Knowledge (XXG)

Cyber manhunt in Hong Kong

Source 📝

24: 236:, etc. They type the keywords or the name of the target into the search engines to find related websites, for instance, the social networking sites, private blogs, and albums of the target. They can obtain the target's private information by visiting those websites. Eventually, they would post and show the information they get to the public through the internet. 283:, indicated that cyber manhunt is a behavior that wishes own happiness and satisfaction by causing pain to others. He explained that some netizens obtain happiness and satisfaction via a cyber manhunt, and some of them will even see it as a network game to increase their sense of identity if they can find more information than others. 312:
who suffer trauma from cyber manhunts may leave an indelible imprint worrying about what people browse to them. They are also at risk of getting mental and psychological damage. Also, a common thing to happen to victims is that they would continuously search the situation on the internet and know how
366:
will commit an offense if they disclose one's private information on the internet without consent. However, Joe Lam, the chief executive officer of Discussion forum points out that it is hard to the law like the speed of communication on the internet is too fast and it is hard to determine if there
244:
Moreover, there are columns in public online platforms called the ‘Column for betraying friends’. Netizens usually post the private information and photos of their friends in these columns. For instance: telephone numbers, emails, addresses, etc. Other netizens would browse these columns and obtain
266:
a good channel to let off their anger and dissatisfaction with the society and social phenomenon. Once an undesirable subject is posted on the internet, it can easily trigger or anger netizens. For instance, "Kong girl 500" rejected people to come to her wedding with $ 500 for a blessing on her
188:, etc.) People are then more willing to share their daily lives on the web. This trend highly raises the accessibility of various internet users to one's personal information. As it gets easier to find people's personal details on the web, it leads to the present prevalence of cyber manhunts. 325:
and fear of becoming the next target of cyber manhunt. They do not need to be consciously responsible for their actions. Therefore, they may criticize others easily. When the cyber manhunt occurs in an uncontrolled situation, some netizens would dread to be the next target.
358:
which was enacted in 2012, a person commits an offense if the person discloses any personal data of a data subject which was obtained from a data user without the data user's consent, with an intent to cause loss or gain in other property or cause harm to the data subject.
291:
Some cyber manhunt was motivated by the sense of justice and some of the netizens use cyber manhunt as a punishment for the individuals who act inappropriately or immorally. There exist many examples of cyber manhunt about moral and ethical issues. For example, some
203:’, citizens use cyber manhunts to raise public attention. It provides a way for victims to seek justice through the internet and also plays a role in monitoring, as people will be careful of their behaviors in public to avoid themselves being shamed on the internet. 171:
The emergence of cyber manhunts was led by the common practice of sharing individual photographs and information on social networks. Owing to the exploitation of cyberspace technology, more and more free social networking websites appear nowadays, (i.e.
716: 267:
Facebook. She has exposed most of her personal information and wedding location on the internet. It reveals the dissatisfaction of netizen toward "Kong girl" and money worship.
355: 346:, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks. 749: 720: 384: 41: 521: 438: 164:
in the 1990s because of technological constraints. However, cyber manhunts became popular in the 21st century. It gained popularity on the ‘
88: 539: 60: 334:
The netizens who involve in cyber manhunt or explore other's private information without permission may violate the following laws.
107: 67: 666: 428: 45: 74: 793: 280: 56: 392: 275:
People have the desire for discourse power which they are not given in traditional media while able to get in the
160:
of an objective person. The term is broadly used by the police and media. Manhunts were limited during the use of
34: 764:"Cyber Manhunt: Evaluation of Technologies and Practices for Effective Community Development and Maintenance" 483:"Cyber Manhunt: Evaluation of Technologies and Practices for Effective Community Development and Maintenance" 525: 165: 313:
the event goes on. It deteriorates victims’ mental health and may even stimulate them to commit suicide.
639: 400: 81: 565: 293: 692: 587: 434: 322: 217: 185: 161: 543: 195:
through cyber manhunts. When there are immoral or unfair scenes that might not be handled by
614: 652: 600: 413: 196: 128:) in Hong Kong is a term for the behavior of tracking down and exploring an individual's 468: 628: 133: 670: 787: 763: 482: 309: 246: 200: 181: 157: 129: 430:
Signs, Meaning and Experience: Integrational Approaches to Linguistics and Semiotics
454: 229: 192: 23: 367:
has been any contravention as Cyber manhunt always involve countless netizens.
276: 177: 744: 153: 221: 141: 281:
Dennis Wong, the Professor of Applied Social Sciences of City University
363: 343: 263: 137: 245:
information. Some of them even criticize targets in columns, causing
507: 224:
search the target by using multitudes of search engines, including
233: 225: 173: 629:"A Study on Cyber-bullying among Hong Kong Secondary Students" 17: 342:
No one shall be subjected to arbitrary interference with his
144:
to the target through blaming, shaming, and naming culprits.
579:
CHAN, Ching To, "Online Uncovering – Justice or Bullying?",
739: 296:
have been arrested because of the power of cyber manhunt.
693:"Personal Data (Privacy) (Amendment) Ordinance 2012" 427:
Pablé, Adrian; Hutton, Christopher (24 April 2015).
48:. Unsourced material may be challenged and removed. 508:"Human flesh search engine: An internet lynching?" 168:’ and thus spread to other social media websites. 8: 152:A cyber manhunt is developed from the word ‘ 717:"The Hong Kong collection :Cyber Judgment" 140:and is regarded as the purpose of a cyber 108:Learn how and when to remove this message 581:Online Uncovering – Justice or Bullying? 755: 667:"Universal Declaration of Human Rights" 376: 199:, such as the ’14-slaps-girl’ and the ‘ 648: 637: 596: 585: 433:. Walter de Gruyter GmbH & Co KG. 409: 398: 338:Universal declaration of human rights 220:to obtain the information of people. 216:One of the methods is to make use of 136:. A cyber manhunt generally involves 7: 46:adding citations to reliable sources 524:. 明報. 11 April 2009. Archived from 156:’. A manhunt is a way of searching 14: 542:. 17 January 2013. Archived from 240:Browsing public online platforms 22: 33:needs additional citations for 391:. October 2010. Archived from 321:Some netizens may also endure 1: 615:"拍分屍短片放 YouTube 網民人肉起底 炸龜童被捕" 258:Expression of dissatisfaction 212:Application of search engine 57:"Cyber manhunt in Hong Kong" 271:Acquisition of satisfaction 191:People tend to put forward 810: 510:. Xinhua Net. 4 July 2008. 469:"輿論魔力:網絡公審成風 人身攻擊 VS 彰顯公" 125: 262:Cyber manhunt gives the 568:. 頭條日報. 4 January 2010. 356:Personal Data Ordinance 350:Personal Data Ordinance 647:Cite journal requires 540:""港女500"到《盛女爱作战》:爱情何价" 408:Cite journal requires 317:Influences on netizens 166:Hong Kong Golden Forum 158:background information 566:"慘遭網友起底圍剿 「七折港女」想過輕生" 305:Influences on victims 794:Culture of Hong Kong 617:. 蘋果日報. 6 July 2012. 42:improve this article 673:on 12 February 2018 522:"網上現出賣朋友區 發布相片評頭品足" 471:. 文匯報. 2 July 2013. 130:private information 323:emotional distress 723:on 16 March 2015. 634:(September 2010). 595:Missing or empty 440:978-1-5015-0228-6 354:According to the 162:traditional media 118: 117: 110: 92: 801: 779: 778: 776: 774: 760: 725: 724: 719:. Archived from 713: 707: 706: 704: 702: 697: 689: 683: 682: 680: 678: 669:. Archived from 663: 657: 656: 650: 645: 643: 635: 633: 625: 619: 618: 611: 605: 604: 598: 593: 591: 583: 576: 570: 569: 562: 556: 555: 553: 551: 536: 530: 529: 528:on 2 April 2015. 518: 512: 511: 504: 498: 497: 495: 493: 479: 473: 472: 465: 459: 458: 451: 445: 444: 424: 418: 417: 411: 406: 404: 396: 395:on 2 April 2015. 381: 287:Sense of justice 127: 113: 106: 102: 99: 93: 91: 50: 26: 18: 809: 808: 804: 803: 802: 800: 799: 798: 784: 783: 782: 772: 770: 762: 761: 757: 736: 729: 728: 715: 714: 710: 700: 698: 695: 691: 690: 686: 676: 674: 665: 664: 660: 646: 636: 631: 627: 626: 622: 613: 612: 608: 594: 584: 578: 577: 573: 564: 563: 559: 549: 547: 546:on 2 April 2015 538: 537: 533: 520: 519: 515: 506: 505: 501: 491: 489: 481: 480: 476: 467: 466: 462: 453: 452: 448: 441: 426: 425: 421: 407: 397: 385:"Pros and Cons" 383: 382: 378: 373: 352: 340: 332: 319: 307: 302: 289: 273: 260: 255: 242: 214: 209: 197:law enforcement 150: 114: 103: 97: 94: 51: 49: 39: 27: 12: 11: 5: 807: 805: 797: 796: 786: 785: 781: 780: 754: 753: 752: 747: 742: 735: 734:External links 732: 727: 726: 708: 684: 658: 649:|journal= 620: 606: 571: 557: 531: 513: 499: 474: 460: 446: 439: 419: 410:|journal= 375: 374: 372: 369: 351: 348: 339: 336: 331: 328: 318: 315: 306: 303: 301: 298: 294:animal abusers 288: 285: 272: 269: 259: 256: 254: 251: 247:cyber bullying 241: 238: 218:search engines 213: 210: 208: 205: 149: 146: 134:internet media 124:(Chinese: 116: 115: 30: 28: 21: 13: 10: 9: 6: 4: 3: 2: 806: 795: 792: 791: 789: 769: 765: 759: 756: 751: 748: 746: 743: 741: 738: 737: 733: 731: 722: 718: 712: 709: 694: 688: 685: 672: 668: 662: 659: 654: 641: 630: 624: 621: 616: 610: 607: 602: 589: 582: 575: 572: 567: 561: 558: 545: 541: 535: 532: 527: 523: 517: 514: 509: 503: 500: 488: 484: 478: 475: 470: 464: 461: 456: 450: 447: 442: 436: 432: 431: 423: 420: 415: 402: 394: 390: 386: 380: 377: 370: 368: 365: 360: 357: 349: 347: 345: 337: 335: 329: 327: 324: 316: 314: 311: 304: 299: 297: 295: 286: 284: 282: 278: 270: 268: 265: 257: 252: 250: 248: 239: 237: 235: 231: 227: 223: 219: 211: 206: 204: 202: 198: 194: 193:Public trials 189: 187: 183: 182:Tencent Video 179: 175: 169: 167: 163: 159: 155: 147: 145: 143: 139: 135: 131: 123: 122:cyber manhunt 112: 109: 101: 90: 87: 83: 80: 76: 73: 69: 66: 62: 59: –  58: 54: 53:Find sources: 47: 43: 37: 36: 31:This article 29: 25: 20: 19: 16: 773:27 September 771:. Retrieved 768:ResearchGate 767: 758: 730: 721:the original 711: 699:. Retrieved 687: 675:. Retrieved 671:the original 661: 640:cite journal 623: 609: 580: 574: 560: 548:. Retrieved 544:the original 534: 526:the original 516: 502: 492:27 September 490:. Retrieved 487:ResearchGate 486: 477: 463: 449: 429: 422: 401:cite journal 393:the original 388: 379: 361: 353: 341: 333: 320: 308: 290: 274: 261: 243: 215: 190: 170: 151: 121: 119: 104: 95: 85: 78: 71: 64: 52: 40:Please help 35:verification 32: 15: 330:Related law 98:August 2020 701:3 February 677:3 February 597:|url= 455:"必須正視網絡欺凌" 371:References 300:Influences 277:cyberspace 178:Tencent QQ 148:Background 68:newspapers 201:Bus Uncle 788:Category 588:citation 550:22 March 264:Netizens 222:Netizens 142:judgment 138:netizens 364:netizen 344:privacy 310:Victims 253:Purpose 154:manhunt 82:scholar 750:明光社 起底 457:. 明光社. 437:  207:Method 84:  77:  70:  63:  55:  745:高等起底組 740:香港高登網 696:(PDF) 632:(PDF) 234:Sogou 230:Petal 226:Baidu 186:Weibo 174:Qzone 89:JSTOR 75:books 775:2020 703:2018 679:2018 653:help 601:help 552:2015 494:2020 435:ISBN 414:help 362:The 132:via 61:news 44:by 790:: 766:. 644:: 642:}} 638:{{ 592:: 590:}} 586:{{ 485:. 405:: 403:}} 399:{{ 387:. 279:. 249:. 232:, 228:, 184:, 180:, 176:, 126:起底 120:A 777:. 705:. 681:. 655:) 651:( 603:) 599:( 554:. 496:. 443:. 416:) 412:( 389:2 111:) 105:( 100:) 96:( 86:· 79:· 72:· 65:· 38:.

Index


verification
improve this article
adding citations to reliable sources
"Cyber manhunt in Hong Kong"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
private information
internet media
netizens
judgment
manhunt
background information
traditional media
Hong Kong Golden Forum
Qzone
Tencent QQ
Tencent Video
Weibo
Public trials
law enforcement
Bus Uncle
search engines
Netizens
Baidu
Petal

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.