Tuesday, 1 November 2016

reference list

reference
cnbc.2016.[online].available at:http://www.cnbc.com/2014/12/top-5-cyber-security-risk.2015.html[accesed 23.october 2016]

future of working.2016.[online]available at:http://future of working.com/advanatgae-of-social-networking/[accesed 23 october 2016]

 Independentinstitution of education (2016).digital citizenship: module manual.1stedition.iie


Friday, 28 October 2016

question 6 poe

digital law

https://www.thinglink.com/scene/793772459907088384

digital security

question 7






THE TOP 5 CYBER-SECURITY RISKS IN 2015 IN S.A


  1. Ransom-ware,
  2. The Internet of Things
  3. Cyber-espionage
  4. Increase in cyber theft and
.5 insecure passwords
 

  1. Ransomware infects a computer and restricts the users access to it, a ransom is paid in order for user to be able to use their computer.
    The Internet of Things is when devices are connected to the internet which increase the risk of personal details being obtained.
    Cyber-espionage is when information is obtained through the internet for use by the government.
    Cyber theft is the stealing of financial information through the internet, such as credit card details.
    Insecure passwords are passwords which are easily obtainable based on the users tastes or preferences and whether the same password is used several times.

    Users are constantly providing financial institutions with confidential, personal, information and so are put at risk when exchanging this information.
    Users allow hackers to obtain these details by replying to emails which are not from the financial institutions itself. These emails are almost identical to the ones received form financial institutions and so users can be easily fooled.
    A way to prevent this from happening is to always check that the email received has a valid email address. This will allow the user to determine whether the email is legitimate or not.
    Another method used by hackers is creating a website that looks almost identical to the real one. User may believe that this website is legitimate and therefore enter personal details. Users can check the URL of the website to ensure that the website is indeed legitimate.
    Having a strong password is important as it protects most of our confidential information. Users often use unsuitable passwords that can be easily determined based on the consumers tastes and preferences. Users often reuse passwords for several accounts which puts them at risk.
    Hackers can send emails pretending ask personal questions while posing as a financial institution. This can be avoided by checking the email address of the email received.
    Not only can users be at risk on the internet but when receiving phone
(cnbc,2016).

Thursday, 27 October 2016

the social economy : unlockng values through social technology

question 3




Benefits and risks of social technologies


Previous studies on public attitudes toward emerging technologies have treated cognitive and affective influences on public opinion as distinct, with little attention to the possible interaction between the two. Directly addressing this issue, we argue that cognitive and affective factors not only have important separate effects on public attitudes but also work in tandem to produce effects. In particular, it may be that affective variables shape the impact of cognitions and vice versa. We use data from a national telephone survey to test this interactive model of decision making about emerging technologies. Our analyses show that emotional heuristics moderate the effect that knowledge about nanotechnology has on people's overall attitudes toward nanotechnology, with knowledge having a weaker effect on attitudes for people who do show strong emotional reactions to the topic. The implications of these findings for future research and policy making in this area are discussed.


 


Advantages:


• Facilitates open communication, leading to enhanced information discovery and delivery


.


• Allows employees to discuss ideas, post news, and ask questions and share links.


 


• Provides an opportunity to widen business contacts.


• Targets a wide audience, making it a useful and effective recruitment tool.


 


• Improves business reputation and client base with minimal use of advertising.


 


• Expands market research, implements marketing campaigns, delivers communications and directs interested people to specific websites.


 






Disadvantages:


 


  • · All SNs are time-consuming. Some teachers find SNs too daunting to tackle.
  •  
  • ·SNs can become addictive. They can take over your life, leaving little time for family and friends.
  •  
  • ·Knowing when to stop is crucial – try to switch off! Replication of themes from one SNto another is annoying. Students become obsessed in finding their teachers on FB and intrude in teachers ‘private lives. Privacy issues with FB AND Twitter– do not accept people you don’t know or protected accounts on Twitter.
  • ·Tweet deck often has technical problems
  • (future of working, 2016).





digital literacy and information fluency

question 2




Q2.1The Fluency Process is as Follows:


Ask
- When the finding (Homo Naledi) was  looked from the start there was many questions asked. If good questions are asked then they can receive good answers based on the evidence. Some of the questions that could be asked during this time could be "How can this fossils relate to the modern human", "How old is the fossil."

Acquire
This step includes determining where the information is; prioritizing the search strategy; skimming, scanning and scouring the resources; filtering through the results
In that case Professor Lee Berger and his people would had have to look back at the information that they had from the start and followed up on it. This would give the team an idea on what to look for.

Analyze
The results of the search will yield raw information and data that in turn needs to be analyzed, authenticated and arranged to make a cohesive picture.

Apply
In this step Professor Lee Berger and his team would have to use the knowledge they have leant into the real world problems they are faced with. They would have to put different ideas that they have acquired together and make sure they all make sense.  The knowledge that they have must be backed up with evidence to make their hypothesis concrete.


Assess
This when the user will look at the result of their application and the process they followed. It involves asking questions about the process used, the steps followed and the information that was obtained; reflecting on what went well and what could have been done better.
(IIE.2016.pg.50-51





Monday, 19 September 2016

digital bill of rights


5.2 digital bill of rights for the internet

Digital citizens have the right to freedom of race, sex colour and religion, no  discrimination
Digital citizen have the opinion of anything they see online
Digital citizens have the right to be innocent  until proven guilty of any internet crime
They have the right  to access free internet in every location any time
Digital citizens also have the right to privacy while they browse the internet and social media sites are obliged to ensure the confidentiality of their users
They have the rights to express themselves in online forums and social media platforms
Again they have the rights to online education
(big think,2016).

reference


Independent institution of education (2016).digital citizenship: module manual.1st edition.iie

Digital citizenship using technology appropriately.2016.[online].available at :www.digitalcitizenship.net/nine_elements.html[accesed 10 September 2016]

Anon.2016.[online].available at:www.forbes.com/sites/bernardmarr/2015/08/17/3-ways-the-internet-of-things-will-change-everything-business[accesed 10 september]

Investopedia.2016.[online].available at:http//www.oxforddictionary.com/browse/English/social-capital-digital-divide[accsed 1o September 2016]

Big think.2016.[online].available at:bigthink.com/in;their;own;words/the-internet-bill-of-rights[accesed 10 September 2016]

Saturday, 17 September 2016

Independent Institute of Education (2016). Digital Citizenship: Module Manual. 1st edition. Johannesburg; IIE
Rape Crisis Online (2016). Rape in South Africa{accesed 14 September 2016}

petition of digital rights


Q.5.1.Petition of digital rights

The world is moving forward and you are standing still. Depriving people of their right to digital citizenship is unacceptable .For your nation to move forward everyone has to be on the same level of development and due to the fact that you are against development your journey downhill due relatively soon.


My petition is here to assist you in making your country a better place while contributing to your riches simultaneously.

Name: keabetswe Ratlhagane

DATE: 16 September 2016

NATION : SOUTH AFRICA

SIGNATURE :K.Ratlhagane

 

Online etiquette has become important part of our social and working lives. List and describe inappropriate digital conduct and the effects on society. Find two relevant articles or case studies and post these on your blog.


Question 4
Digital Etiquette:
The following are examples of inappropriate digital conduct
  • Answering phone calls or texting while in a meeting or class (IIE 2016: 70).
    Impact: Unprofessional behaviour leads to failure and miscommunication.
  • Streaming inappropriate content in public (IIE 2016: 70).
    Impact: social reputation is jeopardized.
  • Utilising institutional computers for non-institutional purposes (IIE 2016: 70).
    Impact: become distracted and inevitably fail the module/semester.
  • Using company phones to make calls that aren’t work-related (IIE 2016: 70).
    Impact: become less productive in the workplace.
  • Inappropriate use of company assets (IIE 2016: 70
MORE EXAMPLES OF POOR DIGITAL
ETIQUETTE
• Sharing inappropriate images
or content
• Spamming, unsolicited email
messages
•...

Gardner (1983) identified several aspects of intelligence. List any four and explain the importance of these levels with regard to the business context today and the impact of technology.


Q 3.2

Linguistic- verbal

This people are good with words all  written and spoken, they are also talented in remembering written and spoken information. they are also good at explaining thing(iie, 2016:73)

This level of intelligence can be used in marketing sales to make profit in a business

Technology – they can use it in the social media marketing y that they can make good business.

Bodily kinesthetic

This are people who are blessed in movement such as dancing, sports and creating objects with their hands if they do the more they remember instead of listening and seeing(iie, 2016:73)

This can be used in technology in the field  of physiology.

They can use they skill in the marketing department where manufacturing is involved, whereby labour takes place.

INTERPERSONAL

This is the ability to understand feelings of other people and their intensions.they are also good in seeing at a different perspectives. (iie, 2016:73)

It is important to business sometimes very good business ideas are not pitched correctly ,in this matter the person with power will still be able to see the value of the idea due to the presence of specific trait

Local mathematical intelligence

This ability people enjoy working with complex situations and fimding solutions there after(iie, 2016:73)

INTERNET OF THINGS


Q3 .1

This is the idea of linking up any device with an on and off switch to the internet. This contains everything from the cellphone, light bulbs, headphones and anything that has the on and off switch. Will be considered as the internet of things The internet of things basically connects. (anon,2016).

How the internet of thing will impact the future business it will allow companies to make smarter products, change the model of the business. Again business can have less stuff, logistic expense and electricity bills by controlling their physical asserts such as light switches, electrical gates. it can also impact the society by enabling the user to monitor, update and control his/her electronic devices online.it is also cost efficient because it encourages the user to to update his or her software devices not having to purchase the new electronic hardware.

POWER POINT

https://drive.google.com/file/d/0Bwy5GcCyHKssb2syMm1XQzE4b0k/view?usp=sharing

How does the digital divide impact on social capital, and what are the ramifications thereof?


Q 1.2 Digital divide- it is the gulf between people who have more access to internet and those who don’t have it at all.(dictionary.com,2016).

Social capital-refers to network of connection between people who stay and work in a particular society to work effectively. (investopedia, 2016).

Digital divide can impact social capital because this days many people own very expensive phones they are able to access the internet very easily. Not forgetting that the are some who do not have the access to technology. Given the importance of being socially active online, it is clear that the digital divide will impact people being able to control their social capital, which can results in them being able to access data, information  and knowledge that could help them with furthering themselves economically.

RAPE-THE COLD HARD FACTS


Q 2.2 according to the chronicle of digital citizenship(2016) in solution fluency we need to” identity the problem find the solution , evaluate the process, and give the outcomes”

Defining                             

South Africa is being said to be the rape capital of the world by Interpol because rape and social abuse against women and children are well known incidents in south Africa women and children are being raped, this is a very big issue for south africa, the huge part of it is people do not report the cases they suffer silently.

Evaluate

Here we need to discover when the incident of rape started and what are the cause of it .women are the most victims and men are the perpetrators because men have more power than women and they take advantage of that. Mostly people who are victims are young girls who usually likes to wear tied clothes and mini dresses which are way to easy to undress .

Solution

This rape problem must be solved simply by making sure that all the rapist pay for what they committed. So that potential rapist must be aware that if they rape the will be price to pay, also they should be special talks at schools and communities on how they should prevent themselves from getting raped and the guidelines of what should be done if one got raped . Sustainable support groups for rape victims must be developed

Deliver

All the information must be delivered to the police forum.