Assignment On Tech Abuse
Assignment On Tech Abuse
1. Research about the case of Justine Sacco. Write a 300word summary of the
incident and what user think about the case.
Justine Sacco became infamous for a highly controversial tweet she posted in December
2013. The public relations executive tweeted a racially insensitive remark that quickly went
viral. The tweet was perceived as offensive, insensitive, and perpetuating racial stereotypes.
Sacco was fired from her position at the media conglomerate IAC, and her online identity
was widely associated with the tweet. The case highlights the power of social media to
rapidly disseminate information and provoke public outrage. Ultimately, the case serves as a
reminder of the need for thoughtful, responsible communication in the digital age. It
highlights the potential consequences of sharing offensive or insensitive content online.
The incident involving Justine Sacco was undeniably a significant social media controversy.
Sacco's tweet was widely condemned for its racially insensitive content, and the subsequent
public backlash led to severe consequences for her personal and professional life. It serves
as a reminder of the power of social media to amplify messages and hold individuals
accountable for their online behavior.
From an ethical standpoint, Sacco's tweet can be seen as offensive and perpetuating harmful
stereotypes. It is important to recognize the negative impact such remarks can have,
particularly on marginalized communities. The swift and widespread condemnation she
faced reflects a societal intolerance for racially insensitive comments and a demand for
accountability.
However, some argue that the magnitude of the public outrage and the subsequent
consequences may have been disproportionate. There are discussions around the nature of
forgiveness and the potential for personal growth and redemption. It raises questions about
whether individuals should be permanently defined by a single misguided comment or
action, or if there is room for education, reflection, and rehabilitation.
Ultimately, the case of Justine Sacco serves as a reminder of the importance of responsible
online behavior and the need to consider the potential consequences of our words in a
digital age. It also highlights the ongoing dialogue surrounding freedom of speech, personal
accountability, and the appropriate balance between condemnation and forgiveness in the
face of offensive or harmful statements.
Reference:
2. What are the various ways in which the abuser can keep a track of person
online? List all the possible ways.
Here are some potential methods an abuser might employ, although these should not be
used for malicious purposes:
I. Social media monitoring: Abusers can track a person's activities, posts, and
interactions on social media platforms by following their accounts or creating fake
profiles to gather information.
II. Location tracking: Abusers may use location-based services or GPS tracking to
monitor a person's movements, especially if they have access to the person's
smartphone or other connected devices.
III. Keylogging: Keyloggers are malicious software or hardware devices that record
keystrokes on a computer or smartphone, allowing an abuser to monitor everything
the victim types, including passwords, messages, and browsing history.
IV. Phishing and email monitoring: Abusers may use phishing techniques to gain access
to a person's email account, enabling them to monitor incoming and outgoing
messages.
V. Spyware and malware: Malicious software can be installed on a person's device
without their knowledge, allowing an abuser to track their online activities, capture
screenshots, record audio, or access files.
VI. Stalking apps: There are various mobile applications marketed as tools for tracking
the activities of family members, but they can also be used by abusers to monitor
their victims' locations, messages, and call logs.
VII. Wi-Fi snooping: If an abuser gains access to a person's Wi-Fi network, they may be
able to monitor their online activities, such as websites visited and data transmitted.
VIII. Public records and data breaches: Abusers can search public records, such as
property ownership, vehicle registrations, or court records, to gather information
about a person. They may also exploit data breaches to obtain personal information.
It's crucial to take steps to protect user’s online privacy, such as using strong passwords,
enabling two-factor authentication, regularly updating software, being cautious with sharing
personal information online, and utilizing privacy settings on social media platforms. If user
suspect that user are being tracked or monitored online, seek assistance from law
enforcement or a trusted professional who can provide guidance and support.
3. What are the various ways in which the abuser can keep a track of person
online? List all the possible ways.
To delete user’s location history or web activity history in Gmail, we have to follow these steps:
It's important to remember that disabling or deleting user’s web activity and location history may
affect personalized experiences and recommendations from Google services.
4. What are the various ways in which the abuser can keep a track of person
online? List all the possible ways.
To enhance user’s privacy on Facebook, user can follow these steps:
a) Access user’s Facebook account and click on the downward-facing arrow in the top
right corner of the page.
b) From the dropdown menu, select "Settings & Privacy" and then click on "Settings."
c) Privacy Settings:
d) In the left-hand sidebar, click on "Privacy" to access the Privacy Settings and Tools.
e) Who Can See User’s Future Posts:
f) Under the "User’s Activity" section, click on "Who can see user’s future posts?"
g) Choose the desired audience from the options provided, such as Friends, Public, or
Custom.
h) Limiting Past Posts Visibility:
i) To limit the visibility of user’s past posts, click on "Limit Past Posts" in the "User’s
Activity" section.
j) A confirmation dialog will appear. Click on "Limit Past Posts" to restrict the visibility
of user’s previous posts to Friends only.
Profile and Tagging Settings:
k) In the Privacy Settings and Tools, click on "Profile and Tagging" in the left-hand
sidebar.
l) Who Can See What Others Post on User’s Profile:
m) Click on "Who can see what others post on user’s profile?"
n) Choose the desired audience from the options provided, such as Friends, Public, or
Custom.
o) Review Tags:
p) Enable the "Review tags people add to user’s posts before the tags appear on
Facebook?" option.
q) This will allow user to review and approve tags before they appear on user’s
timeline.
r) Timeline and Tagging Settings:
s) In the Privacy Settings and Tools, click on "Timeline and Tagging" in the left-hand
sidebar.
t) Who Can Post on User’s Timeline:
u) Click on "Who can post on user’s timeline?"
v) Choose the desired audience from the options provided, such as Friends, Only Me,
or Custom.
Enable the "Review posts user're tagged in before the posts appear on user’s timeline?"
option.
This will give user control over the posts user're tagged in before they are visible on user’s
timeline.
In the Privacy Settings and Tools, click on "Apps and Websites" in the left-hand sidebar.
Choose the desired settings to control whether user’s activity is shared with apps and
websites connected to Facebook.
Privacy Checkup:
To review and adjust additional privacy settings, click on the "Privacy Checkup" option in the
"Privacy Settings and Tools" section.
This interactive tool guides user through various privacy settings and allows user to make
changes based on user’s preferences.
It's important to regularly review and update user’s privacy settings on Facebook to ensure
user have the level of privacy user desires.
Tinder: Tinder is one of the most well-known dating apps, offering a simple swiping interface
to match with potential partners based on their profile pictures and brief bios.
Bumble: Bumble is a dating app where women make the first move. It allows users to
connect and chat, but only if the woman initiates the conversation within 24 hours of
matching.
OkCupid: OkCupid is a dating app that uses an algorithm to match users based on their
responses to personality questions. It offers a mix of casual and more serious dating options.
Hinge: Hinge focuses on building meaningful connections by emphasizing detailed profiles
and conversation starters based on shared interests.
Plenty of Fish (POF): POF is a dating app that offers both free and premium features,
allowing users to browse and message potential matches.
Grindr: Grindr is a dating app specifically designed for gay, bisexual, trans, and queer
individuals. It focuses on location-based matching and facilitates casual encounters.
HER: HER is a dating and social networking app for queer women and non-binary individuals.
It provides a safe space for LGBTQ+ individuals to connect, date, and build communities.
Coffee Meets Bagel: Coffee Meets Bagel sends curated matches, or "bagels," to users every
day, encouraging more intentional connections and conversations.
Remember to exercise caution and use these dating apps responsibly, ensuring your safety
and well-being when meeting new people.
Here are a three news articles discussing the effect of negative comments on
people/celebrities on social media:
7. List top tools available online for spying on phones and computer systems.
The word spy alone screams scandal. In a time where illegal hacking and camera access have
made many IT experts and big entrepreneurs apprehensive, it is quite normal to feel a little
cynical about digital spying.
However, as with everything, the use of phone spying apps can be both ethical and
unethical, depending on an individual’s preferred use.
1) mSpy
2) XNSPY
3) SpyBubble
4) Cocospy
5) uMobix
6) Mobilespy.at
7) Hoverwatch
8) eyeZy
9) Spyera
10) FlexiSPY
8. List recent cases of use of fake images or deepfakes impacting people in real
life.
A deepfake bot on Telegram that created over 100,000 deepfake nude images of
unsuspecting women, many of whom had their photos stolen from social media
accounts. This case shows how deepfakes can be used for sexual harassment,
blackmail and revenge porn.
A deepfake voice scam that used machine learning technology to clone the voices of
people to commit financial crimes. In one instance, a UK-based energy firm was
tricked into transferring $243,000 to a Hungarian bank account after receiving a
phone call from someone who sounded like their German boss. This case shows how
deepfakes can be used for fraud and identity theft.
A deepfake video that showed former US President Barack Obama calling his
successor Donald Trump a "total and complete dipshit". The video was actually
made by comedian Jordan Peele as a public service announcement to warn people
about the dangers of fake news and misinformation. This case shows how deepfakes
can be used for political satire and manipulation.
9. Which country has witnessed most deaths due to selfies? List 5 incidents.
According to a study by researchers from Carnegie Mellon University and Indraprastha Institute
of Information Delhi, India has witnessed the most deaths due to selfies over the past two years,
followed by Russia and the United States. Some of the incidents that occurred in India are:
In 2015, a man was killed by an elephant while trying to take a selfie with it at a wildlife park in West
Bengal.
In 2016, three students drowned after slipping into a reservoir while taking a selfie on a boat in
Nagpur.
In 2017, two teenagers were electrocuted while taking selfies on top of a train in Delhi.
In 2018, six people died after being hit by a train while posing for selfies on railway tracks in
Karnataka.
In 2019, four people drowned after falling into a water tank while taking selfies near Hyderabad.
Sexting can have negative effects on your mental health, such as anxiety, depression, low self-
esteem, shame and guilt. You might feel pressured to sext by your partner or peers, or regret
sending something that you didn’t want to share.
Sexting can damage your reputation and relationships. If your sexts get leaked or forwarded to
others without your consent, you might face bullying, harassment, blackmail or revenge porn. You
might also lose trust and respect from your family, friends or partner.
Sexting can expose you to legal risks. Depending on where you live and how old you are, sexting
might be considered a crime if it involves minors (under 18) or non-consensual sharing of intimate
images. You could face charges for producing, possessing or distributing child pornography.
Sexting can increase your risk of sexual exploitation and abuse. If you send sexts to someone you
don’t know well or trust completely, they might use them to manipulate you into doing things you
don’t want to do. They might also share them with others who could harm you physically or
emotionally.
Sexting can interfere with your personal and professional goals. If your sexts get exposed online or
offline, they might affect your chances of getting into college, finding a job or pursuing a career. They
might also cause you stress and distraction that could affect your academic performance and well-
being.