Presentation on theme: "ELECTRONIC COMMUNICATION. Electronic Communications There are over 60 billion e-mails sent everyday around the world There are over 2 billion cell phone."— Presentation transcript:
Electronic Communications There are over 60 billion s sent everyday around the world There are over 2 billion cell phone owners worldwide – over 200 million in the US There are over 110 million MySpace active users Over 175 million active users on Facebook Pitfall or Potential
Do not rely on to address problems. If there is a sticky situation that needs to be dealt with at work, do it face- to-face. It will earn you respect in the long run. Balance work-related with telephone calls. may enhance a business relationship, but it will not necessarily build one. Pick up the phone and have a conversation with that person as well. Intentional or not, can sometimes come across as rude. It is easy to misread between the lines so at work, try to be extra polite.
Send mature messages at work. Emoticons such as this smiley :-) in business , may be interpreted as too casual. Emoticons Just be straightforward and always use the spell checker! If your Internet access is through a corporate account, check with your employer about their policy regarding private .policy Don't assume any Internet communication is completely secure. "Never put in a mail message anything you would not put on a postcard". Verify any suspect mail, as addresses can be forged.
Emoticons Mr. Mathis, Since we discussed emoticons in class today, I thought that you might find this funny. Last year, when my daughter was in the second grade, she received an from one of her classmates. It made her mad because he sent an emoticon with a smile and a heart. She sent him the following reply: Jeremiah that was not cool to put a smile and a heart. That means I love you. g-r-o-s-s spelles GROSS!!!!!!!!!! ew!!!!!!!!!!!!you are gross do not put this again ew ew ew ew!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! DO NOT !!!!!!!!!!!! put this insted do not put this ether or this 6
Never send chain letters, they are forbidden on the Internet. Notify you System Administrator if you receive one. Do not send abusive or heated messages (flames). Take care with addressing mail. Allow time for mail to be received, and replied to, keeping in mind time differences around the world and other people's busy schedules. If you want your mail to be read, don't make it too long unless the receiver is expecting a verbose message. Over 100 lines is considered long.
If you are forwarding or re-posting a message, don't change the original wording. If you are replying to a message, quote only the relevant parts. Use mixed case: UPPER CASE LOOKS AS IF YOU'RE SHOUTING lower case shows lack of respect to the recipient Mail should have a subject header that reflects the content of the message.
Voic & Cell Phones
Your Voic Message If an employer called and heard these voic s what perception do you think they would have? Yo, this is Kelly, you know what to do and when to do it. Later….(beep) This is Joe, I’m busy at the present moment. If this is Anthony, I’ll be hangin’ until midnight having some brews with the guys. …(beep) Let’s not forget ring tones…….keep them conservative, no techno, hip-hop, mission impossible craziness – cackles, crying etc….
Telephone and Voice Mail If you return a phone call and you're forwarded to that person's voice mail, let them know when and where you can be reached: "I'll be at my desk at 4:30 this afternoon if you want to call me then." Return your calls in a timely manner. Ideally no more than twenty-four hours should go by. When leaving a voic message, give your number at both the beginning and end of the message. If the recipient didn't write it down it at the beginning, they can either catch it at the end or replay the message and catch it at the top.
Cell Phone When on your cell phone, practice netiquette and avoid screaming into your cell phone. The speaker on your cell phone is very sensitive and can transmit your slightest whisper. Be sensitive to those around you, because believe it or not, they don't want to hear your conversation.
Top 10 Cell Phone Etiquette Rules People Still Break 1. Talking too loudly. 2. Holding inappropriate conversations in public. 3. Rudely interrupting conversations. 4. Checking your phone at the movies. 5. Texting while driving. 6. Texting while talking. 7. Texting small talk. 8. Loud and annoying ringtones. 9. Disturbing live performances. 10. Location location location
Facebook Issues At several Kentucky universities, administrators have used incriminating Facebook photographs to discipline students for drinking in campus dorms. After two students at Fisher College in Boston (one of them the Student Council president) mocked and threatened a police officer on a Facebook forum, they were immediately expelled. Penn State police used Facebook to identify and discipline students who rushed the field after the Ohio State football game last October. The University of California, Santa Barbara, has promised harsh consequences for students posting pictures displaying “illegal activity” on the virtual network.
Mild mannered Ray Clark during the day Same guy – is now expelled from his private Christian Academy
Employers Background Checking Process If you’ve got a profile on a social networking site such as MySpace or Facebook, be prepared for potential employers to view it. National Association of Colleges and Employers More than one in 10 employers reported plans to review profiles on social networking when considering candidates. Profile information may have at least some effect on an employer’s hiring decisions: More than 60 percent of employers who review social networking sites said the information gleaned there has at least some influence on their hiring decisions.
Netiquette "Netiquette" stands for "Internet Etiquette“ refers to the set of practices developed over the years to make the Internet experience pleasant for everyone. Like other forms of etiquette, netiquette is primarily concerned with matters of courtesy in communications.
Naughty or Nice? Installing software monitoring tools on your employees’ computers without them knowing it?software monitoring tools Selling information you have collected from your customers without their knowledge to another business, if you believe that your customers may actually benefit from having their personal information available by that other business? Accessing personal of co-workers when you were given special access rights to the company’s databases so you may maintain the servers?
Dos or Don’ts? Pointing out the spelling/grammar errors in your employee’s ? Answering a message in all upper case/lower case letters? Replying “YES” to an , without quoting? Forwarding the private message from your supervisor to your employees? You send a sarcastic message and include emoticons to underscore the sarcasm?
What Do You Do? You receive a particularly upsetting message from your co-worker that has been cc’d to your boss. What do you do? A. Respond in immediately stating the fact that this type of argument is not worth the bandwidth it takes to send it. B. You don’t respond at all C. Wait overnight to send a response D. None of the above
What Do You Do? You receive a spam message that is offensive to you. What do you do? A. Click the link in the message to remove you from the list B. Just delete the message and go on C. Try to Contact the ISP of the Spammer D. None of the Above
What Do You Do? You just received a message from a very good friend informing you of a new virus that has been spreading on the Net. What do you do? A. Immediately forward it to all your friends and relatives B. Ignore it C. Check the hoax web site or/and virus website for the latest info D. None of the above
What Do You Do? You just received an message from an acquaintance with an attachment file entitled Thank- you.doc. What do you do? A. Intrigued, you open it up B. You delete it without opening it C. You contact the friend to verify the authenticity of the message D. None of the above
What Do You Do? You just received an exciting message from a colleague. In all the excitement, you hit the reply button and elaborate in the reply on the shortcomings of your current position. The message goes to all the people subscribed to the listserv, including your current boss. What do you do? A. Put your head in the oven and turn on the gas. B. Send an apology to the listserv and a private one to your boss. C. Ignore the situation D. None of the above
Spam On the Internet, the term spam refers to unwanted messages posted to newsgroups or sent to a list of users through . Most obnoxious form of spam unwanted commercial advertising. chain letters. Spamming has become so pervasive that it’s estimated that unwanted messages account for 5 to 30% of the 15 million messages received by America Online subscribers each day. Best way to Fight it – complain to spammer’s Internet providercomplain to spammer’s Internet provider
Hoaxes Some pretty incredible hoaxes have been propagated across the Internet. The hoaxes are designed to prey upon people’s fears, sensitivities, or desires to keep the hoax spreading to other users over the Net. The major hoaxes are catalogued where you can look to see whether the hoax is a recognized one.
Viruses The best way to guard against catching a virus through is never to open an attachment to an message. One of the most harmful viruses was the Love Bug virus. It spread as an attachment to an message entitled “I Love You” and asked you to open the attachment, which was named “LOVE-LETTER-FOR-YOU.TXT.VBS.” It is also possible for macros in MS Word.doc files and MS Excel.xls files to transmit viruses. To find out about latest viruses, visit Symantec’s websiteSymantec’s website
Safe and Responsible Use of the Internet What you do reflects on you Those are real people out there Play by the rules Keep it private Look your best Don’t pollute Remain cool under fire Read with your eyes open Respect the creator – Credit the source Watch where you are looking Don’t take candy from strangers Don’t go where you don’t belong Do your part Responsible Netizen Institute, July 14, 2003http://www.responsiblenetizen.org