(EMC) ELECTRONICALLY MEDIATED COMMUNICATION. Communication sent via a channel such as a cell phone or the Internet (versus face-to-face).
|
|
|
- Horatio Montgomery
- 9 years ago
- Views:
Transcription
1 ELECTRONICALLY MEDIATED COMMUNICATION (EMC) Communication sent via a channel such as a cell phone or the Internet (versus face-to-face). Examples of EMC Cell phones Computerconferencing Discussion boards Electronic mail Instant messages Photo-sharing communities Social networks (e.g., Facebook, MySpace, Twitter) Texting Blogs Videologs (Vlogs) VOIP (Voice Over Internet Protocol technology, such as Skyping and YouTube) Differences between EMC & F2F Time: Synchronous vs. asynchronous Anonymity: Varies Honesty: Potential for Deception is greater Nonverbal cues: More difficult to assess Language: Relies upon written word; varies on formality (and spelling) Distance: Proximity isn t as vital 1
2 Hyperpersonal Relationships Relationships formed primarily through EMC that become even more personal than the equivalent F2F relationship Due to Absence of distracting external cues (physical appearance) Smaller (selective) amounts of personal information being disclosed Idealization of the communication partner Joseph Walther (1996) EMC Theories Cues-Filtered-Out Theory: Nonverbal cues are limited Nonverbal emotional expression is restricted with text messages We are less likely to use EMC to manage continuing relationships Media Richness Theory: 4 criteria Amount of feedback available to communicators Number of cues the channel can convey (that can be interpreted by a receiver) Variety of language used Potential for expressing emotions and relational messages Social Information-Processing Theory: Can communicate emotions & feelings, but takes longer Technology is changing our understanding of conversations Awareness of audience Degree of conversational spontaneity Abruptness of disengagement Multiplicity of conversations Acceptance of interruptions Notions of Privacy Who is receiving the message? How much planning goes into the message? When does the conversation end? Who else is involved in this (or other) conversations? Who is more important? Interruptions inevitable? Who is able to access the conversation? 2
3 What are the pro s and cons you experience with EMC? Don t assume: Others hold the same attitudes toward EMC as you do Jumpstart (Robb Armstrong) Don t assume: Others hold the same attitudes toward EMC as you do The receiver is the only person receiving your message and/or actually received your message Others know who you are Identify yourself Leave name & contact information (2x on phone) Others are able or willing to respond/communicate at that time 3
4 Beware of Sexting - the sending of nude, semi-nude, or erotic pictures or video via cell phone Cyberbullying (AKA digital harassment) mistreatment that takes place using an electronic medium (includes Cyberstalking) Phishing attempting to acquire sensitive information such as usernames, passwords, and credit card details by posing as a trustworthy entity in an electronic communication. Forwarded funnies /warnings electronic communication that originates from another source than the sender; often unwanted and/or untrue Use common sense! Refuse to pass along unwanted, unverified messages Remember privacy: Limit access to your social network sites Never post or share your personal information online, including sex &relational status Never share your passwords Create a gender neutral name and use business-like signatures Use virus and tracking detection programs Delete questionable documents without opening them Get a spam account Cyber-bullying: If you find yourself being victimized, the classic advice is to ignore the stalker. Even responding to their to say, Leave me alone, just encourages them. Block and report cyber-bullying to the proper authorities Be careful about meeting face-to-face Cell Phone Etiquette If engaged in F2F communication, ignore cell phone Tell others in advance if you are waiting for an important call When you answer a phone call during a conversation with another person, you are saying "you're not as important to me as the person on the phone." Turn off (silent or vibrate might be okay): Theater, musical, film, public speaking events Classrooms, libraries, meetings, worship service, court (continued) 4
5 Cell Phone Etiquette (cont.) Maintain privacy Remove yourself from others so you can speak privately Avoid using the speaker phone & keep your volume down Bad connection? Hang up and find a better place to make the call Avoid discussing personal matters if you are in a public space Screen calls (use voice mail & caller ID) & Text Part of your presenting self in the same way that your verbal and nonverbal messages are in F2F communication Adapt to the communication situation Don t use text abbreviations when ing an employer, a professor, etc. or text may not be the best channel; be flexible AVOID SHOUTING! Take advantage of delayed feedback plan your message Take into account the absence of nonverbal cues to meaning Don t say anything in an or text that you wouldn t say in person and that you wouldn t want forwarded or kept for a later time guidelines If you are responding, include the wording that you are responding to or reference it Identify yourself in the message Use the subject line appropriately Use common abbreviations sparingly, if at all Use proper capitalization, spelling, & punctuation I know you want vs. i no u wnt Be respectful and polite Keep in mind that messages are not secure and can live forever! 5
6 TXTNG Don t text When you are with someone else (without apologizing) If you are intoxicated While driving When a phone call or face-toface would be more effective Don t send bad news by text Don t assume that all people text Beware of problems from TXTNG General deterioration of writing skills Cheating in academic settings Lessened ability to make own decisions because constantly consulting friends Texting can be addictive 6
Online Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
Pacific Northwest University of Health Sciences
Effective: 7/01/06 Exec. Lead: Chief Business Officer Revised: 1/11 Approved By: Board of Trustees Expired: n/a Applies To: University-wide Pacific Northwest University of Health Sciences Policy: Computer,
Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ:
Game Cheatsheet This is a spam email, an unsolicited and unwanted email from an unknown sender. Hint: Does this offer seem too good to be true? Perhaps you need to know more? Best actions: Delete, Check
Affirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
Social Media Guidelines
Purpose for Social Media Guidelines: Guilford County Schools (GCS) realizes that part of 21st century learning is adapting to the changing methods of communication. The importance of teachers, students
Salisbury Township School District Guidelines for Guiding Staff, Students and Parents in Use of Social Media
What is social media? Social media is defined as any form of online publication or presence that allows end users to engage in multidirectional conversations in or around the content on the website. (Online
Social Media and Cyber Safety
Social Media and Cyber Safety Presented to the National Association of REALTORS by Andrew Wooten Safety and Security Consultant [email protected] Social Media and Cyber Safety Our instructor today
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary
EADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
Youth Online Behavior
Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology
Tips for Effective Online Composition and Communication with Dr. Gary Burkholder
Transcript Tips for Effective Online Composition and Communication with Dr. Gary Burkholder [ MUSIC ] HI, I WANT TO DISCUSS FOR YOU TODAY TIPS FOR EFFECTIVE ONLINE COMPOSITION AND COMMUNICATION. AS WALDEN
The Complete Educator s Guide to Using Skype effectively in the classroom
The Complete Educator s Guide to Using Increasingly, educators globally are transforming their classroom using Skype to create powerful, authentic, motivating learning experiences for their students. From
Etiquette Recognition of Rank or Position Gender Neutral Etiquette Telephone E-mail Cubicle Manners Business Cards, Appearance
OFFICE ETIQUETTE The definition of Etiquette is the conduct or procedure prescribed by authority to be observed in social and office environments. An organization s ability to accomplish its mission is
EDEXCEL FUNCTIONAL SKILLS ICT. Study Module 8. Using ICT to communicate
EDEXCEL FUNCTIONAL SKILLS ICT Study Module 8 Using ICT to communicate Published by Pearson Education, Edinburgh Gate, Harlow CM20 2JE Pearson Education 2010 All rights reserved. This material may be used
Computer Mediated Communication (CMC) Group members use of computers in order to communicate with one another
Computer Mediated Communication (CMC) Group members use of computers in order to communicate with one another Forms of CMC E-mail Instant Messaging Chat Rooms Facebook/My Space Listservs Net Conferencing
HEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger
effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor
Social Media and its effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Director, Begun Center for Violence Prevention Research & Education Mandel School of Applied Social Sciences
Tips for Taking Online Classes. Student Success Workshop
Tips for Taking nline Classes Student Success Workshop Types of Distance Learning Distance learning occurs outside of the traditional classroom setting. These classes may take place over the internet (i.e.
SOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
Teen Online & Wireless Safety Survey
Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications [email protected] 404-269-8057 Cox Communications
E-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
LaGuardia Community College Department of Human Resources CUSTOMER SERVICE COMMUNICATION SKILLS INTERPERSONAL SKILLS E-MAIL & TELEPHONE TECHNIQUES
LaGuardia Community College Department of Human Resources CUSTOMER SERVICE COMMUNICATION SKILLS INTERPERSONAL SKILLS E-MAIL & TELEPHONE TECHNIQUES 1 This Workshop Provides Strategies to: Deliver quality
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
Protect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
Model Policy for a Law Enforcement Agency s use of Social Networking
Model Policy for a Law Enforcement Agency s use of Social Networking Disclaimer: This is a model policy was designed to provide a guide to writing a policy related to social networking use. This model
How To Teach Your Students To Be Respectful
E-RATE TOOLKIT Show Respect Online LESSON PLAN Essential Question: How can I make sure my emails are clear and respectful? Learning Overview and Objectives Overview: Students explore the similarities and
Guidelines for Preventing and Dealing with Bullying Issues
Guidelines for Preventing and Dealing with Bullying Issues Stapleford School aims to value all its members, to give all the opportunity to learn, act fairly and celebrate differences between individuals.
Today s mobile ecosystem means shared responsibility
It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has
Office of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices
Office of the Attorney General of Virginia Sexting Protecting Yourself on the Internet and Mobile Devices Websites Often Used for Social Networking Monthly Visitors to Social Networking Sites 1. 750,000,000
Good Practices In Technology: The K-12 Classroom
Good Practices In Technology: The K-12 Classroom Elizabethtown Independent School District BUILDING ON A TRADITION OF EXCELLENCE Ver 0909.2 Acceptable Use Policy All users must read the Acceptable Use
Baldwin County Public Schools. Acceptable Use Policy
Introduction Baldwin County Public Schools Acceptable Use Policy Baldwin County Public Schools (BCPS) recognizes that access to technology in school gives students greater opportunities to learn, engage,
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
HOW TO STAY SAFE. Smartphones
HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these
North Carolina EFNEP Social Media Guidelines
North Carolina EFNEP Social Media Guidelines This document gives guidance to the publication of and commentary on social media by employees of NC EFNEP. For the purposes of this document, social media
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,
Staying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
Social Media Guidelines
Northern Virginia Community College Social Media Guidelines social networks, social media, blogs, wikis and virtual worlds April 2013 (revised) 04.11.13 Page 1 Table of Contents Introduction 3 Connect
FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
SOCIAL MEDIA GUIDELINES FOR SCHOOLS
SOCIAL MEDIA GUIDELINES FOR SCHOOLS The goal of these guidelines is to provide, staff, administrators, students, parents and the school district community direction when using social media applications
Calling Features User Guide
Calling Features User Guide www.etczone.com 866-ETC-4YOU 1 SUNMAN BATESVILLE GREENSBURG BROOKVILLE LIBERTY (812) 623-2122 (812) 932-1000 (812) 222-1000 (765) 547-1000 (765) 223-1000 Today s fast-paced
Business Etiquette. What is it and why does it matter?
What is it and why does it matter? What is Business Etiquette? The rules or norms cultural and societal - both in origin and scope, that define the boundaries of acceptable or expected business interaction
Haslingden High School
Haslingden High School ICT Department Year 8 esafety and Web Design homework Student name: Form: ICT teacher: Date issued: Date due: Level Effort House points Teacher feedback: KS3 Target level Parent/Carer
Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )
Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.
YOUR REPUTATION IS AT RISK! REPUTATION MANAGEMENT BECAUSE YOUR REPUTATION IS AT RISK! 727 479-2991. 0 P a g e
0 P a g e BECAUSE YOUR REPUTATION IS AT RISK! YOUR REPUTATION IS AT RISK! REPUTATION MANAGEMENT 727 479-2991 1 P a g e Table of Contents Online Reputation Management... 2 What is online reputation management?...
Good Communication & Customer Service Basics. Brought to you by Human Resources and Information Services & Resources
Good Communication & Customer Service Basics Brought to you by Human Resources and Information Services & Resources Presentation Contents Principles of Good Communication Telephone Guidelines Voice Mail
Internet Safety/CIPA Lesson Plan
Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,
Acceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
Digital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
Overview. Here to serve, Cedarville University Marketing Department Tyler 212 Suite cedarville.edu/marketing
Social Media Policy Overview... 2 Using Social Media on Behalf of Cedarville University... 3 Content Management... 4 Best Practices... 4 Facebook... 5 Twitter... 5 Blogs... 6 Photos... 6 Video... 6 Comments
UniCom Enterprise Phone (Polycom CX600) User Guide
UniCom Enterprise Phone (Polycom CX600) User Guide 1 6 What is UniCom Enterprise?...1 Frequently Used Make a Call...6 What is Microsoft Lync?...1 Call Functions Use Call Controls...7 Who can use UniCom
e-safety for Parents
e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology
FIRBANK GRAMMAR SCHOOL
FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...
Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations
Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations Overview: Students examine their participation in digital life. They explore how information shared through digital media
Internet basics 2.3 Protecting your computer
Basics Use this document with the glossary Beginner s guide to Internet basics 2.3 Protecting your computer How can I protect my computer? This activity will show you how to protect your computer from
Introduction. Tips for Email Success. Email 101 Email Etiquette and Safety. Page 1
Email 101 Email Etiquette and Safety Introduction Page 1 Like any form of online communication, it's important to practice good etiquette and safety when using email. Etiquette is a set of rules and guidelines
Customer Service and Communication. Bringing service to the next level
Customer Service and Communication Bringing service to the next level 1 Park Authority Philosophy & Goals Before focusing on customer service, it is first important to understand and reinforce the Park
A Parents Guide to. 2014 ConnectSafely.org
A Parents Guide to 2014 ConnectSafely.org Parenting in the age of social media can be tricky. Australians are amongst the highest users of social media in the world, averaging 22 hours per week per person.
COMM 286S: Business & Professional Communication
COMM 286S: Business & Professional Communication Course Syllabus Fall 2014 Instructor: Katherine M. Castle Email [email protected] Office Hours-See BlackBoard Course Description and Objectives Employers
Social Media Guidelines
Anchorage School District Social Media Guidelines Social media includes the various online technology tools that enable people to communicate easily over the Internet to share information and resources.
IOWA WESTERN COMMUNITY COLLEGE Course Syllabus Information SPC-122 Interpersonal Communication Term: Winterim (12/19-1/6)
IOWA WESTERN COMMUNITY COLLEGE Course Syllabus Information SPC-122 Interpersonal Communication Term: Winterim (12/19-1/6) I. Faculty Information: Instructor: Mrs. Tanna White Cell Phone: (319) 830-9728
Chapter 3. Online Bullying
Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.
think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney
think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities
OHIO EXPOSITIONS COMMISSION CUSTOMER SERVICE GUIDELINES
OHIO EXPOSITIONS COMMISSION CUSTOMER SERVICE GUIDELINES The Ohio Expositions Commission (OEC) is committed to providing the best possible service to customers both internal and external. In support of
GUIDELINES FOR THE USE OF SOCIAL MEDIA. January 2010
GUIDELINES FOR THE USE OF SOCIAL MEDIA January 2010 Revised July 2010 Prepared by: The Voices Technology and Best Practice Team TABLE OF CONTENTS Overview of Document...2 General Rules to Follow...3 Social
Today s teens use technology more than ever. Most have
Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social
A Parents' Guide to. Snapchat. 2013 ConnectSafely.org
A Parents' Guide to Snapchat 2013 ConnectSafely.org Top 5 Questions Parents Have About Snapchat 1. Why do kids love Snapchat? They love the spontaneity of it. It s been (rightfully) drummed into their
Adjust Webmail Spam Settings
Adjust Webmail Spam Settings An unsolicited bulk email message is known as "spam." Spam, which usually contains some sort of commercial advertising or proposition, is sent to a large number of recipients
A short guide to Twitter
A short guide to Twitter What is Twitter? Twitter is a micro-blogging communication platform that enables users to send short messages (up to 140 characters) that can be read by anybody else on Twitter.
SOCIAL MEDIA IN PERSONAL INJURY LAW
David K. Inscho Kline and Specter, P.C. SOCIAL MEDIA IN PERSONAL INJURY LAW The Internet isn t written in pencil Mark Social Media Issues Discovery of Social Media Social Media in Investigation Social
Etiquette Advantage in Business. Communications in a Digital World
Etiquette Advantage in Business Communications in a Digital World Gina Johnson The University of Alabama 2013 The Emily Post Institute, Inc. 1 The Most Important Communication Guidelines Be aware if it
GUIDELINES FOR EFFECTIVE WEB CONFERENCES JULY 2008
VNETVIRGINIA EDUCATION NETWORK FOR VIRTUAL CONFERENCING GUIDELINES FOR EFFECTIVE WEB CONFERENCES JULY 2008 VNETVIRGINIA EDUCATION NETWORK FOR VIRTUAL CONFERENCING A principal goal of the Office of Educational
School Policy Regarding Computer Use, Technology and Internet Access
School Policy Regarding Computer Use, Technology and Internet Access Please read the following carefully, as it provides information about the responsibilities and expectations regarding use of school
Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself
