Instant Messaging (IM) Literacy in the Workplace

2009 ◽  
pp. 1225-1242
Author(s):  
Beth L. Hewett ◽  
Russell J. Hewett

This chapter discusses instant messaging (IM) as a valuable digital tool that has influenced business communication practices at least as much as e-mail. It argues that IM’s characteristics of presence awareness, synchronicity, hybridity, and interactivity create a unique set of writing and reading experiences. These functional qualities both require and hone high-level writing and reading skills, which are used powerfully in communicative multitasking. The authors believe that IM should be sanctioned in the workplace and that IM use should be a subject of focused training; to that end, they provide a practical, literacy-based training sequence that can be adapted to various settings.

Author(s):  
Beth L. Hewett ◽  
Russell J. Hewett

This chapter discusses instant messaging (IM) as a valuable digital tool that has influenced business communication practices at least as much as e-mail. It argues that IM’s characteristics of presence awareness, synchronicity, hybridity, and interactivity create a unique set of writing and reading experiences. These functional qualities both require and hone high-level writing and reading skills, which are used powerfully in communicative multitasking. The authors believe that IM should be sanctioned in the workplace and that IM use should be a subject of focused training; to that end, they provide a practical, literacy-based training sequence that can be adapted to various settings.


2010 ◽  
Vol 45 ◽  
Author(s):  
Marisa Liebenberg ◽  
Hugo Lotriet

This paper presents the results of an exploratory investigation into telecommunications practices and challenges among the Deaf in South Africa. Telecommunication products like cell phones, TTY’s, sMessage terminals, e-mail, fax messaging, instant messaging (IM) were some of the technologies investigated. The research shows that the Deaf considers IM as the most successful technology for both business and social communication. E-mail was rated most often used for business communication, where as e-mail and SMS were rated most used for social communication. The main drawbacks experienced by deaf users of telecommunications technologies related to connecting with and understanding of people. The research findings indicate that the Deaf would like to see heightened public awareness of deafness and its challenges in telecommunication.


2012 ◽  
Vol 4 (2) ◽  
pp. 165-169 ◽  
Author(s):  
Diana S. Curran ◽  
Pamela B. Andreatta ◽  
Xiao Xu ◽  
Clark E. Nugent ◽  
Samantha R. Dewald ◽  
...  

Abstract Introduction Residency programs seek to match the best candidates with their positions. To avoid ethical conflicts in this process, the National Residency Matching Program (NRMP or Match) has rules regarding appropriate conduct, including guidelines on contact between candidates and programs. Our study examined communication between obstetrics and gynecology (Ob-Gyn) programs and residency candidates after interviewing and prior to ranking. Methods Ob-Gyn program directors in the United States were sent a self-administered survey via e-mail. Data were collected and analyzed using descriptive methods to examine communication practices of these programs. Results The response rate was 40%. The findings showed that respondents had variable interpretations of the NRMP rules and suggest that programs may be communicating their match intentions especially to favored candidates. Respondents' open text comments highlighted program directors' frustrations with current NRMP rules. Discussion NRMP communication rules are intended to minimize pressure on residency candidates. Our findings suggest they may be leading to unforeseen stresses on program directors and candidates. Conclusions As educational leaders in medicine, we must consider what professional communications are acceptable without increasing the pressure on candidates during the ranking and match process.


2005 ◽  
Vol 68 (1) ◽  
pp. 36-43 ◽  
Author(s):  
Gayle Vogt ◽  
Catherine Atwong ◽  
Jean Fuller

Student Assessment of Learning Gains (SALGains) is a Web-based instrument for measuring student perception of their learning in a variety of courses. The authors adapted this instrument to measure students’ achieved proficiency in analyzing cases in an advanced business communication class. The instrument showed that students did achieve a high level of proficiency and that they did so equally in both traditional and online classes.


2017 ◽  
Vol 13 (4) ◽  
pp. 77-90 ◽  
Author(s):  
Célio Gonçalo Cardoso Marques ◽  
António Manso ◽  
Ana Paula Ferreira ◽  
Felisbela Morgado

The acquisition of reading skills is decisive for the academic achievement of students. However, learning to read is a complex process. With this in mind, several attempts have been made to find new educational approaches to enhance students' reading motivation. Considering the enormous potential of ICT for education and training, we have developed a digital repository of teaching and learning materials and a multiplatform application that runs on mobile devices: Letrinhas. This information system was designed to promote the development of reading and to provide tools for monitoring and assessing reading skills against the curricular targets set by the Ministry of Education. Letrinhas was evaluated by specialists and users and a high level of satisfaction was observed among students and teachers as time and effort spent to consolidate reading is considerably reduced with this application. This evaluation also enabled to identify features that will be available in the future.


Author(s):  
SARIKA KHALADKAR ◽  
SARITA MALUNJKAR ◽  
POOJA SHINGOTE

Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something more secure along with being user friendly is required. This is where Image Based Authentication (IBA) comes into play. This helps to eliminate tempest attack, shoulder attack, Brute-force attack. Using the instant messaging service available in internet, user will obtain the One Time Password (OTP) after image authentication. This OTP then can be used by user to access their personal accounts. The image based authentication method relies on the user’s ability to recognize pre-chosen categories from a grid of pictures. This paper integrates Image based authentication and HMAC based one time password to achieve high level of security in authenticating the user over the internet.


2019 ◽  
Vol 9 (2) ◽  
pp. 43
Author(s):  
Titien Indrianti

In the international business communication, English has become a medium of communication. To respond to such a global challenge, it is vital to equip students with Business English courses to prepare them to be more competitive worldwide. Nevertheless, studying Business English is quite problematic to many non-native learners since they have to focus both on the subject matter and the language. The present study is conducted to investigate the perspectives of the students and alumni on the Business English courses at the Business Administration Department, State Polytechnic of Malang. A survey on the second year students and the alumni was conducted. The questionnaires were distributed to elicit their views on the courses, as well as their recommendations. The existing English syllabuses and materials were collected to be overviewed. The findings indicate most students are in favor of the course. Their motivation and interest in the course are good that they make some attempts to support their Business English skills acquisition. The business English competences, like: business presentation, business meeting, business socializing, negotiation, business correspondence, and knowledge, like global business issues are of their benefits to prepare them to work and develop their career in the future. The alumni claim they apply the Business English knowledge and skills in their workplace. However, the level of the application is different following their job position in the workplace. The students’ proposals for the course are that it should be presented in a more fascinating way and business communication skills are more emphasized. Besides, global business materials and vocabulary in business are to be more inserted. The alumni recommend providing more business communication practices and vocabulary enrichment. Showing the formal and informal English usage is also necessary. Besides, character building related to business needs to be inserted.  The Business English syllabuses and materials were in line with the students’ and alumni’s expectation. The content and materials have already covered business knowledge and skills as expected by the stakeholder.


Author(s):  
Shelly R. Roy

With support from the research literature, this chapter argues that in order to lead effectively in virtual environments, and to achieve virtual prowess, the leaders of Virtual Teams (VTs) need (a) relationship building skills, which include (1) trust, (2) embracing diversity, (3) fostering a team spirit, and the ability to (4) motivate team members. The leaders of VTs must also possess (b) technical skills, which include the ability to use (1) video conferencing software, (2) Instant Messaging (IM) and chatroom software, (3) e-mail, (4) virtual worlds and avatars, and (5) be able to communicate effectively. In addition, leaders of VTs must use their (c) leadership skills and lead with (1) trait emotional intelligence, (2) be able to create an open and supportive environment, (3) lead by example, and (4) resolve conflicts. These four keys, their corresponding skills, as well as their practical applications, are discussed in this chapter.


2014 ◽  
pp. 1175-1195
Author(s):  
Michael J. Moore ◽  
Tadashi Nakano ◽  
Tatsuya Suda ◽  
Akihiro Enomoto

Face-to-Face bullying is a traditional form of bullying in which bullies attack victims through physical, verbal, or social attacks. Cyberbullying is a new form of bullying. Cyberbullies abuse digital media to attack victims (such as attacks through websites, social networking services, blogging, e-mail, instant messaging, chat rooms, and cell phones). Cyberbullying and face-to-face bullying share many similarities. For example, bullies achieve power over a victim in both cyberbullying and face-to-face bullying. On the other hand, cyberbullying has differences from face-to-face bullying that arise from characteristics of digital media such as anonymity and rapid spreading of attacks. This chapter highlights key concerns of cyberbullying stemming from the use of digital media and discusses existing models of face-to-face bullying which may aid in model cyberbullying. This chapter then introduces state-of-the-art research in automated tools to detect cyberbullying. Finally, this chapter concludes with future perspective of research in automated tools to detect cyberbullying.


Sign in / Sign up

Export Citation Format

Share Document