Tuesday 31 May 2016

Referencing/ Biblography for overall posts

References Debono, M., 2013. Some Sneaky Ways Hackers Use to Try And Steal Information (and how to counteract them). [Online] Available at: http://www.reqtest.com/general/some-sneaky-ways-hackers-use-to-try-and-steal-information-and-how-to-counteract-them/ [Accessed 22 May 2016]. Huddleston, C., 2013. 6 Ways You Invite Hackers to Steal Your Personal Information. [Online] Available at: http://www.m.kiplinger.com/article/credit/T048-C011-S001-6-ways-you-invite-hackers-to-steal-your-personal-i.html [Accessed 20 May 2016]. Rouse, M., 2016. What is identity theft?. [Online] Available at: http://www.searchsecurity.techtarget.com/definition/identity-theft [Accessed 17 May 2016]. Schwartz, M., 2012. 8 ways to Avoid Getting Your Life Hacked. [Online] Available at: http://www.darkreading.com/attacks-and-breaches/8-ways-to-avoid-getting-your-life-hacked/d/d-id/1105707 [Accessed 23 May 2016]. V, B., 2016. Computer Virus (virus). [Online] Available at: http://www.webopedia.com/TERM/V/virus.html [Accessed 17 May 2016]. Weisseman, C., 2015. 7 easy ways to avoid being hacked. [Online] Available at: http://www.businessinsider.com/how-to-avoid-being-hacked-2015-4 [Accessed 22 May 2016].

Digital Health and Wellbeing (question 8)

Digital Security (Question 7)

Q-7 (http://informativontn24.info/noticia/aumenta-la-censura-de-internet-en-todo-el-mundo-por-quinto-ano-consecutivo-74814) Digital Security Hackers are able to obtain our private information through the internet. There are certain ways in which you let hackers obtain your private information. • The use of fragile passwords- According to (Huddleston, 2013) when you use simple passwords for all your internet related accounts, you’re making it easy for hackers to access your information. • Using one password for all your accounts- According to (Huddleston, 2013)If a hacker is able to obtain your only password you use for all accounts, they are able to access all your accounts. • Using numerous credit cards to make online purchases- According to (Huddleston, 2013) the more credit cards you use, the more you increase the chances of hackers getting your personal information and using them. • Account Phishing Scams- according to (Debono, 2013) are scams created by hackers to trick web users into thinking that they are entering in personal information on a valid website. • Online Checkouts- according to (Debono, 2013)when shopping online some sites are not entirely secure, they leave out loopholes which enable hackers to access your information. (http://bl00dyp1r4t3.deviantart.com/art/Hack-the-World-256813528) How to avoid being hacked • Do not reply to Spam E-mails- according to (Weisseman, 2015) if you are not sure if an E-mail is spam either click ‘Show original” to find the sources of the E-mail or do not replay to it at all. • Do not open attachments unless you are entirely sure- according to (Weisseman, 2015) one of the ways businesses get hacked is when a unsuspicious employee downloads mail attachments. • Use complicated passwords- according to (Weisseman, 2015) a strong password that contains uppercase, numbers, lowercase and number is more secure than an easy password with only lowercase. • Avoid linking accounts- according to (Schwartz, 2012) avoiding linking accounts reduces the risk of being hacked • Disengage distant wiping- according to (Schwartz, 2012) remote wiping is an easy way for hackers to access your laptop and wipe your information.

Digital Law (Question 6)

https://www.thinglink.com/scene/793787696966270978

Digital Rights and Responsibilities (Question 5)

https://www.thinglink.com/scene/793759505157455874 https://www.thinglink.com/scene/793762046259757058

Digital Code of Conduct (Question 4- Digital Etiquette)

Monday 30 May 2016

The Social economy: UNLOCKIN VALUE THROUGH SOCIAL TECHNOLOGIES (Question 3)

Q-3 Social media plays a huge role in our daily lives. it has the ability not only to create and sculpt our careers and personalities, but to also destroy them. Advantages of Social technologies l Makes communication easier no matter the proximity between people. l You are able to handle bank accounts and purchase goods and services over the Internet. l It keeps us informed regarding the latest news and happenings. l Doing market research doesn’t take alot of time (Bullas, 2012). Disadvantages of Social technologies l There are many cyberbulling cases originating from social media (Claywell, n.d). l Having your information stolen or your personal information hacked. l Being exposed to unreliable information. l Children being exposed to adult content.