Wednesday, 24 June 2015

Digital Security

Digital security  

 Issues surrounding security It is very essential to have such as your computer protected from hackers as they can access it and post your private information for illegal stuff.

   Problems of T&C's  

 Terms and conditions: not reading the small print can mean big problems Survey shows just 7% of people read the full terms when buying a product or service online, while a fifth say they have suffered from not doing so   
The research, commissioned by investment specialist Skandia , exposes how easy it is for people booking and paying for goods and services online to click the terms and conditions box without actually reading them in full. It is really important you understand everything before you sign on the dotted line, as you could find yourself landed with extra fees or charges. While all consumer contracts are subject to the unfair terms in consumer contract regulations, this doesn't mean you can challenge a clause just because you didn't know it was there, or you think it's unfair – because it's clearly written, you're bound by it. 

  Types of cyber crimes 

  With the advent of computers and networked communications, crime was affected in two ways. First,existing crimes were simply performed on the Internet, not changing in severity but only in practice. Second, new ways to commit crimes, or new ways to commit older crimes, were introduced, forcing the government to create new laws in response. Cyber crime usually falls under a few categories involving fraud, intellectual property, theft and abuse. Accordingly, new punishments were also introduced to correspond with particular cyber crimes.these crime include: 
  •  Data Theft and Illegal Access
  •  Violations of intellectual property laws 
  •  Fraud can occur online when a party or individual attempts to coerce another party to give up  personal information or money through false pretenses 
  •  Child protection laws typically involve child privacy and protection from exploitation.

 WAYS TO PREVENT CYBER CRIMES IN SOUTH AFRICA

 
 

Digital Rights and Responsibilities

It may be difficult to understand digital citizenship as the youth in today's digital society, especially when it involves its rights and responsibilities which we have to follow each and every time we us the internet. 

BASIC RIGHTS AND RESPONSIBILITIES FOR STUDENTS 

 
Rights
ü  The right to Internet access
ü  The right to express yourself but be aware of those who you might offend
ü  Each user has the freedom to do whatever they want, except if it's illegal
Responsibilities
ü  Respect everyone that uses the internet.
ü  Keep your personal information private.
ü  Avoid taking part in illegal activities.

 An official AUP for the IIE

General Principle
  • Educational Institution-provided Internet/Intranet and email privileges, are considered educational resources and are intended to be used for educational purposes only. Students should be aware that usage is monitored for unusual activity.
  • Educational Institution email accounts, Internet Ids and web pages should not be used for anything other than the Educational Institution's sanctioned communications. It should be made clear to recipients that opinions expressed by individuals are not necessarily those of the Educational Institution.
  • Use of the Internet/Intranet and email will be subject to monitoring for security and/or network management reasons.
  • The distribution of any information through the Internet, computer-based services, email and messaging systems is subject to the scrutiny of the Educational Institution.

Conditions of Use
The following practices include, but not limited to, are considered unacceptable and may be subject to disciplinary action:
  • Visiting Internet sites that contain obscene, hateful or otherwise objectionable materials; sending or receiving any material that is obscene, defamatory or racist or which is intended to annoy, harass or intimidate other persons.
  • Sending and receiving unusually large emails or attachments; sending or forwarding electronic chain letters.
  • Students wasting time on non-educational business.
  • Soliciting emails that are related to non-Educational Institution business for personal gain or profit.
  • Using the Internet or email for gambling or illegal activities.
  • Use which may result in damage to the Educational Institutions equipment.

Within a school, we have a computer network that is available for use by students for curriculum purposes; this network is connected to the Internet to enable students to undertake research for subject study.  To ensure that this computer network is used correctly and remains secure, it's important that we ensure that students use the facilities in an acceptable manner.   To ensure that all students adhere to the guideline they must read the ICT Acceptable Use Policy and think about its implications if or when these guidelines are broken. In addition to keeping your students safe, the AUP should addresses issues of appropriate conduct online. Plagiarism has become way too easy for students to practice in the Internet age.  understanding these terms means that you have agreed to the terms of the AUP and it stands as their “ticket” or “pass” for going online in the library. We put the AUP in writing and print it out in the form of a contract and then have students, parents (or guardians) and the principal commit to these rules by signing the contract. A copy of the AUP will be near each computer and  someone in the school will be appointed to enforce the AUP rules. One of the most important way to keep students safe while using technology is to monitor them at school and stress that parents do the same at home. 

Digital Etiquette

Internet Ethics reflect the ethics of a wider society in which the internet is being used. Ethical online behavior is referred to as GOOD NETIQUETTE and Unethical online behavior is referred to as BAD NETIQUETTE. The term Netiquette is derived from two words : Internet and Etiquette.


Code Of Conduct for Educational Institutions

  • Do not seek to gain unauthorized access to any kind or resources in the internet.
  • Do not disrupt the intended use of internet within the resources of the institution.
  • Do not waste the institution's resources of the internet.
  • Do not compromise the privacy of other internet users.
  • Do not use the institutions internet resources for unethical behavior.
  • Do not use the institutions internet resources for fraud.
  • Do not destroy  the internet based information inserted by the institution.
  • Do not create false identity under the institution.
  • Do not access what you should not under the institution.
  • Do not post racist, sexist, homophobic or unpleasant remarks.

Penalties for failing to meet these:

  • Depending on what has been do, get a warning.
  • Get suspended fro the Educational institution.
  • Get removed from the internet system.
  • if the is a illegal crime involves, law enforcement is necessary.

How to enforce and manage these.

  • By making sure that everyone is aware of the code of conduct and what will happen if they fail to follow it.
  • Ensure that the penalties are taken serious.
  • No acceptation or omission on enforcing the penalties.
  • No being bias.
  • Constant reminder of the Code of Conduct and its penalties.




REFERENCES

  1. Digital Etiquette. Colburn's digital Citizenship. Available at: http://colburndigitalcitizenship.weebly.com/digital-etiquette.html
  2. Criminal penalties for email hacking. The law dictionary. Available at: http://thelawdictionary.org/article/criminal-penalties-for-email-hacking/
  3. Internet ethics and netiquette. internet guide. Available at:                                    http://www.internet-guide.co.uk/netiquette-guide.html

Tuesday, 23 June 2015

DIGITAL COMMUNICATION

OVERVIEW OF THE GAME


This game is based on a village which will belong to you as the player; making you the chief of the village. You are in charge of everything meaning that all of the villages decisions are taken by you.
For the first 48 hours of first playing the game, as the chief you need to upgrade resource collection which are Gold Mine, Elixir collectors and resource storage which are the Elixir Storage , Gold Storage. As the chief you need to ensure that you build all these while you still can and then also upgrade the town hall.
Cover Photo
LOGISTICS
These are the organization and implementation of the Clash of Clan operation. this includes the organization of the village and how it looks, planning on what to build first and what is more essential, manages the villages finances, arranging the town and making sure it has all the necessary requirements to keep the village and its people alive. this also involves the constant day to day running of the village with the aim to improve it.
STRATEGIES USED
  • Training the troops to invade and attack the Goblins in order to acquire more treasure enabling a better chance to upgrade the village.
  • collecting enough Gold and Elixir in order to use it to upgrade the village.
  • Upgrade your Elixir Collectors and Gold Mines to a high
MY EXPERIENCES
This game kept me in interest from the first few minutes as it gives you a big role with bigger responsibilities. the graphics are also interesting and it can give you hours of entertainment. I am able to interact with other players and view their progress which makes me feel like I'm part of a much bigger village.
REFERENCES



Digital Literacy and Information Fluency

During the year of 2013, animal planet aired a couple of documentaries about mermaids being discovered .Animal Planet 2013 Mermaid Website


  • PURPOSE OF THE OF THE SITE AND THE SERIES
The purpose of the series was to come up with a story that almost everyone is curious about. We always ask ourselves if mermaids do exist or they are just a myth, but couldn't find an answer to that question because there has been no solid evidence that such creatures do actually exist.
The purpose of the series was to then come up with a visual answer to the question which will show the evidence of their existence. The purpose of the site was to get feedback from those who watched it and at the same time bring on traffic to the viewing of the documentaries.

  • THE PROCESS
This started by an idea which was influenced by curiosity, then research was made on how mermaids are believed to look like, what they eat, where they live etc. then the next process was to construct the actual documentary. then this documentary had to be made public by making people aware of the series so they can view it, this was done by creating a site and posting the information as well as the actual documentary.

  • PUBLIC'S RESPONSE
The public took this more as entertainment than an actual discovery as they mentioned that the graphics seemed more men made and even left people questioning more. at the same time it brought about excitement because its not the usual broadcast that we usually get from channels.


  • OPINION OF THE SUCCESS OR LACK THEREOF OF THE CAMPAING
I think that the campaign just went well but not in the level that they would have liked, it was recognized globally and had people talking but did not get people talking that much. this should have went in a level that it got more people investigating on their findings and be broadcasted in the news as a new discovery.



Your Digital Footprint is Important



  • 87% of Americans can be identified online with just three facts about them: ZIP code, birthday, and gender (Morehouse, 2011).
  • In 2009, 45% of all hiring managers used search engines to research the digital footprint of potential applicants - up from 26% the previous year (Cowell, 2010).
  • 63% of hiring managers decided not to hire an applicant because they found something questionable about that person on a social networking site (Cowell, 2010).
  • Most people don't know what's in their digital footprint:  only 3% of people perform a search on themselves regularly, and almost three-quarters have only searched for themselves once or twice (Cowell, 2010).


available at: http://digitalfootprintimu.weebly.com/follow-your-footprint.html


REFERENCES




Monday, 22 June 2015

Digital Access

DIGITAL ACCESS


Digital Access is “The full electronic participation in Society” (Ribble, 2011).
in the digital world there are such as the World Wide web, internet, cellphones, television and other technologies and communication technologies. these are seen as social benefits and are able to make life easier and more convenient.
Are You Part Of The Digital World?

having digital access can bring about both social and economic benefits which open doors to many opportunities.

DIGITAL DIVIDE IS BASED ON SEVERAL GAPS
  • Social Capital
This involves the ability to access data and information through the use of the digital technologies. this is based on those who have the access and those who don't. this divide is often based on social economic factors, but as there are different environments, communities and countries; this gap may also be based on geographic factors, developed verses undeveloped.
  • Knowledge Capital
This involves the ability to have the information, ability or skill of the digital world and how to used the technologies in a way that it will benefit the user, businesses or communities. in context to businesses, it will be an advantage if the business have employees who are very knowledgeable when it comes to the digital world.

  • Human Capital
This involves man power that a business may have, human capital is very essential as people are needed to operate the technology that is available. without the employees no progress will be achieved.

Summary of the Digital World In South Africa.