
Warning: Undefined array key 0 in /var/www/html/wp-content/themes/harmony/functions.php on line 274

Warning: Cannot modify header information - headers already sent by (output started at /var/www/html/wp-content/themes/harmony/functions.php:274) in /var/www/html/wp-includes/rest-api/class-wp-rest-server.php on line 1794
{"id":3064,"date":"2023-02-19T16:11:23","date_gmt":"2023-02-19T16:11:23","guid":{"rendered":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/chapter\/apply-it-10-3-electronic-communication\/"},"modified":"2025-06-25T12:21:08","modified_gmt":"2025-06-25T12:21:08","slug":"apply-it-10-3-electronic-communication","status":"publish","type":"chapter","link":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/chapter\/apply-it-10-3-electronic-communication\/","title":{"raw":"Apply It 10.3: Electronic Communication","rendered":"Apply It 10.3: Electronic Communication"},"content":{"raw":"<section class=\"textbox learningGoals\">\r\n<ul>\r\n\t<li><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Identify different channels of communication&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:15233,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Calibri&quot;,&quot;16&quot;:10}\">Identify common risks of using electronic communication<\/span><\/li>\r\n\t<li><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Recognize ethical issues related to using electronic communication in business&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:12672,&quot;10&quot;:0,&quot;11&quot;:4,&quot;15&quot;:&quot;Calibri&quot;,&quot;16&quot;:10}\">Recognize ethical issues related to using electronic communication in business<\/span><\/li>\r\n<\/ul>\r\n<\/section>\r\n<section class=\"textbox example\" aria-label=\"Example\">\r\n<h2>Privacy in the Workplace <script type=\"text\/javascript\" src=\"https:\/\/www.youtube.com\/iframe_api \"><\/script><\/h2>\r\n<p class=\"cc-media-iframe-container\"><iframe id=\"tpm-plugin-egeebffa-mzLrtld_oek?si=NtQJ-tLdtCSQthm3\" class=\"cc-media-iframe\" src=\"https:\/\/www.youtube.com\/embed\/mzLrtld_oek?si=NtQJ-tLdtCSQthm3?enablejsapi=1 \" frameborder=\"0\" data-mce-fragment=\"1\"><\/iframe><\/p>\r\n<p class=\"cc-media-iframe-container\"><script type='text\/javascript' src='\/\/plugin.3playmedia.com\/ajax.js?cc=1&cc_minimizable=1&cc_minimize_on_load=0&cc_multi_text_track=0&cc_overlay=1&cc_searchable=0&embed=ajax&mf=13387223&p3sdk_version=1.11.7&p=20361&player_type=youtube&plugin_skin=dark&target=3p-plugin-target-egeebffa-mzLrtld_oek?si=NtQJ-tLdtCSQthm3&vembed=0&video_id=mzLrtld_oek?si=NtQJ-tLdtCSQthm3&video_target=tpm-plugin-egeebffa-mzLrtld_oek?si=NtQJ-tLdtCSQthm3'><\/script><\/p>\r\n\r\nYou can view the <a href=\"https:\/\/course-building.s3.us-west-2.amazonaws.com\/Intro+to+Business\/transcripts\/Are+You+Being+Tracked%3F+How+Companies+Are+Monitoring+Productivity_transcript.txt\" target=\"_blank\" rel=\"noopener\">transcript for \u201cAre You Being Tracked? How Companies Are Monitoring Productivity\u201d here (opens in new window).<\/a> \u00a0 How might companies balance their legitimate interest in ensuring productivity with maintaining employee dignity and morale, given that employers have legal authority to monitor electronic communications on company devices? What would constitute an ethical approach that balances productivity with fostering a positive workplace culture? [reveal-answer q=\"617108\"]Click to Show Sample Answer[\/reveal-answer] [hidden-answer a=\"617108\"]Answers will vary.\r\n\r\n<p class=\"whitespace-pre-wrap break-words\">Companies can ethically balance productivity monitoring with maintaining a positive workplace culture through several practical approaches:<\/p>\r\n<ul>\r\n\t<li class=\"whitespace-pre-wrap break-words\">Practice transparency by clearly communicating what's being monitored and why. When employees understand the business rationale behind monitoring, they're less likely to feel distrusted.<\/li>\r\n\t<li class=\"whitespace-pre-wrap break-words\">Focus on measuring meaningful outputs rather than tracking inputs like keystrokes. Setting clear productivity goals while giving employees autonomy in achieving them promotes professionalism and prevents the adversarial relationship that led to \"mouse jigglers\" mentioned in the video.<\/li>\r\n\t<li class=\"whitespace-pre-wrap break-words\">Apply monitoring consistently and fairly across similar roles to avoid perceptions of discrimination or targeting.<\/li>\r\n\t<li class=\"whitespace-pre-wrap break-words\">Consider a graduated approach where proven employees earn greater autonomy, acknowledging that trust can be built over time.<\/li>\r\n\t<li class=\"whitespace-pre-wrap break-words\">Regularly evaluate whether monitoring actually improves business outcomes.<\/li>\r\n<\/ul>\r\n\r\n[\/hidden-answer]<\/section>\r\n<section class=\"textbox connectIt\">\r\n<h2>Do you have a back up plan?<\/h2>\r\n<p>Unfortunately, cybersecurity failures like stolen passwords and ransomware are all too common now.<\/p>\r\n<p><iframe src=\"\/\/plugin.3playmedia.com\/show?mf=9650405&amp;p3sdk_version=1.10.1&amp;p=20361&amp;pt=375&amp;video_id=PYXdTIwdkj0&amp;video_target=tpm-plugin-d6ahio3w-PYXdTIwdkj0\" width=\"800px\" height=\"450px\" frameborder=\"0\" marginwidth=\"0px\" marginheight=\"0px\"><\/iframe><\/p>\r\n<p class=\"p1\">You can view the <a href=\"https:\/\/course-building.s3.us-west-2.amazonaws.com\/Intro+to+Business\/transcripts\/ALongDaywithnoCybersecurity.html\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">transcript for \u201cA Long Day (with no Cybersecurity)\u201d here (opens in new window).<\/span><\/a><\/p>\r\n<p>If you suddenly realized that your personal information has been stolen and platforms that you need to access are frozen, what would you do?<br \/>\r\n[reveal-answer q=\"528382\"]Click to Show Sample Answer[\/reveal-answer]<br \/>\r\n[hidden-answer a=\"528382\"]Check out <a href=\"https:\/\/www.identitytheft.gov\/#\/\">IdentityTheft.gov<\/a> for resources about how to protect yourself and recover from identity theft. As for what you could do in case your school or workplace ever experiences a ransomware attack, know that you may lose access to files kept on the organization's servers or accounts. You'll want to keep backup copies of your most important files separately.[\/hidden-answer]<\/p>\r\n<\/section>","rendered":"<section class=\"textbox learningGoals\">\n<ul>\n<li><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Identify different channels of communication&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:15233,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Calibri&quot;,&quot;16&quot;:10}\">Identify common risks of using electronic communication<\/span><\/li>\n<li><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Recognize ethical issues related to using electronic communication in business&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:12672,&quot;10&quot;:0,&quot;11&quot;:4,&quot;15&quot;:&quot;Calibri&quot;,&quot;16&quot;:10}\">Recognize ethical issues related to using electronic communication in business<\/span><\/li>\n<\/ul>\n<\/section>\n<section class=\"textbox example\" aria-label=\"Example\">\n<h2>Privacy in the Workplace <script type=\"text\/javascript\" src=\"https:\/\/www.youtube.com\/iframe_api\"><\/script><\/h2>\n<p class=\"cc-media-iframe-container\"><iframe id=\"tpm-plugin-egeebffa-mzLrtld_oek?si=NtQJ-tLdtCSQthm3\" class=\"cc-media-iframe\" src=\"https:\/\/www.youtube.com\/embed\/mzLrtld_oek?si=NtQJ-tLdtCSQthm3?enablejsapi=1\" frameborder=\"0\" data-mce-fragment=\"1\"><\/iframe><\/p>\n<p class=\"cc-media-iframe-container\"><script type=\"text\/javascript\" src=\"\/\/plugin.3playmedia.com\/ajax.js?cc=1&#38;cc_minimizable=1&#38;cc_minimize_on_load=0&#38;cc_multi_text_track=0&#38;cc_overlay=1&#38;cc_searchable=0&#38;embed=ajax&#38;mf=13387223&#38;p3sdk_version=1.11.7&#38;p=20361&#38;player_type=youtube&#38;plugin_skin=dark&#38;target=3p-plugin-target-egeebffa-mzLrtld_oek?si=NtQJ-tLdtCSQthm3&#38;vembed=0&#38;video_id=mzLrtld_oek?si=NtQJ-tLdtCSQthm3&#38;video_target=tpm-plugin-egeebffa-mzLrtld_oek?si=NtQJ-tLdtCSQthm3\"><\/script><\/p>\n<p>You can view the <a href=\"https:\/\/course-building.s3.us-west-2.amazonaws.com\/Intro+to+Business\/transcripts\/Are+You+Being+Tracked%3F+How+Companies+Are+Monitoring+Productivity_transcript.txt\" target=\"_blank\" rel=\"noopener\">transcript for \u201cAre You Being Tracked? How Companies Are Monitoring Productivity\u201d here (opens in new window).<\/a> \u00a0 How might companies balance their legitimate interest in ensuring productivity with maintaining employee dignity and morale, given that employers have legal authority to monitor electronic communications on company devices? What would constitute an ethical approach that balances productivity with fostering a positive workplace culture? <\/p>\n<div class=\"qa-wrapper\" style=\"display: block\"><button class=\"show-answer show-answer-button collapsed\" data-target=\"q617108\">Click to Show Sample Answer<\/button> <\/p>\n<div id=\"q617108\" class=\"hidden-answer\" style=\"display: none\">Answers will vary.<\/p>\n<p class=\"whitespace-pre-wrap break-words\">Companies can ethically balance productivity monitoring with maintaining a positive workplace culture through several practical approaches:<\/p>\n<ul>\n<li class=\"whitespace-pre-wrap break-words\">Practice transparency by clearly communicating what&#8217;s being monitored and why. When employees understand the business rationale behind monitoring, they&#8217;re less likely to feel distrusted.<\/li>\n<li class=\"whitespace-pre-wrap break-words\">Focus on measuring meaningful outputs rather than tracking inputs like keystrokes. Setting clear productivity goals while giving employees autonomy in achieving them promotes professionalism and prevents the adversarial relationship that led to &#8220;mouse jigglers&#8221; mentioned in the video.<\/li>\n<li class=\"whitespace-pre-wrap break-words\">Apply monitoring consistently and fairly across similar roles to avoid perceptions of discrimination or targeting.<\/li>\n<li class=\"whitespace-pre-wrap break-words\">Consider a graduated approach where proven employees earn greater autonomy, acknowledging that trust can be built over time.<\/li>\n<li class=\"whitespace-pre-wrap break-words\">Regularly evaluate whether monitoring actually improves business outcomes.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"textbox connectIt\">\n<h2>Do you have a back up plan?<\/h2>\n<p>Unfortunately, cybersecurity failures like stolen passwords and ransomware are all too common now.<\/p>\n<p><iframe loading=\"lazy\" src=\"\/\/plugin.3playmedia.com\/show?mf=9650405&amp;p3sdk_version=1.10.1&amp;p=20361&amp;pt=375&amp;video_id=PYXdTIwdkj0&amp;video_target=tpm-plugin-d6ahio3w-PYXdTIwdkj0\" width=\"800px\" height=\"450px\" frameborder=\"0\" marginwidth=\"0px\" marginheight=\"0px\"><\/iframe><\/p>\n<p class=\"p1\">You can view the <a href=\"https:\/\/course-building.s3.us-west-2.amazonaws.com\/Intro+to+Business\/transcripts\/ALongDaywithnoCybersecurity.html\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">transcript for \u201cA Long Day (with no Cybersecurity)\u201d here (opens in new window).<\/span><\/a><\/p>\n<p>If you suddenly realized that your personal information has been stolen and platforms that you need to access are frozen, what would you do?<\/p>\n<div class=\"qa-wrapper\" style=\"display: block\"><button class=\"show-answer show-answer-button collapsed\" data-target=\"q528382\">Click to Show Sample Answer<\/button><\/p>\n<div id=\"q528382\" class=\"hidden-answer\" style=\"display: none\">Check out <a href=\"https:\/\/www.identitytheft.gov\/#\/\">IdentityTheft.gov<\/a> for resources about how to protect yourself and recover from identity theft. As for what you could do in case your school or workplace ever experiences a ransomware attack, know that you may lose access to files kept on the organization&#8217;s servers or accounts. You&#8217;ll want to keep backup copies of your most important files separately.<\/div>\n<\/div>\n<\/section>\n","protected":false},"author":21,"menu_order":18,"template":"","meta":{"_candela_citation":"[{\"type\":\"copyrighted_video\",\"description\":\"Are You Being Tracked? How Companies Are Monitoring Productivity\",\"author\":\"\",\"organization\":\"Today\",\"url\":\"https:\/\/youtu.be\/mzLrtld_oek\",\"project\":\"\",\"license\":\"arr\",\"license_terms\":\"Standard YouTube License\"},{\"type\":\"copyrighted_video\",\"description\":\"A Long Day (with no Cybersecurity)\",\"author\":\"\",\"organization\":\"Thales\",\"url\":\"https:\/\/www.youtube.com\/watch?v=PYXdTIwdkj0\",\"project\":\"\",\"license\":\"arr\",\"license_terms\":\"Standard YouTube License\"}]","pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"part":3046,"module-header":"apply_it","content_attributions":[{"type":"copyrighted_video","description":"Are You Being Tracked? How Companies Are Monitoring Productivity","author":"","organization":"Today","url":"https:\/\/youtu.be\/mzLrtld_oek","project":"","license":"arr","license_terms":"Standard YouTube License"},{"type":"copyrighted_video","description":"A Long Day (with no Cybersecurity)","author":"","organization":"Thales","url":"https:\/\/www.youtube.com\/watch?v=PYXdTIwdkj0","project":"","license":"arr","license_terms":"Standard YouTube License"}],"internal_book_links":[],"video_content":null,"cc_video_embed_content":{"cc_scripts":"<script type='text\/javascript' src='https:\/\/www.youtube.com\/iframe_api'><\/script><script type='text\/javascript' src='\/\/plugin.3playmedia.com\/ajax.js?cc=1&cc_minimizable=1&cc_minimize_on_load=0&cc_multi_text_track=0&cc_overlay=1&cc_searchable=0&embed=ajax&mf=13387223&p3sdk_version=1.11.7&p=20361&player_type=youtube&plugin_skin=dark&target=&vembed=0&video_id=mzLrtld_oek&video_target=tpm-plugin-egeebffa-mzLrtld_oek?si=NtQJ-tLdtCSQthm3'><\/script>\n","media_targets":["tpm-plugin-egeebffa-mzLrtld_oek?si=NtQJ-tLdtCSQthm3"]},"try_it_collection":null,"_links":{"self":[{"href":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/3064"}],"collection":[{"href":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/wp-json\/wp\/v2\/users\/21"}],"version-history":[{"count":10,"href":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/3064\/revisions"}],"predecessor-version":[{"id":9804,"href":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/3064\/revisions\/9804"}],"part":[{"href":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/wp-json\/pressbooks\/v2\/parts\/3046"}],"metadata":[{"href":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/3064\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/wp-json\/wp\/v2\/media?parent=3064"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/wp-json\/pressbooks\/v2\/chapter-type?post=3064"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/wp-json\/wp\/v2\/contributor?post=3064"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/content.one.lumenlearning.com\/introductiontobusiness\/wp-json\/wp\/v2\/license?post=3064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}