Please enable JavaScript.
Coggle requires JavaScript to display documents.
Week 11: Digital Citizen, THINK BEFORE YOU POST AND ACT! - Coggle Diagram
Week 11: Digital Citizen
The internet is a global interconnected network of computers that allows for the transfer of data between them.
•Consists of clients (devices that we use everyday to access the internet) and servers (computers which provide and store the data for clients to access)
-
Digital signatures:
•used to identify the sender of a message
•can verify that data has not been altered
•is signed with the sender's private key and verified with the receivers public key
How it works:
Digital signature creation uses a hash result derived from and unique to both the signed message and a given private key. For the hash result to be secure, there must be only a negligible possibility that the same digital signature could be created by the combination of any other message or private key.
Digital signature verification is the process of checking the digital signature by reference to the original message and a given public key, thereby determining whether the digital signature was created for that same message using the private key that corresponds to the referenced public key.
Problem with using technology:
Pros: Convenience and efficiency
Cons: Dependence and vulnerability (can get scammed etc)
•Tech is so well integrated into our lives that we do not realise its extent; serious problems can occur if you are not aware of its risks and are not savvy
•Need to understand the risks that come with use of the internet
Types of technology related risks:
•Security issues: keeping information out of the wrong hands
•Safety issues: sharing information that can harm someone
•Privacy issues: sharing information that should not be shared
•Data integrity issues: sharing the wrong information
How to mitigate internet risks:
•Use a reputable security software (anti-virus, anti-malware and spyware) and ensure it scans for threats regularly
•Regularly update security software
•Be careful when browsing the internet, avoid dodgy websites
How to mitigate public wifi risks:
•Pay attention to the networks you connect; set tighter privacy controls for public networks
•Do not make business or personal transactions over a public network
•Use a strong password for your accounts
-do not use the same password for multiple accounts
How to share safely on social media:
•Consider limiting other's access to your social profiles
•Don't rely solely on privacy settings to protect your information
•Make decisions about to share and what not to share with a level head
•Learn to evaluate your social presence with a critical eye
Consequences of irresponsible technology use:
•Disciplinary action from universities and schools
•Stalking
•Identity theft
•Being passed over for a new job or internship
•Disciplinary action from an employer, including getting fired
•Use of posted as incriminating evidence in legal matters
How to become web-wise and tech savvy:
•Learn about technology related risks
•Take steps to avoid or minimise risks
•Take responsibility for your role as a member of the online community
•Apply critical thinking skills and good judgement to all your technology related actions
Open data formats
•All open data is publicly available, but not all publicly available data is open
•Open data allows the public to access it without having to pay fees or be unfairly restricted in its use.
Order of open data formats:
- Choose the data sets that you plan to make open
- Apply an open license
-determine what intellectual property rights exist in the data
-apply a suitable 'open' license that licenses all these rights and support the definition of openness
- Make the data available in a bulk and in a useful format, consider the various ways that it could be made available
- Make it discoverable
-post on the web and perhaps organise a catalog to list your open data sets
IS for productivity
Getting things done (GTD):
•Personal productivity method to help achieve goals
Core principles:
•Breaking large projects into small, incremental tasks
•Capturing all tasks into a single system, excluding vague tasks and tasks that you do not know how to do
•Doing fast,simple tasks immediately
•Prioritising larger tasks and working on them one at a time
Inbox zero:
•Personal productivity method for organising and managing email
•eliminate as many new items as possible
•forward emails that can be delegated
•Set aside a scheduled time every day to review and answer the “requires response” emails until that folder is empty
•Separate message that will take long to respond to and those that can be responded to quickly
Going paperless:
•Always scan everything
•Use digital versions for usual paper products
•Schedule regular paper purges
-