Wednesday, 26 October 2016

REFERENCES


REFERENCES

Anon. 2015. Digital Citizenship. Module Manual. The Independent Institute of Education: unpublished.

Dekman5, (2016). Global Digital Divide. [image] Available at: https://commons.wikimedia.org/wiki/File:Global_Digital_Divide1.png [Accessed 24 May 2016].

Investinganswers.com. (2016). Knowledge Capital Definition & Example | Investing Answers. [online] Available at: http://www.investinganswers.com/financial-dictionary/businesses-corporations/knowledge-capital-6014 [Accessed 24 May 2016].

Spence, M. (1973). Job Market Signaling. The Quarterly Journal of Economics, 87(3), p.355. The United Nations, (2012). Social Inequality. [image] Available at: https://en.wikipedia.org/wiki/Social_inequality#/media/File:Inequality-

adjusted_Human_Development_Index.png [Accessed 24 May 2016

Ribble, M. (2011). Digital citizenship in schools (2 Ed.). Eugene, OR: International Society for Technology in Education.

Ryan. (2014) Understanding digital marketing strategies for engaging the digital generation, 3rd edition. London: Kogan Page

Carroll, B.*(2009) Writing for digital media. New York, NY: Routledge

Mossberger, K. (2007) Digital citizenship: The Internet, society, and participation.2nd edn.Cambridge, MA: The MIT Press

Jones, J. and Slater, L. (2011) Digital journalism. Thousand Oaks, CA: SAGE Publications

 

 

 

POE QUESTION 8

https://uk.pinterest.com/nthabiseng_nkab/digital-health-and-well-being/


Please open this above link for viewing Question 8 of Digital Health and Well Being .

POE QUESTION 7


QUESTION 7: POE

DIGITAL SECURITY

From identity theft and fraud to corporate hacking attacks, cyber security has never been more important for businesses, organizations and governments.

Hacking experts warn there are plenty more security risks ahead in 2017 as cyber criminals become more sophisticated. While "traditional" cybercrime such as internet password fraud will still be widespread in 2016, larger scale espionage attacks and hacking the Internet of Things (IoT) will also be risks.

Beware: ransom ware

Ransom ware - a type of malware which restricts access to the computer system that it infects –will become increasingly sophisticated in its methods and targets, experts at McAfee Labs warned.

"We predict ransom ware variants that manage to evade security software installed on a system will specifically target endpoints that subscribe to cloud-based storage solutions such as Dropbox, Google Drive. Once the endpoint has been infected, the ransom ware will attempt to exploit the logged-on user's stored credentials to also infect backed-up cloud storage data," McAfee's report on 2015 cyber risks noted.

"Ransom ware victims will be in for a rude shock when they attempt to access their cloud storage to restore data—only to find their backups have also been encrypted by the ransom ware," the experts said.

More worryingly, ransom ware attackers will find as many ways as possible to extract ransom payments from victims to release their encrypted data, McAfee warned.

The Internet of Things

The Internet of Things – the connection of physical devices such as home appliances and cars to the internet -- will still be the "Internet of Vulnerabilities," according to cyber experts.

"The IoT will be integrated into every market you can think of – from healthcare to the energy industry and transport network but it hasn't been designed with security in mind. There are millions of hackers out there that could compromise these interconnected systems. We have sacrificed security for efficiency"

Cyber-espionage

Cyber espionage is becoming the weapon of choice for many national governments – no matter how tight-lipped they may be about any involvement in such activities to undermine their enemies. The stealing of financial information is nothing new, with stolen credit or debit card data on the black market a well-established and lucrative business for cyber criminals.
But as new ways of paying for goods, such as contactless and mobile payments, become the norm for European and African consumers, there's a new opportunity for hackers – particularly if retailers don't store payment data securely


Insecure Passwords

Easy-to-crack passwords will continue to be a big risk in 2016, analysts said. "Weaknesses of passwords are known, but still lead to many of the high-profile attacks such as the recent I Cloud attack.”2016 is likely to be the first year when the password starts to be phased out in favour of a number of different multi-factor options. Next year may well be the first year of multi-factor by default," Digital Shadows, a cyber-threat intelligence company, told CNBC. The mechanisms for password recovery are flawed," John added. "The traditional method of password recovery is asking questions that only you, the real owner, should know. Unfortunately, answers to these questions often can be deduced based on information that can easily be found online -- especially given people's proclivity for "over-sharing" on social media sites."

 

An overview of how this can be avoided

The tips below provide basic information on how you can prevent online fraud.

  1. Keep your computer current with the latest patches and updates.
  2. Make sure your computer is configured securely.
  3. Choose strong passwords and keep them safe.
  4. Protect your computer with security software.
  5. Protect your personal information.

6.    Don't allow others to access your password protected sites without you being present. 

 

 

POE QUESTION 6

https://www.thinglink.com/scene/845240980918501378


Please view here for the online poster  for my institute to warn students of the potential  impacts of digital technology on society.

POE QUESTION 5


QUESTION 5: POE

Digital Rights and Responsibilities


Oval Callout:  Digital Rights and Responsibilities are the "privileges and freedom extended to all digital technology users, and the behavioral expectations that come with them" (Ribble & Bailey, 2007).
 

 

 

 






Digital Rights:

  • Right to freedom of expression
  • Right to privacy
  • Right to credit for personal works
  • Right to digital access
  • Right to our identity 

Digital Responsibilities:

  • Responsibility to report bullying, harassing, sexting, or identity theft
  • Responsibility to cite works used for resources and researching
  • Responsibility to download music, videos, and other material legally
  • Responsibility to model and teach student expectations of technology use
  • Responsibility to keep data/information safe from hackers

 

 Education

"Basic digital rights must be addressed, discussed, and understood in the digital world.  With these rights also come responsibilities as well" (Ribble, 2007). According to Nine Elements of Digital Citizenship, we need to talk about and understand technology users' digital rights, and we also need to understand the associated responsibilities (Ribble, 2007): Avoiding plagiarism by using citations

 

 

Society and business

 Following acceptable use policies and using technology responsibly

Using online resources appropriately, siting sources and obtaining necessary permissions

Use technology for inappropriate behaviour such as cheating

Cyber-bullies, threats, etc.