Monday, 30 May 2016

A LIST OF REFERENCES (POE )

1. Berger, Lee R.; et al. (10 September 2015). " Homo Naledi, a new species of the gun us Homo from Dinaledi Chamber, South Africa" eLife 4. doi: 10. 7554/eLife.09560.

2. EWN Online  (2016). Who was Homo Naledi? Accessed 09 April 2016: http//wen.co.za /Features/Naledi/What-Makes-Naledi-Special.

3. Gui, M. & Argentin, G. (2011). Digital skills of internet natives: Different forms of digital litaracy in a random sample of Nothern Italian high school students & Society. Volume 13 Issued 6: http://sagepub.com/context/13/6/963.

4. Hargitta, E. (2002). Second-level digital divide: Differences in people's online skills. First Monday 7 (4).

5. van Deursen, A. & Van Dijk, J. (2009). Improving digital skills for the use of online public information and services. Government Information Quarterly  (26): 333-340.

6. van Dijk, J (2005). The Seeping Divide. Inequality in The Information Society. London: Sage Publication.


Question 8 Digital Health and Well Being (POE )








Link : http://za.interest.com/pin/112801165642979947.

Question 7 Digital Security (POE )

Along with the new technology and means of living comes new ways which people are able to abuse the system. "Digital Security refers to ensuring the ability to use digital information systems without interference, description, unauthorized access or data collection." ( Security in-a-Box, [sa]). Digital Security can involve protecting any personal information online and whoever commit cyber crime are generally known as hackers.
Hackers are able to exploit certain security flaws in the coding in order to benefit themselves or for personal satisfaction. Hackers create systems such as:

* Adware which creates an advert by using your previously viewed sites. This can also be linked with spyware which can memorize your password and a hacker can abuse this system.
* Bots is created by hackers to distribute malware or even crack passwords.
* Ransomware which is created to corrupt and encrypt your files so u can't access them unless certain procedures are followed.
* Viruses which is able to spread at an incredible rapid rate and corrupt your hardrive.
* Roottits which is able to remotely control your device and thus can prove an incredibly useful tool to hackers.

Users are able to avoid hackers by:
* Not downloading any unlicensed files
* Use antimalware software which reduces the risk of any malware being downloaded.
* Password inscriptions which will make it harder for hackers to acquire your password.
* Delete all browser cookies which will reduce the amount of information spyware is able to acquire if your device does not get infected.
* Don't give out personal information by giving out personal information hackers are able to work out passwords and other information.

Question 6 Digital Law (POE )


Question 5 Digital Rights and Responsibilities (POE)

Digital Rights and Responsibilities is having the right and freedom to use all types of digital technology while using this technology it has to be in an acceptable and appropriate manner.

Images

Question 4 Digital Etiquette (POE)

Digital code of conduct

10 Points of Netiquette
 When communicating online, only say things that you would say to a person’s face and things that you would allow people to say to you.
 Adhere to the same real life behavioural standards online.
 Being aware of whom you’re communicating with can be a guide as to which level of netiquette to use.
 Respect the user’s bandwidth when sharing files. Do not waste a user’s time with unnecessary comments and questions.
 Keep a good online image by portraying high intelligence through your personal posts.
 Help others where you can.
 Keep hostile interactions to a minimum.
 Do not provide strangers with another user’s personal details without permission.
 Do not abuse the power you have – use it correctly.
 Do not criticize someone for having little online experience.

Penalties for Non-compliance
 Anyone who communicates inappropriately through messaging will be given a verbal warning. If it happens again you will receive a written warning. If the action is seen as harassment, it could lead to a court case or termination.
 If anyone fails to adhere to the amount of document sharing, especially if they are non-work related, connection to the internet will be terminated.
 Anyone with an issue helping someone less experienced online will be suspended for non-compliance to teamwork.
 If anyone’s personal information is shared without permission, that person will be labelled ‘un-trustworthy’ and may be expelled.

Enforce and Manage
 Each individual will be given this Code of Conduct to read through, sign and return to the head of the institute.
 If failure to meet the Code occurs, they will be given their signed Code of Conduct to read over again. Depending on the action, the necessary repercussions will be taken.

A system will be available on each computer where any individual may report unethical behavior.

Question3 Digital Communication and fluencies (POE)

The social economy
- Social Technologies is defined as applying the used technologies for specific purposes especially social ones: to ease social procedures via social software and social hardware which might include the use of computers and information technology for governmental procedures.

Risk of social technologies for individuals, corparate and communities.

- The rism of social technologies for indivisuals corporate and communities is that South Africa will be faced with the increase in unemployment increased loneliness and also the world description weapons and will also faced conpetancy, risk of social technologies to communicate using Facebook people should be careful as to what they post online on their profiles. The risk of this is that when people get your personal information they might use it to stalk the person which may cause harm to the person.

Benefits of social technologies

- For individuals to benefit they will be able to send messages and by doing this they will be quickly connected. The individual will not lose out on any communication
- The space that they share allows cooperate to co-create content , coodinate joint projects and tasks. People work best and in full potential when they are in groups, sharing ideologies and allowing people build on each others ideas. The main idea is to make corporate communicate simultaneously to a large evidence and it is not expensive to communicate with customers.
- The benefit for communities is that communication has improved as modern technology has broadened the channels used in communication which can be video chat or electronic mail so this means th a SA communities are able to communicate with friends and family located far away and can even Skype which is easy and people wll communicate better.