SlideShare a Scribd company logo
1 of 38
Download to read offline
Email
Electronic Communications
Objectives
• Understand parts of an email
• Differentiate between good and bad emails
• Explain email etiquette
• Evaluate email security risks
• Write emails
Rev 10/2010 Report Writing —Email 2
Definition
Email is the electronic
transmission of
messages through a
computer network.
Rev 10/2010 Report Writing —Email 4
Rev 10/2010Report Writing —Email 5
blog.esudhir.com/.../2009/09/email-cartoon.JPG
Basics of Good Communication
• Know your audience
• Write to that audience
• Emphasize clarity
over cleverness
• Emphasis content
over expansiveness
• Two specific email violations
that bother instructors more
than students are emails not
signed by the message sender
and messages that include
shortcuts like "RU" instead of
"are you". Finally, it appears
that instructor generational
differences have little impact
on these descriptive findings.
• Stephens, Keri K.; Houser, Marian
L.; Cowan, Renee L. R U Able to Meat Me:
The Impact of Students' Overly Casual
Email Messages to Instructors (2009)
Rev 10/2010 Report Writing —Email 6
Design
• Use standard fonts
• Keep bolds, underlines, and italics to a minimum
• If using a priority system, be honest.
• Avoid backgrounds or stationary that detract
from the message.
Rev 10/2010 Report Writing —Email 7
!
Parts of an email
• Addressee
• Cc:
• Subject:
• Text
• Signature
• Attachments
Rev 10/2010 Report Writing —Email 8
Rev 10/2010Report Writing —Email 9
Outlook
Addressee
• The addressee is who
is to receive the email
• Capitalization is not
necessary
• Internal
• Check company
mailing list for name
• A company usually
has a corporate list in
Contacts
• External
• Use Internet email
name and service
• RSpeener@cci.edu
• Jsmith@workplace.net
Rev 10/2010 Report Writing —Email 10
Addressee
Rev 10/2010Report Writing —Email 11
Complimentary Copy
• Additional people being sent copies.
• If the recipients are all of equal importance, put them on
the To: line
• Use cc for courtesy copies
• Use bcc (blind copy) for sending copies without the
Addressee knowing. Use sparingly.
Rev 10/2010 Report Writing —Email 12
ComplimentaryCopy
Rev 10/2010Report Writing —Email 13
Subject
• Subject is a brief summary of the content
• Sometimes it is called RE
• Be concise
• Be precise
• Be current
Rev 10/2010 Report Writing —Email 14
Subject
Rev 10/2010Report Writing —Email 15
Text
• Always have text
• Get to the point
• Be brief
• Put most important information first
• Know the purpose
• Use attachments for longer document rather than
embedding
Rev 10/2010 Report Writing —Email 16
Text
Rev 10/2010Report Writing —Email 17
Signature Block
• Sender’s information
• Include
• Name
• Job title
• email address
• Company, Department
• Separate from text by two or three lines
Rev 10/2010 Report Writing —Email 18
SignatureBlock
Rev 10/2010Report Writing —Email 19
Attachments
Rev 10/2010Report Writing —Email 20
Attachments
• Attachments are files that are sent along with the email
• Use attachments for
• Long documents
• Pictures
• Copies of existing documents
Rev 10/2010 Report Writing —Email 21
OtherBasics
Rev 10/2010Report Writing —Email 22
Address Book
Font Control
Style
• Usually less formal
• It is somewhere between a conversation
and a memo
• Personal
• Business suitable
• Avoid excessive abbreviations
• Don’t be cute — use emoticons sparingly
Rev 10/2010Report Writing —Email 23
Never email something in bad taste!
Before Sending
• Check spelling
• Check grammar
• Check for clarity
• Check Addressee's name
• Don’t send emails when angry
• Remember telephones still exist – Is email the best way
to respond?
Rev 10/2010 Report Writing —Email 24
Rev 10/2010Report Writing —Email 25http://www.itsngenius.com/photos/albums/userpics/toon61.jpg
Managing
• Respond to emails promptly
• If given an assignment by email that will take several
days, acknowledge the assignment and the time
frame.
• Remove emails from active list frequently
• Archive frequently
Rev 10/2010 Report Writing —Email 26
REMEMBER
Rev 10/2010 Report Writing —Email 27
Emails are Forever
• Emails are never completely deleted
• They exist on files
• They exist in archives
• They exist in backups
• They exist on hard drives as ghosts
Rev 10/2010 Report Writing —Email 28
Security
Rev 10/2010 Report Writing —Email 29
Email and Security
• Emails and email attachments are a primary entry
method for computer viruses
• Viruses can spread extremely fast
• Computer crime is the growth sector of organized crime
Rev 10/2010 Report Writing —Email 30
Email Security
• Be skeptical
• Open an email from an unknown sender with caution
• Never open email attachments from an unknown sender
• Never give out passwords, social security numbers, bank
account numbers, etc.
Rev 10/2010 Report Writing —Email 31
Email Security Terms
• Virus – A type of software that run without your
knowledge, replicates itself and spreads to other
computers
• Trojan Horse– A type of virus that is intended to
do harm to the computer. It is usually hidden
inside something attractive, such as a cartoon
• Worm – a type of virus that spreads by Email
Rev 10/2010 Report Writing —Email 32
Email Security Terms
• Spam—Mass mailings
to know email users
• Phish—Requests for
personal information
from what appears to
be a trusted
organization; e.g.
personal bank
Rev 10/2010 Report Writing —Email 33
Internet Security Terms
• Zombie—Unauthorized use of a computer by
others for their personal reasons
• Bot—A web site that automatically transfers the
user to another undesired website
Rev 10/2010 Report Writing —Email 34
Internet Security Terms
• Adware—A program that automatically puts ads
(pop-ups) on the computer
• Spyware—A program that tracks one’s Internet
use. It may also track one’s keystrokes
(passwords etc.) and send it to a designated
recipient
Rev 10/2010 Report Writing —Email 35
Security Measures
• Have a good anti-virus
program
• Use a firewall
• Have good spyware and
adware filters
 Update regularly
• Have a good spam filter
• Update programs
frequently and quickly
• Do not open emails with
multiple forwards
• Be cautious in
downloading free or
shareware programs
• Be cautious in opening
emails from unknown
senders
• Be wary of attachments
Rev 10/2010 Report Writing —Email 36
Summary
• Be concise and precise
• Respond promptly
• Be professional
• Be aware of email
security
Rev 10/2010 Report Writing —Email 37
Examples
• Examples of Bad Email Messages
http://www.michaelhorowitz.com/bademails.html
Rev 10/2010 Report Writing —Email 38
Resources
• Netiquette by Virginia Shea (2004)
http://www.albion.com/netiquette/book/index.html
• Outlook 2007 Tutorial http://tamhsc.edu/information-
technology/tutorials/outlook2007-
tutorial/Outlook%202007%20Tutorial.pdf
• Information Security Guidelines
http://www.gov.mu/portal/goc/ncb/file/pdf.pdf
• Getting up to Speed with Microsoft Outlook 2007
http://office.microsoft.com/training/training.aspx?AssetID=R
C101153581033
Rev 10/2010Report Writing —Email 39

More Related Content

What's hot

Advantages & Disadvantages of Email
Advantages & Disadvantages of EmailAdvantages & Disadvantages of Email
Advantages & Disadvantages of EmailAnirudh Kannan
 
Mobile Reference, Mobile Librarians
Mobile Reference, Mobile LibrariansMobile Reference, Mobile Librarians
Mobile Reference, Mobile LibrariansDarcy Gervasio
 
Presentation on eMargin given to BCU Learning & Teaching Committee
Presentation on eMargin given to BCU Learning & Teaching CommitteePresentation on eMargin given to BCU Learning & Teaching Committee
Presentation on eMargin given to BCU Learning & Teaching CommitteeRDUES
 
E Mail And Forums In An Esl Classroom Teed 3035
E Mail And Forums In An Esl Classroom Teed 3035E Mail And Forums In An Esl Classroom Teed 3035
E Mail And Forums In An Esl Classroom Teed 3035Yaileen Filpo
 
Instant Messaging for Libraries
Instant Messaging for LibrariesInstant Messaging for Libraries
Instant Messaging for LibrariesAmanda Stone
 
adavantages and disadvanteges in email and blogs
adavantages and disadvanteges in email and blogsadavantages and disadvanteges in email and blogs
adavantages and disadvanteges in email and blogsalexandra
 
Social Media In An Eh World
Social Media In An Eh WorldSocial Media In An Eh World
Social Media In An Eh WorldSteve Lipton
 
Web tools assignment
Web tools assignmentWeb tools assignment
Web tools assignmentThomas Dilu
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12FUMINAEUN
 
Intellectual Property in Big Data Era: Opportunities and Challenges
Intellectual Property in Big Data Era: Opportunities and ChallengesIntellectual Property in Big Data Era: Opportunities and Challenges
Intellectual Property in Big Data Era: Opportunities and ChallengesAndré Mendes 安德烈
 

What's hot (15)

13. internet services
13. internet services13. internet services
13. internet services
 
Advantages & Disadvantages of Email
Advantages & Disadvantages of EmailAdvantages & Disadvantages of Email
Advantages & Disadvantages of Email
 
Mobile Reference, Mobile Librarians
Mobile Reference, Mobile LibrariansMobile Reference, Mobile Librarians
Mobile Reference, Mobile Librarians
 
Presentation on eMargin given to BCU Learning & Teaching Committee
Presentation on eMargin given to BCU Learning & Teaching CommitteePresentation on eMargin given to BCU Learning & Teaching Committee
Presentation on eMargin given to BCU Learning & Teaching Committee
 
E-MAIL
E-MAILE-MAIL
E-MAIL
 
E Mail And Forums In An Esl Classroom Teed 3035
E Mail And Forums In An Esl Classroom Teed 3035E Mail And Forums In An Esl Classroom Teed 3035
E Mail And Forums In An Esl Classroom Teed 3035
 
Instant Messaging for Libraries
Instant Messaging for LibrariesInstant Messaging for Libraries
Instant Messaging for Libraries
 
adavantages and disadvanteges in email and blogs
adavantages and disadvanteges in email and blogsadavantages and disadvanteges in email and blogs
adavantages and disadvanteges in email and blogs
 
Chat Technology
Chat TechnologyChat Technology
Chat Technology
 
Reshma technology 1
Reshma technology 1Reshma technology 1
Reshma technology 1
 
E‑mail
E‑mailE‑mail
E‑mail
 
Social Media In An Eh World
Social Media In An Eh WorldSocial Media In An Eh World
Social Media In An Eh World
 
Web tools assignment
Web tools assignmentWeb tools assignment
Web tools assignment
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12
 
Intellectual Property in Big Data Era: Opportunities and Challenges
Intellectual Property in Big Data Era: Opportunities and ChallengesIntellectual Property in Big Data Era: Opportunities and Challenges
Intellectual Property in Big Data Era: Opportunities and Challenges
 

Viewers also liked (6)

Function
FunctionFunction
Function
 
Subject verb agreement
Subject verb agreementSubject verb agreement
Subject verb agreement
 
Bias.pdf
Bias.pdfBias.pdf
Bias.pdf
 
Doors
DoorsDoors
Doors
 
Fragments & run ons
Fragments & run onsFragments & run ons
Fragments & run ons
 
Structure
StructureStructure
Structure
 

Similar to EMail.pdf

Business English - Writing Workplace1.ppt
Business English - Writing Workplace1.pptBusiness English - Writing Workplace1.ppt
Business English - Writing Workplace1.pptabdelrahman allam
 
Business English - Writing Workplace1.ppt
Business English - Writing Workplace1.pptBusiness English - Writing Workplace1.ppt
Business English - Writing Workplace1.pptSabrina377028
 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8William Mann
 
Using Technology to Improve Communication
Using Technology to Improve CommunicationUsing Technology to Improve Communication
Using Technology to Improve CommunicationSophia Abigayle
 
Technical report writing of English communication.pdf
Technical report writing of English communication.pdfTechnical report writing of English communication.pdf
Technical report writing of English communication.pdfawaisiqbal132453
 
Effective E- mailing
Effective E- mailingEffective E- mailing
Effective E- mailingDimple
 
L5_Electronic communication.pptx
L5_Electronic communication.pptxL5_Electronic communication.pptx
L5_Electronic communication.pptxenukahansana
 
Understanding Email Traffic (talk @ E-Discovery NL Symposium)
Understanding Email Traffic (talk @ E-Discovery NL Symposium)Understanding Email Traffic (talk @ E-Discovery NL Symposium)
Understanding Email Traffic (talk @ E-Discovery NL Symposium)David Graus
 
New powerpoint file
New powerpoint fileNew powerpoint file
New powerpoint fileUmesh Majhi
 
webservices.pptx
webservices.pptxwebservices.pptx
webservices.pptxHelenToms3
 
Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...
Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...
Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...AbeerTariq7
 
web services grp ppt.pptx
web services grp ppt.pptxweb services grp ppt.pptx
web services grp ppt.pptxHelenToms3
 
web services grp ppt.pptx
web services grp ppt.pptxweb services grp ppt.pptx
web services grp ppt.pptxArdraD1
 
web services grp ppt.pptx
web services grp ppt.pptxweb services grp ppt.pptx
web services grp ppt.pptxHelenToms3
 

Similar to EMail.pdf (20)

Business English - Writing Workplace1.ppt
Business English - Writing Workplace1.pptBusiness English - Writing Workplace1.ppt
Business English - Writing Workplace1.ppt
 
Business English - Writing Workplace1.ppt
Business English - Writing Workplace1.pptBusiness English - Writing Workplace1.ppt
Business English - Writing Workplace1.ppt
 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8
 
Using Technology to Improve Communication
Using Technology to Improve CommunicationUsing Technology to Improve Communication
Using Technology to Improve Communication
 
Technical report writing of English communication.pdf
Technical report writing of English communication.pdfTechnical report writing of English communication.pdf
Technical report writing of English communication.pdf
 
L42 slides
L42 slidesL42 slides
L42 slides
 
Email writing skills
Email writing skillsEmail writing skills
Email writing skills
 
Effective E- mailing
Effective E- mailingEffective E- mailing
Effective E- mailing
 
L5_Electronic communication.pptx
L5_Electronic communication.pptxL5_Electronic communication.pptx
L5_Electronic communication.pptx
 
Understanding Email Traffic (talk @ E-Discovery NL Symposium)
Understanding Email Traffic (talk @ E-Discovery NL Symposium)Understanding Email Traffic (talk @ E-Discovery NL Symposium)
Understanding Email Traffic (talk @ E-Discovery NL Symposium)
 
E-Mails Etiquette
E-Mails EtiquetteE-Mails Etiquette
E-Mails Etiquette
 
New powerpoint file
New powerpoint fileNew powerpoint file
New powerpoint file
 
webservices.pptx
webservices.pptxwebservices.pptx
webservices.pptx
 
Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...
Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...
Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...
 
web services grp ppt.pptx
web services grp ppt.pptxweb services grp ppt.pptx
web services grp ppt.pptx
 
web services grp ppt.pptx
web services grp ppt.pptxweb services grp ppt.pptx
web services grp ppt.pptx
 
web services grp ppt.pptx
web services grp ppt.pptxweb services grp ppt.pptx
web services grp ppt.pptx
 
Web services
Web services Web services
Web services
 
web services grp
web services grp web services grp
web services grp
 
web services
web services web services
web services
 

More from Ronald Speener (20)

Workflow managemet
Workflow managemetWorkflow managemet
Workflow managemet
 
Teamwork
TeamworkTeamwork
Teamwork
 
Communication skills
Communication skillsCommunication skills
Communication skills
 
Leadership and management
Leadership and managementLeadership and management
Leadership and management
 
Ronald Speener Interactive Resume
Ronald Speener Interactive ResumeRonald Speener Interactive Resume
Ronald Speener Interactive Resume
 
Learning
Learning Learning
Learning
 
Introduction to poetry
Introduction to poetryIntroduction to poetry
Introduction to poetry
 
Verbs
VerbsVerbs
Verbs
 
Pronoun other
Pronoun otherPronoun other
Pronoun other
 
Pronouns case
Pronouns casePronouns case
Pronouns case
 
Pronoun personal
Pronoun personalPronoun personal
Pronoun personal
 
Critical process
Critical processCritical process
Critical process
 
Communication
CommunicationCommunication
Communication
 
Thesis statement
Thesis statementThesis statement
Thesis statement
 
Introductions
IntroductionsIntroductions
Introductions
 
Details
DetailsDetails
Details
 
Concluding
ConcludingConcluding
Concluding
 
Intellectual Property.pdf
Intellectual Property.pdfIntellectual Property.pdf
Intellectual Property.pdf
 
Graphics.pdf
Graphics.pdfGraphics.pdf
Graphics.pdf
 
SURVEY WRITING.pdf
SURVEY WRITING.pdfSURVEY WRITING.pdf
SURVEY WRITING.pdf
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

EMail.pdf

  • 2. Objectives • Understand parts of an email • Differentiate between good and bad emails • Explain email etiquette • Evaluate email security risks • Write emails Rev 10/2010 Report Writing —Email 2
  • 3. Definition Email is the electronic transmission of messages through a computer network. Rev 10/2010 Report Writing —Email 4
  • 4. Rev 10/2010Report Writing —Email 5 blog.esudhir.com/.../2009/09/email-cartoon.JPG
  • 5. Basics of Good Communication • Know your audience • Write to that audience • Emphasize clarity over cleverness • Emphasis content over expansiveness • Two specific email violations that bother instructors more than students are emails not signed by the message sender and messages that include shortcuts like "RU" instead of "are you". Finally, it appears that instructor generational differences have little impact on these descriptive findings. • Stephens, Keri K.; Houser, Marian L.; Cowan, Renee L. R U Able to Meat Me: The Impact of Students' Overly Casual Email Messages to Instructors (2009) Rev 10/2010 Report Writing —Email 6
  • 6. Design • Use standard fonts • Keep bolds, underlines, and italics to a minimum • If using a priority system, be honest. • Avoid backgrounds or stationary that detract from the message. Rev 10/2010 Report Writing —Email 7 !
  • 7. Parts of an email • Addressee • Cc: • Subject: • Text • Signature • Attachments Rev 10/2010 Report Writing —Email 8
  • 8. Rev 10/2010Report Writing —Email 9 Outlook
  • 9. Addressee • The addressee is who is to receive the email • Capitalization is not necessary • Internal • Check company mailing list for name • A company usually has a corporate list in Contacts • External • Use Internet email name and service • RSpeener@cci.edu • Jsmith@workplace.net Rev 10/2010 Report Writing —Email 10
  • 11. Complimentary Copy • Additional people being sent copies. • If the recipients are all of equal importance, put them on the To: line • Use cc for courtesy copies • Use bcc (blind copy) for sending copies without the Addressee knowing. Use sparingly. Rev 10/2010 Report Writing —Email 12
  • 13. Subject • Subject is a brief summary of the content • Sometimes it is called RE • Be concise • Be precise • Be current Rev 10/2010 Report Writing —Email 14
  • 15. Text • Always have text • Get to the point • Be brief • Put most important information first • Know the purpose • Use attachments for longer document rather than embedding Rev 10/2010 Report Writing —Email 16
  • 17. Signature Block • Sender’s information • Include • Name • Job title • email address • Company, Department • Separate from text by two or three lines Rev 10/2010 Report Writing —Email 18
  • 20. Attachments • Attachments are files that are sent along with the email • Use attachments for • Long documents • Pictures • Copies of existing documents Rev 10/2010 Report Writing —Email 21
  • 21. OtherBasics Rev 10/2010Report Writing —Email 22 Address Book Font Control
  • 22. Style • Usually less formal • It is somewhere between a conversation and a memo • Personal • Business suitable • Avoid excessive abbreviations • Don’t be cute — use emoticons sparingly Rev 10/2010Report Writing —Email 23 Never email something in bad taste!
  • 23. Before Sending • Check spelling • Check grammar • Check for clarity • Check Addressee's name • Don’t send emails when angry • Remember telephones still exist – Is email the best way to respond? Rev 10/2010 Report Writing —Email 24
  • 24. Rev 10/2010Report Writing —Email 25http://www.itsngenius.com/photos/albums/userpics/toon61.jpg
  • 25. Managing • Respond to emails promptly • If given an assignment by email that will take several days, acknowledge the assignment and the time frame. • Remove emails from active list frequently • Archive frequently Rev 10/2010 Report Writing —Email 26
  • 26. REMEMBER Rev 10/2010 Report Writing —Email 27
  • 27. Emails are Forever • Emails are never completely deleted • They exist on files • They exist in archives • They exist in backups • They exist on hard drives as ghosts Rev 10/2010 Report Writing —Email 28
  • 28. Security Rev 10/2010 Report Writing —Email 29
  • 29. Email and Security • Emails and email attachments are a primary entry method for computer viruses • Viruses can spread extremely fast • Computer crime is the growth sector of organized crime Rev 10/2010 Report Writing —Email 30
  • 30. Email Security • Be skeptical • Open an email from an unknown sender with caution • Never open email attachments from an unknown sender • Never give out passwords, social security numbers, bank account numbers, etc. Rev 10/2010 Report Writing —Email 31
  • 31. Email Security Terms • Virus – A type of software that run without your knowledge, replicates itself and spreads to other computers • Trojan Horse– A type of virus that is intended to do harm to the computer. It is usually hidden inside something attractive, such as a cartoon • Worm – a type of virus that spreads by Email Rev 10/2010 Report Writing —Email 32
  • 32. Email Security Terms • Spam—Mass mailings to know email users • Phish—Requests for personal information from what appears to be a trusted organization; e.g. personal bank Rev 10/2010 Report Writing —Email 33
  • 33. Internet Security Terms • Zombie—Unauthorized use of a computer by others for their personal reasons • Bot—A web site that automatically transfers the user to another undesired website Rev 10/2010 Report Writing —Email 34
  • 34. Internet Security Terms • Adware—A program that automatically puts ads (pop-ups) on the computer • Spyware—A program that tracks one’s Internet use. It may also track one’s keystrokes (passwords etc.) and send it to a designated recipient Rev 10/2010 Report Writing —Email 35
  • 35. Security Measures • Have a good anti-virus program • Use a firewall • Have good spyware and adware filters  Update regularly • Have a good spam filter • Update programs frequently and quickly • Do not open emails with multiple forwards • Be cautious in downloading free or shareware programs • Be cautious in opening emails from unknown senders • Be wary of attachments Rev 10/2010 Report Writing —Email 36
  • 36. Summary • Be concise and precise • Respond promptly • Be professional • Be aware of email security Rev 10/2010 Report Writing —Email 37
  • 37. Examples • Examples of Bad Email Messages http://www.michaelhorowitz.com/bademails.html Rev 10/2010 Report Writing —Email 38
  • 38. Resources • Netiquette by Virginia Shea (2004) http://www.albion.com/netiquette/book/index.html • Outlook 2007 Tutorial http://tamhsc.edu/information- technology/tutorials/outlook2007- tutorial/Outlook%202007%20Tutorial.pdf • Information Security Guidelines http://www.gov.mu/portal/goc/ncb/file/pdf.pdf • Getting up to Speed with Microsoft Outlook 2007 http://office.microsoft.com/training/training.aspx?AssetID=R C101153581033 Rev 10/2010Report Writing —Email 39