1 / 15

PORTFOLIO 1 CITIZEN

PORTFOLIO 1 CITIZEN. NAME: GAN GEK HIAN TITLE : CYBER STALKING THEME: SAFETY ELEMENT USED: E-RULE, E –SAFETY, E-ACCOUNTABILITY CREDIT (E- ACCOUNTABILITY) http ://www.google.com.my/imghp?client=firefox-a&rls=org.mozilla:en-US:official&hl=en&tab=wi

osgood
Download Presentation

PORTFOLIO 1 CITIZEN

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PORTFOLIO1 CITIZEN NAME: GAN GEK HIAN TITLE : CYBER STALKING THEME: SAFETY ELEMENT USED: E-RULE, E –SAFETY, E-ACCOUNTABILITY CREDIT (E- ACCOUNTABILITY) http://www.google.com.my/imghp?client=firefox-a&rls=org.mozilla:en-US:official&hl=en&tab=wi http://crime.about.com/od/stalking/a/stalking_is.htm

  2. e-Rule legal issues pertaining to the communicative, transactional and distributive aspects of networked information technologies and devices. e-safety Internet safety is more on how to protect your important information from internet threat. It revolves around the idea about the rights and privileges of Net users and the behavior that come with it.

  3. Cyber stalking use of the Internet or any electronic device to stalk other people. Cyber stalkers find information on their victims from various sources such as blogs, search services, and social networking websites.

  4. Cyber Stalking Email Social Network Chat room

  5. FEELING UNSAFE AFRAID VICTIM STALKING CAN BECOME VIOLENT DISTRESS

  6. Stalking case • Previous personal or romantic relationship between the stalker and the victim. • Stalkers try to control every aspect of their victims' lives. • Harassing behavior often escalates to direct or indirect threats. • Level of seriousness often end in violence.

  7. IF NOT….

  8. PREVENT STALKING DO NOT chat with some one you don’t know DO NOT give personal data to the person you chat online

  9. PERSONAL DATA NAME ADDRESS BIRTH DATE MARITAL STATUS E-MAIL PHONE NUMBER

  10. DON’T EXPOSE

More Related