Learn It 10.3.1: Electronic Communication

  • Identify common risks of using electronic communication
  • Recognize ethical issues related to using electronic communication in business

Risks of Electronic Communication

Electronic communication and e- commerce have presented businesses with exciting opportunities that couldn’t have existed even a few decades ago. At the same time, they’ve brought unexpected challenges. Some of the biggest risks of using modern digital and electronic technology for communication and commerce are identity theft, unauthorized credit card or bank account use, and even demand for ransom for the return of stolen data.

When businesses give customers the ability to shop online, receive discounts by providing personal information, and use live chat to communicate with customer service, they are hoping to enhance their image and provide a customer experience that is superior to the competition. But what happens when the information a customer shares with a business is compromised or stolen by a third party? This is a situation that unfortunately happens too frequently and is often reported as hacking or data breaches. For example, wireless carrier T-Mobile revealed in January 2023 that a data breach was discovered that included the theft of data from 37 million customers, including addresses, phone numbers, and dates of birth.[1]

Large Trojan horse statue surrounded by people
Figure 1. An electronic Trojan horse misleads users and exposes them to malware.

Data security is on everyone’s mind these days, and the ways that electronic communication can be compromised seem to evolve as quickly as the technology. The following are just a few of the illicit and illegal ways that people get their hands on sensitive and private information or disrupt normal business operations:

  • Viruses, worms, and Trojan horses. A computer virus is a type of malicious software program (“malware”) that, when executed, replicates by reproducing itself (copying its own source code) and/or infecting other computer programs by modifying them. A computer worm is a stand-alone malware computer program that replicates itself in order to spread to other computers. A Trojan horse, or Trojan, is any malicious computer program or phony site that is used to hack into computers by misleading users about its true intent or identity.
  • Spoofing or phishing. Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money) for malicious reasons like identity theft. Often the sender of the electronic communication also uses spoofing, a deliberate disguising of the sender’s identity that fools the recipient into thinking that the communication is from a trustworthy source.
  • Denial-of-service attacks. A denial-of-service attack (DoS attack) is a cyber attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting the services of a host connected to the Internet.

Hidden Hazards of Electronic Communication

The low cost and rapid delivery of electronic communication makes it the preferred method of communication for both business and consumers, but there can be hidden hazards and costs. The following are common ones:

  • Electronic communications are forever. Electronic messages are permanent (this includes communications such as email and also audio recordings such as voice mail). Even if a person deletes the communications from his or her own server or account, there are generally other servers that still hold this information. One way that these types of communications live in perpetuity is when they are sent or forwarded to multiple individuals.
  • Someone may be watching. In many cases, confidential information is leaked by someone else sifting through his or her messages. The culprit may be a disgruntled employee or even a competitor. Workstations left unattended, employees remaining logged on to networks and email accounts when they are away from their desk, and even sharing passwords with coworkers all make it easy for prying eyes to see information not intended to be shared.
  • Innocent messages can still harm you. Civil litigation lawyers will warn you that even innocent messages can get you in trouble you if they are taken out of context. When a person writes an email or text, he or she may have only one intent or meaning in mind. However, messages can be misconstrued to apply to a completely different scenario.
  • Email avalanche. Managers, in particular, are vulnerable to relying on email too heavily for communication. People use email because it’s quick and easy, and they can send the same information to a lot of people at the same time. This can lead to information overload and misunderstandings by recipients, however. Words alone account for only 7 percent of communication,[2] so it’s important for managers to be aware of the limitations of email in getting their messages across.

  1. Bajak, Frank. “T-Mobile Says Data on 37 Million Customers Stolen.” AP NEWS, January 20, 2023. https://apnews.com/article/technology-politics-business-law-enforcement-87d107f039a2aeb8ad5e4b215c66eead.
  2. Mehrabian, Albert (1981). Silent Messages: Implicit Communication of Emotions and Attitudes (2nd ed.). Belmont, CA: Wadsworth.