Post on 15-Feb-2022
transcript
Regulating Online Speech
Nay Phone Latt
Fake Photo – � � � � � � � � � � � � � �
Verifying Photo
• www.tineye.com
• Google (Search by Image)• Google (Search by Image)
• www.metapicz.com
Hate Speech & Incitement� � � � � � � � � � � � � � � � � � � � � � � �
� � � � � � � � � � � � �႕
Hate Speech
• Hate Speech (� � � � � � � � � � ) � � � � �
� � � � � � � � � � � � � � � � � � �
� � � � � � � � � � � � � � � � � � � � � �� � � � � � � � � � � � � � � � � � � � � �
� � � � � � �႕ ႕ � � � � � � � � � � � � �
� � � � � � � � � � � � �
� � � � � � � � � � � � � � � � � � � �
� � � � � � � � � � � � � � � � � � � � � � � � � � � � � �
� � � � � � � � � � � � � � � � � � � �
• � � � � � � � � � � (Hate Speech) � � � � � �
� � � � � � � � � � ႕
� � � � � � � � � � � � � � � � � � � � � � � � � � �႕
� � � � � � � � � � � � � � � � � � � � � � � � � � � �
� � � � � � � � � � � � � � � � � � � � � � � � � � � �
� � � � � � � � � � � � � �
� � � � � � � � � � � � � � � � �
� � � � � � � � � � � ႕ � � � �
� � � � � � � � � � � � � � � � � � � (� � � ႕ )
Dangerous Speech
� � � � � � � � � � � � � � � � � � � � �
• Powerful Speaker
• Audience
• Media• Media
• Historical fact
Defamation� � � � � � � � � � � � � � �
Coming Soon …Coming Soon …
Cyberbullying
� � � � � � � � � � � � � � � � � � � � � � � �
� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � �
� � � � � � � � ႕ � � � � � � � � � � � � � � � � � � � � � � �
� � � � � � � � � ႕ � � � � � � � � � � � � �
� � � � � � � � � � � � � � � � � � � � �
� � � � � � � � � � � � � � � � � � � � � �
Cyberbullying is the use of the Internet and related Cyberbullying is the use of the Internet and related technologies to harm other people, in a deliberate,
repeated, and hostile manner.
Phishing� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � �
� � � � � � � � � � � � � � � � � � � � � � � � � � � � � �
� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � �
� � � � � � � � � � � � � � � � � �
� � � � � � � � � �႕ � � � � � � � � � � � � � � � � � � � � � �
Phishing is the act of attempting to acquire information such
as usernames, passwords, and credit card details (and as usernames, passwords, and credit card details (and
sometimes, indirectly, money) by masquerading as a
trustworthy entity in an electronic communication.
Sexting� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � �
� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � ႕� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � �
Sexting is the act of sending sexually explicit messages and/or
photographs, primarily between mobile phones.
ASAP – As soon as possible
LOL – Laugh Out Loud
ASL PLS – Age, Sex, Location Please
B4 – Before
CUL – See You Later
HAND – Have A Nice DayHAND – Have A Nice Day
BTW – By The Way
F4E – Friend Forever
Gr8 – Great
L8r - Later
Child pornography
• � � � � � � � � � � � � � � � � � � �
� � � � � � � � � � � � � � � � � � � � � � � � � � � � � �
� � � � � � � � � � � � � �
� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � �
� � � � � � � � � � � � � � � � � � � � � �
• Child pornography refers to pornography depicting sexually
explicit activities involving a child.
Child grooming
• Child grooming refers to actions deliberately undertaken with
the aim of befriending and establishing an emotional
connection with a child, to lower the child's inhibitions in
preparation for sexual activity with the child, or exploitation
(such as child labour—see trafficking of children).(such as child labour—see trafficking of children).
Hackers
• The term "white hat" in Internet slang refers to an ethical computer
hacker, or a computer security expert, who specializes in
penetration testing and in other testing methodologies to ensure
the security of an organization's information systems.[
• A "black hat" hacker is a hacker who "violates computer security for
little reason beyond maliciousness or for personal gain“little reason beyond maliciousness or for personal gain“
• A grey hat hacker is a combination of a Black Hat and a White Hat
Hacker. A Grey Hat Hacker may surf the internet and hack into a
computer system for the sole purpose of notifying the
administrator that their system has been hacked, for example. Then
they may offer to repair their system for a small fee.
Thank you for your attention.
Nay Phone LattNay Phone Latt
(Executive Director)
Myanmar ICT For Development Organization
(MIDO)
nayphonelatt@gmail.com
095047281
Facebook Account – Nay P Latt