SlideShare a Scribd company logo
1 of 5
CYBER INTERACTION AND
   COLLABORATION

       Project 3.2
DEFINITION

IS an exchange and sharing of information
using digital systems and the importance of
  having humility, ioyalty and erspects for
        other when cpmmunicating
various forms of    Digital
commun ications and
colladoratoing
toois

E-mail
Social Networking
Online forum
Instant messaging{Im}
UNETHCAL BEHAVOR WHEN
UTLUZLNG SHARED RESOURES



  Downloading pirated software
 Printing a lot of personal files
 Downloading unnecessary large files during schools houers
 Sending spam e-mails to the other users
INDENTIFYING MISUSE OF
         TECHNOLOGY
USING Social networking sites for the wrong
reasons
 Writing blogs to spread hatred
 Using websites to phish to personal data
Jeopardizing safety when texting while driving
Using mobile phone to cheat of exams
 Using internal computer to hack schools
system
Turning electronic gadget on plane
Spreading hoax via text messages and emails

More Related Content

What's hot

Delcine of communication Due to technology
Delcine of communication Due to technologyDelcine of communication Due to technology
Delcine of communication Due to technologyshahzaib suleman
 
Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)MMHoward
 
Online community-tools
Online community-toolsOnline community-tools
Online community-toolssnoonan
 
I AM therefore IM
I AM therefore IMI AM therefore IM
I AM therefore IMwumoye
 
Programma o sarai programmato
Programma o sarai programmatoProgramma o sarai programmato
Programma o sarai programmatoStefano Penge
 
E-content - R.D.Sivakumar
E-content - R.D.SivakumarE-content - R.D.Sivakumar
E-content - R.D.SivakumarSivakumar R D .
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYChano Alfornon
 
Betten jutasi pp 04.26.12
Betten jutasi pp 04.26.12Betten jutasi pp 04.26.12
Betten jutasi pp 04.26.12colemama
 
Electronic Communication
Electronic CommunicationElectronic Communication
Electronic Communicationlockyerj
 
E-content - R.D.sivakumar
E-content - R.D.sivakumarE-content - R.D.sivakumar
E-content - R.D.sivakumarSivakumar R D .
 
Using Multimedia Elements in Content - R.D.Sivakumar
Using Multimedia Elements in Content - R.D.SivakumarUsing Multimedia Elements in Content - R.D.Sivakumar
Using Multimedia Elements in Content - R.D.SivakumarSivakumar R D .
 
New teacher orientation_2013
New teacher orientation_2013New teacher orientation_2013
New teacher orientation_2013dalehopkins
 
Diapositivas de diseño
Diapositivas de diseñoDiapositivas de diseño
Diapositivas de diseñoJoha Cabrera
 

What's hot (18)

ComTech
ComTechComTech
ComTech
 
Delcine of communication Due to technology
Delcine of communication Due to technologyDelcine of communication Due to technology
Delcine of communication Due to technology
 
Parent ed is_mh
Parent ed is_mhParent ed is_mh
Parent ed is_mh
 
Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)
 
Online community-tools
Online community-toolsOnline community-tools
Online community-tools
 
I AM therefore IM
I AM therefore IMI AM therefore IM
I AM therefore IM
 
Programma o sarai programmato
Programma o sarai programmatoProgramma o sarai programmato
Programma o sarai programmato
 
E-content - R.D.Sivakumar
E-content - R.D.SivakumarE-content - R.D.Sivakumar
E-content - R.D.Sivakumar
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGY
 
Betten jutasi pp 04.26.12
Betten jutasi pp 04.26.12Betten jutasi pp 04.26.12
Betten jutasi pp 04.26.12
 
Computers in Language Teaching
Computers in Language TeachingComputers in Language Teaching
Computers in Language Teaching
 
Electronic Communication
Electronic CommunicationElectronic Communication
Electronic Communication
 
E-content - R.D.sivakumar
E-content - R.D.sivakumarE-content - R.D.sivakumar
E-content - R.D.sivakumar
 
Electronic communication
Electronic communicationElectronic communication
Electronic communication
 
Using Multimedia Elements in Content - R.D.Sivakumar
Using Multimedia Elements in Content - R.D.SivakumarUsing Multimedia Elements in Content - R.D.Sivakumar
Using Multimedia Elements in Content - R.D.Sivakumar
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
 
New teacher orientation_2013
New teacher orientation_2013New teacher orientation_2013
New teacher orientation_2013
 
Diapositivas de diseño
Diapositivas de diseñoDiapositivas de diseño
Diapositivas de diseño
 

Viewers also liked

Viễn thông viettel triển khai tính năng mới cho đồng bào dân tộc
Viễn thông viettel triển khai tính năng mới cho đồng bào dân tộcViễn thông viettel triển khai tính năng mới cho đồng bào dân tộc
Viễn thông viettel triển khai tính năng mới cho đồng bào dân tộchuytmdt
 
La Programación
La ProgramaciónLa Programación
La ProgramaciónPierGian
 
LSC proposed improvement design
LSC proposed improvement designLSC proposed improvement design
LSC proposed improvement designlscproject2012
 
Tổng đài tâm sự
Tổng đài tâm sựTổng đài tâm sự
Tổng đài tâm sựhuytmdt
 
Ecologia medio ambiente3
Ecologia medio ambiente3Ecologia medio ambiente3
Ecologia medio ambiente3MonnicaGN
 
El vagabundo del tren
El vagabundo del trenEl vagabundo del tren
El vagabundo del trendanniela_30
 
Miễn phí dịch vụ thư thoại voice mail
Miễn phí dịch vụ thư thoại voice mailMiễn phí dịch vụ thư thoại voice mail
Miễn phí dịch vụ thư thoại voice mailhuytmdt
 
Stepa Stepanovic
Stepa StepanovicStepa Stepanovic
Stepa Stepanovicbojanm99
 

Viewers also liked (9)

Viễn thông viettel triển khai tính năng mới cho đồng bào dân tộc
Viễn thông viettel triển khai tính năng mới cho đồng bào dân tộcViễn thông viettel triển khai tính năng mới cho đồng bào dân tộc
Viễn thông viettel triển khai tính năng mới cho đồng bào dân tộc
 
The flyer
The flyerThe flyer
The flyer
 
La Programación
La ProgramaciónLa Programación
La Programación
 
LSC proposed improvement design
LSC proposed improvement designLSC proposed improvement design
LSC proposed improvement design
 
Tổng đài tâm sự
Tổng đài tâm sựTổng đài tâm sự
Tổng đài tâm sự
 
Ecologia medio ambiente3
Ecologia medio ambiente3Ecologia medio ambiente3
Ecologia medio ambiente3
 
El vagabundo del tren
El vagabundo del trenEl vagabundo del tren
El vagabundo del tren
 
Miễn phí dịch vụ thư thoại voice mail
Miễn phí dịch vụ thư thoại voice mailMiễn phí dịch vụ thư thoại voice mail
Miễn phí dịch vụ thư thoại voice mail
 
Stepa Stepanovic
Stepa StepanovicStepa Stepanovic
Stepa Stepanovic
 

Similar to Mayed

Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and historygururaj lulkarni
 
Digital literacy 2
Digital literacy 2Digital literacy 2
Digital literacy 2mj_jamal
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfAadil83
 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internetMaricrs Alfarö
 

Similar to Mayed (20)

Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Cybercrime
Cybercrime Cybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Digital literacy 2
Digital literacy 2Digital literacy 2
Digital literacy 2
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdf
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
cyber space.pdf
cyber space.pdfcyber space.pdf
cyber space.pdf
 
cyber space.pdf
cyber space.pdfcyber space.pdf
cyber space.pdf
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Cybercrime(this)
Cybercrime(this)Cybercrime(this)
Cybercrime(this)
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 

Mayed

  • 1. CYBER INTERACTION AND COLLABORATION Project 3.2
  • 2. DEFINITION IS an exchange and sharing of information using digital systems and the importance of having humility, ioyalty and erspects for other when cpmmunicating
  • 3. various forms of Digital commun ications and colladoratoing toois E-mail Social Networking Online forum Instant messaging{Im}
  • 4. UNETHCAL BEHAVOR WHEN UTLUZLNG SHARED RESOURES  Downloading pirated software Printing a lot of personal files Downloading unnecessary large files during schools houers Sending spam e-mails to the other users
  • 5. INDENTIFYING MISUSE OF TECHNOLOGY USING Social networking sites for the wrong reasons  Writing blogs to spread hatred  Using websites to phish to personal data Jeopardizing safety when texting while driving Using mobile phone to cheat of exams  Using internal computer to hack schools system Turning electronic gadget on plane Spreading hoax via text messages and emails