You are on page 1of 5

INSTITUTE OF ACCOUNTS, BUSINESS AND FINANCE

LHC1101: ADMINISTRATIVE PROFESSIONAL MANAGEMENT


FIRST SEMESTER
AY 2021 - 2022

A REACTION PAPER ON
GLOBAL COMMUNICATION - TECHNOLOGY AND ETIQUETTE
FOR FORMATIVE ASSESSMENT 5

SUBMITTED BY:
Tabora, Dhallen Guia S.

November 13, 2021


TABLE OF CONTENTS

I.
Introduction 3
II. [Title of the Paper’s Body] 3-4
III. Conclusion 4
IV. References 4-5
I. INTRODUCTION

First and foremost, I have decided to choose this topic since I think these are timely and
relevant. The gist on this topic are global communication, technology issues and technology
etiquette. Upon scrutinizing this chapter, I've discovered that technology allows us to converse
and transmit messages in real time. It seems to me that knowing the etiquette connected with each
technique and gadget is crucial if we use communicative technology, such as telecommunications,
computers, mobile devices, and other communications devices. When speaking via email or
instant messaging, this will prevent us from accidently offending a client, coworker, or boss.

II. Importance of Having a Good Netiquettes

As I scrutinized this chapter, I have learned numerous security threats such as computer
virus, worm, Trojan horse, adware or spyware and P2P file sharing. As far as I know, it is a
harmful act committed with the intent of compromising or stealing data or disrupting an attacker
attempts or the entire organization. As well as, a security incident is an instance in which a
company's information or system might be hacked. Individuals, not just malevolent actors, can
accidentally disrupt systems and cause computer security concerns due to a lack of awareness, in
my opinion. Simple mistakes like opening poisoned links in emails, messaging apps, and
advertisements enable hackers to spy on businesses and organizations, which can have fatal
consequences. On the other hand, if there are threats and issue, there are also a solutions, as I
grasp this chapter I have learned different type of security solutions namely anti-virus software,
firewall, regular backup, care with e-mail, selective in downloads, effective passwords and
logging off. Furthermore, to my way of thinking, these security solutions are significant especially
in corporate world since no one wants to risk losing their possessions. Nothing is more upsetting
than mainly with respect that the company's premises has been broken into and efficient allocation
and equipment have been stolen. It shuts down company's progress and deprives a significant
portion of their resources in trying to regain the losses. They are laying their entire company at
risk if they do not have a security system installed in their company. As well as, its significance
are beneficial for me since these prevent thieves from intruding into a company's property and
protect their assets at all instances.
It is a vital necessity for any business, smaller or larger. Apparently, security solutions
have improved throughout time in terms of providing the level of security required by businesses
to keep their valuables out of the hands of criminals while also ensuring the safety between both
owners and staff. Moreover, in this chapter effective passwords have been discussed, I have
gained that if we would create a password, it should be at least eight characters long, it should not
from dictionary words nor personal information. On this chapter also tackled mobile etiquette, I
have learned that as a user I should keep my ring setting as low as possible therefore no one will
disturb, instead I will use vibrate or silent setting especially on significance instances. On the
other hand, we are using our mobile phones and we have a call conversation, we should speak
softly and calmly so that the person we are talking to will not turn off to us as well as we should
keep calls short if we were in someone else since it depicts rude towards them. We should be
sensitive every time. By and by, as we communicate, we must use professionals writing
conventions, and we should consider cultural difference as well as like what I have written, we
must be courteous.

III. CONCLUSION

Conclusively, when embracing technology, we must be mindful of our surroundings and


comprehend how our actions may influence others. As we enter in the digital world, we must
make responsible decisions. Viewing maturity level sites, connecting with people in a considerate
approach, respecting others perspectives and content, and using technology at suitable times and
in appropriate contexts were amongst these possibilities. Consequently, we must avoid
unnecessary behaviors such like bullying, threatening, or flaming others, cyberbullying, posting or
sharing personal or private information, and using unacceptable words.

IV. REFERENCES

Blumberg, D. (2019, August 28). 8 tech etiquette rules for the modern workplace. The Garage.
Retrieved from https://garage.hp.com/us/en/modern-life/8-tech-etiquette-rules-for-the-modern-
workplace.html?
fbclid=IwAR0jjtYKI_ls41AH3c8CSI7N92I87D6tjzyNpL4hurvtbYWYkVtzY3X0xXk

Leach, N. (2017, June 14). Netiquette | Know Your Mannaers When Using Technology. Alliance
Work Partners. Retrieved form https://www.awpnow.com/main/2017/06/14/netiquette-know-
your-manners-when-using-technology/?
fbclid=IwAR0AvbD6c_HiRM1thp6cW6AV2tJc3a_QGLFppsUYOJ9xSEl_c7IT79xNTTI

You might also like