Module 3 Intercultural Communication Ethics and Competence
Module 3 Intercultural Communication Ethics and Competence
People’s talk indicates or displays their cultural membership. Culture When you are anxious because of not knowing
is written not only in the language they speak but also the thoughts what you are expected to do, it is only natural to
the express and the assumptions they make. This explains why people focus on that feeling and nor be totally present in
have different communication behaviours, because they have the communication transaction.
different cultural backgrounds. This module will introduce you to the Feeing conscious of being new and out of place,
different ethics and guidelines in intercultural communication. fear of making common mistakes and appearing
awkward to others.
Message Skills – refer to the ability to understand and use the ONLINE ACTIVITY:
language and feedback. Screen Names
Behavioural flexibility – is the ability to select an This is the term used to refer to the name a person uses
appropriate behaviour in diverse contexts. on screen or used in participating in chat
Interaction management – emphasizes the person’s
ability to interact, such as attentiveness and responsiveness. rooms, playing games, uploading videos, leaving online comments,
and selling items online.
Social skills
Screen names may or may not provide accurate
Empathy – is the ability to think the same thoughts and representation of the person behind the screen. A
feel the dame emotions as the other person. person may select screen names based on how they
Identity maintenance – is the ability to maintain a genuinely perceived themselves (e.g. shyguy21,
counterpart’s identity by accurately understanding that toughgirl, etc.) or may choose a screen name that
person’s identity. It also refers to ability to maintain one’s describes the traits they wish to establish and the
identity while dealing with others having different cultural personality they want to portray online. Freedom to
background. choose or create screen names expands opportunities
for online users to hide under different and fraudulent
3. Psychological Adjustment
identities and posts a threat for possible cyber crime.
Effective communicators must be able to acclimate/
E-mail Address
adapt to new environments. They must be able to
handle the feeling of “culture shock, ” such as the e-mail address may create a desired or undesired
frustration, stress, and alienation in ambiguous impression.
situations caused by new environments. The e-mail address also reveals information whether it
is created for individual, organization, private or
Approach to Intercultural Communication
public use.
4. Cultural Awareness It consists of the username, the domain name after the
@ symbol (google, yahoo, gmail, etc.), and the top-
To be competent in intercultural communication, level domain after the dot (.) (.edu for educational
individuals must understand the social customs and the institutions, .com for company , .gov for government
social system of the host culture. Understanding how offices, and so on).
people think and behave is essential for effective
communication with them.
Technology has made the world smaller, people allow the creator to disclose only the information he or she
proximately closer, education more advanced and wishes.
communication a lot easier. These sites may be devoted to specific aspects of the self,
Technological devices play a vital role in the way such as interests, relationships, or any interesting activities
people communicate. In this module, you will be involving people. Content of these pages include pictures,
exposed to the various guidelines to be followed in videos, mash-ups, and posts about their thoughts, talents,
using technology to aid a good and effective and interests.
communication.
Social Networking Sites (SNS)
Relational Technologies
sites allow people to connect with friends, families, and
others in an existing social network while establishing new
connections and forming relationships with people from 4. Relationship and personal drama are best kept private.
around the world.
Facebook, Twitter, Instagram and MySpace. 5. Uncomfortable information, such as one’s psychological issues or
a relative’s or friend’s fading health should be shared sparingly.
used in making connections and building online community
such as group chat rooms and even group conferencing 6. Never share intimate personal details including birthdates, phone
applications. numbers, addresses, ID numbers, and
Some even take disihibition to the extreme, blasting off 15. Reserve confidential discussions for private message threads.
angry e-mails, text messages, and postings. This act is
16. Poor spelling, punctuations, grammar and choice of words can
called flaming.
reflect poorly on you.
3. Permanence
So, proofread all communications before sending or
One of the risks of mediated communication is permanence, posting.
especially for hostile or inappropriate messages. A regrettable text
message, e-mail, or web posting can be archived virtually forever. Guidelines in Becoming a Responsible SNS User
Even worse, it can be retrieved and forwarded. The book Netiquette 1. Understand that each social network has its own rules of conduct,
Essentials: New Rules for Minding your Manners in a Digital World, social norms and methods of
discusses the following guidelines:
interaction. Before utilizing one, take a moment to study how
1. Sharing extremely-opinionated viewpoints (on controversial topics, interactions are done, so you can discern
political issues, etc.) can make you
the appropriate ways of using your desired SNS.
an easy target for criticism.
2. Always assume that everything you post online can be seen by
Think twice before posting or liking posts which can incite others, even privacy settings can suffer
and aggravate
breaches. It may also live on the internet permanently.
others. If you do not have anything nice to say, perhaps it is best to
say nothing at all. 3. Never share information that someone has shared with you in
confidence.
3. Posting embarrassing, revealing or negative photos of
yourself should be avoided at all costs. 4. Always log out of all your accounts after using, especially when
Remember that the images you share may be taken as you are using somebody else’s phone or computer.
representative of your character.
5. You reserve the exclusive right to decline requests from strangers.
3. Never post photos of others without their permission Do not feel compelled to reply to messages or follow challenges or
requests from strangers. Also, respect others’ right to privacy. In case
you want to befriend a person you know but who doesn’t know you,
send a short message first explaining who you are and where you’ve
met.
7. Use privacy settings to limit who can access your account and
view your posts and other information about you.