QUESTION 1
POE-PORTFOLIO OF EVIDENCE
Monday, 8 May 2017
QUESTION 2-DIGITAL LITERACY AND INFORMATION FLUENCY
QUESTION 2
Who is Homo Naledi?
A BLEND
OF PRIMITIVE AND HUMAN
Homo
Naledi was named after the rising star cave "Naledi" means
"star" in Sesotho.
According
to (Rochester, 2016) the following were
illustrated
Ask: The first thing that one needs
to take into consideration is to acquire and understand first what is Homo
Naledi? What is its significance? And why is it considered a Homo Naledi?
Acquire: Homo Naledi simply as “a previously-unknown
species of extinct hominine discovered within the Dinaledi Chamber of the
Rising Star cave system, Cradle of Humankind, South Africa. This species is
characterized by body mass and stature similar to small-bodied human
populations but a small endocrinal volume similar to austral piths” The fossil
of Homo Naledi was discovered by Professor Lee Berger from Wits university in
South Africa. Homo Naledi is not only a brand new discovery but is the most
intact fossil to be discovered in Africa of a humanoid species. It was
discovered nearly 30 meters underground in the well-known cradle of Humankind
world heritage site in South Africa.
Analyse: What does this mean exactly?
Well, for starters we Modern Humans are the only species in our genus, however
close to 100,000 years ago there were species of Homo different to our species
but close relatives. Homo Naledi helps to prove that these distant ancestors
existed 100,000 years ago as opposed to the previously believed notion that
these ancestors died out more than 3 million years ago.
Apply: How can we apply this knowledge?
Homo Naledi stands to prove that we must all keep an open mind at all times,
that the pursuit of knowledge is a fundamental part of our existence. The more
we find out about and learn our history the more the can shape a positive
future.
Assess: My assessment is that my
information fluency process was a success and worked effectively, The Ask,
Acquire, Analyse, and Apply steps were taken with great care. When using the
information fluency process it is important that you follow the process
entirely, leaving out a step can be detrimental to the process as a whole.
IMAGE OF HOMO-NALEDI
Room, N.G.P. (2015) New species of human
relative discovered in south African cave. Available at:
http://press.nationalgeographic.com/2015/09/10/homo_naledi/ (Accessed: 18 May
2017).
QUESTION 3-DIGITAL COMMUNICATION AND FLUENCIES
QUESTION 3
NAPALM GIRL
A young girl, naked, runs screaming toward the camera in
pain after a napalm violence burned her village, her clothes, and then, her
skin. She was 9 years old in 1972 when she was
photographed, screaming in pain, after a U.S. commander ordered South
Vietnamese planes to drop napalm near her village. Editors made an omission to
a policy stopping front nudity in photos and went ahead and published it. Known
simply as "napalm girl", the photo surpassed the disruptive debate
about the rights and wrongs of the Vietnam War and cruelty .
The image of the naked girl can be viewed as both
appropriate and inappropriate. The photographer apprehended a major yet brutal
moment of the Vietnamese war. Therefore the image could be seen as appropriate
as it shows the brutal honesty of the war and what effect it had on the public,
however the girl is naked and it could be seen as child pornography (the
picture was taken without the girls consent too) which makes the picture
inappropriate.
(Sunday, 2012)
According
to the picture that was given, the photo was very disturbing and also very much
inappropriate reason being that Napalm girl was being chased and
was running for her life .The picture clearly shows that she was frightened for
her life, because clearly as the picture has been portrayed she was naked and
running for her life. The picture was inappropriate because it portrayed nudity
and also promoted violence towards youngsters. (Singh, 2014)
I
found this picture to be inappropriate but very educational and informative to
the audience that view the picture. Reason for indicating that is because it
shows that it was not her idea to run in nudity but rather she had no choice to
the matter seeing that she was being chased by men holding intimidating guns.
In spite of the fact that the photo is as yet achievable from online networking
with the life span of remarks that can't be belittled, despite everything I
trust it is not the young lady's blame for the picture and this ought not, in
any in any case undermine her future. (Sunday, 2012)
http://www.npr.org/2012/06/03/154234617/napalm-girl-an-iconic-image-of-war-turns-40 (Accessed: 19 May 2017)
QUESTION 4-DIGITAL ETIQUETTE
QUESTION 4
Impact on online Reputation: People will no longer respect you once naked pictures have been posted, some will also go an extra mile of in-friending you on Facebook this could also ruin better chances of acquiring a good job. Taking nude pictures and putting them on social media like Facebook is highly inappropriate.
DIGITAL
ETIQUETTE
Several
types of inappropriate behaviours
a) Cyberbullying – Sending mean or
threatening messages
Can be defined as the
use of Information and Communications Technology (ICT), particularly mobile
phones and the internet, deliberately to upset someone else. Cyberbullying is a
sub-set or ‘method’ of bullying. It can be used to carry out all the different
‘types’ of bullying (such as racist bullying, homophobic bullying, or bullying
related to special educational needs and disabilities). (Robert,
2016)
Online reputation: There will be grown-up consequences, such as ruined professional relationships due to cyberbullying.
b) Flaming-
Flaming is similar to harassment, but it refers to an online fight exchanged
via emails, instant messaging or chat rooms. It is a type of public bullying
that often directs harsh languages, or images to a specific person.
The examples of flaming are: Sending mean
and threatening messages, Posting offensive messages over the
internet, Commenting on someone’s picture in a
mean way, Posting of mean Facebook status and Sending a tweet about someone and
saying something cruel.
Online Reputation: Threatening someone is an offense according to the law therefore this can lead to serving of jail, not acquiring a proper job, being blocked by people close to you because of not being able to use the internet in a good an professional way.
Online Reputation: Threatening someone is an offense according to the law therefore this can lead to serving of jail, not acquiring a proper job, being blocked by people close to you because of not being able to use the internet in a good an professional way.
c) Identity
theft- is a situation where a bully creates a fake identity
to harass someone anonymously. In addition to creating a fake identity, the
bully can impersonate someone else to send malicious messages to the victim.
Example:
Stealing
someone’s credentials in order to get into their account to do actions which
are not supported by digital citizenship,
Stealing
the credentials in order to steal important information.
Online Reputation: Stealing other peoples information is highly a crime , this can cause on to serve jail time because of in-pleasant behaviour online , which can impact once online reputation
Online Reputation: Stealing other peoples information is highly a crime , this can cause on to serve jail time because of in-pleasant behaviour online , which can impact once online reputation
d)
Photography- Taking pictures which are inappropriate for the
audience to see.
Examples:
Taking
half naked pictures,
Taking
nude pictures, which exposes every single part of the body and Sexting online. (Robert, 2016)
e) Hacking –Corrupting other
people’s computers or rather cell phones by invading their privacy. Logging
on to someone account and making changes.
Impact if offers on online reputation: The impact it has is on other people because they corrupt other peoples information which this end up ruining their image online. You may find that a companies Facebook has been hacked and the image of the company has been tarnished this can be bad for the companies online reputation.
Impact if offers on online reputation: The impact it has is on other people because they corrupt other peoples information which this end up ruining their image online. You may find that a companies Facebook has been hacked and the image of the company has been tarnished this can be bad for the companies online reputation.
2. Digital citizens should use their cell phones and internet very wisely, Good digital citizens should accept feedback from others to make sure that they are using technology wisely, Do not steal other peoples identity, Remember the human. Do not abuse your power, Do not use offensive language, Do not ask the questions that cannot be found on the site , Share and expert knowledge, Know where you are in cyberspaces, Respect other people’s time, Do not flood and Make yourself look good online.(Avaya, 2015)
QUESTION 5-DIGITAL RIGHTS AND RESPONSIBILITY
Question 5
DIGITAL BILL OF RIGHTS
Arcticle1
Control of personal Data
Control of personal Data
Every
person has the right to view, correct, and delete their personal data, whether
it is detained on a free or reserved computer system. Personal data held by
public or private bodies must be made open on request to the individual to whom
it refers, in an open digital format.
Article 2
Article 2
Control
of user content
Internet-based services must offer a means by which users of the service
can view, edit or remove content which they have posted on the service. This
would not spread out to publicly available content which has been reproduced or
shared by other users.
Article 3
Enforcements of Digital Rights
Enforcements of Digital Rights
For everybody to have self-confidence in the system, there should be
right and balanced remedies available to discipline those who breach our rights
online. (Democrats, 2016)
Article 4
Digital Literacy
Digital Literacy
Children and young people should be able to appreciate the benefits of
digital technologies without compromising their safety or privacy. Digital
literacy should be well-thought-out as main leader of the national curriculum,
alongside numeracy and literacy.
Article 5
Right to unrestricted internet access
Right to unrestricted internet access
The ability to access information on the internet is an important right
that supports the ability of citizens to be knowledgeable and involved in
public life. It is also vivacious for the proper active public services, and
helps to safeguard the free flow of information that supports the operational
of markets. The overarching objective of a neutral network means that there can
be no unfair discrimination against content or users. (Democrats,
2016)
Article 6
Encryption
Encryption
Strong cyber-security is the basis of a strong digital economy:
individuals, businesses and public bodies have the right to use strong
encryption to protect their privacy and security online.
Article 7
Privacy
Privacy
People have the same rights to privacy in their telecoms and their
online lives as they do in the offline world.
Protection every advanced subject has the privilege to security, which
incorporates the correct that: State
reconnaissance of the web must be the exemption instead of the standard, and
should just happen where it is unmistakably defended for the insurance of the
general population. (Democrats, 2016)
Article 8
Freedom of speech
Freedom of speech
The right to free expression applies online
just as it does in the offline world. Government has a responsibility to uphold
the right to free expression online, which extends to expression in all its
forms, including text, videos, audio recordings, and other forms of public
communication.
Article 9
A free
and open internet
An open and neutral internet is important for undeveloped government,
good democracy, a strong economy, connected communities and diversity of
culture. (Democrats,
2016
Article 10
The right
to decent Environment:
Clean and
good condition is basic to online clients. Digital residents have the privilege
to stay in a situation that is not hurtful to their wellbeing or prosperity. (Democrats,
2016)
QUESTION 6-DIGITAL LAW
QUESTION 6
Digital Law
6.1 What is digital Socialisation?
Digital socialisation is to socialise in digital culture, to learn the
ways of living online, across national borders, local cultures and societies. (Thomas, 2017)
How can
social media change communities and their practices and tradition?
Easy Access to information: Internet has made it very easy
to get relevant information anytime and anywhere, and users with gadgets such
as tablets and phones also have easy access to information because they use the
Internet. This is convenient for South Africans as they can get updates on
current news affairs on apps such as News24.
Encourages innovation and creativity: While technology may be
challenging to understand and sometimes use, it sparks the brain to work to its
full potential. Technology has helped people establish their own businesses,
which essentially contribute the South Africa’s economy and may aid in job
creation. (Thomas, 2017)
Improved communication: Modern technology has broadened the channels used
in communication (for example video chat or electronic mail), and South
Africans can communicate with friends and family overseas or even have meetings
over Skype.
Efficiency and productivity: Modern technology has helped South African
businesses in increasing their production through automation. The consistency
and accuracy of machinery during the production phase also results in increased
productivity. (Thomas, 2017)
Convenience
in Education Modern
technology has made in much easier for students to learn from anywhere through
online education. In 2015, the South African government issued iPads to matric
learners in order to enhance their learning experience.
Social
Networking Modern
technology has made it easier to form new relationships and to stay in touch.
For communities, it is easy for the community to stay in contact with each
other by using social technologies. (Thomas, 2017)
6.2 What
ethical issues could arise as a result of digital socialisation?
Cyberbullying-
This in general means individuals make use of mobile phones and/ or social
media to torment their targets, the people might start abusing their digital
powers and exercise cyberbullying.(Quetta, 2014)
Hacking-
Gaining unauthorized access to data in a system or computer and this might as
well be easy to citizens when the start to socialise digitally.
Security-Hackers
have found it very easy to hack into any computer/system (as long as it is
connected to the internet).Quetta, 2014)
Privacy
Issues-There are many ways our privacy is exploited. (Use of
internet webcams)Some companies are known for spying on their employees
via social networks
Censorship
and Lack of Human
Interaction- Any act that is well thought-out as a threat
to security, people who are digitally socialising will always have censorship
cases across the world.
Illegal
downloads- If people have access to digital socialisation, there
will be an increase in the download of illegal and unaccepted downloads. This
might even affect the coming generations wherein children make use of social
media to engage in harmful and unacceptable behaviours such as the downloads of
adult contents.Quetta, 2014)
Behaviour- With immediate
access to information and communication, our behaviour has changed to
accommodate it. Where before our focus would be on one or two things,
multitasking has taken over with people checking their mail, listening to
music, catching up on news or even chatting with others and many more .
QUESTION 7-DGITAL SECURITY
QUESTION 7
DIGITAL SECURITY
Giving
out passwords or smart cards. If you give out your
passwords, this just means you enable second gatherings to roll out
improvements and acclimations to your own data, and false data given by them
might be an awesome danger to you and your future.(Boyd, 2011)
Untrusted Web sites- The
fact that most people accept and click pop up messages this simply means that
individuals are putting themselves in danger and are under the risk of being
digitally abused and harassed by unknown sources
Filling
out Web registration pages-No matter how trust-worthy
the sites can seem, a responsible digital citizen does not sign, fill or
register with any page online unless other contact is made concerning the
registration. (Boyd, 2011)
Clicking
on e-mail attachments from unidentified sender –The
way that you don't have a clue about the sources that sent you the email ought
to reveal to you something about the sender's personality, you ought to get
some information about the senders before viewing the email context
Installing
unauthorized application- Unauthorized brings forth damage in the
system and also brings forth the risk of losing sensitive information and
personal information being at risk of being tempered with (Jonson, 2015)
Surfing
gambling and porn sites – This sites are dangerous because most
people tend to be addicts because of this sits, they tend to get ripped of the
money they have because of being addicted to these sites. (Boyd, 2011)
Ways to Safeguard
Do
not give out personal information to unknown sources
(banking
details and identity details).
Do
not install unlawful application even when you are greatly in necessity of
them.
Surf
only pages that you know of and are sure they are accredited and trusted.
Keep
your phone with you at all times; do not leave it unattended.
Use
lock codes and PINs and keep cell phones safe.
Make
a mark on the phone and SIM that is unique and not easily identifiable
(avoiding replication of your property and easy ID).
Know
the information stored on your phone.
Protect
your SIM and memory card.
Dispose
of the phone by ensuring no data/ information is left on it.
Use
only trusted dealers and repair shops.
Back
up your information regularly.
Do
not fill web scripts, forms or registration pages online unless it is a
follow-up step with sources that you are in know of.
Do
not trust everything you read or attain from the internet.
Ref:(Manual,
2015,pp:133)
Subscribe to:
Posts (Atom)