Upload
kelseytitmarsh
View
223
Download
0
Embed Size (px)
Citation preview
8/12/2019 ISY10212 Lecture Week 2, 2006
1/23
G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT
Lecture: Week 2
Slide 1
Week 2 e-mail
ISY10212
Contemporary Issues in Multimedia and
Information Technology
Mails in (Thing, Adams Family) and here to stay
Education Practices some quick comments
and practice makes perfect
8/12/2019 ISY10212 Lecture Week 2, 2006
2/23
G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT
Lecture: Week 2
Slide 2
Communication Background face-to-face
People are social beasts and virtually all communications
in the greater context of history have been face-to-face.
one-to-one; with parents, peers, spouse, children
one-to many; via song and dance
many-to-many; waring tribes beating their chest still evident today when New Zealand play international Rugby
the haka
many-to-one; when the peasants rise up en-mass against the King/
Tsar/ Power/ Authority.
8/12/2019 ISY10212 Lecture Week 2, 2006
3/23
G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT
Lecture: Week 2
Slide 3
Communication Background face-to-face
Even to-day face-to-face communication is:
common (everywhere), regular (often),
important (provides giving of information that matters),
popular (people enjoy the social event), and
beneficial for those that participate (good for the human condition of beinga social being).
Asides
Prisoners are placed into solitary confinement to take them out ofcommunication AND to impose psychological strain.
News readers are a talking head on screen.
Watch news from other countries. The language differsbut the formatis identical.
Then again, Naked News has the talking headplus the body and isThe Program With Nothing to Hidea naked news reader on-line.
8/12/2019 ISY10212 Lecture Week 2, 2006
4/23
G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT
Lecture: Week 2
Slide 4
Communication Push for Written
Pressure to replace verbal communication (or at least
supplement it) with written communication have includedaspects of:
culture
law
time
place, and
technology.
8/12/2019 ISY10212 Lecture Week 2, 2006
5/23
G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT
Lecture: Week 2
Slide 5
Written Communication Culture
Paintings done as art can contain narratives of the time,
religion, social comment. There is art over and above the message. (It can be pleasant to
look at irrespective of your views on the comment).
Written copy can contain narratives of the time, religion,
social comment. Plays, poems, novels.
There is art over and above the message. (It can be pleasant tolisten to irrespective of your views on the comment).
Shakespeare plays are typically considered highly art-form in
the use of language, but also message and commentary of thetimesome of which transcend time and place.
e.g. Romeo & Juliet is STILL performed and has been made into movies set in arange of times and cultures.
8/12/2019 ISY10212 Lecture Week 2, 2006
6/23
G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT
Lecture: Week 2
Slide 6
Written Communication Law
Written documents with a seal the negative from the ring worn by the King (or other important person)
embedded into hot wax as a sign of authenticity.
Written and signed statements, with date in ones own handwriting, can be presented as evidence of a persons
statement of fact, intent, belief
eg; a persons will Literally, I WILLleave my possessions to
Signed statements resulting from Police Interview Record of interview.but open to Police verbal, so now the video camera
is (or at least should be) used
People may say or sign, under duress.but difficult to overturn, becausethey SIGNED it.
You have been warned.NEVER sign anything unless you are surethat you agree. Do you actually READ the software licensing agreements before installing
software?
8/12/2019 ISY10212 Lecture Week 2, 2006
7/23
G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT
Lecture: Week 2
Slide 7
Written Communication Time and Place
Written for posteritymessage from the grave To indicate personal intent, such as a will.
To capture a truth such as a record of atrocities The Diary of Anne Frank
Sandakan Prisoner of War Campo (6 POWs survived from severalthousandbecausethey escaped).
Written to span distances May be the command of Caesar or the King across the empire.
May be the report or request back to the centre of command This used to take about 6 months in a sailing ship in 1800 between Australia
and England.
Letters to loved ones While on conquest and explorations (eg. Charles Darwin on The Beagle)
The tyranny of war (eg. War Museum Canberra, letters from WW1 soldiers in the
trenches and on Gallipoli)
ANYWHERE and ANYTIMEwhere loved ones have been separated in timeand place, a capturing of news, emotions, desires, and dreams for the future.
8/12/2019 ISY10212 Lecture Week 2, 2006
8/23
G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT
Lecture: Week 2
Slide 8
Written Communication Technology
Some technologies facilitated the capture of the message.
Papyrusan early form of paper Quillsan early form of writing with ink
Ball Point PensBicPens.from Baron von Bic who had the idea
Typewritersused to be considered a mechanical marvel
Word Processorson virtually ever home computer.
Some technologies facilitated the transport of the message.
Horseback
Ships
Trains
Telegraph
Aeroplanes
Satellites.
8/12/2019 ISY10212 Lecture Week 2, 2006
9/23
G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT
Lecture: Week 2
Slide 9
Electronic Mail - E mail / e mail
Email brings with it some consequences in:
culture law
time
place
technology
undesirable consequences, and
ethics
8/12/2019 ISY10212 Lecture Week 2, 2006
10/23
G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT
Lecture: Week 2
Slide 10
Electronic Mail - Culture
A whole new style of writing, with responses incorporated into body.
A new means of communicating
when, why, to whom, how, and how often.
An alternative to speaking to someone in Office Politics.
Colleagues (especially if they do not get on well) may use Email tocommunicate instead of leaning over the desk to where the person is
sitting.
In a work environment it becomes another means of carrying on
private discussions with people elsewhere. But who owns the time, the equipment, the network.and what lame
visual joke, or offensive material, is in the attachment?
8/12/2019 ISY10212 Lecture Week 2, 2006
11/23
G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT
Lecture: Week 2
Slide 11
Electronic Mail - Culture
Lame attachment.
Source
unknown
received as an
email attachment
8/12/2019 ISY10212 Lecture Week 2, 2006
12/23
G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT
Lecture: Week 2
Slide 12
Electronic Mail - Law
Email provides an electronic paper trail of who said what, when,
where, to whom. This has a legal status within a court of Law.though the Emails will need
to be obtained through legal means, such as the seizure of computers.
Email has become THE way in which directives are promulgated
through many companies and organisations (such as SCU).
There is still scope for face-to-face announcements to all staff, because
this is more personal.
There is still scope for internal reports because these are more glossy.
but Email is sufficient to indicate that staff have been informed,
PROVIDED it emanates from a suitable person of authority in that chain of
command.
8/12/2019 ISY10212 Lecture Week 2, 2006
13/23
G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT
Lecture: Week 2
Slide 13
Electronic Mail Time and Place
Email can be penned and sent at any place and time, provided
suitable hardware, software, and access requirements are in place. These are modifying as we speak with wireless technology and mobile
phones evolving.
It is flexible enough to enable both synchronous (in real time) and
asynchronous (out of real time) communications.
A response may be received in a few seconds, few minutes, few hours,
few days, few weeks, few months.never.
INCREADIBLYempowering to travellers to stay in touch both
privately and professionally.
Singapore Airportlots of free internet terminals packed with young
travellers of all nationalities and languagestyping away to send and
receive emails.and visit their favourite news sites on the WEB (which we
have yet to speak of).
8/12/2019 ISY10212 Lecture Week 2, 2006
14/23
G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT
Lecture: Week 2
Slide 14
Electronic Mail Technology
Hardware implications
Networks, Intranets, Internet.
Security..it makes available possible breaches in the system via bothtechnology error and human error.
Software and Service implications
Specialised (dedicated) software
Bundled software Free software
Hotmaila case study of giving IT to the masses, released 1996.
Who here have now, or previously have held, a Hotmail account (or similarfree on-line email account)?
Is it YOUR name.or are there already lots of people named you outthere?
Its not really without costif the user does not pay then advertising does.
see http://www.hotmail.com
8/12/2019 ISY10212 Lecture Week 2, 2006
15/23
G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT
Lecture: Week 2
Slide 15
Electronic Mail Undesirable Consequences
NOT ALL GOOD! Any Technology brings with it benefits.
Any Technology brings with it undesirable consequences.
A Cynical view of Email is that it is a more efficient and effective wayto send Junk Mail.irreverently called SPAM! SPAM may also be associated with Illegal intent.
E.g.: Send me your bank details so I can send money from Nigeria.
E.g.: Do you want to buy some cheap software?
Other examples of undesirable consequences of Email include: Scope for viruses and worms to be transmitted in attachments.
The risk of security breaches, and so the need for Firewalls and
Encryption. Additional work load due to the need to document all instructions, some ofwhich were previously given verbally to subordinates.
Scope for workers to misuse employer provided resources.
8/12/2019 ISY10212 Lecture Week 2, 2006
16/23
G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT
Lecture: Week 2
Slide 16
Electronic Mail Ethics
Ethics
are the morals and code of conduct adhered to by people to ensurethat their personal behaviour does not take unfair advantage of their
knowledge, skills, authority, wealth, political contacts, health,
educationand so on.
In general, laws reflect the ethics of any given societal setting or
culture.
For example, Insider Trading is illegal because members of a Board are
privy to confidential information which they may benefit from financially if
enacted upon.
This is unfair from the standpoint of needing to ensure an equal playing
field in the realm of business and the economyand SO is made illegal.
Examples: Rene Rivkin, Steve Vizard.
8/12/2019 ISY10212 Lecture Week 2, 2006
17/23
G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT
Lecture: Week 2
Slide 17
Electronic Mail Ethics
Technology can outpace the capacity of society to establish
appropriate laws. For example, the scientific capacity of stem cell research and human
cloning are essentially presentBUT few countries, if any, in the global
context have been able to develop laws to adequately deal with these
capabilities.
Email technology outpaced the capacity for law to stay abreast.
So ethicsbecomes the means by which people at an individual level,
societal level, national level and international level try to make appropriate
decisions and enforce appropriate behaviourswhile waiting for
legislative systems to identify, develop and enact appropriate laws to
govern these areas.
Some laws now exist with respect to emailbut these have been in
responseto questions and issues raised with respect to their use.
8/12/2019 ISY10212 Lecture Week 2, 2006
18/23
G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT
Lecture: Week 2
Slide 18
Electronic Mail Ethical Questions
With respect to the use of Email, you might like to consider the
following questionsfrom both an ethical and legal perspective. Is it acceptable to compose and send personal Emails at a place of
employment using the employers time and resources?
Who can have access to emails and attachments produced and sent from
a place of employment?
What would be deemed to be offensive and/ or harassing content and/or
attachments?
Can any personal rights to privacy in the context of a personal
communication (much like a hard copy written letter) be signed away to an
employer via an employment contract?
Should contravening appropriate usage of Email be just cause for
cautions, demotion, or sacking?
Note: Network Administrators DO HAVE THE ACCESSPRIVLIDGES
to view emails.
8/12/2019 ISY10212 Lecture Week 2, 2006
19/23
G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT
Lecture: Week 2
Slide 19
Electronic Mail Ethical Questions
Scenario
If you came to a computer that another person had logged onto.and leftwithout logging off from (most likely they have simply forgotten), would it
be acceptable for you to view their current work on screen?
.what about their other assignment files, pictures, Emails..?
and what about their share portfolio, their bank account details, their
medical record..?
Hands up if YOU have ever left a computer work station while still
logged on Does your view change for the above because it is now YOU who may
have their files looked at?
8/12/2019 ISY10212 Lecture Week 2, 2006
20/23
G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT
Lecture: Week 2
Slide 20
Electronic Mail in Education
Southern Cross University is an Educational institution. Email is used for:
staff-to-staff communications staff-to-student communication
student-to-staff communications
student-to-student communications.
It is subject to all the benefits, and the problems associated with thediscussion above.
Convenient
Exact detail specified
Electronic paper trail as evidence
Cc to other parties for their information
Butlots of it, irrelevant messages, SPAM, viruses, privatecommunications
8/12/2019 ISY10212 Lecture Week 2, 2006
21/23
G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT
Lecture: Week 2
Slide 21
Other on-line aspects in Education at SCU
MySCU
Web based portal to a range of study resources. Library searches and borrowing renewals.
Electronic resources.
Study guides for essay and report writing.
Unit materials and group discussions.
Exam dates and enrolment details.
Web based access to resources IN GENERAL
Web access to news
Web access to technical resources (e.g. software hints) Web access to academic papers (e.g. referenced findings)
Web access to like-minded people (e.g. groups)
8/12/2019 ISY10212 Lecture Week 2, 2006
22/23
G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT
Lecture: Week 2
Slide 22
Other on-line aspects in Education at SCU
Web has already changed the way students carry out their
general line of business Web search HASbecome first point of call.
Web as a resource for research and education is here to stay for (I
expect) a long time and impacts students at school, TAFE,
universityand is used by industry, government, and the
unemployed..PROVIDED that they have access.
Impact of computer technology in education will be
considered more next week.
8/12/2019 ISY10212 Lecture Week 2, 2006
23/23
G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT
L t W k 2
Slide 23
Home Work
Before next week, Please ensure that you visit and browse:
Yahoo! Netrospective: 10 years, 100 moments of the Web
http://birthday.yahoo.com/netrospective
While not for everyone, you may like to skim:The Anatomy of a Large-Scale Hypertextual Web Search Engine
by Sergey Brin and Lawrence Page (the Google guys)
http://services.eliteral.com/search-engine-optimization-
india/anatomy-of-a-search-engine.php
http://birthday.yahoo.com/netrospectivehttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://birthday.yahoo.com/netrospective