1 / 23

Regulating Online Speech

Regulating Online Speech. Nay Phone Latt. Fake Photo – ဓါတ္ပံုအတုမ်ား. Verifying Photo. www.tineye.com Google (Search by Image) www.metapicz.com . Hate Speech & Incitement အမုန္းပြားေစေသာစကားမ်ား ၊ လႈံ႕ေဆာ္မႈမ်ား. Hate Speech.

adonis
Télécharger la présentation

Regulating Online Speech

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Regulating Online Speech Nay Phone Latt

  2. Fake Photo –ဓါတ္ပံုအတုမ်ား

  3. Verifying Photo • www.tineye.com • Google (Search by Image) • www.metapicz.com

  4. Hate Speech & Incitementအမုန္းပြားေစေသာစကားမ်ား ၊ လႈံ႕ေဆာ္မႈမ်ား

  5. Hate Speech • Hate Speech (အမုန္းစကား) ဆိုတာလူတစ္ေယာက္ ဒါမွမဟုတ္ လူအဝန္းအဝိုင္းတစ္ခုကိုသူတို႕ရဲ႕ လူမ်ိဳး၊ ဘာသာ၊ လိင္သေဘာသဘာဝ၊ လိင္စိတ္တိမ္းညြတ္မႈ၊ အသားအေရာင္စတဲ့ကြဲျပားျခားနားမႈေတြအေပၚမွာအေျခခံ ၿပီးတုိက္ခိုက္ေျပာဆိုတဲ့ စကားမ်ိဳးကိုေခၚပါတယ္။

  6. အမုန္းစကား (Hate Speech) ဆိုတဲ့ စကားလံုးရဲ႕ အဓိပၸါယ္ထဲမွာပါးစပ္နဲ႕ေျပာဆိုမႈေတြ သာမကပဲလူသားအခ်င္းခ်င္းကြဲျပားျခားနားမႈေတြကိုအေျခခံတုိက္ခုိက္တဲ့၊ အၾကမ္းဖက္မႈေတြကိုေသြးထိုးလံႈ႕ေဆာ္ သလိုျဖစ္ေနတဲ့ အမူအရာ(သို႕) အျပဳအမူ ၊ အေရးအသား (သို႕) တင္ဆက္ျပသမႈေတြပါ အက်ံဳးဝင္ပါတယ္။

  7. Dangerous Speechအႏၱရာယ္ရွိေသာစကားမ်ား • Powerful Speaker • Audience • Media • Historical fact

  8. Defamationအသရည္ဖ်က္မႈမ်ား

  9. Coming Soon …

  10. Cyberbullying အင္တာနက္ႏွင့္အျခားဆက္စပ္ နည္းပညာေတြကိုအသံုးျပဳၿပီးရည္ရြယ္ခ်က္ ရွိရွိနဲ႕ ထပ္ခါထပ္ခါ၊ ၾကမ္းတမ္းေသာအျပဳအမူနဲ႕ အျခားသူေတြကိုထိခုိက္ေစေအာင္လုပ္တဲ့ လုပ္ရပ္ေတြကိုေခၚပါတယ္။ Cyberbullying is the use of the Internet and related technologies to harm other people, in a deliberate, repeated, and hostile manner.

  11. Phishing အင္တာနက္စာမ်က္ႏွာေတြေပၚကယံုၾကည္ထုိက္တဲ့ ကုမၸဏီမ်ားအျဖစ္ အေယာင္ေဆာင္ၿပီးအသံုးျပဳသူနာမည္၊ စကားဝွက္၊ ေငြထုတ္ကဒ္ အခ်က္အလက္ စတာေတြကိုခိုးယူဖို႕ႀကိဳစားမႈေတြကိုေခၚတာပါ။ Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.

  12. Sexting လိင္ပိုင္းဆိုင္ရာေရးသားမႈမ်ား၊ ဓါတ္ပံုမ်ားကိုမိုဘိုင္းဖုန္းမ်ားမွတဆင့္ ေပးပို႕ ေစာ္ကားေသာလုပ္ရပ္မ်ားကုိေခၚပါတယ္။ Sexting is the act of sending sexually explicit messages and/or photographs, primarily between mobile phones.

  13. ASAP – As soon as possible LOL – Laugh Out Loud ASL PLS – Age, Sex, Location Please B4 – Before CUL – See You Later HAND – Have A Nice Day BTW – By The Way F4E – Friend Forever Gr8 – Great L8r - Later

  14. Child pornography • ကေလးငယ္မ်ားပါဝင္ေသာလိင္ပိုင္းဆိုင္ရာေဖာ္ျပမႈမ်ား၊ ဓါတ္ပံုမ်ားကိုေျပာင္ေျပာင္တင္းတင္းေဖာ္ျပတင္ဆက္ တဲ့ လုပ္ရပ္ေတြကိုေခၚပါတယ္။ • Child pornography refers to pornography depicting sexually explicit activities involving a child.

  15. Child grooming • Child grooming refers to actions deliberately undertaken with the aim of befriending and establishing an emotional connection with a child, to lower the child's inhibitions in preparation for sexual activity with the child, or exploitation (such as child labour—see trafficking of children).

  16. Hackers • The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.[ • A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain“ • A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked, for example. Then they may offer to repair their system for a small fee.

  17. Thank you for your attention. Nay Phone Latt (Executive Director) Myanmar ICT For Development Organization (MIDO) nayphonelatt@gmail.com 095047281 Facebook Account – Nay P Latt

More Related