Lecture 3 1Norazirah Ayob, FEB
Ch Technology advances allow individuals to self-select what, when, and where messages are sent and received.
Norazirah Ayob, FEBCh Twitter and tweeting Social networking Other Internet resources Wikis, blogs, and Web 2.0 Search engines Videoconferencing Collaborative writing Hoteling
Identify the appropriate use of communication technology, including its legal and ethical implications Determine the purpose of the messages Determine whether the information is personal or confidential Cannot replace personal interaction Some news is better received in person Some may prefer a personal meeting Norazirah Ayob, FEB4
Facilitates the fast, convenient flow of information among users at various locations and time zones Increases efficiency Reduces cost Reduces paper waste Netiquette Check mail promptly Do not contribute to overload Use selectively Do not send messages when you are angry Exercise caution against viruses and hoaxes Develop an effective system for handling Norazirah Ayob, FEB5
Or online chat Popular – Skype Abbreviate common words or expressions to quicken conversations or reduce keystrokes Norazirah Ayob, FEB6
Web-based platforms or websites Connect people who share interests or activities Popular – Twitter & Facebook Norazirah Ayob, FEB7
Universal communication medium Reaching a broad audience in diverse locations Intranet – web platform to distribute info to employees Extranet – share info with business partners, vendors, suppliers & customers Norazirah Ayob, FEB8
Web users do not want to read, They skim, browse and hop English speaking readers typically start scanning at the top left-hand side Users can more quickly scan items in columns rather than rows Norazirah Ayob, FEB9
A personal journal published on the internet that can take many forms Online scrapbooks Personal diaries Users: bloggers Entries: posts Easily changed, without authorization to post, anyone can publish Norazirah Ayob, FEB10
Norazirah Ayob, FEBCh Web-based communicators must abide by copyright laws Give credit for quoted material Seek permission to use copyrighted text & graphics Companies has right to monitor electronic mail of employees
Norazirah Ayob, FEBCh Respect the rights, safety, and privacy of others. Don’t use mobile phones while driving Invasion of privacy - taking pictures of people without their knowledge
Norazirah Ayob, FEBCh Has become a standard accessory Answer the phone quickly. Speak quietly and end the conversation quickly. Avoid taking or making calls when others are present. Protect the safety of yourself and others by not driving while using your mobile phone. Don’t text or read while talking face-to- face with others.
Norazirah Ayob, FEBCh Retention schedules and systems for easy retrieval are needed. Recognize that is not private. Misuse of and Internet resources can threatens productivity, creates legal concerns, & endangers company’s image Example: Gossip, derogatory comments, lewd or obscene messages or graphics, harassing messages
Norazirah Ayob, FEBCh Spam An sent to multiple persons who do not want to receive it Phishing An or phone message asking the receiver to provide personal information for the purpose of identity theft
Norazirah Ayob, FEBCh Fraud – intentional unauthorized computer access to a wide variety of computer records Virus – a program that attaches to a file and replicates itself, corrupting data, or attempting to crash the computer Worm – a type of computer virus that steals computer resources
Norazirah Ayob, FEBCh a legal right of the owner to control reproduction, distribution, and sale Written works, art, music, photographs, multimedia, computer software
Norazirah Ayob, FEBCh Plagiarism Stealing and using someone else’s ideas or words as your own without giving the other person(s) credit as the source Cite the source ▪ when you quote another person’s words or ideas, and ▪ when you reword passages that express someone else’s ideas unless facts or general knowledge Software piracy Illegal copying of software
Norazirah Ayob, FEB19