SlideShare a Scribd company logo
1 of 41
ATIF KHAN NIAZI
NFC- Institute of Engineering and Technology Multan,Pakistan
Social Media
&
Cyber Crime
WHAT IS SOCIAL MEDIA?
 Social media are online communications in
which individuals
 shift flexibly between the role of audience and
author.
 To do this, they use social software that
enables anyone without
 knowledge of html coding, to create,
comment on, and share
 content and to form communities around
shared interests.
WHAT IS SOCIAL MEDIA?
 • Social networking sites (Facebook,
LinkedIn, Twitter)
 • Photos/Video/Music (flickr, YouTube,
last.fm)
WHAT IS FACEBOOK?
WHAT IS TWITTER?
FACEBOOK
OVERVIEW
 “the facebook.com” – 2004, Mark
Zuckerberg
 Winklevosses’ lawsuit
 2006 – everyone over the age of 13
 800 million active users
OVERVIEW
 #1 visited website
worldwide
 Free account
 Access to networks
 Control own privacy
settings
 Communication –
pictures, videos, blog
feeds, groups
OTHER FACEBOOK FEATURES
 Facebook Chat
 “Like” button
 Ticker
 Events
 Facebook Mobile
BENEFITS
 Enhancing communication
 Reconnect with old friends/family
 Networking
 Promoting events
 Easier to send media
 Education and news
BENEFITS, CONT.
 Marketing for businesses
 Brand image/reputation
 Viral effect
 Pagemodo – user friendly “Welcome” page tab
RISKS
 Spam on newsfeeds
 The rise of other social
networks
 Twitter, Google+
 Reports of a “Facebook
Depression”
 Provides a skewed view of
what is really going on
 It has been banned in many
countries and workplaces
 50% of British employers in
May 2011 banned it from
workplace
 Children under 13 use it
despite the Children’s Online
Privacy Protection Act
 Harms Communication Skills
 Students score lower in
school when using
Facebook while studying
 Decreases need for face-to-
face communication
 Affects college acceptance
and job hiring
Mobile Phone:
Report:
 Some research reveals that there are 4.8 billion mobile
users but only 4.2 billion people with a toothbrush.
Use of Mobile Phone By Students:
 Students’ Facebook addictions weren’t bad enough
when they were limited to the computer, now they have
portable social media devices in their pockets. Across
the board, students with smartphones use social media
apps, including Facebook & Twitter.
It surveyed 100 students to get an insight on their
mobile phone habits and usage.
 Do you have a
smartphone?
 Do you regularly use the
internet on your phone?
 Have you ever used your
phone to search for a
job?
 Yes – 82% / No – 18%
 Yes – 84% / No – 16%
 Yes – 37% / No – 63%
Role of Electronic Media…?
 Voice of Public
 Country Image
 Cultural Representation
Negative Role of Electronic Media:
 Personal Interest.
 People Likes.
 No Rules and Regulation of Media.
SOCIAL MEDIA:
The best thing is you can trust the facts on social media
like Facebook, twitter any many other popular social
network.
Why Social Media…?
 No Personal Interest.
 Best Source of Sharing News.
 Keep In Touch With Each Other.
 Social Media Is Very Easy For Real
Updating.
Electronic Media Is Exposed By
Social Media:
Check The Status of Any
Politician:
The Power of Social Media:
Facebook, YouTube and Twitter that, for the
First Time, Gave Voice to The People of
Egypt.
Cyber Crime
&
Cyber Laws
Cyber Crime
 Activity in which computers or networks are a
tool, a target, or a place of criminal activity.
 Cyber crime also stated as any use of a
computer as an instrument to further illegal
ends, such as
 Committing fraud
 Stealing identities
 Violating privacy
 It is also include traditional crimes in which
computers or networks are used to enable
the illicit activity.
 As the computer has become central to
commerce, entertainment, and government.
 Cyber crime has grown in importance.
 Examples:
 E-mail account of a Federal Minister was hacked.
 Credit cards frauds reach to an alarming level.
 Financial institutions are the favorite targets of
Cyber criminals --- worst effecting the
technological and progress in the area of e –
Commerce.
Cyber Laws
 The legal issues related to use of communications
technology, particularly "cyberspace", i.e. the
Internet.
 It is an intersection of many legal fields, like:
 Intellectual property,
 Privacy
 Cyber laws is an attempt to apply laws designed for
the physical world to human activity on the Internet
Cyber Laws in Pakistan
 There are different law are promulgated in Pakistan.
 These laws not only deal with crime of Internet
 These deal with all dimensions related to computer
& networks.
 Two of them are most known.
 They are:
 Electronic Transaction Ordinance 2002
 Electronic / Cyber Crime Bill 2007
Electronic Transaction Ordinance 2002
 Overview
 The Electronic Transactions Ordinance (ETO), 2002,
was the first IT-relevant legislation created by national
lawmakers.
 A first step and a solid foundation for legal sanctity
and protection for Pakistani e-Commerce locally and
globally.
 Laid the foundation for comprehensive Legal
Infrastructure.
 It is heavily taken from foreign law related to cyber
crime.
Electronic/Cyber Crime Bill 2007
Overview
 “Prevention of Electronic Crimes Ordinance, 2007″
is in force now
 It was promulgated by the President of Pakistan on
the 31st December, 2007
 The bill deals with the electronic crimes included:
 Cyber terrorism
 Data damage
 Electronic fraud
 Unauthorized access to code
 Cyber stalking
 Cyber Spaming
 It offers penalties ranging from six months
imprisonment to capital punishment for 17
types of cyber crimes
 It will apply to every person who commits an
offence, irrespective of his nationality or
citizenship.
 It gives exclusive powers to the Federal
Investigation Agency (FIA) to investigate and
charge cases against such crimes.
Punishments
 Under this law there are defined punishment
for the offence.
 Every respective offence under this law has
its distinctive punishment which can be
imprisonment or fine.

More Related Content

What's hot (20)

Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Viewers also liked

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network SecurityBrian Honan
 
Social media ppt
Social media pptSocial media ppt
Social media pptRyan Parker
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Social networking PPT
Social networking PPTSocial networking PPT
Social networking PPTvarun0912
 
BULK IEEE 2014-15 PROJECTS LIST FOR NS2
 BULK IEEE 2014-15  PROJECTS LIST FOR NS2 BULK IEEE 2014-15  PROJECTS LIST FOR NS2
BULK IEEE 2014-15 PROJECTS LIST FOR NS2Shane Saro
 
Social Issue
Social IssueSocial Issue
Social IssueMD Shibu
 
Representational Issues
Representational IssuesRepresentational Issues
Representational Issuesioji1
 
Immigration as a Controversial Issue in the Media
Immigration as a Controversial Issue in the MediaImmigration as a Controversial Issue in the Media
Immigration as a Controversial Issue in the Mediacscdickinson
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
2014 Business report writing
2014 Business  report writing2014 Business  report writing
2014 Business report writingMartin McMorrow
 
Early Detection of Malicious Flux Networks via Large Scale Passive DNS Traffi...
Early Detection of Malicious Flux Networks via Large Scale Passive DNS Traffi...Early Detection of Malicious Flux Networks via Large Scale Passive DNS Traffi...
Early Detection of Malicious Flux Networks via Large Scale Passive DNS Traffi...Paladion Networks
 
Wjec AS media studies representation of issues - immigration
Wjec AS media studies representation of issues - immigrationWjec AS media studies representation of issues - immigration
Wjec AS media studies representation of issues - immigrationAmanda Simmons
 
Fashion (why fashion is social issue)
Fashion (why fashion is social issue)Fashion (why fashion is social issue)
Fashion (why fashion is social issue)shagufta777
 

Viewers also liked (20)

Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Social media ppt
Social media pptSocial media ppt
Social media ppt
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Social networking PPT
Social networking PPTSocial networking PPT
Social networking PPT
 
BULK IEEE 2014-15 PROJECTS LIST FOR NS2
 BULK IEEE 2014-15  PROJECTS LIST FOR NS2 BULK IEEE 2014-15  PROJECTS LIST FOR NS2
BULK IEEE 2014-15 PROJECTS LIST FOR NS2
 
Social Issue
Social IssueSocial Issue
Social Issue
 
Representational Issues
Representational IssuesRepresentational Issues
Representational Issues
 
Immigration as a Controversial Issue in the Media
Immigration as a Controversial Issue in the MediaImmigration as a Controversial Issue in the Media
Immigration as a Controversial Issue in the Media
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
2014 Business report writing
2014 Business  report writing2014 Business  report writing
2014 Business report writing
 
Early Detection of Malicious Flux Networks via Large Scale Passive DNS Traffi...
Early Detection of Malicious Flux Networks via Large Scale Passive DNS Traffi...Early Detection of Malicious Flux Networks via Large Scale Passive DNS Traffi...
Early Detection of Malicious Flux Networks via Large Scale Passive DNS Traffi...
 
Wjec AS media studies representation of issues - immigration
Wjec AS media studies representation of issues - immigrationWjec AS media studies representation of issues - immigration
Wjec AS media studies representation of issues - immigration
 
8th Semester Computer Science (2013-June) Question Papers
8th Semester Computer Science (2013-June) Question Papers8th Semester Computer Science (2013-June) Question Papers
8th Semester Computer Science (2013-June) Question Papers
 
Representation issues
Representation issuesRepresentation issues
Representation issues
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Fashion (why fashion is social issue)
Fashion (why fashion is social issue)Fashion (why fashion is social issue)
Fashion (why fashion is social issue)
 

Similar to Social media & cyber crime

Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineIRJET Journal
 
Freedom in the Days of the Internet
Freedom in the Days of the InternetFreedom in the Days of the Internet
Freedom in the Days of the Internetthinkingeurope2011
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in iHassan Nasir
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfWAIHIGA K.MUTURI
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...Patrick McCormick
 
At The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianAt The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianDamar Juniarto
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxOxfordRiNorth
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber pathProfsdetchana Murthy
 
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...LorieLynDeGuzmanSalv
 
digital media and society.pptx
digital media and society.pptxdigital media and society.pptx
digital media and society.pptxcatherinviscom
 
Legal issues in applied technology power point
Legal issues in applied technology power pointLegal issues in applied technology power point
Legal issues in applied technology power pointstephanieprovitt
 
Legal issues in applied technology power point
Legal issues in applied technology power pointLegal issues in applied technology power point
Legal issues in applied technology power pointstephanieprovitt
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdflinda gichohi
 

Similar to Social media & cyber crime (20)

Impact of technology
Impact of technology Impact of technology
Impact of technology
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
Freedom in the Days of the Internet
Freedom in the Days of the InternetFreedom in the Days of the Internet
Freedom in the Days of the Internet
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in i
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
At The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianAt The Brink of Digital Authoritarian
At The Brink of Digital Authoritarian
 
Cyber crime in Pakistan
Cyber crime in PakistanCyber crime in Pakistan
Cyber crime in Pakistan
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber path
 
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
 
digital media and society.pptx
digital media and society.pptxdigital media and society.pptx
digital media and society.pptx
 
Legal issues in applied technology power point
Legal issues in applied technology power pointLegal issues in applied technology power point
Legal issues in applied technology power point
 
Legal issues in applied technology power point
Legal issues in applied technology power pointLegal issues in applied technology power point
Legal issues in applied technology power point
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 

Recently uploaded

Finance-and-Operations-in-the-Azure-Cloud.pdf
Finance-and-Operations-in-the-Azure-Cloud.pdfFinance-and-Operations-in-the-Azure-Cloud.pdf
Finance-and-Operations-in-the-Azure-Cloud.pdfandersonwille2024
 
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 OnlyVIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 Onlykhanf3647647
 
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...SocioCosmos
 
Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfeliklein8
 
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceVellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Capstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolutionCapstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolutioneliklein8
 
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...Nitya salvi
 
International Airport Call Girls 🥰 8617370543 Service Offer VIP Hot Model
International Airport Call Girls 🥰 8617370543 Service Offer VIP Hot ModelInternational Airport Call Girls 🥰 8617370543 Service Offer VIP Hot Model
International Airport Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpointAshtonCains
 
Marketing Plan - Social Media. The Sparks Foundation
Marketing Plan -  Social Media. The Sparks FoundationMarketing Plan -  Social Media. The Sparks Foundation
Marketing Plan - Social Media. The Sparks Foundationsolidgbemi
 
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIRBVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIRNeha Kajulkar
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...ZurliaSoop
 
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...Delhi Call girls
 
Film show investigation powerpoint for the site
Film show investigation powerpoint for the siteFilm show investigation powerpoint for the site
Film show investigation powerpoint for the siteAshtonCains
 
Film the city investagation powerpoint :)
Film the city investagation powerpoint :)Film the city investagation powerpoint :)
Film the city investagation powerpoint :)AshtonCains
 
Interpreting the brief for the media IDY
Interpreting the brief for the media IDYInterpreting the brief for the media IDY
Interpreting the brief for the media IDYgalaxypingy
 
Film show pre-production powerpoint for site
Film show pre-production powerpoint for siteFilm show pre-production powerpoint for site
Film show pre-production powerpoint for siteAshtonCains
 

Recently uploaded (20)

The Butterfly Effect
The Butterfly EffectThe Butterfly Effect
The Butterfly Effect
 
Finance-and-Operations-in-the-Azure-Cloud.pdf
Finance-and-Operations-in-the-Azure-Cloud.pdfFinance-and-Operations-in-the-Azure-Cloud.pdf
Finance-and-Operations-in-the-Azure-Cloud.pdf
 
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
 
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 OnlyVIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
 
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
 
Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
 
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceVellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Capstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolutionCapstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolution
 
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
 
International Airport Call Girls 🥰 8617370543 Service Offer VIP Hot Model
International Airport Call Girls 🥰 8617370543 Service Offer VIP Hot ModelInternational Airport Call Girls 🥰 8617370543 Service Offer VIP Hot Model
International Airport Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpoint
 
Marketing Plan - Social Media. The Sparks Foundation
Marketing Plan -  Social Media. The Sparks FoundationMarketing Plan -  Social Media. The Sparks Foundation
Marketing Plan - Social Media. The Sparks Foundation
 
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
 
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIRBVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
 
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
 
Film show investigation powerpoint for the site
Film show investigation powerpoint for the siteFilm show investigation powerpoint for the site
Film show investigation powerpoint for the site
 
Film the city investagation powerpoint :)
Film the city investagation powerpoint :)Film the city investagation powerpoint :)
Film the city investagation powerpoint :)
 
Interpreting the brief for the media IDY
Interpreting the brief for the media IDYInterpreting the brief for the media IDY
Interpreting the brief for the media IDY
 
Film show pre-production powerpoint for site
Film show pre-production powerpoint for siteFilm show pre-production powerpoint for site
Film show pre-production powerpoint for site
 

Social media & cyber crime

  • 1. ATIF KHAN NIAZI NFC- Institute of Engineering and Technology Multan,Pakistan
  • 3. WHAT IS SOCIAL MEDIA?  Social media are online communications in which individuals  shift flexibly between the role of audience and author.  To do this, they use social software that enables anyone without  knowledge of html coding, to create, comment on, and share  content and to form communities around shared interests.
  • 4. WHAT IS SOCIAL MEDIA?  • Social networking sites (Facebook, LinkedIn, Twitter)  • Photos/Video/Music (flickr, YouTube, last.fm)
  • 8. OVERVIEW  “the facebook.com” – 2004, Mark Zuckerberg  Winklevosses’ lawsuit  2006 – everyone over the age of 13  800 million active users
  • 9. OVERVIEW  #1 visited website worldwide  Free account  Access to networks  Control own privacy settings  Communication – pictures, videos, blog feeds, groups
  • 10. OTHER FACEBOOK FEATURES  Facebook Chat  “Like” button  Ticker  Events  Facebook Mobile
  • 11. BENEFITS  Enhancing communication  Reconnect with old friends/family  Networking  Promoting events  Easier to send media  Education and news
  • 12. BENEFITS, CONT.  Marketing for businesses  Brand image/reputation  Viral effect  Pagemodo – user friendly “Welcome” page tab
  • 13. RISKS  Spam on newsfeeds  The rise of other social networks  Twitter, Google+  Reports of a “Facebook Depression”  Provides a skewed view of what is really going on  It has been banned in many countries and workplaces  50% of British employers in May 2011 banned it from workplace  Children under 13 use it despite the Children’s Online Privacy Protection Act  Harms Communication Skills  Students score lower in school when using Facebook while studying  Decreases need for face-to- face communication  Affects college acceptance and job hiring
  • 15. Report:  Some research reveals that there are 4.8 billion mobile users but only 4.2 billion people with a toothbrush.
  • 16. Use of Mobile Phone By Students:  Students’ Facebook addictions weren’t bad enough when they were limited to the computer, now they have portable social media devices in their pockets. Across the board, students with smartphones use social media apps, including Facebook & Twitter.
  • 17. It surveyed 100 students to get an insight on their mobile phone habits and usage.  Do you have a smartphone?  Do you regularly use the internet on your phone?  Have you ever used your phone to search for a job?  Yes – 82% / No – 18%  Yes – 84% / No – 16%  Yes – 37% / No – 63%
  • 18.
  • 19.
  • 20. Role of Electronic Media…?  Voice of Public  Country Image  Cultural Representation
  • 21. Negative Role of Electronic Media:  Personal Interest.  People Likes.  No Rules and Regulation of Media.
  • 22.
  • 23. SOCIAL MEDIA: The best thing is you can trust the facts on social media like Facebook, twitter any many other popular social network.
  • 24. Why Social Media…?  No Personal Interest.  Best Source of Sharing News.  Keep In Touch With Each Other.  Social Media Is Very Easy For Real Updating.
  • 25. Electronic Media Is Exposed By Social Media:
  • 26.
  • 27. Check The Status of Any Politician:
  • 28. The Power of Social Media:
  • 29. Facebook, YouTube and Twitter that, for the First Time, Gave Voice to The People of Egypt.
  • 30.
  • 32. Cyber Crime  Activity in which computers or networks are a tool, a target, or a place of criminal activity.  Cyber crime also stated as any use of a computer as an instrument to further illegal ends, such as  Committing fraud  Stealing identities  Violating privacy
  • 33.  It is also include traditional crimes in which computers or networks are used to enable the illicit activity.  As the computer has become central to commerce, entertainment, and government.  Cyber crime has grown in importance.
  • 34.  Examples:  E-mail account of a Federal Minister was hacked.  Credit cards frauds reach to an alarming level.  Financial institutions are the favorite targets of Cyber criminals --- worst effecting the technological and progress in the area of e – Commerce.
  • 35. Cyber Laws  The legal issues related to use of communications technology, particularly "cyberspace", i.e. the Internet.  It is an intersection of many legal fields, like:  Intellectual property,  Privacy  Cyber laws is an attempt to apply laws designed for the physical world to human activity on the Internet
  • 36. Cyber Laws in Pakistan  There are different law are promulgated in Pakistan.  These laws not only deal with crime of Internet  These deal with all dimensions related to computer & networks.  Two of them are most known.  They are:  Electronic Transaction Ordinance 2002  Electronic / Cyber Crime Bill 2007
  • 37. Electronic Transaction Ordinance 2002  Overview  The Electronic Transactions Ordinance (ETO), 2002, was the first IT-relevant legislation created by national lawmakers.  A first step and a solid foundation for legal sanctity and protection for Pakistani e-Commerce locally and globally.  Laid the foundation for comprehensive Legal Infrastructure.  It is heavily taken from foreign law related to cyber crime.
  • 39. Overview  “Prevention of Electronic Crimes Ordinance, 2007″ is in force now  It was promulgated by the President of Pakistan on the 31st December, 2007  The bill deals with the electronic crimes included:  Cyber terrorism  Data damage  Electronic fraud  Unauthorized access to code  Cyber stalking  Cyber Spaming
  • 40.  It offers penalties ranging from six months imprisonment to capital punishment for 17 types of cyber crimes  It will apply to every person who commits an offence, irrespective of his nationality or citizenship.  It gives exclusive powers to the Federal Investigation Agency (FIA) to investigate and charge cases against such crimes.
  • 41. Punishments  Under this law there are defined punishment for the offence.  Every respective offence under this law has its distinctive punishment which can be imprisonment or fine.