Skip to main content

Home/ Flat Classroom Project/ Group items tagged real world examples

Rss Feed Group items tagged

Becca B.

IL Toolkit - Virtual Communications: 5 - How do we use Virtual Communications Tools? - 0 views

  •  
    "There are some special rules that apply to communicating virtually. The most important is to remember that you are communicating with real people, not a computer. Don't spam. That is, don't send unsolicited e-mail. Remember that the Internet is a pull system, where people can request information, rather than one where you send them information without being asked. A wise person once suggested you treat the Internet like a foreign culture; study it for a month or more, as an anthropologist would, before you participate. Using this example, it would also be advisable to strongly consider cultural differences of the people with whom we communicate. This entails avoiding profanity and slurs or criticisms against any group of people. It means respecting differences and striving for political correctness in all forms of communication and action. The CD-ROM "Information Literacy Toolkit" provides definitions of legal considerations included in dealing with virtual communications. Below are some ethical considerations for handling them. As with security considerations, ethics in dealing with material handled via virtual communication is rooted in traditional communications. That which applies to the paper world also applies in the virtual world. The fact that information is easily available does not remove traditional requirements for attribution, for the avoidance of plagiarism or for the appropriate use the information. The anonymity provided by the ability to surf and search a large number of documents provides a temptation to use material in an unauthorized way. This temptation must be avoided. The same browsing tools that allow wide access also provide a tool for proper attribution. The writer may simply insert a link (URL) to direct the reader to the source of the information cited. Privacy should be safeguarded and observed. Those who control their own information should establish systems to keep information that they do not want disclosed protected. Owners of
Haley A

"BPM in Healthcare" - 0 views

  •  
    This is an outline of an eBook series. It has summary of essays mention in the book, and it is a very good source for workflow in the health world.
Gabriella Tirado

7 Online Marketing Tactics and Campaigns | Social Media Today - 0 views

  •  
    Varun Sharma Unconventional and imaginative ideas pay off in almost every business field. While there are limitless examples of eccentric marketing in the real world, the turf of online marketing is not that exciting.
1 - 3 of 3
Showing 20 items per page