This presentation is made by a student from the online class. "Acting Up - Using Theater & Technology for Social Change" taught by Tom Tresser for the DePaul University School for New Learning.
Info: http://tomsclasses.wordpress.com
1. Email Advocacy Enhancing Social Change @ Sandra Cullinane
2. @ Email The Web links us to the world, but e-mail connects us. Web pages are international, but e-mail is intra-national. Web sites help us round out our picture of the world, but e-mail makes the world go 'round. Email is a system of sending and receiving messages electronically. It is form of communication in which a computer user can compose a message at one terminal and it would be received by the recipient when they check their account. The message sent is in the form of the entered text typed from the keyboard or the electronic files, which have been stored on the storage media and sent via a search engine through the internet. The internet The Internet is a global network of networks. People and organizations connect into the Internet so they can access its massive store of shared information. The Internet is an inherently participative medium. Anybody can publish information or create new services. The Internet is a cooperative endeavor -- no organization is in charge of the net. People and organizations connect into the Internet so they can access its massive store of shared information. The Internet is an inherently participative medium. Anybody can publish information or create new services.
3. @ The Cooperative endeavor of the Internet The Internet - a global network of networks. People and organizations connect into the Internet and they can access its massive store of shared information. The Internet as an inherently participative medium, can publish anyone’s information or create new services. No organization is in charge of the internet – It is a cooperative endeavor. Computer Connection - Phone Line, Cable, DSL, Wireless, ... Modem Network Software - TCP/IP Application Software - Web Browser, Email, ... Internet Service Provider(ESP) Send and receive email messages. Download free software with FTP (File Transfer Protocol). Post your opinion to a Usenet newsgroup. Yack it up on IRC (Internet Relay Chat). Surf the World Wide Web. There is no charge for most services. The Web was invented in 1991 by Tim Berners-Lee , while consulting at CERN ( European Organization for Nuclear Research ) in Switzerland. The Web is a distributed information system.
4.
5. Internet Search Engines Used for Research General Google Yahoo Bing Ask.com Cuil DuckDuck Go Kosmix Yebol Multimedia Munax’sPlayAudioVideo Bing Videos blinkx FindSounds Google.Video Picsearach Pixsta Podscope ScienceStage Songza SeeqPod Veveo TinEve Yahoo!Video YouTube Business Business.com Global Spec Nexis Thomasnet GenieKnows GenieKnows Enterprise AskMeNow Concept Searching Ltd. Dieselpoint dtSearch Endeca Exalead Expert System S.p.A. Fast Search & Transfer IBM ISYS Search Software Northern Light Open TextVivisimo SAP Tera Text X1 Technologies ZyLAB Technologies Job Bixee CareerBuilder Craqigslist Dice Eluta.ca Hotjobs Incruit Indeed LinkUp Monster Education GetEducated Accountancy IFACneet Legal WestLaw Lexios Quicklaw Manupatra Medical Bioinformatic Harvester Entrez inckudes Pubmed EB-eye EMBL=EBI’s GenieKnows GoPubMed Healia Searchmedica WebMD PubGene Blog Amatomu Bloglines BlogScope IceRocket Sphere Technorati BitTorremt Brjunkie FlkixFlux Iswohunt Mioninova The Pirate Bay TorrentSpy Torrentz Price Google Product Kelkoo MSN Shopping PriceGrabber PriceRunner PriceScan Shopping.com ShopWiki Shopzilla TheFind.com Washabi Maps WikiMapia Bing Maps Geoportail GoogleMaps MapQuest Yahoo! Maps Geographical Accoona, China/US Goo, Japan Guruji.com, India Leit.is, Iceland Rediff, India Walla!, Isreal Yandex, Russia ZipLocal,Canada/US Sesam,Birwat, Sweden Searcdh.=ch, Switzerland People Peek You Ex.plode.us InfoSpace Spock Spokeo Wink Zabasearch.com ZoomInfo @
6. @ Email encryption and a wider security strategy Email encryption should never be considered in isolation from a broader security strategy that touches all parts of an organization and protects data wherever it goes. Fundamental to this security strategy must be the issue of encryption and how data, in any of its forms, can be secured from prying eyes according to an organization’s overall data protection strategy. Organizations that deal with legal, financial, medical, or any other classically sensitive data benefit from end-point based encryption. In cryptography, encryption is the process of transforming information (referred to as plain text) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. By using software that integrates into the Heart of a email system, as well as an Existing directory structure, user inter- vention is not required and system management is made much easier. E-mail authentication is the effort to equip messages of the email transport system with enough verifiable information, so that recipients can recognize the nature of each incoming message automatically. It differs from content filtering.
7. @ The Internet has been put to use as part of a facilitative strategy, characterized by multi-party collaboration and the sharing of information . The voluntary sector contains a wide variety of organizations that are supported by the work of volunteers who freely contribute their time and resources in order to support common ends. The sector includes organizational types of trade associations, charities, and hobby clubs. Within this sector, however, there are a large number of groups that strive to improve the general welfare of society through advocacy work, or by performing social services not under the purview of the public or private sectors. Yahoo! National Association of Social Workers AOL AT&T Greenpeace Fund, Inc. Google Bing Web Search American Veterans Relief Foundation Citizens Against Government Waste
8. @ ‘ Social change' agencies act as advocates, promoters and catalyzers of new ideas, attitudes and social institutions. Derived from historical movements designed to deal with social inequalities and dangers resulting from the sometimes narrow and short-term policies of government and business leaders, these social change organizations are currently involved with such issues as the environment, human rights, social justice, peace and international development. American Society for Prevention of Cruelty to Animals TASH (People with disabilities) National Coalition for the Homeles Antidefamation League (combating anti- Semitism
9. @ Actions undertaken by society to effect change are driven by a degree of strategic thought. In thinking strategically, social change activists try to identify the nature and causes of social problems and then choose specific targets that are deemed the most likely people or organizations to resolve those problems. The optimal approach to take to ensure the targets actually help create and maintain the required changes is determined by the type of strategy adopted by the change agents. One of the keys to a successful strategic approach is in maintaining effective communication with, and among, members of the public. Through Emailing Information, the funders are informed of the opportunities, challenges and impact of the tools that were documented, analyzed, and evaluated for nonprofit uses.
10. @ The five C's of social action: Cause. A social objective or undertaking that change agents believe will provide some answer to a social problem. Change Agency. An organization whose primary mission is to advance a social cause. Change Targets. Individuals, groups, or institutions designated as the targets of change efforts. Channels. Ways in which influence and response can be transmitted between change agents and change targets. Change Strategy. A basic mode of influence adopted by the change agent to affect the change target." (Kotler, 1973, p. 172)
11.
12.
13.
14. @ Advantages of Email Email plays large roll in new marketing mediums. Email is the announcer to subscribers when a new social network initiative is launched. It is weaved into social networking with the following procedures:
15. @ Disadvantages of Emails In a new phishing trend, spammers are focusing on individualized attacks. Recipients may be deceived into thinking the message is from a friend, but these spammers want access to their credit card accounts. Phishing is a common scamming practice that involves emailing users under false pretenses with the aim of tricking them into revealing their private information. The emails feature the recipients' names in the subject lines, claim to have seen them at Starbucks, and ask them to click on a link to view photos. Don't click. This is a scam. Those that take the bait may be exposed to objectionable material, incur unauthorized charges to their banking account, and may fall victim to identity theft. Email Corruption When the viewer is unable to open or send an email, the chances are that the email Has become corrupt. When the user sends the message, but a message is indicating that the message is queue able instead, there is the probability that the email might be corrupt.
16. @ Email Recovery The Email Recovery Software is a tool used for repairing and recovering corrupted or deleted emails because the emails are stored in the Mail Folder, a separate file. Different methods to recover them are used Deleted emails can be restored by looking in the deleted items folder in outlook and outlook express, but not if they have been cleared from there as well. The Mail Recovery software can then be used. The Stellar Phoenix Mail Recovery software scans, extracts and saves email messages and folders on the local drive. Sellar offers a complete solution of file recovery software and lost data restoration programs for Windows (Windows 95,98, ME,NT, 2000, 2003, and XP), Apple Macintosh, Novell, Linux, Unix Operating system and FAT, NTFS, HFS, MWFS, JFS, ExT2 and EXT3 file systems. Application Toolbar Icons Collection, 2010.1 PCN, BMP, ICB
17. @ References A Search Engine for your site. Jenki Productions. (2010). Directory of search engines and directories that on can be integrated into personal sites. Retrieved May 14, 2010 from www.searchengines.net Jenkins, G. Simms. (2009). The Truth about Email Ma rketing . Pearson Education, Inc. Publishing as . FT Press, Upper Saddle River, New Jersey. Retrieved May 13, 2010 . Baggptt. Cjros. (2007). Email Marketing by the Numbers: how to use the world’s greatest marekting tool to take any organization to the next level . Retrieved May 12, 2010. Oskar, Park. (2010), Provider of File Recovery Software & Service Provider . Retrieved May14, 2010 from http://www.stearomfp.com , The Strategic Importance of Email Encryption. 2010. strategic importance of email encryption. Securing business data and email traffic Retrieved May 13, 2010 from download.pgp.com/pdfs/Bloor-Research_Email-Encryption-Bri... – Peterson, Mark F.; Thomason, Stephanie J.; Althouse, Norm; Athanassiou, Nicholas; Curri, Gudrun; Konopaske, Robert; Lenartowicz, Tomasz; Meckler, Mark; Mendenhall, Mark E.; Mogaji, Andrew A.; Rowney, Julie I. A. Social Structure and Personal Values that Predict E-Mail Use: An International Comparative Study: Journal of Global Information Management , Apr-Jun2010, Vol. 18 Issue 2, p57-84, 28p; DOI: 10.4018/jgim.2010040103; ( AN 50254194 ) Subjects: CANADA; NIGERIA; UNITED States; COMMUNICATION & technology; ELECTRONIC mail messages -- Social aspects; COMPARATIVE studies; EXECUTIVES – Attitudes. Retrieved May 17, 2010. Serenko, Alexander (04/01/2010). "Rigor and Relevance: The Application of The Critical Incident Technique to Investigate Email Usage.". Journal of organizational computing and electronic commerce (1091- 9392), 20 (2), p. 182. Retrieved May 18, 2010.
18. @ References Mourby, Adrian, A Capital Loss for the Email Junkies (02/16/2001). Times Educational Supplement, Issue 4416, p15, 1/6p, 1 Black and White Photograph; ( AN 4459105 ) Subjects: HIGH technology; SOCIAL change; GREAT Britain Database: Academic Search Premier. Retrieved May 15, 2010. Rory O’Brien, Social Change Activism and the Internet: Strategic Online Activities. web.net / ... / The Inter net and Social Change Activism.doc An Introduction to Activism on the Internet: ( Jan 19, 2006). www.backspace.com/action/cell_phones.php - Using the Internet for Outreach & Organizing: A Virtual Activist ... Jump to Online Resources for Email Activism : Comprehensive information and "how to" guides on Internet activism . The eNonprofit: A Guide to ASPs, ... dawn.thot. net /virtual_ activist _training.html - Cached - Similar