Skip to main content
Business LibreTexts

1.4.11.6: Electronic Communication

  • Page ID
    58571
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)

    ( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\id}{\mathrm{id}}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\kernel}{\mathrm{null}\,}\)

    \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\)

    \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\)

    \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    \( \newcommand{\vectorA}[1]{\vec{#1}}      % arrow\)

    \( \newcommand{\vectorAt}[1]{\vec{\text{#1}}}      % arrow\)

    \( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vectorC}[1]{\textbf{#1}} \)

    \( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)

    \( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)

    \( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)

    \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)

    What you’ll learn to do: identify common risks and ethical issues associated with electronic communication in business

    In this section we’ll touch on some of the risks and ethical issues business face when they rely on electronic communication.

    Electronic Communication

    • Identify common ethical issues associated with electronic communication in business

    Electronic Communication

    Starting in the 1980s with the development of information and communications technologies, businesses have increasingly come to rely on electronic channels as a primary means of communicating and of conducting business. Such technological advances have been a tremendous boon, as businesses are now able to transmit and store vast amounts of information cheaply and quickly. At the same time, these developments are not without risks or challenges, particularly where ethics and security are concerned. In this section we discuss some of the concerns surrounding the use of electronic communication technologies.

    Risks of Electronic Communication

    Electronic communication and eCommerce have presented businesses with exciting opportunities that couldn’t have existed even a couple decades ago. At the same time, they’ve brought unexpected challenges. When businesses allow customers to shop online, receive discounts by providing personal information, use live chat to communicate with customer service, they are hoping to enhance their image and provide a customer experience that is superior to the competition. But, what happens when the information a customer shares with a business is compromised or stolen by a third party? Consider what Home Depot endured when their customer database was breached in 2014:

    Photo of a large Trojan horse outside. People stand around at the base of the horse.Data security is on everyone’s mind these days, and the ways that electronic communication can be compromised seem to evolve as quickly as the technology. The following are just a few of the illicit and illegal ways that people get their hands on electronic communications:

    • Viruses, worms, and Trojan horses. A computer virus is a type of malicious software program (“malware”) that, when executed, replicates by reproducing itself (copying its own source code) or infecting other computer programs by modifying them. A computer worm is a stand-alone malware computer program that replicates itself in order to spread to other computers. A Trojan horse, or Trojan, is any malicious computer program that is used to hack into a computer by misleading users about its true intent.
    • Spoofing or phishing. Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons. Often the sender of the electronic communication is disguised as a trustworthy entity.
    • Denial-of-service attacks. A denial-of-service attack (DoS attack) is a cyber attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting the services of a host connected to the Internet.

    The low cost and rapid delivery of electronic communication makes it the preferred method of communication for both business and consumers, but there can be hidden hazards and costs. The following are common ones:

    • Electronic communications are forever. Electronic messages are permanent (this includes communications such as email and also audio recordings such as voice mail). Even if a person deletes the communications from his or her own server or account, there are generally other servers that still hold this information. One way that these types of communications live in perpetuity is when they are sent or forwarded to multiple individuals.
    • Someone may be watching. In many cases, confidential information is leaked by someone else sifting through his or her messages. The culprit may be a disgruntled employee or even a competitor. Workstations left unattended, employees remaining logged on to networks and email accounts when they are away from their desk, and even sharing passwords with coworkers all make it easy for prying eyes to see information not intended to be shared.
    • Innocent messages can still harm you. Civil litigation lawyers will warn you that even innocent messages can get you in trouble you if they are taken out of context. When a person writes an email or text, he or she may have only one intent or meaning in mind. However, messages can be misconstrued to apply to a completely different scenario.
    • Email avalanche. Managers, in particular, are vulnerable to relying on email too heavily for communication. People use email because it’s quick and easy, and they can send the same information to a lot of people at the same time. This can lead to information overload and misunderstandings by recipients, however. Words alone account for only 7 percent of communication,[1] so it’s important for managers to be aware of the limitations of email in getting their messages across.

    Ethical Issues in Electronic Communication

    Technology enables businesses to communicate and store information more readily and efficiently than ever. However, as much as technology impacts the way that companies do business, it also raises important new issues for the employer-employee relationship. If you send personal emails from your office computer, do you have the right to expect that they’re private? Does your employer have a legal and ethical right to “cyber-peek” at what you are doing with company assets? Twenty years ago this was not an issue; in 2010, it was a case before the Supreme Court. The case concerned the extent to which the right to privacy applies to electronic communications in a government workplace, and the city narrowly won. The U.S. Supreme Court has generally found in favor of employers, giving them the right to monitor any communication that occurs on their equipment (computers, smartphones, or pagers).

    Employers want to use technology to help them screen applicants and verify information about their workforce, which is understandable. In the module on Human Resource Management you learned about the cost of recruiting, hiring, and training employees. However, what if the company believes that one of the quickest ways to gather information about an employee is to access their social media accounts? A company would never ask for your login credentials for Facebook, Twitter, Instagram, LinkdIn . . . or would they? And if they did, is it legally and ethically justified? What would you do if you found yourself in the situation presented in the following video?

    The fact is that technology has put our information at the fingertips of businesses—there for the taking and, in some cases, the selling. Is it ethical for a business to collect data about a person and then sell that information to another business? Many organizations collect data for their own purposes, but they also realize that your data has value to others. As a result, selling data has become an income stream for many organizations. If you didn’t realize that your data was collected by Company A, it’s even less likely you knew that it was sold to Company B.


    1. Mehrabian, Albert (1981). Silent Messages: Implicit Communication of Emotions and Attitudes (2nd ed.). Belmont, CA: Wadsworth.

    1.4.11.6: Electronic Communication is shared under a not declared license and was authored, remixed, and/or curated by LibreTexts.

    • Was this article helpful?