210 likes | 337 Views
Living Online. Unit 11 Communication & Collaboration. Objectives. Identify different communication methods Identify advantages of electronic communication Identify common problems with electronic communication Identify elements of professional electronic communication
E N D
Living Online Unit 11 Communication & Collaboration
Objectives • Identify different communication methods • Identify advantages of electronic communication • Identify common problems with electronic communication • Identify elements of professional electronic communication • Identify appropriate use of email attachments • Identify issues with unsolicited email • Describe how to control unsolicited email • Identify procedures for safe electronic communication
Communication Methods • Need real-time? • Use IM • Need a paper trail? • Use Email • Most widely used • Distance Learning? • Video Conference • Other • Blog, message board
Advantages of Electronic Communication • Speed • Low cost/free • Access from various devices, cell or computer • Forwarding of messages can be done • Collaborative • Share documents • You can keep track of sites visited • Stored on your computer • One to one popular: Email
Viewing Browser History • Favorites Center • Options: • By site • By date • By most visited • Search
Problems with Electronic Communication: Email Issues • Attachments • Size may be too big/too many • Virus • Blocked by program • Delivery Failure • Bounced • Mistyped address • Virus detected/spam filter • You’ve been blocked by receiver • Their mailbox is full
Problems with Electronic Communication: Paper Trail • Written record or history • Can be used in legal cases • You may need proof • Email can provide that • IM, phone/online conferences can’t
Problems with Electronic Communication: Hasty Responses • Say something you wish you could take back • You get an email that makes you angry • Discuss with someone/calm down • Write email & leave out To: address until sure • Save as draft & wait a day • Reply, Reply All • Proper spelling & grammar
Email Ettiquete • Include a subject • Brief yet descriptive enough • Try to keep to 1 subject • Keep message short • Avoid ALL CAPS! • Limit jokes, symbols :-o • Proofread before sending • Double check the addresses • DON’T EMBARRASS YOURSELF! • Email sent through company is NOT private
Unwanted Email • Spam • Unsolicited ads • Don’t reply to junk emails • Typically, an e-mail message is sent to multiple recipients who did not ask to receive it. • E-mail messages are not considered spam if a user has signed up to receive them.
Spam Facts- FYI • Estimated 80% of email is spam • 1978 - An e-mail spam is sent to 600 addresses • 1994 - First large-scale spam sent to 6000 newsgroups, reaching millions of people. • 2005 - 30 billion per day • 2006 - 55 billion per day • 2010- Spam is 92% of email sent
Spam • Be careful giving out your email • Do not publish it online • Check privacy statements • They may share your email address • DO NOT reply to junk mails • They’ll know they have a valid email address • You’ll get more junk! • Use the junk email filter
Phishing • Steals your personal info • Spoofed sites & emails • Emails that appear to come from original source • Asks you to change password • Link takes you to copied site • User collects your info
Spam vs. Phishing • How does it arrive? • Spam: Sneaks in the back door • Phishing: Walks in the front door • How does it make its offer? • Spam: Looks bad, seems far-fetched • Phishing: Looks plausible, seems credible • What is it trying to do? • Spam: Tries to sell you something • Phishing: Tries to steal something from you
Review • What’s worse, spam or phishing? • Let’s Play • Phishing Scams- Avoid the Bait • Spam Scam Slam • Follywood Squares • Phishing IQ Test
Viruses • Program written to cause disruption • Attached to a file or email • Spreads • Worm- copies itself across network & slows it down • Time Bomb- damage at certain time/date • Trojan Horse- looks like something good, but isn’t • Protect with Antivirus software • Update regularly • Be careful opening emails • Scan attachments first
Safe Guidelines • Virus program scan all emails (in & out) • Virus program subscription • Schedule scan • Review emails & IMs before sending • ISP can filter emails as well • Understand netiquette & company rules • Encrypt emails with private info • Save & backup your emails • Remember the “paper trail” • Follow laws
Review • T or F. Email paper trails cannot be used as legal documents. • Junk email is also called _______. • ______ refers o good manners when communicating electronically. • ______ tries to get/steal your private info. • ______ is just annoying!
Living Online Unit 11 Communication & Collaboration