Download presentation
Presentation is loading. Please wait.
Published byBeverley Morrison Modified over 8 years ago
1
© Prentice Hall, 2003 Business Communication TodayChapter B - 1 Communicating Through the Internet and Other Technologies
2
© Prentice Hall, 2003 Business Communication TodayChapter B - 2 Communicating in the Internet Age Internet E-mail Voice Mail Faxes Building Products Running Operations Delivering Services
3
© Prentice Hall, 2003 Business Communication TodayChapter B - 3 Understanding the Internet Internet Service Provider World Wide Web Dial-up modem DSL or cable Wireless access Multimedia Web browser Website
4
© Prentice Hall, 2003 Business Communication TodayChapter B - 4 What Is a Uniform Resource Locator?
5
© Prentice Hall, 2003 Business Communication TodayChapter B - 5 What Is a Uniform Resource Locator? Hypertext Transfer Protocol World Wide Web DomainName Top Level Domain http://www.yahoo.com
6
© Prentice Hall, 2003 Business Communication TodayChapter B - 6 Business on the Internet Share internal data Promote telecommuting Recruit new employees Locate external information Find business partners and customers
7
© Prentice Hall, 2003 Business Communication TodayChapter B - 7 Purchase parts and materials Promote and sell goods and services Facilitate customer support Collaborate with business partners Publicize business developments Business on the Internet
8
© Prentice Hall, 2003 Business Communication TodayChapter B - 8 NewsGroupsNewsGroupsEmailEmail TelnetTelnetFileTransfersFileTransfers Video-ConferencingVideo-ConferencingInstantMessagesInstantMessages Discussion Mailing Lists Discussion TelephonyTelephony InternetCommunicationInternetCommunication
9
© Prentice Hall, 2003 Business Communication TodayChapter B - 9 What Is an Intranet? Job OpeningsJob Openings Policy ManualsPolicy Manuals Benefits InformationBenefits Information Company InformationCompany Information Presentation MaterialsPresentation Materials
10
© Prentice Hall, 2003 Business Communication TodayChapter B - 10 What Is an Extranet? Suppliers Customers Clients Colleagues
11
© Prentice Hall, 2003 Business Communication TodayChapter B - 11 Other Communication Technologies TelephoneSystems Speech-RecognitionSoftware Voice Mail Systems Hand-Held Computing Devices
12
© Prentice Hall, 2003 Business Communication TodayChapter B - 12 Confronting Information Overload Note Routine Messages Flag Urgent Messages Limit E-Mail Use Send Fewer Messages
13
© Prentice Hall, 2003 Business Communication TodayChapter B - 13 Threats to Data Security Hacking Cyberterrorism Cracking Corporate Networks Electronic Data Management Global Networks
14
© Prentice Hall, 2003 Business Communication TodayChapter B - 14 Maintaining Data Security Firewall software Restricted network access Enforcement and education Background checks Strong security policies Data-recovery plans
15
© Prentice Hall, 2003 Business Communication TodayChapter B - 15 The Wired Workplace Productivity Lawsuits Privacy ElectronicMailElectronicMail World Wide Web and Internet World Wide Web and Internet Company Policy
16
© Prentice Hall, 2003 Business Communication TodayChapter B - 16 Sabotage and Theft Employees Contractors Consultants Hackers Viruses Worms Internal Threats External Threats
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.