Email is a wonderful communication tool. With tremendous ease and minimal expense, users can send messages to one individual or a group of individuals. Since files can be attached to emails, it is possible for several people to simultaneously review material, make suggestions and reply back to the sender. Emailing has revolutionized the process of writing, editing and decision making.
However, as with every application or tool, there are advantages and disadvantages. By being aware of the disadvantages, these negative effects can be minimized. Email etiquette (netiquette), viruses and spam are just a few of the email minefields discussed in this module
One of the benefits of email is the ability to communicate quickly and concisely. Compose your thoughts before you write an email. Keep in mind that your messages can be forwarded to others without your consent. Avoid long-winded messages when a short concise message will work. Don't use the anonymity of email to send hurtful email.
Email should be checked frequently, meaning daily or more often. Email senders expect their messages to be read and answered quickly. If correspondents cannot be counted on to check email frequently, the advantages of emailing disappear. Delays may even hinder communication.
Since email messages are read on a computer screen, they should be brief (a screen full - about 25 lines). Longer messages can be sent as attachments that are more easily read and printed out. As computer and connection reliability increase, this attitude may change. It is very discouraging to write a long email and then be ready to click the send button when the computer crashes or the connection is lost.
Email is an informal means of communication. With its speed and interactivity, email messages tend to be very conversational. Conventional (snail) mail is better suited for communicating serious matters.
Although an email exchange has the interactive quality of a phone call, tone of voice and inflection are absent. When you add in email's tendency to be brief and informal, it is easy to see why electronic messages sometimes results in misunderstanding. Electronic communication is not a substitute for personal contact. Some matters should still be handled by phone or in person.
Email is never completely secure. If absolute confidentiality is required, choose another communication vehicle.
Be cautious with the use of acronyms and abbreviations, such as
All email addresses must be precise, much like phone numbers. Just one mistaken letter or number typed in the email address could route the email to another email address or back to the sender, accompanied by a discouraging email message.
Avoid using all caps in your email messages. Similarly, avoid using only small caps. USING ALL CAPS IS THE EQUIVALENT OF SHOUTING. Remember, email is a communications tool and good grammar and good manners are essential for effective communications.
Another area that needs to be mentioned is forwarding messages. Many people enjoy forwarded messages but others will immediately delete anything that is forwarded. Recently, I saw a forwarded email message that had over 500 addresses in it. That is a gold mine of valid 'live' email addresses. Valid email addresses are collected and sold to the folks that send junk email (spam). If you must forward something, then suppress the address list by using the BCC (blind carbon copy) option. In this course, we will use a mailing list (egroups) to hide addresses - more on this in a later module.
SPAM is unwanted junk email. Rule #1 of spam management is never to respond to a piece of junk email asking to be removed or unsubscribed. Identifying your email address as an active address - and one where unsolicited messages get read - begs for more spam.
Bulk emailers and unethical email abusers abound on the Internet. One way to combat this abuse is to sign up for a free email account with YAHOO, HOTMAIL, NETADDRESS or any of the many other email services. When asked for an email address, give out this account. Keep an account for personal email - but only give this address to friends and those who will not abuse it.
The majority of the virus warnings you receive from well-meaning friends are hoaxes. Once you have seen a few, they are easy to spot. Hoaxes usually attempt to panic you by describing devastating destruction to both your computer's software and hardware. Hoaxes often name a reliable company as the source of the message, but don't say exactly who is issuing the message. And they usually urge you to forward the message to everyone that you know. Even if the message seems authentic, don't forward it to your entire mailing list until you check it out. Here are some resources that you can use:
Some search engines such as YAHOO and ASK JEEVES don't use automated spiders. Instead human editors manually compile the web directories. In either case, search engines are the number one method used to find information on the web.
To begin a search, the user will enter one or more search words, select a search style and click a button to start the search. Most search sites offer three basic search styles: any words, all words and exact phrase.
The use of technology in education continues to rise. In 2000, about 60% of all college courses used email and about 43% used web pages in the course. Your participation in this course will greatly enhance your skills in these two areas.