Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lecture 3 1Norazirah Ayob, FEB. Ch 3 - 2  Technology advances allow individuals to self-select  what,  when, and  where messages are sent and received.

Similar presentations


Presentation on theme: "Lecture 3 1Norazirah Ayob, FEB. Ch 3 - 2  Technology advances allow individuals to self-select  what,  when, and  where messages are sent and received."— Presentation transcript:

1 Lecture 3 1Norazirah Ayob, FEB

2 Ch 3 - 2  Technology advances allow individuals to self-select  what,  when, and  where messages are sent and received.

3 Norazirah Ayob, FEBCh 3 - 3  Twitter and tweeting  Social networking  Other Internet resources  Wikis, blogs, and Web 2.0  Search engines  Videoconferencing  Collaborative writing  Hoteling

4  Identify the appropriate use of communication technology, including its legal and ethical implications  Determine the purpose of the messages  Determine whether the information is personal or confidential  Cannot replace personal interaction  Some news is better received in person  Some may prefer a personal meeting Norazirah Ayob, FEB4

5  Facilitates the fast, convenient flow of information among users at various locations and time zones  Increases efficiency  Reduces cost  Reduces paper waste  Netiquette  Check mail promptly  Do not contribute to email overload  Use email selectively  Do not send messages when you are angry  Exercise caution against email viruses and hoaxes  Develop an effective system for handling email Norazirah Ayob, FEB5

6  Or online chat  Popular – Skype  Abbreviate common words or expressions to quicken conversations or reduce keystrokes Norazirah Ayob, FEB6

7  Web-based platforms or websites  Connect people who share interests or activities  Popular – Twitter & Facebook Norazirah Ayob, FEB7

8  Universal communication medium  Reaching a broad audience in diverse locations  Intranet – web platform to distribute info to employees  Extranet – share info with business partners, vendors, suppliers & customers Norazirah Ayob, FEB8

9  Web users do not want to read, They skim, browse and hop  English speaking readers typically start scanning at the top left-hand side  Users can more quickly scan items in columns rather than rows Norazirah Ayob, FEB9

10  A personal journal published on the internet that can take many forms  Online scrapbooks  Personal diaries  Users: bloggers  Entries: posts  Easily changed, without authorization to post, anyone can publish Norazirah Ayob, FEB10

11 Norazirah Ayob, FEBCh 3 - 11  Web-based communicators must abide by copyright laws  Give credit for quoted material  Seek permission to use copyrighted text & graphics  Companies has right to monitor electronic mail of employees

12 Norazirah Ayob, FEBCh 3 - 12  Respect the rights, safety, and privacy of others.  Don’t use mobile phones while driving  Invasion of privacy - taking pictures of people without their knowledge

13 Norazirah Ayob, FEBCh 3 - 13  Has become a standard accessory  Answer the phone quickly.  Speak quietly and end the conversation quickly.  Avoid taking or making calls when others are present.  Protect the safety of yourself and others by not driving while using your mobile phone.  Don’t text or read e-mail while talking face-to- face with others.

14 Norazirah Ayob, FEBCh 3 - 14  Retention schedules and systems for easy retrieval are needed.  Recognize that e-mail is not private.  Misuse of e-mail and Internet resources can threatens productivity, creates legal concerns, & endangers company’s image  Example: Gossip, derogatory comments, lewd or obscene messages or graphics, harassing messages

15 Norazirah Ayob, FEBCh 3 - 15  Spam  An e-mail sent to multiple persons who do not want to receive it  Phishing  An e-mail or phone message asking the receiver to provide personal information for the purpose of identity theft

16 Norazirah Ayob, FEBCh 3 - 16  Fraud – intentional unauthorized computer access to a wide variety of computer records  Virus – a program that attaches to a file and replicates itself, corrupting data, or attempting to crash the computer  Worm – a type of computer virus that steals computer resources

17 Norazirah Ayob, FEBCh 3 - 17  a legal right of the owner to control reproduction, distribution, and sale  Written works, art, music, photographs, multimedia, computer software

18 Norazirah Ayob, FEBCh 3 - 18  Plagiarism  Stealing and using someone else’s ideas or words as your own without giving the other person(s) credit as the source  Cite the source ▪ when you quote another person’s words or ideas, and ▪ when you reword passages that express someone else’s ideas unless facts or general knowledge  Software piracy  Illegal copying of software

19 Norazirah Ayob, FEB19


Download ppt "Lecture 3 1Norazirah Ayob, FEB. Ch 3 - 2  Technology advances allow individuals to self-select  what,  when, and  where messages are sent and received."

Similar presentations


Ads by Google