Monday 30 May 2016

a list of references for POE

List of references
https://www.internet society.org Google search
Wikipedia (online)
National discovery available at https://www.google.com/humo-naledi/porofessor-Berger
Google search available at https://www.independant.co.uk/steve-connor
Digital citizenship, Auburn University. SA
BBC news
Africa news today- Africa's newsletter available at https://www.google.com/sa's-top5-cybersecurity/

POE Q6

Impact of digital technology on society
Poster available at https://www.thinglink.com/sinonzulu/impact-of-technology-on-society.

POE Q7

2015's top 5 cyber security risks in South Africa
As 2015 approaches Fortinet and its threat research division FortiGuard Labs, have taken a look ahead to determine the most significant cyber security threats of the upcoming New Year – both from the perspective of a Black Hat hacker.
Significant Trends and Cyber Security Threats from the Perspective of a Black Hat Hacker in 2015 Include:
1. Blastware to Destroy Systems, Erase Data and Cover Hacker Tracks
This destructive new trend of malware, following Scareware and Ransomware could lead to the ability for hackers to infiltrate systems, gather data and then wipe out the information to on systems and hard drives to cover tracks and thwart forensics. FortiGuard Labs observed the first indications of Blastware in 2014, Dorkbot/NGRbot, where the hackers had code routines built in, that if altered, would self-destruct and wipe out all information on the hard drive. well as a Threat Intelligence solutions
2. Hackers Look to Evade Law Enforcement, Frame the InnocentAs cyber crime increases, law enforcement practices to catch and penalize perpetrators increase with it. Thus, hackers must be more careful and calculated to evade arrest. In 2015, advanced evasion techniques will evolve in order for attackers to cover their tracks. To date, evasion has been currently focused on counter antivirus and intrusion prevention.
3. Internet of Things Becomes Internet of Threats (IoT)
In 2014, we saw an interesting shift – namely Heartbleed and Shellshock – focused on server side vulnerability and exploitation. Looking forward to 2015, we fully expect this trend to continue in an alarming way as black hat hackers pry open the Internet of Things. Hackers will continue to follow the path of least resistance as more and more devices are connected to the network. Vulnerabilities that Black Hat hackers will look to exploit will include Consumer home automation and security systems, as well as webcams, which
 4. Denial of Revenue/Data Breaches Continue and Expand2014 is becoming known as the “year of the data breach,” with significant thefts from stores like Target, Michaels, P.F. Changs and Home Depot. FortiGuard predicts this trend will continue in 2015 as hackers become more sophisticated and find new loopholes for infiltrating retail and financial systems. In the New Year, damages will also extend to denial of service on assembly line, factory, ERP/SAP systems, as well as healthcare and building management, creating even more challenges in the way of critical consumer data compromises, revenue losses and reputation damages for organizations globally.we are already beginning to see.
5. Rise in Counter Threat IntelligenceCrime services and solutions have already supported QA for malware, including sample scanning. Fortinet predicts this to extend to support QA for threat intelligence and undetected coverage for indicator of compromise (IOC) in 2015. As crime services extend their research and coverage, hackers will utilize the same type of processes for determining the best ways to bypass security systems. For example, current crime services scan malware against vendors’ capabilities to stop it, and give them a score result. As vendors expand from malware detection to threat intelligence correlation, criminals will work to counter this movement with the same type of approaches to find out if their botnet infrastructure is flagged in other intelligence systems as well, and work to hide their tracks.(IT News Africa-Africa technological newsletter).
 What can be done to avoid it
1. Protect your data, not just the perimeter.
2. Know your data
3. Wake up to the insider threat
4. Increase vigilance
5. Get to grips with mobile
6. Spend more money and time on cybersecurity.(BBC News).

POE Q6

The Development of Technology in modern times of their impact on human life Technology and society or technology and culture refers to cyclical co-dependence, co-influence, and co-production of technology and society upon the other (technology upon culture, and vice versa). This synergistic relationship occurred from the dawn of humankind, with the invention of simple tools and continues into modern technologies such as the printing press and computers. The academic discipline studying the impacts of science, technology, and society, and vice versa is called science and technology studies and society.(Wikipedia- technology and society).
The Internet is the decisive technology of the Information Age, and with the explosion of wireless communication in the early twenty-first century, we can say that humankind is now almost entirely connected, albeit with great levels of inequality in bandwidth, efficiency, and price.

People, companies, and institutions feel the depth of this technological change, but the speed and scope of the transformation has triggered all manner of utopian and dystopian perceptions that, when examined closely through methodologically rigorous empirical research, turn out not to be accurate. For instance, media often report that intense use of the Internet increases the risk of isolation, alienation, and withdrawal from society, but available evidence shows that the Internet neither isolates people nor reduces their sociability; it actually increases sociability, civic engagement, and the intensity of family and friendship relationships, in all cultures.
Our current “network society” is a product of the digital revolution and some major sociocultural changes. One of these is the rise of the “Me-centered society,” marked by an increased focus on individual growth and a decline in community understood in terms of space, work, family, and ascription in general. But individuation does not mean isolation, or the end of community. Instead, social relationships are being reconstructed on the basis of individual interests, values, and projects. Community is formed through individuals’ quests for like-minded people in a process that combines online interaction with offline interaction, cyberspace, and the local space.
The Internet is the decisive technology of the Information Age, and with the explosion of wireless communication in the early twenty-first century, we can say that humankind is now almost entirely connected, albeit with great levels of inequality in bandwidth, efficiency.(The impact of technology on society-a global perspective).

Society has always been impacted by technology. Each invention has affected how people relate to one another and how cultures have expanded or ended. Technology impacts how cities grow, where people live, and who owns what. Technologies are the reason a few people are very rich, that people are more social, and that teaching and learning is changing. We are at a crucial time in history where we as educators can make a difference in how our students interact with one another and make a place for themselves in society. (Barbara bay,2007).

POE Q4

Digital code of conduct for education institutes


10 points of netiquette
Netiquette is a basic set of rules pertaining to behavior that needs to be followed to ensure the internet is better for all users. (Digital citizenship, Auburn University. S.A).
(Melin,2013) Don't type in CAPS
Don't spam
Don't use offensive language
Don't steal other people's identity
Don't distribute illegal material
Don't flood
Don't expect a response straight away
Engage, don't broadcast only
Don't reply-all for a personal conversation
Don't ask questions that can be found on Google.


Penalties
A lack of netiquette can cause substantial problems in the workplace and schooling. Any disregard for netiquette can break a relationship between business associates, a single mail, post or comment can impact negatively or positively on a business. An institution's brand image could be ruined by a lack of netiquette.
if we disregard all rules and values, our society will eventually fall into anarchy, contributing to the downfall of a society.
We communicate daily be it social, business or academic content. Without any form of guidelines or rules our interactions will degenerate and result in negative consequences. Without the rules and policies associated with them, our communication will have no censure, no consequences and no legal responsibilities. Roles and policies are important for maintaining a sense of decorum and self-worth.
How would it be implemented in a business
Business is about building a relationships, creating rapport is important in establishing trust,authenticity and credibility. Any disregard for netiquette can break the relationship down. A brand's reputation is everything and a positive brand can sway buying decisions. According to (Patel,N.2014), the stats from a survey conducted in 2013, showed that73% of consumers say positive reviews make them trust a business more.

References
Auburn University.(s.a). digital citizenship: netiquette(online) available at https://www.auburn.edu/citizenship/netiquette.html (accessed 22 April 2016)
Melin,E. Mar.2013. 11 examples of bad digital etiquette (online) available at https://www.spiral16.com/blog/2013/03/11
Google search available at www.google .com/digital-code-of-conduct/Wikipedia.

POE Q1.3

Image result for nine elements of digital citizenship
Image result for nine elements of digital citizenshipTHE NINE ELEMENTS OF DIGITAL CITIZENSHIP

POE Q1

Issues surrounding access to the internet, their roles to social capital, knowledge capital and human capital.
Internet society
As the internet expands, so do the issues that surround its stability and ability to evolve.
Social issues
The internet is the most useful technological advance today but the quick growth of the internet presents many benefits and drawbacks with respect to society.
Positive social issues
More people around the world are technologically literate
The internet offers a vast amount of information and service
The internet provides teaching and learning processes.
Negative social issues
The internet erases the identity of the person during the connection
High rate of illegal issues involving the internet
Plagiarism, false information.
According to G.Chabrol digital technology is not static. It is constantly evolving, changing and expanding. One of the most controversial and contentious issues surrounding the use of new information and communication technology especially in schools and libraries, is whether or not authorities should block students' access to the internet.
Internet blocking keep out bad content and allows good content to pass through.
There are ways to do this: computers in the lab or class could be blocked by teachers at certain sites. A computer could only be loaded with materials of the Curriculum. Screening methods can be used.


1.2 Techno-economic paradigm is a fundamental change in the basic concepts and experimental practices of a scientific discipline (Wikipedia)








POE Q3 the social economy: unlocking value through social technology

Question 3


The social economy: unlocking value through social technology.
Benefits and risks of social technology for individuals, corporates and the community.
Social technology for individuals
BENEFIT
Individuals today use social media to communicate being it via E mail or WhatsApp. Social networks have improved the way individuals interact and has become a more easier method to pass a message even to distant areas.
RISK
Online behavior includes being able to understand that the comments individuals make online, their posts and images have an impact, and the longevity of our online interaction. Individuals need to apply  an online set of rules that will guide their behavior.
Social technology for corporates
BENEFIT
Corporates are about building relationships and creating a good reputation. the social networks available today enables Corporates to interact with potential clients, promote their brands and attract sponsors and investors.
RISK
Any disregard for netiquette can break a relationship between individuals, being it by a single E mail, post or video. A brand reputation is everything, and a negative name can ruin a corporation, losing its customers, investors or sponsors.
Social technology for community
BENEFIT
The socio-cultural environment has the deepest and strongest effect on social behavior. If we disregard all rules and values, our society will eventually fall into anarchy. A disregard for netiquette can contribute to the downfall of a society.
RISK
Our behavior in the offline world differs from that of the online world. The reality is that in the real world people subconsciously monitor the behavior of others around them, and adapt their own behavior accordingly.
Online we do not have these types of mechanism (Jones, G.2013) if we do not have these feedback mechanisms, we are creating a long term negative impact on society as a whole.

POE Q2

Question 2


Professor Lee Berger has made the most important archaeological discoveries in the recent history- two new species of human ancestors. (National discovery).


Ask
With help from his nine year old son's curiosity he found two million-year old fossils of an adult female and a young male which he named Australopithecus Sedibe- one of humankind's oldest ancestors.
Acquire
In 2013 guided by cavers Berger discovered ancient fossils outside Johannesburg, deep inside the Rising Star Cave in the Cradle of humanity world heritage site, he uncovered 1,550 fossil elements, representing an unprecedented is individuals in what is they believed to be a burial site. he named the species Homo Naledi.
The new species appeared to have intentionally deposited the bodies of its dead in the  remote chamber. (Wikipedia).
Analyse
Homo Naledi is an extinct species and it is is characterized by a body mass and stature similar to small-bodied human populations, a smaller volume similar to Australopithecus, and a skull shape similar to early Homo species. The skeletal anatomy presents ancestral features known from Australopithecines with more recent features associated with later species.
Apply and Assess
Two cavers were exploring the inner chamber of the rising star cave situated about 30 miles from Johannesburg. They  had found an entrance to an unexplored part of the cave known as Dinaledi Chambers.
Professor Berger decided to use social media because the entrance was down steep narrow shaft, he called social media to call expertise of amateur cavers small enough to squeeze through the 18cm fracture.
Between November 2013 and March 2014 more than 60 cavers and 50 scientists worked on locating and retrieving more than 1,550 fragments of fossil bones.
Professor Berger said that the chamber has not yet given up all its secret as they are potentially 100 or 1000 remains of Homo Naledi still down there. (www.independent.co.uk/SteveConner.



POE Q8

Digital health


kindly follow this link to access images of digital health http://az.pinterest.com/sinonzulu/digital-health/

five fluencies of digital citizenship

THE FIVE FLUENCIES OF DIGITAL CITIZENSHIP




1.Solution fluency
2.Information fluency
3.Media fluency
4.Collaboration fluency
5.Creative fluency

nine elements of digital citizenship

NINE ELEMENTS OF DIGITAL CITIZENSHIP




1.Digital access
2.Digital commerce
3.Digital literacy
4.Digital etiquette
5.Digital law
6.Digital rights and responsibility
7.Digital health and wellness
8.Digital security
9.Digital communication





POE Q5

http://www.thinglink.com/sinonzulu
Digital rights and responsibilities for society, business and education.



POE Q1 : Consequences of digital divide in South Africa

CONSEQUENCES OF DIGITAL DIVIDE IN SOUTH AFRICA


Technology is changing at a rapid rate.
Given the rapid change in computer hardware power, and the introduction of new technologies, access, to data and information is critical.


The consequences of digital divide in South Africa is associated with socio-economic factors like the gap between rural and urban areas. It is also associated with demographic factors since South Africa is a developing country.
Many people in most rural areas are not digitally literate and as a result cannot access the internet, not because they do not want to, but because they are not able to.
Children from model C schools in rural areas struggle to use the computer mainly because their schools do not have Computer lessons.


As a result children from those schools struggle to adapt to the changing usage of technology.
They might even struggle to use a computer at work because of the lack of knowledge.
That will cause in the end limitation to the kind of job they can apply to actually do.



THE DIGITAL DIVIDE IN INFRASTRUCTURE


Developed countries have a greater penetration of appropriate and up-to-date infrastructure than that of developing countries. Due to infrastructure restrictions, coupled with socio-economic factors, people in townships and rural areas utilise their mobile phones as a point of access to the internet.

assigment Q1.2 the impacts of digital divide on social capital

the impacts of digital divide on social capital


social capital is the collective value of all social networks and the inclinations that arise from these networks to do things for each other .
social capital is about specific benefits that are achieved from the use of social network.
it creates value for people who are connected to each other.
users of FACEBOOK or TWITTER are in fact building social capital.
the more we engage in social media the more we increase our social and communication skills.




given the value we gain from online collaboration, it is obvious that the digital divide would impact on people's ability to leverage their social capital, thereby impending their ability to access data, information and knowledge that might enhance their own feelings of self-worth coupled with their ability to further themselves socially, economically, and professionally.

assignment Q.2.2 Rape-the cold hard facts


South Africa has been named the 'Rape Capital of The World' due to the high rate of rape cases.
Using the solution fluency process i will propose possible solution to this problem.

Solution fluency process.
1.Define
The problem is that South Afica has been named the rape capital of the world, meaning that it has a high rate of rape cases compared to other countries.
2.Discover
In the past years, the rate of rape statistics has increased drastically.
Our local newspapers, radio stations and television report on cases of rape, be it in the rural or urban areas.
Children and old people are often victims of such incidents but what is more surprising is that the culprites often get a lighter sentence.
It is clear that rape cases will still increase, as long as the culprites have the freedom to get bail within 24hours.
People have lost all hopes on the law as to how it handles rape cases, to them it seems like the victim is not important than the culprite.
3.Dream
I and many people in South Africa believe that there should be a more thighter, more stronger law regarding people charged of rape.
The government can enforce laws that protect and safe gaurd the victims.
One of government's initiative to help victims of rape was to introduce clinical counceling, to help them to heal.
A person charged of rape should not be granted bail, since its such a huge case thus it should be treated as such.
4.Design
This proposed solution can only become a reality, if the government is involved.
Since government is in charge of making the laws,it should make a thighter law towards rape cases, maybe a law that denies bail to a culprite.
5.Deliver
This plan can be put into action by, writing a petition to both SAPS and government to interven in reducing the high rate of rape cases.
It is also vital to encourage victims to talk about such cases to the police, and not be afraid to lay charges.
6.Debrief
News24 has recently announced that the rape statistics of South Africa has decreased in 2015 compared to the last years.
There is still a lot to be done but as a country, we are getting there.

Assignment Question 3 Q3.1Internet of things

Internet of things

The internet of things refers to any device or thing that can be connected to the internet, examples could be cars and home appliances.
In other words, the internet of things somehow connects us to the world at large.

It's impact on the future.

The internet of things has the potential to shift the way people around the world do things, think and learn.
In  one way or another, we are connected to the world, technology has the ability to connect us to the world, making our lives easier.
Today, our cell phones are able to inform us of what's happening around the world in a second.
The new improved appliances are advanced in a manner that, they can be paused, rewinded or recorded e.g a TV can be record a show or your favourite show in case you do not have time to watch it.
Our cell phones have GPS to help us manage and navigate our roads properly.
All these advanced technologies makes our lives easier and much more manageable.
From the above example, it is clear that the internet of things is not something that is going to happen but it is already happening.
According to (press,G.2014) in 2014 approximately 16 billion things were connected to the internet.

Example of the internet of things.

Wearable technology is the latest digital communication trend with watches and glasses enabling users to communicate, play, work and socialise through the wearable technology.
The GOOGLE glasses allows a person to do all the things they normally do on a tablet or smartphone but visually in front of you.
For example if you are lost, just call up maps and let the glasses guide you with a step-by step guide directing where to go.

In conclusion we can safely argue that the internet of things will change the future into a global technological world.

Q3.2 Aspects of intelligence

Aspects of intelligence according to Gardner(1983)

As we grew up, we only knew that an intelligent person is good in math-based thinking and linguistic skills.
There are several levels of IQ.Gardner (1983):

1.Linguistic-verbal
These people are the ones good with words, both written and spoken.
They are good at remembering written and spoken information.
They enjoy reading and writing and are good at debating, explaining things.
They also use humour in their storytelling.
2.Visual-spatial
These people are good at solving puzzels, love reading, are also good at giving directions
They enjoy drawing and painting and recognise patterns easily
3.Bodily-kinaesthetic
These people score best in body movements, actions and control.
They are good at dancing, they do well in sport, they are creative with their hands.
They are physically coordinated
They best remember things by doing, rather than hearing or seeing.
4.Naturalistic
These bunch of individuals, love nature.
They are very in tune with nature, they want to learn about other species and explore the environment.
They are often arlet of any subtle change within their own environment

The importance of these levels to the business and technology.

The reality is that jobs are being automated more and more, resulting in a pressure for companies and countries alike to search for those people that have creative skills.
With the ever changing environment and advanced technology, the demand for creative skills becomes or is rapidly becoming greater.
Most businesses today, require creative thinking and skills to meet their target market.
Companies are starting to shift their focus from the features and performance of their products to more creative ways in which to create and deliver their products.
It is clear that creative skills are becoming a hot commodity in the market place.

Assignment Q.4

Digital etiquette can be defined as the electronic standards of conduct or procedure.
Online etiquette has become an important part of our social, educational and work lives, the are however, inappropriate digital conducts that can have a negative impact on society.


Inappropriate digital conduct
Examples of inappropriate digital etiquette
Student use cellphones to text in class on topics that are not class-related.
Students communicate on a social networking site without knowing the rules or responsibilities.(digital citizenships in school)


Inappropriate digital conduct according to  (Melin, 2013)
Don't type in CAPS as it is considered shouting
Don't spam
Don't use offensive language
Don't steal other people's identity
Don't distribute illegal materials
Don't flood.
Don't expect an answer straight away


Etiquette and society
Etiquette is societal norms.
Netiquette is the rules society dictates we utilize when we are online.
If we disregard all rules and values, our society will eventually fall into anarchy.
Netiquette can contribute to the downfall of a society
 

assignment Q5.1 Digital rights and responsibility

Digital rights and responsibilities.

According to Digital citizenship DFerris digital rights and responsibility refers to having freedom to use all types of digital technology, while using the technology in an accepteble and appropriate manner.
As a user of digital technology, you have the right to privacy and the freedom of personal expression.We also, however have the responsibility to use it wisely and respect the works of others.With everything, there are rules, with every right there is a responsibility.

Digital rights
Right to freedom of expression.
Right to privacy.
Right to digital access.
Right to our identity.
Right to credit for personal works.

Digital responsibility
Responsibility to report bullying and harassing.
Responsibility to cite works used for research and resource.
Responsibility to download music, videos legally.
Responsibility not to falsify our identity.

Internet censorship in countries like China is extreme due to a wide variety of laws and administrative regulations.
The government authorities not only block website content, but also monitor the internet access of individuals.
That is wrong and according to the Digital rights illegal.
According to Digital rights and responsibilities, every individual is entitled to access to internet, and privacy.
This kind of law implemented in China is depriving humans their right and thus should be looked in to by top authorities.

assignment Q5.1 digital bill of rights.

The United Nations is a group of different countries that are all for and about implementing peace and unity, one of its main aspect is the Human Rights or the United Nations' Human Rights.It highlights the rights people across the country have and together with the responsibilities.

Digital Bill of Rights.
1. Freedom
Digital citizens have the right to free, uncensored internet.
2.Openness
Digital citizens have the right to an open, unobstructed internet.
3.Fairness and equity
All digital citizens are and should be created equally on the internet.
4.Participation
All digital citizens have the right to participate peacefully whenever, wherever and however they choose on the internet.
5.Creativity
Digital citizens have the right to grow, create and collaborate on the internet,and be held accountable for whatever they create.
6.share
Digital citizens have the right to freely share their ideas, lawful discoveries and opinions to the internet.
7.Access
All digital citizens have the right to access the internet equally, regardless of their race or background.
8.Association
All digital citizens have the right to freely associate with individuals on the internet.
9.Privacy
All digital citizens have the right to privacy on the internet.
10.Property
Digital citizens have the right to benefit from whatever they create, and secure their intellectual property on the internet.(keepthewebopen.com).

ASSIGNMENT question 2.1

The following video is adapted from www.youtube.com/digital-footprint (last accessed 24May 2016)

assignment Q1.1

1.1 Power point presentation on the core elements of digital citizenship


available at https://www.scribd.com/user/319581947/sinonzulu-noplatana
OR www.scribd.com/doc/313655153/Core-Elements-of-Digital-Citizenship