Electronic Communication and the Internet Chapter 4 Electronic Communication and the Internet
Electronic communication Electronic communication: exchanging info using through network connections or modems Modem: device that transmits data over telephones or cable lines from computer to another
Internet (Net) Worldwide network that connects millions of computers Started as a government project for researchers to communicate, ARPANET No one organization or government “controls” the Internet, although some governments censor what their citizens can access 3
Key Internet Organizations Internet Corporation for Assigned Names and Numbers (ICANN) Allocates domain names, settles domain disputes Assigns Internet protocol numbers needed by each computer to be “seen” by the network 4
Internet Service Providers (ISPs) Companies that provide access for a fee Levels of service Dial-up High-speed Digital subscriber line (DSL) over telephone wires Cable or fiber optic Satellite Wireless 5
Internet Service Providers (ISPs) E.G. AOL, MSN, EarthLink, Comcast 6
Internet Services and Resources E-mail Instant messaging (IM) Chat software File transfer Database searches Online libraries Remote log-on Discussion and news groups weblog
E-mail (Electronic Mail) Use of computers to transmit text messages to one or more persons with almost instant delivery May transport other file types to the email (attachment files) Can be sent anywhere in the world as long as the person has an e-mail address
E-mail Address Based on user name and “domain name” (organization or company that provides the individual with an account) K.yousef@ju.edu.jo Suggests at least 23 individuals with the same first initial and last name (J. Doe) at this facility “edu” is a domain name indicating an educational facility
E-mail Header Email application Viruses Lists who sent the message, when, to whom, and the address to which a reply should be directed Email application Computer program that assists the users to send/receive messages Viruses Not through email itself but through attachments
Email Encryption: uses mathematical formulas to code the message. Message recipient decode the message with an encryption key Public key infrastructure: methods to validate email author identity Unique code for each user embedded into a storage device Digital Signature: unique identifier issued to the sender
Instant Messaging (IM) Interactive, real-time, text discussion that may occur via computers, cell phones, or other mobile devices Relies on many abbreviations for expeditious communication Popular among adolescents and young adults Sometimes used in work settings
File Transfer A means to move files from one location to another over a network that is separate from e-mail File transfer protocol controls transfer of data Useful for files that exceed allowable size limits imposed by e-mail providers
Database Searches These allow users access to databases, such as literature databases, through libraries or other organizations or via private subscription. Searches can be done in a fraction of the time required to manually search through paper resources.
Remote Log-on Allows users to access computer facilities from a separate location May be used to view files at work or access remote databases at libraries Require users to establish an account that permits access
Discussion and News Groups Similar in content and diversity Differ in method of access Discussion (Listserv or Mailing) groups Individuals subscribe. Mass e-mails are sent to all subscribers. News (Usenet) groups Users “read” and contribute to discussion selectively; no mass e-mails.
E-mail Concerns HIPAA compliance Improper use—no etiquette (netiquette) Forwards, inappropriate or lengthy messages Potential to carry viruses, worms, spyware
E-mail Concerns Commercial uses, overwhelming volume Spam—unsolicited sales messages Phishing—dubious requests for private information
Questions?