Chapter 3 Technological, Legal, and Ethical Considerations 3.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
4.01 Targeted s. Considerations for Effective E- mail Marketing Content of message Content of message Recipients of message Recipients of message.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
Pace E-newsletter Media Kit & Advertising Rates Pace Performance is one of the most recognized e-commerce companies in the automotive parts industry reaching.
Internet Safety/Cyber Ethics
GROUP MEMBERS: -INA -FIDZA. ADVANTAGES Introduction:  Internet has been perhaps the most outstanding innovation in the field of communication in the.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
TOPICS COVERED Can you do these things? INTERNET FOR SENIORS.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 5 Print and Electronic Messages
Understanding and Building Basic Networks Chapter 3 The Other Internet.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
SEM A - Promotion PE – Develop content for use in marketing communications to create interest in product/business/idea PI – Write marketing.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Cyber Crimes.
Communicating Information: and Attachments.
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
Legal & Ethical Issues Affecting E-Marketing The student will be able to: Distinguish between what is legal and what is ethical Distinguish between what.
English Thesis Statement After you take your notes, you need to write a thesis statement. Your thesis statement will be the last sentence of your.
Computer Technology, Mrs. Tom. Using technology in a safe, legal, and responsible way Netiquette – Proper etiquette used in electronic communications.
3.05 Develop content for use in marketing communications to create interest in product/business/idea.
Computer Importance in Children Hundreds of schools in America are still not capable of supplying computer access to students. Was ZapMe a solution?
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
Chapter Copyright © 2009 by Nelson Education Limited. INTERNET MARKETING Prepared by Simon Hudson, Haskayne School of Business University of Calgary.
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
XP New Perspectives on The Internet, Fifth Edition— Comprehensive, 2005 Update Tutorial 7 1 Mass Communication on the Internet Using Mailing Lists Tutorial.
3.07 Develop Content to Generate Interest. Terms Blind Carbon Copy (BCC): keeps recipients from seeing who else is receiving the same ; used in.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
 2001,Hamsi. All rights reserved. branding in the virtual world.
Chapter 7 Goodwill Message 7 Chapter 7Krizan Business Communication ©20052 Why are congratulation messages effective in building goodwill?
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
AUP, Netiquette, Copyright & Fair Use Wilkes University – Internet Literacy for Educators Cathy W. Dowd Spring 2009.
ONLINE SERVICES ADVERTISING. ONLINE ADVERTISING Search Engine Results Pages Companies register with large search engines so that their websites appear.
1 Ch. 18 Personal Selling Personal selling is the face-to-face presentation of a product/service or an idea to a potential customer by a representative.
CHAPTER 17 INTERNATIONAL MARKETING IN E-COMMERCE.
SEM A - Promotion PE – Develop content for use in marketing communications to create interest in product/business/idea PI – Write marketing.
Chapter 10-4 PLAN PROMOTION.  Any form of communication used to inform, persuade, or remind  Used to influence knowledge, beliefs, and actions about.
Theme 1: Expansion of the home office Topic 3: Become more comfortable with Internet Explorer and Textbook: Chapter 1.2, P
1 Ch. 18 Personal Selling Personal selling is the face-to-face presentation of a product/service or an idea to a potential customer by a representative.
Chapter 4 Intranets and Extranets. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Introduction Technical Infrastructure Planning.
Principles of Marketing
InternetInternet ISYS 1050 K. Steere. What is the Internet? A collection of local, regional, national, and international computer networks that are linked.
2.04 Information Gathering. Sources of Internal Sport/Event Records Tickets sold Merchandise sold Invoices Purchase orders Technology.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
What is the Internet?. The Internet is millions of computers all over the world connected together so they can exchange information.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
 Definition  How thieves steal identity  Origin  Possible impacts on the small island nation of Vanuatu  Precaution Measures.
ITeach Session 3 of 16 Communicating and Collaborating with Outlook .
Electronic Newsletter Options
Physical Safety Issues
Using Apps to Get and Share Information
Physical Safety Issues
LESSON 2.4 Shopping on the Net
قواعد تبلیغ در حقوق تجارت الکترونیک
Social Issues in Computing
LEGAL TERMS IN DIGITAL MEDIA
Social Issues in Computing
Physical Safety Issues
3.05 Develop content for use in marketing communications to create interest in product/business/idea.
TOPICS COVERED Can you do these things? INTERNET FOR SENIORS.
SEM A - Promotion PE – Develop content for use in marketing communications to create interest in product/business/idea PI – Write marketing.
Presentation transcript:

Chapter 3 Technological, Legal, and Ethical Considerations 3

Chapter 3Krizan Business Communication ©20052 How can companies use Web Pages to market their goods and services?

Chapter 3Krizan Business Communication ©20053 Web sites feature companies’  addresses  Business addresses  Advertising information  Product information  Order forms

Chapter 3Krizan Business Communication ©20054 Compare and contrast primary and secondary research.

Chapter 3Krizan Business Communication ©20055 Both are methods for gathering data to gain knowledge.

Chapter 3Krizan Business Communication ©20056 Primary research refers to gathering information from original sources.

Chapter 3Krizan Business Communication ©20057 Secondary research is locating and studying information gathered by other researchers.

Chapter 3Krizan Business Communication ©20058 Give examples of pros and cons for telecommuting employees.

Chapter 3Krizan Business Communication ©20059 Pros  Creates greater flexibility  Increases productivity  Decreases employee turnover  Reduces need for costly office space

Chapter 3Krizan Business Communication © Cons  Minimizes office face-time  Promotes worker isolation  Creates non-standard work week  Necessitates productive home work environment

Chapter 3Krizan Business Communication © How could employees misuse and the Internet?

Chapter 3Krizan Business Communication © Employees misuse e- mail and the Internet when they  Send personal messages  Forward jokes  Play games  Surf the net

Chapter 3Krizan Business Communication © What is spam?

Chapter 3Krizan Business Communication © Spam is unwanted bulk with copies of the same message going to multiple persons.

Chapter 3Krizan Business Communication © What problems can spam cause ?

Chapter 3Krizan Business Communication © Spam mass mailings may advertise questionable products or services.

Chapter 3Krizan Business Communication © Responding to spam can lead to  More spam  Harassment  Identity theft  Credit card theft

Chapter 3Krizan Business Communication © Compare and contrast plagiarism and paraphrasing.

Chapter 3Krizan Business Communication © Both terms refer to using others’ ideas.

Chapter 3Krizan Business Communication © Plagiarism is using ideas of others without giving them credit.

Chapter 3Krizan Business Communication © Paraphrasing is using your own words to restate the original meaning of other’s ideas.

Chapter 3Krizan Business Communication © How have “Plain English” laws helped consumers?

Chapter 3Krizan Business Communication © “Plain English” laws help assure consumers can understand business documents.