SlideShare a Scribd company logo
1 of 1
5
Berthalyne Wea
Business Communications II
November 21, 2014
Misuse of Email
Email is a medium commonly misused by communicators. Some examples of misuse are
sharing sensitive materials, using email for conversation, and sending inappropriate contents.
Problems can arise due to these behaviors. A person’s reputation can be questioned, which may
lead to the loss of opportunities. Strategies can be implemented to prevent the misuse and abuse
of email (Downing, et. al., 2014).
Although there are many strategies that can be used to prevent the misuse of email, there
are five strategies that can be followed. First, “do not use email to discuss confidential
information” (Downing, et. al., 2014, p. 316). It is inappropriate to send confidential material
because others could read it. Second, avoid sending offensive material through emails. Sending
offensive materials through email may cause one’s company to be held liable in court if
applicable. Third, always ask permission before forwarding messages or attachments. “You may
be infringing on copyright laws or violating a colleague’s trust” (Downing, et. al., 2014, p. 316).
Next, do not capitalize messages when sending an email. Doing so could send a message of
aggression or rudeness. Last, review what was written before sending it. Proofreading a message
for any errors or potential of misunderstanding prevents miscommunication (Downing, et. al.,
2014).
The misuse or abuse of email can resort to complications. The five rules discussed
included not using email when discussing confidential subject matters, avoiding sending
offensive contents, not forwarding messages or attachments without permission, reading a
message before sending it, and avoiding using capitals when writing an email. Abusing and
misusing email inappropriately can tarnish a person’s reputations.

More Related Content

What's hot

Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
Mazni Salleh
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullying
hoskei
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
Trevschic
 
Ethical and social_issues_in_information_system
Ethical and social_issues_in_information_systemEthical and social_issues_in_information_system
Ethical and social_issues_in_information_system
Kwame Afreh
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
rowenick
 
Privacy Culture
Privacy CulturePrivacy Culture
Privacy Culture
Brian Rowe
 
Investigation Of Media Law Online
Investigation Of Media Law OnlineInvestigation Of Media Law Online
Investigation Of Media Law Online
bsteineck
 

What's hot (19)

Cyber stalking
Cyber stalking Cyber stalking
Cyber stalking
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullying
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Oula 9 a
Oula   9 aOula   9 a
Oula 9 a
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
ICT code of ethics
ICT code of ethicsICT code of ethics
ICT code of ethics
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
 
Ethical and social_issues_in_information_system
Ethical and social_issues_in_information_systemEthical and social_issues_in_information_system
Ethical and social_issues_in_information_system
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Privacy Culture V 2
Privacy Culture V 2Privacy Culture V 2
Privacy Culture V 2
 
Privacy Culture
Privacy CulturePrivacy Culture
Privacy Culture
 
Investigation Of Media Law Online
Investigation Of Media Law OnlineInvestigation Of Media Law Online
Investigation Of Media Law Online
 

Similar to Essay 4

Post 1CyberstalkingCyberstalking is defined as the online st.docx
Post 1CyberstalkingCyberstalking is defined as the online st.docxPost 1CyberstalkingCyberstalking is defined as the online st.docx
Post 1CyberstalkingCyberstalking is defined as the online st.docx
stilliegeorgiana
 
Discussion Board SamplesThe following are tips and sample discus.docx
Discussion Board SamplesThe following are tips and sample discus.docxDiscussion Board SamplesThe following are tips and sample discus.docx
Discussion Board SamplesThe following are tips and sample discus.docx
edgar6wallace88877
 
Discussion Board SamplesThe following are tips and sample discus.docx
Discussion Board SamplesThe following are tips and sample discus.docxDiscussion Board SamplesThe following are tips and sample discus.docx
Discussion Board SamplesThe following are tips and sample discus.docx
duketjoy27252
 

Similar to Essay 4 (15)

Fighting spam
Fighting spamFighting spam
Fighting spam
 
spam
spamspam
spam
 
IST
ISTIST
IST
 
The standard for email communications
The standard for email communicationsThe standard for email communications
The standard for email communications
 
Post 1CyberstalkingCyberstalking is defined as the online st.docx
Post 1CyberstalkingCyberstalking is defined as the online st.docxPost 1CyberstalkingCyberstalking is defined as the online st.docx
Post 1CyberstalkingCyberstalking is defined as the online st.docx
 
Living in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxLiving in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptx
 
Discussion Board SamplesThe following are tips and sample discus.docx
Discussion Board SamplesThe following are tips and sample discus.docxDiscussion Board SamplesThe following are tips and sample discus.docx
Discussion Board SamplesThe following are tips and sample discus.docx
 
Discussion Board SamplesThe following are tips and sample discus.docx
Discussion Board SamplesThe following are tips and sample discus.docxDiscussion Board SamplesThe following are tips and sample discus.docx
Discussion Board SamplesThe following are tips and sample discus.docx
 
Ethical case studies
Ethical case studiesEthical case studies
Ethical case studies
 
Ethical case studies
Ethical case studiesEthical case studies
Ethical case studies
 
Cel1
Cel1Cel1
Cel1
 
LexisNexis Survey of Law Firm File Sharing in 2014
LexisNexis Survey of Law Firm File Sharing in 2014LexisNexis Survey of Law Firm File Sharing in 2014
LexisNexis Survey of Law Firm File Sharing in 2014
 
Processing obtained email data by using naïve bayes learning algorithm
Processing obtained email data by using naïve bayes learning algorithmProcessing obtained email data by using naïve bayes learning algorithm
Processing obtained email data by using naïve bayes learning algorithm
 
Social networks 2013-dwm
Social networks 2013-dwmSocial networks 2013-dwm
Social networks 2013-dwm
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 

Essay 4

  • 1. 5 Berthalyne Wea Business Communications II November 21, 2014 Misuse of Email Email is a medium commonly misused by communicators. Some examples of misuse are sharing sensitive materials, using email for conversation, and sending inappropriate contents. Problems can arise due to these behaviors. A person’s reputation can be questioned, which may lead to the loss of opportunities. Strategies can be implemented to prevent the misuse and abuse of email (Downing, et. al., 2014). Although there are many strategies that can be used to prevent the misuse of email, there are five strategies that can be followed. First, “do not use email to discuss confidential information” (Downing, et. al., 2014, p. 316). It is inappropriate to send confidential material because others could read it. Second, avoid sending offensive material through emails. Sending offensive materials through email may cause one’s company to be held liable in court if applicable. Third, always ask permission before forwarding messages or attachments. “You may be infringing on copyright laws or violating a colleague’s trust” (Downing, et. al., 2014, p. 316). Next, do not capitalize messages when sending an email. Doing so could send a message of aggression or rudeness. Last, review what was written before sending it. Proofreading a message for any errors or potential of misunderstanding prevents miscommunication (Downing, et. al., 2014). The misuse or abuse of email can resort to complications. The five rules discussed included not using email when discussing confidential subject matters, avoiding sending offensive contents, not forwarding messages or attachments without permission, reading a message before sending it, and avoiding using capitals when writing an email. Abusing and misusing email inappropriately can tarnish a person’s reputations.