Thinglink
Wednesday, 24 June 2015
Reference list
References
Citizen-advice(2015)different ways of buying. [online] available at:https://www.citizensadvice.org.uk/consumer/different-ways-of-buying/buying-at-auction/buying-at-an-online-auction/. [Accessed on 21 June 2015]
Ori-hhs(2015) plagiarism. [online] available at: https://ori.hhs.gov/plagiarism-0 [Accessed on 19 June 2015]
Telegraph (2014) cyber crime. [online]. Available at: http://www.telegraph.co.uk/finance/yourbusiness/11393773/Seven-ways-to-avoid-being-hacked.html. [Accessed on 24 July 2015]
New York University(2015) Digital communication. [online] available at: http://www.nyu.edu/employees/resources-and-services/media-and-communications/digital-communications.html. [Accessed on 23 June 2015]
Anon, nd. Digital Rights and Responsibilities. Available at [online]: http://https://sites.google.com/site/digitalcitizenshipdferris/digital-rights-and-responsibilities. Accessed 19 May 2015
21 CIF (2015) Fluencies. [online]. Available at: 21cif.com/resources/difcore/dif_faqs.htm [Accessed on 21 June 2015]
Earnie Kramer. (2013) SecEdu: Nine elements of digital Citizenship. [blog]. Education blog. [online]. Available at: http://www.sec-ed.co.uk/best-practice/the-nine-elements-of-digital-citizenship-that-all-students-must-understand. [Accessed on 13/06/2015]
Did you Know
DID YOU KNOW ?
The internet infrastructure and how to connect to information:•The routers determine where to send information from one computer to another.
•Routers are specialized computers that
send your messages and those of every other Internet user speeding to their
destinations along thousands of pathways.
•Backbones are typically fiber
optic trunk lines.
Every
machine on the Internet has a unique identifying number, called an IP
AddressDid you know ?
BLOG BACKGROUND
•Originally,
Weblogs were not collaborative technologies
•Gave
voice to person wishing to place thoughts and opinions into unedited public
space
•This
one-to-many communication tool was updated to allow reader comments and
feedback
•Now
Weblogs are a place where material can be synthesized, mashed, and opened to
comments
•Video,
audio, images and other media can be incorporated
•Likes
and dislikes can be noted
Parents' section
Games are important for kids in the sense that, they improve and enhance the digital literacy of the kids who play them. As the kids are being exposed to the digital world through these games, they become more familiar to it and reduces the chances of them finding it hard to become a digital citizenship. The games also enhance the kid's state of fluency, since the use of it is exercised in the process of playing the games. ( for more information about digital and creative fluency, visit the digital fluency post in this blog)
A list of games suitable for kids
- Candy Crusher
- Clush of the tribes
- world of zoo
- Tetris
- and so many others that are available in the interactive image link's website
The games recommended here are user friendly on the perspective of impact which is dependent on age, the reason why they are regarded to as suitable for kids. These are a lot more based on good doings to kids who use them, than they are negligibly low on wrong doings to these users.
8 Digital Security
Physical Issues:
We spend most of our working career behind the screen of a computer or laptop and when we are not doing this for work we do it for pleasure, keeping up to date with all our social media or playing games and so on, this could create many complications for us, such as promoting obesity or heart disease, diabetes or even cancer.
There are ways for businesses to help fight against this such as considering the lay out of the office, fitted chairs where you can change the height or even desks that provide a computable environment.
Repetitive Strain Injury Syndrome:
This is a syndrome that acres over time when the same muscle is used over and over or even bad posture, this puts a particular part of your body under a lot of strain and this could cause a lot of pain and discomfort. The most common ones known are:
Carpal Tunnel Syndrome
Tennis Elbow
Trigger Finger
Tendinitis
Blackberry Thumb
Ways that this could be prevented or kept under control are as follows:
1. Look at posture.
2.Slow down your mouse and use keyboard shortcuts rather Look at your keyboard; adjust the repeat rate to avoid mistakes, use sticky keys to avoid having to hold a modifier key down (Shift, Ctrl, Alt)
3. Take regular breaks an don't sit in the same position for long periods
Eye Strain:
Staring at a screen for prolonged periods of time can cause strain on your eyes that could lead to damaging them permanently. There are two types of eye problems that take place the first being computer vision syndrome, that takes place after over using your eye muscles and straining them, the symptoms include blurred vision, double vision, dry eyes, headaches, irritation of the eyes and neck or back pains.
You can try to prevent this from happening by doing the following:
1. Cut the glare
2. Rearrange your desk so that your computer monitor is slightly below eye level, and approximately 50-70 centimetres away from the face
3. Give your eyes a break
4. Tweak your computer settings such as brightness or font size.
The next type of eye strain we will look at is called eye fatigue and the symptoms may include:
Red, irritated eyes
Dry eyes
Intermittent blurred vision when viewing your screen or device
Blurred distance vision when looking away from your screen or device
Headaches
Neck and/ or back pain
You can use the same methods as mentioned previously to help prevent this and also remember to get your eyes checked regularly.
Another challenge of sitting for so long is trying to fight off obesity, in today’s time where there is so much to do and it’s all done on technology we find it hard to have time to cook healthy food so we resort to take away food and this can lead to an unhealthy lifestyle, we should try to remain fit and exercise as much as we can with the time we have away from the computer.
Psychological Issues:
These issues can sometimes be more of a challenge then the physical ones due to the fact that they are harder to identify, can happen without people knowing, easy to misdiagnose and so on.
One of the key issues are addiction, this can happen even when no substance such as drugs are used, addiction is based on the over use or abuse of something such as gambling or the internet. There are a few sings of addiction and can be listed as follows:
1. Increasing amounts of time spent on computer and Internet activities
2. Failed attempts to control
behavior
3. Heightened sense of euphoria while involved in computer and Internet activities
4. Craving more time on the computer and Internet
5. Neglecting friends and family
6. Feeling restless when not engaged in the activity
7. Being dishonest with others
8. Computer use interfering with job/ school performance
9. Feeling guilty, ashamed, anxious, or depressed as a result of
behavior
10. Changes in sleep patterns
11. Physical changes such as weight gain or loss, backaches, headaches, carpal tunnel syndrome
Withdrawing from other pleasurable activities
Cyber Bullying:
Studies have shown that more than half of today’s youth has experienced cyber bullying, this has a very negative phonological effect on an adolescent and could cause serious issues in the future. Cyber bullying allows for someone to be attacked or to attack someone in their own homes from behind their keyboard.
The main reasons why people become bullies could be:
1.Strained parental relationships
2. Inconsistent discipline
3. Poor academic performance
4. in-supportive peer networks
5. Child abuse
6. Victims of bullies themselves
7. Low self-esteem
On the other hand a victim of a bully could show these signs:
1.Low self-esteem
2. Signs of depression
3. Signs of being lonely
4. Has low academic achievement and absenteeism
5. Exhibits behavioural disorders
6. Exhibits psychological or psychosomatic problems, such as headaches, stomach pains, sleeping disorders
7. suffers from stress and phobias
8. Struggles to spend time alone
9. Avoids eye contact
Cyber Stalking:
This is a very real threat in today’s age due to all the social media at our disposal, cyber stalking involves someone becoming obsessed with the victim and then uses any resources at their disposal to follow this person and use this information against them. There are some similarities from proper stalking and cyber stalking, normally the victim is being stalked by someone they were previously intimate with, and the victim is usually a female and the stalker is driven by the desire to control or poses the victim.
There are also difference between online and offline stalking, such as when stalking the stalker will need to physically be close to the victim whereas online it could be done across the country. It is also easy for the stalker to harass the victim and get others involved when it is done online.
Some of the motivations for cyber stalking are:
1.Wanting a romantic attachment
2. A partner trying to reconcile
3. A partner wishing to exact revenge
4. Delusional or imagined attachment to the victim, romantic or otherwise
5. Revenge against an actual or perceived injustice
6. Intolerance, or even hate, for a specific group
Stalking can have a number of effects such as:
1. Effects on physical health such as sleep lose or depression
2. Effects on mental health like the fear of being harmed when you’re alone.
3. Effects on work and/ or school, like not attending classes or refusing to see family members
4. Effects on social life
There are also difference between online and offline stalking, such as when stalking the stalker will need to physically be close to the victim whereas online it could be done across the country. It is also easy for the stalker to harass the victim and get others involved when it is done online.
Digital Commerce
Digital commerce is the process of selling and buying items online.
So what is the difference between the ‘electronic’ parts of the term vs. the ‘digital’ part of the term? the main difference is that the electronic commerce is the buying and selling of goods online and digital commerce is the same thing just in greater depth and a wider range.
Some common terminology used is the following.
Digital Business
E-Business
Digital Commerce
E-Commerce
M-Commerce
S-Commerce
Being an Informed Consumer:
It is important to be an informed customer due to the facts of buying online you will need the to the businesses history and that of the product or service they offer, before you spend any money on what they are offering.Currently e-commerce is in its infancy stage in South Africa compared to other countries. There are some issues which prevent the market from soaring such as; consumers not wanting to spend on delivery costs, consumers not wanting to take the chance of paying for something which might not work or fit properly, consumers not always trusting the site enough to take the chance of giving out their personal details due to the increased level of internet theft. Citizen-Advice (2015)
It is very important to be informed, you need to keep up to date with the changing trends so that you are not left behind while the world is moving forward. Plus keeping informed has become so easy that it’s impossible not to do so from reading newspapers to TV and the internet.
Plagiarism is a very serious offence therefore it is very important to keep these guidelines in mind:
Making sure to always citing all your sources that have helped you in doing your work.
Always paraphrasing even when you have cited the work.
Always present citation for information that can be considered general knowledge.
If not sure whether something should be cited or not; it’s always better to be safe that not by going ahead and citing it regardless.
We must all be ethical writers when borrowing other people’s work. ori-hhs (2015)
Safety tips for online auctions include:
Always read your T&C’s before agreeing to anything on any site.
Make sure to check the identity of your seller.
Be informed enough about the product your are buying.
Check the mode of payment safety. Is the site secure enough, does it have a lock; those are the questions you should be asking yourself.
References
Citizen-advice(2015)different ways of buying. [online] available at:https://www.citizensadvice.org.uk/consumer/different-ways-of-buying/buying-at-auction/buying-at-an-online-auction/. [Accessed on 21 June 2015]
Ori-hhs(2015) plagiarism. [online] available at: https://ori.hhs.gov/plagiarism-0 [Accessed on 19 June 2015]
Digital Access and digital citizenship
Digital Citizenship and digital access
Digital Access is mainly based on the availability and ability of people to access the digital world based on it being at their disposal. Digital citizenship is the way and norm a person excersises their responsibility in the technological world
Digital access is working towards everyone having equal rights to the opportunities and access to technology and supporting the usage of electronic access. Some people have limited access to digital and electronic access so that no one is denied the informationto become productive.

https://www.google.co.za/search?q=digital+citizenship+definition&biw=1440&bih=799&source=lnms&tbm=isch&sa=X&ei=A_YbVau8I8mqUbvOgbAJ&ved=0CAYQ_AUoAQ&dpr=1#imgdii=_&imgrc=5jkSusYpnvitUM%253A%3BreZkowPVavyhbM%3Bhttp%253A%252F%252Flearn-the-ropes.wikispaces.com%252Ffile%252Fview%252F882010_85628_1.gif%252F209483254%252F329x232%252F882010_85628_1.gif%3Bhttp%253A%252F%252Flearn-the-ropes.wikispaces.com%252FDigital%252BCitizenship%3B329%3B232
When using the
internet you are leaving yourself vulnerable to different security issues such
as; malware, cyber-criminal lurks, cyber bullying and credit card thefts to name
a few. The increased security risk has become a major concern to all globally.
Most of the digital users forget to keep themselves safe on the net by
forgetting not to always share all their personal details such as their address
and phone numbers. Teenagers are especially more vulnerable due to bullying
from their peers and them seeing the net as a safe place to just chill and
forget about their life troubles; this leads them to trusting the wrong people
and anyone looking to listen to them.
We never stop to think
of the risks of T&C’s, we usually simply just press the agree button
without even reading what we are agreeing to. Unknowingly we are giving
companies the right to use our information for other purposes. We are so
ignorant to the point that we don’t even realize that our data is being
recorded and kept sometimes eve sold. The only way to possibly combat this
issue is to set your private setting to the highest possible level and giving
minimal personal information.
Types of cyber-crimes:
Phishing/Spoofing
“The
fraudulent practice of sending emails pretending to be from reputable companies
in order to induce individuals to reveal personal information”.
Protect your computer
with a firewall, spam filters, anti-virus and anti-spyware software
Be
cautious of emails from unrecognized senders.
Do not click on links,
download files or open attachments in emails from unknown senders
Beware of links in emails
that ask for personal information.
Never email personal
or financial information, even if you are close with the recipient
Copyright Infringement
The use of works protected
by copyright law without permission Avoid taking anything
from the internet because it almost always is copyrighted by default.
Rather always try to
be creative than copying.
In case of movies or
music rather always buy from trustworthy websites to be on the safe side.
Child Pornography
Any visual depiction
of sexually explicit conduct involving a minor (someone under 18 years of age).
Sites and search
results should be blocked permanently to prevent pedophiles from sharing or
accessing those videos.
Cyber-bullying
“Cyber-bullying is the
harmful use of the Internet and related technologies to harm other people, in a
deliberate, repeated, and hostile manner”.
Cyber bullying can be
stopped by: not responding to the bully, not retaliating, keeping the evidence
of the whole bullying, reporting the bully and lastly by simply blocking the
bully.
Hacking
When someone’s
computer is broken into so that his personal or sensitive information can be
accessed. The criminal uses a variety of software to enter the person’s
computer and the person may not be aware that his computer is being accessed
from a remote location.
Always check
permissions on the apps before installing and make sure they aren’t accessing
unnecessary information. Use a VPN.
Use secure website; it
displays the green lock sign by it. This is otherwise known as HTTPS, and it
encrypts the data that passes from your device to the internet server,
meaning any hackers can’t decipher your private information.
Change all passwords
regularly and not use the same passwords across many different services
References
Telegraph (2014) cyber crime. [online]. Available at: http://www.telegraph.co.uk/finance/yourbusiness/11393773/Seven-ways-to-avoid-being-hacked.html. [Accessed on 24 July 2015]
Tuesday, 23 June 2015
Digital Communication
Clash of clans is a mobile game that you can download on most phones and play with friends. This is a good game to connect and meet new people and also have fun while you do so.
When you start the game you start as a level 1 and have to work your way up, you are the leading of a small village and need to create builds with basic units and slowly upgrade your buildings and solders increase the size of your village.
To do all this you will need resources such as gold, this can be acquired by raiding other villages or mining it, as mentioned before there is the sages where you can raid and thus you can get raided. This is why you will need to join a group of people known as a clan. They can offer support in fights and raids and also resources.
The communication needed in the clan is a test of your online digital skill. This tests if you can come to a common goal as a team and out play your opponents with complicated strategies. The risk of not joining clan is that you may work extremely hard on gathering your resources and troops together and someone that is much stronger and more advanced than you could come and battle your village and win, thus bring down your resources and setting you back quite a bit.
There are many ways to defend your village, from the lay out of your base to the buildings you choose to build, this could help you predicted what your enemy will attack and what they will sue to do so, with this knowledge you can decide on what troops to build or what defenses to upgrade, for example if you think your opponent with dragons you will need to have a good air defense set up.
The disadvantages of being in a clan is that there is a lot of pressure to compete in the clan wars and this could cause people to take this game a bit too seriously, and if one does not take part in the clan war the other members of the clan could start to single this one person out making them a target for cyber bullying.
This can educate the younger generation on digital citizenship due to its time consumption and communication needed, any user of this game will need to manage their time well and understand that there is a time to be on your phone and a time that it will be inappropriate. Also will introduce people who are new to the internet on how to handle themselves online with other people, not to take offense or attack others.
As web technologies
quickly evolve and our primary methods of communication and interaction
change in a globally-networked world, NYU adopts and evolves these tools
and methods to continually support the university's priorities. These
digital communication tools range from traditional e-mail services to
robust interactive websites. New York University (2015)
Clash of clans is a mobile game that you can download on most phones and play with friends. This is a good game to connect and meet new people and also have fun while you do so.
When you start the game you start as a level 1 and have to work your way up, you are the leading of a small village and need to create builds with basic units and slowly upgrade your buildings and solders increase the size of your village.
To do all this you will need resources such as gold, this can be acquired by raiding other villages or mining it, as mentioned before there is the sages where you can raid and thus you can get raided. This is why you will need to join a group of people known as a clan. They can offer support in fights and raids and also resources.
When you start the game you start as a level 1 and have to work your way up, you are the leading of a small village and need to create builds with basic units and slowly upgrade your buildings and solders increase the size of your village.
To do all this you will need resources such as gold, this can be acquired by raiding other villages or mining it, as mentioned before there is the sages where you can raid and thus you can get raided. This is why you will need to join a group of people known as a clan. They can offer support in fights and raids and also resources.
The communication needed in the clan is a test of your online digital skill. This tests if you can come to a common goal as a team and out play your opponents with complicated strategies. The risk of not joining clan is that you may work extremely hard on gathering your resources and troops together and someone that is much stronger and more advanced than you could come and battle your village and win, thus bring down your resources and setting you back quite a bit.
There are many ways to defend your village, from the lay out of your base to the buildings you choose to build, this could help you predicted what your enemy will attack and what they will sue to do so, with this knowledge you can decide on what troops to build or what defenses to upgrade, for example if you think your opponent with dragons you will need to have a good air defense set up.
The disadvantages of being in a clan is that there is a lot of pressure to compete in the clan wars and this could cause people to take this game a bit too seriously, and if one does not take part in the clan war the other members of the clan could start to single this one person out making them a target for cyber bullying.
This can educate the younger generation on digital citizenship due to its time consumption and communication needed, any user of this game will need to manage their time well and understand that there is a time to be on your phone and a time that it will be inappropriate. Also will introduce people who are new to the internet on how to handle themselves online with other people, not to take offense or attack others.
Outside of direct web and online support for the primary academic mission of the university, digital communication and collaboration can be critical to indirectly supporting the NYU community's intellectual growth. Two groups strive to deliver high-quality solutions and guidance for Web Services, Mobile and Social Media: the Office of Web Communications (WebComm) and Information Technology Services' eServices Group (ITS).
Acting as one unit to serve the university's non-academic needs, these two groups have formed the Digital Communications Group (DigiComm) to collaborate with university offices and provide tools to develop and maintain digital outlets while ensuring that the university’s visual identity standards and best practices are met.
If you are looking to update, refresh or redesign your web presence, need help using the Content Management System, or want to send a customized HTML E-mail, DigiComm can help. New York University (2015)
Project
Services
New York University (2015), The Internet is constantly changing, so planning for your office's future is important and effective. If you're looking to establish new features or functionality, the Digital Communications Group (DigiComm - made up of the Office of Web Communications and Information Technology Services) is a useful resource.DigiComm offers a full suite of design, development, and strategic communication services to University administrative offices and Academic departments. Expert advice and execution in architecture, design and programming will ensure your site incorporates the latest technologies and is compatible with the university's principal IT systems and security standards.
References
New York University(2015) Digital communication. [online] available at: http://www.nyu.edu/employees/resources-and-services/media-and-communications/digital-communications.html. [Accessed on 23 June 2015]
Wednesday, 17 June 2015
Digital Rights and Responsibilities
Digital Rights and Responsibilities
There are rights that granted to digital citizens, these rights have complementary responsibilities that work with them hand in hand in order to archive and maintain the user friendliness of digital citizenship to all.
The rights and responsibilities are as follows:
Right
|
Responsibility
|
Freedom to use any social platform or digital technology as you please.
|
To be appropriate and act accordingly.
|
The right to privacy.
|
To give others their privacy and violate someone else’s privacy
|
Right to our identity
|
Not to create false identities
|
Take credit for our own work
|
Not to plagiarize
|
Freedom to express yourself
|
Not to bully others
|
To use someone else’s work
|
Give credit to them
|
I used this particular site because it had been used before as well as it seemed very helpful and reliable.
Reference
Anon, nd. Digital Rights and Responsibilities. Available at [online]: http://https://sites.google.com/site/digitalcitizenshipdferris/digital-rights-and-responsibilities. Accessed 19 May 2015
Subscribe to:
Posts (Atom)