Download presentation
Presentation is loading. Please wait.
Published byJasper Matthews Modified over 6 years ago
1
Unit 10 Communication, Collaboration, and Safety
Living Online Unit 10 Communication, Collaboration, and Safety
2
Objectives Define time-shifted & real-time communication methods
Describe the features & proper use of blogging, text messaging, and chatting Describe the features & proper use of social media sites Identify advantages & disadvantages of electronic communication Identify guidelines for creating effective personal and professional electronic communication
3
Time-Shifting Communication
Delay between transmission & receipt of info Blog, , Discussion Board What’s the purpose of a blog? Follow netiquette Good manners & behavior over Internet Blog- post diary/journal/observations/opinions/marketing
4
Communication Methods
Need real-time? Use IM, chat room, webcam Need a paper trail? Use , text Most widely used Distance Learning? Video Conference Other Blog, message board, social media
5
Real-Time Communication
Instant or no delay Texting/IM Conversational SMS (short messaging service) Up to 160 characters MMS (multimedia messaging service) Added multimedia (pictures/video/etc.) No limit on characters but could be split up iMessage Chatting VoIP Podcast Web/video conference/video chat
6
Social Media Keep in touch with friends, find people with similar interests, build relationships online Facebook, Twitter, Instagram, YouTube, Google+, LinkedIn
7
Project Netiquette & rules for communication
Each group will list rules for their given communication method
8
Advantages of Electronic Communication
Connect to people worldwide Speed Low cost/free Access from various devices, cell, or computer Transmit text, graphics, video, audio Forwarding of messages can be done Collaborate & share documents You can keep track of sites visited Stored on your computer One to one popular:
9
Problems with Electronic Communication: Email Issues
Attachments Size may be too big/too many Virus Blocked by program Delivery Failure Bounced Mistyped address Virus detected/spam filter You’ve been blocked by receiver Their mailbox is full
10
Problems with Electronic Communication: Paper Trail
Written record or history Can be used in legal cases You may need proof can provide that Phone/audio conferences can’t
11
Problems w/ Electronic Comm.: Hasty Responses
Say something you wish you could take back You get an that makes you angry Discuss with someone/calm down Write & leave out To: address until sure Save as draft & wait a day Reply, Reply All Proper spelling & grammar
12
Effective Communications
Face to face or letter may be better than electronic Content, tone, format must be appropriate for the audience Respond to message promptly Statements can harm people Flaming Cyberbullying Slander Libel
13
Which is Best?
14
Unwanted Spam Unsolicited ads Don’t reply to junk s Typically, an message is sent to multiple recipients who did not ask to receive it. messages are not considered spam if a user has signed up to receive them.
15
Spam Facts- FYI Estimated 80% of email is spam
An spam is sent to 600 addresses First large-scale spam sent to newsgroups, reaching millions of people. billion per day billion per day 2010- Spam is 92% of sent
16
Spam Be careful giving out your email Check privacy statements
Do not publish it online Check privacy statements They may share your address DO NOT reply to junk mails They’ll know they have a valid address You’ll get more junk! Use the junk filter
17
Phishing Steals your personal info Spoofed sites & emails
s that appear to come from original source Asks you to change password Link takes you to copied site User collects your info
18
Spam vs. Phishing How does it arrive? How does it make its offer?
Spam: Sneaks in the back door Phishing: Walks in the front door How does it make its offer? Spam: Looks bad, seems far-fetched Phishing: Looks plausible, seems credible What is it trying to do? Spam: Tries to sell you something Phishing: Tries to steal something from you
19
Review What’s worse, spam or phishing? Let’s Play
Phishing Scams- Avoid the Bait Spam Scam Slam Follywood Squares Phishing IQ Test
20
Viruses Program written to cause disruption
Attached to a file or Spreads Worm- copies itself across network & slows it down Time Bomb- damage at certain time/date Trojan Horse- looks like something good, but isn’t Protect with Antivirus software Update regularly Be careful opening s Scan attachments first
21
Safe Guidelines Virus program scan all emails (in & out)
Virus program subscription Schedule scan Review s & IMs before sending ISP can filter s as well Understand netiquette & company rules Encrypt s with private info Save & backup your s Remember the “paper trail” Follow laws
22
Review T or F. Email paper trails cannot be used as legal documents.
Junk is also called _______. ______ refers o good manners when communicating electronically. ______ tries to get/steal your private info. ______ is just annoying!
23
Unit 10 Communication, Collaboration, and Safety
Living Online Unit 10 Communication, Collaboration, and Safety
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.