Understanding social media
Media refers to the plethora of means used to communicate and disseminate information from one person to the other. The exchange of social information and ideas is done through social media. Unlike other media instruments such as newspaper or radio which can only be used to receive information , social media gives the receiver the opportunity to communicate his own ideas and views, thus acting as a two way street. In other words social media refers to all those internet based applications that allow the exchange of user generated content. Given the tremendous amount of globalization and world-wide interconnectedness, social media is growing leaps and bounds. The growth rate of social media can be gauged from the fact
…show more content…
However, it must be observed that the consent to take pictures does not imply the consent to put it publicly on the web. The nature of the consent is being constantly debated all over the world.
Revenge porn is emerging as a new trend in the developed world — from the US and Japan to countries in Europe. And now it's being seen in India, fuelled by the growing access to the Internet and camera-wielding mobile phones — all that is needed for taking and posting offensive pictures.
Unfortunately, there is a serious lack of proper legislation as far as revenge porn is considered. Israel became the first country to legislate upon the issue. Their law recognises revenge porn as a sex crime and its circulation is punishable up to 5 years of imprisonment. Britain, Germany, Philippines and 12 states of the USA have criminalised revenge porn.
The Article 8 of the European Convention on Human Rights provides that every person has the right to respect for his private and family life. Its application lies in the Council of Europe.
In case of UK the offence needs to be done multiple times to constitute harassment. Liberal Democrats in UK are exhorting the government to bring on specific laws in this
…show more content…
The websites generally ask for large sums of money for the removal of such pictures from the victim. In such case the intermediary (Google, Face book, twitter) is unlikely to reveal to the victim the name of the person who might have posted the content online. Court intervention is required for it. In cases of content being circulated on a smartphone the service provider is duty bound to provide the requisite details. Foreign Service providers are not bound to provide information.
• The global community has recognised the right to privacy in this regard. Privacy Protection is recognised in the Article 17 of the International Covenant on Civil and Political Rights (ICCPR)
• No on shall be subjected to arbitrary or unlawful interference with his or her privacy, family, home or correspondence nor to unlawful attacks on one’s honour and reputation.
• Everyone has the right to the protection of the law against such interference or attacks.
However several such laws have been considered to be against the freedom to speech and
Citation: Ashcroft v. Free Speech Coalition 535 U.S. 234 (2002) U.S. Court of Appeals for the Ninth Circuit Facts: The Free Speech Coalition which is a non-profit trade association of the pornography and adult entertainment industry in the United States filed suit, against the Child Pornography Prevention Act of 1996 (CPPA). The child pornography prevention act prohibits and sets penalties for activities such as depicting any visual image of the sexual abuse of minors. This includes pictures, video, and even modified images with the likeness or appearance of a minor engaging in a sexual act. The Promotion, advertisement, and distribution of such works are also prohibited and have consequences.
In 1945, the High Court of Australia heard the case of Gratwick v Johnson and ultimately decided to dismiss the appeal in a unanimous decision by the Judges. While different reasoning was employed, all five judges drew the conclusion that the appeal should be dismissed as the statute the defendant was charged under was inconsistent with s.92 of the Australian Constitution. To provide some context for this case in 1944, Dulcie Johnson was charged with an offence against the National Security Act 1939-1943 in that she did contravene par.3 of the Restriction of Interstate Passenger Transport Order by travelling from South Australia to Western Australia by rail. In brief terms par.3 of the Restriction of Interstate Passenger Transport Order provided that no person shall, without a valid permit, travel from state to state or territory.
Research Paper On Democracy in Canada Name : Harpreet Kaur Introduction The word democracy describes a Political System of any country. Dramatic changes have taken place in recent Years at the national level with respect to the day today functioning of our constitutional democracy. In a Democratic country like Canada , America all the citizens that are eligible have the rights to participate directly or indirectly in decision making that affect them.
Cyber criminals use the information they collect from a victims online platforms to illegally gain access to the victims bank account and credit cards. These criminals later use this information to steal money from the victim's accounts or take loans using the victim's name (Lai, Li, & Hsieh, 2012). Driver's license identity theft: Criminals use the information they obtain from victims social media platforms to steal or forge drivers licenses that have the victim's name. They then use these stolen licenses when they are caught thus implicating the victim in a crime he was not aware
One of the biggest issues is the technology. The advancement on technological devices such as small cameras helped people to stalk other people and to unknowingly take their photos and post it in the social media without them knowing. It is a huge problem here in the UAE to invade someone’s privacy. In this essay, I will talk about invasion of privacy in the UAE, and what does it really mean. I will also talk
With the theory, the way in which social media can be studied has evolved and will continue to evolve in the
McDonalds has restaurants at 33,000 locations in 118 countries and 32,500 restaurants in 118 countries. But how are they able to open as many stores as this? The reason is because of its advertising methods social media and they started using social media since 2006, McDonalds uses social media as an advertising tool for marketing their products in order to communicate with the consumers for their product and by using social media tactics McDonalds ranks as 1st in social media as well as it is one of the top 10 global fast food chain industry. Thereby they have opened so many stores and each earns a large profit from many people visiting by seeing their products and their reviews online. Social media has helped McDonalds expand their business.
In social media, there are many kinds of content that can easily be accessed. However, there are several contents that are not appropriate for the children to see. The inappropriate contents such as contents that showing criminal acts, violance and pornography. The children might not intentionally access to those kind of contents. The contents might suddenly appear while the children are using their social media.
Des Moines in 1969 (Tedford & Herbeck, 2009, pp 1-4) which is in the cover statement, the U.S. or the court stated through this case and more recently, the federal government has determined the need for off campus behavior, such as cyberbullying, controlled by schools. For the state level, which is just like the law of speech and disturbance at the federal level, each country continues to struggle with determine the problem and what legal action to take when violation occurs. In the other hand Malaysia use Computer Crimes Act 1997, in Section Four: Unauthorized access to computer materials with the intent to commit or facilitate an offence. If convicted, the offender is liable to a fine of not more than RM150, 000 or a prison term of not more than 10
Social media are a websites and applications that enables a person to create and share a content. A person can also interact with someone like family, friends, loved ones all around the world. It deals with the sites that a person uses in order for them to have a communication. It has some negative outcomes that has a aggressive feelings, aggressive thoughts, and aggressive behavior. Social networking describes the phenomena found in, participatory and self-expressive websites such as Facebook, Twitter, My space, and Youtube.
Social Media for The Community In this Modern Era, Social Media plays an pivotal role in communicating. If we look according to the expert B.K Lewis, media social is label for digital technology that allows people to interact,providing and sharing the message content. We know that social media is very close to the community. Even it can be said that “human’s can’t lived without social media”.
With the internet being invented and undoubtedly taking huge precedence in our lives, there is inevitably going to be a way for people to waste their time on the internet. That time waster, also known as social media, is one of the most beneficial and also one of the worst things that has entered the lives of people as a result of the internet. People everywhere use social media. They use it to feel connected to people who are far away, to promote their businesses, and for a plethora of other reasons. Social media has begun to be increasing used in school, the workplace, and also just in peoples own homes.
Social media is an online service, platform or site that focuses on building and reflecting of social networks or social relations among people who share interest or activities. Some famous sites are Facebook, Twitter, Instagram and YouTube. The generalization of the internet makes us live conveniently and fast. We live in time where communication is possible without having to exert so much effort. We live in the time where social media is the main medium of communication.
Frameworks and Theories Surrounding Social Media Uptake The overwhelming success of social media has been to date continuously investigated by academic researchers and practitioners. Several existing theories from various fields in social science such as information technology, economics and social psychology have been extended in the area of social media to explain its adoption. Here we discuss some of the key theories and frameworks frequently mentioned in social media literature: One of the earliest social science theory applied is the Diffusion of Innovation (DoI) Theory first developed by E. M. Rogers in 1962.
CYBER CRIME Cybercrime is one of the fastest growing type of crime in our society today and have also been a serious problem since it causes a lot of damages and also affect us in different ways. But before I go further let me start by telling you the meaning of cybercrime, Cybercrime is different and more heinous than normal crime that we know. This crime is committed in an electronic medium and here means read is not a requirement and is done in secret Feldman(2013). Cyber war takes place largely in secret, unknown to the general public of crimes include pornography, cyber fraud, defamation, cyber stalking, harassment, IPR theft, data hostage, money laundering, phishing, e-mail bombing, cyber war, illegal monitoring. Secondly let me talk about the effect of cybercrime in our society today.