Tuesday, 31 May 2016

Task 5

Task 5




Task 1.2

Task 1.2


Techno-economic paradigm locates the notion of technology revolutions in the neo-Schumpeterian effort to comprehend innovation and to identify the regularities, continuities and the discontinuities in the process of innovation. On this basis it explains the technological revolutions, examines the structures that are made in rejuvenating the whole economy through application of the techno-economic paradigm. Making this influences on the institutional and social change of these two components    

Task 2

Task 2

The information fluency process is as follows

  • Ask- Who/what is Homo Naledi?
                When was it discovered?
                 Who discovered it?
                 How old was the finding?
                 Why is the finding so significant?
                 What happened to the finding/where is it?
  • Acquire- Google has become part of our daily digital lives.Reading books, be it from a library or online helps to feed ones knowledge, going to a museum to gain more knowledge on the species Homo Naledi.  
                      
  • Analyze- In this stage i analyse the information that i already have and see which information should i use and which should i not.I will rearrange and organize the information.
  • Apply- I will then practicaly apply the knowledge i have gained within the context of the original purpose.
  • Assess- This is the final stage and i will revisit both the product and the process.
I have used this process to analyze and better understand the information required for the topic below.

 The discovery of a new species of a human ancestor was announced on the 10th of September 2015 at the Cradle of Humankind. The species was discovered by dr Lee Berger from Wits University with the help of national geographic and scientists from around the world.Homo Naledi was named after the rising star cave- "Naledi" means "star" in Sesotho. The bones were found in a chamber of the cave called Dinaledi, accessible only through a narrow chute, about 90 meters from the cave entrance. Homo Naledi looks like one of the most primitive members of our genus, but also has some surprisingly human-like features. Homo Naledi had a very tiny brain, about the size of an orange and a slender body, was about 1.5 meters tall and weighed about 45 kilograms.The hands of Homo Naledi suggest tool-using capabilities, with extremely curved fingers, they were more curved than almost any other species of early discovery, which demonstrates climbing capabilities. Roughly more than 60 cavers and scientists worked together to recover, what is now known as possibly the one of greatest archaeological discoveries of our time, the bones Homo Naledi through the 18-centimeter-wide cave opening. Homo Naledi was first discovered in 2013 by a team at the Rising-star cave.The species according to Dr Berger had extraordinary behavior, one that we as human beings thought we were unique about for so long, it disposed of the dead and buried them. Dr Berger and his team upon finding the remains came up with a rather controversial conclusion, that the place they found the bones in was a burial ground for Homo Naledi as no less than 1550 fossilized bones were found at the bottom of Dinaledi. Dr Berger and his team have not been able to date the fossils yet making it difficult to accurately estimate how long ago they lived on this earth.Homo Naledi is the closest archaeological discovery to man-kind and its origin.      

Monday, 30 May 2016

Task 1.3

Task 1.3







Task 1.1

Task 1.1



Task 7

Task 7

2015 Top five cybersecurity risks in South Africa.


  1. Ransom-ware ; Infects a computer and restricts the users access to it, a ransom is paid in order for the user to be able to use their computer.
  2. The internet of things ; Is when devices are connected to the internet which increases the risk of personal information obtained.
  3. Increase in cyber-theft ; Is the stealing of financial information through the internet, such as credit cards details.
  4. Cyber espionage ; Is when information is obtained through the internet for use by the government
  5. Insecure passwords ; Are passwords which are easily obtainable based on the users tastes or preferences and whether the same password is used several times.
http://www,villanoau.com/resources/iss/companies-affected-by-cyber-attacks/#.VOx6nJF97IU


Companies that experienced cyber-attacks

Yahoo- The email giant confirmed in January that approximately 273 million user password and usernames were exposed to cyber-attackers.
Apple- Hackers accessed Apple iCloud, the company's online data storage system, and posted private photos of celebrities online. Apple stated that individual accounts were accessed through maneuvers that guessed usernames, passwords and security questions- and that Apple's systems were not compromised.
Google- In September 2014, approximately 5 million usernames and passwords of Gmail account holders were compromised and leaked on a Russian forum site. Of these, about 100,000 were legitimate, current and correct username-password combinations.

Companies must have fire-walls and the correct internet security measures in place, whilst at the same time make their employees sign confidentiality agreements on the company.

Task 4

Task 3

10 points of Netiquette

  1. Never forget that the person reading your communication is actually a person with feelings and can get hurt. It is best not to say anything online that you wouldn't say to your reader’s face.
  2. Follow the same standards of behavior online that you follow in real life - Be ethical in your engagement and know that breaking the law is bad netiquette.
  3. Know where you are in cyberspace - The netiquette required will differ from domain to domain. If you are in a forum of experts, your netiquette should reflect respect. Whereas if you are in a chat room with a group of friends (you know in real life) then the netiquette will differ. 
  4.  Respect other people’s time and bandwidth - When sharing files or documents, bear in mind the audience’s bandwidth. Furthermore, make sure you read the FAQs first before asking mundane questions where the answers already exist. If you disagree with a group’s discussion, don’t waste their (or your) time by telling them how stupid they are: Just stay away.
  5.  Make yourself look good online - Check grammar and spelling before you post. Most people judge others’ intelligence based on the use of grammar and spelling. Only post on things you know about, it is not worth it to look like the fool. 
  6. Share expert knowledge - Offer answers and help others where you can.
  7.  Help keep flame wars under control - Don’t respond to flame-bait, don’t post spelling or grammar flames, and apologize if you have done so or perpetuated a flame-war.
  8.  Respect other people’s privacy - Don’t give out other people’s details, online or offline.
  9. Don’t abuse your power - The more power you have, the more important it is how you use it.
  10. Be forgiving of other people’s mistakes - We were all once beginners and should accept that everyone has to start somewhere.
Penalties that apply for failing to meet these rules
1. If these rules are not followed the first step would be to send the user an automatic email stating that they are breaking these rules.
2. The next step would be to limit their time access to the internet.
3. If the rules are still continued to be disobeyed they would then need to attend a disciplinary hearing.
4. If the previous step has not corrected their actions then the final step would be to take legal action against the user.

How you would enforce and manage this in your business? 
I would make people aware of the importance of the code of conduct and the ten netiquette points of digital citizenship, and the penalties that will apply to people who fail to meet the rules,whilst in a social environment that allows the freedom of speech.I would make sure that institutes follow the right procedures when handing penalties and the importance thereof of the above mentioned topics.    




Digital code of conduct

  1. Behave in an ethical way in the digital world as done in the real world.
  2. Respect yourself and others when using technology.
  3. Do not use technology in a harmful or grading manner.
  4. Ensure the privacy of your own information.
  5. Protect yourself and others by reporting digital abuse of students and property.
  6. Do not invade anyone's digital profile and do not abuse it.
  7. DO NOT break laws or rules dealing with the use of technology.
  8. Have consideration and respect for school and peer technological resources and appropriately.

Task 6

Task 6


https://www.thinglink.com/user/793783572556152832/scenes

Task 8

Task 8

https://za.pinterest.com/sobzndungane/digc5110/