SlideShare una empresa de Scribd logo
1 de 8
Due to Australia’s first social networking related conviction occurring last month, now
more than ever social media users need education on the potential damaging effects
                          of material posted on online platforms.
The study conducted primarily at the University of New South Wales in
Kensington has revealed social media platforms are raising huge issues in
   terms of privacy, copyright, employment, bullying and harassment
The Director of the Cyberspace Law and Policy Community at
UNSW, Alana Maurushat believes cybercrime education should start at
year one, so young Australians can learn the responsibilities of posting
                            material online
Alec Christie, a partner at law firm DLA Piper confirms a way to check if your
content is suitable to be posted online is through the ‘front page test’. ‘If you are
  going to go online and publish something online, you need to test it against
 would I be able to publish this on the front page of the Sydney Morning Herald
                                     tomorrow’.
David Vaile from the Cyberspace Law and Policy Centre from UNSW
 emphasises the importance for users of the Internet to understand that the
  law applies to online platforms just as it applies in the traditional world.
'Because it’s not a physical thing, people just think it's just moving a file, it's
                  just posting a photograph’ Vaile explains.
Problems lie with Internet users as they are unaware of the definition of
   ‘indecent’. Alec Christie puts it simply ‘There are no hard and fast
           rules, but it’s what would make you and I blush'.
Joanne, a Criminology student at the University of New South Wales has
   experienced cybercrime problems involving her brother, as he faces
bullying over Facebook. ‘He doesn’t know what to do, he just hates school
                                  now’.
Despite a Law Reform Commission Report being produced four years ago
  based on privacy concerns, no laws have been changed or altered with
regards to an individuals right to privacy which is affecting the legal systems
                       ability to deal with cybercrime.

Más contenido relacionado

La actualidad más candente

URMA Conference 2009
URMA Conference 2009URMA Conference 2009
URMA Conference 2009Art Upton
 
Artifact 2 cyberbullying
Artifact 2 cyberbullyingArtifact 2 cyberbullying
Artifact 2 cyberbullyinghgraffam
 
Teachingdigitalresponsibility
TeachingdigitalresponsibilityTeachingdigitalresponsibility
Teachingdigitalresponsibilitykgehres
 
How will killing Net Neutrality impact education?
How will killing Net Neutrality impact education?How will killing Net Neutrality impact education?
How will killing Net Neutrality impact education?Jacklin Berry
 
Wingate copyright critique portfolio
Wingate copyright critique portfolioWingate copyright critique portfolio
Wingate copyright critique portfolioNicole Wingate
 
Cyberethics accompanying text
Cyberethics accompanying text Cyberethics accompanying text
Cyberethics accompanying text Geoffrey Lowe
 
Digiteen and Digiteacher
Digiteen and DigiteacherDigiteen and Digiteacher
Digiteen and DigiteacherJulie Lindsay
 
The Promise of Networks: How Social Connections = Social Impact
The Promise of Networks: How Social Connections = Social ImpactThe Promise of Networks: How Social Connections = Social Impact
The Promise of Networks: How Social Connections = Social Impactdianascearce
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriersJohn Oxley
 
The Impact of Social Media on Reputation Management – navigating a new legal ...
The Impact of Social Media on Reputation Management – navigating a new legal ...The Impact of Social Media on Reputation Management – navigating a new legal ...
The Impact of Social Media on Reputation Management – navigating a new legal ...Insignia Communications
 
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic DialogueNL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic DialogueMichael Barbour
 

La actualidad más candente (17)

URMA Conference 2009
URMA Conference 2009URMA Conference 2009
URMA Conference 2009
 
Artifact 2 cyberbullying
Artifact 2 cyberbullyingArtifact 2 cyberbullying
Artifact 2 cyberbullying
 
Teachingdigitalresponsibility
TeachingdigitalresponsibilityTeachingdigitalresponsibility
Teachingdigitalresponsibility
 
How will killing Net Neutrality impact education?
How will killing Net Neutrality impact education?How will killing Net Neutrality impact education?
How will killing Net Neutrality impact education?
 
Public Computer Services At CPL
Public Computer Services At CPLPublic Computer Services At CPL
Public Computer Services At CPL
 
Public Computer Services At CPL
Public Computer Services At CPLPublic Computer Services At CPL
Public Computer Services At CPL
 
Wingate copyright critique portfolio
Wingate copyright critique portfolioWingate copyright critique portfolio
Wingate copyright critique portfolio
 
Social Media Policy
Social Media PolicySocial Media Policy
Social Media Policy
 
Making the connection
Making the connectionMaking the connection
Making the connection
 
Wingate Policy Paper
Wingate Policy PaperWingate Policy Paper
Wingate Policy Paper
 
Staying legal: the law surrounding Web2.0
Staying legal: the law surrounding Web2.0Staying legal: the law surrounding Web2.0
Staying legal: the law surrounding Web2.0
 
Cyberethics accompanying text
Cyberethics accompanying text Cyberethics accompanying text
Cyberethics accompanying text
 
Digiteen and Digiteacher
Digiteen and DigiteacherDigiteen and Digiteacher
Digiteen and Digiteacher
 
The Promise of Networks: How Social Connections = Social Impact
The Promise of Networks: How Social Connections = Social ImpactThe Promise of Networks: How Social Connections = Social Impact
The Promise of Networks: How Social Connections = Social Impact
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
The Impact of Social Media on Reputation Management – navigating a new legal ...
The Impact of Social Media on Reputation Management – navigating a new legal ...The Impact of Social Media on Reputation Management – navigating a new legal ...
The Impact of Social Media on Reputation Management – navigating a new legal ...
 
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic DialogueNL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
 

Destacado

Cyber-Crime e Social Media
Cyber-Crime e Social MediaCyber-Crime e Social Media
Cyber-Crime e Social MediaManager.it
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; familyDr.Keshav Sathaye
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldJohn Palfreyman
 
Instant Checkmate Background Check Glossary
Instant Checkmate Background Check GlossaryInstant Checkmate Background Check Glossary
Instant Checkmate Background Check GlossaryInstant Checkmate
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...SlideShare
 

Destacado (8)

Facebook
FacebookFacebook
Facebook
 
Cyber-Crime e Social Media
Cyber-Crime e Social MediaCyber-Crime e Social Media
Cyber-Crime e Social Media
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
 
Instant Checkmate Background Check Glossary
Instant Checkmate Background Check GlossaryInstant Checkmate Background Check Glossary
Instant Checkmate Background Check Glossary
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
 

Similar a Cyber Crime and Social Media

Edge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingEdge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingDr. Conrath
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersMemorial University
 
Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)Professor Mary Aiken
 
Presentation slides
Presentation slidesPresentation slides
Presentation slidesandrewdyoung
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write upvictoriahoo
 
Encyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety PresentationEncyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety Presentationqgecko
 
Age Verification / “Doing the Right Thing”
Age Verification / “Doing the Right Thing”Age Verification / “Doing the Right Thing”
Age Verification / “Doing the Right Thing”IDology, Inc
 
Jacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o scriptJacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o scriptJacque Lewis
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxtodd521
 
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...Vishni Ganepola
 
It’s time to talk about privacy
It’s time to talk about privacyIt’s time to talk about privacy
It’s time to talk about privacylearnafrica2
 
Running head FINAL PAPER .docx
 Running head FINAL PAPER                                      .docx Running head FINAL PAPER                                      .docx
Running head FINAL PAPER .docxMARRY7
 
SummaryReport-TitleIXandCampusSexualAssaultSomos-2
SummaryReport-TitleIXandCampusSexualAssaultSomos-2SummaryReport-TitleIXandCampusSexualAssaultSomos-2
SummaryReport-TitleIXandCampusSexualAssaultSomos-2Claudia Wald
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber pathProfsdetchana Murthy
 
Coalition 2013 election policy – enhance online safety final
Coalition 2013 election policy – enhance online safety   finalCoalition 2013 election policy – enhance online safety   final
Coalition 2013 election policy – enhance online safety finalLisandro Mierez
 

Similar a Cyber Crime and Social Media (20)

Edge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingEdge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullying
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
 
Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write up
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Internet Law Primer
Internet Law PrimerInternet Law Primer
Internet Law Primer
 
Encyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety PresentationEncyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety Presentation
 
Age Verification / “Doing the Right Thing”
Age Verification / “Doing the Right Thing”Age Verification / “Doing the Right Thing”
Age Verification / “Doing the Right Thing”
 
Jacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o scriptJacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o script
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
 
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
 
It’s time to talk about privacy
It’s time to talk about privacyIt’s time to talk about privacy
It’s time to talk about privacy
 
Running head FINAL PAPER .docx
 Running head FINAL PAPER                                      .docx Running head FINAL PAPER                                      .docx
Running head FINAL PAPER .docx
 
SummaryReport-TitleIXandCampusSexualAssaultSomos-2
SummaryReport-TitleIXandCampusSexualAssaultSomos-2SummaryReport-TitleIXandCampusSexualAssaultSomos-2
SummaryReport-TitleIXandCampusSexualAssaultSomos-2
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber path
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
Coalition 2013 election policy – enhance online safety final
Coalition 2013 election policy – enhance online safety   finalCoalition 2013 election policy – enhance online safety   final
Coalition 2013 election policy – enhance online safety final
 

Último

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Último (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Cyber Crime and Social Media

  • 1. Due to Australia’s first social networking related conviction occurring last month, now more than ever social media users need education on the potential damaging effects of material posted on online platforms.
  • 2. The study conducted primarily at the University of New South Wales in Kensington has revealed social media platforms are raising huge issues in terms of privacy, copyright, employment, bullying and harassment
  • 3. The Director of the Cyberspace Law and Policy Community at UNSW, Alana Maurushat believes cybercrime education should start at year one, so young Australians can learn the responsibilities of posting material online
  • 4. Alec Christie, a partner at law firm DLA Piper confirms a way to check if your content is suitable to be posted online is through the ‘front page test’. ‘If you are going to go online and publish something online, you need to test it against would I be able to publish this on the front page of the Sydney Morning Herald tomorrow’.
  • 5. David Vaile from the Cyberspace Law and Policy Centre from UNSW emphasises the importance for users of the Internet to understand that the law applies to online platforms just as it applies in the traditional world. 'Because it’s not a physical thing, people just think it's just moving a file, it's just posting a photograph’ Vaile explains.
  • 6. Problems lie with Internet users as they are unaware of the definition of ‘indecent’. Alec Christie puts it simply ‘There are no hard and fast rules, but it’s what would make you and I blush'.
  • 7. Joanne, a Criminology student at the University of New South Wales has experienced cybercrime problems involving her brother, as he faces bullying over Facebook. ‘He doesn’t know what to do, he just hates school now’.
  • 8. Despite a Law Reform Commission Report being produced four years ago based on privacy concerns, no laws have been changed or altered with regards to an individuals right to privacy which is affecting the legal systems ability to deal with cybercrime.