Tuesday, 7 June 2016

POE. BIBLIOGRAPHY

BIBLIOGRAPHY./REFERENCE.

  1. CNBC. (2015). Top 5 cyber security risks for 2015. [online] Available at:http://www.cnbc.com/2014/12/19/top-5-cyber-security-risks-for-2015.html [Accessed 23 May 2016].
  2. EWN online (2016). who is Homo? Accessed 9 April 2014http://ewn.co.za/features/Naledi/what-makes-Naledi-special
  3. 1. Malcom, Wilson (2014), (definition of techno economic paradigm), retrieved fromhttp://www.anthempress.com/techno-economic paradigms.
  4.   Independent Institute of Education (2016) Introduction to Digital Citizenship Module Manual 2016. South Africa.

POE. Q.7 CYBER SECURITY.

cyber security

The Top 5 cyber security risks in 2015 are:
  1. Ransom ware,
  2. The Internet of Things
  3. Cyber-espionage
  4. Increase in cyber theft and
  5. Insecure passwords
  • Ransom ware infects a computer and restricts the users access to it, a ransom is paid in order for user to be able to use their computer.

  • The Internet of Things is when devices are connected to the internet which increase the risk of personal details being obtained.

  • Cyber-espionage is when information is obtained through the internet for use by the government.

  • Cyber theft is the stealing of financial information through the internet, such as credit card details.

  • Insecure passwords are passwords which are easily obtainable based on the users tastes or preferences and whether the same password is used several times.

Users are constantly providing financial institutions with confidential, personal, information and so are put at risk when exchanging this information.
Users allow hackers to obtain these details by replying to emails which are not from the financial institutions itself. These emails are almost identical to the ones received form financial institutions and so users can be easily fooled.

A way to prevent this from happening is to always check that the email received has a valid email address. This will allow the user to determine whether the email is legitimate or not.
Another method used by hackers is creating a website that looks almost identical to the real one. User may believe that this website is legitimate and therefore enter personal details. Users can check the URL of the website to ensure that the website is indeed legitimate.

Having a strong password is important as it protects most of our confidential information. Users often use unsuitable passwords that can be easily determined based on the consumers tastes and preferences. Users often reuse passwords for several accounts which puts them at risk.

Monday, 6 June 2016

POE, Q.6 digital technology.

potential impact on digital technology.

Impacts of Digital Technology on Society

Made with
LEARN MORE

POE Q.3 the social economy

the social economy.

Positives of social technologies:
  • Individuals can now express themselves as it is easier to not feel embarrassed over the internet.
  • Individuals can learn about other peoples life by visiting their profiles e.g. friends, relationship status, address, number etc. It is easier for people to make friends on social networking sites because people speak more openly and freely.
  • Individuals can now keep in contact with family and friends if they live far away or are just on holiday. Instead of writing a letter to someone, that would only be received a month later, social networking is easy and instant and individuals can reach anyone in the world with an internet connection.
  • Social networking helps businesses market their goods or services more efficiently. Traditional marketing mediums where abandoned because they where too expensive. Social media is free and the only cost for business is energy and time.
  •  Social networking can unite people and communities who share a common interest, objective or goal. E.g.  a community for second hand clothes was created where people can browse on the page and look for clothing.
  • Social networking helps people keep in touch with what is happening in the world every minute. Everyone is informed immediately if their is a crisis.

benefits of social technologies:
  • The most obviously negative about social technologies is cyberbullying. Cyberbullying is so prominent because individuals feel safe and anonymous behind a computer and feel that they will not be harmed. The only way for a bully to be stopped is to report him!
  • Social networking can ruin peoples relationships as people are constantly viewing new profile pictures, relationship statuses, new friends etc. which is causing people to get jealous if they find out, for example, your girlfriend exchanging messages with another man.
  • As useful social media is, it is addictive and people obviously abuse it and spend hours and hours or even the whole day constantly checking their social networking accounts. This can leads to health problems such a eye strain, repetitive strain injury, headaches, neck pain and even mental illness such as depression.
  • Security is a concern when social networking as all an individuals personal information is made readily available to all (Unless security settings are changed) which can pose a security risk. People can steal other people identity online and use their profiles as their own.
  •   Kids can be affected by using social media as their brains are not yet fully developed and people may share a violent image that encourages children to become violent.
  • Some social networking sites in certain businesses are being blocked because employees spend the whole working day on their social media and not doing their work. This leads to reduced productivity levels in the business.

There are many reasons that social networking is creating value in peoples lives and the benefits actually do outweigh the negatives.

c628985f4f2ff57cf5a4fb45391c939a.jpg
                                          (S-media-cache-ak0.pinimg.com, 2016)


POE, Q.4 digital code of conduct for education institutes.

Digital Code of Conduct for educational institutes:

Sunday, May 22nd, 2016

10 points of netiquette:

  1. When typing never type in all capitals, this is shouting and is rude.
  2. Do not plagiarise because someone spent a long period of time working on the content that you just copy and pasta and claim it is yours.
  3. Use proper quotes and always use the whole quote.
  4. Do not gossip and keep  personal information to your self.
  5. Do not steal photographs that are not yours unless you have permission and you give credit.
  6. Watch your language. Do not swear!
  7. Be patient with new users.
  8. No spamming. It is unwanted and annoying.
  9. If you are using a header make sure your content matches the header.
  10. Avoid overuse of emoticons. They are irritating.
    Netiquette
    (1.bp.blogspot.com, 2016)

Penalties for failing to meet netiquette:

  1. If these rules are not followed the first step would be to send the user an email stating that they are breaking the rules.
  2. The next step would be to limit their access to the internet.
  3. If the rules are still not followed the user would then need to attend a disciplinary hearing.
  4. If these steps have been unsuccessful  the final step would be to take legal action against the user.

netiquette-4-638
(Image.slidesharecdn.com, 2016)

creative-commons-image.jpg
(Google.co.za, 2016)


How to enforce and manage Netiquette:

  1. Record all transactions and make sure you get a receipt.
  2. Use professional signatures on documents to provide legitimacy.
  3. Ask for clarification if you have any doubt about instructions to avoid miscommunication.
  4. Do not write in acronyms. It is childish in the work place unless it is specific jargon for your industry.
  5.  Double space paragraphs to make your drawings readable.
  6. Use descriptive headings.
  7. Use references.
  8. Businesses can adopt a strict code of digital conduct where they can monitor their employees actions and watch developing trends that may need to be put to an end.
  9. Although this might be extreme, businesses can spy on employees doings on the internet so that they can ensure all workers have a clear understanding of netiquette.

netiquette-short-introduction-12-638
                  (Image.slidesharecdn.com, 2016)


Digital Code of Conduct.png

References:


POE, Q.2.1.using information fluency skills.

The information process about (Homo Naledi).

Ask
  • Who was Homo Naledi
  • What was the significant about this discovery
Acquire


Analyse

  • A team of archaeologist led by professor lee Berger undertook the rising star expedition and they had made history by discovering and salvaging fossils of at least an individual from the Dinaledi chamber. this was evolutionary discovery since a new species of hominines called Homo Naledi was found in the, remote chamber. Homo Naledi have distinct physical features that are astonishingly similar to that of human being such as:
  • curved fingers
  • small skulls
  • slender bodies
  • ape-like shoulders
Apply

  • According to the finding highlighted in the Homo Naledi could be our common ancestor, therefore this suggest that it could had human characteristics both physical and mental as well as similar behavioural characteristics.
  • The Dinaledi chamber could have been used as a burial ground where the newfound species could have performed burial rituals since none of the fossils had mark nor did they attend the chamber at the same time.
Assess

  • Research was conducted thoroughly and the information was extracted from a good source.
Reference

POE,Q.1.2.what is techno-economic.

what is techno-economic.
Techno-economic paradigm -shifts are at the core of general, innovation-based theory of economic and societal development as conceived by Carlota Perez. Her book on the subject, ‘Technological Revolutions and Financial Capital’, is a seminal enunciation of the theory, and has had immense influence on business strategy, state development programs and policy, and academic thinking on the subject.
‘Techno-Economic Paradigms’ presents a series of essays by the leading academics in the field discussing the theory of techno-economic paradigm shifts, and its role in explaining processes of innovation and development. This festschrift honours Carlota Perez, the founder of the theory 'techno-economic paradigm shifts.

how can one develop from it.
The Finnish urban regions are used as the source of empirical data in this study. All Finnish urban regions are assessed based on the adaptability indicator and further on, the values of the adaptability indicator are compared to the respective values of indicators describing the economic success of the same regions.. Admittedly, the adaptability indicator does not describe the studied phenomenon completely, it might even be considered provocative. However, it gives some interesting results about the different kinds of development trajectories of urban regions, and gives valuable information for regional decision-making.