Friday, 28 October 2016

question 6 poe

digital law

https://www.thinglink.com/scene/793772459907088384

digital security

question 7






THE TOP 5 CYBER-SECURITY RISKS IN 2015 IN S.A


  1. Ransom-ware,
  2. The Internet of Things
  3. Cyber-espionage
  4. Increase in cyber theft and
.5 insecure passwords
 

  1. Ransomware infects a computer and restricts the users access to it, a ransom is paid in order for user to be able to use their computer.
    The Internet of Things is when devices are connected to the internet which increase the risk of personal details being obtained.
    Cyber-espionage is when information is obtained through the internet for use by the government.
    Cyber theft is the stealing of financial information through the internet, such as credit card details.
    Insecure passwords are passwords which are easily obtainable based on the users tastes or preferences and whether the same password is used several times.

    Users are constantly providing financial institutions with confidential, personal, information and so are put at risk when exchanging this information.
    Users allow hackers to obtain these details by replying to emails which are not from the financial institutions itself. These emails are almost identical to the ones received form financial institutions and so users can be easily fooled.
    A way to prevent this from happening is to always check that the email received has a valid email address. This will allow the user to determine whether the email is legitimate or not.
    Another method used by hackers is creating a website that looks almost identical to the real one. User may believe that this website is legitimate and therefore enter personal details. Users can check the URL of the website to ensure that the website is indeed legitimate.
    Having a strong password is important as it protects most of our confidential information. Users often use unsuitable passwords that can be easily determined based on the consumers tastes and preferences. Users often reuse passwords for several accounts which puts them at risk.
    Hackers can send emails pretending ask personal questions while posing as a financial institution. This can be avoided by checking the email address of the email received.
    Not only can users be at risk on the internet but when receiving phone
(cnbc,2016).

Thursday, 27 October 2016

the social economy : unlockng values through social technology

question 3




Benefits and risks of social technologies


Previous studies on public attitudes toward emerging technologies have treated cognitive and affective influences on public opinion as distinct, with little attention to the possible interaction between the two. Directly addressing this issue, we argue that cognitive and affective factors not only have important separate effects on public attitudes but also work in tandem to produce effects. In particular, it may be that affective variables shape the impact of cognitions and vice versa. We use data from a national telephone survey to test this interactive model of decision making about emerging technologies. Our analyses show that emotional heuristics moderate the effect that knowledge about nanotechnology has on people's overall attitudes toward nanotechnology, with knowledge having a weaker effect on attitudes for people who do show strong emotional reactions to the topic. The implications of these findings for future research and policy making in this area are discussed.


 


Advantages:


• Facilitates open communication, leading to enhanced information discovery and delivery


.


• Allows employees to discuss ideas, post news, and ask questions and share links.


 


• Provides an opportunity to widen business contacts.


• Targets a wide audience, making it a useful and effective recruitment tool.


 


• Improves business reputation and client base with minimal use of advertising.


 


• Expands market research, implements marketing campaigns, delivers communications and directs interested people to specific websites.


 






Disadvantages:


 


  • · All SNs are time-consuming. Some teachers find SNs too daunting to tackle.
  •  
  • ·SNs can become addictive. They can take over your life, leaving little time for family and friends.
  •  
  • ·Knowing when to stop is crucial – try to switch off! Replication of themes from one SNto another is annoying. Students become obsessed in finding their teachers on FB and intrude in teachers ‘private lives. Privacy issues with FB AND Twitter– do not accept people you don’t know or protected accounts on Twitter.
  • ·Tweet deck often has technical problems
  • (future of working, 2016).





digital literacy and information fluency

question 2




Q2.1The Fluency Process is as Follows:


Ask
- When the finding (Homo Naledi) was  looked from the start there was many questions asked. If good questions are asked then they can receive good answers based on the evidence. Some of the questions that could be asked during this time could be "How can this fossils relate to the modern human", "How old is the fossil."

Acquire
This step includes determining where the information is; prioritizing the search strategy; skimming, scanning and scouring the resources; filtering through the results
In that case Professor Lee Berger and his people would had have to look back at the information that they had from the start and followed up on it. This would give the team an idea on what to look for.

Analyze
The results of the search will yield raw information and data that in turn needs to be analyzed, authenticated and arranged to make a cohesive picture.

Apply
In this step Professor Lee Berger and his team would have to use the knowledge they have leant into the real world problems they are faced with. They would have to put different ideas that they have acquired together and make sure they all make sense.  The knowledge that they have must be backed up with evidence to make their hypothesis concrete.


Assess
This when the user will look at the result of their application and the process they followed. It involves asking questions about the process used, the steps followed and the information that was obtained; reflecting on what went well and what could have been done better.
(IIE.2016.pg.50-51