- CNBC. (2015). Top 5 cyber security risks for 2015. [online] Available at:http://www.cnbc.com/2014/12/19/top-5-cyber-security-risks-for-2015.html [Accessed 23 May 2016].
- EWN online (2016). who is Homo? Accessed 9 April 2014http://ewn.co.za/features/Naledi/what-makes-Naledi-special
- 1. Malcom, Wilson (2014), (definition of techno economic paradigm), retrieved fromhttp://www.anthempress.com/techno-economic paradigms.
- Independent Institute of Education (2016) Introduction to Digital Citizenship Module Manual 2016. South Africa.
Tuesday, 7 June 2016
POE. BIBLIOGRAPHY
BIBLIOGRAPHY./REFERENCE.
POE. Q.7 CYBER SECURITY.
cyber security
The Top 5 cyber security risks in 2015 are:
Users are constantly providing financial institutions with confidential, personal, information and so are put at risk when exchanging this information.
Users allow hackers to obtain these details by replying to emails which are not from the financial institutions itself. These emails are almost identical to the ones received form financial institutions and so users can be easily fooled.
A way to prevent this from happening is to always check that the email received has a valid email address. This will allow the user to determine whether the email is legitimate or not.
Another method used by hackers is creating a website that looks almost identical to the real one. User may believe that this website is legitimate and therefore enter personal details. Users can check the URL of the website to ensure that the website is indeed legitimate.
Having a strong password is important as it protects most of our confidential information. Users often use unsuitable passwords that can be easily determined based on the consumers tastes and preferences. Users often reuse passwords for several accounts which puts them at risk.
The Top 5 cyber security risks in 2015 are:
- Ransom ware,
- The Internet of Things
- Cyber-espionage
- Increase in cyber theft and
- Insecure passwords
- Ransom ware infects a computer and restricts the users access to it, a ransom is paid in order for user to be able to use their computer.
- The Internet of Things is when devices are connected to the internet which increase the risk of personal details being obtained.
- Cyber-espionage is when information is obtained through the internet for use by the government.
- Cyber theft is the stealing of financial information through the internet, such as credit card details.
- Insecure passwords are passwords which are easily obtainable based on the users tastes or preferences and whether the same password is used several times.
Users are constantly providing financial institutions with confidential, personal, information and so are put at risk when exchanging this information.
Users allow hackers to obtain these details by replying to emails which are not from the financial institutions itself. These emails are almost identical to the ones received form financial institutions and so users can be easily fooled.
A way to prevent this from happening is to always check that the email received has a valid email address. This will allow the user to determine whether the email is legitimate or not.
Another method used by hackers is creating a website that looks almost identical to the real one. User may believe that this website is legitimate and therefore enter personal details. Users can check the URL of the website to ensure that the website is indeed legitimate.
Having a strong password is important as it protects most of our confidential information. Users often use unsuitable passwords that can be easily determined based on the consumers tastes and preferences. Users often reuse passwords for several accounts which puts them at risk.
Monday, 6 June 2016
POE, Q.6 digital technology.
potential impact on digital technology.
POE Q.3 the social economy
the social economy.
Positives of social technologies:
- Individuals can now express themselves as it is easier to not feel embarrassed over the internet.
- Individuals can learn about other peoples life by visiting their profiles e.g. friends, relationship status, address, number etc. It is easier for people to make friends on social networking sites because people speak more openly and freely.
- Individuals can now keep in contact with family and friends if they live far away or are just on holiday. Instead of writing a letter to someone, that would only be received a month later, social networking is easy and instant and individuals can reach anyone in the world with an internet connection.
- Social networking helps businesses market their goods or services more efficiently. Traditional marketing mediums where abandoned because they where too expensive. Social media is free and the only cost for business is energy and time.
- Social networking can unite people and communities who share a common interest, objective or goal. E.g. a community for second hand clothes was created where people can browse on the page and look for clothing.
- Social networking helps people keep in touch with what is happening in the world every minute. Everyone is informed immediately if their is a crisis.
benefits of social technologies:
- The most obviously negative about social technologies is cyberbullying. Cyberbullying is so prominent because individuals feel safe and anonymous behind a computer and feel that they will not be harmed. The only way for a bully to be stopped is to report him!
- Social networking can ruin peoples relationships as people are constantly viewing new profile pictures, relationship statuses, new friends etc. which is causing people to get jealous if they find out, for example, your girlfriend exchanging messages with another man.
- As useful social media is, it is addictive and people obviously abuse it and spend hours and hours or even the whole day constantly checking their social networking accounts. This can leads to health problems such a eye strain, repetitive strain injury, headaches, neck pain and even mental illness such as depression.
- Security is a concern when social networking as all an individuals personal information is made readily available to all (Unless security settings are changed) which can pose a security risk. People can steal other people identity online and use their profiles as their own.
- Kids can be affected by using social media as their brains are not yet fully developed and people may share a violent image that encourages children to become violent.
- Some social networking sites in certain businesses are being blocked because employees spend the whole working day on their social media and not doing their work. This leads to reduced productivity levels in the business.
There are many reasons that social networking is creating value in peoples lives and the benefits actually do outweigh the negatives.

(S-media-cache-ak0.pinimg.com, 2016)
POE, Q.4 digital code of conduct for education institutes.
Digital Code of Conduct for educational institutes:
Sunday, May 22nd, 201610 points of netiquette:
- When typing never type in all capitals, this is shouting and is rude.
- Do not plagiarise because someone spent a long period of time working on the content that you just copy and pasta and claim it is yours.
- Use proper quotes and always use the whole quote.
- Do not gossip and keep personal information to your self.
- Do not steal photographs that are not yours unless you have permission and you give credit.
- Watch your language. Do not swear!
- Be patient with new users.
- No spamming. It is unwanted and annoying.
- If you are using a header make sure your content matches the header.
- Avoid overuse of emoticons. They are irritating.(1.bp.blogspot.com, 2016)
Penalties for failing to meet netiquette:
- If these rules are not followed the first step would be to send the user an email stating that they are breaking the rules.
- The next step would be to limit their access to the internet.
- If the rules are still not followed the user would then need to attend a disciplinary hearing.
- If these steps have been unsuccessful the final step would be to take legal action against the user.

(Image.slidesharecdn.com, 2016)

(Google.co.za, 2016)
How to enforce and manage Netiquette:
- Record all transactions and make sure you get a receipt.
- Use professional signatures on documents to provide legitimacy.
- Ask for clarification if you have any doubt about instructions to avoid miscommunication.
- Do not write in acronyms. It is childish in the work place unless it is specific jargon for your industry.
- Double space paragraphs to make your drawings readable.
- Use descriptive headings.
- Use references.
- Businesses can adopt a strict code of digital conduct where they can monitor their employees actions and watch developing trends that may need to be put to an end.
- Although this might be extreme, businesses can spy on employees doings on the internet so that they can ensure all workers have a clear understanding of netiquette.

(Image.slidesharecdn.com, 2016)

References:
- About Canva. (2016). Free Online Poster Maker: Design Custom Posters With Canva. [online] Available at:https://www.canva.com/create/posters/ [Accessed 22 May 2016].
- Go.vsb.bc.ca. (2016). Digital Code of Conduct. [online] Available at:http://go.vsb.bc.ca/schools/johnoliver/About/Pages/Digital-Code-of-Conduct.aspx [Accessed 22 May 2016].
- Wikipedia. (2016). Etiquette in technology. [online] Available at:https://en.wikipedia.org/wiki/Etiquette_in_technology#Netiquette[Accessed 22 May 2016].
- Uticaod. (2016). Internet Etiquette – 10 Rules of Netiquette. [online] Available at:http://www.uticaod.com/article/20120907/BLOGS/309079938[Accessed 22 May 2016].
POE, Q.2.1.using information fluency skills.
The information process about (Homo Naledi).
Ask
Analyse
Ask
- Who was Homo Naledi
- What was the significant about this discovery
- Information was acquired at the following website: http://ewn.co.za/features/Naledi
Analyse
- A team of archaeologist led by professor lee Berger undertook the rising star expedition and they had made history by discovering and salvaging fossils of at least an individual from the Dinaledi chamber. this was evolutionary discovery since a new species of hominines called Homo Naledi was found in the, remote chamber. Homo Naledi have distinct physical features that are astonishingly similar to that of human being such as:
- curved fingers
- small skulls
- slender bodies
- ape-like shoulders
- According to the finding highlighted in the Homo Naledi could be our common ancestor, therefore this suggest that it could had human characteristics both physical and mental as well as similar behavioural characteristics.
- The Dinaledi chamber could have been used as a burial ground where the newfound species could have performed burial rituals since none of the fossils had mark nor did they attend the chamber at the same time.
- Research was conducted thoroughly and the information was extracted from a good source.
- EWN online (2016). who is Homo? Accessed 9 April 2014http://ewn.co.za/features/Naledi/what-makes-Naledi-special.
POE,Q.1.2.what is techno-economic.
what is techno-economic.
Techno-economic paradigm -shifts are at the core of general, innovation-based theory of economic and societal development as conceived by Carlota Perez. Her book on the subject, ‘Technological Revolutions and Financial Capital’, is a seminal enunciation of the theory, and has had immense influence on business strategy, state development programs and policy, and academic thinking on the subject.
‘Techno-Economic Paradigms’ presents a series of essays by the leading academics in the field discussing the theory of techno-economic paradigm shifts, and its role in explaining processes of innovation and development. This festschrift honours Carlota Perez, the founder of the theory 'techno-economic paradigm shifts.
how can one develop from it.
The Finnish urban regions are used as the source of empirical data in this study. All Finnish urban regions are assessed based on the adaptability indicator and further on, the values of the adaptability indicator are compared to the respective values of indicators describing the economic success of the same regions.. Admittedly, the adaptability indicator does not describe the studied phenomenon completely, it might even be considered provocative. However, it gives some interesting results about the different kinds of development trajectories of urban regions, and gives valuable information for regional decision-making.
Thursday, 2 June 2016
POE=Q.5 Digital right and responsibilty
The
definition of digital rights and responsibilities is having
the right and freedom to use all types of digital technology while using
the technology in an acceptable and appropriate manner. As a user of digital
technology, you also have the right to privacy and the freedom of personal
expression.
Plagiarism Use it wise Respect, Educate and Protect
Unlawful
Netiquette Respect
Integrity, Internet safety bullying through texting, Cyberbullying Sexting,
Facebook other social media Right to our identity
Personal works
Right to privacy
Right to freedom of expression
Digital Law
Cite works used
for resources and researching
Safe from hackers Responsibility to download music
Videos, and other material legally
Responsibility not to
falsify our identity in any way
Harassing
communication
Thursday, 19 May 2016
biblography =assignment
bibliography/reference.
1.http://www.miudossegurosna.net/nove-elementos-da-cidadania-digital.html (HTML Version)
http://miudossegurosna.net/MSNN-NOVE-ELEMENTOS-DA-CIDADANIA-DIGITAL-v1.pdf (PDF Version)
http://ilgeekinblu.blogspot.it/2014/06/i-9-elementi-della-cittadinanza-digitale.html
4.^ "BBC Internet Poll: Detailed Findings", BBC World Service, 8 March 2010
6.^ a b "VI. Conclusions and recommendations", Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, Frank La Rue, Human Rights Council, Seventeenth session Agenda item 3, United Nations General Assembly, 16 May 2011
1.http://www.miudossegurosna.net/nove-elementos-da-cidadania-digital.html (HTML Version)
http://miudossegurosna.net/MSNN-NOVE-ELEMENTOS-DA-CIDADANIA-DIGITAL-v1.pdf (PDF Version)
http://ilgeekinblu.blogspot.it/2014/06/i-9-elementi-della-cittadinanza-digitale.html
3. http://www.digitaltrends.com/home/heck-internet-things-dont-yet/#ixzz48wNyeT1P
Follow us: @digitaltrends on Twitter | digitaltrendsftw on Facebook
Follow us: @digitaltrends on Twitter | digitaltrendsftw on Facebook
4.^ "BBC Internet Poll: Detailed Findings", BBC World Service, 8 March 2010
6.^ a b "VI. Conclusions and recommendations", Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, Frank La Rue, Human Rights Council, Seventeenth session Agenda item 3, United Nations General Assembly, 16 May 2011
Wednesday, 18 May 2016
Q.5.2 assignment =unites nation human rights.
Q.5.2
A Bill
of Rights for the Internet
1. We are
all free and equal. We
are all born free. We all have our own thoughts and ideas and should express
them freely on the internet.
2. No Torture.
Nobody has any right to hurt others by either bullying or using inappropriate
language towards others
.
3. We are all protected by the law. The
law is the same for everyone. It must treat everyone who transgresses the
digital laws with the same fate.
4. The right to privacy.
Nobody should try to harm our good name. Nobody has the right to come into our
digital spaces and harass without a good reason.
5. Freedom of thought. We
all have the right to believe in what we want to believe, to have a religion,
or to change it if we want.
6. Culture and copyright.
Copyright is a special law that protects one’s own artistic creations and
writings; others cannot make copies without permission. We all have the right
to our own way of life and to enjoy the good things that “art,” science and
learning bring.
7. Our responsibilities. We
have a duty to other people, and we should protect their rights and freedoms
and avoid infringing on them due to what we post on the internet.
8. Safe internet surfing. The
internet must be a safe environment to surf and research for any purpose.
9. Free business opportunities. Everyone
should be afforded an opportunity to pursue business ventures on the intern.
10. Right of protection to internet right. Nobody
can take away these rights and freedoms from us.
Q.5.1 assignment =petition of the countries were digital right are not extended.
Question 5.
Q.5.1 We, the citizens of North Korea, Vietnam, China, and Cuba, petition our governments to extend our digital rights to a greater population.
Q.5.1 We, the citizens of North Korea, Vietnam, China, and Cuba, petition our governments to extend our digital rights to a greater population.
There is only a small portion of the population that has
access to the digital world, so there has been a major increase in the number
of people in need of accessing and utilizing the World Wide Web for personal and
business purposes.
We do acknowledge that there may be regulations on the
usage of this important tool and shall abide by the reasonable regulations
thereof.
We demand that the heads of states fully allow all citizens
of the above mentioned respectful countries extensive use of the internet by
the end of July 2016.
Name
|
Address
|
Phone #
|
Signature
|
Voter Reg. #
|
North Korea
|
24 Hill Crest Road
|
203-839-4444
|
George Smith
|
24587234827
|
Vietnam.
|
87 Loganville street
|
348-787-7378
|
Dinky molly
|
63594369266
|
China
|
387
China kingdom road
|
747-357-4747
|
Thabang Nkoana
|
73479427878
|
Cuba.
|
164 mollies street
|
082-54-81882
|
Modroc sirigu
|
72066899008
|
Q.4 assignment =list and describe inappropriate digital conduct and the effects on society.
question 4.
Q.4
Inappropriate digital conduct
1. Sexual
2. Harassment
3. Cyber
bullying
4. Verbal
abuse
5. Fraud
6. Child
pornography
7. Racism
Inappropriate conduct has a profound effect on society as
it is easier for people to behave inappropriately over the internet where they
can remain anonymous. Families are torn apart, lives are lost and money is lost
as a result of inappropriate digital conduct.
Article
1.
March 10, 2014 | Karen Kaplan
Victims of bullying were more than twice as likely as other
kids to contemplate suicide and about 2.5 times as likely to try to kill
themselves, according to a new study that quantifies the emotional effects of
being teased, harassed, beaten up or otherwise harmed by one’s peers. Children
and teens who were taunted by cyberbullies were especially vulnerable — they
were about three times as likely than other kids to have suicidal thoughts, the
study found. The findings, published online Monday by the journal JAMA Paediatrics,
puts the lie to the old adage about sticks and stones.
Article
2.
Online conduct can have far-reaching effects:
Think, Type, and Post.
March 25, 2016
If people are still unsure of what bad behavior looks like
online, the Army clarified it for them in an “All Army Activities” message. Online
misconduct, it says, is “the use of electronic communication to inflict harm.
Examples include, but are not limited to: harassment, bullying, hazing,
stalking, discrimination, retaliation, or any other types of misconduct that
undermine dignity and respect.” Photo by Todd Lopez.
Subscribe to:
Posts (Atom)