CHAPTER 5: ELECTRONIC BUSINESS COMMUNICATIONS Creating and Delivering Messages that Matter

CHAPTER 5: ELECTRONIC BUSINESS
COMMUNICATIONS
Creating and Delivering Messages that Matter
COMMUNICATION CHANNELS: LEVELS OF
RICHNESS VARY
Memos/Reports
Very Low. No information from tone or body language.
E-Mail
Very Low. No information beyond words.
Instant Message
Very Low. Very few words lead to basic communication.
Voice Mail
Low. The audience gains tone but no body language.
Telephone Conversation
Moderate. The audience benefits from changes in your tone.
Videoconferencing
High. Conveys richness similar to in-person communication.
In-Person Presentation
High. Audience experiences all elements of message.
Face-Face Meeting
Very High. Audience experiences full message most directly.
ELECTRONIC WRITING

Blessing
 Faster
 Simpler
 Spelling/grammar

checkers
Curse
 Faster
 Simpler
 Spelling/grammar
checkers
SPELLBOUND
I have a spelling checker,
It came with my PC,
It plainly marks four my revue
Mistakes I cannot sea.
I’ve run this poem threw it,
I’m sure your pleased too no,
Its letter-perfect in it’s weigh,
My checker tolled me sew.
E-mail
E-mail

Do not rely on e-mail to address problems.


Balance work-related e-mail with telephone calls.



E-mail may enhance a business relationship, but it will not necessarily
build one.
Pick up the phone and have a conversation with that person as well.
Intentional or not, e-mail can sometimes come across as rude.


If there is a sticky situation that needs to be dealt with at work, do it
face-to-face. It will earn you respect in the long run.
It is easy to misread between the lines so at work, try to be extra
polite.
If your Internet access is through a corporate account, check
with your employer about their policy regarding private email.
Emoticons
9

Send mature messages at work.

Emoticons such as this smiley :-) in business e-mail, may be interpreted
as too casual.
Mr. Mathis,
Since we discussed emoticons in class today, I thought that you might find this funny.
Last year, when my daughter was in the second grade, she received an e-mail from
one of her classmates. It made her mad because he sent an emoticon with a smile
and a heart. She sent him the following reply:
Jeremiah that was not cool to put a smile and a heart. That means I love
you.
g-r-o-s-s spelles GROSS!!!!!!!!!! ew!!!!!!!!!!!!you are gross do not put this
again ew ew ew ew!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! DO NOT !!!!!!!!!!!! put this
insted do not put this ether or this
E-mail

Never send chain letters, they are forbidden on the Internet.





Notify you System Administrator if you receive one.
Do not send abusive or heated messages (flames).
Take care with addressing mail.
Allow time for mail to be received, and replied to, keeping in
mind time differences around the world and other people's busy
schedules.
If you want your mail to be read, don't make it too long unless
the receiver is expecting a verbose message. Over 100 lines is
considered long.
E-mail


If you are forwarding or re-posting a message, don't change the
original wording.
Use mixed case:
 UPPER CASE LOOKS AS IF YOU'RE SHOUTING



lower case shows lack of respect to the recipient
Mail should have a subject header that reflects the content of
the message.
AND REMEMBER: e-mails are forever
TIPS FOR EXCELLENT EMAIL

Consider both your primary and secondary readers.
Keep it short.
Don’t forget to proofread.
Use standard writing.
Avoid attachments.
Don’t assume privacy.
Avoid anything nearing “off-color”
E-mail belongs to your employer!
Respond promptly to e-mails.
Assume the best.
Create a compelling subject line.

Think before you write, and think again before you send!










Voicemail & Cell Phones
Your Voicemail Message


If an employer called and heard these voicemails what
perception do you think they would have?

Yo, this is Kelly, you know what to do and when to do it. Later….(beep)

This is Joe, I’m busy at the present moment. If this is Anthony, I’ll be
hangin’ until midnight having some brews with the guys. …(beep)
Let’s not forget ring tones…….keep them conservative, no
techno, hip-hop, mission impossible craziness – cackles, crying
etc….
Telephone and Voice Mail

If you return a phone call and you're forwarded to that
person's voice mail, let them know when and where you can
be reached:



"I'll be at my desk at 4:30 this afternoon if you want to call me then."
Return your calls in a timely manner. Ideally no more than
twenty-four hours should go by.
When leaving a voice-mail message, give your number at
both the beginning and end of the message.

If the recipient didn't write it down it at the beginning, they can either
catch it at the end or replay the message and catch it at the top.
Cell Phone


When on your cell phone, practice netiquette and avoid
screaming into your cell phone. The speaker on your cell
phone is very sensitive and can transmit your slightest
whisper.
Be sensitive to those around you, because believe it or not,
they don't want to hear your conversation.
Top 10 Cell Phone Etiquette Rules
People Still Break
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Talking too loudly.
Holding inappropriate conversations in public.
Rudely interrupting conversations.
Checking your phone at the movies.
Texting while driving.
Texting while talking.
Texting small talk.
Loud and annoying ringtones.
Disturbing live performances.
Location, location, location
Texting A&M student caused fatal
wreck
Jury decides that texting A&M student caused fatal wreck, orders him to pay
$22 million
FRANKLIN -- A jury that decided that a Texas A&M University student was texting
while driving and caused a deadly wreck ordered him to pay $22 million in
damages.
The victim, Megan Small of Houston, was a senior at Baylor University and was
driving to Waco when the November 2007 accident happened near Calvert.
The investigation indicated that a vehicle driven by Reed Vestal crossed the center
line and struck Small's vehicle head-on. Phone records indicated that Vestal sent and
received 15 texts and made seven calls in the 45 minutes before the wreck.
The damages will be shared with Small's friend Laura Gleffe, who was driving
another car that rolled during the crash.
Hunter Craft, attorney for the Small family, said Vestal declared bankruptcy before
the civil trial in Franklin.
An attorney for Vestal did not immediately comment.
Posted Friday, Mar. 19, 2010
Facebook
Facebook - Company Figures
20

More than 829 million active users

552 million active users log on to Facebook in any given day

More than 70 million users update their status each day

More than 60 million status updates posted each day

More than 3 billion photos uploaded to the site each month

More than 5 billion pieces of content (web links, news stories, blog posts,
notes, photo albums, etc.) shared each week

More than 3.5 million events created each month

More than 3 million active Pages on Facebook

More than 1.5 million local businesses have active Pages on Facebook

More than 20 million people become fans of Pages each day

Pages have created more than 5.3 billion fans
Facebook Issues




At several Kentucky universities, administrators have used
incriminating Facebook photographs to discipline students for
drinking in campus dorms.
After two students at Fisher College in Boston (one of them the Student
Council president) mocked and threatened a police officer on a
Facebook forum, they were immediately expelled.
Penn State police used Facebook to identify and discipline students
who rushed the field after the Ohio State football game last
October.
The University of California, Santa Barbara, has promised harsh
consequences for students posting pictures displaying “illegal
activity” on the virtual network.
Mild mannered Ray Clark
during the day
Same guy – is now expelled
from his private Christian
Academy
Employers Background Checking
Process



If you’ve got a profile on a social networking site such as
MySpace or Facebook, be prepared for potential employers to
view it. National Association of Colleges and Employers
More than one in 10 employers reported plans to review profiles
on social networking when considering candidates.
Profile information may have at least some effect on an
employer’s hiring decisions:

More than 60 percent of employers who review social networking sites said
the information gleaned there has at least some influence on their hiring
decisions.
Internet
Netiquette

"Netiquette" stands for "Internet Etiquette“
 refers
to the set of practices developed over the years
to make the Internet experience pleasant for everyone.
 Like
other forms of etiquette, netiquette is primarily
concerned with matters of courtesy in communications.
Naughty or Nice?



Installing software monitoring tools on your employees’
computers without them knowing it?
Selling information you have collected from your customers
without their knowledge to another business, if you believe that
your customers may actually benefit from having their personal
information available by that other business?
Accessing personal e-mail of co-workers when you were given
special access rights to the company’s databases so you may
maintain the servers?
Dos or Don’ts?





Pointing out the spelling/grammar errors in your
employee’s email?
Answering a message in all upper case/lower case
letters?
Replying “YES” to an email, without quoting?
Forwarding the private email message from your
supervisor to your employees?
You send a sarcastic message and include emoticons
to underscore the sarcasm?
What Do You Do?

You receive a particularly upsetting message from
your co-worker that has been cc’d to your boss.
What do you do?
A.
B.
C.
D.
Respond in e-mail immediately stating the fact that this
type of argument is not worth the bandwidth it takes to
send it.
You don’t respond at all
Wait overnight to send a response
None of the above
What Do You Do?

You receive a spam message that is offensive to you.
What do you do?
A.
B.
C.
D.
Click the link in the message to remove you from the list
Just delete the message and go on
Try to Contact the ISP of the Spammer
None of the Above
What Do You Do?

You just received a message from a very good
friend informing you of a new virus that has been
spreading on the Net. What do you do?
A.
B.
C.
D.
Immediately forward it to all your friends and relatives
Ignore it
Check the hoax web site or/and virus website for the
latest info
None of the above
What Do You Do?

You just received an email message from an
acquaintance with an attachment file entitled Thankyou.doc. What do you do?
A.
B.
C.
D.
Intrigued, you open it up
You delete it without opening it
You contact the friend to verify the authenticity of the
message
None of the above
What Do You Do?

You just received an exciting message from a colleague. In all
the excitement, you hit the reply button and elaborate in the
reply on the shortcomings of your current position. The
message goes to all the people subscribed to the listserv,
including your current boss. What do you do?
A.
B.
C.
D.
Put your head in the oven and turn on the gas.
Send an apology to the listserv and a private one to your
boss.
Ignore the situation
None of the above
Spam




On the Internet, the term spam refers to unwanted messages
posted to newsgroups or sent to a list of users through e-mail.
Most obnoxious form of spam
 unwanted commercial advertising.
 chain letters.
Spamming has become so pervasive that it’s estimated that
unwanted messages account for 5 to 30% of the 15 million
messages received by America Online subscribers each day.
Best way to Fight it – complain to spammer’s Internet provider
Hoaxes


Some pretty incredible hoaxes have been
propagated across the Internet. The hoaxes are
designed to prey upon people’s fears, sensitivities,
or desires to keep the hoax spreading to other
users over the Net.
The major hoaxes are catalogued
http://www.hoax-slayer.com/ where you can look
to see whether the hoax is a recognized one.
LEGAL HEAD, Adams and Co. Chambers.
892 Bulovard - Airport Road - Kumassi,
00233 Kumassi - GHANA.
Good day to you,
My name is Adam Clayton (Esq) From Ghana, I hope my message meets you in good health.
I wish to notify you (again) that you were listed as the beneficiary to a total sum of USD$4,750,000.00 (Four Million
Seven Hundred And Fifty Thousand United States Dollars) in the intent of the deceased (late) Madame Olivia. I
contacted you because you bear the same last name with my deceased client and therefore I can present you as the
beneficiary to the inheritance, since there is no written will from my late client. I received a notification from the Central
Bank (BANK OF GHANA H/Q) that the funds will be confiscated to Government's treasury account as abandoned funds
due to account in-activity for the past 14 Months since she passed away to glory (Natural Cardiac Arrest) at age 68, I
have two weeks only to present a beneficiary in order to avoid this action. Please, I am in need of your support, for I
cannot do this alone.
I am prepared to provide you with all the documents which might be required by the holding Bank to enable them
release this inheritance funds to you. All the papers work required will be processed in your acceptance of this deal as I
am prepared to offer you 45%, 45% for me, while 10% will be set aside for any expenses we pay for during this
transaction, that is to say that any money spent during the period of this transaction will be fully refunded once the fund
has been transferred into your nominated bank account or any other safer means you prefer. I request that you kindly
forward to me your letter of acceptance with the below details via my private email
(adamclayton@inbox.lv)
Your Full Name:
Full Address:
Personal Tel No.
Private Email:
Date of Birth:
I will truly appreciate your response.
Yours sincerely,
Adam Clayton (Esq)
Viruses




The best way to guard against catching a virus through e-mail
is never to open an attachment to an e-mail message.
One of the most harmful e-mail viruses was the Love Bug virus.
It spread as an attachment to an e-mail message entitled “I
Love You” and asked you to open the attachment, which was
named “LOVE-LETTER-FOR-YOU.TXT.VBS.”
It is also possible for macros in MS Word .doc files and MS
Excel .xls files to transmit viruses.
To find out about latest viruses, visit Symantec’s website
Safe and Responsible Use of the Internet













What you do reflects on you
Those are real people out there
Play by the rules
Keep it private
Look your best
Don’t pollute
Remain cool under fire
Read with your eyes open
Respect the creator – Credit the source
Watch where you are looking
Don’t take candy from strangers
Don’t go where you don’t belong
Do your part
Responsible Netizen Institute, http://www.responsiblenetizen.org , July 14, 2003