 Face to face  Oral  Written  Visual  Electronic Communication in Administration 2.

Slides:



Advertisements
Similar presentations
Intisar O. Hussien Faculty of Computer Studies Arab Open University
Advertisements

PNDBF - Communication Lim Sei cK.
Communication Transferring information from one person to another. Communication is used to instruct, clarify interpret, notify, warn, receive feedback,
The Electronic Office Some supplementary information Corporate websites Office automation Company intranet.
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Communication Methods
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 9 Group Collaboration.
Chapter Lead Black Slide Powered by DeSiaMore Powered by DeSiaMore.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Human Resources. To understand what are meant by effective communication and feedback Analyse the advantages and disadvantages of different communication.
2.3 Communication Chapter 12.
Lecture and Resource Slides BCOM 3e, Lehman & DuFrene © 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted.
Networking Computers. Advantages & Disadvantages of Networking.
New Data Regulation Law 201 CMR TJX Video.
Administrative Practices Outcome 1
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
ICT at Work Global Communication.
Data Security GCSE ICT.
COMMUNICATION AND CONSUMER BEHAVIOUR
Information guide.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
Topic 6 Communication in Administration. You need to know about …  Effective communication  What is meant by internal and external communication  Features.
iGCSE Business Studies
Tool Kit Natasha Donovan.
1.1 System Performance Security Module 1 Version 5.
2.3 Communication Chapter 12. Effective Communication The exchange of information between people or groups with feedback Sendor Aim of Communication Appropriate.
Lecture Slides Business Communication, 16e, Lehman & DuFrene © 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or.
Communicating Electronically Business Communication, 15e Lehman and DuFrene Business Communication, 15 th edition by Lehman and DuFrene  Copyright 2008.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
ACM 511 Introduction to Computer Networks. Computer Networks.
COMMUNICATION. Passing on of information or ideas Information must be:  Easy to understand  Sent by the most suitable method  Sent to the correct person.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
Team working in distributed environments M253 Communicating, Cooperating & Collaborating on Line Faculty of Computer Studies Arab Open University Kuwait.
Communication in Administration (Security)
Defining Communication
1 Communication in Administration Higher Administration
Curriculum Vitae, or Resume, writing
Intermediate1/2 Administration Communication. An Admin Assistant needs to communicate with lots of people everyday. Communication can happen in many different.
Communication Skills Developing the knowledge and skills to communicate within the accounting profession.
PRESENTATION SKILLS. Preparation Need to know Who is the audience? what is the topic? What is the purpose of the presentation? Where and when will.
Communication in Business A2 Business Studies - People
Lecturer:Nada Mohamed Ali Year : 2015/2016 communication skills for Health Sciences 101 COMMUNICATION SKILLS Foundation year Lecture No:2.
 Internet –INTERnational NETwork is the network of computer networks.  It is a Wide Area Network(WLAN).You can have unlimited access to internet. 
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Communication GCSE Business and Communication Systems Business and Communication Systems.
College of Education School of Continuing and Distance Education 2014/2015 – 2016/2017 INFS 112: Introduction to Information Management Session 5 – Verbal,
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Communication. Categories of Communication Communication may be classified using the following categories: –Verbal –Non-Verbal –Written –Numerical –Technological.
Computer Security Sample security policy Dr Alexei Vernitski.
Communication. What is communication Communication refers to the transmission of information from a sender to a receiver, via a given medium. Two-way.
How to use types of communication
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Communication. Objectives At the end of this lesson you should understand: The importance of Communication in Business Internal and External types of.
College of Education School of Continuing and Distance Education 2014/2015 – 2016/2017 INFS 112 Introduction to information management Session 5 – Verbal,
Communication.
Communication Skills.
Administrative Practices Outcome 1
Business Communication
Progress leisure OCR GCSE ICT.
Business Communication
Business Communication
H2.9b Maintain Information
Communicating in the IT Industry
Presentation transcript:

 Face to face  Oral  Written  Visual  Electronic Communication in Administration 2

 Good for exchanging views, generating new ideas, spreading information and encouraging co- operation Interviews, meetings (video conferencing) Communication in Administration 3

 Does not have the same impact as face-to-face but does save travelling time Telephones, paging machines, public address systems Communication in Administration 4

 Advantage of permanence and traceability. It is helpful to keep a record. Letters, s, memos, reports, forms, organisation’s handbook and noticeboards Communication in Administration 5

 Most people can remember pictures rather than the written word. Charts, graphs, pictures, symbols, photographs. Communication in Administration 6

 Meetings  Electronic Diaries   Intranets (LAN)  Audio Conferencing  Video Conferencing  Video phones  Mobile phones  Presentations  Interactive whiteboards  LAN or WAN (Internet and Network meetings)  Instant messaging  Webcams  Wikis  Discussion groups  Blogs

 Write a brief description about each of the methods of communicating information from the previous slide.  Help from:  (pages 86-89, , Higher Admin book)  Internet

 Unless you have proof of what has been said (Written or recorded) people can often distort, not hear, not remember all that has been said  When information is written you cannot gauge intonation or instantly ask for clarification Communication in Administration 9

 Often called NOISE  NOISE is caused by incomplete information, too much information or lack of clarity in information

 As information is passed on it is often summarised. Technical jargon may be missed out because it is not fully understood.  Technical jargon may be used by specialists and may not be understood by the audience.

 Information may be changed as it is retold and passed from one person to another or it may be misinterpreted.

 Information may be missed because you are swamped by the volume of information facing you.

 The verbal communication may conflict with body language. The tone of voice, roll of the eyes or the way the information is given, may give the impression that the information is not that important.

 Some people may find it difficult to talk about certain issues so when passing information on it is important that people are comfortable with this.

 We all have different sets of vocabulary we use on different occasions.  You are likely to speak very differently to your friends compared to how you would speak to your grandparents.  You may use slang words but also speak at a different pace.  You may be careful about what you say with someone who is sensitive.

 This might be because they are nervous, eg at an interview or talking to a doctor  This might be because it’s bad news and they are filtering it.

 Upload an electronic presentation to the intranet – so that staff can view the contents of the presentation in their own time  the information with a ‘read receipt’ – to confirm that the /presentation has been received  Arrange a meeting to give a summary of the presentation – this allows any questions to be addressed/answered face to face

 Protect premises with alarm systems and security guards  Keep computers away from areas which the public can access  Restrict access to the building to those who need access and ensure visitors sign in  Ensure power supply to computers is stable  Use encryption for sensitive data  Ensure those who use portable devices or work from home are subject to the same security measures (passwords, back-ups)

 Only authorised users can gain access to the system using passwords  System administrator can trace what has been accessed  Remove access for employees who have left the organisation  Have different levels of access, which will only allow users to view information that they are authorised to view  Adopt an internet and policy for staff  Discourage opening s when unsure of sender  Electronic safeguards  Virus and content scanner  A firewall  Filtering and scanning software for  Filtering for website access  Intrusion detection systems

 File location There should be information on where files should be stored, for example which drive(s) contain forms and templates or which drive(s) you should store your personal work files on.  Folder structure and file names Guidelines on folder structures, folder names and file names should be given. This will make it easier for other staff to find files.

 Version control If you keep different versions of the same file it is important to know which is the most up-to- date. Everyone should know how to name the files and know which are drafts and which are final versions  Housekeeping procedures Staff should know when to delete files or where to archive old files. This helps ensure the servers do not end up full of old files which can result in the system performance being compromised..

 Back-up procedures These should be outlined, with details of who is responsible for it, and how often it is done.

 Organise the computer shared area very carefully by name folders – so that all files can be found easily  Have a system whereby files are kept up-to- date. Regularly review files to make sure they are accurate and relevant.  Archive files for a set time – Files should be deleted when no longer required.