1. Digital Content Creation

Digital Content Creation (Approx. 9 hours)

  1. Learning Objectives

  2. Introduction

  3. Development of Digital Content 

  4. 4.1. Creating and editing digital content in various formats, expressing oneself through digital media. 

4.2. Exploration of social media (understanding different social media applications) 

4.3. Managing online identity (creating accounts for different platforms - email (signing up, logging in)) 

4.4. Learning about authentication (Google/FB, etc.)

 4.5. Norms of expression when creating digital content for social media

  1. Communication 

5.1. Synchronous and asynchronous communication 

5.2. Sharing content with others through social media 

5.3. Functions for sharing on different social media platforms 

5.4. Understanding the privacy settings of different applications

  1. Data Sharing, Privacy, Cookies 

6.1. Data Exchange impact

  1. Copyright and Licenses 

7.1. Data, information, and digital content aplications.

  1. Online Marketing 

8.1. Major ICT (Information and Communication Technology) 

8.2. Who offers what? 

8.3. Interconnection of platforms

  1. Conclusion

  2. Reflection

  3. Resources

  4. Bibliography


1. Learning Objectives


• Distinguish the unique characteristics of digital marketing as a key exponent of business strategies in interconnected environments. 

• Recognize the importance of digital transformation and the incorporation of digitization strategies in businesses. 

• Communicate in digital environments; connect and collaborate with others; interact and participate in communities and networks; foster a digital culture. 

• Identify digital technologies for sharing information, data, and digital content. 

• Recognize digital technologies to build confidence and participate as a citizen in society. 

• Differentiate basic behavioral norms and digital environments management. 

• Choose communication forms and strategies tailored to a specific audience. 

• Understand the actions to implement the digitization of commercial strategies in both online and physical establishments.


2. Introduction

It is evident that the pandemic has brought about a change in scenario for everyone. And although forecasts predicted a downfall of the physical world in favor of the online, the truth is that both are coexisting and feeding off each other, among other things, due to new marketing strategies aimed at meeting consumer needs in a level of personalization and individualization never seen before.

Traditional marketing has given way to digital marketing as the main exponent of business strategies in interconnected environments. For the successful implementation of content digitization, we must chart a good roadmap with actions that drive the digital.

The pandemic highlighted the need to reinvent and improve the user experience by taking advantage of the opportunities offered by new technologies. People have become more digital since the COVID-19 lockdown and have acquired new habits that have accelerated digitization.

It is necessary to adapt now to the new demands, aiming to:

  • Improve user loyalty.

  • Create more personalized actions.

  • Provide extra security with their personal data.

However, the truth is that digitization does not have a standard formula, and a strategy must be outlined that offers measurable and profitable results.


3. Digital content development. 

A digital content is any information that can be stored, transmitted, or processed through electronic devices or computer networks. Digital content can take various formats such as text, image, audio, video, animation, etc. Some examples of digital content include documents, presentations, web pages, blogs, podcasts, videos, games, applications, etc.

Not all digital content found on the internet is reliable. Some characteristics of low quality or unreliable digital content include:

  • Containing false, inaccurate, or outdated information, even when widely disseminated.

  • Being biased, manipulated, or distorted by particular interests or ideologies, leading to misinformation.

  • Violating copyright or intellectual property rights of other individuals or entities.

  • Threatening the privacy, security, or reputation of the individuals or entities involved.

  • Inciting hatred, violence, or discrimination towards any group or collective.

Considering the above, before using digital content, it is essential to evaluate it as a reliable source based on certain characteristics, such as:

  • Authorship: who is the author or entity responsible for the content, their background, experience, or reputation in the subject, and their motivation or intention in publishing the content.

  • Date: when the content was created or last updated, its currency, and its relevance to the temporal context of the search.

  • Source: where the content comes from, whether it is original or derived from other sources, if it correctly cites and references its sources, and if it can be cross-referenced with similar or different sources.

  • Veracity: whether the content is true or false, if it is based on proven facts or opinions, and if it presents evidence or arguments supporting the information.

  • Relevance: whether the content is pertinent to the search, whether it covers the topic comprehensively or partially, whether it provides new or repeated information, and whether it has an appropriate level of depth or complexity for the purpose of the search.


 Reliability criteria 


After understanding the importance of evaluating or determining the quality of digital content that we select as relevant, a series of reliability criteria for the mentioned digital content and the websites that disseminate them are presented:

  • Authority: This refers to the identification and assessment of the author or source of the digital content, including their reputation, credibility, and expertise in the subject.

  • Timeliness: It indicates the frequency or date of the last update. Clearly, the currency and relevance of the content will make it more reliable. Websites of news media are examples of a proper updating policy, often with multiple daily editions.

  • Accuracy: This involves verifying the correctness and precision of digital content, as well as its internal and external coherence and consistency. Sometimes, indicators of quality include the presence of more advertising content than editorial, citation of other sources, reference to specific data such as dates, authors, statistics, absence of factual errors, clear distinction between opinion and information, etc. Spelling errors and a careless style can also be indicative of poor quality.

  • Editing: It reflects the care with which the information has been treated at each stage of the elaboration process before being published. For example, Wikipedia.

  • Systematization: As a quality criterion for digital content, it refers to the organization, structure, and presentation of content in a clear, coherent, and orderly manner.

  • Intrinsic Interest: It relates to the value, relevance, and utility of the content for the target audience, capturing their attention, curiosity, and motivation.

  • Objectivity: This refers to the neutrality, impartiality, and truthfulness of the content, unaffected by personal opinions, interests, or biases.

  • Originality: It is related to the novelty, creativity, and innovation of the content, ensuring it is not a copy or reproduction of existing content. An example of original digital content would be an artistic or literary work expressing the author's personal and unique vision, not based on previous works or significantly transforming them.

Reflection: Is there any formula for achieving success in digitalization processes?

The first thing we must consider is that the key lies in improving the user experience, which is at the center of all innovations.


4. Creation and edition of digital content in various formats, and to express oneself through digital media.

Technology has been synonymous with evolution, addressing human needs in various contexts: industrial, medical, mechanical, computer-related, educational, digital, among others. In all these areas, the goal has been the same: to streamline processes and make activities more manageable, enabling the acquisition of necessary skills. In the case of digital environments, this has led to the emergence of digital and technological resources and tools.

Digital Media and Tools A digital tool can be software (a program), but also software packages, spaces, and specific applications used through electronic devices. Its function is to facilitate daily life tasks. 

They can be classified based on the function they perform.

Gráfico de creación propia

Communicate

  • Function: Establish synchronous and asynchronous communication channels that break through space and time.

  • Tools: Google Groups, MeWe, LinkedIn, social networks, etc.

Content Organization

  • Function: Provide order to filtered or created information.

  • Tools: Scoop.it, Netvibes, Symbaloo, Google Drive, Pinterest, etc.

Create

  • Function: Generate digital content.

  • Tools: YouTube, SlideShare, LinkedIn, Twitter, WordPress, Google Docs, etc.

Inform / Disseminate

  • Function: Inform and share content online.

  • Tools: Blogger, WordPress, Facebook, Twitter, Scoop.it, Pinterest, etc.

Search

  • Function: Locate information or content that is relevant or interesting to the user.

  • Tools: Search engines, Twitter, Facebook, LinkedIn, Feedly, any of our information sources.


Professional digital tolos.

As citizens and professionals in the digital era, the use of digital tools allows us to optimize efforts and results. However, there is also a commitment to expanding digital knowledge and strengthening necessary skills. The goal is to identify digital tools that address, optimize, and facilitate professional tasks.

There are six main areas:

  1. Web Tools.

  2. Organization Tools.

  3. Search Tools.

  4. Content Creation Tools.

  5. Dissemination Tools.

  6. Communication Tools.

  7. Communication

5.1. Synchronous and Asynchronous Communication (How to Achieve Both)

By "synchrony," we understand the coincidence in time of two or more events. If this concept is applied to communication between people, we get the definition of synchronous communication: real-time communication.

Synchronous Communication: Synchronous communication refers to moments when a dialogue or conversation takes place between two or more people in real-time. In this dialogue, individuals share discourse, information, and time spent in communication, also overcoming the spatial factor.

Difference between Synchronous and Asynchronous Communication: Within digital communication, there are two aspects: synchronous and asynchronous communication. Let's look at their differences:

  • Synchronous: Synchronous communication is that in which the exchange of information over the internet, whether through computers, phones, or other electronic elements, occurs in real-time. For example, a video conference.

  • Asynchronous: Asynchronous communication is that whose exchange of information does not depend on time coincidence. For example, through email.

Characteristics of Synchronous Communication:

  • Simultaneity: The main characteristic of synchronous communication is that it occurs in real-time: the sender and receiver are in front of their devices at the same time exchanging information.

  • Time: In synchronous communication, especially in written form, recording time is important to know which message precedes another and avoid confusion in the exchange of information.

  • Flexibility: It allows modifying opinions and plans in real-time through debate and the exchange of simultaneous ideas. This communication favors argumentation and clarifications.

  • Speed: In synchronous communication, information is shared instantly, whether it is happening through audiovisual means or through written texts, such as in chats.

Types:

  • User-to-User Synchronous Communication: Personalized communications between a single sender and receiver in real-time using various applications like WhatsApp, Telegram, Messenger, Lime, Instagram, or Twitter.

  • Synchronous Communication Among Multiple Users: All electronic or virtual conversations and meetings involving numerous participants, such as chats, video conferences, workshops, online courses, and classes, using applications like Zoom or Skype, among others.

  • Audiovisual Synchronous Communication: This is where the sender and receiver can see and talk to each other in real-time. Currently, multiple platforms and applications feature this mode of communication.

  • Written Synchronous Communication: It was the first computer-based synchronous communication put into practice and was carried out through chats existing in forums on various websites. It continues to be used in academic forums or on platforms like WhatsApp, Teams, or Telegram.

In this regard, synchronous communication represents a true contribution to digital transformation: the ability to communicate quickly and ubiquitously, either individually or collectively.

To carry out a synchronous communication process in virtual environments, a series of tools are required to enable real-time communication. The participants must, in addition to having the necessary tools and technological support, be connected at the same moment, regardless of the distance that separates them.

For this purpose, we highlight two means through which synchronous communication can take place. These are chat and video calls or video conferences.


Gráfica de elaboración propia


• Chat: Derived from the English word of the same name, which means "conversation," it refers to a new method of communication that has emerged with technological advances, allowing an individual to converse simultaneously with others over the network. There are different types of chat applications, such as Telegram, Facebook, WhatsApp, among others. A professional chat can be a channel that facilitates communication within processes. It is important not to lose intentionality within them and to maintain order for their intended use.

Video Communication: A video call is a form of video conferencing that involves two users who can see and hear each other simultaneously. During a video call, users can share files and other multimedia content. Various resources exist for conducting video conferences, such as Skype, Zoom, Google Hangouts, Microsoft Teams, WhatsApp, and Google Meet. In the professional realm, the use of video conferences has become significant because, through this tool, participants can be convened regardless of their location, fostering closer attention.

Due to the 2020 coronavirus pandemic, the use of synchronous applications and media such as Zoom, Skype, or WhatsApp, among others, saw an extraordinary increase.

Synchronous Tools: In the following outline, we present the most commonly used tools or applications for synchronous communication:

  1. Microsoft Teams:

    • A unified communication and collaboration platform combining workplace chat, video meetings, file storage (including collaborative file editing), and application integration.

  2. Skype:

    • An application or program for communication via calls, video conferences, and instant messaging, installable on computers and mobile phones.

  3. Slack:

    • Designed for teams and workplaces, usable across multiple devices and platforms, with robust features for one-on-one and group chats, file sharing, integration with other applications and services.

  4. Zoom:

    • A cloud-based video conferencing service for virtual meetings via video, audio, or both. It allows simultaneous chat with participants and recording sessions for later viewing.

  5. WhatsApp:

    • A chat application for smartphones, allowing users to send text and multimedia messages, audios, and conduct video calls.

  6. Facebook Messenger:

    • A chat and instant messaging application for users of the Facebook social network.

  7. Google Hangouts:

    • A free instant messaging application with a focus on phone calls and video conferencing.

  8. Telegram:

    • An application offering numerous options in chats, file transfers between mobile and PC, acting as an audio player, aiding in photo compression, creating GIFs, and even facilitating the creation of a minimalist blog.

  9. Google Meet:

    • Google's platform for video calls, enabling virtual meetings or open online presentations, as it is a free tool.

Video conferences basic concepts.

A video conference is an interactive system that enables multiple users to engage in a virtual conversation through the real-time transmission of video, audio, and text over the Internet.


Video conferencing allows multiple users to engage in a virtual conversation by transmitting video, audio, and text in real-time over the Internet. This facilitates communication and collaboration, avoiding the expenses and time loss associated with physical travel.

Types of Video Conferences: Video conferences vary based on technology and were previously limited with variable results, including issues like loss of video or audio signals and reception delays. They can be identified based on:

  • Type of Equipment:

    • PC Systems: Individual access to the video conference.

    • Desktop Systems: Access from a regular meeting room using desktop devices.

    • Room Systems: Specially equipped rooms for video conferences with integrated microphones, monitors, and cameras.

  • Connection Method:

    • Point-to-point, if there are only two connecting points.

    • Multipoint, if several points connect simultaneously.

    • Over the Internet, configuring connection points on participants' devices.

  • Type of Participation / Broadcasting:

    • One-to-one: A call between two participants.

    • One-to-many: With a presenter who controls the presentation and decides whether to invite other participants.

    • Many-to-many: All participants can engage in conversation, chat, or share information. In this case, a moderator is often advisable.

Introduction to the ZOOM Tool:

When people hear about Zoom, they probably think of video conferences, but Zoom has many other features, including:

Web and App Access: Zoom can be accessed through the Internet, desktop computer applications, and mobile device apps. To conduct video conferences, a camera is needed, typically integrated into mobile phones or computers.

Basic Features: In addition to video conferencing, Zoom includes other useful tools for online meetings:

  • Chat.

  • Screen sharing.

  • Collaborative work.

  • Recording sessions.

Security: Communications are encrypted and protected. Although there were some security issues initially, the tool has been improved, and now communications are considered secure. Access management systems include passwords, personal invitations, and participant lists to prevent unwanted participants.

How to Get Started with Zoom:

If invited to a Zoom meeting, you can access it directly. However, by registering for the free version, you can also conduct your own meetings and download the app for better performance.

To begin with Zoom, the first step is to sign up by providing the required information. Zoom offers both a paid and a free version.

Simply provide your email and confirm your registration. Zoom will send an email to the registered address for activation.

The next step is to fill out the form and confirm your password following the program's suggestions for security.

Once registered, you can invite your contacts to open their own accounts.

Configure your account and schedule your first meeting, specifying the date, time, and duration.

Zoom generates an access code sent to participants for meeting entry.

You can customize meeting options and add it to your Google Calendar to keep your schedule updated with Zoom events.


Joining a Meeting:

If invited to a meeting, you will receive a link taking you directly to the meeting or to a page to enter the ID provided with the invitation and the password if required.

Main Features of Zoom:

When participating in a Zoom meeting, it is an active process with a series of options accessed from a menu that allows the following:

  1. Microphone:

    • Enables toggling the microphone on and off. It is recommended to mute it when not speaking to avoid additional noise and improve the clarity of the person speaking.

  2. Video:

    • Enables toggling the video on and off. When crossed out, it indicates that the camera is deactivated.

  3. Security:

    • Allows activating security options that can be configured in a waiting room. Participants cannot enter the room directly; they must wait for the host to grant access.

  4. Participants:

    • This option provides information about the number of participants. Additionally, it can be activated to display participants on the side of the screen.

  5. Chat:

    • Zoom has a chat feature that can be used during the meeting to communicate with participants, e.g., saying goodbye if you need to leave before the meeting ends without interrupting. When activated, a chat window opens with one or all participants. It also allows file sharing.

  6. Screen Sharing:

    • This option is usually available to the host who initiates the meeting. It may also allow other participants to share their screens.

  7. Record:

    • The host can record the meeting for later review. When recording starts, a notice appears for participants to decide whether to participate or turn off their cameras.

  8. Reactions:

    • This feature allows all participants to raise their hand to request to speak or express their opinion using emojis.

  9. End/Leave:

    • The final option allows the host to end the meeting, or participants to leave. If the host ends the meeting, it concludes for all participants.


Planning a Meeting:

Planning a meeting is simple. You can do it in advance or on the go, inviting attendees directly at the moment. To do this, follow these simple steps:

Step 1 

Select the option "Schedule a Meeting" 

Here, you can give a title to the meeting and provide a description. To start, set the date and time. If you have a free version, meetings can last up to 40 minutes.

Step 2 Define the Meeting's Characteristics You can set a frequency if you want the meeting to be recurring, for example, once a week. Options include viewing the meeting security code, enabling or disabling the "waiting room," and entering the meeting with audio and video activated or deactivated.

Modify a Meeting:

Once a meeting is created, you can edit and adjust it again. In this case, we have modified the frequency of the meetings.


Invitations to a Meeting:

Once a meeting is created, you can invite attendees. After completing the meeting scheduling, you will obtain an invitation. This can be sent via email, WhatsApp through Zoom itself, or from the calendar application you are using.

Audio Description: Zoom website. "Meetings" section, showing an event called "My Meeting."

Once a meeting is created, the next step is to invite attendees.

Audio Description: By clicking on "My Meeting," you access its configuration menu.

Select the meeting and click on "Copy Invitation to the Meeting."

After clicking, a card opens with details of the meeting. Click on the lower "Copy Invitation to the Meeting" button, which selects all the information on the card. The Gmail mailbox appears. At the bottom left of the screen, the "New Message" box is open.

Copy the invitation and paste it into the body of the email message you are sending to the person you want to invite.

Audio Description: The invitation information is pasted over the message body, and the "Send" button is clicked.

If you prefer, you can also paste and send it in a WhatsApp message.

Audio Description: "WhatsApp Web" is opened, and the "New Message" icon is clicked at the top left of the screen. Below it, a list of contacts appears, and one of them is selected. The messaging window opens, the writing bar is clicked, and the "My Meeting" invitation is pasted. Finally, the button allowing the message to be sent is clicked.

Recommendations for Achieving Engagement:

Before Starting:

When convening the video conference, inform attendees of its objective. Therefore, it is interesting to take the following actions:

  • Place the topic or purpose of the meeting in the subject.

  • In addition to the meeting link, duration, and time, inform who the speaker or person leading the meeting will be.

  • List the points to be discussed and emphasize that time will be allocated for participation. Thus, each participant, informed of the topic in advance, will have had the opportunity to think about it and make valuable contributions.

The First to Arrive:

The organizer should be the first to arrive. Ideally, open the meeting 15 minutes before the scheduled start time. Consider that various unforeseen events can occur (surprise operating system updates, for example).

The Welcome:

As the host, the organizer of the video conference will welcome all participants.

Some recommendations for organizing a video conference are:

  • Turn on the camera so you can be seen.

  • Personalize the welcome for each person entering the meeting.

  • Introduce yourself. Give a brief description of your professional experience.

  • Share a question or image on the screen that invites reflection so that attendees can think about the topic while the meeting begins.

  • Invite attendees to introduce themselves.

  • Check if there is life on the other side.

Becky Pluth, author of the book "Webinars with Wow Factor," states that an online meeting attendee remains attentive for an average of four minutes. Therefore, it is necessary to ask an open question every four minutes to generate discussion.

Get Them Involved:

Present challenges, questions; generate debate; propose rounds of questions. In summary, get them involved.

Master the Application:

It is necessary to master the tool before the event. You must enter and test it to understand its operation well and try to avoid technical hiccups that may seem unprofessional.

There are some basic actions that you need to know how to do and know perfectly:

  • Mute all participants.

  • Share the screen.

  • Pass control to another participant.

  • Identify participants who are not connected (check those not visible in the online window).

  • Use the chat tool.

  • Record the session.

  • Use the whiteboard.

Configure Attendee Permissions:

All users of a Zoom account have a role assigned automatically, either owner, administrator, or member. Users can play different roles during a meeting: host, co-host, alternative host, and participant. Each role will be assigned by the host for the different participants in the meeting. Role-based access control allows additional user functions to be added to an account.

Roles Definition in a Zoom Meeting:

Host:

  • The user who schedules the meeting.

  • Has all the permissions to manage it.

  • A meeting can only have one host.

Co-Host:

  • Shares most of the host's controls, allowing them to focus on the administrative aspects of the meeting.

  • The co-host role is assigned by the host during the meeting.

  • Cannot initiate the meeting.

  • If a host needs another user to start the meeting, they must assign the alternative host role to another user.

Alternative Host:

  • Has the same permissions as the co-host but can also initiate the meeting.

  • The host can assign alternative hosts when scheduling the meeting.

Participants:

  • Have no administrative privileges.

  • Depending on the permissions granted by the host, participants may have more or fewer participation options.

  • The co-host cannot start a meeting scheduled by the host or be assigned before the event. The host must grant co-host status to a participant. The host can also assign the alternative host role to another user.

How to Assign Roles to Users:

It's straightforward; just follow these steps:

  1. Log in to the Zoom web portal with an owner account or an account with role-editing permissions.

  2. Click on User Management > Users.

  3. Check the box to the left of each user to whom you want to assign a role.

  4. Click on Change Role. This displays the Change Role dialog.

  5. Select the role name to which you want to add users.

  6. Finally, click Save to return to the Users page.

Recording Options:

The option to record video calls is very useful, especially in work, educational, and informational contexts, especially when someone invited cannot attend a scheduled session. The host role can use the built-in functions of cloud and local recordings.

Recording a Local Session on the Computer:

Local recording saves the file directly to the computer's hard drive (provided there is enough space). This is an easy option that does not require the use of any cloud storage account. A host (or an attendee to whom the host has given permission to record) will see the Record button at the bottom of the screen. The steps are as follows:


Step 1: Ensure Local Recording is Enabled

Ensure that local recording is enabled. To do this, choose "Meeting Settings" (this option is only visible to the account administrator).

In a business account, the settings section may be named "Account Settings."


Step 2: Start a Zoom Meeting as the Host

Initiate a Zoom meeting as the host. Among the tools at the bottom of the screen, there should be a round icon labeled "Record." Select this icon to start recording.

A notification will appear in the upper-left corner of all participants' windows, indicating that the recording is in progress. The recording can be paused at any time.

Step 3: End of Meeting

When the meeting concludes, a notification will appear, suggesting to "convert the recording of the meeting." The recording will be automatically saved as an MP4 file and an M4A audio-only file on the computer, in a folder named "Zoom_0.mp4."

By default, all recordings will be placed in a Zoom folder located at the following file path on these devices:

  • PC: C:\Users\Username\Documents\Zoom

  • Mac: /Users/Username/Documents/Zoom


Other Video Conferencing Tools: Microsoft Teams

Not everything revolves around Zoom. While Zoom is one of the most commonly used tools for online presentations due to its numerous features, there are other options worth exploring. It's essential to be aware of alternatives that may better suit specific needs at any given moment.

Teams: More Than Just Group Meetings

Microsoft Teams is a collaborative work tool with various features, including chat, video calls, and file sharing.

Chat

Instant messaging platform that supports calls, video conferences, and screen sharing with other users. It keeps the team connected, organizing everything in one place on the platform. Adjusting group participants can enhance efficiency.

Teams enables conversations from anywhere, allowing voice message recording, responding to chats from a mobile phone, and more.

Calls

Teams allows users to make calls to anyone using the platform, facilitating real-time communication with colleagues.

Meetings

  • Video Conferencing: Teams supports meetings in various situations, from individual calls to delivering sales pitches, organizing learning sessions for teams, to general company-wide meetings.

  • Virtual Events: It enables the organization of interactive webinars with secure connections for up to 1,000 attendees and broadcasts for up to 10,000 attendees.

  • Audio Conferencing: Teams allows people to join meetings from anywhere using a global phone number or by contacting each other directly. All they need is a mobile device and Microsoft Teams.

Collaborative Work

  • Team Gatherings: Through the conference mode, team meetings become a more engaging experience. It allows focusing on facial expressions, body language, detecting non-verbal cues, and easily identifying the speaker.

  • Collaborative Work: Quick access to applications like Microsoft Word, Excel, and PowerPoint allows seamless real-time collaboration. It simplifies teamwork with shared documents, calendars, and files.


Teams: Key Features

Creating a Video Tutorial

Teams is a Microsoft tool for synchronized communication.

Audio Description: On the Windows desktop, icons of documents are visible, and the "Chat" section of the "Teams" app is opened.

You can chat, share files, call your contacts, and schedule meetings from your calendar.

Audio Description: The "My Desktop" window is opened, a file is selected, dragged to "Teams," and after pressing enter, the file is sent to the selected contact. Clicking the call icon opens a window displaying the contact's photo. The call is ended by clicking the "Exit" button in the upper right corner.

Simply select the day, indicate the meeting's subject, and set the time.

Audio Description: The Calendar screen appears, clicking on a time slot on September 15 opens a window to create a new event.

Add the members you want to invite.

Audio Description: At the top, the event name "Project Status Meeting" is entered. The time is modified, and an attendee is added in the "Add required attendees" bar.

Write a message in the invitation to provide more information or request something from the guests.

Audio Description: A message is written in the invitation, saying: "Could you bring the client documentation again? Thanks."

Once you send the invitation, it will be recorded in your Teams calendar.

Audio Description: The Teams calendar screen is revisited, showing the "Project Status Meeting" event that was just modified.

Skype

Skype Features

Instant Messaging (Chat)

  • Search for someone.

  • Add a contact.

  • View a contact card.

  • Create a group.

  • Send an instant message.

  • Add someone else to the conversation.

  • Add audio, video, and shared files to an instant messaging conversation.

  • Switch between conversations.

  • Search for a previous instant messaging conversation.

Calls (Audio and Video Conferences)

  • Set up the audio device.

  • Add audio to an instant messaging conversation.

  • Start an audio conference call with multiple people.

  • Invite more people to a call.

  • Answer a call.

  • Use audio call controls.

Virtual Meetings with Skype for Business

  • Schedule a Skype for Business meeting.

  • Set meeting options.

  • Join a Skype meeting.

  • Use controls and view in a Skype meeting.

  • Record and play a meeting.

  • Manage meeting participants.

  • Share the desktop or a program.

  • Give control to meeting participants.

  • Regain control from a participant.

  • Select who can download shared files.

  • Share a PowerPoint presentation.

  • Share a file or an image.

  • Share notes with OneNote.

  • Share a whiteboard.

To use Skype, follow three simple steps: create an account, download Skype, and log in. Before that, it's essential to verify that your computer has the necessary elements to make the most of the program.

Google Meet

If You Have a Google Account, You Have Google Meet

Google has made enterprise-level video conferencing available to everyone. Anyone with a Google account can create an online meeting with up to 100 participants and meet for 60 minutes per session.

  • Unlimited Number of Meetings

    • Allows meetings with whomever you want, as many times as necessary. There's no need to register to start using it.

    • You can invite up to 100 participants to a meeting. For security reasons, if the free version of Google Meet is used, invited individuals must sign in with a Google account to join the meeting.

    • Meetings cannot be recorded in the free version.

  • Instant Subtitles During Meetings

    • Meet allows adding real-time instant subtitles created with Google's speech recognition technology. To activate subtitles, click on the three dots on the Meet screen, and the option will open. This feature is currently available only in English.

  • Screen Sharing with Participants

    • You can show your entire screen or the window of an application to share presentations or collaborate on documents.

  • Preview of Image and Sound

    • After clicking on the meeting code or link, you can adjust the camera and microphone and check how the image appears and the sound is heard before entering. You can also see who has already joined.

  • Adjustable Layouts and Screen Settings

    • Meet automatically changes the layout of the video call window to display content and the most active participants.

    • To change the layout, click on the three dots in the lower corner of the Meet screen.

  • Controls for Meeting Hosts

    • Anyone can pin, mute, or remove participants. For privacy reasons, you cannot activate someone else's sound.



5.2. Sharing content with others through social media (Messenger, WhatsApp, Viber, Instagram, etc.)

Social media has emerged as a new way of communication, facilitated by digital platforms and smartphone applications that enable connection and interaction among individuals with common interests, activities, or relationships, even if they didn't know each other before connecting through the social network.

The establishment of social media platforms has been rapid, starting to gain a presence on the internet in the late '90s and continuously growing and adapting to the changing context since then.

Let's look at some key milestones in the creation of social media platforms:

1999

  • Messenger: A Microsoft instant messaging program created in 1999 and discontinued in 2005, replaced by Windows Live Messenger.

2002

  • LinkedIn: Launched in 2003, LinkedIn is a social network oriented towards business, connecting millions of companies and employees who share their resumes and professional information. In 2011, it became the first social network to go public. Microsoft acquired it in 2016, and it currently has over 750 million members.

2003

  • MySpace: Launched on August 1, 2003, MySpace was one of the most popular social networks in the early 2000s. Acquired by TIME in 2016, it transformed into a news and trends application.

2004

  • Facebook - Vimeo - Flickr:

    • Facebook: Founded by Mark Zuckerberg and launched on February 4, 2004, Facebook is a leading American online social media and social networking service. Despite losing users, its founder envisions it becoming the foundation of a new communication form called the "metaverse."

    • Vimeo: A video-based internet social network launched in November 2004 by InterActiveCorp (IAC). It provides ad-free video viewing services.

    • Flickr: A website for storing, sorting, searching, selling, and sharing photos or videos online. Flickr gained popularity for its tools that allow users to tag photos, explore, and comment on others' images.

2005

  • YouTube: An American video-sharing website created in February 2005 by three former PayPal employees. Google acquired it in October 2006.

2006

  • Twitter - Spotify:

    • Twitter: A U.S. microblogging service created by Jack Dorsey in March 2006 and launched in July of the same year. Twitter has gained global popularity, with over 300 million users generating 65 million tweets daily.

    • Spotify: A Swedish multimedia services company founded in 2006. It offers a streaming application for continuous music playback on the internet. Spotify has around 400 million users, with nearly half having paid accounts.

2009

  • WhatsApp: A messaging app for smartphones that allows users to send and receive messages, images, videos, audios, recordings, and more. It is the most used messaging app with 2 billion active accounts as of 2021.

2010

  • Pinterest and Instagram:

    • Pinterest: Launched in March 2010, Pinterest is a platform that allows users to create and manage thematic personal boards.

    • Instagram: Launched on October 6, 2010, Instagram is a U.S.-based application and social network owned by Facebook. It is widely used by young people to share photos and videos and follow influencers.

2013

  • Telegram: An instant messaging platform of Russian origin developed by the Durov brothers. Known for its higher privacy level, Telegram focuses on chat communication and the creation of user groups.

2016

  • TikTok: A Chinese-owned social media service for sharing videos. TikTok allows users to easily create, edit, and publish videos and share them with others. It has become a platform for trends, with a significant emphasis on influencers.

The social media is changing communication in 21st-century society, much like newspapers, radio, or television did before. The success of a social network is based on the level of usage, utility, and interaction that the community finds in it.


5.2.1 Características de las redes sociales

Rosa ha explorado varias redes sociales y ha notado que no todas son apropiadas para cubrir sus necesidades. Ha observado que algunas están dirigidas a un público específico, otras tienen un propósito profesional, mientras que algunas tienen un enfoque más comunicativo, informativo o de entretenimiento. Todo esto la hace reflexionar sobre cómo las redes sociales han adquirido dimensiones tan amplias y se han convertido en un medio globalizado donde millones de personas pueden interactuar.

Pero hay otros aspectos que pueden definir a las redes sociales. Haz clic en los indicadores para obtener más información.

Conectividad Es la posibilidad de contactar fácilmente con otras personas y crear vínculos a través de las redes sociales, que están abiertas a la participación de cualquier persona u organización.

Viralidad La viralidad es un término muy común en los entornos virtuales. Se refiere a la rápida propagación de un contenido a través de las redes.

Personalización Cada usuario tiene la libertad de personalizar y dar identidad propia a sus redes sociales según las funciones que estas posean. Además, su perfil puede configurarse según sus preferencias y condiciones de privacidad.

Interacción La interacción permite a las personas expresarse, establecer diálogos y mostrar sus preferencias. Esta dinámica es de interés para las empresas, ya que les permite conocer las opiniones e intereses de los públicos y generar mayor engagement, es decir, compromiso o implicación emocional con el público.

Temporalidad Los tiempos en la comunicación pueden variar desde las interacciones en tiempo real hasta las que se producen posteriormente en reacción a la publicación de un contenido. Las redes sociales permiten una interacción continua en el tiempo, motivada por los intereses particulares de sus participantes.

5.3. Funciones para compartir en diferentes redes sociales

Cuando nos conectamos al mundo digital, ya estamos participando de una forma de ciudadanía. Rosa ha notado que su participación en las redes hasta ahora solo se ha centrado en el reportaje visual que está realizando. Nunca ha participado para comunicarse con sus amistades ni para conocer a otras personas. La idea de conectarse para organizar un debate social o un encuentro simplemente por diversión no estaba en su imaginario.

En Internet, es posible encontrar diferentes tipos de participación ciudadana gracias a la comunicación digital. A continuación, presentamos los más importantes:

  • OCIO: Participación que cualquier persona con un dispositivo y acceso a Internet puede realizar. Su función principal es potenciar las relaciones personales entre sus miembros.

  • INTEGRACIÓN: Busca mejorar las relaciones entre personas a través de la compartición de información y la interacción.

  • INTERÉS PROFESIONAL: Busca principalmente promocionarse a nivel profesional, estar al día en su campo y especialidad, e incrementar su agenda de contactos profesionales. Quienes participan en esta categoría crean contenidos, ya sea en soporte escrito o audiovisual, que posteriormente distribuyen y comparten a través de las redes sociales con otras personas.

Reflexiona... Las redes sociales pueden ser utilizadas de manera empresarial, profesional o personal. Por ejemplo, Facebook cuenta con una utilidad que permite crear y acceder a ofertas de trabajo. La mayoría de las empresas, incluidas las multinacionales, tienen un perfil empresarial en esta red social.

Managing social media involves monitoring the activity on a profile with the goal of achieving specific objectives, such as attracting a broader audience, gaining more customers, or strengthening our presence on social networks.


Professional Management of Social Media

The professional aspect of social media involves the daily management of a set of actions aimed at promoting a digital identity to connect with and build loyalty among the audience. These actions range from choosing the social network where the profile will be created to analyzing the content posted on that social network and paying attention to the comments and interactions of the audience with the publication.

Posts on professional/work-related social media cannot be as spontaneous as on a personal network. When managing professional social media, it's essential to remember and respect these requirements:

  • Define Goals and Growth Strategies: Define your goals and growth strategies on each social network where you are present. Research what is being said about you and anticipate a response. If something displeases you, avoid responding impulsively and without careful thought. For example, Rosa might receive negative comments on her social media about the photographs of some houses she is posting, which could potentially harm her professional image. However, she has defined what to do in such cases and has decided to respond constructively, appreciating the comment to improve her work.

  • Create Content for Social Media: Create value-added content for each audience and for each social network. As you already know, it's necessary to create a schedule, knowing what you will post on social media at each moment. Rosa uses her work to write various articles about photography and real estate. She creates images and short videos to accompany her content.

  • Generate Conversation: Generate conversation with the audience, encouraging participation on different social media channels. The tone should be approachable, and the information should be clear. The key is to make others interested in what you do and say on social media. Therefore, the first rule is to know which content you can contribute that is most interesting and to respond to any questions that may arise correctly.

Supervision of Social Media

The supervision of social media, especially if they have a large audience and interactions, can become a very complex task that takes up several hours a day. As you have just seen, having a presence on a network involves not only creating messages, materials, and content but also paying attention to those who participate.

Therefore, it's necessary to consider some considerations that allow you to perform effective supervision without succumbing to provocations. Rosa has chosen the path of planning and active work and follows these recommendations.


Work on Social Media

Internal Work: It's essential to have some planning regarding what and how you want to communicate through social media. Whether it's a personal or professional profile, it's advisable to create a personal plan that considers task completion, attention to interactions, the type of content to be published, posting frequency, and the objectives you want to achieve with them.

Work on the Network: Supervising the response and interaction with the audience is a fundamental task. For this, you need to consider the work to be done, highlighting interaction between people, reviewing their responses, seeing how many times your posts are shared, examining your presence on other channels, observing the conversations that arise, and analyzing how all of this impacts business improvement.

Employees should know how to manage their own social media as part of their professional identity. What they convey in the digital environment can be planned and controlled, so it's good to take advantage of that opportunity. Remember that social media is a means, not an end in itself: consider what use you will give them, what purpose they serve, or can serve for you.

In companies, individuals professionally responsible for managing, building, informing, and moderating communities around a brand through social media are identified with the title of Community Manager (CM).


Community Manager Profile and Role

This role is primarily undertaken by professionals in social communication, journalism, marketing, and advertising, focusing on the web positioning of the brand. They develop digital communication strategies, leveraging the unique possibilities of each social media platform.

The Community Manager is the voice that conveys all the information the institution wants to share with its audience. They observe trends, generate positioning and dissemination campaign strategies, and establish guidelines for audience interaction.

Functions for Sharing on Different Social Media Platforms

Whenever Rosa thinks about the idea of a social network, sites and apps like Facebook, Twitter, LinkedIn, Snapchat, or Instagram come to mind. These platforms have the largest number of participants today, playing a crucial role in mobilization and opinion trends.

Later on, you'll explore the three most important social networks in virtual environments. They have had a significant impact on society, contributing to changes in interaction, communication, and even the organization of internet users.

Facebook

Currently boasting over 2.74 billion users worldwide, Facebook continues to conquer new markets due to its high information exchange and services for individuals and businesses. It allows building a follower base for sharing information through multimedia posts without character limits.

Did you know? Facebook's initial name was "Thefacebook," starting as a student directory. It facilitated finding classmates in the same university classes. Over time, it evolved into connecting friends and creating a network.

What can you do on Facebook? Facebook offers various features, including recommendations, content interaction through reactions, comments, and sharing, groups based on interests or events, event tracking, connecting with new contacts, job listings, games, online payments, and business pages. It serves as both an individual and professional social network.

Instagram

Instagram is an application for sharing photos and videos instantly, allowing users to apply various filters and frames. Originally, it emphasized the immediate publication of photos and videos, introducing features like Instagram Stories in 2016.

Did you know? Instagram Stories have become a global medium of expression due to their brevity and transience, enabling new forms of interaction and communication.

With over 1 billion users, Instagram is a platform for sharing images and videos, turning a mobile photo into a professional-looking image. It provides a simple process for posting content and sharing it across other social media platforms.

YouTube

Starting as a video-sharing website, YouTube has evolved into the second most visited site globally, serving as a social network. It allows users to upload and view videos, changing how audiovisual content is communicated.

YouTube is a cloud service where users can create an account and channel with a Gmail account. Videos can be public or private, organized with labels and playlists. It has gained popularity not only as a social network but also as a search engine for informational videos.

Creating videos for a YouTube channel requires minimal requirements, as modern smartphones support HD video. Free editing programs, like iMovie or Windows Video Editor, enable users to create polished content. YouTube's success lies in the effectiveness of audiovisual communication, which is faster and more viral than text-based content.


5.4. Conocer la configuración de privacidad de las distintas aplicaciones

Protecting Devices

The goal of this competence is to be aware of risks and threats in digital environments, safeguard devices and digital content, and consider reliability and privacy. In this section, we'll explore prevention strategies to avoid risks, protection measures against digital threats, and security practices to consider when using our digital devices. We'll also engage in a practical activity to apply specific security measures.

Prevention Strategies to Avoid Risks

In this section, we'll explore key strategies to prevent and avoid risks in digital environments, focusing on both general digital risks and those specific to devices. By understanding risks and taking preventive measures, we'll be better prepared to protect our devices and digital content.

Among the most common risks in digital environments, both general and device-specific, are:

  1. Malware: Malicious software designed to damage or infiltrate devices without user consent. It includes viruses, worms, trojans, ransomware, spyware, etc.

  2. Unauthorized Access: When someone gains access to a device, account, or network without permission, leading to information theft, data manipulation, or malicious actions on behalf of the legitimate user.

  3. Loss or Theft of Devices: Exposing information stored on mobile devices or laptops if proper security measures are not taken.

  4. Unsecured Connections: Unsecure network connections, like public Wi-Fi without encryption or websites without HTTPS, facilitating unauthorized access or information espionage.

  5. Weak or Predictable Passwords: Attacks such as brute force can discover passwords, especially effective against weak or predictable ones.

  6. Privacy Breach: Unauthorized collection, use, or disclosure of personal information through security breaches on websites, apps, or social networks.

  7. Security Breaches in Applications and Online Services: Breaches in apps and online services leading to exposure of personal and sensitive data.

  8. Hardware or Software Failures: Data loss due to hardware failures, human errors, malware attacks, or other unexpected events.

  9. System and Software Vulnerabilities: Known or unknown vulnerabilities that attackers exploit for unauthorized access to devices or sensitive data.

  10. Social Engineering: Manipulating and deceiving individuals to obtain confidential information, often using phishing techniques.

  11. Online Scams: Various online scams, including fake offers, lotteries, fraudulent donation requests, pyramid schemes, and sales of fake products, aiming to deceive users into revealing personal information or making unauthorized payments.

To protect against these risks, consider the following proactive measures:

  • Antimalware Methods: Detailed study in the next section.

  • Regular Backups: Back up important data regularly to external devices or cloud storage to ensure availability in case of device loss, theft, or damage.

  • Robust Access Configuration: Use strong and unique passwords for all online accounts, considering the use of a reliable password manager.

  • Two-Factor Authentication: Enable two-factor authentication whenever possible for an additional layer of security during login.

  • Secure Network Connection: Avoid unsecure network connections, opting for VPNs to encrypt communication and protect data.

  • Maintenance and Software Updates: Keep operating systems and applications updated to contain vulnerabilities. Configure devices and apps to update automatically or perform regular manual updates.

  • Safe Web Browsing Practices: Use updated web browsers, avoid clicking on suspicious links, and refrain from downloading attachments from untrusted sources. Employ browser security extensions or add-ons to block unwanted ads and protect against malicious websites.

  • Safe Email Usage: Be cautious with emails from unknown senders, avoid sharing personal information through unsecured emails, use end-to-end encryption for sensitive messages, and verify the authenticity of senders and URLs before interacting.

  • Education and Continuous Training: Stay informed about the latest cybersecurity threats and best practices.

  • Participate in online security courses, webinars, and workshops.

  • Share knowledge with family and friends to help them protect themselves.

  • Being Cautious When Clicking on Email Links

  • Not Responding to Emails from Third Parties Posing as Legitimate Entities:

  • Exercising Caution When Providing Personal Information Online:

  • Continued Education and Training.

  • Engaging in Courses, Webinars, and Workshops on Online Security:

  • Staying Informed About the Latest Trends in Cybersecurity:

  • Sharing Our Knowledge with Family and Friends to Help Them Protect Themselves


Protection Measures for Different Devices Against Digital Threats


In the digital realm, various threats can compromise device security and the integrity of digital content. In this section, we will focus on those caused by malware, a primary concern.

The term "malware" is a contraction of "malicious software" and can have multiple objectives, such as stealing personal information, remotely controlling devices, displaying unwanted ads, encrypting files for ransom, or spying on user activities. It infiltrates a device through downloads of infected files, visits to malicious websites, clicks on deceptive links or ads, or by exploiting vulnerabilities in the operating system or applications. It's a broad term encompassing different types of malicious programs.

Computer Viruses: Computer viruses are malicious programs that replicate and attach themselves to other legitimate files or programs. Their goal is to damage or destroy data and programs on the infected device. Example: The "Melissa" virus was an email virus that spread through infected attachments.

Worms: Worms are self-replicating programs that spread through computer networks, exploiting vulnerabilities in operating systems or applications. They can cause significant damage and slow down systems. Example: The "WannaCry" worm spread in 2017 through a Windows SMB protocol vulnerability, encrypting files and demanding a ransom.

Trojans: Trojans are programs disguised as legitimate software but contain malicious code. They can allow unauthorized access to the device, steal confidential information, or install other malicious programs. Example: The "Zeus" Trojan was malware that stole banking information by logging users' keystrokes.

Ransomware: Ransomware encrypts files on the device and demands a ransom for their release. It can spread through phishing emails, downloads of infected files, or by exploiting vulnerabilities. Example: The previously mentioned "WannaCry" ransomware affected thousands of systems worldwide.

Spyware: Spyware installs without the user's knowledge and collects personal information or monitors user activities. It can track passwords, browsing histories, emails, and other confidential information. Example: The "Keylogger" spyware records user keystrokes and sends the information to attackers.

Adware: Adware displays unwanted and annoying ads on infected devices. It often installs alongside other software and can impact device performance. Example: The "Superfish" adware was pre-installed on some Lenovo computers and displayed ads based on user browsing activity.

In the following sections, we will focus on cybersecurity mechanisms to protect the digital ecosystem and methods to provide robust access to this ecosystem.

Mecanismos de ciberseguridad para la protección del sistema mediante cortafuegos y antivirus 


In the digital ecosystem, our devices and networks are interconnected, facilitating data transfer and access to various online services and resources. To ensure the security of this ecosystem, understanding its key components is crucial:

Devices: Devices are fundamental components of the digital ecosystem, including computers, smartphones, tablets, and IoT (Internet of Things) devices. These devices store and process personal information, connecting to the network for online services. Given that devices may contain sensitive data, it is essential to protect them from potential cyber threats and attacks.

Networks: Networks serve as infrastructures enabling communication and data exchange between devices. These can be wired networks (e.g., Ethernet) or wireless networks (e.g., Wi-Fi and Bluetooth). Networks may also be connected to the Internet, expanding possibilities for interconnection and online service access. However, this connectivity also increases the risk of exposure to threats and attacks. Therefore, protecting networks is crucial to prevent unauthorized intrusions and ensure the integrity and confidentiality of transmitted data.

Communication: Communication in the digital ecosystem involves data transfer between devices and across the network. This occurs through email exchanges, web browsing, messaging applications, file transfers, and other means. As data in transit can be intercepted and compromised, implementing security measures such as end-to-end encryption and authentication is necessary to protect privacy and communication integrity.

Digital Services: Digital services are integral to the digital ecosystem, encompassing activities like cloud storage, e-commerce, social networks, and online banking. These services often involve the exchange of personal and financial data, making them attractive targets for cybercriminals. Hence, mechanisms such as secure authentication, data encryption, and security practices by online service providers are fundamental for protection.

Recognizing these components in the digital ecosystem highlights the need to implement protection mechanisms for both devices and networks. The constant interconnection and communication among these elements expose them to potential threats, emphasizing the importance of appropriate security measures to safeguard data and online services' integrity, confidentiality, and availability.



Cybersecurity Mechanisms: Firewalls and Antivirus Programs

In the realm of cybersecurity, various mechanisms contribute to fortifying the security of our systems. Two crucial elements in preventing and detecting cyber threats are firewalls and antivirus programs.

Firewalls: Firewalls are essential security measures to protect systems against external attacks. They act as a barrier between our network and the outside world, filtering unauthorized network traffic. Firewalls can be hardware or software and examine incoming and outgoing traffic, blocking or allowing access based on established security rules. Properly configuring a firewall is fundamental to preventing unauthorized intrusions and minimizing the risk of compromising system security.

Antivirus Programs: Antivirus programs are tools designed to detect, prevent, and eliminate malicious software such as viruses, malware, ransomware, and spyware. These programs scan files and applications for known threat patterns and signatures. Some antivirus programs also employ heuristic detection techniques to identify suspicious and unknown behaviors. Installing updated antivirus software on our devices and conducting regular scans are crucial for effective protection. Antivirus programs may offer additional features, including real-time protection, detection of malicious websites, and blocking potentially dangerous downloads.

Popular antivirus programs include:

  • Norton Antivirus: Recognized security suite offering advanced antivirus protection, malware defense, firewalls, and additional online security features. Norton provides comprehensive protection against various threats with different subscription plans to suit individual needs.

  • McAfee Antivirus: Another popular and reliable choice in digital security, offering robust antivirus protection, malware detection, firewalls, and additional security tools. McAfee Antivirus is available in various versions and packages tailored to specific user requirements.

  • Avast Antivirus: Widely used free antivirus solution providing essential protection against viruses, malware, ransomware, and real-time online security features. Avast also offers premium versions with additional functionalities.

  • AVG Antivirus: AVG is a popular option available in both free and paid versions. The free version offers basic protection, malware detection, and real-time protection. It includes features such as link and file analysis and protection against phishing attacks.

  • Avira Antivirus: Another reliable antivirus product providing real-time protection against viruses, malware, ransomware, and other threats. Avira Antivirus includes additional tools such as a secure browser and a password manager. It offers a free version with essential features and upgrade options to premium versions.

Understanding and properly utilizing these cybersecurity mechanisms strengthen our device protection, reducing the risk of falling victim to cyber attacks. It's essential to note that firewalls and antivirus programs are just part of a comprehensive security approach, and as seen earlier, complementing them with other protective measures, like keeping software updated, using strong passwords, regular backups, and staying vigilant against potential threats and suspicious online practices, is recommended.


User Access Configuration (Privileges) to Ensure Integrity, Availability, and Confidentiality

Proper user access configuration to networks or applications and the adequate management of privileges are fundamental elements to ensure the security and protection of devices and digital content. By establishing user privileges appropriately, we can prevent unauthorized access, safeguard data integrity, ensure resource availability, and maintain information confidentiality. Below, we will outline an example of how user access could be configured in Microsoft 365 for an organization.


Elements

Configuration

Roles and groups

Creating Custom Roles Based on User Responsibilities.

For example, "Basic User," "Project Manager," "IT Administrator," etc.

Assign specific permissions to each role, limiting what users can do.

For example, the "Basic User" might have access to email and documents, while the "IT Administrator" would have access to advanced settings.


Security Groups

Creating Security Groups to Categorize Users with Similar Needs.

For example, "Sales Department," "Development Team," etc.

Assign roles and permissions to these groups instead of individual users. This simplifies access management as group members change over time.


Authentication System

Requiring Multifactor Authentication (MFA) for all users adds an additional layer of security to the login process.

Data Access Control

Using SharePoint and OneDrive to store and share documents, configuring folder and file permissions to control who can access which documents. 

Utilize confidentiality labels and access policies to classify and restrict access to sensitive data.


Exchange Online 

Configure retention policies to retain and delete emails according to regulations and internal policies. Set access permissions for shared mailboxes and folders.

Microsoft Teams

Create teams for specific project or department groups. Control who can create teams and channels, and assign roles such as owners and members..

Administration

Limit the number of global and service administrators. Only authorized IT users should have these roles. Use Azure AD role management to assign specific Microsoft 365 roles, such as Exchange Online administrator or SharePoint administrator.

Monitoring

Enable audit logging in Azure AD to track user activities and detect suspicious behaviors. Use Microsoft Cloud App Security to monitor and control the use of cloud applications. Enable audit logging in Azure AD to track user activities and detect suspicious behaviors. Use Microsoft Cloud App Security to monitor and control the use of cloud applications.

Compliance

Configure alerts and notifications for significant events, such as failed login attempts or changes in security settings. Maintain audit logs for the duration required by regulations.

Education and Conscience

Provide users with training on best security practices in Microsoft 365, such as phishing identification and handling of confidential information.


The proper implementation of these aspects contributes to maintaining the confidentiality of information, ensuring the availability of resources, and preserving the integrity of data in increasingly complex and connected digital environments. It is important to note that the specific configuration may vary according to the needs and regulations of our organization. It is also advisable to conduct tests in a development environment before implementing changes in a production environment.


Installation of the digital certificate and its characteristics

In the field of digital security, digital certificates play a crucial role in ensuring the authenticity, integrity, and confidentiality of online communications. A digital certificate is a digital file that contains information about the identity of an entity or individual and is issued and verified by a trusted Certification Authority (CA).

In Europe, electronic certificates are governed by the regulations of the European Union (EU) regarding digital identity and trusted services. The main regulation is the eIDAS Regulation (Regulation (EU) No 910/2014 on electronic identification and trusted services for electronic transactions in the internal market). Organizations that provide electronic certificates are Certification Authorities (CAs) and trusted service providers. These entities are responsible for issuing, revoking, and managing electronic certificates, ensuring the validity and reliability of users' digital identities.

There are several Certification Authorities (CA) recognized and widely used for the generation of digital certificates, issuing valid certificates at the European level. 

The most prominent CA is Digital Certification Agency (AC Camerfirma): AC Camerfirma is an international Certification Authority operating in Spain. It provides digital certificates for individuals, businesses, and public administrations, ensuring identity and authenticity in online communications and transactions.

In particular, public administrations are among the main institutions that require the use of digital certificates. These certificates are used to authenticate users in online procedures and communications with the administration, allowing them to also electronically sign documents and ensuring the security and confidentiality of transmitted data.

In addition to digital certificates, public administrations also provide other secure access methods, such as the use of electronic identifications (e.g., DNIe in Spain), access keys or passwords, and even, in recent months, authentication through facial recognition against their identification document. These methods allow citizens to authenticate themselves and access online services securely, providing additional protection for privacy and information integrity in interactions with the administration.

The installation of digital certificates involves following the specific procedures and requirements provided by the issuing entity of the certificate. Typically, it requires downloading and installing the certificate on the device used to access online services. This establishes a secure and reliable connection between the user and the entity that issued the certificate, ensuring the authenticity and confidentiality of communications.

6. Sharing Data, Privacy, Cookies

Data sharing can bring many benefits to users, but it also comes with its own set of problems. Two of the main issues are privacy and security.

Data Sharing Principles:

  • Everyone should be able to access the data they need.

  • There should be no barriers preventing people from getting that data.

  • Data should be organized and structured so that anyone can access, understand, and use it easily.

Privacy and Security Conflict:

  • Privacy involves giving people control over their personal information.

  • Security involves protecting it from unauthorized access.

Privacy and security standards are enforced through regulations such as the General Data Protection Regulation (GDPR) in Europe and the California Consumer Privacy Act (CCPA) in the United States.

Key Strategies: Managing privacy and security risks can be achieved by implementing some key strategies. To protect personal information, it is important to invest in proper documentation and establish clear agreements for data sharing. Additionally, implementing access controls and adhering to data minimization practices can help mitigate security risks and ensure the security of confidential information.

A. Privacy When sharing our personally identifiable information, it is natural to want to keep it private. Privacy involves having control over what information is shared, with whom, and why.

Purpose Limitation:

  • Process personal information for specific, explicit, and legitimate purposes.

  • Communicate these purposes to the data subject before collecting the data.

Data Sharing Agreements: The solution is data sharing agreements in which personally identifiable information is identified and marked as such in the database. The purpose for which it was collected and the specific use to be made of it must then be specified.

Context Enrichment: Enriching each field of the identification data with the appropriate context ensures that everyone is aware of its purpose. This way, various teams accessing the data can legally use it according to the purpose limitation principle.

B. Security Security refers to measures implemented to protect personal information. Data needs protection against unauthorized access, use, disclosure, disruption, modification, or destruction. One of the most important security rules of the GDPR is the principle of integrity, which states that personal data must be protected against unauthorized access, alteration, or destruction.

Access Control and Data Minimization: The more people have access to the data, the more opportunities there will be for unauthorized persons to access it. The solution is access control and data minimization, meaning that when it comes to sharing data, we strive to strike the right balance between access and security.

Access Controls: Access controls involve ensuring that only the right people have access to the data. This can include elements such as setting up user roles with different levels of access, using authentication methods like passwords, and monitoring who accesses the data and when.

Data Minimization: Data minimization is about keeping the amount of shared data to a minimum. By sharing only the essential data, you can minimize the amount of information circulating.


Understanding Cookies and Their Impact on Data Exchange

Everyone has seen website banners asking if they allow or deny cookies in their browser. But what does this mean exactly, and what are these cookies? Cookies are essential for the modern Internet experience, being a necessary part of web navigation and helping web developers provide a more personalized and convenient website visit.



In summary, cookies allow websites to remember your logins, shopping carts, and more. However, they can also be a treasure trove of private information and a serious vulnerability to your privacy, as they are text files with small pieces of data, such as a username and password, used to identify your device when you browse the Internet. Specific cookies are used to identify specific users and enhance the web browsing experience.

Due to the European Union's General Data Protection Regulation (GDPR), many websites must now request permission to use certain cookies with your browser and provide information on how those cookies will be used.

The data stored in a cookie is created by the server when connected. This data is tagged with a unique identification for you and your device. When the cookie is exchanged between your device and the network server, the server reads the identification and knows what information to provide specifically for each session.

A "session" is the term used to define the amount of time you spend on a site. During this time, the web server sends a brief stream of identification information to your web browser in the form of cookies. The web browser stores them locally to remember the data that identifies you. Thus, when you return to the website, the web browser returns the cookie data to the website's server, and the retrieval of your data generated and collected in previous sessions is triggered.

This optimizes the internet browsing experience. Without cookies, you would have to log in each time you leave a site or refill your shopping cart if you accidentally close the page.

To be more concise, cookies are intended to be used for:

  • Session Management: For example, cookies allow websites to recognize users and remember their individual login information and preferences, such as sports.

  • Personalization: Personalized advertising is the primary way cookies are used to customize sessions. You may see certain elements or parts of a site, and cookies use this data to help create targeted ads that you may enjoy. They are also used for language preferences.

  • Tracking: Shopping sites use cookies to track items users viewed earlier, allowing sites to suggest other products they might like and keep items in shopping carts while they continue shopping elsewhere on the website. They also track and monitor performance analytics, such as how many times you visited a page or how much time you spent on a page.

While this is primarily for the user's benefit, web developers also gain a lot from this setup. Cookies are stored locally on your device to free up storage space on a website's servers. In turn, websites can customize content and, at the same time, save money on server maintenance and storage costs.

Types of Cookies and Their Impact on Data Exchange

There are different types of cookies:

  • Session Cookies: Used only while browsing a website, stored in random access memory, and never written to the hard drive. Session cookies are automatically deleted when the session ends, and they help the "back" button function in your browser.

  • Persistent Cookies: These remain on a computer indefinitely, though many include an expiration date and are automatically deleted when that date is reached. Persistent cookies serve two main purposes:

    • Authentication: These cookies track whether a user has logged in and with what username. They also optimize login information so that users don't have to remember site passwords.

    • Tracking: These cookies track multiple visits to the same site over time. Online merchants, for example, use cookies to track visits by specific users, including pages and products viewed. The information obtained allows suggesting other items that might interest visitors, creating a profile based on a user's browsing history on that site.

Moreover, internet cookies can be further categorized into two types: first-party and third-party.

  • First-Party Cookies: Created directly by the website you are using. They are generally more secure, as long as you navigate reputable sites that have not been compromised by a data leak or recent cyberattack.

  • Third-Party Cookies: More concerning, generated by websites different from the pages users are currently browsing, usually because they are linked to ads on that page. Third-party cookies allow advertisers or analytics companies to track an individual's web browsing history across any site containing their ads. Allowing third-party cookies to access your browser is now optional in many countries due to new data protection laws. Additionally, most browsers have started to eliminate them (Google has announced the end of third-party cookies in Chrome by 2024). Many websites still function well and remember preferences without using third-party cookies.

  • Zombie Cookies: A form of persistent third-party cookie that installs permanently on users' computers. They have the unique ability to reappear after being "deleted" from the device. They are also called "flash cookies" or "supercookies" and are extremely difficult to remove. Like other third-party cookies, web analytics companies can use zombie cookies to track the browsing histories of unique individuals. Websites can also use zombies to ban specific users. However, in some cases, hackers can manufacture these cookies and use them to infect systems with viruses and malware.

  • Essential Cookies: Now synonymous with the pop-up that asks for your cookie preferences when you visit a website for the first time. Essential cookies are first-party session cookies necessary to run the website or services you requested while browsing that site.

Some cookies may be optional when you enter a website; for example, you can limit which cookies end up on your computer or mobile device. Nowadays, this is commonly done when you visit a website, and you have the option to enable or disable third-party (or others) cookies. To allow cookies, follow these steps:

  1. Look for the cookie section, usually in Privacy Settings.

  2. Click the boxes to allow cookies. Sometimes the option says allow "local" data.

  3. If you don't want cookies, you can simply uncheck them.

Deleting cookies can help mitigate privacy breach risks. Deleting regular cookies is easy but might hinder navigation on certain websites. Without cookies, you may have to re-enter your data on every visit.

Regardless of how you manage cookies, it's best to stay vigilant and clean them regularly.


7. Copyright and Licenses

A license is a legal permission granted by the copyright holder to another party, allowing them to use the copyrighted material in specific ways. It is a contractual agreement that outlines the terms and conditions under which the licensee can use the copyrighted work.

When a license is granted, it provides the licensee with certain rights and restrictions, which may include the right to reproduce, distribute, display, perform, or modify the copyrighted material. The license can be non-exclusive (allowing licenses to be granted to multiple parties) or exclusive (limiting usage rights to a single licensee).

Licenses can be obtained for various types of intellectual property, including software, music, images, videos, and more. The terms of the license agreement determine the scope of authorized use and any limitations or obligations imposed on the licensee.

Copyright is a legal right granted to the creator or owner of an original work of authorship. It automatically protects various forms of creative expression, such as literary works, artistic works, music, films, software code, and more, against unauthorized use or reproduction.

Copyright grants the creator exclusive rights over their work, including the rights to reproduce, distribute, display, perform, and create derivative works based on the original. These rights generally exist from the moment the work is created and have a specific duration, depending on the jurisdiction.

Unlike a license, which grants permission to use copyrighted material, copyright itself is the legal framework that protects creators' rights and allows them to control and monetize their work. Copyright ensures that others cannot use, copy, or benefit from someone else's original creation without permission or outside the scope of fair use and other applicable exceptions.

In summary, a license is permission granted by the copyright holder to use their copyrighted material under specific terms and conditions, while copyright is the legal protection granted to creators, providing them with exclusive rights over their original works. Licenses enable authorized use of copyrighted material, while copyright establishes ownership and control of intellectual property.


7.1. Application of Copyright and Licenses to Data, Information, and Digital Content

As you have seen, licenses can be applied to copyrighted material to grant specific permissions to the licensee for the use of that material. In these cases, the copyright still remains the property of the creator, but the creator has chosen to allow others to use their work. Sometimes, licenses are acquired through purchase, and other times, the creator grants them for free.

Licenses can be applied to allow reuse, redistribution, creation of derivative works, and commercial use.

Creative Commons is the most widely used and accessible free licensing scheme, but there are others used by specific communities. Commercial entities that own the copyright of an article, such as a journal article, may also request licenses. These licenses generally establish limited use for users and are available for a fee.

Creative Commons licenses are applied by the copyright owner to their own works. These are the most widely used licenses globally and consist of four components organized into six configurations:

  • BY: Attribution required.

  • NC: Non-commercial use.

  • ND: No derivative works.

  • SA: Share alike - the license must be the same for any derivative work.

Components ND and SA cannot be combined, as SA only applies to derivative works.

The six licenses (excluding CC-0, which is equivalent to the Public Domain) are:

  1. CC-BY

  2. CC-BY-SA

  3. CC-BY-ND

  4. CC-BY-NC

  5. CC-BY-NC-SA

  6. CC-BY-NC-ND

The following table illustrates the permissions allowed by each license.

Interfaz de usuario gráfica, Diagrama, Aplicación

Descripción generada automáticamente

CreativeCommons.org

The Creative Commons website provides more information about licensing and has a useful license generator for your work. This link shows best practices for attributing content with a Creative Commons license.

Copyleft is a play on words with "copyright" and is a practice that grants users the right to freely distribute and modify the original work, but only on the condition that derivative works have the same rights license. It is similar to the SA stipulation of Creative Commons licenses.

Copyleft licenses grant everyone who possesses the work the same rights as the original author, including:

  • Freedom 0 – the freedom to use the work,

  • Freedom 1 – the freedom to study the work,

  • Freedom 2 – the freedom to copy and share the work with others,

  • Freedom 3 – the freedom to modify the work and the freedom to distribute modified and, therefore, derivative works.

For a work to be truly copyleft, the license must also ensure that the author of a derivative work can only distribute such work under the same license or an equivalent.


8. Principles of Online Marketing

Online or digital marketing promotes or sells goods and services through online channels and technological devices. Common cases include email newsletters, display ads, and retargeting ads, but there are many more.

The data collection capabilities and dynamic elements make digital marketing a significantly more efficient marketing option than traditional marketing. The most compelling element of digital marketing is leveraging data and using information to drive the marketing strategy, requiring constant maintenance and care, such as tracking metrics, monitoring performance, and adjusting the approach.

Four key points support the principles of digital marketing:

  1. Attract Your Target Audience

Product or service awareness is the first step in the consumer's buying process, also called the top of the sales funnel. So, what channels are you setting up to attract your audience and guide them to the next stage of the funnel?

Tactics for a successful digital marketing strategy include:

  • SEO optimization (organic traffic)

  • Pay-per-click advertising (paid traffic)

  • Leads

  • Email marketing

  • Social media marketing

  • Content marketing

  • Affiliate marketing

  • Website

  1. Engage Your Audience

This means you need to form a connection to take the customer from knowing who you are (brand awareness) to conversion (point of sale). Here is where leveraging multiple campaigns across various channels helps keep people interested and engaged.

Once you determine your target audience and develop a successful marketing campaign, it's about making small adjustments to improve your messages and stay relevant. Success is measured in click-through rates, leads, and sales figures. As long as your brand identity remains consistent, your audience won't feel a lack of harmony in any content. Proper messaging requires consistency to guide customers in the right direction.

  1. Convert Followers into Buyers

Engagement means nothing if you can't convert. Once you have the audience's attention, you must convert them into paying customers. Moving them through the funnel requires implementing split testing and analyzing user data at each step. At this point, you'll present different versions of the same variable, such as an individual page element or an entire webpage, to different visitor segments; the results will help you determine which is more effective. A/B testing is an excellent place to start this part of the funnel.

Don't forget to track everything considered a conversion to understand what causes consumers to drop out of the sales funnel. Review key metrics, such as cost per lead (CPL), click-through rates (CTR), and conversion rates, to see if you're meeting your goals. By doing this, you'll find current value and discover critical insights that will help you optimize your funnel.



  1. Retain Customers for Impactful Lifetime Value

To create a customer base that repeats purchases, you must employ any retention strategy that keeps your service value above your cost. Retaining current customers is crucial for sustainable growth, especially since acquiring new customers costs more than retaining the ones you already have. Determine what works and what doesn't. Make sure always to know customer feedback and use this information to improve what you offer and how you serve.

What is your unique selling proposition? How does your product or service differentiate you from your competitors? Why should customers buy from you? What makes you special? What unique benefit do you offer? Conduct thorough research on your audience and put yourself in their shoes to know what they want and need. Audience demographics are extremely useful for developing detailed buyer profiles. Don't forget to ask for feedback whenever and wherever you can. Don't overestimate your knowledge of customer wants and needs unless.

After laying a solid foundation and understanding your audience's needs, you must establish a clear relationship based on trust and mutual understanding. This relationship is a living entity, so you'll need to consciously nurture it for it to grow. Only then can you continue guiding people along the buyer's journey.

Principles of Consistent Marketing

Remember that it takes four minutes to build a relationship and only two seconds to destroy it. Inconsistency is the fastest way to reduce customer retention and loyalty. The more you break their trust, the harder it is to regain. To avoid inconsistencies, analyze your messages, voice, system, and brand identity. It all starts with great content. If your content doesn't add value to your customers, you've already started to lose them. That's why offering free, value-added content is crucial to begin building trust from the start of the relationship.

To achieve this long-term consistency, follow the "KISS" rule (Keep It Simple, Stupid), meaning that if you can express the same idea in half the words, do it. Being concise is important. Don't waste people's time by beating around the bush or being redundant. The briefer you are, the better—always, as long as you are clear and consistent with your message. This also applies to design, color, and format. If you have too many elements, they can distract the customer and create a barrier.

Working on simplicity doesn't mean sacrificing quality. You not only want to attract customers but also excite them. Raise your standards and keep them high to continue impressing your customers. For example, create various types of content (content mix) regarding text, images, and video. These different forms of content will keep interest for longer and increase engagement. It's not just necessary to produce high-quality content; it must also be exciting and relatable.

If content is king, then repetition is queen. Try new things, but if something works, repeat that same message in different ways and across various channels. Similarly, if something fails, start over.

Diversifying channels and types of production is a proven way to expand the network. Various segments of your target audience prefer consuming digital content in different ways. As such, repurposing content is an easy and cost-effective way to have a broader reach and generate the maximum return on investment in content production.





8.1. Understanding the Policies of Major ICT Companies Regarding Their Apps

App policies refer to the set of rules, guidelines, and terms that govern the use of a specific mobile or software application. These policies are typically provided by the application developer or publisher and are designed to ensure that users understand their rights and responsibilities when using the app. Some of the common app policies shared by all ICT (Information and Communication Technology) companies include:

  1. Privacy Policy: Describes how the app collects, uses, and protects user data. It explains what information is collected, how it is used, and with whom it may be shared. The app developer or publisher is responsible for creating and providing a privacy policy.

  2. Terms of Service (ToS) or End-User License Agreement (EULA): Describes the terms and conditions users must agree to when using the app. It often covers issues such as user behavior, intellectual property rights, and dispute resolution. The app developer or publisher typically provides the Terms of Service or the End-User License Agreement.

  3. Refund Policy: Describes the conditions under which users can request refunds for in-app purchases or app subscriptions. The refund policy is offered by the app developer or publisher and usually defines the refund policy.

  4. Content Guidelines: Specifies what type of content is allowed or prohibited in the app. This may include restrictions on hate speech, illegal content, or other objectionable material. Content guidelines are set by the app developer or publisher.

  5. Community Guidelines: Provide rules and expectations for user behavior and interactions within the community or social features of the app. They often address issues such as harassment, bullying, or spam. Community guidelines are established by the app developer or publisher.

  6. Security Policy: Describes the measures taken to protect user data and ensure the security of the app. It may include details about encryption, authentication, and procedures for responding to data breaches. The app developer or publisher is responsible for the security policy.

  7. Cookie Policy: Explains how the app uses cookies or similar tracking technologies to collect information about user browsing habits. The developer or publisher of the app typically provides a cookie policy.

It is important for app users to read and understand these policies before using the app, as they can have a significant impact on their rights and responsibilities. If users have concerns or questions about these policies, they can often contact the app developer or publisher for clarification or seek legal advice. Additionally, some regions and countries may have specific regulations requiring the implementation of certain policies for apps to be distributed and used legally.


8.2. Who Offers What? Understanding App Policies of Major ICT Companies

App policies from leading Information and Communication Technology (ICT) companies vary, but there are key guidelines commonly implemented by companies such as Apple, Google, Facebook (now Meta), and Amazon. These policies may change over time, so it's important to refer to the most up-to-date documentation on each company's website.




Apple:

  • App Store Review Guidelines: Apple has a rigorous review process for apps submitted to the App Store. They have guidelines covering various aspects, including content, functionality, security, and user experience.

  • In-App Purchases: Apple requires digital goods and services offered within apps, such as subscriptions and virtual items, to use their in-app purchase system, from which Apple takes a commission.

  • Privacy and Data Use: Apps on the App Store are expected to follow Apple's privacy policies and obtain user consent for data collection.

Google:

  • Google Play Store Policies: Google has policies governing the content, functionality, and design of apps available on the Google Play Store.

  • In-App Purchases: Google also mandates the use of its in-app billing system for digital goods and services. They take a percentage of revenue generated through in-app purchases.

  • Permissions: App developers must declare the permissions their apps need, and users are informed of these permissions before installation.

Facebook (Meta):

  • Facebook Platform Policies: Developers creating apps or integrations interacting with Facebook services must comply with a set of platform policies covering issues like data privacy, content restrictions, and user experience.

  • Advertising and Data Use: Advertisers on Facebook and Instagram must adhere to specific advertising policies, including guidelines for ad content, targeting, and user data handling.

Amazon:

  • Amazon Appstore Submission Guidelines: Amazon has its own app store for Android devices, and apps submitted to the store are reviewed based on guidelines that include rules regarding content, functionality, and advertising.

  • In-App Purchases: Amazon provides an in-app purchase system for digital content and services, taking a percentage of revenue generated through in-app purchases.

Violation of these policies can lead to the removal of apps from their respective stores and other punitive actions. Additionally, these policies are subject to change, so staying updated with the latest documentation is crucial for app developers and businesses utilizing these platforms.


8.3. Interconnection of ICT Platforms

The interconnection of Information and Communication Technology (ICT) platforms refers to the integration and communication between different technology systems and networks, enabling them to work together seamlessly. This interconnection is crucial for modern businesses and organizations as it allows for efficient exchange of data and services, enhancing productivity and enabling the creation of more complex and versatile solutions.


Here are some key aspects of ICT platform interconnection:

  1. API (Application Programming Interfaces): APIs provide a standardized way for different software systems to interact with each other. They allow developers to access the functionality of a platform or service and integrate it into their own applications or systems.

  2. Data Integration: Interconnecting ICT platforms often involves integrating data from various sources, such as databases, cloud services, and IoT devices. Data integration solutions help ensure that data is consistent and can be used across different platforms.

  3. Middleware: Middleware is software that acts as an intermediary layer between different applications and platforms, facilitating communication and data exchange. It helps bridge the gap between different technologies and protocols.

  4. Cloud Computing: Cloud services play a significant role in the interconnection of ICT platforms. They provide the infrastructure and tools for businesses to create and deploy applications that can easily communicate with other cloud-based services.

  5. Interoperability: Ensuring different ICT platforms can work together is crucial for interconnection. Standards and protocols such as HTTP, REST, SOAP, and others help achieve interoperability.

  6. Enterprise Service Bus (ESB): ESB is a software architecture that facilitates communication and integration between various services and applications within an organization. It helps manage the flow of data and messages between systems.

  7. Internet of Things (IoT): IoT devices generate a vast amount of data, and interconnecting these devices with other platforms is essential for real-time monitoring, control, and data analysis.

  8. Cybersecurity: As platforms interconnect, the need for robust cybersecurity measures becomes more critical. Protecting data and systems from potential threats and vulnerabilities is a key consideration in interconnection.

  9. Integration Platforms as a Service (iPaaS): iPaaS solutions provide pre-designed connectors and tools for integrating different platforms and applications, making it easier for organizations to connect various systems.

  10. Industry-Specific Solutions: Different industries may have unique requirements for ICT platform interconnection. For example, healthcare and finance have specific regulations and standards that must be followed when integrating platforms in these sectors.

  11. Microservices: The microservices architecture involves breaking down applications into small services that can be deployed independently. This approach facilitates the interconnection and scaling of different parts of an application or platform.

Interconnecting ICT platforms is a broad and evolving field, driven by technological advancements and the growing reliance on digital solutions. It enables organizations to optimize operations, improve customer experiences, and leverage data and services from a wide range of sources. However, it also comes with challenges, including security, data privacy, and the need for continuous maintenance and updates to ensure smooth integration.




9. Conclusion

As we delve into the digital era, the creation of high-quality digital content becomes increasingly crucial. With an abundance of information available online, it's more important than ever to have engaging and informative content that keeps people coming back for more.

You've learned that digital content can be defined as any type of electronically delivered content, including text, images, audio, or video. It can be disseminated on websites, social media platforms, or applications. Digital content is significant because it provides a way to reach the target audience and interact with them in ways traditional media cannot. In the vast landscape of the internet, ensuring that your content is of high quality is the easiest way to make it stand out and resonate with your audience.

When it comes to digital content, quality matters because the internet is a crowded space. Whether you're creating an infographic, writing a blog post, or recording a video, start with a clear message and purpose in mind.

Here are some key considerations for creating quality digital content:

  • Have a clear message and purpose when creating content.

  • Ensure your content is engaging and of high quality.

  • Identify your target audience and create content that appeals to them.

  • Utilize social media platforms and other online channels to share your content.

  • Experiment with different types of content, such as text, images, audio, or video.

  • Track audience feedback and use it to improve.

  • Share your content with others to increase its reach.


Reflexion

To achieve the goal of creating quality content, it is necessary to develop certain social skills beyond purely technical ones related to the way you work. These include how you interact with colleagues, how you solve problems, and how you manage your work.

On the other hand, it is evident that certain skills, such as technical knowledge or any other training acquired through life experiences, career, or personal education, need to be developed. These are generally the skill sets required for a job. In the context of content creation, skills may include editing, design, proposal writing, report writing, research ability, and more.

Most of these skills you may have learned or at least discovered in this course. However, regarding social skills, it is necessary to develop them in your day-to-day life. Content creators often possess creativity, analytical thinking, and communication skills that help them generate interest. This involves considering different career paths and interacting with other content creators to learn how they communicate and share information. This helps them establish a personal brand to connect with consumers and share their work.

As you continue to develop content creation skills and grow your audience, you can build a stable network of relationships to advance in your career. If you build a network of collaborators and followers, you can tailor your content to grow your brand, identify new professional opportunities, and demonstrate value to potential employers.

Furthermore, as you produce content and gain experience, you can specialize in aspects of content creation and seek meaningful opportunities. Experiment with new technologies and software to help keep your message up-to-date.


11. Resources

  1. Google Trends:

    • Google Trends is a tool that helps you track the popularity of different search terms over the years. It shows what is currently interesting to people and allows you to compare it with the popularity of similar search terms.

    • When you run out of ideas, checking Google Trends for topic ideas is an excellent way to overcome creative blocks.

  2. Pinterest Trends:

    • Pinterest Trends is a hidden gem that tracks the popularity of different terms on Pinterest, similar to its Google counterpart. It goes a step further by showing visually appealing trends compared to two months or even ten years ago.

    • It offers a visual guide on current trends in aesthetics and design, aiding in aligning your content with them.

  3. AnswerthePublic:

    • AnswerthePublic is a search listening tool that provides creators with insights into what their audiences are searching for. Simply input a keyword, and it gives you autocomplete data from major search engines like Google.

    • Helps discover what questions your audience is asking, facilitating content ideas by answering these questions in your videos and incorporating keywords into your titles.

  4. ChatGPT:

    • ChatGPT is an artificial intelligence tool that allows you to ask questions on any topic. The only limit is your imagination (and the fact that it has knowledge only up to 2023).

    • Unlike Google, ChatGPT provides selected information, offering a concise answer to your queries.

  5. Notion:

    • Notion is a productivity and project management tool that helps individuals and teams collaborate on various projects and tasks. It allows you to create simple or complex systems to manage your creative process.

    • Use Notion's customization options to create or find templates that suit your creative process.

  6. Buffer:

    • Buffer offers multiple features that can enhance your content creation process, especially stress-free scheduling for multiple social media platforms. It is one of the most affordable tools for scheduling content.

    • Buffer includes features like the home page for social media bios, Remix for efficient social media content reuse, Ideas to track spontaneous thoughts, Buffer AI for quick content creation, and Analytics for performance tracking.

  7. WordPress or Ghost:

    • WordPress or Ghost serve as content management systems that keep track of all the content you have published on the web. If blogging is one of your chosen content creation methods, a CMS is a necessary addition to your toolkit.

  8. Substack and Beehiiv:

    • Substack and Beehiiv are tools that allow you to create newsletters and share them with an email list. Both tools offer extensive resources as your audience grows.

    • Newsletters are an excellent way to reach your audience's inboxes and implement subscriptions or announcements at your convenience.

  9. Otter.ai:

    • Otter.ai is a tool that records meetings, takes notes, and generates a summary that you can share. You can integrate it with Zoom or Teams, eliminating the need for physical note-taking.

    • Ideal for creators conducting many interviews and needing content transcription into written formats.

  10. Copy.ai and Lex:

    • Both Copy.ai and Lex can convert your queries into the format you need. You can ask any question to generate content, adapting to your specific needs.

    • For individuals needing to write extensively but lack the time or skills, AI-powered tools could be an excellent option.

  11. Canva:

    • Canva is a graphic design tool available on the web, desktop, or mobile devices. It offers extensive options to create visual, video, and even written content for any of your content platforms.

  12. DALL-E:

    • DALL-E is an artificial intelligence tool that generates images based on text prompts. It's excellent for quickly creating copyright-free images for content creation, especially if you have limited design skills.

  13. Anchor:

    • Anchor is a Spotify tool that allows you to create, edit, upload, distribute, and monetize your podcast. It can be set up with a dedicated podcast website and also supports video podcasts. Available on desktop and mobile devices.

    • A great starting tool for anyone wanting to create a podcast without the need for more complex tools.



  1. Audacity, GarageBand, Descript, InShot:

    • Audacity: Free audio recording and editing tool for more in-depth podcast editing.

    • GarageBand: Ideal for Mac users, pre-installed on Apple devices, suitable for audio editing and original music creation.

    • Descript: Known for its diverse set of tools dedicated to audio content. Provides video editing features as well.

    • InShot: A video editing app available on iOS and Android, effective for editing content for Instagram, TikTok, or YouTube Shorts quickly and efficiently.

  2. Loom, CapCut, Discord, Mighty Networks:

    • Loom: A screen recording tool for clear and concise screen captures, available on desktop, iOS, and Android.

    • CapCut: Video editing tool, especially for TikTok videos, available on the web, desktop, and mobile devices.

    • Discord: Communication tool allowing text, voice, and video chats. Ideal for building a specialized community for your audience.

    • Mighty Networks: Community creation tool with features for launching courses and membership programs. Suitable for those with a large audience aiming to offer paid memberships and courses.

12. Bibliography.

• Ayala P., Teresa (2014). Redes sociales, poder y participación ciudadana. Revista Austral de Ciencias Sociales, (26),23-48. Disponible en: https://www.redalyc.org/articulo.oa?id=45931862002 ; [15/01/2022].

• Freire, F. C. (2008). Las redes sociales trastocan los modelos de los medios de comunicación tradicionales. Revista Latina de comunicación social, 11(63).

• García-Galera, M., del-Hoyo-Hurtado, M., & Fernández-Muñoz, C. (2014). Engaged youth in Internet. The role of social networks in social active participation. [Jóvenes comprometidos en la Red: El papel de las redes sociales en la participación social activa]. Comunicar, 43, 35-43. https://doi.org/10.3916/C43-2014-03. ;

• Hütt Herrera, Harold (2012). LAS REDES SOCIALES: UNA NUEVA HERRAMIENTA DE DIFUSIÓN. Reflexiones, 91(2),121-128. Recuperado de: https://www.redalyc.org/articulo.oa?id=72923962008 [15/01/2022].

• Innovación y competitividad. (20 de febrero 2019). Como crear tu plan de gestión de redes sociales en ocho pasos. Cámara de comercio de España. Recuperado de: https://www.camara.es/innovacion-y-competitividad/8-pasos-estrategia-redes-sociales [15/01/2022].

• Ramirez. P (21 de diciembre 2014) Comunicación y redes sociales. El país de España. Recuperado de:  https://elpais.com/elpais/2014/12/19/eps/1419013223_225275.html. [15/01/2022].

• Ureña. A, Ferrari.A, Blanco. D, Valdecasa. E (2011). Estudio sobre el conocimiento y uso de las Redes Sociales en España. Observatorio nacional de las telecomunicaciones y de la SI. Recuperado de: https://www.ontsi.es/es/publicaciones/Estudio-sobre-el-conocimiento-y-uso-de-las-Redes-Sociales-en-Espana [15/01/2022].