digital law
https://www.thinglink.com/scene/793772459907088384
Friday, 28 October 2016
digital security
question 7
THE TOP 5 CYBER-SECURITY RISKS IN 2015 IN S.A
- Ransom-ware,
- The Internet of Things
- Cyber-espionage
- Increase in cyber theft and
- Ransomware infects a computer and restricts the users access to it, a ransom is paid in order for user to be able to use their computer.
The Internet of Things is when devices are connected to the internet which increase the risk of personal details being obtained.
Cyber-espionage is when information is obtained through the internet for use by the government.
Cyber theft is the stealing of financial information through the internet, such as credit card details.
Insecure passwords are passwords which are easily obtainable based on the users tastes or preferences and whether the same password is used several times.
Users are constantly providing financial institutions with confidential, personal, information and so are put at risk when exchanging this information.
Users allow hackers to obtain these details by replying to emails which are not from the financial institutions itself. These emails are almost identical to the ones received form financial institutions and so users can be easily fooled.
A way to prevent this from happening is to always check that the email received has a valid email address. This will allow the user to determine whether the email is legitimate or not.
Another method used by hackers is creating a website that looks almost identical to the real one. User may believe that this website is legitimate and therefore enter personal details. Users can check the URL of the website to ensure that the website is indeed legitimate.
Having a strong password is important as it protects most of our confidential information. Users often use unsuitable passwords that can be easily determined based on the consumers tastes and preferences. Users often reuse passwords for several accounts which puts them at risk.
Hackers can send emails pretending ask personal questions while posing as a financial institution. This can be avoided by checking the email address of the email received.
Not only can users be at risk on the internet but when receiving phone
Thursday, 27 October 2016
the social economy : unlockng values through social technology
question 3
Benefits and risks of social
technologies
Previous studies on public
attitudes toward emerging technologies have treated cognitive and affective
influences on public opinion as distinct, with little attention to the possible
interaction between the two. Directly addressing this issue, we argue that
cognitive and affective factors not only have important separate effects on public
attitudes but also work in tandem to produce effects. In particular, it may be
that affective variables shape the impact of cognitions and vice versa. We use
data from a national telephone survey to test this interactive model of
decision making about emerging technologies. Our analyses show that emotional
heuristics moderate the effect that knowledge about nanotechnology has on
people's overall attitudes toward nanotechnology, with knowledge having a
weaker effect on attitudes for people who do show strong emotional reactions to
the topic. The implications of these findings for future research and policy
making in this area are discussed.
Advantages:
• Facilitates open communication,
leading to enhanced information discovery and delivery
.
• Allows employees to discuss
ideas, post news, and ask questions and share links.
• Provides an opportunity to widen
business contacts.
• Targets a wide audience, making
it a useful and effective recruitment tool.
• Improves business reputation and
client base with minimal use of advertising.
• Expands market research,
implements marketing campaigns, delivers communications and directs interested
people to specific websites.
Disadvantages:
- · All SNs are time-consuming. Some teachers find SNs too daunting to tackle.
- ·SNs can become addictive. They can take over your life, leaving little time for family and friends.
- ·Knowing when to stop is crucial – try to switch off! Replication of themes from one SNto another is annoying. Students become obsessed in finding their teachers on FB and intrude in teachers ‘private lives. Privacy issues with FB AND Twitter– do not accept people you don’t know or protected accounts on Twitter.
- ·Tweet deck often has technical problems
- (future of working, 2016).
digital literacy and information fluency
question 2
Acquire
This step includes determining where the information is; prioritizing the search strategy; skimming, scanning and scouring the resources; filtering through the results In that case Professor Lee Berger and his people would had have to look back at the information that they had from the start and followed up on it. This would give the team an idea on what to look for.
Analyze
The results of the search will yield raw information and data that in turn needs to be analyzed, authenticated and arranged to make a cohesive picture.
Apply
In this step Professor Lee Berger and his team would have to use the knowledge they have leant into the real world problems they are faced with. They would have to put different ideas that they have acquired together and make sure they all make sense. The knowledge that they have must be backed up with evidence to make their hypothesis concrete.
Assess
This when the user will look at the result of their application and the process they followed. It involves asking questions about the process used, the steps followed and the information that was obtained; reflecting on what went well and what could have been done better.
(IIE.2016.pg.50-51
Q2.1The Fluency Process is as Follows:
Ask
- When the finding (Homo Naledi) was looked from the start there was many questions
asked. If good questions are asked then they can receive good answers based on
the evidence. Some of the questions that could be asked during this time could
be "How can this fossils relate to the modern human", "How old
is the fossil."
Acquire
This step includes determining where the information is; prioritizing the search strategy; skimming, scanning and scouring the resources; filtering through the results In that case Professor Lee Berger and his people would had have to look back at the information that they had from the start and followed up on it. This would give the team an idea on what to look for.
Analyze
The results of the search will yield raw information and data that in turn needs to be analyzed, authenticated and arranged to make a cohesive picture.
Apply
In this step Professor Lee Berger and his team would have to use the knowledge they have leant into the real world problems they are faced with. They would have to put different ideas that they have acquired together and make sure they all make sense. The knowledge that they have must be backed up with evidence to make their hypothesis concrete.
Assess
This when the user will look at the result of their application and the process they followed. It involves asking questions about the process used, the steps followed and the information that was obtained; reflecting on what went well and what could have been done better.
(IIE.2016.pg.50-51
Subscribe to:
Posts (Atom)