Instead of a Nigerian prince giving away his millions, fraudsters now trick people into thinking they’ll be compensated after being subjected to a personal data leak.
A decade after I flagged online bullying, some laws where passed to address the problem. But the challenge remain as online abuse is still prevalent
It is not cyberbullying when the expression is a protected speech. Expressions that fall outside free speech are those that infringe on another persons basic and human rights.
Online threats include social engineering, drive-by download attack, infected servers and removable media. PH, 5th with most online threats detected
Cyber libel is one of the crimes under the cybercrime law in PH. This is being by those at the receiving end of online bullying to seek reprieve.
Before giving apps the permission to access information in your smartphone, be mindful of likely consequences when your personal data is collected and used.
“.. bashing is not a violation of constitutional right to free speech. in fact it is a celebration of it” – Antonio Contreras
A divisive election campaign… A tight VP race… Passionate supporters… Vicious words.
Depending on your personal bias, (online) libel can be viewed as either curtailing your right to free speech and expression; or protecting you from abusive expression or speech by others
Awards will not hamper our resolve to educate the public of the proactive use of social web to reduce cyberbullying and other online abuses.
Anonymous communication is mostly used to spread lies, shame another person, spin a story and spearhead harassment/bullying, in the name of free speech
Eleanor Roosevelt once said “No one can make you feel inferior without your consent”. Thus, let no harassing behaviour affect you.
this infographic provides the telltale signs of a potential cyberbully. This can help parents and the academe reduce incidence of cyberbullying.
Though the figures is from the US, this cyberbullying infographic will be helpful in our study and campaign in the Philippines.
Free speech (art. 19) can violate a human right, because abuses can infringe on the right to privacy (art. 12) and makes us remiss of our responsibility (art. 29)
Social Engineering (SE) is one of the favorite schemes of cyber criminals to con people. It is the art of human manipulation. If employees are not given proper training about SE , companies will fall to cybercrime. Likewise, if parents are unaware, they and the kids will be victims of negative experience, if not cybercrime.
Due to popular demand and for reference purposes, the following are the videos we used on Bullying and Cyber Abuse Prevention at the recently concluded 19th STI National Youth Convention
I will flyback to Manila to talk about Bullying and Cyber Abuse Prevention. This is a “brilliant” marketing move by the brand, engaging the market on their points of interest and educating them of the likely abuses, prevention and responsible use of the mobile and digital platforms.
Per RA 10627, bullying includes social bullying and gender-based bullying. Cyberbullying includes texting, email, IMs/Chats, the internet, social media & online games