Monday, 24 October 2016

References {POE}


Bibliography

Philip, J. 2013. Issues surrounding Digital Divide access in South Africa. < http://www.internetworldstates.com/digitaldivice > Accessed on: 11 October 2016.



Ewn.co.za. 2016. Meet Homo Naledi. Online. < http://ewn.co.za/Features/Naledi > [Accessed on: 17 October 2016].



EWN Online 2016. Who was Homo Naledi? <




Lee, B. 2015. Homo Naledi. Available:< http://https://www.wits.ac.za/.../homo-naledi/homo-naledi-our-new-human-relative.html. > Accessed on: 17 October 2016.

Skinner. 2014. Risks and benefits of social technologies. Online. < https://www.thinglink.com/scene/792253435863891970 > [Accessed on: 11 October 2016]





Learn the Net: Your Online Guide. Netiquette. [Online]. < http://www.learnthenet.com/learnabout/netiquette/ > [Accessed on: 11 October 2016].



Auburn University. Digital Citizenship: Netiquette. [Online]. < http://www.auburn.edu/citizenship/netiquette.html > [Accessed on: 11 October 2016]. 



The Independent Institute of Education. 2016. Digital Citizenship Module Manual, pp.89-90. Johannesburg: Unpublished.

Skinner. 2016. The potential impacts of Digital Technology on Society. Online. < www.thinglink.com/scene/793521169079730177 > [Accessed on: 11 October 2016]



Thomson, R. 2015. Digital Security. < http://www.digitalsecurity.com/2015/12/19/top-5-cyber-security-risks-for-2015.htlm > Accessed on: 19 October 2016

Question 8: Digital Health and Well Being {POE}

Creating a "Board and Pins" of at least 15 topics related to Digital Health.



Question 7: Digital Security {POE}


How users, enabled hackers obtain to the details more easily by providing known companies with our data and an overview how they can be avoided or mitigated.



2015’s to five (5) cybersecurity risks in South Africa

Hackers are able to exploit certain security flaws in the coding, in order to benefit themselves or for personal satisfaction. Hackers create systems such as:



1.    Phishing scams

Email phishing is a common web hacking technique. Hackers send mass emails which legitimately appear to be from bank or a payment, which requires one to very their account information.

Adware which creates an advert by using your previously viewed sites. This can also be linked with spyware which can memorize your password and a hacker can abuse this system.



2.    Password hacking

One of the easiest way to fall into a trap of being hacked, is when simply failing to change their password which can elapse between 30-60 days. Bots are created by hackers to distribute malware or even crack passwords.



3.    Downloading free software's

By downloading free software’s, you are potentially put your business at risks to malicious viruses or malware. This can link to ransomware which is created to corrupt and encrypt your files so you can't access them unless certain procedures are followed.



4.    Buffer overflow

Hackers use techniques to gain access to customers’ information using online forms. Modern subscription-based cloud security services have been put to help identity and avoid such attacks. However, even the rootkits are able to remotely control your device and thus can prove an incredibly useful tool to hackers.



5.    Fault injection

This technique involves hackers whom search ways to infiltrate one source and code to try inputting different code in an attempt to crash the system and this can cause viruses which is able to spread at an incredible rapid rate and corrupt your hard-drive.



An overview how they can be avoided or mitigated;

According to Thomson, 2015 stated that; the risks can be avoided first by installing anti-virus software's and update them weekly, they could also avoid these risks by securing their network connection, personal information and making use of strong passwords.



Users are able to avoid hackers by:
ë  Not downloading any unlicensed files.
ë  Use antimalware software which reduces the risk of any malware being downloaded.
ë  Password inscriptions which will make it harder for hackers to acquire your password.
ë  Deleting all browser cookies which will reduce the amount of information spyware is able to acquire if your device does get infected.
ë  Don't give out personal information by giving out personal information hackers are able to work out passwords and other information.

Question 6: Digital Law {POE}

Online Poster


Question 5: Digital Rights and Responsibilities {POE}


Thing-link image that representing the role of Digital Rights and Responsibilities for society, business and education.

Digital Rights and Responsibilities are the "privileges and freedom extended to all digital technology users, and the behavioral expectations that come with them" (Module Manual, 2016, p.95).



With every right there is also a responsibility. We may have the right to freedom of speech, but in turn it is our duty to use this responsibly. Digital Rights and Responsibilities is having the right and freedom to use all types of digital technology while using this technology it has to be in an acceptable and appropriate manner.


Images

Question 4: Digital Etiquette {POE}


Digital Code of conduct for education institutes



10 points of netiquette

þ  Don’t discriminate or criticize.

þ  Don’t use offensive language.

þ  Do not provide strangers with another user’s personal details without permission - keep it relevant and professional.

þ  Treat people the same way as you want to be treated, as you would face-to-face.

þ  Respect the time of others and do not abuse the power you have – use it correctly and be forgiving.

þ  Share expert knowledge; offer answers and help others where you can.

þ  Make yourself look good online and avoid wasting time with unnecessary comments and questions, lastly, avoid posting confidential information about yourself.

þ  Respect other people privacy and don’t interfere other people work.

þ  Always think before you write something online and post.

þ  Share information with others effectively.




How to enforce and manage this in my business?
I would manage this in my business by creating a confirmation letter for everyone to sign and confirm that they have read and understand the code of conduct and the set procedures and anyone who fails to apply and follow the code of conduct will face the punishment penalty and will have to go over through the procedure of hearing.


Enforce and Manage
• Each individual will be given this Code of Conduct to read through, sign and return to the head of the education institute.

• If failure to meet the Code of Conduct occurs, they will be given their signed Code of Conduct to read over again. Depending on the action, the necessary repercussions will be taken.

Penalties for Non-compliance
• Anyone who communicates inappropriately through messaging will be given a verbal warning. If it happens again he/she will receive a written warning. If the action is seen as harassment, it could lead to a court case or termination.

• If anyone fails to adhere to the amount of document sharing, especially if they are non-work related, connection to the internet will be terminated.

• Anyone with an issue helping someone less experienced online will be suspended for non-compliance to teamwork.
• If anyone’s personal information is shared without permission, that person will be labelled ‘un-trustworthy’ and may be expelled.

References
Learn the Net: Your Online Guide. Netiquette. [Online]. < http://www.learnthenet.com/learnabout/netiquette/ > [Accessed on: 11 October 2016].

Auburn University. Digital Citizenship: Netiquette. [Online]. < http://www.auburn.edu/citizenship/netiquette.html > [Accessed on: 11 October 2016]. 

The Independent Institute of Education. 2016. Digital Citizenship Module Manual, pp.89-90. Johannesburg: Unpublished.

Question 3: Digital Communication and Fluencies {POE}


The social economy: Unlocking value through social technologies, in this post outline the benefits and risks of social technologies for individuals, corporates and communities, however, the focus is on South Africa.



The social economy

Social Technologies refers to applying the used technologies for specific purposes especially social ones: to ease social procedures via social software and social hardware which might include the use of computers and information technology for governmental procedures.



Benefits of social technologies for individuals, corporate and communities
For individuals to benefit they will be able to send messages and by doing this they will be quickly connected, however, individuals will not lose out on any communication.
The space that they share allows cooperate to co-create content, coordinate joint projects and tasks. People work best and in full potential when they are in groups, sharing ideologies and allowing people build on each other’s ideas.



ë  Individuals and communities can connect with others and communicate effectively.

ë  Individuals and communities can share information as well as to access internet any-time and anywhere.

ë  Corporates can connect with their employees and communicate effectively, therefore they can also connect with their customers and share information.

ë  Corporates can increase their level of advertising and popularity of the business and sell their products and services online as an improvement of productivity by attracting new customers.



The benefit for communities is that communication has improved as modern technology has broadened the channels used in communication which can be video chat or electronic mail so this means the South African economy in communities can be able to communicate with friends and family located far away and can even Skype which is easy and people will communicate better.



Risk of social technologies for individuals, corporate and communities

The risk of social technologies for individuals corporate and communities is that South Africa will be faced with the increase in unemployment and also the world description weapons and will also face competency, risk of social technologies to communicate using Facebook people should be careful as to what they post online on their profiles. The risk of this is that when people get your personal information they might use it to stalk the person which may cause harm to the person.



ë  Giving out personal details could be a huge risk.

ë  People could use your personal information to commit crime and fraud.

ë  Connecting and communicating with people you don't know could be risky and dangerous.

ë  Management tools must be out in place to reduce the risks.

ë  Security tools must be put in place passwords and encryption of important data and information to avoid risks.


Question 2: Digital Literacy and information Fluency {POE}


Q.2.1 Information fluency skills to analyze the groundbreaking archeological findings (Homo Naledi) by Professor Lee Berger from Wits University.



Information Fluency

Information fluency can be described as skills needed not only to search, gather information and evaluate, but to create useful knowledge that will help to solve problems. The five (5) Information Fluency process are: Ask, Acquire, Analyze, Apply and Assess. The information fluency process may be used to analyze this groundbreaking archeological as follows;



Step 1: Ask

Relevant questions must be asked in order to receive relevant information. One you should ask about it is what does species fossils belongs to and how this new information could contribute to knowledge already acquired that relates to this species; relevant questions must be asked about the fossil.



Step 2: Acquire

Information is acquired by scientists leading the expectations. This is done by studying the fossil in a professional manner in order to acquire information such as how old the fossil is.



Step 3: Analyze

One must analyze the information which has been acquired in order to organize and arrange it. One must make the decision whether the information acquired about the fossil is trustworthy and if it can be used to make assumptions about the theory of evaluation.



Step 4: Apply

One must apply the information acquired. If the information can be used by scientists to further their studies in their human species.



Step 5: Assess

One must assess whether the process of analyzing the groundbreaking archeological findings could have been carried out effectively, for example by using more advanced technology to study the remains.



Facts about the Homo Naledi sapiens:

Ø  Homo Naledi has a small brain case.

Ø  The ribcage and shoulders and pelvis are also similar to the earlier Homo sapiens.

Ø  Homo Naledi looks more primitive and the teeth are more similar to apes.

Ø  The legs and feet of naledi indicate that the fossil was tall.

Ø  The measurements of the Homo Naledi sapiens brain were 1.5 meters tall 45 kilograms.



Additional Information

v  According to Lee, B. 2015 stated that scientists and researchers, led by Wits University Professor Lee Berger, believe they've unearthed a new species of human relative in the world’s richest hominid fossil site, the Cradle of Humankind.

v  Homo Naledi is a previously-unknown species of extinct hominid discovered within the Di-Naledi Chamber of the Rising Star cave system, Cradle of Humankind, South Africa by Professor Lee Berger.

v  This species is characterized by body mass and stature similar to small-bodied human populations but a small Endocrinal volume similar to Australopithecus.

v  The while primitive dentition is generally small and simple in occlusion morphology.

v  Homo Naledi exhibits a human like foot and lower limb, and these human like aspects are contrasted in the postprandial with a more primitive or Australopithecus-like trunk, shoulder, pelvis and proximal femur.



481 Words

Question 1 {POE}

 Q.1.1 Issues surrounding access awareness  on the ramifications of Digital Divide





Q.1.2 The techno-economic paradigm and how can one develop from this.
Techno-economic Paradigm refers to the change of technology, it analyses the structure of technology and the role in improving the economy through the application of accompanying. One can develop from this by making use of the application of accompanying techno-economic paradigm.

That capacity to transform other industries and activities results from the influence of its associated techno-economic paradigm, a best practice model for the most effective use of the new technologies within and beyond the new industries. The new industries of the revolution expand to become the engines of growth, for a long period while the techno-economic paradigm drives a vast reorganization and a widespread rise in productivity across the economy. However, technological revolution can more generally be defined as a major upheaval of the wealth-creating potential of the economy, opening a vast innovation opportunity space and providing a new set of associated generic technologies, infrastructures and organisational principles that can significantly increase the efficiency and effectiveness of all industries and activities.

Q.1.3 Electronic poster