Email and smart phones can be stressful. Academics are calling this constant work connection “technostress”. Consequently, many European countries are now offering employees the “right to disconnect”. The way email is used is complex, it cannot simply be labelled as “good” or “bad” and research shows that personality, the type of work people do and their goals can influence the way they react t...[Read More]
We educational technologists often have cybersecurity discussions with students, parents and teachers with digital fluency levels ranging from expert to little-to-no knowledge. As parents and teachers we can understandably be fearful of the role of technology in kids’ lives, however this can sometimes be a barrier to student learning.
The mobile and internet-provider, Cell C ,has partnered with Facebook to launch public access Wi-Fi hotspots at the University of the Western Cape (UWC).
It’s a parent’s responsibility to protect their children from harm, no matter where that threat of harm comes from. But what if the threat is a hoax? We’ve seen recently a rollercoaster of panic from parents trying to protect their kids from a supposed online threat known as the Momo challenge, that has for months been debunked as a hoax.
One of the world’s largest website hosting providers, GoDaddy, just launched in South Africa. And they want to get small South African businesses connected.
Instead of being central to the system of decisions that affects us, we are cast out in to its environment. We have progressively restricted our own decision-making capacity and allowed algorithms to take over. We have become artificial humans, or human artefacts, that are created, shaped and used by the technology.
As the internet continues to gain considerable power and agency around the world, many governments have moved to regulate it. And where regulation fails, some states resort to internet shutdowns or deliberate disruptions.
The deluge of cyberattacks sweeping across the world has governments and companies thinking about new ways to protect their digital systems, and the corporate and state secrets stored within. For a long time, cybersecurity experts have erected firewalls to keep out unwanted traffic and set up decoy targets on their networks to distract hackers who do get in. They have also scoured the internet for...[Read More]
When you are asked to create a password – either for a new online account or resetting login information for an existing account – you’re likely to choose a password you know you can remember. Many people use extremely basic passwords, or a more obscure one they reuse across many sites. Our research has found that others – even ones who use different passwords for each site – have a method of devi...[Read More]