Chapter 18 Digital Communication: Email, Instant Messages, Blogs, and Wikis Strategies for Technical Communication in the Workplace Laura J. Gurak John.

Slides:



Advertisements
Similar presentations
ACDV B50 Joyce Kirst. Content Consider whether what you have to say is best said through Consider whether the person you are writing to needs to.
Advertisements

© 2010 Pearson Education, Inc., publishing as Longman Publishers. 1 Chapter 10 Memos and Letters Strategies for Technical Communication in the Workplace.
Electronic Mail CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Electronic Mail Name: ____________________ Class: ________________.
Chapter 10. “Be a yardstick of quality. Some people aren't used to an environment where excellence is expected.” Steve Jobs (1955- )
Copyright © 2010 Pearson Education InternationalChapter Crafting Messages for Electronic Media.
s. Why use s?  send a message any time, any where and the recipient can read it at his or her convenience.  same message to several people.
Understanding and Building Basic Networks Chapter 3 The Other Internet.
Evidence By Jordan Shurety. This I where you write who you are going to send the to. Cc in an means carbon copy or courtesy copy. You.
Lecture and Resource Slides BCOM 3e, Lehman & DuFrene © 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted.
By Chloe.
WEBPAGE DESIGN Electronic Mail Anatomy of an Message Messages Contain Two Parts: HHeader AAddressing information To From Subject MMessage.
© 2010 Pearson Education, Inc., publishing as Longman Publishers. 1 Chapter 3 The Research Process in Technical Communication Strategies for Technical.
Slide 1 Electronic Communication 2.01: Recall components of electronic communication.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Chapter 3 Social Media Revolution Video. 1. Guidelines a. Determine the information you need. b. Consider who is likely to have the info. c. Communicate.
Electronic Etiquette Communication Skills for and Blogs.
Lecture Slides Business Communication, 16e, Lehman & DuFrene © 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or.
Computer-Assisted Communication
Business Correspondence: Letters, Memos, and s
NETIQUETTE GUIDELINES FOR DISTANCE EDUCATION COURSES.
Business Communication, 14 th edition by Lehman and DuFrene  Copyright 2005 by South-Western, a division of Thomson Learning Chapter 5 Communicating Electronically.
Use of Electronic and Internet advertising options Standard 3.4.
Copyright © 2010 Pearson Education, Inc. publishing as Prentice HallChapter Crafting Messages for Electronic Media.
Communicating Electronically Business Communication, 15e Lehman and DuFrene Business Communication, 15 th edition by Lehman and DuFrene  Copyright 2008.
Copyright © 2010 Pearson Education, Inc. publishing as Prentice HallChapter Crafting Messages for Electronic Media.
McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
6-1 © 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any.
Copyright © Allyn & Bacon 2008 Using Technology in the Classroom Gary G. Bitter & Jane M. Legacy This multimedia product and its contents are protected.
Preparing s Using Etiquette Lesson A4-3.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
Preparing s Using Etiquette. Learning Objectives Define . List the parts of an and an header. List rules for etiquette.
NEW MEDIA COMMUNICATION. NETWORKING INFORMATION EXCHANGE COMMUNICATION.
Digital Citizenship Laura Locke ED 505. Netiquette on Social Media Sites  Netiquette is simply defined as “network etiquette.
Electronic Communication Presentation. Attachments Files you attach and send with an message.
is a shortened form of electronic mail allowing you to send messages over the internet, store and retrieve messages which you have received. So.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
Etiquette UNT in partnership with TEA. Copyright©. All rights reserved.
© 2011 Pearson Education, Inc., publishing as Longman Publishers. 1 Chapter 16 and Instant Messaging Technical Communication, 12 th Edition John.
© 2011 Pearson Education, Inc., publishing as Longman Publishers. 1 Chapter 27 Blogs, Wikis, and Social Networks Technical Communication, 12 th Edition.
Basics. Stands for “electronic mail” Digital message sent over the internet Primarily text but can include pictures, sound and attachments.
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
Professional Communications Mrs. Lopez-Wyatt. Why is etiquette important? We interact more with written word and the number of users and usage rates.
Etiquette UNT in partnership with TEA. Copyright©. All rights reserved.
Do Now: Describe the steps used to access the comments tool in MS Word. ( review your notes for the answer) Ex: Step 1. Select the text or item you want.
ETIQUETTES “ - when it absolutely positively has to get lost at the speed of light.”
Chapter 7 Writing Memos, , and Letters
Use the subject field to indicate the purpose of the .
© Prentice Hall, 2008 Business Communication Today, 9eChapter Crafting Messages for Electronic Media.
Prof. Q.   Texting  Blogs  Wikis  Social Networks.
Lecture 3 1Norazirah Ayob, FEB. Ch  Technology advances allow individuals to self-select  what,  when, and  where messages are sent and received.
Objectives.  is short for electronic mail.  It allows you to quickly send a message to anyone else in the world as long as they have their.
© 2008 Pearson Education, Inc., publishing as Longman Publishers. 1 Chapter 16 Memo Reports and Electronic Correspondence Technical Communication, 11 th.
EFFECTIVE ADDRESSING A DIVERSE AUDIENCE By: Yvette Eisenhart.
Guidelines for polite online interaction; words “Internet” and “etiquette” Don’t type in all capital letters; this is interpreted as SHOUTING Do use correct.
TECHNOLOGY IN ACTION. Chapter 3 Using the Internet: Making the Most of the Web’s Resources.
Chapter 7 Writing Memos, , and Letters
Chapter 26 Social Media This chapter explores how social media are used, with increasing frequency, for professional communication. Students will be well.
Chapter 15 and Text Messaging
BCOM 5 7 Communicating Electronically LEHMAN/ DUFRENE
Etiquette.
CBP Program – Business Etiquette
Chapter 7 Writing Memos, , and Letters
Fun gym Cambridge Nationals R001.
Professional Communications
ICT Communications Lesson 5: Communicating Using
Chapter 6 Choosing the Best Process and Form
s © Mgr. Markéta Čeřovská.
Chapter 10.
Presentation transcript:

Chapter 18 Digital Communication: , Instant Messages, Blogs, and Wikis Strategies for Technical Communication in the Workplace Laura J. Gurak John M. Lannon

Benefits of  can quickly and efficiently address an individual or a group.  One message can reach thousands of readers in seconds.  is useful for people working in different time zones.  allows users to attach files.

Audience and Purpose of messages tend to be conversational and are typically used for routine, simple messages. messages tend to be conversational and are typically used for routine, simple messages. Always assume your message will travel far beyond its original intended recipient. Always assume your message will travel far beyond its original intended recipient. Complex or important messages are best sent through a different medium, unless specifically requested as an or attachment. Complex or important messages are best sent through a different medium, unless specifically requested as an or attachment.

Components of  “To” line  “From” line  “Date” line  “Subject” line  Copy notations  CC: carbon copy  BCC: blind carbon copy  Enclosure notation  Attachment: sometimes indicated with an icon

Netiquette Netiquette is “internet etiquette.” Netiquette is “internet etiquette.” Workplace should: Workplace should:  Use proper spelling, grammar, and punctuation  Avoid words or phrases in all capital letters  Avoid text-message style abbreviations and emoticons  Use a professional tone

Other Types of Electronic Communication  Instant Messaging  Blogs  Wikis  RSS Feeds

Instant Messages  Text-based, real-time conversation  Useful for brief, rapid exchanges  Typically not archived Many colleagues may prefer to correspond via  Use when sending attachments  Use if you need a paper trail

Blogs Blog is short for web log. Blogs began as social networking sites to provide forums for people to read and discuss shared interests. Corporate blogs play an increasing role in workplace communication.  Internal Blogs: Users can post information to be seen by all with access  External Blogs: Facilitate customer feedback and enhance public relations Wikis are a type of blog that allow for the sharing and updating of content. Each person with access may log on to the wiki and make changes to the content, overwriting previous versions.  Corporate Wikis: Users can comment on earlier posts and edit them

RSS Feeds An RSS feed is a retrieval program that monitors selected sites, identifies relevant information, and sends links by to subscribers

Copyright and Privacy in Digital Communication Copyright is a system of legal protection for original works of authorship.  If you are a full-time employee, most of what you create will be owned by the company.  If you find a file on the internet, you need to seek permission for its use, unless it is marked “public domain” or qualifies as fair use.

Copyright and Privacy in Digital Communication Privacy Issues  Avoid forwarding without checking with the sender first.  Don’t forward proprietary information (information that belongs to your company) to unauthorized recipients.

Any questions? Any questions? For additional help reviewing this chapter, please visit the Companion Website for your text at