COMM 277 Week 8 Assignment Template: Evaluation and Reflection

COMM 277 Week 8 Assignment Template: Evaluation and Reflection

COMM 277 Week 8 Assignment Template: Evaluation and Reflection

Name

Chamberlain University

COMM-277 Interpersonal Communication

Prof. Name

Date

Online Management

The use of technological advances continues to shape our daily interactions, especially through social media. However, managing privacy and self-disclosures online has become increasingly difficult in today’s rapidly evolving technological landscape. To protect my personal information from being exposed by individuals, corporations, or hackers, I apply Communication Privacy Management (CPM) theory to determine what I share on social media (Nickerson, 2020). Through CPM, I have gained an understanding of how privacy and self-disclosure frameworks operate in online environments. For example, CPM theory has enabled me to establish boundaries between my personal and professional life, guiding what I choose to disclose. As a result, I have developed effective strategies for safeguarding my online activities while continuing to enjoy the benefits of internet use.

On another note, I believe it is unethical for school officials or potential employers to make decisions about admissions or hiring based on what they learn from an individual’s online presence. Using social media to screen applicants is not an objective process, especially if the Civil Rights Act (CRA) protects the individual’s online information (Nickerson, 2020). Such screening can significantly influence decision-making processes, making schools and employers liable for violating personal privacy. Thus, both academic and employment institutions should reconsider the practice of gathering personal information in this manner. Nonetheless, despite these ethical concerns, social media screening remains one of the easiest ways to assess whether individuals are reliable, respectful, and responsible.

PowerPoint Process

Throughout the process of organizing my PowerPoint presentation, I found the structured approach to be particularly helpful. I learned that each slide should focus on a specific topic and be accompanied by lecture notes to further elaborate on the points presented. Additionally, I discovered that a well-organized PowerPoint presentation should consist of an introduction, the main content, and a conclusion. This format ensures that all aspects of the topic are covered and presented clearly, leaving no information out.

Another valuable lesson I learned while designing the slides was the importance of proper planning before starting the actual presentation. Knowing the audience and conducting thorough research prior to the presentation is essential for delivering an effective performance. Ensuring that the slides are free from grammatical errors and that the content is presented concisely in bullet points further enhances the effectiveness of the presentation. For instance, when delivering a 10- to 15-minute presentation, it is ideal to include only three key points on each slide to maintain clarity (Bright, 2018).

Finally, when it came to turning my notes into a class lesson using PowerPoint, I found it helpful to arrange the key points in a logical order and support them with arguments, discussions, and analysis. This allowed me to present a balanced and reasonable view of the topic. Additionally, I avoided using overly complex graphics or tables, opting instead for engaging and visually appealing information that encouraged student learning. Teaching through a PowerPoint presentation follows a structured instructional procedure that keeps the lesson running smoothly and efficiently in the classroom.

Table: Key Points of Online Management and PowerPoint Process

Online ManagementPowerPoint ProcessReferences
Technological advances affect online communication.PowerPoint presentations require a structured approach.Nickerson, 2020.
Privacy management is crucial in today’s fast-changing online world.Each slide should have a topic and accompanying notes.Bright, 2018.
CPM theory helps build privacy boundaries.Proper planning and knowing the audience are key. 
Unethical to use social media for admissions or hiring decisions.Bullet points enhance clarity and keep the presentation concise. 
CRA protects online information from unauthorized access.Logical arrangement of key points is essential.

References

Bright, S. (2018). Microsoft PowerPoint: Creating a presentation, tips for creating and delivering an effective presentation, and marketing your brand through PowerPoint presentation.

COMM 277 Week 8 Assignment Template: Evaluation and Reflection

Nickerson, H. (2020). Shield your privacy: 15 ways to protect your personal information.