Chapter 10 - Communication - 01 - Communication Via Emails
Chapter 10 - Communication - 01 - Communication Via Emails
Communication
In this chapter you will learn about:
★ communication via emails, including:
Uses and constraints
Security
Netiquette
Making copies
Language used
Attachments
Spam
★ effective use of the internet:
Differences between the World Wide Web (WWW) and the internet
Intranets
Extranets
Blogs and wikis
Forums
Social networking
★ internet service providers (ISP)
★ search engines (including the evaluation of information found)
★ internet protocols
★ internet risks.
1
2
Emails are one of the most common ways of communicating between people.
There are many rules we need to follow while using the Emails, why?
to ensure the security of the messages sent, and to prevent people writing
anything that is unacceptable.
2
3
1- Legislation
Many countries have laws to protect people against the misuse of emails.
These guidelines are used when sending out emails.
3
4
2- Acceptable language
The language used when writing emails should follow an acceptable code.
The following is a list of unacceptable content to be used in emails, text mes-
sages and online forums (it does not cover everything, but gives some idea of
what is not acceptable when sending emails):
● Obscene images
● Language regarded as: abusive, profane, inflammatory, etc..
● Racist, exploitative or violent messages
● Using illegal materials or messages.
Basicly anyone writing emails, or posting messages, etc. must be aware of
the above constraints.
● Incoming emails should only be read by the recipient; they can only be
read by another member of staff if so nominated
● The company policy on how to deal with and prevent viruses (and other
security threats) must be clearly laid out (these could include use of anti-
virus software, filtering of incoming and outgoing email traffic, use of
auto-responders when staff are not in work, and so on)
● Monitoring of emails may be carried out and staff must be aware that the
company has the right to read all emails
● Suitable ongoing training will take place to ensure staff follow company
policy at all times and that the company policy on emails will be enforced
at all times.
Basicly the recipient must check this before forwarding emails to somebody
else.
Most companies or organisations will clearly set out their policies on sending
emails and the material that they contain.
By making the sender’s email address as a part of the company’s name, for
example, A.N.User@company_name.com.
Emails and attachments from companies and organisations will usually con-
tain some copyright statement (in the email message).
5
6
You must always consider what you write, because the reader cannot see
your facial expressions or body language.
6
7
Rules of netiquette:
1) Do not be abusive (do not threaten people).
2) Do not send.
3) Be clear and succinct with your message.
4) Remember public posts can be read by anyone.
5) Check your spelling and grammar.
6) Respect people's privacy.
7) Forgive people’s mistakes or errors.
8) Do not use CAPITAL LETTERS to highlight comments (seen as ‘shouting’
in emails, text messages and online forums).
9) Do not plagiarise – always acknowledge quotes used in any messages
you write.
10) Do not use too many emoticons.
7
8
Email groups
Email groups are used for a number of purposes, like:
8
9
Forwarding of emails
Forwarding of emails should be treated with great care.
Both problems are undesirable, because there will now be an increased risk
that many of the emails sent to the email address will be spam.
You could end up being blacklisted by your ISP.
So, many web hosts stopped the email forward feature.
Attachments
9
10
When sending attachments that remember the ISP will have a limit on the
size of file.
Emails do not intend to include large files.
You can use alternative methods when sending large files, such as:
● File compression (zip files)
● Selecting a web service that allows files to be transferred (Upload the
file(s) and then create a link. Then sendthe link in an email and the recip-
ient can then download very large files by clicking on it).
Spam can affect many online operations by links (are called spambots).
These links are posted within videos which send users to another website (for
example, YouTube).
10
11
We will consider the internet, intranets and extranets. This will include many
of the features of each type of network.
The World Wide Web (WWW) is a part of the internet in which users can ac-
cess using web browser software.
The World Wide Web consists of a collection of web pages, and has been
based on the hypertext transfer protocol (http) since 1989.
The World Wide Web is a way of accessing information using the internet.
So, the internet and the World Wide Web are different. The following TABLE
summarises the differences.
11
12
Summary of differences between the internet and the World Wide Web
4) Easier to send out sensitive messages in the knowledge that they will re-
main within the company.
5) Intranets offer better bandwidth than the internet, therefore there are
fewer connection limits than with the internet (that is, the number of bits
per second that can be transmitted are usually higher within an intranet).
It is also possible to create extranets that allow intranets to be extended out-
side the organisation, but with the same advantages as an intranet; this al-
lows, for example, trading partners to have controlled access to some infor-
mation (commercially-sensitive information is password protected).
.هناك عدد من األسباب العتماد الشبكات الداخلية بدًال من استخدام اإلنترنت» :
تعتبر الشبكات الداخلية أكثر أماًنا نظًر ا لوجود فرصة أقل للقرصنة الخارجية أو
الفيروسات
» .من األسهل منع الروابط الخارجية ،على سبيل المثال ،بعض المواقع اإللكترونية
» .يمكن للشركات التأكد من أن المعلومات المتاحة خاصة باحتياجات جمهورها
الداخلي
» .من األسهل إرسال رسائل حساسة مع العلم بأنها ستبقى داخل الشركة
» .توفر الشبكات الداخلية نطاًقا ترددًيا أفضل من اإلنترنت ،وبالتالي هناك حدود اتصال
أقل من اإلنترنت (أي أن عدد البتات في الثانية التي يمكن نقلها يكون عادًة أعلى داخل
شبكة إنترانت) .من الممكن أيًض ا إنشاء شبكات خارجية تسمح بتوسيع شبكات
اإلنترانت خارج المؤسسة ،ولكن مع نفس مزايا الشبكة الداخلية ؛ يسمح هذا ،على
13
14
Figure 10.6 shows how intranets, extranets and the internet can all be con-
nected together. Access to servers behind a firewall is limited for external
users.
يوضح الشكل 10.6كيف يمكن توصيل جميع الشبكات الداخلية واإلكسترانت واإلنترنت
مًعا .الوصول إلى الخوادم خلف جدار الحماية محدود للمستخدمين الخارجيين.
14
15
15
16
Microblogs are similar to blogs, but are used on social networking sites to
make short, frequent posts.
In microblogs the posts can be done using instant messaging, emails or use
other social networking vehicles (such as tweets).
Social networking sites use microblogs to allow members to update their per-
sonal profiles.
(For example: B-blog (short for business blog) used by businesses to pro-
mote themselves on the internet).
16
17
2- Wikis
Wikis are web applications or websites that allow any user to create and edit
their web pages using any web browser.
A wiki can involve hyperlinks and uses a very simple syntax called wiki
markup to create pages. Can be described as ‘web pages with an <edit> but-
ton’.
Features of wikis:
Anyone can edit, delete or modify the content.
Many authors can be involved in a wiki.
Pages can be organized by any way the author(s) wish(es).
Shows/Keeps track of all entries (stores a document history).
Can be easily edited using a web browser.
Allows large documents to be seen by many people (easier than email-
ing several people).
17
18
4- Forums
A forum is an online discussion website where many people can post and dis-
cuss many topics.
There are two types of forums:
1- Moderated
2- Unmoderated
A moderated forum refers to an online discussion forum in which all the posts
are checked by an administrator before they are allowed to be posted.
An unmoderated forum refers to an online discussion forum in which all the
posts are not checked by an administrator before they are allowed to be
posted.
Many users prefer moderated forum, because administrator can:
1) Prevent spam.
2) Filter out any posts that are inappropriate.
3) That wander off the main topic.
The internet is a huge unmoderated forum, because no one ‘owns’ the inter-
net, and it is essentially not policed or managed.
The only protection in the internet is a voluntary company between the users
and the network operators.
Social forums or networking groups have a set of rules or protocols that mem-
bers must follow or they will be deleted.
18