Effective Online Communication for Professionals by Martin Brossman & Jeanne Muñoz

Total Page:16

File Type:pdf, Size:1020Kb

Effective Online Communication for Professionals by Martin Brossman & Jeanne Muñoz Effective Online Communication for Professionals by Martin Brossman & Jeanne Muñoz MartinMartin Brossman Brossman ● Self -Employed Success Coach since leaving IBM in 1995 ● Joined LinkedIn in 2004 ● Teaching statewide at community colleges since 2006 ● 12 years experience with social media, starting with LinkedIn ● Taught first 10 session Social Media Mastery in the Triangle in 2010 ; now at NC State Technology Training Solutions ● 3 Published books on Social Media & LinkedIn ○ Latest is How to Use Hashtags ● Senior Strategist with web marketing company ● Lead networking groups since 1996 ● Podcast t show for over 5 years – Linking Into Sales ● Over 20K index pages of content on Google ©2018 Martin Brossman & Associates LLC I am a digital marketing consultant, experienced trainer, and content creator. I enjoy working with both the business and education communities Jeanne Muñoz to share my knowledge of technology Contributor applications and integration with the goal of improving my client’s productivity, efficiency and success. www.linkedin.com/in/jeannemmunoz www.facebook.com/JMunozConsulting Attendance Tracking •Throughout the class we will stop for a “Time check” •You need to post the time in the Q&A area at your location within 30 seconds •Eg. 2:12PM (Q&A log will show your name) ©2018 Martin Brossman & Associates LLC What is effective communication? The effectiveness of the communication is based on the response we get, not our intentions. Integrity is fundamental to communication effectiveness, where what we say or agree to and what we actually do match up. Internal External How do you communicate as a professional? What tools do you currently use? Who do you communicate with? Talking about Communication: Things to Consider What are your communication goals? ● Building trust and consensus ● Workflow/productivity ● Exchange of information/educating ● Securing and retaining clients/influencing What systems are already available/ in place? ● Windows/ Microsoft ● Apple - iPhone ● Android Phone ● Google Chrome Local or cloud-based? What does your budget allow? ● Free (Windows 10 Mail, Apple Mail, Google Mail/Applications) ● Paid Subscription (Office 365; Google Business G-Suite) ● Exchange server and purchased software What are your security needs? ● Protect customer data ● Protect intellectual property ● Protect communications ● Encryption ● Secure network ● Security policies and guidelines Did you know? ● An email is like a postcard as it travels unless it is encrypted-it can be easily read by all ● An email travels across multiple servers before it reaches its destination ○ One expert tracked his email from Sanford to downtown Raleigh as it went through 14 servers before reaching the recipient ● Data is only as secure as the people who handle it. Data that can be forwarded, downloaded, printed, or shared is vulnerable unless clear policies for access and management of data are in place for your business. Security Considerations Where is the data stored? Whose server? Where is it located? Is the data backed up? Is it encrypted (at rest) and in transit between servers and endpoints? Is the website you are using secure? Does it have an https URL and SSL protection? Are passwords encrypted? Is there an option for two factor authentication? Are your communications protected by end to end encryption? Is it encrypted where stored on a server (at rest)? Are the chat applications located on secure sites with encryption? Newsletter applications? Whiteboard websites? What kinds of security protections are available? ● In MS Word, users can password protect a document before sending and send the password separately. (File > Info > Protect Document > Encrypt with Password) ● Google Forms can be used to password protect a Google Suite document. https://www.youtube.com/watch?v=bVGpvhpYvPY ● Public/private password keys can be purchased (digital certificates) from a certificate authority and used for transmission of secure data. Usually SSL and TLS for your website ● Google has a self-destructing email extension called SnapMail. Email deletes 60 seconds after being accessed. ● Proton Mail is also also used to send sensitive data. ● Websites which allow communication and collaboration often have end-to-end encryption and encryption at rest. Security Tips ● Passwords- use strong passwords- combinations of upper and lower case letters, numbers and special characters (10-14 characters if allowed) Don’t share passwords. ● Have a security policy in place for employees about forwarding and sharing communications. Educate everyone about data security. Identify what data sets should be protected and encrypted. ● Make sure your wifi is password protected with a strong password and WPA or WPA2. ● Do not use sensitive data like social security numbers in online communications. ● Make sure all websites and apps use encryption and secure servers. ● Have a backup plan for email and online communications. Attendance Tracking •Time check! •You need to post the time in the Q&A area at your location within 30 seconds •Eg. 2:12PM (Q&A log will show your name) ©2016 Martin Brossman & Associates LLC Two ways of communicating Dialogue Monologue ● Email ● Newsletters ● Chat/Messenger ● Website ● Forum ● TV ads ● Blog ● Web banner ads (with commenting turned on) (on YouTube news sites) ● Main feed of a Social Network ● Review sites (partial dialog) Top Email Options Google Mail - gmail Free individual version or can subscribe for Branded Teams or Business G-Suite of tools and applications $5.00 or $10.00 per user per month Cloud-Based Secure-encryption at rest and in transit and more... Google Mail Limited back-up Many add-ons for additional functionality like scheduled delivery (Boomerang), canned responses, integration with Google Calendar, Tasks, Keep, Chat, HangUps (Video conference), and SnapMail(military grade encryption) Integrated with Asana, Trello; contact cards connected to Google+ profiles Microsoft Office 365 Subscription only-Business-Office Suite of tools and applications $12.50 per month Cloud-based Secure-encryption at rest and in transit and more... Microsoft Office 365 Limited back-up Business Essentials without Office Applications $5.00 per user per month Add-ons similar to Google Mail and integration with Skype, can connect to LinkedIn profiles; integrated with Asana, Trello, MS Project and MS Planner Apple Mail/iCloud - iCloud Mail Can be configured to handle business accounts from Office 365 and GSuite Cloud-based Secure-encryption at rest and in transit Proton Email - ProtonMail Secure email developed by MIT and CERN End-to-end email encryption Free, easy to use In Switzerland Private, anonymous Mobile apps for IOS and Android Instant Messaging / Chat Instant Messaging vs Chat What is the difference between instant messaging and chat? ● Instant messaging is valuable for nearly real-time communications (not always immediate) -may be asynchronous ● Like a phone call with a text record of the communication ● When instant messaging, messages can be sent, recipients notified, and responses made later on ● Instant messaging is usually back and forth one-one conversation and can be more personal ● Similar to text messaging over cellular networks More About Chat ● Chat- is usually real-time (synchronous) and used for group discussion or collaboration ● Can team-chat from multiple locations and back-channel during conference calls ● Lower cost than long distance phone calls ● Messages can be archived ● Files can be shared ● Live Chat- Can be available on the website for customer service and support ● Is timely interaction and direct individual conversation ● Chat bots may be used. Which is best? This depends upon your needs and client expectations. Things to consider: 1. Speed of response 2. Convenience to client 3. Perceived urgency of need 4. Available staff to maintain 5. Lead conversion 6. Mobile vs desktop- chat is more related to computer vs IM on mobile Options for Chat/ Instant Messaging Applications Attendance Tracking •Time check! •You need to post the time in the Q&A area at your location within 30 seconds •Eg. 2:12PM (Q&A log will show your name) ©2016 Martin Brossman & Associates LLC Video Calling/Conference Calls Video Calling/Conference Calls Benefits of video calls-(usually one-one) or video conferencing (usually more than one): ● No need to travel to a location to meet ● Connects a workforce at many sites and builds team collaboration ● Aids telecommuting ● Easier to schedule meetings around shorter time frames when not physically attending ● More personal-can see body language and expressions ● Visual - you can show things Options for Video Calls/ Conferencing Etiquette Tips for Video Conferencing ● Maintain a quiet, professional environment ● Test technology in advance ● Don’t type during conference ● Look nice and professional ● Use a professional background ● Don’t allow distractions like eating, interruptions and moving around ● Have an agenda ● All cameras should be on ● Remember cameras and mics are still on at the end Attendance Tracking •Time check! •You need to post the time in the Q&A area at your location within 30 seconds •Eg. 2:12PM (Q&A log will show your name) ©2016 Martin Brossman & Associates LLC Dos and Don’ts of Email Etiquette Dos and Don’ts of Email Etiquette Don’ts ● Be careful about using humor, it is easily misunderstood ● Don't assume the recipient knows what you are talking about ● Don't shoot from the lip or hip! When angry stop typing. Very heated topics are best in person or at least by phone. ● Don't! overuse exclamation points and remember all caps is still seen by most as shouting. Dos and Don’ts of Email Etiquette Don’ts ● Don’t just reply to all unless all are relevant! ● Don’t leave long lists of recipients’ names and addresses So they have to scroll down to see your message ● Don’t assume that email is private! ● Never forward jokes, spam, chain letters, or advertisements Dos and Don’ts of Email Etiquette Dos ● Clear signature with: Company, Your Title, Phone, LinkedIn public profile link, and address ● Use a professional salutation - Use “Hi” or “Hello” vs Hey” or“Yo,” .
Recommended publications
  • Application Research and Evaluation Methods of Instant Messaging Software
    International Journal of Multimedia and Ubiquitous Engineering Vol.11, No.7 (2016), pp.279-290 http://dx.doi.org/10.14257/ijmue.2016.11.7.28 Application Research and Evaluation Methods of Instant Messaging Software Sun Beibei Zibo Vocational Institute, Zibo, China, 255314 [email protected] Abstract With the rapid development of computer and communication technology, instant messaging software has become more and more important communication platform, but because of the diversity of the instant communication software, there have not unified specification management, lack of evaluation research for the system. Aiming at finding instant messaging software how to affect the use factors of the user, this paper uses the hierarchy analytic process (hap) and Delphi method, established the application evaluation system of instant messaging software, the usage of instant messaging software and services function be researched. Keywords: Instant messaging software; Delphi method; Hierarchy Analytic process (hap); Evaluation system 1. Introduction Instant messaging (IM) refers to a business that can carry on the Internet information to send and receive instantly, communication instantly [1]. Since 1998, IM obtained the swift and violent development, its function also more and more perfect, such as have blogs, search, music, games, etc. IM started only simple chat, now it has developed into a comprehensive information platform, integrated with news and information, communication, electronic commerce, entertainment, search, office collaboration and enterprise customer service, etc. all kinds of information. E-mail as a communication tool, but it has its own disadvantages, such as ductility flawed, however IM just make up for the shortcomings, makes the terminal capable of communications at any time, contact at any time to view the status information.
    [Show full text]
  • Free Chat Application for Mobile
    Free Chat Application For Mobile Well-defined Dimitrios sometimes ruralized his coercionists expressively and coze so unmeasurably! Falconine and possessive Ambrose typecast her Cantab dig treacherously or forge seasonably, is Dave foveate? Marko withdrawing binocularly while silty Rad citrate lowest or clapboard conversely. As free chat application for mobile and only LiveChat Applications Live Chat App. Line application for free to choose the pro features are a welcome back. Olark is a seamless process. Very informative article tuition is. Chat app store that you can plug it offers basic visitor behavior or business with a popular than one place for hcl including text? Can I use it pinch my desktop? Look for free to use the application in addition of. Crisp free chat with the app will not just one for mobile application enables you are. Please publish an employee account may be rotten to mark statistics as favorites. You for free by providing fast. The developer will be required to enjoy privacy details when they submit or next app update. Free version covers most basic requirements Live chat support apps for mobile devices Gorgeous multi-language chat widgets Analytics and. Allows for free and chats with a free plan to extend or pwas are many online project supported for you can keep yourself how? Slack his work happens. Free 14-day trial your plan features No credit card required Desktop Apps. Chat App Maker Mobile app builder Shoutem. Best live Chat Software 2021 Reviews of agriculture Most Popular. Keep sharing more interesting posts. Hire a Zapier Expert to help someone improve processes and automate workflows.
    [Show full text]
  • Chat Room Using Html, Php, Css, Js, Ajax
    CHAT ROOM USING HTML, PHP, CSS, JS, AJAX Amey Thakur1, Karan Dhiman2 1Department of Computer Engineering, University of Mumbai, Mumbai, MH, India 2 Department of Computer Engineering, University of Mumbai, Mumbai, MH, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Earlier there was no mode of online application is straightforward. It doesn't require a login, communication between users. In big or small has AJAX-style functionality, and will support numerous organizations communication between users posed a users. It consists of two applications: the client app, which challenge. There was a requirement to record these runs on the user's device, and the server programme, communications and store the data for further which is hosted to operate the chat room live over the evaluation. The idea is to automate the existing Simple network. To begin talking, clients should connect to a Chat Room system and make the users utilize the server where they can practise two types of chatting, software so that their valuable information is stored public (message is broadcasted to all connected users) and digitally and can be retrieved for further management private (between any two users alone), and security purposes. There was no online method of precautions were implemented during the latter. communicating with different users. There were many different interfaces available in the market but this 2. PROPOSED SYSTEM method of using windows sockets to communicate between nodes would be fast and reliable. The main 2.1 Architecture of Chat Room objective of our Simple Chat Room project is to create a chat application that helps different users to Application for Chat Rooms A data flow diagram is communicate with each other through a server usually used as a first stage to develop an overview of the connected.
    [Show full text]
  • Email, Communication and More: How Software Engineers Use and Reflect Upon Email at the Workplace
    Email, communication and more: How software engineers use and reflect upon email at the workplace MARION BLATT ANTHONY NORMAN Master of Communication Thesis Report No. 2013:117 ISSN: 1651-4769 University of Gothenburg Department of Applied Information Technology Gothenburg, Sweden, May 2009 Abstract This thesis presents an empirical study into the use of email within a software engineering en- vironment. It aims at filling a gap in the research area of professional email use, looking at specialists within a technology driven industry that is central to the phenomenon of email and electronic communication. An interpretative qualitative methodology allows an investigation into how software engineers use and relate to email in their everyday work. Sixteen software engineers currently engaged in industrial practice constitute the sample for this thesis and pro- vide their subjective views on the topic. Beyond the communicative function, email helps software engineers with personal infor- mation management, such as filtering, archiving and retrieving important information. Moreo- ver, social behaviour when using email, including response expectation and email etiquette, appears to be of significance. Asynchrony, the compression of time and space, and email as a distraction at work, amongst others, were vital considerations for software engineers’ percep- tion when using email at work. The findings indicate that the email behaviour of software en- gineers mostly resembles behaviour found in other professions, with some subtle differences. The study provides a starting point into the use of email within a specific profession and con- cludes with several further research suggestions such as different methodological approaches into the same profession as well as comparative studies into other professions.
    [Show full text]
  • Communications and the Internet What Is Communications?
    Communications And The Internet What is Communications? Communication is the process of conveying information from a sender to a receiver with the use of a medium in which the communicated information is understood by both sender and receiver. It is a process that allows organisms to exchange information by several methods. Why do Organizations Communicate? Share information and Data Resources Monitor Activities Process Sales and Orders Share the use of Applications and Processes Communicate with its Staff and Partners Communicate with its Customers Perform Transactions with its Vendors Computers make it possible for organizations to Communicate from point A to B in-house as well as over a wide geography A Medium B This is made possible via a set of Hardware Devices and Communication Software Organizations Communicate using Computers to Various Departments Accounting Sales Production Computers that communicate within an organization form a NETWORK A computer network, also referred to as just a network, consists of two or more computers, and typically other devices as well (such as printers, external hard drives, modems and routers), that are linked together so that they can communicate with each other and thereby exchange commands and share data, hardware and other resources. The devices on a network are referred to as nodes. They are analogous to the knots in nets that have traditionally been used by fishermen and others. Nodes can be connected using any of various types of media, including twisted pair copper wire cable, optical fiber cable, coaxial cable and radio waves. What is a Network Topology? In communication networks, a topology is a usually schematic description of the arrangement of a network, including its nodes and connecting lines (media).
    [Show full text]
  • Using Computers in Environmental Education: Interactive Multimedia and On-Line Learning
    DOCUMENT RESUME ED 384 532 SE 056 717 AUTHOR Rohwedder, W. J.; Alm, Andy TITLE Using Computers in Environmental Education: Interactive Multimedia and On-Line Learning. The Environmental Education Toolbox--EE Toolbox Workshop Resource Manual. INSTITUTION Michigan Univ., Ann Arbor. School of Natural Resources and Environment.; National Consortium for Environmental Education and Training. SPONS AGENCY Environmental Protection Agency, Washington, D. C. REPORT NO ISBN-1-884782-11-6 PUB DATE 94 CONTRACT EPA-G-NT901935-01-0 NOTE 79p. PUB TYPE Guides Non-Classroom Use (055) EDRS PRICE MF01/PC04 Plus Postage. DESCRIPTORS Classroom Techniques; *Computer Assisted Instruction; *Computer Uses in Education; Educational Resources; Educational Technology; Elementary Secondary Education; Environmental Education; *Inservice Teacher Education; Learning Activities; Multimedia Instruction; *Multimedia Materials; Online Systems; *Program Implementation; orkshops ABSTRACT This manual provides teacher educators with a broad perspective on educational technology to ensure thatenvironmental education is enhanced not compromised by new information and communication tools. The manual puts technology problems andpromises in perspective and contains sections that revieweducational philosophy and instructional techniques related tointeractive multimedia and on-line learning. Handouts and overheads forteacher' workshops are provided. A resources section offersassistance to workshop participants and leaders. It contains referencesto over 100 resources in the following
    [Show full text]
  • Pdf-Fulltext
    IJIE International Journal of Information Ethics Vol. 2 (11/2004) Gustavo Navarro Self-organization in Open Source Communication Networks. Red Académica Electrónica de CLACSO -RAEC- (CLACSO’s Electronic Academic Network -EANC-) case. Abstract: Throughout 1980 two main processes started. The first process was the creation of an area of free information exchange at a low cost and with a diversity of collaborators. The first revolution in the Internet based on the newsgroups, the ftp, the electronic mail and the emergence of the free software were the paradigm of the new world in information. Today, we can think about the existence of are new elements to be linked to this paradigm, such as free encyclopedias, the open source scientific publication, the genomic information, etc. The second process witnessed how huge industries (pharmaceutical, food and agriculture, means of transport, software packing companies) were being built. These industries are now trying to reach the property or the control of the use of information and knowledge and there is a strong pressure to increase the control upon the spreading of knowledge and information by using a mixture of technical and legal tools. These two tendencies are opposed in various cases and these clashes are shaping up the future. In Argentina and in Latin America, these two trends are growing due to the emergence of projects that put special emphasis on the appropriation of the Internet technology in order to create communication networks, using open source technologies, such as the case of the RAEC. Red Académica Electrónica de CLACSO (CLACSO’s Electronic Academic Network -EANC-) with regard to the generation, creation, utilization, storage and transfer of information on one hand, and the benefits and the sources of innovation in the evolution of this Network at concentrating on open technologies, on the other hand.
    [Show full text]
  • World Bank Document
    INTERNET Public Disclosure Authorized TOOLKIT FOR TASK MANAGERS Public Disclosure Authorized Public Disclosure Authorized World Bank Africa Regional Office Informatics and Telecommunications Industry and Energy Department Finance and Private Sector Development Public Disclosure Authorized January 1996 LECOt PY INTERNET TOOLKIT FOR TASK MANAGERS World Bank Africa Regional Office Informnaticsand Telecommunications Industry and Energy Department Finance and Private Sector Development March 1996 Contents Page No. FOREWORD............................................... iv ACKNOWLDGMENTS. ............................................... v 1. INTRODUCTION ............................................... I The primacy of the end user............................................... I Potential benefits from the use of networkingtechnologies ............... 2 Networking realities............................................... 2 Planning for success............................................... 3 Measuring and assessing results............................................... 3 Reviewing expenses and expected gains............................................ 3 Implementing and using the network............................................... 4 Perspective: practical, useful approaches.......................................... 4 2. OVERVIEW: WHAT MAKES INTERNETA SIGNIFICANT T=ECHNOLOGY?............................................... 5 Scope of the Internet............................................... 5 Global reach..............................................
    [Show full text]
  • Need of Sustainopreneurship – a Case Study on Video
    World Wide Journal of Multidisciplinary Research and Development (Mar-2021) WWJMRD 2021; 7(3): 13-20 www.wwjmrd.com International Journal Peer Reviewed Journal Need of Sustainopreneurship – A Case Study on Video Refereed Journal Indexed Journal Communication Services Apps Serves in India Impact Factor SJIF 2017: 5.182 2018: 5.51, (ISI) 2020- 2021: 1.361 N. R. Mohan Prakash, Prathusha. M E-ISSN: 2454-6615 Abstract N. R. Mohan Prakash Sustainopreneurship, in other words, is a 'business with a cause' – here, the universal issues are Associate Professor, curved into commercial openings by the setting out of sustainability inventions. Video Department of Marketing, GITAM Institute of Communication services became an important mode of communication during the pandemic scenario Management, GITAM across the world. Though video communication services have been using by various institutions and (Deemed to be University), businesses for the last two decades for their various needs, the real importance has been recognized Visakhapatnam, Andhra from the day of the lockdown observed, i.e., from March 2020, particularly in India. The Zoom Pradesh, India. online meeting services have been so populated these days because of the concept of electronic- entrepreneurship and inventions for sustainability, particularly in the present pandemic situation. It is Prathusha. M prevailing to note such services during the lockdown time support organizations in connecting their Assistant Professor, Aditya stakeholders under risk-free environment. The authors of the article have attempted to know the Global Business School & Sustainopreneurship is an idea that has arisen from the former concepts of social-entrepreneurship Research Scholar, Department and electronic-copreneurship thru sustainability entrepreneurship.
    [Show full text]
  • Comquter Jse N -=Ocial ~Ervices ~Etwork Vol. 6 No. 2
    Vol. 6 No. 2 ComQuterJse ~n-= ocial~ ervices~etwork Summer 1986 Networking: The Linking of People, Resources and Ideas TABLE OF CONTENTS Services Available ............ ... .......... ; . ......... ... ..... .. 3 Notes From The Editor ....... ..... .... ... ..... ...... .......... .. .. 4 Articles , Reviews and Reports ... ... ..... ............ ................. 4 What is CUSSnet and FlpONET? by Dick Schoech . ........ .... 4 A Description of CUSSnet nodes . .... .... .. .. ..... ... .. .. .. .. ... 4-6 .. 6-8 FIDO Brings Out the Crazies . ... .. .. ... ... 11-13 Selected Items from FIDONET News . ... .. .. .. ... .. .. .. .. 13-14 History of FIDOnet . .. .. ....... .. 14-15 " Virtual Offices" For Management Of The Mental Retardation Program and The ir Essential Funct ions by Gordon C. Krantz . .. .. .. .. 15-18 FIDONET Nodelis t as of 11 July 86 ... ... .. ... .. .. .. .... .. ....... .. .. .. 18_.28 CUSSnet : dipping from and aiding in Human Serv i ces . CoDDDuni cating at : 300- 2400 baud *· . *· 8 data bits 1 stop bit no parity *· Buil din g on FIDONET The Worl d 's Fir st * . I \ BBS Network * 1:00 \ (_: I_) *· ·* _ '@I_\ --~ -~--~~--------~~-~ -- -- -- \ \\ I : ( *) : \ ) ) _ _I -- CUSSnet : _u_: I \I I I FIDO \ [ Support provided by] _I I : : _\ I (_1 3015 __ ) Apple Computers (_l(_!( ____I (jm) I U.S. Robotics \ I & (gmb)\ I U.S. Department of Health and Human Services \ I OHDS, OPD \ I \ I~--~---~ ---------------------------~---------------' 2 About the Network Computer Use in Social Services (CUSS) Network is a call 817-273-3966 and type the file in the HELP file area called nonprofit association of professionals interested in exchanging FIDOLIST.80. Communications are at 300-2400 baud , 8 data information and experiences on using computers in the human bits, 1 stop bit and no parity. Almost any computer or terminal services. Members participate in the Network by : and modem will work.
    [Show full text]
  • Security in Mobile Messaging
    Daria Nurtdinova SECURITY IN MOBILE MESSAGING Bachelor’s Thesis Information Technology April 2016 DESCRIPTION Date of the bachelor's thesis 6 May 2016 Author(s) Degree programme and option Daria Nurtdinova Information Technology Name of the bachelor's thesis Security in mobile messaging Abstract Nowadays the Internet and smartphones are a substantial part of everyday life. It helps us to be in touch with others and to manage business projects more easily. IM immediately adapts to the possi- bilities of digital sphere and to human requirements. The academic purpose is to review the develop- ment of messaging applications and security features through the last 25 years. The main aim of the case is to find a free of charge cross-platform instant messenger with the end-to- end encrypted connection. The chosen app with a new security policy gradually introduces and im- plements better data protection for the case company. Methods include data collection, analyze, test- ing and weighed score comparison. It is not possible to secure users, data or devices from every threat. However, it is possible to reduce risk in dozens of times by implementing basic configurations. The level of use and understanding of the technology among various groups varies considerably, so user-friendly communication software makes employees accustomed with encrypted communication concept. Further development for the case company involves improving smartphones security including passwords, antiviruses, and moni- toring application. This study highlights that development in Internet applications sphere goes very fast and thigs changes frequently. It is important to review security of the system continuously. Subject headings, (keywords) Instant messaging, security Pages Language URN 51 English Remarks, Notes on appendices Tutor Bachelor’s thesis assigned by Matti Koivisto Mikkeli University of Applied Sciences CONTENTS VOCABULARY ...........................................................................................................
    [Show full text]
  • ROLE of COMMUNICATION TECHNOLOGY in INFORMATION TRANSFER 'Iicaster of <£Ibrary 8R S^Nformation Science
    ROLE OF COMMUNICATION TECHNOLOGY IN INFORMATION TRANSFER A SELECT ANNOTATED BIBLIOGRAPHY D1SSERTAT10M SUBMITTED IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE AWARD OF THE DEGREE OF 'iiCaster of <£ibrary 8r S^nformation Science 2001-2002 BY MAHENDRA KUMAR RAWAT ROLL NO. 425 ENROL. NO. AA-4044 UNDER THE SUPERVISION OF MR. ASIF FAREED SIDDfQUI LECTURER DEPARTMENT OF LIBRARY & INFORMATION SCIENCE ALIGARH MUSUM UNIVERSITY ALI6ARH (INDIA) . '^ ' 2002 DS3333 'WHO ALWAYS BEEN A SOURCE OF INSPIRATION, GUIDANCE AND ENCOURAGEMENT FOR ME' ALIGARH MUSLIM UNIVERSITY, ALIGARH fEPBX : 700916, 20-23, 26 Ext. 193/4 DEPARTMENT OF LIBRARY Phone [Direct : 700039 AND Fax: 91-0571-400528,401221 INFORMATION SCIENCE Ref. No. Dated.••• • This to certify that the dissertation entitled "Role of communication technology in information transfer"embodies the result of bonafide work carried out by Mr.Mahendra Kumar Rawat during 2001-2002 for the partial fulfillment of Master of Library and Information Science, under my supervision and guidance. The dissertation has not previously formed the basis for the award of any degree diploma or other similar title or recognition. Asif Fa reed Siddiqui (Lecturer) DECLARATION I hereby declare that the work presented in this dissertation entitled ^Role of communication technology in Information transfer" is original and is carried out by me in Aligarh Muslim University campus has not been submitted earlier in part or in fiiU any degree diploma of any University. iV^ Mahendra Kumar Rawat AOOOOWLEV^MtNT the^ help of crecUx^r of thly unO\/er^, who- created/ mcuv, otAt of (^ concealed/hlood/, touightlhe^ uie^ofoypeyvand/ tXMAj^ht mja>A/i^^u^V}hlcKh£/)c¥ieM) viot.
    [Show full text]