200 likes | 484 Views
Chapter 4 Electronic Communication and the Internet. Electronic communication. Electronic communication: exchanging info using through network connections or modems Modem: device that transmits data over telephones or cable lines from computer to another. Internet (Net).
E N D
Chapter 4 Electronic Communication and the Internet
Electronic communication • Electronic communication: exchanging info using through network connections or modems • Modem: device that transmits data over telephones or cable lines from computer to another
Internet (Net) • Worldwide network that connects millions of computers • Started as a government project for researchers to communicate, ARPANET • No one organization or government “controls” the Internet, although some governments censor what their citizens can access
Key Internet Organizations • Internet Corporation for Assigned Names and Numbers (ICANN) • Allocates domain names, settles domain disputes • Assigns Internet protocol numbers needed by each computer to be “seen” by the network
Internet Service Providers (ISPs) • Companies that provide access for a fee • Levels of service • Dial-up • High-speed • Digital subscriber line (DSL) over telephone wires • Cable or fiber optic • Satellite • Wireless
Internet Service Providers (ISPs) • E.G. • AOL, MSN, EarthLink, Comcast
Internet Services and Resources • E-mail • Instant messaging (IM) • Chat software • File transfer • Database searches • Online libraries • Remote log-on • Discussion and news groups • weblog
E-mail (Electronic Mail) • Use of computers to transmit text messages to one or more persons with almost instant delivery • May transport other file types to the email (attachment files) • Can be sent anywhere in the world as long as the person has an e-mail address
E-mail Address • Based on user name and “domain name” (organization or company that provides the individual with an account) • K.yousef@ju.edu.jo • Suggests at least 23 individuals with the same first initial and last name (J. Doe) at this facility • “edu” is a domain name indicating an educational facility
E-mail • Header • Lists who sent the message, when, to whom, and the address to which a reply should be directed • Email application • Computer program that assists the users to send/receive messages • Viruses • Not through email itself but through attachments
Email • Encryption: uses mathematical formulas to code the message. • Message recipient decode the message with an encryption key • Public key infrastructure: methods to validate email author identity • Unique code for each user embedded into a storage device • Digital Signature: unique identifier issued to the sender
Instant Messaging (IM) • Interactive, real-time, text discussion that may occur via computers, cell phones, or other mobile devices • Relies on many abbreviations for expeditious communication • Popular among adolescents and young adults • Sometimes used in work settings
File Transfer • A means to move files from one location to another over a network that is separate from e-mail • File transfer protocol controls transfer of data • Useful for files that exceed allowable size limits imposed by e-mail providers
Database Searches • These allow users access to databases, such as literature databases, through libraries or other organizations or via private subscription. • Searches can be done in a fraction of the time required to manually search through paper resources.
Remote Log-on • Allows users to access computer facilities from a separate location • May be used to view files at work or access remote databases at libraries • Require users to establish an account that permits access
Discussion and News Groups • Similar in content and diversity • Differ in method of access • Discussion (Listserv or Mailing) groups • Individuals subscribe. • Mass e-mails are sent to all subscribers. • News (Usenet) groups • Users “read” and contribute to discussion selectively; no mass e-mails.
E-mail Concerns • HIPAA compliance • Improper use—no etiquette (netiquette) • Forwards, inappropriate or lengthy messages • Potential to carry viruses, worms, spyware
E-mail Concerns • Commercial uses, overwhelming volume • Spam—unsolicited sales messages • Phishing—dubious requests for private information