SlideShare a Scribd company logo
1 of 5
CYBER INTERACTION AND
   COLLABORATION



       Project 3.2
DEFINTION
Is an exchange and sharing of information
 using digital system and the importance of
 having humility, loyalty and respects for other
 when communicating.
Various Forms of Digital
 Communications and
 collaboration tools



E-Mail
Social Networking site
Online Forum
Instant Messaging (IM)
INDENTIFYING MISUS OF TECHNOLOGY

 Using Social Networking Sites For the Wrong Reasons
 Writing Blogs To Spread Hatred
 Using Websites to phish for personal Data
 Jeopardizing Safety When Texting While Driving
 Using Mobile phone to Hack Schools system
 Turning Electronic Gadgets on plane
 Spreading Hoaxes Via Text Massages and Emails
UNETHICAL BEHAVIOR WHEN
     UTLIZING SHARED RESOURCOS
 Downloading pirated Software
Printing a lot of personal files
Storing files that have nothing to do with work
Downloading unnecessary large files during
 schools hour
Sending spam e-mails to the other users

More Related Content

What's hot

Programma o sarai programmato
Programma o sarai programmatoProgramma o sarai programmato
Programma o sarai programmatoStefano Penge
 
Computer Infections
Computer InfectionsComputer Infections
Computer Infectionserowell
 
Online community-tools
Online community-toolsOnline community-tools
Online community-toolssnoonan
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)John Bosco Javellana, MAEd.
 
Internet surfing and security
Internet surfing and securityInternet surfing and security
Internet surfing and securitynamansaini11
 
Social Networking Technologies
Social Networking TechnologiesSocial Networking Technologies
Social Networking Technologiestasosrules
 
Cyberspace & Digital Divide
Cyberspace & Digital DivideCyberspace & Digital Divide
Cyberspace & Digital DivideDeniz Cengiz
 
Betten jutasi pp 04.26.12
Betten jutasi pp 04.26.12Betten jutasi pp 04.26.12
Betten jutasi pp 04.26.12colemama
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide showBeckusq
 
Digital communication anabelly
Digital communication anabelly Digital communication anabelly
Digital communication anabelly anabellymata
 
Studying is Life but ET is Lifer
Studying is Life but ET is LiferStudying is Life but ET is Lifer
Studying is Life but ET is Liferyvuuuhn
 
Communicatio Skills
Communicatio  Skills Communicatio  Skills
Communicatio Skills SanaRiaz789
 
SocialSense: A System For Social Environment Awareness
SocialSense: A System For Social Environment AwarenessSocialSense: A System For Social Environment Awareness
SocialSense: A System For Social Environment AwarenessRobert Brewer
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networksTannistho Ghosh
 

What's hot (19)

Programma o sarai programmato
Programma o sarai programmatoProgramma o sarai programmato
Programma o sarai programmato
 
Computer Infections
Computer InfectionsComputer Infections
Computer Infections
 
Online community-tools
Online community-toolsOnline community-tools
Online community-tools
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Threats of Computer System and its Prevention
Threats of Computer System and its PreventionThreats of Computer System and its Prevention
Threats of Computer System and its Prevention
 
Virus
VirusVirus
Virus
 
Internet surfing and security
Internet surfing and securityInternet surfing and security
Internet surfing and security
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
Social Networking Technologies
Social Networking TechnologiesSocial Networking Technologies
Social Networking Technologies
 
Cyberspace & Digital Divide
Cyberspace & Digital DivideCyberspace & Digital Divide
Cyberspace & Digital Divide
 
Betten jutasi pp 04.26.12
Betten jutasi pp 04.26.12Betten jutasi pp 04.26.12
Betten jutasi pp 04.26.12
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
 
cyber crime
 cyber crime cyber crime
cyber crime
 
Digital communication anabelly
Digital communication anabelly Digital communication anabelly
Digital communication anabelly
 
Studying is Life but ET is Lifer
Studying is Life but ET is LiferStudying is Life but ET is Lifer
Studying is Life but ET is Lifer
 
Communicatio Skills
Communicatio  Skills Communicatio  Skills
Communicatio Skills
 
SocialSense: A System For Social Environment Awareness
SocialSense: A System For Social Environment AwarenessSocialSense: A System For Social Environment Awareness
SocialSense: A System For Social Environment Awareness
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 

Viewers also liked

Pensions covenant advisory services
Pensions covenant  advisory servicesPensions covenant  advisory services
Pensions covenant advisory servicesDuncan Stocks
 
Fonetica y fonologia (tema 3. fonologia y fonetica..ppt)
Fonetica y fonologia (tema 3. fonologia y fonetica..ppt)Fonetica y fonologia (tema 3. fonologia y fonetica..ppt)
Fonetica y fonologia (tema 3. fonologia y fonetica..ppt)Innês Medrano
 
Marketing 2013
Marketing 2013Marketing 2013
Marketing 2013Paco Suay
 
Bab 4 perangkat internet
Bab 4 perangkat internetBab 4 perangkat internet
Bab 4 perangkat internetNatria Shaniya
 

Viewers also liked (7)

Pensions covenant advisory services
Pensions covenant  advisory servicesPensions covenant  advisory services
Pensions covenant advisory services
 
Fonetica y fonologia (tema 3. fonologia y fonetica..ppt)
Fonetica y fonologia (tema 3. fonologia y fonetica..ppt)Fonetica y fonologia (tema 3. fonologia y fonetica..ppt)
Fonetica y fonologia (tema 3. fonologia y fonetica..ppt)
 
Employment pt1
Employment pt1Employment pt1
Employment pt1
 
Employment pt2
Employment pt2Employment pt2
Employment pt2
 
Flavia Marzano - Open Data Day Italia 2013 il primo passo...
Flavia Marzano - Open Data Day Italia 2013 il primo passo...Flavia Marzano - Open Data Day Italia 2013 il primo passo...
Flavia Marzano - Open Data Day Italia 2013 il primo passo...
 
Marketing 2013
Marketing 2013Marketing 2013
Marketing 2013
 
Bab 4 perangkat internet
Bab 4 perangkat internetBab 4 perangkat internet
Bab 4 perangkat internet
 

Similar to Mohamme d hamed

Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and historygururaj lulkarni
 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...ijccsa
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)ijccsa
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Digital literacy 2
Digital literacy 2Digital literacy 2
Digital literacy 2mj_jamal
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfAadil83
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptxsakshiyad2611
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internetAlexander Decker
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 

Similar to Mohamme d hamed (20)

Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Cybercrime
Cybercrime Cybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Digital literacy 2
Digital literacy 2Digital literacy 2
Digital literacy 2
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdf
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Mohamme d hamed

  • 1. CYBER INTERACTION AND COLLABORATION Project 3.2
  • 2. DEFINTION Is an exchange and sharing of information using digital system and the importance of having humility, loyalty and respects for other when communicating.
  • 3. Various Forms of Digital Communications and collaboration tools E-Mail Social Networking site Online Forum Instant Messaging (IM)
  • 4. INDENTIFYING MISUS OF TECHNOLOGY  Using Social Networking Sites For the Wrong Reasons  Writing Blogs To Spread Hatred  Using Websites to phish for personal Data  Jeopardizing Safety When Texting While Driving  Using Mobile phone to Hack Schools system  Turning Electronic Gadgets on plane  Spreading Hoaxes Via Text Massages and Emails
  • 5. UNETHICAL BEHAVIOR WHEN UTLIZING SHARED RESOURCOS  Downloading pirated Software Printing a lot of personal files Storing files that have nothing to do with work Downloading unnecessary large files during schools hour Sending spam e-mails to the other users