Page 256 - Encyclopedia of Business and Finance
P. 256

eobf_E  7/5/06  3:00 PM  Page 233


                                                                                                  Electronic Mail


                accounts and software, and using company time have no  important message details such as grammar and spelling,
                expectations of privacy. Companies feel free to examine an  will indicate professionalism in corporate communication.
                employee’s e-mail. In addition, e-mail has been sum-
                moned on court cases to prove work environment status.
                                                                 ETIQUETTE
                   Employees should never write anything in an e-mail  When communicating with e-mail, etiquette is an impor-
                that they would not say face-to-face to the concerned par-  tant convention that should not be overlooked. E-mail
                ties. E-mail is not like private letters that are received in
                                                                 lends itself naturally to brief messages. A message can be so
                the mail, torn up, and thrown away. E-mail is backed up,
                                                                 brief, however, that it is terse and may seem both rude and
                placed on other servers, and will be retrievable for a long
                                                                 abrupt to the receiver. Tone, therefore, is an important
                time. Also, the person to whom e-mail is sent may decide
                                                                 issue of etiquette. This is especially true in communicating
                to forward it to others without the sender’s permission.
                                                                 with international audiences who may expect a more
                                                                 extensive exchange of courtesies in the e-mail message.
                SECURITY                                            Correct use of e-mail etiquette includes such courte-
                E-mail is now available in many venues. Checking e-mail  sies as asking a message sender for permission before for-
                on office or home computers is no longer the only option.  warding the sender’s message to others, using an
                E-mail can be transmitted to personal digital assistants,  appropriate and clearly understood subject line, and send-
                pagers, and cell phones. These media frequently use wire-  ing messages only to people who have an interest in receiv-
                less networks. Wireless signals have more security issues  ing them.
                than wired systems. Just as a cell phone call can be inter-  Some message senders use emoticons or symbols to
                cepted and heard by others, so can the related e-mail be  indicate nonverbal communication cues, for instance,  :-)
                compromised. When dealing with issues that should be  (which indicates happiness). Reviews are mixed on whether
                secure, how the e-mail will be received should be consid-  emoticons are acceptable in the business use of e-mail.
                ered. Most companies would not want third parties to be
                able to easily glance at a cell phone display and see propri-
                                                                 JUNK MAIL AND FRAUD ATTEMPTS
                etary company information.
                                                                 Along with receiving a large volume of e-mail is the issue
                                                                 of junk mail including spam, viruses, and phishing. Spam
                ACCESS
                                                                 is unsolicited e-mail that is delivered usually in mass mail-
                E-mail is of value only if it is sent to a valid e-mail address  ings to the electronic mailbox. The sheer volume of spam
                where it will be reviewed by the person one is attempting  can cause systems to crash. In 2003 the CAN-SPAM Act
                to contact. Addresses may be changed and if an address is  was passed in an attempt to better regulate spam. Spam
                not current, the e-mail will not be delivered, resulting in a  filters have been taking a bite out of spam by excluding
                communication delay. One cannot communicate effec-  suspicious e-mail messages and sending them to a quaran-
                tively if one is missing e-mail addresses or has bad  tine area. The e-mail reader should go to the quarantine
                addresses, the other parties do not use e-mail, or the other  area periodically to see if important messages have been
                parties are not checking their e-mail.           sent there by accident. Because the spam filter looks for a
                                                                 wide variety of subject lines, care must be taken to include
                ORGANIZATION                                     an explicit and appropriate subject line. Using something
                In order to keep up with a barrage of e-mail arriving daily,  such as “hi” or “it’s me” might send messages straight to
                it is a good idea to organize one’s e-mail. E-mail is received  the receiver’s quarantine box.
                in chronological order, but most e-mail software will let  Viruses can be attached to e-mail messages, usually
                users sort the chronological list by name of sender or sub-  through attachments. A good plan is to scan attachments
                ject. This way users can find that message they remember  with a current virus scanner before opening any that
                getting but cannot see in their mailbox at first glance.  might be suspicious. As more computer users use strong
                Another option is to move messages one is finished with  antivirus programs, this issue may become less important
                to specific folders. Users can even designate that certain  in the future.
                incoming messages be sent directly to a folder or mailbox  Phishing occurs when a message is received that pur-
                rather than their inbox. Users do have to remember to  ports to be from an entity e-mail readers would know,
                check their e-mail in that special folder or mailbox,  such as their banks, popular shopping sites, or auction
                though.                                          services. If the message is not examined closely, the screen
                   Handling e-mail in a prompt and effective manner is  image and presentation may seem authentic. The message
                increasingly important as the volume of e-mail continues  is phishing for information by trying to get users to reveal
                to build. Accuracy in responses, as well as attention to  valuable personal information such as account numbers


                ENCYCLOPEDIA OF BUSINESS AND FINANCE, SECOND EDITION                                       233
   251   252   253   254   255   256   257   258   259   260   261