Tuesday, 31 May 2016

QUESTION 4- POE

QUESTION 4

DIGITAL ETIQUETTE
 digital code of conduct


  • Cellphones are not to be used in any class /lecture unless  stated by the lecture .if the rule fail to be met students cellphones can be confiscated until the end of the lesson . lecture takes discretion.
  • Cellphones  and electronic devices and wearable technology are not to be on any person during examinations ,assessments or tests . if students fail to comply they will receive 0%for that examination or assignment .
  • No violent ,inappropriate ,pornographic or downloaded etc . while on electronic devices at the institution. if students are caught doing doing so they will banned from using such devices on the premises .
  • All digital communication with the educational institutes are to be professional , respected and within the code of conduct of the establishment.
  • Students conducting themselves online should be so respectfully as they are representation of the institution to which they belong . if one fail to do so penalties will be implied according to the severity.
  • Privacy of students as well as the institution should be respected penalties applied due to severity.
  • All action should be done conducting respectful digital etiquette .
  • Students must show respect and show consideration  for technological resources provided . if one fail to do so or damage any property /resources they will be liable for the cost incurred.
  • By having the privilege to digital access one must must protect and promote honesty and integrity by not plagiarizing information. if caught doing so one will receive 0% and face further disciplinary actions .
  • Students are not to use the networks provided for prsonal or commercial purposes .


Making the stuff  proficient with the code of conduct will enforce the above mentioned policies .this will also be done in the case of students who will also be made aware of penalties which face them.



THE SOCIAL ECONOMY :UNLOCKING VALUE THROUGH SOCIAL TECHNOLOGY.

QUESTION 3.


Almost everyone in the world who has a way and means to uses social media for their own purposes. they are many risks associated with the use of social technologies for individual, corporate and communities.

RISK

INDIVIDUALS: simple things like not setting ones privacy settings properly or liking someone's photo on Facebook can have negative repercussions. for individual cyber bullying can be a problem associated with social technologies. cyber bullying are able to exercise power on over their victims as the bullying is done behind screen instate of face to face. which eliminate the possibility of the bully being caught and reprimanded.


COMMUNITIES : social technologies can also cause a divide between community members who may be spending copious amounts time behind a screen or on a cell phone instead of engaging in communication with the people around them.


CORPORATE : social technologies can cause damage to a business image . this can happen if an employee or a customer portrays a bad image of the business on social media which can results in the loss of current and future customers of the business . social technologies also present the opportunity for hackers to commit fraud as well as launch virus attacks .




BENEFITS


INDIVIDUALS : individuals are able to connect with loved ones who may be far away in another country through the use of social technology.


COMMUNITIES: communities have been able to come together using social technologies such as Facebook. An example of this can be illustration by the National Youth Development Agency which has taken to social media to motivate the south African youth to lead by example.


CORPORATE: business are able to increase brand awareness and share new content instantly . business that are portrayed in a positive way on social media may be able to gain customers and increase profitability with minimal use of advertising . social technology also facilitate communication in the work place , leading to "enhanced information discovery and delivery "(shrm.org.2016). social technology also provide business with an opportunity to target a widespread audience as well widen business contracts.






















Monday, 30 May 2016

QUESTION 2- POE SEPARATE PAGE FOR FINDINGS

SEPARATE PAGE FOR FINDINGS.




A team of scientists lead by professor Lee Berger fro wits university believe they have discovered an entirely new species of human relative .this fact alone makes the discovery remarkable  the Homo naledi fossil was found in the rising star Caves in the Cradle of human kind , in a virtually unnecessary underground chamber.(Ewn.co.za). scientists believe that they may be hundreds of or even thousand more fossilized remains still waiting to be discovered at the site. H.naledi is smaller and much older than the average human with curved fingers and smaller skull. however the species is very similar to humankind which makes this discovery significant. scientists believe that H.naledi may have internationally put the bodies of its dead together in the chamber , which is seen as a ritualized behavior unique to humans . this is imported to note that scientists are able to  use this information to place Homo naledi is, which makes it difficult to slot the species into the tree of life.

QUESTION 2 -POE

QUETION 2


The information fluency can be described as the skills one needs to not only search information but to create useful knowledge that will help solve real problems . (global digital citizen foundation ,2016)the 5As of the information fluency process are :ask, acquire, analyze, apply and assess.


1.ASK :this step involves asking important questions about what knowledge or data is being sought. in order to receive good answers , one must ask good questions .


2. ACQUIRE :this step involves accessing collecting relevant information from various appropriate resources.


3.ANALYSE: this step involves sorting through the information collected in order to authenticate , organize and arrange it all. this step also involves deciding whether or not the collected and verified.


4.APPLY: This step involves the application of the knowledge acquired .this is done once data has been collected and verified and a solution has been created.


5.ASSESS:  this step involves assessing the product and the process which can be done by discussing how the process could have been carried out more efficient.

influence process may be used to analyses this groundbreaking archeological finding

1. ask: relevant questions must be asked in order to receive relevant information . one must ask what species the fossil belongs to and how this new information could contribute to knowledge already acquired that relates to this species.


2.ACQUIRE: information is acquired by scientist's leading the expedition. this is done by studying the fossil remains in a  professional manner in order to acquire information such as how old the fossil is, whether the fossil is male or female etc.


3.ANALYSE: one must analyses the information which has been acquired in order to authenticate ,organize and arrange it all. one must decide whether this information acquired about fossil is trustworthy.
 4.APPLY :one must apply the information acquired and assess whether or not the fossil found by professor Lee Berger is in fact invaluable to the theory of evolution .


5. ASSESS: one must assess whether the process of analyzing the groundbreaking archeological findings could have been carried out more efficiently .













QUESTION1-POE



 QUESTION1


Q1.2 The techno-economic paradigm describes how in the initials stage of any new where there is an emphasis on the technical side rather than innovation.one can develop from this by first making technology more accessible and accepted and then move on to the innovation . this create a production paradox as just because there is new technology it does not mean that productivity ,sales , innovation and profit are immediately going to increase . there is a widow period between the introduction of the new technology and the time of adoption.





Tuesday, 24 May 2016

Reference lists

D FERIS.(2016). DIGITAL RIGHTS AND RESPONSIBILITY.[ONLINE]AVAILABLE AT:HTTPS//SITES.GOOGLE.COM[.ACCESSED 20 MAY 2016]

PARENTS INTERNET TRAINING.(2016).BENEFITS OF GROWING UP DIGITAL.[ONLINE]AVAILABLE AT:HTTPS//BENEFIT OF GROWING UP DIGITAL .[ACCESSED 20 MAY 2016].

ANON (2016) KEEPING THE INTERNET OPEN [ONLINE] AVAILABLE AT:HTTP:KEEPINGTHE EBOPEN.COM[ACCESSED 21 MAY 2016]

WIKIPEDIA.(2016).THEORY OF MULTIPLE INTERLLIGENCES .[ONLINE]AVAILABLE AT:HTTPS//EN.WIKIPEDIA.ORG.[ACCESSED 21 MAY 2016]

GARDNERS MULTIPLE INTERLLIGENCES.(2016).GARDNERS MULTIPLE INTERLLIGENCES.[ONLINE]AVAILABLE AT:HTTPS//WWW.MINSDTOOLS,COM.[ACCESSED 23 MAY 2016]

hurly,k.2014.kevin.com.bullie are not born, they are raised.(online).available at:http://www.kevinmd.com(accessed 23 may 2016)
consandor,k.(s.a)show: Why do people use etiquette.(online). Available at:http://www.ehow.com.( Accessed 22 may 2016).

RAPE-THE COLD HARD FACTS.

Q 2.2  The solution fluency process


DEFINE- south Africa is claimed to be the rape capital of the world. Rape and sexual abuse against children and women are one of SA popular incidents.

DISCOVER- south Africa has the highest rate of sexual abuse against women and children.south Africa is one of the country where sexual abuse are still common as the country has the highest rate child and baby rape in the world with more than 67,ooo cases of rape and sexual assaults against children.

DREAM-we deal with this problem by campaigns that will gather people together and try to address these problems and evaluate ways of rectifying it. more awareness must be created concerning this problem through media.

DESIGN-as the country we can involve the process of the therapy and counselling convince the victims to share their stories to other people so this can help the vulnerable ones to be aware of the offenders .

DELIVER- the nation of south Africa can create more media sources like t.v series  that will publish information about these issues . more awareness will be created on what south Africa is trying to get a handle on.

DEBRIEF
Through applying these solutions ,we we will be more focused on both victims and offenders of the actions .we should create awareness of the problem.