Monday 30 May 2016

DIGITAL LITERACY AND INFORMATION FLUENCIES (QUESTION 2)


Information fluency relates to our ability to instinctively and unconsciously elucidate information in all forms and formats to withdraw crucial knowledge so that one can extract the significance of the information to perform everyday tasks and by asking good question we will find that we receive brilliant answers (IIE, 2015).
A new species to the human ancestry was announced on 10 September 2015. This was enlightening discovery due to the fact that “Homo Naledi” (the name given to the new species) when found was seemed to have placed dead in a small chamber at the cradle of humankind in Sterkfontein.
With the discovery of this new information the scientific world seemed to be asking themselves when this species lived, how they form part of the human ancestry and did they bury their dead. To answer these questions scientist have acquired information that dates back to 1964. By analyzing this information they will be able to determine why and did the Homo Naledi dispose of its dead in such a manner, how they form part of the Homo Genus category and they fit into the human ancestry. The scientific community has concluded that for centuries human believed that they were the only species who buried its dead, however the discovery of Homo Naledi now proves otherwise.
For this information to be relevant scientist would have to access the process they used t decide on whether they could have conducted their research in a different, better manner.

(words: 245)

TECHNO - ECONOMIC PARADIGM


Paradigm with regard to technology is an example or pattern of something, it is basically another term for a model of something.

techno-economic paradigm’ describes how in the initial stages of any new paradigm, or pattern, there is an emphasis on the technical side rather than innovation.

As the technology, or paradigm, becomes more accessible and accepted, the next stage is the diffusion of the new paradigm from the innovative sectors to the economy as a whole. This is where there is a divide between the technology available and the skills required.

Once the divide is overcome the technology can then be used to collate data for processing into information, resulting in knowledge being acquired and used in decision-making processes to improve the business. This is critical in a country where SMEs make up 91% of South Africa’s business entities, contributing between 52% and 57% of the GDP, and 61% toward employment – including those with less skilled labour. 

This paradigm, or pattern, could assist developing countries in their attempts to close or minimize the divide, thus supporting the growth of South Africa’s biggest type of entity – SMEs. Moreover, the paradigm is consistent with the natural progression we are seeing within developing countries; where technology is being adopted and the skills are gradually acquired to utilize the technology. The only main difference is that in a developed country, the socio-economic factors and the infrastructure speeds up the time between adoption of the technology and its universal utilization.

(IIE, 2015)

RAMIFICATIONS OF DIGITAL DIVIDE


















click here to access the power point presentation

9 ELEMENTS OF DIGITAL CITIZENSHIP - POSTER

QUESTION 1.3:

THE SOCIAL ECONOMY: UNLOCKING THE VALUE THROUGH THECNOLOGIES.

Digital Communications and Fluencies (Question 3):

Benefits of Digital communication (Anon, 2015):
  1. It is faster and easier.
  2. It is environmentally friendly, due to no paper being used or wasted.
  3. It can be distributed over large distances.
  4. It is cheaper.
  5. It removes sematic noise.
  6. It provides for facilities such as video conferencing, therefore saving time and money.
DIGITAL COMMUNICATION IN CORPORATIONS:
Benefits:
  • Digital communication makes it easier to companies to reach consumers, by creating accurately precise messages for specific targeted audiences. (Manyika, et al 2015)
  • companies can further use digital communications to gain insights for product development.  (Manyika, et al 2015)
Risk:
  • Negative publicity generated online will give the brand a bad reputation. (Belbey, 2015)
DIGITAL COMMUNCATION IN SOCIETY:
Benefits:
  • World Wide Connectivity, enables societies to quickly gain global information as well as allows for networking both personal and professional to take place. (Claywell, 2013)
  • Real - time Information Sharing, lets people stay in the know due to them having access to news around the world as it breaks.
Risk:
  • Time being wasted, due to some people getting addicted to the internet and can not stay off it.
  • Risk of fraud and identity theft.
DIGITAL COMMUNICATION IN SOUTH AFRICA:
Benefits:
  • Boost customer engagement, which will further improve online shopping in South Africa.(itnewsafrica.2015)
  • It is economically as it is cheaper than print advertising, therefore allowing resources to be spent in other much need sector (ie. education). (itnewsafrica, 2015)
Risk:
  • South Africa does not have the best software infrastructure, therefore there is a high possibility for either fraud or identity theft to take place it information is not secure with privacy protections.

DIGITAL ETIQUETTE

QUESTION 4:
Digital Code of Conduct
 
Examples of Netiquette:
(Anon, 2014)
  1. Do not seek unauthorized access to the internet.
  2. Do not use abusive and threatening language on the internet.
  3. Do not post racist sexist homophobic and offensive remarks on the internet.
  4. Do not do anything virtually and you will not do in reality.
  5. Do not refer to people in a derogatory manner.
  6. Do not share someone else's personal information online without their consent.
  7. Do not waste resources on the internet.
  8. Do not compromise the privacy of other internet users.
  9. Do not destroy the integrity of internet based information.
  10. Do not use bad grammar and spelling on purpose.
  11. Do not post content that is insulating, unlawful, threatening, obsence, harmful, abusive or effects another person's privacy.
 
Methods to enforce Netiquette in a Business Environment (Anon, 2014):
  1. Have a paper trail, make hardcopies of all transactions made.
  2. To prove legitimacy of all documents, make sure they are signed by all parties it concerns.
  3. Avoid miscommunication by asking for clarification on all instructions that have been delivered.
  4. Do not use acronyms, you are in a professional environment not a social one.
  5. Make use of headings.
  6. Cross - Reference all information that has been used.
  7. Install spyware on all company devices to ensure that the employees are using the internet to benefit the business.
Failure to meet these requirements will result in the following:
  1. First timing offenders of Digital Netiquette will be issued with written warnings in the form of an email. 
  2. If users continue to commit these offenses and not following the stipulations of Digital Netiquette, the next step would to limit the internet access, and will receive a second warning.
  3. If offenses are still committed users will have to attend a disciplinary hearing.
  4. If these offenses are further committed after the disciplinary hearing, users will be banned from having internet access and legal action will be taken form this point.
 
 (Anon,2013)
 
Anon, (2014). Netiquette Guide. [online] Internet-guide.co.uk. Available at: http://www.internet-guide.co.uk/netiquette-guide.html [Accessed 27 May 2016].
 
Anon, (2013). Digital Code of Conduct. [online] John Oliver Secondary School. Available at: http://go.vsb.bc.ca/schools/johnoliver/About/Pages/Digital-Code-of-Conduct.aspx [Accessed 27 May 2016].
 
 
 
 
 
 


Sunday 29 May 2016

DIGITAL RIGHTS AND RESPOSIBILITES

QUESTION 5:

Thinglink Image on the role of Digital Rights and Responsibilities

Anon, (2012). 5 Responsibilities That Come With Digital Citizenship. [online] Education.cu-portland.edu. Available at: http://education.cu-portland.edu/blog/tech-ed/responsibilities-that-come-with-digital-citizenship/ [Accessed 23 May 2016].

Anon, (n.d.). [online] teacing coyright. Available at: https://www.teachingcopyright.org/about [Accessed 23 May 2016].


Independent Institute of Education (2015) Digital Citizenship Module Manual 2015. South Africa

Isreal, R. (2014). THE, VALUES, RIGHTS AND RESPONSIBILITIES OF GLOBAL CITIZENSHIP | The Global Citizens' Initiative. [online] Theglobalcitizensinitiative.org. Available at: http://www.theglobalcitizensinitiative.org/global-citizenship-blog-may-2014/ [Accessed 23 May 2016].

Mackenzie, C., Rees, W. and Rodionova, T. (2013). Do Responsible Investment Indices Improve Corporate Social Responsibility? FTSE4Good's Impact on Environmental Management. Corporate Governance: An International Review, [online] 21(5), pp.495-512. Available at: https://rankingdigitalrights.org/project-documents/theory-and-strategy/ [Accessed 23 May 2016].


DIGITAL LAW

 
 
QUESTION 6:
 
 
thinglink online poster on the impacts of technology on society.

Hosale, S. (2016). 25 Negative Effects of Technology - RooGirl. [online] Roogirl.com. Available at: http://roogirl.com/25-negative-effects-of-technology/ [Accessed 20 May 2016].

DIGITAL SECURITY

 
QUESTION 7:TOP 5 SOUTH AFRICAN CYBER SECURITY RISKS.
 
 
 
Both globally and in South Africa the top 5 Cyber security risks seem to be (Ellyatt, 2015) 
1. Ransom-ware:
 is a type of malware that infects computer systems and then demands a random for its removal.
2.Cyber – Espionage:
the use of computer networks to gain access to confidential information especially the information held by governments and other organisations.

3. The Internet of Things:
is the term that describes a society where physical appliance such as homes and cars are connect to the internet and can then be accessed from one device or application (Ellyatt, 2015).

4. Cyber Theft:
the online stealing of financial or personal information for the use of fraud and other illegal activities (Web Finance, Inc, 2016).

5. Insecure Passwords:
popular, generic passwords that well used and easy to decipher.



    How users enable hackers with this information:

Hackers receive information by users are constantly giving their personal, confidential information to trusted financial institutions and are put at risk when giving this information. Due to hackers being able to duplicate the emails that are sent by these trusted financial institutes, leading users to believe that they are a legitimate organisation whom they can trust. This is also known a phishing or spoofing. (Anon, 2014)

Another way hackers gain information is by a scheme know as Buffer overflow. This enables them to gain customer data via online forms. Hackers are able to create forms that for example ask for simple details such as postal address and from there they can further derive you to fill out any other information that they need, since to the user these “forms” seem legitimate. (Anon, 2015)

Fault injection is another way that hackers your information without knowing it, by stealing your information whilst a user surfing the internet. Fault injection is one of the more complicated web hacking techniques where criminals research ways to infiltrate your source code and then try inputting different code to see if they can crash the system. An example would be a hacker using a database query that could erase content, or typing in a Web URL that delivers a worm into your network. (Anon, 2015)
User should never download free software as this is most prone to having viruses or giving hackers a doorway to your information. (Anon, 2015)

By not making use of the privacy on social media platforms such as facebook gives hackers unlimited access to your information which could lead to identity theft
(Writer, 2016).

Ways to avoid this (Weissman, 2015):

1. Install anti-virus soft and firewalls onto your device
2. Change passwords often
3.Delete emails from unknown sources
4.Check link locations
5. Use two-factor authentication
6. Beware of the Cloud and other similar storage spaces
7. Don’t share personal data over public wifi facilities


references:
Anon, (2014). Common Threats. [online] Getcybersafe.gc.ca. Available at: http://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx [Accessed 26 May 2016].
Anon, (2015). 5 Ways Hackers Gain Access To Your Data | My Digital Shield. [online] My Digital Shield. Available at: http://www.mydigitalshield.com/5-ways-hackers-gain-access-data/ [Accessed 26 May 2016].
Anon, (2016). Scareware Definition | Cybercrime.org.za | Safety & Security Guide. [online] Cybercrime.org.za. Available at: http://cybercrime.org.za/ransomware [Accessed 26 May 2016].
Ellyatt, H. (2015). Top 5 cybersecurity risks for 2015. [online] CNBC. Available at: http://www.cnbc.com/2014/12/19/top-5-cyber-security-risks-for-2015.html [Accessed 26 May 2016].
Web Finance, Inc, (2016). What is cybertheft? definition and meaning. [online] BusinessDictionary.com. Available at: http://www.businessdictionary.com/definition/cybertheft.html [Accessed 26 May 2016].
Weissman, C. (2015). 7 easy ways to avoid being hacked. [online] Business Insider. Available at: http://www.businessinsider.com/how-to-avoid-being-hacked-2015-4 [Accessed 26 May 2016].
Writer, C. (2016). How Hackers Can Steal Your Personal Information From Facebook. [online] Science.opposingviews.com. Available at: http://science.opposingviews.com/hackers-can-steal-personal-information-facebook-3381.html [Accessed 26 May 2016].





 







Friday 27 May 2016