Netiquette. IT Engineering II Instructor: Ali B. Hashemi
|
|
- Ariel Carr
- 5 years ago
- Views:
Transcription
1 Netiquette IT Engineering II Instructor: Ali B. Hashemi 1 1
2 Ethics in Networking!? 2 2
3 Netiquette Etiquette: the formal rules for polite behaviour in society or in a particular group. Netiquette is network etiquette: the do's and don'ts of online communication. Netiquette covers both common courtesy online and the informal "rules of the road" of cyberspace. In other words, Netiquette is a set of rules for behaving properly online. 3 3
4 What do you do if someone sends you an that makes you feel uncomfortable? 4 4
5 Language What should you do if someone uses inappropriate language in an ? 5 5
6 Feelings What should you do if someone writes something that is meant to hurt someone else s s feelings? Remember the web s golden rule: Remember, there is a person there. s, comments in chat rooms, and instant messages are read by real people with real feelings. 6 6
7 Netiquette ~ Law There are many rules of netiquette, but some happen to be laws too. No spamming No spoofing No phishing No flaming 7 7
8 HUH???? 8 8
9 SPAMMING Definition: the act of sending unsolicited electronic messages in bulk. (Dictionary.LaborlawTalk.com) 9 9
10 Types of SPAM spam: unsolicited . Forum spam: posting advertisements or useless posts on a forum. Newsgroup spam: advertisement and forgery on newsgroups. Spam in blogs: posting random comments or promoting commercial services to blogs, wikis, guestbooks. Messaging spam ("SPIM"): use of instant messenger services for advertisement or even extortion. Spamdexing: manipulating a search engine to create the illusion of popularity for webpages
11 What is SPAMminess? The original approaches were fairly mundane keyword matching systems. Say the wrong thing and your message is relegated to the bit bucket
12 Dilbert & Spam 12 12
13 SPOOFING Definition: A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host.(webopedia) 13 13
14 SPOOFING (cont.) spoofing A term used to describe fraudulent activity in which the sender address and other parts of the header are altered to appear as though the originated from a different source commonly used for spam and phishing to hide the origin of an message 14 14
15 SPOOFING (cont.) Website spoofing the act of creating a website, as a hoax, with the intention of misleading readers that the website has been created by a different person or organisation. Normally, the website will adopt the design of the target website and sometimes has a similar URL
16 SPOOFING (cont.) Referer spoofing the sending of incorrect referer information along with an HTTP request, sometimes with the aim of gaining unauthorized access to a web site. It can also be used because of privacy concerns, as an alternative to sending no referer at all
17 SPOOFING (cont.) IP (Internet Protocol) address spoofing The creation of IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing system
18 PHISHING webpage spoofing Definition: The act of sending an to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. (Webopedia) Phishing attacks generally use spoofing as a strategy but spoofing attacks are not necessarily phishing 18 18
19 A Geocities web page duplicating the Yahoo! login page 19 19
20 FLAMING Definition: posting messages that are deliberately hostile and insulting, usually in the social context of a discussion board. (Answers.com) 20 20
21 Borrowing Is it ever right to borrow or copy someone else s pictures or writing without giving them credit? Cutting and Pasting Others Work Is Okay as Long as You Give Credit Where Credit Is Due Cite Your Sources! 21 21
22 The Web Makes Us All Neighbors Remember to treat your web neighbors the way you would like to be treated. s are read by real people with real feelings
23 Online Resources GUIDELINES.html
24 The Core Rules of Netiquette 24 24
25 Rule 1: Remember the Human The golden rule: Do unto others as you'd have others do unto you. Easy to misinterpret meaning of words. Lack of facial expression, gestures and tone of voice to convey meaning. Would you say it to the person's face? 25 25
26 Rule 1: Remember the Human (cont.) When you communicate through cyberspace your words are written Any message you send could be saved or forwarded by its recipient. You don't have to be engaged in criminal activity to want to be careful! You have no control over where it goes. It is unethical to forward a message without asking permission of the originator of the message. Do not make changes to someone else's message and pass it on without making it clear where you have made the changes. would be misrepresentation. Use the BCC -Blind Carbon Copy- function when sending a message to a large group of contacts especially if the recipients of your mail do not know each other
27 Rule 2: Stick to real-life standards of behavior Different standards of behavior BUT not lower than in real life. Be ethical encountering an ethical dilemma in cyberspace, consult the code you follow in real life. If you use shareware, pay for it. encourages more people to write shareware. The few dollars probably won't mean much to you, but they benefit all of cyberspace in the long run. Breaking the law is bad Netiquette
28 Rule 3: Know where you are in cyberspace Netiquette varies from domain to domain. What's perfectly acceptable in one area may be dreadfully rude in another. Important: know where you are! Lurk before you leap take a look around. Spend a while listening to the chat or reading the archives. Get a sense of how the people who are already there act. Then go ahead and participate
29 Rule 4: Respect other people's time and bandwidth Bandwidth is the information-carrying capacity of the wires and channels that connect everyone in cyberspace. Storage capacity of a host system. If you accidentally post the same note to the same newsgroup five times!, you are wasting both time (of the people who check each copy) and bandwidth (by sending repetitive information over the wires and requiring it to be stored somewhere)
30 Rule 4: Respect other people's time and bandwidth(cont.) You are not the center of cyberspace! Don t expect instant responses to all your questions. Don't assume that all readers will agree with your passionate arguments. Ensure your message is worth the time it takes to open it. Before you copy people on your messages, ask yourself whether they really need to know. If the answer is no, don't waste their time. If the answer is maybe, think twice before you hit the send key
31 Rule 5: Make yourself look good online Take advantage of your anonymity. You won't be judged by race, color, weight, age. However, You will be judged by the quality of your writing. spelling and grammar do count. Know what you're talking about and make sense. Pay attention to the content of your writing. Ensure your notes are clear and logical. Be pleasant and polite. Avoid offensive language
32 Rule 6: Share expert knowledge Don't be afraid to share what you know. The strength of cyberspace is in its numbers. The Internet is to share information. If you ask a question and anticipate a lot of answers Share the results If you re an expert, or you've researched a topic that you think would be of interest to others: Write it up and post it. Sharing your knowledge is fun. And it makes the world a better place
33 Rule 7: Help keep flame wars under control Flaming is what people do when they express a strongly held opinion without holding back any emotion. Netiquette does not forbid flaming! Flaming is a long-standing network tradition (and Netiquette never messes with tradition!). Flames can be lots of fun, both to write and to read! The recipients of flames sometimes deserve the heat! Netiquette does forbid the perpetuation of flame wars Can dominate the tone and destroy the camaraderie of a discussion group
34 Rule 8: Respect other people's privacy You d never snoop through your colleagues' desk drawers, so naturally you wouldn't read their either. Failing to respect other people's privacy is not just bad Netiquette! It could also cost you your job! 34 34
35 Rule 9: Don't abuse your power Some people in cyberspace have more power than others! experts in every office, and system administrators. Knowing more than others, or having more power than they do, does not give you the right to take advantage of them. For example, sysadmins should never read private
36 Rule 10: Be forgiving of other people s mistakes Everyone was a newbie once. When someone makes a mistake be kind about it. If it's a minor error, you may not need to say anything. Even if you feel strongly about it, think twice before reacting. Having good manners doesn't give you license to correct everyone else. If you inform someone of a mistake: point it out politely preferably by private rather than in public
37 Security Is Important, So You May Want To Follow These Directions 37 37
38 Passwords Should you tell your password to anyone? Why or why not? 38 38
39 Strangers What should you do if a stranger asks you questions? What if a stranger asks to meet you in person? What should you do? 39 39
Netiquette. IT Engineering II. IT Engineering II Instructor: Ali B. Hashemi
Netiquette IT Engineering II IT Engineering II Instructor: Ali B. Hashemi 1 1 Netiquette "Netiquette" is network etiquette, the do's and don'ts of online communication. Netiquette covers both common courtesy
More information2.4.2 List out the Dos and Don ts while communicating online.
NOTES 2.4 Netiquette 2.4.1 Explain the meaning of Netiquette. Netiquette is etiquette on the Internet. Since the Internet changes rapidly, its netiquette does too, but it's still usually based on the Golden
More informationIntellectual Property Rights
Intellectual Property Rights Copyright The U.S. Copyright Act, 17 U.S.C. 101-810, is Federal legislation enacted by Congress under its Constitutional grant of authority to protect the writings of authors.
More informationCircle Link 1 "Know Before You Go" Web Literacy Tips:
5 th Grade Scavenger Hunt Content Circle Link 1 http://pbskids.org/privacy/literacytips.html "Know Before You Go" Web Literacy Tips: You know not to talk to strangers on the street but what about on the
More informationEADS up. stop think connect
EADS up stop think connect You text, you play games, you share photos and video. You update your status, you post comments, you probably spend some time in a virtual world. Being online connected through
More informationNETIQUETTE GUIDE FOR ONLINE LEARNING GADSDEN STATE COMMUNITY COLLEGE TEACHING & LEARNING CENTER
NETIQUETTE GUIDE FOR ONLINE LEARNING GADSDEN STATE COMMUNITY COLLEGE TEACHING & LEARNING CENTER WHAT IS NETTIQUETTE? According to the BBC s WebWise Team (2012), the word netiquette is a combination of
More information(Photos and Instructions Based on Microsoft Outlook 2007, Gmail, Yahoo! Mail, and Hotmail)
Specific instructions on how to compose a professional e-mail using send and reply options, basic e-mail components, appropriate wording, content, tone, and examples of what not to do. (Photos and Instructions
More informationIntroduction to
Introduction to Email gcflearnfree.org/print/email101/introduction-to-email Introduction Do you ever feel like the only person who doesn't use email? You don't have to feel left out. If you're just getting
More informationYour message is sent from your computer to a server (like the post office) where the
E-mail it s convenient, cheap and easy. Today, it is the most rapidly growing means of communication. All e-mail programs are slightly different. Gmail, Hotmail, and Yahoo! are some popular e-mail programs.
More informationGlossary
Glossary www.cybersmart.gov.au/cyberquoll CyberQuoll Internet Safety Education for Primary School Students, Parents Guide Website: www.cybersmart.gov.au/cyberquoll Source: Commonwealth of Australia 2009
More informationONLINE SAFETY. Messaging, , Vlogging and Sexting
ONLINE SAFETY Messaging, email, Vlogging and Sexting www.eitts.co.uk Contents WhatsApp & Messaging Email Vlogging Sexting THE RISKS People online are not necessarily who they say they are or seem to be.
More informationOnline Communication. Chat Rooms Instant Messaging Blogging Social Media
Online Communication E-mail Chat Rooms Instant Messaging Blogging Social Media Advantages: Reduces cost of postage Fast and convenient Eliminates phone charges Disadvantages: May be difficult to understand
More informationComputer Basics 4 Basics Revision 3 ( )
Computer Basics 4 E-mail Basics Revision 3 (1-10-2014) E-MAIL E-mail or electronic mail allows you to send and receive messages from anyone in the world with an e-mail address. To access e-mail you need
More informationImplications of an Information Society Final Exam: Tuesday, 4/29 from 8am-noon in 014
Implications of an Information Society Final Exam: Tuesday, 4/29 from 8am-noon in 014 Computers in our day-to-day lives Communication Email, Instant Messaging Our identity, a virtual face Facebook, Blogs,
More informationInternet and Policy
CITY OF JOHNSON CITY Internet and E-mail Policy Revision Number: 4 Page: 1 of 4 1.0 POLICY STATEMENT: The purpose of the Internet Policy is to implement guidelines for the establishment, administration,
More informationOnline Communication. Chat Rooms Instant Messaging Blogging Social Media
Online Communication E-mail Chat Rooms Instant Messaging Blogging Social Media { Advantages: { Reduces cost of postage Fast and convenient Need an email address to sign up for other online accounts. Eliminates
More informationConveying Emotion. Chapter 12: Computers In Polite Society: Social Implications of IT. Improving the Effectiveness of . Problems with
Chapter 12: Computers In Polite Society: Social Implications of IT Fluency with Information Technology Third Edition by Lawrence Snyder Improving the Effectiveness of Email Problems with email: Conveying
More informationEntomology)320)Honey)Bee)Biology) Spring)2014))
Entomology)320)Honey)Bee)Biology) Spring)2014)) Section:)700(CRN:)16072)) Instructor:)Dr.)Bradley)N)Metz)(bmetz@tamu.edu)) Course)Introduction) Welcome'to'Texas'A&M s'introductory'course'on'honey'bee'biology,'evolution,'
More informationNetiquette Vocabulary
Flame Spam Mail Bomb Newbie Lurk Shouting FAQ Netiquette Vocabulary To send an insulting or derogatory message to another person or people. Consider any message that comments on another person or their
More informationYour security on click Jobs
Your security on click Jobs At Click Jobs is a trading name of Raspberry Recruitment Limited, we're committed to helping you find the right job in a safe and secure environment. On these pages, you can
More informationFACEBOOK SAFETY FOR JOURNALISTS. Thanks to these partners for reviewing these safety guidelines:
FACEBOOK SAFETY FOR JOURNALISTS Thanks to these partners for reviewing these safety guidelines: 10 STEPS TO KEEP YOURSELF SAFE Journalists are using Facebook in innovative ways to do their jobs, tell stories,
More informationFrequently Asked Questions- Communication, the Internet, Presentations Question 1: What is the difference between the Internet and the World Wide Web?
Frequently Asked Questions- Communication, the Internet, Presentations Question 1: What is the difference between the Internet and the World Wide Web? Answer 1: The Internet and the World Wide Web are
More informationChapter 13: The IT Professional
Chapter 13: The IT Professional IT Essentials v6.0 ITE v6.0 1 Chapter 13 - Sections & Objectives 13.1 Communication Skills and the IT Professional Explain why good communication skills are a critical part
More informationETIQUETTE TIPS. Traci Kasten. Executive Assistant Chief Operations Office x179
EMAIL ETIQUETTE TIPS Traci Kasten Executive Assistant Chief Operations Office 896-0667 x179 tkasten@rrps.net SENDING EMAILS Make sure your email contains a courteous greeting and closing. Address your
More information(short for electronic mail) is a fast and convenient way to communicate with others. You can use to:
Everything you ever wanted to know about E-Mail E-mail (short for electronic mail) is a fast and convenient way to communicate with others. You can use e-mail to: Send and receive text messages. You can
More informationAnti-Cyber Bullying Policy.
Anti-Cyber Bullying Policy. Bullying, in any form, is an issue that we all take very seriously at Bredon School. We accept that victims can become depressed and suicidal, and even take their own lives.
More informationSecurity Awareness. Presented by OSU Institute of Technology
Security Awareness Presented by OSU Institute of Technology Information Technologies Division Security Awareness Topics Social Engineering Phishing Social Networks Displaying Sensitive Information Wireless
More informationWho We Are! Natalie Timpone
Who We Are! Natalie Timpone Manager of Security Business Management Office Enterprise Security Awareness Manager Carmelo Walsh Security, Risk, and Compliance Security Awareness Subject Matter Expert Who
More informationTwitter Basics at the Deerfield Public Library
Twitter Basics at the Deerfield Public Library Class Outline: 1) What is Twitter? 2) Setting up an account and profile 3) Terms you should know & examples 4) How do I decide what to write? 5) Q & A Expected
More informationComputer Foundation Skills. Internet Webmail
Computer Foundation Skills Internet Webmail Table of Contents Contents Webmail... 4 Gmail Create an account... 5 Gmail - Passwords... 6 Gmail - Inbox... 7 Gmail View message... 7 Gmail Compose mail...
More informationThis Policy applies to all staff and other authorised users in St Therese School.
St. Therese School Computer and Internet Policy STAFF Policy Statement All staff and other authorised users of St Therese information and communications technology are to use the technology only in a way
More informationThe Internet and the World Wide Web Lesson 3 Communicating on the Internet
The Internet and the World Wide Web Lesson 3 Communicating on the Internet Edited by J. Howard, R. Scott & C. Rhodes 09/11 Lesson 3: Communicating on the Internet Objectives After completing this lesson,
More informationAgenda. 1. Cyberwellness Talk 2. How to Login to LMS
Agenda 1. Cyberwellness Talk 2. How to Login to LMS Cyberwellness Talk 1. Internet & Gaming Addiction 2. Netiquette 3. Danger of Cyber Contacts 4. Dangers of Facebook Internet & Gaming Addiction Definition
More information3.5 SECURITY. How can you reduce the risk of getting a virus?
3.5 SECURITY 3.5.4 MALWARE WHAT IS MALWARE? Malware, short for malicious software, is any software used to disrupt the computer s operation, gather sensitive information without your knowledge, or gain
More informationThe Basics of Netiquette
The Basics of Netiquette Etiquette is a code of social behavior. It includes behavior expectations or norms within a society, social class, or group. Netiquette is how our social codes of behavior look
More informationBinarytech Digital Education Karta Allahabad ( Notes)
Email Email is a service which allows us to send the message in electronic mode over the internet. It offers an efficient, inexpensive and real time mean of distributing information among people. E-Mail
More information101 Etiquette Tips
101 Email Etiquette Tips It is important that whether for business or personal use that you follow the basics of email etiquette. This document covers for you the top tips for email etiquette that everyone
More informationMPEG Frame Types intrapicture predicted picture bidirectional predicted picture. I frames reference frames
MPEG o We now turn our attention to the MPEG format, named after the Moving Picture Experts Group that defined it. To a first approximation, a moving picture (i.e., video) is simply a succession of still
More informationThe ICT4me Curriculum
The ICT4me Curriculum About ICT4me ICT4me is an after school and summer curriculum for middle school youth to develop ICT fluency, interest in mathematics, and knowledge of information, communication,
More informationThe ICT4me Curriculum
The ICT4me Curriculum About ICT4me ICT4me is an after school and summer curriculum for middle school youth to develop ICT fluency, interest in mathematics, and knowledge of information, communication,
More informationStudent E-Safety Induction
Central College Nottingham Student E-Safety Induction Academic Year 2015-16 Training & Learning Technologies September 2015 E-Safety It is important to the College that all students know how to stay safe
More informationASKnLearn Learning Management System Parents Talk Punggol Green Primary School 2 & 3 Jan 2014
ASKnLearn Learning Management System Parents Talk Punggol Green Primary School 2 & 3 Jan 2014 Agenda 1. Cyberwellness Talk 2. How to Login to LMS Cyberwellness Talk 1. Internet & Gaming Addiction 2. Netiquette
More informationUsing Gmail. Created by the Columbia Basin Alliance for Literacy. Margaret Sutherland
Created by the Columbia Basin Alliance for Literacy This project is funded by Government of Canada s New Horizons for Seniors Program and is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike
More informations, Texts and Social Media: What Physicians Need to Know
Emails, Texts and Social Media: What Physicians Need to Know 1 Today s Learning Objectives By the end of today s program, you will be able to : Identify the risks to patients privacy which email, text
More informationRules and Outlines for Replying to Skeptical Correspondence those made in s, social comments, and private messages
Rules and Outlines for Replying to Skeptical Correspondence those made in emails, social comments, and private messages There are 2 types of skeptics: people whose minds you can change, people whose minds
More informationHow to recognize phishing s
Phishing email messages, websites, and phone calls are designed to steal money, steal data and/or destroy information. Cybercriminals can do this by installing malicious software on your computer or stealing
More informationOnline Scams. Ready to get started? Click on the green button to continue.
Online Scams Hi, I m Kate. We re here to learn how to protect ourselves from online scams. We ll follow along with Kevin to learn what types of scams are out there, how to recognize the warning signs,
More informationSecurity and Privacy
E-mail Security and Privacy Department of Computer Science Montclair State University Course : CMPT 320 Internet/Intranet Security Semester : Fall 2008 Student Instructor : Alex Chen : Dr. Stefan Robila
More informationHome/Network Computing
Home/Network Computing How to avoid becoming road kill on the Internet (Information Superhighway) Home Computing not as simple as it used to be almost all computers need to have sys-admin disk drives will
More informationINTERNET SAFETY IS IMPORTANT
INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being
More information2. VIOLATIONS OF ACCESSHOSTING.COM S ACCEPTABLE USE POLICY. b. Harm to minors. Using the Services to harm, or attempt to harm, minors in any way.
1. INTRODUCTION Accesshosting.com's ("AUP") is intended to help enhance the use of the Access Hosting Service by preventing unacceptable use. All users of Accesshosting.com s Access Hosting Services (the
More informationDiscover (n.): This feature surfaces personalized content tailored to your interests.
Glossary: General Terms @: The @ sign is used to call out usernames in Tweets: "Hello @twitter!" People will use your @username to mention you in Tweets, send you a message or link to your profile. @username:
More informationAn electronic mailing list is a way to distribute information to many Internet users using . It is a list of names and addresses, similar to a
1 An electronic mailing list is a way to distribute information to many Internet users using email. It is a list of names and addresses, similar to a traditional mailing list and works using a reflector,
More informationDigital Safety and Digital Citizenship
Digital Safety and Digital Citizenship A Guide for Students The laptop has been given to you as a tool for learning. Use it for that. While doing so, here are some important rules for keeping yourself
More informationChapter 22: Communication Process Study Guide Matching
Chapter 22: Communication Process Study Guide Matching Match the following terms with their definitions. A. barrier B. channel C. decoding D. empathy E. encoding F. feedback G. four Cs of writing H. memo
More informationWritten Communication
Module 2: Written Communication 1 Your Passport to Professionalism: Module 2 Written Communication Step 1 Learn Introduction Sooner or later, you will need to communicate in writing. You will write down
More informationInternet Concepts ML Study Guide Created by Advisers
Description of Internet Concepts ML: The written objective test may consist of general information about the Internet, world wide web, browsers, e-mail, computer security, ethics, and privacy. 1 It is
More informationPrivacy & Cookie Statement
Privacy & Cookie Statement Version: 8 May 2018 Since day 1, WeTransfer has cared a great deal about privacy and respecting our users. We have always had a lean data policy: no sign up, no install, no retargeting.
More informationFAQ: Privacy, Security, and Data Protection at Libraries
FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library
More informationLEARNER I.T. ACCEPTABLE USE POLICY. Learner I.T. Acceptable Use Policy [Type text] Updated November Authorised by ILT Board/Executive.
LEARNER I.T. ACCEPTABLE USE POLICY Learner I.T. Acceptable Use Policy 2012-13 [Type text] Updated November 2011. Authorised by ILT Board/Executive. Learner I.T. Acceptable Use Policy Table of Contents
More informationChapter 6 Network and Internet Security and Privacy
Chapter 6 Network and Internet Security and Privacy Learning Objectives LO6.1: Explain network and Internet security concerns LO6.2: Identify online threats LO6.3: Describe cyberstalking and other personal
More information101 Etiquette Tips
101 Email Etiquette Tips It is important that whether for business or personal use that you follow the basics of email etiquette. This document covers for you the top tips for email etiquette that everyone
More informationViolations of any portion of this policy may be subject to disciplinary action up to and including termination of employment.
Page 1 of 6 Policy: All computer resources are the property of Lee County and are intended to be used for approved County business purposes. Users are permitted access to the computer system to assist
More informationComputer Technology. Lesson 2: Internet Communication
Computer Technology Lesson 2: Internet Communication Learning Goal: Students will be able to define modern Web technologies. Scale Yourself 4 I can define modern Web technologies. I can teach them to others.
More informationComputer Technology. Scale Yourself. Lesson 2: Internet Communication. Learning Goal: Students will be able to define modern Web technologies.
Computer Technology Lesson 2: Internet Communication Learning Goal: Students will be able to define modern Web technologies. Scale Yourself 4 I can define modern Web technologies. I can teach them to others.
More informationSYLLABUS. CISS 300 Introduction to Information Systems Security Section UNIT CLASS NAME AND TITLE (COURSE CODE):
SYLLABUS CLASS NAME AND TITLE (COURSE CODE): CISS 300 Introduction to Information Systems Security Section 11102 1 UNIT PREREQUISITES: None, but a background in computer networking is highly recommended
More informationPeaceful Pill Forum Rules
Peaceful Pill Forum Rules The Exit Peaceful Pill Forums are a private Forum for the purpose of discussing the content of and asking questions in regard to The Peaceful Pill ehandbook. While we encourage
More informationDoctorate of Commissioner Science Thesis on Starting an Online Commissioner Forum. Jim Gray
Doctorate of Commissioner Science Thesis on Starting an Online Commissioner Forum Jim Gray Abstract This Paper is on how to start a Commissioner Forum. The steps I include in here are the ones I used.
More informationTITLE SOCIAL MEDIA AND COLLABORATION POLICY
DATE 9/20/2010 TITLE 408.01 SOCIAL MEDIA AND COLLABORATION POLICY ORG. AGENCY Department of Communications Approved AFT As more and more citizens in our community make the shift towards, or include the
More informationThe Do's and Don'ts of Etiquette
EMAIL The Do's and Don'ts of Email Etiquette Image credit: Shutterstock March 25, 2016 Jacqueline Whitmore Author, Business Etiquette Expert and Founder of The Protocol School of Palm Beach When the use
More informationAcceptable Use Policy
Acceptable Use Policy Why is Cleveland Broadband providing this Policy to me? Cleveland Broadband s goal is to provide its customers with the best Internet service possible. In order to help accomplish
More informationUsing web-based
Using web-based Email 1. When you want to send a letter to a friend you write it, put it in an envelope, stamp it and put it in the post box. From there the postman picks it up, takes it to a sorting office
More informationRapid Software Testing Guide to Making Good Bug Reports
Rapid Software Testing Guide to Making Good Bug Reports By James Bach, Satisfice, Inc. v.1.0 Bug reporting is a very important part of testing. The bug report, whether oral or written, is the single most
More informationWhat is epals SchoolMail? Student Accounts. Passwords. Safety. Flag Attachment
What is epals SchoolMail? http://www.epals.com/ epals Schoolmail is a complete, Internet-based email solution and collaborative toolset designed for the education environment. Student Accounts Students
More informationINTRODUCTION TO Part 3
TECH SAVVY SENIORS The NSW Tech Savvy Seniors program is a key initiative of the NSW Ageing Strategy and the Telstra Digital Literacy Strategy. Victorian Tech Savvy Seniors is a Seniors Card Age Friendly
More informationThe Do s and Don ts of Communicating Effectively
The Do s and Don ts of Communicating Effectively It all started with: Then came verbal communication: Finally, technology was introduced. Webster states: It is. 1. the act or process of communicating;
More informationProfessional Communications
Professional Communications Why do we Communicate? To convey information To clarify instructions To request actions To record events To verify arrangements 2 Communication Modes Professional Email Telephone
More information(c) IKSC 2010 Copying allowed for incidental, classroom purposes. Workshop 2: Playing and Staying Safe Online Student Handouts
Workshop 2: Playing and Staying Safe Online Student Handouts Table of Contents Lesson 1: I Know/I Want to Know 1 Lesson 1: Video Summary: Staying Safe Online, Part 1 2 Lesson 1: Guidelines for Creating
More informationThe Anatomy of A FOSS Project
The Anatomy of A FOSS Project We heard the historical/ political side What does it mean then to say that something is a FOSS project? What do we think of when we hear that term FOSS project? What are expectations
More informationWeb Hosting. Important features to consider
Web Hosting Important features to consider Amount of Storage When choosing your web hosting, one of your primary concerns will obviously be How much data can I store? For most small and medium web sites,
More informationDigital Workflow 10 Tech Rules to Guide You
Last updated: 10/11/10 Digital Workflow 10 Tech Rules to Guide You Introduction Whether your goal is to become paperless, or just to get more out of the technology you use, you need to (1) find the easy
More informationFAQ. Usually appear to be sent from official address
FAQ 1. What is Phishing Email? A form of fraud by which an attacker masquerades as a reputable entity in order to obtain your personal information. Usually appear to be sent from official email address
More informationWYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY
WYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY Wyandotte Municipal Services may modify this Acceptable Use Policy at any time without notifying its users. For this reason, Wyandotte Services High Speed
More informationKeystone Acceptable Use Policy
Keystone Acceptable Use Policy Keystone Learning Services, ("Keystone") Acceptable Use Policy ("AUP") is intended for Keystone products and services with the goal of protecting Keystone Subsidiaries, Affiliates,
More informationThe Table Privacy Policy Last revised on August 22, 2012
The Table Privacy Policy Last revised on August 22, 2012 The Table, an online venue through which your organization and its members/employees can connect to better fulfill its mission respects and is committed
More informationElectronic Network Acceptable Use Policy
Electronic Network Acceptable Use Policy 2016-2017 www.timothychristian.com ELECTRONIC NETWORK ACCEPTABLE USE POLICY Electronic Network This Policy is intended to serve as a guide to the scope of TCS s
More informationUsing in Schools
Using e-mail in Schools Education, Leisure & Lifelong Learning Baglan Information Technology Centre C O N T E N T S Page Background... 1 Teaching e-safety... 1 Using e-mail to enhance teaching and learning...
More informationFighting Phishing I: Get phish or die tryin.
Fighting Phishing I: Get phish or die tryin. Micah Nelson and Max Hyppolite bit.ly/nercomp_sap918 Please, don t forget to submit your feedback for today s session at the above URL. If you use social media
More informationBEST PRACTICES FOR PERSONAL Security
BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple
More informationCyber Security Guide. For Politicians and Political Parties
Cyber Security Guide For Politicians and Political Parties Indian Election Integrity Initiative Design by ccm.design Cover Image by Paul Dufour Helping to Safeguard the Integrity of the Electoral Process
More informationWimba Pronto. Version 2.0. User Guide
Wimba Pronto Version 2.0 User Guide Wimba Pronto 2.0 User Guide Welcome to Wimba Pronto 1 What's New in Wimba Pronto 2.0 2 Getting Started 3 Wimba Pronto System Requirements 3 Creating a New Wimba Pronto
More informationAzon Master Class. By Ryan Stevenson Guidebook #5 WordPress Usage
Azon Master Class By Ryan Stevenson https://ryanstevensonplugins.com/ Guidebook #5 WordPress Usage Table of Contents 1. Widget Setup & Usage 2. WordPress Menu System 3. Categories, Posts & Tags 4. WordPress
More informationS E R V E R C E N T R E
S E R V E R C E N T R E H O S T I N G Acceptable Use Policy Server Centre Hosting Ltd 28/06/2011 Server Centre Hosting Ltd, The Old Public Hall, 3 Watnall Road, Hucknall, Nottingham, NG15 7LD Acceptable
More informationInternet and Mini.K.G Senior Scientist, FRAD, CMFRI
Internet and E-Mail Mini.K.G Senior Scientist, FRAD, CMFRI Email: mini.anish02@gmail.com 28 Introduction to Internet Internet is a worldwide system of interconnected computer networks. It connects several
More informationEDULEADERSHIP. Handle Every Kind of for Maximum Productivity HOW TO: JUSTIN BAEDER ON HIGH-PERFORMANCE INSTRUCTIONAL LEADERSHIP
EDULEADERSHIP JUSTIN BAEDER ON HIGH-PERFORMANCE INSTRUCTIONAL LEADERSHIP HOW TO: Handle Every Kind of Email for Maximum Productivity Email can be a great tool for school leaders, yet it can also be a terrible
More informationThe John Fisher School ICT Policy
The John Fisher School ICT Policy Responsible: Governors Resources Committee Review Date: May 2018 The need for a policy All The John Fisher School s information communication technology (ICT) facilities
More informationELECTRONIC MAIL RAYMOND ROSE. Computer Technology Department 2011/12
ELECTRONIC MAIL RAYMOND ROSE Computer Technology Department 2011/12 ELECTRONIC COMMUNICATION Systems for exchanging information and news were the first applications developed for network communication.
More informationContent Curation Mistakes
Table of Contents Table of Contents... 2 Introduction... 3 Mistake #1 Linking to Poor Quality Content... 4 Mistake #2 Using the Same Few Sources... 5 Mistake #3 Curating Only Blog Posts... 6 Mistake #4
More informationFamily Technology Boundaries:
General questions to answer Family Technology Boundaries: How much time per day/week will various technologies be allowed? Can social media be accessed from all devices? What should children do if they
More informationWriting. By: Sohail Ahmed M.A English Literature
E-mail Writing By: Email writing Email writing has become a large part of modern communication, particularly in business. The world has become much smaller now that we have the ability to send and receive
More information