writing business messages l.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Writing Business Messages PowerPoint Presentation
Download Presentation
Writing Business Messages

Loading in 2 Seconds...

play fullscreen
1 / 17

Writing Business Messages - PowerPoint PPT Presentation


  • 283 Views
  • Uploaded on

Writing Business Messages. Guffey text Ch 5-6 and Thill Bovee Ch 4-5. Business Writing -Discussion. Communication Matters, “Word Crunching” What did you find most interesting, surprising, or unbelievable in this article?. Business Writing Is . . .

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Writing Business Messages' - Albert_Lan


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
writing business messages

Writing Business Messages

Guffey text Ch 5-6 and Thill Bovee Ch 4-5

business writing discussion
Business Writing -Discussion

Communication Matters,“Word Crunching”

  • What did you find most interesting, surprising, or unbelievable in this article?
business writing is
Business Writing Is . . .
  • Purposeful. Solves problems and conveys information.
  • Economical. Is concise.
  • Reader-oriented. Focuses on receiver, not sender.
business communication formula for success
Business Communication Formula for Success

Know:

Yourself

Audience

Material

the 3 x 3 writing process
The 3-x-3 Writing Process
  • Phase 1: Prewriting

Analyzing, anticipating, adapting

  • Phase 2: Writing

Researching, organizing, composing

  • Phase 3: Revising

Revising, proofreading, evaluating

4-3

analyzing and anticipating
Analyzing and Anticipating
  • Define your purpose
    • general
    • specific
  • Anticipate the audience
    • Audience Analysis
  • Adapt the taskto the audience
discussion
Discussion
  • How is it possible to profile or “visualize” an audience if you don’t know the people who will receive a letter or who will hear your presentation?
define your purpose
Define Your Purpose

Generalpurpose

  • Inform
  • Persuade
  • Collaborate

Which gives the audience the most participation?

Which gives the author the most control?

define your purpose10
Define Your Purpose

Specific purpose

  • Clear and straightforward
  • Encompassing

To define, ask what your audience should do or think after receiving your message

adapt the task to the audience
Adapt the Task to the Audience
  • Spotlight receiver benefits
  • Use sensitive language avoiding bias
  • Adapt your tone, use the “You” view
adapt the task to the audience13
Adapt the Task to the Audience
  • Be precise
      • fax me, not contact me.
  • Use vigorous words
      • to identify, diagnose, analyze, examine, not to think about
  • Express thoughts positively
      • you may park in Lot 1, notyou cannot park in Lot 2.
adapt the task to the audience14
Adapt the Task to the Audience
  • Use familiar words
    • salary, notremuneration.
  • Avoid hidden negative messages
    • You do not understand . . .You are not very bright.
    • Your delay . . .You are at fault.
    • You forgot to . . .You are not only inefficient but also stupid and careless.
document for analysis
Document for Analysis

TO: All Employees Using HP 500 Computers

It has recently come to my attention that a computer security problem exists within our organization. I understand that the problem is two-fold in nature:

  • You have been sharing computer passwords
  • You are using automatic log-on procedures

Henceforth, you are prohibited from sharing passwords for security reasons that should be axiomatic. We also must forbid you to use automatic log-on files because they empower anyone to have access to our entire computer system and all company data.

Enclosed please find a form that you must sign and return to the aforementioned individual, indicating your acknowledgement of and acquiescence to the procedures described here. Any computer user whose signed form is not returned will have his personal password invalidated.

document for analysis revision
Document for Analysis - Revision

TO: All Employees Using HP 500 Computers

Your cooperation is urgently needed in solving a serious computer security problem. To enable you to keep your files and those of the entire company secure, please follow these two actions:

1. Keep your password private. Please do not share it with anyone.

2. Log-on to the computer manually. Avoid using automatic log-on procedures.

By refusing to share your password, you prevent intrusion into your private files. Automatic log-on procedures are also dangerous. Although they seem to save time, they give anyone access to the entire computer system -- even those without prior knowledge of your password.

Please sign the attached form and return it to me indicating that you are aware of this urgent problem and are willing to follow the two actions described above.

slide17

End

4-17