|
Chapter 3 Communication on the Internet |
---|
Communication is the most popular use of the Internet, with email topping the list of all the technologies used. Some of the types of communication technologies used also include email discussion groups, Usenet news, chat groups, and IRC. These are unique to networked computer environments and have come into wide popularity because of the Internet. Other technologies, including video and audio conferencing and Internet telephony, are also available on the Internet. They require more multimedia capabilities of computer systems and are more taxing of network resources than the others. They also are adaptations of other technologies to the Internet.
Most of the technologies that are unique to the Internet require communication to be done in textletters with some symbols and punctuation. Communicating effectively involves taking the time, except in informal communications, to use correct grammar, spelling, and punctuation and writing an appropriate message. When replying to a message include the pertinent parts of the message and use an appropriate and interesting subject header in any case.
When youre communicating on the Internet take special care not to give out personal information to strangers and to treat others with respect. Be aware of the risks involved in communicating with people you cannot see and may never meet in person. Take time to consider what you write to others, and be careful to avoid humor and sarcasm except with the best of friends. You cant assume that your messages are private, so be careful about what you write.
Several issues related to ethical and legal considerations arise from using the Internet for communication. The manner in which communication is implemented on the Internet makes it susceptible to monitoring. You cant assume that communications are private. Some believe that sending email is like sending a message on a postcard. Some laws have been enacted to help protect privacy during electronic communications. These, however, have been difficult to enforce and are rarely applied. One way to protect privacy is to encrypt or code a message. A common way of encrypting messages is through the use of public and private keys. Although software for encryption is readily available, current policies and laws prohibit its export.
Another area of concern is dealing with abusive or offensive communications. Laws that apply to libel, harassment, and abuse have been applied to cases where the offending behavior has occurred on the Internet. Unsolicited email or other forms of communication is called spam. It definitely is an annoyance, but also quite costly to the people who receive the junk email or other communications. Its relatively inexpensive to produce, because most of the cost of transporting the email is shifted to the receiver and all people that use the networks supporting the Internet.
Please see the text.
Summary | Terms | Exercises | FYIs
FYIs
Comparing
Instant Messaging Software (5)
These services let you know when someone using the same service sends you a message and let you reply directly to that person. |
Electronic
Privacy (4) Resources and discussions related to electronic privacy |
Histories
of IRC MUDs and MOOs (3) How these forms of communication have developed and been used. |
IRC
(6) Internet Rlay Chat. A popular and wide-open means of communnicating on the Internet. |
MOOs
(3) Object-oriented MUDs |
MUDs
(3) Multi-user domains |
PGP
(3) Pretty Good Privacy - a way to protect your email privacy |
Telephony
Video and Internet Conferencing (7)
|
Where
are the Chat Sites (7) Some resources to consider that list chat sites. |
Writing
Effective Email (3) |