Download presentation
Presentation is loading. Please wait.
Published byViolet Cross Modified over 8 years ago
1
Lecture 3 1Norazirah Ayob, FEB
2
Ch 3 - 2 Technology advances allow individuals to self-select what, when, and where messages are sent and received.
3
Norazirah Ayob, FEBCh 3 - 3 Twitter and tweeting Social networking Other Internet resources Wikis, blogs, and Web 2.0 Search engines Videoconferencing Collaborative writing Hoteling
4
Identify the appropriate use of communication technology, including its legal and ethical implications Determine the purpose of the messages Determine whether the information is personal or confidential Cannot replace personal interaction Some news is better received in person Some may prefer a personal meeting Norazirah Ayob, FEB4
5
Facilitates the fast, convenient flow of information among users at various locations and time zones Increases efficiency Reduces cost Reduces paper waste Netiquette Check mail promptly Do not contribute to email overload Use email selectively Do not send messages when you are angry Exercise caution against email viruses and hoaxes Develop an effective system for handling email Norazirah Ayob, FEB5
6
Or online chat Popular – Skype Abbreviate common words or expressions to quicken conversations or reduce keystrokes Norazirah Ayob, FEB6
7
Web-based platforms or websites Connect people who share interests or activities Popular – Twitter & Facebook Norazirah Ayob, FEB7
8
Universal communication medium Reaching a broad audience in diverse locations Intranet – web platform to distribute info to employees Extranet – share info with business partners, vendors, suppliers & customers Norazirah Ayob, FEB8
9
Web users do not want to read, They skim, browse and hop English speaking readers typically start scanning at the top left-hand side Users can more quickly scan items in columns rather than rows Norazirah Ayob, FEB9
10
A personal journal published on the internet that can take many forms Online scrapbooks Personal diaries Users: bloggers Entries: posts Easily changed, without authorization to post, anyone can publish Norazirah Ayob, FEB10
11
Norazirah Ayob, FEBCh 3 - 11 Web-based communicators must abide by copyright laws Give credit for quoted material Seek permission to use copyrighted text & graphics Companies has right to monitor electronic mail of employees
12
Norazirah Ayob, FEBCh 3 - 12 Respect the rights, safety, and privacy of others. Don’t use mobile phones while driving Invasion of privacy - taking pictures of people without their knowledge
13
Norazirah Ayob, FEBCh 3 - 13 Has become a standard accessory Answer the phone quickly. Speak quietly and end the conversation quickly. Avoid taking or making calls when others are present. Protect the safety of yourself and others by not driving while using your mobile phone. Don’t text or read e-mail while talking face-to- face with others.
14
Norazirah Ayob, FEBCh 3 - 14 Retention schedules and systems for easy retrieval are needed. Recognize that e-mail is not private. Misuse of e-mail and Internet resources can threatens productivity, creates legal concerns, & endangers company’s image Example: Gossip, derogatory comments, lewd or obscene messages or graphics, harassing messages
15
Norazirah Ayob, FEBCh 3 - 15 Spam An e-mail sent to multiple persons who do not want to receive it Phishing An e-mail or phone message asking the receiver to provide personal information for the purpose of identity theft
16
Norazirah Ayob, FEBCh 3 - 16 Fraud – intentional unauthorized computer access to a wide variety of computer records Virus – a program that attaches to a file and replicates itself, corrupting data, or attempting to crash the computer Worm – a type of computer virus that steals computer resources
17
Norazirah Ayob, FEBCh 3 - 17 a legal right of the owner to control reproduction, distribution, and sale Written works, art, music, photographs, multimedia, computer software
18
Norazirah Ayob, FEBCh 3 - 18 Plagiarism Stealing and using someone else’s ideas or words as your own without giving the other person(s) credit as the source Cite the source ▪ when you quote another person’s words or ideas, and ▪ when you reword passages that express someone else’s ideas unless facts or general knowledge Software piracy Illegal copying of software
19
Norazirah Ayob, FEB19
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.