Unit 10 Communication, Collaboration, and Safety
Define time-shifted & real-time communication methods Describe the features & proper use of blogging, text messaging, and chatting Describe the features & proper use of social media sites Identify advantages & disadvantages of electronic communication Identify guidelines for creating effective personal and professional electronic communication
Delay between transmission & receipt of info Blog, , Discussion Board What’s the purpose of a blog? Follow netiquette ◦ Good manners & behavior over Internet
Need real-time? ◦ Use IM, chat room, webcam Need a paper trail? ◦ Use , text ◦ Most widely used Distance Learning? ◦ Video Conference Other ◦ Blog, message board, social media
Instant or no delay Texting/IM ◦ Conversational ◦ SMS (short messaging service) Up to 160 characters ◦ MMS (multimedia messaging service) Added multimedia (pictures/video/etc.) No limit on characters but could be split up ◦ iMessage Chatting VoIP Podcast Web/video conference/video chat
Keep in touch with friends, find people with similar interests, build relationships online Facebook, Twitter, Instagram, YouTube, Google+, LinkedIn
Netiquette & rules for communication Each group will list rules for their given communication method
Connect to people worldwide Speed Low cost/free Access from various devices, cell, or computer Transmit text, graphics, video, audio Forwarding of messages can be done Collaborate & share documents You can keep track of sites visited ◦ Stored on your computer One to one popular:
Attachments ◦ Size may be too big/too many ◦ Virus ◦ Blocked by program Delivery Failure ◦ Bounced Mistyped address Virus detected/spam filter You’ve been blocked by receiver Their mailbox is full
Written record or history ◦ Can be used in legal cases ◦ You may need proof ◦ can provide that Phone/audio conferences can’t
Say something you wish you could take back You get an that makes you angry ◦ Discuss with someone/calm down ◦ Write & leave out To: address until sure ◦ Save as draft & wait a day Reply, Reply All Proper spelling & grammar
Include a subject ◦ Brief yet descriptive enough Try to keep to 1 subject Keep message short Avoid ALL CAPS! Limit jokes, symbols :-o Proofread before sending Double check the addresses ◦ DON’T EMBARRASS YOURSELF! sent through company is NOT private
Face to face or letter may be better than electronic Content, tone, format must be appropriate for the audience Respond to message promptly Statements can harm people ◦ Flaming ◦ Cyberbullying ◦ Slander ◦ Libel
Spam ◦ Unsolicited ads ◦ Don’t reply to junk s Typically, an message is sent to multiple recipients who did not ask to receive it. messages are not considered spam if a user has signed up to receive them.
Estimated 80% of is spam An spam is sent to 600 addresses First large-scale spam sent to 6000 newsgroups, reaching millions of people. billion per day billion per day Spam is 92% of sent
Be careful giving out your ◦ Do not publish it online Check privacy statements ◦ They may share your address DO NOT reply to junk mails ◦ They’ll know they have a valid address ◦ You’ll get more junk! Use the junk filter
Steals your personal info ◦ Spoofed sites & s s that appear to come from original source Asks you to change password Link takes you to copied site User collects your info
How does it arrive? Spam: Sneaks in the back door Phishing: Walks in the front door How does it make its offer? Spam: Looks bad, seems far-fetched Phishing: Looks plausible, seems credible What is it trying to do? Spam: Tries to sell you something Phishing: Tries to steal something from you
What’s worse, spam or phishing? Let’s Play ◦ Phishing Scams- Avoid the Bait Phishing Scams- Avoid the Bait ◦ Spam Scam Slam Spam Scam Slam ◦ Follywood Squares Follywood Squares ◦ Phishing IQ Test Phishing IQ Test
Program written to cause disruption ◦ Attached to a file or ◦ Spreads Worm- copies itself across network & slows it down Time Bomb- damage at certain time/date Trojan Horse- looks like something good, but isn’t Protect with Antivirus software ◦ Update regularly ◦ Be careful opening s ◦ Scan attachments first
Virus program scan all s (in & out) Virus program subscription ◦ Schedule scan Review s & IMs before sending ◦ ISP can filter s as well Understand netiquette & company rules Encrypt s with private info Save & backup your s ◦ Remember the “paper trail” Follow laws
T or F. paper trails cannot be used as legal documents. Junk is also called _______. ______ refers o good manners when communicating electronically. ______ tries to get/steal your private info. ______ is just annoying!
Unit 10 Communication, Collaboration, and Safety