unit 10 communication, collaboration, and safety

23
Living Online Unit 10 Communication, Collaboration, and Safety

Upload: nathan-stanley

Post on 25-Dec-2015

224 views

Category:

Documents


1 download

TRANSCRIPT

Living OnlineUnit 10

Communication, Collaboration, and Safety

Define time-shifted & real-time communication methods

Describe the features & proper use of blogging, text messaging, and chatting

Describe the features & proper use of social media sites

Identify advantages & disadvantages of electronic communication

Identify guidelines for creating effective personal and professional electronic communication

Objectives

Delay between transmission & receipt of info

Blog, Email, Discussion Board

What’s the purpose of a blog?

Follow netiquette◦ Good manners & behavior over Internet

Time-Shifting Communication

Need real-time?◦ Use IM, chat room, webcam

Need a paper trail?◦ Use Email, text◦ Most widely used

Distance Learning?◦ Video Conference

Other◦ Blog, message board, social media

Communication Methods

Instant or no delay

Texting/IM◦ Conversational ◦ SMS (short messaging service)

Up to 160 characters◦ MMS (multimedia messaging service)

Added multimedia (pictures/video/etc.) No limit on characters but could be split up

◦ iMessage Chatting VoIP Podcast Web/video conference/video chat

Real-Time Communication

Keep in touch with friends, find people with similar interests, build relationships online

Facebook, Twitter, Instagram, YouTube, Google+, LinkedIn

Social Media

Netiquette & rules for communication

Each group will list rules for their given communication method

Project

Connect to people worldwide Speed Low cost/free Access from various devices, cell, or computer Transmit text, graphics, video, audio Forwarding of messages can be done Collaborate & share documents You can keep track of sites visited

◦ Stored on your computer

One to one popular: Email

Advantages of Electronic Communication

Attachments◦ Size may be too big/too many◦ Virus◦ Blocked by program

Delivery Failure◦ Bounced

Mistyped address Virus detected/spam filter You’ve been blocked by receiver Their mailbox is full

Problems with Electronic Communication: Email Issues

Written record or history◦ Can be used in legal cases◦ You may need proof◦ Email can provide that

Phone/audio conferences can’t

Problems with Electronic Communication: Paper Trail

Say something you wish you could take back

You get an email that makes you angry◦ Discuss with someone/calm down◦ Write email & leave out To: address until sure◦ Save as draft & wait a day

Reply, Reply All

Proper spelling & grammar

Problems w/ Electronic Comm.: Hasty Responses

Face to face or letter may be better than electronic

Content, tone, format must be appropriate for the audience

Respond to message promptly Statements can harm people

◦ Flaming◦ Cyberbullying◦ Slander◦ Libel

Effective Communications

Which is Best?

Spam◦ Unsolicited ads◦ Don’t reply to junk emails

Typically, an e-mail message is sent to multiple recipients who did not ask to receive it.

E-mail messages are not considered spam if a user has signed up to receive them.

Unwanted Email

Estimated 80% of email is spam

1978 - An e-mail spam is sent to 600 addresses

1994 - First large-scale spam sent to 6000 newsgroups, reaching millions of people.

2005 - 30 billion per day

2006 - 55 billion per day

2010- Spam is 92% of email sent

Spam Facts- FYI

Be careful giving out your email◦ Do not publish it online

Check privacy statements◦ They may share your email address

DO NOT reply to junk mails◦ They’ll know they have a valid email address◦ You’ll get more junk!

Use the junk email filter

Spam

Steals your personal info ◦ Spoofed sites & emails

Emails that appear to come from original source Asks you to change password Link takes you to copied site User collects your info

Phishing

How does it arrive? Spam: Sneaks in the back door Phishing: Walks in the front door

How does it make its offer? Spam: Looks bad, seems far-fetched Phishing: Looks plausible, seems credible

What is it trying to do? Spam: Tries to sell you something Phishing: Tries to steal something from you

Spam vs. Phishing

What’s worse, spam or phishing?

Let’s Play◦ Phishing Scams- Avoid the Bait◦ Spam Scam Slam◦ Follywood Squares◦ Phishing IQ Test

Review

Program written to cause disruption◦ Attached to a file or email◦ Spreads

Worm- copies itself across network & slows it down Time Bomb- damage at certain time/date Trojan Horse- looks like something good, but isn’t

Protect with Antivirus software◦ Update regularly◦ Be careful opening emails◦ Scan attachments first

Viruses

Virus program scan all emails (in & out) Virus program subscription

◦ Schedule scan Review emails & IMs before sending

◦ ISP can filter emails as well Understand netiquette & company rules Encrypt emails with private info Save & backup your emails

◦ Remember the “paper trail” Follow laws

Safe Guidelines

T or F. Email paper trails cannot be used as legal documents.

Junk email is also called _______.

______ refers o good manners when communicating electronically.

______ tries to get/steal your private info.

______ is just annoying!

Review

Living OnlineUnit 10

Communication, Collaboration, and Safety