PORTFOLIO 1 CITIZEN MUHAMMAD TAUFIQ BIN TAHA FA 11025 E-access is about understanding th eprivilege of using electronic device as well as the right to having equal, secure and reliable access. Several ways of gaining access to Internet: ◦ ◦ ◦ ◦ Modem Public Internet services Open and paid Wi-Fi Wireless Internet Access Cellular phones and PDAs E-ACCESS Instilling the right attitude ◦ Appreciate the digital facilities ◦ Being responsible when sharing knowledge and information Equal opportunities for the disabled ◦ Motor impairments – use keyboard commands instead of the mouse ◦ Visual impairments – enlarge or enhance the area of focus ◦ Language and cognitive disabilities – design layouts in the most simple and straightforward way possible. ◦ Hearing impairments – include the visual forms in all auditory information E-ACCESS E-literate is the ability to use technology ang knowing when, when not and how to use it appropriately. Digital literacy applications ◦ Web 2.0 ◦ Instant messanging (IM) ◦ Online application E-LITERATE How to tell if a web page is secure ◦ If a website begins its URLs with “https”, which means that the website provides a secure connection for users. ◦ All secure websites have a “lock” icon somewhere on the screen. E-LITERATE E-rule defines as governing communication and technology use including respect for ownership and authorship. Cyber crimes ◦ ◦ ◦ ◦ ◦ Internet banking fraud Harassment Intellectual property infringement Intrusion Offenses E-RULE Reasons for cyber crime ◦ For pursuit of fame and to gain reputation for intelligence or brilliance ◦ Purely out of mischief ◦ For financial means ◦ To get revenge ◦ To signal some form of protest ◦ Purely to pursue criminal activities ◦ To steal identity ◦ To forge documents and messages E-RULE Effects of cyber crime ◦ ◦ ◦ ◦ Loss of revenue/profits Waste of valuable time Damaged reputations Reduced productivity Property infringements and legal rights ◦ Software piracy ◦ Freeware and shareware E-RULE E-safety is about measures and best practices for Netizens to guard their personal safety and the security of their networks. Internet dangers ◦ Internet threats can come in various forms ◦ The Internet can create the illusion that strangers are actually “friends” ◦ The Internet can damage your reputation E-SAFETY Common forms of digital security breach ◦ ◦ ◦ ◦ ◦ ◦ Identity theft Phishing emails Hacker and cracker Cyber stalking Cyber bullying Internet predator Shared resources & Dedicated resources ◦ Shared resources refer to devices or information on a computer that can be shared or accessed by many users ◦ Dedicated resources refer to a direct connection between a terminal and a service, network, or computer to the specific use of a particular user. E-SAFETY How to permanently erase the data from your old computer? ◦ Dismantle the computer or laptop ◦ Take out hard drive ◦ Physically destroy the hard drive E-SAFETY E-enterprise is about business conducted online using any Internet-based application. Types of Internet Transactions ◦ E-commerce/Online shopping ◦ Online banking The issues when conducting Transactions over the Internet ◦ Credit card fraud ◦ Impulse buying E-ENTERPRISE Tips to online shopping ◦ Shop around. There might be another great deal somewhere else ◦ Make sure you know the trader’s full details. Those details can be used as backup information if you need to lodge a fraud report. ◦ Look for websites that provide a secure payment ◦ Double-check whether the company has a privacy statement that tells you what they will do with your personal information ◦ Protect your privacy. Do not simply disclose your personal details E-ENTERPRISE Tips to ensure a secure online transaction ◦ Keep your passwords, personal identification number (PIN) and card numbers confidential ◦ Look for the lock icon ◦ Use a firewall ◦ Install security updates E-ENTERPRISE Tips to avoid credit card fraud ◦ Keep your credit cards safe ◦ Shred all documents with your credit card details on it ◦ Don’t sign blank credit card receipts ◦ Avoid giving out your credit card information ◦ Be cautious when using your credit card online ◦ Immediately report lost or stolen credit cards ◦ Never leave your credit card to someone else ◦ Check your credit card statement thoroughly before making payment E-ENTERPRISE Tips to avoid becoming an impulsive buyer ◦ Be aware of how much money you spend ◦ Think twice before making a purchase ◦ Set your objectives each time you go for online shopping E-ENTERPRISE 1 CITIZEN MODULE ◦ STUDENT QUICK REFERENCE REFERENCE