5.1. Synchronous and Asynchronous Communication (How to Achieve Both)

By "synchrony," we understand the coincidence in time of two or more events. If this concept is applied to communication between people, we get the definition of synchronous communication: real-time communication.

Synchronous Communication: Synchronous communication refers to moments when a dialogue or conversation takes place between two or more people in real-time. In this dialogue, individuals share discourse, information, and time spent in communication, also overcoming the spatial factor.

Difference between Synchronous and Asynchronous Communication: Within digital communication, there are two aspects: synchronous and asynchronous communication. Let's look at their differences:

  • Synchronous: Synchronous communication is that in which the exchange of information over the internet, whether through computers, phones, or other electronic elements, occurs in real-time. For example, a video conference.

  • Asynchronous: Asynchronous communication is that whose exchange of information does not depend on time coincidence. For example, through email.

Characteristics of Synchronous Communication:

  • Simultaneity: The main characteristic of synchronous communication is that it occurs in real-time: the sender and receiver are in front of their devices at the same time exchanging information.

  • Time: In synchronous communication, especially in written form, recording time is important to know which message precedes another and avoid confusion in the exchange of information.

  • Flexibility: It allows modifying opinions and plans in real-time through debate and the exchange of simultaneous ideas. This communication favors argumentation and clarifications.

  • Speed: In synchronous communication, information is shared instantly, whether it is happening through audiovisual means or through written texts, such as in chats.

Types:

  • User-to-User Synchronous Communication: Personalized communications between a single sender and receiver in real-time using various applications like WhatsApp, Telegram, Messenger, Lime, Instagram, or Twitter.

  • Synchronous Communication Among Multiple Users: All electronic or virtual conversations and meetings involving numerous participants, such as chats, video conferences, workshops, online courses, and classes, using applications like Zoom or Skype, among others.

  • Audiovisual Synchronous Communication: This is where the sender and receiver can see and talk to each other in real-time. Currently, multiple platforms and applications feature this mode of communication.

  • Written Synchronous Communication: It was the first computer-based synchronous communication put into practice and was carried out through chats existing in forums on various websites. It continues to be used in academic forums or on platforms like WhatsApp, Teams, or Telegram.

In this regard, synchronous communication represents a true contribution to digital transformation: the ability to communicate quickly and ubiquitously, either individually or collectively.

To carry out a synchronous communication process in virtual environments, a series of tools are required to enable real-time communication. The participants must, in addition to having the necessary tools and technological support, be connected at the same moment, regardless of the distance that separates them.

For this purpose, we highlight two means through which synchronous communication can take place. These are chat and video calls or video conferences.


Gráfica de elaboración propia

• Chat: Derived from the English word of the same name, which means "conversation," it refers to a new method of communication that has emerged with technological advances, allowing an individual to converse simultaneously with others over the network. There are different types of chat applications, such as Telegram, Facebook, WhatsApp, among others. A professional chat can be a channel that facilitates communication within processes. It is important not to lose intentionality within them and to maintain order for their intended use.

Video Communication: A video call is a form of video conferencing that involves two users who can see and hear each other simultaneously. During a video call, users can share files and other multimedia content. Various resources exist for conducting video conferences, such as Skype, Zoom, Google Hangouts, Microsoft Teams, WhatsApp, and Google Meet. In the professional realm, the use of video conferences has become significant because, through this tool, participants can be convened regardless of their location, fostering closer attention.

Due to the 2020 coronavirus pandemic, the use of synchronous applications and media such as Zoom, Skype, or WhatsApp, among others, saw an extraordinary increase.

Synchronous Tools: In the following outline, we present the most commonly used tools or applications for synchronous communication:

  1. Microsoft Teams:

    • A unified communication and collaboration platform combining workplace chat, video meetings, file storage (including collaborative file editing), and application integration.

  2. Skype:

    • An application or program for communication via calls, video conferences, and instant messaging, installable on computers and mobile phones.

  3. Slack:

    • Designed for teams and workplaces, usable across multiple devices and platforms, with robust features for one-on-one and group chats, file sharing, integration with other applications and services.

  4. Zoom:

    • A cloud-based video conferencing service for virtual meetings via video, audio, or both. It allows simultaneous chat with participants and recording sessions for later viewing.

  5. WhatsApp:

    • A chat application for smartphones, allowing users to send text and multimedia messages, audios, and conduct video calls.

  6. Facebook Messenger:

    • A chat and instant messaging application for users of the Facebook social network.

  7. Google Hangouts:

    • A free instant messaging application with a focus on phone calls and video conferencing.

  8. Telegram:

    • An application offering numerous options in chats, file transfers between mobile and PC, acting as an audio player, aiding in photo compression, creating GIFs, and even facilitating the creation of a minimalist blog.

  9. Google Meet:

    • Google's platform for video calls, enabling virtual meetings or open online presentations, as it is a free tool.


Video conferences basic concepts.

A video conference is an interactive system that enables multiple users to engage in a virtual conversation through the real-time transmission of video, audio, and text over the Internet.

Video conferencing allows multiple users to engage in a virtual conversation by transmitting video, audio, and text in real-time over the Internet. This facilitates communication and collaboration, avoiding the expenses and time loss associated with physical travel.

Types of Video Conferences: Video conferences vary based on technology and were previously limited with variable results, including issues like loss of video or audio signals and reception delays. They can be identified based on:

  • Type of Equipment:

    • PC Systems: Individual access to the video conference.

    • Desktop Systems: Access from a regular meeting room using desktop devices.

    • Room Systems: Specially equipped rooms for video conferences with integrated microphones, monitors, and cameras.

  • Connection Method:

    • Point-to-point, if there are only two connecting points.

    • Multipoint, if several points connect simultaneously.

    • Over the Internet, configuring connection points on participants' devices.

  • Type of Participation / Broadcasting:

    • One-to-one: A call between two participants.

    • One-to-many: With a presenter who controls the presentation and decides whether to invite other participants.

    • Many-to-many: All participants can engage in conversation, chat, or share information. In this case, a moderator is often advisable.

Introduction to the ZOOM Tool:

When people hear about Zoom, they probably think of video conferences, but Zoom has many other features, including:

Web and App Access: Zoom can be accessed through the Internet, desktop computer applications, and mobile device apps. To conduct video conferences, a camera is needed, typically integrated into mobile phones or computers.

Basic Features: In addition to video conferencing, Zoom includes other useful tools for online meetings:

  • Chat.

  • Screen sharing.

  • Collaborative work.

  • Recording sessions.

Security: Communications are encrypted and protected. Although there were some security issues initially, the tool has been improved, and now communications are considered secure. Access management systems include passwords, personal invitations, and participant lists to prevent unwanted participants.

How to Get Started with Zoom:

If invited to a Zoom meeting, you can access it directly. However, by registering for the free version, you can also conduct your own meetings and download the app for better performance.

To begin with Zoom, the first step is to sign up by providing the required information. Zoom offers both a paid and a free version.

Simply provide your email and confirm your registration. Zoom will send an email to the registered address for activation.

The next step is to fill out the form and confirm your password following the program's suggestions for security.

Once registered, you can invite your contacts to open their own accounts.

Configure your account and schedule your first meeting, specifying the date, time, and duration.

Zoom generates an access code sent to participants for meeting entry.

You can customize meeting options and add it to your Google Calendar to keep your schedule updated with Zoom events.

Joining a Meeting:

If invited to a meeting, you will receive a link taking you directly to the meeting or to a page to enter the ID provided with the invitation and the password if required.

Main Features of Zoom:

When participating in a Zoom meeting, it is an active process with a series of options accessed from a menu that allows the following:

  1. Microphone:

    • Enables toggling the microphone on and off. It is recommended to mute it when not speaking to avoid additional noise and improve the clarity of the person speaking.

  2. Video:

    • Enables toggling the video on and off. When crossed out, it indicates that the camera is deactivated.

  3. Security:

    • Allows activating security options that can be configured in a waiting room. Participants cannot enter the room directly; they must wait for the host to grant access.

  4. Participants:

    • This option provides information about the number of participants. Additionally, it can be activated to display participants on the side of the screen.

  5. Chat:

    • Zoom has a chat feature that can be used during the meeting to communicate with participants, e.g., saying goodbye if you need to leave before the meeting ends without interrupting. When activated, a chat window opens with one or all participants. It also allows file sharing.

  6. Screen Sharing:

    • This option is usually available to the host who initiates the meeting. It may also allow other participants to share their screens.

  7. Record:

    • The host can record the meeting for later review. When recording starts, a notice appears for participants to decide whether to participate or turn off their cameras.

  8. Reactions:

    • This feature allows all participants to raise their hands to request to speak or express their opinions using emojis.

  9. End/Leave:

    • The final option allows the host to end the meeting, or participants to leave. If the host ends the meeting, it concludes for all participants.

Planning a Meeting:

Planning a meeting is simple. You can do it in advance or on the go, inviting attendees directly at the moment. To do this, follow these simple steps:

Step 1 

Select the option "Schedule a Meeting" 

Here, you can give a title to the meeting and provide a description. To start, set the date and time. If you have a free version, meetings can last up to 40 minutes.

Step 2 

Define the Meeting's Characteristics You can set a frequency if you want the meeting to be recurring, for example, once a week. Options include viewing the meeting security code, enabling or disabling the "waiting room," and entering the meeting with audio and video activated or deactivated.

Modify a Meeting:

Once a meeting is created, you can edit and adjust it again. In this case, we have modified the frequency of the meetings.


Invitations to a Meeting:

Once a meeting is created, you can invite attendees. After completing the meeting scheduling, you will obtain an invitation. This can be sent via email, WhatsApp through Zoom itself, or from the calendar application you are using.

Audio Description: Zoom website. "Meetings" section, showing an event called "My Meeting."

Once a meeting is created, the next step is to invite attendees.

Audio Description: By clicking on "My Meeting," you access its configuration menu.

Select the meeting and click on "Copy Invitation to the Meeting."

After clicking, a card opens with details of the meeting. Click on the lower "Copy Invitation to the Meeting" button, which selects all the information on the card. The Gmail mailbox appears. At the bottom left of the screen, the "New Message" box is open.

Copy the invitation and paste it into the body of the email message you are sending to the person you want to invite.

Audio Description: The invitation information is pasted over the message body, and the "Send" button is clicked.

If you prefer, you can also paste and send it in a WhatsApp message.

Audio Description: "WhatsApp Web" is opened, and the "New Message" icon is clicked at the top left of the screen. Below it, a list of contacts appears, and one of them is selected. The messaging window opens, the writing bar is clicked, and the "My Meeting" invitation is pasted. Finally, the button allowing the message to be sent is clicked.

Recommendations for Achieving Engagement:

Before Starting:

When convening the video conference, inform attendees of its objective. Therefore, it is interesting to take the following actions:

  • Place the topic or purpose of the meeting in the subject.

  • In addition to the meeting link, duration, and time, inform who the speaker or person leading the meeting will be.

  • List the points to be discussed and emphasize that time will be allocated for participation. Thus, each participant, informed of the topic in advance, will have had the opportunity to think about it and make valuable contributions.

The First to Arrive:

The organizer should be the first to arrive. Ideally, open the meeting 15 minutes before the scheduled start time. Consider that various unforeseen events can occur (surprise operating system updates, for example).

The Welcome:

As the host, the organizer of the video conference will welcome all participants.

Some recommendations for organizing a video conference are:

  • Turn on the camera so you can be seen.

  • Personalize the welcome for each person entering the meeting.

  • Introduce yourself. Give a brief description of your professional experience.

  • Share a question or image on the screen that invites reflection so that attendees can think about the topic while the meeting begins.

  • Invite attendees to introduce themselves.

  • Check if there is life on the other side.

Becky Pluth, author of the book "Webinars with Wow Factor," states that an online meeting attendee remains attentive for an average of four minutes. 

Therefore, it is necessary to ask an open question every four minutes to generate discussion.

Get Them Involved:

Present challenges, questions; generate debate; propose rounds of questions. In summary, get them involved.

Master the Application:

It is necessary to master the tool before the event. You must enter and test it to understand its operation well and try to avoid technical hiccups that may seem unprofessional.

There are some basic actions that you need to know how to do and know perfectly:

  • Mute all participants.

  • Share the screen.

  • Pass control to another participant.

  • Identify participants who are not connected (check those not visible in the online window).

  • Use the chat tool.

  • Record the session.

  • Use the whiteboard.

Configure Attendee Permissions:

All users of a Zoom account have a role assigned automatically, either owner, administrator, or member. Users can play different roles during a meeting: host, co-host, alternative host, and participant. Each role will be assigned by the host for the different participants in the meeting. Role-based access control allows additional user functions to be added to an account.

Roles Definition in a Zoom Meeting:

Host:

  • The user who schedules the meeting.

  • Has all the permissions to manage it.

  • A meeting can only have one host.

Co-Host:

  • Shares most of the host's controls, allowing them to focus on the administrative aspects of the meeting.

  • The co-host role is assigned by the host during the meeting.

  • Cannot initiate the meeting.

  • If a host needs another user to start the meeting, they must assign the alternative host role to another user.

Alternative Host:

  • Has the same permissions as the co-host but can also initiate the meeting.

  • The host can assign alternative hosts when scheduling the meeting.

Participants:

  • Have no administrative privileges.

  • Depending on the permissions granted by the host, participants may have more or fewer participation options.

  • The co-host cannot start a meeting scheduled by the host or be assigned before the event. The host must grant co-host status to a participant. The host can also assign the alternative host role to another user.

How to Assign Roles to Users:

It's straightforward; just follow these steps:

  1. Log in to the Zoom web portal with an owner account or an account with role-editing permissions.

  2. Click on User Management > Users.

  3. Check the box to the left of each user to whom you want to assign a role.

  4. Click on Change Role. This displays the Change Role dialog.

  5. Select the role name to which you want to add users.

  6. Finally, click Save to return to the Users page.

Recording Options:

The option to record video calls is very useful, especially in work, educational, and informational contexts, especially when someone invited cannot attend a scheduled session. The host role can use the built-in functions of cloud and local recordings.

Recording a Local Session on the Computer:

Local recording saves the file directly to the computer's hard drive (provided there is enough space). This is an easy option that does not require the use of any cloud storage account. A host (or an attendee to whom the host has given permission to record) will see the Record button at the bottom of the screen.

 The steps are as follows:

Step 1: Ensure Local Recording is Enabled

Ensure that local recording is enabled. To do this, choose "Meeting Settings" (this option is only visible to the account administrator).

In a business account, the settings section may be named "Account Settings."


Step 2: Start a Zoom Meeting as the Host

Initiate a Zoom meeting as the host. Among the tools at the bottom of the screen, there should be a round icon labeled "Record." Select this icon to start recording.

A notification will appear in the upper-left corner of all participants' windows, indicating that the recording is in progress. The recording can be paused at any time.

Step 3: End of Meeting

When the meeting concludes, a notification will appear, suggesting to "convert the recording of the meeting." The recording will be automatically saved as an MP4 file and an M4A audio-only file on the computer, in a folder named "Zoom_0.mp4."

By default, all recordings will be placed in a Zoom folder located at the following file path on these devices:

  • PC: C:\Users\Username\Documents\Zoom

  • Mac: /Users/Username/Documents/Zoom


Other Video Conferencing Tools: Microsoft Teams

Not everything revolves around Zoom. While Zoom is one of the most commonly used tools for online presentations due to its numerous features, there are other options worth exploring. It's essential to be aware of alternatives that may better suit specific needs at any given moment.

Teams: More Than Just Group Meetings

Microsoft Teams is a collaborative work tool with various features, including chat, video calls, and file sharing.

Chat

Instant messaging platform that supports calls, video conferences, and screen sharing with other users. It keeps the team connected, organizing everything in one place on the platform. Adjusting group participants can enhance efficiency.

Teams enable conversations from anywhere, allowing voice message recording, responding to chats from a mobile phone, and more.

Calls

Teams allow users to make calls to anyone using the platform, facilitating real-time communication with colleagues.

Meetings

  • Video Conferencing: Teams support meetings in various situations, from individual calls to delivering sales pitches, and organizing learning sessions for teams, to general company-wide meetings.

  • Virtual Events: It enables the organization of interactive webinars with secure connections for up to 1,000 attendees and broadcasts for up to 10,000 attendees.

  • Audio Conferencing: Teams allow people to join meetings from anywhere using a global phone number or by contacting each other directly. All they need is a mobile device and Microsoft Teams.

Collaborative Work

  • Team Gatherings: Through the conference mode, team meetings become a more engaging experience. It allows focusing on facial expressions, body language, detecting non-verbal cues, and easily identifying the speaker.

  • Collaborative Work: Quick access to applications like Microsoft Word, Excel, and PowerPoint allows seamless real-time collaboration. It simplifies teamwork with shared documents, calendars, and files.

Teams: Key Features

Creating a Video Tutorial

Teams is a Microsoft tool for synchronized communication.

Audio Description: On the Windows desktop, icons of documents are visible, and the "Chat" section of the "Teams" app is opened.

You can chat, share files, call your contacts, and schedule meetings from your calendar.

Audio Description: The "My Desktop" window is opened, a file is selected, dragged to "Teams," and after pressing enter, the file is sent to the selected contact. Clicking the call icon opens a window displaying the contact's photo. The call is ended by clicking the "Exit" button in the upper right corner.

Simply select the day, indicate the meeting's subject, and set the time.

Audio Description: The Calendar screen appears, clicking on a time slot on September 15 opens a window to create a new event.

Add the members you want to invite.

Audio Description: At the top, the event name "Project Status Meeting" is entered. The time is modified, and an attendee is added in the "Add required attendees" bar.

Write a message in the invitation to provide more information or request something from the guests.

Audio Description: A message is written in the invitation, saying: "Could you bring the client documentation again? Thanks."

Once you send the invitation, it will be recorded in your Teams calendar.

Audio Description: The Teams calendar screen is revisited, showing the "Project Status Meeting" event that was just modified.

Skype

Skype Features

Instant Messaging (Chat)

  • Search for someone.

  • Add a contact.

  • View a contact card.

  • Create a group.

  • Send an instant message.

  • Add someone else to the conversation.

  • Add audio, video, and shared files to an instant messaging conversation.

  • Switch between conversations.

  • Search for a previous instant messaging conversation.

Calls (Audio and Video Conferences)

  • Set up the audio device.

  • Add audio to an instant messaging conversation.

  • Start an audio conference call with multiple people.

  • Invite more people to a call.

  • Answer a call.

  • Use audio call controls.

Virtual Meetings with Skype for Business

  • Schedule a Skype for Business meeting.

  • Set meeting options.

  • Join a Skype meeting.

  • Use controls and view in a Skype meeting.

  • Record and play a meeting.

  • Manage meeting participants.

  • Share the desktop or a program.

  • Give control to meeting participants.

  • Regain control from a participant.

  • Select who can download shared files.

  • Share a PowerPoint presentation.

  • Share a file or an image.

  • Share notes with OneNote.

  • Share a whiteboard.

To use Skype, follow three simple steps: create an account, download Skype, and log in. Before that, it's essential to verify that your computer has the necessary elements to make the most of the program.

Google Meet

If You Have a Google Account, You Have Google Meet

Google has made enterprise-level video conferencing available to everyone. Anyone with a Google account can create an online meeting with up to 100 participants and meet for 60 minutes per session.

  • Unlimited Number of Meetings

    • Allows meetings with whomever you want, as many times as necessary. There's no need to register to start using it.

    • You can invite up to 100 participants to a meeting. For security reasons, if the free version of Google Meet is used, invited individuals must sign in with a Google account to join the meeting.

    • Meetings cannot be recorded in the free version.

  • Instant Subtitles During Meetings

    • Meet allows adding real-time instant subtitles created with Google's speech recognition technology. To activate subtitles, click on the three dots on the Meet screen, and the option will open. This feature is currently available only in English.

  • Screen Sharing with Participants

    • You can show your entire screen or the window of an application to share presentations or collaborate on documents.

  • Preview of Image and Sound

    • After clicking on the meeting code or link, you can adjust the camera and microphone and check how the image appears and the sound is heard before entering. You can also see who has already joined.

  • Adjustable Layouts and Screen Settings

    • Meet automatically changes the layout of the video call window to display content and the most active participants.

    • To change the layout, click on the three dots in the lower corner of the Meet screen.

  • Controls for Meeting Hosts

    • Anyone can pin, mute, or remove participants. For privacy reasons, you cannot activate someone else's sound.

5.2. Sharing content with others through social media (Messenger, WhatsApp, Viber, Instagram, etc.)

Social media has emerged as a new way of communication, facilitated by digital platforms and smartphone applications that enable connection and interaction among individuals with common interests, activities, or relationships, even if they didn't know each other before connecting through the social network.

The establishment of social media platforms has been rapid, starting to gain a presence on the internet in the late '90s and continuously growing and adapting to the changing context since then.

Let's look at some key milestones in the creation of social media platforms:

1999

  • Messenger: A Microsoft instant messaging program created in 1999 and discontinued in 2005, replaced by Windows Live Messenger.

2002

  • LinkedIn: Launched in 2003, LinkedIn is a social network oriented towards business, connecting millions of companies and employees who share their resumes and professional information. In 2011, it became the first social network to go public. Microsoft acquired it in 2016, and it currently has over 750 million members.

2003

  • MySpace: Launched on August 1, 2003, MySpace was one of the most popular social networks in the early 2000s. Acquired by TIME in 2016, it transformed into a news and trends application.

2004

  • Facebook - Vimeo - Flickr:

    • Facebook: Founded by Mark Zuckerberg and launched on February 4, 2004, Facebook is a leading American online social media and social networking service. Despite losing users, its founder envisions it becoming the foundation of a new communication form called the "metaverse."

    • Vimeo: A video-based internet social network launched in November 2004 by InterActiveCorp (IAC). It provides ad-free video viewing services.

    • Flickr: A website for storing, sorting, searching, selling, and sharing photos or videos online. Flickr gained popularity for its tools that allow users to tag photos, explore, and comment on others' images.

2005

  • YouTube: An American video-sharing website created in February 2005 by three former PayPal employees. Google acquired it in October 2006.

2006

  • Twitter - Spotify:

    • Twitter: A U.S. microblogging service created by Jack Dorsey in March 2006 and launched in July of the same year. Twitter has gained global popularity, with over 300 million users generating 65 million tweets daily.

    • Spotify: A Swedish multimedia services company founded in 2006. It offers a streaming application for continuous music playback on the internet. Spotify has around 400 million users, with nearly half having paid accounts.

2009

  • WhatsApp: A messaging app for smartphones that allows users to send and receive messages, images, videos, audios, recordings, and more. It is the most used messaging app with 2 billion active accounts as of 2021.

2010

  • Pinterest and Instagram:

    • Pinterest: Launched in March 2010, Pinterest is a platform that allows users to create and manage thematic personal boards.

    • Instagram: Launched on October 6, 2010, Instagram is a U.S.-based application and social network owned by Facebook. It is widely used by young people to share photos and videos and follow influencers.

2013

  • Telegram: An instant messaging platform of Russian origin developed by the Durov brothers. Known for its higher privacy level, Telegram focuses on chat communication and the creation of user groups.

2016

  • TikTok: A Chinese-owned social media service for sharing videos. TikTok allows users to easily create, edit, and publish videos and share them with others. It has become a platform for trends, with a significant emphasis on influencers.

The social media is changing communication in 21st-century society, much like newspapers, radio, or television did before. The success of a social network is based on the level of usage, utility, and interaction that the community finds in it.

5.2.1 Características de las redes sociales

Rosa ha explorado varias redes sociales y ha notado que no todas son apropiadas para cubrir sus necesidades. Ha observado que algunas están dirigidas a un público específico, otras tienen un propósito profesional, mientras que algunas tienen un enfoque más comunicativo, informativo o de entretenimiento. Todo esto la hace reflexionar sobre cómo las redes sociales han adquirido dimensiones tan amplias y se han convertido en un medio globalizado donde millones de personas pueden interactuar.
Pero hay otros aspectos que pueden definir a las redes sociales. Haz clic en los indicadores para obtener más información.
Conectividad Es la posibilidad de contactar fácilmente con otras personas y crear vínculos a través de las redes sociales, que están abiertas a la participación de cualquier persona u organización.
Viralidad La viralidad es un término muy común en los entornos virtuales. Se refiere a la rápida propagación de un contenido a través de las redes.
Personalización Cada usuario tiene la libertad de personalizar y dar identidad propia a sus redes sociales según las funciones que estas posean. Además, su perfil puede configurarse según sus preferencias y condiciones de privacidad.
Interacción La interacción permite a las personas expresarse, establecer diálogos y mostrar sus preferencias. Esta dinámica es de interés para las empresas, ya que les permite conocer las opiniones e intereses de los públicos y generar mayor engagement, es decir, compromiso o implicación emocional con el público.
Temporalidad Los tiempos en la comunicación pueden variar desde las interacciones en tiempo real hasta las que se producen posteriormente en reacción a la publicación de un contenido. Las redes sociales permiten una interacción continua en el tiempo, motivada por los intereses particulares de sus participantes.
5.3. Funciones para compartir en diferentes redes sociales
Cuando nos conectamos al mundo digital, ya estamos participando de una forma de ciudadanía. Rosa ha notado que su participación en las redes hasta ahora solo se ha centrado en el reportaje visual que está realizando. Nunca ha participado para comunicarse con sus amistades ni para conocer a otras personas. La idea de conectarse para organizar un debate social o un encuentro simplemente por diversión no estaba en su imaginario.
En Internet, es posible encontrar diferentes tipos de participación ciudadana gracias a la comunicación digital. A continuación, presentamos los más importantes:
OCIO: Participación que cualquier persona con un dispositivo y acceso a Internet puede realizar. Su función principal es potenciar las relaciones personales entre sus miembros.
INTEGRACIÓN: Busca mejorar las relaciones entre personas a través de la compartición de información y la interacción.
INTERÉS PROFESIONAL: Busca principalmente promocionarse a nivel profesional, estar al día en su campo y especialidad, e incrementar su agenda de contactos profesionales. Quienes participan en esta categoría crean contenidos, ya sea en soporte escrito o audiovisual, que posteriormente distribuyen y comparten a través de las redes sociales con otras personas.
Reflexiona... Las redes sociales pueden ser utilizadas de manera empresarial, profesional o personal. Por ejemplo, Facebook cuenta con una utilidad que permite crear y acceder a ofertas de trabajo. La mayoría de las empresas, incluidas las multinacionales, tienen un perfil empresarial en esta red social.

Managing social media involves monitoring the activity on a profile with the goal of achieving specific objectives, such as attracting a broader audience, gaining more customers, or strengthening our presence on social networks.

Professional Management of Social Media

The professional aspect of social media involves the daily management of a set of actions aimed at promoting a digital identity to connect with and build loyalty among the audience. These actions range from choosing the social network where the profile will be created to analyzing the content posted on that social network and paying attention to the comments and interactions of the audience with the publication.

Posts on professional/work-related social media cannot be as spontaneous as on a personal network. When managing professional social media, it's essential to remember and respect these requirements:

  • Define Goals and Growth Strategies: Define your goals and growth strategies on each social network where you are present. Research what is being said about you and anticipate a response. If something displeases you, avoid responding impulsively and without careful thought. For example, Rosa might receive negative comments on her social media about the photographs of some houses she is posting, which could potentially harm her professional image. However, she has defined what to do in such cases and has decided to respond constructively, appreciating the comment to improve her work.

  • Create Content for Social Media: Create value-added content for each audience and for each social network. As you already know, it's necessary to create a schedule, knowing what you will post on social media at each moment. Rosa uses her work to write various articles about photography and real estate. She creates images and short videos to accompany her content.

  • Generate Conversation: Generate conversation with the audience, encouraging participation on different social media channels. The tone should be approachable, and the information should be clear. The key is to make others interested in what you do and say on social media. Therefore, the first rule is to know which content you can contribute that is most interesting and to respond to any questions that may arise correctly.

Supervision of Social Media

The supervision of social media, especially if they have a large audience and interactions, can become a very complex task that takes up several hours a day. As you have just seen, having a presence on a network involves not only creating messages, materials, and content but also paying attention to those who participate.

Therefore, it's necessary to consider some considerations that allow you to perform effective supervision without succumbing to provocations. Rosa has chosen the path of planning and active work and follows these recommendations.

Work on Social Media

Internal Work: It's essential to have some planning regarding what and how you want to communicate through social media. Whether it's a personal or professional profile, it's advisable to create a personal plan that considers task completion, attention to interactions, the type of content to be published, posting frequency, and the objectives you want to achieve with them.

Work on the Network: Supervising the response and interaction with the audience is a fundamental task. For this, you need to consider the work to be done, highlighting interaction between people, reviewing their responses, seeing how many times your posts are shared, examining your presence on other channels, observing the conversations that arise, and analyzing how all of this impacts business improvement.

Employees should know how to manage their own social media as part of their professional identity. What they convey in the digital environment can be planned and controlled, so it's good to take advantage of that opportunity. Remember that social media is a means, not an end in itself: consider what use you will give them, what purpose they serve, or can serve for you.

In companies, individuals professionally responsible for managing, building, informing, and moderating communities around a brand through social media are identified with the title of Community Manager (CM).

Community Manager Profile and Role

This role is primarily undertaken by professionals in social communication, journalism, marketing, and advertising, focusing on the web positioning of the brand. They develop digital communication strategies, leveraging the unique possibilities of each social media platform.

The Community Manager is the voice that conveys all the information the institution wants to share with its audience. They observe trends, generate positioning and dissemination campaign strategies, and establish guidelines for audience interaction.

Functions for Sharing on Different Social Media Platforms

Whenever Rosa thinks about the idea of a social network, sites and apps like Facebook, Twitter, LinkedIn, Snapchat, or Instagram come to mind. These platforms have the largest number of participants today, playing a crucial role in mobilization and opinion trends.

Later on, you'll explore the three most important social networks in virtual environments. They have had a significant impact on society, contributing to changes in interaction, communication, and even the organization of internet users.

Facebook

Currently boasting over 2.74 billion users worldwide, Facebook continues to conquer new markets due to its high information exchange and services for individuals and businesses. It allows building a follower base for sharing information through multimedia posts without character limits.

Did you know? Facebook's initial name was "The facebook," starting as a student directory. It facilitated finding classmates in the same university classes. Over time, it evolved into connecting friends and creating a network.

What can you do on Facebook? Facebook offers various features, including recommendations, content interaction through reactions, comments, and sharing, groups based on interests or events, event tracking, connecting with new contacts, job listings, games, online payments, and business pages. It serves as both an individual and professional social network.

Instagram

Instagram is an application for sharing photos and videos instantly, allowing users to apply various filters and frames. Originally, it emphasized the immediate publication of photos and videos, introducing features like Instagram Stories in 2016.

Did you know? Instagram Stories have become a global medium of expression due to their brevity and transience, enabling new forms of interaction and communication.

With over 1 billion users, Instagram is a platform for sharing images and videos, turning a mobile photo into a professional-looking image. It provides a simple process for posting content and sharing it across other social media platforms.

YouTube

Starting as a video-sharing website, YouTube has evolved into the second most visited site globally, serving as a social network. It allows users to upload and view videos, changing how audiovisual content is communicated.

YouTube is a cloud service where users can create an account and channel with a Gmail account. Videos can be public or private, organized with labels and playlists. It has gained popularity not only as a social network but also as a search engine for informational videos.

Creating videos for a YouTube channel requires minimal requirements, as modern smartphones support HD video. Free editing programs, like iMovie or Windows Video Editor, enable users to create polished content. YouTube's success lies in the effectiveness of audiovisual communication, which is faster and more viral than text-based content.

5.4. Conocer la configuración de privacidad de las distintas aplicaciones

Protecting Devices

The goal of this competence is to be aware of risks and threats in digital environments, safeguard devices and digital content, and consider reliability and privacy. In this section, we'll explore prevention strategies to avoid risks, protection measures against digital threats, and security practices to consider when using our digital devices. We'll also engage in a practical activity to apply specific security measures.

Prevention Strategies to Avoid Risks

In this section, we'll explore key strategies to prevent and avoid risks in digital environments, focusing on both general digital risks and those specific to devices. By understanding risks and taking preventive measures, we'll be better prepared to protect our devices and digital content.

Among the most common risks in digital environments, both general and device-specific, are:

  1. Malware: Malicious software designed to damage or infiltrate devices without user consent. It includes viruses, worms, trojans, ransomware, spyware, etc.

  2. Unauthorized Access: When someone gains access to a device, account, or network without permission, leading to information theft, data manipulation, or malicious actions on behalf of the legitimate user.

  3. Loss or Theft of Devices: Exposing information stored on mobile devices or laptops if proper security measures are not taken.

  4. Unsecured Connections: Unsecure network connections, like public Wi-Fi without encryption or websites without HTTPS, facilitating unauthorized access or information espionage.

  5. Weak or Predictable Passwords: Attacks such as brute force can discover passwords, especially effective against weak or predictable ones.

  6. Privacy Breach: Unauthorized collection, use, or disclosure of personal information through security breaches on websites, apps, or social networks.

  7. Security Breaches in Applications and Online Services: Breaches in apps and online services leading to exposure of personal and sensitive data.

  8. Hardware or Software Failures: Data loss due to hardware failures, human errors, malware attacks, or other unexpected events.

  9. System and Software Vulnerabilities: Known or unknown vulnerabilities that attackers exploit for unauthorized access to devices or sensitive data.

  10. Social Engineering: Manipulating and deceiving individuals to obtain confidential information, often using phishing techniques.

  11. Online Scams: Various online scams, including fake offers, lotteries, fraudulent donation requests, pyramid schemes, and sales of fake products, aiming to deceive users into revealing personal information or making unauthorized payments.

To protect against these risks, consider the following proactive measures:

  • Antimalware Methods: Detailed study in the next section.

  • Regular Backups: Back up important data regularly to external devices or cloud storage to ensure availability in case of device loss, theft, or damage.

  • Robust Access Configuration: Use strong and unique passwords for all online accounts, considering the use of a reliable password manager.

  • Two-Factor Authentication: Enable two-factor authentication whenever possible for an additional layer of security during login.

  • Secure Network Connection: Avoid unsecure network connections, opting for VPNs to encrypt communication and protect data.

  • Maintenance and Software Updates: Keep operating systems and applications updated to contain vulnerabilities. Configure devices and apps to update automatically or perform regular manual updates.

  • Safe Web Browsing Practices: Use updated web browsers, avoid clicking on suspicious links, and refrain from downloading attachments from untrusted sources. Employ browser security extensions or add-ons to block unwanted ads and protect against malicious websites.

  • Safe Email Usage: Be cautious with emails from unknown senders, avoid sharing personal information through unsecured emails, use end-to-end encryption for sensitive messages, and verify the authenticity of senders and URLs before interacting.

  • Education and Continuous Training: Stay informed about the latest cybersecurity threats and best practices.

  • Participate in online security courses, webinars, and workshops.

  • Share knowledge with family and friends to help them protect themselves.

  • Being Cautious When Clicking on Email Links

  • Not Responding to Emails from Third Parties Posing as Legitimate Entities:

  • Exercising Caution When Providing Personal Information Online:

  • Continued Education and Training.

  • Engaging in Courses, Webinars, and Workshops on Online Security:

  • Staying Informed About the Latest Trends in Cybersecurity:

  • Sharing Our Knowledge with Family and Friends to Help Them Protect Themselves

Protection Measures for Different Devices Against Digital Threats

In the digital realm, various threats can compromise device security and the integrity of digital content. In this section, we will focus on those caused by malware, a primary concern.

The term "malware" is a contraction of "malicious software" and can have multiple objectives, such as stealing personal information, remotely controlling devices, displaying unwanted ads, encrypting files for ransom, or spying on user activities. It infiltrates a device through downloads of infected files, visits to malicious websites, clicks on deceptive links or ads, or by exploiting vulnerabilities in the operating system or applications. It's a broad term encompassing different types of malicious programs.

Computer Viruses: Computer viruses are malicious programs that replicate and attach themselves to other legitimate files or programs. Their goal is to damage or destroy data and programs on the infected device. Example: The "Melissa" virus was an email virus that spread through infected attachments.

Worms: Worms are self-replicating programs that spread through computer networks, exploiting vulnerabilities in operating systems or applications. They can cause significant damage and slow down systems. Example: The "WannaCry" worm spread in 2017 through a Windows SMB protocol vulnerability, encrypting files and demanding a ransom.

Trojans: Trojans are programs disguised as legitimate software but contain malicious code. They can allow unauthorized access to the device, steal confidential information, or install other malicious programs. Example: The "Zeus" Trojan was malware that stole banking information by logging users' keystrokes.

Ransomware: Ransomware encrypts files on the device and demands a ransom for their release. It can spread through phishing emails, downloads of infected files, or by exploiting vulnerabilities. Example: The previously mentioned "WannaCry" ransomware affected thousands of systems worldwide.

Spyware: Spyware installs without the user's knowledge and collects personal information or monitors user activities. It can track passwords, browsing histories, emails, and other confidential information. Example: The "Keylogger" spyware records user keystrokes and sends the information to attackers.

Adware: Adware displays unwanted and annoying ads on infected devices. It often installs alongside other software and can impact device performance. Example: The "Superfish" adware was pre-installed on some Lenovo computers and displayed ads based on user browsing activity.

In the following sections, we will focus on cybersecurity mechanisms to protect the digital ecosystem and methods to provide robust access to this ecosystem.

Mecanismos de ciberseguridad para la protección del sistema mediante cortafuegos y antivirus 

In the digital ecosystem, our devices and networks are interconnected, facilitating data transfer and access to various online services and resources. To ensure the security of this ecosystem, understanding its key components is crucial:

Devices: Devices are fundamental components of the digital ecosystem, including computers, smartphones, tablets, and IoT (Internet of Things) devices. These devices store and process personal information, connecting to the network for online services. Given that devices may contain sensitive data, it is essential to protect them from potential cyber threats and attacks.

Networks: Networks serve as infrastructures enabling communication and data exchange between devices. These can be wired networks (e.g., Ethernet) or wireless networks (e.g., Wi-Fi and Bluetooth). Networks may also be connected to the Internet, expanding possibilities for interconnection and online service access. However, this connectivity also increases the risk of exposure to threats and attacks. Therefore, protecting networks is crucial to prevent unauthorized intrusions and ensure the integrity and confidentiality of transmitted data.

Communication: Communication in the digital ecosystem involves data transfer between devices and across the network. This occurs through email exchanges, web browsing, messaging applications, file transfers, and other means. As data in transit can be intercepted and compromised, implementing security measures such as end-to-end encryption and authentication is necessary to protect privacy and communication integrity.

Digital Services: Digital services are integral to the digital ecosystem, encompassing activities like cloud storage, e-commerce, social networks, and online banking. These services often involve the exchange of personal and financial data, making them attractive targets for cybercriminals. Hence, mechanisms such as secure authentication, data encryption, and security practices by online service providers are fundamental for protection.

Recognizing these components in the digital ecosystem highlights the need to implement protection mechanisms for both devices and networks. The constant interconnection and communication among these elements expose them to potential threats, emphasizing the importance of appropriate security measures to safeguard data and online services' integrity, confidentiality, and availability.

Cybersecurity Mechanisms: Firewalls and Antivirus Programs

In the realm of cybersecurity, various mechanisms contribute to fortifying the security of our systems. Two crucial elements in preventing and detecting cyber threats are firewalls and antivirus programs.

Firewalls: Firewalls are essential security measures to protect systems against external attacks. They act as a barrier between our network and the outside world, filtering unauthorized network traffic. Firewalls can be hardware or software and examine incoming and outgoing traffic, blocking or allowing access based on established security rules. Properly configuring a firewall is fundamental to preventing unauthorized intrusions and minimizing the risk of compromising system security.

Antivirus Programs: Antivirus programs are tools designed to detect, prevent, and eliminate malicious software such as viruses, malware, ransomware, and spyware. These programs scan files and applications for known threat patterns and signatures. Some antivirus programs also employ heuristic detection techniques to identify suspicious and unknown behaviors. Installing updated antivirus software on our devices and conducting regular scans are crucial for effective protection. Antivirus programs may offer additional features, including real-time protection, detection of malicious websites, and blocking potentially dangerous downloads.

Popular antivirus programs include:

  • Norton Antivirus: Recognized security suite offering advanced antivirus protection, malware defense, firewalls, and additional online security features. Norton provides comprehensive protection against various threats with different subscription plans to suit individual needs.

  • McAfee Antivirus: Another popular and reliable choice in digital security, offering robust antivirus protection, malware detection, firewalls, and additional security tools. McAfee Antivirus is available in various versions and packages tailored to specific user requirements.

  • Avast Antivirus: Widely used free antivirus solution providing essential protection against viruses, malware, ransomware, and real-time online security features. Avast also offers premium versions with additional functionalities.

  • AVG Antivirus: AVG is a popular option available in both free and paid versions. The free version offers basic protection, malware detection, and real-time protection. It includes features such as link and file analysis and protection against phishing attacks.

  • Avira Antivirus: Another reliable antivirus product providing real-time protection against viruses, malware, ransomware, and other threats. Avira Antivirus includes additional tools such as a secure browser and a password manager. It offers a free version with essential features and upgrade options to premium versions.

Understanding and properly utilizing these cybersecurity mechanisms strengthen our device protection, reducing the risk of falling victim to cyber attacks. It's essential to note that firewalls and antivirus programs are just part of a comprehensive security approach, and as seen earlier, complementing them with other protective measures, like keeping software updated, using strong passwords, regular backups, and staying vigilant against potential threats and suspicious online practices, is recommended.

User Access Configuration (Privileges) to Ensure Integrity, Availability, and Confidentiality

Proper user access configuration to networks or applications and the adequate management of privileges are fundamental elements to ensure the security and protection of devices and digital content. By establishing user privileges appropriately, we can prevent unauthorized access, safeguard data integrity, ensure resource availability, and maintain information confidentiality. 

Below, we will outline an example of how user access could be configured in Microsoft 365 for an organization.


Elements

Configuration

Roles and groups

Creating Custom Roles Based on User Responsibilities.

For example, "Basic User," "Project Manager," "IT Administrator," etc.

Assign specific permissions to each role, limiting what users can do.

For example, the "Basic User" might have access to email and documents, while the "IT Administrator" would have access to advanced settings.


Security Groups

Creating Security Groups to Categorize Users with Similar Needs.

For example, "Sales Department," "Development Team," etc.

Assign roles and permissions to these groups instead of individual users. This simplifies access management as group members change over time.


Authentication System

Requiring Multifactor Authentication (MFA) for all users adds an additional layer of security to the login process.

Data Access Control

Using SharePoint and OneDrive to store and share documents, configuring folder and file permissions to control who can access which documents. 

Utilize confidentiality labels and access policies to classify and restrict access to sensitive data.


Exchange Online 

Configure retention policies to retain and delete emails according to regulations and internal policies. Set access permissions for shared mailboxes and folders.

Microsoft Teams

Create teams for specific project or department groups. Control who can create teams and channels, and assign roles such as owners and members..

Administration

Limit the number of global and service administrators. Only authorized IT users should have these roles. Use Azure AD role management to assign specific Microsoft 365 roles, such as Exchange Online administrator or SharePoint administrator.

Monitoring

Enable audit logging in Azure AD to track user activities and detect suspicious behaviors. Use Microsoft Cloud App Security to monitor and control the use of cloud applications. Enable audit logging in Azure AD to track user activities and detect suspicious behaviors. Use Microsoft Cloud App Security to monitor and control the use of cloud applications.

Compliance

Configure alerts and notifications for significant events, such as failed login attempts or changes in security settings. Maintain audit logs for the duration required by regulations.

Education and Conscience

Provide users with training on best security practices in Microsoft 365, such as phishing identification and handling of confidential information.


The proper implementation of these aspects contributes to maintaining the confidentiality of information, ensuring the availability of resources, and preserving the integrity of data in increasingly complex and connected digital environments. It is important to note that the specific configuration may vary according to the needs and regulations of our organization. It is also advisable to conduct tests in a development environment before implementing changes in a production environment.

Installation of the digital certificate and its characteristics

In the field of digital security, digital certificates play a crucial role in ensuring the authenticity, integrity, and confidentiality of online communications. A digital certificate is a digital file that contains information about the identity of an entity or individual and is issued and verified by a trusted Certification Authority (CA).

In Europe, electronic certificates are governed by the regulations of the European Union (EU) regarding digital identity and trusted services. The main regulation is the eIDAS Regulation (Regulation (EU) No 910/2014 on electronic identification and trusted services for electronic transactions in the internal market). Organizations that provide electronic certificates are Certification Authorities (CAs) and trusted service providers. These entities are responsible for issuing, revoking, and managing electronic certificates, ensuring the validity and reliability of users' digital identities.

There are several Certification Authorities (CA) recognized and widely used for the generation of digital certificates, issuing valid certificates at the European level. 

The most prominent CA is Digital Certification Agency (AC Camerfirma): AC Camerfirma is an international Certification Authority operating in Spain. It provides digital certificates for individuals, businesses, and public administrations, ensuring identity and authenticity in online communications and transactions.

In particular, public administrations are among the main institutions that require the use of digital certificates. These certificates are used to authenticate users in online procedures and communications with the administration, allowing them to also electronically sign documents and ensuring the security and confidentiality of transmitted data.

In addition to digital certificates, public administrations also provide other secure access methods, such as the use of electronic identifications (e.g., DNIe in Spain), access keys or passwords, and even, in recent months, authentication through facial recognition against their identification document. These methods allow citizens to authenticate themselves and access online services securely, providing additional protection for privacy and information integrity in interactions with the administration.

The installation of digital certificates involves following the specific procedures and requirements provided by the issuing entity of the certificate. Typically, it requires downloading and installing the certificate on the device used to access online services. This establishes a secure and reliable connection between the user and the entity that issued the certificate, ensuring the authenticity and confidentiality of communications.



Última modificación: domingo, 19 de noviembre de 2023, 23:26