It is proposed that this article be deleted because of the following concern:
If you can address this concern by improving, copyediting, sourcing, renaming, or merging the page, please edit this page and do so. You may remove this message if you improve the article or otherwise object to deletion for any reason. Although not required, you are encouraged to explain why you object to the deletion, either in your edit summary or on the talk page. If this template is removed, do not replace it . The article may be deleted if this message remains in place for seven days, i.e., after 01:21, 16 September 2024 (UTC). Find sources: "Online uncovering in Hong Kong" – news · newspapers · books · scholar · JSTOR Nominator: Please consider notifying the author/project: {{ subst:proposed deletion notify |Online uncovering in Hong Kong|concern=No evidence of notability; none of the linked sources use this term. There is a list that is out of date and lacks clear inclusion criteria (per [[WP:NLIST]]). Everything else is either [[WP:OR]] or adequately covered by [[Doxing]]. This is not a term used in Hong Kong English. Google searches do not support the usage (specifically, scmp.com and standard.com.hk have zero hits for "online uncovering"). This may be a translation of 網上揭露, to reveal online, which is used as a verb (e.g., "在網上揭露某人的身份信息" to reveal someone's information online) but that concept is indistinguishable from doxing. Finally, creation of this article in 2013 appears to be coordinated editing by four SPA's - see talk page.}} ~~~~ |
Online uncovering, also called doxing, is the practice of revealing private information about an individual or organization gathered from online sources. Methods include searching public databases, social media and email accounts, and hacking. When done by private individuals it is a form vigilantism. It can also be used by law enforcement departments. For example, it helped the Hong Kong Police Force [1] to investigate the background information of suspects. [2] Driven by the prevalence of the internet and online forums such as the Golden Forum, online uncovering has become a social phenomenon in Hong Kong. It is used to shame, harass, and tarnish of reputation of the victims.
Online uncovering is a kind of cyber bullying. [3] With online uncovering, the personal information, like the occupation, family members, home address, and telephone numbers, of the victims will be disclosed without any permission, which causes a great nuisance to them. People may spread out one's information to humiliate one, make one ashamed and infringe on one's privacy. [4] Also, people tend to share videos of people's misconduct in public to the Internet, stirring up discussions and debates, also online uncovering of the people in the videos.
Year | Incidents | Reasons |
---|---|---|
2013 | $10 red pocket girl | She dissatisfied with the amount of pocket money her relative gave, and vented her anger on Facebook. [5] |
2012 | Haklam event | He claimed he is a member of triad society in city forum and the strange dressing and behavior had aroused public awareness. [6] |
2012 | $500 Material girl | She rejected people to come to her wedding if they only gave $500 for blessing. [7] |
2010 | Giving-seat boy | A teenager who claimed that he was a child although he was a secondary 5 student. He was blamed by netizens after his video of occupying seats unreasonably was uploaded on YouTube. [8] |
2009 | 30% off material girl | A lady was dissatisfied unilaterally with the unreasonable pricing of building materials company. In an attempt to vent her anger on the Internet, she was doubted by many netizens and finally led to uncovering of her. [9] |
2006 | Uncle Bus Event | He argued with other as other passengers dissatisfied with his loud voice on a Kowloon Motor Bus bus. [10] [11] |
There are various uncovering methods. Most cases are attributed to the victims’ mismanagement of personal information online. [12]
Hackers will utilize engines such as Google to uncover the personal information through blogs, social networking websites or forums.
Hackers will uncover the IP address of the targeted person through interception software. They can also uncover personal information by discovering the Internet Services Provider of the IP address. Installing spyware and virus to the computer could misappropriate personal information either easily.
Social Engineering means hackers tempt the target to disclose personal information via multiple approaches. They may also collect and gather information from the cyber friends of the target. Such actions may likely breach the law.
Some HK online forums such as Golden Forum have set the (Betray Friends page) to encourage netizens to post the photos of their fellows. But information disclosure is forbidden.
Most of the victims in online uncovering were doing something inappropriate, from maltreating animals to impolite actions. Through online uncovering, victims’ inappropriate actions would be pointed out. They would realize they were doing something wrong and make apologies or follow up actions. Just take the case of maltreating cat last year as an example. A student from City University maltreated his cat in hall and a picture was taken and posted on social networks. After the online uncovering, he made apology and promised maltreatments would not happen again. [13]
After online uncovering, victims’ personal information would be found out and circulated on the internet; such as, telephone number, address and photos. They would be annoyed by nonstop phone calls or even recognized by others on the street and criticized them. These all made them face a high pressure and some even suffer from mental illness, the case of material girl $500 was one of the examples. [14]
Identity theft, identity piracy or identity infringement occurs when someone uses another's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term identity theft was coined in 1964. Since that time, the definition of identity theft has been legally defined throughout both the U.K. and the U.S. as the theft of personally identifiable information. Identity theft deliberately uses someone else's identity as a method to gain financial advantages or obtain credit and other benefits. The person whose identity has been stolen may suffer adverse consequences, especially if they are falsely held responsible for the perpetrator's actions. Personally identifiable information generally includes a person's name, date of birth, social security number, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, passwords, or any other information that can be used to access a person's financial resources.
Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.
In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in the sense that it is often one of the many steps in a more complex fraud scheme. It has also been defined as "any act that influences a person to take an action that may or may not be in their best interests."
Internet privacy involves the right or mandate of personal privacy concerning the storage, re-purposing, provision to third parties, and display of information pertaining to oneself via the Internet. Internet privacy is a subset of data privacy. Privacy concerns have been articulated from the beginnings of large-scale computer sharing and especially relate to mass surveillance.
Voice phishing, or vishing, is the use of telephony to conduct phishing attacks.
Internet vigilantism is the act of carrying out vigilante activities through the Internet. The term encompasses vigilantism against alleged scams, crimes, and non-Internet-related behavior.
Internet safety, also known as online safety, cyber safety and electronic safety (e-safety), refers to the policies, practices and processes that reduce the harms to people that are enabled by the (mis)use of information technology.
Anonymous is a decentralized international activist and hacktivist collective and movement primarily known for its various cyberattacks against several governments, government institutions and government agencies, corporations and the Church of Scientology.
Cyberethics is "a branch of ethics concerned with behavior in an online environment". In another definition, it is the "exploration of the entire range of ethical and moral issues that arise in cyberspace" while cyberspace is understood to be "the electronic worlds made visible by the Internet." For years, various governments have enacted regulations while organizations have defined policies about cyberethics.
Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization. It may include false accusations, defamation, slander and libel. It may also include monitoring, identity theft, threats, vandalism, solicitation for sex, doxing, or blackmail. These unwanted behaviors are perpetrated online and cause intrusion into an individual's digital life as well as negatively impact a victim's mental and emotional well-being, as well as their sense of safety and security online.
Christina Chan is a political activist in Hong Kong, known for her stand on human rights, democracy and Tibetan independence. She is enrolled in a premaster's degree in philosophy in the University of Hong Kong.
Zeus is a Trojan horse malware package that runs on versions of Microsoft Windows. It is often used to steal banking information by man-in-the-browser keystroke logging and form grabbing. Zeus is spread mainly through drive-by downloads and phishing schemes. First identified in July 2007 when it was used to steal information from the United States Department of Transportation, it became more widespread in March 2009. In June 2009 security company Prevx discovered that Zeus had compromised over 74,000 FTP accounts on websites of such companies as the Bank of America, NASA, Monster.com, ABC, Oracle, Play.com, Cisco, Amazon, and BusinessWeek. Similarly to Koobface, Zeus has also been used to trick victims of technical support scams into giving the scam artists money through pop-up messages that claim the user has a virus, when in reality they might have no viruses at all. The scammers may use programs such as Command prompt or Event viewer to make the user believe that their computer is infected.
Cyberbullying is a form of bullying or harassment using electronic means. It has become increasingly common, especially among teenagers and adolescents, due to young people's increased use of social media. Related issues include online harassment and trolling. In 2015, according to cyberbullying statistics from the i–Safe Foundation, over half of adolescents and teens had been bullied online, and about the same number had engaged in cyberbullying. Both the bully and the victim are negatively affected, and the intensity, duration, and frequency of bullying are three aspects that increase the negative effects on both of them.
The dark web is the World Wide Web content that exists on darknets: overlay networks that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can communicate and conduct business anonymously without divulging identifying information, such as a user's location. The dark web forms a small part of the deep web, the part of the web not indexed by web search engines, although sometimes the term deep web is mistakenly used to refer specifically to the dark web.
The following outline is provided as an overview of and topical guide to computer security:
Beauty beggar is a derogatory name for beauty bloggers or beauty YouTubers who capitalize their fame to promote cosmetics so as to obtain sponsorship, in the form of testers or money, from cosmetics companies. It is a Hong Kong internet slang that originated from discussions on Instagram and Hong Kong Golden Forum.
A cyber manhunt in Hong Kong is a term for the behavior of tracking down and exploring an individual's private information via internet media. A cyber manhunt generally involves netizens and is regarded as the purpose of a cyber judgment to the target through blaming, shaming, and naming culprits.
Cantonese Internet Slang is an informal language originating from Internet forums, chat rooms, and other social platforms. It is often adapted with self-created and out-of-tradition forms. Cantonese Internet Slang is prevalent among young Cantonese speakers and offers a reflection of the youth culture of Hong Kong.
Vastaamo was a Finnish private psychotherapy service provider founded in 2008. On 21 October 2020, Vastaamo announced that its patient database had been hacked. Private information obtained by the perpetrators was used in an attempt to extort Vastaamo and, later, its clients. The extorters demanded 40 bitcoins, roughly worth 450,000 euros at the time, and threatened to publish the records if the ransom was not paid. To add pressure to their demands, the extorters published hundreds of patient records a day on a Tor message board.
The Shanghai police database leak refers to the unauthorized disclosure of sensitive personal information and police case data from the Shanghai National Police Database, also known as the SHGA Database, in early July 2022. The leaked data, totaling over 23 terabytes, includes details of more than one billion Chinese residents, encompassing names, addresses, birthplaces, resident ID card numbers, phone numbers, photos, mobile phone numbers, and information on criminal cases. The data was made available for sale on the internet by an unidentified hacker, who demanded a price of 10 bitcoins.