160 likes | 294 Vues
In today's digital landscape, technology can be a double-edged sword, allowing for both positive advancements and negative exploitation. Cyber crimes such as internet banking fraud, identity theft, and software piracy threaten personal security and integrity. These threats undermine trust as they are often perpetrated by individuals posing as friends online. Engaging in responsible technology use, such as avoiding cheating in exams and adhering to airline regulations, is crucial. Let’s work together to create a safer online community through awareness and education.
E N D
POSITIVE VALUESIN USINGTECHNOLOGY GROUP : MOMENT SA’AD BIN SABAR FB 11072 MOHD NORSHAFIQ BIN MOHD PAUZI FB 11015
E-RULE • CYBER CRIME- that indicates all the crimes are committed through the use of technology to intimidate people, commit fraud or steal valuable information.
E- Safety • INTERNET DANGER • Can create the illusion that strangers are actually “friend”. • Can damage your reputation. • can come in various forms or attacks.
E- INTERACTION & COLLABORATION MISUSE OF TECHNOLOGY not using the technology at the right place, at the right time.
Using mobile phone cheating in exam DON’T!! DON’T!!
Credits…. • e-safety http://brumbyjuniors.primaryblogger.co.uk/files/2009/12/1280_staysafewallpaper.jpg. software piracy http://www.adsensetracker-gadget.com/wp-content/uploads/2012/03/a.gif http://3.bp.blogspot.com/-o1v8pH8zOtY/TdHUdFN7P5I/AAAAAAAAAMs/a7kcbrAwFYc/s1600/Pirated%2BSoftware.jpg http://www.softdistrict.com/wp-content/uploads/2010/02/software-piracy.gif • cyber crime http://tonyocruz.com/wp-content/uploads/2011/02/cybercrime.jpg http://www.bankislam.com.my/en/PublishingImages/FraudMAIL3.gif http://www.anzroyal.com/en/resources/2/2/22651a804e311b84b44db74d5a1f09ce/1/Hoax1.gif http://2.bp.blogspot.com/-4KV7Oheh5Uw/T0yDM5AqcLI/AAAAAAAAH2g/KuPlfS5GVQw/s1600/GTBank1.png http://www.nationwide.co.uk/NR/rdonlyres/C496A94A-AF8F-44EE-9F54-4345C56F3CC6/0/phishingimageeg5.gif
identity theft http://www.celframe.com/blogs/wp-content/uploads/Identity-Theft.png http://raisingceokids.com/wp-content/uploads/2011/04/Identity-Theft.gif http://1.bp.blogspot.com/_AKKXrIWFzfw/Sa9XyDTzaJI/AAAAAAAAAww/_4KWBWLXOL4/s400/identity-theft.jpg http://www.identitytheftresponse.com/creatives/categories.jpg http://thumbs.dreamstime.com/thumblarge_549/1287493373pX442I.jpg • internet predator http://ecx.images-amazon.com/images/I/513SUQJuSQL._SL500_AA300_.jpg http://www.pcsndreams.com/images/AceSpy/acespy_chats.jpg http://2.bp.blogspot.com/-m_oUOajImkk/T1NIG_LdxqI/AAAAAAAAAGg/nryiuqQuEpg/s1600/Cyberbullying.jpg
cheating exam using phone http://www.qiilans87.com/wp-content/fhoto/dont-cheat-on-exam.jpg http://mathnexus.wwu.edu/mathpix/cheating.jpg http://www.teenvogue.com/connect/blogs/soundoff/assets_c/2010/02/cheating-texting-thumb-500x333-31321.jpg • turn on elecronic gadgets on plane http://www.cbc.ca/gfx/images/news/topstories/2012/03/12/li-phone-plane-620.jpg http://tdwgeeks.files.wordpress.com/2012/03/geek-news-faa-reviews-in-flight-gadget-ban-of-the-day.jpg http://juztboy.files.wordpress.com/2011/12/mobil-plane.jpg http://www.ks95.com/wtf/images/feed/1332378445-gadgets.jpg