Monday, 24 October 2016

P.O.E Reference list


1. Crocket, Jukes and Churches, 2011. The Five Fluencies Of Digital Citizenship. Available On The Student Manual [ https:// portal: iie.ac.za/student/20 Manuals/DIGC 5110-Digital-Citizenship].

2. Gartner, 2015. Available Online [ www.gatner.com/marketing/digital/research/commerce]

3. Heller, J. 2013. The New Evidence Pulls In Highest Animal Planet Rating Ever. Available Online [ www.ibtimes.com/mermaids-hoax-documentary-new-evidence-pulls-highest-animal-planet-ratings-ever-128535.

4. https://ew.wikipedia.org/wiki/mermaids. The Mermaids; The Body Found ( Press Release).

5. https://sites.google.com/site/digital/citizenship/ferris/digital-rights-and-responsibility. The Digital Rights and Responsibility.

6. Ribble, M. 2011. The Elements Of Digital Access.Available On The Student Manual
[ https:// portal: iie.ac.za/student/20 Manuals/DIGC 5110-Digital-Citizenship].

7.Ribble, M. 2011. The 9 Elements Of Digital Citizenship. Ribble, M. 2011. Available On The Student Manual [https:// portal: iie.ac.za/student/20 Manuals/DIGC 5110-Digital-Citizenship].

8. Keenan, R. 2014. 30 Fun and Safe kids websites.  Available Online [www.todaysparents.com/kids/technology-websites/]. [Accessed on 20 June 2015]

9. 
https://digiteen.wikispaces.com/Digital+Health+and+Wellness.[Accessed: 20 June 2015]
10. http://networketiquette.net/netiquette/business-netiquette-rules/  Accessed on 20 June 2015.
11. Stephen, N.2014 .The 10 most common Internet Crimes

Available Online[http://www.complex.com/pop-culture/2012/11/the-10-most-common-internet-crime/ ] Accessed on 20 / 06 / 2015.
12. https://sites.google.com/site/digital/citizenship & Ferris/ digital-rights-and-responsibility. [Accessed on: 22 June 2015].

13. 
Digital Citizenship Module Manual, 2015, 85. 10 Points Of Digital Netiquette.
14. Plauts, J. 2012. 11 Myths The U.S Government Has Addressed. Available Online [http://mentalfloss.com/article/31161/are-mermaids-real-11-myths-us-government-has-addressed] [Accessed: 20 June 2015].

(P.O.E) Q8 Digital Health and Well Being

https://za.pinterest.com/boishady

(POE ) Q.7 Digital Security

Along with the new technology and means of living comes new ways which people are able to abuse the system. "Digital Security refers to ensuring the ability to use digital information systems without interference, description, unauthorized access or data collection." ( Security in-a-Box, [sa]). Digital Security can involve protecting any personal information online and whoever commit cyber crime are generally known as hackers. Hackers are able to exploit certain security flaws in the coding in order to benefit themselves or for personal satisfaction.

Hackers create systems such as:


 * Adware which creates an advert by using your previously viewed sites. This can also be linked with spyware which can memorize your password and a hacker can abuse this system. * Bots is created by hackers to distribute malware or even crack passwords.
 * Ransomware which is created to corrupt and encrypt your files so u can't access them unless certain procedures are followed.
 * Viruses which is able to spread at an incredible rapid rate and corrupt your hardrive.
 * Roottits which is able to remotely control your device and thus can prove an incredibly useful tool to hackers. Users are able to avoid hackers by:
 * Not downloading any unlicensed files
 * Use antimalware software which reduces the risk of any malware being downloaded.
 * Password inscriptions which will make it harder for hackers to acquire your password.
 * Delete all browser cookies which will reduce the amount of information spyware is able to acquire if your device does not get infected.
 * Don't give out personal information by giving out personal information hackers are able to work out passwords and other information

(POE ) Q.6 Digital Law

(P.O.E) Q5 Digital Rights and Responsibilities

Digital Rights
 1. Right to freedom of expression.
 2. Right to privacy.
 3. Right to credit for personal.
 4. Right to personal works.
 5. Right to digital access.
 6. Right to our identity.

 Digital Responsibility
 1. Responsibility to report bullying, harassing, sexting, or identity theft.
 2. Responsibility to cite works used for resources and researching.
 3. Responsibility to download music, videos, and other material legally.
 4. Responsibility to model and teach student expectations of technology use.
 5. Responsibility to keep data/information from hackers.
 6. Responsibility not to falsify our identity in any way. https://sites.google.com/site/digital/citizenship&Ferris/digital-rights-and-responsibility.

(P.O.E) Q4 DIGITAL ENTIQUETTE

Digital Etiquette

 •10 points of netiquette
 Below are listed 10 examples of Netiquette.
 1. Remember the Human - Never forget that the person reading your communication is actually a person with feelings and can get hurt. Essentially never say anything online that wouldn't say to your
 2. Adhere to the same standards of behavior online that you follow in real life - Be ethical in your engagement and know that breaking the law is bad netiquette.
 3. Know where you are in cyberspace - The netiquette required will differ from domain to domain. If you are in a forum of experts, your netiquette should reflect respect. Whereas if you are in a chat room with a group of friends (you know in real life) then the netiquette will differ (Digital Citizenship Module Manual, 2015, 84)
 4. Respect other people’s time and bandwidth - When sharing files or documents, bear in mind the audience’s bandwidth. Furthermore, make sure you read the FAQs first before asking mundane questions where the answers already exist. If you disagree with a group’s discussion, don’t waste their (or your) time by telling them how stupid they are: Just stay away.
 5. Make yourself look good online - Check grammar and spelling before you post. Most people judge others’ intelligence based on the use of grammar and spelling. Only post on things you know about, it is not worth it to look like the fool.
 6. Share expert knowledge - Offer answers and help others where you can.
 7. Help keep flame wars under control - Don’t respond to flame-bait, don’t post spelling or grammar flames, and apologize if you have done so or perpetuated a flame-war Digital Citizenship Module Manual, 2015, 85).
 8. Respect other people’s privacy - Don’t give out other people’s details, online or offline.
 9. Don’t abuse your power - The more power you have, the more important it is how you use it .
 10. Be forgiving of other people’s mistakes - We were all once beginners and should accept that everyone has to start somewhere. (Digital Citizenship Module Manual, 2015, 85).

 •Penalties that apply for failing to meet these
1. If these rules are not followed the first step would be to send the user an automatic email stating that they are breaking these rules.
2. The next step would be to limit their time access to the internet.
3. If the rules are still continued to be disobeyed they would then need to attend a disciplinary hearing.
4. If the previous step has not corrected their actions then the final step would be to take legal action against the user

 •How you would enforce and manage this in your business business netiquette business netiquette

Ethics It is proper netiquette to understand that professionalism includes honesty. Ethics rule explanation, internet etiquette, and netiquette. Business Ethics rule explanation, internet etiquette, and network etiquette.

Receipts It is proper netiquette to record all transactions. Make sure you get a receipt or provide one. 6.1.2 Records rule explanation, internet etiquette, and netiquette. Receipts rule explanation, internet etiquette, and network etiquette.

Signatures It is proper netiquette to use a professional email signature to provide legitimacy to the message.  Signature rule explanation, internet etiquette, and netiquette. Signatures rule explanation, internet etiquette, and network etiquette.

Clarify Question It is proper netiquette to ask for clarification if you have any doubt about your instructions before you act because it is easy to miss-communicate. Clarify rule explanation, internet etiquette, and netiquette. Clarify Questions rule explanation, internet etiquette, and network etiquette. Do 

Not Write in Text It is proper netiquette to refrain from writing in text because it is unprofessional. Whole Words rule explanation, internet etiquette, and netiquette. Do Not Write in Text rule explanation, internet etiquette, and network etiquette.

Paragraphs It is proper netiquette to double space paragraphs to make your writing readable. Spacing rule explanation, internet etiquette, and netiquette. Paragraphs rule explanation, internet etiquette, and network etiquette.

Headings It is proper netiquette to use descriptive headings for everything to give your writing context.  Headings rule explanation, internet etiquette, and netiquette. Headings rule explanation, internet etiquette, and network etiquette.

Reasonable It is proper netiquette to reference your business reasons when writing because readers cannot ask for clarification immediately. Reasonable rule explanation, internet etiquette, and netiquette. Business Reasons rule explanation, internet etiquette, and network etiquette

  Referencing weebly. 2015. 10 Points of Netiquette. [ONLINE] Available at: http://15009701.weebly.com/the-chronicles-of-a-digital-citizen/10-points-of-netiquette. [Accessed 24 October 2016].

(P.O.E) Q3 THE SOCIAL ECONOMY :UNLOCKING VALUE THROUGH SOCIAL TECHNOLOGY

Almost everyone in the world who has a way and means to uses social media for their own purposes. they are many risks associated with the use of social technologies for individual, corporate and communities. RISK INDIVIDUALS: simple things like not setting ones privacy settings properly or liking someone's photo on Facebook can have negative repercussions. for individual cyber bullying can be a problem associated with social technologies. cyber bullying are able to exercise power on over their victims as the bullying is done behind screen instate of face to face. which eliminate the possibility of the bully being caught and reprimanded. COMMUNITIES : social technologies can also cause a divide between community members who may be spending copious amounts time behind a screen or on a cell phone instead of engaging in communication with the people around them. CORPORATE : social technologies can cause damage to a business image . this can happen if an employee or a customer portrays a bad image of the business on social media which can results in the loss of current and future customers of the business . social technologies also present the opportunity for hackers to commit fraud as well as launch virus attacks . BENEFITS INDIVIDUALS : individuals are able to connect with loved ones who may be far away in another country through the use of social technology. COMMUNITIES: communities have been able to come together using social technologies such as Facebook. An example of this can be illustration by the National Youth Development Agency which has taken to social media to motivate the south African youth to lead by example. CORPORATE: business are able to increase brand awareness and share new content instantly . business that are portrayed in a positive way on social media may be able to gain customers and increase profitability with minimal use of advertising . social technology also facilitate communication in the work place , leading to "enhanced information discovery and delivery "(shrm.org.2016). social technology also provide business with an opportunity to target a widespread audience as well widen business contracts.

(P.O.E) Q.2.1 Digital Literacy and information fluency

SEPARATE PAGE FOR FINDINGS. A team of scientists lead by professor Lee Berger fro wits university believe they have discovered an entirely new species of human relative .this fact alone makes the discovery remarkable the Homo naledi fossil was found in the rising star Caves in the Cradle of human kind , in a virtually unnecessary underground chamber.(Ewn.co.za). scientists believe that they may be hundreds of or even thousand more fossilized remains still waiting to be discovered at the site. H.naledi is smaller and much older than the average human with curved fingers and smaller skull. however the species is very similar to humankind which makes this discovery significant. scientists believe that H.naledi may have internationally put the bodies of its dead together in the chamber , which is seen as a ritualized behavior unique to humans . this is imported to note that scientists are able to use this information to place Homo naledi is, which makes it difficult to slot the species into the tree of life.

(P.O.E) Q.1.3 ELECTRONIC POSTER AIMED AT PRIMARY CHILDREN

Q 1.3
(POE) Q.1.2 What is the techno-economic paradigm and how can one develop from this? (According to Sean,2014) techno-economic paradigm describe the change of technology. techno-economic paradigm it analyse the structure of technology and the role in improving the economy through the application of accompanying. One can develop from this by making use of the application of accompanying techno-economic paradigm. Reference ■Malcom, Wilson (2014)(Definition of tehno-economic paradigm), Retrieved from http://www.anthempress.com/techno-economic-paradigms

Q.1.1 P.O.E PowerPoint Presentation