1 / 26

Interacting through Digital Technologies

Unit 1: Netiquette Unit 2: Safety on the net and tips for protecting devices Unit 3: Sharing through digital technologies. Interacting through Digital Technologies. Learning outcomes. At the end of this module you will gain: Acceptable use of online resources

larae
Download Presentation

Interacting through Digital Technologies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Unit 1: Netiquette Unit 2: Safety on the net and tips for protecting devices Unit 3: Sharing through digital technologies Interacting through Digital Technologies

  2. Learning outcomes At the end of this module you will gain: • Acceptable use of online resources • Ability to recognize the threats on internet • Knowledge on sharing through digital technologies

  3. Unit 1: Netiquette Netiquette is used to refer to the set of rules of general behavior on the Internet. The netiquette is nothing more than an adaptation of the rules of etiquette from the real world to the virtual world. The ethics you need to keep on the internet to make your life better. Although this label has evolved to become part of the rules of certain systems, it is quite common for rules of etiquette to be based on an "honor“ based system; that is, that the offender does not even receive a reprimand. The term netiquette describes a protocol that should be used when making electronic "contact". This protocol has been driven by Internet users to provide greater security and humanity to the communication and thus fight network problems such as fraud, spam or rumors.

  4. Unit 1: Netiquette In Netiquette there are 10 basics rules and some recommendations, that are: Rule No. 1: Politeness and common courtesy Treat people with whom you communicate with respect, measure the words you say, because what you write can be filed and then used against you, generally speaking you shall treat others how we would like to be treated . Rule No. 2: Behave like in real life Be respectful and behave according to the laws of society and cyberspace. Even if in cyberspace possibilities of being discovered seem remote, this should not make us forget that there is a human being on the other side of the computer. Rule No. 3: Know where you are in cyberspace Before participating in an activity on the Internet, you should respect behaviors, customs and rules of the site.

  5. Unit 1: Netiquette Rule No. 4: Respect time and bandwidth of others Before sending an information to a certain person, make sure that what you send is important, be brief and concise since time is precious, and it stops people from doing other activities. Rule No. 5: Respect writing styles Use good writing and pay attention to grammar when writing emails, be clear and consistent with the information transmitted so that it is not distorted. Be simple, nice, polite and avoid using offensive language because it can annoy someone. Rule No. 6: Share the knowledge Share your knowledge with other people in the network and cyberspace. Put yourself in the place of others and remember when you did not know anything that particular topic, that they are now asking you.

  6. Unit 1: Netiquette Rule No. 7: Keep disputes under control When you want to be part of a conversation like in a forum, do it if you are sure of what you are going to write. Stay out of discussions that you do not master, be cautious when entering a discussion group. Rule No. 8: Respect everybody’s privacy If you share the computer with other members or users, respect their data. Do not read other people's emails, do not look at their files, etc. This is applicable both to users who use your computer, and to those who do not.

  7. Unit 1: Netiquette Rule No. 9: Do not abuse of the Know-how that you may have Do not take advantage of the expertise you may have to access other people devices. Knowledge does not give you the right to take advantage of others. Rule No. 10: Forgive others for their mistakes Remember that we are all human and therefore, we can make mistakes. You should never judge someone for their failures. Help or make suggestions when you find an error and never show arrogance or laugh at it.

  8. Unit 1: Netiquette Recommendations For groups and mailing lists: • Don’t write profanity; • Don’t do spamming (including sending unwanted links to websites); • Don’t send the so-called chains of happiness; • Read the FAQ list before asking the question; • Avoid provoking discussions or arguments; Recommendations For interactive services (IRC, instant messengers, chat rooms, discussion forums on websites • Use the "Search" function in forums, before creating a new thread (on the subject / problem discussed above); • Read the FAQ of a given channel / forum / chat and comply with the detailed rules contained therein; • Avoid contacting people who do not want to be contacted.

  9. Unit 1: Netiquette Recommendations for electronic correspondence [e-mail]: • Stick to a thread in electronic correspondence or to cite an e-mail (in the absence of such an option in the mailbox); • Add a thread of correspondence underneath (mainly regarding e-mail); • Signature should not have more than four lines (no line dedicated to the delimiter is included in its length); • Always use meaningful and targeted subjects in your emailing correspondence.

  10. Unit 1: Netiquette Examples of behaviors contrary to the netiquette • Trolling: Antisocial behavior characteristic of forums and not only. Trolling people are called trolls. Trolling is about ridiculing or insulting other users by sending messages or making posts public. • Flooding: Repeatedly sending the same message, or many different, empty or intentionally garbled packets in a short time. Flooding can occur in messengers or at network protocols • Spamming: Sending unwanted or unnecessary e-mails. The best known form of spam is e-mail spam. Some people also experienced spam on messengers and via SMS.

  11. Unit 2: Safety on the net and tips for protecting devices If your device is important to you, then you must protect it, especially its data. Don’t forget that personal data such as passwords, email addresses, etc. are stored in your device. The protection of your device depends only on us and there are some risk areas and recommendations that we are going to explore in this unit.

  12. Unit 2: Safety on the net and tips for protecting devices Risk areas: Internet connection • Our Wifi connection is one of the risky areas that we will have to face. To improve the security of our network, it is important to change the default username and password. Online activity • Threats can reach us in two ways: through malicious programs or files that we download and install on our computer, or through computer attacks lead by hackers trying to enter our computer and steal our passwords, in this case computer viruses, worms, Trojans and phishing attacks are used. User level • If your computer does not have a password or any tool to monitor the activity that is being carried out, it is very easy for hackers to steal data.

  13. Unit 2: Safety on the net and tips for protecting devices Tips for protecting devices: • Do not open any email from untrusted sources: They can contain phishing content or malware. • Lock your laptop: When you are away from workstation • Purchase anti-virus software and turn on the firewall. It won’t secure you in 100%, but can save you from some threats. And keep it updated! • Back up your system: It is essential to back up your system and important data in case of hacker attack. • Set a safe password: Its length is a minimum 12 characters, including lowercase and uppercase characters, symbols and numbers. • Don’t use personal related data as a password: That would make hackers their job easier. Date of birth or date of the wedding is not a good password. And do not use the same password for everything!

  14. Unit 2: Safety on the net and tips for protecting devices • Read Privacy Policy: It’s a document on a website which informs users about data that is gathered and how they would be used • Don’t give personal information to strangers and encrypt sensitive data • Don’t send important data on a public wireless network: It might be insecure. • Update your software: It’s important to keep your system up to date. There might be some useful stuff that can help secure your data. Make sure it’s a reliable source • Always read cautiously: Sometimes some things can pop up on your screen and there are few options: agree or disagree. Read everything first and then decide. Do not click on suspicious links and do not download suspicious files. If you are interested in a program, try to download it from the official provider • Be careful with sites where you upload your files, always keep a backup • Turn on the position tracking of your device and do not leave your device unattended

  15. Unit 2: Safety on the net and tips for protecting devices Tips for browsing on the net: Surfing the Internet is an integral part of our lives, so we must avoid data robbing on the web. Here are some ways to avoid Be anonymous • The less information about you circulates on the internet, the safer you are Strong password • Set a strong password. The more characters the better. Change passwords often to prevent guessing Encrypted connection • Typically, the HTTPS protocol is secure and it is visible in the upper left part of the address bar. If you get a warning about a problem with HTTPS then do not enter that page

  16. Unit 2: Safety on the net and tips for protecting devices Use programs for blocking unsolicited items on the page • Install AdBlock, NoScript, Flashblock, Cookie Monster. These programs prevent unwanted items from loading on the page Use Private mode • By enabling private mode in the browser, when we close it, all cookies and browsing history will be deleted Log out • Logging out of the workplace is very important. Do not forget!

  17. Unit 2: Safety on the net and tips for protecting devices Recommendations for transactions: Making transactions via the internet is fast and convenient, but it is not always a secure form of exchange, pay attention to the following: Dos • Always check if the connection is secure with a https protocol and use a separate email for online purchases. • Check the opinion about seller. Choose stores with certificates of trust, search for reviews of the seller. • Check the seller's contact and identification details. • Check the selection of payment methods. Pay preferably via PayPal, as you can recover the money if a problem arises • Log out. Don'ts • Do not buy before you check the reliability of the auction. Do not click links in e-mails - you may fall victim to a scam. • Do not give your data if there is no need and do not give your login and password.

  18. Unit 3: Sharing throughdigital technologies Sharing is good and with digital technology, sharing is easy. Richard Stallman You will always find sharing useful. Imagine that you discovered a fantastic recipe and you want to send it to your child or friend. Maybe you went on holidays and you want to show photos to others. Network gives you the chance to connect with other people. Chat and share information with them. There are many ways of sharing data through the Internet. Let’s have a look at some interesting sharing options…

  19. Unit 3: Sharing throughdigital technologies Sharing offline CDs and DVDs • This is the basic method of sharing data. Recording data on CD or DVD disks is called burning. You can burn any type of data, photos, videos, music, documents. There are few types of CDs and DVDs. • CD-ROM – it’s a Read Only Memory CD disk. This means that they are non-writable. • CD-R - CD disk that is writable. This means that you can burn data once or more than once. • CD-RW - you can add data and erase whole data on disk. Flash memory • More modern way to transport files is use of flash memories. USB sticks and memory cards in various sizes. • Flash cards are used in cameras and phones to store data. You can pop the card out of device and insert to memory reader in PC and give it to someone.

  20. Unit 3: Sharing throughdigital technologies Sharing online Via Social Media Snapchat – Used to share photos and videos. Unique feature is that this content disappears after some time Facebook – very popular around the world. Various types of content. Twitter – Used for giving short information or present opinions. Instagram – mainly intended to share photos and videos.

  21. Unit 3: Sharing throughdigital technologies Via Email • The most commonly used way of sharing data is by Email. You can send a message which apart from text consists of attachments. They can be photos, videos or documents. Don’t expect too much. Attachment size has its limit. But now it isn’t that small. Some of email services allow you to send files with size up to 100MB. Via Skype • Skype is a telecommunications application software product that specializes in providing video chat and voice calls between computers, tablets, mobile devices, the Xbox One console, and smartwatches via the Internet and to regular telephones. Skype additionally provides instant messaging services. Users may transmit both text and video messages, and may exchange digital documents such as images, text, and video. Skype allows video conference calls. HTTPS://WWW.SKYPE.COM

  22. Unit 3: Sharing throughdigital technologies Via Youtube • YouTube is an American video-sharing website headquartered in San Bruno, California. YouTube allows users to upload, view, rate, share, add to favorites, report, comment on videos, and subscribe to other users. It offers a wide variety of user-generated and corporate media videos. Available content includes video clips, TV show clips, music videos, short and documentary films, audio recordings, movie trailers, live streams, and other content such as video blogging, short original videos, and educational videos. HTTPS://WWW.YOUTUBE.COM Via Google Drive • Google Drive is a simple and intuitive tool. It is also connected to Google Docs which allows you to create Word documents, Excel spreadsheets, PowerPoint presentation and much more. The biggest advantage of this service is 15 GB of free space. HTTPS://DRIVE.GOOGLE.COM

  23. Unit 3: Sharing throughdigital technologies Via Cloud storages • Cloud storage is a model of computer data storage in which the digital data is stored in logical pools. The physical storage spans multiple servers (sometimes in multiple locations), and the physical environment is typically owned and managed by a hosting company. It is a comfortable service to store data. It’s also useful in terms of sharing information with others. You can send link to folder with photos, videos, document, etc. You can also use it as a common workplace for a group of people. Create a folder and give others access to create and edit files within it. It’s very helpful if you work on a group project and it’s important to store and share any amount of data. ​ Apart from Google Drive that we have already seen, other cloud based services are listed in the following slides.

  24. Unit 3: Sharing throughdigital technologies Via Dropbox • Dropbox is a multiplatform file hosting service in the cloud, operated by the Dropbox company. The service allows users to store and synchronize files online and between computers and share files and folders with other users and tablets and smartphones. There are free and paid versions, each of which has a variety of options. The mobile version is available for Android, Windows Phone, Blackberry and iOS (Apple). It currently has more than 500 million registered users. HTTPS://WWW.DROPBOX.COM Via WeTransfer • It is a cloud-based service that allows transferring files simply indicating the recipient's email address. It offers unlimited uploads as well as the possibility of sharing files of up to 2 GB in size. The bad part is that files are kept on the server for up to 7 days and they do not use encryption or password protection. HTTPS://WETRANSFER.COM​

  25. Unit 3: Sharing throughdigital technologies Via OneDrive • OneDrive by Microsoft lets you easily backup, store and share photos, videos, documents, and more – anywhere, on any device. You need to have a valid Microsoft license to use safely this service. HTTPS://ACCOUNT.MICROSOFT.COM/ACCOUNT/ONEDRIVE Via Mega • MEGA is a cloud storage and file hosting service offered by Mega Limited, a New Zealand-based company. The service is offered primarily through web-based apps. Mega mobile apps are also available for Windows Phone, Android and iOS. HTTPS://MEGA.NZ/​

  26. Unit 3: Sharing throughdigital technologies Other sharing solutions • Telegram and WhatsAppchannels • Conventional applications like Mediafire and Zippyshare • Torrent • There are many pages to share online temporarily, one of the most used and simple is https://reep.io/ There are also specific sharing platforms • To share images, drawings or photography, the most famous is https://www.deviantart.com/ • To share graphic files and ppts Imgur and ImageShack • There are also pages to share plain text, or share the application code: https://pastebin.com/ or https://github.com

More Related