isy10212 lecture week 2, 2006

Upload: kelseytitmarsh

Post on 03-Jun-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/12/2019 ISY10212 Lecture Week 2, 2006

    1/23

    G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT

    Lecture: Week 2

    Slide 1

    Week 2 e-mail

    ISY10212

    Contemporary Issues in Multimedia and

    Information Technology

    Mails in (Thing, Adams Family) and here to stay

    Education Practices some quick comments

    and practice makes perfect

  • 8/12/2019 ISY10212 Lecture Week 2, 2006

    2/23

    G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT

    Lecture: Week 2

    Slide 2

    Communication Background face-to-face

    People are social beasts and virtually all communications

    in the greater context of history have been face-to-face.

    one-to-one; with parents, peers, spouse, children

    one-to many; via song and dance

    many-to-many; waring tribes beating their chest still evident today when New Zealand play international Rugby

    the haka

    many-to-one; when the peasants rise up en-mass against the King/

    Tsar/ Power/ Authority.

  • 8/12/2019 ISY10212 Lecture Week 2, 2006

    3/23

    G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT

    Lecture: Week 2

    Slide 3

    Communication Background face-to-face

    Even to-day face-to-face communication is:

    common (everywhere), regular (often),

    important (provides giving of information that matters),

    popular (people enjoy the social event), and

    beneficial for those that participate (good for the human condition of beinga social being).

    Asides

    Prisoners are placed into solitary confinement to take them out ofcommunication AND to impose psychological strain.

    News readers are a talking head on screen.

    Watch news from other countries. The language differsbut the formatis identical.

    Then again, Naked News has the talking headplus the body and isThe Program With Nothing to Hidea naked news reader on-line.

  • 8/12/2019 ISY10212 Lecture Week 2, 2006

    4/23

    G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT

    Lecture: Week 2

    Slide 4

    Communication Push for Written

    Pressure to replace verbal communication (or at least

    supplement it) with written communication have includedaspects of:

    culture

    law

    time

    place, and

    technology.

  • 8/12/2019 ISY10212 Lecture Week 2, 2006

    5/23

    G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT

    Lecture: Week 2

    Slide 5

    Written Communication Culture

    Paintings done as art can contain narratives of the time,

    religion, social comment. There is art over and above the message. (It can be pleasant to

    look at irrespective of your views on the comment).

    Written copy can contain narratives of the time, religion,

    social comment. Plays, poems, novels.

    There is art over and above the message. (It can be pleasant tolisten to irrespective of your views on the comment).

    Shakespeare plays are typically considered highly art-form in

    the use of language, but also message and commentary of thetimesome of which transcend time and place.

    e.g. Romeo & Juliet is STILL performed and has been made into movies set in arange of times and cultures.

  • 8/12/2019 ISY10212 Lecture Week 2, 2006

    6/23

    G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT

    Lecture: Week 2

    Slide 6

    Written Communication Law

    Written documents with a seal the negative from the ring worn by the King (or other important person)

    embedded into hot wax as a sign of authenticity.

    Written and signed statements, with date in ones own handwriting, can be presented as evidence of a persons

    statement of fact, intent, belief

    eg; a persons will Literally, I WILLleave my possessions to

    Signed statements resulting from Police Interview Record of interview.but open to Police verbal, so now the video camera

    is (or at least should be) used

    People may say or sign, under duress.but difficult to overturn, becausethey SIGNED it.

    You have been warned.NEVER sign anything unless you are surethat you agree. Do you actually READ the software licensing agreements before installing

    software?

  • 8/12/2019 ISY10212 Lecture Week 2, 2006

    7/23

    G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT

    Lecture: Week 2

    Slide 7

    Written Communication Time and Place

    Written for posteritymessage from the grave To indicate personal intent, such as a will.

    To capture a truth such as a record of atrocities The Diary of Anne Frank

    Sandakan Prisoner of War Campo (6 POWs survived from severalthousandbecausethey escaped).

    Written to span distances May be the command of Caesar or the King across the empire.

    May be the report or request back to the centre of command This used to take about 6 months in a sailing ship in 1800 between Australia

    and England.

    Letters to loved ones While on conquest and explorations (eg. Charles Darwin on The Beagle)

    The tyranny of war (eg. War Museum Canberra, letters from WW1 soldiers in the

    trenches and on Gallipoli)

    ANYWHERE and ANYTIMEwhere loved ones have been separated in timeand place, a capturing of news, emotions, desires, and dreams for the future.

  • 8/12/2019 ISY10212 Lecture Week 2, 2006

    8/23

    G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT

    Lecture: Week 2

    Slide 8

    Written Communication Technology

    Some technologies facilitated the capture of the message.

    Papyrusan early form of paper Quillsan early form of writing with ink

    Ball Point PensBicPens.from Baron von Bic who had the idea

    Typewritersused to be considered a mechanical marvel

    Word Processorson virtually ever home computer.

    Some technologies facilitated the transport of the message.

    Horseback

    Ships

    Trains

    Telegraph

    Aeroplanes

    Satellites.

  • 8/12/2019 ISY10212 Lecture Week 2, 2006

    9/23

    G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT

    Lecture: Week 2

    Slide 9

    Electronic Mail - E mail / e mail

    Email brings with it some consequences in:

    culture law

    time

    place

    technology

    undesirable consequences, and

    ethics

  • 8/12/2019 ISY10212 Lecture Week 2, 2006

    10/23

    G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT

    Lecture: Week 2

    Slide 10

    Electronic Mail - Culture

    A whole new style of writing, with responses incorporated into body.

    A new means of communicating

    when, why, to whom, how, and how often.

    An alternative to speaking to someone in Office Politics.

    Colleagues (especially if they do not get on well) may use Email tocommunicate instead of leaning over the desk to where the person is

    sitting.

    In a work environment it becomes another means of carrying on

    private discussions with people elsewhere. But who owns the time, the equipment, the network.and what lame

    visual joke, or offensive material, is in the attachment?

  • 8/12/2019 ISY10212 Lecture Week 2, 2006

    11/23

    G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT

    Lecture: Week 2

    Slide 11

    Electronic Mail - Culture

    Lame attachment.

    Source

    unknown

    received as an

    email attachment

  • 8/12/2019 ISY10212 Lecture Week 2, 2006

    12/23

    G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT

    Lecture: Week 2

    Slide 12

    Electronic Mail - Law

    Email provides an electronic paper trail of who said what, when,

    where, to whom. This has a legal status within a court of Law.though the Emails will need

    to be obtained through legal means, such as the seizure of computers.

    Email has become THE way in which directives are promulgated

    through many companies and organisations (such as SCU).

    There is still scope for face-to-face announcements to all staff, because

    this is more personal.

    There is still scope for internal reports because these are more glossy.

    but Email is sufficient to indicate that staff have been informed,

    PROVIDED it emanates from a suitable person of authority in that chain of

    command.

  • 8/12/2019 ISY10212 Lecture Week 2, 2006

    13/23

    G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT

    Lecture: Week 2

    Slide 13

    Electronic Mail Time and Place

    Email can be penned and sent at any place and time, provided

    suitable hardware, software, and access requirements are in place. These are modifying as we speak with wireless technology and mobile

    phones evolving.

    It is flexible enough to enable both synchronous (in real time) and

    asynchronous (out of real time) communications.

    A response may be received in a few seconds, few minutes, few hours,

    few days, few weeks, few months.never.

    INCREADIBLYempowering to travellers to stay in touch both

    privately and professionally.

    Singapore Airportlots of free internet terminals packed with young

    travellers of all nationalities and languagestyping away to send and

    receive emails.and visit their favourite news sites on the WEB (which we

    have yet to speak of).

  • 8/12/2019 ISY10212 Lecture Week 2, 2006

    14/23

    G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT

    Lecture: Week 2

    Slide 14

    Electronic Mail Technology

    Hardware implications

    Networks, Intranets, Internet.

    Security..it makes available possible breaches in the system via bothtechnology error and human error.

    Software and Service implications

    Specialised (dedicated) software

    Bundled software Free software

    Hotmaila case study of giving IT to the masses, released 1996.

    Who here have now, or previously have held, a Hotmail account (or similarfree on-line email account)?

    Is it YOUR name.or are there already lots of people named you outthere?

    Its not really without costif the user does not pay then advertising does.

    see http://www.hotmail.com

  • 8/12/2019 ISY10212 Lecture Week 2, 2006

    15/23

    G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT

    Lecture: Week 2

    Slide 15

    Electronic Mail Undesirable Consequences

    NOT ALL GOOD! Any Technology brings with it benefits.

    Any Technology brings with it undesirable consequences.

    A Cynical view of Email is that it is a more efficient and effective wayto send Junk Mail.irreverently called SPAM! SPAM may also be associated with Illegal intent.

    E.g.: Send me your bank details so I can send money from Nigeria.

    E.g.: Do you want to buy some cheap software?

    Other examples of undesirable consequences of Email include: Scope for viruses and worms to be transmitted in attachments.

    The risk of security breaches, and so the need for Firewalls and

    Encryption. Additional work load due to the need to document all instructions, some ofwhich were previously given verbally to subordinates.

    Scope for workers to misuse employer provided resources.

  • 8/12/2019 ISY10212 Lecture Week 2, 2006

    16/23

    G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT

    Lecture: Week 2

    Slide 16

    Electronic Mail Ethics

    Ethics

    are the morals and code of conduct adhered to by people to ensurethat their personal behaviour does not take unfair advantage of their

    knowledge, skills, authority, wealth, political contacts, health,

    educationand so on.

    In general, laws reflect the ethics of any given societal setting or

    culture.

    For example, Insider Trading is illegal because members of a Board are

    privy to confidential information which they may benefit from financially if

    enacted upon.

    This is unfair from the standpoint of needing to ensure an equal playing

    field in the realm of business and the economyand SO is made illegal.

    Examples: Rene Rivkin, Steve Vizard.

  • 8/12/2019 ISY10212 Lecture Week 2, 2006

    17/23

    G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT

    Lecture: Week 2

    Slide 17

    Electronic Mail Ethics

    Technology can outpace the capacity of society to establish

    appropriate laws. For example, the scientific capacity of stem cell research and human

    cloning are essentially presentBUT few countries, if any, in the global

    context have been able to develop laws to adequately deal with these

    capabilities.

    Email technology outpaced the capacity for law to stay abreast.

    So ethicsbecomes the means by which people at an individual level,

    societal level, national level and international level try to make appropriate

    decisions and enforce appropriate behaviourswhile waiting for

    legislative systems to identify, develop and enact appropriate laws to

    govern these areas.

    Some laws now exist with respect to emailbut these have been in

    responseto questions and issues raised with respect to their use.

  • 8/12/2019 ISY10212 Lecture Week 2, 2006

    18/23

    G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT

    Lecture: Week 2

    Slide 18

    Electronic Mail Ethical Questions

    With respect to the use of Email, you might like to consider the

    following questionsfrom both an ethical and legal perspective. Is it acceptable to compose and send personal Emails at a place of

    employment using the employers time and resources?

    Who can have access to emails and attachments produced and sent from

    a place of employment?

    What would be deemed to be offensive and/ or harassing content and/or

    attachments?

    Can any personal rights to privacy in the context of a personal

    communication (much like a hard copy written letter) be signed away to an

    employer via an employment contract?

    Should contravening appropriate usage of Email be just cause for

    cautions, demotion, or sacking?

    Note: Network Administrators DO HAVE THE ACCESSPRIVLIDGES

    to view emails.

  • 8/12/2019 ISY10212 Lecture Week 2, 2006

    19/23

    G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT

    Lecture: Week 2

    Slide 19

    Electronic Mail Ethical Questions

    Scenario

    If you came to a computer that another person had logged onto.and leftwithout logging off from (most likely they have simply forgotten), would it

    be acceptable for you to view their current work on screen?

    .what about their other assignment files, pictures, Emails..?

    and what about their share portfolio, their bank account details, their

    medical record..?

    Hands up if YOU have ever left a computer work station while still

    logged on Does your view change for the above because it is now YOU who may

    have their files looked at?

  • 8/12/2019 ISY10212 Lecture Week 2, 2006

    20/23

    G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT

    Lecture: Week 2

    Slide 20

    Electronic Mail in Education

    Southern Cross University is an Educational institution. Email is used for:

    staff-to-staff communications staff-to-student communication

    student-to-staff communications

    student-to-student communications.

    It is subject to all the benefits, and the problems associated with thediscussion above.

    Convenient

    Exact detail specified

    Electronic paper trail as evidence

    Cc to other parties for their information

    Butlots of it, irrelevant messages, SPAM, viruses, privatecommunications

  • 8/12/2019 ISY10212 Lecture Week 2, 2006

    21/23

    G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT

    Lecture: Week 2

    Slide 21

    Other on-line aspects in Education at SCU

    MySCU

    Web based portal to a range of study resources. Library searches and borrowing renewals.

    Electronic resources.

    Study guides for essay and report writing.

    Unit materials and group discussions.

    Exam dates and enrolment details.

    Web based access to resources IN GENERAL

    Web access to news

    Web access to technical resources (e.g. software hints) Web access to academic papers (e.g. referenced findings)

    Web access to like-minded people (e.g. groups)

  • 8/12/2019 ISY10212 Lecture Week 2, 2006

    22/23

    G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT

    Lecture: Week 2

    Slide 22

    Other on-line aspects in Education at SCU

    Web has already changed the way students carry out their

    general line of business Web search HASbecome first point of call.

    Web as a resource for research and education is here to stay for (I

    expect) a long time and impacts students at school, TAFE,

    universityand is used by industry, government, and the

    unemployed..PROVIDED that they have access.

    Impact of computer technology in education will be

    considered more next week.

  • 8/12/2019 ISY10212 Lecture Week 2, 2006

    23/23

    G. Cooper 2006 ISY10212: Contemporary Issues in MM & IT

    L t W k 2

    Slide 23

    Home Work

    Before next week, Please ensure that you visit and browse:

    Yahoo! Netrospective: 10 years, 100 moments of the Web

    http://birthday.yahoo.com/netrospective

    While not for everyone, you may like to skim:The Anatomy of a Large-Scale Hypertextual Web Search Engine

    by Sergey Brin and Lawrence Page (the Google guys)

    http://services.eliteral.com/search-engine-optimization-

    india/anatomy-of-a-search-engine.php

    http://birthday.yahoo.com/netrospectivehttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://services.eliteral.com/search-engine-optimization-india/anatomy-of-a-search-engine.phphttp://birthday.yahoo.com/netrospective