Monday, 30 May 2016

Q.2

At information fluency we have establish that the are lot of webside and pages available at the intenet, with more and more being added every day.As a results of this repidly increasing information, facts become absolete far quicker, with the knowledge built on those facts becoming less durable.
THE PROCESS
The process involve  the following:

1. ASK:ask good questions so that you get good answers, this means that when you enter the key words in the search box be clear and concise
2. ACQUIRE: This step involving determining where the information is, prioritising the search strategy, skimming, scanning and scouring the resources; filtering through the results and taking smart notes. Sometimes it means going back to the first step: Ask in order to refine the results and information
3. ANALYSE: The results of the search will yield raw information and data that in turn need to be analysed. authenticated and arranged to make a cohesive picture. This involves organising, triangulating and summarising the various source. Here it is important to separate facts from fiction and opinion. The elements identified in the previous section; webside verification, are used in this step. After analysing the sources knowledge is created.
4. APPLY: The user will now be able to apply that knowledge to the real world problem they are faced with.
5. ASSESS: This when the user will look at the results of their application and the process they followed. It involved asking questions about the process used, the steps followed and the information that was obtain, reflecting on what went well and what could have been done better.

Q.6 ONLINE POSTER FOR YOUR STUDY INSTITUTION TO WARN STUDENTS OF THE POTENTIAL IMPACTS OF DIGITAL TECHNOLOGY ON SOCIETY



Using social media Web sites is among the most common activity of today's children and adolescents. Any Web site that allows social interaction is considered a social media site, including social networking sites such as Facebook, MySpace, and Twitter; gaming sites and virtual worlds such as Club Penguin, Second Life, and the Sims; video sites such as YouTube; and blogs. Such sites offer today's youth a portal for entertainment and communication and have grown exponentially in recent years. For this reason, it is important that parents become aware of the nature of social media sites, given that not all of them are healthy environments for children and adolescents. Pediatricians are in a unique position to help families understand these sites and to encourage healthy use and urge parents to monitor for potential problems with cyberbullying, “Facebook depression,” sexting, and exposure to inappropriate content

 The creation of sites like Facebook, many people are giving their personal information out on the internet. Most users are not aware that they can modify the privacy settings and unless they modify them, their information is open to the public. Sites such as Facebook and Twitter have grown popular by broadcasting status updates featuring personal information such as location. Some applications border on "cyberstalking." This has redefined the role of Internet privacy as overlapping with that of security.
Some applications are explicitly centered on "cyberstalking." An application named "Creepy" can track a person's location on a map using photos uploaded to Twitter or Flickr. When a person uploads photos to a social networking site, others are able to track their most recent location. Some smart phones are able to embed the longitude and latitude coordinates into the photo and automatically send this information to the application. Anybody using the application can search for a specific person and then find their immediate location. This poses many potential threats to users who share their information with a large group of followers.[5]
Facebook "Places," is a Facebook service, which publicizes user location information to the networking community. Users are allowed to "check-in" at various locations including retail stores, convenience stores, and restaurants. Also, users are able to create their own "place," disclosing personal information onto the Internet. This form of location tracking is automated and must be turned off manually. Various settings must be turned off and manipulated in order for the user to ensure privacy. According to epic.org, Facebook users are recommended to: (1) disable "Friends can check me in to Places," (2) customize "Places I Check In," (3) disable "People Here Now," and (4) uncheck "Places I've Visited.".[6] Moreover, the Federal Trade Commission has received two complaints in regards to Facebook’s "unfair and deceptive" trade practices, which are used to target advertising sectors of the online community. "Places" tracks user location information and is used primarily for advertising purposes. Each location tracked allows third party advertisers to customize advertisements that suit one’s interests. Currently, the Federal Trade Commissioner along with the Electronic Privacy Information Center are shedding light on the issues of location data tracking on social networking sites.Image result for IMAGES TO WARN STUDENTS ABOUT POTENTIAL IMPACTS OF DIGITAL TECHNOLOGY ON SOCIETY






consequences of digital divice in south africa

digital divide is an economic and social inequality with regard to access to, use of, or impact ofinformation and communication technologies (ICT).[1] The divide within countries (such as the digital divide in South Africa) may refer to inequalities between individuals, households, businesses, or geographic areas, usually at different socioeconomic levels or other demographic categories. The divide between differing countries or regions of the world is referred to as the global digital divide,[1][2]examining this technological gap between developing and developed countries on an international 

QUESTION5



 The definition of digital rights and responsibilities is having the right and freedom to use all types of digital technology while using the technology in an acceptable and appropriate manner. As a user of digital technology, you also have the right to privacy and the freedom of personal expression


children have the right to be educated and to you technology.

IMAGES OF DIGITAL RIGHTS AND RESPONSIBILITY FOR SOCIETY, EDUCATION AND BUSINESS
Image result for IMAGES OF DIGITAL RIGHTS AND RESPONSIBILITY FOR SOCIETY, EDUCATION AND BUSINESSAll children have the rights to be educated and be able to use technology


Image result for IMAGES OF DIGITAL RIGHTS AND RESPONSIBILITY FOR SOCIETY, EDUCATION AND BUSINESSThe business have the rights to communicate with each other and be safe at work place
Image result for IMAGES OF DIGITAL RIGHTS AND RESPONSIBILITY FOR SOCIETY, EDUCATION AND BUSINESSThe society have the right to be safe and work together as one








Question3 SOCIAL ECONOMY

BENEFITS AND RISKS OF SOCIAL TECHNOLOGIES FOR INDIVIDUALS, CORPORATES
AND COMMUNITIES ON SOUTH AFRICA


For people, the benefits of digital communication would be that it is convenient, it is quick for the message to be communicated and it is cheap . In South Africa, the postal service is not as efficient as the postal service in the United Kingdom for example, South Africans use mostly email and other social network to communicate with people around the globe. 
 Around the world there is also risks of using social networks technologies to communicate. e.g you should be very careful as to what to comment and post on your social nertwork because it can be used against you. If someone posts private information online like to say where you are the information could be used against you they can kill you or do something bad to you using the information you post.
For corporates, the benefits of digital communication would be that it is convenient, it is easy for them to communicate simultaneously to a large audience and it is cheap to communicate to its customers. In South Africa, a company such as jet  uses its Facebook page to share fashion, its latest deals and special. It also uses its Facebook page to generate ideas and suggestions from its customers in order to make jet a better shopping experience for its valuable customers. For a small business in South Africa such as a hair salon it is working from home because doesn’t have the funds to buy a website, so it uses Facebook to create a page for its business. The page doesn’t cost them anything, it simply provides them with free advertising for their small business. This are benefits of corporates using social technologies.




Q.1.1 and 1.2

Question 1

the role to social capital, knowledge capital and human capital

Social capital is about the value of social networks, bonding similar people and bridging between diverse people, with norms of reciprocity (Dekker and Uslaner 2001[11] ; Uslaner 2001[12] ). Sander (2002, p. 213)[13] stated that ‘the folk wisdom that more people get their jobs from whom they know, rather than what they know, turns out to be true’. Adler and Kwon (2002)[13] identified that the core intuition guiding social capital research is that the goodwill that others have toward us is a valuable resource. As such they define social capital as ‘the goodwill available to individuals or groups. Its source lies in the structure and content of the actor’s social relations. Its effects flow from the information, influence, and solidarity it makes available to the actor’ (Adler and Kwon 2002, p. 23)[13] . Dekker and Uslaner (2001)[13] posited that social capital is fundamentally about how people interact with each other.























Q.1.2 WHAT IS THE TECHNO-ECONOMIC PARADIGM AND HOW CAN ONE DEVELOP FROM THIS

Q.1.2.


According to Sean,2014) Techno-economic paradigm shifts are at the core of general, innovation-based theory of economic and societal development as conceived by Carlota Perez. Her book on the subject, ‘Technological Revolutions and Financial Capital’, is a seminal enunciation of the theory, and has had immense influence on business strategy, state development programs and policy, and academic thinking on the subject.
‘Techno-Economic Paradigms’ presents a series of essays by the leading academics in the field discussing the theory of techno-economic paradigm shifts, and its role in explaining processes of innovation and development. This festschrift honors Carlota Perez, the founder of the theory 'techno-economic paradigm shift

Q,1,3 poster aimed at primary children with the slogan and examples of nine elements of digital citizenship


Image result for CREATE AN ONLINE POSTER TO WARN STUDENTS OF THE POTENTIAL IMPACTS OF DIGITAL TECHNOLOGY OSOCIETY





























Nine Themes of Digital Citizenship

Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use.

1.   Digital Access:   full electronic participation in society.
Technology users need to be aware that not everyone has the same opportunities when it comes to technology.  Working toward equal digital rights and supporting electronic access is the starting point of Digital Citizenship. Digital exclusion makes it difficult to grow as a society increasingly using these tools. Helping to provide and expand access to technology should be goal of all digital citizens.  Users need to keep in mind that there are some that may have limited access, so other resources may need to be provided.  To become productive citizens, we need to be committed to make sure that no one is denied digital access.

2.   Digital Commerce:   electronic buying and selling of goods.
Technology users need to understand that a large share of market economy is being done electronically. Legitimate and legal exchanges are occurring, but the buyer or seller needs to be aware of the issues associated with it. The mainstream availability of Internet purchases of toys, clothing, cars, food, etc. has become commonplace to many users. At the same time, an equal amount of goods and services which are in conflict with the laws or morals of some countries are surfacing (which might include activities such as illegal downloading, pornography, and gambling). Users need to learn about how to be effective consumers in a new digital economy.

3.   Digital Communication:   electronic exchange of information.
One of the significant changes within the digital revolution is a person’s ability to communicate with other people. In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging).  The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else. Now everyone has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communication options.

4.   Digital Literacy:   process of teaching and learning about technology and the use of technology. 
While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used. New technologies are finding their way into the work place that are not being used in schools (e.g., Videoconferencing, online sharing spaces such as wikis). In addition, workers in many different occupations need immediate information (just-in-time information). This process requires sophisticated searching and processing skills (i.e., information literacy). Learners must be taught how to learn in a digital society. In other words, learners must be taught to learn anything, anytime, anywhere.  Business, military, and medicine are excellent examples of how technology is being used differently in the 21st century. As new technologies emerge, learners need to learn how to use that technology quickly and appropriately. Digital Citizenship involves educating people in a new way— these individuals need a high degree of information literacy skills.

5. Digital Etiquette:   electronic standards of conduct or procedure.Technology users often see this area as one of the most pressing problems when dealing with Digital Citizenship. We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct).   Many people feel uncomfortable talking to others about their digital etiquette.  Often rules and regulations are created or the technology is simply banned to stop inappropriate use. It is not enough to create rules and policy, we must teach everyone to become responsible digital citizens in this new society.

6.   Digital Law:   electronic responsibility for actions and deeds 
Digital law deals with the ethics of technology within a society. Unethical use manifests itself in form of theft and/or crime. Ethical use manifests itself in the form of abiding by the laws of society. Users need to understand that stealing or causing damage to other people’s work, identity, or property online is a crime. There are certain rules of society that users need to be aware in a ethical society. These laws apply to anyone who works or plays online. Hacking into others information, downloading illegal music, plagiarizing, creating destructive worms, viruses or creating Trojan Horses, sending spam, or stealing anyone’s identify or property is unethical.

7.   Digital Rights & Responsibilities:   those freedoms extended to everyone in a digital world.Just as in the American Constitution where there is a Bill of Rights, there is a basic set of rights extended to every digital citizen. Digital citizens have the right to privacy, free speech, etc. Basic digital rights must be addressed, discussed, and understood in the digital world.  With these rights also come responsibilities as well.  Users must help define how the technology is to be used in an appropriate manner.  In a digital society these two areas must work together for everyone to be productive.

8.   Digital Health & Wellness:   physical and psychological well-being in a digital technology world.
Eye safety, repetitive stress syndrome, and sound ergonomic practices are issues that need to be addressed in a new technological world.  Beyond the physical issues are those of the psychological issues that are becoming more prevalent such as Internet addiction.  Users need to be taught that there are inherent dangers of technology. Digital Citizenship includes a culture where technology users are taught how to protect themselves through education and training.

9.   Digital Security (self-protection):   electronic precautions to guarantee safety. 
In any society, there are individuals who steal, deface, or disrupt other people. The same is true for the digital community. It is not enough to trust other members in the community for our own safety. In our own homes, we put locks on our doors and fire alarms in our houses to provide some level of protection. The same must be true for the digital security. We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that

might cause disruption or harm.

QUESTION7

DIGITAL SECURITY

RESEARCH 2015 TOP 5 CYBERSECURITY RISKS IN SOUTH AFRICA ALSO DISCUSS HOW USERS ENABLES HACKERS TO OBTAIN THESE DETAILS AND HOW THEY CAN BE AVOIDED

From identity theft and fraud to corporate hacking attacks, cybersecurity has never been more important for businesses, organizations and governments.
Hacking experts warn there are plenty more security risks ahead in 2015 as cyber criminals become more sophisticated. While "traditional" cybercrime such as internet password fraud will still be widespread in 2015, larger scale espionage attacks and hacking the Internet of Things (IoT) will also be risks
CNBC take a look at the biggest threats to your online world in 2015.

Beware: ransomware

Ransomware -- a type of malware which restricts access to the computer system that it infects –will become increasingly sophisticated in its methods and targets, experts at McAfee Labs warned. 
"We predict ransomware variants that manage to evade security software installed on a system will specifically target endpoints that subscribe to cloud-based storage solutions such as Dropbox, Google Drive, and OneDrive. Once the endpoint has been infected, the ransomware will attempt to exploit the logged-on user's stored credentials to also infect backed-up cloud storage data," McAfee's report on 2015 cyber risks noted.
Ransomware encrypts data and McAfee thought attacks on mobile devices and cloud-backed data would increase.
"Ransomware victims will be in for a rude shock when they attempt to access their cloud storage to restore data—only to find their backups have also been encrypted by the ransomware," the experts said.
More worryingly, ransomware attackers will find as many ways as possible to extract ransom payments from victims to release their encrypted data, McAfee warned.

The Internet of Things

The Internet of Things – the connection of physical devices such as home appliances and cars to the internet -- will still be the "Internet of Vulnerabilities," according to cyber experts.
Jamison Nesbitt, founder of Cyber Senate, a community of global cybersecurity business leaders, echoed experts' beliefs who said that the IoT is "the main cybersecurity risk for 2015." "The IoT presents unique security challenges in terms of the number of connected devices present."
"The IoT will be integrated into every market you can think of – from healthcare to the energy industry and transport network but it hasn't been designed with security in mind. There are millions of hackers out there that could compromise these interconnected systems. We have sacrificed security for efficiency"

Cyber-espionage

Cyber espionage is becoming the weapon of choice for many national governments – no matter how tight-lipped they may be about any involvement in such activities to undermine their enemies.
As Nesbitt said, "the next world war will be fought on a keyboard," and we should expect cyber espionage attacks to increase in frequency in 2015, McAfee's "2015 Threat Predictions" report warned.
"Long-term players will become stealthier information gatherers, while newcomers will look for ways to steal money and disrupt their adversaries," McAfee Labs report states, predicting that more small nation states and terror groups will use cyber warfare.

Cyber theft increases

The stealing of financial information is nothing new, with stolen credit or debit card data on the black market a well-established and lucrative business for cyber criminals. 
But as new ways of paying for goods, such as contactless and mobile payments, become the norm for European consumers, there's a new opportunity for hackers – particularly if retailers don't store payment data securely, Symantec told CNBC.
"Although this would require cyber criminals to target individual cards and wouldn't result in large scale breaches or theft like we have seen in the U.S.,the payment technology used won't protect against retailers who aren't storing payment card data securely, and they will still need to be vigilant in protecting stored data," Candid Wüest, threat researcher at Symantec Security Response, said.

Insecure Passwords

Easy-to-crack passwords will continue to be a big risk in 2015, analysts said. "Weaknesses of passwords are known, but still lead to many of the high-profile attacks such as the recent iCloud attack," Symantec's Sian John said. 
"2015 is likely to be the first year when the password starts to be phased out in favour of a number of different multi-factor options. Next year may well be the first year of multi-factor by default," Digital Shadows, a cyber threat intelligence company, told CNBC.
"The mechanisms for password recovery are flawed," John added. "The traditional method of password recovery is asking questions that only you, the real owner, should know. Unfortunately, answers to these questions often can be deduced based on information that can easily be found online -- especially given people's proclivity for "over-sharing" on social media sites.


QUESTION4

1 Bellow are listed 10 examples of Netiquette.

1. Remember the Human -  Never forget that the person reading your communication is actually a person with feelings and can get hurt. Essentially never say anything online that wouldn't say to your reader’s face (Digital Citizenship Module Manual, 2015, 84).
2. Adhere to the same standards of behavior online that you follow in real life - Be ethical in your engagement and know that breaking the law is bad netiquette (Digital Citizenship Module Manual, 2015, 84).
3. Know where you are in cyberspace - The netiquette required will differ from domain to domain. If you are in a forum of experts, your netiquette should reflect respect. Whereas if you are in a chat room with a group of friends (you know in real life) then the netiquette will differ (Digital Citizenship Module Manual, 2015, 84)

4. Respect other people’s time and bandwidth - When sharing files or documents, bear in mind the audience’s bandwidth. Furthermore, make sure you read the FAQs first before asking mundane questions where the answers already exist. If you disagree with a group’s discussion, don’t waste their (or your) time by telling them how stupid they are: Just stay away (Digital Citizenship Module Manual, 2015, 84).
5. Make yourself look good online - Check grammar and spelling before you post. Most people judge others’ intelligence based on the use of grammar and spelling. Only post on things you know about, it is not worth it to look like the fool.
6. Share expert knowledge - Offer answers and help others where you can (Digital Citizenship Module Manual, 2015, 84).
7. Help keep flame wars under control - Don’t respond to flame-bait, don’t post spelling or grammar flames, and apologize if you have done so or perpetuated a flame-war Digital Citizenship Module Manual, 2015, 85).
8. Respect other people’s privacy - Don’t give out other people’s details, online or offline (Digital Citizenship Module Manual, 2015, 85).
9. Don’t abuse your power - The more power you have, the more important it is how you use it (Digital Citizenship Module Manual, 2015, 85).
10. Be forgiving of other people’s mistakes - We were all once beginners and should accept that everyone has to start somewhere (Digital Citizenship Module Manual, 2015, 85).


2 Penalties that apply for failing to meet these rules
1. If these rules are not followed the first step would be to send the user an automatic email stating that they are breaking these rules.
2. The next step would be to limit their time access to the internet.
3. If the rules are still continued to be disobeyed they would then need to attend a disciplinary hearing.
4. If the previous step has not corrected their actions then the final step would be to take legal action against the user.
3 How would you enforce and manage this in your businesss





pictures of etiquette



Image result for images of etiquette
Image result for images of etiquette




Tuesday, 24 May 2016

Q.3.2 FOUR ASPECT OF INTELLIGENCE AND THEIR EXPLANATION

FOUR ASPECT OF INTELLIGENCE AND THEIR EXPLANATION
  1. Ability to grasp information from data: Two people may receive the same information, but one of them is able to comprehend it better and derive meaning from it. This is not necessarily a function of past knowledge, but an ability to recognize patterns in the data and derive conclusions. A person with this ability is best suited to work in analytical situations, being able to process huge amounts of information and make sense from them.
  2. Ability to remember information: This is perhaps a misunderstood aspect of intelligence, and usually negatively associated with exam cramming. However, you can notice differences there too. Some people are able to cram more information than others. Some are able to remember relevant information from long ago. Memory is an essential part of the brain function. A person who is able to operate with large volumes of relevant information easily accessible while working can be highly efficient. Such a person is well suited for technical work. For example, a software developer who is very familiar with the language API’s.
  3. Ability to juggle multiple things: A good soccer player can run down the field with the ball, and also simultaneously remember exactly when and where to pass the ball, because while running, he can visualize where the other players are. Or think of how an aircraft controller works. Many people break down when confronted with multiple things at the same time. The person with the ability to multi-task revels in such situations.
  4. Ability to concentrate on one thing: This seems the opposite of the previous point. But in some cases, the ability to juggle also requires the ability to tune out certain things. The soccer player in the previous example tunes out the thousands of cheering fans, his personal life and whatever happened 5 minutes ago as he runs. The aircraft controller shuts out all the other distractions in the room. By only focusing on the essential, the entire brainpower is devoted to the main task at hand.

Q.4 INAPPROPRIATE DIGITAL CONDUCT AND THE EFFECTS ON SOCIETY

 INAPPROPRIATE DIGITAL CONDUCT AND THE EFFECTS ON SOCIETY

 The phenomenal growth in digital technology and the rise of social media platforms over the past few years have revolutionised the way in which people communicate and share information. The use of social media tools in society around the world has been gaining acceptance in all spheres of society. This provides an opportunity for two-way communication between government and citizens, partners and stakeholders thereby increasing the frequency and speed of engagement. At the same time social media presents new challenges to governments who must address resulting citizen expectations and the differences in communication culture while navigating the blurry line between official and personal use. All around the world, including South Africa, people are embracing digital technology to communicate in ways that could never have been imagined just a few years ago. With this in mind, governments across the world have begun to recognise the need to embrace social media, but are generally still finding their feet in terms of the most effective use of these new communication tools. 1.1 Purpose The purpose of these guidelines are to create awareness of some of the opportunities that social media presents for government, as well as making government agencies and staff aware of how to manage the risks associated with the use of this kind of technology. The guidelines focus on guidance in the use of social media within the South African government communications environment, in order to improve government transparency, participation and interaction with the public. These policy guidelines establish the principles for: • government employees using social media for official government communication purposes; and • personal use of social media by government employees, when the employee‘s government affiliation is identified, known, or presumed. The intention is to provide: • a standard personal responsibility for government employees • an introductory overview of the social media tools that are most likely to be relevant in a South African environment; • the potential benefits and risks associated with these tools; • guidance in best-practice use of social media; brief examples of where such social media tools have been used in government; and 4 GCIS Social Media Guidelines and Resources • general advocacy applications. These guidelines are not an exhaustive user manual or instruction guide on social media or specific social media tools. Government departments or agencies differ when it comes to communication objectives, audience profiles, availability of human and technical resources, Internet use policies and other factors that will dictate if, what, when and how social media is used. Also, the social media environment is an extremely fluid one, and the available tools and applications are constantly evolving to address evolving user needs. An exhaustive user manual would run into hundreds of pages, and generally be redundant before it is published, in terms of accuracy of information. While governments around the world may face some challenges in adopting social media tools, we are convinced that the potential benefits of using selected social media tools far outweigh any risks, and these benefits will continue to grow as more and more South Africans bridge the digital divide. As public servants we have a unique opportunity to step out and be part of the digital revolution, joining a historical transition that allows conversations with the public, rather than simply communicating to them. South African government employees have the same rights of free speech as other citizens when it comes to the use of, and participation in online social media platforms. As public servants, however, government employees have some additional obligations when it comes to sustaining, building and defending the reputation of government through social media.  Social media are powerful communication tools that have a significant impact on institutional and professional reputations. Because they blur the lines between personal voice and institutional voice, the Government Communication and Information System (GCIS) has produced the following policy guidelines to help clarify how best to enhance and protect institutional and personal reputations when participating in social media. The use of social media in a government department will also be governed by the department’s Internet and email policies, which sets out unacceptable behaviour while using the Internet. As technology and social media platforms evolve, this policy and its accompanying handbook of resources will also evolve as our collective experience in the use of social media evolves.Image result for two article that show the example of digital conduct and effect on societyImage result for two article that show the example of digital conduct and effect on society

Q.1.2 HOW DOES THE DIGITAL IMPACT ON SOCIAL CAPITAL, AND WHAT ARE THE RAMIFICATIONS THEREOF


 HOW DOES THE DIGITAL DEVICE IMPACT ON SOCIAL CAPITAL, AND WHAT ARE THE RAMIFICATIONS THEREOF



There are two complementary uses of the 'social capital' concept :-
1) Social contact : Interpersonal communication patterns, including visits,encounters, phone calls, and social events.
2) Civic engagement : The degree to which people become involved in their community, both actively and passively, including such political and organizational activities as political rallies , book and sports club.Digital divide has a negative impact on social capital as due to the use of digital devices ,there has been a decline in actual face to face socialising events. This then leads to people not having effective communication during their conversations. the digital devise impact on social capital, and what are the ramifications thereof.