Thursday, June 13, 2013

:: TOPIC 7 > e-Care ::

DEFINITION

> e-Care is about physical and psychological well-being in a digital world.

Ergonomics

> ergonomics is applied in our life to fulfill these two goals :
1) health
2) productivity

> proper ergonomics design is necessary to prevent repetitive strain injuries, which can develop over time and can lead to long-term disability. Below are some examples of appliying ergonomics in our life (but not limited to) :

  • adjust the height of your work surface or table
  • use a well designed chair that support your back
  • position the keyboard appropriately
  • adjust your seat to allow your eyes in comfortable condition
Computer Usage that Affect Physical Health

- repetitive stress injuries
- back pain
- eye strain
- musculosketel disorders



:: TOPIC 8 > e-Accountability ::

DEFINITION

> e-Accountability is about the rivileges and responsibilities of all users along with the ethical behaviours and expectations that come with it. e-Accountability also includes credibility and integrity of online content and critical thinking about what is true/false.

> Accountability is a complex concept related to ethnics and governance. It is synonymous with terms such as responsibility, answerability, blameworthiness and liability, associated with the expectation of being rensponsible for every action we take. In order to have governance, there must be rules and policies of acceptable and non-acceptable action or activity, called Acceptable User Policy (AUP) in organizations and institutions.

Respect for the Intellectual Property Creators and their Rights

> the internet allows any internet users to become digital cintent creators and publisher. It is easy to locate and download materials from the internet, however you must know what is appropriate and inappropriate or legal and illegal in doing so.

> the following are some generals terms associated with respect for the intellectual property creators and their rights :

1) intellectual property (IP)
~ IP is the right to own creations or inventions that you create. In simple words the moment you create, invent or innovate something new to others, you already own an IP.

2) copyright
~ A copyright is exclusive rights granted to the creator of an original work that acts as a form of protection provided by the law. The duration of protection of protection of a copyright is the lifetime of the author plus 70 years.

3) fair use
~ Fair use is when the copyrighted material is used for a limited and "transformative" purpose such as to comment upon, critize or parody. Such uses can be done without permission from the copyright owner.

:: TOPIC 6 > e-Enterprise ::

DEFINITION

> e-Enterprise is about business conducted online using any Internet-based application. It is designed to educate on appropriate online buying behaviours, channels as well as tactics for making a secure online transaction.

Types of Internet Transactions

1) E-Commerce/online Shopping
> e-Commerce (electronic commerce) or online shopping means conducting business on the internet and involves selling and buyingof goods or services online.

> Unfortunately, online shopping can sometimes cause you hassle in the form of delayed delivery of goods, the quality of goods that do not match the description on the website, or simply the non-arrival of the goods !

2) Online Banking
> online banking allows you to perform banking activities via the internet, anywhere anytime. Despite the advantages of online banking, customers also face risk such as identity theft and credit card fraud.

[ STAY SMART WHEN ONLINE =) ]

Wednesday, June 12, 2013

:: TOPIC 5 > e-Interaction & Collaboration ::

DEFINITION

e-Interaction & Collaboration is an exchange and sharing of information using digital systems and the importance of having humility, loyalty, and respect for others when communicating.

VARIOUS FORMS OF DIGITALM TOOLS
- email
- social networking site
- blog
- online forum
- instant messaging

Communicating Appropriately when Online

Some suggestios on how you should communicate when online :
> use the right language
> treat people the same as if in person
> if you have nothing nice to say, then don't say it
> it's OK to disagree, but give your justification
. dn't encourage a fight when you spot one

Identifying Misuse of Technology

  • utlising social networking site for wrong resons
  • writing blogs to spread hatred
  • using mobile phone to cheat on exam
  • turning on electronic gadgets on plane

Tuesday, June 11, 2013

:: TOPIC 4 > e-Safety ::

DEFINITION

> e-Safety is about measures and best practices for Netizens to guard their personal safety and the security of their networks

INTERNETS DANGER
  • internet threats can come in various forms or attacks
  • the internet can create the illusion that strangers are actually "friends"
  • the internet can damage your reputation
Common Forms of Digital Security Breach

- identity theft
- phishing emails
- hackers and cracker
- cyber stalking
- cyber bullying
- internet predators





:: TOPIC 3 > e-Rule ::

DEFINITION

> e-Rule defines as governing communication and technology use including respect fo ownership and authorship.

Understanding CYBER CRIME

> Cyber crime is also known as computer crime, digital crime, e-crime and electronic crime, all indicate that the crimes are commited through  the use of technology to indimate people, commit fraud or steal valuable information

9 TYPES Cyber Crime

- thefts of telecmmunication services
- communication in furtherance of criminal conspirances
- telecommunication piracy
- offensive materials
- electronic money laundrying and tax evasion
- vandalism and terrorism
- sales and investment fund
- illegal interception of telecommunications
- electronic funds transfer freud





EFFECTS of CYBER CRIMES

> loss of revenue/profits
> waste of valuable time
> damaged reputations
> reduced productivity



:: TOPIC 2 > e-Literate ::

DEFINITION

> e-Literate is the ability to use technology anda knowing when, when not and how to use it appropriately. It highlights how online behaviour can have major consequences offline.

DIGITAL LITERACY APPLICATION
 
1) Instant messaging (IM)
2) Online application 
    - e-Business
    - e-Government
    - e-Learning
    - Job search portals
    - Social networking sites
    - Social video sites

How to Tell if a Web Page is Secure

Two general indications of a secure web page :
  • If a website begins its URLs with " https", it means that the website provides a secure connection for users.
  • All secure websites have a "lock" icon somewhere on the screen. This is to guarantee the transactions and data provided are safe and secure.

:: TOPIC 1 > e-Access ::

DEFINITION

> e-Access is about understanding the privilege of using electronic information as well as the right to having equal, secure and reliable access.

There are several different ways of gaining access to the internet. Eacg has its own strenghts and weakness. The following options are available for you to gain access to the internet :

  • Modem
  • Public internet services such as collages and universities, commercial places (eg : airports)
  • Open and Paid Wi-Fi Wireless internet access
  • Cellular phones and PDAs
WHY information ACCESS is a global issue?

The reason was due to the great imbalance of internet access throughout the world thus creating a digital gap.

What are the reasons that contribute towards this digital gap?
  • Shortage of ICT infrastructures
  • Lack of skills and capabilities in institutions
  • Financial restriction
  • Poor participation in developmental programs
Istilling the Right Attitude
  
There are many ways to instill the right attitude, but here we focus on two :

1) Appreciating the digital facilities
2) Being rensponsible when sharing knowledge and information

:: ABOUT 1CITIZEN ::

Do you use digital systems and tools ethically when exchanging and sharing information?
Do you have a proper Netiquette attitude when using technology?
Are you able to distinguish appropriate from inappropriate use of technology?
Are you protected from spyware, hackers, phishing, identity, theft, and stalking when you are online?

You may be ICT-savvy but you can claim that you have all it takes to become a skilled and informed driver on the information superhighway?
To find out, take our globally-benchmarked IC CITIZEN Certification, a world-class certification program in Netiquette to confirm and verify your understanding of ground rules for acceptable use of technology in today's digital world.

1CITIZEN is a special training program to foster national unity via appropriate use of technology.
It inspires Netizen to become critical thinkers that understand ethical consequences of online behaviour.

PROGRAM OBJEVTIVES

* To develop a sense of 'keNegaraan', collaboration, rensposibility and ownership to the communities during thei online digital experience
* To infuse positive messages among Youth
* To encourage youth volunteerism and activism
* To integrate a Malaysia-owned Globally-Bencmarked and Standards for Digital Literacy Certification

The program certifies knowledge and understanding of the following values :
1) e-Access
2) e-Literate
3) e-Rule
4) e-Safety
5) e-Interaction & Collaboration
6) e-Enterprise
7) e-Care
8) e-Accountability