Friday, 4 November 2016

question 1.1 and 1.2

Question 1

the role to social capital, knowledge capital and human capital

Social capital is about the value of social networks, bonding similar people and bridging between diverse people, with norms of reciprocity (Dekker and Uslaner 2001 ; Uslaner 2001[12). Sander (2002, p. 213] stated that ‘the folk wisdom that more people get their jobs from whom they know, rather than what they know, turns out to be true’. Adler and Kwon (2002) identified that the core intuition guiding social capital research is that the goodwill that others have toward us is a valuable resource. As such they define social capital as ‘the goodwill available to individuals or groups. Its source lies in the structure and content of the actor’s social relations. Its effects flow from the information, influence, and solidarity it makes available to the actor’ (Adler and Kwon 2002, p. 23) . Dekker and Uslaner (2001)[ posited that social capital is fundamentally about how people interact with each other.























Q.1.2 WHAT IS THE TECHNO-ECONOMIC PARADIGM AND HOW CAN ONE DEVELOP FROM THIS

Q.1.2.


According to Sean,2014) Techno-economic paradigm shifts are at the core of general, innovation-based theory of economic and societal development as conceived by Carlota Perez. Her book on the subject, ‘Technological Revolutions and Financial Capital’, is a seminal enunciation of the theory, and has had immense influence on business strategy, state development programs and policy, and academic thinking on the subject.
‘Techno-Economic Paradigms’ presents a series of essays by the leading academics in the field discussing the theory of techno-economic paradigm shifts, and its role in explaining processes of innovation and development. This festschrift honors Carlota Perez, the founder of the theory 'techno-economic paradigm shift

question 3 Digital Communication and fluencies

Digital Communication and fluencies


The social economy: Unlocking value through social technologies
The benefits and risks of social technologies are determined by how it is used, for what, how will it help and by who uses it. The means of social technology to everyone in the world is to help them at whatever they want or seek to find out, technology is not a bad thing although people uses it for malicious attempts. There benefits and risks of social technologies for individuals, corporate and communities can differ because of the consumption.
For individuals:
Risks:
⦁ People’s privacy get invaded.
⦁ Cyber-bullying.
Benefits:
Individuals are able to communicate with their family and friends. Social technology allows individuals to gain access to the latest news as well as the access to create opportunity for themselves, and also be able use it to create an online profile which can promote their personal trait and likes.
⦁ Individuals gain the access to information, internet allows individuals to get any information they want very easy and quick through the use of gadgets. Mostly South Africans uses the News 24 to get the latest news that is buzzing around the country.
⦁ Improved communication, mostly South Africans uses Skype to video chat with the family or friends out of the country.
⦁ Convenience in education, it is discovered that South Africans recently have been using technology to enhance their education through the use of online education, e.g. in 2015 the department of education introduced the e-learning for Grade 12 learners with the aim to better the education system in South Africa.
For corporate:
Risks:
⦁ Corporate are/ can be easily criticized by the people’s opinion online (internet) which can lead to bad publicity.
⦁ The corporate information can be hacked and be leaked to the public which can lead to a decrease of customers, suppliers and investors.
Benefits:
Corporates that uses technology have a competitive advantage over their competitors. Corporates have faced changes through the use of social technology which had a fundamental change on the business sales, customer services, staff recruitment, internal communications and public relations. These changes made entrepreneurs to create successful business on their own terms.
⦁ Brand health, measures attitudes, conversation topics and emotion around the brand. Social technology is used to identify risks or opportunities related to the brand, new product launches, product and service issues, executive changes or macroeconomic changes.
⦁ Marketing optimization, using social technology can make the most of marketing strategies, advertising tactics and budgets to be more efficient.
⦁ Generates revenue, using social technologies can make business to better understand their customers and customers attitudes and behaviors throughout the buying cycle and also to the extent where they generate better profit.
⦁ Operational efficiency, using social technology can reduce risk and operating expense while engaging and retaining employees. This can monitor employee risk and to find more cost-efficiency ways of performing business functions.
⦁ Customer experience, by the means of using social technology can improve the relationships with customers across the country.
⦁ Innovation, by the means of using social technology business can uncover their products and services risks, as well as making an increment and finding new opportunities.
For communities:
Risks:
⦁ Social technology can make communities to be easily influenced negatively on the use and also make people to engage at illegal attempts such as; hacking other people, making piracy stuff, and attempt phishing.
Benefits:
Social technology can help communities to discuss matters that need to be solved, they can talk about certain problems that are impacting them to raise the awareness and also to collaborate as a society to bring about solutions to those problems and addressing to the public in order to be solved.
Conclusion
Through the significant applying of the digital communication and the fluencies, individuals, corporates and communities will have a safe use of the internet and which will increase the number of South Africans who can trust and use the internet in a safer way which will result in an efficient and appropriate communication among themselves.

Digital Law question 6

Digital Law

This Webpage provides information on current issues related to digital law. The Webpage gives an overview of what digital law is, types of violations and their consequences, and resources for teachers to teach digital law. 

Digital law can be defined as the legal rights and restrictions governing technology use. In today's world, many people are not responsible digital citizens. They are criminals, breaking the law, either knowing or not knowing, what is appropriate or inappropriate technology use. For example, many people think that it is okay to download music without paying for it. This is illegal though and there can be serious consequences if caught. You can pay a hefty fine or even go to jail. Other violations include illegal file sharing sites, pirating software, creating viruses, hacking into systems or networks, stealing someone identity, and copyright infringement. In order to create a functioning 21st century global society with responsible digital citizens, students need to be taught and informed of these violations.

Digital Rights and Responsibilities question 5

Introduction to Digital Rights and Responsibilities



        From the first day of the school year, students are instructed to follow the classroom and school rules. Students learn the expectations of responsible behavior in the classroom, the hallway, the bathroom, the cafeteria, the playground, the bus and so forth. Teachers help the students learn the rules through role play, assemblies, and class discussions. Positive behavior support rewards those students acting as responsible students throughout the school day. At home, parents establish rules and expectations for student behavior. Just as it is important to establish these rules and expectations for the school and the home, it is imperative that parents and educators establish similar rules and expectations for responsible behavior in the digital world. Students need guidelines and boundaries and are often successful when they know and understand the expectations. Educators and parents must model appropriate use of technology at home and at school. They must teach students about responsible use of technology. Through effective modeling and teaching, the students can successfully and safely participate in today's digital society.
        As stated within the NETs standard for digital citizenship, students are expected to "advocate and practice safe, legal and responsible use of information and technology" (International Society for Technology in Education, 2007). Digital rights and responsibilities address this component of the standard. Parents and educators need to work together, use available resources, and create opportunities for our students that promote safe, legal and responsible use of technology. As students participate in the digital world, they have to learn about internet safety, the best practices when using information online and the responsibilities that accompany technology use. With access to so many different websites, it is very easy to misuse technology. By teaching our students the best practices for technology use and the consequences for misuse, we can prepare them to make informed decisions as they collaborate, communicate and participate in the digital world.

question 4 Digital Etiquette

Introduction to Digital Etiquette


        The basic idea behind the topic of digital etiquette is "treat others how you want to be treated." From an early age, students are taught this golden rule. Whether at home, at the movies, at a grocery store or in school, students learn that there are appropriate and inappropriate ways to behave and treat one another. With the overwhelming emerging technology and its involvement in our daily lives, it is fundamental that students transfer that understanding of appropriate behavior into the digital world. Students need to know that their choices, their words and their actions in the digital world can truly have an impact on others. In addition, poor choices can lead to consequences and/or loss of certain privileges. Educators and parents must be role models for our students and discuss these issues with them. The students will be more successful if parents and educators are proactive in engaging in discussions and lessons so that students understand the rules of digital etiquette.
        Considering the needs of current students, it is important to recognize that parents and educators alike were not instructed on how to behave in the digital world because those opportunities were not yet available. Without the experience of these technologies and online resources, many parents and educators often do not realize the important rules children need to learn prior to participating in our digital world. Digital etiquette provides an insight for parents, educators and students as it addresses the appropriate conduct, the best practices for technology use and the consequences for misuse of technology resources. To become informed digital citizens, parents and educators must learn about this topic and the issues involved in order to address the topic with our students. It is a continuous learning process and as new technologies emerge, there is a potential for new issues to arise. By being informed and prepared for the digital world, students will be able to act responsibly, make appropriate choices, and enjoy the many benefits that accompany technology use.

(POE) Question 7 :Digital Security

Digital Security


Critically discuss  about how users, enabled hackers to obtain these details more easily by providing known companies with our data.

Ransomeware
Using storage solutions that require subscription like Google Drive and One Drive increase the chances of hackers to find a gap and use ransomeware to access and destroy data.
They can be avoided by installing and updating anti-virus software's and using windows defender such as McAfee.

The Internet of Things
Users make use of these physical objects to connect and share data with other individuals. Such as devices,vehicles and buildings with software's and applications, hackers make use of physical objects to hack devices and other physical objects.

Cyber-espionage
Making use of computer to access internet network connection and illegally access confidential information held by government or organisation.

Cyber theft increases
Users provide their personal information details and usually hackers make use of that personal information to gain access to another important information. The stealing of personal information and financial information on the internet.

Insecure Passwords
Users set up weak passwords and they do not make use of upper and lower case and numbers to set up strong passwords, this also allow hackers to easily crack weak passwords.

Overview how they can be avoided or mitigated.

They can avoid these risks first by installing anti-virus software's and update them weekly, they could also avoid these risks by securing their network connection, personal information  and making use of strong passwords

Question 6 The potential impacts of Digital.

The potential impacts of Digital Technology on Society



question 3.1

question 3.1


Risks and benefits of social technologies
Benefits for individuals, corporate and communities.

  1. Individuals and communities can connect with others.
  2. Individuals and communities can communicate effectively.
  3. Individuals and communities can share information.
  4. Individuals and communities can access internet any-time and anywhere.
  5. Corporates can connect with their customers and share information.
  6. Corporates can connect with their employees and communicate effectively.
  7. Corporates can increase their level of advertising and popularity of the business.
  8. Corporates can sell their products and services on-line and attract new customers.



Risks for individuals,corporate and communities.



  1. Giving out your details could be a huge risks.
  2. People could use your personal information to commit crime and fraud.
  3. Connecting and communicating with people you don't know could be risky and dangerous.
  4. Protecting yourself, passwords and usernames.
  5. Management tools must be out in place to reduce the risks.
  6. Security tools must be put in place passwords and encryption of important data and information to avoid risks.
Reference
 Skinner (2014)(Risks and benefits of social technologies), Retrieved
Q.1.2 What is the techno-economic paradigm and how can one develop from this?


techno-economic paradigm describe the change of technology.
techno-economic paradigm it analyse the structure of technology and the role in improving the economy through the application of accompanying.

One can develop from this by making use of the application of accompanying techno-economic paradigm.

Saturday, 17 September 2016

QUESTION 2.7 PRESNTATION

<iframe src="https://docs.google.com/presentation/d/1Gj_TfTbe8K0Fqqel6WZWSMTDW-0aNQN4l5ym65zH1TY/embed?start=true&loop=false&delayms=3000" frameborder="0" width="480" height="389" allowfullscreen="true" mozallowfullscreen="true" webkitallowfullscreen="true"></iframe>

Friday, 16 September 2016

The Internet of things Question 3.1

is the internetworking of physical devices, vehicles, buildings and other items—embarked with elecoronics, softwear, sensors, actuators, and network connectivity  that enable these objects to collect and exchange data.

As well as the expansion of Internet-connected automation into a plethora of new application areas, IoT is also expected to generate large amounts of data from diverse locations, with the consequent necessity for quick aggregation of the data, and an increase in the need to index, store, and process such data more effectively

question 5.2 United Nations’ Human Rights

  • It must be in writing and has to be submitted in one of the six UN official languages ( english, FRensh, Russin and spanis
  • It must contain a description of the relevant facts (including names of alleged victims, dates, location and other evidence), with as much detail as possible, and shall not exceed 15 pages;
  • It must not be manifestly politically motivated;
  • It must not be exclusively based on reports disseminated by mass media;
  • It is not being already dealt with by a special procedure, a treaty body or other United Nations or similar regional complaints procedure in the field of human rights;
  • Domestic remedies have been exhausted, unless it appears that such remedies would be ineffective or unreasonably prolonged;
  • It must not use a language that is abusive or insulting;
  • The complaint procedure is not mandated to seek remedies in individual cases or to provide compensation to alleged victims 

question 3.2 aspects of intelligence

.2 •Philological Intelligence: This contains words and language. People with this type of intelligence often look to work as lawyers, writers, journalists and TV and Radio presenters.

There can’t be enough technology in the world that can take a place of one of these positions, because it involves creativity and involved decision making. There is a thought process

that goes into this form of work that a machine cannot simply do.

•Logical intelligence:  This intelligence group consists of logical thinkers, they detect configurations, analyze problems and preform mathematical calculations. They like dealing with

numbers and logic. These people take occupations such as engineers, computer experts, cost accountant, geometricians, analysts, traders and bankers. Many of these positions are

starting to or already been taken over by machines or technology.

•Musical intelligence: This chains people with a musical ability. They can recognize tones and rhythmic patterns and they recognize the relationship between sound and feeling.

Frequently these type of people become musicians, singers, composers, and DJ’s and music producers. There are forms of technology that can already do the work of these individuals.

•Interpersonal Intelligence:  People who possess Interpersonal Intelligence are aware of other people’s feelings.  They have the skill to relate to others or interpret their behavior or

communications and can understand the relationship between people and their situations. These people mostly become therapists, HR professionals, clergy, psychologists, teachers

and doctors.  There are no machines that can do this sort of work and they do not possess emotions and evaluate situations as a human would.

Question 2.2 Rape capital of the world

Rape-The cold hard farts.

south Africa has being named the "rape capital" of the world by the Interpol that shows full right of irrefutable problem in South Africa.

although not taking any significance away from other corruptions, rape is a very grave criminal movement, so far many rapist are getting the minimum sentence for rape, and many are

getting away with it. The main reason for abridged sentences not only with rape but with many other charges, is because of the over-crowed jails in South Africa, correctional services

create a high prisoner turn over because the number of external prisoners are too much higher than the internal.

There are many keys to solve this problem that South Africa is fronting, many of the keys are controlled or yet limited to the resources and budget funding. A very good key would be to

create more jail space, build more prisons to accommodate more jailbirds. Yet South Africa does not have the resources for that key.

Next key to follow is to make prison life harder than it is presently, by different factors. Or make the punishment exacting the jail time longer and incorporate community service and

penalties into the punishment. This is a physical and emotional straining on a person and that could be a preventive to a rapist if he feared the concerns.

Wednesday, 7 September 2016

post 1
what is digital citizenship ?
Digital Citizenship is a concept which helps teachers, technology leaders and parents to understand what students/children/technology users should know to use technology appropriately. Digital Citizenship is more than just a teaching tool; it is a way to prepare students/technology users for a society full of technology
9 elements of digital citizenship ?
digital access
 person of all ages, in all places, all levels of ability -physical and economic

digital commerce  
there can be a problem with technology and identify theft
improper use of credit card
secure site

digital communication
instant massaging
emails
blogs
Facebook and all social media

digital literacy
the ability to use digital technology and knowing and how to use it

digital etiquette
the standards conduct expected by other digital technology users

digital law
the legal rights and restriction governing technology uses

digital rights and responsibility
the privilege and freedoms extended to all digital technology users and the behaves  expatiations that comes with them

digital health and wellness
the elements of physical and psychological well-being related to digital technology uses

digital security
they must take extra care of their personal safety and security of there network .,always use virus protection and must always be up-to-date




reference
from google 2016/09/07