The Chronicles of a Digital Citizen
Thursday, 25 June 2015
Digital Footprints
Saturday, 20 June 2015
References
REFERENCES
- ACORN [Online]. Available at: http://www.acorn.gov.au/what-is-cybercrime/ [Accessed 22 June 2015].
- Animal Planet [Online]. Available at: http://www.animalplanet.com/search/?q=mermaids [Accessed 20 June 2015].
- Clash of clans [Online]. Available at: http://www.clashofclansguidehq.com/ [Accessed 22 June2015].
- Digital Citizenship. DIGC5110 Digital Citizenship. The Independent Institute of Education: unpublished.
- Education [Online]. Available at: http://www.education.com/reference/article/netiquette-rules-behavior-internet/ [Accessed 23 June 2015].
- Global Digital Citizen [Online]. Available at: http://globaldigitalcitizen.org/10-things-to-teach-about-global-digital-citizenship [Accessed 23 June 2015].
- Nuviun [Online]. Available at: http://www.nuviun.com/nuviun-digital-health [Accessed 23 June 2015].
- Story of digital health [Online]. Available at: http://storyofdigitalhealth.com/definition/ [Accessed 23 June 2015].
- Todays parent [Online]. Available at: http://www.todaysparent.com/kids/technology/30-fun-and-safe-kids-websites/ [Accessed 23 June 2015].
- Webopedia [Online]. Available at: http://www.webopedia.com/TERM/D/digital_footprint.html [Accessed 23 June 2015].
Variety of images online n.d. [image online]. Available at:
- http://www.google.co.za/imgres?imgurl=http://images.hngn.com/data/images/full/3812/mermaid-hoax.jpg&imgrefurl=http://www.hngn.com/articles/4083/20130530/mermaid-hoax-reality-mermaids-new-evidence-decide-video.htm&h=420&w=560&tbnid=m3SazJHImasI2M:&zoom=1&docid=tEZZ_v2Estuj5M&ei=eauKVdvLBpDd7Qbl7qDgCA&tbm=isch&ved=0CDgQMygIMAg
- http://www.google.co.za/imgres?imgurl=http://i.huffpost.com/gen/1163072/images/o-ANIMAL-PLANET-JOKE-facebook.jpg&imgrefurl=http://www.huffingtonpost.com/2013/05/29/animal-planet-mermaid-hoax_n_3354461.html&h=953&w=1536&tbnid=ZHbH8VWXBnzxbM:&zoom=1&docid=JTORWGwNXquHzM&ei=eauKVdvLBpDd7Qbl7qDgCA&tbm=isch&ved=0CDEQMygBMAE
- http://www.google.co.za/url?sa=i&source=imgres&cd=&cad=rja&uact=8&ved=0CAgQjRwwAA&url=http%3A%2F%2Fappadvice.com%2Fappnn%2F2013%2F06%2Ffreeze-popular-strategy-game-clash-of-clans-updated-with-cool-new-battle-spell&ei=7TuFVZeNLqXN7Qbs94P4BA&psig=AFQjCNH_U1Kcd6x6ToZsl6mOuC_Y59h77Q&ust=1434881389820573
- https://encrypted-tbn3.gstatic.com/images?q=tbn:ANd9GcSjMIXknE5h8umqLtqfUFVGqiSK4_JCN8r1TPRQGM3trCraq6V9fOcj60g
- http://storyofdigitalhealth.com/wp-content/uploads/2014/04/nuviun-digital-health-landscape-480x477.png
- https://www.google.co.za/search?q=digital+health&es_sm=122&biw=1366&bih=643&tbm=isch&imgil=SWnZU5z8avtnPM%253A%253BqByOpl8Qu6rDAM%253Bhttp%25253A%25252F%25252Fwww.technologytell.com%25252Fhometech%25252F102971%25252Fdigital-health%25252F&source=iu&pf=m&fir=SWnZU5z8avtnPM%253A%252CqByOpl8Qu6rDAM%252C_&usg=__0ppO4jMdNE_LNKP6uWbF6ILy_zA%3D
- https://www.google.co.za/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&ved=0CAcQjRw&url=http%3A%2F%2Fwww.laneterralever.com%2Fdigital-divide-fact-or-fiction%2F&ei=dJeKVZevO6PC7AaR-YGYAg&bvm=bv.96440147,d.ZGU&psig=AFQjCNExg9kqZkOHdGSsEdc_qdBNH47gMQ&ust=1435232382425038
- https://www.google.co.za/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&ved=0CAcQjRw&url=http%3A%2F%2Fmashable.com%2F2012%2F02%2F05%2Fdigital-divide-infographic%2F&ei=VMyKVZfLDsOv7Ab_wIHQCg&bvm=bv.96440147,d.ZGU&psig=AFQjCNFxJPDLvasJ0mCWDkMyqtBCvpLxHw&ust=1435246018577546
- https://www.google.co.za/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&ved=0CAcQjRw&url=https%3A%2F%2Fsarahbattaglene.wordpress.com%2F&ei=nsyKVbCgNY2x7QaSxoDQCg&bvm=bv.96440147,d.ZGU&psig=AFQjCNFxJPDLvasJ0mCWDkMyqtBCvpLxHw&ust=1435246018577546
- http://blog.tmimgcdn.com/wp-content/uploads/2010/09/ecommerce-top-2.jpg?6bcdd7
- http://blog.templatemonster.com/2010/09/08/history-of-ecommerce-timeline-infographic/
- https://www.google.co.za/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&ved=0CAcQjRw&url=https%3A%2F%2Fsites.google.com%2Fsite%2Fnomathembamokoenaseportfolio%2Fshowcase&ei=F62KVer7NYPq7AbzhYHABA&bvm=bv.96440147,d.ZGU&psig=AFQjCNEwA-GT7BWWHvmbwmQ8S1cbfXUOEg&ust=1435237953031650
- https://www.google.co.za/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&ved=0CAcQjRw&url=http%3A%2F%2Fwww.glogster.com%2Fhilary222%2F9-elements-of-digital-citizenship-hilary-west%2Fg-6la66t5ruanetm7eiqr7ka0&ei=9a2KVYvoDsa17gaI7qGQAQ&bvm=bv.96440147,d.ZGU&psig=AFQjCNE3URiZQTDj_nCzD9eK3zFXX5M45g&ust=1435238252413328
- https://www.google.co.za/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&ved=0CAcQjRw&url=https%3A%2F%2Ftwitter.com%2Flessontoolbox%2Fstatus%2F590941137684279297&ei=ma6KVbSCEqG07QaNiq3oDg&bvm=bv.96440147,d.ZGU&psig=AFQjCNEr9AIx5xg8FKJquvWwEmkuCjgHGQ&ust=1435238387617437
- http://www.google.co.za/imgres?imgurl=http://www.beefordprimary.org.uk/sampled/558758/930/0/notbigger&imgrefurl=http://www.beefordprimary.org.uk/parentvisitor-area/internet-safety&h=282&w=397&tbnid=yoKj7AXTrXjAxM:&zoom=1&docid=VVlP2AzHIfk2vM&ei=9bqKVbyWKIKC7gaDu4LQDg&tbm=isch&ved=0CE4QMygXMBc
- http://www.google.co.za/imgres?imgurl=https://s-media-cache-ak0.pinimg.com/originals/cf/62/ff/cf62ff95a9e52997f88004a3ae28c50c.jpg&imgrefurl=https://www.pinterest.com/xorianopoulou/internet-safety/&h=2721&w=2104&tbnid=V_vKdvrhqHzOEM:&zoom=1&docid=DpX7mePF7T_69M&ei=9bqKVbyWKIKC7gaDu4LQDg&tbm=isch&ved=0CFYQMygfMB8
- http://www.google.co.za/imgres?imgurl=http://tutorhub.wpengine.com/wp-content/uploads/2013/06/shutterstock_46131460.jpg&imgrefurl=http://blog.tutorhub.com/2012/02/21/internet-safety-sensible-advice-from-a-policeman/&h=664&w=1000&tbnid=4CuxAG3SHZQgbM:&zoom=1&docid=KI_wIFEjS6_DIM&ei=9bqKVbyWKIKC7gaDu4LQDg&tbm=isch&ved=0CDgQMygJMAk
- http://www.google.co.za/imgres?imgurl=http://www.wired.com/geekdad/wp-content/uploads/2012/11/stop-think-connect.png&imgrefurl=http://archive.wired.com/geekdad/2012/11/everloop-mcafee-internet-safety/&h=340&w=660&tbnid=-O-N1kQSg8Oz6M:&zoom=1&docid=tZ0BbxBwpxECkM&ei=9bqKVbyWKIKC7gaDu4LQDg&tbm=isch&ved=0CDUQMygGMAY
- https://www.google.co.za/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&ved=0CAcQjRw&url=%2Furl%3Fsa%3Di%26rct%3Dj%26q%3D%26esrc%3Ds%26source%3Dimages%26cd%3D%26cad%3Drja%26uact%3D8%26ved%3D0CAcQjRw%26url%3Dhttp%253A%252F%252Fedel545futurevision.weebly.com%252Fresources.html%26ei%3DCsKKVY-KJMTY7AaO_ZqgAw%26bvm%3Dbv.96440147%2Cd.ZGU%26psig%3DAFQjCNF-7aWeNfwwXGlEXYtVxAHIcEWB9w%26ust%3D1435243388977496&ei=CsKKVY-KJMTY7AaO_ZqgAw&bvm=bv.96440147,d.ZGU&psig=AFQjCNF-7aWeNfwwXGlEXYtVxAHIcEWB9w&ust=1435243388977496
- https://globaldigitalcitizen.org/wp-content/uploads/2015/03/web_doctor.jpg
- https://globaldigitalcitizen.org/wp-content/uploads/2015/03/follow_your_footprint.jpg
- http://www.google.co.za/imgres?imgurl=http://www.careerrocketeer.com/wp-content/uploads/Digital-Footprint.png&imgrefurl=http://careerrocketeer.com/2011/07/is-your-digital-footprint-squashing-your-reputation.html&h=298&w=256&tbnid=phYvt_BurQHVzM:&zoom=1&docid=Lt92IX7d5YjCqM&ei=8sGKVe3MH9DY7AblurSoDA&tbm=isch&ved=0CDQQMygAMAA
- https://www.google.co.za/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&ved=0CAcQjRw&url=%2Furl%3Fsa%3Di%26rct%3Dj%26q%3D%26esrc%3Ds%26source%3Dimages%26cd%3D%26cad%3Drja%26uact%3D8%26ved%3D0CAcQjRw%26url%3Dhttps%253A%252F%252Fpublicboard.ca%252FStudents%252FVirtualLibrary%252Fteachervlc%252FDigital%252520Citizenship%252FPages%252Fdefault.aspx%26ei%3D4pyLVZTrM4GtsgG2n6PABg%26bvm%3Dbv.96782255%2Cd.bGg%26psig%3DAFQjCNFPe94Falk0xqZnxZq_EJkDZ2IcTw%26ust%3D1435299391421469&ei=4pyLVZTrM4GtsgG2n6PABg&bvm=bv.96782255,d.bGg&psig=AFQjCNFPe94Falk0xqZnxZq_EJkDZ2IcTw&ust=1435299391421469
- http://image.slidesharecdn.com/tipstoavoidonlineauctionscams-121109232506-phpapp01/95/tips-to-avoid-online-auction-scams-bp-holdings-3-638.jpg?cb=135250364
Additional Resources
ADDITIONAL RESOURCES
- You always have to be smart when on the internet at all times.
- Be wise at all times.
- Be safe at all times.
- Follow your footprint
Parents Section
PARENTS SECTION
Safe and good games for kids:
- Candy crush saga
- My talking Tom
- Farm heroes saga
- Pet rescue saga
- Animals puzzle for kids
Digital Commerce
DIGITAL COMMERCE
According to Techopedia, "Digital commerce (D-commerce) is a type of e-commerce used by an organization that delivers and sells products online. D-commerce is used by companies that sell news, subscriptions, documents or any form of electronic content, and the digital commerce company collects payments, handles customer refunds and billing and manages other accounting functions for online publisher clients. D-commerce is considered a form of e-commerce because it deals with the exchange of electronic goods.
[Picture courtesy of TemplateMontser.com]
The importance of being informed:
Being informed it is a very critical or rather important attribute that one may possess. Information opens our eyes to new things on a daily basis and being informed and up-to date is very important as the world we live in evolves every second when coming to the digital world.
Plagiarism guidelines:
Plagiarism is defined as the unacknowledged use of the work of others as if this were your own
original work.
Guidelines on plagiarism: https://en.wikipedia.org/wiki/Plagiarism
Online auctions and tips:
Thinglink: <img style="max-width:100%" src="//cdn.thinglink.me/api/image/670543143531184129/1024/10/scaletowidth#tl-670543143531184129;1043138249'" class="alwaysThinglink"/><script async charset="utf-8" src="//cdn.thinglink.me/jse/embed.js"></script>
Digital Health and Wellbeing
DIGITAL HEALTH AND WELL-BEING
According to Ribble (2011) the definition of this element is: “Physical and psychological well-being in a digital technological world”.According to Paul Sonnier, "Digital health is the convergence of the digital and genetics revolutions with health, healthcare, living, and society. As we are seeing and experiencing, digital health is empowering us to better track, manage, and improve our own and our family’s health. It’s also helping to reduce inefficiencies in healthcare delivery, improve access, reduce costs, increase quality, and make medicine more personalized and precise".
So it is very important for one to take care of their health while being a participating digital citizen in the vast digital world we live in.
Digital Security
DIGITAL SECURITY
Digital security is a growing problem in this technology age and era and it is very important for users to make an effort to know about such risks. “Digital security refers to ensuring the ability to use digital information and information systems without interference, disruption, unauthorized access or data collection” (Security ina-box, n.d.). Ribble (2011) defines it as the “electronic precautions to guarantee digital safety” (digitalcitizenship, n.d.).
Certain issues surround digital security and such are:
Prohibited offensive and illegal content
Certain issues surround digital security and such are:
- Malware - malicious software, software that is used to compromise computer functions, steal data, bypass controls, or otherwise harm the computer that hosts it.
- Digital fraud and crime - Digital Fraud and Crime includes crimes such as scams, child pornography, identity theft, social media re-engineering, cyber bullying, cyber stalking and cyber harassment. Although to a large extent the Internet is required for many of these crimes to take place, it is also telecommunication devices and tablets that are involved.
- Online privacy issues - The first is that of cookies, which are innocuous in their intent, but if hacked can reveal user’s authentication and other stored information. Cookies are used to better enable user’s navigation, store information about the user’s online behavior, as well as store user preferences (which can at times include financial information). The second most common issue is terms and conditions. Most people have been victims simply because users can not take their time to read the terms and conditions before agreeing to something over the internet.
With security issues being on the rise every year it is important for one to know hoe to protect themselves from these malicious scams as cyber crimes are on the rise.
To protect yourself as a user one must:
- Protection for devices from malware and hackers
- Protect your information
- Creating and maintaining secure passwords
- Protecting sensitive files on your computer
- Keeping your Internet communication private
- How to remain anonymous and bypass censorship on the Internet
- Protecting yourself and your data on social media platforms
According to cybercrime.org.za cyber crime” means any criminal or other offence that is facilitated by or involves the use of electronic communications or information systems, including any device or the Internet or any one or more of them.
cyber crime seems to be on a rise and being educated on the different types of cyber crimes is very important so that users can protect themselves.
Types of cyber crimes:
Attacks on computer systems
- Attacks can result in a criminal accessing your personal or financial details and can prevent you from being able to use your device or computer system properly. Such attacks include unauthorized access or hacking,denial of service attacks and malware.
Cyber-bullying
- Cyber-bullying or stalking occurs when someone engages in offensive, menacing or harassing behavior through the use of technology. It can happen to people at any age, anytime, and often anonymously.
Email spam and phishing
- Spam is electronic junk mail – unsolicited messages sent by email, text message or instant message without the recipient’s consent. Spam messages often contain offers of free goods or ‘prizes’, cheap products, promises of wealth or other similar offers. You might be asked to pay a joining fee, to buy something to ‘win’ a prize or to call or text a 190 telephone number (calls made to these numbers are charged at premium rates).
- Phishing is a way that criminals trick people into giving out their personal or financial details. Phishing messages often pretend to come from legitimate businesses, such as banks or telecommunications providers.
- All in all these two scams involve the use of personal information of users all over the internet. As a user it is vital that you be careful of what information you give out over the telephone or internet.
Identity theft
- Identity theft occurs when a criminal gains access to your personal information (such as your name, address, date of birth or bank account details) to steal money or gain other benefits. Even if you think thieves only have a small amount of information about you, they can use it to find more information about you, including photographs, your date and place of birth and even information about your family. This can be enough to apply for services, such as a new bank account. They can also use your personal information to create fake identity documents in your name or even apply for real identity documents in your name, but with another person’s photograph.
Prohibited offensive and illegal content
- Some online content is prohibited under country laws because it is offensive or illegal. Such material can be found on websites, forums, peer-to-peer networks, and sites providing access to live streamed video. When inadvertently accessed, prohibited offensive and illegal content can be highly distressing – especially for children.
Online child sexual abuse material
- Material that shows or describes child sexual abuse or other offences against children is illegal under many country laws.
- access, possess, distribute, produce, advertise or make available child pornography or child abuse material
- procure, groom or engage in sexual activity with a person under 16 years of age, or
- send indecent communication to a person under 16 years of age.
Online scams or fraud
With the growth in online services and internet use, there are many opportunities for criminals to commit scams and fraud. These are dishonest schemes that seek to take advantage of unsuspecting people to gain a benefit (such as money, or access to personal details). These are often contained in spam and phishing messages.
Common types of online scams include:
- Unexpected prize scams,
- Unexpected money scams,
- Dating or romance scams,
- Threats and extortion scams,
- Jobs and investment scams, and
- Identity theft.
Subscribe to:
Posts (Atom)