Presentation is loading. Please wait.

Presentation is loading. Please wait.

PORTFOLIO 1 CITIZEN MUHAMMAD TAUFIQ BIN TAHA FA 11025.

Similar presentations


Presentation on theme: "PORTFOLIO 1 CITIZEN MUHAMMAD TAUFIQ BIN TAHA FA 11025."— Presentation transcript:

1 PORTFOLIO 1 CITIZEN MUHAMMAD TAUFIQ BIN TAHA FA 11025

2 E-ACCESS E-access is about understanding th eprivilege of using electronic device as well as the right to having equal, secure and reliable access. Several ways of gaining access to Internet: ◦Modem ◦Public Internet services ◦Open and paid Wi-Fi Wireless Internet Access ◦Cellular phones and PDAs

3 E-ACCESS Instilling the right attitude ◦Appreciate the digital facilities ◦Being responsible when sharing knowledge and information Equal opportunities for the disabled ◦Motor impairments – use keyboard commands instead of the mouse ◦Visual impairments – enlarge or enhance the area of focus ◦Language and cognitive disabilities – design layouts in the most simple and straightforward way possible. ◦Hearing impairments – include the visual forms in all auditory information

4 E-LITERATE E-literate is the ability to use technology ang knowing when, when not and how to use it appropriately. Digital literacy applications ◦Web 2.0 ◦Instant messanging (IM) ◦Online application

5 E-LITERATE How to tell if a web page is secure ◦If a website begins its URLs with “https”, which means that the website provides a secure connection for users. ◦All secure websites have a “lock” icon somewhere on the screen.

6 E-RULE E-rule defines as governing communication and technology use including respect for ownership and authorship. Cyber crimes ◦Internet banking fraud ◦Harassment ◦Intellectual property infringement ◦Intrusion ◦Offenses

7 E-RULE Reasons for cyber crime ◦For pursuit of fame and to gain reputation for intelligence or brilliance ◦Purely out of mischief ◦For financial means ◦To get revenge ◦To signal some form of protest ◦Purely to pursue criminal activities ◦To steal identity ◦To forge documents and messages

8 E-RULE Effects of cyber crime ◦Loss of revenue/profits ◦Waste of valuable time ◦Damaged reputations ◦Reduced productivity Property infringements and legal rights ◦Software piracy ◦Freeware and shareware

9 E-SAFETY E-safety is about measures and best practices for Netizens to guard their personal safety and the security of their networks. Internet dangers ◦Internet threats can come in various forms ◦The Internet can create the illusion that strangers are actually “friends” ◦The Internet can damage your reputation

10 E-SAFETY Common forms of digital security breach ◦Identity theft ◦Phishing emails ◦Hacker and cracker ◦Cyber stalking ◦Cyber bullying ◦Internet predator Shared resources & Dedicated resources ◦Shared resources refer to devices or information on a computer that can be shared or accessed by many users ◦Dedicated resources refer to a direct connection between a terminal and a service, network, or computer to the specific use of a particular user.

11 E-SAFETY How to permanently erase the data from your old computer? ◦Dismantle the computer or laptop ◦Take out hard drive ◦Physically destroy the hard drive

12 E-ENTERPRISE E-enterprise is about business conducted online using any Internet-based application. Types of Internet Transactions ◦E-commerce/Online shopping ◦Online banking The issues when conducting Transactions over the Internet ◦Credit card fraud ◦Impulse buying

13 E-ENTERPRISE Tips to online shopping ◦Shop around. There might be another great deal somewhere else ◦Make sure you know the trader’s full details. Those details can be used as backup information if you need to lodge a fraud report. ◦Look for websites that provide a secure payment ◦Double-check whether the company has a privacy statement that tells you what they will do with your personal information ◦Protect your privacy. Do not simply disclose your personal details

14 E-ENTERPRISE Tips to ensure a secure online transaction ◦Keep your passwords, personal identification number (PIN) and card numbers confidential ◦Look for the lock icon ◦Use a firewall ◦Install security updates

15 E-ENTERPRISE Tips to avoid credit card fraud ◦Keep your credit cards safe ◦Shred all documents with your credit card details on it ◦Don’t sign blank credit card receipts ◦Avoid giving out your credit card information ◦Be cautious when using your credit card online ◦Immediately report lost or stolen credit cards ◦Never leave your credit card to someone else ◦Check your credit card statement thoroughly before making payment

16 E-ENTERPRISE Tips to avoid becoming an impulsive buyer ◦Be aware of how much money you spend ◦Think twice before making a purchase ◦Set your objectives each time you go for online shopping

17 REFERENCE 1 CITIZEN MODULE ◦STUDENT QUICK REFERENCE


Download ppt "PORTFOLIO 1 CITIZEN MUHAMMAD TAUFIQ BIN TAHA FA 11025."

Similar presentations


Ads by Google