Professional Documents
Culture Documents
2 - Online Collaboration - Key Characteristics of Online Tools
2 - Online Collaboration - Key Characteristics of Online Tools
Characteristics
of Online Tools
Concurrent
Multiple Users Real Time Global Reach
Access
ICDL Questions
□ Single User
□ Real Time
□ Global Reach
□ Concurrent Access
Single User
Real Time
Global Reach
Concurrent Access
Crowd
sourcing
Online forums or
discussion boards or
using of the
crowd
ICDL Questions
□ True
□ False
True
False
□ Multiple Users
□ Real Time
□ Global Reach
□ Concurrent Access
Multiple Users
Real Time
Global Reach
Concurrent Access
Best possible
team for a
project Regardless of
the location
ICDL Questions
□ Multiple Users
□ Real Time
□ Global Reach
□ Concurrent Access
Multiple Users
Real Time
Global Reach
Concurrent Access
Access all
Any updates
Documents necessary No need for
to a
are all documents different
document
stored in a regardless versions of a
are seen
single place of their document
immediately
location
ICDL Questions
□ Multiple Users
□ Real Time
□ Global Reach
□ Concurrent Access
Multiple Users
Real Time
Global Reach
Concurrent Access
Example:
When a change is made to a document or a calendar is
updated, it is instantly available to other team members to
view and/or use.
ICDL Questions
□ True
□ False
True
False
Create more
Reduce cost hours beneficial
to work
Instant Messaging
Online Meeting
Chat
Ease of Communication
Save time
Instantly
Working on a important
connect with the to
project
right person
Simplify tasks
Easy of communication
can add to the quality of
a project
Enhance Teamwork
People working
on a project
Offices
Enhance Teamwork
Focus on their
specific work
Online Enable team
Collaboration Tools members Greater
understanding of
the larger team
effort
Global Access
Collaborative
Tools
Synchronous Asynchronous
Online Instant
Email Blogs
Meetings Messaging
Risks Associated with Online Collaborative Tools
Online
sharing
services
Free
Fast
Easy to
Use
Unauthorized Access to Shared Files
Scenario
Trade secrets
Ends in the
Critical data wrong hands
Confidential Information
Unauthorized Access to Shared Files
Solution
Protect business by making secure documents sharing a
priority.
How
Problem
1. It is impossible to tell if and when someone has
accessed and changed a file.
2. Employees may make changes that are reflected in
one copy of a file, but not in any others.
Solution
Online collaborative systems only allows one active version of a
file at any particular time, through most also archive past
version.
Malware Threats
□ Malware
□ Instant Messaging
□ Service Interruptions
□ Identity / Data Theft
Which one of the following terms refers to a general term for any software
which causes damage, gather sensitive information, or gain access to a single
computer, server or computer network, without the user knowing it
ICDL Questions
Malware
Instant Messaging
Service Interruptions
Identity / Data Theft
Which one of the following terms refers to a general term for any software
which causes damage, gather sensitive information, or gain access to a single
computer, server or computer network, without the user knowing it
Malware Threats
Malware is used:
Against corporate websites to gather guarded information or to
disrupt their operation in general.
Against individuals to gain personal information.
Malware Threats
Malware
Include
Trojan
Viruses Worms Spyware
Horse
ICDL Questions
□ Viruses
□ Worms
□ Trojan Horse
□ Fireware
Viruses
Worms
Trojan Horse
Fireware
Malware
Spread Through
Social media
Links in text
update Advertisements
messages to a
messages (e.g. on social sites
mobile device
tweets)
ICDL Questions
Examples: Emails
Increase in spam
Major Problems
messages
Identity / Data Theft
Sensitive Financial
Information
Proprietary Formulas
Company Data
& Algorithms
Secret Research
Identity / Data Theft
Security developers
Make it difficult for hackers to access information that very few
people would attempt.
Continually update protective measures (difficult for a hacker
to exploit the system).
Identity / Data Theft
Example
1. Person could create a false Facebook or LinkedIn
account.
2. Start friending people within a company in order to
gain trust and familiarity.
3. After a time, this person can ask for and receive
confidential information from unwitting employees.
4. When others see their fellow employees as contacts,
they are more inclined to accept an invitation from
the perpetrator, which furthers the intelligence
gathering.
Service Interruptions
Cloud
Companies
Services
Unplanned
Planned Outage
Outage
Users informed
Maintenance with the problem
(Recovered Major Service if online service is
Minor incidents
within a Short Outage expected to be
Period of Time) unavailable for
more than 24
Users not Users not hours.
informed with the informed with the
problem problem
Service Interruptions
Individual
Group
Appropriate Use of Content
MULTIPLE CHOICE
ICDL Questions