Presentation is loading. Please wait.

Presentation is loading. Please wait.

Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.

Similar presentations


Presentation on theme: "Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common."— Presentation transcript:

1 Unit 11 Communication & Collaboration

2  Identify different communication methods  Identify advantages of electronic communication  Identify common problems with electronic communication  Identify elements of professional electronic communication  Identify appropriate use of email attachments  Identify issues with unsolicited email  Describe how to control unsolicited email  Identify procedures for safe electronic communication

3  Need real-time? ◦ Use IM  Need a paper trail? ◦ Use Email ◦ Most widely used  Distance Learning? ◦ Video Conference  Other ◦ Blog, message board

4  Speed  Low cost/free  Access from various devices, cell or computer  Forwarding of messages can be done  Collaborative  Share documents  You can keep track of sites visited ◦ Stored on your computer  One to one popular: Email

5  Favorites Center  Options: ◦ By site ◦ By date ◦ By most visited ◦ Search

6  Attachments ◦ Size may be too big/too many ◦ Virus ◦ Blocked by program  Delivery Failure ◦ Bounced  Mistyped address  Virus detected/spam filter  You’ve been blocked by receiver  Their mailbox is full

7  Written record or history ◦ Can be used in legal cases ◦ You may need proof ◦ Email can provide that  IM, phone/online conferences can’t

8  Say something you wish you could take back  You get an email that makes you angry ◦ Discuss with someone/calm down ◦ Write email & leave out To: address until sure ◦ Save as draft & wait a day  Reply, Reply All  Proper spelling & grammar

9  Include a subject ◦ Brief yet descriptive enough  Try to keep to 1 subject  Keep message short  Avoid ALL CAPS!  Limit jokes, symbols :-o  Proofread before sending  Double check the addresses ◦ DON’T EMBARRASS YOURSELF!  Email sent through company is NOT private

10

11  Spam ◦ Unsolicited ads ◦ Don’t reply to junk emails  Typically, an e-mail message is sent to multiple recipients who did not ask to receive it.  E-mail messages are not considered spam if a user has signed up to receive them.

12  Estimated 80% of email is spam  1978 - An e-mail spam is sent to 600 addresses  1994 - First large-scale spam sent to 6000 newsgroups, reaching millions of people.  2005 - 30 billion per day  2006 - 55 billion per day  2010- Spam is 92% of email sent

13  Be careful giving out your email ◦ Do not publish it online  Check privacy statements ◦ They may share your email address  DO NOT reply to junk mails ◦ They’ll know they have a valid email address ◦ You’ll get more junk!  Use the junk email filter

14  Steals your personal info ◦ Spoofed sites & emails  Emails that appear to come from original source  Asks you to change password  Link takes you to copied site  User collects your info

15  How does it arrive?  Spam: Sneaks in the back door  Phishing: Walks in the front door  How does it make its offer?  Spam: Looks bad, seems far-fetched  Phishing: Looks plausible, seems credible  What is it trying to do?  Spam: Tries to sell you something  Phishing: Tries to steal something from you

16  What’s worse, spam or phishing?  Let’s Play ◦ Phishing Scams- Avoid the Bait Phishing Scams- Avoid the Bait ◦ Spam Scam Slam Spam Scam Slam ◦ Follywood Squares Follywood Squares ◦ Phishing IQ Test Phishing IQ Test

17  Program written to cause disruption ◦ Attached to a file or email ◦ Spreads  Worm- copies itself across network & slows it down  Time Bomb- damage at certain time/date  Trojan Horse- looks like something good, but isn’t  Protect with Antivirus software ◦ Update regularly ◦ Be careful opening emails ◦ Scan attachments first

18  Virus program scan all emails (in & out)  Virus program subscription ◦ Schedule scan  Review emails & IMs before sending ◦ ISP can filter emails as well  Understand netiquette & company rules  Encrypt emails with private info  Save & backup your emails ◦ Remember the “paper trail”  Follow laws

19  T or F. Email paper trails cannot be used as legal documents.  Junk email is also called _______.  ______ refers o good manners when communicating electronically.  ______ tries to get/steal your private info.  ______ is just annoying!

20 Unit 11 Communication & Collaboration


Download ppt "Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common."

Similar presentations


Ads by Google