Thursday 12 November 2015

Additional Resources

Digital Citizenship and Digital Access
Chen, W. (2013) [Internet] Slideshare Presentation: The Social Capital Effects: Resources, Tie Strength, and Digital Divides. Available from: http://www.slideshare.net/wenhong/c1-social-capital-effectct-asa2 [Accessed 12 Nov 2015]

“Data” Math is fun, n.d. [Internet] Available from: http://www.mathsisfun.com/data/data.html [Accessed 12 Nov 2015]

Digital Literacy and Information Fluency
Packet switches. [Image] Wikibooks. (n.d.) Available from: http://en.wikibooks.org/wiki/A-level_Computing/AQA/Computer_Components,_The_Stored_Program_Concept_and_the_Internet/Structure_of_the_Internet/Packet_switching#mediaviewer/File:CPT-Internet-packetswitching.svg [Accessed 12 Nov 2015]

Digital Communication
Anon (a), (2013). MIT Technology in Review. [Internet] 2013: The Year of the Internet of Things. Available from: http://www.technologyreview.com/view/509546/2013-the-year-of-the-internet-of-things/ [Accessed 12 Nov 2015]

Digital etiquette
Melin, E. (Mar, 2013). [Internet] 11 Examples of Bad Digital Etiquette. Available from: http://www.spiral16.com/blog/2013/03/11-examples-of-bad-digital-etiquette/ [Accessed 12 Nov, 2015]

Digital Rights and Responsibilities
News24. (11 Sep, 2013) Bristow-Bovey ‘pleads guilty’. [Internet] Available from: http://www.news24.com/World/News/Bristow-Bovey-pleads-guilty-20030911 [Accessed 12 Nov 2015]

Digital Security
Lee, A. (08 Aug, 2011) Huffington Post. Why Does Sony Keep Getting Hacked. [Internet] Available from: http://www.huffingtonpost.com/2011/06/08/sony-hack-problems_n_873443.html [Accessed 12 Nov 2015]

Digital Health and Wellbeing
Net Addiction: Centre for Internet Addiction. (n.d.) FAQ. [Internet] Available from: http://netaddiction.com/faqs/ [Accessed 12 Nov, 2014]

Digital Commerce

Digiteen Wiki. (n.d.) Digital Commerce. [Internet] Available from: https://digiteen.wikispaces.com/Digital+Commerce [Accessed 12 Nov, 2015]

Digital Communication




https://www.google.co.za/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&ved=0CAUQjhxqFQoTCIP7oOKyiMkCFUc7GgodNiYBhw&url=http%3A%2F%2Fclashofclans.com%2F&psig=AFQjCNHpEcAJke6UEyj5Nz8g3oiG7ztzLg&ust=1447332193086555


Clash of clans is an online multiplayer games in which players build a community, train troops, and Dark Elixir, which can be used to build defenses that protect the player from other players’ attacks, and train and upgrade troops.  The game also features a pseudo-single player campaign in which the player must attack a series of fortified goblin village. Johnson, Leif (Aug, 7, 2012)


Strategies: there are two phases in a clan war, the preparation day and the battle day.  Each participant can attack twice during the battle day.  At the end of the war the clan that earns the most stars from attacking wins the clan war.

Logistics: to join a clan and gain trophies.  The game score function is to be a multiplayer game however you can play it in single player mode if you choose. Every clan member who makes successful attacks during a clan war will earn some bonus loot, but only the winning clan will receive a large loot bonus.

The game was not interesting for me; hence I don’t like playing online games. I kept on getting raided and could not get more money and stars to advance my objet. Although there were helpful 
strategies, I struggled to advance.

Collaborative process:
Establish: I needed to make sure that my village was up to speed before an attack. I needed to make sure that I was always connected to the Internet hence the game is played online.
Envision: no issues occurred and the roles were clearly defined.
Engineer: I created a plan on how I was going to monitor the attack of the other team.
Execute: I was able to build a strong army, build and upgrade infrastructure.
Examine: I managed to gather information for my Poe on digital communication.
(Digital Citizenship student manuel,2015, page 52 and 53)

This was inappropriate behavior and communication.
The only communication clash of clans’ uses is global chat function, allowing users to chat to those who form part of the clan.  There are instances where some players used bad language and threats due to the army defeating theirs.  People would end up having normal conversations not even about the game.

This game is not educational for children when it comes to digital citizenship. The language that was used online by other players was not child friendly; hence children of today should not be exposed to that at all. The only way a child could apply digital citizenship is with their parents’ supervision, to teach the child what is right and wrong digital practice e.g. ignoring strangers to contact you, knowing when to report someone etc.




https://www.google.co.za/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&ved=0CAUQjhxqFQoTCMC70_KyiMkCFYe2Ggod3fwGjw&url=https%3A%2F%2Fplay.google.com%2Fstore%2Fapps%2Fdetails%3Fid%3Dcom.supercell.clashofclans&psig=AFQjCNHpEcAJke6UEyj5Nz8g3oiG7ztzLg&ust=1447332193086555






https://www.google.co.za/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&ved=0CAUQjhxqFQoTCJ-2o5iziMkCFUVcGgod6hgFiQ&url=http%3A%2F%2Ffotoaa.xyz%2Fclash-of-clans%2F&psig=AFQjCNHpEcAJke6UEyj5Nz8g3oiG7ztzLg&ust=1447332193086555


Monday 9 November 2015

Digital Security



https://www.google.co.za/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&ved=0CAUQjhxqFQoTCMWx_s60iMkCFcruGgodkqkKow&url=http%3A%2F%2Fwww.extremetech.com%2Finternet%2F214873-get-ready-for-organized-cybercrime&psig=AFQjCNFUismzqKhu5y311lvot3ko1pxgaQ&ust=1447332689876165

Issues surrounding security


Devices and Networks
Our computers, laptops, tablets and smart phones are at risk from malicious software, also known as malware.

Digital fraud and crime
Includes crimes such as scams, child pornography, identity theft, social media re-engineering, cyber bullying, and cyber stalking and cyber harassment.


Terms and conditions
Not reading the small print can mean big problems.
 Rebecca Smithers, consumer affairs correspondent Wednesday May 11, 2011 07.00 BST
The research, commissioned by investment specialist Skandia, exposes how easy it is for people booking and paying for goods and services online to click the terms and conditions box without actually reading them in full.  She said online shoppers may be tempted to tick the box to confirm they have read the terms and conditions when they have not actually done so, but added: “

They are different on every website, so make sure you know what you’re agreeing to.  People are often surprised to find out they’re obliged to pay to return unwanted items purchased online, as it is commonly stated in the terms and conditions and these fees can be expensive.


Cyber crime
When any crime is committed over the Internet it is referred to as a cyber crime.

Types of cyber crimes and their how can they be avoided

Identity Theft: when a person purports to be some other person, with a view to creating a fraud for financial gains.  It can be data breaches of private websites too, that contain important information such as – credit card information, address, email ID’s, etc.
How to prevent identity theft
-shop online only on trusted websites.
-do not directly reply with your resume to online job offers via emails- even if the job website is reputed.
-balance your credit card standards every month to see if any item exists that you cannot relate to.
-check out your credit reports once a year to see if there are any loans that you did not take.

Ransomware: enters your computer network and encrypts your files using public-key encryption, and unlike other malware this encryption key remains on the hacker’s server. Attacked users are then asked to pay huge ransoms to receive this private key.
How to prevent Ransomware
Update OS and security software
Back up your data
Never click on unknown links or download attachments from unknown sources.

DDos attacks: are used to make an online service unavailable and bring it down, by bombarding or overwhelming it with traffic from multiple locations and sources.  The idea is normally to draw attention to the DDOS attack, and allow the hacker to hack into a system.
How to prevent DDos
You must clog your server bandwidth with fake request from botnets. Buying a little more bandwidth will reduce or even prevent DDoS attacks but it can be a costly method.

Malvertising: is a method whereby users download malicious code by simply clicking at some advertisement on any website that is affected.  The cyber criminals show how clean ads for a period of time and then replace it with malverts so that the websites and advertisements do not suspect.
How to prevent malvertising
 Precaution is the only way to avoid malvertising and remember to keep your operating system and your installed software, including browser plugins, always updated
.
Remote Administration Tools: are used to carry out illegal activities.  It can be used to control the computer using shell commands, steal files/data, and send location of the computer to a remote controlling device and more.
How to prevent remote administration tools
-use a strong user login password
-be careful while opening emails from unknown senders and especially while clicking on attachments.
-you will need good anti-malware software to detect and isolate the Trojan before it can install any kind of script on your computer.















Reference Page

Digital divide [online] Available from: http://www.internetworldstats.com/links10.htm [Accessed on 6 Nov 2015]
Definition “social capital” [online] Available from: http://www.betertogether.org/socialcapital.htm [Accessed 6 Nov 2015]

Animal Planet mermaids 2012 [online] Available from: https:en.m.wikipedia.org/wiki/mermaids: The _Body_ Found [Accessed 6 Nov 2015]
Digital footprints [online] Available from: https://en.m.wikipedia.org/wiki/Digital-footprint [Accessed 6 Nov 2015]

Clash of Clans game [online] Available from: https://en.m.wikipedia.org/wiki/Clash_of_clans [Accessed 12 Nov 2015]

10 Points of netiquette [online] Available from: http://15009701.weebly.com/the-chronicles-of-a-digital-citizen/10-points [Accessed 7 Nov 2015]

Bandwidth on a blog[online] Available from: (http://jimmakos.com/2012/02/how-much-bandwidth-does-your-blog-use/)[Accessed 12 Nov 2015]

Types of cybercrimes [online] Available from: http://www.thewindoesclub.com/types-cybercrime [Accessed 9 Nov 2015]

Top 10 tips for buying an online auction [online] Available from:http://www.telegraph.co.uk/sponsored/culture/barnebys-auctions/10344379/online-auction-tips.html[Accessed 8 Nov 2015]

Guidelines to avoid plagiarism [online] Available from: http://www.psych.uncc.edu/pagoolka/plagiars.html[Accessed 8 Nov 2015]

History of ecommerce [online] Available from:  http://www.miva.com/blog/the-history-of-ecommerce -how-did-it-all-begin? [Accessed 7Nov 2015]











Digital Commerce (Online Auctions and Tips)


Online Auctions and Tips

http://online-auction-sites.toptenreviews.com/

Top 10 tips for buying at an online auction

By Bridget Galton 12:39PM BST 02 Oct 2013

1. The estimate is just an indication
The estimate is just, merely an indication of what the piece is worth.

2. Do your research
Get as much information about the item before you start, read the in formation carefully in advance and don’t be afraid to email the auction house in advance for more photos or information.

3. Choose your limit
You can get emotionally caught up in the thrill of the moment and continue bidding beyond what you can afford.

4. Look out for extra charges
Check additional charges before you did.  Auction houses usually charge 15-25 per cent commission on top of the hammer price and some online bidding platforms charge 3-5 per cent to use them.

5. It is a contract to buy
when the auctioneer bangs the gavel down at the end of bidding,it establishes the hammer price and it is a contract to buy.

6. Place an absentee bid
this authorizes the auction house to bid on your behalf to secure the lot at the lowest possible price.

7. keep an eye on the deadline
you receive email alerts as other bidders top your price.





Digital Commerce (History of ecommerce)


https://www.google.co.za/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&ved=0CAUQjhxqFQoTCNKz0ZiwiMkCFUmGGgodJWQLkA&url=http%3A%2F%2Fvisual.ly%2Fhistory-ecommerce&psig=AFQjCNF-tRMQB57rUVX4-aYTy6Ku2i3cQA&ust=1447331508840527

History of ecommerce
Posted by Miva Merchant to articles on October 26th, 2011
Ecommerce or electronic commerce, is the buying and selling of products or services via the Internet.

Ecommerce was introduced 40 years ago and, to this day, continues to grow with new technologies, innovations, and thousands of businesses entering the online market each year.  The convenience, safety, and user experience of ecommerce has improved exponentially since its inception in the 1970’s.

1960-1982
Paving the way for electronic commerce was the development of the Electronic Data Interchange (EDI).  EDI replaced traditional mailing and faxing of documents with transfer of data from one computer to another.  Trading partners could transfer orders, invoices and other business transactions using a data format that met the ANSI ASC X12, the predominant set of standards in North America.  Once an order is sent, it is then examined by VAN (Value-Added Network) and finally directed to the recipient’s order processing system. EDI allowed the transfer of data seamlessly without any human intervention.
In 1979 Micheal Aldrich connected a television set to a transaction processing computer with a telephone line and created what he coined, :teleshopping:, meaning shopping at a distance.

1982-1990
In 1982, France launched the precursor to the Internet called, Minitel.  The Minitel was free to telephone subscribers and connected millions of users to a computing network.
By 1999, over 9 million Minitel terminals had been distributed and were connecting approximately 25 million users in this interconnected network of machines.  The Minitel system peaked in 1991 and slowly met its demise after the success of the Internet 3 years later.  In 2011, France Telecom announced its shutdown of the Minitel service system.

90’s To Present
In 1990 Tim Berners Lee, along with his friend Robert Cailliau, published a proposal to build a “Hypertext project” called, “Worldwide Web”.  The inspiration for this project was modeled after the Dynatex SGMl reader licensed by CERN.
The Same year Lee, using a NeXtcomputer the first web server and wrote the first web browser.  Shortly therafter, he went on to debut the web on Aug 6,1991 as a publicly available service on the Internet. When Berner’s Lee decided he would take on the task of marrying hypertext to the Internet, in doing that, the process led to him developing URL, HTML and HTTP.
 (http://www.miva.com/blog/the-history-of-ecommerce-how-did-it-all-begin)

Online Ecommerce Megastores
In the mid-nineties to 2000’s major advancements in the commercial use of the Internet. The largest online retailer in the world Amazon, launched in 1995 as an online bookstore.
The dot com bubble was Ebay, an online auction site that debuted in 1995. Other retailers like Zappos and Victoria Secret followed suit with online shopping sites;  Zappos being a web only operation.
Also in 1995, was the inception of Yahoo followed by Google in 1998, two leading search engines in the US. These successful web directories began their own ecommerce subsidiaries with Google Shopping and Yahoo! Auction, in following years.
As more and more people began doing business online, a need for secure communication and transactions became apparent. In 2004, the Payment Card Industry Security Standards Council (PCI) was formed to ensure businesses were meeting compliance with various security requirements.

http://www.miva.com/blog/the-history-of-ecommerce -how-did-it-all-begin



Digital Commerce (Plagiarism)


Guidelines To Avoid Plagiarism
[Dr. Goolkasian’s HomePage]


https://www.google.co.za/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&ved=0CAUQjhxqFQoTCI_F74etiMkCFUO4GgodP78IhA&url=http%3A%2F%2Fqualitycustomessays.com%2Fblog%2Fplagiarism%2F&psig=AFQjCNFuXOrKrKdQWO6AuoEcIGrrZvMeGQ&ust=1447330665090934


Plagiarism Guidelines

Guideline 1
Any part of your paper which contains the exact words of an author must appear in quotation marks, with the author’s name, and the date of publication and page number of the source attached.
Guideline 2
Material should not be adapted with only minor changes, such as combining sentences, omitting phrases, changing a few words, or inverting sentence order.
Guideline 3
If what you have to say is substantially your own words, but the facts or ideas are taken from a particular author, then omit the quotation marks and reference with a bracketed citation, such as (Jines,1949).
Guideline 4
Always acknowledge “secondary sources”.
Guideline 5
Every statement of fact, and every idea or opinion not your own must be referenced unless the item is part of common knowledge.
Guidelines 6
Do not hand in for credit a paper which is the same or similar to one you have handed in elsewhere.
Guideline 7
 It is permissible to ask someone to criticize a completed paper before you submit it, and to bring to your attention errors in logic, grammar, punctuation, spelling, and expression.  However, it is not permissible to have another person re-write any portion of your paper, or to have another person translate into English for you a paper which you have written in another language.

(http://www.psych.uncc.edu/pagoolka/plagiars.html)