Download presentation
Presentation is loading. Please wait.
Published byVivian Glenn Modified over 9 years ago
1
GROUP : MOMENT SA’AD BIN SABAR FB 11072 MOHD NORSHAFIQ BIN MOHD PAUZI FB 11015 1 POSITIVE VALUES IN USING TECHNOLOGY
2
E-RULE 2 CYBER CRIME- that indicates all the crimes are committed through the use of technology to intimidate people, commit fraud or steal valuable information.
3
3 Internet banking fraud
4
4 Software Piracy
5
E- Safety 5 INTERNET DANGER -Can create the illusion that strangers are actually “friend”. -Can damage your reputation. -can come in various forms or attacks.
6
6 Identity theft
7
7
8
8 Internet predator
9
9
10
E- INTERACTION & COLLABORATION 10 MISUSE OF TECHNOLOGY not using the technology at the right place, at the right time.
11
11 Using mobile phone cheating in exam
12
12 Turn on electronic gadgets on plane
13
13
14
14 Credits…. e-safety http://brumbyjuniors.primaryblogger.co.uk/files/2009/12/1280_staysafewallpaper.jpg. software piracy http://www.adsensetracker-gadget.com/wp-content/uploads/2012/03/a.gif http://3.bp.blogspot.com/- o1v8pH8zOtY/TdHUdFN7P5I/AAAAAAAAAMs/a7kcbrAwFYc/s1600/Pirated%2BSoftware.j pg http://www.softdistrict.com/wp-content/uploads/2010/02/software-piracy.gif cyber crime http://tonyocruz.com/wp-content/uploads/2011/02/cybercrime.jpg http://www.bankislam.com.my/en/PublishingImages/FraudMAIL3.gif http://www.anzroyal.com/en/resources/2/2/22651a804e311b84b44db74d5a1f09ce/1/Hoa x1.gif http://2.bp.blogspot.com/- 4KV7Oheh5Uw/T0yDM5AqcLI/AAAAAAAAH2g/KuPlfS5GVQw/s1600/GTBank1.png http://www.nationwide.co.uk/NR/rdonlyres/C496A94A-AF8F-44EE-9F54- 4345C56F3CC6/0/phishingimageeg5.gif
15
15 identity theft http://www.celframe.com/blogs/wp-content/uploads/Identity- Theft.png http://raisingceokids.com/wp-content/uploads/2011/04/Identity- Theft.gif http://1.bp.blogspot.com/_AKKXrIWFzfw/Sa9XyDTzaJI/AAAAAAAA Aww/_4KWBWLXOL4/s400/identity-theft.jpg http://www.identitytheftresponse.com/creatives/categories.jpg http://thumbs.dreamstime.com/thumblarge_549/1287493373pX4 42I.jpg internet predator http://ecx.images- amazon.com/images/I/513SUQJuSQL._SL500_AA300_.jpg http://www.pcsndreams.com/images/AceSpy/acespy_chats.jpg http://2.bp.blogspot.com/- m_oUOajImkk/T1NIG_LdxqI/AAAAAAAAAGg/nryiuqQuEpg/s160 0/Cyberbullying.jpg
16
16 cheating exam using phone http://www.qiilans87.com/wp-content/fhoto/dont-cheat-on- exam.jpg http://mathnexus.wwu.edu/mathpix/cheating.jpg http://www.teenvogue.com/connect/blogs/soundoff/assets_ c/2010/02/cheating-texting-thumb-500x333-31321.jpg turn on elecronic gadgets on plane http://www.cbc.ca/gfx/images/news/topstories/2012/03/12 /li-phone-plane-620.jpg http://tdwgeeks.files.wordpress.com/2012/03/geek-news- faa-reviews-in-flight-gadget-ban-of-the-day.jpg http://juztboy.files.wordpress.com/2011/12/mobil-plane.jpg http://www.ks95.com/wtf/images/feed/1332378445- gadgets.jpg
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.