Tuesday, 31 May 2016


Potential Impacts of Digital Technology on Society

Digital technology impacts a lot on the society especially the human lifestyle. Over the years it has radically increased and has effected the society hardly in the communication to finance and mostly the social interactions.

Its impact:
Adaption-Edges change to adaption and adds improvement to your learning and motivates to engaging content and strategies.
Time-Manages your time as it makes life easier and rapidly if you have the right wireless networks. Influences  students and extending learning to having the right educational information.Being the  best at learning in time. Pace is not a problem because it allows students to be free and to progress with work at their own rate.
Location-You turn to learn on the go, meaning anywhere anytime. Its creates a new world of opportunities.
Independence-Customises learning level and mortality.

Affordability-Time changing products as technology takes way and is developed randomly.
Similarities-More of the safe information ,the risk of layering technology and benefiting little.
Old paradigms-Lectures ,administrators being stack in time. The usage of olden technics and digital systems. Lack of lectures introducing new tools of technology.
Balance-Educational balance as more the  students parents can't or having  difficulty in affording the current digitals network systems e. g latest windows 8.1 and the 3G,4G,wi-fi and tablets etc. All this systems their prices always increase with time.
Technology-It assisting some of the problems  and effectively and efficiently dealing and making our learning skills easier and benefiting it has its challenges.


Made with

Canva.com. (2016). Amazingly Simple Graphic Design Software – Canva. [online] Available at: https://www.canva.com/ [Accessed 24 May 2016].
Point, M. (2015). Impact Of Technology On Our Society – Positive & Negative. [online] My Essay Point. Available at: http://myessaypoint.com/how-technology-effects-our-society [Accessed 24 May 2016].


  The definition of digital rights and responsibilities is having the right and freedom to use all types of digital technology while using the technology in an acceptable and appropriate manner. As a user of digital technology, you also have the right to privacy and the freedom of personal expression.
  1. Business
These days companies promote themselves on digital societies but the responsibilities are that they must be clear/transparent about their products and services to their customers
As students we need to have an ethical way of performing tasks. Unacceptable conduct or actions as a digital citizen could also be plagiarism which is a serious offense that could ruin future endeavors weather in an academic or working field. We right to surf the net but the responsibility to adhere to good conduct and ethics is something we should have at the back of our minds
Responsibilities in society
The way we use the internet shouldn’t pollute our society. There’s so many ways that it could ruin our or have an effect on societies and cultures. There is more to your personal society then meets the eye. Your digital society is also impacted by what you share or post,ultimately your beliefs and actions. The way we behave on our digital society must be thoughtful and considerate for all those who are your “friends or followers” on social media



2015’s Top 5 Cybersecurity Risks in South Africa

The Top 5 cybersecurity risks in 2015 are:
  1. Ransomware,
  2. The Internet of Things
  3. Cyber-espionage
  4. Increase in cyber theft and
  5. Insecure passwords
(CNBC, 2015)

Ransomware infects a computer and restricts the users access to it, a ransom is paid in order for user to be able to use their computer.
The Internet of Things is when devices are connected to the internet which increase the risk of personal details being obtained.
Cyber-espionage is when information is obtained through the internet for use by the government.
Cyber theft is the stealing of financial information through the internet, such as credit card details.
Insecure passwords are passwords which are easily obtainable based on the users tastes or preferences and whether the same password is used several times.

Users are constantly providing financial institutions with confidential, personal, information and so are put at risk when exchanging this information.
Users allow hackers to obtain these details by replying to emails which are not from the financial institutions itself. These emails are almost identical to the ones received form financial institutions and so users can be easily fooled.
A way to prevent this from happening is to always check that the email received has a valid email address. This will allow the user to determine whether the email is legitimate or not.
Another method used by hackers is creating a website that looks almost identical to the real one. User may believe that this website is legitimate and therefore enter personal details. Users can check the URL of the website to ensure that the website is indeed legitimate.
Having a strong password is important as it protects most of our confidential information. Users often use unsuitable passwords that can be easily determined based on the consumers tastes and preferences. Users often reuse passwords for several accounts which puts them at risk.
Hackers can send emails pretending ask personal questions while posing as a financial institution. This can be avoided by checking the email address of the email received.
Not only can users be at risk on the internet but when receiving phone callsas well. People may ask personal questions in order to determine their potential password.
This can be easily avoided by not giving out personal information over the phone. If an institution needs information they will often tell you to go in and resolve the issue.
Users should always keep on guard when online and always check what links they are clicking on and what files they are downloading. In order to protect your self, users are advised to download anti-virus software in order to protect your computer and confidential information.


CNBC. (2015). Top 5 cybersecurity risks for 2015. [online] Available at:http://www.cnbc.com/2014/12/19/top-5-cyber-security-risks-for-2015.html[Accessed 23 May 2016].CYBERSECURITY RISKS IN SOUTH AFRICA





 digital code of conduct

  • Cellphones are not to be used in any class /lecture unless  stated by the lecture .if the rule fail to be met students cellphones can be confiscated until the end of the lesson . lecture takes discretion.
  • Cellphones  and electronic devices and wearable technology are not to be on any person during examinations ,assessments or tests . if students fail to comply they will receive 0%for that examination or assignment .
  • No violent ,inappropriate ,pornographic or downloaded etc . while on electronic devices at the institution. if students are caught doing doing so they will banned from using such devices on the premises .
  • All digital communication with the educational institutes are to be professional , respected and within the code of conduct of the establishment.
  • Students conducting themselves online should be so respectfully as they are representation of the institution to which they belong . if one fail to do so penalties will be implied according to the severity.
  • Privacy of students as well as the institution should be respected penalties applied due to severity.
  • All action should be done conducting respectful digital etiquette .
  • Students must show respect and show consideration  for technological resources provided . if one fail to do so or damage any property /resources they will be liable for the cost incurred.
  • By having the privilege to digital access one must must protect and promote honesty and integrity by not plagiarizing information. if caught doing so one will receive 0% and face further disciplinary actions .
  • Students are not to use the networks provided for prsonal or commercial purposes .

Making the stuff  proficient with the code of conduct will enforce the above mentioned policies .this will also be done in the case of students who will also be made aware of penalties which face them.



Almost everyone in the world who has a way and means to uses social media for their own purposes. they are many risks associated with the use of social technologies for individual, corporate and communities.


INDIVIDUALS: simple things like not setting ones privacy settings properly or liking someone's photo on Facebook can have negative repercussions. for individual cyber bullying can be a problem associated with social technologies. cyber bullying are able to exercise power on over their victims as the bullying is done behind screen instate of face to face. which eliminate the possibility of the bully being caught and reprimanded.

COMMUNITIES : social technologies can also cause a divide between community members who may be spending copious amounts time behind a screen or on a cell phone instead of engaging in communication with the people around them.

CORPORATE : social technologies can cause damage to a business image . this can happen if an employee or a customer portrays a bad image of the business on social media which can results in the loss of current and future customers of the business . social technologies also present the opportunity for hackers to commit fraud as well as launch virus attacks .


INDIVIDUALS : individuals are able to connect with loved ones who may be far away in another country through the use of social technology.

COMMUNITIES: communities have been able to come together using social technologies such as Facebook. An example of this can be illustration by the National Youth Development Agency which has taken to social media to motivate the south African youth to lead by example.

CORPORATE: business are able to increase brand awareness and share new content instantly . business that are portrayed in a positive way on social media may be able to gain customers and increase profitability with minimal use of advertising . social technology also facilitate communication in the work place , leading to "enhanced information discovery and delivery "(shrm.org.2016). social technology also provide business with an opportunity to target a widespread audience as well widen business contracts.

Monday, 30 May 2016



A team of scientists lead by professor Lee Berger fro wits university believe they have discovered an entirely new species of human relative .this fact alone makes the discovery remarkable  the Homo naledi fossil was found in the rising star Caves in the Cradle of human kind , in a virtually unnecessary underground chamber.(Ewn.co.za). scientists believe that they may be hundreds of or even thousand more fossilized remains still waiting to be discovered at the site. H.naledi is smaller and much older than the average human with curved fingers and smaller skull. however the species is very similar to humankind which makes this discovery significant. scientists believe that H.naledi may have internationally put the bodies of its dead together in the chamber , which is seen as a ritualized behavior unique to humans . this is imported to note that scientists are able to  use this information to place Homo naledi is, which makes it difficult to slot the species into the tree of life.



The information fluency can be described as the skills one needs to not only search information but to create useful knowledge that will help solve real problems . (global digital citizen foundation ,2016)the 5As of the information fluency process are :ask, acquire, analyze, apply and assess.

1.ASK :this step involves asking important questions about what knowledge or data is being sought. in order to receive good answers , one must ask good questions .

2. ACQUIRE :this step involves accessing collecting relevant information from various appropriate resources.

3.ANALYSE: this step involves sorting through the information collected in order to authenticate , organize and arrange it all. this step also involves deciding whether or not the collected and verified.

4.APPLY: This step involves the application of the knowledge acquired .this is done once data has been collected and verified and a solution has been created.

5.ASSESS:  this step involves assessing the product and the process which can be done by discussing how the process could have been carried out more efficient.

influence process may be used to analyses this groundbreaking archeological finding

1. ask: relevant questions must be asked in order to receive relevant information . one must ask what species the fossil belongs to and how this new information could contribute to knowledge already acquired that relates to this species.

2.ACQUIRE: information is acquired by scientist's leading the expedition. this is done by studying the fossil remains in a  professional manner in order to acquire information such as how old the fossil is, whether the fossil is male or female etc.

3.ANALYSE: one must analyses the information which has been acquired in order to authenticate ,organize and arrange it all. one must decide whether this information acquired about fossil is trustworthy.
 4.APPLY :one must apply the information acquired and assess whether or not the fossil found by professor Lee Berger is in fact invaluable to the theory of evolution .

5. ASSESS: one must assess whether the process of analyzing the groundbreaking archeological findings could have been carried out more efficiently .



Q1.2 The techno-economic paradigm describes how in the initials stage of any new where there is an emphasis on the technical side rather than innovation.one can develop from this by first making technology more accessible and accepted and then move on to the innovation . this create a production paradox as just because there is new technology it does not mean that productivity ,sales , innovation and profit are immediately going to increase . there is a widow period between the introduction of the new technology and the time of adoption.

Tuesday, 24 May 2016

Reference lists






hurly,k.2014.kevin.com.bullie are not born, they are raised.(online).available at:http://www.kevinmd.com(accessed 23 may 2016)
consandor,k.(s.a)show: Why do people use etiquette.(online). Available at:http://www.ehow.com.( Accessed 22 may 2016).


Q 2.2  The solution fluency process

DEFINE- south Africa is claimed to be the rape capital of the world. Rape and sexual abuse against children and women are one of SA popular incidents.

DISCOVER- south Africa has the highest rate of sexual abuse against women and children.south Africa is one of the country where sexual abuse are still common as the country has the highest rate child and baby rape in the world with more than 67,ooo cases of rape and sexual assaults against children.

DREAM-we deal with this problem by campaigns that will gather people together and try to address these problems and evaluate ways of rectifying it. more awareness must be created concerning this problem through media.

DESIGN-as the country we can involve the process of the therapy and counselling convince the victims to share their stories to other people so this can help the vulnerable ones to be aware of the offenders .

DELIVER- the nation of south Africa can create more media sources like t.v series  that will publish information about these issues . more awareness will be created on what south Africa is trying to get a handle on.

Through applying these solutions ,we we will be more focused on both victims and offenders of the actions .we should create awareness of the problem.



3.1 The internet of things  refers to the over growing of network of physical objectives that feature an IP dress for internet connectivity and the commutation that occurs between these devices and systems.internet of things has potential to really shift the way we do things ,think and learn.

the internet of things will impact on the future of business as digital and physical world will merge into one . Data will become capital and people who are able to collect ,manage and handle this data in a meaningful way will hold the power in future.

Ownership will lose its importance as tangible objects will become more self aware when they collect data and react to the changes of the environment.

the internet of things will impact the on the future of society as smart appliance will be linked to our everyday lives and will be able to assist us with everyday activities on a level like never before.
 the manufacturing of products will run much smoother and quicker and cars will be able to run on solar power instead of petrol.

technology will beable to prevent transport tragedies and health care will allow people to live much longer. using smart-grid power will be prices on basis of demand .finally farmers will be able to use technology to assist them with all aspects of their farming practices .


Q 3.2 musical intelligence
this has to do with sensitivity to sound,rhythms, tones and music. people with a high musical intelligence have a good pitch and are able to sing ,play music instruments and compose music. this kind of people can go on and be successful musicians or composers .

bodily-kinesthetic intelligence
this is the ability of one to use their body for expression which can be seen in professional dancers and athletes. technology today allows dancers to express themselves to a larger audience with greater clarity.

spacial intelligence

this is the ability to recognize ,use and interpret images and patterns and produce projects. spacial intelligence can go on to be become successful architects, sculptors and designers to produce work with greater ease and clarity.

naturalist intelligence

this is the ability to recognize and appreciate our relationship with the natural world. people with high level of naturalist intelligence  can go on become astronomers ,biologist and zoologist. technology allows professionals to engage with the work that they do on a higher level .

Q.4 Digital etiquette is the standards of conduct expected by other digital technology users.


1. speaking or texting on a cell while driving which may put other drivers  at risk .
2. speaking loudly on a cell phone in a crowded area or in a public place which may be uncomfortable for surrounding people.
3. texting while having a conversation with someone in front of you , which shows disrespect and indicate that you are not very interested in the conversation.
4. using technology to bully someone else known as cyber-bulling, which can cause emotional damage to the victim.
5. unwilling to share public technology which does not allow others to exercise their rights.
6. using camera phones inapropriate which may make others feel uncomfortable.

inapropriate digital conduct can cause friction in society. it can cause a divide between members of society which is unneccesary. in future people may not feel to have conversation with earch other anymore because they will be too engrossed in the technology which they use everyday. can also make who are on the recerving feel uncomfortable and put them in harm either physically or emotionally.


Penny sparrow-inapropriate digital conduct .

Gareth cliff- twitter post.


I Mathabo Mgiba am the promoter of this petition against countries who do not extend digital rights to the majority of the citizens.

digital; rights and responsibility is having the right and freedom to use all types of digital technology while using the technology in an apropriate manner. I would  like to ask you to extend this digital rights to your citizens . include your citizens to the digital world. children of today whom have grown up using technology are known as digital natives . there are many benefits of being a digital native . you can research anything ,anywhere, anytime as long as the device can connect to the intrnet.  digital natives can connect with others whom may be across the world in a matter of seconds. you can download and upload media such as music , movies and images .digital natives are known to be creative ,social and expensive. As a digital native you can be up to date with worldly events that are taking place all over the world.

Name: Mathabo Mgiba
Nation:South Africa
Date: 24 may 2016
Signature: M.mgiba


1. digital citizens have the right toi uncensord internet.
2. digital citizens have the right to an unobstructed internet.
3. digital citizens are all equal on the internet .
4. digital citizens have the right to participate on the internet.
5. digital citizens are allowed to create and collaborate on the internet.
6. digital citizens have the right to share on the internet.
7. digital citizens have equal right to access the internet.
8. digital citizens have the right to privacy on the internet.
9. digital citizens have the right to associate on the internet.
10. digital citizens have the right to be secure in their property on the internet.




Q2.1 A digital footprint can be described as the trail that one leaves behind on the internet. many people think that by hitting the delete button anything we have typed or posted will go permenently. the truth is nothiong can be permanently deleted from the internet and every move you make online is recorded . this means that it is good to build a good online reputation for yourself . some people who have applied for a certain job get rejected due to their activity online . when an employee has a bad reputation can make a company look bad as a whole. so as a digital citizen you should be aware of teh way that they are portraying themselves online to the world .




1. Access

One important tenant of digital citizenship is that access to technology should be available to all. This concept reflects challenges that are present in our non-digital society.  Most all citizens believe, in theory, that everyone should have access to education, health care, the right to worship, etc., but the reality of providing these to all citizens of the world is virtually impossible. It is at the root of wars, political divisions and religious fanaticism. It is unreasonable to think that everyone can receive equal access to technology, but it is a noble goal towards which to aspire. Digital citizens should continue to lobby for more digital access, in more locations, so that more people can benefit from it.

2. Commerce

If the sales figures for Black Monday are any indication, we as a society are fully embracing digital commerce. Digital citizenship encourages people to embrace digital commerce and continue to strive for safe and secure utilization of shopping, banking, and engaging in other commercial transactions in technical venues.

3. Communication

Digital communication is another element of Digital Citizenship that we seem to be embracing wholeheartedly. Digital communication includes emailing, texting, instant messaging, utilizing cell phones, etc. As digital communication continues to grow, it is important that we not forget how to communicate face to face. If we lose our humanity, technology will be a poor replacement.  Utilize digital channels of communication to enhance your ability to communicate, but do not allow it to replace your ability to communicate.

4. Literacy

As digital citizens, it is our responsibility to develop and continually enhance our technological knowledge. We should support and encourage the acquisition of technological knowledge by others. We should model the positive and proactive use of technology for good causes, personal and professional growth and education.

5. Etiquette

This is a real weakness among many users of today's technology. Picture the guy who spends the entire meal in a resturant on his cell phone talking so loudly that he disrupts everyone around him, or the peer that sits across the table from you in an important meeting constantly checking emails or playing Angry Birds. Perhaps you can't teach old dogs new tricks, and it is too late to instill rules of etiquette onto these rude digital citizens. However, digital etiquette should be an integral part of the education of our youth.

6. Law

As citizens of our city, state and country, we are governed by certain laws.  As digital citizens there are also laws that apply to our behavior and interaction. There should be no stealing, no plagiarism, no abuse of others. Many intellectual information laws are violated in this new digital age, i.e. copyright infringement and trademark abuse.  The digital world is so enormous that it is difficult to police.  Therefore, we digital citizens must be vigilant in reporting illegal behavior, if we see it, and we personally should only engage in behavior that is above reproach.

7. Rights and Responsibilities

In the words of Spider Man's uncle, "With great power comes great responsibility." The global and instantaneous nature of our digital age puts enormous power into the hands of everyday citizens. In order to keep the right to digital access, we must strive to always use it in responsible ways. Sadly, when there is abuse of these rights, the solution is often to withdraw all access (for example, a few students abuse the privilege of having a cell phone at school and thus, all students are banned from using cell phones - even if for an educational endeavor).

8. Health and Wellness

The physical and psychological well being of children in the digital world is a critical issue that keeps many parents awake at night. Childhood obesity is epidemic and a generation of children sitting in front of a computer screen is certainly not  helping matters. Parents struggle with how to allow their children access to technology while protecting them from online predators and cyberbullying. Fortunately, awareness is on the increase as to how to protect children on both the physical and psychological fronts. I reiterate the point that I made early on in this series of packets - knowledge is power. It is the responsibility of parents and educators to understand the world in which children live, play and study, and they must guide them in being responsible digital citizens.

9. Security

Digital security is basically protecting yourself in the digital world - protecting your identity, your data, your money, etc. While there are many publicized breaches of "secure" information featured regularly on the news, for most of us, a few simple steps can safeguard our cyber security. Backup data regularly. Create strong passwords and change passwords regularly. Be aware of internet scams and do not share information with anyone that you don't know. It is good to have a healthy dose of skepticism to keep yourself and your information security

Five Influences of Digital Citizenship

1- Solution Fluency
" Solution Fluency is the ability to think creatively to solve problems in real time by clearly defining the problem, designing an appropriate solution, delivering the solution and then evaluating the process and the outcome."

2-Creativity Fluency
Creative Fluency is the process by which artistic proficiency adds meaning through design, art, and storytelling. It is about using innovative design to add value to the function of a product though its form

"Collaboration Fluency is team working proficiency that has reached the unconscious ability to work cooperatively with virtual and real partners in an online environment to solve problems and create original products".

" There are two components of Media Fluency. Firstly, the ability to look analytically at any communication to interpret the real message, and evaluate the efficacy of the chosen medium. Secondly, to create original communications by aligning the message and audience though the most appropriate and effective medium."

Information Fluency is the ability to unconsciously and intuitively interpret information in all forms and formats in order to extract the essential knowledge, authenticate it, and perceive its meaning and significance. Ribble, M. 2011)


1.2 Social capital can be defined as the networks of relationship among people who live and work in a particular society ,enabling  that society to function effectively.

digital divide is defined as "the socioeconomic and other disparities between those people who have opportunity and skills enabling them too benefit from digital resource ,especial the internet and those who do not have opportunity and skills."(dictionary, 2015) 

some are not very fortunate and may have very little or even no access to technology at all. this create divide in society to those who have and those who do not have which can cause friction in society . digital divide can impact on peoples ability to leverage their social capital ,which may affect their ability to access data, information and and knowledge that could assist them furthering themselves economically ,socially etc .

digital citizens must remember that they are others who are less fortunate and might not have access to technology .digital citizens must make a conscious effort to include all members of society by helping to provide and expand access to technology.