Communication - Chap 10 Flashcards
What are constraints?
Rules used while communicating to ensure security of a message that is sent and to prevent people from writing unacceptable things.
List the five constraints that need to followed while communicating through emails.
- Laws
- Acceptable language
- Copyright
- Security and password protection
- Netiquette
State the seven Email laws.
- Companies must have Privacy policy clearly stated
- Way to “opt out” must be there
- Senders of emails should obtain “opt in” info first in many countries
- Option for unsubscription must be present
- Companies must provide a valid postal address
- Many countries don’t allow “harvesting” of email addresses.
- No false or misleading subject lines are allowed
What are examples of unacceptable content used in email, text messages or online forums?
- Obscene images
- Usage of profane, abusive and blasphemous language
- Racist, exploitative and violent messages
- Use of illegal material in messages
List methods of increasing the security of emails.
- Use a strong password
- Change password frequently
- Use spam filters to remove suspicious emails to a junk folder
- Run an anti- virus and anti- spam software on you computer at all times
What are passive and active email attacks?
Passive- the release of email material to other users without your consent
Active- modification of your messages or denial of service ( i.e., overloading your computer by sending thousands of emails which can make internet access seem impossible).
What is netiquette?
- short form for internet etiquette
- The need to respect other user’s views and display common courtesy while posting views in online discussion groups or when sending emails
List ten rules of netiquette.
- Don’t be abusive
- Don’t send spam
- Be clear with your messages
- Remember that most posts are public and can be read by anyone
- Check your spelling and grammer
- Respect people’s privacy (don’t publish embarassing info)
- Don’t be too compelled to point out errors
- Don’t use CAPITAL LETTERS (seen as shouting)
- Don’t plagiarize (use quotes if needed)
- Don’t use too many emoticons (annoys other users)
What is spam and what are its disdvantages?
Spam is unsolicited email sent over the internet.
Disadvantages:
• uses up people’s time
• annoys people
• uses up valuable bandwidth and slows down the internet
• can have viruses attached or be part of a phishing scam
• clogs up user’s inboxes
What are email groups used for?
- Easier to send out multiple emails if all the IDs are grouped under one name
- Companies can target specific groups for marketing purposes
- Spammers can create email groups (from harvesting email addresses) and send spam email to thousands of people with just one click
- Companies can use email groups to set up meetings (so that everyone is invited and no one is forgotten)
What is the internet used for?
- sending and receiving emails
- chatting online
- transferring files
- browsing the world wide web
Define internet.
It is a concept that connects many networks and relies on physical infrastructure.
Define intranet.
Intranet is a computer network based on internet technology but designed for the internal needs for sharing info within a single organization or company.
List the advantages of adopting intranets rather than internet.
- safer (less chance of hacking or virus)
- specific info available
- certain external links can be blocked
- intranet has better bandwidth
- easier to send out sensitive messages
- it is possible to create an extranet (outsiders can be given partial access)
What is copyright?
Laws that prevent people without permission from copying, printing and sharing confidential documents, emails and other information.