Unit 10 Communication, Collaboration, and Safety Living Online Unit 10 Communication, Collaboration, and Safety
Objectives Define time-shifted & real-time communication methods Describe the features & proper use of blogging, text messaging, and chatting Describe the features & proper use of social media sites Identify advantages & disadvantages of electronic communication Identify guidelines for creating effective personal and professional electronic communication
Time-Shifting Communication Delay between transmission & receipt of info Blog, Email, Discussion/Bulletin Board What’s the purpose of a blog? Post a diary, journal, etc. Your observations or opinions Can be used for marketing products Purpose of a Blog- post diary/journal/observations/opinions/marketing Tags- used in a blog to simplify & help the search process
Netiquette Following good manners & behavior when communicating over electronic media Netiquette rules when blogging: Write original content (DO NOT PLAGIARIZE) Proofread & check for spelling/grammar Respond to those who comment Give credit when quoting others/link to them Use kind & polite words when commenting Avoid negative
Real-time Communications Text Messaging/Instant Messaging (IM) SMS (short message service)-up to 160 characters MMS (multimedia message service)- longer messages split up iMessage Chat Room VoIP (Phone calls over Internet) Podcast Web conference (presentation over Internet) Video conference (audio/video over Internet) VoIP- Skype; need microphone/webcam
Real-time Communications Social Media Sites Keep in touch with friends, find people with similar interests, build relationships online Facebook, Twitter, Instagram, YouTube, Google+, LinkedIn Most have privacy settings
Social Media Privacy Settings What privacy settings are there usually? Who can see your posts Making your name available to the search Being invisible Can others tag you Authorization of trusted apps and web sites
Review- 4Q What’s the limit on characters in an SMS? 160 What’s the purpose of a blog? To post your opinion What’s the difference between SMS and MMS? MMS has photo/audio/video What’s the difference between a web conference and a video conference? Web conference is presentation & audio; video has camera to also show you/people
Project Netiquette & rules for communication Each group will list rules for their given communication method Rules for: email, texting, chatting, web/video conference, video chats, social media
Advantages of Electronic Communication Connect to people worldwide Fast speed Many are low cost/free Access from various devices, cell, or computer Transmit text, graphics, video, audio Forwarding of messages can be done Collaborate & share documents You can keep track of sites visited Stored on your computer One to one popular: Email
Disadvantages of Electronic Communication Misconception of your message Misuse of your message Confidential & sensitive info can be hacked Electronic paper trail left Lack of physical presence can damage relationships
Problems with Electronic Communication: Email Issues Attachments Size may be too big/too many Virus Blocked by program Delivery Failure Bounced Mistyped address Virus detected/spam filter You’ve been blocked by receiver Their mailbox is full
Problems with Electronic Communication: Paper Trail Written record or history Can be used in legal cases You may need proof Email can provide that Phone/audio conferences can’t
Problems w/ Electronic Comm.: Hasty Responses Say something you wish you could take back You get an email that makes you angry Discuss with someone/calm down Write email & leave out To: address until sure Save as draft & wait a day Reply, Reply All Proper spelling & grammar
Effective Communications Is face to face better than electronic? Is email better than phone call? Should it be formal or informal? Content, tone, format must be appropriate for the audience Respond to message promptly
Following Standards Statements & info you publish can harm people Flaming (bashing) Intense, online verbal argument Cyberbullying Using Internet to harass, threaten, embarrass a person Slander Verbally making false statements about someone Libel Written false statements about a person General Slander Examples (Oral false statements) Telling someone that a certain person has a sexually transmitted disease Relating to someone that a husband is cheating on his wife Saying a doctor has fake diplomas on his wall An employer claiming an employee stole equipment Stating that a severed finger was found in the soup at a restaurant Accusing someone of stealing your television Saying Linda had an affair with a company executive to get a promotion Claiming the business owners participated in unethical and illegal activities Telling someone that a person cheated on his taxes Saying a restaurant is serving meat from dogs Claiming that someone is gay, lesbian or bisexual Relating that someone is incompetent at their job Accusing a celebrity of having a threesome with a man and a woman Celebrity Slander Examples When blood was found in the tub at the Intercontinental Hotel in London , a housekeeper claimed Lady Gaga bathed in blood as a part of a Satanic ritual. Casino mogul Steve Wynn was slandered by Joe Francis, founder of “Girls Gone Wild.” He claimed Mr. Wynn threatened to kill him because of a gambling debt. David Beckham’s libel and slander lawsuit against In Touch magazine involved a story that he had cheated on his wife with a prostitute. Jerry Seinfeld made comments on the David Letterman show about Missy Chase Lapine. He said Lapine was a "nut job" and "a wacko" for saying his wife had plagiarized her cookbook, Deceptively Delicious: Simple Secrets to Getting Your Kids Eating Good Food. An attorney for Anna Nicole Smith’s mother suggested Howard Stern was involved in Anna’s death. David Schwimmer won a lawsuit against former Hollywood fund-raiser Aaron Tonken, who said he asked for two Rolex watches in payment for his attendance at a charity affair. Sharon Stone sued her plastic surgeon Renato Calabria for allegations that he told several magazines that she had a facelift.
Online Safety Tips for Teens Quizzes
Review- 3Q What is it called when you are intentionally hostile & insulting with someone online? Flaming A fellow student says at graduation on the microphone that you have an STD. This is not really true. What is this called? Slander A fake Facebook page is made up with your name, picture, and info that says you do drugs. It’s not true. What is this called? Libel
Which is Best?
Unwanted Email Spam Unsolicited ads Don’t reply to junk emails Typically, an e-mail message is sent to multiple recipients who did not ask to receive it. E-mail messages are not considered spam if a user has signed up to receive them.
Spam Spammers collect email addresses from: Spam: Chatrooms, websites, customer lists, viruses getting them from your address book, other spammers that sell lists Spam: Advertises products & services that may not be real Collects email addresses to sell to other spammers May put malware on your PC One of the problems with spam, and the reason why there is so much of it, is that it is so easy to create. You could easily become a spammer yourself. Let's say that you have a recipe from your grandmother for the best blueberry muffins ever created. A friend suggests that you sell the recipe for $5. You decide that your friend might be on to something, so you send an e-mail to the 100 people in your personal e-mail address book with the subject line, "These Blueberry Muffins Have Been Described as Heaven -- You Can Have the Recipe for $5!" Your e-mail contains a link to your blueberry muffin Web site. As a result of your 100 e-mails, you get two orders and make $10. "Wow!" you think, "It cost me nothing to send those 100 e-mails, and I made $10. If I sent 1,000 e-mails I could make $100. If I sent a million e-mails I could make $100,000! I wonder where I could get a million e-mail addresses..."
Spam Facts- FYI 1978 - An e-mail spam is sent to 600 addresses 1994 - First large-scale spam sent to 6000 newsgroups, reaching millions of people. 2005 - 30 billion per day 2006 - 55 billion per day 90% of email sent is spam!
Spam Be careful giving out your email Check privacy statements Do not publish it online Check privacy statements They may share your email address DO NOT reply to junk mails They’ll know they have a valid email address You’ll get more junk! Use the junk email filter
Phishing Steals your personal info Spoofed sites & emails Emails that appear to come from original source Asks you to change password Link takes you to copied site User collects your info
Spam vs. Phishing How does it arrive? How does it make its offer? Spam: Sneaks in the back door Phishing: Walks in the front door How does it make its offer? Spam: Looks bad, seems far-fetched Phishing: Looks plausible, seems credible What is it trying to do? Spam: Tries to sell you something /steal email Phishing: Tries to steal information/identity from you
Review What’s worse, spam or phishing? Let’s Play Phishing Scams- Avoid the Bait Spam Scam Slam Follywood Squares Phishing IQ Test
Viruses Program written to cause disruption Attached to a file or email Spreads Worm- copies itself across network & slows it down Time Bomb- damage at certain time/date Trojan Horse- looks like something good, but isn’t Protect with Antivirus software Update regularly Be careful opening emails Scan attachments first
Safe Guidelines Virus program scan all emails (in & out) Virus program subscription Schedule scan Review emails & IMs before sending ISP can filter emails as well Understand netiquette & company rules Encrypt emails with private info Save & backup your emails Remember the “paper trail” Follow laws
Review T or F. Email paper trails cannot be used as legal documents. Junk email is also called _______. ______ refers o good manners when communicating electronically. ______ tries to get/steal your private info. ______ is just annoying!
Unit 10 Communication, Collaboration, and Safety Living Online Unit 10 Communication, Collaboration, and Safety