Digital Citizen POE

Question 1



Question 2
 The information process:
Findings on Homo Naledi:

Ask
Who was Homo Naledi.
What was the significant about this discovery.

Acquire
Information was acquired at the following website: 

Analyse
A team of archaeologist led by Professor Lee Berger undertook the rising star expedition and they had made history by discovering and salvaging fossils of at least an individual from the Dinaledi chamber. This was evolutionary discovery since a new species of hominines called Homo Naledi was found in the remote chamber. Homo Naledi has distinct physical features that are astonishingly similar to that of human being such as:
     
Curved fingers
-      
  Small skulls
-        
Slender bodies
-      
 Ape-like shoulders

Apply
According to the finding highlighted in the Homo Naledi could be our common ancestor, therefore this suggest that it could had human characteristics both physical and mental as well as similar behavioural characteristics.
The Dinaledi chamber could have been used as a burial ground where the newfound species could have performed burial rituals since none of the fossils had mark nor did they attend the chamber at the same time.

Assess
Research was conducted thoroughly and the information was extracted from a good source.

Question 3

What is Media fluency:
Media fluency is actually two-fold: the first step involves the interpretation (listening) of the media; and the second step involves how we leverage this for our own output (communication). This fluency influences through the most appropriate and effective medium. (Zickuhler et al (2011).)

What is Inappropriate communication:
Personal digital communication can have far-reaching impacts, where our words, often said in the moment of heated emotion, are stored online forever. With the advent of social media, there is a greater risk of over-sharing, inadvertent bullying or just plain maliciousness. We need to be careful in our behaviour and conduct whilst online, as the longevity of the comments/ statement cannot be underestimated. (Zickuhler et al (2011).)

Napalm girl:
In my opinion when I stare at the image with regards to the war in Vietnam I believe the image is being used inappropriately to convey a message to the public. Firstly it gives many people a negative perception when looking the image because all the girls and boys have clothes on and too many it seems like the naked girl has been molested in some way. That might not even be the case but since the girl is naked it portrays a negative image to people. So therefore I believe that image has been used in an inappropriate manner because it conveys an negative image of some sort. No media group should post naked or nude images to convey messages or they should be more courteous when doing so. During the time of war the image was seen as error inappropriate according to the press, but after the war in Vietnam the image was seen as inappropriate communication but many still did not understand what the purpose of image meant or conveyed.

Question 4
Digital Etiquette refers to the way you address yourself on the internet and in the digital world. The standards of conduct expected by other digital technology users.
Many people do not understand what is expected from them as a digital citizen when using the internet. It is proven that the numbers of people misusing the internet is increasing rapidly. There are many activities related to inappropriate behaviour on the internet and people who engage in these activities may suffer the consequences.

Inappropriate behaviour on the internet:

Hacking:
Hacking is unauthorized intrusion into a computer or a network. The person engaged in hacking activities is generally referred to as a hacker. This hacker may alter system or security features to accomplish a goal that differs from the original purpose of the system.

Identity Theft:
Is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name and maybe to the other person's disadvantage or loss. The person whose identity has been stolen may suffer consequences, especially if they are held responsible for the suspects actions. Identity theft occurs when someone uses another's personally identifying information, like their name, identity number, or credit card number, without their permission, to commit fraud or other crimes.

Cyber bullying :
Cyber bullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook,  Twitter, and WhatsApp to harass, threaten or intimidate someone. Cyber bullying is often done by children, who have increasingly early access to these technologies. The problem is compounded by the fact that a bully can hide behind unknown user name, disguising his or her true identity. This secrecy makes it difficult to trace the source and encourages bullies to behave more aggressively than they might in a situation where they were identified.

Computer Fraud:
Is defined as any act using computers, the Internet, Internet devices, and Internet services to defraud people, companies, or government institutions of money, revenue, or Internet access. Illegal computer activities include phishing, social engineering, viruses, and DDoS attacks are some examples used to disrupt service or gain access to another's funds.

The consequences of inappropriate behavior on the internet:

Hacking:
You could face jail time and some costly fines should you get caught, not to mention having your access to computers restricted and your travel to other countries restricted even after you pay your fines and serve your prison sentence.

Identity Theft:
Assuming your efforts lead to the findings of the thief, penalties vary from state to state and may depend on what he does with your identity. If he accessed your information but never used it, this might only lead to a misdemeanor conviction. He might not even go to jail, but just be placed on probation, particularly if this was his first offense.

Cyber Bullying:
The consequences of cyber bullying include putting both victims and bullies at a high risk for depression, anxiety and stress-related disorders. According to Kids Health from Nemours also reported that “those involved in these bullying acts are at a greater risk of suffering from suicidal thoughts, attempts, and completed suicides.”

Computer Fraud:
A fraud victim may feel lonely or embarrassed because of a change in social status. The incident may cause marital problems and prevent someone from providing adequate support for their family.

Guidelines for online etiquette:
-        Remember the Human (person).
-        Adhere to some standards of online behaviour that you follow in your "real' life.
-        Know where you are in cyberspace.
-        Respect other people’s time and bandwidth.
-        Make yourself look good online.
-        Share expert knowledge.
-        Help keep flame wars under control. Ignore flame-bait.
-        Respect the privacy of others.
-        Do not abuse your power and privileges.
-        Be forgiving of other peoples mistakes.

Question 5

Digital Bill of rights:

Article one.
(1) Everyone has the right to freedom of peaceful assembly and association.
(2) No one may be compelled to belong to an association.

Article two.
(1) Everyone has the right to take part in the government of his country, directly or through freely chosen representatives.
(2) Everyone has the right of equal access to public service in his country.
(3) The will of the people shall be the basis of the authority of government; this will shall be expressed in periodic and genuine elections which shall be by universal and equal suffrage and shall be held by secret vote or by equivalent free voting procedures.

Article three.
Everyone, as a member of society, has the right to social security and is entitled to realization, through national effort and international co-operation and in accordance with the organization and resources of each State, of the economic, social and cultural rights indispensable for his dignity and the free development of his personality.

Article four.
(1) Everyone has the right to work, to free choice of employment, to just and favorable conditions of work and to protection against unemployment.
(2) Everyone, without any discrimination, has the right to equal pay for equal work.
(3) Everyone who works has the right to just and favorable remuneration ensuring for himself and his family an existence worthy of human dignity, and supplemented, if necessary, by other means of social protection.
(4) Everyone has the right to form and to join trade unions for the protection of his interests.

Article five.
Everyone has the right to rest and leisure, including reasonable limitation of working hours and periodic holidays with pay.

Article six.
(1) Everyone has the right to a standard of living adequate for the health and well-being of himself and of his family, including food, clothing, housing and medical care and necessary social services, and the right to security in the event of unemployment, sickness, disability, widowhood, old age or other lack of livelihood in circumstances beyond his control.
(2) Motherhood and childhood are entitled to special care and assistance. All children, whether born in or out of wedlock, shall enjoy the same social protection.

Article seven.
(1) Everyone has the right to education. Education shall be free, at least in the elementary and fundamental stages. Elementary education shall be compulsory. Technical and professional education shall be made generally available and higher education shall be equally accessible to all on the basis of merit.
(2) Education shall be directed to the full development of the human personality and to the strengthening of respect for human rights and fundamental freedoms. It shall promote understanding, tolerance and friendship among all nations, racial or religious groups, and shall further the activities of the United Nations for the maintenance of peace.
(3) Parents have a prior right to choose the kind of education that shall be given to their children.

Article eight.
Everyone is entitled to a social and international order in which the rights and freedom’s set forth in this Declaration can be fully realized.

Article nine.
(1) Everyone has duties to the community in which alone the free and full development of his personality is possible.
(2) In the exercise of his rights and freedoms, everyone shall be subject only to such limitations as are determined by law solely for the purpose of securing due recognition and respect for the rights and freedoms of others and of meeting the just requirements of morality, public order and the general welfare in a democratic society.
(3) These rights and freedoms may in no case be exercised contrary to the purposes and principles of the United Nations.

Article ten.
Nothing in this Declaration may be interpreted as implying for any State, group or person any right to engage in any activity or to perform any act aimed at the destruction of any of the rights and freedoms set forth herein.

Question 6

Digital Socialization:

6.1) Socialization refers to a continuing process whereby an individual acquires a personal identity and learns the norms, values, behaviour, and social skills appropriate to his or her social position. Digital Socialization is a communication method that many people use to interact with other people world-wide and plays a vital role in today’s generation.

How can Social Media change communities and their practices and their Traditions:

Advantages of Social Media:
-        Individuals has the ability to connect to other people world-wide.

World-wide connections such as:
-        Finding romance.
-        Seeking a new job.
-        Locating assistance.
-        Getting and giving product and service referrals.
-        Receiving support from like-minded individuals.
-        Making or receiving career or personal advice.
-        Sharing political beliefs.
-        Accessing news in real time.

 Real-Time Information Sharing:
Many social networking sites incorporate an instant messaging feature, which allow people to exchange information in real-time via a chat which leads to changing people’s practices and tradition.

Commonality of interest:
When you opt to participate in a social network community, you can pick and            choose individuals whose likes and dislikes are similar to yours and build your network around those commonalities.

Disadvantages of Social Media:

Privacy: Social networking sites encourage people to be more public about their personal lives. Because intimate details of our lives can be posted so easily, users are prone to bypass the filters they might normally employ when talking about their private lives.

Decreased Productivity: While many businesses use social networking sites to find and communicate with clients, the sites can also prove a great distraction to employees who may show more interest in what their friends are posting than in their work tasks.

Cyber-bullying: The immediacy provided by social media is available to predators as well as friends. Kids especially are vulnerable to the practice of cyber-bullying in which the perpetrators, anonymously or even posing as people their victims trust, terrorize individuals in front of their peers.

6.2) Ethical issues that may arise because of Digital Socialization:

- Privacy and Security
- Pornography
- Freedoms and accountability
-  Lack of Human Interaction:
- Copyright access and infringement

Question 7

Here are some Cyber-security tips you may follow:
-        
     Trust nobody.
-        Never post in appropriate content and pictures it leads to cyber bullying.
-        Keep all applications up-to-date.
-        Use a VPN connection.
-        Create very strong and complex passwords.
-        Ask loudly for your right to privacy.
-        Never use the same password twice.
-        Install an antivirus solution.
-        Verify your privacy settings on mobile devices and social media



Question 8


Question 9

Digital Commerce is defined as the electronic selling and buying of goods however it goes further than that, nowadays technology is having a tremendous influence in our lives. E-commerce is the buying and selling of products and services by businesses and consumers through an electronic medium, without using any paper documents. (Jacob Morgan (May 13, 2014).)

E-commerce business models and why is it so unique:
 B2B refers to businesses that are focused on selling products or services to other companies are called B2B, or business-to-business.

B2C is the type of commerce transaction in which businesses sell products or services to consumers. More recently, the term B2C refers to the online selling of products, or e-tailing, in which manufacturers or retailers sell their products to consumers over the Internet.

C2C is a business model that facilitates the transaction of products or services between customers. An example of C2C would be the classifieds section of a newspaper, or an auction. In both of these cases, a customer, not a business, sells goods or services to another customer.

C2B is in contrast with the more traditional business-to-consumer model, the C2B (consumer-to-business) model allows businesses to extract value from consumers – and vice versa. In the C2B model, businesses profit from the willingness of consumers to name their own price or contribute data or marketing to the company, while consumers profit from flexibility, direct payment, or free or reduced-price products and services




REFRENCE LIST/BIBLIOGRAPGHY
 Zickuhler et al (2011), Generations and their Gadgets Pew internet and American life.
Jacob Morgan ( May 13, 2014), Forbes.com
Dutton, W et al, (2004); “bridging broadcast internet divides” Journal of information technology. 19 (1); 28-38
Hilbert, Martin (2010), “Information Soccieties or “ ICT Equipment Societies? “Measuring the Digital Information-Processing Capacity of a society in Bits and bytes.” The Information Society  26 157-178
Global Citizenship Foundation (2013), www.globaldigitalcitizen.org
EWN online (2016). who is Homo? Accessed 9 April 2014 http://ewn.co.za/features/Naledi/what-makes-Naledi-special
“Advantages and Disadvantages of Social Media”(2013): www.smallbusinessChron.com

“How to secure your internet credentials” (2011): www.digitech.securitymethods.com

Comments