WHY STUDY DIGITAL JOURNALISM?
The
field of digital journalism is massive and rapidly expanding. This
brings with it many career opportunities to write online. For example,
eBooks, news articles, blogs, content and other forms of digital
writing.
This course will help you to -
- Improve your writing skills.
- Learn how to create a website.
- Gain an understanding of the modern publishing industry.
This is a very good course for anyone seeking a start in today's publishing industry.
Career Opportunities
It is a must course for writers, Journalists, freelance writers and anyone interested in writing for the web.
Modules
Note that each module in the Qualification - Certificate In Digital Journalism is a short course in its own right, and may be studied separately.
During the course, you will learn more about - How Can Intellectual Property be Protected?
The publishing industry
today creates, manages and often publishes in an electronic format. In
doing so, there are may advantages that publishing did not enjoy in the
past; but there are also vulnerabilities that didn't exist before.
In an electronic format; work becomes vulnerable; and may become accessible in ways that printed material was not accessible.
More Risk but More Opportunity
There is no doubt that
anything you write and publish in a digital format is subject to being
plaigarized (more today than ever). At the same time though; the
opportunities for electronic journalism are stronger because of digital
publishing. Writers and publishers who embrace digital publishing are
still protected by laws that grant them ownership of their work; and in
the places where that ownership counts most, they are still able to
enforce their position. Don't be scared by the risks -to do so only
limits your career or business opportunities.
Information
security is a very broad topic and covers a lot of categories. The
easiest way to define information security is by restricting access from
unauthorised people to confidential data, so that they cannot read,
modify or delete data not intended for them.
ETHICAL ISSUES
When we think about ethics, we think about having an understanding of
what is right and wrong – that is a ‘society’ accepted proper course of
action in a given situation. Ethics and ethical standards can be applied
to any situation.
Ethics in business are specifically about developing business or company
values. The ethics of any business are a guide to what is appropriate
and what is not within the scope of that particular business. Ethics of
IT professionals are extremely important for a number of factors, mostly
because of the nature of data and information which can be accessed.
The next part of this lesson is an outline of ethics which are relevant
to IT professionals.
Ethical issues facing IT professionals
There are many ethical issues facing IT professionals nowadays, most of
them involve data privacy and data security, but others are ownership,
control and accuracy.
Some examples include:
- Given that network
and system administrators in most organisations would generally have
access to the e-mails of all the employees, is it okay for them to read
some of those emails, just because they can? Would it be okay to read
those emails as a security measure, to make sure that employees are not
disclosing confidential and private company information to unauthorised
people?
- If the system
administrators read emails from the employees working in their company,
should they disclose this policy to them or not? If they should, is it
better to do it before or after they’ve read their private emails?
- Are system administrators allowed to monitor and keep a log of the websites visited by the employees?
- Some network and
system administrators might decide to install key logger and screen
capture software on all or selected computers on the network to capture
and save all what the employees type and view. Is it ethical to do so?
Should they notify the users that they are being watched?
- Is it okay for system
administrators to access documents, files and personal photos of other
employees when they are stored on their work computers or on the file
servers?
Legal issues facing IT professionals
There are multiple threats to information systems. The most important ones are listed below:
- Collecting and using information in an illegal way,
- Developing and distributing software which can break information systems,
- Having information leaks in visual channels, electric channels, radio channels, and other technical channels,
- Damaging or stealing computer systems or other IT equipment,
- Intercepting data in computer networks and lines of communication,
- Accessing database information by unauthorised personnel,
- Distributing data in such a way as to cause an infringement of the legal restrictions set for information distribution.
The
necessity to have adequate information legislation in place is crucial
to the successful application of information technology in organisations
and businesses. Although current laws are not able to cover all the
problems related to information technology, successful information
legislation should be developed in order to address and regulate the
legal relationship of information collection, processing, saving and
usage, therefore it is vital for governments and legal agencies to
realise efficient measures which ensure information security
maintenance.
There are many components involved in developing complete information
security for information systems. The most important component in
information security is the protection of information captured, stored
and flowing in computer systems and computer networks. As a result,
criminal laws and legislative laws should be able to endorse the
protection of information on computer systems and networks, and these
laws must be subject to constant reviews and improvements. Such reviews
and improvements are required because of the ever-changing nature of
information systems and information security and the emergence of more
sophisticated types of attacks.
Information security is not only limited to taking measures to protect
information; it also includes a wide range of actions (technical
actions, organisational actions, etc.) such as:
- establishing and improving the information system,
- developing, using and improving the means for a better information security,
- efficiently monitoring information security and reporting any infringements,
- developing protected and secure telecommunication systems,
- standardising the means for information security and data protection.
With
sufficient financing and adequate legislative actions and laws, it is
possible to achieve higher information security. High level security can
also be achieved by fulfilling complex actions deemed necessary by
stakeholders.
What Next?
If you are interested in improving your journalism skills to write online, then are so many opportunities.
Study this specialist course to improve your job and career prospects in journalism.
Improve your writing skills!