regulating online speech - lirneasia

Post on 15-Feb-2022

1 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Regulating Online Speech

Nay Phone Latt

Fake Photo – � � � � � � � � � � � � � �

Verifying Photo

• www.tineye.com

• Google (Search by Image)• Google (Search by Image)

• www.metapicz.com

Hate Speech & Incitement� � � � � � � � � � � � � � � � � � � � � � � �

� � � � � � � � � � � � �႕

Hate Speech

• Hate Speech (� � � � � � � � � � ) � � � � �

� � � � � � � � � � � � � � � � � � �

� � � � � � � � � � � � � � � � � � � � � �� � � � � � � � � � � � � � � � � � � � � �

� � � � � � �႕ ႕ � � � � � � � � � � � � �

� � � � � � � � � � � � �

� � � � � � � � � � � � � � � � � � � �

� � � � � � � � � � � � � � � � � � � � � � � � � � � � � �

� � � � � � � � � � � � � � � � � � � �

• � � � � � � � � � � (Hate Speech) � � � � � �

� � � � � � � � � � ႕

� � � � � � � � � � � � � � � � � � � � � � � � � � �႕

� � � � � � � � � � � � � � � � � � � � � � � � � � � �

� � � � � � � � � � � � � � � � � � � � � � � � � � � �

� � � � � � � � � � � � � �

� � � � � � � � � � � � � � � � �

� � � � � � � � � � � ႕ � � � �

� � � � � � � � � � � � � � � � � � � (� � � ႕ )

Dangerous Speech

� � � � � � � � � � � � � � � � � � � � �

• Powerful Speaker

• Audience

• Media• Media

• Historical fact

Defamation� � � � � � � � � � � � � � �

Coming Soon …Coming Soon …

Cyberbullying

� � � � � � � � � � � � � � � � � � � � � � � �

� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � �

� � � � � � � � ႕ � � � � � � � � � � � � � � � � � � � � � � �

� � � � � � � � � ႕ � � � � � � � � � � � � �

� � � � � � � � � � � � � � � � � � � � �

� � � � � � � � � � � � � � � � � � � � � �

Cyberbullying is the use of the Internet and related Cyberbullying is the use of the Internet and related technologies to harm other people, in a deliberate,

repeated, and hostile manner.

Phishing� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � �

� � � � � � � � � � � � � � � � � � � � � � � � � � � � � �

� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � �

� � � � � � � � � � � � � � � � � �

� � � � � � � � � �႕ � � � � � � � � � � � � � � � � � � � � � �

Phishing is the act of attempting to acquire information such

as usernames, passwords, and credit card details (and as usernames, passwords, and credit card details (and

sometimes, indirectly, money) by masquerading as a

trustworthy entity in an electronic communication.

Sexting� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � �

� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � ႕� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � �

Sexting is the act of sending sexually explicit messages and/or

photographs, primarily between mobile phones.

ASAP – As soon as possible

LOL – Laugh Out Loud

ASL PLS – Age, Sex, Location Please

B4 – Before

CUL – See You Later

HAND – Have A Nice DayHAND – Have A Nice Day

BTW – By The Way

F4E – Friend Forever

Gr8 – Great

L8r - Later

Child pornography

• � � � � � � � � � � � � � � � � � � �

� � � � � � � � � � � � � � � � � � � � � � � � � � � � � �

� � � � � � � � � � � � � �

� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � �

� � � � � � � � � � � � � � � � � � � � � �

• Child pornography refers to pornography depicting sexually

explicit activities involving a child.

Child grooming

• Child grooming refers to actions deliberately undertaken with

the aim of befriending and establishing an emotional

connection with a child, to lower the child's inhibitions in

preparation for sexual activity with the child, or exploitation

(such as child labour—see trafficking of children).(such as child labour—see trafficking of children).

Hackers

• The term "white hat" in Internet slang refers to an ethical computer

hacker, or a computer security expert, who specializes in

penetration testing and in other testing methodologies to ensure

the security of an organization's information systems.[

• A "black hat" hacker is a hacker who "violates computer security for

little reason beyond maliciousness or for personal gain“little reason beyond maliciousness or for personal gain“

• A grey hat hacker is a combination of a Black Hat and a White Hat

Hacker. A Grey Hat Hacker may surf the internet and hack into a

computer system for the sole purpose of notifying the

administrator that their system has been hacked, for example. Then

they may offer to repair their system for a small fee.

Thank you for your attention.

Nay Phone LattNay Phone Latt

(Executive Director)

Myanmar ICT For Development Organization

(MIDO)

nayphonelatt@gmail.com

095047281

Facebook Account – Nay P Latt

top related