ThingLink

ThingLink

ThingLink

ThingLink

ThingLink

ThingLink

ThingLink

Tuesday, 31 May 2016

Digital LAW



Digital Etiquette


Digital Code of Conduct According to Perilya.com

  1. One should take care of the computer being used.
  2. One should use the Internet for educational purposes and development
  3. One should use their login detail given by the institute
  4. One should not use another’s login details
  5. One cannot use the internet provided by the institute to view for explicit content
  6. One should contact The IT department if encountering any difficulties with the computer being used
  7. One should care for the computer being used
  8. One should follow the rules and regulations provided if using the institutes devices
     

  • Failure to adhere to the rules and regulations will result in disciplinary measures
  • A written warning will be given for 1st offence till 3rd where disciplinary measures will be then proceeded.
     
Top 5 cyber security Risks in South Africa
  • Unprotected Server Page- Crashing of websites leaving them useless.
  • Defacement-
  • Phishing-Scams
  • POS Hacking-Having access to credit, gift and debit cards of other people
  • Twitter Botnet-automated hashtags to hamper between oppositions activities.

The social economy: Unlocking value through social technologies


 



 

Social Technology

According to Harris Naseem the basis of social technology started in the mid-1990s such as Internet Cell Phones.

Benefits and risks of social technologies for individual’s corporates and communities.


General Benefits


According to MGI_The_social_economy_Full_report individuals will capture important share of value that companies create with social technologies like applications been currently used like Facebook and Twitter. Individuals will gain leverage over suppliers by joining other social platforms

Value creation


Which is created by the basis of marketing, product development and enterprise collaboration.

Product Development


New products are the primary source of growth for a business

Operations


Because  within corporates we have distribution network in a large scale creating advantages for individuals and communities of been aware of any changes or promotion companies like ShopRite, Checkers and PicknPay are already doing this.

 

Risk of Individuals


  • Social cohesion
  • User-generated content quality
  • Sexual predators
  • Cyber-bullying

Risk of Corporates


Internal Risks to enterprises

According to MGI_The_social_economy_Full_report

  • Worker Productivity
  • Proprietary information
  • Brand Reputation
  • Intellectual Property