1. Digital Divide
Please see below the PowerPoint presentation to raise awareness on the ramifications of
1.1 Techno-Economic paradigm
1.2 Elements of Digital Citizenship poster aimed at primary children
Digital citizenship by Rethabile Michelle Mokhobo byrmokhobo
email@example.com has created a poster onhttp://www.postermywall.com/index.php/posterbuilder/load/13d5cb092407fe0f95cb67f8e7272e3b and shared it with you.
2.Digital Literacy and information fluency on archaeological findings Homo Naledi
This is the story of one of the greatest fossil discoveries of the past half century, and of what it might mean for our understanding of human evolution.A trove of bones hidden deep within a South African cave represents a new species of human ancestor, scientists announced Thursday in the journal eLife. Homo Naledi, as they call it, appears very primitive in some respects—it had a tiny brain, for instance, and apelike shoulders for climbing. But in other ways it looks remarkably like modern humans. When did it live? Where does it fit in the human family tree? And how did its bones get into the deepest hidden chamber of the cave—could such a primitive creature have been disposing of its dead intentionally?
Well ,two years ago, a pair of recreational cavers entered a cave called Rising Star, some 30 miles northwest of Johannesburg. Rising Star has been a popular draw for cavers since the 1960s, and its filigree of channels and caverns is well mapped. Steven Tucker and Rick Hunter were hoping to find some less trodden passage. Deep in the cave, Tucker and Hunter worked their way through a constriction calledSuperman’s Crawl—because most people can fit through only by holding one arm tightly against the body and extending the other above the head, like the Man of Steel in flight. Crossing a large chamber, they climbed a jagged wall of rock called the Dragon’s Back. At the top they found themselves in a pretty little cavity decorated with stalactites. Hunter got out his video camera, and to remove himself from the frame, Tucker eased himself into a fissure in the cave floor. His foot found a finger of rock, then another below it, then—empty space. Dropping down, he found himself in a narrow, vertical chute, in some places less than eight inches wide. He called to Hunter to follow him. Both men have hyper-slender frames, all bone and wiry muscle. Had their torsos been just a little bigger, they would not have fit in the chute, and what is arguably the most astonishing human fossil discovery in half a century—and undoubtedly the most perplexing—would not have occurred.
In the back of their minds was another mission. In the first half of the 20th century, this region of South Africa produced so many fossils of our early ancestors that it later became known as the Cradle of Humankind. Though the heyday of fossil hunting there was long past, the cavers knew that a scientist in Johannesburg was looking for bones. The odds of happening upon something were remote. But you never know.Having exhausted all other explanations, Berger and his team were stuck with the improbable conclusion that bodies of H. Naledi were deliberately put there, by other H. Naledi Until now only Homo sapiens, and possibly some archaic humans such as the Neanderthals, are known to have treated their dead in such a ritualized manner. The researchers don’t argue that these much more primitive hominids navigated Superman’s Crawl and the harrowing shark-mouth chute while dragging corpses behind them—that would go beyond improbable to incredible.
Deliberate disposal of bodies would still have required the hominids to find their way to the top of the chute through pitch-black darkness and back again, which almost surely would have required light—torches, or fires lit at intervals. The notion of such a small-brained creature exhibiting such complex behavior seems so unlikely that many other researchers have simply refused to credit it. At some earlier time, they argue, there must have been an entrance to the cave that afforded more direct access to the fossil chamber—one that probably allowed the bones to wash in. Disposal of the dead brings closure for the living, confers respect on the departed, or abets their transition to the next life. Such sentiments are a hallmark of humanity. But H. Naledi, was NOT human—which makes the behavior all the more intriguing.A New Kind of Ancestor H. Naledi was much closer in appearance to Homo species such as H. erect-us than to Australopithecus, such as Lucy. But it possesses enough traits shared with no other member of our genus that it warrants a new species name.
3.Digital Communication and fluencies –
The Social Economy
Benefits for social technologies in corporate : The social networking can may allow organisations to improve communication which includes the following:
- it targets a wide range of audiences making it a useful and effective recruitment tool
- improves business reputation and client base with a minimum use of advertising
- it also expands market research , implements marketing campaigns
Risk for social technologies in corporate
- social technology opens up the possibility for hackers to commit fraud and launch spam.it results in lost productivity especially if employees are busy updating profile sit potentially resulting in data or identity theft.
Benefits for social technologies in society –
- social media has a lot of benefits for the society especially for teachers and student it is very easy to educate from others who are experts and professionals via social media as they share knowledge.
Risks for social technologies in society –
- cyber-bullying is the most common activity find and children have become victims of the cyber-bullying
- personal data and privacy can be easily cracked and shared on internet this is why it is of most importance to have privacy settings
Benefits for social technologies for individuals-
- knowledge is enhance due to professionals who post information that usually helps an individual to know more about lifestyle , education and more
Risks for social technologies for individuals –
- one may be addicted in social media and it may also affect their way of living and health as most people then end up not interacting with other verbally because one could be
Digital Code of Conduct for education institutes
- Remember the Human – Never forget that the person reading your communication is actually a person with feelings and can get hurt. Essentially never say anything online that wouldn’t say to your reader’s face.
- Adhere to the same standards of behavior online that you follow in real life – Be ethical in your engagement and know that breaking the law is bad netiquette
- Know where you are in cyberspace – The netiquette required will differ from domain to domain. If you are in a forum of experts, your netiquette should reflect respect. Whereas if you are in a chat room with a group of friends (you know in real life) then the netiquette will differ
- Respect other people’s time and bandwidth – When sharing files or documents, bear in mind the audience’s bandwidth. Furthermore, make sure you read the FAQs first before asking mundane questions where the answers already exist. If you disagree with a group’s discussion, don’t waste their (or your) time by telling them how stupid they are: Just stay away
- Make yourself look good online – Check grammar and spelling before you post. Most people judge others’ intelligence based on the use of grammar and spelling. Only post on things you know about, it is not worth it to look like the fool.
- Share expert knowledge – Offer answers and help others where you can
- Help keep flame wars under control – Don’t respond to flame-bait, don’t post spelling or grammar flames, and apologize if you have done so or perpetuated a flame-war
- Respect other people’s privacy – Don’t give out other people’s details, online or offline
- Don’t abuse your power – The more power you have, the more important it is how you use it
- Be forgiving of other people’s mistakes – We were all once beginners and should accept that everyone has to start somewhere .
Penalties that apply for failing to meet these rules
- If these rules are not followed the first step would be to send the user an automatic email stating that they are breaking these rules.
- The next step would be to limit their time access to the internet.
If the rules are still continued to be disobeyed they would then need to attend a disciplinary hearing.
4If the previous step has not corrected their actions then the final step would be to take legal action against the user
5.Digital Rights and Responsibilities
|Share on Facebook|
|CancelPost to Facebook|
The 5 Top cyber-security risks in 2015 are:
- The Internet of Things
- Increase in cyber theft and
- Insecure passwords
How users, enabled hackers to obtain these details more easily by providing known companies with our data?
It is of most importance to protect yourself against online fraud as online fraud takes on many guises that can impact everyone, including small businesses and their employees. It is helpful to maintain consistent and predictable online messaging when communicating with your customers to prevent others from impersonating your company. Be sure to never request personal information or account details through email, social networking or other online messages. Let your customers know you will never request this kind of information through such channels and instruct them to contact you directly should they have any concerns,businesses face this threat from two directions –
How they can be avoided or mitigated?
Test web-facing servers often and thoroughly. How often is often? Hackers have probably discovered 10 new ways to exploit your server as you read this sentence. Initiate automated scans and manually scan your web servers at least monthly. Use multi-layered scanning – don’t use the same scan utility over and over. Scan from inside and outside your network. You never know where a hacker may be sitting.