DIGC5110 POE
Thursday, 26 May 2016
Q8- Pinterest
Question 8
Digital Health and Well Being
Pinterest link :https://za.pinterest.com/ashleighcrowe58/pins/
Q7 - Digital Security
According to Holly Ellyatt of CNBC, the top 5
cyber-security risks in 2015 in South Africa are:
1.
Ransomware
2.
The internet of things
3.
Cyber-espionage
4.
Increase in cyber theft
5.
Insecure passwords
How do hackers obtain our details?
Ransomware :” a type of malware which restricts access to the
computer system that it infects” (Ellyatt, 2015).Specifically targeting endpoints
that subscribe to cloud-based storage solutions such as Dropbox, Google Drive,
and OneDrive. Once the endpoint has been infected, the ransomware will attempt
to exploit the logged-on user's stored credentials to also infect backed-up
cloud storage data.
The Internet of Things:
“the connection of physical devices such as home appliances and cars to the
internet” (Ellyatt, 2015). One should always
be aware, when you are online, by checking what links you are clicking on and
what files you are downloading. It is
advised to rather download anti-virus software in order to protect yourself and
your computer containing its confidential information.
Cyber-Espionage:
this is when information is obtained through
the internet for use by the government which has become the weapon of choice
for them.
Cyber Theft: a new opportunity for hackers lies in when paying by
mobile and contactless payments, particularly if retailers do not store payment
data securely.
Insecure Passwords: Information for the hackers can be easily found online,
especially when sharing information over social media.
How can this be avoided or mitigated?
Make sure you log off of all your accounts once you
are finished on them.
Use different passwords for different
websites, use both capital and lowercase letters, you can also make use of
symbols and numbers.
Use anti-virus software.
Install an inclusive firewall program
that can pinpoint unauthorized programs attempting to transmit data other the
internet.
Ignore pop-ups.
Never open attachments (unless you’re really sure).
References
Top 5 cyber security risks
for 2015. [online] Available at http://www.cnbc.com/2014/12/19/top-5-cyber-security-risks-for-2015.html[Accessed
30 May 2016].
20 ways to keep your internet identity safe from hackers.
[online] Available at https://www.theguardian.com/technology/2013/may/12/20-ways-keep-internet-identity-safe [Accessed 30May
2016].
7 easy ways to avoid being hacked.2015. Business insider. [online].
Available at: http://www.businessinsider.com/how-to-avoid-being-hacked-2015-4[Accessed 30May 2016].
Q6 -Digital Law Poster
Poster link : https://www.thinglink.com/scene/793960795602944001
Print screen image of poster posted on thing link
Q5-Digital Rights and Responsibilities
Digital Right and Responsibility definition:
“Privileges and freedom extended to all digital technology users, and the behavioral expectations that come with them”-(Digital Citizenship module manual, 2016).
Q4 - Digital Etiquette
Digital Code of Conduct for Education Institutes
Acting Responsibly
I will demonstrate ethical behaviour in the digital world just as I would in the real world.
I
will use technology in an appropriate manner.
I
will make appropriate digital decisions by committing myself to a high standard
of conduct and procedure.
I
will NOT break any laws or rules dealing with the use of technology.
I
will follow the established rules surrounding technology and take
responsibility for my actions.
Acting
Respectfully
I
will respect myself and others through my actions.
I
will demonstrate respectful digital etiquette.
I
will not use technology in a harmful, degrading or inappropriate manner.
I will demonstrate
consideration of, and respect for, school and peer technological
resources and use
them appropriately.
I
will model good digital behaviour.
Acting
Safely
I
will act safely in the digital world to prevent disruption or harm to myself
and others.
I
will work to have a balanced, healthy lifestyle relationship with technology.
I
will protect myself and others by reporting digital abuse of people and
property.
I
will ensure the privacy of my own information.
10 Points of Netiquette
1. Remember the human.
2. Adhere to the same standards of
behaviour online that you follow in real life.
3. Know where you are in cyberspace and
act or discuss accordingly.
4. Respect other people’s time and
bandwidth.
5. Make yourself look good online.
6. Share expert knowledge, communicate
about subjects you have knowledge or are interested in.
7. Help keep flame wars under control.
8. Respect other people’s privacy.
9. Don’t abuse your power.
10. Be forgiving of other people’s
mistakes even online.
Penalties
Suspension or
expulsions for plagiarism of others work.
Disciplinary hearing.
Possible dismissal from your current
job.
Enforcing & managing in a business
environment
The digital code of conduct will be
displayed prominently in the workplace, also available on the intranet.
I
will implement workshops on Digital Etiquette and Digital Right and
Responsibilities.
All new employees are given a copy of the code of conduct and are to sign they will adhere to it and understand the consequences of non compliance.
All new employees are given a copy of the code of conduct and are to sign they will adhere to it and understand the consequences of non compliance.
It will be enforced by disciplinary
hearing leading to disciplinary measures including dismissal.
References
The
Chronicles of a Digital Citizen. (2015). Digital etiquette. [online] Available
at: https://pinkie13021580.wordpress.com/digital-etiquette/ [Accessed 30 May 2016].
John
Oliver secondary school. 2016. Digital code of conduct. [online]. Available
at: http://go.vsb.bc.ca/schools/johnoliver/About/Pages/Digital-Code-of-Conduct.aspx [Accessed 30 May
2016].
Independent Institute of Education. 2015. Digital Citizenship Module Manual. 1st Edition. Pretoria. pp 89 – 90.
Centre for Creative Media. 2016. [online image]. Available at http://centerforcreativemedia.com/index.php/how-to-creative-commons/ [Accessed 29th May 2016]
Q.3.1-The social economy :Unlocking through social technologies
The Social
Economy: Unlocking value through social technologies
There
are many benefits as well as risks associated with the use of social
technologies for individuals, corporates and communities.
Individuals
Benefits
Individuals benefit in a way that they can
use the internet to use for research, reading material.Able to communicate with distant relatives and friends over social media.
Able to access the latest news worldwide.
Risks
Understanding of the consequences of posting online.South African individuals tend to post personal details online such as location /cell numbers.
For corporate companies the benefits are that
the companies can expand awareness of their products or services that they have
produced and they can use technologies to keep in contact with their suppliers
or their customers.
Risks
of fraud and identify theft, therefore important for businesses to protect
their private information. The fact that 90 % of companies use technologies
that benefit, using the site LinkedIn.
Corporates: Social technologies can cause damage to a business’ image. This can happen
if an employee or a customer portrays a bad image of the business on social
media which can result in the loss of current and future customers of the
business. Social technologies also present the opportunity for hackers to
commit fraud as well as launch virus attacks.
Communicates
benefit in the way that social media is simple and real time way of
communicating with one another, example in my neighbourhood we have a whatsapp
group called “ Lakeside Alerts “ for updates and the mountain men themselves
are in it our security , alerting the community of robberies / theft and any dodge people walking about.
Q 2.1.Digital Literacy & Information Fluency
Application of Information Fluency
Information
Fluency is the “ability to unconsciously and intuitively interpret information
in all forms and formats in order to extract the essential knowledge, perceive
its meaning and significance, and use it to complete real –world tasks” (Churches,
Jukes &Crockett, 201, p.33).
The Information Fluency
Process:
Ask
Asking of good
questions
Who was Homo Naledi?
What are the
groundbreaking archaeological findings founded by Professor Lee Berger on the
Homo Naledi?
What is the significant about the ground-breaking
archaeological findings?
Acquire
I have
skimmed, scanned through the resources on the internet that is available and the
information was acquired at the following websites
http://ewn.co.za/Features/Naledi
Analyse
A team of
archaeologists led by Professor Lee Berger undertook the Rising Star Expedition
and they had made history by discovering and salvaging fossils of at least 15 individuals
from the Dinaledi Chamber, a discovery of a new species called Homo Naledi was
found. This fossil is a bit smaller and a lot older than we are. It has a
small skull and curved fingers, but in some ways very similar to humankind
(Eyewitness News, 2016). They have a tiny brain and broad shoulders for
climbing, their jawbone and teeth were very primitive but it other ways it
looks much like modern humans.
This involves
applying the findings and knowledge.
According to
the findings and information online Homo Naledi , could be traced to our roots
this suggesting that it could have had human characteristics both physical and
mental besides from just similar features.
The Dinaledi
chamber might have been used as a buriel ground, scientists are still trying to
figure out how Homo Naledi got into the cave with such a small entrance.
Assess
Research was
conducted and the information was extracted from good online sources, having
summarised the information to the most important facts about the Homo
Naledi
Bibliography
Independent Institute
of Education. 2016:50. Digital Citizenship Module Manual. 2nd
Edition. Pretoria.
National Geographic.
This face changes the human story. But how? 2016. [online].
Available at http://news.nationalgeographic.com/2015/09/150910-human-evolution-change/
[Accessed 29 May 2016].
Room, N. (2015). New Species of Human
Relative Discovered in South African Cave. [online] National Geographic
Society Press Room. Available at: http://press.nationalgeographic.com/2015/09/10/homo_naledi/
[Accessed 30May 2016].
EWN. Special
discoveries. 2016. [online]. Available at http://ewn.co.za/Features/Naledi [Accessed
29th May 2016]
Subscribe to:
Posts (Atom)