Sonntag, 10. August 2008

5.1.) Additional questions chapter 5

How might the metaphor of an “ecology” impact on the way you think about, understand or use the internet?

I find the description of Stadler (1997) describing the internet as web mad up of institutional servers as fixations points or structural nodes and the relating information as a cob web spanning between these information points very appropriate. I start my information search or my web travel by visiting one of these fixation points open as kind of a travel vehicle an internet browser and a search engine and start crawling the web by following the strings of information. In case I get lost I refer back to my initial starting point or structural fixation or another node. I am aware that the string of information is not fixed but might change of time like a betting table which gets updated every Saturday. When the nodes do not offer access to information of interest I stop visiting them. As such they loose their character as a structural element to me. Overall the internet feels to me like ecologic micro cosmos which changes with changing of information.

Stadler, F. (1997). A position paper (version 1.0). McLuhan Program in Culture and technology. Retrieved August 09, 2008, from http://felix.openflows.com/html/infoecco.html

How are the concepts “information” and “communication” understood within the framework of an “information ecology”?

Information is made up of several dimensions. These are according to Graham (1989) a social -, a lingusistic -, and a historic dimension defining the understanding and availability of information. It are these dimensions of information which might lead to communication in the framework of “information ecology”. Coming from the farer past by citing Watzlawik (Watzlawik, Beavin & Jackson, 1969, p.10) communication is made up by a sender receivership model with both interconnected by the message in a code deciphered by y both the sender and receiver. As such information in the information ecology as the base material of the ecology. But only the understanding of the information will lead to communication within the information ecology. As such information can be considered a semi finished material which depending on its context might become communication or not.


Graham, T. (1989). Contribution to the NORDINFO International seminar "Information and Quality" in Wormell, I. (Ed.), Information Quality. Definitions and Dimensions . Copenhagen. Royal School of Librarianship.

Watzlawik, P., Beavin, J. H., & Jackson, D. D. ( 1969). Menschliche Kommunikation - Formen, Störungen, Paradoxien. Bern, Huber.


Why don’t we talk of a “communication ecology”?

Communication does not constitute an environment as information does. Communication is just a short moment of understanding of information exchanged between numbers of individuals. An ecology in my understanding nevertheless has to offer a room or space for a population and not only a number of individuals. It does not upfront requests from its inhabitants any level of understanding. Some of the information within this information ecology might also not be understood of some individuals which is a pre requisite for communications. As such communication by its exclusiveness can not become an ecology. Furthermore the term ecology by its openness to non communicating and communicating participants can not be combined with the term communication as this would hinder its characteristic openness.

Sonntag, 3. August 2008

5.) Project

Concept Evaluation




Net 11 The Internet: Communications

Student Stefan Fuhrmann





Content




1. Concept 26: Privacy and Security

References


2. Concept 7: Netiquette

References

3. Concept 23: Human-computer interfaces

References

4. Concept 17: The impact of text – based real – time chat

References



1. Concept 26: Privacy and Security


The internet is by its main purpose a place where data in the form information and programs is exchanged. This data exchange is normally of benevolent effect to the recipient. Nevertheless also software programs having negative effects for the receiver are transferred. The group of persons involved in such activities as well as their motivational background is heterogeneous ranging from the technical versatile criminal to the self confirming adolescent or jealous colleague or friend. This diversity extents to the motivational background of these persons spanning criminal intention, risk and fun seeking behaviour or simple mal intention.
The implications can range from violation of privacy, financial damage as well as corruption and destruction of software and data of the affected victim (Lynch, 2004, p. 48) or the exposure to abusive content (Spanbauer, 2005, p. 148).
To elevate the risk of becoming a victim of such activities the advanced user is actively pursuing to increase his security, whereby the novice internet user often relies on third parties and good fate (Furnell, Tsaganidi & Phippen, 2008). An higher risk awareness has positive implications for the security directed behaviour of the internet user (Gollmann, 2006, p. 8).
Thereby already on individual person level simple techniques can help to minimize security and privacy risk significantly (Pasquinucci, 2007, p. 14).
It starts with the general attitude of the user. Awareness and a healthy distrust of unknown software and applications is the first starting point to ensure security and privacy. As such a very limited display of private and personal data in all kind of internet arenas, like e-mails, blogs and web pages is a policy the advanced internet user will follow.
Also recommended by almost every author is the enabling of the Windows firewall and the use of passwords as access regulation (Huth, 2005, p. 12). The construction of alpha numeric passwords of sufficient length helps to minimize the chances for hacking these once. Recommended is the use of antivirus software and anti spyware and the regular software update (Spanbauer, 2000, p. 246). A good policy for advanced internet users is to deactivate the active x option in the windows set up (Janowicz, 2006, p. 89).
Regular backups help to minimize the risk of data loss (Danielyan, 2000, p. 8). The download of software and files from the internet should be limited to the actual needed software.

For e-mails data encryption should be considered if the content of the e-mail is critical (Bardsley & Shultz, 1996, 25) and information should restrain itself to the necessary content excluding all kind of sensitive data e.g. bank accounts or passwords. For e-mails received all attachments should be checked upfront before being opened. As such the file extension should be audited in respect of active content of the attachment and if this is the case and the sender of the e-mail is unknown the file should rather be deleted. This does not only applies not only to unknown but also to known senders as often viruses or other detrimental software is distributed unknown.

Using these strategies actively the advanced internet user will succeed in increasing his internet security and privacy.


References



Bardsley, J. & Shultz D. H. (1996). AS consultant’s guide to internet e-mail. Journal of Management Consulting 9 (2), 22-26. Retrieved July 04, 200, from Sciencedirect database.

Danielyan, E. (2000). Security: threats and mistakes. Inside Solaris 6 (13), 148. Retrieved July 04, 2008, from ProQuest Computing database.

Furnell, S., Tsaganidi, V. & Phippen, A. (2008). Security beliefs and barriers for the novice internet users. Unedited manuscript for Computers & Security. Retrieved July 04, 2008, from ProQuest Computing database.

Gollmann, D. (2006). Why trust is bad for security. Electronic Notes in Theoretical Computer Science 157, 3-9. Retrieved July 04, 2008, from Sciencedirect database.

Huth, P. (2005). Internet schnell und sicher. Düsseldorf: Data Becker.

Janowicz, K. (2006). Sicherheit im Internet. Köln: O’Reilly Verlag.

Lynch, B. (2004). Web –privacy management increases in importance. Wall Street & Technology 3, 48-49. Retrieved July 04, 2008, from ProQuest Computing database.

Pasquinucci, A. (2007). Security, risk analysis and governance: a practical approach.. Computer Fraud & Security 7, 11-14. Retrieved July 04, 2008, from ProQuest Computing database.

Spanbauer S. (2000). Tools and rules of internet security. PC World 18 (11), 246-248. Retrieved July 04, 2008, from ProQuest Computing database.

Spanbauer S. (2005). Easy ways to keep the internet safe for all ages. PC World 23 (10), 148.
Retrieved July 04, 2008, from ProQuest Computing database.





URLs to be quoted:

http://www.microsoft.com/protect/default.mspx

The Microsoft side spans a wide range of protection topics, reaching from computer protection, personal protection to family and children related themes. As it can be expected from a side with such a powerful sponsor it is very professional constructed and regularly updated. That a significant section of the side is also dedicated to security software sales almost appears natural. Nevertheless there is no forced buying. It has got a free information service about recent security issues. Furthermore it provides a newsletter service and a free download section supplying educational material. There are furthermore some general very basic explications about IT-security available.


http://www.liv.ac.uk/csd/security/index.htm

This is a non-commercial side set up by the University of Liverpool. It covers security related topics like online security and –privacy, identity fraud, phishing, etc. It gives a good explanation about password security and how a safe password can be set up. A description of firewall related issues is included and a free download of anti spyware. A broad section informs the reader about e-mail related security issues and the university policy in this respect. Overall the side gives a practical overview of common software and network security issue in a network used by a wide range of people.


2. Concept 7: Netiquette


Netiquette describes the rules governing the behaviour of the individual user within the internet. Pioneering work was undertaken by Shea (1997), who published the widely known first ten rules of netiquette. As the net is a wide area differ in dependence of its surrounding (Wikipedia a, 2008).
Netiquette rules apply to forums, e-mail, viewing and publication of net content, and even size and amount of downloads and thereby vary.

As first rule in forums people entering are expected to say hello and goodbye when leaving. Opening questions in regard of age, sex or marital status (Wikipedia b, 2008) or to personal conversation is considered displace for forums. To avoid flame wars Smith (2002, p. 58) recommends restraining from overly aggressive or personal responses or reacting on statements of such nature. Spreading of spam should be avoided. Guideline for the German Usenet groups include consideration of other humans as recipients, the careful consideration and production of any article before posting, some news quality of the article, reflection of the potential addressee, a limitation to relevance, obedience of the law. If the content is irrelevant to the group one should refer to private e-mail as form of communication (Kirchwitz, 1997).

The content of the e-mail should be limited to the necessary and suspicious attachments of active content should be avoided (Ogilvie, 2006, p. 59). Unless one wants to shout capital letters wording should be avoided as well as the use of ambivalent content like sarcasm and jokes. For e-mails a clear and concise header and subject is requested. Addresses should be limited to the relevant persons and cc should be avoided (Williams & Williams, 2006, p. 41). It is a good police to delay replies when one is emotional upset and then reread the reply mail before sending (Solomon, 2001, p.61).

The specific purpose of the e-mail might also influence netiquette. Grimm (2000, p. 40) requests for job application e-mails personal addressing of the e-mail recipient, restrain on e-mail text and word attachments, appropriate layout and spelling from both sides the applicant as well as the recruiter. Using e-mail as a medium does not mean in his opinion that basic application rules become negligible.

Furthermore netiquette can be depending on the environment the user is allocated within. Yoder (1999, 36-38) describes the policy of different US authorities in respect of private internet usage by their employees. Private use during after work hours or lunch break is mostly tolerated but should avoid dealing with material of abusive or commercial nature and restraining from creation of overly burdens for the network. Similar requests are reported by Sturges (2002, p. 216) in respect of net behaviour of users of public library internet access, including restraining from download of sexual explicit material or hate speech.

It can be summarized that the advanced internet user is aware of netiquette within the net and is able to apply this requirement to a wide area of contents, media and situations in order to make the net an amenable experience for himself and others and to stay within a governing legal frame work.

References



Bay, W. (2008). Bile in the blogosphere. Town & Country 162 (5335), 116. Retrieved July 04, 2008, from ProQuest database.

Grimm, J. (2000). E-mail & netiquette. Editor & Publisher 133 (17), 40-42. Retrieved July 04, 2008, from ProQuest database.

Kirchwitz, A. M. (1997). Netiquette. Charter Accounting & Tax Periodicals 77 (5), 58-59.
Retrieved July 04, 2008, from http://www.useneteverwaltung.org/netiquette.

Ogilvie, A. O. (2006). Netiquette. Charter Accounting & Tax Periodicals 77 (5), 58-59.
Retrieved July 04, 2008, from ProQuest database.

Smith, K. C. (2002). How not to get involved in a ‘flame’ war. Dermatology Times 23 (4), 58-59.
Retrieved July 04, 2008, from ProQuest database.

Solomon, G. L. (2001). E-mail etiquette. Medical Economicss 78 (8), 61-64. Retrieved July 04, 2008, from ProQuest database.

Sturges, P. (2002). Remember the human first rule of netiquette, librarians and the internet. Online Information Review 26 (3), 209-216. Retrieved July 04, 2008, from ProQuest database.

Wikipedia a (2008). IRC-netiquete. Retrieved July 04, 2008, from
http://wiki.chaoz-irc.org./hilfe/netiquette

Wikipedia b (2008). Netiquette. Retrieved July 04, 2008, from
http://en.wikipedia.org./wiki/Netiquette

Williams, T. & Williams, R. (2006). Too much. Communication World 23 (6), 38-41. Retrieved July 04, 2008, from ProQuest Computing database.

Yoder, E. (1999). Netiquette. Government Executive 31 (5), 32-38. Retrieved July 04, 2008, from ProQuest database.


URLs to be quoted:


http://www.albion.com/netiquette

The web page is run by albion.com a long running commercial service. It allows the reader to review the historic basic ten rules of netiquette set up by Virginia Shea. The rules are set up as bullet points but are linked to underlying text thereby easing understanding. It also has a content catalogue of her online works covering business netiquette, flaming, love & sex in cyberspace and violations of netiquette. It also offers a test allowing one self to test his / her knowledge of netiquette and the option to join a mailing list providing latest issues in that respect.

http://www.netplanet.org/netiquette/chat.html
The web page is part of a German internet lexicon set up by an individual author. It gives a good overview of netiquette rules applying to different internet services This includes netiquette in e-mail, mailing lists, internet relay chat, netnews, internet phone calls, for internet information services and internet service providers. Further it covers the topics acceptable use policy and basic computer ethics. Each topic is presented as link offering an in depth text. Written in a lexical style it misses authentication by referencing, nevertheless it provides an actual picture of comment netiquette issues in net applications.



3. Concept 23: Human-computer interfaces


The human computer interaction is today made up on the hardware side in most cases of the human user communicating with the computer via haptic devices like screen , keyboard and mouse (Neumann, 2005). In this pure physical consideration the user is required to adapt fully to the technological surrounding and represents as such the situation very much in the beginning of HCI.

Since then research into HCI has evaluated a wide range of other areas of human computer interaction. These areas to name a few comprise speech recognition, attention surveillance, visual communication and emotional perception (Neumann, 2005). Thereby research into HCI is a highly disputed topic between designers, engineers and scientists, with each groups putting up different emphasis (Bartneck & Rauterberg, 2006, p. 737). The ultimate goal is a symbiotic relationship between human and computer with the computer being able to recognise emotions and meet decisions (Neumann, 2005).

Thereby speech recognition is at least in the surrounding of expert systems a common trait in HCI for example speech recognition is used in access control systems or in on-line banking (Wikipedia, 2008). Similarly in individual medical cases of paralysis one can find examples of good progress in visual communication between human and computers

Caridakis, Karpouzis and Kollias (2008, p. 1) for example showed the difficulties in the perception of different emotional states of the user. This is mainly due to the complexity in recognizing contextual modalities like facial expression, posture and gesture. They argue that there is significant practical application for the recognition of affective states, e.g. surveillance of attentive states in air traffic control.

Other research areas in HCI comprise age and culture. Turner (2008, p. 6) reviewed in a study of elderly people how their relationship to computers changed after they started an internet training course.

In a broad based study about the effect about the adoption of cultural based symbols Shen, Woolley and Prior (2006, p. 848) observed the cultural suppressing effects of interfaces based on the American –English metaphors and ignoring cultural contexts. On the contrary the usage o culture based symbols improved interface usability with Chinese users. So they used for example symbols based on Chinese gardens like Koi Karps for movement or a pagoda as signpost to navigate back home (Shen, Wooley & Prior 2006, p. 832).

In a strong practical based study Sener and Wormwald (2007, p.12) reviewed the effects of changes in 10 HCI concepts of computer aided design systems. Thereby study participants were included in HCI design ideation, participated in the design development and in the final concept development. As a result the results rating an increase of enjoyment, inspiration and perceived assistance of the product improved strongly.

What is the outflow of this research in respect of the advanced internet user? The advanced internet user recognises the importance of emotional and affective factors in design. Furthermore he will consider the personal background of the addressee of his information like gender age and cultural rooting. By considering this he will put his information in a corresponding context and design. This will help him to achieve his communicative goal in the most efficient way.

References



Bartneck, C. & Rauterberg, M.. (2007). HCI reality – an unreal tournament?. International Journal Human-Computer Studies 65, 737-743. Retrieved July 04, 2008, from Sciencedirect database.

Caridakis, G., Karpouzis, K., and Kollias, S., (2008). User and context adaptive neural networks for emotion recognition. Neurocomputing doi:10.1016/j.neucom.2007.11.043, 1-10. Retrieved July 04, 2008, from Sciencedirect database.

Neumann, H. (2005). Perzeption und interaktive Technologien. Retrieved July 04, 2008, from
http://www.uni-ulm.de/aktuelles/aktuelles_thema/aktuell0503/index.html

Sener, B. & Wormald, P. (2007). User evaluation of HCI concepts for defining product form. Design Studies 29: 12-29. Retrieved July 04, 2008, from Sciencedirect database.


Shen, S.-T., Wooley, M., and Prior, S. (2006). Towards culture centred design. Interacting with
computers 18 , 820-852. Retrieved July 04, 2008, from Sciencedirect database.

Turner, P. (2008). Being with – a study of familiarity. Interacting with Computers
doi:10.1016/j.intercom.2008.04.002. Retrieved July 04, 2008, from Sciencedirect database.

Wikipedia (2008). Künstliche Intelligenz. Retrieved July 04, 2008, from
http://de.wikipedia.org./wiki/K%C3%BCnstliche_Intelligenz



URLs to be quoted:

http://www.bcs-hci.org.uk/

This is the side of the British HCI society, which is not free of charge but requests for students a small subscription fee in order to get full access. Nevertheless a lot of information is available without subscription. As such there is information about upcoming HCI events within the UK, a job page with HCI job offers and publication list offering a good overview of current journals to research. Furthermore a course catalogue enlisting training courses in HCI with British universities is provided. Overall the side is less a direct source of information but rather an entry point into deeper research.





http://www.cs.umd.edu/hcil/

This is the HCI laboratory side of the University of Maryland. It covers a wide range of topics. At first it gives an overview to a range of HCI events and seminars organised by the university. Additionally it gives an overview about HCI and offers membership in a HCI mailing list. On following the current and historic research topics of the faculty are presented giving a good idea what current topics exist in HCI. The heading publication offers an abstract catalogue including most university research articles from 1985 onward. The page overall provides a nice inside into university HCI research.


4. Concept 17: The impact of text – based real time chat



Text – based real time chat is a relatively new form of communication within the internet. Nevertheless it is very popular not only with younger internet users but also within business, where it in some instances replaces traditional e-mail and face to face communication or it is used to introduce or ease a subsequent face to face communication (Diet-Uhler & Bishop-Clark, 2001, p. 279). Coming from its written form it is similar to e-mail, while from its reaction speed it corresponds with normal face to face communication.

In respect to both real-time text-based communications have specific advantages and disadvantages. Advantages are compared to e-mail are that it is faster and has higher responsiveness. Compared to face to face communication it reduces personal restrictions, it allows for parallel communication with several parties or participants while it still for example can be copied and saved so the conversation remains documented. Fullick (2006, p. 159) reports here about the discussion enhancing effects in school student study of web-chat.
Zinkhan, Kwak, Morrison and Peters (2003, p. 25) also report an affective component like entertainment and relaxation as motivational factor for real-time chat on the net. Adding some writing economy perspective to the advantages of text-based real-time chat the ability to quote or integrate some upfront produced text into the conversation is mentioned by Jonsson (1998).

Disadvantages in relation to e-mail include due to the high communicative rapidity an often observed lack of form and structure. Nevertheless this rapidity is considered outweighing this the lack of structure, where interactive problem solving is required (Ingram, Hathorn & Evans, 2000, 21). Due to the rapidity of the conversation real-time text-based communication is only partially following normal orthographic rules e.g. the whole text is kept in non-capital letters, mistakes are tolerated and abbreviations are often applied (Jonsson, 1998).

In regard of real-time communication the upfront lack of non-verbal cues is an often cited disadvantage. A common tool in text-based chat is the use of emoticons as a replacement of the missing social cues, which at least have some compensatory effects. Derks, Bos and von Grumbkow (2007, 847-848) reviewed in this respect the use of emoticons and how it is aligned to the textual content. As a result emoticons reflect very well the emotional content of the underlying text, e.g. positive emoticons were found with a positive content and vice versa.

Overall text-based real time chat seems to fill an important communicative niche. How far it will be replaced by AV conferencing will have to be seen. AV conferencing lacks two of the major advantages of text-based real time chat. It is much more personal, so it lacks a bit the positive personal neutrality of text based conversation and it lacks documentation. Advantages are an equal speediness and the better ability to integrate social clues into the conversation. It can be supposed that it will take over some share of conversation but not all. Relevant in this respect will also be hardware and software prerequisites required for effective AV conferencing. Considering the historical communicative evolution writing never replaced speaking in total nor did e-mail replace printing (Jonsson 1998).




References


Derks, D., Bos, A. E. R., von Grumbkow, J. (2007). Emoticons and social interaction on the internet: The importance of social context. Computers in Human Behavior 23, 842-849. Retrieved July 04, 2008, from Sciencedirect database.


Dietz-Uhler, B. & Bishop-Clark, C. (2001). The use of computer mediated communication to enhance subsequent face-to-face discussions. Computers in Human Behavior 17, 269-283. Retrieved July 04, 2008, from Sciencedirect database.

Fullick, P. L. (2006). Synchronous web-based communication using text as a means of enhancing discussion among school students. Campus-Wide Information Systems 23 (3), 159-170.
Retrieved July 04, 2008, from Sciencedirect database.

Ingram, A. L., Hathorn, L. G. and Evans, A. (2000). Beyond chat on the internet. Computers &
Education 35, 21-35. Retrieved July 04, 2008, from Sciencedirect database.

Jonsson, E. (1998). Electronic discourse on speech and writing on the internet. Retrieved July 04, 2008, from http://www.ludd.luth.se/~jonsson/D-essay/preface.html.

Zinkhan, G. M., Kwak, H., Morrison, M.. and Peters, C. O. (2003). Web - based chatting: Consumer communication in cyberspace. Journal of Consumer Psychology 13 (1&2), 17-27. Retrieved July 04, 2008, from Sciencedirect database.



URLs to be quoted:


http://www.emoderators.com/moderators.shtml

This is a commercial side, offering a wide range of sources facilitating net discussions with one of them being computer mediated communication. It is somehow a bit outdated as the last update was in 2006 but still has got some usable links. Under the computer mediated discussion topic it offers several links to basic texts dealing with the relevance and functionalities of writing in computer based chat. The links and texts provided create a good understanding of written net chat issues, the pro and cons of internet related chat, and further help to set up research strategies on the internet.


http://commfaculty.fullerton.edu/jreinard/internet.htm

The side is maintained by person related to Californian State University, Fullerton. It remains unclear if it is an official web site, therefore it should be handled with some caution. It offers a huge catalogue of links to web pages dealing with communication and the internet. Areas dealt with include general communication research sources, governmental sides, library sides, and sides providing research tools, communication organisation sides, sides dealing with mass communication and mass communication research and a lot more. Each link is only shortly described. As the page is run only by one person links might be occasionally outdated.

4.5.) Annotation reflection

a.) I suppose as I have written the annotation already with the somehow hidden intention to highlight the points important to me the will give me a better idea about the article in question, than the original snapshot, which was partially the text accompanying the url and partially the text abstract.


b.) For an external user the originally annotation would probably serve better as kind of point of information. Reasons here for are that by focussing a little bit on the use of the article to inform myself in respect of a specific topic/theme the information might become biased to him. Furthermore I consider my annotations a bit to long for normal use.

4.4.) The three most useful/interesting pages from the previous searches

I used for the first two sources the search strategy from 4.3. b.) using the conjunction “and” and the domain “edu” to limit the number of pages to choose from. For the third page I removed the restriction on educational sites, whereby it is still a scientific work.

So the three most useful or rather interesting pages from the previous search are to me:
a.) URL: http://education.odu.edu/eci/idt/research/dissertations/2004-SLin.pdf

Author: Shin Yi Lin

Instititution: Old Dominion University


Summary: The dissertation reviews the different forms of presentation on the net in hindsight of eudcational puposes. It reviews thereby the furthering effects of synchronous, written chat, versus asynchronous forms of presentation, like text on the net and tasks.










“Synchronous text-based chat vis-à-vis asynchronous threaded discussion: an instructional strategy for providing an option in two course delivery schemes” (Shin, 2004)

b.) URL: http://jcmc.indiana.edu/vol4/issue4/donath.html

Author: Judith Donath, Karrie Karahalios and Fernanda Viegas

Institution :MIT Media Lab Massachusetts Institute of Technology


Abstract
Although the archive of text generated by a persistent conversation (i.e. newsgroup, mailing list, recorded chat, etc.) is searchable, it is not very expressive of the underlying social patterns. In this paper we will discuss the design of graphical interfaces that reveal the social structure of the conversation by visualizing patterns such as bursts of activity, the arrival of new members, or the evolution of conversational topics. Our focus is on two projects: Chat Circles, a graphical interface for synchronous conversation and Loom, a visualization of threaded discussion. Through these examples we will explore key issues in the generation, design and use of graphical interfaces for persistent conversations.

“Proceedings of the Thirty-Second Annual Hawaii International Conference on System Sciences “ (Donath, Karahalios & Viegas, 1999)




Author: Jonsson Ewa

Institution: Lulea University of Technology



Summary: the author deals with the different media available on the internet for communication. It shows current developments and highlights the advantages and disadvantages of these media. These media include written text in IRC and chat, speech and avatars.

























“Electronic discourse on speech and writing on the internet” (Jonsson, 1997)


References

Donath, J., Karahalios, K., & Viegas, F. (1999). Proceedings of the Thirty-Second Annual Hawaii International Conference on System Sciences. Retrieved August 01, 2008, from http://jcmc.indiana.edu/vol4/issue4/donath.html

Jonsson, E. (1997). Electronic discourse on speech and writing on the internet. Retrieved August 01, 2008, from http://www.ludd.luth.se/~jonsson/D-essay/preface.html

Shin, Y.I. (2004). Synchronous text based chat vis a vis asynchronous threaded discussion: An instructional strategy providing an option in two course delivery schemes. Retrieved August 01, 2008, from, http://education.odu.edu/eci/idt/research/dissertations/2004-SLin.pdf

Even if I considered these 3 pages the most useful / interesting pages I did not use them all in the project as some just did not fit into the text structure and would have, considering the 500 word limit, just taken the text to far into detail. Nevertheless these pages raised to me interesting points and improved my understanding of the theme.

4.3.) Boolean search methodology

a.) Strategy for biggest number of hits

To get a very high number of hits I would use an “or “as conjunction between the different key words.

For Copernic this results in a number of hits of 81.
Google shows a results number of 3430.000.000.

b.) Strategy to get most relevant hits.

As I am looking for referencing material I limit my search to edu. domains as these are run but research and learning based institutions. Further I opt for the “and” conjunction between my different key words.

For Copernic this results as in my first search in 4.2 in 57 hits, so it seems as if Copernic does some sort of “quality” search already initially.

For Google this limitation results in a hit number of 1350 hits, which is only a fraction of the previous search. Here the adding of the “edu” domain is somehow a bit different interpreted allowing for the web page already when “edu” is already contained somewhere in the text.

c.) Strategy aiming to find only university sources

In order to achieve this I repeat to add a request for an “edu” domain, but use for the key words no specific conjunction so an “or”.

For Copernic the number of hit only increased slightly to 58.
For Google the number now increases exponentially to 86.200.000.

To draw a conclusion from the results; It is useful to use Boolean search logic to limit the results to a number of pages, which can be reviewed. I would assume anything exceeding significantly 1000 pages is far too much. The Copernic search is a bit more comfortable than Google by doing a higher pre selection, while Google has the advantage to pick up more pages so leaving a greater choice to the researcher.

4.3.) Boolean search methodology

a.) Strategy for biggest number of hits

To get a very high number of hits I would use an “or “as conjunction between the different key words.

For Copernic this results in a number of hits of 81.
Google shows a results number of 3430.000.000.

b.) Strategy to get most relevant hits.

As I am looking for referencing material I limit my search to edu. domains as these are run but research and learning based institutions. Further I opt for the “and” conjunction between my different key words.

For Copernic this results as in my first search in 4.2 in 57 hits, so it seems as if Copernic does some sort of “quality” search already initially.

For Google this limitation results in a hit number of 1350 hits, which is only a fraction of the previous search. Here the adding of the “edu” domain is somehow a bit different interpreted allowing for the web page already when “edu” is already contained somewhere in the text.

c.) Strategy aiming to find only university sources

In order to achieve this I repeat to add a request for an “edu” domain, but use for the key words no specific conjunction so an “or”.

For Copernic the number of hit only increased slightly to 58.
For Google the number now increases exponentially to 86.200.000.

To draw a conclusion from the results; It is useful to use Boolean search logic to limit the results to a number of pages, which can be reviewed. I would assume anything exceeding significantly 1000 pages is far too much. The Copernic search is a bit more comfortable than Google by doing a higher pre selection, while Google has the advantage to pick up more pages so leaving a greater choice to the researcher.

4.2.) Comparison of Copernic and Google search results

Search terms:

Text based chat


Search conditions:

Advanced search was used and exact term search option chosen.

Search results Copernic: 57

The first five hits:

http://www.shorewalker.com/section4/chat_disappoints.html

http://en.wikipedia.org/wiki/Chat_room

http://llt.msu.edu/vol10num3/laizhao/default.html

http://llt.msu.edu/vol10num3/pdf/laizhao.pdf

http://worldbridges.net/chat

Search engines used:

All

Search results Google: 56700

The first five hits:

http://en.wikipedia.org/wiki/Chat_room

http://llt.msu.edu/vol10num3/laizhao/default.html

http://llt.msu.edu/vol10num3/pdf/laizhao.pdf

http://www.shorewalker.com/section4/chat_disappoints.html

http://www.shorewalker.com/section4/chat_disappoints.html

The first 5 entries shown for both search engines Copernic and Google did agree in respect of their hits. The only difference to be found was within the hierarchy in which the results were shown. So Google show the Wikipedia page while Copernicus shows it in the second rank. As such it can be assumed that the search algorithm of both search engines is relatively similar.
Using the number of hits the Google search resulted in it by far outperformed the Copernic results. So to take the quality of search results into consideration I took a look at the Google hits with lower hierarchy. It becomes here a bit dubious as Google starts to enlist all the chat rooms with a text based chat facility- which is not what I was looking for.