Monday, 9 March 2015

Essay draft 2

Increasingly, social media platforms such as Facebook have become platforms for anonymous groups in Singapore to target and attack popular social media influences such as bloggers. While what these groups post on their social media pages may seem harmless and even taken as a joke to some, there have been instances where lines have been crossed. For instance, the home address of Singapore blogger Wendy Cheng, also known as “Xiaxue” was exposed online by a follower of the anonymous Facebook group “SMRT Ltd Feedback” in 2014. The follower had used an online tool that SMRTfeedback had posted on its Facebook page to find out Wendy’s address. (Cheng, 2015)The reason for this being, they simply did not like her. With thousands of followers on SMRTFeedbacks Facebook page, exposing their victim’s home address online puts their lives in danger. While there are laws, such as the Protection from Harassment Act to protect an individual against cyber harassments like these, the solution is not full proof and still leaves many victims of cyber harassment unprotected.

In 2014, Singapore full time blogger Wendy Cheng filed for a Protection Order against the anonymous vigilante group SMRT Ltd (Feedback). According to Wendy, the anonymous group had been harassing her via social media platforms like twitter and Facebook. The group has allegedly posted insulting and derogatory comments about her looks, her character and even accused her of rigging her blog’s statistic counter. This could have potentially affected her blogging career. (Koh, 2015) When her home address was posted online for virtually anyone to see, Wendy filed for the Protection Order for fear of the safety of her 2 year old son and elderly mother. This is not the first time that the anonymous group has exposed the home address of a person online. In 2014, following an incident where a Sim Lim Square shop owner Jover Chew swindled a Vietnamese tourist into paying a highly exorbitant price for an IPhone. The self-proclaimed vigilante group took justice into their own hands by exposing the home address of Jover Chew online so that online users could play pranks on him in punishment for his misdeed. While these may all seem like harmless pranks, it actually poses danger to victim’s lives as well as their careers and businesses.

The Protection Order was put in place in 2014. Unlike any other acts, the Protection Order is extended to the anonymous on social media. The act helps to “protect persons against harassment, unlawful stalking and provide civil remedies in relation to false states of fact.” (Yam, 2014) This means that cyber harassers will no longer be able to make untrue or derogatory and abusive statements about their victims under the Protection Order. Harassers are liable to punishments if they fail to obey the order. While the act may be effective in punishing harassers, it fails to take into consideration certain issues, as such making the solution to the problem of cyber harassment a non-full proof one.
The Protection Order does not require anonymous entities to expose their identities.  This means that anonymous groups like SMRTFeedback can actually take on another social media persona to attack its victims without breaking the rules of the Protection Order. Also, with a large number of followers and fans of, stopping the group itself from cyber harassing its victims does not stop their followers from continuing to do so. As such, the Protection Order does not entirely protect cyber victims from harassments online.

In order to make the Protection Harassment Act a more effective one, the Act needs to require anonymous persons to expose their identities to the law. This is to ensure that harassers do not set up different accounts in order to continue their acts online without getting caught for it.  Also, the Protection Order could extent its watch not just to owners of the social media page but to their followers as well. If a Protection Order is taken on a particular social media account, anyone who posts abusive or false statements about the victim on the page should also face a penalty. This is to deter users from cyber-harassing fellow online users. This ensures that cyber harassment does not continue to carry on through the harasser’s followers and fans.

Aside from the Protection Harassment Act that has been implemented, Singapore has also put in place “Cybercrime Command”, an act within the Criminal investigation Department (CID) in order to combat cybercrimes. (Lim, 2015) The cybercrime command aims to create a platform whereby young Singaporeans who use the Internet often are able to work hand in hand with the police in investigating cyber-harassers. The Internet is a huge network; it is nearly impossible for the police to track down every single activity. As such, the platform will be an effective measure to take towards cyber-harassment as it allows the online community to give “tip-offs” to the CID whenever they witness an online harassment taking place, the CID will then look into the issue and take necessary actions on the harassers. (Liang, 2015).

While Cybercrime command may be effective in locating and punishing cyber-harassers, like the Protection Harassment Act, it is not a preventive measure towards cyber-harassment. Both measures only solve the issue as it arises. In order to combat cyber-harassment, actions need to be taken at the root of the problem. To prevent these anonymous groups from harassing their victims. A preventive measure would be stating rules that harmful or derogatory comments are not allowed to be posted on social media platform pages. Social media platform administrators should ensure that popular social media accounts with over a certain number of followers are monitored closely with routine checks. Should there be any form of cyber-harassment detected, the social media page will then be forced to shut down after a warning. Should there be a need, the administrators can then report the issue to the police for further action to be taken.

As the saying goes “prevention is better than cure.”  Attempting to solve the issue of cyber harassment through laws such as the Protection act order and the Cybercrime command may be effective in certain ways as mentioned above. However in order to prevent cyber harassment from taking place, cooperation between both social media platform administrators and the police force is necessary.








References:


Koh, V. (2015, February 6). Channelnewsasia. Retrieved from http://www.channelnewsasia.com/news/singapore/xiaxue-takes-out/1641824.html
Lim, Y. (2015, March 06). channelnewsasia. Retrieved from http://www.channelnewsasia.com/news/singapore/police-to-set-up-new/1698876.html
Cheng, W. (2015, February 6). xiaxue. Retrieved from www.xiaxue.blogspot.com.sg
Yam, P. T. (2014, September 19). Singapore Statuses Online. Retrieved from http://statutes.agc.gov.sg/aol/search/display/view.w3p;page=0;query=DocId%3A%2207275b05-417a-4de5-a316-4c15606a2b8d%22%20Status%3Ainforce%20Depth%3A0;rec=0






Friday, 6 March 2015

Essay draft 1

Increasingly, social media platforms such as Facebook have become a platform for anonymous groups in Singapore to target and attack popular social media influences such as bloggers. While what these vigilantes post on their social media platform pages may seem harmless and even taken as a joke to some, there have been instances where lines have been crossed. For instance, the home address of Singapore blogger Wendy Cheng was exposed online by a follower of the anonymous group “SMRT Ltd Feedback” in 2014. The follower had used an online tool that the anonymous group had posted on its Facebook page to find out Wendy’s address. (Cheng, 2015)The reason for this being, they simply did not like her. With thousands of followers on SMRT Feedbacks Facebook page, exposing their victim’s home address online puts their victims lives in danger. While there are laws, such as the Protection from Harassment Act to protect an individual against cyber harassments like these, the solution is not full proof and still leaves many victims of cyber harassment unprotected.

In 2014, Singapore full time blogger Wendy Cheng filed for a Protection Order against the anonymous satirical vigilante group SMRT Ltd (Feedback). According to Wendy, the anonymous group had been harassing her via social media platforms like twitter and Facebook. The group has allegedly posted insulting and derogatory comments about her looks, her character and even accused her of rigging her blog’s statistic counter and fraud, which could have potentially affected her blogging career. (Koh, 2015) When her home address was posted online for virtually anyone to see, Wendy filed for the Protection Order for fear of the safety of her 2 year old son and mother. This is not the first time that the anonymous group has exposed the home address of a person online. In 2014, following an incident where a Sim Lim Square shop owner Jover Chew swindled a Vietnamese tourist into paying a highly exorbitant price for an IPhone. The vigilante group took justice into their own hands by exposing the home address of Jover Chew online so that online users could play pranks on him in punishment for his misdeed. While these may all seem like harmless, satire pranks, it actually poses danger to victim’s lives as well as their careers and businesses.

The Protection Order was put in place in 2014. Unlike any other acts, the Protection Order is extended to the anonymous on social media. The act helps to “protect persons against harassment and unlawful stalking and provide civil remedies in relation to false states of fact.” (Yam, 2014) This means that cyber harassers will no longer be able to make untrue or derogatory and abusive communication about their victims under the Protection Order. They are also liable to punishments if they fail to obey the order. While the act may seem effective, it actually fails to take into consideration certain details, as such making the solution to the problem of cyber harassment a non full proof one.
The Protection Order does not require the anonymous to expose their identities.  This means that anonymous groups like the SMRT Feedback can actually take on another social media persona to attack its victims without breaking the rules of the Protection Order on their social media account. Also, with a large number of followers and fans of the vigilante group, stopping the group itself from cyber harassing its victims does not stop their followers from continuing to do so. As such, the Protection Order does not entirely protect cyber victims from harassments online.

Aside from the Protection Harassment Act that has been implemented, Singapore has also put in place a new “Cybercrime Command” within the Criminal investigation Department (CID) in order to combat cybercrimes. (Lim, 2015) The cybercrime command aims to create a platform whereby young Singaporeans who use the Internet often are able to work hand in hand with the police in investigating cyber-harassers. The Internet is a huge network; it is nearly impossible for the police to track down every single activity. As such, the platform will be an effective measure to take towards cyber-harassment as it allows the online community to give “tip-offs” to the CID whenever they witness an online harassment taking place, the CID will then look into the issue and take necessary actions on the harassers. (Liang, 2015).

While Cybercrime command may be effective in locating and punishing cyber-harassers, like the Protection Harassment Act, it is not a preventive measure towards cyber-harassment. Both measures only solve the issue as it arises. In order to combat cyber-harassment, actions need to be taken at the root of the problem. To prevent these anonymous groups from harassing their victims. A preventive measure would be stating rules that harmful or derogatory comments are not allowed to be posted on social media platform pages. Social media platform administrators should ensure that popular social media accounts with over a certain number of followers are monitored closely with routine checks. Should there be any form of cyber-harassment detected, the social media page will then be forced to shut down after a warning. Should there be a need, the administrators can then report the issue to the police for further action to be taken.

As the saying goes “prevention is better than cure.”  Attempting to solve the issue of cyber harassment through laws such as the Protection act order and the Cybercrime command may be effective in certain ways as mentioned above. However in order to prevent cyber harassment from taking place,  cooperation between both social media platform administrators and the police force is necessary.








References:


Koh, V. (2015, February 6). Channelnewsasia. Retrieved from http://www.channelnewsasia.com/news/singapore/xiaxue-takes-out/1641824.html
Yam, P. T. (2014, September 19). Singapore Statuses Online. Retrieved from http://statutes.agc.gov.sg/aol/search/display/view.w3p;page=0;query=DocId%3A%2207275b05-417a-4de5-a316-4c15606a2b8d%22%20Status%3Ainforce%20Depth%3A0;rec=0
Lim, Y. (2015, March 06). channelnewsasia. Retrieved from http://www.channelnewsasia.com/news/singapore/police-to-set-up-new/1698876.html
Cheng, W. (2015, February 6). xiaxue. Retrieved from www.xiaxue.blogspot.com.sg
Liang, L. Y. (2015, March 6). the staits time singapore. Retrieved from http://www.straitstimes.com/news/singapore/more-singapore-stories/story/new-cybercrime-unit-within-the-cid-be-set-20150306



Thursday, 5 March 2015

An Influential event

When I was 15 years old, I had the opportunity to go on a Community Involvement Program (CIP) trip to Batam, Indonesia with a group of girls from my secondary school. I immediately jumped at the opportunity, as the thought of being able to go on a “holiday” with my friends was so appealing. Little did I know that the 4 days 3 nights trip would change my life forever. A group of us were assigned to visit an Indonesian Christian orphanage called “House of love”. The House of love was an orphanage built specially to house children who had been left home less and without a family after the 2004 Tsunami that hit the coast of Indonesia. We taught the English language to the children, played different games with them and even helped to clean and paint the walls of their bedrooms. What struck me the most throughout the trip was when a 6 year-old boy by the name of Richy started singing the Christian song “give thanks”. The lyrics go something like this “give thanks with a grateful heart.. let the weak say I am strong, let the poor say I am rich because of what the Lord has done for us.”

Although I doubt that at such a young age he would have known what the song really meant, he taught me a valuable lesson that day. If an orphan can be thankful for the little that he has, surely I can be grateful for everything that I have.






(252 words)

Wednesday, 4 March 2015

Essay Draft 1

Main problem:  Social media such as facebook as a platform for anonymous vigilante groups in Singapore to target political groups and popular social media influences. In the past year, these vigilantes have overstepped their boundaries by exposing private details such as the home addresses of their target victims.

Affected target group/stakeholder: Government, political leaders, social media influences

Agent of change/stakeholder: Educational institutions, the government ( in the form of legislation and law), social media platforms.

Solution 1: Protection from Harassment Act 2014 to protect online users from cyber-harrasment.

Evaluation 1: Vigilante’s garner support from the masses through their ability to empathise with their struggles. They give ordinary people a platform to voice their opinions about political or social issues that otherwise will not be heard. As such, placing a restraining order on these groups does not stop their supporters from continuing the harrasment online. It is not possible to place a harrasment act on such a large mass of people. Also, the protection order does not require vigilantes that are anonymous to reveal their identities, meaning these groups of people are able to set up multiple social media accounts to attack their victims without getting caught or punished for it.

Solution 2: Perhaps what the government needs to do is to implement laws that criminalizes the posting of other’s private details without their consent. They can also work closely with social media organizations to monitor the content of what these vigilantes post on their social media platforms. Any violation of rules should result in punishments.

Implication/Conclusion: This may however stir anger amongst the vigilante groups supporters as they feel that they no longer have the freedom to voice their opinions online.This may result in an even bigger issue such as protests or supporters taking things Into their own hands

Thesis: Social media platforms have increasingly become a platform for anonymous vigilante groups to attack political groups and popular social media influences in Singapore. Cooperation between the government and social media companies are needed to combat this growing problem.