1 / 20

Living Online

Living Online. Unit 11 Communication & Collaboration. Objectives. Identify different communication methods Identify advantages of electronic communication Identify common problems with electronic communication Identify elements of professional electronic communication

kiele
Download Presentation

Living Online

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Living Online Unit 11 Communication & Collaboration

  2. Objectives • Identify different communication methods • Identify advantages of electronic communication • Identify common problems with electronic communication • Identify elements of professional electronic communication • Identify appropriate use of email attachments • Identify issues with unsolicited email • Describe how to control unsolicited email • Identify procedures for safe electronic communication

  3. Communication Methods • Need real-time? • Use IM • Need a paper trail? • Use Email • Most widely used • Distance Learning? • Video Conference • Other • Blog, message board

  4. Advantages of Electronic Communication • Speed • Low cost/free • Access from various devices, cell or computer • Forwarding of messages can be done • Collaborative • Share documents • You can keep track of sites visited • Stored on your computer • One to one popular: Email

  5. Viewing Browser History • Favorites Center • Options: • By site • By date • By most visited • Search

  6. Problems with Electronic Communication: Email Issues • Attachments • Size may be too big/too many • Virus • Blocked by program • Delivery Failure • Bounced • Mistyped address • Virus detected/spam filter • You’ve been blocked by receiver • Their mailbox is full

  7. Problems with Electronic Communication: Paper Trail • Written record or history • Can be used in legal cases • You may need proof • Email can provide that • IM, phone/online conferences can’t

  8. Problems with Electronic Communication: Hasty Responses • Say something you wish you could take back • You get an email that makes you angry • Discuss with someone/calm down • Write email & leave out To: address until sure • Save as draft & wait a day • Reply, Reply All • Proper spelling & grammar

  9. Email Ettiquete • Include a subject • Brief yet descriptive enough • Try to keep to 1 subject • Keep message short • Avoid ALL CAPS! • Limit jokes, symbols :-o • Proofread before sending • Double check the addresses • DON’T EMBARRASS YOURSELF! • Email sent through company is NOT private

  10. Which is Best?

  11. Unwanted Email • Spam • Unsolicited ads • Don’t reply to junk emails • Typically, an e-mail message is sent to multiple recipients who did not ask to receive it. • E-mail messages are not considered spam if a user has signed up to receive them.

  12. Spam Facts- FYI • Estimated 80% of email is spam • 1978 - An e-mail spam is sent to 600 addresses • 1994 - First large-scale spam sent to 6000 newsgroups, reaching millions of people. • 2005 - 30 billion per day • 2006 - 55 billion per day • 2010- Spam is 92% of email sent

  13. Spam • Be careful giving out your email • Do not publish it online • Check privacy statements • They may share your email address • DO NOT reply to junk mails • They’ll know they have a valid email address • You’ll get more junk! • Use the junk email filter

  14. Phishing • Steals your personal info • Spoofed sites & emails • Emails that appear to come from original source • Asks you to change password • Link takes you to copied site • User collects your info

  15. Spam vs. Phishing • How does it arrive? • Spam: Sneaks in the back door • Phishing: Walks in the front door • How does it make its offer? • Spam: Looks bad, seems far-fetched • Phishing: Looks plausible, seems credible • What is it trying to do? • Spam: Tries to sell you something • Phishing: Tries to steal something from you

  16. Review • What’s worse, spam or phishing? • Let’s Play • Phishing Scams- Avoid the Bait • Spam Scam Slam • Follywood Squares • Phishing IQ Test

  17. Viruses • Program written to cause disruption • Attached to a file or email • Spreads • Worm- copies itself across network & slows it down • Time Bomb- damage at certain time/date • Trojan Horse- looks like something good, but isn’t • Protect with Antivirus software • Update regularly • Be careful opening emails • Scan attachments first

  18. Safe Guidelines • Virus program scan all emails (in & out) • Virus program subscription • Schedule scan • Review emails & IMs before sending • ISP can filter emails as well • Understand netiquette & company rules • Encrypt emails with private info • Save & backup your emails • Remember the “paper trail” • Follow laws

  19. Review • T or F. Email paper trails cannot be used as legal documents. • Junk email is also called _______. • ______ refers o good manners when communicating electronically. • ______ tries to get/steal your private info. • ______ is just annoying!

  20. Living Online Unit 11 Communication & Collaboration

More Related