question archive write 600 words with min 2-3 peer reviewed references "Zooming In" Activity 4: Sony page 215 - Part 1 Answer critical thinking
Subject:BusinessPrice: Bought3
Answer critical thinking.
Critical Thinking
• Why should you be prudent when sending or forwarding insensitive comments, even from your personal device?
• How might sending tactless messages affect a career?
• How effective is an apology given after an indiscreet message
Guffey, Mary Ellen; Loewy, Dana. Business Communication: Process & Product (p. 215). Cengage Learning. Kindle Edition.
.
Your submission must be double-spaced with uniform 1-inch margins and using 12-point Times New Roman font.
Please refer below article and reference inorder to answer this questions
Material:
Business Communication: Process & Product (9th Edition) by Guffey and Loewy (ISBN-13: 9781305957961) Publication Manual of the American Psychological Association (7th Edition) (ISBN-13: 9781433832161)
Sony Hack Signals the End of Privacy Sony Pictures Entertainment—the global conglomerate headquartered in Los Angeles—has delighted movie viewers with blockbuster film franchises such as Men in Black and Spider-Man. Recently Sony was about to release a Seth Rogan comedy when its entire data system was hacked and countless crass and indiscreet e-mails sent by Sony executives were publicly released. Some of the most offensive messages came from studio chief Amy Pascal, a Hollywood insider who worked her way from low-level secretary to the top position in Sony’s film division. Like many executives, Pascal routinely sent e-mails all day and into the night, and because she thought they were secure, she wrote freely—too freely. In the exposed e-mails, she criticized superstar Angelina Jolie, made insensitive racial remarks aimed at President Obama, and threatened to fire a longtime colleague. The subsequent onslaught of negative publicity caused Pascal to step down amid a worldwide, humiliating scandal. She and other executives implicated in the incident shattered their hard-earned stature and indelibly ruined longtime professional relationships. E-mail is not the only form of electronic media that has caused people from all walks of life to be shamed. Tasteless text messages have forced members of Congress to resign. An inappropriate e-mail cost a young investment banker not one but two prestigious jobs and is making the rounds on Wall Street.1 The take-away is clear: Nothing written and sent over digital media is private or confidential simply because any message can be monitored, forwarded, or printed out. The savvy business professional treats every text, instant message, e-mail, and social media post as if it will be seen by the world. Critical Thinking • Why should you be prudent when sending or forwarding insensitive comments, even from your personal device? • How might sending tactless messages affect a career? • How effective is an apology given after an indiscreet message is revealed? Writing Digital Age E-Mail Messages and Memos Communication is rapidly changing in this digital era. The Web has evolved from a mere repository of passively consumed information to Web 2.0 and beyond—a dynamic, interactive, and highly networked environment. Users are empowered, active participants who create content, review products, and edit and share information. As discussed in previous chapters, communicators are increasingly relying on mobile devices. Messages are shorter and more frequent, and response time is much speedier. Social media networks such as Twitter have transformed communication from one-on-one conversations to one-to-many transmissions. For better or worse, citizen journalists have the power to distribute news items and media links to multitudes on the fly. In addition, social networking sites such as Facebook, Pinterest, and Instagram have revolutionized the way we keep in touch with friends and family. Similarly, in the workplace new devices and technologies are transforming the way we exchange information and conduct business. Ever more data are stored on and accessed from remote networks, not individual computers. This storing and accessing of data along with software applications in remote networks (the cloud) is called cloud computing. In many businesses desktop computers, once the mainstay of the office, are becoming obsolete. They’re being replaced with ever-smaller laptops, smartphones, tablets, and other powerful mobile devices. Virtual private networks (VPNs) offer secure access to organizations’ information from any location in the world that provides an Internet connection. Whether they like it or not, businesspeople are increasingly connected 24/7. Doubtless you are already connecting digitally with your friends, family, and Internet pals. However, chances are that you need to understand how businesses transmit information electronically and how they use communication technologies. This chapter explores short forms of workplace communication, beginning with e-mail, which many workers love to hate, and memos, which are disappearing but still necessary in many organizations. Moving on to newer media, you will learn about workplace text messaging and interoffice chat applications, corporate blogs, podcasts, wikis, and social networking sites. Learning these workplace technologies and best practices can save you time, reduce blunders, and help you excel as a professional.
Guffey, Mary Ellen; Loewy, Dana. Business Communication: Process & Product (p. 215). Cengage Learning. Kindle Edition.