This document provides guidelines and best practices for using email effectively and avoiding common email pitfalls. It discusses proper email etiquette, privacy concerns, how to avoid and identify spam and hoaxes, and netiquette for discussion groups. Key recommendations include keeping emails concise and professional, using blind carbon copy carefully, not opening unexpected attachments, avoiding flaming, and not forwarding private emails without permission.
This is a great PowerPoint to help individuals identify and prevent infecting their computers and identity from Malware programs. I found it on the internet and thought it was so good for people to view. The original document was created by the Consumer Jungle and can be found at: http://www.consumerjungle.org/content/view/55/1146/
The Internet is inescapable – both in your professional as well as your personal life. With our computers and phones, we are on the net at all times. But the net is dangerous. Whether you use e-mail, e-commerce, or even just a spreadsheet, you may not only be putting yourself in danger, but your whole company.
In this presentation, Prof. Dias explains some of the common ways you may be attacked when using Internet services, and how you can protect yourself against these attacks.
This is a great PowerPoint to help individuals identify and prevent infecting their computers and identity from Malware programs. I found it on the internet and thought it was so good for people to view. The original document was created by the Consumer Jungle and can be found at: http://www.consumerjungle.org/content/view/55/1146/
The Internet is inescapable – both in your professional as well as your personal life. With our computers and phones, we are on the net at all times. But the net is dangerous. Whether you use e-mail, e-commerce, or even just a spreadsheet, you may not only be putting yourself in danger, but your whole company.
In this presentation, Prof. Dias explains some of the common ways you may be attacked when using Internet services, and how you can protect yourself against these attacks.
Need the very basics for Microsoft Powerpoint? Look no further! We've taken our Microsoft Powerpoint class and moved it online, available 24/7, so anyone needing a brief rundown of the uses for Powerpoint, the windows and ribbons, and some helpful tips can get to it.
UX Strategy - the secret sauce that defines the pixie dustEric Reiss
My opening keynote at UX Riga, 2016
UX strategy is about analyzing an organization’s business strategy and outlining what needs to be done from a UX perspective to ensure that the goals of the business strategy are achieved.
In brief, UX strategy is the glue that binds the company vision (goals) with the day-to-day UX tactics (execution). Without a clear UX strategy, it is entirely possible to design killer UX concepts, yet fail miserably in the marketplace. That happens a lot.
This talk aims to help companies and designers avoid costly yet easily avoidable pitfalls.
The colours that dresses your brand are playing an important role in how they support this personality that you want to portray. Don’t panic when a colour speaks one thing, but in the relation to the brand it delivers a slightly different response.
Check out these examples of how brands used in conveying their message through branding and banner advertisement.
Read more http://www.bannersnack.com/blog/color-banner-design-inspiration/
Here is a very simple three step guide on how to create a professional Twitter cover photo in PowerPoint. Use this strategy for your business, personal brand or whatever you want in order to bring traffic to your other sites.
Need the very basics for Microsoft Powerpoint? Look no further! We've taken our Microsoft Powerpoint class and moved it online, available 24/7, so anyone needing a brief rundown of the uses for Powerpoint, the windows and ribbons, and some helpful tips can get to it.
UX Strategy - the secret sauce that defines the pixie dustEric Reiss
My opening keynote at UX Riga, 2016
UX strategy is about analyzing an organization’s business strategy and outlining what needs to be done from a UX perspective to ensure that the goals of the business strategy are achieved.
In brief, UX strategy is the glue that binds the company vision (goals) with the day-to-day UX tactics (execution). Without a clear UX strategy, it is entirely possible to design killer UX concepts, yet fail miserably in the marketplace. That happens a lot.
This talk aims to help companies and designers avoid costly yet easily avoidable pitfalls.
The colours that dresses your brand are playing an important role in how they support this personality that you want to portray. Don’t panic when a colour speaks one thing, but in the relation to the brand it delivers a slightly different response.
Check out these examples of how brands used in conveying their message through branding and banner advertisement.
Read more http://www.bannersnack.com/blog/color-banner-design-inspiration/
Here is a very simple three step guide on how to create a professional Twitter cover photo in PowerPoint. Use this strategy for your business, personal brand or whatever you want in order to bring traffic to your other sites.
Exploring Career Paths in Cybersecurity for Technical CommunicatorsBen Woelk, CISSP, CPTC
Brief overview of career options in cybersecurity for technical communicators. Includes discussion of my career path, certification options, NICE and NIST resources.
Resumes, Cover Letters, and Applying OnlineBruce Bennett
This webinar showcases resume styles and the elements that go into building your resume. Every job application requires unique skills, and this session will show you how to improve your resume to match the jobs to which you are applying. Additionally, we will discuss cover letters and learn about ideas to include. Every job application requires unique skills so learn ways to give you the best chance of success when applying for a new position. Learn how to take advantage of all the features when uploading a job application to a company’s applicant tracking system.
The Impact of Artificial Intelligence on Modern Society.pdfssuser3e63fc
Just a game Assignment 3
1. What has made Louis Vuitton's business model successful in the Japanese luxury market?
2. What are the opportunities and challenges for Louis Vuitton in Japan?
3. What are the specifics of the Japanese fashion luxury market?
4. How did Louis Vuitton enter into the Japanese market originally? What were the other entry strategies it adopted later to strengthen its presence?
5. Will Louis Vuitton have any new challenges arise due to the global financial crisis? How does it overcome the new challenges?Assignment 3
1. What has made Louis Vuitton's business model successful in the Japanese luxury market?
2. What are the opportunities and challenges for Louis Vuitton in Japan?
3. What are the specifics of the Japanese fashion luxury market?
4. How did Louis Vuitton enter into the Japanese market originally? What were the other entry strategies it adopted later to strengthen its presence?
5. Will Louis Vuitton have any new challenges arise due to the global financial crisis? How does it overcome the new challenges?Assignment 3
1. What has made Louis Vuitton's business model successful in the Japanese luxury market?
2. What are the opportunities and challenges for Louis Vuitton in Japan?
3. What are the specifics of the Japanese fashion luxury market?
4. How did Louis Vuitton enter into the Japanese market originally? What were the other entry strategies it adopted later to strengthen its presence?
5. Will Louis Vuitton have any new challenges arise due to the global financial crisis? How does it overcome the new challenges?
Want to move your career forward? Looking to build your leadership skills while helping others learn, grow, and improve their skills? Seeking someone who can guide you in achieving these goals?
You can accomplish this through a mentoring partnership. Learn more about the PMISSC Mentoring Program, where you’ll discover the incredible benefits of becoming a mentor or mentee. This program is designed to foster professional growth, enhance skills, and build a strong network within the project management community. Whether you're looking to share your expertise or seeking guidance to advance your career, the PMI Mentoring Program offers valuable opportunities for personal and professional development.
Watch this to learn:
* Overview of the PMISSC Mentoring Program: Mission, vision, and objectives.
* Benefits for Volunteer Mentors: Professional development, networking, personal satisfaction, and recognition.
* Advantages for Mentees: Career advancement, skill development, networking, and confidence building.
* Program Structure and Expectations: Mentor-mentee matching process, program phases, and time commitment.
* Success Stories and Testimonials: Inspiring examples from past participants.
* How to Get Involved: Steps to participate and resources available for support throughout the program.
Learn how you can make a difference in the project management community and take the next step in your professional journey.
About Hector Del Castillo
Hector is VP of Professional Development at the PMI Silver Spring Chapter, and CEO of Bold PM. He's a mid-market growth product executive and changemaker. He works with mid-market product-driven software executives to solve their biggest growth problems. He scales product growth, optimizes ops and builds loyal customers. He has reduced customer churn 33%, and boosted sales 47% for clients. He makes a significant impact by building and launching world-changing AI-powered products. If you're looking for an engaging and inspiring speaker to spark creativity and innovation within your organization, set up an appointment to discuss your specific needs and identify a suitable topic to inspire your audience at your next corporate conference, symposium, executive summit, or planning retreat.
About PMI Silver Spring Chapter
We are a branch of the Project Management Institute. We offer a platform for project management professionals in Silver Spring, MD, and the DC/Baltimore metro area. Monthly meetings facilitate networking, knowledge sharing, and professional development. For event details, visit pmissc.org.
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
Email Basics Handout
1. Email Basics
Presented by:
Software Training Services
The University of Akron
Topics
Guidelines/Etiquette
Privacy of Email
Spam
Chain Letters/Hoaxes
Discussion Groups/Listservs
The University of Akron
Guidelines/Etiquette
The University of Akron
1
2. Basic Guidelines
Length
Concise, to the point
Subject Line
Tone
Avoid all capital letters
Professional
Read carefully before sending
Humor, sarcasm – difficult to convey
Emoticons – use sparingly
The University of Akron
Emoticons
:-) = Happy
:-( = Sad
;-) = Wink (Sarcasm)
:-O = Yell
The University of Akron
Identify Yourself
Signature
Full Name
Title
Company
Address
Phone Number
Fax Number
The University of Akron
2
3. Replies and Forwarding
Use the “Reply to” or “Reply to All” option
Maintains a link to the original message
Maintains “thread” of correspondence
Forwarding a message
Not the same as replying
Mail original message to someone other than the sender
Use caution when forwarding private or sensitive email
messages without the permission of the sender
May be inappropriate to forward a portion of a message
The University of Akron
Using the “CC:” field
Carbon copy
Everyone in the “To” and “CC” fields are
visible
‘This email is not addressed to you, you're
just receiving a copy' (FYI)
Can be overused
“Reply to All” will be sent to everyone in
“CC” and “To” fields
The University of Akron
Using the “Bcc” field
Blind carbon copy
Conceals address from other recipients
Use for mass mailings
No need for others to see list of recipients
Will not receive a “Reply To” or “Reply to
All” message
The University of Akron
3
4. Email Attachments
Never open an unexpected attachment
Even from someone you know
Used to spread viruses
Scan questionable attachments
On Demand Scan
When sending attachments, alert the
recipient to the attachment
The University of Akron
Etiquette - Flaming
Verbal attack
Not an appropriate use
Ignore
Steps to Avoid:
Carefully read messages before sending
Don’t send messages in all upper case
Don’t send insulting email
Don’t send mass-mailing advertisements
The University of Akron
Privacy of Email
The University of Akron
4
5. Privacy of Email
Not a secure form of communication
Don’t send secret or confidential
information
Credit Card information
Social Security number
Passwords
More like a postcard than a sealed letter
Think before you forward
Do you have the sender’s permission?
The University of Akron
Privacy of Email
Subject to review with sufficient
justification
Court order
Evidence as part of investigations
Message may be mistakenly addressed
Return message to sender and delete
The University of Akron
When NOT to communicate via Email
Don’t send email of a sensitive or
confidential nature
Don’t use email to communicate
complaints or dissatisfaction with someone
Have a phone or face-to-face conversation
with the person
Promotes 2-way communication
If you find yourself responding more than
3 times on the same topic –
Have a phone or face-to-face conversation
The University of Akron
5
6. Privacy of Email
If you wouldn’t want it broadcast on the
6:00 news – don’t put it in an email!!
The University of Akron
Spam
The University of Akron
Spam
Junk mail
Unsolicited bulk mailings
Overloads mailboxes
20 – 90% of incoming traffic
Adult content, health promotions, software
offers, investment ads, get-rich quick schemes
Chain letters, hoaxes, jokes
NEVER respond to spam!
The University of Akron
6
7. Spam
How they obtain email addresses:
Posted on the web (chat, newsgroups, etc.)
Web-based discussion boards
Inappropriate sharing or sale of email
addresses
Companies not respecting user opt-out
preferences
Signing up for “offers”
Guessing (random generation)
Stealing via malware
The University of Akron
University of Akron Response to Spam
Defining spam
Difficult – Did you sign up for stock tips? Are
you really interested in wonder vitamins?
Can’t block all sites
Also include legitimate mail
The University of Akron
University of Akron Response to Spam
Spammers hide true source of mail
Misconfigured mail servers allow this
Sign up for free accounts
Spam Scanning System
Determines if each message is spam
{SPAM?} = May be spam
{SPAM!} = High probability
Point system
The University of Akron
7
8. Reporting Spam
Messages not marked as spam, send to:
spam@uakron.edu
Messages marked as spam which are
legitimate, send to:
notspam@uakron.edu
The University of Akron
Spam Filters
Set up filters on email to sort spam
messages
Place in Junk Mail folder and then review
Software Training website
http://www.uakron.edu/its/learning/training/facs
taffmail.php
The University of Akron
Other Methods to Reduce Spam
Contact your congressperson
Be cautious when giving out your email
address
Complain to the Internet Service Provider
where the message originated
Forward message
abuse@domain_name – abuse@uakron.edu,
abuse@yahoo.com, abuse@aol.com
The University of Akron
8
9. Hoaxes and Chain Letters
The University of Akron
Purpose and Cost
Send to everyone
Messages are untrue
Appeal to sense of good will
Cost:
Time to read
Stress placed on servers
Spammers harvest email addresses from
hoaxes and chain letters
The University of Akron
Cost of Hoaxes and Chain Letters
Generation 1 2 3 4 5 6
No of 10 100 1,000 10,000 100,000 1,000,000
Messages:
The University of Akron
9
10. Examples
The University of Akron
The University of Akron
Identification
“Send this to everyone you know”
Technical language
Credibility by association
3 Components
Hook – grab your interest
Threat – something terrible will happen
Request – Forward this to everyone
No contact information or invalid contact
information
The University of Akron
10
11. Hoax/Chain Letter Prevention
Do NOT forward the message
Various sites used to check validity:
McAfee: http://vil.nai.com/vil/hoaxes.aspx
F-Secure: http://www.f-secure.com/virus-
info/hoax/
Snopes: http://www.snopes.com
Hoaxbuster’s: http://hoaxbusters.ciac.org
The University of Akron
University Rule 3359-11-10
Access and acceptable use of university
computer and informational resources
“Misuse of e-mail, such as, but not limited
to:
Sending unsolicited e-mails to a large number
of recipients, i.e. sending spam-mail or
unwanted chain letters.”
http://www.uakron.edu/ogc/rules/Rulesby
Number.php#policies
The University of Akron
Phishing
Process by which someone obtains private
information through deceptive or illicit
means
Used to falsely assume another person’s
identity
Online course available
Faculty and staff can enroll at:
https://www.uakron.edu/seminars/index.php
Students can log in to ZipLine and find the
course listed on the “My Page” tab – under
CyberSecurity Information
The University of Akron
11
12. Listservs and Discussion
Groups
The University of Akron
Guidelines
Double-check the To: when replying
Don’t send your response to the entire listserv
Start a new email and type the recipient’s
name
Don’t air your grievances on a list
Avoid personal attacks
Be professional
“Lurk” if you are new to a list
Read posts without responding
Learn what the group discusses, how it talks,
expected behavior
The University of Akron
Summary
Email is a valuable communication tool
Sometimes – it is NOT the best or most
appropriate method of communication
Follow the basic guidelines presented to
improve the quality of your
communications
The University of Akron
12
13. Questions?
Email: PSTrain@uakron.edu
Phone: 330.972.6391
Web site:
http://www.uakron.edu/its/learning/training/ind
ex.php
The University of Akron
Record Course Completion
Click the following link to have this course
added to your training record:
http://survey.uakron.edu:2929/2wV3GFE/Li
nk.html
NOTE: Failure to click the link and complete
the necessary information will result in your
course completion being unrecorded!
The University of Akron
13