Thursday, 18 June 2015

Digital Etiquette

Digital Etiquette

Ten points of netiquette

1. Remember the Human Never forget that the person reading your communication is actually a person with feelings and can get hurt. Essentially never say anything online that wouldn’t say to your reader’s face.

 2. Adhere to the same standards of behavior online that you follow in real life Be ethical in your engagement and know that breaking the law is bad netiquette.

 3. Know where you are in cyberspace The netiquette required will differ from domain to domain. If you are in a forum of experts, your netiquette should reflect respect. Whereas if you are in a chat room with a group of friends (you know in real life) then the netiquette will differ!

4. Respect other people’s time and bandwidth When sharing files or documents, bear in mind the audience’s bandwidth. Furthermore, make sure you read the FAQs first before asking mundane questions where the answers already exist. If you disagree with a group’s discussion, don’t waste their (or your) time by telling them how stupid they are: Just stay away.

5. Make yourself look good online Check grammar and spelling before you post. Most people judge others’ intelligence based on the use of grammar and spelling. Only post on things you know about, it is not worth it to look like the fool.

 6. Share expert knowledge Offer answers and help others where you can.

7. Help keep flame wars under control Don’t respond to flame-bait, don’t post spelling or grammar flames, and apologies if you have done so or perpetuated a flame-war.

 8. Respect other people’s privacy Don’t give out other people’s details, online or offline.

 9. Don’t abuse your power The more power you have, the more important it is how you use it.

10. Be forgiving of other people’s mistakes We all were once a newb (and no we don’t mean noob – those who know little and have no will to learn any more).
(IIE Module Manual DIGC5110 )

2 Penalties for failing to meet this 

Failing to meet this guide lines may result you be regarded as a person who is not responsible and following the digital law, in some other instances you will be plagiarizing the work of other which is a serious offence because suspension or expulsion could be implemented if you fail to meet the guidelines of the etiquette(IIE Module manual DIGC 5110)

3 Management of the etiquette

I could manage the etiquette by making awareness of the guidelines in the workplaces by posters or on notice boards, I would also implement workshops for employees so that they understand the etiquette and the penalties if not followed

4 References

The Independent institute of Education.2015.Digital citizenship module manual 2015. First edition. unpublished

Digital citizenship and digital access


Elements

Social capital 


Information flows (e.g. learning about jobs, learning about candidates running for office, exchanging ideas at college, etc.) depend on social capital norms of reciprocity (mutual aid) are dependent on social networks. Bonding networks that connect folks who are similar sustain particularized (in-group) reciprocity. Bridging networks that connect individuals who are diverse sustain generalized reciprocity. Collective action depends upon social networks (e.g., the role that the black church played in the civic rights movement) although collective action also can foster new networks. Broader identities and solidarity are encouraged by social networks that help translate an "I" mentality into a "we" mentality. What are some examples of social capital? When a group of neighbors informally keep an eye on one another's homes, that's social capital in action. When a tightly knit community of Hassidic Jews trade diamonds without having to test each gem for purity, that's social capital in action. Barn-raising on the frontier was social capital in action, and so too are e-mail exchanges among members of a cancer support group. Social capital can be found in friendship networks, neighborhoods, churches, schools, bridge clubs, civic associations, and even bars. The motto in Cheers "where everybody knows your name" captures one important aspect of social capital.http://www.bettertogether.org/socialcapital.htm

knowledge Capital

An intangible asset that comprises the information and skills of a company's employees, their experience with business processes, group work and on-the-job learning. Knowledge capital is not like the physical factors of production - land, labor and capital - in that it is based on skills that employees share with each other in order to improve efficiency, rather than on physical items. Having employees with skills and access to knowledge capital puts a company at a comparative advantage to its competitors.


INVESTOPEDIA EXPLAINS 'KNOWLEDGE CAPITAL'Businesses develop knowledge capital by encouraging employees to share information through white papers, seminars and person-to-person communication. Knowledge capital is important because it reduces the odds that a company will have to "reinvent the wheel" each time a particular process is undertaken because its employees have access to documents detailing the necessary steps, and personnel who have undertaken similar activities.


Read more:http://www.investopedia.com/terms/k/knowledge-capital.asp#ixzz3ZSL0KdoK

Human Capital


Human Capital is a focused recruitment company specialising in placing highly talented and qualified candidates with Investment Banks, Investment Managers and other financial services businesses. Human Capital has extensive networks with senior management at local and foreign Investment Banks, traditional Asset Managers as well as Hedge Funds. In addition, Human Capital has extensive networks of Qualified Actuaries, Actuarial Students, Mathematics of Finance Graduates, Chartered Accountants ,CFA Charterholders and Engineers. The directors of Human Capital have a combined financial markets experience of 23 years. This combined market experience means that Human Capital is best suited to perfectly match candidates with respective employers and positions.

Human Capital’s competitive advantage is in assisting candidates transition from traditional actuarial, accounting, consulting or analytical positions into a banking or investment environment. This is in addition to assisting candidates with existing banking or investment management experience advance up the corporate ladder in the field they are already specialised in.http://www.hcapital.co.za/

How do the content relate to the South African context

The partially digital: Internet, citizenship, social inequalities, and digital citizenship in South Africa

Abstract

The Internet has evolved as a major medium of information and communication; broadband connection especially enhances Internet's capacity as a virtual platform for social, economic, political and civil activities. The problem is there is a limited and skewed access to the Internet in South Africa. The slow growth of household Internet and fixed broadband is problematic for a country that aspires to be "an advanced information society in which information and ICT tools are key drivers of economic and societal development" (South African Broadband Policy 2010). This dissertation investigates the pattern of Internet penetration in South Africa. Largely, I explore the pattern of Internet penetration amongst university students; data were collected from 10 universities located in both rural and urban areas with other demographic qualities that are representative of the student population in South Africa. ^ Following Mossberger, Tolbert & McNeal's (2008) use of the concept of digital citizenship, I rearticulate the concept as a citizenry with the fulfilled rights to regular and flexible access to the Internet—implicitly individual and household forms of access, the skills to use the Internet, and regular use of the Internet for participation in all spheres of society. I then develop a theoretical framework of digital citizenship by identifying five key elements, namely: citizenship rights, Internet access, Internet use, Internet/digital skills, and policy. These elements are used as measures to investigate the pattern of Internet penetration in South Africa. I conducted a survey amongst students, interviewed officials in government agencies in the communications sector, studied selected policy documents, and carried out digital skill experiments. From the findings, I argue that digital citizenship is largely nonexistent in South Africa, particularly amongst the university students. I claim that most of these students are partially digital . A partially digital person has limited access to the Internet, inadequate skills to apply this technology and as a result cannot efficiently use the Internet to participate effectively as a citizen in society. ^ The study also reveals the skewed access to the Internet replicates the existing pattern of social inequalities in the country, often analyzed in terms of rural-urban inequalities, inequalities based on gender of household heads, family income, racial and population groups. I also claim that students from households that bear the brunt of social inequalities in South Africa are further deprived by the lack of access to the Internet, particularly household access, and the inability to effectively use the Internet. This deprivation means that their rights and abilities to participate in society as citizens using digital means are compromised. In conclusion, I offer recommendations towards achieving digital citizenship.

Reference

Recommended Citation

Tokunbo Toks D Oyedemi, "The partially digital: Internet, citizenship, social inequalities, and digital citizenship in South Africa" (January 1, 2012). Doctoral Dissertations Available from Proquest. Paper AAI3518402.
http://scholarworks.umass.edu/dissertations/AAI3518402
 literacy and information influency

Five fluencies and their relevance

Media fluency

In the past the most powerful technology for communication was the printing press. However, today we have such a vast array of accessible and relatively inexpensive digital technology that allow us to produce images, video and audio content with relative ease.   
In the communication’s learning unit we will explore this in more detail, but for this section of digital literates we need to understand how to interpret media.  
Media fluency is actually two-fold, the first involves the interpretation (listening) of the media; the second, involves how we leverage this for our own output (communication).  
This fluency involves both the communication aspect, as well as the literacy. We cannot produce something without knowing how to use the technology, but we cannot leverage the message without understanding this. Therefore, there may be some repetition between the two units..(IIE Module Manual DIGC5110)

Collaboration fluency 

All over the world there are people who are communicating and working together…yet they may never meet face to face! The reality is with today’s technology, distance has become a concept that is relative. The authors of the book “Literacy is not enough” (Jukes, Churches, Crockett, 2011) worked on an entire project without ever meeting face-to-face until after the completion thereof! So how did they do it? Well, they had already mastered the skill of collaboration as well as being digitally literate. In this section we will look at the steps involved with the process.(IIE Module Manual DIGC5110)

Solution fluency

Technology has changed our lives drastically in the last 20 years and with these changes new needs have been identified. These needs range from personal to business, and with this we see new possibilities and opportunities. This has resulted in new job opportunities in fields of business that previously did not exist. So how do we learn for careers that don’t yet exist or are so new that there are no qualifications available to teach us, guide and prepare us for? We can’t! However, we can learn the skills that will help us adapt to these opportunities; essentially learn how to learn. The skill that would help the most here, although the fluency skills are all interlinked, is the solution fluency skill..(IIE Module Manual DIGC5110)

Information fluency

We have established that there are a lot of websites and pages available on the Internet, with more and more being added every day. The amount of readily available information is incredible to even try to imagine. This is often referred to as the InfoWhelm; the bombardment of information, much of which is irrelevant and useless. As a result of this rapidly increasing volume of information, facts become obsolete far quicker, with the knowledge built on those facts becoming less durable. (IIE Module Manual DIGC5110) 

References


The Independent institute of Education.2015.Digital citizenship module manual 2015. First edition. unpublished





Digital literacy and information fluency

1 The purpose of the site 

The animal planet website is created for the animal lovers that follows the life of the animals. The website provide its TV series guide shows that tune in the satellite television and it provides all the latest news and videos about animals.(animalplanet.com)

2 The process

The process of the website is to connect all people who follow the animal planet and feedback can be given by the website followers.(animalplanet.com/bites-blog)

3 The public response 

The response of the website has a blog where the visitors would comment and give opinions on the website blog and the public in the website seem to give feedback on the website. Visitors could also leave their family pets videos to be shared in the television. Available at: http://blogs.discovery.com/bites-animal-planet/

References
Animal planet.2015..Available at:http://www.animalplanet.com/

Animal planet.2015.Available at:http://www.animalplanet.com/bites-blog/

Animal planet.2015.Available at:http://www.animalplanet.com/bites-blog/




Digital communication


Digital communication


1 The clash of the clans is a game where by you use strategies to create your own army and you lead the clan. its features are:

● Build your village into an unbeatable fortress
● Raise your own army of Barbarians, Archers, Hog Riders, Wizards, Dragons and other mighty fighters
● Battle with players worldwide and take their Trophies
● Join together with other players to form the ultimate Clan
● Fight against rival Clans in epic Clan Wars
● Build 18 unique units with multiple levels of upgrades
● Discover your favorite attacking army from countless combinations of troops, spells, Heroes and Clan reinforcements
● Defend your village with a multitude of Cannons, Towers, Mortars, Bombs, Traps and Walls
● Fight against the Goblin King in a campaign through the realm
My experience:I never played the game but I saw videos of people playing the game on Youtube it seems like an interesting game because it creates you to be more strategic

 Google play store.Game reviews.2015.[online].Available at: https://play.google.com/store/apps/details?id=com.supercell.clashofclans&hl=en


2.The clan 

I joined a clan by the name of BIT1-Pretoria and in our clan we have the leader of the clan.Our clan will engage in clan wars with other countries and communication is used during the time of war.We protect our clan by building a security around ourselves so that if a war is broke we are protected even more.

3 .The communication

Our clan we have a leader and the way we communicate is that if I send a messages to the clan, the members of the clan will see the messages that I sent to them and we can communicate locally or globally. Everyone in the clan will have access to communicate with everyone anytime when we build our security, make strategies and during war clans whether locally or globally so the communication is effective.

4.How can the game be used to educate young generation about the digital citizenship

The game can educate younger generation to access the digital world, there will have "full electronic participation in society" It will give them basic skill to access technology and it will improve their communication skills because on the game communication is used so that the goals of the game are archived as planned.(digitalcitizenship.net)

The game can decrease the digital divide among society because if the younger generation grow up having the knowledge, skills and infrastructure to access the digital world a digital dive among society may be reduced.(IIE module manual)

The young stars will learn on how to be responsible when using the internet and we can avoid things such as cyber bullying and taking other people intellectual property without acknowledgement, it will promote a good responsibility on the generation itself so that they be accountable when exploring and surfing the internet.(globaldigitalcitizen.org)


References


The Independent institute of Education.2015.Digital citizenship module manual 2015. First edition. unpublished

Global digital citizen foundation.Digital citizenship school program.2015.[online].Available at: http://globaldigitalcitizen.org/digital-citizenship-school-program

Digital citizenship.Using technology appropriately.2015.[online].Available at:http://www.digitalcitizenship.net/Nine_Elements.html






9 elements of digital citizenship


Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use.  

1.   Digital Access:   full electronic participation in society. 
Technology users need to be aware that not everyone has the same opportunities when it comes to technology.  Working toward equal digital rights and supporting electronic access is the starting point of Digital Citizenship. Digital exclusion makes it difficult to grow as a society increasingly using these tools. Helping to provide and expand access to technology should be goal of all digital citizens.  Users need to keep in mind that there are some that may have limited access, so other resources may need to be provided.  To become productive citizens, we need to be committed to make sure that no one is denied digital access. (digitalcitizenship.net)  

2.   Digital Commerce:   electronic buying and selling of goods
Technology users need to understand that a large share of market economy is being done electronically. Legitimate and legal exchanges are occurring, but the buyer or seller needs to be aware of the issues associated with it. The mainstream availability of Internet purchases of toys, clothing, cars, food, etc. has become commonplace to many users. At the same time, an equal amount of goods and services which are in conflict with the laws or morals of some countries are surfacing (which might include activities such as illegal downloading, pornography, and gambling). Users need to learn about how to be effective consumers in a new digital economy. 
(digitalcitizenship.net)  

3.   Digital Communication:   electronic exchange of information. 
One of the significant changes within the digital revolution is a person’s ability to communicate with other people. In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging).  The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else. Now everyone has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communication options.(digitalcitizenship.net) 

4.   Digital Literacy:   process of teaching and learning about technology and the use of technology. 
While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used. New technologies are finding their way into the work place that are not being used in schools (e.g., Videoconferencing, online sharing spaces such as wikis). In addition, workers in many different occupations need immediate information (just-in-time information). This process requires sophisticated searching and processing skills (i.e., information literacy). Learners must be taught how to learn in a digital society. In other words, learners must be taught to learn anything, anytime, anywhere.  Business, military, and medicine are excellent examples of how technology is being used differently in the 21st century. As new technologies emerge, learners need to learn how to use that technology quickly and appropriately. Digital Citizenship involves educating people in a new way— these individuals need a high degree of information literacy skills.
(digitalcitizenship.net) 

5. Digital Etiquette:   electronic standards of conduct or procedure.Technology users often see this area as one of the most pressing problems when dealing with Digital Citizenship. We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct).   Many people feel uncomfortable talking to others about their digital etiquette.  Often rules and regulations are created or the technology is simply banned to stop inappropriate use. It is not enough to create rules and policy, we must teach everyone to become responsible digital citizens in this new society.(digitalcitizenship.net)

6.   Digital Law:   electronic responsibility for actions and deeds 
Digital law deals with the ethics of technology within a society. Unethical use manifests itself in form of theft and/or crime. Ethical use manifests itself in the form of abiding by the laws of society. Users need to understand that stealing or causing damage to other people’s work, identity, or property online is a crime. There are certain rules of society that users need to be aware in a ethical society. These laws apply to anyone who works or plays online. Hacking into others information, downloading illegal music, plagiarizing, creating destructive worms, viruses or creating Trojan Horses, sending spam, or stealing anyone’s identify or property is unethical.(digitalcitizenship.net)

7.   Digital Rights & Responsibilities:   those freedoms extended to everyone in a digital world.Just as in the American Constitution where there is a Bill of Rights, there is a basic set of rights extended to every digital citizen. Digital citizens have the right to privacy, free speech, etc. Basic digital rights must be addressed, discussed, and understood in the digital world.  With these rights also come responsibilities as well.  Users must help define how the technology is to be used in an appropriate manner.  In a digital society these two areas must work together for everyone to be productive. (digitalcitizenship.net)

8.   Digital Health & Wellness:   physical and psychological well-being in a digital technology world.
Eye safety, repetitive stress syndrome, and sound ergonomic practices are issues that need to be addressed in a new technological world.  Beyond the physical issues are those of the psychological issues that are becoming more prevalent such as Internet addiction.  Users need to be taught that there are inherent dangers of technology. Digital Citizenship includes a culture where technology users are taught how to protect themselves through education and training. (digitalcitizenship.net)

9.   Digital Security (self-protection):   electronic precautions to guarantee safety. 
In any society, there are individuals who steal, deface, or disrupt other people. The same is true for the digital community. It is not enough to trust other members in the community for our own safety. In our own homes, we put locks on our doors and fire alarms in our houses to provide some level of protection. The same must be true for the digital security. We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.


References

Digital citizenship.2015.using technology appropriately.[online].Available at:  http://www.digitalcitizenship.net/Nine_Elements.html

Digital literacy and information fluency(continued)

4 The veracity of the series

The series of the websites are in fact true stories because documentation of the animals are made in reality videos and shows to proof that information regarding the information of the animals and you  can access the videos on the website as their shown but for the PR campaign there is no evidence that there was mermaids. (blogs.discovery.com)

5 The animal planet campaign

The success of the PR campaign, I think it was not a success because the campaign of the website is no longer available on the website if you search it and with the information fluency  the facts of the campaign lacked in terms of evidence that means that the site was less durable so it no longer exists.(animalplanet.com)




Source: http://www.google.co.za/imgres?imgurl=http://tvbythenumbers.zap2it.com/wp-content/uploads/2013/04/animal-planet-river-monsters-photo011.jpg&imgrefurl=http://interviewly.com/i/jeremy-wade-apr-2015-reddit&h=312&w=468&tbnid=8tNJGzdGfPjxdM:&zoom=1&docid=BD4UyDXFjBeoJM&ei=Fvl3VajGL-yU7QaQtoDICA&tbm=isch&ved=0CCIQMygHMAdqFQoTCKipr6TehMYCFWxK2wodEBsAiQ

References

Animal planet.2015.bites.[online].Available at: http://blogs.discovery.com/bites-animal-planet/

Animal planet.2015.animal planet beta.[online]. Available at: http://www.animalplanet.com/search/?terms=The+discovery+of+mermaids&pg=2

Digital security

Digital security

Security issues

Cloud computing is considered a big security issues because from a security perspective, cloud-based computing still has to address several vulnerabilities before it can be considered the ideal answer to modern computing needs.(pmaconsulting.co.za)
One of the main issues is the nature of so-called “multi-tenant” clouds. A large number of different companies may all have their data and applications on a single cloud – and you won’t have any way of telling who’s sharing your cloud with you. You might even be sharing a cloud with your main competitors.(pmaconsulting.co.za)
If a single tenant’s application has a security flaw, there’s the potential that an attacker who manages to exploit this flaw will gain access not only to that tenant’s data and systems, but to yours too because you data will be stored from the server that is being attakced
Another security concern is that using cloud-based services involves handing your potentially sensitive data to an external third party, in the form of the service provider so your information is no longer secured as it was when you had it in your computer.(pmaconsulting.co.za)

Types of cyber crimes

1. THEFT OF TELECOMMUNICATIONS SERVICES
This cyber crime is the one in which phone breakers break into telecommunications of an organisation or company. criminals organisations can obtain access to dial-dial circuits and then make their own calls or sell call time to third parties (Gold 1999). Offenders may gain access to the switchboard by impersonating a technician, by fraudulently obtaining an employee's access code, or by using software available on the internet. Some sophisticated offenders loop between PBX systems to evade detection. Additional forms of service theft include capturing "calling card" details and on-selling calls charged to the calling card account, and counterfeiting or illicit reprogramming of stored value telephone cards.(www.crime.hku.uk)

2. TELECOMMUNICATIONS PIRACY
Digital technology permits perfect reproduction and easy dissemination of print, graphics, sound, and multimedia combinations. The temptation to reproduce copyrighted material for personal use, for sale at a lower price, or indeed, for free distribution, has proven irresistible to many.(www.crime.hku.uk)

3. ELECTRONIC MONEY LAUNDERING AND TAX EVASION
For some time now, electronic funds transfers have assisted in concealing and in moving the proceeds of crime. Emerging technologies will greatly assist in concealing the origin of ill-gotten gains. Legitimately derived income may also be more easily concealed from taxation authorities. Large financial institutions will no longer be the only ones with the ability to achieve electronic funds transfers transiting numerous jurisdictions at the speed of light. The development of informal banking institutions and parallel banking systems may permit central bank supervision to be bypassed, but can also facilitate the evasion of cash transaction reporting requirements in those nations which have them. Traditional underground banks, which have flourished in Asian countries for centuries, will enjoy even greater capacity through the use of telecommunications.(www.crime.hku.uk)

4. SALES AND INVESTMENT FRAUD
As electronic commerce becomes more prevalent, the application of digital technology to fraudulent endeavors will be that much greater. The use of the telephone for fraudulent sales pitches, deceptive charitable solicitations, or bogus investment overtures is increasingly common. Cyberspace now abounds with a wide variety of investment opportunities, from traditional securities such as stocks and bonds, to more exotic opportunities such as coconut farming, the sale and leaseback of automatic teller machines, and worldwide telephone lotteries (Cella and Stark 1997 837-844). Indeed, the digital age has been accompanied by unprecedented opportunities for misinformation. Fraudsters now enjoy direct access to millions of prospective victims around the world, instantaneously and at minimal cost.(www.crime.hku.uk)

5. ELECTRONIC FUNDS TRANSFER FRAUD
Electronic funds transfer systems have begun to proliferate, and so has the risk that such transactions may be intercepted and diverted. Valid credit card numbers can be intercepted electronically, as well as physically; the digital information stored on a card can be counterfeited.(crime.hku.uk)


How cyber crime can be prevented or reduced

Prevention step one: education and training

You need to train your employees to learn about the access of the organisation network and the information of the organisation because making them aware of the cyber crime so that you are protected from the cyber crime.(forbes.com)

Prevention step two: securing computers, digital assets and networking

Update your software protection regularly like the intrusion prevention system and anti-viruses software's because if your not protected it is easy for cyber hackers to access your system and intrude so you must be always safe by being updated on your software.(forbes.com)


Images for creative common licences




Source: http://www.google.co.za/imgres?imgurl=http://maconeastlibraryprojects.wikispaces.com/file/view/creatvie_commons_picture.png/294338428/creatvie_commons_picture.png&imgrefurl=http://maconeastlibraryprojects.wikispaces.com/Creative%2BCommons%2BLicenses&h=437&w=508&tbnid=EHFxad5ZE1itGM:&zoom=1&docid=zUCgHF64KeobDM&ei=8_Z3VdygPIWy7QaU6YKAAg&tbm=isch&ved=0CBsQMygAMABqFQoTCJzm0Z_chMYCFQVZ2wodlLQAIA

References

Australian Institute of criminology.2015.9 types of cyber crime.[online].Available at: http://www.crime.hku.hk/cybercrime.htm

PM&A.2014.Cloud computing: why is security  an issue?.[online].Available at: http://pmaconsulting.co.za/news/cloud-computing-why-security-issue

Forbes.2013.How to prevent cyber crime.[online].Available at:http://www.forbes.com/sites/thesba/2013/08/28/how-to-prevent-cyber-crime/













Digital commerce

Digital commerce

1 History of digital commerce

One of the most popular activities on the Web is shopping. It has much allure in it — you can shop at your leisure, anytime, and in your pajamas. Literally anyone can have their pages built to display their specific goods and services.
History of ecommerce dates back to the invention of the very old notion of "sell and buy", electricity, cables, computers, modems, and the Internet. Ecommerce became possible in 1991 when the Internet was opened to commercial use. Since that date thousands of businesses have taken up residence at web sites.
At first, the term ecommerce meant the process of execution of commercial transactions electronically with the help of the leading technologies such as Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT) which gave an opportunity for users to exchange business information and do electronic transactions. The ability to use these technologies appeared in the late 1970s and allowed business companies and organizations to send commercial documentation electronically.
Although the Internet began to advance in popularity among the general public in 1994, it took approximately four years to develop the security protocols (for example, HTTP) and DSL which allowed rapid access and a persistent connection to the Internet. In 2000 a great number of business companies in the United States and Western Europe represented their services in the World Wide Web. At this time the meaning of the word ecommerce was changed. People began to define the term ecommerce as the process of purchasing of available goods and services over the Internet using secure connections and electronic payment services. Although the dot-com collapse in 2000 led to unfortunate results and many of ecommerce companies disappeared, the "brick and mortar" retailers recognized the advantages of electronic commerce and began to add such capabilities to their web sites (e.g., after the online grocery store Webvan came to ruin, two supermarket chains, Albertsons and Safeway, began to use ecommerce to enable their customers to buy groceries online). By the end of 2001, the largest form of ecommerce, Business-to-Business (B2B) model, had around $700 billion in transactions.(Kenneth C and Carol G,2008)

According to all available data, ecommerce sales continued to grow in the next few years and, by the end of 2007, ecommerce sales accounted for 3.4 percent of total sales.
Ecommerce has a great deal of advantages over "brick and mortar" stores and mail order catalogs. Consumers can easily search through a large database of products and services. They can see actual prices, build an order over several days and email it as a "wish list" hoping that someone will pay for their selected goods. Customers can compare prices with a click of the mouse and buy the selected product at best prices.
Online vendors, in their turn, also get distinct advantages. The web and its search engines provide a way to be found by customers without expensive advertising campaign. Even small online shops can reach global markets. Web technology also allows to track customer preferences and to deliver individually-tailored marketing.(Kenneth C and Carol G,2008)

History of ecommerce is unthinkable without Amazon and Ebay which were among the first Internet companies to allow electronic transactions. Thanks to their founders we now have a handsome ecommerce sector and enjoy the buying and selling advantages of the Internet. Currently there are 5 largest and most famous worldwide Internet retailers: Amazon, Dell, Staples, Office Depot and Hewlett Packard. According to statistics, the most popular categories of products sold in the World Wide Web are music, books, computers, office supplies and other consumer electronics.(Kenneth C and Carol G,2008)

Amazon.com, Inc. is one of the most famous ecommerce companies and is located in Seattle, Washington (USA). It was founded in 1994 by Jeff Bezos and was one of the first American ecommerce companies to sell products over the Internet. After the dot-com collapse Amazon lost its position as a successful business model, however, in 2003 the company made its first annual profit which was the first step to the further development.
At the outset Amazon.com was considered as an online bookstore, but in time it extended a variety of goods by adding electronics, software, DVDs, video games, music CDs, MP3s, apparel, footwear, health products, etc. The original name of the company was Cadabra.com, but shortly after it become popular in the Internet Bezos decided to rename his business "Amazon" after the world's most voluminous river. In 1999 Jeff Bezos was entitled as the Person of the Year by Time Magazine in recognition of the company's success. Although the company's main headquarters is located in the USA, WA, Amazon has set up separate websites in other economically developed countries such as the United Kingdom, Canada, France, Germany, Japan, and China. The company supports and operates retail web sites for many famous businesses, including Marks & Spencer, Lacoste, the NBA, Bebe Stores, Target, etc.(Kenneth C and Carol G,2008)

Amazon is one of the first ecommerce businesses to establish an affiliate marketing program, and nowadays the company gets about 40% of its sales from affiliates and third party sellers who list and sell goods on the web site. In 2008 Amazon penetrated into the cinema and is currently sponsoring the film "The Stolen Child" with 20th Century Fox.
According to the research conducted in 2008, the domain Amazon.com attracted about 615 million customers every year. The most popular feature of the web site is the review system, i.e. the ability for visitors to submit their reviews and rate any product on a rating scale from one to five stars. Amazon.com is also well-known for its clear and user-friendly advanced search facility which enables visitors to search for keywords in the full text of many books in the database.(Kenneth C and Carol G,2008)

One more company which has contributed much to the process of ecommerce development is Dell Inc., an American company located in Texas, which stands third in computer sales within the industry behind Hewlett-Packard and Acer.
Launched in 1994 as a static page, Dell.com has made rapid strides, and by the end of 1997 was the first company to record a million dollars in online sales. The company's unique strategy of selling goods over the World Wide Web with no retail outlets and no middlemen has been admired by a lot of customers and imitated by a great number of ecommerce businesses. The key factor of Dell's success is that Dell.com enables customers to choose and to control, i.e. visitors can browse the site and assemble PCs piece by piece choosing each single component based on their budget and requirements. According to statistics, approximately half of the company's profit comes from the web site.
In 2007, Fortune magazine ranked Dell as the 34th-largest company in the Fortune 500 list and 8th on its annual Top 20 list of the most successful and admired companies in the USA in recognition of the company's business model.
History of ecommerce is a history of a new, virtual world which is evolving according to the customer advantage. It is a world which we are all building together brick by brick, laying a secure foundation for the future generations.(Kenneth C and Carol G,2008


2 The importance of being informed

The importance of being formed with digital commerce is because in this world we live in today digital commerce is evolving rapidly and people are now moving to e commerce because it makes things easily and convenient when it comes to shopping so people must be informed so that they move one step with technology because shopping online is easy than ever.

3 Plagiarism guidelines

Guideline 1: An ethical writer ALWAYS acknowledges the contributions of others and the source of his/her ideas.
Guideline 2: Any verbatim text taken from another author must be enclosed in quotation marks.
Guideline 3: We must always acknowledge every source that we use in our writing; whether we paraphrase it, summarize it, or enclose it quotations.
Guideline 4: When we summarize, we condense, in our own words, a substantial amount of material into a short paragraph or perhaps even into a sentence.
Guideline 5: Whether we are paraphrasing or summarizing we must always identify the source of the information.
Guideline 6: When paraphrasing and/or summarizing others’ work we must reproduce the exact meaning of the other author’s ideas or facts using our words and sentence structure.
Guideline 7: In order to make substantial modifications to the original text that result in a proper paraphrase, the author must have a thorough understanding of the ideas and terminology being used.
Guideline 8: A responsible writer has an ethical responsibility to readers, and to the author/s from whom s/he is borrowing, to respect others’ ideas and words, to credit those from whom we borrow, and whenever possible, to use one’s own words when paraphrasing.
Guideline 9: When in doubt as to whether a concept or fact is common knowledge, provide a citation.
Guideline 10: Authors who submit a manuscript for publication containing data, reviews, conclusions, etc., that have already been disseminated in some significant manner (e.g., published as an article in another journal, presented at a conference, posted on the internet) must clearly indicate to the editors and readers the nature of the previous dissemination.
Guideline 11: Authors of complex studies should heed the advice previously put forth by Angell & Relman (1989). If the results of a single complex study are best presented as a ‘cohesive’ single whole, they should not be partitioned into individual papers. Furthermore, if there is any doubt as to whether a paper submitted for publication represents fragmented data, authors should enclose other papers (published or unpublished) that might be part of the paper under consideration (Kassirer & Angell, 1995). Similarly, old data that have been merely augmented with additional data points and that are subsequently presented as a new study can be an equally serious ethical breach.
Guideline 12: Because some instances of plagiarism, self-plagiarism, and even some writing practices that might otherwise be acceptable (e.g., extensive paraphrasing or quoting of key elements of a book) can constitute copyright infringement, authors are strongly encouraged to become familiar with basic elements of copyright law.
Guideline 13: While there are some situations where text recycling is an acceptable practice, it may not be so in other situations. Authors are urged to adhere to the spirit of ethical writing and avoid reusing their own previously published text, unless it is done in a manner consistent with standard scholarly conventions (e.g., by using of quotations and proper paraphrasing).
Guideline 14: Authors are strongly urged to double-check their citations. Specifically, authors should always ensure that each reference notation appearing in the body of the manuscript corresponds to the correct citation listed in the reference section and vice versa and that each source listed in the reference section has been cited at some point in the manuscript. In addition, authors should also ensure that all elements of a citation (e.g., spelling of authors’ names, volume number of journal, pagination) are derived directly from the original paper, rather than from a citation that appears on a secondary source. Finally, authors should ensure that credit is given to those authors who first reported the phenomenon being studied.
Guideline 15: The references used in a paper should only be those that are directly related to its contents. The intentional inclusion of references of questionable relevance for purposes of manipulating a journal’s or a paper’s impact factor or a paper’s chances of acceptance is an unacceptable practice.
Guideline 16: Authors should follow a simple rule: Strive to obtain the actual published paper. When the published paper cannot be obtained, cite the specific version of the material being used, whether it is conference presentation, abstract, or an unpublished manuscript.

Guideline 17Generally, when describing others’ work, do not rely on a secondary summary of that work. It is a deceptive practice, reflects poor scholarly standards, and can lead to a flawed description of the work described. Always consult the primary literature.
Guideline 18: If an author must rely on a secondary source (e.g., textbook) to describe the contents of a primary source (e.g., an empirical journal article), s/he should consult writing manuals used in his or her discipline to follow the proper convention to do so. Above all, always indicate the actual source of the information being reported.
Guideline 19: When borrowing heavily from a source, authors should always craft their writing in a way that makes clear to readers, which ideas are their own and which are derived from the source being consulted.
Guideline 20: When appropriate, authors have an ethical responsibility to report evidence that runs contrary to their point of view. In addition, evidence that we use in support of our position must be methodologically sound. When citing supporting studies that suffer from methodological, statistical, or other types of shortcomings, such flaws must be pointed out to the reader.
Guideline 21: Authors have an ethical obligation to report all aspects of the study that may impact the independent replicability of their research.
Guideline 22: Researchers have an ethical responsibility to report the results of their studies according to their a priori plans. Any post hoc manipulations that may alter the results initially obtained, such as the elimination of outliers or the use of alternative statistical techniques, must be clearly described along with an acceptable rationale for using such techniques.
Guideline 23: Authorship determination should be discussed prior to commencing a research collaboration and should be based on established guidelines, such as those of the International Committee of Medical Journal Editors.
Guideline 24: Only those individuals who have made substantitve contributions to a project merit authorship in a paper.
Guideline 25: Faculty-student collaborations should follow the same criteria to establish authorship. Mentors must exercise great care to neither award authorship to students whose contributions do not merit it, nor to deny authorship and due credit to the work of students.
Guideline 26: Academic or professional ghost authorship in the sciences is ethically unacceptable.
(ori.hhs.gov)

References



The office research integrity.2015.26 Guidelines at glance on avoiding plagiarism.2015.[online].Available at: https://ori.hhs.gov/plagiarism-0 


Kenneth C. Laudon, Carol G. Traver (2008). E-Commerce: Business, Technology, Society, Second Edition (Hardcover).


Jim Collins (2001). Good to Great: Why Some Companies Make the Leap... and Others Don't.









Digital rights and responsibilities