1 citizen portfolio Presented by: Lim Xin Hui – SA11040 Hew Xin Lin – SB11019 Trainer: Encik Mohd Tarmizi Session: 28-29 april 2012.

Slides:



Advertisements
Similar presentations
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Advertisements

Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Developed by Technology Services 1:1 Laptop Initiative
Cyber Safety Assessment Review
Definition Is when a child, preteen is tormented, threatened, harassed, humiliated, embarrassed, or otherwise targeted by another child, preteen, or teen.
Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
Cyberbullying: What Parents Need to Know. Technology is Here to Stay Technology has changed the world in many ways. Most of those changes have been positive;
Forms of Cyberbullying
Breaking Trust On The Internet
CYBERSAFETY Acting Sergeant Kate Brown Christchurch Police Youth Education.
Internet Safety and Awareness Cyberbullies and Predators Enfield High School Computer Network.
Washburn High School Student “Responsible Use” Guidelines for Electronic Technologies.
BULLYING What Is The Definition of Bullying?
CYBER BULLYING…. What Is Cyber Bullying??? 0 "Cyber bullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed.
 e-Access is about understanding the privilege of using electronic information as well as the right to having equal, secure and reliable access.  The.
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
e-safety and cyber bullying
Netiquette Rules.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Information for Students and Families
Where does bullying occur? OFSTED Report % at school 55% at school 24% at home 24% at home 18% around where children live 18% around where children.
Internet Safety and Kids Ms. Lee’s Classroom Computers are NOT bad Computers can be used to help kids learn and play. They can be used safely, if parents.
Internet Safety Awareness
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
GUIDANCE LESSON INTERNET SAFETY/NETIQUETTE IF YOU DO NOT WANT IT TO BE TOMORROW’S FRONT PAGE NEWS, DO NOT SEND IT THROUGH TECHNOLOGY!!!
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
E-safety and safeguarding Staying safe online. Introduction Being eSafe relies on selecting appropriate privacy levels knowing how to behave online understanding.
Cyber Crimes.
Cyber Bullying: Not Something To Be Ignored A Presentation By Tyler Mulford.
E-Safety Challenge College. Learning Objectives Understanding the definition of ‘cyber’ bullying and the affect it can have on the victim.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
IT security By Tilly Gerlack.
Donette Mullinix ED 505 UWA Clipart:
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
 Facebook  Twitter  MySpace  Windows LiveSpace.
November 10,  Acceptable use  Internet Filtering  Social Web (MySpace, Facebook, etc.)  Cyberbullying  Plagiarism  Phishing.
CYBERBULLYING. What is it? Cyber bullying is bullying or harassment that happens online. It can happen in an , a text message, an online game, or.
Have Fun – Stay Safe ‘E Safety’ – ‘Cyber Safe’. What is ‘Cyber Space’? The invisible space that we use to link ourselves to the internet or other people.
Ethical and Morality of Digital in 1 Malaysia WELCOME TO.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
100 Internet Safety Jeopardy Social Network Sites Online Shopping Words & Pictures Cyber- bullying Internet Scams.
August 24 th 2011 Digital Citizenship. Cell/Smart phones Slates and Tablets Social Network Sites Video Conferencing Online Gaming.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
Berkeley Unified School District Cyber Savvy social networking and netiquette.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
PORTFOLIO 1 CITIZEN MUHAMMAD TAUFIQ BIN TAHA FA
You must be an E-safety Support member to use these resources in your school. © www.e-safetysupport.com Cyber Bullying.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Internet Dangers Technology Communication Tools E-Literate.
E-Literate Muhammad Naimullah b. Badrulhisam
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
An Overview of Legislation and Board Policy. Federal Legislation (CIPA, COPPA) WCPSS Board of Education ◦ Policy 2313, 3013, and 4013 Federally Mandated.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Guidelines for Internet Safety Chad Olivard ITC 525 Kutztown University Summer 2011.
Internet Safety. Online Concerns: Contact Content Conduct.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Safety.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Online Safety! By: Michelle Deng.
BULLYING
Teaching Internet Safety
Cyber Bullying.
Presentation transcript:

1 citizen portfolio Presented by: Lim Xin Hui – SA11040 Hew Xin Lin – SB11019 Trainer: Encik Mohd Tarmizi Session: april 2012

-Physical and Psychological Well-Being in a Digital World -applying ergonomics in our daily life e-Care

Examples: Table Work Surface Height Must be adjustable

Example2: Chair With adjustable height well-designed chair that supports your back as well as allows you to work with ease.

Example3: Using mouse purchase a well-designed mouse that can help avoid pressure on your forearms and wrists. Release the mouse at frequent intervals so that you can avoid pressure on the wrists

Example4: Desktop layout Make sure that all your documents and controls are easily reachable by both hands so that there is no need to twist and turn any parts of your body unnecessarily.

Example5: Document Holder reduce the movement of your head in djusting your focus from the screen to your documents.

e-Literate

What is e-Literate?? The e-Literate module provides an introduction to 21st century global digital technology. It explains the capabilities to use digital technology and knowing when, when not and how to use it. It stresses on the ethics, process of learning about technology and the uses of technology.

The Digital Literacy Tools

Mobile Phone

Smart Object

Sa telli te TV

Game Console

Wireless Internet

How to Tell if a Web Page is Secure? Most websites begin with the letters “http”, it is impossible to tell if the websites are secure or not. However, if a website begins its URLs with “https”, it means that the website provides a secure connection for users Example:

“Lock” icon All secure websites have a “lock” icon somewhere on the screen. This is to guarantee the transactions and data provided are safe and secure. Example:

e-Safety

What is e-Safety?? Description: Internet safety is more on how to protect your important information from internet threat.

Cyber Bullying

Description: "Cyberbullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones.

Examples of Cyber-Bullying 1.A fake profile is created on a social networking site and the fake profile is used to harass and abuse other students. 2.Someone posts some embarrassing, private or doctored photos or videos to a social networking site. Someone sends abusive or threatening text messages or s to a victim. 3. Online polls are set up to judge and intimidate other students based on characteristics such as physical appearance or intelligence.

Cyberstalking

Description: Cyber stalking is the use of the Internet or any electronic device to stalk other people. Cyber stalkers find information on their victims from various sources such as blogs, search services, and social networking websites.

What To Do If You Are Being Cyberstalked??? Save all communications for evidence. Do not edit or alter them in any way. Also, keep a record of your contacts with Internet system administrators or law enforcement officials. You may want to consider blocking or filtering messages from the harasser. Many programs such as Eudora and Microsoft Outlook have a filter feature, and software can be easily obtained that will automatically delete s from a particular address or contain offensive words. Chat room contact can be blocked as well.

Contact your local police department and inform them of the situation in as much detail as possible. In appropriate cases, they may refer the matter to state or federal authorities.

Hacker and Cracker

Hacker Hacker is a person who enjoys learning programming languages and computer systems and can be considered an expert on the subjects. Hackers usually are programmers who try to find holes in the ground systems to enhance their knowledge. Sometimes hackers may share the information they find with others, but have no intention to interfere with the system or to get others’ personal information.

Cracker Cracker is a person who is illegally accessed to someone else’s system, with the intention to distribute malicious software. A cracker can disturb the system by damaging key data.

Protection from Internet Threats 1. Your Screen If you walk away from your computer, close the lid or engage the screensaver. Be sure you have it password protected to get back to the main screen. 2. Be responsible and be aware You are responsible for what happens on your computer and with your account, Know the security policy (AUP)

3. Password choice Mix upper and lower case, numbers and misspell the words you choose. Do not write it down. Do not share your password with anyone. Do not rely on one password for everything in case you have a breach. 4. Surf wisely Surf as if others were observing you. Be cautious about providing personal information to websites.

5. It is all on the record Every keystroke of every , every IM, everything said or done on the web or in is recorded somewhere. 6. Practise safe access Be careful opening any attachments. This is especially true if you do not know the sender, but even if you do, it is possible for malware to fake address or even steal them from computer and send them out without the owner knowing.

7. Protect your identity Do not reply or click on links in any message requesting personal or financial information. Monitor your finances. At least review your credit quarterly. Don’t download programs from companies of which you are not familiar. Secure your computer. Block popups. 8. Backup data Backup to disks, external hard drives, flash drives or the server. Create a schedule.