20
Living Online Unit 11 Communication & Collaboration

Unit 11 Communication & Collaboration. Identify different communication methods Identify advantages of electronic communication Identify common

Embed Size (px)

Citation preview

Living OnlineUnit 11

Communication & Collaboration

Identify different communication methods Identify advantages of electronic communication Identify common problems with electronic

communication Identify elements of professional electronic

communication Identify appropriate use of email attachments Identify issues with unsolicited email Describe how to control unsolicited email Identify procedures for safe electronic

communication

Objectives

Need real-time?◦ Use IM

Need a paper trail?◦ Use Email◦ Most widely used

Distance Learning?◦ Video Conference

Other◦ Blog, message board

Communication Methods

Speed Low cost/free Access from various devices, cell or computer Forwarding of messages can be done Collaborative Share documents You can keep track of sites visited

◦ Stored on your computer

One to one popular: Email

Advantages of Electronic Communication

Favorites Center Options:

◦ By site◦ By date◦ By most visited◦ Search

Viewing Browser History

Attachments◦ Size may be too big/too many◦ Virus◦ Blocked by program

Delivery Failure◦ Bounced

Mistyped address Virus detected/spam filter You’ve been blocked by receiver Their mailbox is full

Problems with Electronic Communication: Email Issues

Written record or history◦ Can be used in legal cases◦ You may need proof◦ Email can provide that

IM, phone/online conferences can’t

Problems with Electronic Communication: Paper Trail

Say something you wish you could take back

You get an email that makes you angry◦ Discuss with someone/calm down◦ Write email & leave out To: address until sure◦ Save as draft & wait a day

Reply, Reply All

Proper spelling & grammar

Problems with Electronic Communication: Hasty Responses

Include a subject◦ Brief yet descriptive enough

Try to keep to 1 subject Keep message short Avoid ALL CAPS! Limit jokes, symbols :-o Proofread before sending Double check the addresses

◦ DON’T EMBARRASS YOURSELF! Email sent through company is NOT private

Email Ettiquete

Which is Best?

Spam◦ Unsolicited ads◦ Don’t reply to junk emails

Typically, an e-mail message is sent to multiple recipients who did not ask to receive it.

E-mail messages are not considered spam if a user has signed up to receive them.

Unwanted Email

Estimated 80% of email is spam

1978 - An e-mail spam is sent to 600 addresses

1994 - First large-scale spam sent to 6000 newsgroups, reaching millions of people.

2005 - 30 billion per day

2006 - 55 billion per day

2010- Spam is 92% of email sent

Spam Facts- FYI

Be careful giving out your email◦ Do not publish it online

Check privacy statements◦ They may share your email address

DO NOT reply to junk mails◦ They’ll know they have a valid email address◦ You’ll get more junk!

Use the junk email filter

Spam

Steals your personal info ◦ Spoofed sites & emails

Emails that appear to come from original source Asks you to change password Link takes you to copied site User collects your info

Phishing

How does it arrive? Spam: Sneaks in the back door Phishing: Walks in the front door

How does it make its offer? Spam: Looks bad, seems far-fetched Phishing: Looks plausible, seems credible

What is it trying to do? Spam: Tries to sell you something Phishing: Tries to steal something from you

Spam vs. Phishing

What’s worse, spam or phishing?

Let’s Play◦ Phishing Scams- Avoid the Bait◦ Spam Scam Slam◦ Follywood Squares◦ Phishing IQ Test

Review

Program written to cause disruption◦ Attached to a file or email◦ Spreads

Worm- copies itself across network & slows it down Time Bomb- damage at certain time/date Trojan Horse- looks like something good, but isn’t

Protect with Antivirus software◦ Update regularly◦ Be careful opening emails◦ Scan attachments first

Viruses

Virus program scan all emails (in & out) Virus program subscription

◦ Schedule scan Review emails & IMs before sending

◦ ISP can filter emails as well Understand netiquette & company rules Encrypt emails with private info Save & backup your emails

◦ Remember the “paper trail” Follow laws

Safe Guidelines

T or F. Email paper trails cannot be used as legal documents.

Junk email is also called _______.

______ refers o good manners when communicating electronically.

______ tries to get/steal your private info.

______ is just annoying!

Review

Living OnlineUnit 11

Communication & Collaboration