Chapter 5
Chapter 5
5
Learning Outcomes
After studying this chapter,
you should be able to do
the following:
3 Identify professional
applications of business
podcasts and the profes-
sional standards underpin-
ning them.
ESB Professional/Shutterstock.com
audiences.
Information E-Mails
SUBJECT LINE: Summarize the main idea in condensed form.
OPENING: Reveal the main idea immediately but in expanded form (complete
sentences).
BODY: Explain and justify the main idea using headings, bulleted lists, and
other high-skim techniques when appropriate.
CLOSING: Include (a) action information, dates, or deadlines; (b) a summary of
the message; or (c) a closing thought.
Draft a Compelling but Concise Subject Line. A crucial part of an e-mail is its subject
line—not surprising when writers can expect that their messages will be viewed on
mobile devices by busy people. Avoid meaningless statements such as Help, Urgent, or
Meeting. Summarize the purpose of the message clearly and make the receiver want to
open the message. Try to include a verb (Need You to Attend Las Vegas Trade Show). In
some instances the subject line can be the entire message (Meeting Location Changed
to Conference Room II). Also be sure to adjust the subject line if
the topic changes after a thread of replies emerges. Subject lines should appear as
a combination of uppercase and lowercase letters—never in all lowercase letters or
all caps.
Include a Greeting. To help receivers see the beginning of a message and to help
them recognize whether they are the primary or secondary receiver, include a greeting,
also called a salutation. The greeting sets the tone for the message and reflects your
audience analysis. For friends and colleagues, try friendly greetings (Hi, Lara; Thanks,
Lara; Good morning, Lara; or Greetings, Lara). For more formal messages and those to
outsiders, include an honorific and last name (Dear Ms. Ingram). When a given name is
gender-neutral (unisex), and the gender of identity is not known, omit the honorific. Use
the full name of the recipient instead (Dear Robin Gray).
Organize the Body for Readability and Tone. In the revision phase, ask yourself
how you could make your message more readable. Did you start directly? Did you
group similar topics together? Could some information be presented with bulleted or
numbered lists? Could you add headings—especially if the message contains more
than a few paragraphs? Do you see any phrases or sentences that you could condense?
Get rid of wordiness, but don’t sacrifice clarity. If a longer sentence is necessary for
comprehension, then keep it. To convey the best tone, read the message aloud. If it
sounds curt, it probably is.
Options... HTML
Pursuant to your recent request, I am responding with this e-mail. Your inquiry of May 6 Fails to reveal
suggested that you wanted to know how to deal with the database problems. purpose quickly
The biggest problem is that it contains outdated information, including customers who Buries two problems
haven’t purchased anything in five or more years. Another problem is that the old data- and three-part
base is not compatible with the new Access software used by our mailing service, and solution in huge
paragraph
this makes it difficult to merge files. I think I can solve both problems by starting a new
database. This would be where we put the names of all new customers. And we would
have it keyed using Access software. Next we need to learn whether our current custo- Forgets to conclude
mers wish to continue receiving our e-mail updates and product announcements. Finally, with next action and
we would rekey the names of all active customers in the new database. Make sense? end date
Options... HTML
Angel,
States purpose As you requested, I am submitting my recommendations for improving our customer
concisely in the database. The database has two problems. First, it contains many names of individu-
opening and high-
lights two problems
als who have not made purchases in five or more years. Second, the format is not
compatible with the new Access software used by our mailing service.
1. Start a new database. Effective immediately, enter the names of all new
customers in a new database using Access software.
Organizes main
points in numbered 2. Determine the status of customers in our old database. Send out a mailing ask-
list for readability ing whether recipients wish to continue receiving our e-mail updates and product
announcements.
3. Rekey the names of active customers. Enter the names of all responding
customers in our new database so that we have only one active database.
Closes with key These changes will enable you, as team leader, to send mailings only to active
benefit, deadline, customers. Please let me know by May 13 whether you think these recommendations
and next action
are workable. If so, I will investigate costs before starting work on our spring campaign.
Harley Dominic | Senior Marketing Manager After To, insert the receiver’s e-mail address.
[email protected] | 818-435-4009 In most e-mail programs, this task is automated.
Your name and/or e-mail address should be inserted
automatically by your e-mail client in the From field.
After Subject, present a clear summary of the message.
Include a salutation (Angel; Hi, Angel) or honorific
and last name (Dear Mr. Fuentes, especially in
messages to external audiences).
Double-space (skip one line) between paragraphs.
Do not type in all caps or in all lowercase letters.
Include full contact information for messages to
external recipients; perhaps shorten in internal
messages.
When preparing e-mail attachments, be sure that they carry sufficient identifying
information. Because the attachment may become separated from the cover e-mail
message, it must be named thoughtfully. Preparing the e-mail attachment as a memo
provides a handy format that identifies the date, sender, receiver, and subject.
Comparing Memos and E-Mails. Memos have much in common with e-mails. Both
usually carry nonsensitive information that may be organized directly with the main idea
first. Both have guide words calling for a subject line, a dateline, and the identification
of the sender and receiver. To enhance readability, both should be organized with
headings, bulleted lists, and enumerated items whenever possible.
Similarities. E-mails and memos both generally close with (a) action information,
dates, or deadlines; (b) a summary of the message; or (c) a closing thought.
An effective memo or e-mail closing might be Please create a slideshow featuring
our new product line by April 20 so that we are prepared for the trade show in May.
In more detailed messages, a summary of main points may be an appropriate closing.
If no action request is made and a closing summary is unnecessary, you might end with
a simple concluding thought (I’m glad to answer your questions or This sounds like a
worthwhile project).
Differences. You need not close messages to coworkers with goodwill statements
such as those found in e-mails or letters to customers and clients. However, some
closing thought is often necessary to avoid sounding abrupt. Closings can show
gratitude or encourage feedback with remarks such as I sincerely appreciate your help
or What are your ideas on this proposal? Other closings look forward to what’s next,
such as How would you like to proceed? Avoid closing with overused expressions such
as Please let me know if I may be of further assistance. This ending sounds mechanical
and insincere.
In Model Document 5.2, notice how interoffice memos are formatted and how they
can be created to improve readability with lists, tables, and white space.
1 inch
On-Camera Audience Services
2 blank lines
M E M O R A N D U M
2 blank lines
Date: June 10, 2022
1 blank line
To: Avi Alvarado, President
Aligns all 1 blank line
heading words From: Eden Silva, Special Events Manager Provides writer’s
with those 1 blank line handwritten
following Subject: Enhancing Our Website (or electronic)
Subject 1 or 2 blank lines initials after
printed name
As you requested, I am submitting the following suggestions for improving
our website. Because interest in our audience member, seat-filler, and usher and title
services is growing at a startling rate, we must use our website more
strategically. Here are three suggestions.
1. Explain Purpose. Our website should explain our purpose more explicitly. We Uses ragged
Leaves side specialize in providing customized and responsive audiences for studio produ- line ending—not
margins of 1 ctions and award shows. The website should distinguish between audience justified margin
to 1.25 inches members and seat fillers. Audience members have a seat for the entire taping
of a show. Seat fillers sit in the empty seats of celebrity presenters or perfor-
mers so that the front section does not look empty to the home audience.
2. List Events. I suggest that our Web designer include a listing such as the
following so that readers recognize the events and services we provide:
To create a platform
Search for secure and legally
compliant internal com-
Favorites Logs Chats All munication, large com-
panies have introduced
Go ahead, post!
Gary Goreman powerful networks
Senior Studio Designer
Monica Meyer behind corporate fire-
Update your status Any idea how the voicemail feature works in other walls that combine vari-
locations (like Hamburg, Germany) ...?
ous capabilities in one:
Calendar Available
All e-mail, chat, Twitter-like
Gregorio Sanchez short messaging, and
Phone 408-635-5000 Ext. 87045 Is anyone reading the feedback on bugs? directory access by
I've submitted a bunch and had no responses at all.
Video Start a video session Want to know I'm not wasting my time. phone. All workers
need to be professional;
All
Chat Start a chat session they are always on
Email [email protected]
Stephen Robinson display. Everyone from
Why do I always show as "not connected"? I tried connecting
via VPN, no help... can't make any calls, yet can use vibes from rookie coder to
Location San Jose, CA CEO is on the system.
All
Department Global Design
James Ridell
Can we have some Emoticons please?
Manager Wes Cooper
All
Type Regular
Vicky Ramirez-Villa
About Me Part of the global studio No vibes during SJ shutdown? Come on... :)
design team located in
San Francisco and Beijing,
All
I use Aruba tools to tell
stories with video.
Carole McKaye
Is it possible to retrieve chat history?
Text Message
Today 10:28 PM
6046
old problems, and new ways to think and create.”44 In addition to its famous TED Talks
on YouTube, the nonprofit organization produces daily audio TED Talks.
Education Podcasts. Podcasts are increasingly common in education. Some instructors
started recording their own to facilitate accessible learning for students with disabilities,
to benefit auditory learners, and create an archive of lessons. The portability of
podcasts allows students to listen to instructors’ lectures, interviews, sporting events,
and other content anytime and anywhere.
Apple’s iTunes U is likely the best-known example of free educational programs from
hundreds of renowned universities across the globe. Open University on iTunes covers
a vast amount of learning resources in categories such as business and economics,
engineering, history, languages, science, and many more. An Internet search reveals
many options for education podcasts.
LEARNING
OUTCOME 4
Describe how businesses
5-4 Telling Stories With Blogs and News Sites
A blog is a website or social media platform with generally well-crafted articles or
use blogs to connect with commentaries on topics such as new products or services, media coverage, industry
internal and external news, human resources, and philanthropy. Businesses use blogs to keep customers,
audiences. employees, and the public at large informed. The two biggest advantages of external
business blogs are that they can accumulate a far-flung, vast audience and allow
companies to shape the brand story in a longer narrative form. Blogs are another tool
for public relations and brand building—one channel in a multichannel social media
strategy.
Employees and executives at companies as varied as Allstate, Caterpillar, Exxon
Mobil, General Motors, Patagonia, Southwest Airlines, and Target maintain blogs. They
use blogs to communicate internally with employees and externally with the public.
At present, 270 (54 percent) of Fortune 500 companies in the United States maintain
a public-facing corporate blog.48 However, blog adoption varies across industries.
Research shows that the top five sectors most likely to embrace blogs are commercial
banks, specialty retailers, semiconductors and electronics makers, gas and electric
“For companies and utilities, and pharmaceuticals.49
entrepreneurs, gain- In this section you will learn how businesses use blogs. You will also find guidance on
ing online visibility is professional blogging practices.
one of the best ways
to grow subscribers, 5-4a How Companies Tell Stories
leads and ultimately
revenue. This can’t be Like social media platforms, corporate blogs may be used to create virtual
achieved with a static communities. Companies use blogs for public relations, customer relations,
corporate website. market research, internal
Creating blog content communication, online
that is valuable, help- community building, and
ful, and/or entertain- recruiting. Internal blogs
ing is an effective accessible to employees on
way to grow your a corporate intranet serve as
website’s authority, information hubs, encourage
online rankings, and discussion, create a sense
traffic.”47 of community, and foster
Stoatphoto/Shutterstock.com
engagement.
Gary Dekmezian,
entrepreneur, digital Public Relations and
marketer, professional Customer Relations. One of
blogger the prominent uses of blogs
is to provide up-to-date
Provide Details in the Body. Mind the So what? and What’s in it for me? questions.
Use vivid examples, quotations and testimonials, or statistics. Structure the body with
numbers, bullets, and subheadings. Use expressive action verbs (buy for get; own for
have; travel or jet for go). Use conversational language to sound warm and authentic.
Use contractions (can’t for cannot; doesn’t for does not; isn’t for is not).
Consider Visuals. Add visual interest with relevant images and diagrams. Keep
paragraphs short and use plenty of white space around them. Aim to make the look
simple and easy to scan.
Include a Call to Action. Call on readers to do something or provide a take-away and “When it comes to
gentle nudge at the end. the biggest trends in
Here’s a tip you can use right away. You’ll have vastly better copy on your website in marketing today, our
20 minutes by following these two simple steps: industry is obsessed
with channels such
Go look at your web copy right now. as social, voice, and
augmented real-
Take out every word that doesn’t contribute something new.
ity as the means
Come back here and tell us about the before-and-after. I bet you’ll have something for reaching today’s
to say!55 modern audience.
And while each plays
Asking open-ended questions is another effective closing: “Those are two of XYZ
an important role in
Company’s ideas about where business-to-business marketing is heading. How about
the customer journey,
you? Have you developed some new strategies of your own? What exciting ideas are
new research from
fueling your own marketing—and how are you applying them? Let us know in the
Adobe finds a more
comments.”
traditional form of
Edit and Proofread. Follow the revision tips in Chapter 4 of this book. Cut any marketing—email—is
unneeded words, sentences, and irrelevant ideas. Fix awkward, wordy, and repetitious very much hold-
sentences. Edit and proofread as if your life depended on it—your reputation might. ing its own among
The best blogs are error free. newer channels and
technologies.”57
Respond to Posts Respectfully. Build a positive image online by posting compelling
comments on other bloggers’ posts. Politely and promptly reply to comments on Giselle Abramovich,
your site. This reply to Jamie Spencer’s blogging advice post 56 makes a positive executive editor, Enterprise
comment and asks a question. The exchange is cordial, albeit marred by punctuation Thought Leadership, Adobe
errors:
Key Facts
Explanations
Evidence Fact check.
Earn your readers’ trust.
Examples
Credit your sources.
Background Apply the inverted pyramid.
Details Edit, edit, edit.
Proof, proof, proof.
Alice M: Thank you for all your helpful information. I’ve found this website so useful!
I’m about to start my first blog. The blog is basically music reviews and I was just
wondering if you knew whether I’m allowed to copy videos off YouTube for example?
Jamie: As long as you use the relevant embed codes from YouTube to add videos
to your site you should be ok to do that. I wouldn’t recommend ripping any content
from a YouTube video and then hosting it yourself, this could be a copyright issue.
If you disagree with a post, do so respectfully. Don’t ramble. Your blog posts can
benefit from the journalistic pattern shown in Figure 5.6 by emphasizing the big news
up front, supported by specifics and background information.
The biggest global social network, Facebook has reached more than 2.7 billion monthly active users (MAU) worldwide,
followed by YouTube with 2 billion MAU. Since buying WhatsApp, Facebook saw the messaging app’s popularity soar to
2 billion MAU. Another Facebook-owned brand, Instagram, boasts more than 1.15 billion global MAU; relative newcomer
TikTok reports 689 million MAU; LinkedIn has 766 million registered users but only 310 million are active per month; and
monthly active users on Twitter now number 340 million. On Facebook, the top three product brands with the most fans are
Facebook itself (211 million followers), Samsung (1620 million), and Coca-Cola (106 million).
Source: Statista, 2020; Omnicore, 2021; We Are Social.
Don’t download free software and utilities to Be careful when blogging, tweeting, or posting on social
company machines. Employees can unwittingly networking sites. Unhappy about not receiving a tip, a Beverly
introduce viruses, phishing schemes, and other Hills waiter lost his job for tweeting disparaging remarks about
cyber bugs. an actress. Forgetting that his boss was his Facebook friend, a
British employee was fired after posting, “OMG, I HATE MY
Don’t store your music and photos on a company JOB!” and calling his supervisor names.
machine (or server) and don’t watch streaming
videos. Capturing precious company bandwidth for Keep sensitive information private. Use privacy settings, but
personal use is a sure way to be shown the door. don’t trust the “private” areas on Facebook, Twitter, Flickr, and
other social networks.
Don’t share files, and avoid file-sharing services.
Clarify whether you may use Google Docs and other Avoid pornography, sexually explicit jokes, or inappropriate
services that offer optional file sharing. Stay away from screen savers. Anything that might poison the work
distributors or pirated files such as LimeWire. environment is a harassment risk and, therefore, prohibited.
wayside, buzz becomes more important than truth, and a few keystrokes can threaten
a reputation. Americans fear for their privacy yet increasingly trust information on
social media more than mainstream media sources. This section addresses several
cyberthreats that affect all of us as businesspeople and citizens.
Privacy Fears. Our smartphones spy on us. Location services in most apps allow users
to be tracked with pinpoint precision. Tracking is enabled by default and most people
don’t know that practically all their movements can be followed, as a disturbing New
York Times exposé revealed.81 Our personal data from every account or profile we
create online ends up in the cloud where it exists indefinitely. Once there, our data can
be hacked, viewed by unauthorized personnel, or sold to advertisers. Sometimes it
ends up on the dark web in the hands of criminals. The Dark Web is the black market
of the Internet, a mostly illicit network of websites that cannot be accessed by standard
search engines and browsers.
Sensitive financial information and our medical data are stored in networks that are
frequently breached. Wearable devices track our vital signs, exercise frequency, and
lifestyle patterns. The end user doesn’t know where all the massive data are stored, as
U.S. consumers are largely unprotected in a yet barely regulated market.
Future trends are no less worrisome to privacy advocates. The sophistication of
artificial intelligence and facial recognition technology is growing. In China, a huge
wk1003mike/Shutterstock.com
information in seconds. What has been a boon to law
enforcement may soon land in the hands of everyday
users—not just advertisers, but stalkers and other bad
actors. True privacy and anonymity may be a thing
of the past for consumers who use smart electronic
devices, maintain social media profiles, and pay with
credit cards—that is, nearly all of us.
Disinformation and Election Tampering. Researchers tell us that social media have
changed how we consume information and form opinions. More than 90 percent of
users access their news online; some 50 to 68 percent of them rely solely on social
media.82 Online, people tend to seek out so-called echo chambers of like-minded
individuals and embrace narratives that confirm their existing views while rejecting
contradicting information. The resulting polarization carries with it a negative emotional
charge.83 As Pew Research suggests, such charged information environments make
people vulnerable to misinformation. False news stories and doctored narratives,
including targeted disinformation (i.e., propaganda originating primarily in Russia and
China), confuse the public.84 A BuzzFeed survey found that 75 percent of American
adults can’t spot fake news.85
Even more troubling, though, is stealthy interference by foreign agents who use
large bot armies to disseminate fake news stories on social media and incite conflict
to deepen sharp divisions among the American public. Fake news planted by bots
has risen to the level of potentially tampering with U.S. elections thus undermining
democratic institutions. Bots are also used to steal social identities of people by
impersonating them. Our carefree sharing on social media can provide criminals with
clues.
Deepfakes, Doctored Videos. It has been said that we live in a post-truth era; in other
words, we now exist in “circumstances in which objective facts are less influential in
shaping public opinion than appeals to emotion and personal belief.”86 The urgent
need for critical thinking now extends even to visual information—video content
we don’t question because, after all, instinctively we tend to believe what we see.
Advances in AI could soon make creating fake video and audio a lot easier, permitting
ever more sophisticated disinformation.
The ability to manipulate video footage to make people seem to say or do
something they did not do is so worrisome to the U.S. government that it has begun
to combat deepfakes. Altering photos and videos to distort the truth is not new, but
deepfake technology takes deception to a whole new level. Computers can be trained
to synthesize facial features and create composites of realistic-looking humans. It’s easy
to see how such tampering could be weaponized before an election or might threaten
national security; likewise, people could claim that real videos are fake.87 Alarmingly,
this is already happening as sizable Internet communities aggressively proclaim the
moon landing in 1969 was staged, the Earth is flat, and the terror attacks of 9/11 were
“an inside job.”88
Incivility, Trolling, and Cyberbullying. The anonymity of the Internet facilitates toxic
behavior. Trolls are users who fake their identity, provoke skirmishes, and disrupt
discussions on social media. They can be vicious bullies who thrive on denigrating
others. Social media may originally have been idealized as a public square which
guaranteed participants a practically unlimited freedom of expression. However, even
Examine the professional usage, structure, and format of e-mails and memos in the
digital era workplace.
■ Even after five decades, e-mail remains a heavily used communication channel in most workplaces.
■ Office workers still send paper-based messages when they need a permanent record; wish to maintain confidentiality; or
need to convey formal, long, and important messages.
Explain workplace messaging and texting including their liabilities and best
practices.
■ Instant messaging and real-time chat apps such as Slack as well as texting are best suited for brief text-based exchanges.
■ Benefits of messaging apps and texting are their speed, allowing quick decisions; Slack’s group chat connects distant as
well as local project teams; SMS marketing is growing.
■ Risks include productivity losses, leaked trade secrets, and legal liability from workers’ improper use of digital media;
fraud, malware, and spam pose additional risks.
■ Best practices include following company policies, avoiding sensitive information, not sending inappropriate digital
content, and using correct grammar and spelling.
■ Text messages should observe proper timing, be addressed to the correct person, and identify the sender; savvy workers
don’t send sensitive news or expect an instant reply.
■ Slack is beloved by many as an e-mail alternative and team chat tool; the downsides include distraction and incivility.
Describe how businesses use blogs to connect with internal and external audiences.
■ Blogs help businesses to keep customers, employees, and suppliers informed and to receive feedback.
■ Businesses tell stories with blogs to engage with their customers and the public, for public relations, to grow online
communities, and for internal communication and recruiting.
■ Advice for masterful blogs includes crafting a catchy title, acing the first paragraph, providing details, using visuals,
including call to action, careful editing, and responding respectfully.
Discuss business organizations’ external and internal social media practices as well
as the risks inherent in Internet use today.
■ Social media such as Facebook and Twitter allow firms to share company news; exchange ideas; and connect with
customers, employees, other stakeholders, and the public.
■ Companies boost their brand recognition by engaging customers on the social media platforms where they congregate;
enterprise social networks provide secure internal communication.
■ Productivity losses, legal liability, leaking of trade secrets, and angry Internet users are potential risks of social media use
at work.
■ Workers should share only appropriate, work-related information, not post questionable content; they should activate
and monitor their privacy options on social media sites.
■ Technology and social media have a dark side, which includes threats to privacy, disinformation, deepfakes, incivility, and
trolling, as well as threats to data security.
Key Terms
cloud text messaging malware
virtual private networks short message service discovery
salutation rich communication services podcasts
down-editing presence functionality blog
instant messaging phishing influencers
Chapter Review
1. List and concisely describe at least five electronic communication channels used most commonly by businesspeople today.
(L.O. 1–4)
2. Why is workplace e-mail unlikely to go away anytime soon? (L.O. 1)
3. Why do many workers complain about e-mail? (L.O. 1)
4. Name at least five reasons some organizations forbid employees to use instant and text messaging. (L.O. 2)
5. How can you show professionalism and respect for your receivers in writing business instant messages and texts? (L.O. 2)
6. How do organizations use podcasts, and how are they accessed? (L.O. 3)
7. Explain why companies use blogs. (L.O. 4)
8. List the eight best practices for master bloggers. (L.O. 4)
9. How do businesses try to tap the vast potential of social networking? (L.O. 5)
10. Why do you need to critically evaluate all information that engulfs you daily? (L.O. 5)
Critical Thinking
11. You have seen that e-mail is not universally loved although it is here to stay, despite the advent of real-time chat apps, texting,
and other workplace short-form messaging. “Email is the last great unowned technology,” said the Harvard law professor
Jonathan Zittrain, “and by unowned, I mean there is no CEO of email . . . it’s just a shared hallucination that works.” Others
believe that e-mail, though much maligned, “is still a cornerstone of the open web.”96 Interpret these statements. What points
are they making, about openness in particular? (L.O. 1, 5)
12. Despite laws dictating a 40-hour workweek, many young Chinese tech workers endure the dreaded 9-9-6 schedule: 9 a.m. to
9 p.m., six days a week. What role does technology play here? How do you feel about work-life balance? (L.O. 3)
13. Are conversational Internet acronyms and slang—such as AFAIK, G2G, HIFW, ICYMI, and NSFW—as well as all-lowercase writing
acceptable in e-mail, texting, or instant messaging for business? (L.O. 1, 2)
14. Traditional mainstream media act as so-called gatekeepers that vet the news and decide what kind of content gets published.
However, social media networks have changed the game. Now anyone with an Internet connection can publish anything,
even fake news and hate speech, and reach vast audiences in mere seconds. What are the benefits and dangers of this
unprecedented access and speed of distribution? (L.O. 5)
15. In many workplaces employers are introducing game-like competitions and tracking of workers’ vital functions with wearable
devices. Consider the potential impact of gamification and wearable devices on your career. How do you feel about such
tracking of employees and monitoring on the job and outside the workplace? Can you think of other vulnerable technologies?
What advice would you give someone who is not sure how to handle invasive technologies that may threaten privacy and
security? (L.O. 1–5)
YOUR TASK. Compare the following sets of message openers. Circle the letter of the opener that illustrates a direct opening.
Write an appropriate subject line for each opening paragraph.
Before Revision:
Our office could implement better environmental practices such as improving energy efficiency and reducing our carbon
footprint. Here are three simple things we can do to make our daily work practices greener. For one thing, we can power
down. At night we should turn off monitors, not just log off our computers. In addition, we could “Light Right.” This means
installing energy-efficient lighting throughout the office. A final suggestion has to do with recycling. We could be recycling
instantly if we placed small recycling bins at all workstations and common use areas.
After Revision:
Our office could use energy more efficiently and reduce our carbon footprint in three simple ways:
Power down: Turn off monitors rather than just logging off our computers.
Light right: Install energy-efficient lighting throughout the office.
Recycle instantly: Place small recycling bins at all workstations and common use areas to encourage recycling.
YOUR TASK. Revise the following wordy, unorganized paragraphs. Include an introductory statement followed by a bulleted or
numbered list. Look for ways to eliminate unnecessary wording.
20. In writing to customers granting approval for loans, you should follow four steps that include announcing that loan approval
has been granted. You should then specify the terms and limits. Next, you should remind the reader of the importance of
making payments that are timely. Finally, a phone number should be provided for assistance.
21. The National Crime Prevention Council made a statement about crime in the workplace. It also provided some tips for
improving workplace safety and preventing crime at work. It says that crime prevention and safety measures are just as
important at work as they are at home. Some of the ways you can improve safety and prevent crime including changing locks
Radical Rewrites
Note: Radical Rewrites are provided at www.cengage.com for you to download and revise. Your instructor may show a suggested
solution.
5.1 Radical Rewrite: Weak Request Response Requires Your Revision (L.O. 1)
Blog writer Brian Drummond needs examples and information for a blog he plans to publish on the Online Voices platform.
He writes to Nadya DeAlba, office manager at a high-tech firm, requesting information and examples. He met Ms. DeAlba at a
conference and believes that she could be a willing source of information for his blog. Ms. DeAlba’s advice is valuable, but her
message is poorly organized, contains writing and grammar errors, and is hard to read.97
YOUR TASK. Analyze the following poorly written message from Nadya DeAlba. Identify its weaknesses including sentence
fragments, wordiness, grammar faults, misspellings, and other writing problems you have studied. Include examples. Then revise
if your instructor advises. Your instructor may provide a possible revision. Remember that you can download these documents at
www.cengage.com
Brian,
Thanks for this opportunity to make a contribution to your blog post for Online Voices. You ask that I confine my remarks to
five main and important points. Which I will try to do. However, I could share many more annoying habits that create tension
in the workplace. They interrupt workflow, reduce productivity, and lead to stress. Here’s my top five annoying tech habits
that drive coworkers crazy. I have observed these in our open office.
The first has to do with cc abuse. Todays e-mail programs make it to easy to copy people who may be unrelated to the
discussion. Before clicking the cc field, writers should ask themselves whether it’s critical to ask all receivers specific
questions such as who wants the vegan or the barbecue lunch. Another annoying habit is what I call “radio silence.”
This occurs when receivers fail to respond to e-mails within 24 hours. It’s not that I expect responses to every Slack
message, tweet, DM, text message, voice mail, or Facebook post. As a writer, however, it is annoying when important
e-mail messages are ignored.
One of my coworkers complains about notification overload. Offices today are awash with chirps, dings, and rings of countless
devices that are allowed to ring and echo through the sweeping open space. The constant ding, ding, dinging is not only
annoying to the intended recipients. But also to nearby colleagues.
Another annoying habit has to do with jumbled threads. When writers do not observe the conventions of threading their
comments on Slack or e-mail. The structure of the conversation becomes garbled. This really annoying behavior is one of
the many tech irritants that aggravate coworkers.
Best,
Nadya DeAlba
[Full contact information]
Hey, thanks for asking me to provide some help with the networking manual about teleconferencing that you are preparing
and working up for Trevi Publications. Appreciate this opportunity! Although you asked me to keep it brief, I could give you
an extensive, comprehensive list of dos and don’ts for videoconferencing. If you want this, let me know.
As an alternative to on-site meetings, virtual meetings became a necessity during the COVID-19 pandemic. Here’s a bunch of
tips for your manual. First and foremost, plan ahead. All participants should be notified well ahead of time of things like the
date, time, and duration. It’s your job to send log-ins and passwords by e-mail. Zoom, for example, generates all necessary
information automatically and you can distribute the invitation by e-mail.
If you have documents that are needed during the conference, send them by e-mail ahead of time or prepare them to be shared
onscreen during the meeting. Be very careful with the log-in credentials if you don’t want to be “Zoom-bombed.” This means
that anyone with the password and meeting ID can hijack your meeting and cause all kinds of mischief. For the same reason,
use a waiting room approximately 10 minutes before admitting attendees to your meeting at the appointed time. That way you
can control admission.
Another tip has to do with muting (silencing) your microphone. Believe me, there’s nothing worse than barking dogs, side
conversations. And worst of all is the sound of toilets flushing during a video conference. Ick! Also, check your camera before
the meeting! Activate it once the meetings is about to begin. If you use headphones, make sure they work too.
You should play with your microphone, speakers or headphones, and camera until you sound and look good. And of course,
don’t shuffle papers. Don’t eat. Don’t move things while your speaking. You may have heard that some people love to wear
pajama bottoms and shorts with their suit jacket. Don’t do it. Resist the temptation. Look good, feel good, but don’t overdo it.
Business casual will suffice.
My final tip involves using a waiting room before admitting participants to the meeting. They will see a slide that tells the
meeting details. Such as the start time, audio and video information, and the agenda. This waiting-room slide should go up
about 10 minutes before the meeting begins.
Live chat operators who help customers by exchanging instant messages with them in real time play an important role in
customer service. The goal of providing such direct communication online is to inform and troubleshoot, but also to build a lasting
relationship with customers. Ideally, by being cordial, professional, and helpful, live chat operators can contribute significantly
to turning customers into fans of the company or brand. Representatives must sound authentic and human. TransAvia Airlines is
training its representatives with hypothetical customer service scenarios. Following are two logs of chats by trainees who were
asked to respond to a customer, Victor, in an online chat.
YOUR TASK. Carefully review the logs of the conversations between Victor and Representative 1 as well as Representative 2.
Individually or as a team, critique Rep 1 and Rep 2 in class or in an e-mail to your instructor summarizing your observations. Support
your views with examples. For instance, you could comment on the representatives’ courtesy, helpfulness, tone, or writing skills.
Then, if your instructor asks you to rewrite this chat, try your hand at being Representative 3 and apply some of the lessons you
have learned in this chapter and Chapter 4.
Tip: Create a table to approximate the dialogue in an online chat. Note that sometimes the same person may write two or more
comments in a row instead of waiting for a reply to the first one.
Representative 1 Representative 2
Rep: Hey, Victor, what’s shakin’ in Atlanta? What do Rep: Good day, dear sir! We are honored to serve esteemed
you need? customers like you.
Victor: Hi. Victor: Hi.
Rep: Perf to have you here. Hiw can I hlep? Rep: How can we be of assistance?
Victor: Your award-travel system sucks!! I’m so tired of Victor: Your award-travel system sucks!! I’m so tired of
wasting time on your website! wasting time on your website!
Rep: Whoa! Chill!?. Why diss our system. What trasnpired Rep: We are so very sorry to hear that your customer expe-
rience is less than stellar, sir!
Victor: What happened is that I keep getting an error Victor: What happened is that I keep getting an error mes-
message just before I click Purchase. I tried many times. sage just before I click Purchase. I tried many times.
Victor: What point are award miles when they can’t Victor: What point are award miles when they can’t be
be redeemed?? redeemed??
Rep: Where… what Just a sec I’m on another chat. Rep: Would you be so kind and describe the precise nature
Whats wrong? of your issue?
Victor: I am planning a business trip to London with Victor: I am planning a business trip to London with some
some of my 500k frequent flyer miles. Whenever I of my 500k frequent flyer miles. Whenever I choose the
choose the itinierary, fill in payment information for the itinierary, fill in payment information for the taxes etc, I hit
taxes etc, I hit Purchase and an Error !!! pops up. I can’t Purchase and an Error !!! pops up. I can’t finish the booking.
finish the booking. So annoying! Who has the time?? So annoying! Who has the time??
Rep: How v nice to be able to go to London Wow, Rep: When you visited our website, we saw your credentials
500k miles? I can see your search in our systm. Lemme and search parameters. I shall attempt to complete the
try it for you. Leave technology to a milenial! [Pause] booking in your stead. [Pause]
Rep: Nope! it doesn’t work Sorry. System is new and Rep: I’m truly inconsolable, sir. It appears that I am unable
has glitches. to complete the transaction using our new system. I might
need to escalate the problem to my supervisor.
Victor: Why on earth do you roll out something that’s Victor: Why on earth do you roll out something that’s full of
full of bugs, why waste my time?? bugs, why waste my time??
Rep: Yasss, good question tbh. Listen I can try to get Rep: Please stay calm, sir. We are trying our best to serve
on this and will let you go now. When I make the book- you. As one of America’s most respected airlines, we take
ing I will give you a buzz first. then shoot you an email. customer service very seriously. Allow me to keep trying to
Our tech boss has a blog for complaints. You should complete the transaction gratis, without live booking fees.
give him an earful there!! He says he wants to hear I shall telephone you and communicate via e-mail once the
from our ticked off customers. Will send you the link booking is completed. You will also receive a link that will
too. Oh and I will save you money, no live booking fees. allow you to share your experience with our CTO.
5.4 Instant Messaging: Practicing Your Professional Real-Time Chat Skills (L.O. 2)
Communication Technology Social Media Team Web
Your instructor will direct this role-playing group activity. Using instant messaging, you will simulate one of several typical business
scenarios—for example, responding to a product inquiry, training a new-hire, troubleshooting with a customer, or making an
appointment. For each scenario, two or more students chat professionally with only a minimal script to practice on-the-spot, yet
courteous, professional interactions by real-time chat. Your instructor will determine which client software or app you will need and
provide brief instructions to prepare you for your role.
If you don’t have instant messaging software on your computer or smart device yet, download the application first—for example,
Slack, WhatsApp, Facebook Messenger, or Skype. All messaging software enables users to share photos and media files. These
advanced features turn messaging apps into a simple conferencing tool and video phone. You can make voice calls and use
webcam video as well. Zoom and FaceTime are other videoconferencing options. Contrary to calling landlines or cell phones, you
can connect for free on Wi-Fi with people all around the world, as long as you’re both connecting by the same app. You may want
to use a computer because downloading chat sessions is easier on a computer than on a smartphone.
YOUR TASK. Open the messaging or chat app your instructor chooses. Follow your instructor’s directions closely as you role-play
the business situation you were assigned with your partner or team. The scenario involves two or more people who communicate
by real-time chat.
Podcasting done right is hard work. Most podcasts (80 percent) fail or no longer publish.98 Experts advise business podcasters first
to provide quality content with an authentic voice to build value, and to consider money making second.99 To browse
and learn from popular favorites, search for iTunes Charts US Podcasts or Top US Podcasts Insights (Apple Podcasts Top Charts). These
sites rank the top 100 most popular podcasts, some business-related (e.g., The $100 MBA, Freakonomics Radio, The Indicator
from Planet Money, How I Built This, and HBR Ideacast). Podcast Awards, an annual ranking of favorites selected by listeners and
podcasters, is another resource for finding valuable podcasts in various categories, including business, science, and technology.
Past winners include the irreverent, chatty Big Girl Money show and Ellen on the Go featuring Ellen DeGeneres.
YOUR TASK. Using the rankings mentioned above or other podcast sources, individually or as a small team find a highly rated
business-related podcast series that sparks your interest. Scan the topics covered. Listen to several episodes and jot down notes.
Evaluate the show’s format (e.g., frequency of publication, duration, number of presenters or hosts, music use, interviews, formality
of tone, professionalism, and other characteristics).
Categorize the content of your chosen podcast series (topics covered, invited guests, value of the information presented, your
level of interest, and more). Look up the producer’s credentials. Are the hosts competent subject experts? Find out what other
authorities say about the podcast you selected and its producers. Then consider the overall value and credibility of the show.
Would you recommend the podcast series to your classmates? Why or why not? Summarize your findings in a well-organized e-mail
or classroom presentation. Alternatively, create an informative but brief social media post for an audience that doesn’t know the
podcast series or tweet an intriguing tidbit about the show.
Browsing the podcasts at iTunes, you stumble across the Quick and Dirty Tips series, specifically Money Girl, who has been
dispensing financial advice since 2008. You sign up for the free podcasts that cover a variety of business topics. You can also visit
the website Quick and Dirty Tips or interact with Laura D. Adams on her Money Girl Facebook page. Alternatively, examine the
advice conveyed via podcast, the Web, Facebook, and Twitter by clever Grammar Girl Mignon Fogarty.
Do you want to try your hand at producing a podcast? Businesses rely on a host of social media and communication technologies
when reaching out to the public or internally to their workers. As you have seen, some companies produce such short audio or
video clips on focused, poignant subjects. The following process describes how to create a simple podcast.
Select software. The best software for newbies is Audacity and GarageBand (Mac only). One step up is Adobe Audition. They allow
recordings within a Web browser or from a smartphone. Most can also be accessed as mobile apps.
Obtain hardware. For high sound quality, you may need a sophisticated microphone and other equipment. The recording room
must be properly shielded against noise, echo, and other interference. Many universities and some libraries provide recording
booths. In the absence of fancy recording locations, a quiet room at home will do.
Organize the message. Make sure your broadcast has a beginning, middle, and end. Build in some redundancy. Previews,
summaries, and transitions are important to help your audience follow the message.
Choose an extemporaneous or scripted delivery. Extemporaneous delivery means that you prepare, but you use only brief notes. It
usually sounds more spontaneous and natural than reading from a script, but it can also lead to rambling, repetition, and flubbed lines.
Prepare and practice. Practice before recording. Editing audio or video is difficult and time consuming. Try to get your recording
right, so that you won’t have to edit much.
Publish your message. Once you post the MP3 podcast to your course website or blog, you can introduce it and request feedback.
YOUR TASK. Create a short podcast about a business-related subject you care about. Producing a simple podcast does not
require sophisticated equipment. With free or inexpensive recording, editing, and publishing software such as Audacity, you can
inform customers, mix your own music, or host interviews. Any digital recorder can be used to create a no-frills podcast if the
material is scripted and well-rehearsed. If all fails, even voice mail recordings can be used for this purpose.
Examine the blogs of Seth Godin, Chris Brogan, Guy Kawasaki, Bill Marriott, and other acclaimed bloggers. See what tricks of the
trade you can adopt and make work for you.
YOUR TASK. You may be asked to write a blog post detailing your analysis of the professional blogs you have examined. Apply
the best practices for professional business blogs outlined in this chapter. Remember to offer a catchy title that will attract browsers
or, in this case, your peers in class and your instructor. Share helpful advice in easy-to-read numbered items and, if applicable,
provide links to other relevant articles. To motivate readers to respond, ask questions at the end of your blog entry.
Review the guidelines for professional blogging in this chapter. Find a recent social media–related study or survey, and target
an audience of business professionals who may wish to know more about social networking. Search for studies conducted by
respected organizations and businesses such as Pew Research Center, Robert Half International, Burson-Marsteller, ePolicy Institute,
and U.S. government agencies, as applicable. As you plan and outline your post, follow the advice provided in this chapter.
Although the goal is usually to offer advice, you could also weigh in with your opinion regarding a controversy. For example, do you
agree with companies that forbid employees to use company computers to access their social media accounts? Do you agree that
millennials and Gen Z are losing social skills because of excessive online connectivity?
YOUR TASK. Compose a one-page blog entry in MS Word. Post it to the discussion board on the class course-management
platform, or e-mail it to your instructor, as appropriate. Because you will be drawing on other people’s ideas, be careful to paraphrase
correctly and not to copy from your sources. Visit Chapter 10 to learn how to put ideas into your own words with integrity.
The modern workplace is a potential digital minefield. The imprudent use of practically any online tool—whether e-mail, real-time
messaging, texting, tweeting, blogging, or posting to Instagram—can land workers in hot water and even lead to dismissal. Here
are five ways Twitter can get you canned for showing poor judgment:100
a. Sending hate tweets about the boss. Example: My idiot boss said he put in for raises. I think he lies. He is known for that. His daddy
owns the company.
b. Lying to the boss and bragging about it. Example: I so lied to my boss . . . I was late but I said I forgot my badge and got away with it.
c. Romancing the boss (kissing and telling). Example: I give the boss what he wants, and the fringe benefits are amazing.
d. Announcing the desire to quit. Example: So close to quitting my job right now. Sometimes I can’t [expletive] stand this place
[expletive] moron assistant plant manager I’m about to deck him.
e. Blocking your boss. Example: i kept my promise . . . my boss thought she was gonna follow me on here . . . i BLOCKED her [expletive] ASAP.
YOUR TASK. Discuss each violation of Twitter best practices, or summarize in general why these tweets are potentially damaging
to their authors. How could the Twitter users have handled their grievances more professionally? Should they have refrained
altogether? Comment on the style of these questionable tweets. If your instructor requests, summarize your observations in an
e-mail message or an online post.
5.11 Social Media: Following the Top 10 Most Plugged-in CEOs (L.O. 5)
E-Mail Social Media Team Web
If you are a budding entrepreneur and future tycoon, you may be looking to successful business leaders for inspiration. Learning
about and connecting with chief executives has never been easier thanks to social media. Consulting firm Brunswick Group
examined the digital profiles of 790 CEOs in the U.S. and U.K. for their social media presence on Facebook, Instagram, Twitter, and
LinkedIn. Additionally, Brunswick surveyed thousands of employees in both countries for its study. After crunching 100,000+ data
points, the firm established a ranking of CEOs based not only on connectedness, that is, the presence of accounts, but also on their
owners’ active engagement. The ranking extends from the lowest score of 536 for Flutter Entertainment CEO Peter Jackson, who
placed 100th, to No.1-ranked Walmart CEO Doug McMillon and his score of 829. The study also confirmed that Twitter and LinkedIn
are the CEOs’ preferred networking sites.101
Social media are “an unfiltered forum for corporate leaders to listen to their communities and to connect by sharing their successes
and challenges,” Nasdaq president and CEO Adena Friedman says. The fourth-ranked CEO believes that “Social media projects
the human side of the corporate world.”102 The Brunswick study revealed that most workers check a CEO’s social media accounts
before joining a company. The candidates also consult Glassdoor, a popular platform where current and former employees submit
anonymous company reviews, including otherwise hard-to-come-by salary information. A top Glassdoor score means high job
approval among employees. Highly connected CEOs on average scored better than their less connected peers on Glassdoor (+5
percent), as did their companies (+3 percent).
YOUR TASK. Search for the Connected Leadership report by Brunswick on the Web. Peruse or download a PDF copy. You will find
that the top five executives are Doug McMillon (Walmart), Brent Saunders (Allergan), Ramon Laguarda (PepsiCo), Adena Friedman
(Nasdaq), and Dan Schulman (PayPal). Mary Barra (GM), Hans Vestberg (Verizon), and Ed Bastian (Delta Air Lines) are also among
the top 10 CEOs. Individually or as a team, select a CEO who interests you. Analyze the executives’ presence and influence on their
social media networks of choice. Find out how many followers they have, how often they post, what topics they discuss (strictly
business or personal), how they come across to you (approachable and friendly or formidable and tough), and more. Correlate these
observations with the executives’ Glassdoor scores. Does the approval score match your CEO’s Brunswick survey rating? Discuss
your findings as a group or in class. If asked, summarize your research in a cogent e-mail or memo.
Could you give up your electronic toys for 24 hours without withdrawal symptoms? How about quitting social media cold turkey for
a week? Thirty days? Would you be able to survive unplugged from all media? Headlines decrying social media addiction litter the
Internet. Self-declared social media junkies detail the lessons they learned after renouncing their gadgets for a “detox,” “sabbatical,”
“purge,” or “dramatic spree.” Those who go offline describe feelings of emptiness, boredom, loneliness, depression, and anxiety.
Some are baffled by their digital friends reacting to their abstinence with coercion, cajoling—even scorn!103
In one study a class of 200 students at the University of Maryland, College Park, went media free for 24 hours and then blogged
about the experience.104 Some did sound like addicts going cold turkey: In withdrawal. Frantically craving. Very anxious. Extremely
Grammar/Mechanics Checkup 5
b (1.18a) EXAMPLE a. When do you expect your daughter to graduate high school?
b. When do you expect your daughter to graduate from high school?
1. a. Instant messages should be respectful, professional, and written with brevity in mind.
b. Instant messages should be respectful, professional, and brief.
2. a. Don’t you hate when you must write a clarifying e-mail because you couldn’t understand
someone’s message?
b. Don’t you hate it when you must write a clarifying e-mail because you couldn’t
understand someone’s message?
3. a. If the boss urgently wants to see you, than you must be in trouble.
b. If the boss urgently wants to see you, then you must be in trouble.
4. a. Ethnocentrism is when you think your culture is better than any other.
b. Ethnocentrism is the idea that your culture is better than any other.
5. a. The new marketing trainee is more experienced than the last.
b. The new marketing trainee is more experienced then the last.
6. a. What type of smartphone do you prefer—iPhone or Android?
b. What type smartphone do you prefer—iPhone or Android?
7. a. Can you tell me where the cafeteria is at?
b. Can you tell me where the cafeteria is?
8. a. Did you apply to the subsidiary in Chicago or to the headquarters in Boston?
b. Did you apply to the Chicago subsidiary or the Boston headquarters?
9. a. The job candidate said she graduated college last year.
b. The job candidate said she graduated from college last year.
10. a. Myra had a great interest, as well as a profound respect for, environmental activism.
b. Myra had a great interest in, as well as a profound respect for, environmental activism.
This is just a reminder to all of you to say that performance appraisals for all
you employees must be submitted by May second. These appraisal are especially
important and essential this year because of job changes, new technologys, and
because of office reorganization.
To complete your performance appraisal in the most effective manner, you should
follow the procedures described in our Employee Manual. Let me briefly make a
review of those procedures;
Be sure each and every employee has a performance plan with three or 4 main
objective.
For each objective make an assessment of the employee on a scale of 5
(consistently exceeds requirements) to 0 (does not meet requirements.
We look upon appraisals as a tool for helping each worker assess his performance.
And enhance his output. Please submit and send each employees performance
appraisal to my office by May second. If you would like to discuss this farther, please
do not hesitate to call me.
* We purposely avoid using the words conspiracy theory because they describe a paradox. A theory is a scientific construct; the belief in
an unproven, absurd, even patently false conspiracy is not.