SlideShare una empresa de Scribd logo
1 de 38
Descargar para leer sin conexión
Email
Electronic Communications
Objectives
• Understand parts of an email
• Differentiate between good and bad emails
• Explain email etiquette
• Evaluate email security risks
• Write emails
Rev 10/2010 Report Writing —Email 2
Definition
Email is the electronic
transmission of
messages through a
computer network.
Rev 10/2010 Report Writing —Email 4
Rev 10/2010Report Writing —Email 5
blog.esudhir.com/.../2009/09/email-cartoon.JPG
Basics of Good Communication
• Know your audience
• Write to that audience
• Emphasize clarity
over cleverness
• Emphasis content
over expansiveness
• Two specific email violations
that bother instructors more
than students are emails not
signed by the message sender
and messages that include
shortcuts like "RU" instead of
"are you". Finally, it appears
that instructor generational
differences have little impact
on these descriptive findings.
• Stephens, Keri K.; Houser, Marian
L.; Cowan, Renee L. R U Able to Meat Me:
The Impact of Students' Overly Casual
Email Messages to Instructors (2009)
Rev 10/2010 Report Writing —Email 6
Design
• Use standard fonts
• Keep bolds, underlines, and italics to a minimum
• If using a priority system, be honest.
• Avoid backgrounds or stationary that detract
from the message.
Rev 10/2010 Report Writing —Email 7
!
Parts of an email
• Addressee
• Cc:
• Subject:
• Text
• Signature
• Attachments
Rev 10/2010 Report Writing —Email 8
Rev 10/2010Report Writing —Email 9
Outlook
Addressee
• The addressee is who
is to receive the email
• Capitalization is not
necessary
• Internal
• Check company
mailing list for name
• A company usually
has a corporate list in
Contacts
• External
• Use Internet email
name and service
• RSpeener@cci.edu
• Jsmith@workplace.net
Rev 10/2010 Report Writing —Email 10
Addressee
Rev 10/2010Report Writing —Email 11
Complimentary Copy
• Additional people being sent copies.
• If the recipients are all of equal importance, put them on
the To: line
• Use cc for courtesy copies
• Use bcc (blind copy) for sending copies without the
Addressee knowing. Use sparingly.
Rev 10/2010 Report Writing —Email 12
ComplimentaryCopy
Rev 10/2010Report Writing —Email 13
Subject
• Subject is a brief summary of the content
• Sometimes it is called RE
• Be concise
• Be precise
• Be current
Rev 10/2010 Report Writing —Email 14
Subject
Rev 10/2010Report Writing —Email 15
Text
• Always have text
• Get to the point
• Be brief
• Put most important information first
• Know the purpose
• Use attachments for longer document rather than
embedding
Rev 10/2010 Report Writing —Email 16
Text
Rev 10/2010Report Writing —Email 17
Signature Block
• Sender’s information
• Include
• Name
• Job title
• email address
• Company, Department
• Separate from text by two or three lines
Rev 10/2010 Report Writing —Email 18
SignatureBlock
Rev 10/2010Report Writing —Email 19
Attachments
Rev 10/2010Report Writing —Email 20
Attachments
• Attachments are files that are sent along with the email
• Use attachments for
• Long documents
• Pictures
• Copies of existing documents
Rev 10/2010 Report Writing —Email 21
OtherBasics
Rev 10/2010Report Writing —Email 22
Address Book
Font Control
Style
• Usually less formal
• It is somewhere between a conversation
and a memo
• Personal
• Business suitable
• Avoid excessive abbreviations
• Don’t be cute — use emoticons sparingly
Rev 10/2010Report Writing —Email 23
Never email something in bad taste!
Before Sending
• Check spelling
• Check grammar
• Check for clarity
• Check Addressee's name
• Don’t send emails when angry
• Remember telephones still exist – Is email the best way
to respond?
Rev 10/2010 Report Writing —Email 24
Rev 10/2010Report Writing —Email 25http://www.itsngenius.com/photos/albums/userpics/toon61.jpg
Managing
• Respond to emails promptly
• If given an assignment by email that will take several
days, acknowledge the assignment and the time
frame.
• Remove emails from active list frequently
• Archive frequently
Rev 10/2010 Report Writing —Email 26
REMEMBER
Rev 10/2010 Report Writing —Email 27
Emails are Forever
• Emails are never completely deleted
• They exist on files
• They exist in archives
• They exist in backups
• They exist on hard drives as ghosts
Rev 10/2010 Report Writing —Email 28
Security
Rev 10/2010 Report Writing —Email 29
Email and Security
• Emails and email attachments are a primary entry
method for computer viruses
• Viruses can spread extremely fast
• Computer crime is the growth sector of organized crime
Rev 10/2010 Report Writing —Email 30
Email Security
• Be skeptical
• Open an email from an unknown sender with caution
• Never open email attachments from an unknown sender
• Never give out passwords, social security numbers, bank
account numbers, etc.
Rev 10/2010 Report Writing —Email 31
Email Security Terms
• Virus – A type of software that run without your
knowledge, replicates itself and spreads to other
computers
• Trojan Horse– A type of virus that is intended to
do harm to the computer. It is usually hidden
inside something attractive, such as a cartoon
• Worm – a type of virus that spreads by Email
Rev 10/2010 Report Writing —Email 32
Email Security Terms
• Spam—Mass mailings
to know email users
• Phish—Requests for
personal information
from what appears to
be a trusted
organization; e.g.
personal bank
Rev 10/2010 Report Writing —Email 33
Internet Security Terms
• Zombie—Unauthorized use of a computer by
others for their personal reasons
• Bot—A web site that automatically transfers the
user to another undesired website
Rev 10/2010 Report Writing —Email 34
Internet Security Terms
• Adware—A program that automatically puts ads
(pop-ups) on the computer
• Spyware—A program that tracks one’s Internet
use. It may also track one’s keystrokes
(passwords etc.) and send it to a designated
recipient
Rev 10/2010 Report Writing —Email 35
Security Measures
• Have a good anti-virus
program
• Use a firewall
• Have good spyware and
adware filters
 Update regularly
• Have a good spam filter
• Update programs
frequently and quickly
• Do not open emails with
multiple forwards
• Be cautious in
downloading free or
shareware programs
• Be cautious in opening
emails from unknown
senders
• Be wary of attachments
Rev 10/2010 Report Writing —Email 36
Summary
• Be concise and precise
• Respond promptly
• Be professional
• Be aware of email
security
Rev 10/2010 Report Writing —Email 37
Examples
• Examples of Bad Email Messages
http://www.michaelhorowitz.com/bademails.html
Rev 10/2010 Report Writing —Email 38
Resources
• Netiquette by Virginia Shea (2004)
http://www.albion.com/netiquette/book/index.html
• Outlook 2007 Tutorial http://tamhsc.edu/information-
technology/tutorials/outlook2007-
tutorial/Outlook%202007%20Tutorial.pdf
• Information Security Guidelines
http://www.gov.mu/portal/goc/ncb/file/pdf.pdf
• Getting up to Speed with Microsoft Outlook 2007
http://office.microsoft.com/training/training.aspx?AssetID=R
C101153581033
Rev 10/2010Report Writing —Email 39

Más contenido relacionado

La actualidad más candente

Advantages & Disadvantages of Email
Advantages & Disadvantages of EmailAdvantages & Disadvantages of Email
Advantages & Disadvantages of EmailAnirudh Kannan
 
Mobile Reference, Mobile Librarians
Mobile Reference, Mobile LibrariansMobile Reference, Mobile Librarians
Mobile Reference, Mobile LibrariansDarcy Gervasio
 
Presentation on eMargin given to BCU Learning & Teaching Committee
Presentation on eMargin given to BCU Learning & Teaching CommitteePresentation on eMargin given to BCU Learning & Teaching Committee
Presentation on eMargin given to BCU Learning & Teaching CommitteeRDUES
 
E Mail And Forums In An Esl Classroom Teed 3035
E Mail And Forums In An Esl Classroom Teed 3035E Mail And Forums In An Esl Classroom Teed 3035
E Mail And Forums In An Esl Classroom Teed 3035Yaileen Filpo
 
Instant Messaging for Libraries
Instant Messaging for LibrariesInstant Messaging for Libraries
Instant Messaging for LibrariesAmanda Stone
 
adavantages and disadvanteges in email and blogs
adavantages and disadvanteges in email and blogsadavantages and disadvanteges in email and blogs
adavantages and disadvanteges in email and blogsalexandra
 
Social Media In An Eh World
Social Media In An Eh WorldSocial Media In An Eh World
Social Media In An Eh WorldSteve Lipton
 
Web tools assignment
Web tools assignmentWeb tools assignment
Web tools assignmentThomas Dilu
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12FUMINAEUN
 
Intellectual Property in Big Data Era: Opportunities and Challenges
Intellectual Property in Big Data Era: Opportunities and ChallengesIntellectual Property in Big Data Era: Opportunities and Challenges
Intellectual Property in Big Data Era: Opportunities and ChallengesAndré Mendes 安德烈
 

La actualidad más candente (15)

13. internet services
13. internet services13. internet services
13. internet services
 
Advantages & Disadvantages of Email
Advantages & Disadvantages of EmailAdvantages & Disadvantages of Email
Advantages & Disadvantages of Email
 
Mobile Reference, Mobile Librarians
Mobile Reference, Mobile LibrariansMobile Reference, Mobile Librarians
Mobile Reference, Mobile Librarians
 
Presentation on eMargin given to BCU Learning & Teaching Committee
Presentation on eMargin given to BCU Learning & Teaching CommitteePresentation on eMargin given to BCU Learning & Teaching Committee
Presentation on eMargin given to BCU Learning & Teaching Committee
 
E-MAIL
E-MAILE-MAIL
E-MAIL
 
E Mail And Forums In An Esl Classroom Teed 3035
E Mail And Forums In An Esl Classroom Teed 3035E Mail And Forums In An Esl Classroom Teed 3035
E Mail And Forums In An Esl Classroom Teed 3035
 
Instant Messaging for Libraries
Instant Messaging for LibrariesInstant Messaging for Libraries
Instant Messaging for Libraries
 
adavantages and disadvanteges in email and blogs
adavantages and disadvanteges in email and blogsadavantages and disadvanteges in email and blogs
adavantages and disadvanteges in email and blogs
 
Chat Technology
Chat TechnologyChat Technology
Chat Technology
 
Reshma technology 1
Reshma technology 1Reshma technology 1
Reshma technology 1
 
E‑mail
E‑mailE‑mail
E‑mail
 
Social Media In An Eh World
Social Media In An Eh WorldSocial Media In An Eh World
Social Media In An Eh World
 
Web tools assignment
Web tools assignmentWeb tools assignment
Web tools assignment
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12
 
Intellectual Property in Big Data Era: Opportunities and Challenges
Intellectual Property in Big Data Era: Opportunities and ChallengesIntellectual Property in Big Data Era: Opportunities and Challenges
Intellectual Property in Big Data Era: Opportunities and Challenges
 

Destacado (6)

Function
FunctionFunction
Function
 
Subject verb agreement
Subject verb agreementSubject verb agreement
Subject verb agreement
 
Bias.pdf
Bias.pdfBias.pdf
Bias.pdf
 
Doors
DoorsDoors
Doors
 
Fragments & run ons
Fragments & run onsFragments & run ons
Fragments & run ons
 
Structure
StructureStructure
Structure
 

Similar a EMail.pdf

Business English - Writing Workplace1.ppt
Business English - Writing Workplace1.pptBusiness English - Writing Workplace1.ppt
Business English - Writing Workplace1.pptabdelrahman allam
 
Business English - Writing Workplace1.ppt
Business English - Writing Workplace1.pptBusiness English - Writing Workplace1.ppt
Business English - Writing Workplace1.pptSabrina377028
 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8William Mann
 
Using Technology to Improve Communication
Using Technology to Improve CommunicationUsing Technology to Improve Communication
Using Technology to Improve CommunicationSophia Abigayle
 
Technical report writing of English communication.pdf
Technical report writing of English communication.pdfTechnical report writing of English communication.pdf
Technical report writing of English communication.pdfawaisiqbal132453
 
Effective E- mailing
Effective E- mailingEffective E- mailing
Effective E- mailingDimple
 
L5_Electronic communication.pptx
L5_Electronic communication.pptxL5_Electronic communication.pptx
L5_Electronic communication.pptxenukahansana
 
Understanding Email Traffic (talk @ E-Discovery NL Symposium)
Understanding Email Traffic (talk @ E-Discovery NL Symposium)Understanding Email Traffic (talk @ E-Discovery NL Symposium)
Understanding Email Traffic (talk @ E-Discovery NL Symposium)David Graus
 
New powerpoint file
New powerpoint fileNew powerpoint file
New powerpoint fileUmesh Majhi
 
webservices.pptx
webservices.pptxwebservices.pptx
webservices.pptxHelenToms3
 
Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...
Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...
Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...AbeerTariq7
 
web services grp ppt.pptx
web services grp ppt.pptxweb services grp ppt.pptx
web services grp ppt.pptxHelenToms3
 
web services grp ppt.pptx
web services grp ppt.pptxweb services grp ppt.pptx
web services grp ppt.pptxArdraD1
 
web services grp ppt.pptx
web services grp ppt.pptxweb services grp ppt.pptx
web services grp ppt.pptxHelenToms3
 

Similar a EMail.pdf (20)

Business English - Writing Workplace1.ppt
Business English - Writing Workplace1.pptBusiness English - Writing Workplace1.ppt
Business English - Writing Workplace1.ppt
 
Business English - Writing Workplace1.ppt
Business English - Writing Workplace1.pptBusiness English - Writing Workplace1.ppt
Business English - Writing Workplace1.ppt
 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8
 
Using Technology to Improve Communication
Using Technology to Improve CommunicationUsing Technology to Improve Communication
Using Technology to Improve Communication
 
Technical report writing of English communication.pdf
Technical report writing of English communication.pdfTechnical report writing of English communication.pdf
Technical report writing of English communication.pdf
 
L42 slides
L42 slidesL42 slides
L42 slides
 
Email writing skills
Email writing skillsEmail writing skills
Email writing skills
 
Effective E- mailing
Effective E- mailingEffective E- mailing
Effective E- mailing
 
L5_Electronic communication.pptx
L5_Electronic communication.pptxL5_Electronic communication.pptx
L5_Electronic communication.pptx
 
Understanding Email Traffic (talk @ E-Discovery NL Symposium)
Understanding Email Traffic (talk @ E-Discovery NL Symposium)Understanding Email Traffic (talk @ E-Discovery NL Symposium)
Understanding Email Traffic (talk @ E-Discovery NL Symposium)
 
E-Mails Etiquette
E-Mails EtiquetteE-Mails Etiquette
E-Mails Etiquette
 
New powerpoint file
New powerpoint fileNew powerpoint file
New powerpoint file
 
webservices.pptx
webservices.pptxwebservices.pptx
webservices.pptx
 
Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...
Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...
Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...
 
web services grp ppt.pptx
web services grp ppt.pptxweb services grp ppt.pptx
web services grp ppt.pptx
 
web services grp ppt.pptx
web services grp ppt.pptxweb services grp ppt.pptx
web services grp ppt.pptx
 
web services grp ppt.pptx
web services grp ppt.pptxweb services grp ppt.pptx
web services grp ppt.pptx
 
Web services
Web services Web services
Web services
 
web services grp
web services grp web services grp
web services grp
 
web services
web services web services
web services
 

Más de Ronald Speener (20)

Workflow managemet
Workflow managemetWorkflow managemet
Workflow managemet
 
Teamwork
TeamworkTeamwork
Teamwork
 
Communication skills
Communication skillsCommunication skills
Communication skills
 
Leadership and management
Leadership and managementLeadership and management
Leadership and management
 
Ronald Speener Interactive Resume
Ronald Speener Interactive ResumeRonald Speener Interactive Resume
Ronald Speener Interactive Resume
 
Learning
Learning Learning
Learning
 
Introduction to poetry
Introduction to poetryIntroduction to poetry
Introduction to poetry
 
Verbs
VerbsVerbs
Verbs
 
Pronoun other
Pronoun otherPronoun other
Pronoun other
 
Pronouns case
Pronouns casePronouns case
Pronouns case
 
Pronoun personal
Pronoun personalPronoun personal
Pronoun personal
 
Critical process
Critical processCritical process
Critical process
 
Communication
CommunicationCommunication
Communication
 
Thesis statement
Thesis statementThesis statement
Thesis statement
 
Introductions
IntroductionsIntroductions
Introductions
 
Details
DetailsDetails
Details
 
Concluding
ConcludingConcluding
Concluding
 
Intellectual Property.pdf
Intellectual Property.pdfIntellectual Property.pdf
Intellectual Property.pdf
 
Graphics.pdf
Graphics.pdfGraphics.pdf
Graphics.pdf
 
SURVEY WRITING.pdf
SURVEY WRITING.pdfSURVEY WRITING.pdf
SURVEY WRITING.pdf
 

Último

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

EMail.pdf

  • 2. Objectives • Understand parts of an email • Differentiate between good and bad emails • Explain email etiquette • Evaluate email security risks • Write emails Rev 10/2010 Report Writing —Email 2
  • 3. Definition Email is the electronic transmission of messages through a computer network. Rev 10/2010 Report Writing —Email 4
  • 4. Rev 10/2010Report Writing —Email 5 blog.esudhir.com/.../2009/09/email-cartoon.JPG
  • 5. Basics of Good Communication • Know your audience • Write to that audience • Emphasize clarity over cleverness • Emphasis content over expansiveness • Two specific email violations that bother instructors more than students are emails not signed by the message sender and messages that include shortcuts like "RU" instead of "are you". Finally, it appears that instructor generational differences have little impact on these descriptive findings. • Stephens, Keri K.; Houser, Marian L.; Cowan, Renee L. R U Able to Meat Me: The Impact of Students' Overly Casual Email Messages to Instructors (2009) Rev 10/2010 Report Writing —Email 6
  • 6. Design • Use standard fonts • Keep bolds, underlines, and italics to a minimum • If using a priority system, be honest. • Avoid backgrounds or stationary that detract from the message. Rev 10/2010 Report Writing —Email 7 !
  • 7. Parts of an email • Addressee • Cc: • Subject: • Text • Signature • Attachments Rev 10/2010 Report Writing —Email 8
  • 8. Rev 10/2010Report Writing —Email 9 Outlook
  • 9. Addressee • The addressee is who is to receive the email • Capitalization is not necessary • Internal • Check company mailing list for name • A company usually has a corporate list in Contacts • External • Use Internet email name and service • RSpeener@cci.edu • Jsmith@workplace.net Rev 10/2010 Report Writing —Email 10
  • 11. Complimentary Copy • Additional people being sent copies. • If the recipients are all of equal importance, put them on the To: line • Use cc for courtesy copies • Use bcc (blind copy) for sending copies without the Addressee knowing. Use sparingly. Rev 10/2010 Report Writing —Email 12
  • 13. Subject • Subject is a brief summary of the content • Sometimes it is called RE • Be concise • Be precise • Be current Rev 10/2010 Report Writing —Email 14
  • 15. Text • Always have text • Get to the point • Be brief • Put most important information first • Know the purpose • Use attachments for longer document rather than embedding Rev 10/2010 Report Writing —Email 16
  • 17. Signature Block • Sender’s information • Include • Name • Job title • email address • Company, Department • Separate from text by two or three lines Rev 10/2010 Report Writing —Email 18
  • 20. Attachments • Attachments are files that are sent along with the email • Use attachments for • Long documents • Pictures • Copies of existing documents Rev 10/2010 Report Writing —Email 21
  • 21. OtherBasics Rev 10/2010Report Writing —Email 22 Address Book Font Control
  • 22. Style • Usually less formal • It is somewhere between a conversation and a memo • Personal • Business suitable • Avoid excessive abbreviations • Don’t be cute — use emoticons sparingly Rev 10/2010Report Writing —Email 23 Never email something in bad taste!
  • 23. Before Sending • Check spelling • Check grammar • Check for clarity • Check Addressee's name • Don’t send emails when angry • Remember telephones still exist – Is email the best way to respond? Rev 10/2010 Report Writing —Email 24
  • 24. Rev 10/2010Report Writing —Email 25http://www.itsngenius.com/photos/albums/userpics/toon61.jpg
  • 25. Managing • Respond to emails promptly • If given an assignment by email that will take several days, acknowledge the assignment and the time frame. • Remove emails from active list frequently • Archive frequently Rev 10/2010 Report Writing —Email 26
  • 26. REMEMBER Rev 10/2010 Report Writing —Email 27
  • 27. Emails are Forever • Emails are never completely deleted • They exist on files • They exist in archives • They exist in backups • They exist on hard drives as ghosts Rev 10/2010 Report Writing —Email 28
  • 28. Security Rev 10/2010 Report Writing —Email 29
  • 29. Email and Security • Emails and email attachments are a primary entry method for computer viruses • Viruses can spread extremely fast • Computer crime is the growth sector of organized crime Rev 10/2010 Report Writing —Email 30
  • 30. Email Security • Be skeptical • Open an email from an unknown sender with caution • Never open email attachments from an unknown sender • Never give out passwords, social security numbers, bank account numbers, etc. Rev 10/2010 Report Writing —Email 31
  • 31. Email Security Terms • Virus – A type of software that run without your knowledge, replicates itself and spreads to other computers • Trojan Horse– A type of virus that is intended to do harm to the computer. It is usually hidden inside something attractive, such as a cartoon • Worm – a type of virus that spreads by Email Rev 10/2010 Report Writing —Email 32
  • 32. Email Security Terms • Spam—Mass mailings to know email users • Phish—Requests for personal information from what appears to be a trusted organization; e.g. personal bank Rev 10/2010 Report Writing —Email 33
  • 33. Internet Security Terms • Zombie—Unauthorized use of a computer by others for their personal reasons • Bot—A web site that automatically transfers the user to another undesired website Rev 10/2010 Report Writing —Email 34
  • 34. Internet Security Terms • Adware—A program that automatically puts ads (pop-ups) on the computer • Spyware—A program that tracks one’s Internet use. It may also track one’s keystrokes (passwords etc.) and send it to a designated recipient Rev 10/2010 Report Writing —Email 35
  • 35. Security Measures • Have a good anti-virus program • Use a firewall • Have good spyware and adware filters  Update regularly • Have a good spam filter • Update programs frequently and quickly • Do not open emails with multiple forwards • Be cautious in downloading free or shareware programs • Be cautious in opening emails from unknown senders • Be wary of attachments Rev 10/2010 Report Writing —Email 36
  • 36. Summary • Be concise and precise • Respond promptly • Be professional • Be aware of email security Rev 10/2010 Report Writing —Email 37
  • 37. Examples • Examples of Bad Email Messages http://www.michaelhorowitz.com/bademails.html Rev 10/2010 Report Writing —Email 38
  • 38. Resources • Netiquette by Virginia Shea (2004) http://www.albion.com/netiquette/book/index.html • Outlook 2007 Tutorial http://tamhsc.edu/information- technology/tutorials/outlook2007- tutorial/Outlook%202007%20Tutorial.pdf • Information Security Guidelines http://www.gov.mu/portal/goc/ncb/file/pdf.pdf • Getting up to Speed with Microsoft Outlook 2007 http://office.microsoft.com/training/training.aspx?AssetID=R C101153581033 Rev 10/2010Report Writing —Email 39