GROUP : MOMENT SA’AD BIN SABAR FB 11072 MOHD NORSHAFIQ BIN MOHD PAUZI FB 11015 1 POSITIVE VALUES IN USING TECHNOLOGY.

Slides:



Advertisements
Similar presentations
D ETER D ETECT D EFEND CiTiZEN. When Someone Uses Your Personally Identifying Information, Like Your Name, Social Security Number, Or Credit Card Number,
Advertisements

ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
World has change Which side do CHOOSE you. A fight between GOOD EVIL.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
 e-Access is about understanding the privilege of using electronic information as well as the right to having equal, secure and reliable access.  The.
E-safety Quiz. Which one of these is not safe to share on your profile? Question 1.
Who Wants To Be A Safe Communicator? What does the ‘e’ stand for when it is in front of words? For example: , e-safety etc…
Define and identify unethical practices such as hacking, phone fraud, online piracy, cyberstalking, and data vandalism. Use of employer’s computers for.
Cyber X-Force-SMS alert system for threats.
How Secure Are You When You Use the Internet?. Overview What is the Internet? And what it is commonly used for? o Parents vs. Teens/Kids Use Ways of accessing.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
e-Safety What e-Safety? E-safety is about measures and best particles for Netizens to guard their personal safety and the security of their networks.
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
Internet Safety North Boone High School 2011 Mrs. Lenser.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Stay Safe on the Internet!
In New Digital World for better future CYBERJAYA become as a new digital city in our country E-Access.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
GOOD COMPUTER SAFETY FOR 1 MALAYSIAN HEALTH CARE
Mrs. Jefferson Business Information Management I.
Challenge College E-Safety. Learning Objective To understand what the term E- Safety means and how it affects you in everyday life.
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Ethical and Morality of Digital in 1 Malaysia WELCOME TO.
Nu’aim Hussaini Bin Zulkefli Sr221 Csc434 Pn Noridah Binti Abu Bakar.
Connecting Generations – Discovering the digital World together.
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
By Cheryl Costantino, M.A. June  Teachers, students and parents have responsibilities when it comes to the use of technology.  There are national.
O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,
What is e-safety? It is about measures and best practices for Netizens to guard their personal safety and the security of their networks.
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
Online Safety Staying Safe In The Internet Age by Ross Parker.
PORTFOLIO 1 CITIZEN MUHAMMAD TAUFIQ BIN TAHA FA
 Internet crime is, Any crime or illegal activity committed online or through the internet.
Personal Safety Online There are many dangers youth face while online, such as: Predators – strangers who may cause harm Cyber bullies Inappropriate websites.
Internet Dangers Technology Communication Tools E-Literate.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
DIGITAL CITIZENSHIP. Digital Citizenship covers 9 areas according to Mike Ribble, an expert in the field.  Etiquette  Communication  Literacy  Access.
INTRODUCTION & QUESTIONS.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Identity Theft One of America's fastest growing crimes.
PROTECTING YOUR CREDIT PG NAME, TEACHER AND DATE.
Cyber Time Fifth Grade. Personal Information Can Share: o Favorite Food o Favorite Color o Dislikes o State/Country Don’t Share: o Address o o.
Appropriate Online Behavior
D IGITAL C ITIZENSHIP By Raquel Laliberty. Digital access is the equal ability for people in different countries and societies to access digital technology.
Issues for Computer Users, Electronic Devices, Computer and Safety.
By: Arjun Vachhani.  What is Cybercrime  What is Cybercrime Law  Cybercrime in Our Lives  Case 1: Albert Gonzalez  Case 2:Phishers  Statistics 
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Cyber crime and security issues
CYBER DANGERS TASHA LYON BOISE STATE UNIVERSITY. CYBER DANGERS Cyber bullying Online Predators Cyber Crime To Stop Cyber Dangers Parent Resources Bullying.
Internet Safety By: Zack Ward.
ARE YOU SAFE ON THE INTERNET?
Chapter 19.1 Cyberlaw and Cybercrime
Submitted By: Arslan Javaid Bsmc Submitted to: Sir Farrukh
MODUS OPERANDI OF CYBER CRIME
#1 Consumer Fraud Complaint – 5th straight year!
Dangers of the internet
Sissy r. osteen, ph.d., cfp® Oklahoma State University
Building your brand David Sade.
Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School
COMPUTER CRIME.
Five Unethical Uses of Computers
Cyber Crime Today we will look at: Different types of cyber-crime
CYBERTHON Use-cases.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Personal Safety Online
Presentation transcript:

GROUP : MOMENT SA’AD BIN SABAR FB MOHD NORSHAFIQ BIN MOHD PAUZI FB POSITIVE VALUES IN USING TECHNOLOGY

E-RULE 2 CYBER CRIME- that indicates all the crimes are committed through the use of technology to intimidate people, commit fraud or steal valuable information.

3 Internet banking fraud

4 Software Piracy

E- Safety 5 INTERNET DANGER -Can create the illusion that strangers are actually “friend”. -Can damage your reputation. -can come in various forms or attacks.

6 Identity theft

7

8 Internet predator

9

E- INTERACTION & COLLABORATION 10 MISUSE OF TECHNOLOGY not using the technology at the right place, at the right time.

11 Using mobile phone cheating in exam

12 Turn on electronic gadgets on plane

13

14 Credits…. e-safety software piracy o1v8pH8zOtY/TdHUdFN7P5I/AAAAAAAAAMs/a7kcbrAwFYc/s1600/Pirated%2BSoftware.j pg cyber crime x1.gif 4KV7Oheh5Uw/T0yDM5AqcLI/AAAAAAAAH2g/KuPlfS5GVQw/s1600/GTBank1.png C56F3CC6/0/phishingimageeg5.gif

15 identity theft Theft.png Theft.gif Aww/_4KWBWLXOL4/s400/identity-theft.jpg I.jpg internet predator amazon.com/images/I/513SUQJuSQL._SL500_AA300_.jpg m_oUOajImkk/T1NIG_LdxqI/AAAAAAAAAGg/nryiuqQuEpg/s160 0/Cyberbullying.jpg

16 cheating exam using phone exam.jpg c/2010/02/cheating-texting-thumb-500x jpg turn on elecronic gadgets on plane /li-phone-plane-620.jpg faa-reviews-in-flight-gadget-ban-of-the-day.jpg gadgets.jpg