Monday, 8 May 2017

QUESTION 1-DIGITAL ACCESS

QUESTION 1

QUESTION 2-DIGITAL LITERACY AND INFORMATION FLUENCY


QUESTION 2
Who is Homo Naledi?

 A BLEND OF PRIMITIVE AND HUMAN
Homo Naledi was named after the rising star cave "Naledi" means "star" in Sesotho. 

According to (Rochester, 2016) the following were illustrated
Ask: The first thing that one needs to take into consideration is to acquire and understand first what is Homo Naledi? What is its significance? And why is it considered a Homo Naledi?

Acquire:  Homo Naledi simply as “a previously-unknown species of extinct hominine discovered within the Dinaledi Chamber of the Rising Star cave system, Cradle of Humankind, South Africa. This species is characterized by body mass and stature similar to small-bodied human populations but a small endocrinal volume similar to austral piths” The fossil of Homo Naledi was discovered by Professor Lee Berger from Wits university in South Africa. Homo Naledi is not only a brand new discovery but is the most intact fossil to be discovered in Africa of a humanoid species. It was discovered nearly 30 meters underground in the well-known cradle of Humankind world heritage site in South Africa.

Analyse: What does this mean exactly? Well, for starters we Modern Humans are the only species in our genus, however close to 100,000 years ago there were species of Homo different to our species but close relatives. Homo Naledi helps to prove that these distant ancestors existed 100,000 years ago as opposed to the previously believed notion that these ancestors died out more than 3 million years ago.

Apply: How can we apply this knowledge? Homo Naledi stands to prove that we must all keep an open mind at all times, that the pursuit of knowledge is a fundamental part of our existence. The more we find out about and learn our history the more the can shape a positive future.

Assess: My assessment is that my information fluency process was a success and worked effectively, The Ask, Acquire, Analyse, and Apply steps were taken with great care. When using the information fluency process it is important that you follow the process entirely, leaving out a step can be detrimental to the process as a whole.







IMAGE OF HOMO-NALEDI

Room, N.G.P. (2015) New species of human relative discovered in south African cave. Available at: http://press.nationalgeographic.com/2015/09/10/homo_naledi/ (Accessed: 18 May 2017).

QUESTION 3-DIGITAL COMMUNICATION AND FLUENCIES


QUESTION 3



NAPALM GIRL



A young girl, naked, runs screaming toward the camera in pain after a napalm violence burned her village, her clothes, and then, her skin. She was 9 years old in 1972 when she was photographed, screaming in pain, after a U.S. commander ordered South Vietnamese planes to drop napalm near her village. Editors made an omission to a policy stopping front nudity in photos and went ahead and published it. Known simply as "napalm girl", the photo surpassed the disruptive debate about the rights and wrongs of the Vietnam War and  cruelty .




The image of the naked girl can be viewed as both appropriate and inappropriate. The photographer apprehended a major yet brutal moment of the Vietnamese war. Therefore the image could be seen as appropriate as it shows the brutal honesty of the war and what effect it had on the public, however the girl is naked and it could be seen as child pornography (the picture was taken without the girls consent too) which makes the picture inappropriate. (Sunday, 2012)



According to the picture that was given, the photo was very disturbing and also very much inappropriate reason being that Napalm girl was being chased and was running for her life .The picture clearly shows that she was frightened for her life, because clearly as the picture has been portrayed she was naked and running for her life. The picture was inappropriate because it portrayed nudity and also promoted violence towards youngsters. (Singh, 2014)



I found this picture to be inappropriate but very educational and informative to the audience that view the picture. Reason for indicating that is because it shows that it was not her idea to run in nudity but rather she had no choice to the matter seeing that she was being chased by men holding intimidating guns. In spite of the fact that the photo is as yet achievable from online networking with the life span of remarks that can't be belittled, despite everything I trust it is not the young lady's blame for the picture and this ought not, in any in any case undermine her future. (Sunday, 2012)


NAPALM-GIRL IMAGE


QUESTION 4-DIGITAL ETIQUETTE

QUESTION 4

DIGITAL ETIQUETTE


Several types of inappropriate behaviours
a)    Cyberbullying – Sending mean or threatening messages
      Can be defined as the use of Information and Communications Technology (ICT), particularly mobile phones and the internet, deliberately to upset someone else. Cyberbullying is a sub-set or ‘method’ of bullying. It can be used to carry out all the different ‘types’ of bullying (such as racist bullying, homophobic bullying, or bullying related to special educational needs and disabilities). (Robert, 2016)
Online reputation:  There will be grown-up consequences, such as ruined professional relationships due to cyberbullying. 

b) Flaming- Flaming is similar to harassment, but it refers to an online fight exchanged via emails, instant messaging or chat rooms. It is a type of public bullying that often directs harsh languages, or images to a specific person.
The examples of flaming are: Sending mean and threatening messages,  Posting offensive messages over the internet, Commenting on someone’s picture in a mean way,  Posting of mean Facebook status and  Sending a tweet about someone and saying something cruel.

Online Reputation: Threatening someone is an offense according to the law  therefore this can lead to serving of jail, not acquiring a proper job, being blocked by people close to you because of not being able to use the internet in a good an professional way.
c) Identity theft- is a situation where a bully creates a fake identity to harass someone anonymously. In addition to creating a fake identity, the bully can impersonate someone else to send malicious messages to the victim.
Example:  Stealing someone’s credentials in order to get into their account to do actions which are not supported by digital citizenship, Stealing the credentials in order to steal important information.
Online Reputation: Stealing other peoples information is highly a crime , this can cause on to serve jail time because of in-pleasant behaviour online , which can impact once online reputation

d) Photography- Taking pictures which are inappropriate for the audience to see.
Examples:   Taking half naked pictures,  Taking nude pictures, which exposes every single part of the body and Sexting online.  (Robert, 2016)
Impact on online Reputation: People will no longer respect you once naked pictures have been posted, some will also go an extra mile of in-friending you on Facebook this could also ruin better chances of acquiring a good job. Taking nude pictures and putting them on social media like Facebook is highly inappropriate.
e) Hacking –Corrupting other people’s computers or rather cell phones by invading their privacy. Logging on to someone account and making changes.

Impact if offers on online reputation: The impact it has is on other people because  they corrupt other peoples information  which this end up ruining their image online. You may find that a companies Facebook has been hacked and the image of the company has been tarnished this can be bad for the companies online reputation.


2.  Digital citizens should use their cell phones and internet very wisely, Good digital citizens should accept feedback from others to make sure that they are using technology wisely,  Do not steal other peoples identity,  Remember the human.  Do not abuse your power,   Do not use offensive language, Do not ask the questions that cannot be found on the site , Share and expert knowledge,  Know where you are in cyberspaces, Respect other people’s time,  Do not flood and Make yourself look good online.(Avaya, 2015)





QUESTION 5-DIGITAL RIGHTS AND RESPONSIBILITY


Question 5
DIGITAL BILL OF RIGHTS

Arcticle1
Control of personal Data
 Every person has the right to view, correct, and delete their personal data, whether it is detained on a free or reserved computer system. Personal data held by public or private bodies must be made open on request to the individual to whom it refers, in an open digital format.                                                        
                                                                    Article 2
Control of user content
Internet-based services must offer a means by which users of the service can view, edit or remove content which they have posted on the service. This would not spread out to publicly available content which has been reproduced or shared by other users.
Article 3
Enforcements of Digital Rights
For everybody to have self-confidence in the system, there should be right and balanced remedies available to discipline those who breach our rights online. (Democrats, 2016)
Article 4
Digital Literacy
Children and young people should be able to appreciate the benefits of digital technologies without compromising their safety or privacy. Digital literacy should be well-thought-out as main leader of the national curriculum, alongside numeracy and literacy.
Article 5
Right to unrestricted internet access
The ability to access information on the internet is an important right that supports the ability of citizens to be knowledgeable and involved in public life. It is also vivacious for the proper active public services, and helps to safeguard the free flow of information that supports the operational of markets. The overarching objective of a neutral network means that there can be no unfair discrimination against content or users. (Democrats, 2016)
Article 6
Encryption
Strong cyber-security is the basis of a strong digital economy: individuals, businesses and public bodies have the right to use strong encryption to protect their privacy and security online. 
Article 7
Privacy
People have the same rights to privacy in their telecoms and their online lives as they do in the offline world.  Protection every advanced subject has the privilege to security, which incorporates the correct that:  State reconnaissance of the web must be the exemption instead of the standard, and should just happen where it is unmistakably defended for the insurance of the general population. (Democrats, 2016)
Article 8
Freedom of speech
 The right to free expression applies online just as it does in the offline world. Government has a responsibility to uphold the right to free expression online, which extends to expression in all its forms, including text, videos, audio recordings, and other forms of public communication.
Article 9
A free and open internet
An open and neutral internet is important for undeveloped government, good democracy, a strong economy, connected communities and diversity of culture.  (Democrats, 2016
Article 10
The right to decent Environment:
Clean and good condition is basic to online clients. Digital residents have the privilege to stay in a situation that is not hurtful to their wellbeing   or prosperity. (Democrats, 2016)

QUESTION 6-DIGITAL LAW


QUESTION 6

Digital Law

6.1 What is digital Socialisation?

Digital socialisation is to socialise in digital culture, to learn the ways of living online, across national borders, local cultures and societies. (Thomas, 2017)

How can social media change communities and their practices and tradition?

      Easy Access to information: Internet has made it very easy to get relevant information anytime and anywhere, and users with gadgets such as tablets and phones also have easy access to information because they use the Internet. This is convenient for South Africans as they can get updates on current news affairs on apps such as News24.

      Encourages innovation and creativity: While technology may be challenging to understand and sometimes use, it sparks the brain to work to its full potential. Technology has helped people establish their own businesses, which essentially contribute the South Africa’s economy and may aid in job creation. (Thomas, 2017)

      Improved communication: Modern technology has broadened the channels used in communication (for example video chat or electronic mail), and South Africans can communicate with friends and family overseas or even have meetings over Skype.

      Efficiency and productivity: Modern technology has helped South African businesses in increasing their production through automation. The consistency and accuracy of machinery during the production phase also results in increased productivity. (Thomas, 2017)

      Convenience in Education Modern technology has made in much easier for students to learn from anywhere through online education. In 2015, the South African government issued iPads to matric learners in order to enhance their learning experience.

Social Networking Modern technology has made it easier to form new relationships and to stay in touch. For communities, it is easy for the community to stay in contact with each other by using social technologies. (Thomas, 2017)



6.2 What ethical issues could arise as a result of digital socialisation?

Cyberbullying- This in general means individuals make use of mobile phones and/ or social media to torment their targets, the people might start abusing their digital powers and exercise cyberbullying.(Quetta, 2014)

Hacking- Gaining unauthorized access to data in a system or computer and this might as well be easy to citizens when the start to socialise digitally.

Security-Hackers have found it very easy to hack into any computer/system (as long as it is connected to the internet).Quetta, 2014)

Privacy Issues-There are many ways our privacy is exploited. (Use of internet webcams)Some companies are known for spying on their employees via social networks

Censorship and Lack of Human Interaction- Any act that is well thought-out as a threat to security, people who are digitally socialising will always have censorship cases across the world.

Illegal downloads- If people have access to digital socialisation, there will be an increase in the download of illegal and unaccepted downloads. This might even affect the coming generations wherein children make use of social media to engage in harmful and unacceptable behaviours such as the downloads of adult contents.Quetta, 2014)

 Behaviour- With immediate access to information and communication, our behaviour has changed to accommodate it. Where before our focus would be on one or two things, multitasking has taken over with people checking their mail, listening to music, catching up on news or even chatting with others and many more .












QUESTION 7-DGITAL SECURITY


QUESTION 7

DIGITAL SECURITY

     

Giving out passwords or smart cards. If you give out your passwords, this just means you enable second gatherings to roll out improvements and acclimations to your own data, and false data given by them might be an awesome danger to you and your future.(Boyd, 2011)

 Untrusted Web sites- The fact that most people accept and click pop up messages this simply means that individuals are putting themselves in danger and are under the risk of being digitally abused and harassed by unknown sources

Filling out Web registration pages-No matter how trust-worthy the sites can seem, a responsible digital citizen does not sign, fill or register with any page online unless other contact is made concerning the registration. (Boyd, 2011)

Clicking on e-mail attachments from unidentified sender –The way that you don't have a clue about the sources that sent you the email ought to reveal to you something about the sender's personality, you ought to get some information about the senders before viewing the email context

Installing unauthorized application- Unauthorized brings forth damage in the system and also brings forth the risk of losing sensitive information and personal information being at risk of being tempered with (Jonson, 2015)

Surfing gambling and porn sites – This sites are dangerous because most people tend to be addicts because of this sits, they tend to get ripped of the money they have because of being addicted to these sites. (Boyd, 2011)



Ways to Safeguard


Do not give out personal information to unknown sources

(banking details and identity details).

Do not install unlawful application even when you are greatly in necessity of them.

Surf only pages that you know of and are sure they are accredited and trusted.

Keep your phone with you at all times; do not leave it unattended.

Use lock codes and PINs and keep cell phones safe.

Make a mark on the phone and SIM that is unique and not easily identifiable (avoiding replication of your property and easy ID).

Know the information stored on your phone.

Protect your SIM and memory card.

Dispose of the phone by ensuring no data/ information is left on it.

Use only trusted dealers and repair shops.

Back up your information regularly.

Do not fill web scripts, forms or registration pages online unless it is a follow-up step with sources that you are in know of.

Do not trust everything you read or attain from the internet. 
Ref:(Manual, 2015,pp:133)








QUESTION 8-DIGITAL HEALTH AND WELL BEING

Question 8

link to Pinterest : https://za.pinterest.com/mahlorigifths/digital-health-and-wellness/ 



QUESTION 9-DIGITAL COMMERCE

QUESTION 9

B2B







Business to Business e-commerce involves electronic transactions between businesses. These transactions have been around for many years in the form of electronic data interchange and electronic funds transfer.B2B it allows companies to   purchase orders, invoices, inventory status, shipping logistics, business contracts, and other operations which produces reports of increasing transaction speed, reducing errors and eliminating manual tasks  an example is Walmart . (Bidgoli, 2016,p:176)


B2C 

Business to consumer is defined as all the companies that sell directly to the consumers. Companies such as Amazon,  and Onsale.com them directly to the consumers. Amazon and its business partners sell a wide array of products and services which includes DVDs, prescription drugs, clothing and household products. (Bidgoli, 2016,p:176)
C2B

Consumer to Business involves people selling products or services to businesses, such as when a consumer creates an online survey for a company to utilise or when a business uses crowd sourcing by asking consumers to perform services such as contributing to a web site for free. (Bidgoli, 2016,p:176)
C2C

Consumer to Consumer e-commerce involves business transactions between users, such as consumers selling to other consumers via the internet. When people use online classified ads (e.g., Craigslist’s) or online auction sites such as eBay that is regarded as C2C e-commerce.(Bidgoli, 2016,p:176)








BIBLIOGRAPHY

Bibliography



Anon., n.d. [Online]
Available at: http://cdn2.business2community.com/wp-content/uploads/2013/04/b2b.jpg
Avaya, 2015. communications services trends for 2015. [Online]
Available at: http://www.avaya.com/usa/documents/communicationsservices-trends-for-2015-svc7635.pdf
[Accessed 19 May 2017].
Bidgoli, H, 2016,p:176. Management Information Systems {MIS}. 6th ed. United States of America: Cengage Learning Solutions.
Boyd, D. a. A. M., 2011. Why Cyberbullying Rhetoric Misses the Mark. [Online]
Available at: http://www.nytimes.com/2011/9/23/opinion/why-cyberbullying-rhetoric-misses-the-mark.html.
[Accessed 14 April 2017].


Quotty, J., 2014. business 2 community. [Online] Available at: https:www.business2community.com/social-media/impact-social-media-truly-society-0974685/amp [Accessed 14 May 2017]
Citizen, G. D., 2016. 21st century fluencies/information fluency. [Online]
Available at: https://www.globaldigitalcitizen.org/21st-century-fluencies/information-fluency
[Accessed 18 May 2017].
Democrats, L., 2016. Digital Bill of Rights Consultation   . [Online]
Available at: https://d3n8a8pro7vhmx.cloudfront.net/libdems/pages/8730/attachments/original/1428513286/Digital_Bill_of_Rights_Consultation_Paper_FINAL.pdf?1428513286
[Accessed 19 May 2017].
Holly Ellyatt, I. P., 2015. Top 5 cyber security risks . [Online]
Available at: http://www.cnbc.com/2014/12/19/top-5-cyber-security-risks-for2015.html
[Accessed 14 May 2017].
Rochese, G., 2016. Homo Naledi an information fluency process. [Online]
Available at: https://gabrieleronchese.wordpress.com/2016/05/31/homo-naledi-an-information-fluency-process/
[Accessed 08 May 2017].
Singh, S., 2014. top15 trends. [Online]
Available at: http://www.forbes.com/sites/sarwantsingh/2014/12/17/top-15trends-for-2015/5/
[Accessed 19 May 2017].
Sunday, W. E., 2012. napalm girl an iconic image of war. [Online]
Available at: http://www.npr.org/2012/06/03/154234617/napalm-girl-an-iconic-image-of-war-turns-40
[Accessed 18 May 2017].
Telegraph.B, 2016. homo naledi newlydiscovered ancient human spicies photos. [Online]
Available at: http://www.belfasttelegraph.co.uk/gallaries/news/homo-naledi-newlydiscovered-ancient-human-spicies-photos-315170201.html
[Accessed 10 May 2017].
Thomas, W., 2017. Social Networking. [Online]
Available at: https://www.su.diva-portal.org>FULLTEXT01.Social Networking
[Accessed 14 May 2017].
Wood, T. a. s., 2016:p:14. An eveolution of Homo Naledi and Early jHomo from a young age creationiss perspectives. 6th ed. C.A: Journal of creation Theology and science Series B:Life sciencies.