Regulating Online Speech Nay Phone Latt Fake Photo – ဓဓဓဓဓဓဓဓဓဓဓဓဓဓ Verifying Photo • www.tineye.com • Google (Search by Image) • www.metapicz.com.

Download Report

Transcript Regulating Online Speech Nay Phone Latt Fake Photo – ဓဓဓဓဓဓဓဓဓဓဓဓဓဓ Verifying Photo • www.tineye.com • Google (Search by Image) • www.metapicz.com.

Regulating Online Speech
Nay Phone Latt
Fake Photo – ဓဓဓဓဓဓဓဓဓဓဓဓဓဓ
Verifying Photo
• www.tineye.com
• Google (Search by Image)
• www.metapicz.com
Hate Speech & Incitement
ဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓ ဓ
ဓဓဓဓဓဓဓဓဓဓဓဓဓဓ
Hate Speech
• Hate
Speech
(ဓဓဓဓဓဓဓဓဓဓ)
ဓဓဓဓဓဓဓဓဓဓ
ဓဓဓဓဓ
ဓဓဓဓဓဓဓဓဓ
ဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓ
ဓဓဓဓဓဓဓဓဓ
ဓဓဓဓဓဓဓဓ
ဓဓဓဓဓ
ဓဓဓဓဓဓဓဓဓဓဓဓဓ
ဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓ
ဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓ
ဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓ
ဓဓဓဓ
• ဓဓဓဓဓဓဓဓဓဓ
(Hate
Speech)
ဓဓဓဓဓဓ
ဓဓဓဓဓဓဓဓဓဓဓ
ဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓ
ဓဓဓဓဓဓ ဓဓဓဓဓဓ ဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓ
ဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓ ဓဓဓဓဓဓ
ဓဓဓဓဓဓဓဓဓဓဓဓဓဓ
ဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓ
ဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓ
Dangerous Speech
ဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓ
•
•
•
•
Powerful Speaker
Audience
Media
Historical fact
Defamation
ဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓ
Coming Soon …
Cyberbullying
ဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓ ဓဓဓဓဓဓ
ဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓ ဓဓဓဓဓဓဓဓဓဓဓ
ဓဓဓဓဓဓဓဓဓ ဓဓဓဓဓဓဓဓဓဓဓ ဓဓဓဓဓဓဓဓဓဓဓဓ
ဓဓဓဓဓဓဓဓဓဓ ဓဓဓဓဓဓဓဓဓဓဓဓဓ
ဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓ
ဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓ
Cyberbullying is the use of the Internet and related
technologies to harm other people, in a deliberate,
repeated, and hostile manner.
Phishing
ဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓ ဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓ
ဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓ ဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓ
ဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓ ဓဓဓဓဓဓဓဓဓ ဓဓဓဓဓဓဓဓဓဓ
ဓဓဓဓဓဓဓဓဓ ဓဓဓဓဓဓဓဓဓ
ဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓ ဓဓဓဓဓဓဓဓ
Phishing is the act of attempting to acquire information such
as usernames, passwords, and credit card details (and
sometimes, indirectly, money) by masquerading as a
trustworthy entity in an electronic communication.
Sexting
ဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓ ဓဓဓဓဓဓဓဓဓဓဓဓဓ ဓဓဓဓဓဓဓဓဓဓဓ
ဓဓဓ ဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓ ဓဓဓဓဓဓဓ
ဓဓဓဓဓဓဓဓဓဓ ဓဓဓဓဓဓဓဓဓဓဓဓဓဓ ဓဓဓဓဓဓဓဓဓ
Sexting is the act of sending sexually explicit messages and/or
photographs, primarily between mobile phones.
ASAP – As soon as possible
LOL – Laugh Out Loud
ASL PLS – Age, Sex, Location Please
B4 – Before
CUL – See You Later
HAND – Have A Nice Day
BTW – By The Way
F4E – Friend Forever
Gr8 – Great
L8r - Later
Child pornography
• ဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓ
ဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓ
ဓဓဓဓဓဓဓဓဓဓဓဓဓဓ
ဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓဓ ဓဓဓ
ဓဓဓဓဓဓဓဓဓဓဓဓဓ ဓဓဓဓဓဓဓဓဓ
• Child pornography refers to pornography depicting sexually
explicit activities involving a child.
Child grooming
• Child grooming refers to actions deliberately undertaken with
the aim of befriending and establishing an emotional
connection with a child, to lower the child's inhibitions in
preparation for sexual activity with the child, or exploitation
(such as child labour—see trafficking of children).
Hackers
• The term "white hat" in Internet slang refers to an ethical computer
hacker, or a computer security expert, who specializes in
penetration testing and in other testing methodologies to ensure
the security of an organization's information systems.[
• A "black hat" hacker is a hacker who "violates computer security for
little reason beyond maliciousness or for personal gain“
• A grey hat hacker is a combination of a Black Hat and a White Hat
Hacker. A Grey Hat Hacker may surf the internet and hack into a
computer system for the sole purpose of notifying the
administrator that their system has been hacked, for example. Then
they may offer to repair their system for a small fee.
Thank you for your attention.
Nay Phone Latt
(Executive Director)
Myanmar ICT For Development Organization
(MIDO)
[email protected]
095047281
Facebook Account – Nay P Latt