Sunday 6 November 2016

Q.6.1 Digital Law

Q.3.1 Social Technlogies include a broad range of applications that can be used both by consumers and enterprises. These include, blogs, social networks, social gaming, discussion forums, wikis, and crowd sourcing to mention but a few (McKinsey and Company, 2012)

The advantage and disadvantages of social technology with an everyday person
Advantage’s
Disadvantages
It allows people to stay connected all the time
People end up wasting the social network and it will be slow
Using the password to protect your details and to ensure your safety
By using easy password people can hack your account, have your details and use them wrongfully
You can say what’s on your mind and be free as you know that you are save and protected
It can ruin your reputation when 6you speak your mind and you say inappropriate things
Easy to find out new information online using the laptops, tablets and phones on the go
It can make inappropriate books to be online to search for the things that are not good.

Advantages and disadvantages for the corporate’s
Advantages
Disadvantages
Create a name and image for your company.
Bad information and post can be posted and mentioned about your company
People can follow you online and follow your online website
The private life may be exposed and find bad information about you
More people might want to invest in your company because of people passing the message using the social network
Many people ca hack into your phone or laptop if u left then unlocked and when you use easy passwords

Advantages and disadvantages of communities

Advantages
Disadvantages
It can create job employment opportunities
Many people start to demand too much on social medias and networks
It can make the community aware about what is going on around them and make them safe
It can also be negative and bring criminals in a community because they know everything about the surroundings and easy for them to attack

Reference
 Skinner (2014)(Risks and benefits of social technologies), Retrieved from http://www.slideshare.net/norwiz/benefits-and-risks-of-social-technologies

Q.7.1 Digital Security

The Top 5 cybersecurity risks in 2015 are:
  1. Ransomware,
  2. The Internet of Things
  3. Cyber-espionage
  4. Increase in cyber theft and
  5. Insecure passwords
Ransomware - a type of malware which restricts access to the computer system that it infects –will become increasingly sophisticated in its methods and targets, experts at McAfee Labs warned.   infects a computer and restricts the users access to it, a ransom is paid in order for user to be able to use their computer.
The Internet of Things -is when devices are connected to the internet which increase the risk of personal details being obtained. Jamison Nesbitt, founder of Cyber Senate, a community of global cybersecurity business leaders, echoed experts' beliefs who said that the IoT is "the main cybersecurity risk for 2015." "The IoT presents unique security challenges in terms of the number of connected devices present."
Cyber-espionage -is when information is obtained through the internet for use by the government. As Nesbitt said, "the next world war will be fought on a keyboard," and we should expect cyber espionage attacks to increase in frequency in 2015, McAfee's "2015 Threat Predictions" report warned.

Cyber theft-is the stealing of financial information through the internet, such as credit card details."Although this would require cyber criminals to target individual cards and wouldn't result in large scale breaches or theft like we have seen in the U.S.,the payment technology used won't protect against retailers who aren't storing payment card data securely, and they will still need to be vigilant in protecting stored data," Candid Wüest, threat researcher at Symantec Security Response, said.
Insecure passwordsEasy-to-crack passwords will continue to be a big risk in 2015, analysts said. "Weaknesses of passwords are known, but still lead to many of the high-profile attacks such as the recent iCloud attack," Symantec's Sian John said, that they are passwords which are easily obtainable based on the users tastes or preferences and whether the same password is used several times/.
Methods to  prevent hackers to hack your account 
A way to prevent this from happening is to always check that the email received has a valid email address. This will allow the user to determine whether the email is legitimate or not.
Another method used by hackers is creating a website that looks almost identical to the real one. User may believe that this website is legitimate and therefore enter personal details. Users can check the URL of the website to ensupre that the website is indeed legitimate.
Having a strong password is important as it protects most of our confidential information. Users often use unsuitable passwords that can be easily determined based on the consumers tastes and preferences. Users often reuse passwords for several accounts which puts them at risk.
Reference
Photography, Z., Images, G. and Ellyatt, H. (2015) Top 5 cybersecurity risks for 2015. Available at: http://www.cnbc.com/2014/12/19/top-5-cyber-security-risks-for-2015.html (Accessed: 06 November 2016).
Sieber, T. (2011) 9 ways to prevent identity theft by computer hackers. Available at: http://www.makeuseof.com/tag/9-ways-prevent-identity-theft-computer-hackers-2/ (Accessed: 06 November 2016)

Q.5.1. Create one Thinglink image that representing the role of Digital Rights and Responsibilities for society, business and education. Provide a definition in each of the images, highlighting the most critical aspects you believe they have in each context.

Q4.1 Create a Digital Code of Conduct for education institutes. Please think of how you would reinforce and manage it, include this into your ‘Code of Conduct’. This would be a guideline for the institutes that they can then adapt to their specific requirements.

Image result for code of conduct images

10 Points of netiquette
  1. Showing respect to the lectures in and out the class room
  2. Treating people the same way u want to be treated.
  3. Be forgiving and listen for what others are saying.
  4. Use the common language that all can understand and agree on that
  5. Do don’t criticize or discriminate others about their background.
  6. Always think before you say anything.
  7. Following all the instruction the way they are told.
  8. Be in a save area and feel comfortable if not move to the space that is save for you
  9. Be part of the team play or perform your role as a team player
  10. Be honest to yourself so that you can be honest to others


Image result for code of conduct images
Penalties for failing meeting this
  1. For treating others in a bed manner and using strong language you will be expelled.
  2. Not respecting time to attend the lectures lesson the lecture have the right to make you stay outside for an hour or not to return until the next session
  3. By not listening and using things like computers or school resource with unrespect will for the computer and internet the IT department have the right the disable your account and not to switch it on until you tell the truth and apologies.
  4. For not being hornet to yourself you will end up with wrong people that will make you do wrong things and skip class and for that you won’t be able to write exams because you won’t qualify for them because you don’t attend classes and you will fail.


Q.2.1 Use information fluency skills to analyze the groundbreaking archeological findings (Homo Naledi) by Professor Lee Berger from Wits University. Use the information fluency process, ask, acquire, analyse, apply and assess to dissect the matter. In your discussion highlight the significance of this finding Use a minimum of 300 words Create a separate page for your findings on the blog

The information fluency process involves the following:
Ask, Acquire, Analyse, Apply and Asses.

Regarding the findings by professor Lee Berger, 
from Wits University

ASK-This involves asking questions like where, when, who, what and why. to answer these
"While searching in a place later called Malapa, some ten miles from Rising Star, he and his nine-year-old son, Matthew, 
found some hominin fossils poking out of hunks of dolomite." (Shreeve, National Geographic). This was in 2008, Tucker and Hunter who worked for Berger were the folks who made the recent findings. "There were bones everywhere. The cavers first thought they must be modern. They weren’t stone heavy, like most fossils, nor were they encased in stone—they were just lying about on the surface, as if someone had tossed them in. They noticed a piece of a lower jaw, with teeth intact; it looked human." (Shreeve, National Geographic).

ACQUIRE- this involves acquiring accurate information about the findings. "There were some 1,550 specimens in all, representing at least 15 individuals. Skulls. Jaws. Ribs. Dozens of teeth. A nearly complete foot. A hand, virtually every bone intact, arranged as in life. Minuscule bones of the inner ear. Elderly adults. Juveniles. Infants, identified by their thimble-size vertebrae. Parts of the skeletons looked astonishingly modern. But others were just as astonishingly primitive—in some cases, even more apelike than the Australopithecus. “We’ve found a most remarkable creature,” Berger said. " (Shreeve, National Geographic)

ANALYSE- this involves organizing and summarizing the topics so that the main points are focused on. basically, the main points focused on in the story according to the National geographic are:

·         After many years Lee Berger and his team made an amazing discovery of human like bones in a small cave called Dinaledi- 1oo yards from caves main enterance
·       Certain features of the bones where too primitive to be from humans
·        they found 1200 bones that fitted together to form almost full body parts
·         Berger called these creatures H.naledi. 
·          Berger came to the conclusion that the H. naledi were deliberately placed there by other H. naledi.
·           H. naledi had small brains (smaller than the human brain)

APPLY- This involves applying the findings and knowledge: 

H. naledi could have been part of our roots and scientists who believe in evolution may have found more evidence that we evolved from apes. This creature has got similar features to humans. 
The H. naledi may have been thrown into the Dinaledi cave with no way to get out and therefore died there, it may have been used to bury them or they may have used the cave as shelter and been trapped in there by falling rock. Scientists are not too sure of how H. Nadeli got into the cave as the entrance is very small, but the above thoughts are being researched to find the most likely one. 

ASSESS-  The processed used to acquire the information was legitimate as Lee Berger was there at the scene. research sources were valid and reliable and the information given could be proved by the bones and fossils found at the scene. 



Q.1.3 Primary school children are the most vulnerable to malicious intent online. Research what the nine elements of digital citizenship are. Create an electronic poster aimed at primary children, with a slogan and examples of what the nine elements are.

Nine Element of Digital Citizenshi1 by Masego on Scribd

Q.1.2 What is the techno-economic paradigm and how can one develop from this?

  • ·         The techno-economic paradigm explains the change of technology
  • ·         The Techno-economic paradigm is the rules values, practices that play a role in how we view reality of the community and the theory that combine the Kondratieff’s long-wave theory with Schumpeter’s economic development theory that focuses within the capitalist development process on technology change.
  • ·         One techno-economic paradigm can develop from this by making use of the application of accompanying.

Q.1.1 Research the issues surrounding access; note their role to social capital, knowledge capital and human capital. Create a PowerPoint presentation to raise awareness on the ramifications of Digital Divide, outline how you can assist to the government to solve the issues around access

Digital Divide by Masego on Scribd