Friday, 4 November 2016

question 1.1 and 1.2

Question 1

the role to social capital, knowledge capital and human capital

Social capital is about the value of social networks, bonding similar people and bridging between diverse people, with norms of reciprocity (Dekker and Uslaner 2001 ; Uslaner 2001[12). Sander (2002, p. 213] stated that ‘the folk wisdom that more people get their jobs from whom they know, rather than what they know, turns out to be true’. Adler and Kwon (2002) identified that the core intuition guiding social capital research is that the goodwill that others have toward us is a valuable resource. As such they define social capital as ‘the goodwill available to individuals or groups. Its source lies in the structure and content of the actor’s social relations. Its effects flow from the information, influence, and solidarity it makes available to the actor’ (Adler and Kwon 2002, p. 23) . Dekker and Uslaner (2001)[ posited that social capital is fundamentally about how people interact with each other.























Q.1.2 WHAT IS THE TECHNO-ECONOMIC PARADIGM AND HOW CAN ONE DEVELOP FROM THIS

Q.1.2.


According to Sean,2014) Techno-economic paradigm shifts are at the core of general, innovation-based theory of economic and societal development as conceived by Carlota Perez. Her book on the subject, ‘Technological Revolutions and Financial Capital’, is a seminal enunciation of the theory, and has had immense influence on business strategy, state development programs and policy, and academic thinking on the subject.
‘Techno-Economic Paradigms’ presents a series of essays by the leading academics in the field discussing the theory of techno-economic paradigm shifts, and its role in explaining processes of innovation and development. This festschrift honors Carlota Perez, the founder of the theory 'techno-economic paradigm shift

question 3 Digital Communication and fluencies

Digital Communication and fluencies


The social economy: Unlocking value through social technologies
The benefits and risks of social technologies are determined by how it is used, for what, how will it help and by who uses it. The means of social technology to everyone in the world is to help them at whatever they want or seek to find out, technology is not a bad thing although people uses it for malicious attempts. There benefits and risks of social technologies for individuals, corporate and communities can differ because of the consumption.
For individuals:
Risks:
⦁ People’s privacy get invaded.
⦁ Cyber-bullying.
Benefits:
Individuals are able to communicate with their family and friends. Social technology allows individuals to gain access to the latest news as well as the access to create opportunity for themselves, and also be able use it to create an online profile which can promote their personal trait and likes.
⦁ Individuals gain the access to information, internet allows individuals to get any information they want very easy and quick through the use of gadgets. Mostly South Africans uses the News 24 to get the latest news that is buzzing around the country.
⦁ Improved communication, mostly South Africans uses Skype to video chat with the family or friends out of the country.
⦁ Convenience in education, it is discovered that South Africans recently have been using technology to enhance their education through the use of online education, e.g. in 2015 the department of education introduced the e-learning for Grade 12 learners with the aim to better the education system in South Africa.
For corporate:
Risks:
⦁ Corporate are/ can be easily criticized by the people’s opinion online (internet) which can lead to bad publicity.
⦁ The corporate information can be hacked and be leaked to the public which can lead to a decrease of customers, suppliers and investors.
Benefits:
Corporates that uses technology have a competitive advantage over their competitors. Corporates have faced changes through the use of social technology which had a fundamental change on the business sales, customer services, staff recruitment, internal communications and public relations. These changes made entrepreneurs to create successful business on their own terms.
⦁ Brand health, measures attitudes, conversation topics and emotion around the brand. Social technology is used to identify risks or opportunities related to the brand, new product launches, product and service issues, executive changes or macroeconomic changes.
⦁ Marketing optimization, using social technology can make the most of marketing strategies, advertising tactics and budgets to be more efficient.
⦁ Generates revenue, using social technologies can make business to better understand their customers and customers attitudes and behaviors throughout the buying cycle and also to the extent where they generate better profit.
⦁ Operational efficiency, using social technology can reduce risk and operating expense while engaging and retaining employees. This can monitor employee risk and to find more cost-efficiency ways of performing business functions.
⦁ Customer experience, by the means of using social technology can improve the relationships with customers across the country.
⦁ Innovation, by the means of using social technology business can uncover their products and services risks, as well as making an increment and finding new opportunities.
For communities:
Risks:
⦁ Social technology can make communities to be easily influenced negatively on the use and also make people to engage at illegal attempts such as; hacking other people, making piracy stuff, and attempt phishing.
Benefits:
Social technology can help communities to discuss matters that need to be solved, they can talk about certain problems that are impacting them to raise the awareness and also to collaborate as a society to bring about solutions to those problems and addressing to the public in order to be solved.
Conclusion
Through the significant applying of the digital communication and the fluencies, individuals, corporates and communities will have a safe use of the internet and which will increase the number of South Africans who can trust and use the internet in a safer way which will result in an efficient and appropriate communication among themselves.

Digital Law question 6

Digital Law

This Webpage provides information on current issues related to digital law. The Webpage gives an overview of what digital law is, types of violations and their consequences, and resources for teachers to teach digital law. 

Digital law can be defined as the legal rights and restrictions governing technology use. In today's world, many people are not responsible digital citizens. They are criminals, breaking the law, either knowing or not knowing, what is appropriate or inappropriate technology use. For example, many people think that it is okay to download music without paying for it. This is illegal though and there can be serious consequences if caught. You can pay a hefty fine or even go to jail. Other violations include illegal file sharing sites, pirating software, creating viruses, hacking into systems or networks, stealing someone identity, and copyright infringement. In order to create a functioning 21st century global society with responsible digital citizens, students need to be taught and informed of these violations.

Digital Rights and Responsibilities question 5

Introduction to Digital Rights and Responsibilities



        From the first day of the school year, students are instructed to follow the classroom and school rules. Students learn the expectations of responsible behavior in the classroom, the hallway, the bathroom, the cafeteria, the playground, the bus and so forth. Teachers help the students learn the rules through role play, assemblies, and class discussions. Positive behavior support rewards those students acting as responsible students throughout the school day. At home, parents establish rules and expectations for student behavior. Just as it is important to establish these rules and expectations for the school and the home, it is imperative that parents and educators establish similar rules and expectations for responsible behavior in the digital world. Students need guidelines and boundaries and are often successful when they know and understand the expectations. Educators and parents must model appropriate use of technology at home and at school. They must teach students about responsible use of technology. Through effective modeling and teaching, the students can successfully and safely participate in today's digital society.
        As stated within the NETs standard for digital citizenship, students are expected to "advocate and practice safe, legal and responsible use of information and technology" (International Society for Technology in Education, 2007). Digital rights and responsibilities address this component of the standard. Parents and educators need to work together, use available resources, and create opportunities for our students that promote safe, legal and responsible use of technology. As students participate in the digital world, they have to learn about internet safety, the best practices when using information online and the responsibilities that accompany technology use. With access to so many different websites, it is very easy to misuse technology. By teaching our students the best practices for technology use and the consequences for misuse, we can prepare them to make informed decisions as they collaborate, communicate and participate in the digital world.

question 4 Digital Etiquette

Introduction to Digital Etiquette


        The basic idea behind the topic of digital etiquette is "treat others how you want to be treated." From an early age, students are taught this golden rule. Whether at home, at the movies, at a grocery store or in school, students learn that there are appropriate and inappropriate ways to behave and treat one another. With the overwhelming emerging technology and its involvement in our daily lives, it is fundamental that students transfer that understanding of appropriate behavior into the digital world. Students need to know that their choices, their words and their actions in the digital world can truly have an impact on others. In addition, poor choices can lead to consequences and/or loss of certain privileges. Educators and parents must be role models for our students and discuss these issues with them. The students will be more successful if parents and educators are proactive in engaging in discussions and lessons so that students understand the rules of digital etiquette.
        Considering the needs of current students, it is important to recognize that parents and educators alike were not instructed on how to behave in the digital world because those opportunities were not yet available. Without the experience of these technologies and online resources, many parents and educators often do not realize the important rules children need to learn prior to participating in our digital world. Digital etiquette provides an insight for parents, educators and students as it addresses the appropriate conduct, the best practices for technology use and the consequences for misuse of technology resources. To become informed digital citizens, parents and educators must learn about this topic and the issues involved in order to address the topic with our students. It is a continuous learning process and as new technologies emerge, there is a potential for new issues to arise. By being informed and prepared for the digital world, students will be able to act responsibly, make appropriate choices, and enjoy the many benefits that accompany technology use.

(POE) Question 7 :Digital Security

Digital Security


Critically discuss  about how users, enabled hackers to obtain these details more easily by providing known companies with our data.

Ransomeware
Using storage solutions that require subscription like Google Drive and One Drive increase the chances of hackers to find a gap and use ransomeware to access and destroy data.
They can be avoided by installing and updating anti-virus software's and using windows defender such as McAfee.

The Internet of Things
Users make use of these physical objects to connect and share data with other individuals. Such as devices,vehicles and buildings with software's and applications, hackers make use of physical objects to hack devices and other physical objects.

Cyber-espionage
Making use of computer to access internet network connection and illegally access confidential information held by government or organisation.

Cyber theft increases
Users provide their personal information details and usually hackers make use of that personal information to gain access to another important information. The stealing of personal information and financial information on the internet.

Insecure Passwords
Users set up weak passwords and they do not make use of upper and lower case and numbers to set up strong passwords, this also allow hackers to easily crack weak passwords.

Overview how they can be avoided or mitigated.

They can avoid these risks first by installing anti-virus software's and update them weekly, they could also avoid these risks by securing their network connection, personal information  and making use of strong passwords