Friday, 27 October 2017

{PEO} Bibliography


Bibliography




[s.a.], A. U. (2015, April 22). Digital Citizenship. Retrieved September 25, 2017, from Netiquette: http://www.auburn.edu/citizenship/netiquette.html

Anon. (2014, April 26). Cellphone policy. Retrieved August 02, 2017, from http://sunvalleyprimary.co.za/downloads/policy/d_cell_phone_policy_2014.pdf

Anon. (2016, August 18). Digiteen Wiki. [s.a.]. Retrieved July 20, 2107, from Digital Commerce. [Online]: http://digiteen.wikispaces.com/Digital+Commerce

Anon. (2016, October 11). Learn the Net: Your Online Guide. Retrieved September 2017, 2017, from Netiquette: http://www.learnthenet.com/learnabout/netiquette/

Campbell, J. (2017, May 19). Baltimore Sun. Retrieved October 10, 2017, from Confronting the myths of ‘Napalm Girl’: http://www.baltimoresun.com/news/opinion/oped/bs-ed-napalm-girl-20170401-story.html

Education, T. I. (2016). Personal Computing. In T. I. Education, Getting started witih Word 2010 (pp. 126-160). Johannesburg: Unpublished.

Education, T. I. (2017). Digital Citizenship Module Manual. Johannesburg: Unpublished. Retrieved October 09, 2017

Marsh, K. (2012, May 07). Media opinion. Retrieved October 17, 2017, from News: http://www.bizcommunity.com/Article/196/15/74730.html

Masilo, M. (2016, August 15). Digital Citizenship-Slides. (T. E. Modiselle, Interviewer) Gauteng, South Africa: Unpublished. Retrieved July 19-20, 2017

Mavuso, N. (2017, August 04). Assignment (Source based). (T. E. Modiselle, Interviewer) Gauteng, Pretoria, South Africa: Unpublished. Retrieved August 05-07, 2017

Points, T. (2017). E-Commerce - Business Models. Retrieved October 20, 2017, from Tutorials Library: https://www.tutorialspoint.com/e_commerce/e_commerce_business_models.htm

Rights, U. D. (1948, December 10). United Nations General Assembly. General Assembly resolution, 3, 217. Retrieved October 2017, from https://www.scribd.com/document/292971879/Universal-Declaration-of-Human-Rights-Illustrated-Version

Shea, V. (2017). Netiquette guidelines and examples of bad etiquette. Retrieved July 04, 2017, from http://www.albion.com/netiquette/corerules.html.

Thomson, R. (2016, October 19). Digital Security. Retrieved August 2017, from http://www.digitalsecurity.com/2015/12/19/top-5-cyber-security-risks-for-2015.htlm

Wiki, D. (2016, August 18). Digital Commerce. Retrieved 2017, from The Nine Digital Elements: http://digiteen.wikispaces.com/Digital+Commerce



{PEO} Question 9


Question 9: Digital commerce

Digital commerce is the electronic selling and buying of goods. There are four (4) main business models in the e-commerce perspective. These are business-to-business (B2B), business-to-consumer (B2C), consumer-to-business (C2B) and consumer-to-consumer (C2C).



Business-to-business (B2B)

The business-to-business model is where a company sells supplies to another business.  Business model also sells its product to an intermediate buyer who then sells the product to the final customer. As an example, a wholesaler places an order from a company's website and after receiving the consignment, sells the end product to final customer who comes to buy the product at wholesaler's retail outlet.







Consumer-to-Consumer (C2C)

Business model helps consumer to sell their assets like residential property, cars, motorcycles etc. or rent a room by publishing their information on the website. Website may or may not charge the consumer for its services. Another consumer may select to buy the product of the first customer by viewing the post/advertisement on the website.




Consumer-to-Business (C2B)

In this model, a consumer approaches website showing multiple business organizations for a particular service. Consumer places an estimate of amount he/she wants to spend for a particular service. For example, comparison of interest rates of personal loan/ car loan provided by various banks via website. Business organization who fulfils the consumer's requirement within specified budget approaches the customer and provides its services.




Business-to-Consumer(B2C)

The following B2C business model sells its product directly to a customer. A customer can view products shown on the website of business organization. The customer can choose a product and order the same. Website will send a notification to the business organization via email and organization will dispatch the product/goods to the customer.





The above four (4) main business models in the e-commerce perspective are stated by the Tutorials Point in 2017.

Thursday, 26 October 2017

{POE} Question 8


Question 8: Digital Health and Well Being

Creating a "Board and Pins" of at least 15 topics related to Digital Health.

The Link of my board
<Link to my board: Link to my board >






{POE} Question 7


Question 7: Digital Security

Warning to the fellow students about the hazards of online activity and provide guidelines on online safety.



Ransomware

Ransomware is a type of malware which does not allow access to the computer system that it affects. Ransomware can manage to avoid security software installed on a system. Once infected, the ransomware will attempt to exploit the logged-in user’s stored identifications to also contaminate backed-up cloud storage data. Ransomware encrypts data, this would increase attacks on mobile devices and cloud-based data.



Insecure Passwords

Passwords that are too short and does not contain a mix of numbers and letters are classified as easy-to-crack passwords, will continue to be a big risk. This mainly due the fact that the mechanisms are flawed. The traditional method of password recovery is asking questions that only you know. Unfortunately, answers to these questions often can be deduced based on information that can easily be found online. This is caused by people over-sharing their private and valuable information to social media sites.



Cyber-espionage

Cyber espionage is becoming the weapon of choice for many national governments; it is a weapon that is used to undermine their enemies. It has been predicted that cyber espionage attacks are likely to increase in frequency as times goes by. Making use of the computer to access internet network connection and illegally access confidential information held by government or organisation.



The Internet of Things

The connection of physical devices such as home appliances and cars to the internet will still remain the Internet of Weaknesses. Internet of Things is said to be the main cybersecurity risk and will be integrated into markets such as healthcare, energy industry and transport network but it fails to keep up with the security attacks that still hasn't been designed yet.



Cyber theft increases

The stealing of financial information is nothing new, with stolen credit or debit card data on the black market a well-established and profitable business for cyber criminals. However as new ways of paying for goods, such as contactless and mobile payments, become the norm for International consumers “European consumers”, it will also create new opportunity for hackers – particularly if retailers don't store payment data firmly.



In addition; the guidelines on online safety:

They can avoid these risks first by installing anti-virus software's and update them weekly or even monthly, they could also avoid these risks by securing their network connection, personal information and making use of strong passwords.

ë  Ignore Pop-Ups which can allow contain soft wares that are harmful, to trick a user into verifying things they don't know.

ë  Never click on a link you did not expect to receive - The main way criminals infect computers with intrusive software is where by the persuade users to click on a link or open an attachment.

ë  Think on how you share your information; this involves identity fraud; people can use your identity elsewhere for their need.

ë  Block-Avoid social media invitations like Facebook request from people you have no knowledge about.

ë  Use different passwords on different sites; it is easy for hackers to crack your password especially when you used names from the dictionary.

{POE} Question 6

Question 6: Digital Law
Q.6.1 What is digital socialisation? How can social media change communities and their practices and traditions?
Digital Socialisation is an impact of digital technology. Technology has an impact on society, we experience technology in our everyday lives and it affects our culture and our living standards. Digital technology can easily be referred to the practical technical knowledge to the practical problems we are experiencing in the world today.

Digital Technology can impact on the society both positive and negative.
Positive Impacts
ë  There is more interaction within the communities with help of technologies.
ë  Children can learn better with the usage of technology.
ë  Advancements in technology have greatly increased our living standard.

Negative Impacts
ë  With every advancement that is made in the technological world, creative destruction results.
ë  Digital Technology replaces people in some business sectors only small amount of people will be employed.
ë  Technology use interferes with job/school performances.

Q.6.2 What ethical issues could arise as a result of digital socialisation?
The company and the consumer
Ethics
Ethical issues and responsibilities include:
ë  Ethical marketing tactics;
ë  Ethical digital advertising and communication;
ë  The monitoring of consumers’ online behaviour;
ë  Obtaining general consumer information through transparent means;
ë  Ethical use and distribution of personal information obtained via electronic means.

Legal Issues
General legal issues and responsibilities include:
ë  The legal use of digital technology in obtaining consumer information;
ë  Transparent advertising;
ë  No false claims of product benefits through the means of digital manipulation;
ë  Protection of consumers’ digital information;
ë  No spamming.

The above ethical issues that could arise as a result of digital socialisation are suggested on the Module Manual, (2017) on page 109.

{PEO} Question 5

Question 5: Digital Rights and Responsibilities
“Since the internet is not owned or governed by a specific organization or country, there is unfortunately no specific constitution that governs it, and therefore no specific bill of rights” (Mavuso, 2017). Digital Rights and Responsibilities is having the right and freedom to use all types of digital technology in an acceptable and appropriate way. As a digital citizen you do have a right to privacy and freedom of personal expression.

Digital Bill of Rights that has 10 articles
Article 1
All human beings are born free and equal in dignity and rights. They are able with reason and conscience and should act towards one another in a spirit of brotherhood.


Article 2
Everyone is entitled to all the rights and freedoms set forth in this Affirmation, without distinction of any kind, such as race, colour, sex, language, religion, political or other opinion, national or social origin, property, birth or other status. Furthermore, no distinction shall be made on the basis of the political, or international status of the country or territory to which a person belongs, whether it be independent, trust, non-self-governing or under any other limitation of rule.




Article 3
Everyone has the right to life, liberty and security of person.


Article 4
No one shall be held in slavery or servitude; slavery and the slave trade shall be prohibited in all their forms.





Article 5
No one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment.




Article 6
Everyone has the right to recognition everywhere as a person before the law.





 
Article 7
All are equal before the law and are entitled without any discrimination to equal protection of the law. All are entitled to equal protection against any discrimination in violation of this Declaration and against any incitement to such discrimination.


Article 8

Everyone has the right to an effective remedy by the competent national tribunals for acts violating the fundamental rights granted him by the constitution or by law.

Article 9

No one shall be subjected to arbitrary arrest, detention or exile.












Article 10

Everyone is entitled in full equality to a fair and public hearing by an independent and impartial tribunal, in the determination of his rights and obligations and of any criminal charge against him.


The ten (10) articles along with the pictures were stated by the Universal Declaration of Human Rights



Digital Bill of Rights for the Internet

1. We are all born free and equal- we all have our own thoughts and ideas.


2. Don’t discriminate- everyone has rights, regardless of our differences.
3. We have the right to live in freedom and safety.

4. Remember the Human- Never forget that the person reading your communication is actually a person with feelings and can get hurt; never say anything online that would not say to your reader’s face.

5. The right to privacy- nobody has the right to invade our personal space on the internet without our permission.

6. Freedom of thought- we have the right to believe what we want to believe in.

7. Freedom of expression- everyone has the right to make up their own minds, think what they want, and say what they think and to share their ideas with others over the internet.

8. Sharing- everyone has the right to freely share their ideas and opinions lawfully on the internet.

9. Property- digital citizens have the right to benefit from what they create, and be secure in their electoral property on the internet.

10. All digital citizens are created to have equal rights and responsibilities on the internet.

11. Make yourself look good online- check grammar and spelling before your post, as most people may judge your intelligence based on the grammar and spelling.

12. Share expert knowledge- offer answers and help others where you can.

The above answers for Question 5 of Digital Bill of Rights for the Internet was stated on the (Module Manual, 2016, pp.89-90)


{POE} Question 4

Question 4: Digital Etiquette
Digital etiquette, or netiquette as it is sometimes referred to, is a basic set of rules pertaining to behaviour that needs to be followed to ensure the Internet is better for all users. Basically it means “the use of good manners in online communication such as email, forums, blogs, and social networking sites” (Digital Citizenship, Auburn University. [s.a.]).

Inappropriate digital conduct:
Cyber bullying: Is when a young person uses the Internet or technology to harass, threaten, embarrass or target another person, this person is called a cyberbully. This is a major problem all over the world, many people are bullied over social media every day, it leads to depression and in some cases suicide.

Sexual harassment: Is also another issue that impacts on society as people are left traumatized and scarred for the rest of their life. The problem with inappropriate conduct is that there are no ramifications because people remain anonymous which is why it is so hard to put it to an end. Harassment repeatedly sending hateful messages to someone online.

Hacking computers: is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. Computer hacking is most common among teenagers and young adults; however, many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form.

Fault injection: This technique involves hackers whom search ways to infiltrate one source and code to try inputting different code in an attempt to crash the system and this can cause viruses which is able to spread at an incredible rapid rate and corrupt your hard-drive.

Child pornography: is pornography that exploits children for sexual stimulation. It may be produced with the direct involvement or sexual assault of a child (also known as child sexual abuse images). Abuse of the child occurs during the sexual acts or pubic areas which are recorded in the production of child pornography. Child pornography may use a variety of media, including writings, magazines, photos, drawing, cartoon, painting, animation, sound recording, film, video and video games.

Consequences for individuals and society:
Lack of socialisation: Let's face it, our thousands of friends in our list are really not the ones we call on when we are alone. Instead, the time spent on the internet takes away the time we would otherwise have spent socialising and meeting 'real' people in a 'real environment'.

Negative effects on health: Researchers have found that there appears to be a positive correlation between hyper networking, which is more than three hours of internet time, and negative health behaviour such as depression, drug abuse and isolation among teenagers. In extreme cases, the negative effect can even extend to suicide.

Isolation: We might be getting 'connected' with our online friends every day but physically, we are spending less and less time outdoors and with other human beings. This lack of physical contact with our fellow human being can result in many symptoms including depression, somatic symptoms, and anxiety.

Defamation: There are times when companies face a scenario where disgruntled employees speak their mind, defaming the company's good name. Social networking sites have also been famous for defaming and negatively portraying brands, companies, celebrities, as well as members of the general public.

Accidental leakage of confidential information: Many slips happen and in the case of social media marketing, confidential information can be released - and once it's out there, it cannot be retrieved. What's more, since it reaches such a wide audience, the impact is a lot greater had the leak been in a more 'real' setting.

Identity theft: Another area that has correspondingly increased with the increase of social networking sites is identity theft. With personal information so easily available it can also be easily stolen. The cases where information is taken from social networking sites are soaring.

Stalking and misbehaviour: Availability of one's personal information so easily can also make one prey for possible stalkers, as many of us have seen. The misuse of photographs, personal information as well as 'tagging' photographs with other identities, puts one in danger and can be a cause of discomfort.

According to Kelly Marsh (2012) stated that there are many other instances where social networking has changed our behaviour but not in good ways. The language we use has become poorer with many grammatical mistakes; the use of social networking by employees while working has decreased their performance, individuals' reputations have also been harmed in many ways. However, just as a coin has two faces, so does social media. The good and the bad go hand-in-hand but more than anything else all you need to be is vigilant and create balance.

In addition of the above inappropriate digital conduct and consequences for individuals and society:
ë  ‘Society’ is not just the society within which you live, but also the digital society. When you use social media, those that follow you or are friends with you are part of your society.
ë  According to Mavuso, N (2017) suggested that Your actions, beliefs and statements have an impact and, therefore, should be considered carefully. It is your right to share, however, you need to share responsibly.
ë  illegal downloads has greater ramifications than just that of the relevant production company losing money.

A short list for guiding audience in online etiquette:
ë  Don’t discriminate or criticize.
ë  Don’t use offensive language.
ë  Share information with others effectively.
ë  Always think before you write something online and post.
ë  Respect other people privacy and don’t interfere other peoples’ work.
ë  Treat people the same way as you want to be treated, as you would face-to-face.
ë  Share expert knowledge; offer answers and help others where you can.
ë  Respect the time of others and do not abuse the power you have – use it correctly and be forgiving.
ë  Do not provide strangers with another user’s personal details without permission - keep it relevant and professional.
ë  Make yourself look good online and avoid wasting time with unnecessary comments and questions, lastly, avoid posting confidential information about yourself.

The above guidelines were stated by Shea (1994), an academic who has been dubbed the ‘network manners guru’.

500 Words



 References
[s.a.], A. U. (2015, April 22). Digital Citizenship. Retrieved September 25, 2017, from Netiquette: http://www.auburn.edu/citizenship/netiquette.html
Anon. (2016, October 11). Learn the Net: Your Online Guide. Retrieved September 2017, 2017, from Netiquette: http://www.learnthenet.com/learnabout/netiquette/
Education, T. I. (2016). Digital Citizenship Module Manual. Johannesburg, South Africa: Unpublished. Retrieved September 25, 2017
Shea, V. (2017). Netiquette guidelines and examples of bad etiquette. Retrieved July 04, 2017, from http://www.albion.com/netiquette/corerules.html.






{POE} Question 3


Question 3; Digital Communication and Fluencies
Digital communication is the electronic exchange of information. I think the image is inappropriate from the given context. “Personal digital communication can have far-reaching impacts” (Module Manual. 2016; 61).

With the arrival of social media, there is a greater risk of over-sharing, inadvertent bullying or just plain maliciousness. It is imperative that thought is given to the audience and to the type of message being sent, the language that is used and the manner in which it is delivered. By not following good netiquette, the communication becomes inappropriate.

An authentic picture of an incident during the Vietnamese war in 1972.
The most famous being a stunning black-and-white image from the Vietnam War that's come to be known simply as "Napalm Girl". The “Napalm-Girl” post was soiled with a lot of controversy because of the nakedness of the girl which is seen by some critics as a violation of best practice.

According to Campbell, J (2017) it was stated that the photo was taken in a time of great stress and many think it helped power the public against the war and that it helped accelerate the wars end. And although these myths have been exposed there is still the opinion that the photo has an emotional impact, which for me is true.

The photo highlights one of the heartbreaks that happened in the Vietnamese war and the photo shows the terrified child running naked down a country road, her body literally burning from the napalm bombs dropped on her village just moments before the image it was captured. The photo shows the horror and pain that not only children went through, but adults as well. It shows a scene that the world needed to see. "This picture revealed the kind of details that were an essential part of what the war had been about, which made it so significant and important to be published" said Peter Arnett.

The fears of a war; it didn’t matter that although it was thought to be an American attack and was actually a South Vietnamese air force pilot, the point is to show how bad the war was and the impact it had on humans. The girl in the photo, Kim Phuc was nine at the time and she survived with horrible scarring to her body and she wasn’t the only one. Many people died, many people were injured and scarred for life, and the world needed to see that.

206 Words