Skip to main content

Home/ Digiteen/ Group items matching "email" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
18More

Internet Collaboration: Good, Bad, and Downright Ugly - 0 views

  • Tips for Effective Internet Collaboration
  • in order to make the most of an often bad situation, I offer eight tips for effective Internet collaboration. These tips were developed based on my experiences over the past
  • While
  • ...14 more annotations...
  • c communication re
  • I believe strongly that electroni
  • mains a poor substitute for face-to
  • -face communication, I also realize that some collaborative projects would n
  • t be practical without it. So,
  • ew years with groups that follow them and
  • th groups
  • with groups that don't.
  • 1. Appoint a single leader or a small group of leaders who are responsible for making sure everything runs smoothly. These leaders need not have any decision-making authority, but they should have administrative responsibilities such as: keeping debates on topic, setting and enforcing deadlines, maintaining the group mailing list, and keeping a group archive. They should also be willing to serve as a resource and answer questions from group members so that these questions need not clog the mailing list. These leaders must be diligent about carrying out their responsibilities and should seek assistance should they find themselves over burdened. 2. Establish a no flame policy for your group. Flame wars are destructive to just about any collaborative effort. Group leaders should make a point of not involving themselves in flame wars, even if they are the target of a flame. They should also gently remind other group members of the policy. Some groups may wish to give a leader the authority to remove group members who repeatedly engage in flame wars. 3. Establish a policy of open communication between all group members. Members should keep everyone informed of the progress they have made i
  • n carrying out their responsibilities. If someone is havin
  • Establish
  • trouble completing a task they volunteered to do (due to lack of time, lack of expertise, or any other reason), they should inform other group members. If some group members communicate privately about a group matter, they should inform the rest of the group about the outcome of their discussion (being careful to say ``we recommend'' rather than ``we decided'' unless the group has given them the authority to make the decision). It is especially important for anyone in a leadership position to communicate with other members and make sure that the members are communicating with each other. 4. Establish a mission statement and set of operating procedures for your group. Depending on the size of your group and the duration of your project, this may be a short list of ground rules or a formal constitution. You should have guidelines and rules that cover the responsibilities of the leaders, the responsibilities of members, procedures for making decisions (including what to do in the event of a deadlock), procedures for appointing and expelling group members or leaders, and procedures for changing these rules. When working on a long-term, open ended project it is best to keep the ground rules somewhat flexible so that unanticipated ideas are not precluded and new group members don't feel stifled by a framework established by members long-retired. 5. Whenever a new and likely controversial topic is introduced to the group, have people respond to the original poster rather than to the entire mailing list. Then have the original poster collect all the responses into a single message (and if possible prepare an executive summary) and send that back to the group. You may want to repeat this for several rounds of discussion before opening the topic up for general debate. The idea here is to put all the issues on the table at once so that people don't start a debate before they have all the facts and a general understanding of the concerns of other group members. 6. Hold periodic virtual meetings. This can be done through a conference call, audio or video online conferencing software, an online chat room, or even an agreement that everyone will be online and checking their email at a specified time. Any of these formats should allow for a more or less synchronous debate followed, if necessary, by a vote. 7. If your group has trouble making decisions and is unable to get group members together for a virtual meeting frequently enough, try resorting to an electronic equivalent of Roberts Rules of Order in which the rules of debate are spelled out in great detail. (The nice thing about Robert's Rules is that they have been well established and thus groups can agree to adopt them without arguing over what they should be. Adopting a set of electronic rules for debate may be tricky if your group has to write these rules from scratch. But you may be able to get your group members to agree t
  • o adopt a set of rules written by
  • subcommittee or a neutral party.) Such rules might include the maximum amount of time allowed for a debate before a vote must be taken, the amount of time members have to submit their votes, and the maximum number of words or separate email messages a member may send to the mailing list on a particular topic. I see this mostly as a method of last resort, and I don't recommend writing this into the group's constitution or ground rules unless you've tried it and found it to be effective. 8. Try to find ways for as many of your group members as possible to meet in person. Ideally you would fly everyone to a central location for a group retreat. But financial concerns often don't allow for such luxuries, so do the best you can. Encourage group members to visit their geographically closest neighbors in the group and to meet other members at conferences or when traveling. The more group members get to know each other, the easier collaboration will be. If possible, try to get the entire group together at the beginning of the project and at the end of the project (or for a lengthy project, after every major phase of the project has been completed). Getting the entire group together at the beginning will help the group establish a common sense of direction. Meeting at the end or after the completion of a major phase will provide a sense of closure and an opportunity for group members to evaluate what they have done.
  •  
    This is some collaboration tips.
1More

Women's Online Habits Study | WebProNews - 0 views

  •  
    Women are also inflicted with habits online. Microsoft studies have given us interesting findings: 16 percent would have a high tendency to shop, communicate, and employ digital devices; 86 percent share their "finds" to others in their time; If forced to, they would "throw out" their television or cell phone first; only 11 percent would throw out their personal laptop; email is overwhelmingly, 85 percent, the most important tool.
1More

How wireless technology can affect the body - Health - CBC News - 1 views

  •  
    Phones send waves of radiation. About five billion wireless subscriptions world wide, which is given by WHO's estimate. Long-term exposure to the the electromagnetic fields (EMF), which cellphones communications create, has been given attention to by researchers. In May of this year, the WHO's International Agency for REsearch on Cancer found that the evidence was too inadequate to make any conclusions about risk. Many studies have been done, but no solid proof has been found. Another study was done on a case of glioma, a type of brain cancer, and acoustic neuroma,, a slow-growing non-cancerous tumour in the inner ear that results in hearing loss. Although the group found the evidence also lacking. however, the evidence was significant enough to warrant classifying radio frequency electromagnetic fields as "possibly carcinogenic to humans." WHO places this in a category known as 2B. Mind, coffee and pesticide DDT are also classified as "possibly carcinogenic to humans." Placing calls rather than emailing or texting has been proved that the risk is higher since the radio frequency energy is higher. Even though the evidence is limited, many countries advise children especially should limit their use of cellphones. The United Kingdom, German, Belgium, Israel, Russia, France, Canada, and India are all included. James McNamee, division chief for health effects and assessments in Health Canada's bureau of consumer and clinical radiation protection, said, "There has been relatively little science done on children and children's cellphone use, and children are going to be using these devices for a much larger period of their life span. Their brains and immune systems are still developing." Health Canada said cellphone users may take practical steps to reduce exposure, such as: Limit the length of cellphone calls. Replace cellphone calls with text messages or use "hands-free" devices. Encourage those under the age of 18 to limit the cellphone use.
1More

Documentary on Addiction on Technology - 0 views

  •  
    A two minute video on Technology Addiction becoming a problem in today's world. Do you think you might be addicted if you fake to go to the bathroom during dinner, just so you can check your email, reply to a text message or check your Facebook? Quote: "People post how it's changing their lives, how wired we are. Everyone is hungry to talk about this subject." - Filmmaker and Webby Awards founder Tiffany Shlain
4More

iPredators: Cyberbullying to cyber-harassing troll cop from hell - 1 views

  • Newsletter Subscriptions Newsletter Archives White Papers Webcasts Podcasts This Week In Print IT Jobs Community Slideshows New Data Center Solution Centers Aruba Networks Bring Your Own Device (BYOD) Aerohive Enterprise Networking Solution Center BMC Control-M Workload Automation CA Technologies Executive Resource Center CA Technologies Transform Your IT Strategy Dell 12th Generation PowerEdge Servers Solution Center HP + Microsoft Data Management Appliances & Architectures Network World Accelerating the Cloud Challenge Network World Data Center Challenge 2012 Network World Next Generation Firewall Challenge Network World Wi-Fi Challenge Riverbed Accelerate Business Performance Solution Center Silver Peak's Virtual WAN Optimization Center View all Solution Centers // Network World #nww_header ul.top_nav li.dropdown ul { display:none; } #nww_header ul.top_nav li.dropdown_active ul { background:url("http://www.networkworld.com/includes/styles/r08/img/more-back.gif") repeat-x scroll left top black; cursor:pointer !important; border:1px solid black; position:absolute; margin-top:20px; display:block; width:150px; left:0; } #nww_header ul.top_nav li.dropdown span { background-position:right center; background-repeat:no-repeat; cursor:default !important; padding:0 0 0 6px; color:#000000; height:20px; width:37px; } #nww_header ul.top_nav li ul li { background:none repeat scroll 0 0 transparent; margin-left:0; padding:0; } #nww_header ul.top_nav li.dropdown_active ul li a { background:url("http://www.networkworld.com/includes/styles/r08/img/more-sep.gif") no-repeat scroll left bottom transparent; cursor:pointer !important; text-decoration:none; padding-bottom:5px; padding-left:10px; line-height:11px; padding-top:3px; color:#EEEEEE; display:block; width:130px; } #nww_header ul.top_nav li.dropdown_active ul li.noBackground a { background:none; } #nww_header ul.top_nav li.dropdown_active ul li a:hover { background:url("http://www.networkworld.com/includes/styles/r08/img/more-hi.gif") repeat-x scroll left bottom transparent; padding-right:10px; width:129px; } function isMoreHovering() { $("#morepopupcontainer").bind("mouseleave", function() { $("#morepopupcontainer").hide(); }); $("#morepopupcontainer").show(); } $(document).ready(function() { $('.dropdown').hover( function () { $(this).addClass("dropdown_active"); }, function () { $(this).removeClass("dropdown_active"); } ); }); News Blogs & Columns &lpos=Nav:Ut
  • Back to Microsoft SubnetPrivacy and Security FanaticMs. Smith -- Select Microsoft Subnet Blog --Author expert: Microsoft Expression Web 3Brian Egler's SQL Server StrategiesEssential SharePointManaging MicrosoftMicrosoft Explorer Microsoft InsightsMicrosoft, Google and cloud tech newsMostly MicrosoftPrivacy and Security FanaticRated Critical: A Microsoft Security BlogSecrets of Windows Back Office ServersSQL Marklar The Best Microsoft VideosThe Social EnterpriseWatch Your Assets Previous Article iPredators: Cyberbullying to cyber-harassing troll cop from hellOctober is pegged to raise awareness about cyberbullying, cybersecurity and domestic violence, but an iPredator can play a part in all three. While getting help from the authorities is not always easy, what about when the cyber-creep doing the harassing and trolling is a cop? By Ms. Smith on Wed, 10/24/12 - 12:24pm. window.fbAsyncInit = function() { FB.init({ appId : '147094931979429', //NWW appId channelUrl : '//www.networkworld.com/community/sites/all/modules/nwmisc/channel.html', status : true, // check login status cookie : true, // enable cookies to allow the server to access the session xfbml : true // parse XFBML }); FB.Event.subscribe('edge.create', function(response) { if(typeof(OPG.Tracking.omniture_tl) != 'undefined') OPG.Tracking.omniture_tl('Social Click Complete', 'default'); }); }; (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); 4 Comments Print document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); clas
  • When it comes to cyberbullying, there are thousands of articles online about the tragic suicide of 15-year-old Amanda Todd and how Anonymous may have unmasked the man who bullied her into sending pictures which he later posted online and sent to her friends. While the man responsible for tormenting the Canadian teenager was a creep and a bully, since an adult was involved then it technically wasn't cyberbullying, according to Stop cyberbullying.
  •  
    October is cybersecurity month and bullying prevention awareness month.
2More

Technology: Virtual vs. Real Life: You Choose | Psychology Today - 0 views

  • I see two fundamental differences between connected life, that is, life through the lens of technology, and real life, the one in which we live (I realize that it could be argued that tech life is the real one in which many of us live, but I see that as a problem). First, wired life is not real, meaning experiences are created by technology with the aim of approximating and simulating actual experience. The problem with this "low-resolution" life is that, though it shares similarities to real life, it lacks the high resolution and the granularity of real life. For example, email can be a wonderful means of communication, but it lacks visual input (so important to effective communication), the nuance of facial expressions and body language, and clear emotional content. Second, digital life is mediated by the technology that makes it possible. There is always something between us and our experiences, whether a text message or a Wii sports game, and, as I just noted, a great deal is lost in the translation.
  •  
    Virtual life is not real. It creates a gap in communication and takes away from actual experiences in life.
2More

Positive Effects of the Internet - 0 views

  • Internet, as most of us know, is a large network of networks, which communicate with each other by means of data packets. Internet is regarded as the largest information base. Today, Internet has become an integral part of our daily lives. We depend on the Internet to update ourselves about current news and rely on the communication platform it offers to get in touch with our near ones. The information from all around the world is just a click away, thanks to the Internet. Internet has surely affected the society positively. With the onset of the Internet, access to information has become easy. Internet has served being an efficient and organized storage of information. Internet search engines are the best information retrieval systems that are functional over the Internet. Typing in a simple search query to a search engine fetches you thousands of search results. Moreover, the ranking strategies adopted by the search engines ensure that the most relevant results are delivered to you on priority. The search engines crawl over all the information that seems relevant to your search query. They retrieve the most relevant results in top order, thus helping you fetch the required information with great ease. Information is truly a click away! The Internet provides some of the most effective means of communication. Emails and instant messages have made online communication possible. Social networking and blogging websites and online discussion forums have proved being popular platforms of expression. People in different parts of the world can collaborate over the Internet. They can exchange views, share information and work together over the Internet. It was the development of the Internet that made online education and distance learning possible. Professionals working in physically distant locations can collaborate their efforts, thanks to the Internet.
  •  
    Internet can have positive results, such as easy access of information and communication
1More

Email Etiquette (Netiquette) - 0 views

  •  
    This is a very nice website. It has a lot of good tips for e-mail etiquette!:)
1More

Certification | Common Sense Media - 1 views

  •  
    Read about Common Sense Signature Schools and Educators Program: Digital Citizenship Certification 2013-2014
1More

Chris Brogan Blogs - 1 views

  •  
    Email etiquette posted by Chris Brogan
7More

Netiquette - Wikipedia, the free encyclopedia - 0 views

shared by Nolan C on 02 Oct 09 - Cached
  • Netiquette (a compound formed from "net etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855.[1] However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community. The points most strongly emphasized about USENET netiquette often include using simple electronic signatures, and avoiding multiposting, cross-posting, off-topic posting, hijacking a discussion thread, and other techniques used to minimize the effort required to read a post or a thread. Netiquette guidelines posted by IBM for employees utilizing Second Life in an official capacity, however, focus on basic professionalism, maintaining a tenable work environment, and protecting IBM's intellectual property.[2] Similarly, some Usenet guidelines call for use of unabbreviated English[3][4] while users of online chat protocols like IRC and instant messaging protocols like SMS often encourage just the opposite, bolstering use of SMS language.
  • Common rules for e-mail[7] and USENET such as avoiding flamewars and spam are constant across most mediums and communities. Another rule is to avoid typing in all caps, which is considered to be the equivalent of shouting or yelling. Other commonly shared points, such as remembering that one's posts are (or can easily be made) public, are generally intuitively understood by publishers of web pages and posters to USENET, although this rule is somewhat flexible depending on the environment. On more private protocols, however, such as email and SMS, some users take the privacy of their posts for granted. One-on-one communications, such as private messages on chat forums and direct SMSes, may be considered more private than other such protocols, but infamous breaches surround even these relatively private media. For example, Paris Hilton's Sidekick PDA was cracked in 2005, resulting in the publication of her private photos, SMS history, address book, etc.[8]
  •  
    Netiquette project
  • ...2 more comments...
  •  
    the definition of netiquette
  •  
    Wikipedia definition of Netiquette
  •  
    Netiquette (short for "network etiquette" or "Internet etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855. However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community.
  •  
    Netiquette (short for "network etiquette" or "Internet etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855. However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community.
1More

Facebook Website Review - 5 views

  •  
    Commonsense media supply regular updates on social media tools. This one about FaceBook is an excellent guide.
7More

Cyber Bullying Alert | CyberBullying Prevention Software | Internet Harassment - 1 views

  • The CyberBully Alert software is a tool for parents to equip their children with the ability to immediately communicate and document any threats or cyberbullying their children experience when online. Th
  • Experts agree that the best way to address cyberbullying and online threats is to immediately communicate the incident with an adult, as well as document what the threat is.
    • Vicki Davis
       
      I think that every internet browser should have an easy, built in way to take a screen shot and send it to someone. We need this for many safety reasons. It is to protect those who need it most and are often the most technically challenged.
  • A text and email message immediately notifies pre-specified recipients of the online threat - assuring rapid communication between adults and children.
  • ...1 more annotation...
  • CyberBully Alert gives parents the security of immediately being there for their kids when a threat occurs—whether they are at work, in a meeting, on the road, or simply in another room.
  •  
    Software program to mention in cyberbullying section of the wiki.
  •  
    New software that allows children to document and report harmful harrassment online. I would love to test this tool, I find it very interesting. I think this kind of thing is good, but never replaces a parent talking to a child. However, if there is nothing that "can be done" because local laws and others have no method of dealing with it, then I don't know if it will breed frustration. I think every computer should have an easy way to grab screenshots like my fireshot program in firefox. I think this should be part of every web browser.
8More

How to Protect Yourself Online - 0 views

  • Personal firewalls and security software packages (
  • Be Careful What You Download
  • Don't Respond to Emails Requesting Personal Information
  • ...5 more annotations...
  • Log Out Completely. Closing or minimizing your browser
  • The best passwords are ones that are difficult to guess.
  • Using a security token can make it even harder for an identity thief to access your online brokerage account.
    • Hayes G.
       
      ways to protect yourself on the internet
  • Make sure the computer you are using has the latest security patches,
2More

CTLT | Online Etiquette Guidelines - 0 views

  • Do Don't Be clear in your communications Use appropriate respectful language Be brief Make a good impression Be selective in what you write Be forginving of others mistakes (e.g. spelling, grammar, etc.) Ask permission before forwarding emails/discussion postings Obey copyright laws Cite others work if you use it in your communitations Remember you are not anonymous Be respectful of others Respect the privacy of others Read all postings first, write later Keep attachments small Be positive No SPAM DON'T TYPE IN ALL CAPS No flames or personal attacks Don't be rude with others No name calling Don't be arrogant Don't be disruptive to others communications No SPAM, chain letters, pornography No plagiarizing others work
  •  
    i think all of these apply to the rules of netiquette
2More

Online Etiquette - 0 views

  • 1. Avoid language that may come across as strong or offensive. Language can be easily misinterpreted in written communication. If a point must be stressed, review the statement to make sure that an outsider reading it would not be offended, then post the statement. Humor and sarcasm may easily be misinterpreted as well, so try to be as matter-of-fact and professional as possible.2. Keep writing to a point and stay on topic. Online courses require a lot of reading. When writing, keep sentences poignant and brief so that readers do not get lost in wordy paragraphs and miss the point of the statement. Also, do not introduce new topics; it may just confuse the readers.3. Read first, write later. It is important to read all posts or comments of students and instructors within the course discussion before personally commenting to prevent repeating commentary or asking questions that have already been answered.4. Review, review, then send. There’s no taking back a comment that has already been sent, so it is important to double-check all writing to make sure that it clearly conveys the exact intended message.5. An online classroom is still a classroom. Though the courses may be online, appropriate classroom behavior is still mandatory. Respect for fellow classmates and the instructors is as important as ever.6. The language of the Internet. Though still a fairly young type of communication, certain aspects of this form of communication are becoming conventional. For example, do not write using all capital letters, because it will appear as shouting. Also, the use of emoticons can be helpful when used to convey nonverbal feelings (example: :-) or :-( ), but avoid overusing them.7. Consider the privacy of others'. Ask permission prior to giving out a classmate's email address or other information.8. If possible, keep attachments small. If it is necessary to send pictures, change the size to an acceptable 100k.9. No inappropriate material. Do not forward virus warnings, chain letters, jokes, etc. to classmates or instructors. The sharing of pornographic material is forbidden.
  •  
    rules
« First ‹ Previous 41 - 60 of 78 Next ›
Showing 20 items per page