Important Announcement
PubHTML5 Scheduled Server Maintenance on (GMT) Sunday, June 26th, 2:00 am - 8:00 am.
PubHTML5 site will be inoperative during the times indicated!

Home Explore Digital Citizenship (By Hatta Hani)

Digital Citizenship (By Hatta Hani)

Published by Hatta Hani, 2021-07-01 07:20:22

Description: Digital Citizenship (By Hatta Hani)

Keywords: Digital Citizenship

Search

Read the Text Version

Learning Objectives • To practice ethical use of digital systems and tools for exchanging and sharing information • To demonstrate how digital systems and tools may be used appropriately to foster unity and understanding among various communities • To distinguish between good and bad causes of various forms of digital communication and collaboration • To exhibit ethical behaviours when exchanging and sharing information over networked systems

What is… • Digital Interaction • An online communication between one person to another via digital technology such as email, forum, blog • Digital Collaboration • Working together and sharing ideas and info together using online technology. • Using technologies to enable efficient, valuable connections between people and information • In a global economy that is increasingly service-based, information is a vital asset, and collaboration is the engine that generates value from this asset. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

Interaction & Collaboration OLD MEDIA NEW MEDIA Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

Guided Lesson 1: Using Various Forms Of Digital Communication & Collaboration • Case #1: “Indonesian Facebook mum wins hospital defamation case” – Yahoo News, 29 Dec 2009 • An Indonesian court on Tuesday threw out a hospital's criminal defamation case against a mother-of-two who wrote emails to her friends complaining about a wrong diagnosis. • Arrested, the mother spent three weeks in custody while she was still breastfeeding her second child. • Public anger at her detention, symbolized by a Facebook support group with more than 100,000 members, forced authorities to release her and bring her before the courts. • A group of bloggers started a \"Help Prita\" movement which raised more than 50,000 dollars in public donations to help her pay the fine. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

Guided Lesson 1: Using Various Forms Of Digital Communication & Collaboration Moral of the Story: • How you can use the social network for good cause • Quick and effective use of technology to raise fund Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

The Prita Story Video: e_Intr&Colla_V001

Guided Lesson 2: Ethical/Unethical Behaviors When Exchanging & Sharing Information Over Networked Systems • What is shared resources? • In computing, a shared resource is a device or piece of information on a computer that can be remotely accessed from another computer(s) or that can be shared/accessed by many people E.g. shared file access, (folder sharing), shared printer access (printer sharing), shared scanner access • The implication when violating the use of shared resources: • Breach of security • Congested/overwhelm the bandwidth Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

Guided Lesson 3: Misuses Of Technology Which Do Not Promote Sensitivity, Harmony & Safety • Case #2: Bomb posting: Student charged – Daily Express, Jan 16, 2010 • Police charged a student accused of posting a comment on his Facebook threatening to petrol bomb a Hindu temple. • The student faces up to a year in prison if convicted for posting an \"offensive comment\" on Jan. 10. Ten churches have been fire-bombed or vandalized in Malaysia after the High Court decided on December 31 to lift a government ban on non-Muslims using \"Allah\" as a translation for \"God\". • Posted on Facebook that he was willing to attack the Batu Caves temple for money. Additionally, he posted another comment on Facebook claiming that he had manufactured the explosives used in the series of church fire-bombings. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

Guided Lesson 3: Misuses Of Technology Which Do Not Promote Sensitivity, Harmony & Safety Other examples: • Spreading hoaxes via mobile phone’s SMS • People getting warnings and alerts on “expected” bombings and sending them forward to their friends and relatives without verification are spreading fear and panic. [safety] • Rally that the government has announced as illegal. [Sensitivity & Harmony] • Purposely ignore the instruction to switch off mobile phone on flight. [safety] • Using social networking site to start hatred groups. [harmony]

Guided Lesson 4: Ethical Challenges When Interacting & Collaborating Over The Internet Examples: • Accidentally forward a friend an e-mail containing dangerous viruses that could damage his computer operating system. • Write ‘unclear’ messages that may lead to misinterpretation • “bebai!” Ask yourself: What should you do if you counter one of these scenarios?

Guided Lesson 5: Disrespectful & Hateful Content While Online Examples: • Writes dissatisfaction about someone and post the comments on social networking site (ie. Facebook, Twitter) or blogs • Post comments that ‘disturb’ fellow members of the forum • Write a message using racist language to describe another person in a forum group. • Post flaming message in the forum Ask yourself: What should you do if you counter one of these scenarios?

Guided Lesson 6: Inappropriate Use Of Technology…cont’d Video: e_Intr&Colla_V002

Guided Lesson 6: Inappropriate Use Of Technology…cont’d Other examples: • Mobile phone interruptions at religious places (mosque, temple, church), hospitals, classrooms while attending classes/lectures, cinemas, libraries, etc. [respect others] • Snap photos using mobile phone camera – to cheat during exam or upload the image onto social networking sites, etc. [privacy invasion] • Chatting via instant messaging or texting while in class. [respect others] Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

Guided Lesson 6: Inappropriate Use Of Technology…cont’d

Lesson Learned • An individual’s use of mobile phones, social networking sites (to mention a few) in communicating and collaborating may affect others. • If the technology tools are properly used/utilized, it can benefits everyone. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI



Learning Scope • Know how to determine a secure websites for your online transaction activity • Understand what credit card fraud is and know the proper ways to protect my self for credit card fraud. • Know how to keep all my transaction detail safe from identity theft. • Know what is impulsive buying and its impact on my buying behaviour. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

Evolution of trading • Barter system – Cash Money • Cash – Credit Cards / Bank Cards • Cash on delivery – Online shopping / transaction Video : e-Enterprise_vo1 Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

Test your knowledge.. 1. An online store offers an 60% discount for leather products. How do you verify the reliability of the retail website for purchase and payment? Look at the website address whether it starts with ‘https’. 2. You want to pay your dinner bill at a restaurant using your newly acquired credit card. What are the two best ways to protect yourself from credit card fraud? (Choose two) Hand over your credit card directly to the cashier Confirm the bill tally with the charge slip before you sign Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

3. What is the best way to protect yourself from identity theft? Use names that do not indicate family relationship in your mobile contact list 4. What is a consequence of impulse buying? Tendency to purchase more than I need Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

Top Ten Internet Frauds… Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI Resources : http://www.fraud.org/internet/2001stats.htm

Credit Cards Fraud • 2005 - MasterCard and Visa generated $190.6 billion in Canada alone - 2.8 millions was lost due to credit card fraud. Video : e-Enterprise_vo2 common frauds: • Theft of the card: A person took others credit cards and uses it without permission of the owner. • Counterfeiting : A person who took others credit cards details and uses it for his/her own interest. A credit cards detail - especially for online transaction. • Card-not-present fraud: Details may be obtained from card theft, skimming or going through someone's receipts, or copying down details during a transaction. Goods or services are fraudulently obtained by buying over the phone, internet, from mail order companies, or by fax. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

How to Avoid Credit Card Fraud From Happening to You?... • Keep your credit cards safe. – safe place, do not expose to unknown individual.. • Shred anything with your credit card number on it - Rather than toss your credit card billing statements directly into the trash, shred them to keep dumpster divers from getting their hands on your credit card number. • Don't sign blank credit card receipts.- To avoid credit card fraud, always verify the amount on your credit card receipt before signing it. • Avoid giving out your credit card information - Only give out your credit card number or other sensitive information on calls you initiate to customer service • Be safe with your credit card online.- Don't click on email links from anyone pretending to be your bank, credit card company, or other business who uses your personal information, even if the email looks legitimate. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

e-Banking in brief… • Banks and financial service companies are offering wireless • account access called as e-banking. - extension of internet applications, delivery to highly portable cell phones & personal digital assistants. • Improve customer retention rates, especially technology oriented customer. Resources : www.mediapost.com Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

Online Banking is safe…Are you sure? • The over the shoulder looking. - account access data was obtained by the criminal just by observing customers at a public Internet access point. • Phishing - scheme involves using fake emails and/or fake websites. The word \"phishing\" stems from combining the words \"password\" and \"fishing\". • The \"Trojan horse\" scheme - embedding a computer virus type software program onto the customer's PC. Trojans often tie themselves into the keyboard driver and record keystrokes. Video : e-Enterprise_vo3 Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

Identity Theft… • Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. • 86,200 identity theft incidents last year, up from 31,000 the prior year • The cost to consumers averaged $1,200 per crime • Some incidences required victims to spend up to three years communicating with lenders and credit bureaus to straighten out records. Video : e-Enterprise_vo4 Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

You are here Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

How best to manage your password?... •Always use strong passwords. •Is at least seven characters long. •Does not contain your user name, real name, or company name. •Does not contain a complete dictionary word. •Is significantly different from previous passwords. Passwords that increment (Password1, Password2, Password3 ...) are not strong. •If passwords must be written down on a piece of paper, store the paper in a secure place and destroy it when it is no longer needed. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

•Never share passwords with anyone. •Use different passwords for all user accounts. •Change passwords immediately if they may have been compromised. •Be careful about where passwords are saved on computers. Some dialog boxes, such as those for remote access and other telephone connections, present an option to save or remember a password. Selecting this option poses a potential security threat. Video : e-Enterprise_vo5 Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

Impulse buying?.. • Impulse buying happens when you get caught up in the hype of a situation and you buy something without thinking much about it. Impulse items may be new products, samples or well-established products at unexpected low prices. Video : e-Enterprise_vo6 Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

• Situations that play on shoppers impulsiveness include: items on sale tables that advertise 'huge bargains' or '10% off all items' or the enticement of announcements that something is half price for the next 5 minutes. Impulse buying makes you spend money on items you may not really need or want. To avoid impulse buying you need to ask yourself if you really need the item or just want it. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

Online purchase tips… • Have a budget made up and don't spend over this amount. • Have a list of items that you intend to buy and stick to it. • Be wary of enticements like red-hot specials where an item is advertised in the store as reduced for the next 5 minutes or telemarketers saying that if you buy a product or service during this call they will include something else for free. • Compare prices between sellers. You may find that someone is selling an item at 10% off and another seller is selling the same thing at a lower price and they're not having a sale. • Compare items for price and quality. • Examine the goods carefully. Are they exactly what you want. Sometimes packaging can mislead you about the actual quantity supplied. • Keep all receipts. • Check out the warranty. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

• Stay Smart When Online!



About This Module • In this module, we will take a look at some of the most common health and safety issues and the steps that can be taken to reduce the risks. You will also be introduced to several terms such as ‘computer & Internet addictions’, 'ergonomics' as well as the environmental impact of using computers. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

Learning Objectives The objectives of this module are: • to identify the proper ergonomics for computer related work • to identify health hazards related to computer usage • to identify social problems associated with Internet and computing addictions • to identify ways to recycle and properly dispose of computer equipment Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

Learning Outcomes By the end of the module, you should be able to: • Understand what ergonomics is • Have ideas on how to set an ergonomics environment • Know what common illness and discomfort associated with bad computing practice • Develop a healthy digital lifestyle • Recognize ways to dispose computer accordingly Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

What is e-Care? • In 1Citizen Program, the Definition of e-Care is Physical and psychological well-being in a digital technology world. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

ergonomics Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

What and why is ergonomics important? • Ergonomics a science that helps people to create and design machines or tools which are comfortable and easy to use. In other words, instead of making computer users adapt to the way their computer is designed, it actually tries to design a way to make the computer fit for the user. • This includes creating furniture and peripherals such as computer chairs, mouse and keyboards which are comfortable and provides less strain for people. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

Samples of Ergonomic Furniture & peripherals Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

Healthy Workstations Video: e_Care_V001 Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

How to apply ergonomics in our life? Work surface height Adjustable computer table • Adjust the height of your work surface or table. Make sure that your elbow is approximately a finger length above the surface so that you do not have to bend down to much or strain yourself too high up to reach it. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

How to apply ergonomics in our life? Chair Adjustable chair • Choose ‘height & tilt’ adjustable chair for Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI you to use keyboard comfortably. • Use a footrest to avoid your leg muscles from strained; if you feet do not reach the floor. • Do not slump or slouch in you chair. • Adjust the backrest to rest your lower back and avoid getting extra stress. • Choose a chair with adjustable armrests to avoid strain on your neck and shoulders.

How to apply ergonomics in our life? Posture during keyboarding Body posture • Position yourself in a relaxed and Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI natural manner to allow movement freedom. Do not sit in a rigid and stiff manner. • Change your posture frequently. Avoid awkward postures that can strain the joints especially the wrists. • Make sure to take short breaks frequently rather than infrequent long ones.

How to apply ergonomics in our life? Other things that you can do: • Keyboard placement • Screen placement • Desktop layout • Lighting for Visual Display Units • Glare and reflection • Use ergonomics mouse • VDU radiation Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

How does computer usages affect your physical health? Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

How does computer usages affect your physical health? Repetitive Stress Injuries RSI • Repetitive Stress Injuries or RSI can occur due to prolonged use of the hand. The symptoms are such as pain, burning, swelling, tingling, numbness, loss of dexterity and weakness. Carpal Tunnel Syndrome • This is due to repetitive hand motion which involves continuously typing on a keyboard and using a mouse. The symptoms for this disorder is numbness in the hands and pain in the wrists. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

How does computer usages affect your physical health? Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI

How does computer usages affect your physical health? Back Pain Back Pain • When you sit in a computer chair, you are putting yourself in a static posture. This allows pressure to increasingly stress your back, neck, shoulders, arms and legs. • People naturally tend to slouch down in a chair when they have been sitting in it for too long, and this can overstretch the spinal ligaments. Over time you may be damaging your spinal structures and exposing back pain. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI


Like this book? You can publish your book online for free in a few minutes!
Create your own flipbook