By Augusta Epuli Anjoh April 2013 Cyber security forum 2013



Similar documents
Affirmative Action Presentation

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Digital Citizenship Lesson Plan

Social Media Guidelines Resource

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )

Staying Safe Online. A Practical Guide for Parents and Children.

E-Safety Issues and Online Safety. Parents Evening

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

E-Safety Issues and Online Safety

National Statistics. Domestic Violence/Sexual Assault Fact Sheet: Oklahoma Department of Mental Health and Substance Abuse Services

The Hidden Side of Domestic Abuse: Men abused in intimate relationships

Internet Safety/CIPA Lesson Plan

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.

E-Safety Issues and Online Safety

Online Safety for Middle and High School

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Finchley Catholic High School. Anti Bullying Policy

How To Deal With Social Media At Larks Hill J & I School

Social Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA)

Guidelines for Preventing and Dealing with Bullying Issues

Internet Safety Fact Sheet Facts about Social Networking:

Technology Acceptable Use Policy

Who's chatting to your kids?

FIRBANK GRAMMAR SCHOOL

RIVERVIEW SCHOOL DISTRICT

Cyber safety Parent Easy Guide 63

Safeguarding adults from neglect and abuse

Social Networking Sites like Facebook, MSN

TOWARD A SAFER INTERNET ENVIRONMENT FOR CHILDREN

Today s teens use technology more than ever. Most have

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.

Class 2: Manage Your Digital Footprint. Student Handbook

Acceptable Use Policy for Technology Catholic Schools of the Diocese of Brooklyn

School Policy Regarding Computer Use, Technology and Internet Access

DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY

Revised: 6-04, 8-09, 1-12 REGULATION #5420

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY

Safety Tips for Social Networking

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

CyberbullyNOT Student Guide to Cyberbullying

Cyberstalking: Dangers on the Information Superhighway By: Trudy M. Gregorie, Director of Training National Center for Victims of Crime, 2001

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

Wakefield Public Schools Technology Acceptable Use Policy

How To Use Your Cell Phone At Renaissance Academy Charter School

Code of Virginia, 1950, as amended, Sections , :1, , , and

(EMC) ELECTRONICALLY MEDIATED COMMUNICATION. Communication sent via a channel such as a cell phone or the Internet (versus face-to-face).

Chapter 3: The Gender Based Violence Classification Tool. The Gender Based Violence Information Management System USER GUIDE

ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

EADS up. stop think connect

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.

ICT POLICY AND PROCEDURE

HAZING AND BULLYING (Harassment, Intimidation and Dating Violence)

Forrestville Valley School District #221

Tomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

Acceptable Use Policy - NBN Services

2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.

Sibford School Student Computer Acceptable Use Policy

Melville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students

Girls & Cyber- bullying

BOARD OF EDUCATION POLICY

[Example] Social Media Acceptable Use Policy

LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET

RESPONDING TO EXTREMIST SPEECH ONLINE 10 FREQUENTLY ASKED QUESTIONS

LCC xdsl Usage Policy

Comments made online may be misinterpreted by both receivers and third-parties, which may affect the determination of prevalence of cyberbullying.

STALKING REALITIES AND RESPONSES

2012 NCSA / McAfee Online Safety Survey

Students Acceptable Use Policy for Electronic Resources Rules Summary

Outsmarting On-line Predators. Christina Kilbourne

The Digital Divide: How the Online Behavior of Teens is Getting Past Parents

St Thomas More Catholic Primary School Saffron Walden

(Internet) for students, staff and, if requested, members of the Board of Education. All computer


Acceptable Use of Information Technology

Transcription:

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013

What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary Copyright 2005 by Houghton Mifflin Company

There are so many fascinating things to do and explore online. Although the Internet is educational and entertaining, it can a bit scary, therefore a source of great danger if one is not careful. Women are therefore exposed to great danger on the cyberspace Serious emotional distresses could include feeling terrified, intimidated, threatened, harassed, or tormented.

Cyber crime presents a new form of Violence Against Women(VAW) which is increasingly becoming part of women s experiences. All forms of VAW usually take place under the veil of silence and shame due to fear of stigmatisation and a strong sense of obligation to keep family s reputations intact Most of the time, perpetrators go unpunished Estimates from the United Nations found 95% of online abuse being targeted at women.

Social networking websites have been around since the mid-90's, but in recent years, social networking has exploded across the web

They are websites that encourage people to post profiles of themselves complete with pictures, interests, their age, gender, hobbies, and interests and even journals so they can meet like-minded friends. Some also offer chat rooms. Most sites are free some restrict membership by age

Face book Twitter Link-in My space Hi -5 Skype Face time Yahoo messenger Google talk You Tube etc

Its easy to gain access to information on potential victims by using online profiles Therefore there are lots of wolves in sheep clothing using the cyber space Stalkers and potential hackers use this information to perpetrate acts of violence against women.

STALKING Stalking is committed by one who intentionally engages in a course of conduct directed at a specific person

SMS stalking Specifically in Uganda, they found that males control their spouses phones and many times, invade their privacy through SMS stalking. Cyber Stalking Cyber stalking is the use of the Internet, email, or other telecommunication technologies to harass, threaten, or intimidate another person. It is an extension of stalking from physical space to cyberspace.

A cyber stalker is someone who methodically, deliberately, and persistently sends unwanted communications that do not stop even after you have requested that he or she end all contact with you. Cyber stalking may take many different forms. A cyber stalker may: use the Internet to identify and track you send unsolicited email, including hate mail or obscene or threatening messages post messages about you or spread rumors about you through newsgroups create websites that provide real or false personal information about you assume your identity online (i.e., in chat rooms, instant messages, or email) to embarrass you, to pry into your personal life, or for other negative purposes.

PORNOGRAPHY Pornography is the explicit representation of sexual activity in print or on film of adults or children in the nude or having sexual relations to stimulate erotic rather than visual or emotional feelings. It is helpful to remember that pornography shows women as mere physical objects and focuses on their breasts and sex organs does not even try to show other ways in which a woman can be attractive, e.g. character, intelligence, humour shows sex as the only important thing in a relationship between a man and a woman; cannot substitute for long-term love and commitment. It produces shortlived thrills and does nothing to develop a loving sexual relationship. It is possible for sexually explicit material not to be pornographic. For instance, medical textbooks and sex manuals are designed for education. Pornography differs because its only purpose is titillation and fantasy. Pornography can lead to pain, shame and loss because of addictive sexual behaviour.

Psychological battering This is a pattern of signs and symptoms, such as fearfulness and a feeling of helplessness, commonly appearing in women who are psychologically and mentally abused over an extended period by a husband or partner or stalker. Cheating By Impersonation The crime of falsely assuming the identity of another person in order to gain a benefit or cause harm to the other person. It is passing oneself off as another person. For example Gender switching "Won't someone at least pretend to be female?"

Trafficking Human trafficking is a modern form of slavery. It involves controlling a person through force, fraud, or coercion to exploit the victim for forced labor, sexual exploitation, or both. Most women get involved in this though dating sites.

Cyber Bullying Currently, cyber bullying becomes one of the fastest growing problem, and it is defined as using the computer or other electronic devices to intimidate, threaten or humiliate another individual. Cyber bullying most commonly takes place on the internet among teenagers. Bullies use Threats Intimidation Black Mail Identity Theft Posing As A Friend

Hacking A hacker is someone who accesses a computer system by circumventing its security system. Hackers use excellence, playfulness, cleverness and exploration in performing their activities.

obscenity and indecent representation of women in the cyber space. harassing women with sexually blackmailing mails or messages

Its important to highlight the use of mobile phones as a means of perpetrating violence against women Cell phones often have almost all the functionality of a computer. Therefore used to connect to these social media Pictures and videos can be posted within minutes on social media. These pictures and videos can be widely distributed and transferred via Bluetooth

When communicating on-line, Select a gender-neutral username, email address, etc. Keep your primary email address private. Don't give out information simply because it is requested Block or ignore unwanted users. Don't allow others to draw you into conflict. Watch what you "say" online. Especially on social media and chat rooms Know what's in your signature file. Company names and personal phone numbers Never use a business account for personal use.

Never give your password to anyone. Don't provide your credit card number or other identifying information Instruct children to never, ever give out personal information Be very cautious about putting any pictures of yourself or your children online anywhere, or allowing anyone else (relatives, schools, dance academies, sports associations) to publish any photos. use privacy settings to restrict access to profiles so only the individuals on your contact lists are able to view your profile. only add people you know in real life to your contact lists. creating strong passwords. Report inappropriate activity to the website or law enforcement immediately

Preventing technology-related Violence Against Women is an important component in ending violence against women today and contributes to creating a safe and secure environment for women and girls in every sphere of life.

Thank you for you kind attention

http://www.fbi.gov/aboutus/investigate/vc_majorthefts/innocent/socia l-networking-sites GenderIt.org www.fbi.gov Care.org.uk http://www.uhs.wisc.edu/assault/onlinestalking.shtml