This document provides an overview of email including its definition, parts of an email, etiquette, security risks, and how to write effective emails. It discusses the key components of an email like the addressee, subject line, text, signature, and attachments. It emphasizes the importance of clarity, brevity, and knowing your audience when writing emails. It also outlines best practices for email security including using antivirus software and being cautious of emails from unknown senders.
2. Objectives
ā¢ Understand parts of an email
ā¢ Differentiate between good and bad emails
ā¢ Explain email etiquette
ā¢ Evaluate email security risks
ā¢ Write emails
Rev 10/2010 Report Writing āEmail 2
3. Definition
Email is the electronic
transmission of
messages through a
computer network.
Rev 10/2010 Report Writing āEmail 4
5. Basics of Good Communication
ā¢ Know your audience
ā¢ Write to that audience
ā¢ Emphasize clarity
over cleverness
ā¢ Emphasis content
over expansiveness
ā¢ Two specific email violations
that bother instructors more
than students are emails not
signed by the message sender
and messages that include
shortcuts like "RU" instead of
"are you". Finally, it appears
that instructor generational
differences have little impact
on these descriptive findings.
ā¢ Stephens, Keri K.; Houser, Marian
L.; Cowan, Renee L. R U Able to Meat Me:
The Impact of Students' Overly Casual
Email Messages to Instructors (2009)
Rev 10/2010 Report Writing āEmail 6
6. Design
ā¢ Use standard fonts
ā¢ Keep bolds, underlines, and italics to a minimum
ā¢ If using a priority system, be honest.
ā¢ Avoid backgrounds or stationary that detract
from the message.
Rev 10/2010 Report Writing āEmail 7
!
7. Parts of an email
ā¢ Addressee
ā¢ Cc:
ā¢ Subject:
ā¢ Text
ā¢ Signature
ā¢ Attachments
Rev 10/2010 Report Writing āEmail 8
9. Addressee
ā¢ The addressee is who
is to receive the email
ā¢ Capitalization is not
necessary
ā¢ Internal
ā¢ Check company
mailing list for name
ā¢ A company usually
has a corporate list in
Contacts
ā¢ External
ā¢ Use Internet email
name and service
ā¢ RSpeener@cci.edu
ā¢ Jsmith@workplace.net
Rev 10/2010 Report Writing āEmail 10
11. Complimentary Copy
ā¢ Additional people being sent copies.
ā¢ If the recipients are all of equal importance, put them on
the To: line
ā¢ Use cc for courtesy copies
ā¢ Use bcc (blind copy) for sending copies without the
Addressee knowing. Use sparingly.
Rev 10/2010 Report Writing āEmail 12
13. Subject
ā¢ Subject is a brief summary of the content
ā¢ Sometimes it is called RE
ā¢ Be concise
ā¢ Be precise
ā¢ Be current
Rev 10/2010 Report Writing āEmail 14
15. Text
ā¢ Always have text
ā¢ Get to the point
ā¢ Be brief
ā¢ Put most important information first
ā¢ Know the purpose
ā¢ Use attachments for longer document rather than
embedding
Rev 10/2010 Report Writing āEmail 16
17. Signature Block
ā¢ Senderās information
ā¢ Include
ā¢ Name
ā¢ Job title
ā¢ email address
ā¢ Company, Department
ā¢ Separate from text by two or three lines
Rev 10/2010 Report Writing āEmail 18
20. Attachments
ā¢ Attachments are files that are sent along with the email
ā¢ Use attachments for
ā¢ Long documents
ā¢ Pictures
ā¢ Copies of existing documents
Rev 10/2010 Report Writing āEmail 21
22. Style
ā¢ Usually less formal
ā¢ It is somewhere between a conversation
and a memo
ā¢ Personal
ā¢ Business suitable
ā¢ Avoid excessive abbreviations
ā¢ Donāt be cute ā use emoticons sparingly
Rev 10/2010Report Writing āEmail 23
Never email something in bad taste!
23. Before Sending
ā¢ Check spelling
ā¢ Check grammar
ā¢ Check for clarity
ā¢ Check Addressee's name
ā¢ Donāt send emails when angry
ā¢ Remember telephones still exist ā Is email the best way
to respond?
Rev 10/2010 Report Writing āEmail 24
25. Managing
ā¢ Respond to emails promptly
ā¢ If given an assignment by email that will take several
days, acknowledge the assignment and the time
frame.
ā¢ Remove emails from active list frequently
ā¢ Archive frequently
Rev 10/2010 Report Writing āEmail 26
27. Emails are Forever
ā¢ Emails are never completely deleted
ā¢ They exist on files
ā¢ They exist in archives
ā¢ They exist in backups
ā¢ They exist on hard drives as ghosts
Rev 10/2010 Report Writing āEmail 28
29. Email and Security
ā¢ Emails and email attachments are a primary entry
method for computer viruses
ā¢ Viruses can spread extremely fast
ā¢ Computer crime is the growth sector of organized crime
Rev 10/2010 Report Writing āEmail 30
30. Email Security
ā¢ Be skeptical
ā¢ Open an email from an unknown sender with caution
ā¢ Never open email attachments from an unknown sender
ā¢ Never give out passwords, social security numbers, bank
account numbers, etc.
Rev 10/2010 Report Writing āEmail 31
31. Email Security Terms
ā¢ Virus ā A type of software that run without your
knowledge, replicates itself and spreads to other
computers
ā¢ Trojan Horseā A type of virus that is intended to
do harm to the computer. It is usually hidden
inside something attractive, such as a cartoon
ā¢ Worm ā a type of virus that spreads by Email
Rev 10/2010 Report Writing āEmail 32
32. Email Security Terms
ā¢ SpamāMass mailings
to know email users
ā¢ PhishāRequests for
personal information
from what appears to
be a trusted
organization; e.g.
personal bank
Rev 10/2010 Report Writing āEmail 33
33. Internet Security Terms
ā¢ ZombieāUnauthorized use of a computer by
others for their personal reasons
ā¢ BotāA web site that automatically transfers the
user to another undesired website
Rev 10/2010 Report Writing āEmail 34
34. Internet Security Terms
ā¢ AdwareāA program that automatically puts ads
(pop-ups) on the computer
ā¢ SpywareāA program that tracks oneās Internet
use. It may also track oneās keystrokes
(passwords etc.) and send it to a designated
recipient
Rev 10/2010 Report Writing āEmail 35
35. Security Measures
ā¢ Have a good anti-virus
program
ā¢ Use a firewall
ā¢ Have good spyware and
adware filters
ļ¬ Update regularly
ā¢ Have a good spam filter
ā¢ Update programs
frequently and quickly
ā¢ Do not open emails with
multiple forwards
ā¢ Be cautious in
downloading free or
shareware programs
ā¢ Be cautious in opening
emails from unknown
senders
ā¢ Be wary of attachments
Rev 10/2010 Report Writing āEmail 36
36. Summary
ā¢ Be concise and precise
ā¢ Respond promptly
ā¢ Be professional
ā¢ Be aware of email
security
Rev 10/2010 Report Writing āEmail 37
37. Examples
ā¢ Examples of Bad Email Messages
http://www.michaelhorowitz.com/bademails.html
Rev 10/2010 Report Writing āEmail 38
38. Resources
ā¢ Netiquette by Virginia Shea (2004)
http://www.albion.com/netiquette/book/index.html
ā¢ Outlook 2007 Tutorial http://tamhsc.edu/information-
technology/tutorials/outlook2007-
tutorial/Outlook%202007%20Tutorial.pdf
ā¢ Information Security Guidelines
http://www.gov.mu/portal/goc/ncb/file/pdf.pdf
ā¢ Getting up to Speed with Microsoft Outlook 2007
http://office.microsoft.com/training/training.aspx?AssetID=R
C101153581033
Rev 10/2010Report Writing āEmail 39