Email Advocacy


Published on

This presentation is made by a student from the online class. "Acting Up - Using Theater & Technology for Social Change" taught by Tom Tresser for the DePaul University School for New Learning.


  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Email Advocacy

  1. 1. Email Advocacy Enhancing Social Change @ Sandra Cullinane
  2. 2. @ Email The Web links us to the world, but e-mail connects us. Web pages are international, but e-mail is intra-national. Web sites help us round out our picture of the world, but e-mail makes the world go 'round. Email is a system of sending and receiving messages electronically. It is form of communication in which a computer user can compose a message at one terminal and it would be received by the recipient when they check their account. The message sent is in the form of the entered text typed from the keyboard or the electronic files, which have been stored on the storage media and sent via a search engine through the internet. The internet The Internet is a global network of networks. People and organizations connect into the Internet so they can access its massive store of shared information. The Internet is an inherently participative medium. Anybody can publish information or create new services. The Internet is a cooperative endeavor -- no organization is in charge of the net. People and organizations connect into the Internet so they can access its massive store of shared information. The Internet is an inherently participative medium. Anybody can publish information or create new services.
  3. 3. @ The Cooperative endeavor of the Internet The Internet - a global network of networks. People and organizations connect into the Internet and they can access its massive store of shared information. The Internet as an inherently participative medium, can publish anyone’s information or create new services. No organization is in charge of the internet – It is a cooperative endeavor. Computer Connection - Phone Line, Cable, DSL, Wireless, ... Modem Network Software - TCP/IP Application Software - Web Browser, Email, ... Internet Service Provider(ESP) Send and receive email messages. Download free software with FTP (File Transfer Protocol). Post your opinion to a Usenet newsgroup. Yack it up on IRC (Internet Relay Chat). Surf the World Wide Web. There is no charge for most services. The Web was invented in 1991 by Tim Berners-Lee , while consulting at CERN ( European Organization for Nuclear Research ) in Switzerland. The Web is a distributed information system.
  4. 4. A Search Engine for your Site From general search engines to meta search engines to specialized search engines, each site needs a search engine. There are two main ways to add &quot;search&quot; to your site. The simplest is simply to install one of the hundreds of search forms: boxes that allow your visitors to search the Web via 3rd party search engines. @ <ul><ul><li>The Web </li></ul></ul><ul><ul><li>contains multimedia </li></ul></ul><ul><ul><li>Information in the Web is connected by hyperlinks </li></ul></ul><ul><ul><li>A web page is a document on the World Wide Web </li></ul></ul><ul><ul><li>A web browser is the computer program you use to retrieve and view web ages </li></ul></ul><ul><ul><li>The most popular browsers = </li></ul></ul><ul><ul><li>Microsoft Internet Explorer and Netscape Navigator </li></ul></ul><ul><ul><li>Web page are stored in computers called web servers </li></ul></ul><ul><li>Any organization can setup a web server. </li></ul><ul><li>A web site is a collection of web pages. </li></ul><ul><li>The starting point for a web site sometimes is called a home page. </li></ul><ul><li>Most large web sites have some navigation scheme to find informtion. </li></ul><ul><li>Links on the home page will bring direct contact to featured content. </li></ul><ul><li>  </li></ul>
  5. 5. Internet Search Engines Used for Research General Google Yahoo Bing Cuil DuckDuck Go Kosmix Yebol Multimedia Munax’sPlayAudioVideo Bing Videos blinkx FindSounds Google.Video Picsearach Pixsta Podscope ScienceStage Songza SeeqPod Veveo TinEve Yahoo!Video YouTube Business Global Spec Nexis Thomasnet GenieKnows GenieKnows Enterprise AskMeNow Concept Searching Ltd. Dieselpoint dtSearch Endeca Exalead Expert System S.p.A. Fast Search & Transfer IBM ISYS Search Software Northern Light Open TextVivisimo SAP Tera Text X1 Technologies ZyLAB Technologies Job Bixee CareerBuilder Craqigslist Dice Hotjobs Incruit Indeed LinkUp Monster Education GetEducated Accountancy IFACneet Legal WestLaw Lexios Quicklaw Manupatra Medical Bioinformatic Harvester Entrez inckudes Pubmed EB-eye EMBL=EBI’s GenieKnows GoPubMed Healia Searchmedica WebMD PubGene Blog Amatomu Bloglines BlogScope IceRocket Sphere Technorati BitTorremt Brjunkie FlkixFlux Iswohunt Mioninova The Pirate Bay TorrentSpy Torrentz Price Google Product Kelkoo MSN Shopping PriceGrabber PriceRunner PriceScan ShopWiki Shopzilla Washabi Maps WikiMapia Bing Maps Geoportail GoogleMaps MapQuest Yahoo! Maps Geographical Accoona, China/US Goo, Japan, India, Iceland Rediff, India Walla!, Isreal Yandex, Russia ZipLocal,Canada/US Sesam,Birwat, Sweden Searcdh.=ch, Switzerland People Peek You InfoSpace Spock Spokeo Wink ZoomInfo @
  6. 6. @ Email encryption and a wider security strategy Email encryption should never be considered in isolation from a broader security strategy that touches all parts of an organization and protects data wherever it goes. Fundamental to this security strategy must be the issue of encryption and how data, in any of its forms, can be secured from prying eyes according to an organization’s overall data protection strategy. Organizations that deal with legal, financial, medical, or any other classically sensitive data benefit from end-point based encryption. In cryptography, encryption is the process of transforming information (referred to as plain text) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. By using software that integrates into the Heart of a email system, as well as an Existing directory structure, user inter- vention is not required and system management is made much easier. E-mail authentication is the effort to equip messages of the email transport system with enough verifiable information, so that recipients can recognize the nature of each incoming message automatically. It differs from content filtering.
  7. 7. @ The Internet has been put to use as part of a facilitative strategy, characterized by multi-party collaboration and the sharing of information . The voluntary sector contains a wide variety of organizations that are supported by the work of volunteers who freely contribute their time and resources in order to support common ends. The sector includes organizational types of trade associations, charities, and hobby clubs. Within this sector, however, there are a large number of groups that strive to improve the general welfare of society through advocacy work, or by performing social services not under the purview of the public or private sectors. Yahoo! National Association of Social Workers AOL AT&T Greenpeace Fund, Inc. Google Bing Web Search American Veterans Relief Foundation Citizens Against Government Waste
  8. 8. @ ‘ Social change' agencies act as advocates, promoters and catalyzers of new ideas, attitudes and social institutions. Derived from historical movements designed to deal with social inequalities and dangers resulting from the sometimes narrow and short-term policies of government and business leaders, these social change organizations are currently involved with such issues as the environment, human rights, social justice, peace and international development. American Society for Prevention of Cruelty to Animals TASH (People with disabilities) National Coalition for the Homeles Antidefamation League (combating anti- Semitism
  9. 9. @ Actions undertaken by society to effect change are driven by a degree of strategic thought. In thinking strategically, social change activists try to identify the nature and causes of social problems and then choose specific targets that are deemed the most likely people or organizations to resolve those problems. The optimal approach to take to ensure the targets actually help create and maintain the required changes is determined by the type of strategy adopted by the change agents. One of the keys to a successful strategic approach is in maintaining effective communication with, and among, members of the public. Through Emailing Information, the funders are informed of the opportunities, challenges and impact of the tools that were documented, analyzed, and evaluated for nonprofit uses.
  10. 10. @ The five C's of social action: Cause. A social objective or undertaking that change agents believe will provide some answer to a social problem. Change Agency. An organization whose primary mission is to advance a social cause. Change Targets. Individuals, groups, or institutions designated as the targets of change efforts. Channels. Ways in which influence and response can be transmitted between change agents and change targets. Change Strategy. A basic mode of influence adopted by the change agent to affect the change target.&quot; (Kotler, 1973, p. 172)
  11. 11. Getting Started with Email Activism @ <ul><li>Start with a clear understanding of what you want to accomplish and who </li></ul><ul><li>you want to reach. Is your constituency online? </li></ul><ul><li>Make sure you have the resources to maintain an online presence, and </li></ul><ul><li>determine who will be responsible for answering email. Once you create a </li></ul><ul><li>web site or launch an email newsletter or discussion list, who will manage it? </li></ul><ul><li>Collect email addresses from your members, supporters and volunteers, the media, </li></ul><ul><li>our contacts in legislative offices, your funders and anyone else you communicate </li></ul><ul><li>with regularly. Include a space for email addresses in your membership sign-up forms, </li></ul><ul><li>newsletter subscription forms, and fundraising reply cards. </li></ul><ul><li>If your organization publishes a newsletter, offer your members the option of receiving </li></ul><ul><li>it electronically, and encourage them to switch by reminding them that your </li></ul><ul><li>organization will save money. </li></ul><ul><li>If your organization has a Web site where visitors can sign up to volunteer, to subscribe </li></ul><ul><li>to a newsletter or action alert, or to donate money, be sure to ask for an email address </li></ul><ul><li>If your organization has a table at a conference, rally, or other event, include space for </li></ul><ul><li>an email address on your sign-up sheet. </li></ul><ul><li> Continued </li></ul>
  12. 12. @ Yuzhe Cool Motion 2009 1.1 Cool Motion helps to create interactive animations, flash games, flash videos, various effects, slide shows, etc. Cool Motion shows quite a lot of new features in editing, such as script compile and decompile, editing various types of motions, replacing symbols, Assigning inks, multi-documents mode, Floatable and movable menu bar and toolbar etc. and these new features will make your design work more convenient! <ul><li>If you distribute press releases to the media, start sending them by email </li></ul><ul><li>instead of fax. (Also, be sure to add online media outlets to your </li></ul><ul><li>distribution list). </li></ul><ul><li>Use email to communicate with staff consultants in legislative offices. </li></ul><ul><li>Establish and promote an email action alert list. </li></ul>
  13. 13. @ <ul><li>Advantages of Email </li></ul><ul><li>Emails are faster and less expensive than physical letters . </li></ul><ul><li>Email provides enhanced features with file attachments, Rich Text Format, and delivery confirmation, etc which cannot be done with normal letters . </li></ul><ul><li>They are time-saving and more efficient. </li></ul><ul><li>They can be sent to more than one person at a time, and can be received as information from more than one person at a time </li></ul><ul><li>Address Book – The user can ener the name, address, email address, and additional comments in the address book and can view the same when required by clicking on the View Entries link. </li></ul><ul><li>Attachments – The user can manage all the attachments in their account through this link and download the attachments. </li></ul><ul><li>Calendar – Each email account contains a calendar to be used to prepare a schedule by adding, editing, or deleting entries by clicking on he specific link. </li></ul><ul><li>Composition of Emails consists of the user creating mail. When the user is finished composing an email, he can eithe rsave it as a draft, or send it to the recipient. </li></ul><ul><li>Folders – The user can ceate, delete, and rename folders and sub-folders by clicking on the FOLDERS OPTIONS link. </li></ul><ul><li>Search - This option is used when there are many emails. This feature helps the user to move, read, and fordward emails listed on this page. </li></ul><ul><li>Trash Folder – When he user deletes any email, it automatically moves to this folder and if needed, the user can undelete the same. This folder is automatically emptied once everyday. </li></ul>
  14. 14. @ Advantages of Email Email plays large roll in new marketing mediums. Email is the announcer to subscribers when a new social network initiative is launched. It is weaved into social networking with the following procedures:
  15. 15. @ Disadvantages of Emails In a new phishing trend, spammers are focusing on individualized attacks. Recipients may be deceived into thinking the message is from a friend, but these spammers want access to their credit card accounts. Phishing is a common scamming practice that involves emailing users under false pretenses with the aim of tricking them into revealing their private information. The emails feature the recipients' names in the subject lines, claim to have seen them at Starbucks, and ask them to click on a link to view photos. Don't click. This is a scam. Those that take the bait may be exposed to objectionable material, incur unauthorized charges to their banking account, and may fall victim to identity theft. Email Corruption When the viewer is unable to open or send an email, the chances are that the email Has become corrupt. When the user sends the message, but a message is indicating that the message is queue able instead, there is the probability that the email might be corrupt.
  16. 16. @ Email Recovery The Email Recovery Software is a tool used for repairing and recovering corrupted or deleted emails because the emails are stored in the Mail Folder, a separate file. Different methods to recover them are used Deleted emails can be restored by looking in the deleted items folder in outlook and outlook express, but not if they have been cleared from there as well. The Mail Recovery software can then be used. The Stellar Phoenix Mail Recovery software scans, extracts and saves email messages and folders on the local drive. Sellar offers a complete solution of file recovery software and lost data restoration programs for Windows (Windows 95,98, ME,NT, 2000, 2003, and XP), Apple Macintosh, Novell, Linux, Unix Operating system and FAT, NTFS, HFS, MWFS, JFS, ExT2 and EXT3 file systems. Application Toolbar Icons Collection, 2010.1 PCN, BMP, ICB
  17. 17. @ References A Search Engine for your site. Jenki Productions. (2010). Directory of search engines and directories that on can be integrated into personal sites. Retrieved May 14, 2010 from Jenkins, G. Simms. (2009). The Truth about Email Ma rketing . Pearson Education, Inc. Publishing as . FT Press, Upper Saddle River, New Jersey. Retrieved May 13, 2010 . Baggptt. Cjros. (2007). Email Marketing by the Numbers: how to use the world’s greatest marekting tool to take any organization to the next level . Retrieved May 12, 2010. Oskar, Park. (2010), Provider of File Recovery Software & Service Provider . Retrieved May14, 2010 from , The Strategic Importance of Email Encryption. 2010. strategic importance of email encryption. Securing business data and email traffic Retrieved May 13, 2010 from – Peterson, Mark F.; Thomason, Stephanie J.; Althouse, Norm; Athanassiou, Nicholas; Curri, Gudrun; Konopaske, Robert; Lenartowicz, Tomasz; Meckler, Mark; Mendenhall, Mark E.; Mogaji, Andrew A.; Rowney, Julie I. A. Social Structure and Personal Values that Predict E-Mail Use: An International Comparative Study: Journal of Global Information Management , Apr-Jun2010, Vol. 18 Issue 2, p57-84, 28p; DOI: 10.4018/jgim.2010040103; ( AN 50254194 ) Subjects: CANADA; NIGERIA; UNITED States; COMMUNICATION & technology; ELECTRONIC mail messages -- Social aspects; COMPARATIVE studies; EXECUTIVES – Attitudes. Retrieved May 17, 2010. Serenko, Alexander (04/01/2010). &quot;Rigor and Relevance: The Application of The Critical Incident Technique to Investigate Email Usage.&quot;. Journal of organizational computing and electronic commerce (1091- 9392), 20 (2), p. 182. Retrieved May 18, 2010.
  18. 18. @ References Mourby, Adrian, A Capital Loss for the Email Junkies (02/16/2001). Times Educational Supplement, Issue 4416, p15, 1/6p, 1 Black and White Photograph; ( AN 4459105 ) Subjects: HIGH technology; SOCIAL change; GREAT Britain Database: Academic Search Premier. Retrieved May 15, 2010. Rory O’Brien, Social Change Activism and the Internet: Strategic Online Activities. / ... / The Inter net and Social Change Activism.doc An Introduction to Activism on the Internet: ( Jan 19, 2006). - Using the Internet for Outreach & Organizing: A Virtual Activist ... Jump to Online Resources for Email Activism ‎: Comprehensive information and &quot;how to&quot; guides on Internet activism . The eNonprofit: A Guide to ASPs, ... dawn.thot. net /virtual_ activist _training.html - Cached - Similar