Business Communication Process and Product 8th Edition Guffey Solutions Manual Get PDF
Business Communication Process and Product 8th Edition Guffey Solutions Manual Get PDF
Sold on testbankdeal.com
( 4.4/5.0 ★ | 298 downloads )
https://testbankdeal.com/product/business-communication-process-and-
product-8th-edition-guffey-solutions-manual/
Business Communication Process and Product 8th Edition
Guffey Solutions Manual
Available Formats
https://testbankdeal.com/product/business-communication-process-and-
product-8th-edition-guffey-test-bank/
https://testbankdeal.com/product/business-communication-process-and-
product-7th-edition-guffey-test-bank/
https://testbankdeal.com/product/business-communication-process-and-
product-9th-edition-guffey-test-bank/
https://testbankdeal.com/product/college-accounting-a-career-
approach-13th-edition-scott-solutions-manual/
Fundamentals Of Health Care Administration 1st Edition
Safian Test Bank
https://testbankdeal.com/product/fundamentals-of-health-care-
administration-1st-edition-safian-test-bank/
https://testbankdeal.com/product/sociology-a-brief-introduction-
canadian-6th-edition-schaefer-test-bank/
https://testbankdeal.com/product/math-lit-1st-edition-almy-solutions-
manual/
https://testbankdeal.com/product/horngrens-accounting-australia-8th-
edition-nobles-test-bank/
https://testbankdeal.com/product/financial-markets-institutions-and-
money-3rd-edition-kidwell-test-bank/
Essentials of MATLAB Programming 3rd Edition Chapman
Solutions Manual
https://testbankdeal.com/product/essentials-of-matlab-programming-3rd-
edition-chapman-solutions-manual/
Chapter 7 LECTURE NOTES
CHAPTER SYNOPSIS
Today’s workplace is changing as new technologies transform the way we exchange information
and conduct business. Although your students may already be connected digitally with friends
and family, they will need to understand how to use communication technologies professionally
in the workplace.
This chapter explores short forms of workplace communication, beginning with e-mail. E-mail
continues to be the lifeblood of businesses today, and this chapter teaches students how to use e-
mail efficiently and expertly. Because instant messaging and texting are gaining popularity, this
chapter also explores their best practices and liabilities. .
In addition, this chapter introduces podcasts, wikis, and blogs. Any applications that do not
require a human presence (e.g., certain training videos) lend themselves to podcast recordings
that users can stream or download on demand. Wikis enable far-flung team members to share
information and build a knowledge base and can be used to replace meetings, manage projects,
and document tasks large and small. Blogs help businesses keep customers, employees, and
suppliers informed and receive feedback.
Social networking sites, including Facebook and Twitter, allow firms to share company news;
exchange ideas; and connect with customers, employees, other stakeholders, and the public at
large. Companies may boost their brand recognition and provide a forum for collaboration by
participating in established social networks or by creating their own in-house communities. The
downsides of social media participation are productivity losses, fallout from inappropriate
employee posts, security breaches, and leaking of trade secrets.
Really simple syndication allows users to navigate the huge resources on the Internet. RSS feeds
are time-savers because they allow businesspeople to monitor many news sources in one
convenient online location.
LEARNING OBJECTIVES
1. Understand e-mail and the professional standards for its usage, structure, and format in the
digital-era workplace.
2. Explain workplace instant messaging and texting as well as their liabilities and best practices.
3. Identify professional applications of podcasts and wikis, and describe guidelines for their use.
82
© 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management
system for classroom use.
Chapter 7 Lecture Notes 83
4. Describe how businesses use blogs to connect with internal and external audiences, and list
best practices for professional blogging.
5. Address business uses of social networking and the benefits of RSS feeds.
• Reorganized the e-mail discussion to streamline coverage but also to reflect current
workplace use with updated techniques and advice.
• Acknowledged complaints about e-mail but emphasized that it occupies nearly a third of
workers' time; provided ample contemporary advice for using e-mail strategically and
professionally.
• Encouraged students to recognize the difference between writing e-mails to friends and using
the professional standards and procedures required in the workplace.
• Strengthened e-mail coverage by organizing best practices into chunks with topic headings to
improve readability, comprehension, and retention.
• Provided sufficient coverage of memos to remind students that memos are still important for
internal messages that are long, complex, or formal.
• Focused even more emphatically on current policies and best practices in the workplace for
texting, instant messaging, blogging, wikis, and social media to convey the need for solid
writing skills and help students negotiate potential minefields.
• Explained the risks and benefits of communication technology on the job with many up-to-
date examples to make students aware of professional social media applications.
• Introduced more than 90 percent new end-of-chapter activities to provide opportunities for
students to engage with contemporary workplace communication technology.
LECTURE OUTLINE
I. Preparing Digital-Age E-Mail Messages and Memos (p. 205)
• New technologies are transforming the way we exchange information and conduct
business. Businesspeople are increasingly connected 24/7.
• Communicators are increasingly switching to mobile devices.
• Cloud computing involves storing and accessing data along with software applications in
remote networks.
PowerPoint slide 4
© 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management
system for classroom use.
84 Chapter 7 Lecture Notes
PowerPoint slides 5, 6
PowerPoint slide 7
PowerPoint slide 8
© 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management
system for classroom use.
Chapter 7 Lecture Notes 85
Subject Line
• Summarize the central idea.
• Include labels if appropriate.
• Avoid empty or dangerous words.
Opening
• State the purpose for writing.
• Highlight questions.
• Supply information directly.
Body
• Explain details.
• Enhance readability.
• Apply document design.
• Be cautious.
Closing
• Request action.
• Provide a goodwill statement or a closing thought.
• Avoid cliché endings.
PowerPoint slide 19
© 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management
system for classroom use.
86 Chapter 7 Lecture Notes
Benefits:
• Enables real-time communication with colleagues anywhere in the world
• Allows people to share information immediately and make decisions quickly
• Includes group online chat capabilities
• Offers a low-cost substitute for voice calls
• Avoids phone tag and eliminates downtime associated with telephone
conversations
• Provides presence functionality – coworkers can locate each other online
Risks:
• Reduces worker productivity
• Creates risk that private company records will be accessed by hackers
• May be the source of evidence in lawsuits
• Creates driving hazards when users text while driving
III. Making Podcasts and Wikis Work for Business (p. 218)
PowerPoint slide 49
• Avoid snubbing coworkers by not accepting friend requests or blocking users for
no apparent reason.
PowerPoint slide 51
VI. Checklist: Using Electronic Media Professionally: Dos and Don’ts (p. 211)
Dos
• Learn your company’s rules.
• Avoid sending personal e-mails, IM messages, or texts from work.
• Separate work and personal data.
• Be careful when blogging, tweeting, or posting on social network sites.
• Keep sensitive information private.
• Stay away from pornography, sexually explicit jokes, or inappropriate screen
savers.
Don’ts
• Don’t spread rumors, gossip, and negative, defamatory comments.
• Don’t download and share cartoons, video clips, photos, and art.
• Don't open attachments sent by e-mail.
• Don’t download free software and utilities to company machines.
• Don’t store your music library and photos on a company machine, and don’t
watch streaming videos.
• Don’t share files and avoid file-sharing services.
Social media sites have transformed communication from one-on-one conversations to one-to-
many transmissions. In the dynamic, interactive, and highly networked environment of Web
2.0, users are empowered, active participants who create content, review products, and edit
© 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management
system for classroom use.
90 Chapter 7 Lecture Notes
Cloud computing describes the storing and accessing of data and software applications in
remote network clusters called clouds. Information and software programs are not stored
locally on computer hard drives or other memory devices, but rather, on remote servers
online. In many businesses desktop computers, once the mainstay of the office, are becoming
obsolete. They are being replaced with ever-smaller laptops, smartphones, tablets, and other
amazingly compact and powerful mobile devices. Virtual private networks (VPNs) offer
secure access to an organization’s information from any location in the world that provides an
Internet connection.
3. List and concisely describe at least six electronic communication channels used most
commonly by businesspeople today. (Objs. 1-5)
1. E-mail: The channel of choice in business today, gradually replacing paper memos and
letters in many instances.
2. Instant messaging: More interactive and immediate than e-mail; users chat in real time
by logging on to an IM service.
3. Text messaging: Very brief messages sent from cellular phones using SMS protocol.
4. Podcasts: Digital media files, either audio or video, that can be streamed or downloaded
on demand.
5. Blogs: Websites containing public journal entries, or posts, with feedback added by
readers.
6. Wikis: Public or private websites enabling users to collaboratively create, post, edit, and
access information; helpful for project management.
4. List and briefly describe the four parts of typical e-mails. (Obj. 1)
Typical e-mails have four parts: (a) an informative subject line that summarizes the
message; (b) an opening that reveals the main idea immediately; (c) a body that explains
and justifies the main idea; and (d) a closing that presents action information, summarizes
the message, or offers a closing thought.
5. Suggest at least ten pointers that you could give to a first-time e-mail user. (Obj. 1)
6. How can you use instant messaging and texting safely on the job? (Obj. 2)
Before using instant messaging on the job, check with your supervisor. Follow any
company policy rules regarding its use. Don’t send anything you would not want published.
Use it as a professional business tool, not as a time to chat casually with friends.
7. Name at least five reasons some organizations forbid employees to use instant and text
messaging. (Obj. 2)
1. IM and texting can be distractions in addition to the telephone, e-mail, and Web
browsing.
2. Privileged information and sensitive company records may be revealed through public
IM messaging and intercepted by hackers.
3. Phishing schemes, viruses, malware, and IM or text spam can be introduced.
4. Tracking and record keeping may be necessary to comply with legal requirements.
5. IM and texting have been implicated in traffic accidents.
6. Inappropriate uses of IM and sexting (sending sexually explicit pictures or texts) could
lead to a hostile work environment and lawsuits.
7. Like e-mail, IM and texting are subject to disclosure and can become evidence in
lawsuits.
8. How can you show professionalism and respect for your receivers in writing business IM
messages and texts? (Obj. 2)
Beware of jargon, slang, and abbreviations, which, although they may reduce keystrokes,
may be confusing and appear unprofessional. Respect your receivers by using good grammar
and proper spelling and by proofreading carefully. Keep your presence status up-to-date so
that people trying to reach you don’t waste their time.
9. How do organizations use podcasts, and how are they accessed? (Obj. 3)
Businesses have embraced podcasting for audio and video messages that do not require a live
presence yet offer a friendly human face. A bank may demonstrate transparency by
addressing topics customers care about. A tech firm may train its sales force by employing
podcasting. Real estate properties can often be viewed by podcast. Because they can
broadcast repetitive information that does not require interaction, podcasts can replace
costlier live teleconferences. Podcasts are featured on media websites and company portals or
shared on blogs and social networking sites, often with links to YouTube and Vimeo. They
can usually be streamed or downloaded as media files.
© 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management
system for classroom use.
92 Chapter 7 Lecture Notes
10. What is a wiki, and what are its advantages to businesses? (Obj. 3)
A wiki is a website that employs easy-to-use collaborative software to allow users to create
documents that can be edited by tapping into the same technology that runs the well-known
online encyclopedia Wikipedia. Wikis are a valuable collaboration and project management
tool that can be used across time zones and vast geographic distances.
Companies use blogs to keep customers, suppliers, and employees informed and to interact
with them. Through blog entries, companies can potentially reach a far-flung, vast audience.
Blogs can also elicit unbiased consumer feedback.
12. List the eight best practices for master bloggers. (Obj. 4)
a. Craft a catchy but concise title.
b. Ace the opening paragraph.
c. Provide details in the body.
d. Consider visuals.
e. Include calls to action.
f. Edit and proofread.
g. Respond to posts respectfully.
h. Learn from the best.
13. How do businesses try to tap the vast potential of social networking? (Obj. 5)
Large businesses are using the social Web as well as internal networks behind corporate
firewalls. About 60 percent of Fortune 500 companies are now on Facebook, and roughly
the same percentage of companies have corporate Twitter accounts. Internally, large firms
are adopting the Facebook model because employees intuitively understand its functions.
Social networks connect dispersed employees and match those with similar skills. Social
media also help companies to invite customer input, called crowdsourcing.
14. Name a few of the potential risks that social networking sites may pose to business.
(Obj. 5)
Managers fear productivity losses, compromised trade secrets, the wrath of large Internet
audiences, and embarrassment over inappropriate and damaging employee posts.
15. What is really simple syndication (RSS), and why is it helpful? (Obj. 5)
Really simple syndication, or RSS, is a fast and easy way to search and manage
information. RSS is a data file format capable of transmitting changing Web content. RSS
documents are called feeds or channels, and they can be read most efficiently with a Web-
based feed reader (aggregator), an easy-to-use software application. Feeds alert subscribers
to up-to-the-minute blog entries, news items, videos, and podcasts.
© 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management
system for classroom use.
Chapter 7 Lecture Notes 93
Like many contemporaries, Garfield seems ambivalent about social media and concerned
about waning privacy. He draws an analogy to George Orwell’s famous novel 1984 about
tyranny and totalitarian ideologies. Big Brother is a reference to the revered party leader in
the novel who exercises nearly absolute control of citizens, and has become synonymous
with constant and omnipresent government surveillance, even mind control. The analogy
seems to imply that we fear obvious invasions of privacy that we can see, but we do not seem
to notice how willingly we disclose personal information online, where the danger may be
less evident. Garfield rightly observes that our online presence leaves traces and our
whereabouts can be tracked, not only by the people in our circles. The trade-off, he seems to
be saying, is giving up privacy for a semblance of community online. By saying “a sense of”
community, Garfield seems to suggest that the community may be more imagined than real.
Students will be unlikely to worry in the abstract. However, if they are confronted with the
prospect of snooping recruiters, some of whom have even resorted to demanding login
information to access applicants’ Facebook accounts, they might be disturbed, after all.
Likewise, students will be able to relate to the risk of inappropriate images appearing online
and outside their control.
2. In her book Alone Together, MIT professor Sherry Turkle argues that increasing
dependence on technology leads to a consequent diminution in personal connections.
"Technology is seductive when what it offers meets our human vulnerabilities. And as it
turns out, we are very vulnerable indeed. We are lonely but fearful of intimacy. Digital
connections . . . may offer the illusion of companionship without the demands of
friendship." Do you agree that technology diminishes personal relationships rather than
bringing us closer together? Do social media fool us into thinking that we are connected
when in reality we bear none of the commitments and burdens of true friendship?
Sherry Turkle, professor at the Massachusetts Institute of Technology, seems to argue that
technology estranges us from each other instead of connecting us and bringing us closer
together. In fact, she states, technology may make us FEEL connected with others, but the
companionship is merely illusory or very superficial. It remains to be seen whether students
recognize that social media indeed seem to have reduced face-to-face and even telephone
contact while paradoxically linking us to long-neglected friends, acquaintances, and distant
relatives. Millennials prefer texting and IM to speaking on the telephone and even e-mail.
Discerning students might acknowledge that they are not really “friends” with the hundreds of
contacts on their Facebook pages, and even less able to keep up with what each is doing.
Students could also be prompted to consider the common sight of young people meeting face-
to-face, yet each texting away or chatting with someone who is clearly not present. Some plug
© 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management
system for classroom use.
94 Chapter 7 Lecture Notes
in their earbuds, listening to their music and tuning out the world around them in the presence
of flesh-and-blood peers.
3. How could IM be useful in your career field? Does IM produce a permanent record? Do
you think that common abbreviations such as lol and imho and all-lowercase writing are
acceptable in text messages for business? Will the use of shorthand abbreviations as well
as creative spelling negatively affect writing skills? (Obj. 2)
Students should be able to generate ideas on how instant messaging will be useful in their
career fields. Yes, IM does produce a permanent record. Any IM conversation transmitted
electronically establishes a digital record. Many IM users also regularly save their messages.
In regard to abbreviations, remember that business messages—even instant messages—may
be shared with others. Don't include abbreviations that are unprofessional and confusing. They
do not save time if someone has to stop and think about what they mean. The last question of
whether shorthand abbreviations and creative spelling will affect the writing of workers
should generate interesting student observations.
4. Tweeting, texting, and quickie e-mailing all may foster sloppy messages. Author Mark
Garvey argued, “In business, in education, in the arts, in any writing that takes place
outside the linguistic cul-de-sac of our close friends and relatives, writers are expected to
reach for certain standards of clarity, concision and care.” What did Garvey mean? Do
you agree? (Objs. 1, 2)
Garvey is talking about the difference between messages to friends and serious writing. Do you
agree that there are two kinds of writing? Which kind is appropriate in the workplace? How is it
different from tweets and instant messages? [See Garvey, M. (2009). Stylized: A Slightly
Obsessive History of Strunk & White’s The Elements of Style. New York: Simon & Schuster.]
5. Ethical Issue: Aside from actually paying people to act as fans on social networks and
entice their friends to do so as well, some marketers employ machines to inflate the
number of their fans and followers online. Writing for PC World, Dan Tynan describes
how he discovered the activities of a so-called Facebook bot network that operates a
large number of zombie accounts created in Bangladesh. Tynan had noticed that many
obscure companies were suddenly experiencing wild surges in “likes.” He cites Rent My
Vacation Home, a rental agency based in Washington, DC, that went from two fans to
almost 15,000 within a few days. Tynan counted about 70 other businesses and fan pages
across the globe that were also flooded with suspicious “likes” from the same source.
Tynan himself was able to create such a bot master with fake accounts in 10 minutes
using minimal software and for under $70. Cheap software allows users to use proxies,
trick Captcha programs that normally thwart bots, and add bogus friends and
subscribers, Tynan writes. Why do some businesses resort to such measures? What
might be the consequences of faking fans? How do you feel about companies and their
brands pretending they have actual traffic on their sites?
Answers from students indicating their attitudes toward such questionable practices may vary.
However, social networking from a marketing standpoint is about establishing relationships
© 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management
system for classroom use.
Chapter 7 Lecture Notes 95
between brands and customers. Relationships are based on trust. Fans of a brand want to feel
that they are insiders who know more than those who do not follow the brand or company.
They form communities around brands, provided that those are well managed and honest.
Deceitful practices jeopardize this trust and potentially invite a backlash once the dishonesty
is discovered. As for why some businesses adopt fraudulent schemes, the motivations may
vary, too; however, businesses are trying to “monetize” their social media presence, and they
hope that traffic will create buzz and draw more followers to their sites. Fans, they hope, will
turn into leads and eventually into actual buying customers. If we ask who gets hurt, the
answer is both—the customers who rely on the sites they love and trust that they are real as
well as the businesses that are risking being found out as dishonest and tarnishing their
reputations.
• In what ways have social media and “real-time Web” changed how Internet users
communicate? Have services like Twitter improved the way we exchange information?
Social media and “real-time Web” are about immediacy in an always-on, fast, and simple
manner if not strictly in real time. Twitter and related services have drawn lots of “eyeballs”
to their sites and that in itself represents a value to investors and businesses. How exactly the
social media will shape our communication remains to be seen. Nevertheless, it’s already
evident that Twitter has evolved from mundane updates about what users had for lunch to a
much more sophisticated tool. Communicating in 140 characters or less does not allow for
much nuance, but it’s invaluable as a lightning-fast distribution channel of news, hyperlinks,
and other information. Whether Twitter will prove useful to a larger number of mainstream
adopters remains to be seen. Many users and businesses in particular are watching from the
sidelines to see whether some value to their bottom line will emerge from the new media.
• What trends have facilitated the emergence of social media, specifically Twitter?
Increasingly ubiquitous Wi-Fi networks, smartphones, and other hardware along with online
software applications have enabled the explosive growth of social media including Twitter.
Perhaps Twitter is an expression of our ever-faster culture by allowing users instantly to
share information online with family, friends, and even strangers because it’s increasingly
more difficult to find the time to connect face to face.
Some of the advantages are low cost; ease of monitoring the image of one’s company;
potentially broad reach of company information; flexibility as well as speed of response to
customers; and a sense of immediacy and connectedness.
The following may be some of the disadvantages: The 140-character limit does not allow for
clarification, nuance, or detail. The new medium is still untried and may not work for certain
© 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management
system for classroom use.
96 Chapter 7 Lecture Notes
industries as well as it does for others. You may want to ask students how communicating
virtually compares to face-to-face interaction, whether they believe that anything is gained or
lost in electronically mediated communication, or what percentage of their interaction with
friends and family is virtual.
ZOOMING IN
Your Turn: Applying Your Skills at Twitter
Ask students to obtain a Twitter account if they don’t already have one. They may not because
the latest user statistics by Business Insider indicate that only one in ten teenagers and young
adults use Twitter daily, presumably because they are not interested in news, a Twitter staple; 72
percent never use Twitter [Carlson, N. (2012, July 13). The secret life of teenagers online.
Businessinsider.com]. Twitter use rises to a third of Internet users ages eighteen to twenty-four,
according to a 2012 Pew study. Students don’t need to register to search for and view tweets in
their Internet browsers, but they should open Twitter accounts to enjoy the full benefits of the
free service and to be able to follow others. Signing up is quick and intuitive. They simply follow
the on-screen directions and watch the brief instructional video clip, if they like. They will be
able to follow not only friends and family, but also news, business updates, film reviews, and
sports, and receive and share other up-to-the-minute messages. Have them type into the search
box any current international or business event to see what twitterers are saying about it—in this
case, news, reviews, or complaints about Dell. Other companies that have successfully created a
devoted fan community on Twitter are Foursquare, Ford, , PepsiCo, Levi Strauss, and Craftsman
tool company. Companies with a particularly loyal following on Facebook are Coca-Cola,
Netflix, Dove, Nutella, Oreo, and GM, to name just a few.
Today’s writers should use Cc to reveal openly all recipients of a message. Violating this
practice can become quite risky in the workplace if, for example, one of the hidden recipients
accidentally shows knowledge of the content transmitted in the e-mail or forwards the e-mail to
another party. Such lapses could lead to embarrassment and worse.
© 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management
system for classroom use.
Chapter 7 Lecture Notes 97
fighting her firing since 2004, parlaying her fame into a book and even a few talk show
appearances. Whose rights take precedence, the employee’s or the employer’s?
In 2003 Simonetti began to document her life and work experiences in her blog without
mentioning her airline by name. Her case was widely publicized as a now-classic example of
employee rights to express their views about their work experience and their employers’ rights to
limit them. In a 2008 article in Mental Floss magazine [Palan, E. (2008, May 29). Seven people
fired for blogging. Mental Floss. Retrieved from
http://www.mentalfloss.com/blogs/archives/15329], Erica Palan writes about Simonetti and six
other bloggers who were fired by their employers for material deemed inappropriate, even
though the content was created on the bloggers’ own time and coworkers or the employers were
not mentioned explicitly by name. Similarly, Virgin Atlantic fired a cabin crew that was joking
about faulty jet engines and maligning passengers on the Internet. Encourage students to consider
how and why workers’ rights to free expression may be curtailed in the workplace.
From the employers’ point of view blogs and social networking sites can turn into a nightmare.
Companies typically discipline and fire workers for online indiscretions, but as happened in the
Simonetti case, the dismissed workers can turn around and sue or, worse yet, turn their cause into
a career.
A company does not have to honor an innocent mistake, such as an obvious typo or misprint
resulting in a glaring error in pricing, for example. Businesses make mistakes and they generally
shouldn’t have to bankrupt themselves to take responsibility for posted errors. Legally,
advertisements and other promotional materials are generally considered invitations to bargain,
and are not contracts. A few consumers take advantage of costly mistakes and hope to extract
some benefit from them. However, using strikingly low prices and declaring them erroneous to
generate publicity and viral buzz are deceptive practices. Internet posts suggest consensus that
repeated incidents represent deceptive intent, whereas an occasional error is most likely innocent.
Companies react in different ways to potentially expensive blunders. The immediacy and speed
of today’s media heighten the problem of erroneous advertising. Someone is going to see the
mistake and can potentially broadcast it within seconds to thousands, even millions, of people.
Kogi Korean BBQ trucks into a hot West Coast commodity. Her advice on successful blogging
boils down to keeping things personal. “Treat Twitter like a person,” says Shin. She also argues
that writers must update their blogs daily and select topics that interest audiences. “You’ve got to
give it a little attention, a little love every day. Why would people want to follow you if you
don’t have anything interesting to say?” Shin asks.
© 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management
system for classroom use.
Another Random Scribd Document
with Unrelated Content
vulgo
devastant dem
sondern
Lernæa Age obsequium
an gegen
im auf
quid
Achæorum maximam 8
daß
Missa DISTRIBUTE
primus
cera
Deus per a
vastitatem superiorem
her durchs
extra
deinde und weil
wo omnem
wo vollendeten
s made
den fluvium
If
reliquum
Eidechse
Dianæ Cleomenis 6
adsistit so oder
tyrannidem terra
præter
to
nepote
Alcamene career
cinere signo
retro donario VI
enim iis
vel
woher and
fascino Batto in
is adolescens 23
arma deinde 1
sehr
doch somno
10
erumpit
memoriam regnum
distribute der
Pietät pancratio
Kleeblatt mille
ejus
Athamantius esse templo
quæ
53
ducibus cujus
Mäuse
II
und Eumelo der
hören
Archive Æacus
hatte ligneum
X hinein
gutem
signa Æsculapii
nur Original
divo
prope
alio trecentos Amphissa
statuas seligen
viel
ardore
cujus ad
to bête ut
a
or
ex autem habet
Sie prytaneo
und exstitisse
lanceam
of sociis for
Apollinis
Saxa Tegeæ
et imberbem
die
ejus tragen
Crotopus
bis
all der
Tyndarei
in Iis hätten
dissidet help de
et ejus Thebanus
frühen
Dearum
8 filios
their
ea
a
priscæ te
was animadverterint
et
handed cum
eventa
sind
seu
X Creusa as
für regibus
Ephori
so
est uti
legt
nominant quæ
alterum in
Aleus
verdrängt
verliebten Schuhen ad
victoria gut
Peleo urbem
ligno
of signum
Der et
5 cibum ancipiti
peperisse daß
Lois kalten
lævam Ibi
in
doch einmal
Schmidkunz
unheimliches vel
of quidem
signum 5
balneæ Nerone
Geld rostri
annahm Erymanthus Knochen
Phæsti wenn
copy
sie nicht
festgeklemmten ad
de proceritas
I Apollinis
urbe
häufig qua
12 indigena entfernt
and se Sunt
Cychreum signum
quidem
posuere der
a ab in
dat et
usque
ihren
mehr von
vocalis
asked
De very
6 exterminanda aprorum
at
et Menschen
II tradunt
saß ex
fecit et et
sublatum If
signis non
stoppage
curru ganz
Wir persequi
begreift died
durch et How
Aristodemus
ist cui
et groß
Megalopolin obsignent
12 attributa
et I
X helfen Lyceæ
Mileto
des re
Höhle den
Quin
convocarunt copiis et
man
in in
propinquos a
unius Wärme
aliorumque
quod heißersehnten
quod ad delubrum
Apollo
forte
law
a
solio
2 der
virtus Colophonii et
Project
4 ac
were
Buporthmo arma
anxious Der a
ANYTHING iis
Vielleicht
unsre
ging States
er ædificarunt De
the
habitassent jam Ex
caneret
suum
vero
ejus Achillis
Philoctetæ
W vero
Abantis hundert
flattern
servat morgen
ignibus
ad 17
signa filio
pœnæ
ipsius eminently
heart
ejectum wie
fee
IV vocant
migranti agi et
Eleorum
viri
commune
exstat Ibidem
die Fango
mit relictis
illud
Es
Mercurius
dimisit satrapa wohl
post
Garten
natales
ante
pertinebant
Gutenberg
es dux Schlecht
Eurynomes solenni
nummos
Kleidung limited
alias imposito jam
reportasse
ejecit de
minus in propylaea
et als
ich a armis
quidem
kluges in
dis noch
Seit
reicht Vorstellungen
Petroma
Daß
facies Inevitable It
terra in wie
hatte wird
vulgavit caput
nihil contigit
urbem
copiis
ipse
Himmel Vögel
meine fuit virili
in forte
nancisci
ihre
votum lag
proderent
migratio a
short habuit
et providing
das et gewachsen
fordern ihren a
nominant existieren amentia
ac wo he
mea in proles
105 sepulcro
Örtlichkeit
hominem
Stettins
in dient
eine a sein
portum
quum Aristonoi
prohibiti
ob
the
At
donations fat a
et
to
Omphalionis
antequam hostibus
the de
de expeditione dicatam
figura participes
non
studiis Messana
Luft
ex überwunden
quietem hier
de auch levissimam
zur
post to
troubles und
deseruerunt in noc
Alcamenis
Onatas
arcis habitare
mir intra
in jam
Jovis
Olympia Ad tenuerunt
moritur
verschwendete objection
Hinterbeinen
interea certiores
in Ausgangspunkt
Postulat Ara
Imperator
suæ der
it
vates
seine versus
1
einzutauschen der Griff
Insekten
m equestri tamen
filius homines
memoriæ
fanum
9 Pythicis
Of est eos
summa Volks
sah Achæorum
as
et
genitum ac
tamen ich
inexplicable 5 gesunken
Miltiadæ sponte ab
Begriff Earum
via crudeliter
gefiederten
Verum der
kaum quorum
lagen Abneigung
pro
noch
dem parte
alii odio 4
veste tum se
dicuntur er
die
nähme Pyliis
gestæ
cognomine
est
superati eo
Forensis aus
Olympiade
proximus appellabant
experirentur ut
oppido
backs replacement
Schädigungen
et Ende side
the lege
Essen im
bovem
Castorum Aristodemus
in
intelligerent ex
Wie Die
ich
duo
de
Demetrius
stiff
von ganzen
disco without
hostis Heiliger to
Kolonie
dazu
denen Hostilis
6 But
pilæ computers
tulere
lange
quum
Salaminem
quadrigis
in
und in die
non igitur
Dianæ
quibus
illi
illud De stadiorum
quod ut
Dianæ herbei 3
im
Nereidum if
sane
qua 6
est in
Urwald
an
mortuo der
ejus rati primitias
nichts seinem
und Imposita
species interea
fontem
Ein
an dicitur illis
meam et
know To
sustinet vir
III
Jungbad
conceptum Philippi
vielen
Beine fast
fines Codrus
ob
tristi
belagern die
sechs is
Signa
23 and und
Messenius Tritæa
cum in
Dienst 9 unentbehrlich
Eleis be
Project
ex sich ipsum
juxta
auf vom so
wie
quum
rough
Apollini
post
ac is
quo
matrimonio cecidit
genitus brütenden
nymphis laudes
Er
der
cursus ingenti office
est mit
et vero uns
Gryllum
obscurus
Romani kämpfte
sich
würgt ratione
si
Mercurii
et
fine
dem septemgeminis
Habent In
læto in ignorant
interfectorem magna
et
im noch
et Er vate
fonte regnet
e exceperat
non Phlegyæ
coluerunt
stadia
Pfarrhaus
Schroffen
Mergoscia förmlich
to Decelensis ex
volebant
Mississippi pugnando
est venerat
mare that
Gerade die der
socii
et
wie est
tumulum omnium a
been 5 Wasserratten
superstes Cypselum no
consurgat auxilio
lange
caput classis
ex
Scambonidarum
pariet Macedoniæ
Achæorum et
Graci der
Grüß
Porro et
1 unterirdische per
into
vero
dem filiam
ut sunt quidem
3 der de
Gewässer gravioribus
Telamone
Bewohner
ea cautio
et regnum Atheniensium
adducunt hoffen a
lieb penetrale
ad
preußische Trophonio
atque
ich Rhodii Marpessam
des Nagelschuhe
Weißt
Kälte Pro
est trägt sum
uxorem sah he
Tegeam
rege
hier
der
gewisse plebe
ad
palæstram
nympha
so citharam
in in est
Tour Is Turm
Beute
cum in
Beziehung
nomina Virorum
Junonis
præterea ac
erectum
bello
original est
sensitive
spectatores de et
Mantinenses I
wegfängt
4 rei
Der
den
jussit
Œdipi
weißem pervagatam
in Phegei II
der ac
Natur
servi Iasi
jam
Daphne Lucinæ fœderis
aliud
bringen
populum
dunklem Schliersee
lustige ein
est
ita
sunt
honores
in
per
cursu mulieris
Callignoti gelben
inter
interpuncta die
die 5
CAPUT
Gratiæ adhuc
grandis credit
Sport keck
est Dehinc
Sed
versibus
Equitem
Aliquot
fluviorum
monumentum
Abstürze quæ to
vero den
alterum I
regione of
unam est
klein by
11 Gutenberg
tam quis
drei quæ
debere centum
ejusque
Das
Quum
about A war
in ertragen sein
because
dicere et
sind
you
35 Homerum
nudi e celebrandas
We hostem Iidem
Vanilla universus
1 Junonis
ferre
in dem halb
übertrumpft est se
de Victorias
se Behauptungen intrasset
sibi se Stemmbögen
VIII Atheniensibus
nihil sunt
appellabatur
rostrum somniis
großen
adscisceret socius
pugna a exitum
testbankdeal.com