Monday, February 2, 2009

Conceptual Research & Reflection Project


Concept 7: Netiquette



Quote: “Good communication practice on the Internet is not something one ‘learns’, but something one ‘practices’ so as to teach others, less familiar than yourself, how it is done.” [Allen, n,d]



Netiquette is social networks of etiquette in which provides the do’s and don’ts of online communication. [S T Ross, n,d] The primary reason for its existence is to provide guidance on good manners for internet users who utilize the world of WWW. But who provides this ethics of practice? There are plenty of websites that list and contain do’s and don’ts for netiquette, stemming from Edutopia, Netiquette Guidelines & countless other websites of similar information. But who are these people? They are people just like you and me who are promoting good behaviour and exercising the ethic of maintenance. However they do not take responsibility for doing it ‘right’, they are merely teaching others less familiar then themselves, how it is done.

Our goal in contributing to networking sites, email & various other communication media is always to interact with other people and its social communities. Ignoring the particulars of social behaviour/netiquette is the easiest way to lose out on the benefits of social networking. [P Sturges, 2002]There are many problems that occur online, that destroy online communities and it is vital that we teach others the practices of netiquette to ensure these problems don’t weaken sociability online.

There is no one ‘ruler’ in cyberspace controlling the manners/behaviour of internet users to make certain they are ethically doing the right thing and given this potentially dangerous problem, internet users must ensure that they practice netiquette online and teach others of this social responsibility. [S T Ross, n,d]

Previously this concept has been very grey, because of the disintegration of online communities & as such is created from societal evils. [L Weir, 2009] There is a perception that there are evidently no consequences in an online environment because there is no one to get in to trouble with & it is virtual by all means. My evaluation of online bad behaviour is due to no face to face authorities, mystery of the internet, a vast difference in communication styles & ages from around the globe & day to day society networks. There will always be people that don’t follow the norm and show no remorse.

It is very critical in today’s online society to ensure that interacting over communicating systems through the internet is done safely and effectively. To ensure that good communication practice is used on the internet, it needs to be taught from an early age so that internet users take this approach to online communication in the future & so they can teach others. [L Weir, 2009] Educators must take responsibility and become aware that students from an early age need to be educated on internet behaviour. By doing so, this will enable good network netiquette, the implementation of ethical social responsibility that one practices on a day to day basis and to show others how it is done.

As teaching netiquette to the youth from a young age is critical to the future of online communication, it is also important for internet users of today no matter what age, to teach others the rights of netiquette, respect others, share information & communicate ethics of maintenance to head in this same direction. [S Hambridge, 1995].




Site 1: Behave Yourself – Online Manners Matter
URL Link:
http://www.edutopia.org/Whats-next-2008-netiquette-guidelines



This article written by Laila Weir outlines the importance of educating children from a young age about netiquette & online manners. Laila stresses how critical it is to teach students about Internet communication and that it is just as important as teaching manners in society networks. The internet is now a very big part of society and do’s and don’ts should be strictly taught to ensure students educate & teach others how it is done. The article also outlines the reasoning behind her assumptions & opinions and provides ways of forward thinking in our education system.



Site 2: Etiquette Online: From nice to necessary
URL Link:
http://www.ifsm.umbc.edu/~preece/Papers/Etiquette_online.pdf



Preece’s article evaluates the current evolution of netiquette in a variety of asynchronous communication systems. She speaks about how the perceived ‘manners’ and ethical boundaries of internet publication is often blurred. She stresses that netiquette is a necessity in to days world wide web due to social problems & the perception that there is no consequences in an online forum. Preece has provided a range of solutions given to sole this ongoing bad behaviour with reference to current solutions in place. This site is credible as Preece is a significant writer & professer of informationm systems & has been cited in many publications.


Concept 17: The Impact of text-based real-time chat



Quote: “Real-time internet-based text chat is a significant part of contemporary internet use. The question than to be asked is: what is the difference here that makes this mode of communication popular; and then what impact does it have of the kinds of communication and social interaction that take place?” [Allen, n,d]



Instant messaging (IM) is a type of real-time communication that allows interaction between people based on typed text. Chat happens in real-time right before your eyes as a faster conversation than technologies such as email & can be moderately fast paced. [J Marquez, 2005]

Text-based real-time chat allows people to more easily form and sustain friendships and romance attachments & engage in debatable social & political discussions directly from their home. (Tyler p 196, 2002). However IM provides the user with the ability to hide behind the computer screen, show none of the physical signals that they would normally see face to face & created a desired impression of ones self. You loose cues such as interpretation of tone, facial expressions, body language & giving the end-user the time to pick & choose his or her words. [J Marquez, 2005]

This creates a lot of control for the user enabling a person to hide behind a false character they wish to pursue. For the receiver it is also hard to discern the motives in a conversation. [R Farm, 2003] IM grants people time to respond & can be used to consider certain words to be said when talking about touchy topics however IM also allows a person to think their responses through to ensure that arguments become less heated & easily resolved. IM can also help with shyness & socialising issues unlike email or telephone by helping a user to sit behind a desk and feel normal, free to be one self & to be accepted by his or her peers because through text you cannot see what a person looks like & thus breaks down the barrier of stereotypes.

As entities are becoming more information based the need for effective information sharing, team working & ethical environments has become vital in the workplace.
IM also raises a great debate in the workforce as it is a very useful tool for work colleagues because it fits in perfectly with busy schedules & enables the ability to multi-task. [R Farm, 2003] The benefits it presents are that it allows you to communicate for free with other workers & customers where distance is a problem. It also provides efficient productivity with getting answers immediately, quick communication & clarification, co-coordinating & scheduling tasks & the ability to get the job done faster. IM can also be used for presentations via Web-cams & online meetings, thus savings time & money. Another advantage to this growing tool in business is the convenience of working from home. Using IM as a tool for business purposes also has its downfall when it comes to lost productivity [D Shinder, 2004] by spending more time than necessary ‘chatting’ and abusing the tool for personal use & more involved conversations. This tool can also be a distraction to employees by wasting a lot of time talking to family & friends & also be open to viruses & security risks. Chat conversations can be lost unlike email however it is now possible to save a conversation for later reference. [Businessknowledgesource.com, n,d]




Site 1: The Effect of Instant Messaging on the Social Lives of Students Within a College Dorm
URL Link:
Http://www.stanford.edu/class/pwr3-25/group2/pdfs/IM_Social.pdf



Juan talks about the consequences of face to face social interactions & explores the ways that IM affects the social lives of students. He speaks about the research, history & background of IM and trends found in standard online communication tools. Juan gives a better indication of whom, when & how often IM is used within students. The author of this essay evaluates that IM real-time text based chat affects everyone differently depending on their personality & social nature & that IM only enhances students social habits & it’s the direct cause of this.



Site 2: Instant Messaging: Does it have a Place in Business Networks
URL Link:
http://windowsecurity.com/articles/Instant-Messaging-Business-Networks.html



This article looks at the pros & cons of allowing online communication using instant messaging in the workplace. I think Deb outlines her debate in a fair way & presents reasoning for her opinions. She also talks about the relationships between the ongoing updates to Voice over IP & that it is slowing the growth of instant-messaging. It provides answers to ensure that IM is made secure in the work environment & how to stop users from using it on the whole. This website is significant for business owners to evaluate communications through technology & how to handle implementing this tool in the workplace.





Concept 26: Privacy & Security



Quote: “The internet is a profoundly ‘open’ system and advanced internet users are cautious about either accepting or sending material from and to unknown sources and are careful in releasing information about themselves in any form. Conceptually, the internet challenges us to take greater responsibility for the protection of privacy and security than perhaps we are used to when dealing with the media.” [Allen, n,d]



The internet has crossed boarders on global levels and changes need to be made in order to protect our security & privacy. Users must realise that necessary measures should be taken to protect not only personal details & identity but also there computer & software. [J Nielsen, 2000] There are many aspects of privacy & security generated from the internet and they can affect all means of life. Internet users of today must become aware of various threats & need to ensure that they take responsibility for the protection of privacy & security to take steps to prevent these unwanted attacks over the internet.

Privacy on the internet is the responsibility of the individual. One must be cautious at all times when producing private information on to the internet. Internet users should never trust technology with identity details as hackers actively seek to exploit others for their own gain. [Center for Democracy & Technology, n.d] These motivations include criminal, social & political demons & limited technical understanding with users also creates an attractive environment for security breaches.

“The object must be to bring policy to the internet, and bring the internet to everyday privacy polices” (Attaran & Van Laar, 1999)

Security & privacy measures must be taught to internet users in order to protect themselves from harmful internet consequences. It can be argued that it will not solve the problem long term & therefore internet users will switch back to traditional methods of communication.

The most secure way to ensure our information is protected is using an encrypted program. However to protect all mediums on the internet the realistic way to do this would be to make a built-in feature of all computing basics & encrypt all information at all times. Turn on all security settings by default, and automate all updates. You cannot rely on the user to ensure he or she is safe from these vulnerabilities, the computer industry and/or government needs to take responsibility and take control over the security & privacy measures that can be put in place to ensure simplicity. [J Nielsen, 2004] Some examples of these security & privacy breaches range from the following:

- Viruses
- Spoofing
- Worms/Spiders
- Hackers
- Spammers
- Identity Theft
- Unwanted content
- Collection of personal data
- Stored information from web browsers & IM

To ensure the user takes the right steps in protecting ones self from security & privacy breaches, the following measures can be taken:

- When using internet for financial details one must use a secure program
- Never reveal your true identity
- Protect your passwords
- Constantly update your virus protection
- If you are subscribing to an online website check the companies online privacy policy
- Use 2 emails – One for personal use & one for online merchants [Privacyrights.org, 2008]

The internet is an influential medium allowing the fast transfer of immense quantities of information between users world wide and whilst this brings great benefit, it has given rise to new vulnerabilities. The answer to these consequences lies with companies at large, computer designers & not so much the user, as it is to unrealistic to assume that the average users cannot beat the threats online.




Site 1: Security & Human Factors
URL Link:
Http://www.useit.com/alertbox/20001126.html



Nielsen Norman Group focus on leading edge research into countless user experience tools & topics and their impact in the online environment. Jakob Nielsen is the founder of this large organisation who is a significant authoritarian on usability & how to achieve security & privacy threats by applying rules of a more computer based design. I believe in Nielsen’s opinion that the fix does not rely on the human to make changes but for the computers to be the change. This article shows you different ways in which security can be protected & debates how design is an important factor is protecting our online environment.



Site 2: The Australian Government Net Alert
URL Link:
http://www.netalert.gov.au/home.html



This site helps facilitate families & students with useful information & tips to ensuring that a safe online environment is used. This site should be more advertised in the marketing world as I’m sure many internet users do not know these help centers like this even exists. This national net alert has features including: tips, awareness, downloadable programs & news & events to ensure your family is protected. This site also provides safety advice & solution guides for parents, librarians & teachers. This website also shows the government’s contribution to helping Australian families, companies & students with using the internet.

Concept 13: Communication is not complete upon

receipt



Quote: “The Key to effective email management is to consistently and conscientiously respond to and act upon the email you receive, while recognizing that others may not be as efficient as yourself” [Allen, n,d]


Email is a system that sends and receives messages electronically through the World Wide Web. This communicative tool is a popular way for people to interact with others for personal & business use. An email can be created & sent straight away to anyone on a global level & thus why it is widely used for all purposes. [D Dunn, 2008] However what comes with this is the concept that communication is not complete upon receipt & thus raises uncertainty that the recipient may or may not respond. [Mindtools.com, n,d] This is because if the recipient does not get back to the sender, subsequently there is no communication between the sender & receiver. As a result communication comes to an end at the hands of the receiver & the sender does not have any control of what happens after the email has been sent. Communication is only complete when a reply is received!

It can be argued that when we send an email to someone we expect a reply immediately; however this is not the case depending on the recipients’ circumstances and that we cannot rely on others to be as efficient as ourselves. This also stems out to assume that we can rely on automated processing information but not on humans.
It is impractical for efficient users to assume that when a message has been received, it will automatically get responded to or acted upon.

For successful email communication, emails should be responded to in an efficient way however this is not always the case. In my personal experience I have come across several recipients who choose not to reply in a quick manner, I have waited hours, days and sometimes my emails never get returned. In such circumstances humans have no control other the receiver and thus need to recognise that others may not be as efficient as me!

To ensure that emails are acted upon there are several ways in which the recipient can become an efficient user. Firstly, you can attach a ‘read receipt’ on to the email to get notified if the recipient has viewed your email, though this does not guarantee that the reader has paid attention to the text & whether they have any intention to reply. [Marc, 2007] Other key recommendations are to keep emails short, precise, identify the type of response that is required & include a title that is going to grab the reader’s attention. Stay away from long emails as it is tedious for the reader and they may choose to ignore the email altogether & sometimes you will find that the recipient may just ignore the email for no reason at all. [J Jasper, n.d]

A good way to be efficient is if you do not have time to reply, a notification should be sent to the sender that you will reply when you get some time. [Marc, 2007] This shows how one can take responsibility of the email & that notice has been taken. We also must realise that not everyone is going to be efficient email users & that as humans we cannot be relied upon.


Site 1: Effective Mail – How to communicate powerfully by email
URL Link:
http://www.mindtools.com/CommSkll/EmailCommunication.htm




This site is extremely vital for any internet user in ensuring that emails get responded to & provides tips & effective ways in which you can send your emails to ensure that the recipient will want to read it. This site provides general insight to email communication & how powerful it can be when used in the right way. This site shows credibility & enables users to trust the information provided. Mind Tools emphasis that a simple rule to get your email noticed is for it to be useful to the recipient.



Site 2: Efficient Email Use Enables User Productivity
URL Link:
http://www.processor.com/editorial/article.asp?articles/P3016/23p16/23p16.asp&guid (Please note this URL always goes back to homepage after it has been published, it won't let me get to the exact article. If you insert the head title into the search it will find the article immediately.)



This article written by Darrell Dun emphasis’s the importance of being an efficient email user. Darren believes that users in the workforce should be educated with email etiquette & provide simple tips that will improve the experience for employees & ensure the best results for the recipient. Darrell focuses on implementing policies to govern the use of email to ensure efficiency & encourages appropriate practice in the workforce. This includes how to implement a policy; adopt a compliance policy appropriate for the industry; limit or eliminate the use of personal folders; communicate some end-user email guidelines & attachment rules.

Bibliography/Reference

Title: Behaveyourself.com: Online Manners Matter

URL: http://www.edutopia.org/Whats-next-2008-netiquette-guidelines

Public Education – 2009 – The George Lucas Education Foundation

Date Accessed: January 22, 2009

Writer: Laila Weir Reference: [L Weir, 2009]

Title: Beyond Emily – Post-ing Etiquette

URL: http://www.edutopia.org/netiquette-guidelines

Public Education – 2009 – The George Lucas Education Foundation

Date Accessed: January 22, 2009

Author: Laia Weir Reference: [L Weir, 2009]

Title: CDT’s guide to online privacy
URL: http://www.cdt.org/privacy/guide/start/
Publication: Center for Democracy & Technology
Volume: Chaptor one
Date Published: No Date
Date Accessed: January 25, 2009
Reference: [Center for Democracy & Technology, n.d]

Title: Efficient Email Use Enables User Productivity

URL: http://www.processor.com/editorial/article.asp?articles/P3016/23p16/23p16.asp&guid
Author: Darren Dun
Article covers: General Information
Date Published: April 18, 2008
Date Accessed: January 26, 2009
Volume: 30 Issue: 6 Page: 11
Reference: [D Dunn, 2008]

Title: Efficient Email Tips URL Link: http://www.businessknowhow.com/manage/emailtips.htm

Author: Jan Jasper

Publication Date: No Date

Publication: Business Know-how ATF Attard Communcations Inc

Date Accessed: January 25, 2009 Reference: [J Jasper, n.d]

Title: Effective Mail – How to communicate powerfully by email
URL: http://www.mindtools.com/CommSkll/EmailCommunication.htm Author: No Name
Publisher: Mind Tools Ltd Published
Date: No Date
Date Accessed: January 26, 2009
Reference: [Mindtools.com, n,d]

Title: Email Communication Problems: How to Communicative Effectively
URL:
http://www.marcaandangel.com/2007/05/28/email-communication-problems-how-to-communicate-effectively/
Author: Marc (no last name provided)
Publication: May 28, 2007
Date Accessed: January 25, 2009
Reference: [Marc, 2007]

Title: Is the Internet Changing Social Life? It seems that More Things Change, the More They Stay the Same.
Author: Tyler, T.R
Journal: Journal of Social Issues
Year: 2002 Volume: 58 Issue: 1 Page: 195-205

Title: Instant Messaging – Collaborative Tool or Educator’s Nightmare! URL: http://www.unb.ca/naweb/proceedings/2003/PaperFarmer.html Date Accessed: January 24, 2009
Author: Rober Farm
Education: Mount Saint Vincent University, Canada
Published: 2003 Reference: [R Farm, 2003]

Title: Instant Messaging: Does it have a Place in Business Networks
URL: http://windowsecurity.com/articles/Instant-Messaging-Business-Networks.html
Date Accessed: January 24, 2009
Author: Deb Shinder
Published: November 2, 2004
Updated: April 6, 2005
Section: Articles – Misc Network Security
Reference: [D Shinder, 2004]

Title: Leadership & Management Program - Efficient Email
URL:
http://www.inclentrust.org/pdf/lamp2003/Efficient%20Email%20Module%20_July%202003_.pdf
Author: Nancy Johnson, Cynthia Cordero, William Macharia
Date Published: July 2003
Date Accessed: January 26, 2009
Version: 1 Module 5

Title: Netiquette Home Page

URL: http://www.albion.com/netiquette/

Date Accessed: January 22, 2009

Published Date: No Date provided

Author: Seth T Ross

Reference: [S T Ross, n,d]

Title: Netiquette Guidelines
URL: http://www.dtcc.edu/cs/rfc1855.html
Date Accessed: January 22, 2009
Last Page Update: 24 October, 1995
Author: Sally Hambridge
Reference: [S Hambridge, 1995]

Title: Privacy and the Internet – Travelling in Cyberspace Safely Fact Sheet URL: http://www.privacyrights.org/fs/fs18-cyb.html
Publication: Privacy Rights Clearing House
Date Accessed: January 25, 2009
Published Date: 2008 Reference: [Privacyrights.org, 2008]

Title: Pros & Cons of using instant messaging at work URL: http://www.businessknowledgesource.com/smallbusiness/pros_and_cons_of_using_instant_messaging_at_work_022590.html Date Accessed: January 24, 2009
Published: Ongoing 2003-2009
Reference: [Businessknowledgesource.com, n,d]

Publication of Education: Curtin Univesity – Internet Communications – Concepts Document URL Link: http://www.webct.curtin.edu.au
Author: Allen Date Published: No Date Reference: [Allen, n,d]


Title: Remember the human: The first rule of netiquette, librarians and the Internet.
Author: Paul Sturges
Journal: Online information review
Year: 2002 Volume: 26 Issue: 3 Page: 209-216
Publisher: MCB UP Ltd Reference: [P Sturges, 2002]

Title: Security & Human Factors URL: Http://www.useit.com/alertbox/20001126.html
Date Accessed: January 25, 2009
Author: Jakob Nielsen
Published Date: 2000 Reference: [J Nielsen, 2000]

Title: The Effect of Instant Messaging on the Social Lives of Students Within a College Dorm
URL: Http://www.stanford.edu/class/pwr3-25/group2/pdfs/IM_Social.pdf Date Accessed: January 24, 2009
Author: Juan Marquez Reference: [J Marquez, 2005]

Title: User Education Is Not the Answer to Security Problems
URL: http://www.useit.com/alertbox/20041025
Date Accessed: January 25, 2009
Author: Jakob Nielsen
Published Date: 2004 Reference: [J Nielsen, 2004]

Title: World Privacy Forum URL: http://www.worldprivacyforum.ord/index.html
Date Accessed: January 25, 2009
Published: Ongoing, No Date

1 comment:

Sujit On web said...

Are we connected or socially disconnected…I personally believe that technology has reduced our social capital—the

relationships that bind people together and create a sense of community.

Consequences include decreased civility, loss of behavioural boundaries

and increased crime. We must find ways to deal with our profound loss of

social connectedness.Even though technological advances have contributed significantly to the problem of isolation, the emphasis on individualism in today’s society has

compounded it.

more:didier grossemy