Choice of Communication Channel

Why do people choose one channel of communication over another? A model of media richness helps explain channel selection among managers.22

Channel Richness

Channels differ in their capacity to convey information. Some are rich in that they can (1) handle multiple cues simultaneously, (2) facilitate rapid feedback, and (3) be very personal. Others are lean, in that they score low on these factors. Face-to-face conversation scores highest in channel richness because it transmits the most information per communication episode–multiple information cues (words, postures, facial expressions, gestures, intonations), immediate feedback (both verbal and nonverbal), and the personal touch of being present. Other examples of media with high channel richness (in descending order) include video conferences, telephone conversations, live speeches, and voice mail. Impersonal written media such as formal reports and bulletins score lowest in richness as well as memos, letters, prerecorded speeches, and e-mail.23

In sum, rich channels give us the chance to observe. The unconscious aspects of communication help us understand the full meaning of a message. When these aspects are missing, we must look for other clues to deduce the sender’s emotions and attitudes.

Choosing Communication Methods

The choice of channel depends on whether the message is routine. Routine messages tend to be straightforward and have minimal ambiguity; channels low in richness can carry them efficiently. Nonroutine communications are likely to be complicated and have the potential for misunderstanding. Managers can communicate them effectively only by selecting rich channels.

Choosing Oral Communication

Whenever you need to gauge the receiver’s receptivity, oral communication is usually the better choice. The marketing plan for a new product, for instance, may need to be worked out with clients in person, so you can see their reactions to each idea you propose. Also consider the receiver’s preferred mode of communication; some individuals focus on content better in written form and others prefer discussion. For example, if your manager requests a meeting with you, you may not want to ask for an e-mail exchange instead. The pace of your work environment matters too. A fast-paced workplace may thrive on pop-by meetings, while a deadline-heavy team project may progress faster with scheduled Skype videoconferences.

Much of what we communicate face-to-face is in the delivery, so also consider your speaking skills when choosing your communication method. Research indicates the sound of your voice is twice as important as what you are saying. A good speaking voice, clear and moderated, can be a help to your career; while loud, questioning, irritating, immature, falsetto, breathy, or monotone voice tones can hinder you. If your voice is problematic, your work teams can help you raise your awareness so you can make changes, or you may benefit from the help of a voice coach.24

Choosing Written Communication

Written communication is generally the most reliable mode for complex and lengthy communications, and it can be the most efficient method for short messages when, for instance, a two-sentence text can take the place of a 10-minute phone call. But keep in mind that written communication can be limited in its emotional expression.

Choose written communication when you want the information to be tangible, verifiable, and “on the record.” Letters are used in business primarily for networking and record-keeping purposes, and when signatures need to be authentic. Also, a handwritten thank-you note is never a wrong choice for an applicant to send after an employment interview, and handwritten envelopes are often put right on the receiver’s desk unopened by administrative staff. In general, you should respond to instant messages only when they are professional and initiate them only when you know they will be welcome; remember that your conversation will not be stored for later reference. Texts are cheap to send and receive, and the willingness to be available for quick communications from clients and managers is conducive to good business. However, some users—and managers—view text messaging as intrusive and distracting, so establish some protocols first. Some of the most spectacular gains in social media are in the sales arena, both business-to-public and business-to-business. For instance, one sales representative for virtual meetings company PGi landed his fastest sale ever by instantly connecting with a potential client after TweetDeck alerted him that a CEO was tweeting his frustration about Web conferencing.25 Finally, curtail usage of blogs, posting, and commenting; both options are more public than you may think, and your words are easily found by your name via search engines like Google.

Choosing Nonverbal Communication

It’s important to be alert to nonverbal aspects of communication; look for these cues as well as the literal meaning of a sender’s words. You should particularly be aware of contradictions between the messages. For example, someone who frequently glances at her wristwatch is giving the message that she would prefer to terminate the conversation no matter what she actually says. We misinform others when we express one message verbally, such as trust, but nonverbally communicate a contradictory message that reads, “I don’t have confidence in you.”

Information Security

Security is a huge concern for nearly all organizations with private or proprietary information about clients, customers, and employees. Organizations worry about the security of the electronic information they need to protect such as hospital patient data, physical information they still keep in file cabinets, and information they entrust their employees with knowing. Most companies actively monitor employee Internet use and e-mail records, and some even use video surveillance and record phone conversations. Necessary though they may be, such practices can seem invasive to employees. An organization can relieve employee concerns by engaging them in the creation of information-security policies and giving them some control over how their personal information is used.26

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.16.66.206