Question 4. Digital Etiquette (Inappropriate Behavior Using the Internet) POE

Roberts Blog (2016) quotes the definition of Ribble & Baily of 2007 on digital etiquette as follows:”…the standards of conduct expected by other digital technology users”. Digital etiquette implies how people must act when using the internet. They must behave in an appropriate and accountable manner when using the internet/technology.

 

The Metropolitan Police of the United Kingdom (n.d.) issued warnings on the dangers associated with inappropriate internet use. The following types of inappropriate behavior of internet use and the possible effects are:

  • Privacy

Due to the fact that the internet offers users a lot of freedom, people can act inappropriately, in ways they would not usually do in public. They might post things they would never do when facing people in public, or they might make private information about themselves known. A typical example can be when the person sends a message on his/her future movements going on holiday. If the information gets into the wrong hands, he/she might be burglarized while on holiday.d1.png                                                                                Story Board (2017).

  • Cyber bullying

Cyber bullying can be similar to bullying someone on the playground. The target will feel afraid and alone, while the bully will try not to be caught. Cyberbullying can cause psychological, emotional and physical stress which can lead to suicide, impacting negatively on society (Roberts Blog, 2016).Comments, images and videos about a person can be posted online which will upset the victim.

  1. Cyber bullies can hack into a victim’s personal accounts and harass them.

Due to the fact that they cannot be seen, cyber bullies think they are untraceable, which is incorrect as there are traces of evidence that it has happened. d2.png Story Board (2017)

 

  • Cyber stalking

People are harassed on the internet, which can be as terrifying as forms of stalking. The UK Metropolitan Police (n.d.), states that it is usually women and girls who are the victims. They might for instance be harassed by an ex-lover who is still upset about their break-up. Sexual harassment impacts negatively on society as people are can be traumatized for the rest of their life (Roberts Blog, 2016).

d3.png                                                                                                                    Story Board (2017).

  • Identity Theft

The more information you make available of yourself on the internet, the greater the risk of identity theft. It might be very tempting to react to a special offer or competition making your personal details such as phone number, address, banking information or identity number known. The chances of fraud or theft while misusing your identity number is a possibility.

d4.png Story Board (2017).

  • Sexting

According to the UK Metro Police (n.d.) sexting refers to:” sending and receiving rude messages or videos of:

  1. naked pictures
  2. ‘underwear shots’
  3. any sexual texts, images or videos”

The images or videos can be sent from somebody you have met on the internet. Sexting can happen because:

  1. You conform to peer pressure, for example sending explicit to friends.
  2. You are harassed, threatened or blackmailed into sending pictures.
  3. someone keeps asking for things and you feel that it’s easier just to ‘give in’
  4. You think you ‘owe’ your boyfriend or girlfriend or you think you can trust them because you love them.
  5. You feel proud of your body and want to share it with other people.

d5.png

Story Board (2017)

Remember:

  1. There is no turning back once you press send.
  2. Even if you use apps like Snapchat the person can take a screen shot
  • You risk being seen as someone you are not.
  • Inappropriate content

Internet users must be careful of the sites they visit, as there are many sites with sex, violence, racial comments and other unlawful activities. Some of these sites can be entered even when parental control is switched on.

According to Roberts Blog (2016), inappropriate conduct has an intense effect on society as it is easier for people to behave inappropriately over the internet where they can remain anonymous. Inappropriate conduct can also negatively affect society as almost anyone in the world can be reached via the internet which can lead to all the negative impacts as described above.

A short summary of Virginia Shea’s “Netiquette” rules, can guide users of the internet to behave in a proper and acceptable manner (Deva, 2016 & http://www.albion.com/bookNetiquette/0963702513p32.html ). The rules are:

  • Rule 1. Remember the human. Treat others in the same way you would like to be treated. Do not hurt other people’s feelings.
  • Rule 2. Adhere to the same standards of behaviour online that you follow in real life – be ethical.
  • Rule 3. Know where you are in cyberspace due to netiquette that varies from domain to domain.
  • Rule 4. Respect other people’s time and bandwidth. Do not think that what you are busy doing is more important than what others are doing. Refrain from asking stupid questions and post messages to the correct discussion group. Conserve bandwidth when you retrieve information from a host or server.
  • Rule 5. Make yourself look good online. Check grammar and spelling before you post and make sure you know what you are talking about. It must make sense.
  • .Rule 6. Share expert knowledge. Offer your help to people of your discussion group if they ask questions
  • Rule 7. Help keep flame wars under control. Refrain from posting spelling or grammar flames. Don’t respond to flame-bait. If you have started a flame war, apologise.
  • Rule 8. Respect other people’s privacy. Don’t read other people’s private email.
  • Rule 9. Don’t abuse your power. Use your power well.
  • Rule 10. Be forgiving of other people’s mistakes. Remember that you were a network newbie once too.

 

Bibliography (POE)

 

Brownell, L. 2017. Nine elements of digital citizenship. Retrieved 15/10/2017, available at < https://www.sophia.org/tutorials/nine-elements-of-digital-citizenship >

Campbell, W.J. 2014. Media myth alert. Exaggerating the power of “Napalm Girl” photo. Retrieved 11/10/2017, available at < https://mediamythalert.wordpress.com/2014/05/29/exaggerating-the-power-of-napalm-girl-photo/ >

Core rules of netiquette (summary). Retrieved 06/10/2017, available at < http://www.albion.com/bookNetiquette/0963702513p32.html >

Davis, D. n.d. Internet questionnaire 02.1. Retrieved 06/10/2017, available at <                           http://ww3.haverford.edu/psychology/ddavis/webforms/ma.paper.02.q1.html >

Deva, S. 2016. Virginia Shea Netiquette guidelines. Retrieved 14/10/2017, available at < https://samiieblog.wordpress.com/2016/08/16/first-blog-post/ >

Fernandes, J. 2014. There are 6 basic types of e-commerce. Retrieved 15/10/2017, available at < http://bloomidea.com/en/blog/types-e-commerce >

Gilani, N. n.d. Types of e-business models. Retrieved 16/10/2017, available at < http://yourbusiness.azcentral.com/types-ebusiness-models-1144.html >

Government of Canada. 2017. Cyber security risks. Retrieved 15/10/2017, available at < https://www.getcybersafe.gc.ca/cnt/rsks/index-en.aspx 2017 >

 

Independent Institute of Education (IIE). 2017. Module manual. Digital citizenship: As revised 2017. Retrieved 06/10/2017, available at < https://portal.iie.ac.za/ADV_Student/Login.asp >

Jayson, S. 2014. Social media research raises privacy and ethical issues. Retrieved 14/10/2017, available at < https://www.usatoday.com/story/news/nation/2014/03/08/data-online-behavior-research/5781447/ >

Lents, N.H. 2017. Big news on Homo naledi more fossils and a surprising young age. Retrieve 10/10/2017, available at < https://www.skeptic.com/reading_room/homo-naledi-more-fossils-younger-age/ >

Massachusets Institute of Technology, n.d. Top ten safe computing tips. Retrieved 12/10/2017, available at < https://ist.mit.edu/security/tips >

Metro Police of the United Kingdom n.d. Get the facts Why is it important to stay safe online? Retrieved 13/10/2017, available at < https://safe.met.police.uk/internet_safety/get_the_facts.html >

Mitchell, S. 2017. What is socialization on the internet? Retrieved 13/10/2017, available at < http://smallbusiness.chron.com/socialization-internet-39077.html >

Musthaler, L. 2007. Top 10 dangerous online activities. Retrieved 16/10/2017, available at < https://www.networkworld.com/article/2297895/lan-wan/top-10-dangerous-online-activities.html >

Roberts Blog. 2016. Inappropriate digital conduct and the effects on society. Retrieved 13/10/2017, available at < https://roberttsiliyiannis.wordpress.com/2016/05/05/inappropriate-digital-conduct-and-the-effects-on-society/ >

Spector, J.B. 2015. Interview: Lee Berger on Homo naledi and fame. Retrieved 11/10/201, available at < https://www.dailymaverick.co.za/article/2015-11-02-interview-lee-berger-on-homo-naledi-and-fame/#.Wd3nZxtrxy0 >

Story Board. 2017. Retrieved 12/10/2017, available at <           http://www.photosforclass.com/download/2551588894 >

Survey Monkey, n.d. Internet usage questionnaire survey. Retrieved 06/10/17, available at < https://www.surveymonkey.com/r/Internetusagequestionnaire >

Tutwiler, J. 2013. Joe’s rhetorical ramblings. Retrieved 11/10/2017, available at < http://jtutwiler454.blogspot.co.za/2013/10/image-analysis.html >

United Nations. Universal Declaration of Human Rights http://www.un.org/en/universal-declaration-human-rights/

Ward, S.J.A. 2017. Digital media ethics. Retrieved 15/10/2017, available at < https://ethics.journalism.wisc.edu/resources/digital-media-ethics/ >

Webster, S. 2017. What Are the Positive & Negative Effects of Using Technology to Communicate? Retrieved 14/10/2017, available at <          http://smallbusiness.chron.com/positive-negative-effects-using-technology-communicate-21241.html >

Question 9. Digital Commerce (POE)

 

Digital Commerce is one of the nine themes of Digital Citizenship as defined by Ribble in 2011 (Brownell, 2017). He describes digital commerce as the electronic buying and selling of goods in the market economy. He furthermore warns that although a vast number of electronic purchases are legal, users must take caution of an electronic market which can be in conflict with the laws and morals of a country. Ribble further stated that users need to learn how to be effective consumers in a new digital economy.
The four e-Commerce models in the graph are the following:

  • The Business-to-Business model implies that companies use the Internet to conduct transactions with one other. Gilani (n.d.) is of the opinion that B2B transactions are multifaceted and can involve multiple transactions at each step of the supply chain. B2B businesses generate revenue from direct sales.
  • Fernandes (2014) & Gilani (n.d.) describe this as the Business to Consumer model of e-business which sells products directly to retail customers online. This e-business has only an online identity which offers a range of products to their customers. Gilani (n.d.) states that most B2C models generate revenue from direct sales and processing fees. B2C is also known as electronic retail or e-tail. Fernandes (2017) is of the opinion that when one compares buying from conventional trade, the consumer usually has more information available on the content and thinks he/she is buying cheaper with. They also think the product will be processed faster and delivered.
  • Fernandes (2014) & Gilani (n.d.) describe the model as Consumer-to Business. The consumer formulates the price and request for products. Business can then quickly review the need before they make a bid on it. The consumer can then evaluate the bids before making a decision on which company will get his/her business. A typical example is buying airline tickets on Priceline.
  • The model is also known as Consumer-to Consumer. Fernandes (2014) describes it as all e-commerce transactions taking place between consumers. The business are done via a third party who provides the online platform where the business will be done. The C2C model can generate income from personal advertisement fees, membership and subscription fees, commission from sales and transaction fees (Gilani, n.d.).

Question 7. Digital Security (POE)

 

Musthaler (2007), the Massachusets Institute of Technology (n.d.) and Government of Canada (2017) warns against the following hazards/risks of online activity and how to avoid them to ensure online safety:

  • Clicking on e-mail attachments from unknown senders. If you are not sure who sent it or what it is about, do not open it. Delete it as it might have Trojan viruses implanted in it. Rather delete it. Protect your data.
  • Turning off or disabling automated security Do not turn an automated virus scan off in order to safe time as this can enable breach of security via viruses or loss of personal privacy and data.
  • Opening HTML (Hypertext Markup Language) or plain-text messages from unknown senders. According to Musthaler (2007) the HTML documents can be a source of spyware or executable codes. Be careful of all messages with or without attachments and if you are unsure about it, rather delete it. Use desktop firewalls.
  • Surfing to gambling, porn or other dicey sites, including random surfing of unknown/untrusted Web sites. These sites are known to place viruses, spyware and Adware on the user’s computer in drive-bys.
  • Giving out passwords, tokens or smart cards. Use strong passwords. Users must guard their passwords with at least eight characters which should include symbols, capital and lower case letters and numbers. Memorise the password because if it is written down and end up in the wrong hands it can lead to identity theft.
  • Using any old Wi-Fi network. The Internet cafe with the free Wi-Fi might be a place where your data can be intercepted from such a network. Users must ensure that they have a personal firewall on the laptop before using a wireless network operated by an unknown source.
  • Filling out Web scripts, forms or registration pages. Do not just register or subscribe to a free download or newsletter. Your personal information can be captured by unwanted sources.
  • Participating in chat rooms or social networking sites. Be careful when you are invited to join LinkedIn or a similar social network. Social engineers can gather your personal information and even convince you to reveal more by gaining your trust.

Learn to be a smart online user and prevent being exploited by all types of shady characters and scams lurking outside.

Q.6.2 What ethical issues could arise as a result of digital socialization? POE

Ethics of Privacy. Jayson (2014), every time a user makes use of the internet/digital socialisation, vast amounts of the user’s information can be collected by outside parties due to the digital footprint left behind. This poses an ethical issue as the user did not necessarily give consent for the use of personal information which transgresses his/her privacy.

Ethics of Images (Ward, 2017) raises a concern on the ethical use of photographs or videos on the net without the user’s knowledge. Some people can manipulate or change the image which can lead to embarrassment of the user and which can lead to sexting, cyber bullying or harassment.

Ethics of Anonymity (Ward, 2017). The freedom of the net makes it easy to be anonymous in digital socialisation and to post inappropriate information in breach of ethics. Ethical guidelines for online and offline anonymity, should be formulated.

Ward (2017) refers to the challenge in giving guidelines when dealing with rumors and mistakes to be corrected online, in time. It should be consistent with the principles of accuracy, verification and transparency.

 Question 6. Digital Law

 

Q.6.1 What is digital socialisation? How can social media change communities and their practices and traditions?

Mitchel (2017), describes socialisation on the internet (therefore it can be assumed the same will follow for any other digital technology use) to the ways that people communicate and the methods they use to do so. Socialisation describes the customs, quirks and language unique to a particular culture. The net, can involve millions of people in the world with different backgrounds, developing cultural habits unique to them.

According to Webster (2017):”Social media have been a revolution in how people plan events and communicate with one another. Rather than talking to their friends in person, they can post a comment about their life. The revolution of social media has allowed people to rekindle friendships, make new friends and gain new interests”. Some users will use social media to develop new relationships in person, while other people might never meet people from the sites they used. Social media must be used with care at all times in order to prevent cyber bullying, maintain privacy, prevent sexting, prevent identity theft and all other dangers associated with the use of digital technology. The amount of information you put out on the Internet over social media, can be misused in the real world.

 

Question 5. Digital Rights and Responsibilities (POE)

My 10 Digital Bill of Rights (Derived from the Universal Declaration of Human Rights of 1948 http://www.un.org/en/universal-declaration-human-rights/ )

 

Article 1

All Internet Users must maintain privacy and not misuse their freedom on the net.

Article 2

Everyone using digital technology are entitled to all the rights and freedoms set forth in this Declaration, without discrimination such as race, colour, sex, language, and religion, political or other opinion, which can lead to cyber bullying.

Article 3

Every digital technology user has the right to digital security.

Article 4

No user of digital technology shall be subjected to sexting.

Article 5

All digital technology users are to be safeguarded against inappropriate content on the net.

Article 6

All digital technology users must ensure that they are safeguarded against identity theft.

Article 7

No digital technology user is allowed to conduct cyber stalking.

Article 8

All digital technology users must respect other user’s time and bandwidth.

Article 9

Every digital technology user must adhere to the same standards of behaviour online than in real life – be ethical.

Article 10

Everyone must be human online and treat others in the same manner they wish to be treated.

 

Question 3. Digital Communication and Fluencies (Napalm-Girl). POE

 

Campbell (2014), describes the photo of the “Napalm-Girl” of June 1972 as one of the “most profound and disturbing images of the Vietnam War”. The photo was taken by Nick Ut for Associated Press and shows the disturbing image of a napalm attack on a Vietnamese village by the South Vietnamese Air Force with the nine year old Kim Phuc at the center of the photo (Tutwiler, 2013).

The horror of war is clearly portrayed through Kim Phuc in the mid-ground of the black and white photo. Tutwiler (2013) states that her nudity is in stark contrast with the other people in the picture who are in different states of half and full dress. He further describes the image of the girl with her outstretched arms similar to the holy image of Christ on the cross which:” lends a holy innocence to the young girl mutilated by the atrocities of war”. What is also very disturbing in the photo, is the terror and pain on the children’s faces running away from the attack, while in the background the faces of the South Vietnamese are set in determined masks of unfeeling for the victims. This image of terror and pain of the children in the presence of the unfeeling soldiers (flow) will definitely create empathy and sympathy in viewers.

In my opinion the photo of the “Napalm-Girl” is not inappropriate in the context of the Vietnamese war in which it was taken. The photographer aligned the message and medium to deliver a powerful message to the viewers, especially the people from the United States of America who mainly opposed their participation in the Vietnamese war. The horror depicted by the photo (form) would have enhanced their condemnation of the war even more.