Digital Citizenship POE 16003302

Monday, 7 November 2016

Q 1.3Primary school children are the most vulnerable to malicious intent online. Research what the nine elements of digital citizenship are. Create an electronic poster aimed at primary children, with a slogan and examples of what the nine elements are.

.

                    We are Digital  Citizenship 
 Children respect themselves and other children by using kind words.
   Children visit website when they want to learn or for educational purpose

 
  • digital commerce                                                           Children respect themselves and others
  • digital communication                                                     Balance the time and stay safe online
  • digital literacy
  • digital etiquette
  • digital law
  • digital right and responsibilities
  • digital health and wellness
  • digital security (self protection)
  • digital access
                                    .
Posted by Karabo Maphoto Digital Citizenship POE 16003302 at 01:44 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Sunday, 6 November 2016

Q .6 Create an online poster for your institute of study to warn students of the potential impacts of Digital Technology on Society. Use ThingLink and post the link to your blog.



Posted by Karabo Maphoto Digital Citizenship POE 16003302 at 22:17 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Q ,8 Digital Health and Well Being Navigate to https://www.pinterest.com You will use this tool to curate content on this topic. You will have to create an account on this site. Create a board and pins at least 15 topics related to digital health to your board. Post your link using the board as an image to you blog


Digital Health and Wellness    

https://za.pinterest.com/maphotok88/?etslf=3826&eq=d



   
                                                 















Posted by Karabo Maphoto Digital Citizenship POE 16003302 at 22:10 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Q ,8 Digital Health and Well Being Navigate to https://www.pinterest.com You will use this tool to curate content on this topic. You will have to create an account on this site. Create a board and pins at least 15 topics related to digital health to your board. Post your link using the board as an image to you blog


Digital Health and Wellness    

https://za.pinterest.com/maphotok88/?etslf=3826&eq=d



   
                                                 















Posted by Karabo Maphoto Digital Citizenship POE 16003302 at 22:10 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Q .7 Cyber security risks range from ID theft and fraud to corporate hacking attacks (Sony Attacks). cyber security has never been more important fo individuals, business, organisations and governments. Reseacrh 2015's top 5 cyber security risks in south africa. critically discuss about how users, enabled hackers to obtain these details more easily by providing known companes with our data and an overview how they can be avoided or mitigated

 Digital Security


Top 5 cyber security in South Africa

  • Ransomware- is a type of malware which restricts access to the computer system that if infects. Ransomware encrypts data and McAfee thought attacks on mobile devices and cloud-backed data would increase.
  • The internet of things- Refers the connection of physical devices such as home appliances and cars to the internet.
  • Cyber-espionage- is becoming the weapon of choice for many national governments no matters how tight lipped they may be about any involvement in such activities to undermine their enemies.
  • Cyber theft increases- The stealing of financial information is nothing new, with stolen credit or debit card data on the black market a well-established and lucrative business for criminals.
  • Insecure passwords – Easy to crack passwords will continue to be a big risk 2015.
 Hackers phish pages, where a hacker will send a login page of Gmail or Facebook and it will look exactly the same as the real Facebook login page. Most of the time they use Social engineering skills like, they will send message saying “This person has posted your bad picture on Facebook, click here to check your photo”, and once you click on the link, you will be taken to login page, as soon as you enter your password, it will be sent to hacker, and your page will reload to take you to the real page.

 Most of the time, victim don’t even realize his password is gone. 

Many of them will use your Email account to send spam links to your contact list or use your Facebook account to send spam application link. Though, the major problem comes when hackers get hold of your private and sensitive data and blackmail starts.




To way to solve this is by enforcing stricter passwords. Users should be encouraged to stop replying to emails that are not reliable and safety . They should check if the email relates to the financial institutions.
Not only can users be at risk on the internet but when receiving phone calls as well. People may ask personal questions in order to determine their potential password.

This can be easily avoided by not giving out personal information over the phone. If an institution needs information they will often tell you to go in and resolve the issue.
Users should always keep on guard when online and always check what links they are clicking on and what files they are downloading. In order to protect your self, users are advised to download anti-virus software in order to protect your computer and confidential information.

References 
CNBC. 2015. Top 5 cyber security risks for 2015. [ONLINE] Available at:http://www.cnbc.com/2014/12/19/top-5-cyber-security-risks-for-2015.html. [Accessed  25 October 2016].
Mahesh. 2015. How do hackers hack your passwords . [ONLINE] Available at:http://www.shoutmeloud.com/how-do-hackers-hack-your-passwords.html. [Accessed  25 October 2016

Post navigati

Nex
Posted by Karabo Maphoto Digital Citizenship POE 16003302 at 22:10 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Q.5 Create one Thinglink image that representing the role of Digital Rights and Responsibilities for society, business and education. Provide a definition in each of the images, highlighting the most critical aspects you believe they have in each context.

Digital Rights and Responsibilities are the "privileges and freedom extended to all digital technology users, and the behavioral expectations that come with them" (Ribble & Bailey, 2007). In other words, your students have the privilege and freedom to engage in technology,


The following list sets out a few rights and responsibilities in relation to AUP (Brown University, 2015) (Institute of International Education, 2015) (Institute of International Education, 2015).


  •    You will only have access to computers that you have authorization over

  •   You may not attempt to copy or assume another users’ password to gain access to    their account 
  •  You are responsible for all resources allocated to you which include hardware and          software
  • One is expected to adhere to agreements that are set out by third parties in                  connection to resource.
  •  You should be responsible for protecting your credentials in order to limit                      authorized access.


Posted by Karabo Maphoto Digital Citizenship POE 16003302 at 22:10 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Q.4 Create a Digital Code of Conduct for education institutes. Please think of how you would reinforce and manage it, include this into your ‘Code of Conduct’. This would be a guideline for the institutes that they can then adapt to their specific requirements. Please ensure that you cover the following elements:

Digital etiquette, or netiquette as its sometimes called, is a basic set of rules you should follow in order to make the internet better for others, and better for you. It's just as important to treat people with courtesy and respect online as it is in real life.

The ten point of etiquette 

  • Do not steal other people,s identity 
  • Remember the human
  • Do not abuse your power 
  • Do not use offensive language 
  • Do not ask the questions that can not be found on the site      
  • Share and expert knowledge 
  • Know where you are in cyberspaces 
  • Respect other people,s time
  • Do not flood 
  • Make yourself look good online.
if the code of conduct is not followed strict action will take place

  • Students will not be allowed to write exams or submit assignments
  • They will be expelled
  • Their image will be affected by other institute.
Technology and its involvement in our daily lives, it is fundamental that students transfer that understanding of appropriate behaviour into the digital world. students need to know that their are choices, their words and their actions in the digital world can truly have an impact on others. in addition, poor choices can lead to consequences and or loss of a certain privileges. educators and parents must be role models of our students and discuss these issues with them.The student will be more successful if parents and educators are proactive in engaging in discussions and lessons so that students understand the rules of digital etiquette.


Posted by Karabo Maphoto Digital Citizenship POE 16003302 at 19:22 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Older Posts Home
Subscribe to: Posts (Atom)

About Me

Karabo Maphoto Digital Citizenship POE 16003302
View my complete profile

Blog Archive

  • ▼  2016 (12)
    • ▼  November (12)
      • Q 1.3Primary school children are the most vulnera...
      • Q .6 Create an online poster for your institute of...
      • Q ,8 Digital Health and Well Being Navigate to htt...
      • Q ,8 Digital Health and Well Being Navigate to htt...
      • Q .7 Cyber security risks range from ID theft and ...
      • Q.5 Create one Thinglink image that representing t...
      • Q.4 Create a Digital Code of Conduct for education...
      • Q .3 Create a blog post titled: The social economy...
      • Q,2.1 Use the information fluency process, ask, ac...
      • Q,2.1 Use the information fluency process, ask, ac...
      • Q 1 ,2 What is the techno-economic paradigm and ho...
      • Q1.1 Research the issues surrounding access; note ...
Simple theme. Powered by Blogger.