Wednesday, 20 May 2015

Digital Security

Cyber-crime; types, what they are and how to prevent it:
Hacking: hacking is a crime where one person breaks into someone else’s personal computer using a variety of software and access the information they have stored on it. The owner of the computer doesn’t know that their computer is being hacked and it can be done from another computer.

Theft / piracy: piracy is when someone illegally downloads music, movies, TV series, games and software from the internet. This violates copyrights of the original creators / owners.

Cyber Stalking: Cyber stalking is a kind of online harassment where the stalker sends the victim a series of emails and online messages. The stalker usually know the person they are stalking. They make the victim’s life miserable with all the messages.

Identity Theft: With this kind of cyber crime the thief hacks the victim’s online banking account in order to get useful information like debit/credit card details to buy things online in their name or transfer the money from one account to another.

Malicious Software: These are Internet-based software or programs that are used to disrupt a network. The software is used to gain access to a system to steal sensitive information or data or causing damage to software present in the system.

Child soliciting and Abuse: This is also a type of cyber crime where criminals solicit minors via chat rooms for the purpose of gaining pictures for child pornography.
(Anon. N.d. Cross Domain Solutions. Accessed 17 May 2015. http://www.crossdomainsolutions.com/cyber-crime/)

Ways to prevent becoming a victim of cyber crime:
Anti-virus management
Intrusion detection
Firewall management
Identity management
Routing and encryption
Directory management
Asset management
Configuration management
(Anon. n.d. Cross Domain Solutions. Accessed 17 May 2015. http://www.crossdomainsolutions.com/cyber-security/)

Digital Rights and Responsibilities

Rights and Responsibilities
All the students has the right to an education, but it is their responsibility to come to class, do their homework and assignment and to study for tests.
All users must protect VC's E-Resources from unauthorized access. Specifically, all users must:
Take responsibility for the security and integrity of information stored on any personal or assigned desktop, laptop, or handheld system;
Take care to access E-Resources only from secure environments and to log out of sessions before leaving any computer unattended;
Take all appropriate precautions when accessing confidential or restricted College data to protect the data from unauthorized disclosures and from threats to its accuracy or integrity;
Comply with requests from the IT Staff and other authorized personnel to cease use of E-Resources that compromises the E-Resources or the College; and,
Cooperate with system administrators during investigations of improper use.

AUP for IIE and penalty guideline
The College makes E-Resources available to support its academic and administrative goals, and uses of E-Resources to advance those goals take precedence over all others.
The staff of the Varsity College's Information Technology department ("IT Staff") is responsible for the administration of this policy.

This Policy applies to all information-technology and other electronic resources of Varsity College ("E-Resources"), including without limitation:
All computers, systems, equipment, software, networks, and computer facilities owned, managed, or maintained by the College for the handling of data, voice, television, telephone, or related signals or information;
Any access or use of the College's electronic resources from a computer or other system not controlled or maintained by the College; and,
The creation, processing, communication, distribution, storage, and disposal of information under the College's control.

All use of VC's E-Resources must comply with:
All College policies, procedures, and codes of conduct, including those found in the student, faculty, and employee handbooks;
All laws and regulations applicable to the user or the College; and,
All relevant licenses and other contractual commitments of the College, as modified from time to time.

(http://robyngigc.weebly.com)

Digital Etiquette

Digital Code of Conduct

1. Behave in a ethical way in the digital world as I do the real world.
2. Use technology in an appropriate manner.
3. DO NOT break any laws or rules dealing with the use of technology.
4. Be responsible when using technology.
5. Respect yourself and others when using technology.
6. Do not use technology in a harmful or degrading  manner.
7. Have consideration of, and respect for, school and peer technological resources and use them appropriately.
8. Act safely in the digital world to prevent disruption or harm to myself and others.
9. Have a balanced, healthy lifestyle relationship with technology.
10. Protect yourself and others by reporting digital abuse of people and property.
11. Ensure the privacy of your own information.
12. Do not invade anyone’s digital profile and do not abuse it.

Penalties
1. When you do not adhere to these requirements you will not be able to use this institutes technology any longer.
2. Based on your actions and the seriousness thereof, a hearing will be held to determine whether or not you will be allowed to finish your course at this institute.
3. If your actions has serious consequences you will be asked to pay a fine to correct your wrongs.

Enforcing and Managing
In the beginning of each school year the Digital Code of Conduct will be discussed with the students and on the registration contract both student and parent/guardian has to read and sign this. The devices at the college will be kept an eye on for any suspicious doings from the students.

(Anon. n.d. Digital Code of Conduct. Accessed 16 May 2015.  http://go.vsb.bc.ca/schools/johnoliver/About/Pages/Digital-Code-of-Conduct.aspx)

Digital Communication

The new "it" everyone is playing, Clash of Clans. Young and old is enjoying this game about war and strategy.


3.1 Clash of Clans is a game that requires a lot of strategy and planning on the player’s side. To progress in this game you have to attack other player’s villages and basically steel their money. You build mines to get gold to build your village and clan and to upgrade on your clan making buildings. The higher you are in the game the more successful you will be. To win an attack you have to attack your opponents defense first, like the canons and archer’s towers. After this you can get the gold without getting killed.
3.2 When you join a clan you attack other clans and win gold and trophies. Within the clan you get a leader and elders, who makes the decision to attack. You can also request troops (the other players in your clan sends you soldiers from their village) to help defend your village when it’s being attacked by other players. It is like being part of a virtual family.
3.3 The communication in this game is based on how well you know the members of your clan and how comfortable you are with them. When it comes to having war, it is sort of professional because having to go into war is a serious issue for the dedicated players. But most of the time there isn’t really a lot of communication, but this differs from clan to clan.
3.4 Players can communicate with each other by sending messages. In a way it can educate the youth about digital citizenship but on a very small scale. For example, the players have to be responsible for the messages they send to other players and not send inappropriate messages that could offend other players. They must also consider the digital footprint they leave behind with the use of this game. Most of the things they do on this game can be traced back to the player need be.

Digital Literacy and Information Fluency

In 2013 Animal Planet aired a documentary about the discovering of mermaids and everything in the history that shows that mermaids might really actually exist.



The purpose of this site and series is to inform people about the discoveries that are made by scientists and normal everyday people across the world. People would like to know about new creatures that are being discovered, like mermaids. People think they have the right to know about what is going on in the world, and we do. It is not everyday that someone discovers a mythical creature.

Some people believed that there are such things as mermaids and other people think it’s all one big hoax to make money off of innocent people that will believe anything they hear. Most of the scientists that didn’t see the corpse of the mermaid, didn’t believe in it but the people who saw the corpse or any other evidence of mermaids believes in it.
Most of the videos you can see is man made with technology - computers, photoshop etc. but some of the pictures and videos look like the real deal. The videos by Animal Planet were made to explain how mermaids may have existed all a long and how they may have evolved. These videos is based on a theory and not real life or facts.
My opinion about this site is that some of the videos can be real but for the other I can see that it is fake. I will believe it if I see it with my own eyes in front of me, but I do believe that there are creatures out there that must still be discovered or that will maybe never be discovered like unicorns, mermaids, fairies, minotaur, aliens etc. for now we have to believe in what is real and what we know that God created. For the rest, it will stay mythical.



( Anon. n.d. Animal Planet - Mermaids. Accessed 5 May 2015. http://www.animalplanet.com/tv-shows/mermaids/)

Having a digital footprint means that everything you do on the internet can be traced back to you whether or not you have deleted it, it will stay on the internet forever. Employers can trace your digital footprint to see what kind of person you are and if they want you to be a part of their company, and if you left a bad digital footprint it will influence their decision in employing you.

(Anon, 2015: 54-55)

Digital Citizenship and Digital Access

The center of social capital is social networks and their value. Social capital are the values of all social networks. Social networks refers to the people you know or are a part of your social group.
(Anon. N.d. About Social Capital. Accessed 16 May 2015. http://www.hks.harvard.edu/programs/saguaro/about-social-capital)
My perception of social capital is the amount of friends you have and how they are of a value to you.

Knowledge capital is an intangible asset that consists of the skills, experience and information of the workers of a business. Knowledge capital has nothing to do with the physical factors of production, but has everything do to with the worker’s skills, information knowledge etc.  when a business has workers with skills, information knowledge and experience it gives the business a competitive advantage above other businesses.
(Anon. N.d. Knowledge Capital. Accessed 16 May 2015. http://www.investopedia.com/terms/k/knowledge-capital.asp#ixzz3aK1QmqYn )


Human capital does not only consist of one thing but a collection of a lot of things such as intelligence, wisdom, skills, talents, knowledge, training etc. that a person have. These traits and the extent of these traits will determine the success and wealth of a person.
(Anon. N.d. Human Capital. Accessed 16 May 2015. http://en.wikipedia.org/wiki/Human_capital)