Page 276 - Keys To Community College Success
P. 276
KEY 9.5 Take steps to protect your privacy.
1.
7. Password-protect your devices. 2.
Make sure only you can access
Don’t spread gossip online. personal information on your
Information online moves at smartphone, tablet, or computer, and Use theft-recovery applications.
breakneck speed and remains don’t give out your password Apps such as Find My Phone can
available indef nitely, and gossip you locate a lost or stolen device.
spread will be easily traced to you
and can cause trouble.
Take Steps
6. 3.
to Pro ec Your
Use conservative social
Shop securely. networking privacy settings.
Look for websites with URLs Privacy Make sure you are not letting
starting with https, which information roam too far from
are the most secure.
your close network.
5. 4.
Be wary of Protect your online reputation.
revealing your location. Make sure that everything you post on
Instead of using Foursquare or other a blog, social network, or chat forum is
location apps, consider texting your something you would be comfortable
location to only those few people with an instructor or employer
who need to know it.
seeing
Source: Maier, Fran. “Back to School: 10 Privacy Tips for the Connected Student” (Retitled: “Take Steps to Protect Your Privacy”). Mashable, September 7, 2011.
From http://mashable.com/2011/09/07/privacy-back-to-school. Copyright (c) 2011 by Fran Maier. Used by Permission of Fran Maier.
Manage Conflict
Conflicts, both large and small, arise when there is a clash of ideas or interests. You
may have small conflicts with a housemate over a door left unlocked. You may have a
major conflict with your partner about finances or with an instructor about a failing
grade. Conflict, as unpleasant as it can be, is a natural element in the dynamic of
getting along with others. Prevent conflict when you can—and when you can’t, use
problem-solving strategies as soon as possible to resolve it.
Conflict prevention strategies
The following two strategies can help prevent conflict from starting in the first place.
Send “I” messages. “I” messages communicate your needs rather than attacking
someone else. Creating these messages involves some simple rephrasing: “You didn’t
lock the door!” becomes “I was worried when I came home and found the door
unlocked.” “I” statements soften the conflict by highlighting the effects the other per-
son’s actions have on you, rather than focusing on the person or the actions themselves.
Be assertive. Most people tend to express themselves in one of three ways—aggres-
sively, assertively, or passively. Aggressive communicators focus primarily on their own
needs and become impatient when needs are not satisfied. Passive communicators focus
9 primarily on the needs of others and often deny themselves power, causing frustration.
CHAPTER 238 Assertive communicators are able to declare and affirm their opinions while respecting
the rights of others to do the same. Assertive behavior strikes a balance between aggres-