1 / 17

PORTFOLIO 1 CITIZEN

PORTFOLIO 1 CITIZEN. MUHAMMAD TAUFIQ BIN TAHA FA 11025. E-access is about understanding th eprivilege of using electronic device as well as the right to having equal, secure and reliable access. Several ways of gaining access to Internet: Modem Public Internet services

steve
Download Presentation

PORTFOLIO 1 CITIZEN

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PORTFOLIO 1 CITIZEN MUHAMMAD TAUFIQ BIN TAHA FA 11025

  2. E-access is about understanding theprivilege of using electronic device as well as the right to having equal, secure and reliable access. • Several ways of gaining access to Internet: • Modem • Public Internet services • Open and paid Wi-Fi Wireless Internet Access • Cellular phones and PDAs E-ACCESS

  3. Instilling the right attitude • Appreciate the digital facilities • Being responsible when sharing knowledge and information • Equal opportunities for the disabled • Motor impairments – use keyboard commands instead of the mouse • Visual impairments – enlarge or enhance the area of focus • Language and cognitive disabilities – design layouts in the most simple and straightforward way possible. • Hearing impairments – include the visual forms in all auditory information E-ACCESS

  4. E-literate is the ability to use technology ang knowing when, when not and how to use it appropriately. • Digital literacy applications • Web 2.0 • Instant messanging (IM) • Online application E-LITERATE

  5. How to tell if a web page is secure • If a website begins its URLs with “https”, which means that the website provides a secure connection for users. • All secure websites have a “lock” icon somewhere on the screen. E-LITERATE

  6. E-rule defines as governing communication and technology use including respect for ownership and authorship. • Cyber crimes • Internet banking fraud • Harassment • Intellectual property infringement • Intrusion • Offenses E-RULE

  7. Reasons for cyber crime • For pursuit of fame and to gain reputation for intelligence or brilliance • Purely out of mischief • For financial means • To get revenge • To signal some form of protest • Purely to pursue criminal activities • To steal identity • To forge documents and messages E-RULE

  8. Effects of cyber crime • Loss of revenue/profits • Waste of valuable time • Damaged reputations • Reduced productivity • Property infringements and legal rights • Software piracy • Freeware and shareware E-RULE

  9. E-safety is about measures and best practices for Netizens to guard their personal safety and the security of their networks. • Internet dangers • Internet threats can come in various forms • The Internet can create the illusion that strangers are actually “friends” • The Internet can damage your reputation E-SAFETY

  10. Common forms of digital security breach • Identity theft • Phishing emails • Hacker and cracker • Cyber stalking • Cyber bullying • Internet predator • Shared resources & Dedicated resources • Shared resources refer to devices or information on a computer that can be shared or accessed by many users • Dedicated resources refer to a direct connection between a terminal and a service, network, or computer to the specific use of a particular user. E-SAFETY

  11. How to permanently erase the data from your old computer? • Dismantle the computer or laptop • Take out hard drive • Physically destroy the hard drive E-SAFETY

  12. E-enterprise is about business conducted online using any Internet-based application. • Types of Internet Transactions • E-commerce/Online shopping • Online banking • The issues when conducting Transactions over the Internet • Credit card fraud • Impulse buying E-ENTERPRISE

  13. Tips to online shopping • Shop around. There might be another great deal somewhere else • Make sure you know the trader’s full details. Those details can be used as backup information if you need to lodge a fraud report. • Look for websites that provide a secure payment • Double-check whether the company has a privacy statement that tells you what they will do with your personal information • Protect your privacy. Do not simply disclose your personal details E-ENTERPRISE

  14. Tips to ensure a secure online transaction • Keep your passwords, personal identification number (PIN) and card numbers confidential • Look for the lock icon • Use a firewall • Install security updates E-ENTERPRISE

  15. Tips to avoid credit card fraud • Keep your credit cards safe • Shred all documents with your credit card details on it • Don’t sign blank credit card receipts • Avoid giving out your credit card information • Be cautious when using your credit card online • Immediately report lost or stolen credit cards • Never leave your credit card to someone else • Check your credit card statement thoroughly before making payment E-ENTERPRISE

  16. Tips to avoid becoming an impulsive buyer • Be aware of how much money you spend • Think twice before making a purchase • Set your objectives each time you go for online shopping E-ENTERPRISE

  17. 1 CITIZEN MODULE • STUDENT QUICK REFERENCE REFERENCE

More Related