24:
236:, etc. They type the keywords or the name of the target into the search engines to find related websites, for instance, the social networking sites, private blogs, and albums of the target. They can obtain the target's private information by visiting those websites. Eventually, they would post and show the information they get to the public through the internet.
283:, indicated that cyber manhunt is a behavior that wishes own happiness and satisfaction by causing pain to others. He explained that some netizens obtain happiness and satisfaction via a cyber manhunt, and some of them will even see it as a network game to increase their sense of identity if they can find more information than others.
312:
who suffer trauma from cyber manhunts may leave an indelible imprint worrying about what people browse to them. They are also at risk of getting mental and psychological damage. Also, a common thing to happen to victims is that they would continuously search the situation on the internet and know how
366:
will commit an offense if they disclose one's private information on the internet without consent. However, Joe Lam, the chief executive officer of
Discussion forum points out that it is hard to the law like the speed of communication on the internet is too fast and it is hard to determine if there
244:
Moreover, there are columns in public online platforms called the ‘Column for betraying friends’. Netizens usually post the private information and photos of their friends in these columns. For instance: telephone numbers, emails, addresses, etc. Other netizens would browse these columns and obtain
266:
a good channel to let off their anger and dissatisfaction with the society and social phenomenon. Once an undesirable subject is posted on the internet, it can easily trigger or anger netizens. For instance, "Kong girl 500" rejected people to come to her wedding with $ 500 for a blessing on her
188:, etc.) People are then more willing to share their daily lives on the web. This trend highly raises the accessibility of various internet users to one's personal information. As it gets easier to find people's personal details on the web, it leads to the present prevalence of cyber manhunts.
325:
and fear of becoming the next target of cyber manhunt. They do not need to be consciously responsible for their actions. Therefore, they may criticize others easily. When the cyber manhunt occurs in an uncontrolled situation, some netizens would dread to be the next target.
358:
which was enacted in 2012, a person commits an offense if the person discloses any personal data of a data subject which was obtained from a data user without the data user's consent, with an intent to cause loss or gain in other property or cause harm to the data subject.
291:
Some cyber manhunt was motivated by the sense of justice and some of the netizens use cyber manhunt as a punishment for the individuals who act inappropriately or immorally. There exist many examples of cyber manhunt about moral and ethical issues. For example, some
203:’, citizens use cyber manhunts to raise public attention. It provides a way for victims to seek justice through the internet and also plays a role in monitoring, as people will be careful of their behaviors in public to avoid themselves being shamed on the internet.
171:
The emergence of cyber manhunts was led by the common practice of sharing individual photographs and information on social networks. Owing to the exploitation of cyberspace technology, more and more free social networking websites appear nowadays, (i.e.
716:
267:
Facebook. She has exposed most of her personal information and wedding location on the internet. It reveals the dissatisfaction of netizen toward "Kong girl" and money worship.
355:
346:, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks.
749:
720:
384:
41:
521:
438:
164:
in the 1990s because of technological constraints. However, cyber manhunts became popular in the 21st century. It gained popularity on the ‘
88:
539:
60:
334:
The netizens who involve in cyber manhunt or explore other's private information without permission may violate the following laws.
107:
67:
666:
428:
45:
74:
793:
280:
56:
392:
275:
People have the desire for discourse power which they are not given in traditional media while able to get in the
160:
of an objective person. The term is broadly used by the police and media. Manhunts were limited during the use of
34:
764:"Cyber Manhunt: Evaluation of Technologies and Practices for Effective Community Development and Maintenance"
483:"Cyber Manhunt: Evaluation of Technologies and Practices for Effective Community Development and Maintenance"
525:
165:
313:
the event goes on. It deteriorates victims’ mental health and may even stimulate them to commit suicide.
639:
400:
81:
565:
293:
692:
587:
434:
322:
217:
185:
161:
543:
195:
through cyber manhunts. When there are immoral or unfair scenes that might not be handled by
614:
652:
600:
413:
196:
128:) in Hong Kong is a term for the behavior of tracking down and exploring an individual's
468:
628:
133:
670:
787:
763:
482:
309:
246:
200:
181:
157:
129:
430:
Signs, Meaning and
Experience: Integrational Approaches to Linguistics and Semiotics
454:
229:
192:
23:
367:
has been any contravention as Cyber manhunt always involve countless netizens.
276:
177:
744:
153:
221:
141:
281:
Dennis Wong, the
Professor of Applied Social Sciences of City University
363:
343:
263:
137:
245:
information. Some of them even criticize targets in columns, causing
507:
224:
search the target by using multitudes of search engines, including
233:
225:
173:
629:"A Study on Cyber-bullying among Hong Kong Secondary Students"
17:
342:
No one shall be subjected to arbitrary interference with his
144:
to the target through blaming, shaming, and naming culprits.
579:
CHAN, Ching To, "Online
Uncovering – Justice or Bullying?",
739:
296:
have been arrested because of the power of cyber manhunt.
693:"Personal Data (Privacy) (Amendment) Ordinance 2012"
427:
Pablé, Adrian; Hutton, Christopher (24 April 2015).
48:. Unsourced material may be challenged and removed.
508:"Human flesh search engine: An internet lynching?"
168:’ and thus spread to other social media websites.
8:
152:A cyber manhunt is developed from the word ‘
717:"The Hong Kong collection :Cyber Judgment"
140:and is regarded as the purpose of a cyber
108:Learn how and when to remove this message
581:Online Uncovering – Justice or Bullying?
755:
667:"Universal Declaration of Human Rights"
376:
199:, such as the ’14-slaps-girl’ and the ‘
648:
637:
596:
585:
433:. Walter de Gruyter GmbH & Co KG.
409:
398:
338:Universal declaration of human rights
220:to obtain the information of people.
216:One of the methods is to make use of
136:. A cyber manhunt generally involves
7:
46:adding citations to reliable sources
524:. 明報. 11 April 2009. Archived from
156:’. A manhunt is a way of searching
14:
542:. 17 January 2013. Archived from
240:Browsing public online platforms
22:
33:needs additional citations for
391:. October 2010. Archived from
321:Some netizens may also endure
1:
615:"拍分屍短片放 YouTube 網民人肉起底 炸龜童被捕"
258:Expression of dissatisfaction
212:Application of search engine
57:"Cyber manhunt in Hong Kong"
271:Acquisition of satisfaction
191:People tend to put forward
810:
510:. Xinhua Net. 4 July 2008.
469:"輿論魔力:網絡公審成風 人身攻擊 VS 彰顯公"
125:
262:Cyber manhunt gives the
568:. 頭條日報. 4 January 2010.
356:Personal Data Ordinance
350:Personal Data Ordinance
647:Cite journal requires
540:""港女500"到《盛女爱作战》:爱情何价"
408:Cite journal requires
317:Influences on netizens
166:Hong Kong Golden Forum
158:background information
566:"慘遭網友起底圍剿 「七折港女」想過輕生"
305:Influences on victims
794:Culture of Hong Kong
617:. 蘋果日報. 6 July 2012.
42:improve this article
673:on 12 February 2018
522:"網上現出賣朋友區 發布相片評頭品足"
471:. 文匯報. 2 July 2013.
130:private information
323:emotional distress
723:on 16 March 2015.
634:(September 2010).
595:Missing or empty
440:978-1-5015-0228-6
354:According to the
162:traditional media
118:
117:
110:
92:
801:
779:
778:
776:
774:
760:
725:
724:
719:. Archived from
713:
707:
706:
704:
702:
697:
689:
683:
682:
680:
678:
669:. Archived from
663:
657:
656:
650:
645:
643:
635:
633:
625:
619:
618:
611:
605:
604:
598:
593:
591:
583:
576:
570:
569:
562:
556:
555:
553:
551:
536:
530:
529:
528:on 2 April 2015.
518:
512:
511:
504:
498:
497:
495:
493:
479:
473:
472:
465:
459:
458:
451:
445:
444:
424:
418:
417:
411:
406:
404:
396:
395:on 2 April 2015.
381:
287:Sense of justice
127:
113:
106:
102:
99:
93:
91:
50:
26:
18:
809:
808:
804:
803:
802:
800:
799:
798:
784:
783:
782:
772:
770:
762:
761:
757:
736:
729:
728:
715:
714:
710:
700:
698:
695:
691:
690:
686:
676:
674:
665:
664:
660:
646:
636:
631:
627:
626:
622:
613:
612:
608:
594:
584:
578:
577:
573:
564:
563:
559:
549:
547:
546:on 2 April 2015
538:
537:
533:
520:
519:
515:
506:
505:
501:
491:
489:
481:
480:
476:
467:
466:
462:
453:
452:
448:
441:
426:
425:
421:
407:
397:
385:"Pros and Cons"
383:
382:
378:
373:
352:
340:
332:
319:
307:
302:
289:
273:
260:
255:
242:
214:
209:
197:law enforcement
150:
114:
103:
97:
94:
51:
49:
39:
27:
12:
11:
5:
807:
805:
797:
796:
786:
785:
781:
780:
754:
753:
752:
747:
742:
735:
734:External links
732:
727:
726:
708:
684:
658:
649:|journal=
620:
606:
571:
557:
531:
513:
499:
474:
460:
446:
439:
419:
410:|journal=
375:
374:
372:
369:
351:
348:
339:
336:
331:
328:
318:
315:
306:
303:
301:
298:
294:animal abusers
288:
285:
272:
269:
259:
256:
254:
251:
247:cyber bullying
241:
238:
218:search engines
213:
210:
208:
205:
149:
146:
134:internet media
124:(Chinese:
116:
115:
30:
28:
21:
13:
10:
9:
6:
4:
3:
2:
806:
795:
792:
791:
789:
769:
765:
759:
756:
751:
748:
746:
743:
741:
738:
737:
733:
731:
722:
718:
712:
709:
694:
688:
685:
672:
668:
662:
659:
654:
641:
630:
624:
621:
616:
610:
607:
602:
589:
582:
575:
572:
567:
561:
558:
545:
541:
535:
532:
527:
523:
517:
514:
509:
503:
500:
488:
484:
478:
475:
470:
464:
461:
456:
450:
447:
442:
436:
432:
431:
423:
420:
415:
402:
394:
390:
386:
380:
377:
370:
368:
365:
360:
357:
349:
347:
345:
337:
335:
329:
327:
324:
316:
314:
311:
304:
299:
297:
295:
286:
284:
282:
278:
270:
268:
265:
257:
252:
250:
248:
239:
237:
235:
231:
227:
223:
219:
211:
206:
204:
202:
198:
194:
193:Public trials
189:
187:
183:
182:Tencent Video
179:
175:
169:
167:
163:
159:
155:
147:
145:
143:
139:
135:
131:
123:
122:cyber manhunt
112:
109:
101:
90:
87:
83:
80:
76:
73:
69:
66:
62:
59: –
58:
54:
53:Find sources:
47:
43:
37:
36:
31:This article
29:
25:
20:
19:
16:
773:27 September
771:. Retrieved
768:ResearchGate
767:
758:
730:
721:the original
711:
699:. Retrieved
687:
675:. Retrieved
671:the original
661:
640:cite journal
623:
609:
580:
574:
560:
548:. Retrieved
544:the original
534:
526:the original
516:
502:
492:27 September
490:. Retrieved
487:ResearchGate
486:
477:
463:
449:
429:
422:
401:cite journal
393:the original
388:
379:
361:
353:
341:
333:
320:
308:
290:
274:
261:
243:
215:
190:
170:
151:
121:
119:
104:
95:
85:
78:
71:
64:
52:
40:Please help
35:verification
32:
15:
330:Related law
98:August 2020
701:3 February
677:3 February
597:|url=
455:"必須正視網絡欺凌"
371:References
300:Influences
277:cyberspace
178:Tencent QQ
148:Background
68:newspapers
201:Bus Uncle
788:Category
588:citation
550:22 March
264:Netizens
222:Netizens
142:judgment
138:netizens
364:netizen
344:privacy
310:Victims
253:Purpose
154:manhunt
82:scholar
750:明光社 起底
457:. 明光社.
437:
207:Method
84:
77:
70:
63:
55:
745:高等起底組
740:香港高登網
696:(PDF)
632:(PDF)
234:Sogou
230:Petal
226:Baidu
186:Weibo
174:Qzone
89:JSTOR
75:books
775:2020
703:2018
679:2018
653:help
601:help
552:2015
494:2020
435:ISBN
414:help
362:The
132:via
61:news
44:by
790::
766:.
644::
642:}}
638:{{
592::
590:}}
586:{{
485:.
405::
403:}}
399:{{
387:.
279:.
249:.
232:,
228:,
184:,
180:,
176:,
126:起底
120:A
777:.
705:.
681:.
655:)
651:(
603:)
599:(
554:.
496:.
443:.
416:)
412:(
389:2
111:)
105:(
100:)
96:(
86:·
79:·
72:·
65:·
38:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.