1 citizen portfolio Presented by: Lim Xin Hui – SA11040 Hew Xin Lin – SB11019 Trainer: Encik...

34
1 citizen portfolio Presented by: • Lim Xin Hui – SA11040 • Hew Xin Lin – SB11019 Trainer: Encik Mohd Tarmizi Session: 28-29 april 2012

Transcript of 1 citizen portfolio Presented by: Lim Xin Hui – SA11040 Hew Xin Lin – SB11019 Trainer: Encik...

1 citizen portfolio

Presented by:• Lim Xin Hui – SA11040• Hew Xin Lin – SB11019

Trainer: Encik Mohd TarmiziSession: 28-29 april 2012

-Physical and Psychological Well-Being in a Digital World

-applying ergonomics in our daily life

e-Care

Examples: Table

• Work Surface Height• Must be adjustable

Example2: Chair

• With adjustable height• well-designed chair that supports your back as

well as allows you to work with ease.

Example3: Using mouse• purchase a well-designed mouse that can help

avoid pressure on your forearms and wrists. • Release the mouse at frequent intervals so

that you can avoid pressure on the wrists

Example4: Desktop layout

• Make sure that all your documents and controls are easily reachable by both hands so that there is no need to twist and turn any parts of your body unnecessarily.

Example5: Document Holder

• reduce the movement of your head in djusting your focus from the screen to your documents.

e-Literate

What is e-Literate??

The e-Literate module provides an introduction to 21st century global digital technology. It explains the capabilities to use digital technology and knowing when, when not and how to use it. It stresses on the ethics, process of learning about technology and the uses of technology.

The Digital Literacy

Tools

Mobile Phone

Smart Object

Satellite TV

Game Console

Wireless Internet

How to Tell if a Web Page is Secure?

• Most websites begin with the letters “http”, it is impossible to tell if the websites are secure or not.

• However, if a website begins its URLs with “https”, it means that the website provides a secure connection for users

• Example:

“Lock” icon

• All secure websites have a “lock” icon somewhere on the screen. This is to guarantee the transactions and data provided are safe and secure.

• Example:

e-Safety

What is e-Safety??

Description:Internet safety is more on how to protect your important information from internet threat.

Cyber Bullying

Description:

"Cyberbullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones.

Examples of Cyber-Bullying1.A fake profile is created on a social networking site and the fake profile is used to harass and abuse other students.

2.Someone posts some embarrassing, private or doctored photos or videos to a social networking site. Someone sends abusive or threatening text messages or emails to a victim.

3. Online polls are set up to judge and intimidate other students based on characteristics such as physical appearance or intelligence.

Cyberstalking

Description:

• Cyber stalking is the use of the Internet or any electronic device to stalk other people. Cyber stalkers find information on their victims from various sources such as blogs, search services, and social networking websites.

What To Do If You Are Being Cyberstalked???

Save all communications for evidence. Do not edit or alter them in any way. Also, keep a record of your contacts with Internet system administrators or law enforcement officials.

You may want to consider blocking or filtering messages from the harasser. Many email programs such as Eudora and Microsoft Outlook have a filter feature, and software can be easily obtained that will automatically delete emails from a particular email address or contain offensive words. Chat room contact can be blocked as well.

Contact your local police department and inform them of the situation in as much detail as possible. In appropriate cases, they may refer the matter to state or federal authorities.

Hacker and Cracker

Hacker• Hacker is a person who enjoys learning

programming languages and computer systems and can be considered an expert on the subjects.

• Hackers usually are programmers who try to find holes in the ground systems to enhance their knowledge.

• Sometimes hackers may share the information they find with others, but have no intention to interfere with the system or to get others’ personal information.

Cracker• Cracker is a person who is illegally accessed to

someone else’s system, with the intention to distribute malicious software.

• A cracker can disturb the system by damaging key data.

Protection from Internet Threats

1. Your Screen If you walk away from your computer, close the

lid or engage the screensaver.Be sure you have it password protected to get

back to the main screen.2. Be responsible and be aware You are responsible for what happens on your

computer and with your account,Know the security policy (AUP)

3. Password choice Mix upper and lower case, numbers and misspell the words

you choose. Do not write it down.

Do not share your password with anyone.

Do not rely on one password for everything in case you have a breach.

4. Surf wisely Surf as if others were observing you.

Be cautious about providing personal information to websites.

5. It is all on the record Every keystroke of every email, every IM,

everything said or done on the web or in email is recorded somewhere.

6. Practise safe access Be careful opening any email attachments. This

is especially true if you do not know the sender, but even if you do, it is possible for malware to fake email address or even steal them from computer and send them out without the owner knowing.

7. Protect your identity Do not reply or click on links in any message requesting

personal or financial information. Monitor your finances. At least review your credit

quarterly. Don’t download programs from companies of which you

are not familiar. Secure your computer. Block popups.

8. Backup data Backup to disks, external hard drives, flash drives

or the server.Create a schedule.