SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Due to Australia’s first social networking related conviction occurring last month, now
more than ever social media users need education on the potential damaging effects
                          of material posted on online platforms.
The study conducted primarily at the University of New South Wales in
Kensington has revealed social media platforms are raising huge issues in
   terms of privacy, copyright, employment, bullying and harassment
The Director of the Cyberspace Law and Policy Community at
UNSW, Alana Maurushat believes cybercrime education should start at
year one, so young Australians can learn the responsibilities of posting
                            material online
Alec Christie, a partner at law firm DLA Piper confirms a way to check if your
content is suitable to be posted online is through the ‘front page test’. ‘If you are
  going to go online and publish something online, you need to test it against
 would I be able to publish this on the front page of the Sydney Morning Herald
                                     tomorrow’.
David Vaile from the Cyberspace Law and Policy Centre from UNSW
 emphasises the importance for users of the Internet to understand that the
  law applies to online platforms just as it applies in the traditional world.
'Because it’s not a physical thing, people just think it's just moving a file, it's
                  just posting a photograph’ Vaile explains.
Problems lie with Internet users as they are unaware of the definition of
   ‘indecent’. Alec Christie puts it simply ‘There are no hard and fast
           rules, but it’s what would make you and I blush'.
Joanne, a Criminology student at the University of New South Wales has
   experienced cybercrime problems involving her brother, as he faces
bullying over Facebook. ‘He doesn’t know what to do, he just hates school
                                  now’.
Despite a Law Reform Commission Report being produced four years ago
  based on privacy concerns, no laws have been changed or altered with
regards to an individuals right to privacy which is affecting the legal systems
                       ability to deal with cybercrime.

Weitere ähnliche Inhalte

Was ist angesagt?

Artifact 2 cyberbullying
Artifact 2 cyberbullyingArtifact 2 cyberbullying
Artifact 2 cyberbullying
hgraffam
 
Teachingdigitalresponsibility
TeachingdigitalresponsibilityTeachingdigitalresponsibility
Teachingdigitalresponsibility
kgehres
 
Wingate copyright critique portfolio
Wingate copyright critique portfolioWingate copyright critique portfolio
Wingate copyright critique portfolio
Nicole Wingate
 

Was ist angesagt? (17)

URMA Conference 2009
URMA Conference 2009URMA Conference 2009
URMA Conference 2009
 
Artifact 2 cyberbullying
Artifact 2 cyberbullyingArtifact 2 cyberbullying
Artifact 2 cyberbullying
 
Teachingdigitalresponsibility
TeachingdigitalresponsibilityTeachingdigitalresponsibility
Teachingdigitalresponsibility
 
How will killing Net Neutrality impact education?
How will killing Net Neutrality impact education?How will killing Net Neutrality impact education?
How will killing Net Neutrality impact education?
 
Public Computer Services At CPL
Public Computer Services At CPLPublic Computer Services At CPL
Public Computer Services At CPL
 
Public Computer Services At CPL
Public Computer Services At CPLPublic Computer Services At CPL
Public Computer Services At CPL
 
Wingate copyright critique portfolio
Wingate copyright critique portfolioWingate copyright critique portfolio
Wingate copyright critique portfolio
 
Social Media Policy
Social Media PolicySocial Media Policy
Social Media Policy
 
Making the connection
Making the connectionMaking the connection
Making the connection
 
Wingate Policy Paper
Wingate Policy PaperWingate Policy Paper
Wingate Policy Paper
 
Staying legal: the law surrounding Web2.0
Staying legal: the law surrounding Web2.0Staying legal: the law surrounding Web2.0
Staying legal: the law surrounding Web2.0
 
Cyberethics accompanying text
Cyberethics accompanying text Cyberethics accompanying text
Cyberethics accompanying text
 
Digiteen and Digiteacher
Digiteen and DigiteacherDigiteen and Digiteacher
Digiteen and Digiteacher
 
The Promise of Networks: How Social Connections = Social Impact
The Promise of Networks: How Social Connections = Social ImpactThe Promise of Networks: How Social Connections = Social Impact
The Promise of Networks: How Social Connections = Social Impact
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
The Impact of Social Media on Reputation Management – navigating a new legal ...
The Impact of Social Media on Reputation Management – navigating a new legal ...The Impact of Social Media on Reputation Management – navigating a new legal ...
The Impact of Social Media on Reputation Management – navigating a new legal ...
 
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic DialogueNL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
 

Andere mochten auch

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
SlideShare
 

Andere mochten auch (8)

Facebook
FacebookFacebook
Facebook
 
Cyber-Crime e Social Media
Cyber-Crime e Social MediaCyber-Crime e Social Media
Cyber-Crime e Social Media
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
 
Instant Checkmate Background Check Glossary
Instant Checkmate Background Check GlossaryInstant Checkmate Background Check Glossary
Instant Checkmate Background Check Glossary
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
 

Ähnlich wie Cyber Crime and Social Media

Edge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingEdge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullying
Dr. Conrath
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
ITIIIndustries
 
Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)
Professor Mary Aiken
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
andrewdyoung
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write up
victoriahoo
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
todd521
 
Running head FINAL PAPER .docx
 Running head FINAL PAPER                                      .docx Running head FINAL PAPER                                      .docx
Running head FINAL PAPER .docx
MARRY7
 
SummaryReport-TitleIXandCampusSexualAssaultSomos-2
SummaryReport-TitleIXandCampusSexualAssaultSomos-2SummaryReport-TitleIXandCampusSexualAssaultSomos-2
SummaryReport-TitleIXandCampusSexualAssaultSomos-2
Claudia Wald
 

Ähnlich wie Cyber Crime and Social Media (20)

Edge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingEdge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullying
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
 
Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write up
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Internet Law Primer
Internet Law PrimerInternet Law Primer
Internet Law Primer
 
Encyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety PresentationEncyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety Presentation
 
Age Verification / “Doing the Right Thing”
Age Verification / “Doing the Right Thing”Age Verification / “Doing the Right Thing”
Age Verification / “Doing the Right Thing”
 
Jacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o scriptJacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o script
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
 
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
 
It’s time to talk about privacy
It’s time to talk about privacyIt’s time to talk about privacy
It’s time to talk about privacy
 
Running head FINAL PAPER .docx
 Running head FINAL PAPER                                      .docx Running head FINAL PAPER                                      .docx
Running head FINAL PAPER .docx
 
SummaryReport-TitleIXandCampusSexualAssaultSomos-2
SummaryReport-TitleIXandCampusSexualAssaultSomos-2SummaryReport-TitleIXandCampusSexualAssaultSomos-2
SummaryReport-TitleIXandCampusSexualAssaultSomos-2
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber path
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
Coalition 2013 election policy – enhance online safety final
Coalition 2013 election policy – enhance online safety   finalCoalition 2013 election policy – enhance online safety   final
Coalition 2013 election policy – enhance online safety final
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

Cyber Crime and Social Media

  • 1. Due to Australia’s first social networking related conviction occurring last month, now more than ever social media users need education on the potential damaging effects of material posted on online platforms.
  • 2. The study conducted primarily at the University of New South Wales in Kensington has revealed social media platforms are raising huge issues in terms of privacy, copyright, employment, bullying and harassment
  • 3. The Director of the Cyberspace Law and Policy Community at UNSW, Alana Maurushat believes cybercrime education should start at year one, so young Australians can learn the responsibilities of posting material online
  • 4. Alec Christie, a partner at law firm DLA Piper confirms a way to check if your content is suitable to be posted online is through the ‘front page test’. ‘If you are going to go online and publish something online, you need to test it against would I be able to publish this on the front page of the Sydney Morning Herald tomorrow’.
  • 5. David Vaile from the Cyberspace Law and Policy Centre from UNSW emphasises the importance for users of the Internet to understand that the law applies to online platforms just as it applies in the traditional world. 'Because it’s not a physical thing, people just think it's just moving a file, it's just posting a photograph’ Vaile explains.
  • 6. Problems lie with Internet users as they are unaware of the definition of ‘indecent’. Alec Christie puts it simply ‘There are no hard and fast rules, but it’s what would make you and I blush'.
  • 7. Joanne, a Criminology student at the University of New South Wales has experienced cybercrime problems involving her brother, as he faces bullying over Facebook. ‘He doesn’t know what to do, he just hates school now’.
  • 8. Despite a Law Reform Commission Report being produced four years ago based on privacy concerns, no laws have been changed or altered with regards to an individuals right to privacy which is affecting the legal systems ability to deal with cybercrime.