Tuesday, 31 May 2016

Question 7 - Cyber risks

Ellyat (2015). has stated that the top five security risks of 2015 are:

  • Ransomware - A type of malware that infects your PC that can not be removed by the user, but only the creator of the 'Virus' and a fee is demanded in order for the virus to be removed.
  • The internet of things - With the growing popularity of smart devices and all platforms being linked we are putting our personal information and online identity at risk.
  • Cyber-espionage - This is when our online profiles and details are gathered in order for the government to make use of the internet.
  • Cyber theft - This is the financial theft that happens online when shopping on insecure platforms or online bank scams.
  • Insecure passwords- This is when basic information about a person is used to guess passwords and hack accounts or profiles, for example pets names or birthdays.

  • .       (Ellyat, 2015)
  • People have become very negligent in what they post online. Especially the younger generations that are not aware of the dangers that they face online, we have to be weary of the websites and platforms that we use. There are many different anti-virus and anti-malware programs available to us but it is our responsibility to make use of them.





Question 8 -Digital health and well being

https://za.pinterest.com/dylhayman/digital-health-and-well-being/

Question 6 Digital Law

Digital Law

Question 5

Thinglink question 5

Question 4- Digital code of conduct

Digital Code of conduct

The way that you conduct yourself online is very influential on a way that you can be viewed as a person and the perceptions they may have of you.
We have to realise that everything we do online is going to be there forever and be judged by a much wider community than what we are exposed to on a daily basis
The following guidelines will inform and educate you of what is acceptable and allowed online.
1.     The language and punctuation used can be translated very differently, we must take care in the ‘voice’ that we use when posting online, for example, excessive use of exclamation marks or capital letters may give off the sence of an aggrrsive or angry approach.
2.     Always acknowledge your source of information. A lot of time and effort has been put into your online findings so adequate praise is always appreciated and necessary.
3.     Language used is very important, we cannot assume that everyone who reads our post online uses certain language the way we use it. We must a weary of what we say and in what context we use as this can very easily offend or insult somebody online.
4.     We need to be considerate of other users and not assume that they have the same access to internet, large files and un-necessary content in mails is not the correct and professional way of going about business.
5.     Nobody wants span, so do not forward or send any mails to recipients that wouldn’t want to receive it.
6.     As much as we have a freedom of choice we must respect others right to security, personal opinion and information must be kept to a minimum.
7.     Be accurate and be sure that everything you post online has relevance to what is being discussed, be careful not to go off topic.
8.     Use the internet for reason that it was intended to be used. Avoid personal affairs in a professional environment.
9.      
 (education, 2016)   (Issa, 2016)

How the code will be enforced:
1.     All internet activity will be monitored and screened.
2.     All emails and online posts must follow a strict format.
3.     Excessive data usage will be shaped and analysed
4.     All outgoing mail will be screened and approved by the digital administration department.
5.     All mail will be screened and approved for proper use of language


Anyone who fails to comply with this code will face the following consiquences:
1.     On the first incident of failure to comply with this code, the offender will be sent a mail of warning reminding them of the rules.
2.     On the second offence the offender will receive a verbal and written warning and be made to sign and acknowledge hat they understand their actions.
3.     On the third offence the offender will have their internet access restricted and be made to attend a disciplinary hearing.

4.     If the offender fails to abide by the code a fourth time, all access will be terminated and any further action will be taken.

Monday, 30 May 2016

Question 2 -Homo Naledi

There are five steps to the information fluency process and they are as follows:
1.     Ask
2.     Analyse
3.     Acquire
4.     Apply and,
5.     Assess
We can use these processes to research the discovery of Homo Naledi:

·       Ask- We must question the validity of these findings,
                        -who made the discovery?
                        -Where was it made?
                        -How old is the fossil that was discovered?
                        -Is there only one body found?
                        -Why has it not been discovered yet?
                       
·      Acquire- This step refers to the gathering of the information and research. This is the physical study of the findings, for example authentication of the age of the fossil or whether is even of human descent.

·       Analyse-  This step can be considered the more in-depth study of the finding and this would then answer the questions you asked in the first step, it would give you a more researched and accurate answer. Maybe establish whether the findings are credible and if we can use them to make credible assumptions.

·       Apply- This step is now the implementation of the information that was gathered in the research.

·       Assess- the final step would be to go back and question your findings again. To analyse your findings and be sure that the investigation was carried out in the appropriate manner, and as accurately as possible.

                        

Question 1.3

Question 1 - The digital divides