Download presentation
Presentation is loading. Please wait.
Published byDeirdre Booker Modified over 9 years ago
2
e-Access is about understanding the privilege of using electronic information as well as the right to having equal, secure and reliable access. The following options are available for us to gain access to the internet: Modem. Open and Paid Wi-Fi Wireless Internet Access. Cellular Phones and PDAs. Public Internet Services such as colleges and universities or cyber cafes.
3
We should not vandalize internet kiosk. We should not hack the network We should not spread fabricated or incorrect information and news. We should be sensitive towards different races and ethnic groups, religious beliefs as well as the needs of the nation.
4
E-Literate is the ability to use technology and knowing when, when not and how to use it appropriately. It highlight how online behavior can have major consequences offline. There are few examples of e-literate such as: Instant Messaging (IM). Online application E-Business,E-Government,E-Learning, Job Search Portals, Social Networking Sites, Social Videos Sites.
5
If a website begins its URLs with “https", it means that the websites provides a secure connection for users. All secure websites have a “lock” icon somewhere on the screen. This is to guarantee the transactions and data provided are safe and secure.
6
e-Rule defines a governing communication and technology use including respect for ownership and authorship. Cyber crimes is the crimes are committed through the use of technology to intimidate people, commit fraud or steal valuable information. There are a few of cyber crimes: internet banking fraud, harassment, distribution of offensive materials, sales and investment fraud.
7
For financial means, for pursuit of fame and to gain reputation for intelligence or brilliance. To signal some form of protest, purely to pursue criminal activities. To steal identity, to forge documents and messages, purely out of mischief.
8
e-Interaction and Collaboration is an exchange and sharing of information using digital systems and the importance of having humility, loyalty and respect for others when communicating. There are various forms of digital communications and collaboration tools: emails, social networking site, blog, online forum, instant messaging (IM)
9
Use the right language, threat people the same as if in person, if you have nothing nice to say, then don’t say it, don’t encourage a fight when you spot one. Speak softly, keep your private conversations, respect camera phone rules, keep your distance from those around.
10
e-Enterprise is about business conducted online using any internet-based application. It is designed to educate on appropriate online buying behaviors, channels as well as tactics for making a secure online transaction. There are two examples of internet transactions: e-Commerce/online shopping Online banking
11
Keep your passwords, personal identification number (PIN) and card numbers confidential. Look for the lock icon. Use a firewall. Install security updates.
12
e-Care is about physical and psychological well-being in a digital world. Ergonomics- science that helps people to create and design machines which are comfortable and easy to use. Ergonomics is applied in our life to fulfill thee two goals: Health Productivity
13
Adjust the height of your work surface or table, do not sit in a rigid and stiff manner; change your posture frequently. Take short breaks frequently rather than long infrequent ones. Release the mouse at frequent intervals so that you can avoid pressure on the wrists.
14
e-Accountability is about the privileges and responsibilities of all users along with the ethical behaviors and expectations that come with it. e-Accountability also includes credibility and integrity of online content and critical thinking about what is true/false. Fair Use is when the copyrighted material is used for a limited and “transformative” purpose such as to comment upon, criticize or parody.
15
Material used must be directly relevant to the topic. Clearly cite, credit and acknowledge the author, source and possible copyrights. Do not use it for the purpose of commercial gain. Don’t excessively use the author’s material until it affects the market value of the original work. The quoted sources must be a legitimate academics work from a recognized educational institution.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.