The Mobile Entrepreneur Part 2
-
Upload
venturepointsa -
Category
Business
-
view
57 -
download
4
description
Transcript of The Mobile Entrepreneur Part 2
3. Code of Ethics• Impact your reputation.
• Avoid behaviors that harm you imageand how you are perceived by customers,partners or people in general.
• Demonstrates multicultural awarenessand business culture.
TELEPHONE: THE FIRST IMPRESSION- It is important to answer the telephone by the second ring.
- Give a proper greeting.
- It is your responsibility to return a call promptly after receiving wordof a missed call.
- Smile when talking.
- Do not cover the phone during the call.
- Try not to put the other person on hold..
RING TONE- Think about what the ringtone saysabout you.
- If you are embarrassed by yourringtone in certain situations (trains,office, when you're visiting yourmother), then you almost certainlyhave made the wrong choice.Choose a different ringtone.
SILENCERemember that your phone has the funcGons ofvibraGon or silence. Use It!!
SUGGESTIONS FOR USING THE PHONE- Do not make calls to people from inappropriate places; a call from a bathroom isvery unpleasant.
- Bluetooth headsets are great in the car (they are safe and legal).
- If you are expecting an important call when meeting someone socially, explain atthe outset that you will have to take the call, and apologize in advance. Otherwise,apologize and retire somewhere private to make or receive the call.
SUGGESTIONS USING THE PHONE
- Isolate yourself from noise or distracGons that mightinterfere with your conversaGon..
- Avoid talking publicly about inGmate issues, using foullanguage or being rude.
- During the call avoid having anything in your mouth thathinders communicaGon (cigare_es, candy, gum, drinks, etc..).
- Although you may have a smartphone, it can be beneficial tohave a small notebook and pen to take notes.
BASIC CODE OF CONDUCT FOR TEXT MESSAGES
- Short messages and instant messaging.
- Do not cancel an appointment with a text message.
- Formal written communication should never bereplaced by a text message.
- Never send a condolence message by text.
- Avoid using confusing language and abbreviated textas the recipient may not understand. (lol, omg, rofl)
- You can omit conventional greetings and farewells.
4. HUMAN RESOURCE MANAGEMENT
- Remote monitoring- Distant work teams
- Virtual Meetings and Video Conferences- Economic and energy savings
TIME DESKREMOTE MONITORING
Helps you:- Find and eliminate the waste of Gme
- Understand what is happening at work- Track your projects to bill customers
- Fully automaGc - no data entry- Available for Windows, Mac, Linux, Android & iPhone
-www.desk[me.com
5. Virtual Meetings & VideoConferencing
Virtual meetings take place overthe Internet, where individuals,partners or employees attend
through their computer withoutphysically traveling to the meeting.
VIRTUAL MEETING PROTOCOL
- The first thing to understand when conducGng a virtual meeGng is that it is notreally a virtual meeGng at all.
- The meeGng is real, the acGvity is real, and the importance of the results are real.
- This is a real mee[ng that happens to take place in a virtual environment.
- Consider the processes that take place:
o Before meeGng
o During the meeGng
o AXer the meeGng.
BEFORE THE MEETING:The place to conduct the meeting.
1. Technology? Does everyone have the necessary resources?
2. Who are the participants and how will they be invited?
3. What time will the meeting be, and are there participants in different time zones?
4. What language will be spoken during the meeting?
5. Do you make and answer questions during the meeting, or after?
6. What materials will participants need? How will they be sent? Email? Fax?Overnight Delivery?
DURING THE MEETING
1. Try to call or arrive a few minutes early.
2. Introduce all participants.
3. Follow the agenda.
4. Be accurate, use examples to ensure understanding, recap andsummarize.
5. Refer to the slide number or page number if you are using apresentation previously sent.
6. Direct questions to each participant instead of saying "Are there anyquestions?"
7. Listen to the views of all participants.
AFTER THE MEETING1. The meeting does not end as soon as participants hang up or log off.
2. Sending notes shortly after the meeting helps ensure that everyone has thesame understanding of what happened and what will happen next.
3. Well documented decisions and action items with clear deadlines helppeople understand how to proceed once they have been disconnected or
dismissed from the meeting.
4. Considering that people may be located in different time zones, the more
you can help people to be successful, the more willing and able they will be
to attend future meetings and take on additional responsibilities.
ADVANTAGES OF VIDEO CONFERENCINGAND VIRTUAL MEETINGS
• Economic• Time-saving
• Maximize resources• Improved quality of life
ADVANTAGES OF VIDEO CONFERENCING ANDVIRTUAL MEETINGS
The use of videoconferencing is an efficient and dynamic communication thatgoes beyond the traditional voice call. It incorporates much richer visualcommunications and participation.
Applica[ons and Services3G Video Conferencing
- Offers the possibility to partners, employees or users to initiate and / or
participate in videoconference from any location.
- Videoconferencing 3G multimedia communications ubiquity allows "face to
face" communication and a more effective exchange of information, it increasesproductivity, and helps resolve issues quickly, including questions and doubts.
- Excellent visual collaboration system for global sales meetings, job interviews
or for the promotional launch of a product or service.
3G Mobile Phone Video ConferenceRequirements
- The 3G Phone or Aircard
- Built-in Camera
- Data Plan
- Video Conferencing Client
6. Security
Computer security has three main goals:
- Confidentiality
- Integrity
- Availability
Basic Computer Security Methods
- Limit computer access to "safe" users.
- Peripherals can block any "unsafe" activity.
- Firewall and antivirus software.
Security
- What is cyber security?
- What are the risks?
- What can you do?
What can you do?
- Hacker, attacker, or intruder
- Malicious code
- Vulnerability
The Internet is Public- It’s accessible and contains a wealth of information
- Has become a popular resource for communicating, for researchingtopics, and for finding information about people
- You are not really anonymous when you are online
- Once online, you can be accessed by a world of strangers…and
remember, you have no idea what they might do with that information.
Guidelines when publishinginforma[on on the Internet- View the internet as a novel, not a diary
- Be careful what you advertise
- Realize that you can't take it back
- Before you publish something on the Internet, determinewhat value it provides and consider the implications ofhaving the information available to the public - forever!
Why do you need a password?- Choose a good password (numbers & letters).
- Don't use passwords that are based on personal information.
- Don't use words that can be found in any dictionary of any language.
- Develop a mnemonic for remembering complex passwords.
- Use both lowercase and capital letters.
- Use a combination of letters, numbers, and special characters.
- Use passphrases when you can.
- Use different passwords on different systems.
Why do you need a password?
-
-
-
-
-
How to protect your password.
Minimize the access other people have to your information.
Lock your computer when you are away.
Disconnect your computer from the Internet when you aren't using it.
Evaluate your security settings often.
What other steps can you take?
- Protect your computer against power surges and briefoutages.
- Back up all of your data.
7. BRANDING
A company or a person with a strong business identity anda good position in the market will be a steady source ofincome and safe in the long term - reputation, good name,identity.
Professional Image- Tools that can make a difference in your market:
o The Mission, Vision and Values of your company
o The value of your word
o Business cards and other advertising
o Design and layout of your website
o Virtual Offices
o Social Network
THE WHY AND THE VALUE OF VIRTUAL OFFICES
BACKGROUND
- Entrepreneurs who work alone are increasing every day
- Currently 58% of small business owners work from home
- More attractive for women entrepreneurs
- Companies can make some fixed infrastructure costs, variable and dependent
on the number of employees
8. VIRTUAL OFFICES- A company requires between 200 and 250 sq ftof office space per employee.
-Every day more people are working remotely.
-How much is spent on a simple change ofaddress for your office?
-Change of address (business cards, stationery,stamps, TIME) can be expensive
- A virtual office can save money.
CO-WORKINGCo-working (co-work) allows freelancers, entrepreneurs and SBs from
different sectors to share workspace, both physical and virtual, to developtheir professional projects independently, while encouraging joint projects.
CO-WORKING BENEFITSRESULTS OF A RECENT SURVEY ON VIRTUAL OFFICES OR Co-working SPACES:
- 92% of respondents said their social circle had increased significantly.
- 80% said their business had grown its network.
- Reported a 75% increase in productivity.
- 86% said that their isolation has decreased.
- 96% of respondents said that community is an important value amongmembers in their co-working space.
- 74% of people know all or many of the names of their companions inthe co-working space.
Responses to the quesGon"What do you like most about your
virtual office?"81% said they liked the people
61% said their virtual office was the best place to work46% said that price was the most important element68% said they had no plans to leave their work area17% said they would stay for at least one year
SOCIAL PLATFORMS- Social platforms are increasingly used by companies.
- Review profiles of prospective employees, customers or partners
- Facebook and Twitter let you get a sense of the environment,friendships, tastes and interests of the candidates.
- For this reason, we must be careful with the information we sharein these social spaces and properly handle privacy settings.
- Check the privacy settings on Social Media
- Create a personal profile and avoid mixing other professionalinformation
- Browse search results of our names in Google