SlideShare a Scribd company logo
Email
Electronic Communications
Objectives
ā€¢ Understand parts of an email
ā€¢ Differentiate between good and bad emails
ā€¢ Explain email etiquette
ā€¢ Evaluate email security risks
ā€¢ Write emails
Rev 10/2010 Report Writing ā€”Email 2
Definition
Email is the electronic
transmission of
messages through a
computer network.
Rev 10/2010 Report Writing ā€”Email 4
Rev 10/2010Report Writing ā€”Email 5
blog.esudhir.com/.../2009/09/email-cartoon.JPG
Basics of Good Communication
ā€¢ Know your audience
ā€¢ Write to that audience
ā€¢ Emphasize clarity
over cleverness
ā€¢ Emphasis content
over expansiveness
ā€¢ Two specific email violations
that bother instructors more
than students are emails not
signed by the message sender
and messages that include
shortcuts like "RU" instead of
"are you". Finally, it appears
that instructor generational
differences have little impact
on these descriptive findings.
ā€¢ Stephens, Keri K.; Houser, Marian
L.; Cowan, Renee L. R U Able to Meat Me:
The Impact of Students' Overly Casual
Email Messages to Instructors (2009)
Rev 10/2010 Report Writing ā€”Email 6
Design
ā€¢ Use standard fonts
ā€¢ Keep bolds, underlines, and italics to a minimum
ā€¢ If using a priority system, be honest.
ā€¢ Avoid backgrounds or stationary that detract
from the message.
Rev 10/2010 Report Writing ā€”Email 7
!
Parts of an email
ā€¢ Addressee
ā€¢ Cc:
ā€¢ Subject:
ā€¢ Text
ā€¢ Signature
ā€¢ Attachments
Rev 10/2010 Report Writing ā€”Email 8
Rev 10/2010Report Writing ā€”Email 9
Outlook
Addressee
ā€¢ The addressee is who
is to receive the email
ā€¢ Capitalization is not
necessary
ā€¢ Internal
ā€¢ Check company
mailing list for name
ā€¢ A company usually
has a corporate list in
Contacts
ā€¢ External
ā€¢ Use Internet email
name and service
ā€¢ RSpeener@cci.edu
ā€¢ Jsmith@workplace.net
Rev 10/2010 Report Writing ā€”Email 10
Addressee
Rev 10/2010Report Writing ā€”Email 11
Complimentary Copy
ā€¢ Additional people being sent copies.
ā€¢ If the recipients are all of equal importance, put them on
the To: line
ā€¢ Use cc for courtesy copies
ā€¢ Use bcc (blind copy) for sending copies without the
Addressee knowing. Use sparingly.
Rev 10/2010 Report Writing ā€”Email 12
ComplimentaryCopy
Rev 10/2010Report Writing ā€”Email 13
Subject
ā€¢ Subject is a brief summary of the content
ā€¢ Sometimes it is called RE
ā€¢ Be concise
ā€¢ Be precise
ā€¢ Be current
Rev 10/2010 Report Writing ā€”Email 14
Subject
Rev 10/2010Report Writing ā€”Email 15
Text
ā€¢ Always have text
ā€¢ Get to the point
ā€¢ Be brief
ā€¢ Put most important information first
ā€¢ Know the purpose
ā€¢ Use attachments for longer document rather than
embedding
Rev 10/2010 Report Writing ā€”Email 16
Text
Rev 10/2010Report Writing ā€”Email 17
Signature Block
ā€¢ Senderā€™s information
ā€¢ Include
ā€¢ Name
ā€¢ Job title
ā€¢ email address
ā€¢ Company, Department
ā€¢ Separate from text by two or three lines
Rev 10/2010 Report Writing ā€”Email 18
SignatureBlock
Rev 10/2010Report Writing ā€”Email 19
Attachments
Rev 10/2010Report Writing ā€”Email 20
Attachments
ā€¢ Attachments are files that are sent along with the email
ā€¢ Use attachments for
ā€¢ Long documents
ā€¢ Pictures
ā€¢ Copies of existing documents
Rev 10/2010 Report Writing ā€”Email 21
OtherBasics
Rev 10/2010Report Writing ā€”Email 22
Address Book
Font Control
Style
ā€¢ Usually less formal
ā€¢ It is somewhere between a conversation
and a memo
ā€¢ Personal
ā€¢ Business suitable
ā€¢ Avoid excessive abbreviations
ā€¢ Donā€™t be cute ā€” use emoticons sparingly
Rev 10/2010Report Writing ā€”Email 23
Never email something in bad taste!
Before Sending
ā€¢ Check spelling
ā€¢ Check grammar
ā€¢ Check for clarity
ā€¢ Check Addressee's name
ā€¢ Donā€™t send emails when angry
ā€¢ Remember telephones still exist ā€“ Is email the best way
to respond?
Rev 10/2010 Report Writing ā€”Email 24
Rev 10/2010Report Writing ā€”Email 25http://www.itsngenius.com/photos/albums/userpics/toon61.jpg
Managing
ā€¢ Respond to emails promptly
ā€¢ If given an assignment by email that will take several
days, acknowledge the assignment and the time
frame.
ā€¢ Remove emails from active list frequently
ā€¢ Archive frequently
Rev 10/2010 Report Writing ā€”Email 26
REMEMBER
Rev 10/2010 Report Writing ā€”Email 27
Emails are Forever
ā€¢ Emails are never completely deleted
ā€¢ They exist on files
ā€¢ They exist in archives
ā€¢ They exist in backups
ā€¢ They exist on hard drives as ghosts
Rev 10/2010 Report Writing ā€”Email 28
Security
Rev 10/2010 Report Writing ā€”Email 29
Email and Security
ā€¢ Emails and email attachments are a primary entry
method for computer viruses
ā€¢ Viruses can spread extremely fast
ā€¢ Computer crime is the growth sector of organized crime
Rev 10/2010 Report Writing ā€”Email 30
Email Security
ā€¢ Be skeptical
ā€¢ Open an email from an unknown sender with caution
ā€¢ Never open email attachments from an unknown sender
ā€¢ Never give out passwords, social security numbers, bank
account numbers, etc.
Rev 10/2010 Report Writing ā€”Email 31
Email Security Terms
ā€¢ Virus ā€“ A type of software that run without your
knowledge, replicates itself and spreads to other
computers
ā€¢ Trojan Horseā€“ A type of virus that is intended to
do harm to the computer. It is usually hidden
inside something attractive, such as a cartoon
ā€¢ Worm ā€“ a type of virus that spreads by Email
Rev 10/2010 Report Writing ā€”Email 32
Email Security Terms
ā€¢ Spamā€”Mass mailings
to know email users
ā€¢ Phishā€”Requests for
personal information
from what appears to
be a trusted
organization; e.g.
personal bank
Rev 10/2010 Report Writing ā€”Email 33
Internet Security Terms
ā€¢ Zombieā€”Unauthorized use of a computer by
others for their personal reasons
ā€¢ Botā€”A web site that automatically transfers the
user to another undesired website
Rev 10/2010 Report Writing ā€”Email 34
Internet Security Terms
ā€¢ Adwareā€”A program that automatically puts ads
(pop-ups) on the computer
ā€¢ Spywareā€”A program that tracks oneā€™s Internet
use. It may also track oneā€™s keystrokes
(passwords etc.) and send it to a designated
recipient
Rev 10/2010 Report Writing ā€”Email 35
Security Measures
ā€¢ Have a good anti-virus
program
ā€¢ Use a firewall
ā€¢ Have good spyware and
adware filters
ļ¬ Update regularly
ā€¢ Have a good spam filter
ā€¢ Update programs
frequently and quickly
ā€¢ Do not open emails with
multiple forwards
ā€¢ Be cautious in
downloading free or
shareware programs
ā€¢ Be cautious in opening
emails from unknown
senders
ā€¢ Be wary of attachments
Rev 10/2010 Report Writing ā€”Email 36
Summary
ā€¢ Be concise and precise
ā€¢ Respond promptly
ā€¢ Be professional
ā€¢ Be aware of email
security
Rev 10/2010 Report Writing ā€”Email 37
Examples
ā€¢ Examples of Bad Email Messages
http://www.michaelhorowitz.com/bademails.html
Rev 10/2010 Report Writing ā€”Email 38
Resources
ā€¢ Netiquette by Virginia Shea (2004)
http://www.albion.com/netiquette/book/index.html
ā€¢ Outlook 2007 Tutorial http://tamhsc.edu/information-
technology/tutorials/outlook2007-
tutorial/Outlook%202007%20Tutorial.pdf
ā€¢ Information Security Guidelines
http://www.gov.mu/portal/goc/ncb/file/pdf.pdf
ā€¢ Getting up to Speed with Microsoft Outlook 2007
http://office.microsoft.com/training/training.aspx?AssetID=R
C101153581033
Rev 10/2010Report Writing ā€”Email 39

More Related Content

What's hot

Advantages & Disadvantages of Email
Advantages & Disadvantages of EmailAdvantages & Disadvantages of Email
Advantages & Disadvantages of EmailAnirudh Kannan
Ā 
Mobile Reference, Mobile Librarians
Mobile Reference, Mobile LibrariansMobile Reference, Mobile Librarians
Mobile Reference, Mobile LibrariansDarcy Gervasio
Ā 
Presentation on eMargin given to BCU Learning & Teaching Committee
Presentation on eMargin given to BCU Learning & Teaching CommitteePresentation on eMargin given to BCU Learning & Teaching Committee
Presentation on eMargin given to BCU Learning & Teaching CommitteeRDUES
Ā 
E Mail And Forums In An Esl Classroom Teed 3035
E Mail And Forums In An Esl Classroom Teed 3035E Mail And Forums In An Esl Classroom Teed 3035
E Mail And Forums In An Esl Classroom Teed 3035Yaileen Filpo
Ā 
Instant Messaging for Libraries
Instant Messaging for LibrariesInstant Messaging for Libraries
Instant Messaging for LibrariesAmanda Stone
Ā 
adavantages and disadvanteges in email and blogs
adavantages and disadvanteges in email and blogsadavantages and disadvanteges in email and blogs
adavantages and disadvanteges in email and blogsalexandra
Ā 
Chat Technology
Chat TechnologyChat Technology
Chat TechnologyBEdEnglishEng
Ā 
Reshma technology 1
Reshma technology 1Reshma technology 1
Reshma technology 1BEdEnglishEng
Ā 
Eā€‘mail
Eā€‘mailEā€‘mail
Eā€‘mailMukul Kumar
Ā 
Social Media In An Eh World
Social Media In An Eh WorldSocial Media In An Eh World
Social Media In An Eh WorldSteve Lipton
Ā 
Web tools assignment
Web tools assignmentWeb tools assignment
Web tools assignmentThomas Dilu
Ā 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12FUMINAEUN
Ā 
Intellectual Property in Big Data Era: Opportunities and Challenges
Intellectual Property in Big Data Era: Opportunities and ChallengesIntellectual Property in Big Data Era: Opportunities and Challenges
Intellectual Property in Big Data Era: Opportunities and ChallengesAndrĆ© Mendes 安德ēƒˆ
Ā 

What's hot (15)

13. internet services
13. internet services13. internet services
13. internet services
Ā 
Advantages & Disadvantages of Email
Advantages & Disadvantages of EmailAdvantages & Disadvantages of Email
Advantages & Disadvantages of Email
Ā 
Mobile Reference, Mobile Librarians
Mobile Reference, Mobile LibrariansMobile Reference, Mobile Librarians
Mobile Reference, Mobile Librarians
Ā 
Presentation on eMargin given to BCU Learning & Teaching Committee
Presentation on eMargin given to BCU Learning & Teaching CommitteePresentation on eMargin given to BCU Learning & Teaching Committee
Presentation on eMargin given to BCU Learning & Teaching Committee
Ā 
E-MAIL
E-MAILE-MAIL
E-MAIL
Ā 
E Mail And Forums In An Esl Classroom Teed 3035
E Mail And Forums In An Esl Classroom Teed 3035E Mail And Forums In An Esl Classroom Teed 3035
E Mail And Forums In An Esl Classroom Teed 3035
Ā 
Instant Messaging for Libraries
Instant Messaging for LibrariesInstant Messaging for Libraries
Instant Messaging for Libraries
Ā 
adavantages and disadvanteges in email and blogs
adavantages and disadvanteges in email and blogsadavantages and disadvanteges in email and blogs
adavantages and disadvanteges in email and blogs
Ā 
Chat Technology
Chat TechnologyChat Technology
Chat Technology
Ā 
Reshma technology 1
Reshma technology 1Reshma technology 1
Reshma technology 1
Ā 
Eā€‘mail
Eā€‘mailEā€‘mail
Eā€‘mail
Ā 
Social Media In An Eh World
Social Media In An Eh WorldSocial Media In An Eh World
Social Media In An Eh World
Ā 
Web tools assignment
Web tools assignmentWeb tools assignment
Web tools assignment
Ā 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12
Ā 
Intellectual Property in Big Data Era: Opportunities and Challenges
Intellectual Property in Big Data Era: Opportunities and ChallengesIntellectual Property in Big Data Era: Opportunities and Challenges
Intellectual Property in Big Data Era: Opportunities and Challenges
Ā 

Viewers also liked

Viewers also liked (6)

Function
FunctionFunction
Function
Ā 
Subject verb agreement
Subject verb agreementSubject verb agreement
Subject verb agreement
Ā 
Bias.pdf
Bias.pdfBias.pdf
Bias.pdf
Ā 
Doors
DoorsDoors
Doors
Ā 
Fragments & run ons
Fragments & run onsFragments & run ons
Fragments & run ons
Ā 
Structure
StructureStructure
Structure
Ā 

Similar to EMail.pdf

Business English - Writing Workplace1.ppt
Business English - Writing Workplace1.pptBusiness English - Writing Workplace1.ppt
Business English - Writing Workplace1.pptabdelrahman allam
Ā 
Business English - Writing Workplace1.ppt
Business English - Writing Workplace1.pptBusiness English - Writing Workplace1.ppt
Business English - Writing Workplace1.pptSabrina377028
Ā 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8William Mann
Ā 
Using Technology to Improve Communication
Using Technology to Improve CommunicationUsing Technology to Improve Communication
Using Technology to Improve CommunicationSophia Abigayle
Ā 
Technical report writing of English communication.pdf
Technical report writing of English communication.pdfTechnical report writing of English communication.pdf
Technical report writing of English communication.pdfawaisiqbal132453
Ā 
L42 slides
L42 slidesL42 slides
L42 slidessgibson28
Ā 
Effective E- mailing
Effective E- mailingEffective E- mailing
Effective E- mailingDimple
Ā 
L5_Electronic communication.pptx
L5_Electronic communication.pptxL5_Electronic communication.pptx
L5_Electronic communication.pptxenukahansana
Ā 
Understanding Email Traffic (talk @ E-Discovery NL Symposium)
Understanding Email Traffic (talk @ E-Discovery NL Symposium)Understanding Email Traffic (talk @ E-Discovery NL Symposium)
Understanding Email Traffic (talk @ E-Discovery NL Symposium)David Graus
Ā 
E-Mails Etiquette
E-Mails EtiquetteE-Mails Etiquette
E-Mails Etiquettejagrati asija
Ā 
New powerpoint file
New powerpoint fileNew powerpoint file
New powerpoint fileUmesh Majhi
Ā 
webservices.pptx
webservices.pptxwebservices.pptx
webservices.pptxHelenToms3
Ā 
Internet & Email & collaborative Computing & Social Networking by Abeer Ali šŸ‘...
Internet & Email & collaborative Computing & Social Networking by Abeer Ali šŸ‘...Internet & Email & collaborative Computing & Social Networking by Abeer Ali šŸ‘...
Internet & Email & collaborative Computing & Social Networking by Abeer Ali šŸ‘...AbeerTariq7
Ā 
web services grp ppt.pptx
web services grp ppt.pptxweb services grp ppt.pptx
web services grp ppt.pptxHelenToms3
Ā 
web services grp ppt.pptx
web services grp ppt.pptxweb services grp ppt.pptx
web services grp ppt.pptxArdraD1
Ā 
web services grp ppt.pptx
web services grp ppt.pptxweb services grp ppt.pptx
web services grp ppt.pptxHelenToms3
Ā 

Similar to EMail.pdf (20)

Business English - Writing Workplace1.ppt
Business English - Writing Workplace1.pptBusiness English - Writing Workplace1.ppt
Business English - Writing Workplace1.ppt
Ā 
Business English - Writing Workplace1.ppt
Business English - Writing Workplace1.pptBusiness English - Writing Workplace1.ppt
Business English - Writing Workplace1.ppt
Ā 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8
Ā 
Using Technology to Improve Communication
Using Technology to Improve CommunicationUsing Technology to Improve Communication
Using Technology to Improve Communication
Ā 
Technical report writing of English communication.pdf
Technical report writing of English communication.pdfTechnical report writing of English communication.pdf
Technical report writing of English communication.pdf
Ā 
L42 slides
L42 slidesL42 slides
L42 slides
Ā 
Email writing skills
Email writing skillsEmail writing skills
Email writing skills
Ā 
Effective E- mailing
Effective E- mailingEffective E- mailing
Effective E- mailing
Ā 
L5_Electronic communication.pptx
L5_Electronic communication.pptxL5_Electronic communication.pptx
L5_Electronic communication.pptx
Ā 
Understanding Email Traffic (talk @ E-Discovery NL Symposium)
Understanding Email Traffic (talk @ E-Discovery NL Symposium)Understanding Email Traffic (talk @ E-Discovery NL Symposium)
Understanding Email Traffic (talk @ E-Discovery NL Symposium)
Ā 
E-Mails Etiquette
E-Mails EtiquetteE-Mails Etiquette
E-Mails Etiquette
Ā 
New powerpoint file
New powerpoint fileNew powerpoint file
New powerpoint file
Ā 
webservices.pptx
webservices.pptxwebservices.pptx
webservices.pptx
Ā 
Internet & Email & collaborative Computing & Social Networking by Abeer Ali šŸ‘...
Internet & Email & collaborative Computing & Social Networking by Abeer Ali šŸ‘...Internet & Email & collaborative Computing & Social Networking by Abeer Ali šŸ‘...
Internet & Email & collaborative Computing & Social Networking by Abeer Ali šŸ‘...
Ā 
web services grp ppt.pptx
web services grp ppt.pptxweb services grp ppt.pptx
web services grp ppt.pptx
Ā 
web services grp ppt.pptx
web services grp ppt.pptxweb services grp ppt.pptx
web services grp ppt.pptx
Ā 
web services grp ppt.pptx
web services grp ppt.pptxweb services grp ppt.pptx
web services grp ppt.pptx
Ā 
web services
web services web services
web services
Ā 
web services
web services web services
web services
Ā 
Web services
Web services Web services
Web services
Ā 

More from Ronald Speener

More from Ronald Speener (20)

Workflow managemet
Workflow managemetWorkflow managemet
Workflow managemet
Ā 
Teamwork
TeamworkTeamwork
Teamwork
Ā 
Communication skills
Communication skillsCommunication skills
Communication skills
Ā 
Leadership and management
Leadership and managementLeadership and management
Leadership and management
Ā 
Ronald Speener Interactive Resume
Ronald Speener Interactive ResumeRonald Speener Interactive Resume
Ronald Speener Interactive Resume
Ā 
Learning
Learning Learning
Learning
Ā 
Introduction to poetry
Introduction to poetryIntroduction to poetry
Introduction to poetry
Ā 
Verbs
VerbsVerbs
Verbs
Ā 
Pronoun other
Pronoun otherPronoun other
Pronoun other
Ā 
Pronouns case
Pronouns casePronouns case
Pronouns case
Ā 
Pronoun personal
Pronoun personalPronoun personal
Pronoun personal
Ā 
Critical process
Critical processCritical process
Critical process
Ā 
Communication
CommunicationCommunication
Communication
Ā 
Thesis statement
Thesis statementThesis statement
Thesis statement
Ā 
Introductions
IntroductionsIntroductions
Introductions
Ā 
Details
DetailsDetails
Details
Ā 
Concluding
ConcludingConcluding
Concluding
Ā 
Intellectual Property.pdf
Intellectual Property.pdfIntellectual Property.pdf
Intellectual Property.pdf
Ā 
Graphics.pdf
Graphics.pdfGraphics.pdf
Graphics.pdf
Ā 
SURVEY WRITING.pdf
SURVEY WRITING.pdfSURVEY WRITING.pdf
SURVEY WRITING.pdf
Ā 

Recently uploaded

ŠšŠŠ¢Š•Š Š˜ŠŠ ŠŠ‘Š—ŠÆŠ¢ŠžŠ’Š Ā«Š•Ń„ŠµŠŗтŠøŠ²Š½Šµ ŠæŠ»Š°Š½ŃƒŠ²Š°Š½Š½Ń тŠµŃŃ‚ŃƒŠ²Š°Š½Š½Ń ŠŗŠ»ŃŽŃ‡Š¾Š²Ń– Š°ŃŠæŠµŠŗтŠø тŠ° ŠæрŠ°Šŗт...
ŠšŠŠ¢Š•Š Š˜ŠŠ ŠŠ‘Š—ŠÆŠ¢ŠžŠ’Š  Ā«Š•Ń„ŠµŠŗтŠøŠ²Š½Šµ ŠæŠ»Š°Š½ŃƒŠ²Š°Š½Š½Ń тŠµŃŃ‚ŃƒŠ²Š°Š½Š½Ń  ŠŗŠ»ŃŽŃ‡Š¾Š²Ń– Š°ŃŠæŠµŠŗтŠø тŠ° ŠæрŠ°Šŗт...ŠšŠŠ¢Š•Š Š˜ŠŠ ŠŠ‘Š—ŠÆŠ¢ŠžŠ’Š  Ā«Š•Ń„ŠµŠŗтŠøŠ²Š½Šµ ŠæŠ»Š°Š½ŃƒŠ²Š°Š½Š½Ń тŠµŃŃ‚ŃƒŠ²Š°Š½Š½Ń  ŠŗŠ»ŃŽŃ‡Š¾Š²Ń– Š°ŃŠæŠµŠŗтŠø тŠ° ŠæрŠ°Šŗт...
ŠšŠŠ¢Š•Š Š˜ŠŠ ŠŠ‘Š—ŠÆŠ¢ŠžŠ’Š Ā«Š•Ń„ŠµŠŗтŠøŠ²Š½Šµ ŠæŠ»Š°Š½ŃƒŠ²Š°Š½Š½Ń тŠµŃŃ‚ŃƒŠ²Š°Š½Š½Ń ŠŗŠ»ŃŽŃ‡Š¾Š²Ń– Š°ŃŠæŠµŠŗтŠø тŠ° ŠæрŠ°Šŗт...QADay
Ā 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...Product School
Ā 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
Ā 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Ā 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Ā 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Product School
Ā 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...Product School
Ā 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
Ā 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Ā 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Product School
Ā 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance
Ā 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...Product School
Ā 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
Ā 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance
Ā 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
Ā 
UiPath New York Community Day in-person event
UiPath New York Community Day in-person eventUiPath New York Community Day in-person event
UiPath New York Community Day in-person eventDianaGray10
Ā 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
Ā 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesThousandEyes
Ā 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance
Ā 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
Ā 

Recently uploaded (20)

ŠšŠŠ¢Š•Š Š˜ŠŠ ŠŠ‘Š—ŠÆŠ¢ŠžŠ’Š Ā«Š•Ń„ŠµŠŗтŠøŠ²Š½Šµ ŠæŠ»Š°Š½ŃƒŠ²Š°Š½Š½Ń тŠµŃŃ‚ŃƒŠ²Š°Š½Š½Ń ŠŗŠ»ŃŽŃ‡Š¾Š²Ń– Š°ŃŠæŠµŠŗтŠø тŠ° ŠæрŠ°Šŗт...
ŠšŠŠ¢Š•Š Š˜ŠŠ ŠŠ‘Š—ŠÆŠ¢ŠžŠ’Š  Ā«Š•Ń„ŠµŠŗтŠøŠ²Š½Šµ ŠæŠ»Š°Š½ŃƒŠ²Š°Š½Š½Ń тŠµŃŃ‚ŃƒŠ²Š°Š½Š½Ń  ŠŗŠ»ŃŽŃ‡Š¾Š²Ń– Š°ŃŠæŠµŠŗтŠø тŠ° ŠæрŠ°Šŗт...ŠšŠŠ¢Š•Š Š˜ŠŠ ŠŠ‘Š—ŠÆŠ¢ŠžŠ’Š  Ā«Š•Ń„ŠµŠŗтŠøŠ²Š½Šµ ŠæŠ»Š°Š½ŃƒŠ²Š°Š½Š½Ń тŠµŃŃ‚ŃƒŠ²Š°Š½Š½Ń  ŠŗŠ»ŃŽŃ‡Š¾Š²Ń– Š°ŃŠæŠµŠŗтŠø тŠ° ŠæрŠ°Šŗт...
ŠšŠŠ¢Š•Š Š˜ŠŠ ŠŠ‘Š—ŠÆŠ¢ŠžŠ’Š Ā«Š•Ń„ŠµŠŗтŠøŠ²Š½Šµ ŠæŠ»Š°Š½ŃƒŠ²Š°Š½Š½Ń тŠµŃŃ‚ŃƒŠ²Š°Š½Š½Ń ŠŗŠ»ŃŽŃ‡Š¾Š²Ń– Š°ŃŠæŠµŠŗтŠø тŠ° ŠæрŠ°Šŗт...
Ā 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Ā 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
Ā 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Ā 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Ā 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Ā 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Ā 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ā 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
Ā 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Ā 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
Ā 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Ā 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Ā 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
Ā 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Ā 
UiPath New York Community Day in-person event
UiPath New York Community Day in-person eventUiPath New York Community Day in-person event
UiPath New York Community Day in-person event
Ā 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Ā 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Ā 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
Ā 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Ā 

EMail.pdf

  • 2. Objectives ā€¢ Understand parts of an email ā€¢ Differentiate between good and bad emails ā€¢ Explain email etiquette ā€¢ Evaluate email security risks ā€¢ Write emails Rev 10/2010 Report Writing ā€”Email 2
  • 3. Definition Email is the electronic transmission of messages through a computer network. Rev 10/2010 Report Writing ā€”Email 4
  • 4. Rev 10/2010Report Writing ā€”Email 5 blog.esudhir.com/.../2009/09/email-cartoon.JPG
  • 5. Basics of Good Communication ā€¢ Know your audience ā€¢ Write to that audience ā€¢ Emphasize clarity over cleverness ā€¢ Emphasis content over expansiveness ā€¢ Two specific email violations that bother instructors more than students are emails not signed by the message sender and messages that include shortcuts like "RU" instead of "are you". Finally, it appears that instructor generational differences have little impact on these descriptive findings. ā€¢ Stephens, Keri K.; Houser, Marian L.; Cowan, Renee L. R U Able to Meat Me: The Impact of Students' Overly Casual Email Messages to Instructors (2009) Rev 10/2010 Report Writing ā€”Email 6
  • 6. Design ā€¢ Use standard fonts ā€¢ Keep bolds, underlines, and italics to a minimum ā€¢ If using a priority system, be honest. ā€¢ Avoid backgrounds or stationary that detract from the message. Rev 10/2010 Report Writing ā€”Email 7 !
  • 7. Parts of an email ā€¢ Addressee ā€¢ Cc: ā€¢ Subject: ā€¢ Text ā€¢ Signature ā€¢ Attachments Rev 10/2010 Report Writing ā€”Email 8
  • 8. Rev 10/2010Report Writing ā€”Email 9 Outlook
  • 9. Addressee ā€¢ The addressee is who is to receive the email ā€¢ Capitalization is not necessary ā€¢ Internal ā€¢ Check company mailing list for name ā€¢ A company usually has a corporate list in Contacts ā€¢ External ā€¢ Use Internet email name and service ā€¢ RSpeener@cci.edu ā€¢ Jsmith@workplace.net Rev 10/2010 Report Writing ā€”Email 10
  • 11. Complimentary Copy ā€¢ Additional people being sent copies. ā€¢ If the recipients are all of equal importance, put them on the To: line ā€¢ Use cc for courtesy copies ā€¢ Use bcc (blind copy) for sending copies without the Addressee knowing. Use sparingly. Rev 10/2010 Report Writing ā€”Email 12
  • 13. Subject ā€¢ Subject is a brief summary of the content ā€¢ Sometimes it is called RE ā€¢ Be concise ā€¢ Be precise ā€¢ Be current Rev 10/2010 Report Writing ā€”Email 14
  • 15. Text ā€¢ Always have text ā€¢ Get to the point ā€¢ Be brief ā€¢ Put most important information first ā€¢ Know the purpose ā€¢ Use attachments for longer document rather than embedding Rev 10/2010 Report Writing ā€”Email 16
  • 17. Signature Block ā€¢ Senderā€™s information ā€¢ Include ā€¢ Name ā€¢ Job title ā€¢ email address ā€¢ Company, Department ā€¢ Separate from text by two or three lines Rev 10/2010 Report Writing ā€”Email 18
  • 20. Attachments ā€¢ Attachments are files that are sent along with the email ā€¢ Use attachments for ā€¢ Long documents ā€¢ Pictures ā€¢ Copies of existing documents Rev 10/2010 Report Writing ā€”Email 21
  • 21. OtherBasics Rev 10/2010Report Writing ā€”Email 22 Address Book Font Control
  • 22. Style ā€¢ Usually less formal ā€¢ It is somewhere between a conversation and a memo ā€¢ Personal ā€¢ Business suitable ā€¢ Avoid excessive abbreviations ā€¢ Donā€™t be cute ā€” use emoticons sparingly Rev 10/2010Report Writing ā€”Email 23 Never email something in bad taste!
  • 23. Before Sending ā€¢ Check spelling ā€¢ Check grammar ā€¢ Check for clarity ā€¢ Check Addressee's name ā€¢ Donā€™t send emails when angry ā€¢ Remember telephones still exist ā€“ Is email the best way to respond? Rev 10/2010 Report Writing ā€”Email 24
  • 24. Rev 10/2010Report Writing ā€”Email 25http://www.itsngenius.com/photos/albums/userpics/toon61.jpg
  • 25. Managing ā€¢ Respond to emails promptly ā€¢ If given an assignment by email that will take several days, acknowledge the assignment and the time frame. ā€¢ Remove emails from active list frequently ā€¢ Archive frequently Rev 10/2010 Report Writing ā€”Email 26
  • 26. REMEMBER Rev 10/2010 Report Writing ā€”Email 27
  • 27. Emails are Forever ā€¢ Emails are never completely deleted ā€¢ They exist on files ā€¢ They exist in archives ā€¢ They exist in backups ā€¢ They exist on hard drives as ghosts Rev 10/2010 Report Writing ā€”Email 28
  • 28. Security Rev 10/2010 Report Writing ā€”Email 29
  • 29. Email and Security ā€¢ Emails and email attachments are a primary entry method for computer viruses ā€¢ Viruses can spread extremely fast ā€¢ Computer crime is the growth sector of organized crime Rev 10/2010 Report Writing ā€”Email 30
  • 30. Email Security ā€¢ Be skeptical ā€¢ Open an email from an unknown sender with caution ā€¢ Never open email attachments from an unknown sender ā€¢ Never give out passwords, social security numbers, bank account numbers, etc. Rev 10/2010 Report Writing ā€”Email 31
  • 31. Email Security Terms ā€¢ Virus ā€“ A type of software that run without your knowledge, replicates itself and spreads to other computers ā€¢ Trojan Horseā€“ A type of virus that is intended to do harm to the computer. It is usually hidden inside something attractive, such as a cartoon ā€¢ Worm ā€“ a type of virus that spreads by Email Rev 10/2010 Report Writing ā€”Email 32
  • 32. Email Security Terms ā€¢ Spamā€”Mass mailings to know email users ā€¢ Phishā€”Requests for personal information from what appears to be a trusted organization; e.g. personal bank Rev 10/2010 Report Writing ā€”Email 33
  • 33. Internet Security Terms ā€¢ Zombieā€”Unauthorized use of a computer by others for their personal reasons ā€¢ Botā€”A web site that automatically transfers the user to another undesired website Rev 10/2010 Report Writing ā€”Email 34
  • 34. Internet Security Terms ā€¢ Adwareā€”A program that automatically puts ads (pop-ups) on the computer ā€¢ Spywareā€”A program that tracks oneā€™s Internet use. It may also track oneā€™s keystrokes (passwords etc.) and send it to a designated recipient Rev 10/2010 Report Writing ā€”Email 35
  • 35. Security Measures ā€¢ Have a good anti-virus program ā€¢ Use a firewall ā€¢ Have good spyware and adware filters ļ¬ Update regularly ā€¢ Have a good spam filter ā€¢ Update programs frequently and quickly ā€¢ Do not open emails with multiple forwards ā€¢ Be cautious in downloading free or shareware programs ā€¢ Be cautious in opening emails from unknown senders ā€¢ Be wary of attachments Rev 10/2010 Report Writing ā€”Email 36
  • 36. Summary ā€¢ Be concise and precise ā€¢ Respond promptly ā€¢ Be professional ā€¢ Be aware of email security Rev 10/2010 Report Writing ā€”Email 37
  • 37. Examples ā€¢ Examples of Bad Email Messages http://www.michaelhorowitz.com/bademails.html Rev 10/2010 Report Writing ā€”Email 38
  • 38. Resources ā€¢ Netiquette by Virginia Shea (2004) http://www.albion.com/netiquette/book/index.html ā€¢ Outlook 2007 Tutorial http://tamhsc.edu/information- technology/tutorials/outlook2007- tutorial/Outlook%202007%20Tutorial.pdf ā€¢ Information Security Guidelines http://www.gov.mu/portal/goc/ncb/file/pdf.pdf ā€¢ Getting up to Speed with Microsoft Outlook 2007 http://office.microsoft.com/training/training.aspx?AssetID=R C101153581033 Rev 10/2010Report Writing ā€”Email 39