Cyber etiquette synonyms

Category:

Part of speech:

Manners applied to the Internet and the use of technology in everyday situations. Two examples of breaches of technology etiquette are checking email messages in meetings (usually through some wireless device such as a Bluetooth-enabled handheld) or taking cell phone calls during business lunches. Manners applied to the Internet and the use of technology in everyday situations. Two examples of breaches of technology etiquette are checking email messages in meetings (usually through some wireless device such as a Bluetooth-enabled handheld) or taking cell phone calls during business lunches. To avoid such breaches, cell phones should be turned off during business meetings. Also, individuals should avoid using email for personal or sensitive messages, because they can easily be misinterpreted because of a lack of vocal tone and body-language cues. The latter help receivers decode the message more accurately, especially for subtle nuances. Senders should avoid overusing the “reply all” category on email sendouts, limiting the response to only those people requiring follow-up. Also, senders of email should use high-tech shorthand (such as BTW to mean “by the way”) only if they are sure that every member of the audience is familiar with such phrases. Finally, individuals should not take pictures with a camera phone unless there is a legitimate business need and only if permission from the person to be photographed was obtained beforehand. Staff. High-tech Boors on Rise. The Globe and Mail, September 29, 2004, p. C6.
0
0
Manners applied to the Internet and the use of technology in everyday situations. Two examples of breaches of technology etiquette are checking email messages in meetings (usually through some wireless device such as a Bluetooth-enabled handheld) or taking cell phone calls during business lunches. Manners applied to the Internet and the use of technology in everyday situations. Two examples of breaches of technology etiquette are checking email messages in meetings (usually through some wireless device such as a Bluetooth-enabled handheld) or taking cell phone calls during business lunches. To avoid such breaches, cell phones should be turned off during business meetings. Also, individuals should avoid using email for personal or sensitive messages, because they can easily be misinterpreted because of a lack of vocal tone and body-language cues. The latter help receivers decode the message more accurately, especially for subtle nuances. Senders should avoid overusing the “reply all” category on email sendouts, limiting the response to only those people requiring follow-up. Also, senders of email should use high-tech shorthand (such as BTW to mean “by the way”) only if they are sure that every member of the audience is familiar with such phrases. Finally, individuals should not take pictures with a camera phone unless there is a legitimate business need and only if permission from the person to be photographed was obtained beforehand. Staff. High-tech Boors on Rise. The Globe and Mail, September 29, 2004, p. C6.
0
0
The specific internet consisting of a global network of computers that communicate using Internet Protocol (IP) and that use Border Gateway Protocol (BGP) to identify the best paths to route those communications.
0
0
(Dated) A radio set.
0
0
Advertisement
Find another word for cyber etiquette. In this page you can discover 4 synonyms, antonyms, idiomatic expressions, and related words for cyber etiquette, like: cyber ethics, electronic mail or email, internet and wireless.