regulating online speech

23
Regulating Online Speech Nay Phone Latt

Upload: adonis

Post on 11-Feb-2016

54 views

Category:

Documents


0 download

DESCRIPTION

Regulating Online Speech. Nay Phone Latt. Fake Photo – ဓါတ္ပံုအတုမ်ား. Verifying Photo. www.tineye.com Google (Search by Image) www.metapicz.com . Hate Speech & Incitement အမုန္းပြားေစေသာစကားမ်ား ၊ လႈံ႕ေဆာ္မႈမ်ား. Hate Speech. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Regulating Online Speech

Regulating Online Speech

Nay Phone Latt

Page 2: Regulating Online Speech

Fake Photo – ဓါတ္ပံု�အတ�မ်ား

Page 3: Regulating Online Speech

Verifying Photo

• www.tineye.com• Google (Search by Image)• www.metapicz.com

Page 4: Regulating Online Speech

Hate Speech & Incitement အမ�န ္ု းပြ�ားေုေ�သာ�ကားမ်ား ၊ လႈုေံ�ဆာု�ႈမ်ား

Page 5: Regulating Online Speech
Page 6: Regulating Online Speech

Hate Speech

• Hate Speech (အမ�န ္ု း�ကား) ဆိ�တာ လတူ�္ေုယာ က္ ဒါမွမဟ�တ္ လူအဝန ္ု းအဝိ�င္ုးတ�္ခုကိ� သူတိ��ရဲ�

လူမဳိ်း၊ ဘာသာ၊ လိေင)ဘာသဘာဝ၊ လိင္စိတ္တ ိမ္ုးညြ-တ�ႈ၊အသားေအရာင္စတဲက့ြကဲု0�ားု0ခားနားမႈေုတြတေအ�ၚမွာ

ေအု0ခခံ ၿ�ီး တ�ု ကိ္ခိုက္ေုု0�ာဆိ�တဲ့ �ကားမဳိ်း ကိ�ေုခၚ�ါတယ္။

Page 7: Regulating Online Speech

• အမ�န ္ု း�ကား (Hate Speech) ဆိ�တဲ့ �ကားလံု�း ရဲ� အဓိ�ၸါယ္ထ ဲမွာ�ါး��္နဲေ�ု0�ာဆိ�မႈေုတြတ သာ

မက�ဲ လသူားအခ်င္ုးခ်င္ုး ကြကဲု0�ားု0ခားနားမႈေု တြတကိ� ေအု0ခခံ တ�ု ကိ္ခုုကိ္တ ဲ့၊ အၾကမ္ုးဖက�ႈေု

တြတကိ� ေုတြသးထိ�းလံႈေ�ဆာု္ သလိ�ု 0ဖ�္ေုနတဲ့အမူအရာ(သိ��) အ0�ဳအမူ ၊ ေအရးအသား (သိ��) တ

ငင္ဆက္ု0�သမႈေုတြတ�ါ အက်ံုးဳဝင္ပါတယ္။

Page 8: Regulating Online Speech

Dangerous SpeechအႏုCရာယ္ရွိေုသာ�ကားမ်ား

• Powerful Speaker• Audience• Media• Historical fact

Page 9: Regulating Online Speech

Defamationအသရည္ဖ်က�ႈမ်ား

Page 10: Regulating Online Speech
Page 11: Regulating Online Speech
Page 12: Regulating Online Speech

Coming Soon …

Page 13: Regulating Online Speech

Cyberbullying အင္တာနက္ုႏုငွG့ုHျJခား ဆက္စ�္ န-္ုး�-ာေုတြတကိ�အသံု�းု0�ဳၿ�ီး ရညြညK

ယ္ခ်က္ ရိွရိွန�ဲ ထ�္ခါထ�္ခါ၊ ၾကမ္ုးတမ္ုးေုသာ အ0�ဳအမူန�ဲ အ0ခား သူေုတြတကိ� ထိခ�ုက္ိေုေ�အာင္ုလ င�္တဲ့ လ��္ရ�္ေုတြတကိ�ေုခၚ�ါတယ္။

Cyberbullying is the use of the Internet and related technologies to harm other people, in a deliberate,

repeated, and hostile manner.

Page 14: Regulating Online Speech

Phishing အင္တာနက္စာမ်က္ုႏုာွေုေတြတ�ၚက ယံု�ၾကည္ထုုကိ္တ ဲ့ က�မၸဏီမ်ားအ0ဖ�္

ေအယာင္ေုဆာင္ၿ�ီး အသံု�းု0�ဳသူနာမ-္၊ �ကားဝွက္၊ ေုပြငထ�တ္က ဒ္ အခ် ကH လက္ �တာေုတြတကိ� ခိ�းယူဖိ��ႀကဳိ�ားမႈေုတြတကိ� ေုခၚတာ�ါ။

Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.

Page 15: Regulating Online Speech
Page 16: Regulating Online Speech
Page 17: Regulating Online Speech

Sexting လိင္ပိုင္ုးဆိ�င္ရာ ေုရးသားမႈမ်ား၊ ဓါတ္ပံု�မ်ား ကိ� မိ�ဘိ�င္ုးဖ�န ္ု းမ်ားမွတဆင့ု ္

ေု�း�ိ�� ေု�ာု္ကားေုသာ လ��္ရ��်ားက�ု ိေုခၚ�ါတယ္။

Sexting is the act of sending sexually explicit messages and/or photographs, primarily between mobile phones.

Page 18: Regulating Online Speech

ASAP – As soon as possibleLOL – Laugh Out LoudASL PLS – Age, Sex, Location PleaseB4 – BeforeCUL – See You LaterHAND – Have A Nice DayBTW – By The WayF4E – Friend ForeverGr8 – GreatL8r - Later

Page 19: Regulating Online Speech

Child pornography

• ေကလးငယ�်ား�ါဝင္ေုသာ လိင္ပိုင္ုးဆိ�င္ရာေုဖာု္ု 0�မႈမ်ား၊ ဓါတ္ပံု�မ်ားကိ� ေုု0�ာင္ေုု0�ာင္တင္ုးတင္ုးေုဖာု္ု 0�တင္ဆက္ တဲ့ လ��္ရ�္ေုတြတကိ� ေုခၚ

�ါတယ္။• Child pornography refers to pornography depicting sexually

explicit activities involving a child.

Page 20: Regulating Online Speech

Child grooming• Child grooming refers to actions deliberately undertaken with

the aim of befriending and establishing an emotional connection with a child, to lower the child's inhibitions in preparation for sexual activity with the child, or exploitation (such as child labour—see trafficking of children).

Page 21: Regulating Online Speech

Hackers• The term "white hat" in Internet slang refers to an ethical

computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.[

• A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain“

• A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked, for example. Then they may offer to repair their system for a small fee.

Page 22: Regulating Online Speech
Page 23: Regulating Online Speech

Thank you for your attention.

Nay Phone Latt(Executive Director)

Myanmar ICT For Development Organization(MIDO)

[email protected]

Facebook Account – Nay P Latt