unit 10 communication, collaboration, and safety
TRANSCRIPT
Define time-shifted & real-time communication methods
Describe the features & proper use of blogging, text messaging, and chatting
Describe the features & proper use of social media sites
Identify advantages & disadvantages of electronic communication
Identify guidelines for creating effective personal and professional electronic communication
Objectives
Delay between transmission & receipt of info
Blog, Email, Discussion Board
What’s the purpose of a blog?
Follow netiquette◦ Good manners & behavior over Internet
Time-Shifting Communication
Need real-time?◦ Use IM, chat room, webcam
Need a paper trail?◦ Use Email, text◦ Most widely used
Distance Learning?◦ Video Conference
Other◦ Blog, message board, social media
Communication Methods
Instant or no delay
Texting/IM◦ Conversational ◦ SMS (short messaging service)
Up to 160 characters◦ MMS (multimedia messaging service)
Added multimedia (pictures/video/etc.) No limit on characters but could be split up
◦ iMessage Chatting VoIP Podcast Web/video conference/video chat
Real-Time Communication
Keep in touch with friends, find people with similar interests, build relationships online
Facebook, Twitter, Instagram, YouTube, Google+, LinkedIn
Social Media
Netiquette & rules for communication
Each group will list rules for their given communication method
Project
Connect to people worldwide Speed Low cost/free Access from various devices, cell, or computer Transmit text, graphics, video, audio Forwarding of messages can be done Collaborate & share documents You can keep track of sites visited
◦ Stored on your computer
One to one popular: Email
Advantages of Electronic Communication
Attachments◦ Size may be too big/too many◦ Virus◦ Blocked by program
Delivery Failure◦ Bounced
Mistyped address Virus detected/spam filter You’ve been blocked by receiver Their mailbox is full
Problems with Electronic Communication: Email Issues
Written record or history◦ Can be used in legal cases◦ You may need proof◦ Email can provide that
Phone/audio conferences can’t
Problems with Electronic Communication: Paper Trail
Say something you wish you could take back
You get an email that makes you angry◦ Discuss with someone/calm down◦ Write email & leave out To: address until sure◦ Save as draft & wait a day
Reply, Reply All
Proper spelling & grammar
Problems w/ Electronic Comm.: Hasty Responses
Face to face or letter may be better than electronic
Content, tone, format must be appropriate for the audience
Respond to message promptly Statements can harm people
◦ Flaming◦ Cyberbullying◦ Slander◦ Libel
Effective Communications
Spam◦ Unsolicited ads◦ Don’t reply to junk emails
Typically, an e-mail message is sent to multiple recipients who did not ask to receive it.
E-mail messages are not considered spam if a user has signed up to receive them.
Unwanted Email
Estimated 80% of email is spam
1978 - An e-mail spam is sent to 600 addresses
1994 - First large-scale spam sent to 6000 newsgroups, reaching millions of people.
2005 - 30 billion per day
2006 - 55 billion per day
2010- Spam is 92% of email sent
Spam Facts- FYI
Be careful giving out your email◦ Do not publish it online
Check privacy statements◦ They may share your email address
DO NOT reply to junk mails◦ They’ll know they have a valid email address◦ You’ll get more junk!
Use the junk email filter
Spam
Steals your personal info ◦ Spoofed sites & emails
Emails that appear to come from original source Asks you to change password Link takes you to copied site User collects your info
Phishing
How does it arrive? Spam: Sneaks in the back door Phishing: Walks in the front door
How does it make its offer? Spam: Looks bad, seems far-fetched Phishing: Looks plausible, seems credible
What is it trying to do? Spam: Tries to sell you something Phishing: Tries to steal something from you
Spam vs. Phishing
What’s worse, spam or phishing?
Let’s Play◦ Phishing Scams- Avoid the Bait◦ Spam Scam Slam◦ Follywood Squares◦ Phishing IQ Test
Review
Program written to cause disruption◦ Attached to a file or email◦ Spreads
Worm- copies itself across network & slows it down Time Bomb- damage at certain time/date Trojan Horse- looks like something good, but isn’t
Protect with Antivirus software◦ Update regularly◦ Be careful opening emails◦ Scan attachments first
Viruses
Virus program scan all emails (in & out) Virus program subscription
◦ Schedule scan Review emails & IMs before sending
◦ ISP can filter emails as well Understand netiquette & company rules Encrypt emails with private info Save & backup your emails
◦ Remember the “paper trail” Follow laws
Safe Guidelines
T or F. Email paper trails cannot be used as legal documents.
Junk email is also called _______.
______ refers o good manners when communicating electronically.
______ tries to get/steal your private info.
______ is just annoying!
Review