A guide in becoming a “Netizen” e-Access It is about understanding privilege of using electronic information as well as the right in having fair, safe.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Digital Citizenship in the Classroom
PORTFOLIO.  TYPE OF INTERNET TRANSACTION 1. ONLINE BANKING 2. ONLINE SHOPPING.
Implications and Security Issues of the Internet By Neelesh Patel.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Breaking Trust On The Internet
INTERNET SAFETY FOR STUDENTS
 e-Access is about understanding the privilege of using electronic information as well as the right to having equal, secure and reliable access.  The.
Internet Safety/Cyber Ethics
Security, Privacy, and Ethics Online Computer Crimes.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
e-Safety What e-Safety? E-safety is about measures and best particles for Netizens to guard their personal safety and the security of their networks.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety By Lydia Snowden.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
E-ACCESS  An example of technology use in e- Access are : 1.Laptop 2.Tablet 3.handphone.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
Cyber Crimes.
Day 3 Cybersafety Presented by FJUHSD Teacher Librarian.
In New Digital World for better future CYBERJAYA become as a new digital city in our country E-Access.
How To Be A Good Netizens? By Yew Keat Yat. E-Care Take a break from looking for screen. Go for jogging.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Reason for Cyber Crime Pursuit of fame Purely out of mischief For finance means To get revenge on someone they hate Purely to pursuit criminal.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
A guide to netiquette, copyright & fair use, plagiarism, internet and computer safety By Briana Horton.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Ethical and Morality of Digital in 1 Malaysia WELCOME TO.
By Alex Oliver D IGITAL A CCESS Digital access is the ability for people places of the world to access digital technology. People in all societies should.
Nu’aim Hussaini Bin Zulkefli Sr221 Csc434 Pn Noridah Binti Abu Bakar.
Por Guan Xiong PROJECT OBJECTIVES To develop a sense of ‘keNegaraan’, collaboration, responsibility and ownership to the communities during.
E - ENTERPRISE PUAN NORIDAH BINTI ABU BAKAR CSC 434 SITI NADHRAH BINTI OTHMAN SPORT SCIENCE AND RECREATION /SR223 E – Enterprise is about business conducted.
Digital Citizenship By: Amanda Thurber. Netiquette on Social Media Sites According to networketiquette.net, netiquette is the social code of the internet.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
CiTiZEN Group Member: Chew Swee Guan Goh Si Hui
WE ARE DATA By Hazim Zaidani Do you really think that your personal data is protected ? Well… Think Again !!!
O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Technology..technology e-Access 1 Ni hao..friends.,I want to know. How can I find about Malaysia country?? 2 Ayoyo..so easy just read book la… 3 Book?oh,
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
PORTFOLIO 1 CITIZEN MUHAMMAD TAUFIQ BIN TAHA FA
E- Enterpris e. What is e- Enterprise??? Business conducted online using any Internet based application. Designed to educate on appropriate online buying.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Digital Citizenship By Lori Gray.
By: Asfa Khan and Huda Mukhtar
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Internet Dangers Technology Communication Tools E-Literate.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School
Video: Digital citizenship is defined as the norms of appropriate,
Digital $$ Quiz Test your knowledge.
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

A guide in becoming a “Netizen”

e-Access It is about understanding privilege of using electronic information as well as the right in having fair, safe and reliable access There are few ways where to get the internet :  Modem  Public Internet Services such as universities  Open and Paid Wi-Fi Wireless Internet Access  Cellular phones and PDAs

Instill the Right Attitudes Appreciate the digital facilities Do not misuse the facilities Do not vandalize Internet kiosks Do not overwhelm the bandwidth Be responsible Should not spread incorrect information Do not condemn others in the cyber world Should be sensitive towards other races and ethnics

e-Literate Is it the skill in using technology and knowing when and when not and how to use it appropriately. It emphasizes on how online behaviour can produce major consequences offline. Internet enables us to perform various tasks and activities daily via the applications. Different applications can perform different tasks depending on what objective an application is created.

How can you trust internet resources?  Check whether the website is from a renown company  Call the company itself to confirm the website  Compared the prices from the website with the company  Make sure the website’s URL begins with “https”  There should be a lock icon somewhere in the website page

e-Rule It is defines as governing communication and tecnology use including respect for ownership and authorship. Everything that a man created will have it’s own positive and negative impacts. Same goes to the application of internet. There are various types of crime that can be commited for many reasons with the use of technology, also known as “cyber crimes”.

Examples of cyber crimes Internet Banking Fraud 1,191 Internet banking fraud cases detected in M'sia Jan-June ( my/news/story.asp?file= /2009/12/9/business/ &sec=bus iness) my/news/story.asp?file= /2009/12/9/business/ &sec=bus iness Harassment Man Sentenced for Internet Harassment ( bout.com/od/o nline/a/web_h arass.htm) bout.com/od/o nline/a/web_h arass.htm Intrusion Russian Computer Hacker Indicted in California ( news/2012/04/13/a _ shtml) news/2012/04/13/a _ shtml

Negative Impacts of Cyber Crimes If a company’s disclosed financial information is leaked, it can be used by another party to steal the company’s money from it’s account. Loss of revenue The security together with IT department have to waste their time trying to find and solve security breaches that exists as a result of the cyber crimes Waste of Valuable Time In the Wikileaks case, reputations of many countries were damaged as their private and confidential information /discussion were leaked. Damaged Reputation Companies will have to take appropriate actions to prevent future damage after the first case, thus, the employers will be distracted from their work routine Reduced productiyity

Property Infringments and Legal Rights Software piracy – One software is being shared or copied by many users but only one license agreement was paid. Freeware – Can download, copy, pass or use the the software without payment for a license Shareware – It is free for a limited period of time EULA (End User License Agreement) – Can install the software on a computer but prohibited from sharing it with other computer.

e-Safety It is about actions and best practices for Netizens to protect their personal safety and the security of their networks. There are many types of threat that can come from the internet. It exists in various forms and may be present without you knowing it.

Common forms of Digital Security Breach Identity Theft Three Indicted in Identity-Theft Case ( om/wp- dyn/content/article/2009/08/1 7/AR html) om/wp- dyn/content/article/2009/08/1 7/AR html Internet Predator Man arrested in Internet predator case ( /NEWS/ /Man- arrested-Internet-predator-case) /NEWS/ /Man- arrested-Internet-predator-case Cyber Bullying Student guilty in gay cyber-bullying case ( /us-student-guilty-in-gay- webcam-suicide-case/ ) /us-student-guilty-in-gay- webcam-suicide-case/ Phishing s Three phishing cases lodged in a day ( day.com/news/2012/feb/ Cyber-crime-Three-phishing-cases- lodged-in-a-day.htm) day.com/news/2012/feb/ Cyber-crime-Three-phishing-cases- lodged-in-a-day.htm

How to permenantly erase the data from an old computer?  To donate If you wish to donate the old computer to another party, a shredder software can be purchased to permenantly erase the data on the hard drive.  To dispose If you wish to dispose the old computer, first, you need to dismantle the computer. Second, take out the hard drive. Third, physically destroy or damage the hard drive * This is very important to avoid your personal data from falling into the wrong person that may use the information to commit a crime.

e-Interaction & Collaboration It is about the exchange and sharing of information using digital systems and the importance of having humility, loyal and respect for others when communicating. Since the internet enables communication digitally without the other person to be face-to-face, there are basic rules that should be remembered when communicating online to preserve good relationship with others. Use the right language Treat people the same as if they are in front of you Don’t encourage a fight if things get heated up

Misuse of Technology Case study : Mom: MySpace Hoax Led to Daughter's Suicide ( Utilising social networking site for the wrong reasons Case study : Blogger faces up to 2 years in jail for critising Russian Orthodox church ( Writing blogs to spread hatred Case Study : Woman who killed toddler in texting-while- driving case pleads no contest ( who-killed-toddler-in-texting-while-driving-/nD5dm/) who-killed-toddler-in-texting-while-driving-/nD5dm/ Jeopardizing safety when texting while driving Case study : Mother works to stop exploitation of child for online hoax ( online/article_0edbe de6-b258-3dfeb5094f39.html) online/article_0edbe de6-b258-3dfeb5094f39.html Spreading hoaxes via text messages and s

e-Enterprise It is about business conducted online using any internet-based application. It is created to enlighten on proper online buying behaviours, channels as well as the policies to perform a secure online transaction. e-Enterprise is just another way of how the internet can ease the human life. Nowadays, all the payments or groceries-shopping can be done online as the banks and companies are coping with the technologies of the 21 st centuries to escalate their business. However, catious must be taken to avoid unlucky incidents.

Types of internet transaction Online Shopping Try to acquire the trader’s complete details Use a website that provide secure payment (padlock icon = encryption) Verify with the company after the transaction has been performed. Double-check whether the company has a privacy statement that tells you what they are doing with your personal information. Online Banking Don‘t give away your passwords, card numbers and Personal Identification Number (PIN). Ensure that the page you are performing your transaction has encryption. Use a firewall Make sure that you install and constantly update your security updates (automatic update should be beneficial)

Identifying Affairs when Conductiong Transactions over the Internet Credit Card Fraud There are 3 types : theft of the card, counterfeiting and card- not-present fraud. Shred all documents containing informations on your credit card. When paying, give the card straight to to cashier. If your credit card is stolen, immediate report to the police should be done. Avoid giving credit card informations to others. Impulse Buying It is an unplanned or spontaneous purchase. Withdraw just enough money to buy whats needed. Make a list of the needed stuffs only. Do not surf around the mall or window-shopping. Jot down the expenses to observe the money flow.

e-Care It is about physical and psychological well-being in a digital world. Having the internet to cater your every need allow you to just sit back and relax in your home while performing all the daily routine (business, shopping, socializing and paying bills) through online. But with that, there are issues that need to be taken care of to ensure the health of your physical, mental and social behaviour.

Exercise to stretch the muscles and improve blood circulation

e-Accountability It is about the privileges and responsibilities of all users together with ethical behaviors that come with it. It is also includes credibility and integrity of online content and rational thinking about what is right or wrong. Every internet user should understand that they have responsibility to be ethical towards others and also, there are needs to govern the system to ensure that the welfare and rights of the users themselves are well-protected. Thus, laws and legislations are regulated so that objectives above are attained.

Brought to you by :