Thursday 26 May 2016

Q8- Pinterest


Question 8

Digital Health and Well Being

Pinterest link :https://za.pinterest.com/ashleighcrowe58/pins/






Q7 - Digital Security



According to Holly Ellyatt of CNBC, the top 5 cyber-security risks in 2015 in South Africa are:

1.      Ransomware

2.      The internet of things

3.      Cyber-espionage

4.      Increase in cyber theft

5.      Insecure passwords


How do hackers obtain our details?

Ransomware :” a type of malware which restricts access to the computer system that it infects” (Ellyatt, 2015).Specifically targeting endpoints that subscribe to cloud-based storage solutions such as Dropbox, Google Drive, and OneDrive. Once the endpoint has been infected, the ransomware will attempt to exploit the logged-on user's stored credentials to also infect backed-up cloud storage data.

The Internet of Things: “the connection of physical devices such as home appliances and cars to the internet” (Ellyatt, 2015). One should always be aware, when you are online, by checking what links you are clicking on and what files you are downloading.  It is advised to rather download anti-virus software in order to protect yourself and your computer containing its confidential information.

Cyber-Espionage: this is when information is obtained through the internet for use by the government which has become the weapon of choice for them.

Cyber Theft: a new opportunity for hackers lies in when paying by mobile and contactless payments, particularly if retailers do not store payment data securely.

Insecure Passwords: Information for the hackers can be easily found online, especially when sharing information over social media.

How can this be avoided or mitigated?
Make sure you log off of all your accounts once you are finished on them.
Use different passwords for different websites, use both capital and lowercase letters, you can also make use of symbols and numbers.
Use anti-virus software.
Install an inclusive firewall program that can pinpoint unauthorized programs attempting to transmit data other the internet.
Ignore pop-ups.
Never open attachments (unless you’re really sure).
References
Top 5 cyber security risks for 2015. [online] Available at http://www.cnbc.com/2014/12/19/top-5-cyber-security-risks-for-2015.html[Accessed 30 May 2016].
20 ways to keep your internet identity safe from hackers. [online] Available at https://www.theguardian.com/technology/2013/may/12/20-ways-keep-internet-identity-safe [Accessed 30May 2016]. 
7 easy ways to avoid being hacked.2015. Business insider. [online]. Available at: http://www.businessinsider.com/how-to-avoid-being-hacked-2015-4[Accessed 30May 2016]. 



Q6 -Digital Law Poster


Poster link : https://www.thinglink.com/scene/793960795602944001

Print screen image of poster posted on thing link



Q5-Digital Rights and Responsibilities


Digital Right and Responsibility definition:

“Privileges and freedom extended to all digital technology users, and the behavioral expectations that come with them”-(Digital Citizenship module manual, 2016).





Q4 - Digital Etiquette


Digital Code of Conduct for Education Institutes

Acting Responsibly

I will demonstrate ethical behaviour in the digital world just as I would in the real world.
I will use technology in an appropriate manner.
I will make appropriate digital decisions by committing myself to a high standard of conduct and procedure.
I will NOT break any laws or rules dealing with the use of technology.
I will follow the established rules surrounding technology and take responsibility for my actions.


Acting Respectfully

I will respect myself and others through my actions.
I will demonstrate respectful digital etiquette.
I will not use technology in a harmful, degrading or inappropriate manner.
I will demonstrate consideration of, and respect for, school and peer technological
resources and use them appropriately.
I will model good digital behaviour.

Acting Safely

I will act safely in the digital world to prevent disruption or harm to myself and others.
I will work to have a balanced, healthy lifestyle relationship with technology.
I will protect myself and others by reporting digital abuse of people and property.
I will ensure the privacy of my own information.

10 Points of Netiquette
1. Remember the human.
2. Adhere to the same standards of behaviour online that you follow in real life.

3. Know where you are in cyberspace and act or discuss accordingly.

4. Respect other people’s time and bandwidth.
5. Make yourself look good online.

6. Share expert knowledge, communicate about subjects you have knowledge or are interested in.
7. Help keep flame wars under control.

8. Respect other people’s privacy.
9. Don’t abuse your power.

10. Be forgiving of other people’s mistakes even online.

Penalties

Suspension or expulsions for plagiarism of others work.

Disciplinary hearing.
Possible dismissal from your current job.

Enforcing & managing in a business environment
The digital code of conduct will be displayed prominently in the workplace, also available on the intranet.
I will implement workshops on Digital Etiquette and Digital Right and Responsibilities.

All new employees are given a copy of the code of conduct and are to sign they will adhere to it and understand the consequences of non compliance.

It will be enforced by disciplinary hearing leading to disciplinary measures including dismissal.

References
The Chronicles of a Digital Citizen. (2015). Digital etiquette. [online] Available at: https://pinkie13021580.wordpress.com/digital-etiquette/  [Accessed 30 May 2016].

John Oliver secondary school. 2016. Digital code of conduct. [online]. Available at: http://go.vsb.bc.ca/schools/johnoliver/About/Pages/Digital-Code-of-Conduct.aspx [Accessed 30 May 2016].      

Independent Institute of Education. 2015. Digital Citizenship Module Manual. 1st Edition. Pretoria. pp 89 – 90.

Centre for Creative Media. 2016. [online image]. Available at http://centerforcreativemedia.com/index.php/how-to-creative-commons/ [Accessed 29th May 2016]


Q.3.1-The social economy :Unlocking through social technologies


The Social Economy: Unlocking value through social technologies

There are many benefits as well as risks associated with the use of social technologies for individuals, corporates and communities.

Individuals

Benefits
Individuals benefit in a way that they can use the internet to use for research, reading material.
Able to communicate with distant relatives and friends over social media.
Able to access the latest news worldwide.


Risks
Understanding of the consequences of posting online.
 South African individuals tend to post personal details online such as location /cell numbers.

For corporate companies the benefits are that the companies can expand awareness of their products or services that they have produced and they can use technologies to keep in contact with their suppliers or their customers.

Risks of fraud and identify theft, therefore important for businesses to protect their private information. The fact that 90 % of companies use technologies that benefit, using the site LinkedIn.

Corporates: Social technologies can cause damage to a business’ image. This can happen if an employee or a customer portrays a bad image of the business on social media which can result in the loss of current and future customers of the business. Social technologies also present the opportunity for hackers to commit fraud as well as launch virus attacks.

Communicates benefit in the way that social media is simple and real time way of communicating with one another, example in my neighbourhood we have a whatsapp group called “ Lakeside Alerts “ for updates and the mountain men themselves are in it our security , alerting the community of robberies  / theft and any dodge people walking about.


Q 2.1.Digital Literacy & Information Fluency


Application of Information Fluency

Information Fluency is the “ability to unconsciously and intuitively interpret information in all forms and formats in order to extract the essential knowledge, perceive its meaning and significance, and use it to complete real –world tasks” (Churches, Jukes &Crockett, 201, p.33).


The Information Fluency Process:


Ask

Asking of good questions

Who was Homo Naledi?

What are the groundbreaking archaeological findings founded by Professor Lee Berger on the Homo Naledi?

What is the significant about the ground-breaking archaeological findings?


Acquire

I have skimmed, scanned through the resources on the internet that is available and the information was acquired at the following websites


http://ewn.co.za/Features/Naledi



Analyse

A team of archaeologists led by Professor Lee Berger undertook the Rising Star Expedition and they had made history by discovering and salvaging fossils of at least 15 individuals from the Dinaledi Chamber, a discovery of a new species called Homo Naledi was found. This fossil is a bit smaller and a lot older than we are.  It has a small skull and curved fingers, but in some ways very similar to humankind (Eyewitness News, 2016).  They have a tiny brain and broad shoulders for climbing, their jawbone and teeth were very primitive but it other ways it looks much like modern humans. 


Apply


This involves applying the findings and knowledge.

According to the findings and information online Homo Naledi , could be traced to our roots this suggesting that it could have had human characteristics both physical and mental besides from just similar features.

The Dinaledi chamber might have been used as a buriel ground, scientists are still trying to figure out how Homo Naledi got into the cave with such a small entrance.



Assess

Research was conducted and the information was extracted from good online sources, having summarised the information to the most important facts about the Homo Naledi


Bibliography

Independent Institute of Education. 2016:50. Digital Citizenship Module Manual. 2nd Edition. Pretoria.

National Geographic. This face changes the human story.  But how?  2016. [online]. Available at http://news.nationalgeographic.com/2015/09/150910-human-evolution-change/ [Accessed 29 May 2016]. 

Room, N. (2015). New Species of Human Relative Discovered in South African Cave. [online] National Geographic Society Press Room. Available at: http://press.nationalgeographic.com/2015/09/10/homo_naledi/ [Accessed 30May 2016].

EWN. Special discoveries. 2016. [online]. Available at http://ewn.co.za/Features/Naledi [Accessed 29th May 2016]