SlideShare a Scribd company logo
DEFINITION

 Is an exchange and sharing of information of using
 digital systems and the importance of having
 humility, loyalty and respects for other when
 communicating.
Various Forms of Digital Communications
           and Collaboration

 E-Mail
 Social Networking site
 Online Forum
 Internet Massaging (IM)
INDENTIFYING MISUSE OF TECHNOLOGY

 Using social networking Sites For The Wrong
  Reasons
 Writing Blogs To Spread Hatred
 Using Website to Push For personal Date
 Jeopardizing Safety when
 Using mobile phone to cheat on Exams
 Using Internal computer to Hack school’s System
 Turning Electronic Gadgets on plane
 Spreading Hoaxes Via Text Massages and Emailss
UNETHICAL BEHAVIOR WHEN UTILIZING
        SHEARED RESOURCE
o Downloading pirated software
o Printing a lot of personal files
o Strong files that have no thing to do with work
o Downloading unnecessary large files during schools
  hours
o Sending spam e-mails to the other users

More Related Content

What's hot

ComTech
ComTechComTech
ComTech
guest4e0549
 
Responsible use presentation
Responsible use presentationResponsible use presentation
Responsible use presentation
Carl Hooker
 
Technology Safety Practices
Technology Safety PracticesTechnology Safety Practices
Technology Safety Practices
Shireen Mitchell
 
Educational Technology Chapter 8
Educational Technology Chapter 8Educational Technology Chapter 8
Educational Technology Chapter 8
Martin Jon Barnachia
 
Orientation 2015 2 a & 2b technology issues & cybersafety
Orientation 2015 2 a & 2b technology issues & cybersafetyOrientation 2015 2 a & 2b technology issues & cybersafety
Orientation 2015 2 a & 2b technology issues & cybersafety
mthomson
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGY
Chano Alfornon
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
John Bosco Javellana, MAEd.
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
franzjho
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
Nader Alkeinay
 
Problems in moderen techniques of communication
Problems in moderen techniques of communicationProblems in moderen techniques of communication
Problems in moderen techniques of communication
Asif Razzaq
 
Delcine of communication Due to technology
Delcine of communication Due to technologyDelcine of communication Due to technology
Delcine of communication Due to technology
shahzaib suleman
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICT
Rolly Franco
 
Software Asset Management Power Point For Employers W Presentation Notes
Software  Asset  Management  Power Point For  Employers W  Presentation  NotesSoftware  Asset  Management  Power Point For  Employers W  Presentation  Notes
Software Asset Management Power Point For Employers W Presentation Notesguest78023a
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Anuj Bhardwaj
 
Digital Natives
Digital NativesDigital Natives
Digital NativesChauTran09
 

What's hot (18)

COmPuter
COmPuterCOmPuter
COmPuter
 
ComTech
ComTechComTech
ComTech
 
Responsible use presentation
Responsible use presentationResponsible use presentation
Responsible use presentation
 
Welcome to misd!
Welcome to misd!Welcome to misd!
Welcome to misd!
 
Technology Safety Practices
Technology Safety PracticesTechnology Safety Practices
Technology Safety Practices
 
Educational Technology Chapter 8
Educational Technology Chapter 8Educational Technology Chapter 8
Educational Technology Chapter 8
 
Orientation 2015 2 a & 2b technology issues & cybersafety
Orientation 2015 2 a & 2b technology issues & cybersafetyOrientation 2015 2 a & 2b technology issues & cybersafety
Orientation 2015 2 a & 2b technology issues & cybersafety
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGY
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
Problems in moderen techniques of communication
Problems in moderen techniques of communicationProblems in moderen techniques of communication
Problems in moderen techniques of communication
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Delcine of communication Due to technology
Delcine of communication Due to technologyDelcine of communication Due to technology
Delcine of communication Due to technology
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICT
 
Software Asset Management Power Point For Employers W Presentation Notes
Software  Asset  Management  Power Point For  Employers W  Presentation  NotesSoftware  Asset  Management  Power Point For  Employers W  Presentation  Notes
Software Asset Management Power Point For Employers W Presentation Notes
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Digital Natives
Digital NativesDigital Natives
Digital Natives
 

Viewers also liked

Universal symbols
Universal symbolsUniversal symbols
Universal symbolsnorastrauch
 
Finding outcommunities
Finding outcommunitiesFinding outcommunities
Finding outcommunitiesnorastrauch
 
SeeThinkWonderAboutHomes
SeeThinkWonderAboutHomesSeeThinkWonderAboutHomes
SeeThinkWonderAboutHomesnorastrauch
 
Interpreting paintingsgrade1artgallery
Interpreting paintingsgrade1artgalleryInterpreting paintingsgrade1artgallery
Interpreting paintingsgrade1artgallerynorastrauch
 

Viewers also liked (6)

Universal symbols
Universal symbolsUniversal symbols
Universal symbols
 
Hmsp deck
Hmsp deckHmsp deck
Hmsp deck
 
Finding outcommunities
Finding outcommunitiesFinding outcommunities
Finding outcommunities
 
SeeThinkWonderAboutHomes
SeeThinkWonderAboutHomesSeeThinkWonderAboutHomes
SeeThinkWonderAboutHomes
 
How toviewart
How toviewartHow toviewart
How toviewart
 
Interpreting paintingsgrade1artgallery
Interpreting paintingsgrade1artgalleryInterpreting paintingsgrade1artgallery
Interpreting paintingsgrade1artgallery
 

Similar to Project 3 2 ismaeel mashi

Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
MdRuga
 
eSmart Cybersafety
eSmart CybersafetyeSmart Cybersafety
eSmart Cybersafetytekwire
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
Alomgir Hossain
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
Rochelle Nato
 
Advantages and drawbacks of the Internet
Advantages and drawbacks of the InternetAdvantages and drawbacks of the Internet
Advantages and drawbacks of the Internet
Dmessaoudi2
 
cyber space.pdf
cyber space.pdfcyber space.pdf
cyber space.pdf
Yashwanth Rm
 
cyber space.pdf
cyber space.pdfcyber space.pdf
cyber space.pdf
Yashwanth Rm
 
Cyberspace
CyberspaceCyberspace
Cyberspace
Utchi
 
Internet safety
Internet safetyInternet safety
Internet safety
Dan Tomlinson
 
EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.
RIZALEAHSAMANIEGO
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators RoleJana Baxter
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
21_zaheer
 
Digital literacy 2
Digital literacy 2Digital literacy 2
Digital literacy 2mj_jamal
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdf
Jeth Cuenco
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators RoleJana Baxter
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Sanjeev Kumar Jaiswal
 
Cybercrime
Cybercrime Cybercrime
Cybercrime
Anuj Bhardwaj
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
pscl
 

Similar to Project 3 2 ismaeel mashi (20)

Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
eSmart Cybersafety
eSmart CybersafetyeSmart Cybersafety
eSmart Cybersafety
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Advantages and drawbacks of the Internet
Advantages and drawbacks of the InternetAdvantages and drawbacks of the Internet
Advantages and drawbacks of the Internet
 
cyber space.pdf
cyber space.pdfcyber space.pdf
cyber space.pdf
 
cyber space.pdf
cyber space.pdfcyber space.pdf
cyber space.pdf
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Internet safety
Internet safetyInternet safety
Internet safety
 
EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
 
Digital literacy 2
Digital literacy 2Digital literacy 2
Digital literacy 2
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdf
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cybercrime
Cybercrime Cybercrime
Cybercrime
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Project 3 2 ismaeel mashi

  • 1.
  • 2. DEFINITION  Is an exchange and sharing of information of using digital systems and the importance of having humility, loyalty and respects for other when communicating.
  • 3. Various Forms of Digital Communications and Collaboration  E-Mail  Social Networking site  Online Forum  Internet Massaging (IM)
  • 4. INDENTIFYING MISUSE OF TECHNOLOGY  Using social networking Sites For The Wrong Reasons  Writing Blogs To Spread Hatred  Using Website to Push For personal Date  Jeopardizing Safety when  Using mobile phone to cheat on Exams  Using Internal computer to Hack school’s System  Turning Electronic Gadgets on plane  Spreading Hoaxes Via Text Massages and Emailss
  • 5. UNETHICAL BEHAVIOR WHEN UTILIZING SHEARED RESOURCE o Downloading pirated software o Printing a lot of personal files o Strong files that have no thing to do with work o Downloading unnecessary large files during schools hours o Sending spam e-mails to the other users