Digital Citizenship

Thursday 12 November 2015

Digital Security

Digital Security

In the last two decades technology has advanced to a point where organizations and individuals has opted to completely rely on computers and other technology related devices, so with this heavy reliance on technology came a new problem of data, identity thefts and hacking as some of the leading security issues. It does not end there as the world becomes more and more digitized. It is important for organizations to know how to keep their data safe, and being aware of new security risks in order to keep the organization both safe and protected from these crimes. With this said it becomes apparent that people need to arm themselves with knowledge of digital security. As more and more ignorant or people who lack the digital skill becomes victims, and this might result in financial loss and at times physical harm. http://www.arcon.gov.au/what-is-cybercrime

Cyber Crime

This may be explained as any act that is malicious and involves the use of computers, cyber crimes can occur anywhere as computer can be accessed in all location around the world.

Types of Cyber Crime

1. Theft of telecommunication services

Criminals can gain access to a company switchboard, and gain access to make call at the company expense. Sometime they word sell the airtime to third parties

2. Telecommunications Piracy

Since the digital age, it is easy to reproduce and disseminate print, graphics sound and multimedia combinations. People over the years have reproduced and sell copywriter material that they have reproduced.

3. Dissemination of offensive material

In the last couple of years people have created offensive material like photos or videos of individuals a posted on blogs and social media site without consent of individual being used on the material. At times people use digital technology to harass, threaten and intrude on people’s personal lives.

4. Electronic money laundering and tax evasion

People over the years have started to conceal and move around proceeds of crime using money transfer. Some would go to great lengths to hide the profits from their businesses, from the taxation authorities.

5. Sales and investment fraud

As e-commerce is growing at a rapid rate criminals create fake site where unsuspecting customers would put their detail and becomes victims of identity theft.

6. Electronic Funds Transfer Fraud

Criminals are using technologies that can intercept transaction and divert the funds to their own accounts. The digital information stored on credit cards can be counterfeited.

7. Illegal interception of telecommunications

With new developments in telecommunications, it is now possible to do an electronic eavesdropping. There has be a considerable growth in surveillance of unfaithful spouse or industrial espionage and political espionage. http://za.norton.com/cybercrime-prevention

Digital Rights and Responsibilities


The IIE Acceptable Use Policy

ApplyWithUs℠ Acceptable Use Policy

Revised and Effective as of October 23, 2012.
This Acceptable Use Policy ("AUP") identifies activities and content that are prohibited on, through or in connection with the ApplyWithUs website at applywithus.com (the "ApplyWithUs Site") and the ApplyWithUs Service provided by ApplicationsOnline, LLC through the ApplyWithUs Site, as of the effective date shown above. This AUP is not exhaustive and ApplicationsOnline may modify this AUP from time to time, in its sole discretion, by posting the modified AUP on the ApplyWithUs Site. By accessing the ApplyWithUs Site or by using the ApplyWithUs Service, you accept the most recent version of this AUP and agree to use the ApplyWithUs Site and/or ApplyWithUs Service only in a manner consistent with this AUP. Any use/activity/content in violation of this AUP may result in deletion of non-compliant content, and/or the termination of your ability to use the ApplyWithUs Site and the ApplyWithUs Service, and may constitute a breach of your agreement with applicationsonline. 
The full AUP can be found on 
https://iie-ugrad-institution.applywithus.com/legal/acceptable_use_policy
Guide to Digital Rights & Responsibilities
This refers to the right and freedom to use all types of digital technology, in an acceptable and appropriate manner. As a user of digital systems you have rights that include the below listed rights and responsibilities.
Digital Rights
Right to freedom of expression
Right to privacy
Right to credit for personal works
Right to digital access
Right to our identity
Digital Responsibilities
Responsibility to report bullying, harassing, sexting, or identity theft
Responsibility to cite works used for resources and researching
Responsibility to download music, videos, and other material legally
Responsibility to model and teach student expectations of technology use
Responsibility to keep data/information safe from hackers
Responsibility not to falsify our identity in any way
Plagiarism
Plagiarism is a process of using someone else’s work, and presents it as your own idea or work. This includes information from the internet, books, songs or even TV shows. This is usually done without the owner’s consent. Sometime the real problem is that, when people are referencing, they are not doing it correctly. In academia and business plagiarism is a serious ethical offence.
Creative Commons
By allowing the creators of to communicate the rights that they are willing to reserve, and which ones they are willing to waiver for the good of the community. It allows the community member to build on to the original creation. This will be done by using the creative’s commons licenses which are free of charge to the public.
Summary of AUP


Wednesday 11 November 2015

Digital Communication

Clash Of Clans

Clash of Clans is a strategy game that can be played on android and apple devices, or you can use Facebook to play on windows based devices. To play you can create a new clan or join and existing clan, the plot is to battle each other to win gold elexir which is a pink liquid. the more you progress in the game, you win trophies. The game can be played in two modes, there is a single mode and on the other hand there is multiplayer mode. while progressing each player must build a civilization that will ultimately become the most powerfull, in order to protect your empire. other clans might try to attach your clan to loot the gold and the elexir. in every epoch you will need to research new technologies and upgrade you clan. to do so you can either buy credit or you can generate gold and elexir which might take longer.

Digital Etiquette

10 Points of Netiquette

1.  When typing never write in all capital letters. People will assume you are shouting.
2. Never Plagiarize, stealing other peoples work is considered a crime if you use other peoples
      work, credit them on your reference page.
3.  Use proper quotes and always use the whole quote. Never quote out of context, or do selective
     quoting.
4.  Keep Personal information personal, do not gossip. Get facts first before telling stories.
5.  Be careful of copy write laws, do not still photos on the internet for your projects.
6.  Watch your language. No potty mouths.
7.  Be patient with internet newbies. Know that they are just learning like you did once upon a
     time.
8.  No spamming. Remember that spam is unwanted electronic messages or sending the same
     electronic message over and over. This can get you in a lot of trouble on some sites and as a
     general rule it just irritates everyone else.
9.  If you are using a header (such as in an email) make sure your content really pertains to the
     header. You must admit it would really stink if the header said something about football, for
     example, and the email was really about your newest and greatest business idea. Just stay on
     topic and the problem is solved.
10.  Avoid overuse of emoticons. You know… those cute little smiley faces. They really lose their
       cuteness when overused and tend to irritate people.

Penalties that apply for failing to meet this netiquettes 

Since the inception of the internet there were no consequences on what people do while they are online, but finally new legislation's are helping to correct this problem of bad behavior and or bullying while on the internet. People now may face  criminal prosecutions over the things they do while they are on the cyber space, or you may be even expelled from joining and participating in some online groups or websites.

How to enforce and manage etiquette in business

When running an organisation the first step would be to implement proper computer and internet usage policies where each user needs to sign off to indicate that they understand the implication of the policies. Another effective method would be to use firewall to restrict access to certain website which may be in contravention to the organizations IT policies. http://www.uticaod.com/article/20120907/blogs/309079938

Digital Literacy and Information Fluency


Digital Literacy and Information Fluency

Purpose of the site and series

Animal planet created this illusion of mermaids found, in order to entertain people who either believe in mythology or people who don’t know what to believe. Since this is a profit seeking institution, one cannot put away the fact that animal planet and their researchers will do anything to see their organization profitable.

The Process

There is no real proof that any person alive has seen or recorded a mermaid. While watching the images it is clear that the creators of the series used illusion and photography and cinematography from amateur enthusiasts. Their images are not conclusive evidence to the existence of mermaids. The creators of the series also knew that publicity might be good for the channel whether positive or negative.

Public Response

There are a lot of people who seem to believe that the images and videos are proof that mermaids do exist, but at the same time there are many who think that this is work of a creative artist, and the animal planet network is in, on that lie to confuse gullible viewers who are in a position to believe everything, even without clear and concrete evidence showing the existence is real

Veracity of the series

Based on the fact that the images and videos provided as proof are not of high quality, and some are just a split second in length, it is almost impossible to be in a position to verify these images.

Opinion

Animal Planet has a lot of resources to make even this unverifiable story look real. My opinion is that the story has enjoyed a huge success as a science fiction to promote ideas of what other people think about the world unseen, but the story still lack on fact that can be proven. Some other sea mammals from a distance might look like something alien to someone who wishes to see an alien.
http://www.animalplanet.com/tv-shows/mermaids/videos/mermaids-evidence/