https://www.pinterest.com/masegomosito/digital-health-and-well-being/?etslf=3309&eq=digital%20health%20and%20well%20being
16006017-POE DIGC5110
Monday, 7 November 2016
Sunday, 6 November 2016
Q.3.1 Social Technlogies include a broad range of applications that can be used both by consumers and enterprises. These include, blogs, social networks, social gaming, discussion forums, wikis, and crowd sourcing to mention but a few (McKinsey and Company, 2012)
The advantage and disadvantages of social technology with an
everyday person
Advantage’s
|
Disadvantages
|
It allows people to stay connected all the time
|
People end up wasting the social network and it will
be slow
|
Using the password to protect your details and to
ensure your safety
|
By using easy password people can hack your account, have your details
and use them wrongfully
|
You can say what’s on your mind and be free as
you know that you are save and protected
|
It can ruin your reputation when 6you speak your
mind and you say inappropriate things
|
Easy to find out new information online using the
laptops, tablets and phones on the go
|
It can make inappropriate books to be online to search for the things
that are not good.
|
Advantages and disadvantages for the corporate’s
Advantages
|
Disadvantages
|
Create a name and image for your company.
|
Bad information and post can be posted and mentioned
about your company
|
People can follow you online and follow your
online website
|
The private life may be exposed and find bad information about you
|
More people might want to invest in your company because
of people passing the message using the social network
|
Many people ca hack into your phone or laptop if u
left then unlocked and when you use easy passwords
|
Advantages and disadvantages of communities
Advantages
|
Disadvantages
|
It can create job employment opportunities
|
Many people start to demand too much on social
medias and networks
|
It can make the community aware about what is
going on around them and make them safe
|
It can also be negative and bring criminals in a community because
they know everything about the surroundings and easy for them to attack
|
Reference
Skinner (2014)(Risks and benefits of social technologies), Retrieved from http://www.slideshare.net/norwiz/benefits-and-risks-of-social-technologies
Skinner (2014)(Risks and benefits of social technologies), Retrieved from http://www.slideshare.net/norwiz/benefits-and-risks-of-social-technologies
Q.7.1 Digital Security
The Top 5 cybersecurity risks in 2015 are:
- Ransomware,
- The Internet of Things
- Cyber-espionage
- Increase in cyber theft and
- Insecure passwords
Ransomware - a type of malware which restricts access to the computer system that it infects –will become increasingly sophisticated in its methods and targets, experts at McAfee Labs warned. infects a computer and restricts the users access to it, a ransom is paid in order for user to be able to use their computer.
The Internet of Things -is when devices are connected to the internet which increase the risk of personal details being obtained. Jamison Nesbitt, founder of Cyber Senate, a community of global cybersecurity business leaders, echoed experts' beliefs who said that the IoT is "the main cybersecurity risk for 2015." "The IoT presents unique security challenges in terms of the number of connected devices present."
Cyber-espionage -is when information is obtained through the internet for use by the government. As Nesbitt said, "the next world war will be fought on a keyboard," and we should expect cyber espionage attacks to increase in frequency in 2015, McAfee's "2015 Threat Predictions" report warned.
Cyber theft-is the stealing of financial information through the internet, such as credit card details."Although this would require cyber criminals to target individual cards and wouldn't result in large scale breaches or theft like we have seen in the U.S.,the payment technology used won't protect against retailers who aren't storing payment card data securely, and they will still need to be vigilant in protecting stored data," Candid Wüest, threat researcher at Symantec Security Response, said.
Insecure passwords- Easy-to-crack passwords will continue to be a big risk in 2015, analysts said. "Weaknesses of passwords are known, but still lead to many of the high-profile attacks such as the recent iCloud attack," Symantec's Sian John said, that they are passwords which are easily obtainable based on the users tastes or preferences and whether the same password is used several times/.
Methods to prevent hackers to hack your account
A way to prevent this from happening is to always check that the email received has a valid email address. This will allow the user to determine whether the email is legitimate or not.
Another method used by hackers is creating a website that looks almost identical to the real one. User may believe that this website is legitimate and therefore enter personal details. Users can check the URL of the website to ensupre that the website is indeed legitimate.
Having a strong password is important as it protects most of our confidential information. Users often use unsuitable passwords that can be easily determined based on the consumers tastes and preferences. Users often reuse passwords for several accounts which puts them at risk.
Reference
Photography, Z., Images, G. and Ellyatt, H. (2015) Top 5
cybersecurity risks for 2015. Available at:
http://www.cnbc.com/2014/12/19/top-5-cyber-security-risks-for-2015.html
(Accessed: 06 November 2016).
Sieber, T. (2011) 9 ways to prevent identity theft by
computer hackers. Available at: http://www.makeuseof.com/tag/9-ways-prevent-identity-theft-computer-hackers-2/
(Accessed: 06 November 2016)
Q4.1 Create a Digital Code of Conduct for education institutes. Please think of how you would reinforce and manage it, include this into your ‘Code of Conduct’. This would be a guideline for the institutes that they can then adapt to their specific requirements.
10 Points of netiquette
- Showing respect to the lectures in and out the class room
- Treating people the same way u want to be treated.
- Be forgiving and listen for what others are saying.
- Use the common language that all can understand and agree on that
- Do don’t criticize or discriminate others about their background.
- Always think before you say anything.
- Following all the instruction the way they are told.
- Be in a save area and feel comfortable if not move to the space that is save for you
- Be part of the team play or perform your role as a team player
- Be honest to yourself so that you can be honest to others
Penalties for failing meeting this
- For treating others in a bed manner and using strong language you will be expelled.
- Not respecting time to attend the lectures lesson the lecture have the right to make you stay outside for an hour or not to return until the next session
- By not listening and using things like computers or school resource with unrespect will for the computer and internet the IT department have the right the disable your account and not to switch it on until you tell the truth and apologies.
- For not being hornet to yourself you will end up with wrong people that will make you do wrong things and skip class and for that you won’t be able to write exams because you won’t qualify for them because you don’t attend classes and you will fail.
Q.2.1 Use information fluency skills to analyze the groundbreaking archeological findings (Homo Naledi) by Professor Lee Berger from Wits University. Use the information fluency process, ask, acquire, analyse, apply and assess to dissect the matter. In your discussion highlight the significance of this finding Use a minimum of 300 words Create a separate page for your findings on the blog
The
information fluency process involves the following:
Ask, Acquire, Analyse, Apply and Asses.
Regarding the findings by professor Lee Berger, from Wits University
ASK-This involves asking questions like where, when, who, what and why. to answer these
"While searching in a place later called Malapa, some ten miles from Rising Star, he and his nine-year-old son, Matthew, found some hominin fossils poking out of hunks of dolomite." (Shreeve, National Geographic). This was in 2008, Tucker and Hunter who worked for Berger were the folks who made the recent findings. "There were bones everywhere. The cavers first thought they must be modern. They weren’t stone heavy, like most fossils, nor were they encased in stone—they were just lying about on the surface, as if someone had tossed them in. They noticed a piece of a lower jaw, with teeth intact; it looked human." (Shreeve, National Geographic).
ACQUIRE- this involves acquiring accurate information about the findings. "There were some 1,550 specimens in all, representing at least 15 individuals. Skulls. Jaws. Ribs. Dozens of teeth. A nearly complete foot. A hand, virtually every bone intact, arranged as in life. Minuscule bones of the inner ear. Elderly adults. Juveniles. Infants, identified by their thimble-size vertebrae. Parts of the skeletons looked astonishingly modern. But others were just as astonishingly primitive—in some cases, even more apelike than the Australopithecus. “We’ve found a most remarkable creature,” Berger said. " (Shreeve, National Geographic)
ANALYSE- this involves organizing and summarizing the topics so that the main points are focused on. basically, the main points focused on in the story according to the National geographic are:
Regarding the findings by professor Lee Berger, from Wits University
ASK-This involves asking questions like where, when, who, what and why. to answer these
"While searching in a place later called Malapa, some ten miles from Rising Star, he and his nine-year-old son, Matthew, found some hominin fossils poking out of hunks of dolomite." (Shreeve, National Geographic). This was in 2008, Tucker and Hunter who worked for Berger were the folks who made the recent findings. "There were bones everywhere. The cavers first thought they must be modern. They weren’t stone heavy, like most fossils, nor were they encased in stone—they were just lying about on the surface, as if someone had tossed them in. They noticed a piece of a lower jaw, with teeth intact; it looked human." (Shreeve, National Geographic).
ACQUIRE- this involves acquiring accurate information about the findings. "There were some 1,550 specimens in all, representing at least 15 individuals. Skulls. Jaws. Ribs. Dozens of teeth. A nearly complete foot. A hand, virtually every bone intact, arranged as in life. Minuscule bones of the inner ear. Elderly adults. Juveniles. Infants, identified by their thimble-size vertebrae. Parts of the skeletons looked astonishingly modern. But others were just as astonishingly primitive—in some cases, even more apelike than the Australopithecus. “We’ve found a most remarkable creature,” Berger said. " (Shreeve, National Geographic)
ANALYSE- this involves organizing and summarizing the topics so that the main points are focused on. basically, the main points focused on in the story according to the National geographic are:
· After many years Lee
Berger and his team made an amazing discovery of human like bones in a small
cave called Dinaledi- 1oo yards from caves main enterance
· Certain features of
the bones where too primitive to be from humans
· they found 1200 bones
that fitted together to form almost full body parts
· Berger called these
creatures H.naledi.
· Berger came
to the conclusion that the H. naledi were deliberately placed
there by other H. naledi.
· H. naledi had
small brains (smaller than the human brain)
APPLY- This involves applying the findings and
knowledge:
H. naledi could
have been part of our roots and scientists who believe in evolution may have
found more evidence that we evolved from apes. This creature has got similar
features to humans.
The H. naledi may
have been thrown into the Dinaledi cave with no way to get out and therefore
died there, it may have been used to bury them or they may have used the cave
as shelter and been trapped in there by falling rock. Scientists are not too
sure of how H. Nadeli got into the cave as the entrance is
very small, but the above thoughts are being researched to find the most likely
one.
ASSESS- The processed used to acquire the
information was legitimate as Lee Berger was there at the scene. research
sources were valid and reliable and the information given could be proved by
the bones and fossils found at the scene.
Subscribe to:
Posts (Atom)