Portfolio 1 Citizen

advertisement


e-Access is about understanding the privilege
of using electronic information as well as the
right to having equal, secure and reliable
access.
The following options are available for us to
gain access to the internet:




Modem.
Open and Paid Wi-Fi Wireless Internet Access.
Cellular Phones and PDAs.
Public Internet Services such as colleges and
universities or cyber cafes.




We should not vandalize internet kiosk.
We should not hack the network
We should not spread fabricated or incorrect
information and news.
We should be sensitive towards different
races and ethnic groups, religious beliefs as
well as the needs of the nation.


E-Literate is the ability to use technology and
knowing when, when not and how to use it
appropriately. It highlight how online
behavior can have major consequences
offline.
There are few examples of e-literate such as:
 Instant Messaging (IM).
 Online application
 E-Business ,E-Government ,E-Learning, Job Search Portals,
Social Networking Sites, Social Videos Sites.


If a website begins its URLs with “https", it
means that the websites provides a secure
connection for users.
All secure websites have a “lock” icon
somewhere on the screen. This is to
guarantee the transactions and data provided
are safe and secure.



e-Rule defines a governing communication
and technology use including respect for
ownership and authorship.
Cyber crimes is the crimes are committed
through the use of technology to intimidate
people, commit fraud or steal valuable
information.
There are a few of cyber crimes: internet
banking fraud, harassment, distribution of
offensive materials, sales and investment
fraud.



For financial means, for pursuit of fame and
to gain reputation for intelligence or
brilliance.
To signal some form of protest, purely to
pursue criminal activities.
To steal identity, to forge documents and
messages, purely out of mischief.


e-Interaction and Collaboration is an
exchange and sharing of information using
digital systems and the importance of having
humility, loyalty and respect for others when
communicating.
There are various forms of digital
communications and collaboration tools:
emails, social networking site, blog, online
forum, instant messaging (IM)


Use the right language, threat people the
same as if in person, if you have nothing nice
to say, then don’t say it, don’t encourage a
fight when you spot one.
Speak softly, keep your private conversations,
respect camera phone rules, keep your
distance from those around.


e-Enterprise is about business conducted
online using any internet-based application.
It is designed to educate on appropriate
online buying behaviors, channels as well as
tactics for making a secure online
transaction.
There are two examples of internet
transactions:
 e-Commerce/online shopping
 Online banking




Keep your passwords, personal identification
number (PIN) and card numbers confidential.
Look for the lock icon.
Use a firewall.
Install security updates.



e-Care is about physical and psychological
well-being in a digital world.
Ergonomics- science that helps people to
create and design machines which are
comfortable and easy to use.
Ergonomics is applied in our life to fulfill thee
two goals:
 Health
 Productivity



Adjust the height of your work surface or
table, do not sit in a rigid and stiff manner;
change your posture frequently.
Take short breaks frequently rather than long
infrequent ones.
Release the mouse at frequent intervals so
that you can avoid pressure on the wrists.


e-Accountability is about the privileges and
responsibilities of all users along with the
ethical behaviors and expectations that come
with it. e-Accountability also includes
credibility and integrity of online content and
critical thinking about what is true/false.
Fair Use is when the copyrighted material is
used for a limited and “transformative”
purpose such as to comment upon, criticize
or parody.





Material used must be directly relevant to the
topic.
Clearly cite, credit and acknowledge the author,
source and possible copyrights.
Do not use it for the purpose of commercial gain.
Don’t excessively use the author’s material until
it affects the market value of the original work.
The quoted sources must be a legitimate
academics work from a recognized educational
institution.
Download