs on the internet. It could also be used a stress
reliever, decreasing conflict, and giving people something to do during boredom.
Functionalism Perspective thinks social media is good because the internet reaches for
people and both television and the radio, so when a child goes missing it is spread all
over the internet because it reaches so many people globally, with better chances of
finding the child because everyone is aware.
 Functions:
1) Manifest Functions:
 Agent of Socialization:
Functionalists focus on how parts of society function in expected and unexpected ways to
maintain existing social order. They also pay attention to how parts disrupt the existing
order in expected and unexpected ways. Of course the use of social networking sites as a
platform for presenting the self to others is the part of society we are analyzing. Some
expected, or manifest, functions of social networking sites are that they facilitate
connections with family, friends, and other parties; allow members to share photos and
videos; support discussions with like-minded people about hobbies and other interests;
and help users to plan face-to-face meetings with friends. They also allow users to
establish and maintain contacts with a far greater number of people than is typically
possible using non-digital means.ix
 Enforcer of Social Norms:
Social norms are usually the unwritten social behaviors that are to be expected in a society or a
social group. It’s a required standard; such as completing higher education in a certain social
group, getting married during a certain age period, or gender assigned roles. Norms enforce
conformity of behavior and order in every social group, even among marginalized groups and
Social
Media 6
anarchists, but they do not necessarily represent functional principles or justice and equality. The
ability to interact, debate, and express freely online has led to the encouragement of action and
challenging the status quo. Take for instance the rise of gender equality and female rights
movement online led by independent activists. The repetition of this subject online has led to
worldwide awareness due to its mass and borderless audience and the effectiveness of repetition
on persuasion for multiple media outlets. This, without a doubt, works on the normalization of
female rights and equality, further pushing patriarchal systems in reform and the shaming of
inequality on a bigger scale. This effect is leading to the formation of new social norms to
conform to in pursuit of acceptance and avoidance of isolation.
In the end, reforming social norms takes great responsibility and balanced evaluation by both the
individual and the institution seeking change, but since crowd psychology doesn’t solely depend
on logic, it is safe to assume that we’ll face many social and cultural obstacles in the future.x
 Coferral of Status:
Media attention confers status on people, things, and policies. By focusing on an individual or
item, the media legitimize the status of that individual or item, enhancing prestige and authority.
Lazarsfeld and Merton described status conferral as being one of the social functions of the
media. They pointed out that it was not only favorable media attention that conferred status, such
as a newspaper editorial endorsing a particular political candidate, but any media attention
enhanced status.
People can become famous for being famous— celebrity status can be gained by sheer media
coverage. In a circular belief, people believe that someone must be important because the media
focuses attention on him or her. Celebrities appearing in advertisements confer status on a
product.xi
 Promotion of Consumption:
Using advertising to develop branding supports economy ,provides information about
products and underwrites the cost of media. Young people cannot escape commercial
messages .They show up at rock concerts or as banners on web pages .They also surface
in form of product placement -for example, the Coca-Cola glasses that sit in front of
judges in different TV shows is nothing new .
Social
Media 7
 Facebook:
Facebook provides information about brands and products by Ad feature .Different
brands and pages purchase promotion packages to boost their posts.
 Instagram:
Instagram is also unique engine for promotion of consumptions. It also provides
promotion packages to its users.
 YouTube:
YouTube provides two types of Ads :
i. Nev Bar Ads
ii. Display-in Ads
2)Latent Functions:
An unexpected, or latent, function of social networking sites is that many offer users a tool that
allows them to connect with people with whom they have lost contact, including lost relatives. It
is also a tool that police departments draw upon to collect incriminating evidence.
Social Media also serves to collect big data to analyze large sums of information also gives
people an open platform to say what they please.
Dysfunction:
1)Manifest Dysfunction:
One manifest dysfunction of social media websites is that there is no way to tell whether people
are presenting real or fabricated self-profile. The news feature seemingly endless numbers of
stories about people who post fabricated profiles, such as one involving three teens that posted
embarrassing material and falsely attributed it to a disliked teacher. As one critic argues, "There
is a general feeling that social networking is the wild west of identity management" (Martin
2008).Many people create a Facebook page for the purpose of meeting like-minded friends or
Social
Media 8
staying in touch, not thinking that potential employers may view postings for clues about
someone's character apart from the resume and interview.
Most profiles are accessible which means that your life is out in the open and privacy seems far.
2)Latent Dysfunction:
 Narcotizing Effect:
Narcotizing dysfunction approach is one of the most overlooked approaches of media effects in
the relevant literature. Robert K. Merton and Paul F. Lazarsfeld in their Mass Communication,
Popular Taste and Organized Social Action named article, argue about the narcotizing
dysfunctions of media. According to their approach, media creates an apathy in which people are
content to ‘know’ rather than ‘do’ something. In this context, media provides information about
the events and the receivers demonstrate some superficial concern on media about the events
while the importance of real action is neglected. Consequently, the receivers are drugged into the
inactivity like they are under the influence of narcotics. One of the main assumptions of this
approach is that, increasing dosages of mass communications sometimes ‘unpredictably’
transform the energies of the receivers from ‘active participation’ into ‘passive knowledge’. As
Robert K. Merton and Paul F. Lazarsfeld states: Exposure to this flood of information may serve
to narcotize rather than to energize the average reader or listener. As an increasing mead of time
is devoted to reading and listening, a decreasing share is available for organized action. The
individual reads accounts of issues and problems and may even discuss alternative lines of
action. But this rather intellectualized, rather remote connection with organized social action is
not activated. The interested and informed citizen can congratulate himself on his lofty state of
interest and information and neglect to see that he has abstained from decision and action…. He
comes to mistake knowing about problems of the day for doing something about them. His social
conscience remains spotlessly clean. He is concerned. He is informed. And he has all sorts of
ideas as to what should be done. But, after he has gotten through his dinner and after he has
listened to his favored radio programs and after he has read his second newspaper of the day, it is
really time for bed (1957: 464).xii
 Less Control:
Social
Media 9
A unexpected, or latent, dysfunction of social networking sites is that once something is posted
for others to access, there is no way to control how it will be used .People start talking
inappropriately at each other online because they think they are anonymous and have free
speech.
Conflict Perspective on Social Media:
The conflict perspective looks at how social networking sites create a false way of connecting
people over the web and a place where bullying thrives, which is called cyberbullying. Conflict
theory can be used to say social media has a large influence in the younger population by looking
at who the media is controlled by. Teens are more tempted by advertisings and the propaganda in
order, which makes teens more influenced by the media .
 Unequal Fame:
Social media is ruled by those with more followers. People with more followers continue to gain
followers as their content continues to be ever far reaching. People with less followers become
lost in the blur of the rest of those with names .People on social media with the most status
compete with each other in view on social media platforms ,whereas people with lower status are
not seen. These people try to keep their power ,by teaching followers what his or her status is all
about ,so that their followers are “schooled” in the status that the popular social media person has
,so that his power stays legitimized.
 Gatekeeping:
Conflict theorists seek to identify advantaged and disadvantaged groups, document unequal
access to scarce and valued resources, and describe the ways in which advantaged groups
promote and protect their interests. With regard to social networking websites, conflict theorists
ask, "Who ultimately controls these websites? And who benefits from this arrangement and at
whose expense?" Conflict theorists maintain that the advantaged groups include those who own
the social networking websites, advertisers, potential employers, and other parties interested in
selling products. No matter how much users think they benefit from social networking, in the
final analysis they are the disadvantaged groups, especially if they mistakenly believe that they
control the information they have posted. On close analysis we see that the control lies with the
website. Facebook (2008), for example, makes it clear that "all content on the Site and available
through the Service, including designs, text, graphics, pictures, video, information, applications,
Social
Media 10
software, music, sound and other les . . . are the proprietary property of the Company." My Space
(2008) warns that it may use "cookies and similar tools to customize the content and advertising
gleaned from the Pro le Information you have provided."
 Dominant Ideology:
In the Marxist perspective, “Dominant ideology” is referred to as the ideology of the majority in
a population. This ideology remains to be prevalent given that interests of the dominant class are
fulfilled. This can lead to seizure of development process in the subordinate class, who are
unable to form an effective opposition. It can be said without doubt that the ideas of the
dominant class are deeply penetrated into the social system Williams, 1977. According to Karl
Marx, ‘Social class determines consciousnesses. The relationship of a class to the modes of
production generates cultural conditions and its material conditions. In other words it can also be
said that each class has a separate belief system because each has its own interests due to
difference in their economic conditions. Secondly each mode of production has a dominant class
which is responsible for a dominant ideology to ensure the subordination of the working class.
Marx also distinguished two types of social influences in the formation of ideologies. The main
source of ideas is the experiences of individuals as they continue their daily life experiences.
David Cheal calls the reactions to these daily activities as the ‘practical ideas.’ Another source
through which individuals are introduced to new ideas is called ‘received ideas’ as these are
achieved through social interactions or communication between individuals. For Gramsci, the
presence of these two sources of ideas can lead to contradictions, which he called ‘contradictory
consciousness.’ Such types of contradictions are unevenly distributed among the classes. For
dominant classes, they form a consistent system of thought and the consequences of such
contradictions are insignificant. However for subordinate classes, these contradictions are large
and significant. (Cheal, 1979) Leading thinkers in Marxist ideology, Althussers and Paulantzas
argue that the dominance in political or ideological structures is determined by economic base.
Such dominance is sometimes also facilitated by non-economic factors like religion. In feudal
and pre-capitalist societies religion was used to ensure that a continuous labor source was
available from the peasantry. (Abercrombie & Turner, 1978). According to Marxists, media
plays an important role in spreading the dominant ideology and in building a sense of consensus
among the population about right and wrong nature of things. This in a sense can be true as
Social
Media 11
media has means to provide false information and completely ignore or brand something
unreasonable which challenges the dominant ideology. Media presents ideas of the ruling class
while marginalizing voices of minority. The power structures in media can be further broken
down to the interests of the owners and managers of a media group. Murdock argues that the two
important reasons that recede power of ruling class is the growth of professional managers and
the creation of new capital enterprise. As industry grows, so does the need for managers.(Gitlin,
1979) This in turn increases the influence of professional managers and threatens the power base
of the owner.xiii
Interactionist Perspective on Social Media:
People connect with others for various reasons: starting relationships, continuing relationships,
career aspirations, or something else. Social media is driven by people and their connections and
interactions with others. People are active on social media, because this is how they give meaning
to the world, by commenting on what they find meaningful and selecting articles for example
which shows what they give meaning to.xiv Symbolic interactionists study social interaction and
focus on self-awareness, symbols, and negotiated order. Symbolic interactionists ask, "How do the
involved parties experience, interpret, influence, and respond to what they and others are saying
and doing?" Symbolic interactionists are interested in learning how social networking platforms
serve as a mirror, giving users especially teenagers the chance to be noticed by others and to receive
feedback.
Symbolic interactionists studying Facebook and other social networking sites familiarize
themselves with vocabulary and symbols people use to convey intent and mood with words such
as block (take action to prevent a user from making contact or viewing a profile) and add (to gain
a new friend). Finally, symbolic interactionists are interested in how order is dealt with presenting
the self and seeking responses to that presentation.xv Neo-Luddites are people who see
technology as symbolizing the coldness and alienation of modern life. But for technophiles,
technology symbolizes the potential for a brighter future. For those adopting an ideological middle
ground, technology might symbolize status (in the form of a massive flat-screen television) or
failure (in owning a basic old mobile phone with no bells or whistles).xvi
Social
Media 12
Feminist Perspective on Social Media:
Take a look at popular television shows, advertising campaigns, and online game sites. In most,
women are portrayed in a particular set of parameters and tend to have a uniform look that
society recognizes as attractive. Most are thin, white or light-skinned, beautiful, and young. Why
does this matter? Feminist perspective theorists believe it is crucial in creating and reinforcing
stereotypes. For example, Fox and Bailenson (2009) found that online female avatars (the
characters you play in online games like World of Warcraft or Second Life) conforming to
gender stereotypes enhances negative attitudes toward women, and Brasted (2010) found that
media (advertising in particular) promotes gender stereotypes.
The gender gap in tech-related fields (science, technology, engineering, and math) is no secret. A
2011 U.S. Department of Commerce report suggested that gender stereotyping is one reason for
this gap, acknowledging the bias toward men as keepers of technological knowledge (U.S.
Department of Commerce 2011). But gender stereotypes go far beyond the use of technology.
Press coverage in the media reinforces stereotypes that subordinate women, giving airtime to
looks over skills, and disparaging women who defy accepted norms.
Recent research in new media has offered a mixed picture of its potential to equalize the status of
men and women in the arenas of technology and public discourse. A European agency, the
Advisory Committee on Equal Opportunities for Men and Women (2010), issued an opinion
report suggesting that while there is the potential for new media forms to perpetuate gender
stereotypes and the gender gap in technology and media access, at the same time new media
could offer alternative forums for feminist groups and the exchange of feminist ideas. Still, the
committee warned against the relatively unregulated environment of new media and the potential
for antifeminist activities, from pornography to human trafficking, to flourish there.
Increasingly prominent in the discussion of new media and feminism is cyberfeminism, the
application to, and promotion of, feminism online. Research on cyberfeminism runs the gamut
from the liberating use of blogs by women living in Iraq during the second Gulf War (Pierce
2011) to the analysis of postmodern discourse on the relationship between the body and
technology (Kerr 2014).xvii
Social
Media 13
Audience:
The Social Media is distinguished from other social institutions by the necessary presence of an
audience. It can be identifiable, finite group , such as audience at a jazz club or a Broadway
musical , or a much larger and undefined group , such as users of Facebook. The specialized
targeting of audiences has led some scholars to question the “masses” on social media. For
example, the British social psychologist Sonia Livingstone (2004) has written that the media
have become so segmented, they have taken on the appearance almost of individualization. Are
viewing audiences so segmented that large collective audiences are a thing of the past? That is
not yet clear. Even though we seem to be living in an age of personal computers and personal
digital assistants (PDAs) , large formal organizations still transmit public messages that reach a
sizeable , heterogeneous , and scattered audience.
Audience Behavior:
Sociologist have long researched how audiences interact with one another and how they share
information after a media event. The role of audience members as opinion leaders particularly
intrigues social researchers . An opinion leader is someone who influences the opinions and
decisions of others through day-to-day personal contact and communication. For example, a
movie of theater critic functions as an opinion leader . Sociologist Paul Lazarsfeld and his
colleagues (1948) pioneered the study of opinion of opinion leaders in their research on voting
behavior in the 1940s . They found that opinion leaders encourage their relatives , friends and co-
workers to think positively about a particular candidate, perhaps pushing them to listen to the
politician’s speeches or read the campaign literature .Despite the role of opinion leaders ,
members of an audience do not all interpret media in the same way .Often their response is
influenced by their social characteristics ,such as occupation ,race , education and income .
Social
Media 14
1.2Social Media Addiction:
Addiction is a psychological and physical inability to stop consuming a chemical, drug, activity,
or substance, even though it is causing psychological and physical harm. Social Media Addiction
is not a formal clinical diagnosis, it is fair to say that many people spend far too much time on
social media and may at the very least describe themselves as being “obsessed”, if not addicted.
In recent years the mental health community has become increasingly interested in the impact
that modern technology has on our lives – both positive and negative. The rise of social media
has meant that we as a global population are more connected than we have ever been in the
history of time. However, our reliance on social media can have a detrimental effect on our
mental health, with the average Brit checking their phone as much 28 times a day.
 Features that make social media addictive :
According to Nick Zagorski (2017), a writer for Psychiatric News, recent studies have shown
that social media use is linked to feelings of social isolation, depression, insecurity, jealousy, and
poor self-esteem. However, these findings beg the question: how do these negative feelings
transpire from just perusing social media sites?
Here are some real examples of reasons you might feel worse by increased exposure to social
media:
 The illusion that others are more popular due to the number of “friends” or “followers” they
have
 Seeing pictures of a group of friends that you consider yourself to be close to but you
weren’t invited to join them
 Seeing pictures of happy people enjoying their lives, which creates sadness and jealousy
because your life doesn’t seem as grand
 Lack of “likes” to your post, resulting in feelings of disappointment and decreased self-
esteem
 Seeing a love interest with someone else may make you feel depressed and insecure
Social
Media 15
 Political posts that you don’t agree with
 Feeling like you can never keep up with what everyone else has
 Being directly attacked about a message or picture you posted
One thing that probably contributes to social media being so addictive is the role it played in the
rise of the digital age. While social media was becoming popular, the internet also became more
widely used, cheaper to access, and faster to load content .The rise of mobile phones with
internet capabilities and mobile internet also made it easier for social media to be available
wherever you go, and regardless of whatever you’re doing. Thanks to the popularity of social
media, you can constantly and instantaneously update your network about what you’re eating,
what you’re wearing, and who you’re with.
Your Ego:
Having your own space online means you have free reign to post about your favorite subject:
yourself. After all, your profile, your rules, and no one is forcing you to ‘friend’ them or ‘follow’
them. In general, humans spend 30-40% of conversations talking about themselves.
Interestingly, that number reaches up to 80% on social media posts.
FOMO (Fear of Missing Out):
FOMO is one of the leading drivers of social media addiction. People use social media to post
about the best things happening in their life, which gives them a self-esteem boost—especially
when the people in their networks affirm them. But even when experiencing something great,
people often wonder if there is something better and more exciting happening at the same time,
so they go on social media to check. Social media provides the proof that there are other great
things happening, through photos and status updates. When people compare what they’re doing
to what other people are doing, they may start to feel negative about what they would otherwise
perceive as a good time .Sometimes people forget that social media can be both a world unto
itself (suitable for undirected exploration) and also an extension of real life. Even if you’re not
bothered by other people having more fun than you, social media is a compelling place to
procrastinate.
A "High" of Sorts:
When you see people reacting to or ‘liking’ what you post about, it validates you and makes you
Social
Media 16
feel good. When you see that new notification alert, your brain secretes a neurotransmitter called
dopamine, which controls the brain’s pleasure and reward center. The more dopamine released,
the more the brain recognizes that it is triggered by a reward Your Own, Personal Bubble
Social media can serve as your own personal chunk of the internet. There are many who grew up
with Xanga, Blogger, and now Tumblr blogs. They turned to these online platforms and internet
strangers in order to express what they couldn't tell the people in their “real” lives. Thanks to
different levels of privacy both then and now, it’s easy to create a news feed that only contains
the thoughts of like minded people. While this effectively cuts out the trolls it can also encourage
a homogenized world view. It’s up to you to decide if you’re OK with that when trimming your
friend list based on viewpoint differences. On the idea of social media acting as a personal
bubble, consider what British filmmaker Adam Curtis said in a New York Times interview:
“On a social-media network, it’s very much like being in a heroin bubble. As a radical artist in
the 1970s, you used to go and take heroin and wander through the chaos and the collapsing
Lower East Side, and you felt safe. That’s very like now. You know you aren’t safe, but you feel
safe because everyone is like you. But you don’t have to take heroin, so it’s brilliant. You don’t
get addicted, or maybe you do. Mostly you do.”
The Like Button:
When Justin Rosenstein—one of the four designers of Facebook’s ‘Like’ Button—came up with
the idea for it, he did not think it would turn into a cultural phenomenon.
“The main intention I had was to make positivity the path of least resistance, and I think it
succeededin its goals, but it also created large unintended negative side effects. In a way, it
was too successful.”
The negative side effects he refers might include the fact that so many offline activities by
Facebook users are now driven by “likes”. For example, are you traveling somewhere new? Your
social media addiction may result in you feeling the need to post about it on social media for
positive affirmation in the form of likes. It’s possible that being able to post about your trip on
social media was in fact one of the driving forces pushing you to take it in the first place.
Facebook addiction symptoms:
Facebook Addiction Disorder, is a condition that is defined by hours spent on Facebook, so
much time in fact that the healthy balance of the individual’s life is affected. It has been said that
Social
Media 17
approximately 350million people are suffering from the disorder that is detected through a
simple set of six-criteria. People who are victims of the condition must have at least 2-3 of the
following criteria during a 6-8 month time period.
1)Tolerance: This term is used to describe the desperate behavior of a Facebook addict. They
spend an increasing amount of time on the site, coming to a stage where they need it in order to
obtain satisfaction or on the other extreme, it is having a detrimental affect on them as a person
and their life. For the family members and friends who think they are dealing with an addict, a
sign to look out for are multiple Facebook windows open. Three or more confirms that they are
indeed suffering from this condition.
2)Withdrawal symptoms: These become obvious when one is restricted from using Facebook
because they have to participate in normal everyday activities. Common signs are anxiety,
distress and the need to talk about Facebook and what might have been posted on their wall in
their absence.
3)Reduction of normal social/recreational activities: Someone suffering from FAD will
reduce the time spent catching up with friends, playing sport or whatever it is they used to enjoy
doing, to simply spend time on Facebook. Instead of catching up with a friend for coffee, they
will send a Facebook message. A dinner date will be substituted with a messenger chat. In
extreme cases, the person will even stop answering their parent’s phone calls, instead insisting
that they use Facebook to contact them.
4)Virtual dates: It is obvious that things are extreme when real dates are replaced with virtual
dates. Instead of going to the movies or out to dinner, they tell their partner to be online at a
certain time.
5)Fake friends: If 8 out of 10 people shown on their Facebook page are complete strangers, it is
undeniable: they have a serious case of FAD.
6)Eating Disorders:
Social
Media 18
It causes imbalance of diet and irregular eating habits.
Effect of Addiction:
1)It triggers more sadness, less well-being:
The more we use social media, the less happy we seem to be. One study a few years ago found
that Facebook use was linked to both less moment-to-moment happiness and less life
satisfaction—the more people used Facebook in a day, the more these two variables dropped
off. The authors write, “Facebook provides an invaluable resource for fulfilling such needs by
allowing people to instantly connect. Rather than enhancing well-being, as frequent interactions
with supportive 'offline' social networks powerfully do, the current findings demonstrate that
interacting with Facebook may predict the opposite result for young adults—it may undermine it.
2)Comparing our lives with others is mentally unhealthy:
Part of the reason Facebook makes people feel socially isolated (even though they may not
actually be) is the comparison factor. We fall into the trap of comparing ourselves to others as we
scroll through our feeds, and make judgements about how we measure up. One study looked at
how we make comparisons to others posts, in “upward” or “downward” directions—that is,
feeling that we’re either better or worse off than our friends. It turned out that both types of
comparisons made people feel worse, which is surprising, since in real life, only upward
comparisons (feeling another person has it better than you) makes people feel bad. But in the
social network world, it seems that any kind of comparison is linked to depressive symptoms.
3) It can lead to jealousy—and a vicious cycle:
It’s no secret that the comparison factor in social media leads to jealousy—most people will
admit that seeing other people’s tropical vacations and perfectly behaved kids is envy-inducing.
Studies have certainly shown that social media use triggers feelings of jealousy. The authors of
one study, looking at jealousy and other negative feelings while using Facebook, wrote that
“This magnitude of envy incidents taking place on FB alone is astounding, providing evidence
Social
Media 19
that FB offers a breeding ground for invidious feelings." They add that it can become a vicious
cycle: feeling jealous can make a person want to make his or her own life look better, and post
jealousy-inducing posts of their own, in an endless circle of one-upping and feeling jealous.
Another study looked at the connection between envy and depression in Facebook use and,
interestingly, discovered that envy mediates the Facebook-depression link. That is, when envy is
controlled for, Facebook isn’t so depressing. So it may be the envy that’s largely to blame in the
depression-Facebook connection.
4) We get caught in the delusion of thinking it will help:
Part of the unhealthy cycle is that we keep coming back to social media, even though it doesn’t
make us feel very good. This is probably because of what’s known as a forecasting error: Like a
drug, we think getting a fix will help, but it actually makes us feel worse, which comes down to
an error in our ability to predict our own response. One study looked at how people feel after
using Facebook and how they think they’ll feel going in. Like other studies suggested, the
participants in this one almost always felt worse after using it, compared to people engaging in
other activities. But a follow-up experiment showed that people generally believed that they’d
feel better after using, not worse. Which of course turns out not to be the case at all, and sounds a
lot like the pattern in other types of addiction.
5) More friends on social doesn’t mean you’re more social:
A couple of years ago, a study found that more friends on social media doesn’t necessarily mean
you have a better social life—there seems to be a cap on the number of friends a person’s brain
can handle, and it takes actual social interaction (not virtual) to keep up these friendships. So
feeling like you’re being social by being on Facebook doesn’t work. Since loneliness is linked to
myriad health and mental health problems (including early death), getting real social support is
important. Virtual friend time doesn’t have the therapeutic effect as time with real friends.
Complete addiction: When they meet new people, they say their name, followed by “I’ll talk to
you on Facebook”, or for those who are extremely bad, “I’ll see you in Facebook”. Their pets
Social
Media 20
have Facebook pages, and any notifications, wall posts, inboxes or friend requests that they
receive give them a high, one which can be compared to that gambling addicts get from the
pokies or roulette table.
So someone believes that addiction to the net is a real condition that needs to be treated just like
any other addiction, with care and caution, but is an obsession with Facebook a real condition, or
is FAD really just the latest fad? Either way, Facebook obsessions are definitely present in
today’s society and whether it is a disorder or not, something needs to be done to fix it. Forget
the fancy name and look at the facts. Many people, teenagers in particular, are spending too
much time online. People’s lives are being affected because of the hours spent looking at profiles
and pictures. Facebook, very beneficial in some ways, is having a detrimental affect on the
everyday behaviors of people around the world. Having seen the affects of too much time online
firsthand, I know this to be true. Nobody can possibly disagree when the facts speak for
themselves and when an individual’s online ‘life’ becomes more important than their real one,
we know that there is a serious problem that needs to be addressed.
Effect of Dopamine:
Dopamine is the chemical in our brain associate with stimulus and reward/ the pleasure center of
our brain. Dopamine is not only about pleasure and reward, but about learning and memory. The
reward of having our image or post "liked," shared, or commented on is something that our brain
soon learns. It is validating. When we see the little red dots on our phone, or open up Facebook
and see the notifications lit up, it does the same thing to our brain we begin to have a conditioned
stimulus. We have set the expectation of a reward by posting, and once we see the notifications
and likes we are rewarded. Dopamine is released because we seek out the reward. One of the
original developers of the Facebook news feed even said that the thing which made it successful
wasn’t the software at all. But it was actually the scroll wheel on a mouse. Because with this
your hand never has to leave its resting position, you just scroll and keep looking. Therefore,
because of dopamine giving us the desire to seek and be rewarded In an evolutionary context, it
rewards us for beneficial behaviors and motivates us to repeat them. ‘Instant gratification’ is the
immediate attainability of satisfaction and happiness. It is a way of experiencing pleasure and
fulfillment without delay or patience because it provides a spike in dopamine without effort or
discipline. With the internet, twitter, and texting, instant gratification of your desire to seek is
Social
Media 21
available at the click of a button. You can talk to anyone just by sending a text and they respond
in a few seconds. According to Mauricio Delgado, an Associate Professor of Psychology at
Rutgers University, “The same brain areas [that are activated for food and water] are activated
for social stimuli." This means that our brain sees this social media stimuli as a necessity.
1.3 Statistics of Pakistani Social Media Users:
Social media and its uses are increasing day by day with every passing second around the world,
its utility is also increasing in Pakistan and people are understanding the use and power of social
media. Many issues that were too controversial to be raised are now supported on the internet
and the horizon of people is expanding. Pakistan is a country which was going through corrupt
leadership and bad governance when a nation is going through such issues; problems faced by
common people are always overlooked but social media and digital media is providing such
platforms for people to come up and speak for their rights. Social media and digital platforms are
not just providing a platform for business to reach out masses and grow but it is also giving the
true freedom of speech and power to the opinion of ordinary people.
Digital Statistical Indicators:
The above chart shows the statistics of Pakistan’s population and the number of people who are
active users of the internet, mobile users, social media users and mobile social users. The main
concern is to know how much of our total population is active social media user to know how
much influence we can create by approaching on social media. Social media is one of those
Social
Media 22
technological changes you can’t resist as with time everything starts to depend on them. The stats
of Pakistani people actually having access and actually using social media on an active basis
shows that we have so much of people to still make aware and reach out in order to make
Pakistan socially active.
The stats show that only 44.6 million out of 198.9 are internet users in Pakistan which
means only 22% of our total population has access to internet, even out of them only 35
million are active users of social media which means only 18% are social media users. If you
look deeper about the number of mobile users you will get to know that 109.5 million out of the
total population uses mobile and among them 32 million are active internet and social media
users from their mobile devices which is just 16% of our people.
All these stats show that we have a lot to do in this sector as compared to the developed
countries. We need to create awareness regarding the healthy and efficient uses of social media.
We need to realize the wide horizon people have on the social media. Our people use it just for
time pass and connectivity whereas the true essence and power is overlooked.
Social Media Websites Usage:
The most commonly used social media websites on the internet by the people of Pakistan are
these six including Facebook, YouTube, Twitter, Pinterest, Instagram and Google+. The info
graphic is a clear elaboration of how people are using these social websites. The most used social
media website that people of Pakistan are using is Facebook as 92.06% of our population
which has access to internet is actively using Facebook. The Stats in this info graphic shows
that people of Pakistan are just familiar with Facebook and many of them are just using it for the
purpose of connectivity with friends and family however ignoring the other vital uses of social
media. With time and with certain awareness programs like Social Media Summit ‘18 can bring
change in the utility of internet. The overall stats show that people are only aware with Facebook
and are not adopting other social websites as much as they use Facebook. The reality is that all
the other platforms are as much of an opportunity as Facebook but people of Pakistan might find
it more user friendly.
Social
Media 23
Top Industries on Facebook:
This next info graphic shows the number of followers of the biggest local Pakistani pages in the
different industries. To be more specific the data is from the total number of Local
Fans/followers for the largest 200 pages in Pakistan by Fan count.
The stats show that people use Facebook more for the sake of fashion than any other thing. The
stats have been carefully studied to come to these results which show that most followers are of
fashion industry. After fashion industry the people follow telecom sector on Facebook.
Social
Media 24
Ecommerce is also booming for people of Pakistan on Facebook. Retail and services are next.
These all stats show that people of Pakistan are now getting involved in retail activities online, in
the beginning people were too reluctant in adapting this totally new experience of buying
intangible stuff but with time trend is changing and a good amount of people are involved in
online purchases. Still the numbers are growing each year and the people are becoming aware.
However Pakistan still need to make people aware regarding the uses and utility of social media
and digital market.
Instagram Usage Statistics:
Instagram is a relatively new thing for Pakistani people and is less popular among the common
people however the upper class is obsessed with its various uses. We have 5.2 million monthly
active users on Instagram, the number is very less as compared to the Facebook users which was
35million. 5.2 million is just 3% of our population the rest is still a target.
Social
Media 25
On Instagram also the number of male users is more than female users. 31% of the total active
Instagram users are females where as 69% are males but the numbers are increasing with time.
Cure to this Social Media Addiction:
It’s undeniable that people stare at their phone screens too much. In fact, a Nielsen study found
that the average adult spends five and a half hours every week on social media. That's nearly 12
full days every year. If that doesn’t scare you enough, a lot of us are now addicted to social
media. The rush of dopamine you get from likes, comments and retweets is actually rewiring
your brain to crave Facebook, Twitter and Instagram. To test if you’re at risk for addiction, ask
yourself: Do you feel like social media is keeping you from doing your best work or living up to
your full potential? If your answer is yes, then you’ve been bitten by the social bug. Like
breaking any bad habit, the secret is to replace your bad habit with a better one in order for the
transformation to stick. Here’s the step-by-step process I teach my clients for breaking social
media addiction once and for all:
Step1: Understand That You’re Being Played : An embarrassingly heavy social-media
habit isn’t entirely your fault. “Pinterest, Facebook, Twitter—they’ve all been designed to make
you repeatedly use them and check back in,” says Levi Felix, the CEO of Digital Detox, a tech-
free wellness retreat in Northern California. “FarmVille was engineered to keep you at your
computer.” (After all, if you miss a specific window to harvest your crops, they die.) When you
keep in mind that the technology is designed to hold you hostage, you might be motivated to set
time limits. (Think of it as buying a snack-size bag of chips instead of the party-size.)
Step2: Figure out why you’re addicted to social media.
Social
Media 26
Ask yourself: Why do you open Instagram and Facebook in the first place? Was your
answer, “There’s no reason, I just like scrolling through my Instagram feed”? If so, take a closer
look at your motive. Are you bored at work, stressed out, feeling disconnected from the outside
world or just overwhelmed? The first step is to identify the core need, or “cue,” that triggers the
impulse to check your phone.
Step 3: Make the itch less easy to scratch.
The second step is to implement three to four tactics that keep social media at arm’s
length. These could include deleting social media apps from your phone, using a newsfeed
blocker on your desktop, keeping your phone out of your bedroom, setting your phone to Do Not
Disturb or turning off app notifications. Remember, some of the best minds in the world have
dedicated their lives to making social media more addictive. You’ll need to get aggressive in
order to win your focus back.
Step 4: Find alternative ways to respond to the itch.
The third step is to replace the negative routine of checking your social media with a new
routine. The cue of “I’m bored” or “I’m stressed” is still going to be there. But you can replace
your response to these triggers with something positive and productive. For example, tell
yourself: “When I feel bored at work, I’m going to take a walk around the block.” Or “When I
feel stressed out, I’m going to do a three-minute breathing exercise.” Once you retrain your brain
to respond to these cues, the itch will stop altogether.
Step 5: Implement multiple layers of accountability.
The fourth step is to repeat the new habit over and over again. This is usually where people fall
down, because their self-discipline muscle needs to be incredibly strong for this to work. But
self-discipline becomes a whole lot easier when you’re not on your own. Outsource your
discipline by enrolling an accountability buddy or coach to keep you on track .A quick solution
for accountability is to use an app. Google “accountability app” and choose one of the many
options for external, unbiased accountability options. (There’s even one that donates to a cause
you hate if you don’t reach your goals -- how’s that for motivation?)
Social
Media 27
Step 6: Reward, reward, reward.
The fifth step is to train your brain that the new routine is a good thing by rewarding it for a job
well done until the habit is strong enough to happen automatically. Habit formation shouldn’t
feel like torture. To make sure your new habit sticks, incorporate a positive reward into your
process, even if you don’t feel like you deserve it. For example, if you work social media-free for
an hour, give yourself a 10-minute reward break to do whatever you please. And, if you make it
through your whole day social media-free, give yourself an hour of personal time in the evening
as a reward. The best new habit you could create is one that frees you from the chains of
distraction and misused time. Join the fast-growing ranks of people pushing back against the tide
of social media, and revel in your newfound freedom.xviii
Why we today need Motivational speeches?
Have we evolved our body structures? Are we shifted to a new world? Have we less intellect than our
ancestors? No? Then what thing changed , which make us so. Why we need a motivational speaker to tell
us what our goals are ? How should we live our lives? The reason is that WE ARE PROGRAMMED
We are hollow Facebook profiles blindly walking behind memes and other’s life style. We follow Popular
Cultures that originate through social media. We spend more time in using social media and comparing
our lives to other. The time which could be spent in reading books or research is used in using social
media. Our energies are used to understand memes. We have limited our minds inside the world of social
media. It’s hard to get out of this. We should explore ourselves. We are much more than Profiles. Most of
us excuse that , we use social media apps to get knowledge ,but in fact , 60% of teens just use these sites
for fun.
1.4 A SOCIOLOGICAL STUDY OF DIFFERENT TYPES OF CYBER CRIMES:
INTRODUCTION : A common man who is a user of computer and internet and cell phone is
unaware of the traps set by clever criminals in the Cyber space and the ways to get rid of them.
Computers evolved as a result of man’s search for fast and accurate calculating devices. Forging
documents is one of the best examples of this kind of a Cybercrime. Image morphing, circulation
of defamatory comments and threats through mobile phones, taking photographs without consent
and consistent blackmailing may be some other examples. With the rise in the internet users’
Cyber criminals are also increasingly targeting cyber space to commit their illegal designs.
Social
Media 28
CYBERCRIME:
Cyber-crime is a crime involving, using or relating to computers especially the internet. Crimes
involving use of information technology or usage of electronic means in furtherance of crime are
covered under the scope of Cyber-crime. The ambit of the term includes all kinds of
objectionable or unlawful activities, misuse or abuse taking place in cyber world, through or
against the computer, internet, and telecommunication networks run with computer system or
technology. The scope of Cyber-crime is bound to increases in view of the ever-increasing
technological advancement in the area.
DIFFERENT TYPES OF CYBERCRIMES: Cyber-crimes are new generation crimes where
the achievements of information technology are misused for criminal activities. Such crimes may
be committed against the governments, individuals, and institutions. Generally, most of the
Cyber-crimes are adversely affect individuals, and society at large. The common types of Cyber-
crimes are discussed under the following heads:
a) Hacking:
Hacking means unauthorized access to another computer system. It is the most popular
and commonly known Cybercrime. Hackers will break into networks and computers
system for multiple purposes like data theft, fraud, destruction of data, causing damage to
computer system for mere pleasure or personal satisfaction. Hacking is the basic act of
the criminals who later on tread on to the other computer related crimes and frauds thus
making it easier for law enforcement authorities to grill them down under other existing
laws too. Latest development in this field is hacking of Wi-Fi environment. But the
Information Technology Act does not use the term hacking but refers to the same act as
unauthorized access to the computer resource. There are three classes of hackers-white
hat hackers, black hat hackers, and grey hat hackers.
Social
Media 29
DIFFERENT TYPES OF HACKERS:
 White Hat Hackers: White Hackers use their hacking skills for good reasons and do no
harm to the computer system. So, they are referred as ethical hackers.
 Black Hat Hackers: A black hat hacker is a person who gains unauthorized access to a
computer system with a malicious intention. The black hat hackers use their computer
knowledge for private gain. They cause damage to the system after intrusion. They may
steal, modify or erase data or insert viruses or women are which damages the system.
 Grey Hat Hackers: A Grey Hat Hackers is a skilled hacker who sometimes acts legally,
sometimes in good will and sometimes not. They are hybrids between white hat and
black hat hackers. They usually do not hack for personal gain nor have malicious
intentions but may or may not occasionally commit crimes during the course of their
technological exploits.
b) Cyber Terrorism: Cyber terrorism is the convergence of cyberspace and terrorism. It
refers to unlawful attacks and threads of attacks against computers, networks and the
information stored therein that are carried out to intermediates or coerce a country’s
government or citizens in furtherance of political or social objectives. Serial attacks
against crucial infrastructures could count as acts of cyber terrorism. The cyber terrorism
attacks and threats includes interfering and disrupting information and transportation
Social
Media 30
systems, emergency services and government services, communication networks,
infrastructure systems, banking and fiancé system.
FACTORS OF CYBER TERRORISM:
c) Cyber Stalking:
These crimes involve the use of internet to harass someone. The behavior includes false
accusation, threats and harassment of as victim through e-Mil. Chat message or web pages. It
is a willful conduct that actually causes a victim to feel terrorized, frightened, intimidated or
molested. Normally majority of cyber stalkers are men and the majority of victims are
women.
Social
Media 31
GOAL PREVENTING CYBER STALKING:
In order to prevent cyber stalking, the netizens should avoid disclosing any information
pertaining to one while chatting. Girls should avoid sending any photographs online participatory
to strangers and chat friends as there has been incidence of misuse of the photograph for
morphing so as the reduce the chance of netizens becoming victims of Cybercrimes. When
children are involved in cyber stalking it is called cyber bullying.
d) Cyber bullying:
Cyber bullying occurs when children including teenagers are tormented threatened, harassed,
humiliated, embraced or otherwise targeted by other children using the internet, interactive and
digital technologies or mobile phones. It has to have a minor on both sides or at least should have
been instigated by a minor against another minor. The methods used are limited only by child’s
imagination and access to technology. Cyber bullying is usually not a onetime communication
unless it voices death threats or credible threats of serious bodily harm. Cyber bullying may arise
to the level of a cyber harassment charge, or if the child is young enough it may result in the
charge of juvenile delinquency. In order to safeguard children from cyber bullying parents
should be more involved in their children’s online activities, the parents should also be aware of
major changes in a child’s behavior.
Social
Media 32
 E- mail spoofing:
E-mail is the short form for ‘electronic mail’. The electronic mail system over the internet can
carry messages, letters, pictures, sounds, or anything that can be created and stored in a
computer. Data can be sent as electronic mail to any other computer connected to the internet, e-
mail spoofing is a technique commonly used to hide the origin of an e mail message. The result
is that, although the e-mail appears to have come from a particular address it comes actually
from other sources.
 Phishing:
It proceeds through the mass distribution of emails that purport to originate from Banks, credit
card companies and e-sellers. These mails request for providing personal and other details in
order to update their account. The fraudsters thus gain access to the password and other security
and authentication information of users, which can then be used to hack bank accounts or steal
through credit cards. According to the Anti-Phishing Working Group (APWG), there were over
2500 such sites reported on the internet in January 2005 alone, a 100% increase in the number in
Comparison to previous year (APWG, 2005) Internet offers valuable opportunity to fraudsters to
disguise themselves and their identities. These fraudsters also change personal attributes such as
Social
Media 33
age, gender, ethnic group, country of residence and so on. Even though the fraud is detected,
identifying the culprit is very difficult Victims of online frauds may be reluctant to report their
victimization due to the following reasons. Relatively small amount of money involved does not
make pursuing the matter worthwhile, embarrassment in reporting a fraud, ignorance about
reporting the offence to the concerned authority, likelihood that no results will ensue as the
fraudsters are located in another country. A literature review is a body of text that aims to review
the critical points of current knowledge including substantive findings as well as theoretical and
methodological contributions to a particular topic. Literature reviews are secondary sources, and
as such, do not report any new or original experimental work. No study can be undertaken
without reviewing and analyzing the literature available related to the field of study. Review of
Literature is an important component of research by which multifaceted understanding of the
phenomenon becomes the part of researcher’s cognitive personality. Review of literature on
Cybercrime and Social Networking Sites is to find out what research has already been
undertaken in the area of Cybercrime and Social Networking Sites, what type of the critical
explanations have been given about this new technological crime which is spreading very fast all
over the globe, what have been the causes behind occurrence of Online crime and what effect it
reflects on Indian society. Besides all this, it is also worthwhile to find out what laws and
legislations are present to deal with Cybercrime and issues related to Social media. As the
subject of Cybercrime and social networking sites is new in the field of Sociology and
Criminology, there is a paucity of literature in this area. Not only this, the available literature has
many limitations as the area of Cybercrime and Social Networking is wide and dynamic. Many
prominent classical sociologists have contributed towards the social thought on social order,
effects of science and technology and crime in society. It is worthwhile to note their viewpoints
before reviewing the current literature on technology and crime.
 Morphing:
Morphing is editing the original picture by unauthorized user or fake identity. It was identified
that female’s pictures are downloaded by fake users and again Re-posted/uploaded on different
websites by creating fake profiles aft editing it. The change smoothly from one image to another
by small gradual steps using computer animation techniques. Morphing is a special effect in
Social
Media 34
motion pictures and animations that changes one image or shape into another through
technological means or as part of a fantasy or surreal sequence.
 Cyber Theft:
Cyber Theft is a way of using a computer and Internet to steal money or in formation. This is
also the most popular Cybercrime because the ability to steal from a distance reduces the risk of
detection.
Cyber Theft includes:
 Cyber Embezzlement:
Online embezzlement means misuse or alteration of data by an employee of a company who has
legitimate access to the company’s computerized system and network. Example an employee
misusing the company’s computerized payroll system in such a way that he is paid extra.
Unlawful Appropriation wherein an individual gains access from outside the organization to
transfer funds and modify documents in such a manner that it gives him legitimate right to
property he doesn’t own. Unlawful appropriation differs from embezzlement as the offender is
not interested with the valuables but gains access and transfers funds or modifies some
information.
 Corporate Espionage:
Corporate Espionage- In this crime, an individual from inside/outside the company uses the
network and steals marketing strategies, trade secrets, financial data, client lists etc. in order to
gain a competitive advantage. In corporate or industrial espionage, the person uses the
company’s network to steal trade secrets, financial data, confidential client lists, marketing
strategies or information to gain a competitive edge.
 Plagiarism:
Plagiarism is to steal someone else’s original writing and call its own. This form of crime is
increasing everywhere as more and more people have access to computers and internet. Piracyis
is an unauthorized copying of copyrighted software, video, music, books, etc. which causes loss
of revenue to the owner. Cyber piracy is the appropriation of new forms of intellectual property,
in which the computer program expressed in the form of a digital code, generates through a
Social
Media 35
computer system virtual products’ such as images, music, office aids or interactive experiences.
When cyberspace and intellectual property laws interact, they become a powerful force,
especially in present day society where economic profit is quite important. Identity Theft- In this
victim’s personal information is stolen by the criminal to commit financial frauds.
 Cyber Fraud:
Cyber Fraud another form of cybercrime which has a firm grip on society is cyber fraud and
scams online. But, the problem with this is the lack of systematic and official data. Internet
Crime Complain Centre (ICCC)16 is the only source available whose primary role is to receive
public reports of cybercrime and refer them to the relevant criminal justice agencies fraction.
Hani Duruy, an eBay spokesperson in USA, claims that frauds account for only 0.01% of
transactions under taken using the site yet this would amount to 3000 frauds per day, given that
more than 30 million actions taking place on eBay daily Cha (2005)17. The fact is that growing
number of internet auction sites provide thieves a global market Through which they sell stolen
items to unsuspecting customers. For example, a group of motorcycle thieves in Delhi and
Punjab, who is mantled various bikes and sold them online as spare parts for Rs one lakh.
Another form of reported fraud is non-delivery of items for which he victims have already paid.
It can also include product in authenticity and misrepresentation of the condition of the item. In
cases of shill hiding, the seller places false bids by either using multiple fake identities or aliases
to place bids on their own items or by arranging for associates to place bids for the items with no
intention of actually purchasing them. There after it becomes impossible for the legitimate
Social
Media 36
bidders to detect whether or not others are genuine buyers or shills. In recent years Phishing and
spoofing frauds have increased.
 CONCLUSION:
The Study observes use of computers and the change in technology due to new advancements.
This Study also cautions the security of internet users and relates this to emergence of
Cybercrime. This Studies mentioned different types of cybercrime, discusses hacking as based
on technical virtuosity. The advent of computer networking and the popularity of the internet
have also given rise to excessive hacking. Not only this, Privacy is at stack because of
widespread online transactions. Mostly people don’t know about Cybercrime and Cyber laws.
So, today’s need to aware the society about different types of Cybercrimes and Cyber laws.xix
1.5 Laws against Cyber Crime and Role of PTA :
Pakistan: National Assembly Passes New Cybercrime Law. (Sept. 21, 2016) On August 11,
2016, Pakistan's lower house, the National Assembly, passed a controversial cybercrime
law called the Prevention of Electronic Crimes Act, 2016. The Senate had unanimously passed
the law, with a number of amendments, in Sep 21, 2016. The Act introduces a range of offenses
Social
Media 37
involving the unauthorized access, transmission, copying, or interference in an information
system or data.
 Spreading False Information about an Individual: up to 3 Years in Prison or up to Rs.
1 Million in Fine or both. Whoever intentionally and publicly displays any information
through any information system, which he knows to be false and intimidates or harms
the reputation or privacy of a natural person, shall be punished with imprisonment for a
term which may extend to three years or with fine which may extend to one million
rupees or with both:
Example
 You know that an information is wrong and you still post or share it on Facebook about a
person that damages his/her reputation
Not to mention, this section will not apply where offense is committed by a broadcast media
licensed under the Pakistan Electronic Media Regulatory Authority Ordinance, 2002 (XIII of
2002).
 Cyber stalking: Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or both
If you try to get into a relation with someone online through internet website, email, SMS, phone
or any communication tool despite there is disinterest from the other party then you can be jailed
for three years or imposed a fine which may extend to one million rupees or with both.
Examples:
 You repeatedly call someone, despite the other party asks you to not to
 You send emails with no interest shown by the other party
 You do something in a manner that other party is harassed out of your actions
If you call, chat with someone and other party has no issues with that then its all cool, nothing to
worry about.
Social
Media 38
Hacking Email / phone for Stalking:
Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or both. If someone monitor a person
through mail, text message or any other form of electronic communication then you can be jailed
for up to three years and a fine of Rs. 1 Million or both
Example:
You hack someone with intent to a relation that you are in or may make and then monitors the
email, this could land you in jail for up to three years.
Making Videos/Pics and Distributing without Consent:
Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or both. You take a photograph or make a
video of any person and displays or distributes it without his/her consent in a manner that harms
a person then you can go behind bars for up to three years and may have to bear a fine of up to
Rs. 1 million or both
Example:
You take picture or video of someone and then posts in online to damage the other party
Note: If you take pictures, videos and they are harmless or distribute it with the consent of other
party then its all good.
Cyber Stalking with a Minor:
Up to 5 Years in Jail and up to Rs. 10 Million in Fine. If victim of the cyber stalking is a minor
the punishment may extend to five years or with hue which may extend to ten million rupees or
with both.
Cyber stalking offences include:
 Making contact in a manner that minor is harassed
 Taking photographs, making videos and distributing them without consent
 Blackmailing
 Spying on minors
Social
Media 39
Hate speech:
Up to 7 Years in Prison or fine or both. Whoever prepares or distributes information, through
any information system or device that triggers inter-faith, sectarian or racial hatred, shall be
punished with imprisonment for a term which may extend to seven years or with fine or with
both.
Examples:
 You post messages on Facebook that can trigger inter-faith or sectarian avoidance
 You write a blog that triggers ethnic hatred
Spamming:
Three Months of Prison or Fine up to Rs. 5 Million or Both. Anyone (an individual or an
organization) can be fined with up to Rs. 50,000 for the first and three months of jail if they:
 Send spam emails/SMS without permission of receiver
 Send emails without unsubscribe options
 Send emails with
o harmful fraudulent emails
o misleading email
o illegal email
Note: Every subsequent offenses (after first time) may increase the fine with multiples of Rs.
50,000 up to Rs. 5 million
Spoofing:
Up to 3 Years in Jail or Fine up to Rs. 500,00 or both . Whoever with dishonest intention
establishes a website or sends any information with a counterfeit source intended to be believed
by the recipient or visitor of the website to he an authentic source commits spoofing.
Social
Media 40
Malicious Code:
Up to 2 Years in Jail or up to Rs. 1 Million in Fine or Both. Whoever writes, offers, makes
available, distributes or transmits malicious code with intent to cause harm to any information
system or data resulting in the corruption, destruction, alteration suppression, theft or loss of the
information system or data shall be punished with imprisonment for a term which may extend to
two years or with fine which may extend to one million rupees or with both.
Examples:
 You write a virus
 You write a code that can be used to destruct a hard drive
 You develop a mobile app to spy someone
 Yo develop an app to spread virus
 You DDoS attack someone
Unauthorized Access to Information Systemor Data: Up to 3 Months Prison or up to Rs.
50,000 Fine or both. Law says that if you access any information system or data with dishonest
intents then you can go to jail for up to three months or be liable to pay a fine up to Rs. 50,000 or
both.
It is wondered how the term “dishonest” is going to be defined by the litigators. Even worse,
how are they going to establish if any attempt was dishonest or not.
Examples:
 Access to Information System means: Gaining access, control or ability to use any part or
whole of an system that could be a laptop, mobile phone, tablet, or any other kind of
computer system
 Access to Data: Gaining access, control or ability to use any data or traffic data, i.e. an
email, SMS, fax, print out, or any kind of computer data.
Note: These punishments will be applicable if access to information is gained through infringing
any security or otherwise.
Social
Media 41
Unauthorized copying or transmission of Data:
Up to 6 Months Prison or up to Rs. 100,000 Fine or both. Whoever with dishonest intention and
without authorization copies or otherwise transmits or causes to be transmitted any data shall be
punished with imprisonment for a term which may extend to six months, or with fine which may
extend to one hundred thousand rupees or with both.
Examples:
 If you copies data of someone else’s flash drive
 If you gain access to someone’s phone and copy a mobile number
 If you forward someone’s SMS to unintended people
 You hack a website and copy its data
 If you know a loophole in a website and copy data, say email addresses
So anything which is not yours, you somehow gain access — through security infringement or
otherwise — and you are proven to have copied data or transmitted it, then this section will get
activated.
Interference with information system or data: Up to 2 Years Prison or up to Rs. 500,000 Fine
or both. Whoever with dishonest intention interferes with or damages any part or whole of an
information system or data shall be punished with imprisonment which may extend to two years
or with fine which may extend to five hundred thousand rupees or with both.
Examples:
 You hack a website and delete the content of the server
 You gain access to someone’s mobile and delete its number
 You gain access to someone’s Facebook account and delete it, partly or wholly
 You gain access to someone’s Facebook account and post an update from his/her account
 You gain access to someone’s email and send an email from his account
 You send an SMS from someone’s mobile phone
So anything which is not yours, and you change its data, or access it to take an action which may
alter the content of that system or trigger a communication can land you in jail for two years or
Rs. 500,000 fine or both.
Social
Media 42
Unauthorized access to critical infrastructure information system or data:
Up to 3 Years Prison or up to Rs. 1 Million Fine or both. Whoever with dishonest
intention gains unauthorized access to any critical infrastructure information system or
data shall be punished with imprisonment which may extend to three years or with
fine which may extend to one million rupees or with both.
Examples:
 You hack NADRA’s database and get an authorized access
 You hack and intercept a fiber optic cable
 You hack government of Pakistan’s website that’s maybe offering healthcare
services
 You hack and get access to Pakistan Stock Exchange
 You hack in to Pakistan Army’s servers
So anything which can cause detrimental damage, financially, socially, economically
will be treated under this section
Unauthorized copying or transmission of critical infrastructure data:
Up to 5 Years Prison or up to Rs. 5 Million Fine or both. Whoever with dishonest intention and
without authorization copies or otherwise transmits or causes to be transmitted any critical
infrastructure data shall be punished with imprisonment for a term which may extend to five
years, or with fine which may extend to five million rupees or with both.
Examples:
 You hack NADRA’s database and steal the data,
 You hack and intercept a fiber optic cable and start listening to data
 You hack government of Pakistan’s website that’s maybe offering healthcare services
and copy the data
 You hack and get access to Pakistan Stock Exchange and copy all the records
Social
Media 43
 You hack in to Pakistan Army’s servers and copy the data and forward it your friend
Interference with critical infrastructure information system or data:
Up to 7 Years Prison or up to Rs. 10 Million Fine or both. Whoever with dishonest intention
interferes with or damages any part or whole of a critical information system, or data shall be
punished with imprisonment which may extend to seven years or with fine which may extend to
ten million rupees or with both.
Examples:
 You hack NADRA’s database and delete everything
 You hack and intercept a fiber optic cable and start transmitting it to someone
 You hack government of Pakistan’s website that’s maybe offering healthcare services
and copy the data and start selling it
 You hack and get access to Pakistan Stock Exchange and copy all the records and then
delete them from server
 You hack in to Pakistan Army’s servers and copy the data and then delete it from the
server
Glorification of an offence:
Up to 7 Years Prison or up to Rs. 10 Million Fine or both. Whoever prepares or
spreads information through any information system or device with the intent to glorify an
offence relating to terrorism, or any person convicted of a crime relating to terrorism, or
activities of prescribed organizations or individuals or groups shall be punished with
imprisonment for a term which may extend to seven years or with fine which may extend to ten
million rupees or with both.
Examples:
 You post on Facebook about Talibaan and say that they are good people
 You SMS someone and say that Al-Qaida people will go to heaven
 You come on TV and start praising banned outfit
Social
Media 44
 You own a website that preaches about suicide bombing
 You run a YouTube channel and there you say good things about anyone who has been
convicted of terrorism
Cyber terrorism: Up to 14 Years in Prison or up to Rs. 50 Million fine or both.
Whoever accesses, copies or destroys any critical information system with an intent
to create a sense of fear, panic or insecurity in the Government or the public or a
section of the public or community or sect or create a sense of fear or insecurity in
society can be punished with imprisonment of either description for a term which may
extend to 14 years or that fine which may be extended to 50 million rupees or with
both.
Examples:
 You gain access to back-end system of a TV channel and start broadcasting a
message that may create panic
 You gain access to back-end of a mobile company and start broadcasting a
message that may trigger fear
Online Recruitment, Funding of Terrorism: Up to 7 Years in Prison or fine or both.
Whoever prepares or distributes information, through any information system or device that
invites or motivates to fund, or recruits people for terrorism or plans for terrorism shall be
punished with imprisonment for a term which may extend to seven years or with fine or with
both.
Examples:
 You run a Facebook group and encourage people to fund TTP
 You run a WhatsApp group and plan a terror attack
Social
Media 45
Electronic forgery: Up to 3 Years in Prison or up to Rs. 250,000 fine or both. Whoever
interferes with or uses any information system, device or data, with the intent to cause damage or
injury to the public or to any person, or to make any illegal claim or title or to cause any person
to part with property or to enter into any express or implied contract, or with intent to commit
fraud by any input, alteration, deletion, or suppression of data, resulting in unauthentic data with
the intent that it be considered or acted upon for legal purposes as if’ it were authentic, regardless
of the fact that the data is directly readable and intelligible or not shall he punished with
imprisonment of either description for a term which may extend to three years or with line which
may extend to two hundred and fifty thousand rupees or with both.
Examples:
 Change a contract/ agreement / invoice with intent to gain legal benefit
Electronic forgery of Critical Infrastructure: Up to 7 Years in Prison or up to Rs. 5
Million fine or both. If any of electronic forgery is done in relation to critical
infrastructure information system or data shall be punished with imprisonment for a term which
may extend to seven years or with fine which may extend to five million rupees or with both.
Examples:
 You electronically change a contract that may result into detrimental loss to a company
in magnitude
Electronic fraud: Up to 2 Years in Prison or up to Rs. 10 Million fine or both. Whoever
with the intent for wrongful gain interferes with or uses any information system, device
or data or induces any person to enter into a relationship or deceives any person, which
act or omission is likely to cause damage or harm to that person or any other person shall
be punished with imprisonment for a term which may extend to two years or with fine
which may extend to ten million rupees or with both.
Examples
 You get into a relationship with someone with intents to cause financial damage
Social
Media 46
Making, obtaining, or supplying device for use in offence: Up to six months in Prison or up to
Rs. 50,000 fine or both. Whoever produces, makes, generates, adapts, exports, supplies, offers to
supply or imports for use any information system, data or device, with the intent to he used or
believing that it is primarily to he used to commit or to assist in the commission of an offence
under this Act will be punished with imprisonment for a term which may extend to six months or
with fine which may extend to fifty thousand rupees or with both.
Examples
 You make a software to hack a website
 You manufacture a special purpose phone to communicate for planning an attack
 You write code to steal data
 You develop a phishing page
Unauthorized use of identity information: Up to 3 Years in Prison or up to Rs. 5 Million fine
or both. Whoever obtains, sells, possesses, transmits or uses another person’s identity
information without authorization shall be punished with imprisonment for a term which may
extend to three years or with fine which may extend to five million rupees, or with both.
Examples:
 You use someone’s email address to pose as someone you aren’t
 You call someone and claim you are a person which you are not
Unauthorized issuance of SIM cards etc: Up to 3 Years in Prison or Up to Rs. 500,000
in fine or both. Whoever sells or otherwise provide SIM card without obtaining and
verification of the subscriber’s details in a manner that’s not allowed by PTA, will be
punished with imprisonment for a term which may extend to three years with or with fine
which may extend to five hundred thousand rupees or with both
Examples:
 You sell SIM cards without verifying data
 You provide a SIM card to someone else for usage, even temporarily
Social
Media 47
Tampering of communication equipment: Up to 3 Years in Prison or Up to Rs. 1 Million in
fine or both. Whoever unlawfully or without authorization changes, alters, tampers with or re-
programs any communication equipment including a cellular or wireless handset and starts using
or marketing such device for transmitting and receiving information shall be shall be punished
with imprisonment which may extend to three years or with fine which may extend to one
million rupees or with both.
Example
 You install a spy mobile app that can record calls and SMS and is able to send this data in
email to you or someone else
Unauthorized interception: Up to 2 Years in Prison or Up to Rs. 500,000 in fine or both.
Whoever with dishonest intention commits unauthorized interception by technical means of
 any transmission that is not intended to be and is not open to the public, from or within an
information system
 electromagnetic emissions from an information system that are carrying data
Shall be punished with imprisonment of either description for a term which may extend to two
years or with fine which may extend to five hundred thousand rupees or with both.xx
Role of PTA:
ISLAMABAD - Pakistan Telecommunication Authority (PTA) has established a Cyber Vigilance
Division (CVD) to handle complaints against unlawful online content under Prevention of
Electronic Crimes Act (PECA). In order to handle this gigantic role, PTA has also developed a
Standard Operating Procedure (SOP) for lodging complaints and their disposal has been developed
accordingly. All such contents which are hosted on unsecured websites is being currently handled
through telecom operators of Pakistan and same is being done by PTA itself through an automated
system. On the contrary, any content which is unlawful and hosted on secured web site is handled
differently. The popular social media websites like Facebook, YouTube and twitter etc. are a few
examples of secured websites which are hosted out side of physical boundaries of Pakistan. As
Social
Media 48
per PTA’s latest report, the Authority, in this regard, has developed close liaison with all such
platforms to honor requests made for removal of such content. It said historically and
predominantly, PTA has been acting under functions and powers given by Pakistan Telecom (Re-
organization) Act, 1996. However, with development and growth of World Wide Web (www),
PTA has been entrusted upon responsibilities for blocking/removing of any content which is
declared unlawful under relevant provisions of the law. This responsibility was handed over to
PTA under Prevention of Electronic Crimes Act (PECA), 2016. Since the promulgation of PECA,
PTA stands committed to its responsibilities to facilitate aggrieved Internet users and
stakeholders, including but not limited to government organizations, public offices, business
entities and other agencies. In this course, PECA also identifies the areas under which
blocking/removal of unlawful content would be addressed which are “against the glory of Islam,
against the integrity, security and defense of Pakistan, public order, contempt of court, against
decency & morality and incitement of any offices under section 37 of the PECA, 2016”. The
complaints received with PTA against unlawful online content including Anti State, Anti
Judiciary, Blasphemy etc. In this regard, PTA has blocked 824,878 URLs so far which came in its
jurisdiction under PECA. It is pertinent to mention that users of social media must act responsibly
while using and accessing such platforms and should honor the norms of society and laws of the
land. In case of objectionable content is observed by any user, these platforms are open to receive
complaints from valuable users directly. Relatively high value is given to complainant/users who
report to platforms any objectionable material directly. Those complaints which are not addressed
by these platforms in the first instance can be reported to PTA at info@pta.gov.pk for escalating
the matter. xxi
Social
Media 49
Implementation:
In July 2017, a man in Peshawar was jailed for 12 years for creating a fake Facebook profile of a
woman and then blackmailing her. The convict, Muhammad Munir, was arrested by the FIA in
March 2015, under the Electronics Transaction Ordinance 2002. He was also ordered to pay a
Rs0.3 million fine. The duration of the sentence, which was handed down by Additional Sessions
Judge Usman Ali, was unprecedented in Pakistan’s history of cybercrime cases.xxii
Reporting of cybercrimes, especially the harassment and blackmailing of women, has
increased sharply in Pakistan in the last three years, Dawn News TV reported on Tuesday
citing figures releasedby the Federal Investigation Agency (FIA).
The agency said that its cybercrime circle has so far conducted 2,295 inquiries, registered 255
cases and made 209 arrests in 2018 — all highest since the Prevention of Electronic Crimes Act
(Peca), 2016 was enforced. The corresponding figures for 2017 were 1,290 inquiries, 207 cases
registered and 160 arrests made, whereas figures for 2016 stood at 514, 47 and 49. The FIA
admitted that cybercrimes are on the rise in Pakistan but added that "the government's recent
measure to establish 15 new cybercrime reporting centers" will help control the situation. In
June, FIA Cybercrimes Director retired Captain Mohammad Shoaib had told a Senate standing
committee that the agency only has 10 experts to investigate cybercrimes in the country.xxiii
Social
Media 50
References:
i Kuss, D. J., & Griffiths, M. D. (2011). Online social networking and addiction—a review of the
psychological literature. International journal of environmental research and public health, 8(9), 3528-
3552.
ii Peng, T., Leckie, C., & Ramamohanarao, K. (2007). Survey of network-based defense mechanisms
countering the DoS and DDoS problems. ACM Computing Surveys (CSUR), 39
iii Wolak, J., Mitchell, K., & Finkelhor, D. (2007). Unwanted and wanted exposure to online pornography in
a national sample of youth Internet users. Pediatrics, 119(2), 247-257.
iv Kuss, D. J., & Griffiths, M. D. (2011). Online social networking and addiction—a review of the
psychological literature. International journal of environmental research and public health, 8(9), 3528-
3552.
v Mander, J., & McGrath, F. (2015). GWI device summary: GlobalWebIndex’s quarterly report on the latest
trends for smartphones, tablets, smart TVs and wearables. GlobalWebIndex 2015.
vi Brewer, J. (2013). The pleasures of the imagination: English culture in the eighteenth century.
Routledge.
vii https://www.internetworldstats.com/stats.htm
viii https://www.internetworldstats.com/stats3.htm
ix https://courses.lumenlearning.com/alamo-sociology/chapter/reading-theoretical-perspectives-on-media-and-
technology/
x https://sailemagazine.com/2017/09/how-new-media-is-sculpting-our-social-norms/#.XFVcVJMzbIU
xi http://sk.sagepub.com/reference/behavioralsciences/n2431.xml
xii EŞİTTİ, Ş. (2016). Narcotizing Effect of Social Media. Journal of the Institute of Social Sciences Cankiri
Karatekin University/Cankiri Karatekin Üniversitesi Sosyal Bilimler Enstitusu Dergisi, 7(1).
xiii http://nourilrb.blogspot.com/p/blog-page_17.html
xiv Elmore,Tim. “The Real Purposeof Social Media.Tim Elmore.” Growing Leaders. N.p., 24 Jan.2017.Web . 06 Feb.
2017.
xv http://www.sociologyguide.com/sociology-of-social-media/
xvi https://opentextbc.ca/introductiontosociology/chapter/chapter8-media-and-technology/
xvii https://opentextbc.ca/introductiontosociology/chapter/chapter8-media-and-technology/
xviii https://www.realsimple.com/work-life/technology/social-media-addiction
xix
Brenner,W.Susan(2010), Cybercrime:Criminal threatsfromcyberspace.GreenwoodPublishing
group,Westport
Cross,Michael and Shinder,LittlejohnDebra(2008).Scene of the Cybercrime,SyngressPublishingInc,
USA.
Flemming,P.andStohl,M. (2000), Myths and Realitiesof Cyberterrorism,InternationalConference on
CounteringTerrorismthroughEnhancedInternational Cooperation,22-24Sept.2000, Italy.
Furnell,Steven(2002),Cybercrime:Vandalizingthe informationSociety,Addison-Wesley,Boston.
Higgins,George (2010), Cybercrime:AnIntroductiontoanEmergingPhenomenon,McGraw Hill
Publishing,New York.
Holt,Thomas J (2011), Crime Online:CorrelatesCausesandContexts.Durham, CarolineAcademicPress,
USA. Indiaisnowworld’sthirdlargestInternetuserafterU.S.andChina;The Hindu;Aug 24,2013
Social
Media 51
Jaishankar,K.(2001).CyberCriminology:ExploringInternetCrimesandCriminalBehaviour.CRCPress:
Taylorand FrancisGroup.
KeralaState Legal Service Authority,Cochin(2013) LessonsinLaw.CochinPrintedPvt. Ltd.Eloor.
SkinnerW.F.and FreamA.M. (1927), A Social Learningtheoryanalysisof computerCrime Among
College Students,Journal of ResearchinCrime andDelilnquency,Vol34,495-518. Sutherland,EdwinH.
(1924), Principlesof Criminology,University of ChicagoPress,Chicago.
Wall,DavidS (2001), Crime andthe Internet,Routledge,London.
http://cybercrime.planetindia.net/intro.htm20/11/201
http://www.cyberlawsindia.net/black-hatml.7/4/2015[13] http://www.stopcyberbulling.org/what-is-
cyberbulling-exactly.html.21/3/2015
http://www.cyberkeralam.in8888/common/cybersecurity.jsp.2/11/2014
http://www.interpol.int/public/technologycrime/crimeprev/itsecurity.asp#21/4/2015
xx https://propakistani.pk/2016/08/05/must-read-list-of-cyber-crimes-and-their-punishments-in-pakistan/
xxi https://nation.com.pk/21-Jan-2019/pta-sets-up-cyber-vigilance-division
xxii https://www.pakistantoday.com.pk/2019/01/23/man-sentenced-to-eight-years-for-uploading-womens-
pictures-to-facebook/
xxiii https://www.dawn.com/news/1440854

Más contenido relacionado

La actualidad más candente

Social media in government - presentation to NSW Health
Social media in government - presentation to NSW HealthSocial media in government - presentation to NSW Health
Social media in government - presentation to NSW HealthCraig Thomler
 
Literature Review of Information Behaviour on Social Media
Literature Review of Information Behaviour on Social MediaLiterature Review of Information Behaviour on Social Media
Literature Review of Information Behaviour on Social MediaDavid Thompson
 
The effect of personality styles on social media use
The effect of personality styles on social media useThe effect of personality styles on social media use
The effect of personality styles on social media useKrishna De
 
Social Media as a powerful tool for Political parties
Social Media as a powerful tool for Political parties Social Media as a powerful tool for Political parties
Social Media as a powerful tool for Political parties Dr.Aravind TS
 
Importance of Social Media Marketing for Corporate Firms AVEA
Importance of Social Media Marketing for Corporate Firms AVEAImportance of Social Media Marketing for Corporate Firms AVEA
Importance of Social Media Marketing for Corporate Firms AVEACem Senkal
 
Social Media- A gateway to world domination
Social Media- A gateway to world dominationSocial Media- A gateway to world domination
Social Media- A gateway to world dominationKrishna Vijaywargiy
 
Social Media Role in politics ziad jaser
Social Media Role in politics   ziad jaserSocial Media Role in politics   ziad jaser
Social Media Role in politics ziad jaserZiad Jaser
 
Social Networking
Social NetworkingSocial Networking
Social Networkingijtsrd
 
The Implementation of Social Media for Educational Objectives
The Implementation of Social Media for Educational ObjectivesThe Implementation of Social Media for Educational Objectives
The Implementation of Social Media for Educational Objectivestheijes
 
Social media marketing
Social media marketingSocial media marketing
Social media marketingMaliha Jahan
 
Social media and social networking
Social media and social networkingSocial media and social networking
Social media and social networkingChirag Dhamija
 
Social Media as a political voice in many societies
Social Media as a political voice in many societiesSocial Media as a political voice in many societies
Social Media as a political voice in many societiesOrlando Zambrano Romero
 
Snss & PR Professionals: A Case Study of Facebook PR Groups as a Tool for Bui...
Snss & PR Professionals: A Case Study of Facebook PR Groups as a Tool for Bui...Snss & PR Professionals: A Case Study of Facebook PR Groups as a Tool for Bui...
Snss & PR Professionals: A Case Study of Facebook PR Groups as a Tool for Bui...inventionjournals
 
Outhwaite turner chp44_final (1)
Outhwaite turner chp44_final (1)Outhwaite turner chp44_final (1)
Outhwaite turner chp44_final (1)Rohanbhatkal2
 
Intro to social networking
Intro to social networkingIntro to social networking
Intro to social networkingKris
 
Government use of Social Media
Government use of Social MediaGovernment use of Social Media
Government use of Social MediaOdai M. Marie
 

La actualidad más candente (20)

Social media in government - presentation to NSW Health
Social media in government - presentation to NSW HealthSocial media in government - presentation to NSW Health
Social media in government - presentation to NSW Health
 
Literature Review of Information Behaviour on Social Media
Literature Review of Information Behaviour on Social MediaLiterature Review of Information Behaviour on Social Media
Literature Review of Information Behaviour on Social Media
 
Ijrar19 j1432
Ijrar19 j1432Ijrar19 j1432
Ijrar19 j1432
 
The effect of personality styles on social media use
The effect of personality styles on social media useThe effect of personality styles on social media use
The effect of personality styles on social media use
 
Social Media as a powerful tool for Political parties
Social Media as a powerful tool for Political parties Social Media as a powerful tool for Political parties
Social Media as a powerful tool for Political parties
 
Importance of Social Media Marketing for Corporate Firms AVEA
Importance of Social Media Marketing for Corporate Firms AVEAImportance of Social Media Marketing for Corporate Firms AVEA
Importance of Social Media Marketing for Corporate Firms AVEA
 
Social Media- A gateway to world domination
Social Media- A gateway to world dominationSocial Media- A gateway to world domination
Social Media- A gateway to world domination
 
Social Media Role in politics ziad jaser
Social Media Role in politics   ziad jaserSocial Media Role in politics   ziad jaser
Social Media Role in politics ziad jaser
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
The Implementation of Social Media for Educational Objectives
The Implementation of Social Media for Educational ObjectivesThe Implementation of Social Media for Educational Objectives
The Implementation of Social Media for Educational Objectives
 
Social media marketing
Social media marketingSocial media marketing
Social media marketing
 
U180203134138
U180203134138U180203134138
U180203134138
 
Social media and social networking
Social media and social networkingSocial media and social networking
Social media and social networking
 
Social Media as a political voice in many societies
Social Media as a political voice in many societiesSocial Media as a political voice in many societies
Social Media as a political voice in many societies
 
1130944
11309441130944
1130944
 
Snss & PR Professionals: A Case Study of Facebook PR Groups as a Tool for Bui...
Snss & PR Professionals: A Case Study of Facebook PR Groups as a Tool for Bui...Snss & PR Professionals: A Case Study of Facebook PR Groups as a Tool for Bui...
Snss & PR Professionals: A Case Study of Facebook PR Groups as a Tool for Bui...
 
Managing government use of social media
Managing government use of social mediaManaging government use of social media
Managing government use of social media
 
Outhwaite turner chp44_final (1)
Outhwaite turner chp44_final (1)Outhwaite turner chp44_final (1)
Outhwaite turner chp44_final (1)
 
Intro to social networking
Intro to social networkingIntro to social networking
Intro to social networking
 
Government use of Social Media
Government use of Social MediaGovernment use of Social Media
Government use of Social Media
 

Similar a Social Media in light of Sociology

Avinash singh bagri design and development of social media strategies in bank...
Avinash singh bagri design and development of social media strategies in bank...Avinash singh bagri design and development of social media strategies in bank...
Avinash singh bagri design and development of social media strategies in bank...aavi241
 
Avinash Singh Bagri_Design and development of social media strategies in bank...
Avinash Singh Bagri_Design and development of social media strategies in bank...Avinash Singh Bagri_Design and development of social media strategies in bank...
Avinash Singh Bagri_Design and development of social media strategies in bank...Avinash Singh Bagri
 
Seminar paper on social media a case of bangladesh
Seminar paper on social media a case of bangladeshSeminar paper on social media a case of bangladesh
Seminar paper on social media a case of bangladeshShastry Rahman
 
Seminar paper on social media a case of bangladesh
Seminar paper on social media a case of bangladeshSeminar paper on social media a case of bangladesh
Seminar paper on social media a case of bangladeshShastry Rahman
 
impact of social media on youth
impact of social media on youthimpact of social media on youth
impact of social media on youthfemeena dobariya
 
Survey paper: Social Networking and its impact on Youth, Culture, Communicati...
Survey paper: Social Networking and its impact on Youth, Culture, Communicati...Survey paper: Social Networking and its impact on Youth, Culture, Communicati...
Survey paper: Social Networking and its impact on Youth, Culture, Communicati...Imesha Perera
 
Awareness Of Social Media
Awareness Of Social MediaAwareness Of Social Media
Awareness Of Social MediaAkbar Kiani
 
Usaid report
Usaid reportUsaid report
Usaid reportJamaity
 
RESARCH ARTICLE.docx
RESARCH ARTICLE.docxRESARCH ARTICLE.docx
RESARCH ARTICLE.docxKankshiMalavi
 
Lesson 7_Communication Aids and Strategies.pptx
Lesson 7_Communication Aids and Strategies.pptxLesson 7_Communication Aids and Strategies.pptx
Lesson 7_Communication Aids and Strategies.pptxChelloAnnAsuncion2
 
The Reader To Leader Framework Motivating Technology Mediated So
The Reader To Leader Framework Motivating Technology Mediated SoThe Reader To Leader Framework Motivating Technology Mediated So
The Reader To Leader Framework Motivating Technology Mediated SoPath of the Blue Eye Project
 
Social media Marketing Presentation by vaibhavjain
Social media Marketing Presentation by vaibhavjainSocial media Marketing Presentation by vaibhavjain
Social media Marketing Presentation by vaibhavjainVaibhav Jain
 
Social media and its effects on people
Social media and its effects on peopleSocial media and its effects on people
Social media and its effects on peopleAhsanulRifat
 
Social Media Tools for Academic Library Services
Social Media Tools for Academic Library ServicesSocial Media Tools for Academic Library Services
Social Media Tools for Academic Library Servicesinventionjournals
 
What is social media_ The impact of social media.pdf
What is social media_ The impact of social media.pdfWhat is social media_ The impact of social media.pdf
What is social media_ The impact of social media.pdfDavid Due
 
Pr chapter 13
Pr chapter 13Pr chapter 13
Pr chapter 13devy7
 

Similar a Social Media in light of Sociology (20)

Avinash singh bagri design and development of social media strategies in bank...
Avinash singh bagri design and development of social media strategies in bank...Avinash singh bagri design and development of social media strategies in bank...
Avinash singh bagri design and development of social media strategies in bank...
 
Avinash Singh Bagri_Design and development of social media strategies in bank...
Avinash Singh Bagri_Design and development of social media strategies in bank...Avinash Singh Bagri_Design and development of social media strategies in bank...
Avinash Singh Bagri_Design and development of social media strategies in bank...
 
Seminar paper on social media a case of bangladesh
Seminar paper on social media a case of bangladeshSeminar paper on social media a case of bangladesh
Seminar paper on social media a case of bangladesh
 
Seminar paper on social media a case of bangladesh
Seminar paper on social media a case of bangladeshSeminar paper on social media a case of bangladesh
Seminar paper on social media a case of bangladesh
 
impact of social media on youth
impact of social media on youthimpact of social media on youth
impact of social media on youth
 
Survey paper: Social Networking and its impact on Youth, Culture, Communicati...
Survey paper: Social Networking and its impact on Youth, Culture, Communicati...Survey paper: Social Networking and its impact on Youth, Culture, Communicati...
Survey paper: Social Networking and its impact on Youth, Culture, Communicati...
 
Awareness Of Social Media
Awareness Of Social MediaAwareness Of Social Media
Awareness Of Social Media
 
Social media and globalization
Social media and globalizationSocial media and globalization
Social media and globalization
 
Usaid report
Usaid reportUsaid report
Usaid report
 
Quantifying Social Media
Quantifying Social MediaQuantifying Social Media
Quantifying Social Media
 
RESARCH ARTICLE.docx
RESARCH ARTICLE.docxRESARCH ARTICLE.docx
RESARCH ARTICLE.docx
 
Lesson 7_Communication Aids and Strategies.pptx
Lesson 7_Communication Aids and Strategies.pptxLesson 7_Communication Aids and Strategies.pptx
Lesson 7_Communication Aids and Strategies.pptx
 
The Reader To Leader Framework Motivating Technology Mediated So
The Reader To Leader Framework Motivating Technology Mediated SoThe Reader To Leader Framework Motivating Technology Mediated So
The Reader To Leader Framework Motivating Technology Mediated So
 
Social media Marketing Presentation by vaibhavjain
Social media Marketing Presentation by vaibhavjainSocial media Marketing Presentation by vaibhavjain
Social media Marketing Presentation by vaibhavjain
 
Social media and its effects on people
Social media and its effects on peopleSocial media and its effects on people
Social media and its effects on people
 
Social Media Tools for Academic Library Services
Social Media Tools for Academic Library ServicesSocial Media Tools for Academic Library Services
Social Media Tools for Academic Library Services
 
What is social media_ The impact of social media.pdf
What is social media_ The impact of social media.pdfWhat is social media_ The impact of social media.pdf
What is social media_ The impact of social media.pdf
 
E5232833
E5232833E5232833
E5232833
 
Pr chapter 13
Pr chapter 13Pr chapter 13
Pr chapter 13
 
Twitter
TwitterTwitter
Twitter
 

Más de Ismakhalid1

Research Proposal
Research ProposalResearch Proposal
Research ProposalIsmakhalid1
 
Identity Crisis of Pakistan
Identity Crisis of PakistanIdentity Crisis of Pakistan
Identity Crisis of PakistanIsmakhalid1
 
Philosophy Essay on "What to pursue to have a good life?"
Philosophy Essay on "What to pursue to have a good life?"Philosophy Essay on "What to pursue to have a good life?"
Philosophy Essay on "What to pursue to have a good life?"Ismakhalid1
 
How do I Know Whether God exists? Philosophy Essay
How do I Know Whether God exists? Philosophy EssayHow do I Know Whether God exists? Philosophy Essay
How do I Know Whether God exists? Philosophy EssayIsmakhalid1
 
Psychology Report on Metacognition
Psychology Report on Metacognition Psychology Report on Metacognition
Psychology Report on Metacognition Ismakhalid1
 
Factors of production Economics
Factors of production EconomicsFactors of production Economics
Factors of production EconomicsIsmakhalid1
 
Factors of production Economics
Factors of production EconomicsFactors of production Economics
Factors of production EconomicsIsmakhalid1
 
Nishat linen marketing project
Nishat linen marketing projectNishat linen marketing project
Nishat linen marketing projectIsmakhalid1
 
Refco group Limited Scam
Refco group Limited ScamRefco group Limited Scam
Refco group Limited ScamIsmakhalid1
 

Más de Ismakhalid1 (10)

Research Proposal
Research ProposalResearch Proposal
Research Proposal
 
Kashmir issue
Kashmir issueKashmir issue
Kashmir issue
 
Identity Crisis of Pakistan
Identity Crisis of PakistanIdentity Crisis of Pakistan
Identity Crisis of Pakistan
 
Philosophy Essay on "What to pursue to have a good life?"
Philosophy Essay on "What to pursue to have a good life?"Philosophy Essay on "What to pursue to have a good life?"
Philosophy Essay on "What to pursue to have a good life?"
 
How do I Know Whether God exists? Philosophy Essay
How do I Know Whether God exists? Philosophy EssayHow do I Know Whether God exists? Philosophy Essay
How do I Know Whether God exists? Philosophy Essay
 
Psychology Report on Metacognition
Psychology Report on Metacognition Psychology Report on Metacognition
Psychology Report on Metacognition
 
Factors of production Economics
Factors of production EconomicsFactors of production Economics
Factors of production Economics
 
Factors of production Economics
Factors of production EconomicsFactors of production Economics
Factors of production Economics
 
Nishat linen marketing project
Nishat linen marketing projectNishat linen marketing project
Nishat linen marketing project
 
Refco group Limited Scam
Refco group Limited ScamRefco group Limited Scam
Refco group Limited Scam
 

Último

Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 

Último (20)

Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 

Social Media in light of Sociology

  • 1. Social Media 0 Assignment Topic: Social Media Group Members: Isma Khalid Roll No. BS-IAS-31-R-F18 Iqra Ashfaq Roll No. BS-IAS-38-R-F18 Hamda Shahid Roll No. BS-IAS-48-R-F18 Asad Khalil Roll No. BS-IAS-44-R-F18 Maha Sarfraz Roll No. BS-IAS-41-R-F18 Section: A Submitted to: Mam Madiha Malik
  • 2. Social Media 0 Table of Contents 1.1 Introduction to Social Media and Theoretical Perspectives.............................................................. IntroductiontoSocial Media……………………………………………………………………………………………………………….2 Functionalist Perspective on Social Media.........................................................................................5 ConflictPerspective onSocial Media …………………………………………………………………………………………………..9 InteractionistPerspective onSocial Media………………………………………………………………………………………11 FeministPerspectiveonSocial Media………………………………………………………………………………………………12 Audience &It’sbehavior………………………………………………………………………………………………………………….13 1.2 Social Media Addiction............................................................................................................... 14 Symptoms ....................................................................................................................................16 Effects.......................................................................................................................................... 18 Effectof Dopamine…………………………………………………………………………………………………………………………….20 1.3 Statistics of Pakistani Users …………………………………………………………………………………………………………...22 Cure to Addiction………………………………………………………………………………………………………………………………26 Why we todayneedmotivationalspeeches?........................................................................................28 1.4 A Sociological Study of differenttypesofCyber Crimes…………………………………………………………………29 CyberTerrorism…………………………………………………………………………………………………………………………….31 CyberBullying………………………………………………………………………………………………………………………………32 CyberFraud…………………………………………………………………………………………………………………………………36 1.5 Laws against CyberCrime…..…………………………………………………………………………………………………………..38 Role of PTA………………………………………………………………………………………………………………………………………48 Implementation……………………………………………………………………………………………………………………………….
  • 3. Social Media 1 1.1 Media In general, "media" refers to various means of communication. For example, television, radio, and the newspaper are different types of media. The term can also be used as a collective noun for the press or news reporting agencies. In the computer world, "media" is also used as a collective noun, but refers to different types of data storage options. Types of Media: There are five types of media: 1-Newspaper 2-Magazines 3-Radio 4-Television 5-InternetNewspaper & magazines are part of Print media while Radio, Television and internet are part of Electronic Media. Media Newspaper Magazines Television Radio Internet
  • 4. Social Media 2 Evolution of Media: Newspapers were vital during the Revolutionary War. Later, in the party press era, party loyalty governed coverage. At the turn of the twentieth century, investigative journalism and muckraking appeared, and newspapers began presenting more professional, unbiased information. The modern print media have fought to stay relevant and cost-efficient, moving online to do so. Most families had radios by the 1930s, making it an effective way for politicians, especially presidents, to reach out to citizens. While the increased use of television decreased the popularity of radio, talk radio still provides political information. Modern presidents also use television to rally people in times of crisis, although social media and the Internet now offer a more direct way for them to communicate. While serious newscasts still exist, younger viewers prefer soft news as a way to become informed. Introduction to Social Media  What is social media? Virtual communities where users can create individual public profiles, interact with real- life friends, and meet other people based on shared interests.i Any website that enables social interaction by users is considered a social media site.  Types of Social Media: Following are four types of social media: 1) Social networking (Facebook, LinkedIn, Google+). 2) Microblogging (Twitter, Tumblr). 3) Photo sharing (Instagram, Snapchat, Pinterest). 4) Video sharing (YouTube, Facebook Live, Periscope, Vimeo).
  • 5. Social Media 3  Background : The ease of internet access worldwide has made it one of the most popular medium of seeking information and for communication (Ramamohanarao et al, 2007ii). The internet is now very vital in the modern world. It has become an important instrument in education and social life such that it is gradually becoming indispensable in the daily life of many people (Pew Internet Research, 2004).iii The internet is a highly enlightening and entertaining medium, therefore people engage in several activities on it; some of which may be potentially addictive. One of such activities is the use of social media (Kuss & Griffiths 2011).iv The introduction of social media in the last decade has largely attracted many people. This has therefore shifted their focus from mainly using just traditional media and traditional forms of social networking for social interaction (globalwebindex, 2015).v The mass appeal of social media could be an issue of concern, especially with regards to the steady increase in the time users spend online. Also, the qualities of social media make it a desirable escape for many of these people increasing their dependency on it; thereby contributing to the growth of the social media addiction phenomenon worldwide (Brewer, 2013).vi  Overview: Social media has become a global phenomenon and a very important means of communication among peers, families and all manner of persons. Social media sites such as Facebook, Twitter, Instagram, LinkedIn and mobile instant messaging services (IM) such as WhatsApp, Viber and IMO and video calling services like Skype have become a popular means of communication in the past few years .Statistics show that Internet active users percentage has increased from 1,966 million (28.7%) to 4,208 million (55.1%) from year 2010-2018. The increase in number of these social media sites, combined with the fast growth and advancement of mobile device technology in the last few years, coupled with the ease of access to broadband and mobile data services have created a major avenue for daily social interaction; encouraging regular profile updates and replies to comments and messages in real time. People are now logging on to social media on mobile devices everywhere, at any time and on the go; making it a common everyday activity .The number of social media users worldwide in 2018 is 3.196 billion, up
  • 6. Social Media 4 13 percent year-on-year. The level of popularity and use of social media has increased greatly over the years since it was first introduced. vii In Pakistan also, the number of internet users is increasing .According to 2018 statistics , the estimated total population of Pakistan was 200,813,818, out of which 44,608,065 were internet users .viii Total Population of Pakistan (2018) Internet Users(2000) Internet Users(2018) Facebook Users Users %age Asia 200,813,818 133,900 44,608,065 32,000,000 2.2% Lahore among the top cities by Pakistani users on Facebook with approximately 5.2 million users that contributes about 21% of total Pakistani Facebook audience.
  • 7. Social Media 5 Functionalist Perspective on Social Media: Functionalist perspective sees that social media contributes to society in a positive way. When using social media, different cultures are expanded all around the world. Culture is taught more by people putting their beliefs on the internet. It could also be used a stress reliever, decreasing conflict, and giving people something to do during boredom. Functionalism Perspective thinks social media is good because the internet reaches for people and both television and the radio, so when a child goes missing it is spread all over the internet because it reaches so many people globally, with better chances of finding the child because everyone is aware.  Functions: 1) Manifest Functions:  Agent of Socialization: Functionalists focus on how parts of society function in expected and unexpected ways to maintain existing social order. They also pay attention to how parts disrupt the existing order in expected and unexpected ways. Of course the use of social networking sites as a platform for presenting the self to others is the part of society we are analyzing. Some expected, or manifest, functions of social networking sites are that they facilitate connections with family, friends, and other parties; allow members to share photos and videos; support discussions with like-minded people about hobbies and other interests; and help users to plan face-to-face meetings with friends. They also allow users to establish and maintain contacts with a far greater number of people than is typically possible using non-digital means.ix  Enforcer of Social Norms: Social norms are usually the unwritten social behaviors that are to be expected in a society or a social group. It’s a required standard; such as completing higher education in a certain social group, getting married during a certain age period, or gender assigned roles. Norms enforce conformity of behavior and order in every social group, even among marginalized groups and
  • 8. Social Media 6 anarchists, but they do not necessarily represent functional principles or justice and equality. The ability to interact, debate, and express freely online has led to the encouragement of action and challenging the status quo. Take for instance the rise of gender equality and female rights movement online led by independent activists. The repetition of this subject online has led to worldwide awareness due to its mass and borderless audience and the effectiveness of repetition on persuasion for multiple media outlets. This, without a doubt, works on the normalization of female rights and equality, further pushing patriarchal systems in reform and the shaming of inequality on a bigger scale. This effect is leading to the formation of new social norms to conform to in pursuit of acceptance and avoidance of isolation. In the end, reforming social norms takes great responsibility and balanced evaluation by both the individual and the institution seeking change, but since crowd psychology doesn’t solely depend on logic, it is safe to assume that we’ll face many social and cultural obstacles in the future.x  Coferral of Status: Media attention confers status on people, things, and policies. By focusing on an individual or item, the media legitimize the status of that individual or item, enhancing prestige and authority. Lazarsfeld and Merton described status conferral as being one of the social functions of the media. They pointed out that it was not only favorable media attention that conferred status, such as a newspaper editorial endorsing a particular political candidate, but any media attention enhanced status. People can become famous for being famous— celebrity status can be gained by sheer media coverage. In a circular belief, people believe that someone must be important because the media focuses attention on him or her. Celebrities appearing in advertisements confer status on a product.xi  Promotion of Consumption: Using advertising to develop branding supports economy ,provides information about products and underwrites the cost of media. Young people cannot escape commercial messages .They show up at rock concerts or as banners on web pages .They also surface in form of product placement -for example, the Coca-Cola glasses that sit in front of judges in different TV shows is nothing new .
  • 9. Social Media 7  Facebook: Facebook provides information about brands and products by Ad feature .Different brands and pages purchase promotion packages to boost their posts.  Instagram: Instagram is also unique engine for promotion of consumptions. It also provides promotion packages to its users.  YouTube: YouTube provides two types of Ads : i. Nev Bar Ads ii. Display-in Ads 2)Latent Functions: An unexpected, or latent, function of social networking sites is that many offer users a tool that allows them to connect with people with whom they have lost contact, including lost relatives. It is also a tool that police departments draw upon to collect incriminating evidence. Social Media also serves to collect big data to analyze large sums of information also gives people an open platform to say what they please. Dysfunction: 1)Manifest Dysfunction: One manifest dysfunction of social media websites is that there is no way to tell whether people are presenting real or fabricated self-profile. The news feature seemingly endless numbers of stories about people who post fabricated profiles, such as one involving three teens that posted embarrassing material and falsely attributed it to a disliked teacher. As one critic argues, "There is a general feeling that social networking is the wild west of identity management" (Martin 2008).Many people create a Facebook page for the purpose of meeting like-minded friends or
  • 10. Social Media 8 staying in touch, not thinking that potential employers may view postings for clues about someone's character apart from the resume and interview. Most profiles are accessible which means that your life is out in the open and privacy seems far. 2)Latent Dysfunction:  Narcotizing Effect: Narcotizing dysfunction approach is one of the most overlooked approaches of media effects in the relevant literature. Robert K. Merton and Paul F. Lazarsfeld in their Mass Communication, Popular Taste and Organized Social Action named article, argue about the narcotizing dysfunctions of media. According to their approach, media creates an apathy in which people are content to ‘know’ rather than ‘do’ something. In this context, media provides information about the events and the receivers demonstrate some superficial concern on media about the events while the importance of real action is neglected. Consequently, the receivers are drugged into the inactivity like they are under the influence of narcotics. One of the main assumptions of this approach is that, increasing dosages of mass communications sometimes ‘unpredictably’ transform the energies of the receivers from ‘active participation’ into ‘passive knowledge’. As Robert K. Merton and Paul F. Lazarsfeld states: Exposure to this flood of information may serve to narcotize rather than to energize the average reader or listener. As an increasing mead of time is devoted to reading and listening, a decreasing share is available for organized action. The individual reads accounts of issues and problems and may even discuss alternative lines of action. But this rather intellectualized, rather remote connection with organized social action is not activated. The interested and informed citizen can congratulate himself on his lofty state of interest and information and neglect to see that he has abstained from decision and action…. He comes to mistake knowing about problems of the day for doing something about them. His social conscience remains spotlessly clean. He is concerned. He is informed. And he has all sorts of ideas as to what should be done. But, after he has gotten through his dinner and after he has listened to his favored radio programs and after he has read his second newspaper of the day, it is really time for bed (1957: 464).xii  Less Control:
  • 11. Social Media 9 A unexpected, or latent, dysfunction of social networking sites is that once something is posted for others to access, there is no way to control how it will be used .People start talking inappropriately at each other online because they think they are anonymous and have free speech. Conflict Perspective on Social Media: The conflict perspective looks at how social networking sites create a false way of connecting people over the web and a place where bullying thrives, which is called cyberbullying. Conflict theory can be used to say social media has a large influence in the younger population by looking at who the media is controlled by. Teens are more tempted by advertisings and the propaganda in order, which makes teens more influenced by the media .  Unequal Fame: Social media is ruled by those with more followers. People with more followers continue to gain followers as their content continues to be ever far reaching. People with less followers become lost in the blur of the rest of those with names .People on social media with the most status compete with each other in view on social media platforms ,whereas people with lower status are not seen. These people try to keep their power ,by teaching followers what his or her status is all about ,so that their followers are “schooled” in the status that the popular social media person has ,so that his power stays legitimized.  Gatekeeping: Conflict theorists seek to identify advantaged and disadvantaged groups, document unequal access to scarce and valued resources, and describe the ways in which advantaged groups promote and protect their interests. With regard to social networking websites, conflict theorists ask, "Who ultimately controls these websites? And who benefits from this arrangement and at whose expense?" Conflict theorists maintain that the advantaged groups include those who own the social networking websites, advertisers, potential employers, and other parties interested in selling products. No matter how much users think they benefit from social networking, in the final analysis they are the disadvantaged groups, especially if they mistakenly believe that they control the information they have posted. On close analysis we see that the control lies with the website. Facebook (2008), for example, makes it clear that "all content on the Site and available through the Service, including designs, text, graphics, pictures, video, information, applications,
  • 12. Social Media 10 software, music, sound and other les . . . are the proprietary property of the Company." My Space (2008) warns that it may use "cookies and similar tools to customize the content and advertising gleaned from the Pro le Information you have provided."  Dominant Ideology: In the Marxist perspective, “Dominant ideology” is referred to as the ideology of the majority in a population. This ideology remains to be prevalent given that interests of the dominant class are fulfilled. This can lead to seizure of development process in the subordinate class, who are unable to form an effective opposition. It can be said without doubt that the ideas of the dominant class are deeply penetrated into the social system Williams, 1977. According to Karl Marx, ‘Social class determines consciousnesses. The relationship of a class to the modes of production generates cultural conditions and its material conditions. In other words it can also be said that each class has a separate belief system because each has its own interests due to difference in their economic conditions. Secondly each mode of production has a dominant class which is responsible for a dominant ideology to ensure the subordination of the working class. Marx also distinguished two types of social influences in the formation of ideologies. The main source of ideas is the experiences of individuals as they continue their daily life experiences. David Cheal calls the reactions to these daily activities as the ‘practical ideas.’ Another source through which individuals are introduced to new ideas is called ‘received ideas’ as these are achieved through social interactions or communication between individuals. For Gramsci, the presence of these two sources of ideas can lead to contradictions, which he called ‘contradictory consciousness.’ Such types of contradictions are unevenly distributed among the classes. For dominant classes, they form a consistent system of thought and the consequences of such contradictions are insignificant. However for subordinate classes, these contradictions are large and significant. (Cheal, 1979) Leading thinkers in Marxist ideology, Althussers and Paulantzas argue that the dominance in political or ideological structures is determined by economic base. Such dominance is sometimes also facilitated by non-economic factors like religion. In feudal and pre-capitalist societies religion was used to ensure that a continuous labor source was available from the peasantry. (Abercrombie & Turner, 1978). According to Marxists, media plays an important role in spreading the dominant ideology and in building a sense of consensus among the population about right and wrong nature of things. This in a sense can be true as
  • 13. Social Media 11 media has means to provide false information and completely ignore or brand something unreasonable which challenges the dominant ideology. Media presents ideas of the ruling class while marginalizing voices of minority. The power structures in media can be further broken down to the interests of the owners and managers of a media group. Murdock argues that the two important reasons that recede power of ruling class is the growth of professional managers and the creation of new capital enterprise. As industry grows, so does the need for managers.(Gitlin, 1979) This in turn increases the influence of professional managers and threatens the power base of the owner.xiii Interactionist Perspective on Social Media: People connect with others for various reasons: starting relationships, continuing relationships, career aspirations, or something else. Social media is driven by people and their connections and interactions with others. People are active on social media, because this is how they give meaning to the world, by commenting on what they find meaningful and selecting articles for example which shows what they give meaning to.xiv Symbolic interactionists study social interaction and focus on self-awareness, symbols, and negotiated order. Symbolic interactionists ask, "How do the involved parties experience, interpret, influence, and respond to what they and others are saying and doing?" Symbolic interactionists are interested in learning how social networking platforms serve as a mirror, giving users especially teenagers the chance to be noticed by others and to receive feedback. Symbolic interactionists studying Facebook and other social networking sites familiarize themselves with vocabulary and symbols people use to convey intent and mood with words such as block (take action to prevent a user from making contact or viewing a profile) and add (to gain a new friend). Finally, symbolic interactionists are interested in how order is dealt with presenting the self and seeking responses to that presentation.xv Neo-Luddites are people who see technology as symbolizing the coldness and alienation of modern life. But for technophiles, technology symbolizes the potential for a brighter future. For those adopting an ideological middle ground, technology might symbolize status (in the form of a massive flat-screen television) or failure (in owning a basic old mobile phone with no bells or whistles).xvi
  • 14. Social Media 12 Feminist Perspective on Social Media: Take a look at popular television shows, advertising campaigns, and online game sites. In most, women are portrayed in a particular set of parameters and tend to have a uniform look that society recognizes as attractive. Most are thin, white or light-skinned, beautiful, and young. Why does this matter? Feminist perspective theorists believe it is crucial in creating and reinforcing stereotypes. For example, Fox and Bailenson (2009) found that online female avatars (the characters you play in online games like World of Warcraft or Second Life) conforming to gender stereotypes enhances negative attitudes toward women, and Brasted (2010) found that media (advertising in particular) promotes gender stereotypes. The gender gap in tech-related fields (science, technology, engineering, and math) is no secret. A 2011 U.S. Department of Commerce report suggested that gender stereotyping is one reason for this gap, acknowledging the bias toward men as keepers of technological knowledge (U.S. Department of Commerce 2011). But gender stereotypes go far beyond the use of technology. Press coverage in the media reinforces stereotypes that subordinate women, giving airtime to looks over skills, and disparaging women who defy accepted norms. Recent research in new media has offered a mixed picture of its potential to equalize the status of men and women in the arenas of technology and public discourse. A European agency, the Advisory Committee on Equal Opportunities for Men and Women (2010), issued an opinion report suggesting that while there is the potential for new media forms to perpetuate gender stereotypes and the gender gap in technology and media access, at the same time new media could offer alternative forums for feminist groups and the exchange of feminist ideas. Still, the committee warned against the relatively unregulated environment of new media and the potential for antifeminist activities, from pornography to human trafficking, to flourish there. Increasingly prominent in the discussion of new media and feminism is cyberfeminism, the application to, and promotion of, feminism online. Research on cyberfeminism runs the gamut from the liberating use of blogs by women living in Iraq during the second Gulf War (Pierce 2011) to the analysis of postmodern discourse on the relationship between the body and technology (Kerr 2014).xvii
  • 15. Social Media 13 Audience: The Social Media is distinguished from other social institutions by the necessary presence of an audience. It can be identifiable, finite group , such as audience at a jazz club or a Broadway musical , or a much larger and undefined group , such as users of Facebook. The specialized targeting of audiences has led some scholars to question the “masses” on social media. For example, the British social psychologist Sonia Livingstone (2004) has written that the media have become so segmented, they have taken on the appearance almost of individualization. Are viewing audiences so segmented that large collective audiences are a thing of the past? That is not yet clear. Even though we seem to be living in an age of personal computers and personal digital assistants (PDAs) , large formal organizations still transmit public messages that reach a sizeable , heterogeneous , and scattered audience. Audience Behavior: Sociologist have long researched how audiences interact with one another and how they share information after a media event. The role of audience members as opinion leaders particularly intrigues social researchers . An opinion leader is someone who influences the opinions and decisions of others through day-to-day personal contact and communication. For example, a movie of theater critic functions as an opinion leader . Sociologist Paul Lazarsfeld and his colleagues (1948) pioneered the study of opinion of opinion leaders in their research on voting behavior in the 1940s . They found that opinion leaders encourage their relatives , friends and co- workers to think positively about a particular candidate, perhaps pushing them to listen to the politician’s speeches or read the campaign literature .Despite the role of opinion leaders , members of an audience do not all interpret media in the same way .Often their response is influenced by their social characteristics ,such as occupation ,race , education and income .
  • 16. Social Media 14 1.2Social Media Addiction: Addiction is a psychological and physical inability to stop consuming a chemical, drug, activity, or substance, even though it is causing psychological and physical harm. Social Media Addiction is not a formal clinical diagnosis, it is fair to say that many people spend far too much time on social media and may at the very least describe themselves as being “obsessed”, if not addicted. In recent years the mental health community has become increasingly interested in the impact that modern technology has on our lives – both positive and negative. The rise of social media has meant that we as a global population are more connected than we have ever been in the history of time. However, our reliance on social media can have a detrimental effect on our mental health, with the average Brit checking their phone as much 28 times a day.  Features that make social media addictive : According to Nick Zagorski (2017), a writer for Psychiatric News, recent studies have shown that social media use is linked to feelings of social isolation, depression, insecurity, jealousy, and poor self-esteem. However, these findings beg the question: how do these negative feelings transpire from just perusing social media sites? Here are some real examples of reasons you might feel worse by increased exposure to social media:  The illusion that others are more popular due to the number of “friends” or “followers” they have  Seeing pictures of a group of friends that you consider yourself to be close to but you weren’t invited to join them  Seeing pictures of happy people enjoying their lives, which creates sadness and jealousy because your life doesn’t seem as grand  Lack of “likes” to your post, resulting in feelings of disappointment and decreased self- esteem  Seeing a love interest with someone else may make you feel depressed and insecure
  • 17. Social Media 15  Political posts that you don’t agree with  Feeling like you can never keep up with what everyone else has  Being directly attacked about a message or picture you posted One thing that probably contributes to social media being so addictive is the role it played in the rise of the digital age. While social media was becoming popular, the internet also became more widely used, cheaper to access, and faster to load content .The rise of mobile phones with internet capabilities and mobile internet also made it easier for social media to be available wherever you go, and regardless of whatever you’re doing. Thanks to the popularity of social media, you can constantly and instantaneously update your network about what you’re eating, what you’re wearing, and who you’re with. Your Ego: Having your own space online means you have free reign to post about your favorite subject: yourself. After all, your profile, your rules, and no one is forcing you to ‘friend’ them or ‘follow’ them. In general, humans spend 30-40% of conversations talking about themselves. Interestingly, that number reaches up to 80% on social media posts. FOMO (Fear of Missing Out): FOMO is one of the leading drivers of social media addiction. People use social media to post about the best things happening in their life, which gives them a self-esteem boost—especially when the people in their networks affirm them. But even when experiencing something great, people often wonder if there is something better and more exciting happening at the same time, so they go on social media to check. Social media provides the proof that there are other great things happening, through photos and status updates. When people compare what they’re doing to what other people are doing, they may start to feel negative about what they would otherwise perceive as a good time .Sometimes people forget that social media can be both a world unto itself (suitable for undirected exploration) and also an extension of real life. Even if you’re not bothered by other people having more fun than you, social media is a compelling place to procrastinate. A "High" of Sorts: When you see people reacting to or ‘liking’ what you post about, it validates you and makes you
  • 18. Social Media 16 feel good. When you see that new notification alert, your brain secretes a neurotransmitter called dopamine, which controls the brain’s pleasure and reward center. The more dopamine released, the more the brain recognizes that it is triggered by a reward Your Own, Personal Bubble Social media can serve as your own personal chunk of the internet. There are many who grew up with Xanga, Blogger, and now Tumblr blogs. They turned to these online platforms and internet strangers in order to express what they couldn't tell the people in their “real” lives. Thanks to different levels of privacy both then and now, it’s easy to create a news feed that only contains the thoughts of like minded people. While this effectively cuts out the trolls it can also encourage a homogenized world view. It’s up to you to decide if you’re OK with that when trimming your friend list based on viewpoint differences. On the idea of social media acting as a personal bubble, consider what British filmmaker Adam Curtis said in a New York Times interview: “On a social-media network, it’s very much like being in a heroin bubble. As a radical artist in the 1970s, you used to go and take heroin and wander through the chaos and the collapsing Lower East Side, and you felt safe. That’s very like now. You know you aren’t safe, but you feel safe because everyone is like you. But you don’t have to take heroin, so it’s brilliant. You don’t get addicted, or maybe you do. Mostly you do.” The Like Button: When Justin Rosenstein—one of the four designers of Facebook’s ‘Like’ Button—came up with the idea for it, he did not think it would turn into a cultural phenomenon. “The main intention I had was to make positivity the path of least resistance, and I think it succeededin its goals, but it also created large unintended negative side effects. In a way, it was too successful.” The negative side effects he refers might include the fact that so many offline activities by Facebook users are now driven by “likes”. For example, are you traveling somewhere new? Your social media addiction may result in you feeling the need to post about it on social media for positive affirmation in the form of likes. It’s possible that being able to post about your trip on social media was in fact one of the driving forces pushing you to take it in the first place. Facebook addiction symptoms: Facebook Addiction Disorder, is a condition that is defined by hours spent on Facebook, so much time in fact that the healthy balance of the individual’s life is affected. It has been said that
  • 19. Social Media 17 approximately 350million people are suffering from the disorder that is detected through a simple set of six-criteria. People who are victims of the condition must have at least 2-3 of the following criteria during a 6-8 month time period. 1)Tolerance: This term is used to describe the desperate behavior of a Facebook addict. They spend an increasing amount of time on the site, coming to a stage where they need it in order to obtain satisfaction or on the other extreme, it is having a detrimental affect on them as a person and their life. For the family members and friends who think they are dealing with an addict, a sign to look out for are multiple Facebook windows open. Three or more confirms that they are indeed suffering from this condition. 2)Withdrawal symptoms: These become obvious when one is restricted from using Facebook because they have to participate in normal everyday activities. Common signs are anxiety, distress and the need to talk about Facebook and what might have been posted on their wall in their absence. 3)Reduction of normal social/recreational activities: Someone suffering from FAD will reduce the time spent catching up with friends, playing sport or whatever it is they used to enjoy doing, to simply spend time on Facebook. Instead of catching up with a friend for coffee, they will send a Facebook message. A dinner date will be substituted with a messenger chat. In extreme cases, the person will even stop answering their parent’s phone calls, instead insisting that they use Facebook to contact them. 4)Virtual dates: It is obvious that things are extreme when real dates are replaced with virtual dates. Instead of going to the movies or out to dinner, they tell their partner to be online at a certain time. 5)Fake friends: If 8 out of 10 people shown on their Facebook page are complete strangers, it is undeniable: they have a serious case of FAD. 6)Eating Disorders:
  • 20. Social Media 18 It causes imbalance of diet and irregular eating habits. Effect of Addiction: 1)It triggers more sadness, less well-being: The more we use social media, the less happy we seem to be. One study a few years ago found that Facebook use was linked to both less moment-to-moment happiness and less life satisfaction—the more people used Facebook in a day, the more these two variables dropped off. The authors write, “Facebook provides an invaluable resource for fulfilling such needs by allowing people to instantly connect. Rather than enhancing well-being, as frequent interactions with supportive 'offline' social networks powerfully do, the current findings demonstrate that interacting with Facebook may predict the opposite result for young adults—it may undermine it. 2)Comparing our lives with others is mentally unhealthy: Part of the reason Facebook makes people feel socially isolated (even though they may not actually be) is the comparison factor. We fall into the trap of comparing ourselves to others as we scroll through our feeds, and make judgements about how we measure up. One study looked at how we make comparisons to others posts, in “upward” or “downward” directions—that is, feeling that we’re either better or worse off than our friends. It turned out that both types of comparisons made people feel worse, which is surprising, since in real life, only upward comparisons (feeling another person has it better than you) makes people feel bad. But in the social network world, it seems that any kind of comparison is linked to depressive symptoms. 3) It can lead to jealousy—and a vicious cycle: It’s no secret that the comparison factor in social media leads to jealousy—most people will admit that seeing other people’s tropical vacations and perfectly behaved kids is envy-inducing. Studies have certainly shown that social media use triggers feelings of jealousy. The authors of one study, looking at jealousy and other negative feelings while using Facebook, wrote that “This magnitude of envy incidents taking place on FB alone is astounding, providing evidence
  • 21. Social Media 19 that FB offers a breeding ground for invidious feelings." They add that it can become a vicious cycle: feeling jealous can make a person want to make his or her own life look better, and post jealousy-inducing posts of their own, in an endless circle of one-upping and feeling jealous. Another study looked at the connection between envy and depression in Facebook use and, interestingly, discovered that envy mediates the Facebook-depression link. That is, when envy is controlled for, Facebook isn’t so depressing. So it may be the envy that’s largely to blame in the depression-Facebook connection. 4) We get caught in the delusion of thinking it will help: Part of the unhealthy cycle is that we keep coming back to social media, even though it doesn’t make us feel very good. This is probably because of what’s known as a forecasting error: Like a drug, we think getting a fix will help, but it actually makes us feel worse, which comes down to an error in our ability to predict our own response. One study looked at how people feel after using Facebook and how they think they’ll feel going in. Like other studies suggested, the participants in this one almost always felt worse after using it, compared to people engaging in other activities. But a follow-up experiment showed that people generally believed that they’d feel better after using, not worse. Which of course turns out not to be the case at all, and sounds a lot like the pattern in other types of addiction. 5) More friends on social doesn’t mean you’re more social: A couple of years ago, a study found that more friends on social media doesn’t necessarily mean you have a better social life—there seems to be a cap on the number of friends a person’s brain can handle, and it takes actual social interaction (not virtual) to keep up these friendships. So feeling like you’re being social by being on Facebook doesn’t work. Since loneliness is linked to myriad health and mental health problems (including early death), getting real social support is important. Virtual friend time doesn’t have the therapeutic effect as time with real friends. Complete addiction: When they meet new people, they say their name, followed by “I’ll talk to you on Facebook”, or for those who are extremely bad, “I’ll see you in Facebook”. Their pets
  • 22. Social Media 20 have Facebook pages, and any notifications, wall posts, inboxes or friend requests that they receive give them a high, one which can be compared to that gambling addicts get from the pokies or roulette table. So someone believes that addiction to the net is a real condition that needs to be treated just like any other addiction, with care and caution, but is an obsession with Facebook a real condition, or is FAD really just the latest fad? Either way, Facebook obsessions are definitely present in today’s society and whether it is a disorder or not, something needs to be done to fix it. Forget the fancy name and look at the facts. Many people, teenagers in particular, are spending too much time online. People’s lives are being affected because of the hours spent looking at profiles and pictures. Facebook, very beneficial in some ways, is having a detrimental affect on the everyday behaviors of people around the world. Having seen the affects of too much time online firsthand, I know this to be true. Nobody can possibly disagree when the facts speak for themselves and when an individual’s online ‘life’ becomes more important than their real one, we know that there is a serious problem that needs to be addressed. Effect of Dopamine: Dopamine is the chemical in our brain associate with stimulus and reward/ the pleasure center of our brain. Dopamine is not only about pleasure and reward, but about learning and memory. The reward of having our image or post "liked," shared, or commented on is something that our brain soon learns. It is validating. When we see the little red dots on our phone, or open up Facebook and see the notifications lit up, it does the same thing to our brain we begin to have a conditioned stimulus. We have set the expectation of a reward by posting, and once we see the notifications and likes we are rewarded. Dopamine is released because we seek out the reward. One of the original developers of the Facebook news feed even said that the thing which made it successful wasn’t the software at all. But it was actually the scroll wheel on a mouse. Because with this your hand never has to leave its resting position, you just scroll and keep looking. Therefore, because of dopamine giving us the desire to seek and be rewarded In an evolutionary context, it rewards us for beneficial behaviors and motivates us to repeat them. ‘Instant gratification’ is the immediate attainability of satisfaction and happiness. It is a way of experiencing pleasure and fulfillment without delay or patience because it provides a spike in dopamine without effort or discipline. With the internet, twitter, and texting, instant gratification of your desire to seek is
  • 23. Social Media 21 available at the click of a button. You can talk to anyone just by sending a text and they respond in a few seconds. According to Mauricio Delgado, an Associate Professor of Psychology at Rutgers University, “The same brain areas [that are activated for food and water] are activated for social stimuli." This means that our brain sees this social media stimuli as a necessity. 1.3 Statistics of Pakistani Social Media Users: Social media and its uses are increasing day by day with every passing second around the world, its utility is also increasing in Pakistan and people are understanding the use and power of social media. Many issues that were too controversial to be raised are now supported on the internet and the horizon of people is expanding. Pakistan is a country which was going through corrupt leadership and bad governance when a nation is going through such issues; problems faced by common people are always overlooked but social media and digital media is providing such platforms for people to come up and speak for their rights. Social media and digital platforms are not just providing a platform for business to reach out masses and grow but it is also giving the true freedom of speech and power to the opinion of ordinary people. Digital Statistical Indicators: The above chart shows the statistics of Pakistan’s population and the number of people who are active users of the internet, mobile users, social media users and mobile social users. The main concern is to know how much of our total population is active social media user to know how much influence we can create by approaching on social media. Social media is one of those
  • 24. Social Media 22 technological changes you can’t resist as with time everything starts to depend on them. The stats of Pakistani people actually having access and actually using social media on an active basis shows that we have so much of people to still make aware and reach out in order to make Pakistan socially active. The stats show that only 44.6 million out of 198.9 are internet users in Pakistan which means only 22% of our total population has access to internet, even out of them only 35 million are active users of social media which means only 18% are social media users. If you look deeper about the number of mobile users you will get to know that 109.5 million out of the total population uses mobile and among them 32 million are active internet and social media users from their mobile devices which is just 16% of our people. All these stats show that we have a lot to do in this sector as compared to the developed countries. We need to create awareness regarding the healthy and efficient uses of social media. We need to realize the wide horizon people have on the social media. Our people use it just for time pass and connectivity whereas the true essence and power is overlooked. Social Media Websites Usage: The most commonly used social media websites on the internet by the people of Pakistan are these six including Facebook, YouTube, Twitter, Pinterest, Instagram and Google+. The info graphic is a clear elaboration of how people are using these social websites. The most used social media website that people of Pakistan are using is Facebook as 92.06% of our population which has access to internet is actively using Facebook. The Stats in this info graphic shows that people of Pakistan are just familiar with Facebook and many of them are just using it for the purpose of connectivity with friends and family however ignoring the other vital uses of social media. With time and with certain awareness programs like Social Media Summit ‘18 can bring change in the utility of internet. The overall stats show that people are only aware with Facebook and are not adopting other social websites as much as they use Facebook. The reality is that all the other platforms are as much of an opportunity as Facebook but people of Pakistan might find it more user friendly.
  • 25. Social Media 23 Top Industries on Facebook: This next info graphic shows the number of followers of the biggest local Pakistani pages in the different industries. To be more specific the data is from the total number of Local Fans/followers for the largest 200 pages in Pakistan by Fan count. The stats show that people use Facebook more for the sake of fashion than any other thing. The stats have been carefully studied to come to these results which show that most followers are of fashion industry. After fashion industry the people follow telecom sector on Facebook.
  • 26. Social Media 24 Ecommerce is also booming for people of Pakistan on Facebook. Retail and services are next. These all stats show that people of Pakistan are now getting involved in retail activities online, in the beginning people were too reluctant in adapting this totally new experience of buying intangible stuff but with time trend is changing and a good amount of people are involved in online purchases. Still the numbers are growing each year and the people are becoming aware. However Pakistan still need to make people aware regarding the uses and utility of social media and digital market. Instagram Usage Statistics: Instagram is a relatively new thing for Pakistani people and is less popular among the common people however the upper class is obsessed with its various uses. We have 5.2 million monthly active users on Instagram, the number is very less as compared to the Facebook users which was 35million. 5.2 million is just 3% of our population the rest is still a target.
  • 27. Social Media 25 On Instagram also the number of male users is more than female users. 31% of the total active Instagram users are females where as 69% are males but the numbers are increasing with time. Cure to this Social Media Addiction: It’s undeniable that people stare at their phone screens too much. In fact, a Nielsen study found that the average adult spends five and a half hours every week on social media. That's nearly 12 full days every year. If that doesn’t scare you enough, a lot of us are now addicted to social media. The rush of dopamine you get from likes, comments and retweets is actually rewiring your brain to crave Facebook, Twitter and Instagram. To test if you’re at risk for addiction, ask yourself: Do you feel like social media is keeping you from doing your best work or living up to your full potential? If your answer is yes, then you’ve been bitten by the social bug. Like breaking any bad habit, the secret is to replace your bad habit with a better one in order for the transformation to stick. Here’s the step-by-step process I teach my clients for breaking social media addiction once and for all: Step1: Understand That You’re Being Played : An embarrassingly heavy social-media habit isn’t entirely your fault. “Pinterest, Facebook, Twitter—they’ve all been designed to make you repeatedly use them and check back in,” says Levi Felix, the CEO of Digital Detox, a tech- free wellness retreat in Northern California. “FarmVille was engineered to keep you at your computer.” (After all, if you miss a specific window to harvest your crops, they die.) When you keep in mind that the technology is designed to hold you hostage, you might be motivated to set time limits. (Think of it as buying a snack-size bag of chips instead of the party-size.) Step2: Figure out why you’re addicted to social media.
  • 28. Social Media 26 Ask yourself: Why do you open Instagram and Facebook in the first place? Was your answer, “There’s no reason, I just like scrolling through my Instagram feed”? If so, take a closer look at your motive. Are you bored at work, stressed out, feeling disconnected from the outside world or just overwhelmed? The first step is to identify the core need, or “cue,” that triggers the impulse to check your phone. Step 3: Make the itch less easy to scratch. The second step is to implement three to four tactics that keep social media at arm’s length. These could include deleting social media apps from your phone, using a newsfeed blocker on your desktop, keeping your phone out of your bedroom, setting your phone to Do Not Disturb or turning off app notifications. Remember, some of the best minds in the world have dedicated their lives to making social media more addictive. You’ll need to get aggressive in order to win your focus back. Step 4: Find alternative ways to respond to the itch. The third step is to replace the negative routine of checking your social media with a new routine. The cue of “I’m bored” or “I’m stressed” is still going to be there. But you can replace your response to these triggers with something positive and productive. For example, tell yourself: “When I feel bored at work, I’m going to take a walk around the block.” Or “When I feel stressed out, I’m going to do a three-minute breathing exercise.” Once you retrain your brain to respond to these cues, the itch will stop altogether. Step 5: Implement multiple layers of accountability. The fourth step is to repeat the new habit over and over again. This is usually where people fall down, because their self-discipline muscle needs to be incredibly strong for this to work. But self-discipline becomes a whole lot easier when you’re not on your own. Outsource your discipline by enrolling an accountability buddy or coach to keep you on track .A quick solution for accountability is to use an app. Google “accountability app” and choose one of the many options for external, unbiased accountability options. (There’s even one that donates to a cause you hate if you don’t reach your goals -- how’s that for motivation?)
  • 29. Social Media 27 Step 6: Reward, reward, reward. The fifth step is to train your brain that the new routine is a good thing by rewarding it for a job well done until the habit is strong enough to happen automatically. Habit formation shouldn’t feel like torture. To make sure your new habit sticks, incorporate a positive reward into your process, even if you don’t feel like you deserve it. For example, if you work social media-free for an hour, give yourself a 10-minute reward break to do whatever you please. And, if you make it through your whole day social media-free, give yourself an hour of personal time in the evening as a reward. The best new habit you could create is one that frees you from the chains of distraction and misused time. Join the fast-growing ranks of people pushing back against the tide of social media, and revel in your newfound freedom.xviii Why we today need Motivational speeches? Have we evolved our body structures? Are we shifted to a new world? Have we less intellect than our ancestors? No? Then what thing changed , which make us so. Why we need a motivational speaker to tell us what our goals are ? How should we live our lives? The reason is that WE ARE PROGRAMMED We are hollow Facebook profiles blindly walking behind memes and other’s life style. We follow Popular Cultures that originate through social media. We spend more time in using social media and comparing our lives to other. The time which could be spent in reading books or research is used in using social media. Our energies are used to understand memes. We have limited our minds inside the world of social media. It’s hard to get out of this. We should explore ourselves. We are much more than Profiles. Most of us excuse that , we use social media apps to get knowledge ,but in fact , 60% of teens just use these sites for fun. 1.4 A SOCIOLOGICAL STUDY OF DIFFERENT TYPES OF CYBER CRIMES: INTRODUCTION : A common man who is a user of computer and internet and cell phone is unaware of the traps set by clever criminals in the Cyber space and the ways to get rid of them. Computers evolved as a result of man’s search for fast and accurate calculating devices. Forging documents is one of the best examples of this kind of a Cybercrime. Image morphing, circulation of defamatory comments and threats through mobile phones, taking photographs without consent and consistent blackmailing may be some other examples. With the rise in the internet users’ Cyber criminals are also increasingly targeting cyber space to commit their illegal designs.
  • 30. Social Media 28 CYBERCRIME: Cyber-crime is a crime involving, using or relating to computers especially the internet. Crimes involving use of information technology or usage of electronic means in furtherance of crime are covered under the scope of Cyber-crime. The ambit of the term includes all kinds of objectionable or unlawful activities, misuse or abuse taking place in cyber world, through or against the computer, internet, and telecommunication networks run with computer system or technology. The scope of Cyber-crime is bound to increases in view of the ever-increasing technological advancement in the area. DIFFERENT TYPES OF CYBERCRIMES: Cyber-crimes are new generation crimes where the achievements of information technology are misused for criminal activities. Such crimes may be committed against the governments, individuals, and institutions. Generally, most of the Cyber-crimes are adversely affect individuals, and society at large. The common types of Cyber- crimes are discussed under the following heads: a) Hacking: Hacking means unauthorized access to another computer system. It is the most popular and commonly known Cybercrime. Hackers will break into networks and computers system for multiple purposes like data theft, fraud, destruction of data, causing damage to computer system for mere pleasure or personal satisfaction. Hacking is the basic act of the criminals who later on tread on to the other computer related crimes and frauds thus making it easier for law enforcement authorities to grill them down under other existing laws too. Latest development in this field is hacking of Wi-Fi environment. But the Information Technology Act does not use the term hacking but refers to the same act as unauthorized access to the computer resource. There are three classes of hackers-white hat hackers, black hat hackers, and grey hat hackers.
  • 31. Social Media 29 DIFFERENT TYPES OF HACKERS:  White Hat Hackers: White Hackers use their hacking skills for good reasons and do no harm to the computer system. So, they are referred as ethical hackers.  Black Hat Hackers: A black hat hacker is a person who gains unauthorized access to a computer system with a malicious intention. The black hat hackers use their computer knowledge for private gain. They cause damage to the system after intrusion. They may steal, modify or erase data or insert viruses or women are which damages the system.  Grey Hat Hackers: A Grey Hat Hackers is a skilled hacker who sometimes acts legally, sometimes in good will and sometimes not. They are hybrids between white hat and black hat hackers. They usually do not hack for personal gain nor have malicious intentions but may or may not occasionally commit crimes during the course of their technological exploits. b) Cyber Terrorism: Cyber terrorism is the convergence of cyberspace and terrorism. It refers to unlawful attacks and threads of attacks against computers, networks and the information stored therein that are carried out to intermediates or coerce a country’s government or citizens in furtherance of political or social objectives. Serial attacks against crucial infrastructures could count as acts of cyber terrorism. The cyber terrorism attacks and threats includes interfering and disrupting information and transportation
  • 32. Social Media 30 systems, emergency services and government services, communication networks, infrastructure systems, banking and fiancé system. FACTORS OF CYBER TERRORISM: c) Cyber Stalking: These crimes involve the use of internet to harass someone. The behavior includes false accusation, threats and harassment of as victim through e-Mil. Chat message or web pages. It is a willful conduct that actually causes a victim to feel terrorized, frightened, intimidated or molested. Normally majority of cyber stalkers are men and the majority of victims are women.
  • 33. Social Media 31 GOAL PREVENTING CYBER STALKING: In order to prevent cyber stalking, the netizens should avoid disclosing any information pertaining to one while chatting. Girls should avoid sending any photographs online participatory to strangers and chat friends as there has been incidence of misuse of the photograph for morphing so as the reduce the chance of netizens becoming victims of Cybercrimes. When children are involved in cyber stalking it is called cyber bullying. d) Cyber bullying: Cyber bullying occurs when children including teenagers are tormented threatened, harassed, humiliated, embraced or otherwise targeted by other children using the internet, interactive and digital technologies or mobile phones. It has to have a minor on both sides or at least should have been instigated by a minor against another minor. The methods used are limited only by child’s imagination and access to technology. Cyber bullying is usually not a onetime communication unless it voices death threats or credible threats of serious bodily harm. Cyber bullying may arise to the level of a cyber harassment charge, or if the child is young enough it may result in the charge of juvenile delinquency. In order to safeguard children from cyber bullying parents should be more involved in their children’s online activities, the parents should also be aware of major changes in a child’s behavior.
  • 34. Social Media 32  E- mail spoofing: E-mail is the short form for ‘electronic mail’. The electronic mail system over the internet can carry messages, letters, pictures, sounds, or anything that can be created and stored in a computer. Data can be sent as electronic mail to any other computer connected to the internet, e- mail spoofing is a technique commonly used to hide the origin of an e mail message. The result is that, although the e-mail appears to have come from a particular address it comes actually from other sources.  Phishing: It proceeds through the mass distribution of emails that purport to originate from Banks, credit card companies and e-sellers. These mails request for providing personal and other details in order to update their account. The fraudsters thus gain access to the password and other security and authentication information of users, which can then be used to hack bank accounts or steal through credit cards. According to the Anti-Phishing Working Group (APWG), there were over 2500 such sites reported on the internet in January 2005 alone, a 100% increase in the number in Comparison to previous year (APWG, 2005) Internet offers valuable opportunity to fraudsters to disguise themselves and their identities. These fraudsters also change personal attributes such as
  • 35. Social Media 33 age, gender, ethnic group, country of residence and so on. Even though the fraud is detected, identifying the culprit is very difficult Victims of online frauds may be reluctant to report their victimization due to the following reasons. Relatively small amount of money involved does not make pursuing the matter worthwhile, embarrassment in reporting a fraud, ignorance about reporting the offence to the concerned authority, likelihood that no results will ensue as the fraudsters are located in another country. A literature review is a body of text that aims to review the critical points of current knowledge including substantive findings as well as theoretical and methodological contributions to a particular topic. Literature reviews are secondary sources, and as such, do not report any new or original experimental work. No study can be undertaken without reviewing and analyzing the literature available related to the field of study. Review of Literature is an important component of research by which multifaceted understanding of the phenomenon becomes the part of researcher’s cognitive personality. Review of literature on Cybercrime and Social Networking Sites is to find out what research has already been undertaken in the area of Cybercrime and Social Networking Sites, what type of the critical explanations have been given about this new technological crime which is spreading very fast all over the globe, what have been the causes behind occurrence of Online crime and what effect it reflects on Indian society. Besides all this, it is also worthwhile to find out what laws and legislations are present to deal with Cybercrime and issues related to Social media. As the subject of Cybercrime and social networking sites is new in the field of Sociology and Criminology, there is a paucity of literature in this area. Not only this, the available literature has many limitations as the area of Cybercrime and Social Networking is wide and dynamic. Many prominent classical sociologists have contributed towards the social thought on social order, effects of science and technology and crime in society. It is worthwhile to note their viewpoints before reviewing the current literature on technology and crime.  Morphing: Morphing is editing the original picture by unauthorized user or fake identity. It was identified that female’s pictures are downloaded by fake users and again Re-posted/uploaded on different websites by creating fake profiles aft editing it. The change smoothly from one image to another by small gradual steps using computer animation techniques. Morphing is a special effect in
  • 36. Social Media 34 motion pictures and animations that changes one image or shape into another through technological means or as part of a fantasy or surreal sequence.  Cyber Theft: Cyber Theft is a way of using a computer and Internet to steal money or in formation. This is also the most popular Cybercrime because the ability to steal from a distance reduces the risk of detection. Cyber Theft includes:  Cyber Embezzlement: Online embezzlement means misuse or alteration of data by an employee of a company who has legitimate access to the company’s computerized system and network. Example an employee misusing the company’s computerized payroll system in such a way that he is paid extra. Unlawful Appropriation wherein an individual gains access from outside the organization to transfer funds and modify documents in such a manner that it gives him legitimate right to property he doesn’t own. Unlawful appropriation differs from embezzlement as the offender is not interested with the valuables but gains access and transfers funds or modifies some information.  Corporate Espionage: Corporate Espionage- In this crime, an individual from inside/outside the company uses the network and steals marketing strategies, trade secrets, financial data, client lists etc. in order to gain a competitive advantage. In corporate or industrial espionage, the person uses the company’s network to steal trade secrets, financial data, confidential client lists, marketing strategies or information to gain a competitive edge.  Plagiarism: Plagiarism is to steal someone else’s original writing and call its own. This form of crime is increasing everywhere as more and more people have access to computers and internet. Piracyis is an unauthorized copying of copyrighted software, video, music, books, etc. which causes loss of revenue to the owner. Cyber piracy is the appropriation of new forms of intellectual property, in which the computer program expressed in the form of a digital code, generates through a
  • 37. Social Media 35 computer system virtual products’ such as images, music, office aids or interactive experiences. When cyberspace and intellectual property laws interact, they become a powerful force, especially in present day society where economic profit is quite important. Identity Theft- In this victim’s personal information is stolen by the criminal to commit financial frauds.  Cyber Fraud: Cyber Fraud another form of cybercrime which has a firm grip on society is cyber fraud and scams online. But, the problem with this is the lack of systematic and official data. Internet Crime Complain Centre (ICCC)16 is the only source available whose primary role is to receive public reports of cybercrime and refer them to the relevant criminal justice agencies fraction. Hani Duruy, an eBay spokesperson in USA, claims that frauds account for only 0.01% of transactions under taken using the site yet this would amount to 3000 frauds per day, given that more than 30 million actions taking place on eBay daily Cha (2005)17. The fact is that growing number of internet auction sites provide thieves a global market Through which they sell stolen items to unsuspecting customers. For example, a group of motorcycle thieves in Delhi and Punjab, who is mantled various bikes and sold them online as spare parts for Rs one lakh. Another form of reported fraud is non-delivery of items for which he victims have already paid. It can also include product in authenticity and misrepresentation of the condition of the item. In cases of shill hiding, the seller places false bids by either using multiple fake identities or aliases to place bids on their own items or by arranging for associates to place bids for the items with no intention of actually purchasing them. There after it becomes impossible for the legitimate
  • 38. Social Media 36 bidders to detect whether or not others are genuine buyers or shills. In recent years Phishing and spoofing frauds have increased.  CONCLUSION: The Study observes use of computers and the change in technology due to new advancements. This Study also cautions the security of internet users and relates this to emergence of Cybercrime. This Studies mentioned different types of cybercrime, discusses hacking as based on technical virtuosity. The advent of computer networking and the popularity of the internet have also given rise to excessive hacking. Not only this, Privacy is at stack because of widespread online transactions. Mostly people don’t know about Cybercrime and Cyber laws. So, today’s need to aware the society about different types of Cybercrimes and Cyber laws.xix 1.5 Laws against Cyber Crime and Role of PTA : Pakistan: National Assembly Passes New Cybercrime Law. (Sept. 21, 2016) On August 11, 2016, Pakistan's lower house, the National Assembly, passed a controversial cybercrime law called the Prevention of Electronic Crimes Act, 2016. The Senate had unanimously passed the law, with a number of amendments, in Sep 21, 2016. The Act introduces a range of offenses
  • 39. Social Media 37 involving the unauthorized access, transmission, copying, or interference in an information system or data.  Spreading False Information about an Individual: up to 3 Years in Prison or up to Rs. 1 Million in Fine or both. Whoever intentionally and publicly displays any information through any information system, which he knows to be false and intimidates or harms the reputation or privacy of a natural person, shall be punished with imprisonment for a term which may extend to three years or with fine which may extend to one million rupees or with both: Example  You know that an information is wrong and you still post or share it on Facebook about a person that damages his/her reputation Not to mention, this section will not apply where offense is committed by a broadcast media licensed under the Pakistan Electronic Media Regulatory Authority Ordinance, 2002 (XIII of 2002).  Cyber stalking: Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or both If you try to get into a relation with someone online through internet website, email, SMS, phone or any communication tool despite there is disinterest from the other party then you can be jailed for three years or imposed a fine which may extend to one million rupees or with both. Examples:  You repeatedly call someone, despite the other party asks you to not to  You send emails with no interest shown by the other party  You do something in a manner that other party is harassed out of your actions If you call, chat with someone and other party has no issues with that then its all cool, nothing to worry about.
  • 40. Social Media 38 Hacking Email / phone for Stalking: Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or both. If someone monitor a person through mail, text message or any other form of electronic communication then you can be jailed for up to three years and a fine of Rs. 1 Million or both Example: You hack someone with intent to a relation that you are in or may make and then monitors the email, this could land you in jail for up to three years. Making Videos/Pics and Distributing without Consent: Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or both. You take a photograph or make a video of any person and displays or distributes it without his/her consent in a manner that harms a person then you can go behind bars for up to three years and may have to bear a fine of up to Rs. 1 million or both Example: You take picture or video of someone and then posts in online to damage the other party Note: If you take pictures, videos and they are harmless or distribute it with the consent of other party then its all good. Cyber Stalking with a Minor: Up to 5 Years in Jail and up to Rs. 10 Million in Fine. If victim of the cyber stalking is a minor the punishment may extend to five years or with hue which may extend to ten million rupees or with both. Cyber stalking offences include:  Making contact in a manner that minor is harassed  Taking photographs, making videos and distributing them without consent  Blackmailing  Spying on minors
  • 41. Social Media 39 Hate speech: Up to 7 Years in Prison or fine or both. Whoever prepares or distributes information, through any information system or device that triggers inter-faith, sectarian or racial hatred, shall be punished with imprisonment for a term which may extend to seven years or with fine or with both. Examples:  You post messages on Facebook that can trigger inter-faith or sectarian avoidance  You write a blog that triggers ethnic hatred Spamming: Three Months of Prison or Fine up to Rs. 5 Million or Both. Anyone (an individual or an organization) can be fined with up to Rs. 50,000 for the first and three months of jail if they:  Send spam emails/SMS without permission of receiver  Send emails without unsubscribe options  Send emails with o harmful fraudulent emails o misleading email o illegal email Note: Every subsequent offenses (after first time) may increase the fine with multiples of Rs. 50,000 up to Rs. 5 million Spoofing: Up to 3 Years in Jail or Fine up to Rs. 500,00 or both . Whoever with dishonest intention establishes a website or sends any information with a counterfeit source intended to be believed by the recipient or visitor of the website to he an authentic source commits spoofing.
  • 42. Social Media 40 Malicious Code: Up to 2 Years in Jail or up to Rs. 1 Million in Fine or Both. Whoever writes, offers, makes available, distributes or transmits malicious code with intent to cause harm to any information system or data resulting in the corruption, destruction, alteration suppression, theft or loss of the information system or data shall be punished with imprisonment for a term which may extend to two years or with fine which may extend to one million rupees or with both. Examples:  You write a virus  You write a code that can be used to destruct a hard drive  You develop a mobile app to spy someone  Yo develop an app to spread virus  You DDoS attack someone Unauthorized Access to Information Systemor Data: Up to 3 Months Prison or up to Rs. 50,000 Fine or both. Law says that if you access any information system or data with dishonest intents then you can go to jail for up to three months or be liable to pay a fine up to Rs. 50,000 or both. It is wondered how the term “dishonest” is going to be defined by the litigators. Even worse, how are they going to establish if any attempt was dishonest or not. Examples:  Access to Information System means: Gaining access, control or ability to use any part or whole of an system that could be a laptop, mobile phone, tablet, or any other kind of computer system  Access to Data: Gaining access, control or ability to use any data or traffic data, i.e. an email, SMS, fax, print out, or any kind of computer data. Note: These punishments will be applicable if access to information is gained through infringing any security or otherwise.
  • 43. Social Media 41 Unauthorized copying or transmission of Data: Up to 6 Months Prison or up to Rs. 100,000 Fine or both. Whoever with dishonest intention and without authorization copies or otherwise transmits or causes to be transmitted any data shall be punished with imprisonment for a term which may extend to six months, or with fine which may extend to one hundred thousand rupees or with both. Examples:  If you copies data of someone else’s flash drive  If you gain access to someone’s phone and copy a mobile number  If you forward someone’s SMS to unintended people  You hack a website and copy its data  If you know a loophole in a website and copy data, say email addresses So anything which is not yours, you somehow gain access — through security infringement or otherwise — and you are proven to have copied data or transmitted it, then this section will get activated. Interference with information system or data: Up to 2 Years Prison or up to Rs. 500,000 Fine or both. Whoever with dishonest intention interferes with or damages any part or whole of an information system or data shall be punished with imprisonment which may extend to two years or with fine which may extend to five hundred thousand rupees or with both. Examples:  You hack a website and delete the content of the server  You gain access to someone’s mobile and delete its number  You gain access to someone’s Facebook account and delete it, partly or wholly  You gain access to someone’s Facebook account and post an update from his/her account  You gain access to someone’s email and send an email from his account  You send an SMS from someone’s mobile phone So anything which is not yours, and you change its data, or access it to take an action which may alter the content of that system or trigger a communication can land you in jail for two years or Rs. 500,000 fine or both.
  • 44. Social Media 42 Unauthorized access to critical infrastructure information system or data: Up to 3 Years Prison or up to Rs. 1 Million Fine or both. Whoever with dishonest intention gains unauthorized access to any critical infrastructure information system or data shall be punished with imprisonment which may extend to three years or with fine which may extend to one million rupees or with both. Examples:  You hack NADRA’s database and get an authorized access  You hack and intercept a fiber optic cable  You hack government of Pakistan’s website that’s maybe offering healthcare services  You hack and get access to Pakistan Stock Exchange  You hack in to Pakistan Army’s servers So anything which can cause detrimental damage, financially, socially, economically will be treated under this section Unauthorized copying or transmission of critical infrastructure data: Up to 5 Years Prison or up to Rs. 5 Million Fine or both. Whoever with dishonest intention and without authorization copies or otherwise transmits or causes to be transmitted any critical infrastructure data shall be punished with imprisonment for a term which may extend to five years, or with fine which may extend to five million rupees or with both. Examples:  You hack NADRA’s database and steal the data,  You hack and intercept a fiber optic cable and start listening to data  You hack government of Pakistan’s website that’s maybe offering healthcare services and copy the data  You hack and get access to Pakistan Stock Exchange and copy all the records
  • 45. Social Media 43  You hack in to Pakistan Army’s servers and copy the data and forward it your friend Interference with critical infrastructure information system or data: Up to 7 Years Prison or up to Rs. 10 Million Fine or both. Whoever with dishonest intention interferes with or damages any part or whole of a critical information system, or data shall be punished with imprisonment which may extend to seven years or with fine which may extend to ten million rupees or with both. Examples:  You hack NADRA’s database and delete everything  You hack and intercept a fiber optic cable and start transmitting it to someone  You hack government of Pakistan’s website that’s maybe offering healthcare services and copy the data and start selling it  You hack and get access to Pakistan Stock Exchange and copy all the records and then delete them from server  You hack in to Pakistan Army’s servers and copy the data and then delete it from the server Glorification of an offence: Up to 7 Years Prison or up to Rs. 10 Million Fine or both. Whoever prepares or spreads information through any information system or device with the intent to glorify an offence relating to terrorism, or any person convicted of a crime relating to terrorism, or activities of prescribed organizations or individuals or groups shall be punished with imprisonment for a term which may extend to seven years or with fine which may extend to ten million rupees or with both. Examples:  You post on Facebook about Talibaan and say that they are good people  You SMS someone and say that Al-Qaida people will go to heaven  You come on TV and start praising banned outfit
  • 46. Social Media 44  You own a website that preaches about suicide bombing  You run a YouTube channel and there you say good things about anyone who has been convicted of terrorism Cyber terrorism: Up to 14 Years in Prison or up to Rs. 50 Million fine or both. Whoever accesses, copies or destroys any critical information system with an intent to create a sense of fear, panic or insecurity in the Government or the public or a section of the public or community or sect or create a sense of fear or insecurity in society can be punished with imprisonment of either description for a term which may extend to 14 years or that fine which may be extended to 50 million rupees or with both. Examples:  You gain access to back-end system of a TV channel and start broadcasting a message that may create panic  You gain access to back-end of a mobile company and start broadcasting a message that may trigger fear Online Recruitment, Funding of Terrorism: Up to 7 Years in Prison or fine or both. Whoever prepares or distributes information, through any information system or device that invites or motivates to fund, or recruits people for terrorism or plans for terrorism shall be punished with imprisonment for a term which may extend to seven years or with fine or with both. Examples:  You run a Facebook group and encourage people to fund TTP  You run a WhatsApp group and plan a terror attack
  • 47. Social Media 45 Electronic forgery: Up to 3 Years in Prison or up to Rs. 250,000 fine or both. Whoever interferes with or uses any information system, device or data, with the intent to cause damage or injury to the public or to any person, or to make any illegal claim or title or to cause any person to part with property or to enter into any express or implied contract, or with intent to commit fraud by any input, alteration, deletion, or suppression of data, resulting in unauthentic data with the intent that it be considered or acted upon for legal purposes as if’ it were authentic, regardless of the fact that the data is directly readable and intelligible or not shall he punished with imprisonment of either description for a term which may extend to three years or with line which may extend to two hundred and fifty thousand rupees or with both. Examples:  Change a contract/ agreement / invoice with intent to gain legal benefit Electronic forgery of Critical Infrastructure: Up to 7 Years in Prison or up to Rs. 5 Million fine or both. If any of electronic forgery is done in relation to critical infrastructure information system or data shall be punished with imprisonment for a term which may extend to seven years or with fine which may extend to five million rupees or with both. Examples:  You electronically change a contract that may result into detrimental loss to a company in magnitude Electronic fraud: Up to 2 Years in Prison or up to Rs. 10 Million fine or both. Whoever with the intent for wrongful gain interferes with or uses any information system, device or data or induces any person to enter into a relationship or deceives any person, which act or omission is likely to cause damage or harm to that person or any other person shall be punished with imprisonment for a term which may extend to two years or with fine which may extend to ten million rupees or with both. Examples  You get into a relationship with someone with intents to cause financial damage
  • 48. Social Media 46 Making, obtaining, or supplying device for use in offence: Up to six months in Prison or up to Rs. 50,000 fine or both. Whoever produces, makes, generates, adapts, exports, supplies, offers to supply or imports for use any information system, data or device, with the intent to he used or believing that it is primarily to he used to commit or to assist in the commission of an offence under this Act will be punished with imprisonment for a term which may extend to six months or with fine which may extend to fifty thousand rupees or with both. Examples  You make a software to hack a website  You manufacture a special purpose phone to communicate for planning an attack  You write code to steal data  You develop a phishing page Unauthorized use of identity information: Up to 3 Years in Prison or up to Rs. 5 Million fine or both. Whoever obtains, sells, possesses, transmits or uses another person’s identity information without authorization shall be punished with imprisonment for a term which may extend to three years or with fine which may extend to five million rupees, or with both. Examples:  You use someone’s email address to pose as someone you aren’t  You call someone and claim you are a person which you are not Unauthorized issuance of SIM cards etc: Up to 3 Years in Prison or Up to Rs. 500,000 in fine or both. Whoever sells or otherwise provide SIM card without obtaining and verification of the subscriber’s details in a manner that’s not allowed by PTA, will be punished with imprisonment for a term which may extend to three years with or with fine which may extend to five hundred thousand rupees or with both Examples:  You sell SIM cards without verifying data  You provide a SIM card to someone else for usage, even temporarily
  • 49. Social Media 47 Tampering of communication equipment: Up to 3 Years in Prison or Up to Rs. 1 Million in fine or both. Whoever unlawfully or without authorization changes, alters, tampers with or re- programs any communication equipment including a cellular or wireless handset and starts using or marketing such device for transmitting and receiving information shall be shall be punished with imprisonment which may extend to three years or with fine which may extend to one million rupees or with both. Example  You install a spy mobile app that can record calls and SMS and is able to send this data in email to you or someone else Unauthorized interception: Up to 2 Years in Prison or Up to Rs. 500,000 in fine or both. Whoever with dishonest intention commits unauthorized interception by technical means of  any transmission that is not intended to be and is not open to the public, from or within an information system  electromagnetic emissions from an information system that are carrying data Shall be punished with imprisonment of either description for a term which may extend to two years or with fine which may extend to five hundred thousand rupees or with both.xx Role of PTA: ISLAMABAD - Pakistan Telecommunication Authority (PTA) has established a Cyber Vigilance Division (CVD) to handle complaints against unlawful online content under Prevention of Electronic Crimes Act (PECA). In order to handle this gigantic role, PTA has also developed a Standard Operating Procedure (SOP) for lodging complaints and their disposal has been developed accordingly. All such contents which are hosted on unsecured websites is being currently handled through telecom operators of Pakistan and same is being done by PTA itself through an automated system. On the contrary, any content which is unlawful and hosted on secured web site is handled differently. The popular social media websites like Facebook, YouTube and twitter etc. are a few examples of secured websites which are hosted out side of physical boundaries of Pakistan. As
  • 50. Social Media 48 per PTA’s latest report, the Authority, in this regard, has developed close liaison with all such platforms to honor requests made for removal of such content. It said historically and predominantly, PTA has been acting under functions and powers given by Pakistan Telecom (Re- organization) Act, 1996. However, with development and growth of World Wide Web (www), PTA has been entrusted upon responsibilities for blocking/removing of any content which is declared unlawful under relevant provisions of the law. This responsibility was handed over to PTA under Prevention of Electronic Crimes Act (PECA), 2016. Since the promulgation of PECA, PTA stands committed to its responsibilities to facilitate aggrieved Internet users and stakeholders, including but not limited to government organizations, public offices, business entities and other agencies. In this course, PECA also identifies the areas under which blocking/removal of unlawful content would be addressed which are “against the glory of Islam, against the integrity, security and defense of Pakistan, public order, contempt of court, against decency & morality and incitement of any offices under section 37 of the PECA, 2016”. The complaints received with PTA against unlawful online content including Anti State, Anti Judiciary, Blasphemy etc. In this regard, PTA has blocked 824,878 URLs so far which came in its jurisdiction under PECA. It is pertinent to mention that users of social media must act responsibly while using and accessing such platforms and should honor the norms of society and laws of the land. In case of objectionable content is observed by any user, these platforms are open to receive complaints from valuable users directly. Relatively high value is given to complainant/users who report to platforms any objectionable material directly. Those complaints which are not addressed by these platforms in the first instance can be reported to PTA at info@pta.gov.pk for escalating the matter. xxi
  • 51. Social Media 49 Implementation: In July 2017, a man in Peshawar was jailed for 12 years for creating a fake Facebook profile of a woman and then blackmailing her. The convict, Muhammad Munir, was arrested by the FIA in March 2015, under the Electronics Transaction Ordinance 2002. He was also ordered to pay a Rs0.3 million fine. The duration of the sentence, which was handed down by Additional Sessions Judge Usman Ali, was unprecedented in Pakistan’s history of cybercrime cases.xxii Reporting of cybercrimes, especially the harassment and blackmailing of women, has increased sharply in Pakistan in the last three years, Dawn News TV reported on Tuesday citing figures releasedby the Federal Investigation Agency (FIA). The agency said that its cybercrime circle has so far conducted 2,295 inquiries, registered 255 cases and made 209 arrests in 2018 — all highest since the Prevention of Electronic Crimes Act (Peca), 2016 was enforced. The corresponding figures for 2017 were 1,290 inquiries, 207 cases registered and 160 arrests made, whereas figures for 2016 stood at 514, 47 and 49. The FIA admitted that cybercrimes are on the rise in Pakistan but added that "the government's recent measure to establish 15 new cybercrime reporting centers" will help control the situation. In June, FIA Cybercrimes Director retired Captain Mohammad Shoaib had told a Senate standing committee that the agency only has 10 experts to investigate cybercrimes in the country.xxiii
  • 52. Social Media 50 References: i Kuss, D. J., & Griffiths, M. D. (2011). Online social networking and addiction—a review of the psychological literature. International journal of environmental research and public health, 8(9), 3528- 3552. ii Peng, T., Leckie, C., & Ramamohanarao, K. (2007). Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Computing Surveys (CSUR), 39 iii Wolak, J., Mitchell, K., & Finkelhor, D. (2007). Unwanted and wanted exposure to online pornography in a national sample of youth Internet users. Pediatrics, 119(2), 247-257. iv Kuss, D. J., & Griffiths, M. D. (2011). Online social networking and addiction—a review of the psychological literature. International journal of environmental research and public health, 8(9), 3528- 3552. v Mander, J., & McGrath, F. (2015). GWI device summary: GlobalWebIndex’s quarterly report on the latest trends for smartphones, tablets, smart TVs and wearables. GlobalWebIndex 2015. vi Brewer, J. (2013). The pleasures of the imagination: English culture in the eighteenth century. Routledge. vii https://www.internetworldstats.com/stats.htm viii https://www.internetworldstats.com/stats3.htm ix https://courses.lumenlearning.com/alamo-sociology/chapter/reading-theoretical-perspectives-on-media-and- technology/ x https://sailemagazine.com/2017/09/how-new-media-is-sculpting-our-social-norms/#.XFVcVJMzbIU xi http://sk.sagepub.com/reference/behavioralsciences/n2431.xml xii EŞİTTİ, Ş. (2016). Narcotizing Effect of Social Media. Journal of the Institute of Social Sciences Cankiri Karatekin University/Cankiri Karatekin Üniversitesi Sosyal Bilimler Enstitusu Dergisi, 7(1). xiii http://nourilrb.blogspot.com/p/blog-page_17.html xiv Elmore,Tim. “The Real Purposeof Social Media.Tim Elmore.” Growing Leaders. N.p., 24 Jan.2017.Web . 06 Feb. 2017. xv http://www.sociologyguide.com/sociology-of-social-media/ xvi https://opentextbc.ca/introductiontosociology/chapter/chapter8-media-and-technology/ xvii https://opentextbc.ca/introductiontosociology/chapter/chapter8-media-and-technology/ xviii https://www.realsimple.com/work-life/technology/social-media-addiction xix Brenner,W.Susan(2010), Cybercrime:Criminal threatsfromcyberspace.GreenwoodPublishing group,Westport Cross,Michael and Shinder,LittlejohnDebra(2008).Scene of the Cybercrime,SyngressPublishingInc, USA. Flemming,P.andStohl,M. (2000), Myths and Realitiesof Cyberterrorism,InternationalConference on CounteringTerrorismthroughEnhancedInternational Cooperation,22-24Sept.2000, Italy. Furnell,Steven(2002),Cybercrime:Vandalizingthe informationSociety,Addison-Wesley,Boston. Higgins,George (2010), Cybercrime:AnIntroductiontoanEmergingPhenomenon,McGraw Hill Publishing,New York. Holt,Thomas J (2011), Crime Online:CorrelatesCausesandContexts.Durham, CarolineAcademicPress, USA. Indiaisnowworld’sthirdlargestInternetuserafterU.S.andChina;The Hindu;Aug 24,2013
  • 53. Social Media 51 Jaishankar,K.(2001).CyberCriminology:ExploringInternetCrimesandCriminalBehaviour.CRCPress: Taylorand FrancisGroup. KeralaState Legal Service Authority,Cochin(2013) LessonsinLaw.CochinPrintedPvt. Ltd.Eloor. SkinnerW.F.and FreamA.M. (1927), A Social Learningtheoryanalysisof computerCrime Among College Students,Journal of ResearchinCrime andDelilnquency,Vol34,495-518. Sutherland,EdwinH. (1924), Principlesof Criminology,University of ChicagoPress,Chicago. Wall,DavidS (2001), Crime andthe Internet,Routledge,London. http://cybercrime.planetindia.net/intro.htm20/11/201 http://www.cyberlawsindia.net/black-hatml.7/4/2015[13] http://www.stopcyberbulling.org/what-is- cyberbulling-exactly.html.21/3/2015 http://www.cyberkeralam.in8888/common/cybersecurity.jsp.2/11/2014 http://www.interpol.int/public/technologycrime/crimeprev/itsecurity.asp#21/4/2015 xx https://propakistani.pk/2016/08/05/must-read-list-of-cyber-crimes-and-their-punishments-in-pakistan/ xxi https://nation.com.pk/21-Jan-2019/pta-sets-up-cyber-vigilance-division xxii https://www.pakistantoday.com.pk/2019/01/23/man-sentenced-to-eight-years-for-uploading-womens- pictures-to-facebook/ xxiii https://www.dawn.com/news/1440854