%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 19 0 R ] /Count 2 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 18 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240521142002+00'00') /ModDate (D:20240521142002+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R 16 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 6364 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 69.220 521.469 677.514 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 746.734 m 566.734 746.734 l 565.984 745.984 l 46.016 745.984 l f 566.734 746.734 m 566.734 69.220 l 565.984 69.220 l 565.984 745.984 l f 45.266 746.734 m 45.266 69.220 l 46.016 69.220 l 46.016 745.984 l f 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(BEAT THE CYBERBULLY)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(Cyberbullying)] TJ ET BT 121.028 564.033 Td /F4 9.0 Tf [( is deliberately and repeatedly harming or harassing someone using electronic technology - this includes )] TJ ET BT 61.016 553.044 Td /F4 9.0 Tf [(devices and equipment such as cell phones, computers, and tablets, as well as communication tools including social )] TJ ET BT 61.016 542.055 Td /F4 9.0 Tf [(media sites, text messages, chat, and websites.)] TJ ET BT 61.016 522.066 Td /F4 9.0 Tf [(With the increased use of communication technology, cyberbullying has become increasingly common, especially among )] TJ ET BT 61.016 511.077 Td /F4 9.0 Tf [(teenagers.While the term cyberbullying is used predominantly for children or teenagers, )] TJ ET BT 414.158 511.077 Td /F3 9.0 Tf [(cyberstalking)] TJ ET BT 472.181 511.077 Td /F4 9.0 Tf [( or )] TJ ET BT 61.016 500.088 Td /F4 9.0 Tf [(cyberharassment is when the same behaviour occurs in adults.)] TJ ET BT 61.016 480.099 Td /F3 9.0 Tf [(What is cyberbullying or -stalking?)] TJ ET BT 61.016 460.110 Td /F4 9.0 Tf [(The main goal of this harassment is to threaten a person's reputation, employment, earnings, safety or try to turn people )] TJ ET BT 61.016 449.121 Td /F4 9.0 Tf [(against them. Cyberbullies aim to intimidate, hurt, control, manipulate, humiliate or falsely discredit someone. Their actions )] TJ ET BT 61.016 438.132 Td /F4 9.0 Tf [(are deliberate, hostile, usually repeated and intended to harm.)] TJ ET BT 61.016 418.143 Td /F4 9.0 Tf [(Cyberstalkers use public forums, social media or online information sites to launch their attacks on. Online platforms )] TJ ET BT 61.016 407.154 Td /F4 9.0 Tf [(provide anonymity and bullies can remain ignorant of the consequences their attacks have on the victims.According to the)] TJ ET BT 61.016 396.165 Td /F4 9.0 Tf [(National Council on Crime Prevention's survey, 81% of teenagers thought others cyberbully because it's funny.)] TJ ET BT 61.016 376.176 Td /F4 9.0 Tf [(Cyberbullying can come in various forms. It can be someone repeatedly sending e-mails or text messages even when the )] TJ ET BT 61.016 365.187 Td /F4 9.0 Tf [(person clearly stated they don't want them. It can include repeated threats, sexual remarks, hate speech, false )] TJ ET BT 61.016 354.198 Td /F4 9.0 Tf [(accusations or ridiculing someone.)] TJ ET BT 61.016 334.209 Td /F4 9.0 Tf [(Some bullies/stalkers will even go so far as to hacking into a site and changing information or posting false statements to )] TJ ET BT 61.016 323.220 Td /F4 9.0 Tf [(humiliate or discredit a person. They may also publicise a victim's personal data or create a fake account to use to )] TJ ET BT 61.016 312.231 Td /F4 9.0 Tf [(defame, discredit or humiliate them.)] TJ ET BT 61.016 292.242 Td /F4 9.0 Tf [(The 8 most common cyberbullying tactics used by teens according to )] TJ ET 0.373 0.169 0.255 rg BT 338.630 292.242 Td /F4 9.0 Tf [(www.wikipedia.org)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 338.630 291.091 m 413.141 291.091 l S 0.400 0.400 0.400 rg BT 413.141 292.242 Td /F4 9.0 Tf [(are the following:)] TJ ET BT 78.360 272.269 Td /F4 9.0 Tf [(1.)] TJ ET BT 91.016 272.253 Td /F4 9.0 Tf [(Exclusion: Teenagers intentionally exclude others from an online group.)] TJ ET BT 78.360 261.280 Td /F4 9.0 Tf [(2.)] TJ ET BT 91.016 261.264 Td /F4 9.0 Tf [(Cyberstalking: Teens will harass others by constantly sending emails, messages, or tagging others in posts they )] TJ ET BT 91.016 250.275 Td /F4 9.0 Tf [(dont want to be tagged in.)] TJ ET BT 78.360 239.302 Td /F4 9.0 Tf [(3.)] TJ ET BT 91.016 239.286 Td /F4 9.0 Tf [(Gossip: Post or send cruel messages that damage anothers reputation, relationships, or confidence.)] TJ ET BT 78.360 228.313 Td /F4 9.0 Tf [(4.)] TJ ET BT 91.016 228.297 Td /F4 9.0 Tf [(Outing/Trickery: Trick another teen into revealing secrets or embarrassing information which the cyberbully will )] TJ ET BT 91.016 217.308 Td /F4 9.0 Tf [(then share online.)] TJ ET BT 78.360 206.335 Td /F4 9.0 Tf [(5.)] TJ ET BT 91.016 206.319 Td /F4 9.0 Tf [(Harassment: Post or send offensive, insulting, and mean messages repeatedly.)] TJ ET BT 78.360 195.346 Td /F4 9.0 Tf [(6.)] TJ ET BT 91.016 195.330 Td /F4 9.0 Tf [(Impersonation: Create fake accounts to exploit another teens trust. They may also hack into an account and post )] TJ ET BT 91.016 184.341 Td /F4 9.0 Tf [(or send messages that are damaging to the persons reputation or relationships.)] TJ ET BT 78.360 173.368 Td /F4 9.0 Tf [(7.)] TJ ET BT 91.016 173.352 Td /F4 9.0 Tf [(Cyber Threats: Threaten or imply violent behaviour toward others to make them feel uncomfortable.)] TJ ET BT 78.360 162.379 Td /F4 9.0 Tf [(8.)] TJ ET BT 91.016 162.363 Td /F4 9.0 Tf [(Flaming: Fights online that involve hateful or offensive messages that may be posted on various websites, forums, )] TJ ET BT 91.016 151.374 Td /F4 9.0 Tf [(or blogs.)] TJ ET BT 61.016 131.385 Td /F4 9.0 Tf [(More definitions of cyberbullying can be found on )] TJ ET 0.373 0.169 0.255 rg BT 259.115 131.385 Td /F4 9.0 Tf [(The Centre for Justice and Crime Prevention's website.)] TJ ET 0.18 w 0 J [ ] 0 d 259.115 130.234 m 478.913 130.234 l S 0.400 0.400 0.400 rg BT 61.016 111.396 Td /F3 9.0 Tf [(Who are the bullies?)] TJ ET BT 61.016 91.407 Td /F4 9.0 Tf [(The root of cyberbullying is the same as face-to-face bullying. The only difference is the convenience and anonymity of )] TJ ET BT 61.016 80.418 Td /F4 9.0 Tf [(technologywhich makes it even easier.)] TJ ET q 225.000 0 0 174.000 61.016 398.824 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 398.8243 286.0157 572.8243 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/2016/11/cyber-bullying/bully-655659_960_720/) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 338.6297 291.4096 413.1407 300.5671 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (https://en.wikipedia.org/wiki/Cyberbullying) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 259.1147 130.5526 478.9127 139.7101 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (http://www.cyberbullying.org.za/what-is-cyberbullying.html) >> endobj 18 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 232 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 15126>> stream JFIF;CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), quality = 82 C    !'"#%%%),($+!$%$C   $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$," }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?(((((((((((((((((((((QEQEQEQF((((((((((((((((((((((((((((((((? 3EP3Ef(E4Q@Q@Q@Q@h3EPEPEP3EQEQEQEQ((4f(3햇m۫o`y }9`O5m5>Ѝ>2.؟x@Ji;cJTVjݝe3;VREXnTM<=&_TW>i$1;M5~s =kMeë[~HW) >np)%FG}Bt s֞ufbɧ_Mv>.a8CTgf#i:HiMFjZ>A?R?'ռRnLI\`plTjzݵXi?{qBpMsF3ڿᲮ[:񝚙}?:m~.VMrNN m` Cý|7:؉Ñ"x G왨>,}vT 0[ pƗy#o>&xö>U{ {/w2+c0Þ95lX9OW.?;]˿hyO-v* 'gӉ^U!Ls^+)_Dz8l6tԪOigZ6øpׄlצV/[VGxz/ C5խ6@j8iaºD@*ۜa 'oJh}jym :w|K.Y ʌ)T)AnD0ҚM=ϠojZKhǂo$W#]C8^<05:|a/ p):Ox)aOX65v w=yz潯Bu7k孻^¨t&lztB="1TȵzHZޅWk i.e]WغT7mfUbT9Ǘ5蟵kcW1pV2:_+x@qҒ:3nI1n<cuݜ2KKl)9I3a$l|}AgdÚs*P)7Qs$u_9=iI쮮ث9dXd`Gp]7Omo#g4q>F Y@Qɪb֒t}\RQEHG.#ᩦ'bi}ԧom&4aF7_bOGZʴ`W p-ӿ|eHEu.6' 5z vI*o(*yںo5k;^BɅ ]BݙSnˆ'$QK>0†81 +p3NzW &_=9ziE=zY_rI<1s"C:6O>H#\4G _A6,Aw<d%m`0+ۥ`xo4Zb=Ai\,*|CI&^AiqQzׯU$څ:70Wv=+g[Coqf:}h`wlɂ9H Ӛ\k~'/"xu8Y H#:_ksw3w%ҬI a\q]3Bwwk]Oml?]J$Zջly- Hܟ*Y])7c;''ԡj7;OY&C_1MFm;LqŤ1BZ2e$Ԑs`SE]|vt3-ɹ@O(W}Sҭ>+H_k'm*AN+y+r; մj!+#$Hi 3pk˖e:WGT0I>b$iKG$%Oɑd }'is[[T_/ȋ@JpNz>|"YٱVB $>Z?:S6gTW i}68T $MZ *]G}JLE\hpHc9<[\xױqqvCk >r7#yZ|jODr0CO^sm͉qFH;'ֺ.W*e,qRd;/xKLJܕ+;dY.%)9Yӯ*wHe˨-.-[x|TciA)é*;q/Ñ>)?);BƹnNkƯ$š>ސ zlr/ChvG? -/3`+8`!4S*(0 Դi:i\/RHRt|O[x:BubiI0lB8l>*Z{п:xEmܾKUp%]J>n/?lٵͨAy}ȿ_坥nK67зħKX? WPl/a`_V:t3Mݮ$ yY-@ y\w.,RK2yFL0j#X#8^a{ka8vmEӴEyo/98cxnfWAv#Iz-a3<4>8M9BqdBAV,Gvb.RvjTil4{KUF $5)ɷr7ː2:zVR־-96cE8$S_.[ۥAs-$N zm$~-J/H9l*~cvw!P7K&qyY,s+k[x ;BHUI﹟]όPůfݽQ;6Tsk7k 1JԛK^X['V9iuşs*E ElcUqpzaa}^R~܌iqr GBMuӮVMO֎"@``mvGxEۑhUq34li;EPf%)2E+.:,ɞ~W<1k{]n[Y/.8Dt.p ?hnzD׍WZO9\^Gx ˙ 8'=)#gD oݸ*@a2O\zץӵg6A_|S"['Dd7b\}-WYԺvv|eMмY r>;Op$x~dףD!k4mGZܼw11˴e\/ڭj~ W[x`iRɯ.;I'SǛ;20A"lonB]ϥi?on#mho njoh7g dq+ӍjM;_O+;o櫫h[Nu7!+f>/C[H=ͺEclyH@xKƛ -Djki'4N aASXݿ!{MO{5b[wD>lp@\]5+rj-N{>ƞ,ҴhF!/̂.F@TS޿D"!cB"`:_%ʾu4y4 |Z P$U\d޾'Š(A_(~$"lh>!j;嶰gbGTWF4xr>0 2\4APH'Ծ"]oźݷm1[$fG_Tlkzם%h'x|QsJ,+S#c%'ֺMg[ӭ-/|GKiY3]b2̣Z9;rK孻6uKSVXabKrN6y9H?iZ-NJ=zl3v$| 8 H\Ïj^ a\h̶MܦFb) uEm .$ '"0UU6B`=JyeI$_MrhݨſMmxgᏍ$+غ~FOӵ=Z m.PI6U5K]t CeI?7|zW *ݦx},ܩ9Igx ״ʵ~:nQ4z_ R;D6ږd'bx|DԮd/ vЇ`#11\f緵܉Z͓B >l_ V1mη0̪ k6_0mh'ss|e?6/ޱLDKKszE=EAvY< i< c\Gt$-Fqolқĺ,`YVO)@03 ,q8ǃ5Ǿ E!Z<83_.p6 W-R>ZUoc]ⷋཊMBKK_1O3~t\7siSMqZ@gHBEba:qR,x-B&7g-!hD|c>:]SΗ0,A >W u$^QK_NI.KKwrmfх%&TVvbA#W KmMIXF4;[<9RT^Lb/g~[l'$6N9?_e,𧈥ӢmZ*?+ؾL\b,V6<kR פI2(ŇP@Ƕ{Wi$"[U7Nn`w0Fq[w7Xx~"}]=PFFPw vH;đIt!szXd,A;W x܃I+~'1g^m''d>Xlorhs'9⅖室]ihV"!'j?ZoFyھI38*ĸg2nQWԿKma2OmfF,$?f9UIh=ʊ(F7ͬjr$`Ɍ}*hlűTInVx\`a5o E}[R$i&*mrTc {dEj2yֶMŻFh [Y-<'`Op]h%] BɻxʜqN,Ϥ=ٳGmK8 9*!#wl uU9$f3\h]?e 9TqLϑϸ dZ.oh:U!訡G*w.b(jMOH|u6֑ m,tQߥ}9_)~<_':ywugn,^&$,рqF}}k$F{k\Ib(~k־voWy[([Ī2s5Ol4mUТ{wc]0Ӓ+uuc3iRZF$VnctVF;rX1pw dVuož%X`)p0@ 99N'4LIDbAXԕYu=;g1 # S_:_ZZï.鎜' 3AA஦Ȭ;fl?||=޻$QI@%!&U\r++[l4gw^<,~m[^r9D>9FA%_#>Ö{޳KjW:3xWOU5k>VY ?ylV>xfG.Q#;PHᤒiY-a#ct]5*Xhu;[o~2l&m'bs0Q\\-*Ib{WeiCGkduigrE}M/Þ 䰷ԯ,52'Y Lf^_'\hUiQZ?~7i7 Kn~OF>}]#}NDpa9^xZ|Jp>YnN$!prp9sm$? /e=>;nb8nTs{'{x(Il׮_ozg2hZƧ6mwcӷPySBYl[#NV)npǝжFk _Ű$dX'?e3|g+ҬsF捱csJQקo`爃qVn  4]k|n:@r~~8k)t𯈓IW[Eնc<9y|E8" o8ba.=AU?V4l4V4g4C pң35PIkz٣";.[xg54hF|cV?MJ,ޫ%m|,*LZ0f푚U㭖T%K__,|A:vK*1c[mnmn1 / ;R[\Ԝ+\85Bs}qY˲=w?e hhJr2#|ٯq[_Fq*˦8Q$9tRO՞8b=6Vr,KcـǞkVljׂڥt ( g~i>iӦys1ξk#>.'3(x#.铏NG?Q5x-&߇>~_O6xX9 H@'#W͗K/5Ⱦ[@uh[j1gImd}3q`4au0H `qe~gOQ~r֍;鯽tz.oe~D; ́v8&J̥Pʭ8+fPYl00B8}gv,t(oΒIG% IVV:ibp|i|N^/} m_/(XΟ'iϯ4Ii;v3S^og.a4 .ˉ7!lW?AeQu-IFr@$3*G2՜]ӓx0xZH3[l¿?UbڼV@T4*cA ~ׅw!q NxF :q^CJӌe~$u$' I+pеA{GvrMru ķV}ۉ$B/\ZUφuke+P-1;z^HiOx[H—,a'$\z_x6;w;.m̒(wڼv*ez8HI=[֛t0|k7&(> ,C4?0wN| .c' gvQʰF9ZB.UaϾ]*@ZՇ J݌12~L8ð+'sc^NNRoiUsjRvZ%׽n=*P:i/"E$m'~9q{d՘~Zk"?& ow|ۧLʶu JUEiťkB-O EZOo)lS{ VApqVu1mVZGMZn6ޝ/Wy1lOx\XϽ|hno$MId1$;R@^//K~_^&ɡ'V,{95+jQmV).y@۲9M&;3>"uIأN~gu5H-#*ƠV&1#+ɧk#Z9Kh.e{K=]>)cO+19 k8ŔG5xNa]Miyk2)8ݱ$Wˎ| {øI_SEo^%[I*۳gwn=OF[MNɪ; +"D} H]o=Hgl?Y%:/*NZ}Z]k+ O1o lcAX渉I1~T˗yn|4]AHVp`X1c;?7+ QdG ,*(S@cyW~ ^2mkɒ@ E0<7͞;((+>,Ņ֤%k~-"HPFף@>kUǰ_:2tlnz~zl@-Woqfu;Hb?3pp8_?Ś_/> endobj 20 0 obj << /Length 3045 >> stream 0.400 0.400 0.400 rg 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 472.621 521.469 285.363 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 472.621 m 566.734 472.621 l 565.984 473.371 l 46.016 473.371 l f 566.734 757.984 m 566.734 472.621 l 565.984 473.371 l 565.984 757.984 l f 45.266 757.984 m 45.266 472.621 l 46.016 473.371 l 46.016 757.984 l f 0.400 0.400 0.400 rg BT 61.016 740.193 Td /F4 9.0 Tf [(Usually, a bully will know their victim and attackthem because of their own prejudice, whether it's race, religion or sexual )] TJ ET BT 61.016 729.204 Td /F4 9.0 Tf [(orientation. Or merely because they're "not cool" or they didn't like something they said on social media.)] TJ ET BT 61.016 709.215 Td /F4 9.0 Tf [(It's important to keep in mind that, in general, a bully's behaviour stems from their own problems or issues. According to )] TJ ET BT 61.016 698.226 Td /F4 9.0 Tf [(Stopbullying.gov, there are two main groups who harass others. Popular kids or teens bully because they think it will make )] TJ ET BT 61.016 687.237 Td /F4 9.0 Tf [(them more popular or hurting others give them a false perception of power. At the other end of the spectrum are those )] TJ ET BT 61.016 676.248 Td /F4 9.0 Tf [(who bully because they are victims of bullying themselves and it's their way to lash out.)] TJ ET BT 61.016 654.459 Td /F3 9.0 Tf [(How to beat cyberbullying or cyberstalking)] TJ ET BT 61.016 634.470 Td /F4 9.0 Tf [(In most countries, cyberstalking has the same consequences as physical stalking. South Africadoes not have specific )] TJ ET BT 61.016 623.481 Td /F4 9.0 Tf [(legislation dealing with cyberbullying. The victims of cyberbullying, therefore, have to rely on criminal law and/or civil law. )] TJ ET BT 61.016 612.492 Td /F4 9.0 Tf [(More information on these laws can be found on )] TJ ET 0.373 0.169 0.255 rg BT 255.614 612.492 Td /F4 9.0 Tf [(The Centre for Justice and Crime Prevention's website.)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 255.614 611.341 m 475.412 611.341 l S 0.400 0.400 0.400 rg BT 61.016 592.503 Td /F4 9.0 Tf [(For this reason, it's important to deal with cyberbullying as soon as it rears its head. The )] TJ ET 0.373 0.169 0.255 rg BT 412.880 592.503 Td /F4 9.0 Tf [(video below)] TJ ET 0.18 w 0 J [ ] 0 d 412.880 591.352 m 460.400 591.352 l S 0.400 0.400 0.400 rg BT 460.400 592.503 Td /F4 9.0 Tf [( provides some )] TJ ET BT 61.016 581.514 Td /F4 9.0 Tf [(valuable hints in this regard.)] TJ ET BT 61.016 561.525 Td /F4 9.0 Tf [()] TJ ET BT 87.826 541.536 Td /F4 9.0 Tf [([SOURCES: http://www.bullying.co.uk/cyberbullying/,http://www.deletecyberbullying.org/why-do-people-cyberbully/, )] TJ ET BT 333.418 530.547 Td /F4 9.0 Tf [(http://www.cyberbullying.org.za/south-african-law.html])] TJ ET BT 61.016 510.558 Td /F4 9.0 Tf [()] TJ ET BT 61.016 490.569 Td /F4 9.0 Tf [(Posted in:Communication,E-mail,General,Security | Tagged:Cyberbullying | With 0 comments)] TJ ET endstream endobj 21 0 obj << /Type /Annot /Subtype /Link /A 22 0 R /Border [0 0 0] /H /I /Rect [ 255.6137 611.6596 475.4117 620.8171 ] >> endobj 22 0 obj << /Type /Action /S /URI /URI (http://www.cyberbullying.org.za/south-african-law.html) >> endobj 23 0 obj << /Type /Annot /Subtype /Link /A 24 0 R /Border [0 0 0] /H /I /Rect [ 412.8797 591.6706 460.3997 600.8281 ] >> endobj 24 0 obj << /Type /Action /S /URI /URI (https://www.youtube.com/watch?v=Jwu_7IqWh8Y) >> endobj xref 0 25 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000339 00000 n 0000000376 00000 n 0000000511 00000 n 0000000607 00000 n 0000007023 00000 n 0000007135 00000 n 0000007242 00000 n 0000007362 00000 n 0000007478 00000 n 0000007605 00000 n 0000007727 00000 n 0000007855 00000 n 0000007950 00000 n 0000008078 00000 n 0000008188 00000 n 0000023483 00000 n 0000023574 00000 n 0000026672 00000 n 0000026800 00000 n 0000026906 00000 n 0000027034 00000 n trailer << /Size 25 /Root 1 0 R /Info 5 0 R >> startxref 27129 %%EOF Communication « Informasietegnologie
  • Recent Posts

  • Categories

  • Archives

Communication

Whatsapp scams

Wednesday, November 23rd, 2016

WhatsApp is a popular communication tool, used by students and personnel every day. On the downside, it provides cyber criminals with another way to convince you to part with your well-earned money and unfortunately it’s usually quite convincing.

WhatsApp scams come in many different forms and are often very convincing. Just make sure that you stay vigilant and don’t fall for anything that seems too good or too worrying to be true. Just because a friend or a family member sends you something, it doesn’t mean that it is safe.

Voucher scams

A message arrives in your WhatsApp from someone who looks like your friend, recommending a deal they’ve found. The messages usually come with a link that actually takes you to another website and tricks you into giving your personal information. Don’t ever click a link you’re not sure of and certainly don’t ever hand over personal information to a website you haven’t checked.

WhatsApp shutting down

There are many fake messages claiming that WhatsApp is going to end unless enough people share a certain message. The messages often look convincing, claiming to come from the CEO or another official. They’re written using the right words and phrases and look like an official statement. Any official statement wouldn’t need users to send it to everyone like a round robin. You would either see it in the news or it’ll come up as a proper notification in the app from the actual WhatsApp team.

WhatsApp threatening to shut down your account

This is very similar to the previous scam. It looks like an official message that claims that people’s WhatsApp accounts are being shut down for being inactive. Sending the message on will prove that it’s actually being used and often instructs people to pass it along.

WhatsApp forcing you to pay

Similar to the previous scam, with the only difference being that the message supposedly exempts you from having to pay for your account – if you send it on to other people.

WhatsApp Gold or WhatsApp Premium

The claim suggests that people pay for or download a special version of WhatsApp, usually called Gold or Premium. It offers a range of exciting-sounding features, like the ability to send more pictures, use new emoji or add extra security features. The problem is that it is far from secure. Downloading the app infects people’s phones with malware that use the phone to send more fake messages at the cost of the original victim.

Emails from WhatsApp

Spam e-mails are bad enough. E-mails plus WhatsApp is even worse. There’s a range of scams out there that send people e-mails that look like they’ve come from WhatsApp, usually looking like a notification for a missed voice call or voicemail. But when you click through, you will end up getting tricked into giving over your information, passphrases etc. Don’t ever click on an e-mail from a questionable sender. WhatsApp doesn’t send you e-mails including information about missed calls or voicemails.

Fake WhatsApp spying apps

Currently, it is not possible to let people spy on other’s conversations on WhatsApp, because it has end-to-end encryption enabled, which ensures that messages can only be read by the phones that send and receive them. These scam apps encourage people to download something that isn’t actually real and force people to pay money for malware, or actually read your chats once they’ve got onto your phone.

Lastly – 

Hopefully, you have  already blocked sharing your WhatsApp details with Facebook (telephone number, name etc. and allowing Facebook to suggest phone contacts as friends) and Facebook will not be able to  make your WhatsApp account accessible to the 13 million South African Facebook users.

There are some details about this controversial policy change by WhatsApp on the following page: http://www.mirror.co.uk/tech/you-can-stop-whatsapp-sharing-8893949

 

[ARTICLE BY DAVID WILES]

 

 

Beat the cyberbully

Friday, November 11th, 2016

bully-655659_960_720Cyberbullying is deliberately and repeatedly harming or harassing someone using electronic technology  – this includes devices and equipment such as cell phones, computers, and tablets, as well as communication tools including social media sites, text messages, chat, and websites. 

With the increased use of communication technology, cyberbullying has become increasingly common, especially among teenagers. While the term cyberbullying is used predominantly for children or teenagers, cyberstalking or cyberharassment is when the same behaviour occurs in adults. 

What is cyberbullying or -stalking?

The main goal of this harassment is to threaten a person’s reputation, employment, earnings, safety or try to turn people against them. Cyberbullies aim to intimidate, hurt, control, manipulate, humiliate or falsely discredit someone. Their actions are deliberate, hostile, usually repeated and intended to harm.

Cyberstalkers use public forums, social media or online information sites to launch their attacks on. Online platforms provide anonymity and bullies can remain ignorant of the consequences their attacks have on the victims. According to the National Council on Crime Prevention’s survey, 81% of teenagers thought others cyberbully because it’s funny. 

Cyberbullying can come in various forms. It can be someone repeatedly sending e-mails or text messages even when the person clearly stated they don’t want them. It can include repeated threats, sexual remarks, hate speech, false accusations or ridiculing someone.

Some bullies/stalkers will even go so far as to hacking into a site and changing information or posting false statements to humiliate or discredit a person. They may also publicise a victim’s personal data or create a fake account to use to defame, discredit or humiliate them.

The 8 most common cyberbullying tactics used by teens according to www.wikipedia.org are the following:

  1. Exclusion: Teenagers intentionally exclude others from an online group.
  2. Cyberstalking: Teens will harass others by constantly sending emails, messages, or tagging others in posts they don’t want to be tagged in.
  3. Gossip: Post or send cruel messages that damage another’s reputation, relationships, or confidence.
  4. Outing/Trickery: Trick another teen into revealing secrets or embarrassing information which the cyberbully will then share online.
  5. Harassment: Post or send offensive, insulting, and mean messages repeatedly.
  6. Impersonation: Create fake accounts to exploit another teen’s trust. They may also hack into an account and post or send messages that are damaging to the person’s reputation or relationships.
  7. Cyber Threats: Threaten or imply violent behaviour toward others to make them feel uncomfortable.
  8. Flaming: Fights online that involve hateful or offensive messages that may be posted on various websites, forums, or blogs.

More definitions of cyberbullying can be found on The Centre for Justice and Crime Prevention’s website.

Who are the bullies?

The root of cyberbullying is the same as face-to-face bullying. The only difference is the convenience and anonymity of technology which makes it even easier.

Usually, a bully will know their victim and attack them because of their own prejudice, whether it’s race, religion or sexual orientation. Or merely because they’re “not cool” or they didn’t like something they said on social media. 

It’s important to keep in mind that, in general, a bully’s behaviour stems from their own problems or issues. According to Stopbullying.gov, there are two main groups who harass others. Popular kids or teens bully because they think it will make them more popular or hurting others give them a false perception of power. At the other end of the spectrum are those who bully because they are victims of bullying themselves and it’s their way to lash out. 

How to beat cyberbullying or cyberstalking

In most countries, cyberstalking has the same consequences as physical stalking. South Africa does not have specific legislation dealing with cyberbullying. The victims of cyberbullying, therefore, have to rely on criminal law and/or civil law. More information on these laws can be found on The Centre for Justice and Crime Prevention’s website.

For this reason, it’s important to deal with cyberbullying as soon as it rears its head. The video below provides some valuable hints in this regard.

 

[SOURCES: http://www.bullying.co.uk/cyberbullying/, http://www.deletecyberbullying.org/why-do-people-cyberbully/, http://www.cyberbullying.org.za/south-african-law.html]

 

Google says Allo

Friday, September 30th, 2016

alloWe’ve seen Google grow from a small company developing a search engine to one known for its groundbreaking work, developing not only technology for today but also self-driving cars and virtual reality platforms for the future. 

Rich Miller of Data Centre Knowledge estimated that in 2011 Google was running more than one million data centres around the world. Not bad for a company that started off as a research project by two PhD Stanford University students, Larry Page and Sergey Brin, in 1996.

On 21 September they added a new phone-based chat application, Allo, to their list of innovations. 

Much speculation has been made as to why Google would launch a stand-alone app that can only be used on mobile devices and can’t be integrated with other devices. Some claim Allo is their attempt at breaking into the Indian market, the 3rd largest in the world after China and the US. And as we all know, censorship in China doesn’t allow much in the line of western technology, hence Google’s focus on India. 

One of the advantages of using Google products is that it can be accessed over all platforms with your Google account. This is not the case with their latest brainchild.  Allo won’t recognise you as a Google user. In fact, you have to register anew, without an option to register with your Gmail address. Allo, like Whatapp, uses your mobile number as a form of recognition instead of an e-mail address. 

Allo does not replace the less-than-perfect Google Hangouts. It doesn’t do video chat or send SMSs. Another app, Duo, which is used exclusively for video, was released at the same time as Allo. So why install Allo at all? There are some positive points to be made. 

Google’s machine learning technology might be the main reason why Allo downloads passed the million mark this week. Allo introduces Google Assistant, an integrated, smart search bot embedded in your chat. It enables access to information without opening an additional tab or alternatively, you can start a private conversation by typing @google and asking a question. Think of it as Siri for Android, only more efficient. 

Other nice-to-haves include whisper/shout, a tool enabling you to change the size of your text by holding down the Send button and dragging your finger upwards. Not revolutionary, but possibly useful if you’re in a hurry. 

If verbal communication is not your strength, Allo has a large collection of sticker packs you use to express yourself with visually. The new Ink feature also allows you to draw on or add text to photos.

On a practical level, Allo uses Smart Replies, a tool which apparently thinks for you. By tracking your most used phrases and words, it predicts what your replies might be. Almost like autocorrect, only more clever and less embarrassing.

Lastly, there’s Incognito mode

Initially, when Allo was announced earlier this year, Google claimed that conversations would automatically be deleted after a specific time, as set by you. 

However, when Allo was released this week, Google changed their mind. They announced that the current version of Allo will store messages indefinitely on Google’s servers to enable them to collect data to improve their products. Unless you decide to delete your messages, they will stay on Google’s servers.  It’s this announcement that prompted Edward Snowden to warn the world against installing Google Allo.

The good news is you can still use Incognito Mode, which is end-to-end encrypted and will not store your messages. A good thing if you are sensitive about your data being potentially accessible to a third party or if you are Edward Snowden.

Google Allo can be downloaded from the Google Play store.

SOURCES:

https://en.wikipedia.org/wiki/Google_Allo
http://arstechnica.com/gadgets/2016/09/google-allo-is-incomplete-but-assistant-is-the-companys-future/
http://www.pcadvisor.co.uk/new-product/google-android/what-is-google-allo-what-is-google-duo-google-allo-available-now-3640590/
http://arstechnica.com/gadgets/2016/09/google-allos-limitations-explained-in-one-word-india/
http://www.androidauthority.com/google-allo-717745/
http://www.techradar.com/how-to/phone-and-communications/mobile-phones/how-to-use-google-allo-1329437

E-mail on the cloud

Thursday, September 29th, 2016

cloudAt the end of July we announced that university e-mail will soon be hosted in the cloud. Most of our Tygerberg staff were successfully migrated and are already active on Outlook via Office365. Next up is Stellenbosch.

Benefits of cloud e-mail include:
• Larger mailboxes and storage space.
• E-mail and storage space are accessible from anywhere in the world where there is internet access.
• E-mail and storage space are backed up in the cloud.

The only consideration is dependability on internet quality, as the service is hosted in the cloud. 

Mailboxes will be moved per department and each department will be notified via e-mail ahead of time when their e-mail will be moved. Little, if any disruption or downtime are anticipated during the migration period. 

After your mailbox has been moved, Outlook will prompt you to enter a password. Please enter your full e-mail address (e.g. username@sun.ac.za), password and select the Remember credentials option. There is a possibility that e-mail settings on your mobile device might have to be changed. We have also compiled a selection of FAQs if you have any problems. More technical instructions, if needed, are available on the IT self-help site.

User support might be necessary for devices with outdated software and our support team is ready to deal with these cases. However, please note that standard SU devices with Windows and asset numbers have to be attended to first and will be given priority. Non-standard devices, for example, Apple and Linux operating systems or private devices without asset numbers can only be attended to once we’re done with them.

If you have any questions or feedback, please contact the IT Service Desk at 021 808 4367 or help@sun.ac.za

Play and learn: apps for children

Friday, July 22nd, 2016

kids-appsAfter watching Barney, the dinosaur, or Lollos, the unidentifiable creature with the big ears, sing the same song for the twenty-seventh time this week, most parents would be desperate to find something else. Even if it’s only to preserve their own sanity. 

Gone are the days when television and videos were the only available options for frustrated parents. Today technology provides another platform for distraction and one which also has the ability to educate. Phones and tablets can conveniently be loaded with apps, games, and movies. 

The biggest challenge for parents is choosing the best, most appropriate, safest and most educational apps, which will also hold their child’s attention for as long as possible.

PC Advisor, one of the United Kingdom’s leading technology and media companies, attempted to make this choice easier. With the help of a group of parents, they compiled and published a list of 46 apps on their website. The apps are divided into sections for babies, toddlers, primary school scholars and teenagers. Don’t feel left out, there’s also a section for kids of all ages. That means you can also play along.

Do you have any suggestions for fun and educational apps? Let us know at bits.bytes@sun.ac.za and we’ll add your suggestions to our next article. 

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.