Tuesday, 31 May 2016

Question 8

Digital Health

Link to Pinterest
https://za.pinterest.com/lethabobopape/digital-health/


Question 7

Cyber Security

Top 5 Cybersecurity risks in South Africa
  • Ransomware
  • The internet of things
  • Cyber-espionage
  • Increase in cyber theft
  • Insecure passwords

  • Ransomware – a ransom has to be paid first by the user for them to access their computer.
  • The internet of things – when you are connected to the internet with a device there is a risk of your personal details being obtained.
  • Cyber-espionage – when they get information on the internet to be used by the government.
  • Cyber theft – when your financial details are stolen from the internet i.e. credit card details.
  • Insecure passwords – they get your password based on the things you like or if you have been using the same password for other things too.

This can be avoided by not replying to email addresses you are not similar with because it can be a hacker trying to obtain your personal details. Do not open attachments from email addressed because it can be a virus or a worm in order to obtain your personal information. Ensure that you use a secured website because some of them are fake and almost identical to the real websites. Do not give out personal information over the phone someone might have hacked your phone and is listening to your conversations. Use a strong password and add numbers or symbols in your password in order for it not to be easy to be guessed by anyone. Install an anti-virus software on your computer in order for it not to be easy to hack your computer and will notify you when someone is tempering with your computer. 

Question 4

Digital Code of Conduct

Rule 1: When you see text appearing on your screen, remember that there’s a human on the other side.
Rule 2: Internet interprets censorship as damage and routes around it; information wants to be free. (Gilmore’s Law)
Rule 3: For every opinion there is at least one equally loud and opposing opinion.
Rule 4: As an online discussion grows longer, the probability of a comparison involving Nazis or Hitler approaches one. (Godwin’s Law)
Rule 5: Never attribute to malice or conspiracy that which can be adequately explained by stupidity: People say hurtful things on Internet. (Hanlon’s Razor)
Rule 6: One cannot argue with stupid. (Callahan’s Principle). Inevitably, when someone comments with an off-the-wall, untenable, or distasteful viewpoint, some well-meaning soul attempts to argue them out of it. Don’t.
Rule 7: Don’t feed the trolls. A ‘troll’ in Internet parlance is someone who is deliberately provoking argument, being insulting, or just trying to derail the conversation off-topic. Arguing with troll is purposeless, that’s what they want.
Rule 8: Intensity of an online argument is inversely proportional to the value of the stakes at issue. (Sayre’s Law)
Rule 9: Passion in an online argument is inversely proportional to the amount of real information available. (Benford’s ‘Law of Controversy’)
Rule 10: Those who are most eager to share their opinions are more likely to be those whose opinions are of least value. (Campbell’s Theorem). Alternatively: stupid people shout the loudest.

Penalties that apply for failing to meet netiquette
    
If these rules are not followed the first step would be to send the user an automatic email stating that they are breaking these rules.

The next step would be to limit their time access to the internet.

If the rules are still continued to be disobeyed they would then need to attend a disciplinary hearing.

If the previous step has not corrected their actions then the final step would be to take legal action against the use
     
 How one could manage penalties of netiquette in a business
Interacting with others via social networks
When asking to become contacts with strangers on social networks, add a personal note explaining who you are and why you wish to connect. Realize that some individuals may utilize these networks for personal reasons, and they may perceive outreach made via these sites as a violation of privacy.
Adjust privacy settings so you have control over who posts on your wall, tags you in photos, and — via status updates or other methods — can share unwanted content with colleagues or clients, as these items may not be reflective of your or your organization's opinions.
Avoid liking or retweeting a negative, controversial or unflattering status update: Your actions may be perceived as providing a tacit endorsement.
Think before you post on social networks: Is your update of interest, and relevant to, your audience?

Connecting with co-workers
Prior to requesting or accepting connections from colleagues, think about material all sides are apt to share — Is it appropriate for consumption?
Before connecting with your boss on social networks, consider if you'd still want to be connected if you ever leave the position.
When posting status updates, photos or videos, or interacting online, let professionalism rule: If it's unsafe to say or share at the office, avoid saying or sharing it online.
Do not tag co-workers without their permission, and do not tag them in images and videos that may be perceived as unprofessional, inappropriate or controversial.

What not to post
Do not post negative, controversial, rude or potentially insulting commentary in online spaces.
Don't speak ill of others or publicly deride competitors — good sportsmanship reigns.
Respond respectfully to commentary aimed at you, or do not respond at all.
Be careful which posts you like or retweet — such actions may be perceived as a sign of your absolute support for these posts, regardless of content contained within them.


References

http://elmagivo.blogspot.co.za/2015/06/digital-etiquette-digital-etiquette-can.html

http://bizshifts-trends.com/2013/02/25/rules-of-the-internet-golden-rules-of-netiquette-standards-practices-code-of-conduct-that-govern-internet-behavior/

Question 3

Benefits of social technologies

Individuals:

  • People get the opportunity to interact with others in a way that has made it convenient to communicate with people all around the world.
  • It is more conveniet to communicate via social technologies because it hsa become advanced to the point where instant one- on- one conversations can be made

Corporates:

  • Social technologies are a huge benefit to corporate companies as it is easier to keep in conatact with company associates when they are not able to physically attend meetings 
  • Now that online banking has been introduced, corporate companies are able to do all money and bank related activities online, for example. salaries can be EFTed to everyone in the company.
  • Social technologies assist companies in enhancing operations and exploiting new market opportunities
Commuinities:

  • People are able to explore the internet, therefore learning new things everyday
  • Individuals are able to stay updated with current affairs via social media like Twitter, and news applications for example News24 cellphone application


 Risks of social technologies

Individuals: 
  • There is no control of personal content. Once personal imformation has been posted online, it can no longer be retrieved as it is permanatly online. This information may be changed and edited but it stays on the cloud.
Corporates:

  • If negative comments about a company are made on the internt, it is very easy for these comments to become viral, which can easily dent or damage the image of a company and that will determine the success of the company at that moment

 Communities:

  • In communities it is easy for information to circulate and become viral, due to the fact that people are constantly communicating via social media

Question 2

Homo Naledi

Ask
Who was Homo Naledi
What was the significant about this discovery

Acquire

Information was acquired at the following website: http://ewn.co.za/features/Naledi

Analyse

A team of archaeologist led by professor lee Berger undertook the rising star expedition and they had made history by discovering and salvaging fossils of at least an individual from the Dinaledi chamber. this was evolutionary discovery since a new species of hominines called Homo Naledi was found in the, remote chamber. Homo Naledi have distinct physical features that are astonishingly similar to that of human being such as:
curved fingers
small skulls
slender bodies
ape-like shoulders

Apply
According to the finding highlighted in the Homo Naledi could be our common ancestor, therefore this suggest that it could had human characteristics both physical and mental as well as similar behavioural characteristics.
The Dinaledi chamber could have been used as a burial ground where the newfound species could have performed burial rituals since none of the fossils had mark nor did they attend the chamber at the same time.

Assess
Research was conducted thoroughly and the information was extracted from a good source.


Reference
 
EWN online (2016). who is Homo? Accessed 9 April 2014http://ewn.co.za/features/Naledi/what-makes-Naledi-special

ThingLink

ThingLink

Question 1.3
https://www.thinglink.com/scene/794136142894071810

Question 5:
https://www.thinglink.com/scene/794115323094630401

 Question 6:
https://www.thinglink.com/scene/794165814855991298