180 likes | 335 Views
PORTFOLIO 1 CITIZEN. MUHAMMAD TAUFIQ BIN TAHA FA 11025. E-access is about understanding th eprivilege of using electronic device as well as the right to having equal, secure and reliable access. Several ways of gaining access to Internet: Modem Public Internet services
E N D
PORTFOLIO 1 CITIZEN MUHAMMAD TAUFIQ BIN TAHA FA 11025
E-access is about understanding theprivilege of using electronic device as well as the right to having equal, secure and reliable access. • Several ways of gaining access to Internet: • Modem • Public Internet services • Open and paid Wi-Fi Wireless Internet Access • Cellular phones and PDAs E-ACCESS
Instilling the right attitude • Appreciate the digital facilities • Being responsible when sharing knowledge and information • Equal opportunities for the disabled • Motor impairments – use keyboard commands instead of the mouse • Visual impairments – enlarge or enhance the area of focus • Language and cognitive disabilities – design layouts in the most simple and straightforward way possible. • Hearing impairments – include the visual forms in all auditory information E-ACCESS
E-literate is the ability to use technology ang knowing when, when not and how to use it appropriately. • Digital literacy applications • Web 2.0 • Instant messanging (IM) • Online application E-LITERATE
How to tell if a web page is secure • If a website begins its URLs with “https”, which means that the website provides a secure connection for users. • All secure websites have a “lock” icon somewhere on the screen. E-LITERATE
E-rule defines as governing communication and technology use including respect for ownership and authorship. • Cyber crimes • Internet banking fraud • Harassment • Intellectual property infringement • Intrusion • Offenses E-RULE
Reasons for cyber crime • For pursuit of fame and to gain reputation for intelligence or brilliance • Purely out of mischief • For financial means • To get revenge • To signal some form of protest • Purely to pursue criminal activities • To steal identity • To forge documents and messages E-RULE
Effects of cyber crime • Loss of revenue/profits • Waste of valuable time • Damaged reputations • Reduced productivity • Property infringements and legal rights • Software piracy • Freeware and shareware E-RULE
E-safety is about measures and best practices for Netizens to guard their personal safety and the security of their networks. • Internet dangers • Internet threats can come in various forms • The Internet can create the illusion that strangers are actually “friends” • The Internet can damage your reputation E-SAFETY
Common forms of digital security breach • Identity theft • Phishing emails • Hacker and cracker • Cyber stalking • Cyber bullying • Internet predator • Shared resources & Dedicated resources • Shared resources refer to devices or information on a computer that can be shared or accessed by many users • Dedicated resources refer to a direct connection between a terminal and a service, network, or computer to the specific use of a particular user. E-SAFETY
How to permanently erase the data from your old computer? • Dismantle the computer or laptop • Take out hard drive • Physically destroy the hard drive E-SAFETY
E-enterprise is about business conducted online using any Internet-based application. • Types of Internet Transactions • E-commerce/Online shopping • Online banking • The issues when conducting Transactions over the Internet • Credit card fraud • Impulse buying E-ENTERPRISE
Tips to online shopping • Shop around. There might be another great deal somewhere else • Make sure you know the trader’s full details. Those details can be used as backup information if you need to lodge a fraud report. • Look for websites that provide a secure payment • Double-check whether the company has a privacy statement that tells you what they will do with your personal information • Protect your privacy. Do not simply disclose your personal details E-ENTERPRISE
Tips to ensure a secure online transaction • Keep your passwords, personal identification number (PIN) and card numbers confidential • Look for the lock icon • Use a firewall • Install security updates E-ENTERPRISE
Tips to avoid credit card fraud • Keep your credit cards safe • Shred all documents with your credit card details on it • Don’t sign blank credit card receipts • Avoid giving out your credit card information • Be cautious when using your credit card online • Immediately report lost or stolen credit cards • Never leave your credit card to someone else • Check your credit card statement thoroughly before making payment E-ENTERPRISE
Tips to avoid becoming an impulsive buyer • Be aware of how much money you spend • Think twice before making a purchase • Set your objectives each time you go for online shopping E-ENTERPRISE
1 CITIZEN MODULE • STUDENT QUICK REFERENCE REFERENCE