Thursday, 25 June 2015

Digital Communication



CLash of the Clan


its a game that is very useful due to communication , its a site game that helps with leadership skills as well as being able to communicate with other people playing the game .
We create a clan according to a setup you fall under. When one of our members has an emergency then we all recieve the text that he/she sends. thats why i say its a game that enables us to communicate and be able to fight other clans.

logistics

everyone that plays the game is actually part of a clan and its a group game type of thing because there are different clans with different individuals.

Each clan has itsown leader , in my experience i realised how difficult it is because everytime i was not online the game continued playing which made it difficult for me because am not always connected to the inrt\erent meaning i would normaly get beaten up while am currently not online, so i didn't like the game at all. the communication is approriate because we could talk about upcoming threats coming from other clans.

the village we created was not strong enough because not everyone could access internet and fight back with other clans.therefore we lost alot of lives ni my clan.

Troops are divided into Tier 1, Tier 2, Tier 3, Dark Elixir Troops, and Heroes.
Tier #1 - Consists of Barbarians, Archers, and Goblins.
Barbarians- Barbarians are elixir troops that are the fastest to create (20 seconds) in the barracks. Barbarians also known as Barbs in CoC. Barbarians have decent hit points for the amount of elixir that they take to create.
Archers- Archers are elixir troops that are fairly quick (30 seconds) to make in a barracks and are the second troop to become available once a barracks has been upgraded to level two.
Goblins- Goblins are useful for looting bases at lower levels. They have double hit points on resource type buildings including both gold and elixir storage and gold mines and elixir collectors. Goblins are made using elixir and are created in 30 seconds.

Tier #2 - Consists of Giants, Wall Breakers, that carry bombs), Balloons, (Wall Breakers in hot air balloons that drop bombs), and Wizards.
Tier #3 - Consists of Dragons, Healers, and P.E.K.K.As (heavily armored sword-wielding warriors whose exact identity is unconfirmed).
Dark Elixir Troops - Consists of Minions, Hog Riders, Valkyries, Golems, Witches, and Lava Hounds (a group of flying fiery hound-like golems that target air defenses). These troops are created by using "dark elixir", a special type of elixir that is only available at higher levels, and are also trained in their own "dark barracks".
Heroes - Consists of the Barbarian King and the Archer Queen. Heroes are immortal and are only trained once. They are summoned by an altar rather than being trained in the barracks (or dark barracks) like the other troops. They are trained and upgraded exclusively with dark elixir.
Buildings






Gameplay in Clash of Clans. A player is attacking another player's village. The amount of resources available for capture are on the top left. The troops available for deployment are along the bottom of the screen.


To earn and store gold and elixir, players must build gold mines and gold storages and elixir collectors and elixir storages, respectively. Elixir is used to train new troops, carry out research in the laboratory to upgrade troops and to build and upgrade certain buildings, mostly pertaining to buildings used in attacking another player's base. Gold is used to build defensive buildings[6] and to upgrade the town hall, which allows access to more buildings and higher levels for existing buildings. At higher levels, dark elixir becomes available; this type of elixir is used to train and upgrade dark elixir troops and heroes, as well as fuel the "inferno tower", a defensive building that is available only at very high levels. To earn and store dark elixir, players must build dark elixir drills and dark elixir storages.[7]


There are a number of buildings available to the player to defend their community, including cannons, mortars, bombs, traps, archer towers, and wizard towers. Players can also build walls, which can be upgraded as they increase in level.[7][8]
Clan wars


Clans are groups of players who join together to support each other, either materially (donating troops) or verbally (giving advice). Players can join clans once they rebuild the special Clan Castle building early on. A major component of the gameplay of Clash of Clans is clans facing off against one another. Clan leaders and co-leaders can begin wars against other clans. Each clan is then given one "preparation day" and one "war day." When a player attacks a member of the opposing clan, they receive stars based upon the amount of destruction they cause to the opponent's community. Each player is limited to two attacks per war, and the team with the most stars at the end of the war day is declared victorious, with players receiving bonus war loot if he/she use their attacks in the war and a one more war win record in the clan description.[9]
Gems


Aside from gold and elixir, the game also uses gems as a currency. Gems are awarded for reaching certain milestones, completing achievements and randomly awarded when clearing certain obstacles in your compound. However, the main way to acquire gems is through in-app purchases using real world money. Gems can be used to speed up every aspect of the game, from construction times to troop training to lab research. They can also be used to purchase more resources and builders.[5]


( Bedford, John 2009)


https://en.wikipedia.org/wiki/Clash_of_Clans
Bedford, John. "Clash of the Clans Review". Modojo. Retrieved June 9, 2014.

Digital Commerce




Digital Commerce is the electronic buying and selling of goods. Now a days, a large amount is being purchased on the internet, because it’s easier and more convenient. Almost anything can be bought such as music, toys clothing, cars, food and even porn. Even though some of these purchases are illegal we will be focusing on all the item’s you can buy legally on the internet. Some of the popular websites are eBay, iTunes, Amazon, HMV,Best Buy and much more.


Digital commerce (D-commerce) is a type of e-commerce used by an organization that delivers and sells products online. D-commerce is used by companies that sell news, subscriptions, documents or any form of electronic content, and the digital commerce company collects payments, handles customer refunds and billing and manages other accounting functions for online publisher clients.


D-commerce is considered a form of e-commerce because it deals with the exchange of electronic goods.

Techopedia


The pay-as-you-go model is applied to digital commerce. Customers start an account with a digital commerce company and can purchase text and content from publishers, but they only have to relay their financial information once. This makes for a more secure online environment. (Cory Janssen 2009).


Digital commerce can also be risky, because people sometimes get nervous about putting their credit card details on the internet or theft. There are a lot of different ways for paying for your online purchases, such as debit cards, electronic money, cash on delivery, cheques, wire transfer, postal money orders. Paypal, moneybookers, reverse sms billing so that the bill is sent with your phone bill, gift cards and of course credit cards.


Because buyers cannot see the real product before they purchase it, there are more chances of fraud happening. SSL (the secure socket layer) has solved the problem of credit card details being stolen but identity thefts are still an issue when they hack into the supplier's site and steal names, credit card numbers, addresses and other personal information.


To avoid theft, only shop from sites that you know and have heard are good and reliable, read the privacy policy to make sure you do agree with it, make sure that the vendor address is protected with SSL, and you will know this because the url begins with "https" instead of just "http", and to make sure your passwords are strong (a mixture of letters and numbers) and you don't display any unnecessary personal information.

It seems so much more convenient to do your shopping when you are sitting at your computer, not having to get up and go to the shops, and most of the sites deliver to your house. It is also convenient because they are open all day, everyday. This is why in 2006 alone,

Ebay is a great example of an online auction. On Ebay you can sell or buy collectibles, appliances, computers, furniture, equipment, vehicles and other types of items. Nearly anything can be sold on Ebay, as long as it isn't illegal and does not violate the Ebay Prohibited and Restricted Items Policy. You can buy new items or second items on Ebay. Companies often sell new releases on Ebay as well as in the shops to maximize sales.


https://digiteen.wikispaces.com/Digital+Commerce




Horror Stories?


You've heard horror stories of people loosing large amounts of money through the internet. The reason you many have heard so much about it is simply because it's true. People are scammed and robbed everyday. This page is to provide you with some information so you won't become a victim. There are many scams out there so we can never guarantee this information will protect you from all of them. Also there are new scams starting up each day so always be careful. That doesn't mean that you can't buy safely online. Millions of people do it each day. Read how some of these scams work. There are different variations of the scams most are very similar.


We are adding this information to this website for two reasons. First by letting you know about the way some of these scams operate you will be less likely to become a victim. Second when the scammers realize we are on to them they will take their scams elsewhere or, better yet, get an honest job.


Three simple rules


If the deal sounds to good to be true, it's probably not true.


If a person makes it a point to tell you to trust them because they are honest - they are probably not honest.


Never - Never - Never send money via Western Union to somebody, or some company, you don't know. JUST NEVER DO IT!

A few tips when buying or selling on the internet.
Know how the scams work. They only work if they can fool you. If you know about them they can't fool you.
Purchase in person if possible. The most expensive items sold in the classifieds on this site are motorcycles. If you see a good deal on a motorcycle that is thousands of miles from you, there is a good chance you'll find a similar deal close to you. If the deal really good you might find it worth wile to travel.
Use a secure method of sending money. Never send cash or transfer money via Western Union to an unknown person. OK, it looks like were picking on Western Union. We don't mean to. They are great for sending money to someone you know.
Use a third party to help with the transaction. Escrow companies can help but be very cautious. Make sure you are dealing with a real and licensed escrow company. Many scammers are setting up fake companies to collect the money. This can be a problem if you are selling also. This is one of the common scams. Please take the time to read about it by clicking here. Some fake companies can be very convincing. If in doubt, don't use them. We have a few tips for spotting fraudulent escrow companies. Click here for that information.




http://www.lets-ride.com/classifiedadvertisements/buy_sell_safely.htm

.

Wednesday, 24 June 2015

Additional Sources

Digital.Citizen for Schools
By : Mike Ribble, Gerald Bailey

Digital Community
by: Jason B ,Ohler

Digital Citizenship
Internet,Society and Participation
By: Karen Moosberger

References

Did you know
Available [online]: www.edutopia.org/blog/film-festival-digital-citizenship Assessed on 24 June 2015 @ 09:24
Security
By Mark Theoharis Available [online]http://www.criminaldefenselawyer.com/crime-penalties/federal/computer-crimes.htm Assessed on[ 13 June 2015 @
11:04]

Communication
by Bedford, John 2009) Available [online]
https://en.wikipedia.org/wiki/Clash_of_Clans Assessed on{± 17 June 2015 @ 16:08}

Commerce
Available[online] @www.let-ride.com/classifiedadvertisements_buy_sell_safe.htm Assessed on {1
3June 2015 @ 12:35}

Elizabeth Hartney, Available [online] :http://addictions.about.com/od/internetaddiction/tp/Ten-Rules-Of-Netiquette.htm
[Assessed on 13 July at 10:12]

PICTURE
Available [online ] http://pakitmag.com/wp-content/uploads/2015/04/cybercrime.jpg Assesed on 13 June 2015 @ 10:52

Health
Bickley, D. and Trawick, L. (2013) Digital Health and Wellness. Retrieved fromhttp://www.nisd.net/digitalcitizen/sec_digcit/life_outside_health_6_12.htm
Available [online]: https://cunedigitalcitizenship.wikispaces.com/

Digital footprint
Available (online): secure.surveymonkey.com/_resources/14993/39254993/5b3d007c-559a42d9-822a-92bel888b53d.gif Assessed on 13 June 2015 @13:00

www.cybersmart.gov.au/kids%20facts/digital%20Footprint.aspx Assessed on 13June 2015

Parents
Available {online}
www.staysafeonline.org/stay-safe-online/for-parents/raising-digitalcitizens
Assessed 11June 2015

5 fluences
Digital Citizenship student manuel Rosebank College
IIE(pg 43-49)

Nine elements
By Mike Ribble(2011) Available [online] http://digitalcitizenship.netNine_Elements.html
Assessed on 28May 2015 14:28

Mermaid Shots
By Jodi Werswick
Available [online]: http://blogs.discovery.com/bites-animal-planet/mermaid Assessed on 11 June

Tuesday, 23 June 2015

Did you know???

"Digital citizenship" is an umbrella term that
covers a whole host of important issues.
Broadly, it's the guidelines for responsible,
appropriate behavior when one is using
technology. But specifically, it can cover
anything from "netiquette" to cyberbullying;
technology access and the digital divide; online
safety and privacy; copyright, plagiarism, and
digital law, and more. In fact, some programs
that teach digital citizenship have outlined no
less than nine elements that intersect to inform
a well-equipped digital citizen . It's an
overwhelming array of skills to be taught and
topics to explore.
But while there is much talk about the
importance of teaching digital citizenship in this
information society, not many are sure what
that really looks like. What tools are out there
for teaching it? And how in the world can
teachers make time in an already overcrowded
curriculum? This playlist is intended to offer
tools to make the case that it's critical to
teach this, and then launchpad videos to seed
classroom discussions once you've carved out
that precious time. (BB Sutton 2012)

Thursday, 18 June 2015

Digital Rights and responsibitlities




Rights of digital citizen
right to freedom of expression
right to privacy
Right to credit for personal works
rigth to digital access
right to our identity

Responsibilities of digital citizen
Responsibilty to report bullying, harrassing,sexting,or identity theft.
Responsiblity to cite works used for resources and researching to download music , videos and other materials legally.
Responsibilty to model and teach student expectations of technology use.
Responsibility to keep data or information from hackers.
 Responsibilty not to falsify our identity in any way.


Digital Health

Digital Health and Wellness is the branch of digital citizenship that focuses on using technology safely and appropriately. In the technological world we live in today our society is becoming dependent on the use of internet. It is becoming increasingly neccessary to inform our students and children about the dangers involved with frequent internet use.

Picking the right mouse and keyboard. Arthritis can develop from constant typing and clicking.Digital Health and Wellness Problems

Internet Addiction-

Recent scientific studies are now showing that: " it may be possible to experience habit-forming chemical reactions to behavior as well as substances"(Young, 2012). Internet addiction has become an international problem that is now being recognized as a serious problem. Internet addiction can cause excessive fatigue or loss of sleep, academic problems, withdrawal from friends and family, and behavioral problems in those who suffer from it. Different types of internet addiction can include cybersexual addiction, cyber-relationship addiction, net compulsions, information overload, and computer addiction.

Ergonomics-

Ergonomics is the safe physical use of the computer. This may include:
Sitting up straight: Make sure you are straight up in your chair with your back flat against the back and your feet on the gound.
Maintain a safe distance from the screen. Do not sit too close, do not stare at the screen for long periods of time.
Do not sit for long periods at a time. Frequently get up and do other activities.
Simple exercises to warm up the body.
For children: Watch modifications provided in video.

Online Safety-

Digital health and wellness includes teaching students internet safety as well. Today, scams are master-minded everyday through the use of the internet. Children must be well aware of what they should and shouldn't do while on the internet. Some rules to consider are:
Do not give out any personal information while online.
Do not give out your name or picture while online.
Meet with parents or teacher to go over rules for being online.
Report to your parent or teacher any information/picture online that makes you feel uncomfortable.
Do not agree to meet anyone online without your parents or teacher's permission.
Do not respond to any innappropriate comments and do not use innapproriate comments yourself.


Bickley, D. and Trawick, L. (2013) Digital Health and Wellness. Retrieved fromhttp://www.nisd.net/digitalcitizen/sec_digcit/life_outside_health_6_12.htm


Available [online]: https://cunedigitalcitizenship.wikispaces.com/Digital+Health+and+Wellness Assessed on 18 June at 13:54

Saturday, 13 June 2015

Digital Security


Computer Crime



There are a number of offenses which can fall under the category of “computer crime.” Any crime that either targets a computer, or in which someone uses a computer to commit a crime, falls into this category. State computer crime laws differ widely, and when a person uses a computer to commit a crime, that crime may be covered under several different state or federal laws.
Unlawful use or access. Some states have laws that make it a crime to use or access a someone else's computer without permission or authority. This type of crime includes instances where a person physically accesses someone else's computer, gains access electronically, or uses a virus to gain access. These laws are often used incomputer hacking cases where someone gains access to someone else's computer without permission.This can be avoided when a system of tracking computers and devices is created. When someone hacks or tries to hack computers can be located and found to be arrested, legal actions should take place. 

Access for fraudulent purposes. Other states have laws that punish using a computer to accomplish a fraudulent act. Some states, for example, make it a crime to use a computer, computer software, or computer network to fraudulently obtain goods or services of any kind.
Data theft. Even if you're allowed to use or access a computer, you can still commit a computer crime if you access, copy, damage, or alter information you don't have permission to use. Some states provide additional penalties in cases where the data theft resulted in damage, while less severe penalties apply for thefts which did result in data being damaged, altered, or destroyed.
Child pornography. It's a crime to make, possess, or transmit images that portray child pornography. All 50 states, as well as the federal government, have laws which prohibit keeping pornographic images of children. There are also laws which prohibit transmitting harmful materials to children. “Harmful materials” include sexual or pornographic images that may be legal for adults to view, but which are harmful to, or inappropriate for, children.

Internet Crime

While computer crimes cover a range of activities, internet crime laws punish activity that specifically involves the internet in some way. These laws apply to emails and websites, as well as using the internet to commit identity theft or other forms of fraud. Like computer crimes, both individual states and the federal government have laws that apply to internet crime.
Luring or soliciting children. Nearly all states have laws that make it a crime to use the internet to solicit, lure, or entice a child to engage in a sexual act. These laws apply when a person aged 18 or older uses the internet to communicate with a child. The age limit of a child for the purposes of these laws is usually 16. However, a person can violate these laws as long as they believe the person they're talking to is 16 or younger, even if the person is actually an adult.
Harassment, stalking, and bullying. Various states have enacted laws which criminalize using the internet to stalk, harass, or make criminal threats against someone. State stalking laws typically require that the threats made must be credible, but a state's harassment laws may also punish internet communications intended to threaten or harass even if the threat is not credible. Recently, some states have enacted cyber bullying laws which criminalizes harassment aimed specifically towards minors.
Other laws and new laws. There are any number of federal and state crimes that may also apply in computer and internet criminal cases. Federal wire fraud, for example, can apply to any case where a person uses a computer or electronic communications device to fraudulently deprive someone else of property. As computers and the internet continue to change and proliferate, legislatures regularly introduce new criminal laws which apply to internet and computer use. Serious legal action should take place in order for people to stop doing cyber crimes.
By Mark Theoharis Available [online]http://www.criminaldefenselawyer.com/crime-penalties/federal/computer-crimes.htm Assessed on 13 June @ 11:04 am]

Digital Etiquette

1. Real People Take Priority


Nothing is more irritating than trying to have a conversation with someone who is more interested in their cell phone or computer. I don't care whether you work in tech support and you are multi-tasking -- if someone is in the room with you, stop what you are doing and look at them. And don't answer your cell phone unless it is to tell the person on the other end that you will call them right back. If you are expecting an important call or email, let the person with you know upfront, and apologize for taking the call.


This is doubly true if the person you are with is your date, partner or child. Constantly checking your email, voicemail or Facebook while you are with them gives them the message that you don't care about them. And it is extremely annoying to be with someone who is having a conversation that you are not part of.


This is also true of public places, such as restaurants, public transit, stores, elevators, and libraries. Speaking a foreign language does not excuse this behavior; in fact, it makes it worse.


2. If You Wouldn't Say it to Someone's Face, Don't Say it Online


Name calling, cursing, expressing deliberately offensive opinions -- if you wouldn't do it to the face of anyone who might conceivably see what you write, don't write it. Perhaps you have no sympathy for drug addicts and think they should all be locked up or forced to starve. But my site is written primarily for them, so save me the trouble of deleting your message before stating this in offensive terms. The same goes for any forum, chat room, or email.


And it's not just what you say, but how you say it. Either take the trouble to use the shift key for capital letters, or write in all lower case, but don't use caps lock. All caps are generally perceived as yelling. Please don't forget to say please and thank you as appropriate.

3. If You Wouldn't Show it in Public, Don't Share it Online


Naked sext pictures, drunk pictures, drug-use pictures, unedited home video -- if you would have a problem with your boss, your parents, or your kids seeing it now, or at any point in the future, don't post it online. You need only look at what happened to Anthony Weiner to pay heed to this warning.


The same goes for cellphone conversations in public places -- I don't want my 5-year-old learning his first curse words on the train, nor do I want him to hear about how wasted you were last night, or about your sexual exploits. Just because you can't see the person you are talking to doesn't mean the rest of us can't see -- or hear -- you.


4. Don't Exclude Your Audience


If you have an in-joke to share with one other person, or a small number of people in a larger online group, send them a private message. Don't make everyone else feel left out by posting an obscure comment to your Facebook status, listserv or forum. The same goes for laughing at texted or emailed jokes when you are in the presence of others. If you don't want to share the joke, save it for later.

5. Don't "Friend" then "Unfriend" People


No one believes you have 1,000 friends, but it is still insulting to be dropped from someone's friend list. Think about it before adding them or accepting their invitation. If you don't want to be in touch with them, don't add them in the first place. If you want to stay in touch for professional reasons, tell them you only use Facebook for close personal friendships, and join LinkedIn or another professional networking site for more distant contacts.


The obvious exception to this is if you "friend" someone while you are getting along, and then you have a disagreement. Then, by all means, unfriend them if the relationship is beyond repair. But don't torture them with on-again off-again friending.


6. Don't Overload System Resources With Enormous Files


You might think that sequence of nature pictures with inspirational statements is wonderfully moving. It might even give you a sense of serenity. But that is the last thing it will give the person you email it to if it crashes their server, depletes their inbox quota so their emails get bounced for a week before they realize, or uses up the last bit of space they needed to complete an important assignment. So post it to your own webspace and send people a link. Don't attach it to an email.


And if you reply to a message, delete all but the most recent correspondence from the sender, otherwise the message gets really, really long. One of you will be upset if you have to print it out one day, and the whole conversation uses up 20 pages.

7. Respect People's Privacy


Don't forward information sent to you without checking with the original sender first. Use BCC (blind carbon copy) rather than CC (carbon copy) if you are sending something out to more than one person. You might think that we are all friends online, but your friends may not want their names and or email addresses publicized to your acquaintances that they do not even know.


The same goes for uploading photos or videos that include other people to public space, or sending them out to your own contacts. And remember, if you tag people on Facebook, others can access pictures of those people, unless they have adjusted their privacy settings.


Finally, don't sign up for newsletters and such using someone else's email address. Or at least check with them whether they want to receive it first.

8. Don't Repost Without Checking the Facts


That cure for cancer might sound pretty impressive, but it will just cause upset if it is a hoax. And urban myths just add to the noise of the internet and waste people's time. If you aren't sure of the facts, email it to someone who does know or can find out, like your friendly


Don't forget that many viruses are circulated via chain letters and invitations to send some seemingly pertinent piece of information to ten of your friends, or everyone in your address book. So don't be naive, forwarding that message will not bring you good luck, just bad karma. (julian M,2007)

9. Check and Respond to Email Promptly


By all means, ignore and delete spam, unsolicited messages and crazy stuff. But if you have given someone your email address or if you are in a position where people could reasonably be expected to contact you by email and your email address is public, have the courtesy to reply to their message, within, say, two weeks. If it is going to take longer to reply, email them and tell them that. Don't simply ignore a question because you don't want to give the answer. Write back saying that it is a difficult question and they might be better off seeking the information elsewhere.

10. Update Online Information That People Depend Upon


Don't leave inaccurate information online just because you can't be bothered to update your website. If you are going to be unavailable, for example, don't leave your hours of operation online indicating you will be available. If you can't keep your website up to date, take it down.


by Elizabeth Hartney, Available [online] :http://addictions.about.com/od/internetaddiction/tp/Ten-Rules-Of-Netiquette.htm


[Assessed on 13 July at 10:12]







by Br


Available [online ] http://pakitmag.com/wp-content/uploads/2015/04/cybercrime.jpg Assesed on 13 June 2015 @ 10:52




Penalties for cyber crime




cyberbullying :The penalties for cyberbullying are as wide-ranging as the laws discussed above. Depending on the state and applicable laws, sanctions could range anywhere from civil penalties, such as school intervention via suspensions and/or expulsions, to jail time for criminal misdemeanors and even felonies. - Available [online] http://criminal.findlaw.com/criminal-charges/cyber-bullying.html Assesed on [13 June 2015 at 10:28]
Cyber harrasment : harrasing a person online may cause you to go to jail for 6 months or pay a fine of R2500.
Cyberstalking: sentenced to 9 months in jail.by ADI NEWS SERVICESAvailable [online]: https://arizonadailyindependent.com/2013/10/27/penalties-heavy-for-cyberstalking-and-cyberharassment-in-arizona/ Assessed on [13 June 2015 at 10:34 ]
cyber hacking : may cause a person to get arrested for 6 months in jail.
pornography : you may get blocked on social networks and would not be allowed to activate an account.
invading in someone else's privacy may also lead to a sentence in jail. (brian d,2014)


how will i enforce this in my business?

I will make sure that everyone has a strong password on each and every device they will use in the workplace.
I will make sure that every worker uses the internet for work related issues and not use it fpr personal things.
Every worker will be monitored on everything they do when they access the internet.
if the are workers that have a conflict then it will be resolved at work and a meeting will take place to avoid cyber harrassment.

digital footprints


Digital footprint


Available [online]: https://secure.surveymonkey.com/_resources/14993/39254993/5b3d007c-559a-42d9-822a-92be1888b53d.gif Assessed on 13 June 2015

Everything that you do online defines what kind of person you are it describes you as an individual . Thats why its so important for people to be careful online because it builds your digital footprint.
One of the great things about being online is the ability to share videos and photos with your friends and seeing their response. Everything you post online combines to make your digital footprint. Remember that what you share with your friends may also be viewed by people you don’t know. And once it’s online, it could be there forever. So think before you post.


You can manage your digital footprint by:
Keeping your personal details private. Use a nickname instead of your real name and always ask your parents before giving out your name, address or phone number online.
Not sharing your username or password with anyone.
Thinking before you post. Once posted, it can be difficult to remove.
Not posting things that you don't want others to know about or that you wouldn’t say to their face.
Being respectful of other people’s content that you post or share. For example, a photo that your friend took is their property, not yours. You should post it online only if you have their permission.


Available [online]: http://www.cybersmart.gov.au/Kids/Get%20the%20facts/Digital%20footprint.aspx Assessed on [13 June 2015 at 10:05 am]

Thursday, 11 June 2015

Mermaids Animal \\\Planet





By JOdi Werswick Available [oline] http://blogs.discovery.com/bites-animal-planet/mermaids/ Assessed on 11 June 2015

the article

You first saw "Mermaids: The Body Found" during Animal Planet's monstrousMonster Week line-up, but the two hour documentary-style program recently re-aired on Discovery. Once again, the Animal Planet program, which uses scientific theory and real events to debate whether or not mermaids exist, caused a stir among viewers and the program was trending in the No. 1 spot on Google after airing. It seems the program had many convinced that mermaids could exist (much in the way another popular Animal Planet program, "Finding Bigfoot," explores the possibility that Sasquatch could be real).


How much of this is real and how much of this is made up?


The science really informs the fiction. The theory of Aquatic Ape mentioned in the program is real and has been studied for decades. Many events in the show have occurred – i.e. the whale beachings, Navy experimental sonar testing, The Bloop ...


We use the transitive property to further explore the possibility of mermaids – i.e. if polar bears evolved from the brown bear, isn’t it possible that a mermaid, which was reported in disparate civilizations for ages, evolved from a human-like creature that retreated into the water?


The scientists are actors who portray an authentic government organization (NOAA) who currently study phenomena like whale beachings and sonar testing. The imagined part of the show is our entry point into a new world of possibility rooted in science.


By JOdi Werswick Available [oline] http://blogs.discovery.com/bites-animal-planet/mermaids/ Assessed on 11 June 2015






Ask: do mermaids lay eggs like fish or do they mate like human beings?


Acquire: my search phrase would be discovery of mermaids


Analyse: analyse inforamtion and data and turn them into raw materials.


Apply : apply this knowledge in the real world.


Assess: asking questions about the process.






Was to let us know that mermaids really do exist and they might be very dangerous as we do not know the way they live . To answer curiousity questions about mermaids to let our imaginations run wild. as well as finding out what people think about mermaids.these amazing creatures are searched by scientist to give us an answer of whether they do exist or not. in some videos of animal planet they look like someone edited them and they make things that dont exist look like they do exist which is wrong, because they give us false information just to make our imagination run wild. but i belive the video are awsome for they also make you interested in the research of finding animals.





section for Parents.

The Internet is a wonderful place for learning and entertainment, but like the world around us, it can pose dangers if precautions are not taken.  Allowing free access puts your child, your computer and your personal data at risk.
  • Remain positively engaged: Pay attention to and know the online environments your children use. Surf the Internet with them. Appreciate your children’s participation in their online communities and show interest in their friends. Try to react constructively when they encounter inappropriate material. Make it a teachable moment.
  • Support their good choices: Expand your children’s online experience and their autonomy when developmentally appropriate, as they demonstrate competence in safe and secure online behavior and good decision making.
  • Keep a clean machine: Safety and security start with protecting all family computers with a security suite (anti-virus, anti-spyware, and firewall) that is set to update automatically. Keep your operating system, web browsers, and other software current as well, and back up computer files on a regular basis.
  • Know the protection features of the websites and software your children use: All major Internet service providers (ISPs) have tools to help you manage young children’s online experience (e.g., selecting approved websites, monitoring the amount of time they spend online, or limiting the people who can contact them) and may have other security features, such as pop-up blockers. Third-party tools are also available. But remember that your home isn't the only place they can go online.
  • Review privacy settings: Look at the privacy settings available on social networking sites, cell phones, and other social tools your children use. Decide together which settings provide the appropriate amount of protection for each child.
  • Teach critical thinking: Help your children identify safe, credible Web sites and other digital content, and be cautious about clicking on, downloading, posting, and uploading content.
  • Explain the implications: Help your children understand the public nature of the Internet and its risks as well as benefits. Be sure they know that any digital info they share, such as emails, photos, or videos, can easily be copied and pasted elsewhere, and is almost impossible to take back. Things that could damage their reputation, friendships, or future prospects should not be shared electronically.
  • Help them be good digital citizens: Remind your children to be good “digital friends” by respecting personal information of friends and family and not sharing anything about others that is potentially embarrassing or hurtful.
  • Just saying "no" rarely works: Teach your children how to interact safely with people they "meet" online. Though it's preferable they make no in-person contact with online-only acquaintances, young people may not always follow this rule. So talk about maximizing safe conditions: meeting only in well-lit public places, always taking at least one friend, and telling a trusted adult about any plans they make – including the time, place, and acquaintance’s contact information (at least a name and cell phone number). Remind them to limit sharing personal information with new friends.
  • Empower your children to handle issues: Your children may deal with situations online such as bullying, unwanted contact, or hurtful comments. Work with them on strategies for when problems arise, such as talking to a trusted adult, not retaliating, calmly talking with the person, blocking the person, or filing a complaint. Agree on steps to take if the strategy fails.
  • Encourage your children to be "digital leaders:" Help ensure they master the safety and security techniques of all technology they use. Support their positive and safe engagement in online communities. Encourage them to help others accomplish their goals. Urge them to help if friends are making poor choices or being harmed.
More Ways to Keep Your Children Safer and More Secure Online
  • Keep your home computer in a central and open location: If your computer is in the open, you can physically monitor your children while they are online. 
  • Be aware of all the ways people connect to the Internet: Young people have many options to connect to the Internet beyond a home computer. Phones, tablets, gaming systems and even TVs have become connected. Be aware of all the ways and devices (including what they do at friend’s houses) your children are using and be sure they know how to use them safely and responsibly.
  • Talk to other parents: When and how you decide to let your children use the Internet is a personal parenting decision. Knowing what other parents are thinking and allowing their children to do is important and can be helpful for making decisions about what your children do online.

Know the rules: Not all online services are for kids. Even some of the most popular social networking services and other sites are meant only for use by people 13 and older. There are many terrific sites designed specifically for younger children that provide a safer, more secure and age-appropriate environment.
Stay current. Keep pace with new ways to stay safe online: The online world is ever changing. New services with great features continually emerge. Knowing about them and how young people use them can help you better understand the digital life your children experience as well as any concerns you may have for your children.
Consider separate accounts on your computer: Most operating systems allow you to create a different account for each user. Separate accounts can lessen the chance that your child might accidentally access, modify, change settings and/or delete your files. You can set up certain privileges (the things that can and can’t be done) for each account.


Available [online] https://www.staysafeonline.org/stay-safe-online/for-parents/raising-digital-citizens Assessed on 11 June 2015

Thursday, 4 June 2015

five fluencies

Information Fluency

There are a lot of websites and some are still added day by day. information fluency is all about information that is interpreted unconsciously and intuitively so that we are able to receive information, knowledge and be able to receive skills required. Facts end up becoming more obsolete far quicker there's a process of making information relevant like :
Ask: Asking good questions in order to get good answers, this means when using the search box you have to use it very well by typing the right possible question and be very clear.
Acquire: this is all based on where the information is  and prioritizing the search strategy skimming, scanning and scouring the resources given. taking notes
Analyze: this is the part whereby you have to analyze your information from the results that you got from the search, and be able to differentiate from opinions and fiction.
Apply: the user will now be able to use the knowledge they received and be able to face whatever problems they facing in the real world.
Assess: this is when user will look at the results of their application and the process they sued , its al about asking questions and about their process  and the steps followed.

Solution fluency
As explained earlier we need to have information fluency skills in order to extract information to gain knowledge. This is a critical skill when we start trying to find solutions to problems that are presented to us on a daily basis.

Technology has changed our lives drastically in the last 20 years and with these changes new needs have been identified. These needs range from personal to business, and with this we see new possibilities and opportunities. This has resulted in new job opportunities in fields of business that previously did not exist. So how do we learn for careers that don’t yet exist or are so new that there are no qualifications available to teach us, guide and prepare us for? We can’t! However, we can learn the skills that will help us adapt to these opportunities; essentially learn how to learn. The skill that would help the most here, although the fluency skills are all interlinked, is the solution fluency skill .

The Process  Solution fluency as a process should become the focal point of learning, so that we intuitively are able to adapt to new ‘problems’ presented to us. This requires that the process be learnt and applied as often as possible until it becomes second nature, becoming an embedded skill. This means you need to know the process, and apply this at all times to ‘problems’ presented to you. These problems could be anything from learning a new skill, writing an essay, to creating artwork.


The discover stage is essentially an exploration stage of looking at the problem from all angles: How did we get here, what was done in the past, could something have been done differently?
Dream 
With a clear understanding of where we are (discover) and how got there (define) we are now able to move forward and think of solutions. This is a whole-minded process where we imagine what the solution will be in the future. Essentially it is an envisioning process, where we look at the possible and impossible. This is the stage that innovation takes place, where people have ignored the ‘impossible’ and asked "why not?" or "how can it be done". It is here that the creativity fluency comes into play, which was discussed previously in the manual.
Design
So the "define" tells us where we are now, the "dream" helps guide us on where we want to go. The "design" becomes the planning of how to make the solution a reality. It involves a gap-analysis, breaking out all the necessary steps to get there.
Deliver
This step puts the "design"/ plan into action, making the ‘dream’ stage a reality. There are two components to this stage: Produce and Publish. The production can be anything, a performing a play, building a sculpture, completing an experiment. The second part is the ‘publication’ where the product (play, song, experiment, etc.) is presented.
Debrief
This is the evaluation process of all the steps. Did you define the problem sufficiently, did you get enough information or was it the right information, was the solution a good fit to the problem, the blue-print a realization of the solution, and the presentation the answer? These are the kind of questions that need to be asked in order to guide future decisions on problem solving.

© The Independent Institute of Education (Pty) Ltd 2015 Page 49 of 172
Media Fluency
 
To be effectively digitally literate, we need two additional skills, Media and Collaboration Fluencies. In this section we will look at the steps involved with these processing skills.

In the past the most powerful technology for communication was the printing press. However, today we have such a vast array of accessible and relatively inexpensive digital technology that allow us to produce images, video and audio content with relative ease.

In the communication’s learning unit we will explore this in more detail, but for this section of digital literacies we need to understand how to interpret media.

Media fluency is actually two-fold, the first involves the interpretation (listening) of the media; the second, involves how we leverage this for our own output (communication).

This fluency involves both the communication aspect, as well as the literacy. We cannot produce something without knowing how to use the technology, but we cannot leverage the message without understanding this. Therefore, there may be some repetition between the two units.

Crockett, Jukes and Churches (2011:58) believe that media fluency means being a "‘presume’ – an effective consumer and producer of digital content". The first part of this process is explained in this unit, whereas the Leverage process is explained in communication.

Collaboration Fluency
All over the world there are people who are communicating and working together…yet they may never meet face to face! The reality is with today’s technology, distance has become a concept that is relative. The authors of the book "Literacy is not enough" (Jukes, Churches, Crockett, 2011) worked on an entire project without ever meeting face-to-face until after the completion thereof! So how did they do it? Well, they had already mastered the skill of collaboration as well as being digitally literate. In this section we will look at the steps involved with the process.
 


Creative Fluency

Intelligence levels have traditionally only been measured in terms of math based thinking and linguistic skills. However, there are actually several levels of IQ. Gardner (1983) came up with the following:

 Visual-Spatial

These people are good at solving puzzles, love reading, are good with directions and map/ chart work, enjoy drawing and painting and recognize patterns easily.

 Linguistic - Verbal

These people are good with words, both written and spoken, they are good at remembering written and spoken information, enjoys reading and writing, good at debating and explaining things. They often use humor in their storytelling.

 Logical – Mathematical

People that score high in this section are good at analyzing problems and mathematical operations, they enjoy thinking about abstract ideas, conducting scientific experiments and working with complex computations.

 Bodily – Kinesthetic

Those that have a high score in this area are good at body movement, actions and control. They are good at dancing, sports, creating with their hands and physical coordination. They remember things best by doing, rather than hearing or seeing.

 Musical

These people think in patterns, rhythms and sounds. They enjoy singing and playing musical instruments, and are quick to recognize a musical pattern and tones. They have a deep understanding of musical structure, notes and rhythms and are able to remember songs and melodies quite easily.

 Interpersonal

People in this section have a good understanding of other people and relate well with them. They are good at communicating and very skilled at the non-verbal cues. They have an ability to see things from different perspectives and create positive relationships with others. They are also good at resolving conflict.


 
Digital Citizenship, Student Manual,Rosebank College \IIE   (pp 43-49)
 

9 elements of digital ctizenship

1 digital access
people should know that not everyone has digital as well as access to technology. .   Digital Access:   full electronic participation in society.
Technology users need to be aware that not everyone has the same opportunities when it comes to technology.  Working toward equal digital rights and supporting electronic access is the starting point of Digital Citizenship. Digital exclusion makes it difficult to grow as a society increasingly using these tools. Helping to provide and expand access to technology should be goal of all digital citizens.  Users need to keep in mind that there are some that may have limited access, so other resources may need to be provided.  To become productive citizens, we need to be committed to make sure that no one is denied digital access.

2.   Digital Commerce:   electronic buying and selling of goods.
Technology users need to understand that a large share of market economy is being done electronically. Legitimate and legal exchanges are occurring, but the buyer or seller needs to be aware of the issues associated with it. The mainstream availability of Internet purchases of toys, clothing, cars, food, etc. has become commonplace to many users. At the same time, an equal amount of goods and services which are in conflict with the laws or morals of some countries are surfacing (which might include activities such as illegal downloading, pornography, and gambling). Users need to learn about how to be effective consumers in a new digital economy. 

3.   Digital Communication:   electronic exchange of information.
One of the significant changes within the digital revolution is a person’s ability to communicate with other people. In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging).  The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else. Now everyone has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communication options.

4.   Digital Literacy:   process of teaching and learning about technology and the use of technology.
While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used. New technologies are finding their way into the work place that are not being used in schools (e.g., Videoconferencing, online sharing spaces such as wikis). In addition, workers in many different occupations need immediate information (just-in-time information). This process requires sophisticated searching and processing skills (i.e., information literacy). Learners must be taught how to learn in a digital society. In other words, learners must be taught to learn anything, anytime, anywhere.  Business, military, and medicine are excellent examples of how technology is being used differently in the 21st century. As new technologies emerge, learners need to learn how to use that technology quickly and appropriately. Digital Citizenship involves educating people in a new way— these individuals need a high degree of information literacy skills.

5. Digital Etiquette:   electronic standards of conduct or procedure.Technology users often see this area as one of the most pressing problems when dealing with Digital Citizenship. We recognize inappropriate behaviour when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct).   Many people feel uncomfortable talking to others about their digital etiquette.  Often rules and regulations are created or the technology is simply banned to stop inappropriate use. It is not enough to create rules and policy, we must teach everyone to become responsible digital citizens in this new society.

6.   Digital Law:   electronic responsibility for actions and deeds
Digital law deals with the ethics of technology within a society. Unethical use manifests itself in form of theft and/or crime. Ethical use manifests itself in the form of abiding by the laws of society. Users need to understand that stealing or causing damage to other people’s work, identity, or property online is a crime. There are certain rules of society that users need to be aware in a ethical society. These laws apply to anyone who works or plays online. Hacking into others information, downloading illegal music, plagiarizing, creating destructive worms, viruses or creating Trojan Horses, sending spam, or stealing anyone’s identify or property is unethical.

7.   Digital Rights & Responsibilities:   those freedoms extended to everyone in a digital world.Just as in the American Constitution where there is a Bill of Rights, there is a basic set of rights extended to every digital citizen. Digital citizens have the right to privacy, free speech, etc. Basic digital rights must be addressed, discussed, and understood in the digital world.  With these rights also come responsibilities as well.  Users must help define how the technology is to be used in an appropriate manner.  In a digital society these two areas must work together for everyone to be productive.

8.   Digital Health & Wellness:   physical and psychological well-being in a digital technology world.
Eye safety, repetitive stress syndrome, and sound ergonomic practices are issues that need to be addressed in a new technological world.  Beyond the physical issues are those of the psychological issues that are becoming more prevalent such as Internet addiction.  Users need to be taught that there are inherent dangers of technology. Digital Citizenship includes a culture where technology users are taught how to protect themselves through education and training.

9.   Digital Security (self-protection):   electronic precautions to guarantee safety.
In any society, there are individuals who steal, deface, or disrupt other people. The same is true for the digital community. It is not enough to trust other members in the community for our own safety. In our own homes, we put locks on our doors and fire alarms in our houses to provide some level of protection. The same must be true for the digital security. We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.
Mike Ribble {2011} Available [online] :http://digitalcitizenship.net/Nine_Elements.html
Accessed on 28 May 14:28