Digital Citizen POE
Question 1
Question 2
The information
process:
Findings
on Homo Naledi:
Ask
Ask
Who was Homo Naledi.
What was the significant about
this discovery.
Acquire
Information was acquired at
the following website:
Analyse
A team of archaeologist led by
Professor Lee Berger undertook the rising star expedition and they had made
history by discovering and salvaging fossils of at least an individual from the
Dinaledi chamber. This was evolutionary discovery since a new species of
hominines called Homo Naledi was found in the remote chamber. Homo Naledi has
distinct physical features that are astonishingly similar to that of human
being such as:
Curved fingers
-
Small skulls
-
Slender bodies
-
Ape-like shoulders
Apply
According to the finding
highlighted in the Homo Naledi could be our common ancestor, therefore this
suggest that it could had human characteristics both physical and mental as
well as similar behavioural characteristics.
The Dinaledi chamber could
have been used as a burial ground where the newfound species could have
performed burial rituals since none of the fossils had mark nor did they attend
the chamber at the same time.
Assess
Research was conducted
thoroughly and the information was extracted from a good source.
Question 3
What
is Media fluency:
Media fluency is actually two-fold: the first step
involves the interpretation (listening) of the media; and the second step
involves how we leverage this for our own output (communication). This fluency
influences through the most appropriate and effective medium. (Zickuhler et al (2011).)
What
is Inappropriate communication:
Personal digital communication can have far-reaching
impacts, where our words, often said in the moment of heated emotion, are
stored online forever. With the advent of social media, there is a greater risk
of over-sharing, inadvertent bullying or just plain maliciousness. We need to
be careful in our behaviour and conduct whilst online, as the longevity of the
comments/ statement cannot be underestimated. (Zickuhler et al (2011).)
Napalm
girl:
In my opinion when I stare at the image with regards to
the war in Vietnam I believe the image is being used inappropriately to convey
a message to the public. Firstly it gives many people a negative perception
when looking the image because all the girls and boys have clothes on and too
many it seems like the naked girl has been molested in some way. That might not
even be the case but since the girl is naked it portrays a negative image to
people. So therefore I believe that image has been used in an inappropriate
manner because it conveys an negative image of some sort. No media group should
post naked or nude images to convey messages or they should be more courteous
when doing so. During the time of war the image was seen as error inappropriate
according to the press, but after the war in Vietnam the image was seen as
inappropriate communication but many still did not understand what the purpose
of image meant or conveyed.
Question 4
Digital Etiquette refers to the way you address yourself on
the internet and in the digital world. The standards of conduct expected by
other digital technology users.
Many people do not understand what is expected from them
as a digital citizen when using the internet. It is proven that the numbers of
people misusing the internet is increasing rapidly. There are many activities
related to inappropriate behaviour on the internet and people who engage in
these activities may suffer the consequences.
Inappropriate
behaviour on the internet:
Hacking:
Hacking is unauthorized intrusion into a computer or a network. The person
engaged in hacking activities is generally referred to as a hacker. This hacker
may alter system or security features to accomplish a goal that differs from
the original purpose of the system.
Identity
Theft:
Is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or
obtain credit and other benefits in the other person's name and maybe to the
other person's disadvantage or loss. The person whose identity has been stolen
may suffer consequences, especially if they are held responsible for the
suspects actions. Identity theft occurs when someone uses another's personally
identifying information, like their name, identity number, or credit card
number, without their permission, to commit fraud or other crimes.
Cyber
bullying :
Cyber bullying is the use of cell phones, instant messaging, e-mail,
chat rooms or social networking sites such as Facebook, Twitter, and WhatsApp to harass, threaten or intimidate someone. Cyber bullying
is often done by children, who have increasingly early access to these
technologies. The problem is compounded by the fact that a bully can hide
behind unknown user name, disguising his or her true identity. This secrecy
makes it difficult to trace the source and encourages bullies to behave more
aggressively than they might in a situation where they were identified.
Computer
Fraud:
Is defined as any act using computers, the Internet, Internet devices, and
Internet services to defraud people, companies, or government institutions of
money, revenue, or Internet access. Illegal computer activities include phishing, social engineering, viruses, and DDoS attacks are some examples used to disrupt service
or gain access to another's funds.
The
consequences of inappropriate behavior on the internet:
Hacking:
You could face jail time
and some costly fines should you get caught, not to mention having your access
to computers restricted and your travel to other countries restricted even
after you pay your fines and serve your prison sentence.
Identity
Theft:
Assuming your efforts lead to the findings of the thief, penalties vary
from state to state and may depend on what he does with your identity. If he
accessed your information but never used it, this might only lead to a
misdemeanor conviction. He might not even go to jail, but just be placed on probation,
particularly if this was his first offense.
Cyber Bullying:
The consequences of cyber bullying
include putting both victims and bullies at a high risk for depression, anxiety
and stress-related disorders. According to Kids Health from Nemours
also reported that “those involved in these bullying acts are at a greater risk
of suffering from suicidal thoughts,
attempts, and completed suicides.”
Computer Fraud:
A fraud victim may feel lonely or embarrassed because of
a change in social status. The incident may cause marital problems and prevent
someone from providing adequate support for their family.
Guidelines
for online etiquette:
-
Remember the
Human (person).
-
Adhere to some
standards of online behaviour that you follow in your "real' life.
-
Know where
you are in cyberspace.
-
Respect
other people’s time and bandwidth.
-
Make
yourself look good online.
-
Share expert
knowledge.
-
Help keep
flame wars under control. Ignore flame-bait.
-
Respect the
privacy of others.
-
Do not abuse
your power and privileges.
-
Be forgiving
of other peoples mistakes.
Question 5
Digital
Bill of rights:
Article one.
(1) Everyone has the right to freedom of peaceful assembly and
association.
(2) No one may be compelled to belong to an association.
(2) No one may be compelled to belong to an association.
Article two.
(1) Everyone has the right to take part in the government of his
country, directly or through freely chosen representatives.
(2) Everyone has the right of equal access to public service in his country.
(3) The will of the people shall be the basis of the authority of government; this will shall be expressed in periodic and genuine elections which shall be by universal and equal suffrage and shall be held by secret vote or by equivalent free voting procedures.
(2) Everyone has the right of equal access to public service in his country.
(3) The will of the people shall be the basis of the authority of government; this will shall be expressed in periodic and genuine elections which shall be by universal and equal suffrage and shall be held by secret vote or by equivalent free voting procedures.
Article three.
Everyone, as a member of society, has the right to social security and
is entitled to realization, through national effort and international
co-operation and in accordance with the organization and resources of each
State, of the economic, social and cultural rights indispensable for his
dignity and the free development of his personality.
Article four.
(1) Everyone has the right to work, to free choice of employment, to
just and favorable conditions of work and to protection against unemployment.
(2) Everyone, without any discrimination, has the right to equal pay for equal work.
(3) Everyone who works has the right to just and favorable remuneration ensuring for himself and his family an existence worthy of human dignity, and supplemented, if necessary, by other means of social protection.
(4) Everyone has the right to form and to join trade unions for the protection of his interests.
(2) Everyone, without any discrimination, has the right to equal pay for equal work.
(3) Everyone who works has the right to just and favorable remuneration ensuring for himself and his family an existence worthy of human dignity, and supplemented, if necessary, by other means of social protection.
(4) Everyone has the right to form and to join trade unions for the protection of his interests.
Article five.
Everyone has the right to rest and leisure, including reasonable
limitation of working hours and periodic holidays with pay.
Article six.
(1) Everyone has the right to a standard of living adequate for the
health and well-being of himself and of his family, including food, clothing,
housing and medical care and necessary social services, and the right to
security in the event of unemployment, sickness, disability, widowhood, old age
or other lack of livelihood in circumstances beyond his control.
(2) Motherhood and childhood are entitled to special care and assistance. All children, whether born in or out of wedlock, shall enjoy the same social protection.
(2) Motherhood and childhood are entitled to special care and assistance. All children, whether born in or out of wedlock, shall enjoy the same social protection.
Article seven.
(1) Everyone has the right to education. Education shall be free, at
least in the elementary and fundamental stages. Elementary education shall be
compulsory. Technical and professional education shall be made generally
available and higher education shall be equally accessible to all on the basis
of merit.
(2) Education shall be directed to the full development of the human personality and to the strengthening of respect for human rights and fundamental freedoms. It shall promote understanding, tolerance and friendship among all nations, racial or religious groups, and shall further the activities of the United Nations for the maintenance of peace.
(3) Parents have a prior right to choose the kind of education that shall be given to their children.
(2) Education shall be directed to the full development of the human personality and to the strengthening of respect for human rights and fundamental freedoms. It shall promote understanding, tolerance and friendship among all nations, racial or religious groups, and shall further the activities of the United Nations for the maintenance of peace.
(3) Parents have a prior right to choose the kind of education that shall be given to their children.
Article eight.
Everyone is entitled to a social and international order in which the
rights and freedom’s set forth in this Declaration can be fully realized.
Article nine.
(1) Everyone has duties to the community in which alone the free and
full development of his personality is possible.
(2) In the exercise of his rights and freedoms, everyone shall be subject only to such limitations as are determined by law solely for the purpose of securing due recognition and respect for the rights and freedoms of others and of meeting the just requirements of morality, public order and the general welfare in a democratic society.
(3) These rights and freedoms may in no case be exercised contrary to the purposes and principles of the United Nations.
(2) In the exercise of his rights and freedoms, everyone shall be subject only to such limitations as are determined by law solely for the purpose of securing due recognition and respect for the rights and freedoms of others and of meeting the just requirements of morality, public order and the general welfare in a democratic society.
(3) These rights and freedoms may in no case be exercised contrary to the purposes and principles of the United Nations.
Article ten.
Nothing in this Declaration may be interpreted as implying for any
State, group or person any right to engage in any activity or to perform any
act aimed at the destruction of any of the rights and freedoms set forth
herein.
Question 6
Digital Socialization:
6.1) Socialization
refers to a continuing process whereby an individual acquires a personal
identity and learns the norms, values, behaviour, and social skills appropriate to his or her social position. Digital Socialization is a
communication method that many people use to interact with other people
world-wide and plays a vital role in today’s generation.
How can Social Media
change communities and their practices and their Traditions:
Advantages
of Social Media:
-
Individuals has the ability to connect to
other people world-wide.
World-wide connections such as:
-
Finding romance.
-
Seeking a new job.
-
Locating
assistance.
-
Getting and giving
product and service referrals.
-
Receiving support
from like-minded individuals.
-
Making or receiving
career or personal advice.
-
Sharing political
beliefs.
-
Accessing news in
real time.
Real-Time Information
Sharing:
Many social
networking sites incorporate an instant messaging feature, which allow people
to exchange information in real-time via a chat which leads to changing
people’s practices and tradition.
Commonality of interest:
When you opt to
participate in a social network community, you can pick and choose individuals whose likes and
dislikes are similar to yours and build your network around those
commonalities.
Disadvantages
of Social Media:
Privacy: Social networking sites encourage people to be
more public about their personal lives. Because intimate details of our lives
can be posted so easily, users are prone to bypass the filters they might
normally employ when talking about their private lives.
Decreased Productivity: While many
businesses use social networking sites to find and communicate with clients,
the sites can also prove a great distraction to employees who may show more
interest in what their friends are posting than in their work tasks.
Cyber-bullying: The immediacy
provided by social media is available to predators as well as friends. Kids
especially are vulnerable to the practice of cyber-bullying in which the
perpetrators, anonymously or even posing as people their victims trust,
terrorize individuals in front of their peers.
6.2) Ethical issues that may arise because of
Digital Socialization:
- Privacy and Security
- Pornography
- Freedoms and
accountability
- Lack of Human Interaction:
- Copyright access and
infringement
Question 7
Here are
some Cyber-security tips you may follow:
-
Trust nobody.
-
Never post in appropriate content and pictures it leads to cyber bullying.
-
Keep all applications up-to-date.
-
Use a VPN
connection.
-
Create very strong and complex passwords.
-
Ask loudly for your right to privacy.
-
Never use the same password twice.
-
Install an antivirus solution.
-
Verify your privacy settings on mobile devices and social media
Question 8
Question 9
Digital Commerce is defined as the
electronic selling and buying of goods however it goes further than that,
nowadays technology is having a tremendous influence in our lives. E-commerce
is the buying and selling of products and services by businesses and consumers through an electronic medium, without using any paper documents. (Jacob Morgan (May 13, 2014).)
E-commerce business models and why is it so
unique:
B2B refers to businesses that are focused on
selling products or services to other companies are called B2B, or business-to-business.
B2C is the type of commerce
transaction in which businesses sell products or services to consumers. More
recently, the term B2C refers to the online selling of products, or e-tailing,
in which manufacturers or retailers sell their products to consumers over the
Internet.
C2C is a business model that
facilitates the transaction of products or services between customers. An example
of C2C would be the classifieds section of a newspaper, or an auction. In both
of these cases, a customer, not a business, sells goods or services to another
customer.
C2B is in contrast with the
more traditional business-to-consumer model, the C2B (consumer-to-business)
model allows businesses to extract value from consumers – and vice versa. In
the C2B model, businesses profit from the willingness of consumers to name
their own price or contribute data or marketing to the company, while consumers
profit from flexibility, direct payment, or free or reduced-price products and
services
REFRENCE LIST/BIBLIOGRAPGHY
Zickuhler et al (2011), Generations and their
Gadgets Pew internet and American life.
Jacob Morgan ( May 13, 2014), Forbes.com
Dutton, W et al, (2004); “bridging
broadcast internet divides” Journal of information technology. 19 (1); 28-38
Hilbert, Martin (2010), “Information
Soccieties or “ ICT Equipment Societies? “Measuring the Digital
Information-Processing Capacity of a society in Bits and bytes.” The
Information Society 26 157-178
EWN online (2016). who is
Homo? Accessed 9 April 2014 http://ewn.co.za/features/Naledi/what-makes-Naledi-special
Comments
Post a Comment