SlideShare a Scribd company logo
Cyber-bullying  網上欺凌 Social, Economic and Political Perspectives For Rotary Club of Central Charles Mok Internet Society Hong Kong August 4, 2010
What is Cyber-bullying  網上欺凌 When the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person (National Crime Prevention Council, USA) A situation when a child or teen is repeatedly 'tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted' by another child or teenager using text messaging, email, instant messaging or any other type of digital technology (StopCyberbullying.org)
It's nothing new? Compared to traditional or physical bullying Anonymity of attackers Often involves personal data (privacy) Widespread effect; difficult to remove Difficult to avoid  Psychological vs physical effect
Notable overseas cases Ryan Halligan (1989-2003) –  committed suicide in Vermont after repeatedly bullied by classmates and being sent IM messages accusing him of being gay Magan Meier (1992-2006) –  committed suicide after being  bullied on MySpace by one of her friends' mother, and a neighbor,  Lori Drew, pretending to be a  young boy (Josh Evans).
Local cases 港女大鬧元朗聯興行事件 女事主不滿店長要求旺角分店將貨 品價格修正而發生口角,女事主更 拍攝片段以博取網民同情;女事主 遭起底 大學生被指推女朋友落樓梯事件 有人聲稱從 xanga 轉貼一篇文章, 指一名徐姓男生把懷孕的女朋友推 下樓梯;男事主遭起底,支持與反 對男事主的網民激辯。 算不算:巴士阿叔?陳冠希?
Implications Are these cases unique to the cyber world? How to balance the public's right to know – public good, or when concerning public figures, who are public figures? How to define cyber-bullying if handle by legislation?  Will they be effective? Exposing subject's identity  人肉搜尋、起底
Legislative attempts Several US states pursuing legislations Some city ordinances passed, making online harassment a misdemeanor Problematic to define: 'coerce, intimidate, harass or cause other substantial emotional stress'? California State Assembly Bill 86 2008 gives school the authority to discipline students for bullying others offline or online
Bullying, news, or public interest?
導遊阿珍
霸王
維基解密  (WikiLeaks)
莫乃光  Charles Mok [email_address] http://www.charlesmok.hk http://www.isoc.hk

More Related Content

What's hot

Hazing (1)
Hazing (1)Hazing (1)
Hazing (1)
awoooooooooo
 
Affirmative Action
Affirmative ActionAffirmative Action
Affirmative Action
Trameka Peterson
 
The affirmative action 7
The affirmative action 7The affirmative action 7
The affirmative action 7
Nancy Yanira Munoz Martinez
 
Media violence presentation
Media violence presentationMedia violence presentation
Media violence presentation
jgraf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
francispatiam
 
Media Violence And Aggression
Media Violence And AggressionMedia Violence And Aggression
Media Violence And Aggression
cleopatra77
 
Violence in mass media
Violence in mass media Violence in mass media
Violence in mass media
AzianChemistry
 
Research Paper
Research PaperResearch Paper
Research Paper
mdhughley
 
Hazing
HazingHazing
Affirmative actions: an analysis
Affirmative actions:  an analysisAffirmative actions:  an analysis
Affirmative actions: an analysis
Service_supportAssignment
 
Why have social media platforms facilitated cyberbullying joana vilela
Why have social media platforms facilitated cyberbullying   joana vilelaWhy have social media platforms facilitated cyberbullying   joana vilela
Why have social media platforms facilitated cyberbullying joana vilela
JoDolores
 
Bay College Michigan Web 2.0 Whirlwind
Bay College Michigan Web 2.0 WhirlwindBay College Michigan Web 2.0 Whirlwind
Bay College Michigan Web 2.0 Whirlwind
Barry Dahl
 
Cv 4 REPORT
Cv 4 REPORTCv 4 REPORT
Cv 4 REPORT
Acoh Lucero
 
English Writing
English WritingEnglish Writing
English Writing
kike
 
The Media And School Violence
The Media And School ViolenceThe Media And School Violence
The Media And School Violence
CourtneyWaid
 
The Impact Of Media Violence On Youth Powerpoint
The Impact Of Media Violence On Youth PowerpointThe Impact Of Media Violence On Youth Powerpoint
The Impact Of Media Violence On Youth Powerpoint
charmaine03
 
#MeToo Campaign & Learnings
#MeToo Campaign & Learnings#MeToo Campaign & Learnings
#MeToo Campaign & Learnings
Param Shobhit
 
7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT
mattyp99
 
Sexting and gender
Sexting and genderSexting and gender
Sexting and gender
Emily Setty
 

What's hot (19)

Hazing (1)
Hazing (1)Hazing (1)
Hazing (1)
 
Affirmative Action
Affirmative ActionAffirmative Action
Affirmative Action
 
The affirmative action 7
The affirmative action 7The affirmative action 7
The affirmative action 7
 
Media violence presentation
Media violence presentationMedia violence presentation
Media violence presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Media Violence And Aggression
Media Violence And AggressionMedia Violence And Aggression
Media Violence And Aggression
 
Violence in mass media
Violence in mass media Violence in mass media
Violence in mass media
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Hazing
HazingHazing
Hazing
 
Affirmative actions: an analysis
Affirmative actions:  an analysisAffirmative actions:  an analysis
Affirmative actions: an analysis
 
Why have social media platforms facilitated cyberbullying joana vilela
Why have social media platforms facilitated cyberbullying   joana vilelaWhy have social media platforms facilitated cyberbullying   joana vilela
Why have social media platforms facilitated cyberbullying joana vilela
 
Bay College Michigan Web 2.0 Whirlwind
Bay College Michigan Web 2.0 WhirlwindBay College Michigan Web 2.0 Whirlwind
Bay College Michigan Web 2.0 Whirlwind
 
Cv 4 REPORT
Cv 4 REPORTCv 4 REPORT
Cv 4 REPORT
 
English Writing
English WritingEnglish Writing
English Writing
 
The Media And School Violence
The Media And School ViolenceThe Media And School Violence
The Media And School Violence
 
The Impact Of Media Violence On Youth Powerpoint
The Impact Of Media Violence On Youth PowerpointThe Impact Of Media Violence On Youth Powerpoint
The Impact Of Media Violence On Youth Powerpoint
 
#MeToo Campaign & Learnings
#MeToo Campaign & Learnings#MeToo Campaign & Learnings
#MeToo Campaign & Learnings
 
7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT
 
Sexting and gender
Sexting and genderSexting and gender
Sexting and gender
 

Viewers also liked

新一代互聯網 - IPv6時代
新一代互聯網 - IPv6時代新一代互聯網 - IPv6時代
新一代互聯網 - IPv6時代
Charles Mok
 
Our ICT Our Environment
Our ICT Our EnvironmentOur ICT Our Environment
Our ICT Our Environment
Charles Mok
 
.HK -- An Unsafe Place to Surf?
.HK -- An Unsafe Place to Surf?.HK -- An Unsafe Place to Surf?
.HK -- An Unsafe Place to Surf?
Charles Mok
 
網絡宣教與牧養教牧講座
網絡宣教與牧養教牧講座網絡宣教與牧養教牧講座
網絡宣教與牧養教牧講座
Charles Mok
 
互聯網的挑戰與機遇
互聯網的挑戰與機遇互聯網的挑戰與機遇
互聯網的挑戰與機遇
Charles Mok
 
Technology Policy for Hong Kong
Technology Policy for Hong KongTechnology Policy for Hong Kong
Technology Policy for Hong Kong
Charles Mok
 
Cloud computingworldforum
Cloud computingworldforumCloud computingworldforum
Cloud computingworldforum
Charles Mok
 

Viewers also liked (7)

新一代互聯網 - IPv6時代
新一代互聯網 - IPv6時代新一代互聯網 - IPv6時代
新一代互聯網 - IPv6時代
 
Our ICT Our Environment
Our ICT Our EnvironmentOur ICT Our Environment
Our ICT Our Environment
 
.HK -- An Unsafe Place to Surf?
.HK -- An Unsafe Place to Surf?.HK -- An Unsafe Place to Surf?
.HK -- An Unsafe Place to Surf?
 
網絡宣教與牧養教牧講座
網絡宣教與牧養教牧講座網絡宣教與牧養教牧講座
網絡宣教與牧養教牧講座
 
互聯網的挑戰與機遇
互聯網的挑戰與機遇互聯網的挑戰與機遇
互聯網的挑戰與機遇
 
Technology Policy for Hong Kong
Technology Policy for Hong KongTechnology Policy for Hong Kong
Technology Policy for Hong Kong
 
Cloud computingworldforum
Cloud computingworldforumCloud computingworldforum
Cloud computingworldforum
 

Similar to Cyberbullying

Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…
Pew Research Center's Internet & American Life Project
 
Week 5
Week 5Week 5
Week 5
Ray Brannon
 
Presentation2
Presentation2Presentation2
Presentation2
bdonaghy
 
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]
William Kritsonis
 
Cyrenne Madlangsakay
Cyrenne MadlangsakayCyrenne Madlangsakay
Cyrenne Madlangsakay
Cyrenne Madlangsakay
 
Bullying in the digital age
Bullying in the digital ageBullying in the digital age
Bullying in the digital age
Via Christi Health
 
Student X 1 Sample Student X Misaghi English .docx
 Student X 1 Sample Student X Misaghi English .docx Student X 1 Sample Student X Misaghi English .docx
Student X 1 Sample Student X Misaghi English .docx
aryan532920
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
sepulvedamd
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
damarissepulveda
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
Carla Hockenbury
 
Essays On Cyber Bullying
Essays On Cyber BullyingEssays On Cyber Bullying
Essays On Cyber Bullying
College Papers Writing Service
 
Violence on the Internet: How many youth are really looking?
Violence on the Internet: How many youth are really looking?Violence on the Internet: How many youth are really looking?
Violence on the Internet: How many youth are really looking?
Center for Innovative Public Health Research
 
Youth exposure to pornography and violent web sites
Youth exposure to pornography and violent web sitesYouth exposure to pornography and violent web sites
Youth exposure to pornography and violent web sites
Center for Innovative Public Health Research
 
Cyber-bullying for Attorneys June2012
Cyber-bullying for Attorneys June2012Cyber-bullying for Attorneys June2012
Cyber-bullying for Attorneys June2012
Deborah Gonzalez, Esq.
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
TeamBanana
 
Presentation 2
Presentation 2Presentation 2
Presentation 2
bdonaghy
 
Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
Pew Research Center's Internet & American Life Project
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
Ray Brannon
 
Create a 5 pages page paper that discusses bullying focus.docx
Create a 5 pages page paper that discusses bullying focus.docxCreate a 5 pages page paper that discusses bullying focus.docx
Create a 5 pages page paper that discusses bullying focus.docx
studywriters
 
Create a 5 pages page paper that discusses bullying focus.docx
Create a 5 pages page paper that discusses bullying focus.docxCreate a 5 pages page paper that discusses bullying focus.docx
Create a 5 pages page paper that discusses bullying focus.docx
studywriters
 

Similar to Cyberbullying (20)

Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…
 
Week 5
Week 5Week 5
Week 5
 
Presentation2
Presentation2Presentation2
Presentation2
 
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]
 
Cyrenne Madlangsakay
Cyrenne MadlangsakayCyrenne Madlangsakay
Cyrenne Madlangsakay
 
Bullying in the digital age
Bullying in the digital ageBullying in the digital age
Bullying in the digital age
 
Student X 1 Sample Student X Misaghi English .docx
 Student X 1 Sample Student X Misaghi English .docx Student X 1 Sample Student X Misaghi English .docx
Student X 1 Sample Student X Misaghi English .docx
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Essays On Cyber Bullying
Essays On Cyber BullyingEssays On Cyber Bullying
Essays On Cyber Bullying
 
Violence on the Internet: How many youth are really looking?
Violence on the Internet: How many youth are really looking?Violence on the Internet: How many youth are really looking?
Violence on the Internet: How many youth are really looking?
 
Youth exposure to pornography and violent web sites
Youth exposure to pornography and violent web sitesYouth exposure to pornography and violent web sites
Youth exposure to pornography and violent web sites
 
Cyber-bullying for Attorneys June2012
Cyber-bullying for Attorneys June2012Cyber-bullying for Attorneys June2012
Cyber-bullying for Attorneys June2012
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Presentation 2
Presentation 2Presentation 2
Presentation 2
 
Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Create a 5 pages page paper that discusses bullying focus.docx
Create a 5 pages page paper that discusses bullying focus.docxCreate a 5 pages page paper that discusses bullying focus.docx
Create a 5 pages page paper that discusses bullying focus.docx
 
Create a 5 pages page paper that discusses bullying focus.docx
Create a 5 pages page paper that discusses bullying focus.docxCreate a 5 pages page paper that discusses bullying focus.docx
Create a 5 pages page paper that discusses bullying focus.docx
 

More from Charles Mok

Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
Charles Mok
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
Charles Mok
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
Charles Mok
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
Charles Mok
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
Charles Mok
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Charles Mok
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
Charles Mok
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Charles Mok
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
Charles Mok
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
Charles Mok
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
Charles Mok
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
Charles Mok
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
Charles Mok
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Charles Mok
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
Charles Mok
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
Charles Mok
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
Charles Mok
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
Charles Mok
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
Charles Mok
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
Charles Mok
 

More from Charles Mok (20)

Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
 

Recently uploaded

Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Mydbops
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Bert Blevins
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
Eric D. Schabell
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
welrejdoall
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
Matthew Sinclair
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
jackson110191
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
Vijayananda Mohire
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
SynapseIndia
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
Kief Morris
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
Sally Laouacheria
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
Stephanie Beckett
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
Yevgen Sysoyev
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
SynapseIndia
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
Lidia A.
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
UiPathCommunity
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
Aurora Consulting
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
ScyllaDB
 
The Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive ComputingThe Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive Computing
Larry Smarr
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
rajancomputerfbd
 

Recently uploaded (20)

Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
 
The Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive ComputingThe Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive Computing
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
 

Cyberbullying

  • 1. Cyber-bullying 網上欺凌 Social, Economic and Political Perspectives For Rotary Club of Central Charles Mok Internet Society Hong Kong August 4, 2010
  • 2. What is Cyber-bullying 網上欺凌 When the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person (National Crime Prevention Council, USA) A situation when a child or teen is repeatedly 'tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted' by another child or teenager using text messaging, email, instant messaging or any other type of digital technology (StopCyberbullying.org)
  • 3. It's nothing new? Compared to traditional or physical bullying Anonymity of attackers Often involves personal data (privacy) Widespread effect; difficult to remove Difficult to avoid Psychological vs physical effect
  • 4. Notable overseas cases Ryan Halligan (1989-2003) – committed suicide in Vermont after repeatedly bullied by classmates and being sent IM messages accusing him of being gay Magan Meier (1992-2006) – committed suicide after being bullied on MySpace by one of her friends' mother, and a neighbor, Lori Drew, pretending to be a young boy (Josh Evans).
  • 5. Local cases 港女大鬧元朗聯興行事件 女事主不滿店長要求旺角分店將貨 品價格修正而發生口角,女事主更 拍攝片段以博取網民同情;女事主 遭起底 大學生被指推女朋友落樓梯事件 有人聲稱從 xanga 轉貼一篇文章, 指一名徐姓男生把懷孕的女朋友推 下樓梯;男事主遭起底,支持與反 對男事主的網民激辯。 算不算:巴士阿叔?陳冠希?
  • 6. Implications Are these cases unique to the cyber world? How to balance the public's right to know – public good, or when concerning public figures, who are public figures? How to define cyber-bullying if handle by legislation? Will they be effective? Exposing subject's identity 人肉搜尋、起底
  • 7. Legislative attempts Several US states pursuing legislations Some city ordinances passed, making online harassment a misdemeanor Problematic to define: 'coerce, intimidate, harass or cause other substantial emotional stress'? California State Assembly Bill 86 2008 gives school the authority to discipline students for bullying others offline or online
  • 8. Bullying, news, or public interest?
  • 12. 莫乃光 Charles Mok [email_address] http://www.charlesmok.hk http://www.isoc.hk