Unit 10 Communication, Collaboration, and Safety

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

Forms of Cyberbullying
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
Internet Safety/Cyber Ethics
Netiquette Rules.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
AND SPAM BY OLUWATOBI BAKARE
Unit 10 Communication, Collaboration, and Safety.
Unit 9 Communication Services
Lesson 27 Communications and Collaboration
A Student’s Guide to Proper and Safe Web Behavior
Digital Citizenship Jessica L. Webb ED 505. Netiquette Netiquette Social Media- interactive dissemination of information through the internet. Netiquette-
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
Submitted by: Donna Rembert Instructor: Dr. Laurie Fowler ED508 Technology Portfolio.
Social Networks Cyberbullying Techno Addiction Digital footprint Spam Internet shopping The positive side Netiquette.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
1 Lesson 26 Communications and Collaboration Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Do pictures always give truthful information? Can publishing it be hurtful??
According to netiquette simply refers to our behavior the internet.
Digital Citizenship Project By Lacy Brown. Netiquette Netiquette is etiquette for the internet. Netiquette is etiquette for the internet. You should be.
Cassidy Culligan Digital Citizenship Project ED 505.
Electronic Communication Presentation. Attachments Files you attach and send with an message.
THE INTERNET. TABLE OF CONTENT CONNECTING TO THE INTERNET ELECTRONIC MAIL WORLD WIDE WEB INTERNET SERVICES.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Digital Citizen Project By: Frances Murphey Technology and Education.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Let’s Get Savvy about Technology Mrs. George Dondero School.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Lecture 3 1Norazirah Ayob, FEB. Ch  Technology advances allow individuals to self-select  what,  when, and  where messages are sent and received.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
A Student’s Guide to Proper and Safe Web Behavior
Internet Safety.
Safety.
Digital Citizenship.
DIGITAL CITIZENSHIP What You Should Know!.
Technology in society, safety & ethics
Learn how to protect yourself against common attacks
Communications and collaboration
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Information Security.
Lesson 3 Safe Computing.
GOSSIP and CYBERBULLYING
Unit 10 Communication, Collaboration, and Safety
Unit 11 Communication & Collaboration
Protect Your Computer Against Harmful Attacks!
Appropriate Use of Technology
Electronic Communication
Electronic Communication
STOP. THINK. CONNECT. Online Safety Quiz.
Internet Safety Vocabulary
Electronic Communication
CBP Program – Business Etiquette
GOSSIP and CYBERBULLYING
HOW DO I KEEP MY COMPUTER SAFE?
Digital Citizenship EIT, Author Gay Robertson, 2017.
Communication & Collaboration
Your life online Unit 14 5 days including project, review and test.
ICT Communications Lesson 3: Internet Life and Privacy
How would you define media? Give an example
Online Safety! Created by Educational Technology Network
Communication services
Many ways to communicate Electronically
Security of People, Property and Information
Electronic Communication
Introduction-Cyber Safety
Presentation transcript:

Unit 10 Communication, Collaboration, and Safety Living Online Unit 10 Communication, Collaboration, and Safety

Objectives Define time-shifted & real-time communication methods Describe the features & proper use of blogging, text messaging, and chatting Describe the features & proper use of social media sites Identify advantages & disadvantages of electronic communication Identify guidelines for creating effective personal and professional electronic communication

Time-Shifting Communication Delay between transmission & receipt of info Blog, Email, Discussion/Bulletin Board What’s the purpose of a blog? Post a diary, journal, etc. Your observations or opinions Can be used for marketing products Purpose of a Blog- post diary/journal/observations/opinions/marketing Tags- used in a blog to simplify & help the search process

Netiquette Following good manners & behavior when communicating over electronic media Netiquette rules when blogging: Write original content (DO NOT PLAGIARIZE) Proofread & check for spelling/grammar Respond to those who comment Give credit when quoting others/link to them Use kind & polite words when commenting Avoid negative

Real-time Communications Text Messaging/Instant Messaging (IM) SMS (short message service)-up to 160 characters MMS (multimedia message service)- longer messages split up iMessage Chat Room VoIP (Phone calls over Internet) Podcast Web conference (presentation over Internet) Video conference (audio/video over Internet) VoIP- Skype; need microphone/webcam

Real-time Communications Social Media Sites Keep in touch with friends, find people with similar interests, build relationships online Facebook, Twitter, Instagram, YouTube, Google+, LinkedIn Most have privacy settings

Social Media Privacy Settings What privacy settings are there usually? Who can see your posts Making your name available to the search Being invisible Can others tag you Authorization of trusted apps and web sites

Review- 4Q What’s the limit on characters in an SMS? 160 What’s the purpose of a blog? To post your opinion What’s the difference between SMS and MMS? MMS has photo/audio/video What’s the difference between a web conference and a video conference? Web conference is presentation & audio; video has camera to also show you/people

Project Netiquette & rules for communication Each group will list rules for their given communication method Rules for: email, texting, chatting, web/video conference, video chats, social media

Advantages of Electronic Communication Connect to people worldwide Fast speed Many are low cost/free Access from various devices, cell, or computer Transmit text, graphics, video, audio Forwarding of messages can be done Collaborate & share documents You can keep track of sites visited Stored on your computer One to one popular: Email

Disadvantages of Electronic Communication Misconception of your message Misuse of your message Confidential & sensitive info can be hacked Electronic paper trail left Lack of physical presence can damage relationships

Problems with Electronic Communication: Email Issues Attachments Size may be too big/too many Virus Blocked by program Delivery Failure Bounced Mistyped address Virus detected/spam filter You’ve been blocked by receiver Their mailbox is full

Problems with Electronic Communication: Paper Trail Written record or history Can be used in legal cases You may need proof Email can provide that Phone/audio conferences can’t

Problems w/ Electronic Comm.: Hasty Responses Say something you wish you could take back You get an email that makes you angry Discuss with someone/calm down Write email & leave out To: address until sure Save as draft & wait a day Reply, Reply All Proper spelling & grammar

Effective Communications Is face to face better than electronic? Is email better than phone call? Should it be formal or informal? Content, tone, format must be appropriate for the audience Respond to message promptly

Following Standards Statements & info you publish can harm people Flaming (bashing) Intense, online verbal argument Cyberbullying Using Internet to harass, threaten, embarrass a person Slander Verbally making false statements about someone Libel Written false statements about a person General Slander Examples (Oral false statements) Telling someone that a certain person has a sexually transmitted disease Relating to someone that a husband is cheating on his wife Saying a doctor has fake diplomas on his wall An employer claiming an employee stole equipment   Stating that a severed finger was found in the soup at a restaurant  Accusing someone of stealing your television Saying Linda had an affair with a company executive to get a promotion Claiming the business owners participated in unethical and illegal activities Telling someone that a person cheated on his taxes Saying a restaurant is serving meat from dogs Claiming that someone is gay, lesbian or bisexual Relating that someone is incompetent at their job Accusing a celebrity of having a threesome with a man and a woman Celebrity Slander Examples When blood was found in the tub at the Intercontinental Hotel in London , a housekeeper claimed Lady Gaga bathed in blood as a part of a Satanic ritual. Casino mogul Steve Wynn was slandered by Joe Francis, founder of “Girls Gone Wild.” He claimed Mr. Wynn threatened to kill him because of a gambling debt.             David Beckham’s libel and slander lawsuit against In Touch magazine involved a story that he had cheated on his wife with a prostitute. Jerry Seinfeld made comments on the David Letterman show about Missy Chase Lapine. He said Lapine was a "nut job" and "a wacko" for saying his wife had plagiarized her cookbook, Deceptively Delicious: Simple Secrets to Getting Your Kids Eating Good Food. An attorney for Anna Nicole Smith’s mother suggested Howard Stern was involved in Anna’s death. David Schwimmer won a lawsuit against former Hollywood fund-raiser Aaron Tonken, who said he asked for two Rolex watches in payment for his attendance at a charity affair. Sharon Stone sued her plastic surgeon Renato Calabria for allegations that he told several magazines that she had a facelift.

Online Safety Tips for Teens Quizzes

Review- 3Q What is it called when you are intentionally hostile & insulting with someone online? Flaming A fellow student says at graduation on the microphone that you have an STD. This is not really true. What is this called? Slander A fake Facebook page is made up with your name, picture, and info that says you do drugs. It’s not true. What is this called? Libel

Which is Best?

Unwanted Email Spam Unsolicited ads Don’t reply to junk emails Typically, an e-mail message is sent to multiple recipients who did not ask to receive it. E-mail messages are not considered spam if a user has signed up to receive them.

Spam Spammers collect email addresses from: Spam: Chatrooms, websites, customer lists, viruses getting them from your address book, other spammers that sell lists Spam: Advertises products & services that may not be real Collects email addresses to sell to other spammers May put malware on your PC One of the problems with spam, and the reason why there is so much of it, is that it is so easy to create. ­ You could easily become a spammer yourself. Let's say that you have a recipe from your grandmother for the best blueberry muffins ever created. A friend suggests that you sell the recipe for $5. You decide that your friend might be on to something, so you send an e-mail to the 100 people in your personal e-mail address book with the subject line, "These Blueberry Muffins Have Been Described as Heaven -- You Can Have the Recipe for $5!" Your e-mail contains a link to your blueberry muffin Web site. As a result of your 100 e-mails, you get two orders and make $10. ­ "Wow!" you think, "It cost me nothing to send those 100 e-mails, and I made $10. If I sent 1,000 e-mails I could make $100. If I sent a million e-mails I could make $100,000! I wonder where I could get a million e-mail addresses..."

Spam Facts- FYI 1978 - An e-mail spam is sent to 600 addresses 1994 - First large-scale spam sent to 6000 newsgroups, reaching millions of people. 2005 - 30 billion per day 2006 - 55 billion per day 90% of email sent is spam!

Spam Be careful giving out your email Check privacy statements Do not publish it online Check privacy statements They may share your email address DO NOT reply to junk mails They’ll know they have a valid email address You’ll get more junk! Use the junk email filter

Phishing Steals your personal info Spoofed sites & emails Emails that appear to come from original source Asks you to change password Link takes you to copied site User collects your info

Spam vs. Phishing How does it arrive? How does it make its offer? Spam: Sneaks in the back door Phishing: Walks in the front door How does it make its offer? Spam: Looks bad, seems far-fetched Phishing: Looks plausible, seems credible What is it trying to do? Spam: Tries to sell you something /steal email Phishing: Tries to steal information/identity from you

Review What’s worse, spam or phishing? Let’s Play Phishing Scams- Avoid the Bait Spam Scam Slam Follywood Squares Phishing IQ Test

Viruses Program written to cause disruption Attached to a file or email Spreads Worm- copies itself across network & slows it down Time Bomb- damage at certain time/date Trojan Horse- looks like something good, but isn’t Protect with Antivirus software Update regularly Be careful opening emails Scan attachments first

Safe Guidelines Virus program scan all emails (in & out) Virus program subscription Schedule scan Review emails & IMs before sending ISP can filter emails as well Understand netiquette & company rules Encrypt emails with private info Save & backup your emails Remember the “paper trail” Follow laws

Review T or F. Email paper trails cannot be used as legal documents. Junk email is also called _______. ______ refers o good manners when communicating electronically. ______ tries to get/steal your private info. ______ is just annoying!

Unit 10 Communication, Collaboration, and Safety Living Online Unit 10 Communication, Collaboration, and Safety