1 / 35

Chapter 5: Electronic BUSINESS COMMUNICATIONs

Chapter 5: Electronic BUSINESS COMMUNICATIONs. Creating and Delivering Messages that Matter. COMMUNICATION CHANNELS: LEVELS OF RICHNESS VARY. ELECTRONIC WRITING. Blessing Faster Simpler Spelling/grammar checkers Curse Faster Simpler Spelling/grammar checkers.

sibley
Download Presentation

Chapter 5: Electronic BUSINESS COMMUNICATIONs

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 5: Electronic BUSINESS COMMUNICATIONs Creating and Delivering Messages that Matter

  2. COMMUNICATION CHANNELS: LEVELS OF RICHNESS VARY

  3. ELECTRONIC WRITING • Blessing • Faster • Simpler • Spelling/grammar checkers • Curse • Faster • Simpler • Spelling/grammar checkers

  4. Spellbound I have a spelling checker, It came with my PC, It plainly marks four my revue Mistakes I cannot sea. I’ve run this poem threw it, I’m sure your pleased too no, Its letter-perfect in it’s weigh, My checker tolled me sew.

  5. Electronic Communications There are over 60 billion e-mails sent everyday around the world There are over 2 billion cell phone owners worldwide – over 200 million in the US There are over 110 million MySpace active users Over 800 million active users on Facebook Pitfall or Potential

  6. E-mail

  7. E-mail • Do not rely on e-mail to address problems. • If there is a sticky situation that needs to be dealt with at work, do it face-to-face. It will earn you respect in the long run. • Balance work-related e-mail with telephone calls. • E-mail may enhance a business relationship, but it will not necessarily build one. • Pick up the phone and have a conversation with that person as well. • Intentional or not, e-mail can sometimes come across as rude. • It is easy to misread between the lines so at work, try to be extra polite. • If your Internet access is through a corporate account, check with your employer about their policy regarding private e-mail.

  8. Emoticons • Send mature messages at work. • Emoticons such as this smiley :-) in business e-mail, may be interpreted as too casual. Mr. Mathis, Since we discussed emoticons in class today, I thought that you might find this funny. Last year, when my daughter was in the second grade, she received an e-mail from one of her classmates. It made her mad because he sent an emoticon with a smile and a heart. She sent him the following reply: Jeremiah that was not cool to put a smile and a heart. That means I love you.   g-r-o-s-s spelles GROSS!!!!!!!!!! ew!!!!!!!!!!!!you are gross do not put this again    ewewewew!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! DO NOT !!!!!!!!!!!! put this insted    do not put this ether    or this 

  9. E-mail • Never send chain letters, they are forbidden on the Internet. • Notify you System Administrator if you receive one. • Do not send abusive or heated messages (flames). • Take care with addressing mail. • Allow time for mail to be received, and replied to, keeping in mind time differences around the world and other people's busy schedules. • If you want your mail to be read, don't make it too long unless the receiver is expecting a verbose message. Over 100 lines is considered long.

  10. E-mail • If you are forwarding or re-posting a message, don't change the original wording. • Use mixed case: • UPPER CASE LOOKS AS IF YOU'RE SHOUTING • lower case shows lack of respect to the recipient • Mail should have a subject header that reflects the content of the message.

  11. TIPS FOR EXCELLENT EMAIL • Consider both your primary and secondary readers. • Keep it short. • Don’t forget to proofread. • Use standard writing. • Avoid attachments. • Don’t assume privacy. • Avoid anything nearing “off-color” • E-mail belongs to your employer! • Respond promptly to e-mails. • Assume the best. • Create a compelling subject line. • Think before you write, and think again before you send!

  12. Voicemail & Cell Phones

  13. Your Voicemail Message • If an employer called and heard these voicemails what perception do you think they would have? • Yo, this is Kelly, you know what to do and when to do it. Later….(beep) • This is Joe, I’m busy at the present moment. If this is Anthony, I’ll be hangin’ until midnight having some brews with the guys. …(beep) • Let’s not forget ring tones…….keep them conservative, no techno, hip-hop, mission impossible craziness – cackles, crying etc….

  14. Telephone and Voice Mail • If you return a phone call and you're forwarded to that person's voice mail, let them know when and where you can be reached: • "I'll be at my desk at 4:30 this afternoon if you want to call me then." • Return your calls in a timely manner. Ideally no more than twenty-four hours should go by. • When leaving a voice-mail message, give your number at both the beginning and end of the message. • If the recipient didn't write it down it at the beginning, they can either catch it at the end or replay the message and catch it at the top.

  15. Cell Phone • When on your cell phone, practice netiquette and avoid screaming into your cell phone. The speaker on your cell phone is very sensitive and can transmit your slightest whisper. • Be sensitive to those around you, because believe it or not, they don't want to hear your conversation.

  16. Top 10 Cell Phone Etiquette Rules People Still Break Talking too loudly. Holding inappropriate conversations in public. Rudely interrupting conversations. Checking your phone at the movies. Texting while driving. Texting while talking. Texting small talk. Loud and annoying ringtones. Disturbing live performances. Location, location, location

  17. Texting A&M student caused fatal wreck Jury decides that texting A&M student caused fatal wreck, orders him to pay $22 million FRANKLIN -- A jury that decided that a Texas A&M University student was texting while driving and caused a deadly wreck ordered him to pay $22 million in damages. The victim, Megan Small of Houston, was a senior at Baylor University and was driving to Waco when the November 2007 accident happened near Calvert. The investigation indicated that a vehicle driven by Reed Vestal crossed the center line and struck Small's vehicle head-on. Phone records indicated that Vestal sent and received 15 texts and made seven calls in the 45 minutes before the wreck. The damages will be shared with Small's friend Laura Gleffe, who was driving another car that rolled during the crash. Hunter Craft, attorney for the Small family, said Vestal declared bankruptcy before the civil trial in Franklin. An attorney for Vestal did not immediately comment. Posted Friday, Mar. 19, 2010

  18. Facebook

  19. Facebook - Company Figures • More than 800 million active users • 552 million active users log on to Facebook in any given day • More than 70 million users update their status each day • More than 60 million status updates posted each day • More than 3 billion photos uploaded to the site each month • More than 5 billion pieces of content (web links, news stories, blog posts, notes, photo albums, etc.) shared each week • More than 3.5 million events created each month • More than 3 million active Pages on Facebook • More than 1.5 million local businesses have active Pages on Facebook • More than 20 million people become fans of Pages each day • Pages have created more than 5.3 billion fans

  20. Facebook Issues • At several Kentucky universities, administrators have used incriminating Facebook photographs to discipline students for drinking in campus dorms. • After two students at Fisher College in Boston (one of them the Student Council president) mocked and threatened a police officer on a Facebook forum, they were immediately expelled. • Penn State police used Facebook to identify and discipline students who rushed the field after the Ohio State football game last October. • The University of California, Santa Barbara, has promised harsh consequences for students posting pictures displaying “illegal activity” on the virtual network.

  21. Mild mannered Ray Clark during the day Same guy – is now expelled from his private Christian Academy

  22. Employers Background Checking Process • If you’ve got a profile on a social networking site such as MySpace or Facebook, be prepared for potential employers to view it. National Association of Colleges and Employers • More than one in 10 employers reported plans to review profiles on social networking when considering candidates. • Profile information may have at least some effect on an employer’s hiring decisions: • More than 60 percent of employers who review social networking sites said the information gleaned there has at least some influence on their hiring decisions.

  23. Internet

  24. Netiquette • "Netiquette" stands for "Internet Etiquette“ • refers to the set of practices developed over the years to make the Internet experience pleasant for everyone. • Like other forms of etiquette, netiquette is primarily concerned with matters of courtesy in communications.

  25. Naughty or Nice? • Installing software monitoring tools on your employees’ computers without them knowing it? • Selling information you have collected from your customers without their knowledge to another business, if you believe that your customers may actually benefit from having their personal information available by that other business? • Accessing personal e-mail of co-workers when you were given special access rights to the company’s databases so you may maintain the servers?

  26. Dos or Don’ts? • Pointing out the spelling/grammar errors in your employee’s email? • Answering a message in all upper case/lower case letters? • Replying “YES” to an email, without quoting? • Forwarding the private email message from your supervisor to your employees? • You send a sarcastic message and include emoticons to underscore the sarcasm?

  27. What Do You Do? • You receive a particularly upsetting message from your co-worker that has been cc’d to your boss. What do you do? • Respond in e-mail immediately stating the fact that this type of argument is not worth the bandwidth it takes to send it. • You don’t respond at all • Wait overnight to send a response • None of the above

  28. What Do You Do? • You receive a spam message that is offensive to you. What do you do? • Click the link in the message to remove you from the list • Just delete the message and go on • Try to Contact the ISP of the Spammer • None of the Above

  29. What Do You Do? • You just received a message from a very good friend informing you of a new virus that has been spreading on the Net. What do you do? • Immediately forward it to all your friends and relatives • Ignore it • Check the hoax web site or/and virus website for the latest info • None of the above

  30. What Do You Do? • You just received an email message from an acquaintance with an attachment file entitled Thank-you.doc. What do you do? • Intrigued, you open it up • You delete it without opening it • You contact the friend to verify the authenticity of the message • None of the above

  31. What Do You Do? • You just received an exciting message from a colleague. In all the excitement, you hit the reply button and elaborate in the reply on the shortcomings of your current position. The message goes to all the people subscribed to the listserv, including your current boss. What do you do? • Put your head in the oven and turn on the gas. • Send an apology to the listserv and a private one to your boss. • Ignore the situation • None of the above

  32. Spam • On the Internet, the term spam refers to unwanted messages posted to newsgroups or sent to a list of users through e-mail. • Most obnoxious form of spam • unwanted commercial advertising. • chain letters. • Spamming has become so pervasive that it’s estimated that unwanted messages account for 5 to 30% of the 15 million messages received by America Online subscribers each day. • Best way to Fight it – complain to spammer’s Internet provider

  33. Hoaxes • Some pretty incredible hoaxes have been propagated across the Internet. The hoaxes are designed to prey upon people’s fears, sensitivities, or desires to keep the hoax spreading to other users over the Net. • The major hoaxes are catalogued http://www.hoax-slayer.com/ where you can look to see whether the hoax is a recognized one.

  34. Viruses • The best way to guard against catching a virus through e-mail is never to open an attachment to an e-mail message. • One of the most harmful e-mail viruses was the Love Bug virus. It spread as an attachment to an e-mail message entitled “I Love You” and asked you to open the attachment, which was named “LOVE-LETTER-FOR-YOU.TXT.VBS.” • It is also possible for macros in MS Word .doc files and MS Excel .xls files to transmit viruses. • To find out about latest viruses, visit Symantec’s website

  35. Safe and Responsible Use of the Internet • What you do reflects on you • Those are real people out there • Play by the rules • Keep it private • Look your best • Don’t pollute • Remain cool under fire • Read with your eyes open • Respect the creator – Credit the source • Watch where you are looking • Don’t take candy from strangers • Don’t go where you don’t belong • Do your part ResponsibleNetizen Institute, http://www.responsiblenetizen.org , July 14, 2003

More Related