Download presentation
Presentation is loading. Please wait.
Published byFelix Griffin Modified over 9 years ago
1
PORTFOLIO 1 CITIZEN MUHAMMAD TAUFIQ BIN TAHA FA 11025
2
E-ACCESS E-access is about understanding th eprivilege of using electronic device as well as the right to having equal, secure and reliable access. Several ways of gaining access to Internet: ◦Modem ◦Public Internet services ◦Open and paid Wi-Fi Wireless Internet Access ◦Cellular phones and PDAs
3
E-ACCESS Instilling the right attitude ◦Appreciate the digital facilities ◦Being responsible when sharing knowledge and information Equal opportunities for the disabled ◦Motor impairments – use keyboard commands instead of the mouse ◦Visual impairments – enlarge or enhance the area of focus ◦Language and cognitive disabilities – design layouts in the most simple and straightforward way possible. ◦Hearing impairments – include the visual forms in all auditory information
4
E-LITERATE E-literate is the ability to use technology ang knowing when, when not and how to use it appropriately. Digital literacy applications ◦Web 2.0 ◦Instant messanging (IM) ◦Online application
5
E-LITERATE How to tell if a web page is secure ◦If a website begins its URLs with “https”, which means that the website provides a secure connection for users. ◦All secure websites have a “lock” icon somewhere on the screen.
6
E-RULE E-rule defines as governing communication and technology use including respect for ownership and authorship. Cyber crimes ◦Internet banking fraud ◦Harassment ◦Intellectual property infringement ◦Intrusion ◦Offenses
7
E-RULE Reasons for cyber crime ◦For pursuit of fame and to gain reputation for intelligence or brilliance ◦Purely out of mischief ◦For financial means ◦To get revenge ◦To signal some form of protest ◦Purely to pursue criminal activities ◦To steal identity ◦To forge documents and messages
8
E-RULE Effects of cyber crime ◦Loss of revenue/profits ◦Waste of valuable time ◦Damaged reputations ◦Reduced productivity Property infringements and legal rights ◦Software piracy ◦Freeware and shareware
9
E-SAFETY E-safety is about measures and best practices for Netizens to guard their personal safety and the security of their networks. Internet dangers ◦Internet threats can come in various forms ◦The Internet can create the illusion that strangers are actually “friends” ◦The Internet can damage your reputation
10
E-SAFETY Common forms of digital security breach ◦Identity theft ◦Phishing emails ◦Hacker and cracker ◦Cyber stalking ◦Cyber bullying ◦Internet predator Shared resources & Dedicated resources ◦Shared resources refer to devices or information on a computer that can be shared or accessed by many users ◦Dedicated resources refer to a direct connection between a terminal and a service, network, or computer to the specific use of a particular user.
11
E-SAFETY How to permanently erase the data from your old computer? ◦Dismantle the computer or laptop ◦Take out hard drive ◦Physically destroy the hard drive
12
E-ENTERPRISE E-enterprise is about business conducted online using any Internet-based application. Types of Internet Transactions ◦E-commerce/Online shopping ◦Online banking The issues when conducting Transactions over the Internet ◦Credit card fraud ◦Impulse buying
13
E-ENTERPRISE Tips to online shopping ◦Shop around. There might be another great deal somewhere else ◦Make sure you know the trader’s full details. Those details can be used as backup information if you need to lodge a fraud report. ◦Look for websites that provide a secure payment ◦Double-check whether the company has a privacy statement that tells you what they will do with your personal information ◦Protect your privacy. Do not simply disclose your personal details
14
E-ENTERPRISE Tips to ensure a secure online transaction ◦Keep your passwords, personal identification number (PIN) and card numbers confidential ◦Look for the lock icon ◦Use a firewall ◦Install security updates
15
E-ENTERPRISE Tips to avoid credit card fraud ◦Keep your credit cards safe ◦Shred all documents with your credit card details on it ◦Don’t sign blank credit card receipts ◦Avoid giving out your credit card information ◦Be cautious when using your credit card online ◦Immediately report lost or stolen credit cards ◦Never leave your credit card to someone else ◦Check your credit card statement thoroughly before making payment
16
E-ENTERPRISE Tips to avoid becoming an impulsive buyer ◦Be aware of how much money you spend ◦Think twice before making a purchase ◦Set your objectives each time you go for online shopping
17
REFERENCE 1 CITIZEN MODULE ◦STUDENT QUICK REFERENCE
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.