SlideShare a Scribd company logo
1 of 5
CYBER INTERACTION AND
   COLLABORATION

       Project 3.2
DEFINITION
IS an exchange and sharing of
 information using digital systems and the
Importance of having humility , loyalty
 and   respects for other            when
 communicating .
Various forms of
        digital
 communications and
 collaboration
        tools

E – mail
Social
Networking site
Online forum
Instant
Messaging (im)
INDENTIFYING MISUS OF TECHNOLOGY
Using Social Networking Sites For the Wrong
Reasons
Writing Blogs To Spread Hatred
Using Websites to phish for personal Data
Jeopardizing Safety When Texting While Driving
Using Mobile phone to Hack Schools system
Turning Electronic Gadgets on plane
Spreading Hoaxes Via Text Massages and Emails
UNETHICAL BEHAVIOR WHEN
  UTLIZING SHARED RESOURCOS
 Downloading pirated Software
Printing a lot of personal files
Storing files that have nothing to do with
work
Downloading unnecessary large files during
schools hour
Sending spam e-mails to the other users

More Related Content

What's hot

Online community-tools
Online community-toolsOnline community-tools
Online community-toolssnoonan
 
Technology Devices Use to Deliver Online Distance Learning
Technology Devices Use to Deliver Online Distance LearningTechnology Devices Use to Deliver Online Distance Learning
Technology Devices Use to Deliver Online Distance LearningGreta Board
 
Programma o sarai programmato
Programma o sarai programmatoProgramma o sarai programmato
Programma o sarai programmatoStefano Penge
 
Computer Infections
Computer InfectionsComputer Infections
Computer Infectionserowell
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide showBeckusq
 
Internet surfing and security
Internet surfing and securityInternet surfing and security
Internet surfing and securitynamansaini11
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYChano Alfornon
 
Betten jutasi pp 04.26.12
Betten jutasi pp 04.26.12Betten jutasi pp 04.26.12
Betten jutasi pp 04.26.12colemama
 
Cyberspace & Digital Divide
Cyberspace & Digital DivideCyberspace & Digital Divide
Cyberspace & Digital DivideDeniz Cengiz
 
Studying is Life but ET is Lifer
Studying is Life but ET is LiferStudying is Life but ET is Lifer
Studying is Life but ET is Liferyvuuuhn
 
SocialSense: A System For Social Environment Awareness
SocialSense: A System For Social Environment AwarenessSocialSense: A System For Social Environment Awareness
SocialSense: A System For Social Environment AwarenessRobert Brewer
 
Responsible use presentation
Responsible use presentationResponsible use presentation
Responsible use presentationCarl Hooker
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networksTannistho Ghosh
 
Social Networking Technologies
Social Networking TechnologiesSocial Networking Technologies
Social Networking Technologiestasosrules
 

What's hot (20)

Online community-tools
Online community-toolsOnline community-tools
Online community-tools
 
Technology Devices Use to Deliver Online Distance Learning
Technology Devices Use to Deliver Online Distance LearningTechnology Devices Use to Deliver Online Distance Learning
Technology Devices Use to Deliver Online Distance Learning
 
Programma o sarai programmato
Programma o sarai programmatoProgramma o sarai programmato
Programma o sarai programmato
 
Computer Infections
Computer InfectionsComputer Infections
Computer Infections
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Internet surfing and security
Internet surfing and securityInternet surfing and security
Internet surfing and security
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
 
Virus
VirusVirus
Virus
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGY
 
Betten jutasi pp 04.26.12
Betten jutasi pp 04.26.12Betten jutasi pp 04.26.12
Betten jutasi pp 04.26.12
 
Cyberspace & Digital Divide
Cyberspace & Digital DivideCyberspace & Digital Divide
Cyberspace & Digital Divide
 
Threats of Computer System and its Prevention
Threats of Computer System and its PreventionThreats of Computer System and its Prevention
Threats of Computer System and its Prevention
 
Studying is Life but ET is Lifer
Studying is Life but ET is LiferStudying is Life but ET is Lifer
Studying is Life but ET is Lifer
 
SocialSense: A System For Social Environment Awareness
SocialSense: A System For Social Environment AwarenessSocialSense: A System For Social Environment Awareness
SocialSense: A System For Social Environment Awareness
 
Educational Technology Chapter 8
Educational Technology Chapter 8Educational Technology Chapter 8
Educational Technology Chapter 8
 
Responsible use presentation
Responsible use presentationResponsible use presentation
Responsible use presentation
 
cyber crime
 cyber crime cyber crime
cyber crime
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
Social Networking Technologies
Social Networking TechnologiesSocial Networking Technologies
Social Networking Technologies
 

Viewers also liked

Term paper on coco cola(imm)
Term paper on coco cola(imm)Term paper on coco cola(imm)
Term paper on coco cola(imm)mali_shashank
 
Francis and Rose Gell's Wedding
Francis and Rose Gell's WeddingFrancis and Rose Gell's Wedding
Francis and Rose Gell's WeddingAngel Domingo
 
0316 JIL Tangalan Sunday Service Worship and Praise Songs
0316 JIL Tangalan Sunday Service Worship and Praise Songs0316 JIL Tangalan Sunday Service Worship and Praise Songs
0316 JIL Tangalan Sunday Service Worship and Praise SongsAngel Domingo
 
0330 Sunday Service Praise and Worship Songs
0330 Sunday Service Praise and Worship Songs0330 Sunday Service Praise and Worship Songs
0330 Sunday Service Praise and Worship SongsAngel Domingo
 
0322 Sunday Service Praise and Worship Songs
0322 Sunday Service Praise and Worship Songs0322 Sunday Service Praise and Worship Songs
0322 Sunday Service Praise and Worship SongsAngel Domingo
 
Describing a Place Activity
Describing a Place ActivityDescribing a Place Activity
Describing a Place ActivityAngel Domingo
 
Feature Writing Basics
Feature Writing BasicsFeature Writing Basics
Feature Writing BasicsAngel Domingo
 
Educational Planning and Management - 2014 Trends
Educational Planning and Management - 2014 TrendsEducational Planning and Management - 2014 Trends
Educational Planning and Management - 2014 TrendsAngel Domingo
 
Salad gà chiên
Salad gà chiênSalad gà chiên
Salad gà chiênXuan Nguyen
 
Cơm chiên thập cẩm
Cơm chiên thập cẩmCơm chiên thập cẩm
Cơm chiên thập cẩmXuan Nguyen
 
Baigiangtinhoc10bai16soanthaovanban
Baigiangtinhoc10bai16soanthaovanbanBaigiangtinhoc10bai16soanthaovanban
Baigiangtinhoc10bai16soanthaovanbanXuan Nguyen
 
безопастност и защита на Iphone мобилни комуникации
безопастност и защита на Iphone мобилни комуникациибезопастност и защита на Iphone мобилни комуникации
безопастност и защита на Iphone мобилни комуникацииvvangelov
 
безопастност и защита на Iphone мобилни комуникации
безопастност и защита на Iphone мобилни комуникациибезопастност и защита на Iphone мобилни комуникации
безопастност и защита на Iphone мобилни комуникацииvvangelov
 

Viewers also liked (17)

Sach
SachSach
Sach
 
Ndtnccndh-docx
Ndtnccndh-docxNdtnccndh-docx
Ndtnccndh-docx
 
Term paper on coco cola(imm)
Term paper on coco cola(imm)Term paper on coco cola(imm)
Term paper on coco cola(imm)
 
Imagine
ImagineImagine
Imagine
 
Francis and Rose Gell's Wedding
Francis and Rose Gell's WeddingFrancis and Rose Gell's Wedding
Francis and Rose Gell's Wedding
 
Ndtnccndhpdf
NdtnccndhpdfNdtnccndhpdf
Ndtnccndhpdf
 
0316 JIL Tangalan Sunday Service Worship and Praise Songs
0316 JIL Tangalan Sunday Service Worship and Praise Songs0316 JIL Tangalan Sunday Service Worship and Praise Songs
0316 JIL Tangalan Sunday Service Worship and Praise Songs
 
0330 Sunday Service Praise and Worship Songs
0330 Sunday Service Praise and Worship Songs0330 Sunday Service Praise and Worship Songs
0330 Sunday Service Praise and Worship Songs
 
0322 Sunday Service Praise and Worship Songs
0322 Sunday Service Praise and Worship Songs0322 Sunday Service Praise and Worship Songs
0322 Sunday Service Praise and Worship Songs
 
Describing a Place Activity
Describing a Place ActivityDescribing a Place Activity
Describing a Place Activity
 
Feature Writing Basics
Feature Writing BasicsFeature Writing Basics
Feature Writing Basics
 
Educational Planning and Management - 2014 Trends
Educational Planning and Management - 2014 TrendsEducational Planning and Management - 2014 Trends
Educational Planning and Management - 2014 Trends
 
Salad gà chiên
Salad gà chiênSalad gà chiên
Salad gà chiên
 
Cơm chiên thập cẩm
Cơm chiên thập cẩmCơm chiên thập cẩm
Cơm chiên thập cẩm
 
Baigiangtinhoc10bai16soanthaovanban
Baigiangtinhoc10bai16soanthaovanbanBaigiangtinhoc10bai16soanthaovanban
Baigiangtinhoc10bai16soanthaovanban
 
безопастност и защита на Iphone мобилни комуникации
безопастност и защита на Iphone мобилни комуникациибезопастност и защита на Iphone мобилни комуникации
безопастност и защита на Iphone мобилни комуникации
 
безопастност и защита на Iphone мобилни комуникации
безопастност и защита на Iphone мобилни комуникациибезопастност и защита на Iphone мобилни комуникации
безопастност и защита на Iphone мобилни комуникации
 

Similar to Mohamed rashid salim

Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and historygururaj lulkarni
 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...ijccsa
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)ijccsa
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfAadil83
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptxsakshiyad2611
 
Digital literacy 2
Digital literacy 2Digital literacy 2
Digital literacy 2mj_jamal
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internetAlexander Decker
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorismawderdlfy
 

Similar to Mohamed rashid salim (20)

Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdf
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cybercrime
Cybercrime Cybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
Digital literacy 2
Digital literacy 2Digital literacy 2
Digital literacy 2
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

Mohamed rashid salim

  • 1. CYBER INTERACTION AND COLLABORATION Project 3.2
  • 2. DEFINITION IS an exchange and sharing of information using digital systems and the Importance of having humility , loyalty and respects for other when communicating .
  • 3. Various forms of digital communications and collaboration tools E – mail Social Networking site Online forum Instant Messaging (im)
  • 4. INDENTIFYING MISUS OF TECHNOLOGY Using Social Networking Sites For the Wrong Reasons Writing Blogs To Spread Hatred Using Websites to phish for personal Data Jeopardizing Safety When Texting While Driving Using Mobile phone to Hack Schools system Turning Electronic Gadgets on plane Spreading Hoaxes Via Text Massages and Emails
  • 5. UNETHICAL BEHAVIOR WHEN UTLIZING SHARED RESOURCOS  Downloading pirated Software Printing a lot of personal files Storing files that have nothing to do with work Downloading unnecessary large files during schools hour Sending spam e-mails to the other users