Sonntag, 10. August 2008

5.1.) Additional questions chapter 5

How might the metaphor of an “ecology” impact on the way you think about, understand or use the internet?

I find the description of Stadler (1997) describing the internet as web mad up of institutional servers as fixations points or structural nodes and the relating information as a cob web spanning between these information points very appropriate. I start my information search or my web travel by visiting one of these fixation points open as kind of a travel vehicle an internet browser and a search engine and start crawling the web by following the strings of information. In case I get lost I refer back to my initial starting point or structural fixation or another node. I am aware that the string of information is not fixed but might change of time like a betting table which gets updated every Saturday. When the nodes do not offer access to information of interest I stop visiting them. As such they loose their character as a structural element to me. Overall the internet feels to me like ecologic micro cosmos which changes with changing of information.

Stadler, F. (1997). A position paper (version 1.0). McLuhan Program in Culture and technology. Retrieved August 09, 2008, from http://felix.openflows.com/html/infoecco.html

How are the concepts “information” and “communication” understood within the framework of an “information ecology”?

Information is made up of several dimensions. These are according to Graham (1989) a social -, a lingusistic -, and a historic dimension defining the understanding and availability of information. It are these dimensions of information which might lead to communication in the framework of “information ecology”. Coming from the farer past by citing Watzlawik (Watzlawik, Beavin & Jackson, 1969, p.10) communication is made up by a sender receivership model with both interconnected by the message in a code deciphered by y both the sender and receiver. As such information in the information ecology as the base material of the ecology. But only the understanding of the information will lead to communication within the information ecology. As such information can be considered a semi finished material which depending on its context might become communication or not.


Graham, T. (1989). Contribution to the NORDINFO International seminar "Information and Quality" in Wormell, I. (Ed.), Information Quality. Definitions and Dimensions . Copenhagen. Royal School of Librarianship.

Watzlawik, P., Beavin, J. H., & Jackson, D. D. ( 1969). Menschliche Kommunikation - Formen, Störungen, Paradoxien. Bern, Huber.


Why don’t we talk of a “communication ecology”?

Communication does not constitute an environment as information does. Communication is just a short moment of understanding of information exchanged between numbers of individuals. An ecology in my understanding nevertheless has to offer a room or space for a population and not only a number of individuals. It does not upfront requests from its inhabitants any level of understanding. Some of the information within this information ecology might also not be understood of some individuals which is a pre requisite for communications. As such communication by its exclusiveness can not become an ecology. Furthermore the term ecology by its openness to non communicating and communicating participants can not be combined with the term communication as this would hinder its characteristic openness.

Sonntag, 3. August 2008

5.) Project

Concept Evaluation




Net 11 The Internet: Communications

Student Stefan Fuhrmann





Content




1. Concept 26: Privacy and Security

References


2. Concept 7: Netiquette

References

3. Concept 23: Human-computer interfaces

References

4. Concept 17: The impact of text – based real – time chat

References



1. Concept 26: Privacy and Security


The internet is by its main purpose a place where data in the form information and programs is exchanged. This data exchange is normally of benevolent effect to the recipient. Nevertheless also software programs having negative effects for the receiver are transferred. The group of persons involved in such activities as well as their motivational background is heterogeneous ranging from the technical versatile criminal to the self confirming adolescent or jealous colleague or friend. This diversity extents to the motivational background of these persons spanning criminal intention, risk and fun seeking behaviour or simple mal intention.
The implications can range from violation of privacy, financial damage as well as corruption and destruction of software and data of the affected victim (Lynch, 2004, p. 48) or the exposure to abusive content (Spanbauer, 2005, p. 148).
To elevate the risk of becoming a victim of such activities the advanced user is actively pursuing to increase his security, whereby the novice internet user often relies on third parties and good fate (Furnell, Tsaganidi & Phippen, 2008). An higher risk awareness has positive implications for the security directed behaviour of the internet user (Gollmann, 2006, p. 8).
Thereby already on individual person level simple techniques can help to minimize security and privacy risk significantly (Pasquinucci, 2007, p. 14).
It starts with the general attitude of the user. Awareness and a healthy distrust of unknown software and applications is the first starting point to ensure security and privacy. As such a very limited display of private and personal data in all kind of internet arenas, like e-mails, blogs and web pages is a policy the advanced internet user will follow.
Also recommended by almost every author is the enabling of the Windows firewall and the use of passwords as access regulation (Huth, 2005, p. 12). The construction of alpha numeric passwords of sufficient length helps to minimize the chances for hacking these once. Recommended is the use of antivirus software and anti spyware and the regular software update (Spanbauer, 2000, p. 246). A good policy for advanced internet users is to deactivate the active x option in the windows set up (Janowicz, 2006, p. 89).
Regular backups help to minimize the risk of data loss (Danielyan, 2000, p. 8). The download of software and files from the internet should be limited to the actual needed software.

For e-mails data encryption should be considered if the content of the e-mail is critical (Bardsley & Shultz, 1996, 25) and information should restrain itself to the necessary content excluding all kind of sensitive data e.g. bank accounts or passwords. For e-mails received all attachments should be checked upfront before being opened. As such the file extension should be audited in respect of active content of the attachment and if this is the case and the sender of the e-mail is unknown the file should rather be deleted. This does not only applies not only to unknown but also to known senders as often viruses or other detrimental software is distributed unknown.

Using these strategies actively the advanced internet user will succeed in increasing his internet security and privacy.


References



Bardsley, J. & Shultz D. H. (1996). AS consultant’s guide to internet e-mail. Journal of Management Consulting 9 (2), 22-26. Retrieved July 04, 200, from Sciencedirect database.

Danielyan, E. (2000). Security: threats and mistakes. Inside Solaris 6 (13), 148. Retrieved July 04, 2008, from ProQuest Computing database.

Furnell, S., Tsaganidi, V. & Phippen, A. (2008). Security beliefs and barriers for the novice internet users. Unedited manuscript for Computers & Security. Retrieved July 04, 2008, from ProQuest Computing database.

Gollmann, D. (2006). Why trust is bad for security. Electronic Notes in Theoretical Computer Science 157, 3-9. Retrieved July 04, 2008, from Sciencedirect database.

Huth, P. (2005). Internet schnell und sicher. Düsseldorf: Data Becker.

Janowicz, K. (2006). Sicherheit im Internet. Köln: O’Reilly Verlag.

Lynch, B. (2004). Web –privacy management increases in importance. Wall Street & Technology 3, 48-49. Retrieved July 04, 2008, from ProQuest Computing database.

Pasquinucci, A. (2007). Security, risk analysis and governance: a practical approach.. Computer Fraud & Security 7, 11-14. Retrieved July 04, 2008, from ProQuest Computing database.

Spanbauer S. (2000). Tools and rules of internet security. PC World 18 (11), 246-248. Retrieved July 04, 2008, from ProQuest Computing database.

Spanbauer S. (2005). Easy ways to keep the internet safe for all ages. PC World 23 (10), 148.
Retrieved July 04, 2008, from ProQuest Computing database.





URLs to be quoted:

http://www.microsoft.com/protect/default.mspx

The Microsoft side spans a wide range of protection topics, reaching from computer protection, personal protection to family and children related themes. As it can be expected from a side with such a powerful sponsor it is very professional constructed and regularly updated. That a significant section of the side is also dedicated to security software sales almost appears natural. Nevertheless there is no forced buying. It has got a free information service about recent security issues. Furthermore it provides a newsletter service and a free download section supplying educational material. There are furthermore some general very basic explications about IT-security available.


http://www.liv.ac.uk/csd/security/index.htm

This is a non-commercial side set up by the University of Liverpool. It covers security related topics like online security and –privacy, identity fraud, phishing, etc. It gives a good explanation about password security and how a safe password can be set up. A description of firewall related issues is included and a free download of anti spyware. A broad section informs the reader about e-mail related security issues and the university policy in this respect. Overall the side gives a practical overview of common software and network security issue in a network used by a wide range of people.


2. Concept 7: Netiquette


Netiquette describes the rules governing the behaviour of the individual user within the internet. Pioneering work was undertaken by Shea (1997), who published the widely known first ten rules of netiquette. As the net is a wide area differ in dependence of its surrounding (Wikipedia a, 2008).
Netiquette rules apply to forums, e-mail, viewing and publication of net content, and even size and amount of downloads and thereby vary.

As first rule in forums people entering are expected to say hello and goodbye when leaving. Opening questions in regard of age, sex or marital status (Wikipedia b, 2008) or to personal conversation is considered displace for forums. To avoid flame wars Smith (2002, p. 58) recommends restraining from overly aggressive or personal responses or reacting on statements of such nature. Spreading of spam should be avoided. Guideline for the German Usenet groups include consideration of other humans as recipients, the careful consideration and production of any article before posting, some news quality of the article, reflection of the potential addressee, a limitation to relevance, obedience of the law. If the content is irrelevant to the group one should refer to private e-mail as form of communication (Kirchwitz, 1997).

The content of the e-mail should be limited to the necessary and suspicious attachments of active content should be avoided (Ogilvie, 2006, p. 59). Unless one wants to shout capital letters wording should be avoided as well as the use of ambivalent content like sarcasm and jokes. For e-mails a clear and concise header and subject is requested. Addresses should be limited to the relevant persons and cc should be avoided (Williams & Williams, 2006, p. 41). It is a good police to delay replies when one is emotional upset and then reread the reply mail before sending (Solomon, 2001, p.61).

The specific purpose of the e-mail might also influence netiquette. Grimm (2000, p. 40) requests for job application e-mails personal addressing of the e-mail recipient, restrain on e-mail text and word attachments, appropriate layout and spelling from both sides the applicant as well as the recruiter. Using e-mail as a medium does not mean in his opinion that basic application rules become negligible.

Furthermore netiquette can be depending on the environment the user is allocated within. Yoder (1999, 36-38) describes the policy of different US authorities in respect of private internet usage by their employees. Private use during after work hours or lunch break is mostly tolerated but should avoid dealing with material of abusive or commercial nature and restraining from creation of overly burdens for the network. Similar requests are reported by Sturges (2002, p. 216) in respect of net behaviour of users of public library internet access, including restraining from download of sexual explicit material or hate speech.

It can be summarized that the advanced internet user is aware of netiquette within the net and is able to apply this requirement to a wide area of contents, media and situations in order to make the net an amenable experience for himself and others and to stay within a governing legal frame work.

References



Bay, W. (2008). Bile in the blogosphere. Town & Country 162 (5335), 116. Retrieved July 04, 2008, from ProQuest database.

Grimm, J. (2000). E-mail & netiquette. Editor & Publisher 133 (17), 40-42. Retrieved July 04, 2008, from ProQuest database.

Kirchwitz, A. M. (1997). Netiquette. Charter Accounting & Tax Periodicals 77 (5), 58-59.
Retrieved July 04, 2008, from http://www.useneteverwaltung.org/netiquette.

Ogilvie, A. O. (2006). Netiquette. Charter Accounting & Tax Periodicals 77 (5), 58-59.
Retrieved July 04, 2008, from ProQuest database.

Smith, K. C. (2002). How not to get involved in a ‘flame’ war. Dermatology Times 23 (4), 58-59.
Retrieved July 04, 2008, from ProQuest database.

Solomon, G. L. (2001). E-mail etiquette. Medical Economicss 78 (8), 61-64. Retrieved July 04, 2008, from ProQuest database.

Sturges, P. (2002). Remember the human first rule of netiquette, librarians and the internet. Online Information Review 26 (3), 209-216. Retrieved July 04, 2008, from ProQuest database.

Wikipedia a (2008). IRC-netiquete. Retrieved July 04, 2008, from
http://wiki.chaoz-irc.org./hilfe/netiquette

Wikipedia b (2008). Netiquette. Retrieved July 04, 2008, from
http://en.wikipedia.org./wiki/Netiquette

Williams, T. & Williams, R. (2006). Too much. Communication World 23 (6), 38-41. Retrieved July 04, 2008, from ProQuest Computing database.

Yoder, E. (1999). Netiquette. Government Executive 31 (5), 32-38. Retrieved July 04, 2008, from ProQuest database.


URLs to be quoted:


http://www.albion.com/netiquette

The web page is run by albion.com a long running commercial service. It allows the reader to review the historic basic ten rules of netiquette set up by Virginia Shea. The rules are set up as bullet points but are linked to underlying text thereby easing understanding. It also has a content catalogue of her online works covering business netiquette, flaming, love & sex in cyberspace and violations of netiquette. It also offers a test allowing one self to test his / her knowledge of netiquette and the option to join a mailing list providing latest issues in that respect.

http://www.netplanet.org/netiquette/chat.html
The web page is part of a German internet lexicon set up by an individual author. It gives a good overview of netiquette rules applying to different internet services This includes netiquette in e-mail, mailing lists, internet relay chat, netnews, internet phone calls, for internet information services and internet service providers. Further it covers the topics acceptable use policy and basic computer ethics. Each topic is presented as link offering an in depth text. Written in a lexical style it misses authentication by referencing, nevertheless it provides an actual picture of comment netiquette issues in net applications.



3. Concept 23: Human-computer interfaces


The human computer interaction is today made up on the hardware side in most cases of the human user communicating with the computer via haptic devices like screen , keyboard and mouse (Neumann, 2005). In this pure physical consideration the user is required to adapt fully to the technological surrounding and represents as such the situation very much in the beginning of HCI.

Since then research into HCI has evaluated a wide range of other areas of human computer interaction. These areas to name a few comprise speech recognition, attention surveillance, visual communication and emotional perception (Neumann, 2005). Thereby research into HCI is a highly disputed topic between designers, engineers and scientists, with each groups putting up different emphasis (Bartneck & Rauterberg, 2006, p. 737). The ultimate goal is a symbiotic relationship between human and computer with the computer being able to recognise emotions and meet decisions (Neumann, 2005).

Thereby speech recognition is at least in the surrounding of expert systems a common trait in HCI for example speech recognition is used in access control systems or in on-line banking (Wikipedia, 2008). Similarly in individual medical cases of paralysis one can find examples of good progress in visual communication between human and computers

Caridakis, Karpouzis and Kollias (2008, p. 1) for example showed the difficulties in the perception of different emotional states of the user. This is mainly due to the complexity in recognizing contextual modalities like facial expression, posture and gesture. They argue that there is significant practical application for the recognition of affective states, e.g. surveillance of attentive states in air traffic control.

Other research areas in HCI comprise age and culture. Turner (2008, p. 6) reviewed in a study of elderly people how their relationship to computers changed after they started an internet training course.

In a broad based study about the effect about the adoption of cultural based symbols Shen, Woolley and Prior (2006, p. 848) observed the cultural suppressing effects of interfaces based on the American –English metaphors and ignoring cultural contexts. On the contrary the usage o culture based symbols improved interface usability with Chinese users. So they used for example symbols based on Chinese gardens like Koi Karps for movement or a pagoda as signpost to navigate back home (Shen, Wooley & Prior 2006, p. 832).

In a strong practical based study Sener and Wormwald (2007, p.12) reviewed the effects of changes in 10 HCI concepts of computer aided design systems. Thereby study participants were included in HCI design ideation, participated in the design development and in the final concept development. As a result the results rating an increase of enjoyment, inspiration and perceived assistance of the product improved strongly.

What is the outflow of this research in respect of the advanced internet user? The advanced internet user recognises the importance of emotional and affective factors in design. Furthermore he will consider the personal background of the addressee of his information like gender age and cultural rooting. By considering this he will put his information in a corresponding context and design. This will help him to achieve his communicative goal in the most efficient way.

References



Bartneck, C. & Rauterberg, M.. (2007). HCI reality – an unreal tournament?. International Journal Human-Computer Studies 65, 737-743. Retrieved July 04, 2008, from Sciencedirect database.

Caridakis, G., Karpouzis, K., and Kollias, S., (2008). User and context adaptive neural networks for emotion recognition. Neurocomputing doi:10.1016/j.neucom.2007.11.043, 1-10. Retrieved July 04, 2008, from Sciencedirect database.

Neumann, H. (2005). Perzeption und interaktive Technologien. Retrieved July 04, 2008, from
http://www.uni-ulm.de/aktuelles/aktuelles_thema/aktuell0503/index.html

Sener, B. & Wormald, P. (2007). User evaluation of HCI concepts for defining product form. Design Studies 29: 12-29. Retrieved July 04, 2008, from Sciencedirect database.


Shen, S.-T., Wooley, M., and Prior, S. (2006). Towards culture centred design. Interacting with
computers 18 , 820-852. Retrieved July 04, 2008, from Sciencedirect database.

Turner, P. (2008). Being with – a study of familiarity. Interacting with Computers
doi:10.1016/j.intercom.2008.04.002. Retrieved July 04, 2008, from Sciencedirect database.

Wikipedia (2008). Künstliche Intelligenz. Retrieved July 04, 2008, from
http://de.wikipedia.org./wiki/K%C3%BCnstliche_Intelligenz



URLs to be quoted:

http://www.bcs-hci.org.uk/

This is the side of the British HCI society, which is not free of charge but requests for students a small subscription fee in order to get full access. Nevertheless a lot of information is available without subscription. As such there is information about upcoming HCI events within the UK, a job page with HCI job offers and publication list offering a good overview of current journals to research. Furthermore a course catalogue enlisting training courses in HCI with British universities is provided. Overall the side is less a direct source of information but rather an entry point into deeper research.





http://www.cs.umd.edu/hcil/

This is the HCI laboratory side of the University of Maryland. It covers a wide range of topics. At first it gives an overview to a range of HCI events and seminars organised by the university. Additionally it gives an overview about HCI and offers membership in a HCI mailing list. On following the current and historic research topics of the faculty are presented giving a good idea what current topics exist in HCI. The heading publication offers an abstract catalogue including most university research articles from 1985 onward. The page overall provides a nice inside into university HCI research.


4. Concept 17: The impact of text – based real time chat



Text – based real time chat is a relatively new form of communication within the internet. Nevertheless it is very popular not only with younger internet users but also within business, where it in some instances replaces traditional e-mail and face to face communication or it is used to introduce or ease a subsequent face to face communication (Diet-Uhler & Bishop-Clark, 2001, p. 279). Coming from its written form it is similar to e-mail, while from its reaction speed it corresponds with normal face to face communication.

In respect to both real-time text-based communications have specific advantages and disadvantages. Advantages are compared to e-mail are that it is faster and has higher responsiveness. Compared to face to face communication it reduces personal restrictions, it allows for parallel communication with several parties or participants while it still for example can be copied and saved so the conversation remains documented. Fullick (2006, p. 159) reports here about the discussion enhancing effects in school student study of web-chat.
Zinkhan, Kwak, Morrison and Peters (2003, p. 25) also report an affective component like entertainment and relaxation as motivational factor for real-time chat on the net. Adding some writing economy perspective to the advantages of text-based real-time chat the ability to quote or integrate some upfront produced text into the conversation is mentioned by Jonsson (1998).

Disadvantages in relation to e-mail include due to the high communicative rapidity an often observed lack of form and structure. Nevertheless this rapidity is considered outweighing this the lack of structure, where interactive problem solving is required (Ingram, Hathorn & Evans, 2000, 21). Due to the rapidity of the conversation real-time text-based communication is only partially following normal orthographic rules e.g. the whole text is kept in non-capital letters, mistakes are tolerated and abbreviations are often applied (Jonsson, 1998).

In regard of real-time communication the upfront lack of non-verbal cues is an often cited disadvantage. A common tool in text-based chat is the use of emoticons as a replacement of the missing social cues, which at least have some compensatory effects. Derks, Bos and von Grumbkow (2007, 847-848) reviewed in this respect the use of emoticons and how it is aligned to the textual content. As a result emoticons reflect very well the emotional content of the underlying text, e.g. positive emoticons were found with a positive content and vice versa.

Overall text-based real time chat seems to fill an important communicative niche. How far it will be replaced by AV conferencing will have to be seen. AV conferencing lacks two of the major advantages of text-based real time chat. It is much more personal, so it lacks a bit the positive personal neutrality of text based conversation and it lacks documentation. Advantages are an equal speediness and the better ability to integrate social clues into the conversation. It can be supposed that it will take over some share of conversation but not all. Relevant in this respect will also be hardware and software prerequisites required for effective AV conferencing. Considering the historical communicative evolution writing never replaced speaking in total nor did e-mail replace printing (Jonsson 1998).




References


Derks, D., Bos, A. E. R., von Grumbkow, J. (2007). Emoticons and social interaction on the internet: The importance of social context. Computers in Human Behavior 23, 842-849. Retrieved July 04, 2008, from Sciencedirect database.


Dietz-Uhler, B. & Bishop-Clark, C. (2001). The use of computer mediated communication to enhance subsequent face-to-face discussions. Computers in Human Behavior 17, 269-283. Retrieved July 04, 2008, from Sciencedirect database.

Fullick, P. L. (2006). Synchronous web-based communication using text as a means of enhancing discussion among school students. Campus-Wide Information Systems 23 (3), 159-170.
Retrieved July 04, 2008, from Sciencedirect database.

Ingram, A. L., Hathorn, L. G. and Evans, A. (2000). Beyond chat on the internet. Computers &
Education 35, 21-35. Retrieved July 04, 2008, from Sciencedirect database.

Jonsson, E. (1998). Electronic discourse on speech and writing on the internet. Retrieved July 04, 2008, from http://www.ludd.luth.se/~jonsson/D-essay/preface.html.

Zinkhan, G. M., Kwak, H., Morrison, M.. and Peters, C. O. (2003). Web - based chatting: Consumer communication in cyberspace. Journal of Consumer Psychology 13 (1&2), 17-27. Retrieved July 04, 2008, from Sciencedirect database.



URLs to be quoted:


http://www.emoderators.com/moderators.shtml

This is a commercial side, offering a wide range of sources facilitating net discussions with one of them being computer mediated communication. It is somehow a bit outdated as the last update was in 2006 but still has got some usable links. Under the computer mediated discussion topic it offers several links to basic texts dealing with the relevance and functionalities of writing in computer based chat. The links and texts provided create a good understanding of written net chat issues, the pro and cons of internet related chat, and further help to set up research strategies on the internet.


http://commfaculty.fullerton.edu/jreinard/internet.htm

The side is maintained by person related to Californian State University, Fullerton. It remains unclear if it is an official web site, therefore it should be handled with some caution. It offers a huge catalogue of links to web pages dealing with communication and the internet. Areas dealt with include general communication research sources, governmental sides, library sides, and sides providing research tools, communication organisation sides, sides dealing with mass communication and mass communication research and a lot more. Each link is only shortly described. As the page is run only by one person links might be occasionally outdated.

4.5.) Annotation reflection

a.) I suppose as I have written the annotation already with the somehow hidden intention to highlight the points important to me the will give me a better idea about the article in question, than the original snapshot, which was partially the text accompanying the url and partially the text abstract.


b.) For an external user the originally annotation would probably serve better as kind of point of information. Reasons here for are that by focussing a little bit on the use of the article to inform myself in respect of a specific topic/theme the information might become biased to him. Furthermore I consider my annotations a bit to long for normal use.

4.4.) The three most useful/interesting pages from the previous searches

I used for the first two sources the search strategy from 4.3. b.) using the conjunction “and” and the domain “edu” to limit the number of pages to choose from. For the third page I removed the restriction on educational sites, whereby it is still a scientific work.

So the three most useful or rather interesting pages from the previous search are to me:
a.) URL: http://education.odu.edu/eci/idt/research/dissertations/2004-SLin.pdf

Author: Shin Yi Lin

Instititution: Old Dominion University


Summary: The dissertation reviews the different forms of presentation on the net in hindsight of eudcational puposes. It reviews thereby the furthering effects of synchronous, written chat, versus asynchronous forms of presentation, like text on the net and tasks.










“Synchronous text-based chat vis-à-vis asynchronous threaded discussion: an instructional strategy for providing an option in two course delivery schemes” (Shin, 2004)

b.) URL: http://jcmc.indiana.edu/vol4/issue4/donath.html

Author: Judith Donath, Karrie Karahalios and Fernanda Viegas

Institution :MIT Media Lab Massachusetts Institute of Technology


Abstract
Although the archive of text generated by a persistent conversation (i.e. newsgroup, mailing list, recorded chat, etc.) is searchable, it is not very expressive of the underlying social patterns. In this paper we will discuss the design of graphical interfaces that reveal the social structure of the conversation by visualizing patterns such as bursts of activity, the arrival of new members, or the evolution of conversational topics. Our focus is on two projects: Chat Circles, a graphical interface for synchronous conversation and Loom, a visualization of threaded discussion. Through these examples we will explore key issues in the generation, design and use of graphical interfaces for persistent conversations.

“Proceedings of the Thirty-Second Annual Hawaii International Conference on System Sciences “ (Donath, Karahalios & Viegas, 1999)




Author: Jonsson Ewa

Institution: Lulea University of Technology



Summary: the author deals with the different media available on the internet for communication. It shows current developments and highlights the advantages and disadvantages of these media. These media include written text in IRC and chat, speech and avatars.

























“Electronic discourse on speech and writing on the internet” (Jonsson, 1997)


References

Donath, J., Karahalios, K., & Viegas, F. (1999). Proceedings of the Thirty-Second Annual Hawaii International Conference on System Sciences. Retrieved August 01, 2008, from http://jcmc.indiana.edu/vol4/issue4/donath.html

Jonsson, E. (1997). Electronic discourse on speech and writing on the internet. Retrieved August 01, 2008, from http://www.ludd.luth.se/~jonsson/D-essay/preface.html

Shin, Y.I. (2004). Synchronous text based chat vis a vis asynchronous threaded discussion: An instructional strategy providing an option in two course delivery schemes. Retrieved August 01, 2008, from, http://education.odu.edu/eci/idt/research/dissertations/2004-SLin.pdf

Even if I considered these 3 pages the most useful / interesting pages I did not use them all in the project as some just did not fit into the text structure and would have, considering the 500 word limit, just taken the text to far into detail. Nevertheless these pages raised to me interesting points and improved my understanding of the theme.

4.3.) Boolean search methodology

a.) Strategy for biggest number of hits

To get a very high number of hits I would use an “or “as conjunction between the different key words.

For Copernic this results in a number of hits of 81.
Google shows a results number of 3430.000.000.

b.) Strategy to get most relevant hits.

As I am looking for referencing material I limit my search to edu. domains as these are run but research and learning based institutions. Further I opt for the “and” conjunction between my different key words.

For Copernic this results as in my first search in 4.2 in 57 hits, so it seems as if Copernic does some sort of “quality” search already initially.

For Google this limitation results in a hit number of 1350 hits, which is only a fraction of the previous search. Here the adding of the “edu” domain is somehow a bit different interpreted allowing for the web page already when “edu” is already contained somewhere in the text.

c.) Strategy aiming to find only university sources

In order to achieve this I repeat to add a request for an “edu” domain, but use for the key words no specific conjunction so an “or”.

For Copernic the number of hit only increased slightly to 58.
For Google the number now increases exponentially to 86.200.000.

To draw a conclusion from the results; It is useful to use Boolean search logic to limit the results to a number of pages, which can be reviewed. I would assume anything exceeding significantly 1000 pages is far too much. The Copernic search is a bit more comfortable than Google by doing a higher pre selection, while Google has the advantage to pick up more pages so leaving a greater choice to the researcher.

4.3.) Boolean search methodology

a.) Strategy for biggest number of hits

To get a very high number of hits I would use an “or “as conjunction between the different key words.

For Copernic this results in a number of hits of 81.
Google shows a results number of 3430.000.000.

b.) Strategy to get most relevant hits.

As I am looking for referencing material I limit my search to edu. domains as these are run but research and learning based institutions. Further I opt for the “and” conjunction between my different key words.

For Copernic this results as in my first search in 4.2 in 57 hits, so it seems as if Copernic does some sort of “quality” search already initially.

For Google this limitation results in a hit number of 1350 hits, which is only a fraction of the previous search. Here the adding of the “edu” domain is somehow a bit different interpreted allowing for the web page already when “edu” is already contained somewhere in the text.

c.) Strategy aiming to find only university sources

In order to achieve this I repeat to add a request for an “edu” domain, but use for the key words no specific conjunction so an “or”.

For Copernic the number of hit only increased slightly to 58.
For Google the number now increases exponentially to 86.200.000.

To draw a conclusion from the results; It is useful to use Boolean search logic to limit the results to a number of pages, which can be reviewed. I would assume anything exceeding significantly 1000 pages is far too much. The Copernic search is a bit more comfortable than Google by doing a higher pre selection, while Google has the advantage to pick up more pages so leaving a greater choice to the researcher.

4.2.) Comparison of Copernic and Google search results

Search terms:

Text based chat


Search conditions:

Advanced search was used and exact term search option chosen.

Search results Copernic: 57

The first five hits:

http://www.shorewalker.com/section4/chat_disappoints.html

http://en.wikipedia.org/wiki/Chat_room

http://llt.msu.edu/vol10num3/laizhao/default.html

http://llt.msu.edu/vol10num3/pdf/laizhao.pdf

http://worldbridges.net/chat

Search engines used:

All

Search results Google: 56700

The first five hits:

http://en.wikipedia.org/wiki/Chat_room

http://llt.msu.edu/vol10num3/laizhao/default.html

http://llt.msu.edu/vol10num3/pdf/laizhao.pdf

http://www.shorewalker.com/section4/chat_disappoints.html

http://www.shorewalker.com/section4/chat_disappoints.html

The first 5 entries shown for both search engines Copernic and Google did agree in respect of their hits. The only difference to be found was within the hierarchy in which the results were shown. So Google show the Wikipedia page while Copernicus shows it in the second rank. As such it can be assumed that the search algorithm of both search engines is relatively similar.
Using the number of hits the Google search resulted in it by far outperformed the Copernic results. So to take the quality of search results into consideration I took a look at the Google hits with lower hierarchy. It becomes here a bit dubious as Google starts to enlist all the chat rooms with a text based chat facility- which is not what I was looking for.

Sonntag, 27. Juli 2008

4.1.) Programs downloaded

For the chapter 4 . tasks I downloaded the following programs:

Adobe Reader 7.0 (I had one before on my other computer, so the software is well known to me already)

Copernic Agent Basic, german version ( I found the idea interesting to see it in comparison to Google)

The download of both programs did not pose any problems. I was able to download the Adobe Reader without specific registration of my e-mail address or name, but had to accept the license agreement.
With the Copernic Agent Basic I had to register by name and e-mail address and also had to accept the licence agreement.

As I already know the Adobe Reader there was not to much room left for experiments. With the Copernic Agent Basic I started to search by varying the categories and search areas. I used search terms well known to me. Thereafter I went through search limitations and took a look at the pull down menue.

I found the different selection criteria with the Copernic Agent Basic a very useful feature. Admittedly if one uses Google advanced search there is some optionality given for the search, but in Copernic it is much better differentiated.

Downloading software from the internet is a very convenient way to get access to new programs both in economic terms and time required. The disadvantage of this convenience is that often copy rights are getting violated. Furthermore there is the imminent danger to download viruses or other hazardous material.
Especially for younger users the easiness with which software can be downloaded is high. So the might incur without knowing or because of unawareness high debts or might accidentally access material not intended to be seen by under age persons.

3.6.) Web 2.0: Blinklist vs Html

After taking a look at the blinklist and the html version I would clearly prefer the blinklist to get a quick overview what kind of information is available in respect of a topic. This could be described as kind of initial search stadium. When I already have got a good idea what information I am looking for and what is available I would probably prefer the html format. Comparing both they both offer the same information. Nevertheless the blinklist is much more in line with the recommendations for writing on the net. It offers a good structure and offers the main information in bold letters, leaving it up to the reader to search deeper. The html page gives a somehow unstructured impression and the reader seems himself confronted with a lot to read as there is no highlighting of key words.
When the reader decides to enter deeper into one topic actually the blinklist is less comfortable than the html page as it takes longer arrive at the web page offering the information in question.

3.5.) Blog reflection

Before the unit my experience with blogging were hardly existing at all. O.k. I read a few blogs before but did not had a clue how to set one up or an idea what kind of medium a blog can be.
In general I think a blog offers a good a affordable platform to communicate one’s thoughts to a wide community. It is not a very directed medium as the community thereby is anonymous so one does not really no, who he or she will reach with his or her blog.
Thereby blogging has got some advantage were somebody for example wants to speak some exotic topic were people interested are widely spread geographically.
Apart from citizen journalism and personal blogs there is a bewildering wide area and purposes blogs are dealing with. Coming from the German blog watch side you can find blogs to the following main groups:


-Society
-Business
-Live
-Country
-Travel
-Sport

For some of these topics I find a blog a very useful instrument. So for example travel blogs offer a cheap and authentic source of information where to go and to stay, when going abroad. O.k. everything has to be read with some common sense. On the other and I find blogs about sports relatively stupid. If I would like to have some information about my local team I watch it in the TV, if I want to have a good analysis of the game I go to my local pub and discuss it with my mates -> hence no room for blogs at all.

So overall the usage of blogs to me is very much dependent on the topic or theme the blog is related to. For myself I doubt that I become a devoted blogger, not because I dislike blogging but because I am to busy normally.

3.4.) Upload of web page using FTP

I uploaded my web page first to the presentation area using the wizard as were provided by Curtin. It took me a while to upload, admittedly I am not an natural born IT freak at all. Finally I managed and got all the little bugs with the pictures etc. sorted out and felt enormously relieved. I repeated then the procedure using my ftp client. Thereby I had to change the client and used now the one recommended by Curtin “Core FTP Lite”, which worked fine. The only thing was that I ad to overwrite the files as they were already existing due to the previous upload. The url in the presentation area is:

http://webct.curtin.edu.au/305033_b/student_pres/Group17/index.html

Samstag, 26. Juli 2008

3.3.) Infringement of copyright

When I set up my web page I used several pictures and text written and formatted by myself. The text as it was produced by myself does not constitute any violation of copyright. Different is the situation in respect of the pictures.

The first picture is are three painted bananas loaded down from the net. Furthermore I used a photographed salad prepared on a dish. A cartoon figure from Joe Bartons web page tutorial and a painted can of motor oil. All also downloaded from the web.

There are two laws which have to reviewed in respect of violation of copyright and eventually compensation of damage. The first one is the copyright regulation itself.

With the bananas, the salad, and the motoroil can no copyright note was attached. It might still be possible to claim copyright but the note would be required in order to sue for any damage compensation.

With Joe Bartons cartoon cook the situation is different. There is a copyright notice attached to the tutorial as such not only copyright is violated but even a damage compensation might be claimed.

In this case the fair use condition has to be checked also. This is made up of the following conditions:

1. Purpose of use non-profit educational or commercial
2. Nature of the copyright
3. % of violation
4. Reduction in market value of copyright.

As purpose was non profit, the % of violation was minor (only small part of tutorial), and the market value of the tutorial is probably only little reduced by the use of the cartoon no damage might be assumed.

Nevertheless to avoid any doubts we are going to remove Joe’s chef immediately and replace him through a German chef, who will be cheaper in a law suit.

Furthermore by resizing and only using parts of the picture the original copyright law might have been taken out of effect.


When a student is using the Curtin university logo the situation taking Curtin’s copyright and intellectual property policy into account would be as follows.

1.) The Curtin university logo is a design which can be protect as intellectual property by the design act 1906.
2.) The design has been created by astaff member or by an external party, e.g. a web designer, as a commissioned work for Curtin University.
3.) Curtin claims the intellectual property of such work as clearly stated in the copyright and intellectual property guidelines of Curtin University.
4.) Both staff and students are requested to respect these guideline and not to use Curtin University intellectual property. (This might not refer to scientific work cited in the normal way, but to work used for commercial purposes or purposes extending any scientific use).
5.) The option for the student in order to get permission of using the Curtin University logo would be to apply to the intellectual property committee.
6.) If the student does not get permission upfront Curtin University might take disciplinary action, sue the student for damage resulting from intellectual property infringement and additional might get an legal order forcing the student to restrain the student from further use of the logo.

3.2.) The 5 most important things for writing on the web

Actually by reading through the texts from Nielsen, not only the 1997 text but the others also, I found reflecting on my own reading style and behaviour in respect of web pages and e-mails a lot of congruence.

The first thing is clearly I have a tendency to scan a web page, and I normally read words marked in colour or bold letters and with bullet points attached. So rule no. 1 would be for me:

Highlight important key words of the text.

I have further a tendency to dump web pages, which go across several pages as I find reading such a long text on a computer screen exhausting and inconvenient.

Use short paragraphs which in itself provide all necessary information.

A tendency to use marketing speech by using superlatives or flashy adverts undermines credibility and gives in my personal impression the page a strong commercial appearance.

Avoid exaggerating and marketing speech for an informational text.

Links offer a convenient way to provide background information and certify own views but supportive other sources, but to much links are also just distractive.

Links used in reasonable numbers help to extent informational depth and reliability.

I like texts which come to the point and give me already in the first paragraph a good idea about the topic.

Put a concise summary upfront and get later on into more detail.

Coming from these advises the research undertaken by Nielsen clearly still holds. A problem which today with broadband internet is probably reduced are waiting times as downloads are much faster today.
Also web design is much more professional today, taking into account much more of these “web page ergonomics” then in former.

3.1.) Web Page Experience

The set up of the web page was a very positive experience and did not pose any problems. O.k. I did not create a very senseful web page but this is probably in line with a quite nihilistic attitude.
What I found a very tedious process was the upload of the web page to the presentation area. As I had an error in the title line the wizard could not recognize the index.htlm file. So I tried for ages until I finally reviewed the code to realise my error.

When I had the web page finished and then even uploaded I felt like the master of creation – simply great.

I like the blog thing but is more restricted in hindsight of the creative elements. This is something I can find in a web page, where I can play around with colours, fonts and attachments. This is somehow a bit more in line with my personal nature. O.k. it takes longer to work with html then writing a block.
I positive aspect of blogging is that one can get comments so that there is a direct feed back provided.

Donnerstag, 10. Juli 2008

2.4.) Group chat

Hi there all I found the group chat a very nice experience. At first I was very worried because of the time difference between Australia and Europe if I could find the time to do the chat,but finally this prooved totally unjustified.

I am not a very experienced chatter is this course forced me actually to set up all the stuff like MSN, Skype, ICQ for very much the first time but everything worked wtihout any problems at all. I like especially the skype thing very much as enables also spoken communication.

So thanks again to both ladies I had the chance to chat with. In the copy of the chat I took out all the surnames for privacy reasons, spelling mistakes might be excused.

2.4.) Group chat

[10:04:47] Stefan: Hi Kylie, its me Stefan speaking from net 11. Just want to test if you get my message.
[10:05:20] Kylie: hi stefan
[10:05:26] Kylie: it worked :)
[10:06:08] Stefan: Are you participating in the 8.30 group chat???
[10:07:24] Kylie: not sure, if i'm able to stay on that long i might
[10:07:27] Kylie: are u?
[10:08:29] Stefan: Yes I try, but first have to take someody to the airport and then return.
[10:10:15] Kylie: so is it 8.30 perth time or eastern time?
[10:13:49] Stefan: Good question, I already asked myself. Suppose its perth time meaning I am anyway 6 hours back. So I can have my lunch easily before.
[10:15:02] Kylie: for me it's 2 hours away if it's perth time
[10:17:22] Stefan : Do you think we can count this already as the group chat???? in case we miss it.
[10:18:13] Kylie: i guess, if u like we can add people now, how long do u have?
[10:19:33] Kylie: i'm sure Fiona will join us
[10:20:38] Stefan : 20 minutes to 25 minutes
[10:21:00] *** Stefan hat jeytiger zum Gruppen-Chat eingeladen ***
[10:21:11] Kylie: ok, i'll grad FI
[10:21:22] Kylie: hiya jey
[10:22:29] *** Kylie hat fiona.***** zum Gruppen-Chat eingeladen ***
[10:23:03] Kylie: well 4 counts as a group chat?
[10:23:24] Fiona: it sure does!
[10:23:59] Fiona: i added you both to my contacts.. Hi
[10:24:24] Kylie: i think stefan may be at work?
[10:24:38] Stefan : Half
[10:24:46] Fiona: who is jeytiger?
[10:24:57] Fiona: Hi Stefan..
[10:26:12] Kylie: i love watching that little pencil writing on the right hand side (chuckle)
[10:26:35] Stefan : I thought that were you fiona. Thats the unfortunate thing I suppose with glamorous names. Might be Silke. But not there anyway. Hi Fiona.
[10:28:19] Fiona: Go the pencil! I watch it like something possessed and when it erases I wonder what has been censored from the conversation...
[10:28:33] Kylie: lol me too
[10:28:34] Fiona: I am Fiona!
[10:28:48] Kylie: he thought u were jeytiger
[10:28:53] Fiona: Hmmm, the mysterious jeytiger
[10:29:06] Kylie: i'm going to check lol
[10:29:12] Stefan : Hey can you help me out I ask myself all the time what the lol stands for???
[10:29:14] Fiona: there is a cutpaste too, but I think that is Joel
[10:29:25] Fiona: laugh out loud
[10:29:29] Kylie: cutpaste is joel
[10:30:13] Fiona: and brb is be right back, i didn't know that one until i started using skype
[10:30:46] Stefan : ok. got it. Where are you both, how many lake macquaries exist in Australia???
[10:30:55] Kylie: i hate this one....asl?
[10:31:07] Fiona: what is asl??
[10:31:17] Kylie: age sex location
[10:31:21] Fiona: ohhh
[10:31:27] Stefan : o.k. then drop it.
[10:31:33] Fiona: 29 female nsw central coast
[10:31:41] Kylie: there is only one lake macquarie in australia
[10:31:46] Kylie: that's where i am
[10:31:58] Fiona: where are you Stefan?
[10:32:21] Stefan : 41 male Düsseldorf trying to slim down.
[10:33:05] Fiona: really? not the slim down bit, the Dusseldorf bit..
[10:33:33] Stefan : Yes, why not. Have you ever been to Düsseldorf?
[10:33:35] Kylie: jeytiger is Kathy Wright btw
[10:34:04] Kylie: not me, i 've never been outside NSW lol
[10:34:20] Fiona: Kathy! of course i remember seeing that in the DB
[10:34:40] Stefan : Kylie I suppose today I learn more abbrevations then in my whole live but not bad.
[10:34:51] Fiona: no, I haven't been.. i wish i had
[10:35:01] Kylie: i was the same when i first started
[10:35:40] Fiona: Stefan if you are there, then why did you study through OUA? Are you travelling or do you live there?
[10:38:37] Stefan : Good question. I started studying with OUA in 2002. In Germany university programs are very rigid, meaning there is normally a lot of physical presence requested. And I was working already. And the Aussies where just a bit further with internet based course and study options.
[10:39:14] Kylie: how do you find the time to study while at work?
[10:39:27] Fiona: Go the Aussies!
[10:40:16] Fiona: Yes, it is such a flexible course and it offers so much in the way of employment options.. what do you do now? and are you doing the BA internet studies?
[10:43:05] Stefan : I found the whole studying so far very interesting but also sometimes really hard, sacrifiying a lot of weekends and evenings and even some holidays, but if I here some of the others are mums having three kids to look after I think it is still relatively o.k. for me.
[10:44:26] Stefan : No, Fiono, I am doing the BA in Human Life Science, and this course is one of my three add on courses.
[10:44:47] Fiona: Good answer... Kylie and I are both Mums!
[10:45:03] Fiona: So what can you do with human Life science?
[10:45:59] Stefan : I am not sure. I try to work that out myself. Perhaps become Dr. Frankenstein.
[10:46:50] Kylie: lol
[10:46:55] Fiona: Thats funny! You can use the computer to control him... Sorry guys, I have to go :( My son needs his bedtime story... tomorrow??
[10:47:15] Fiona: You on tomorrow kylie?
[10:47:23] Kylie: i am yes
[10:47:30] Kylie: have a great night Fi
[10:47:45] Stefan : Iam off alos. Thanks for the nice conversation. Have a great night you both
[10:47:54] Fiona: Thanks... See ya. Nice to meet you Stefan
[10:48:10] Kylie: nice meeting you too stefan
[10:48:12] *** Fiona left ***
[10:48:12] Kylie: have a good day
Kylie
Fiona
[10:48:10] Kylie: nice meeting you too stefan
[10:48:12] *** Fiona left ***
[10:48:12] Kylie: have a good day
[10:48:23] *** Kylie left ***
Kylie
Fiona

Dienstag, 8. Juli 2008

2.3.) Contribution to newsgroup

This is an inquiry in German at a newsgroup in repsect of the final of European Masters in football, where Germany was playing Spain and lost out. The game itself was terrible dissappointing the Germans where playing like primary school pupils and the Spanish appeared to be already in grammar school.

The newsgroup is an internet fan club of one of the local football clubs. So I hoped to get some comments on the final.


Endspiel-???‏
Von:
Stefan2000

Diese E-Mail ist möglicherweise gefährlich. Weitere Informationen
Gesendet:
Montag, 30. Juni 2008 22:06:54
An:
Lucky Zebras 97 (lucky-zebras@googlegroups.com)
Hi, bin per Zufall auf der MSV Seite hier gelandet und dachte mir alsalter Duisburger schau doch mal rein, hoffe das ist o.k.. Also klar war schon toll das unsere Mannschaft überhaupt bis insEndspiel gekommen ist. Leider waren dann aber nur die ersten 10Minuten gut und danach erinnerte ich mich leider nur noch an dasKroatien Spiel. Spielanalysen oder Meinungen vorhanden??? GrussStefan

2.2.) Pros and cons of email lists vs discussion boards

Pros and cons of email lists versus discussion boards and suitability for certain communication and purpose
E-mail lists offer a good chance of regular information about a certain topic. They do not offer quick answers but rather a continuous and somehow formalised flow of information. The issuer of e-mail lists often have good expertise in the specific subject. E-mail lists are normally maintained on one list server. Sometimes the topic on list servers become to narrow and concentrated as such making it less interesting for some participants.
Different is the situation with discussion boards. A discussion board is made up of people of an certain area of interest and is also normally maintained on a single server. A discussion group does not offer answers in time critical situations but offers the opportunity to an interactive exchange of information and opinion. Thereby the topics can vary more compared to information supplied by a list server. Also the form will be less formalised in a discussion group compared to the list server

2.1.) E-mail communication

a.) Within the e-mail header one can see from whom the e-mail was sent and a what time. This is important is e-mail is a good example of asynchronous communication, when the mail can be sent much earlier then read. If the e-mail is resent by sender previous senders of the e-mail can be seen within the body of the e-mail.

b.) The cc function of e-mail is useful if somebody else should be informed additionally. This can be to comply with convention, e.g. the boss is included in cc so he or she is not passed by or one might signal to the receiver of the e-mail that other people are informed also, for example an request to do something should not be ignored. Furthermore if other people need to become active in respect of a certain job cc might be useful as kind of request of their support. BCC is normally rather used for documentation that information has been send out, to give an example, when the boss asks the employee to sent out a quote for an order and the employee wants to document his action for the boss.

The received function is similar as it documents that the addressee of a mail really has received it. This is helpful where time critical activities should be initiated by the mail or there is a semi official situation where some form of documentation of receipt is required.

c.) To ensure that attachements can be read sending them in a standard format like rich text or RFT is helpful. Even better to read are attachements sent in ASCII format. Good practise sending attachements is to refer to them by citing the program used to create them like Excel or Word.

d.) The set up of e-mail filters can help to categorize e-mails in certain groups but also to prevent the receipt of junk or spam mail. A good example here for is an e-mail filter I created for Lotus Notes when my mail boxes was floated with e-mails offering all kind of medical support. I was able to stop most of these e-mails by creating a filter blocking all e-mails containing the word Viagra.

e.) I organised my e-mail folders according to major topics and persons and sort my e-mails by date. Effectively sorting my e-mail by person is very similar as by topic as certain persons would fall very much always in one topic category, for example most of my mates could be assigned also to leisure time. Sorting by date helps to deal with oldest stuff first.

Samstag, 28. Juni 2008

Traceroute task

At the beginning I thought oh this is really complicated. When I then browesed the internet there were several options available to follow the route of the signal and everything was well explained. So I downloaded the side from a local German college offering the option to do the tracing of the signal with the following results:

Provider: Local German college (Datenverarbeitungszentrum FH-Friedberg)

Start: Somewhere in the middle of Germany

Hops involved: 18


Time used:

3575,732 ms



Download

1 cisfhfb.fh-friedberg.de (212.201.24.1) 0.448 ms 0.471 ms 0.549 ms 2 xr-fra1-ge9-10.x-win.dfn.de (188.1.231.237) 1.969 ms 2.080 ms 1.726 ms 3 zr-fra1-te0-0-0-0.x-win.dfn.de (188.1.145.190) 1.855 ms 1.790 ms 1.844 ms 4 dfn.rt1.fra.de.geant2.net (62.40.124.33) 8.787 ms 1.928 ms 1.961 ms 5 abilene-wash-gw.rt1.fra.de.geant2.net (62.40.125.18) 94.640 ms 94.671 ms 95.783 ms 6 so-0-2-0.0.rtr.chic.net.internet2.edu (64.57.28.12) 111.402 ms 111.339 ms 111.378 ms 7 * * so-4-3-0.0.rtr.kans.net.internet2.edu (64.57.28.36) 314.618 ms 8 so-0-0-0.0.rtr.salt.net.internet2.edu (64.57.28.24) 146.302 ms 147.822 ms 158.651 ms 9 so-0-0-0.0.rtr.seat.net.internet2.edu (64.57.28.26) 162.990 ms 162.885 ms 162.864 ms10 aarnet-1-lo-jmb-706.sttlwa.pacificwave.net (207.231.240.2) 296.833 ms 304.737 ms 295.386 ms11 so-3-3-0.bb1.b.syd.aarnet.net.au (202.158.194.93) 295.720 ms 300.433 ms 309.560 ms12 so-2-0-0.bb1.a.mel.aarnet.net.au (202.158.194.33) 304.532 ms 304.258 ms 309.409 ms13 so-2-0-0.bb1.a.adl.aarnet.net.au (202.158.194.17) 304.951 ms 304.769 ms 300.535 ms14 so-0-1-0.bb1.a.per.aarnet.net.au (202.158.194.5) 304.186 ms 304.560 ms 309.905 ms15 gigabitethernet0.er1.curtin.cpe.aarnet.net.au (202.158.198.178) 304.689 ms 295.864 ms 309.903 ms16 gw1.er1.curtin.cpe.aarnet.net.au (202.158.198.186) 305.017 ms 309.759 ms 304.727 ms17 te2-4-b309-cr.net.curtin.edu.au (134.7.16.46) 300.889 ms 300.876 ms 300.885 ms18 te1-1.b309-sr.net.curtin.edu.au (134.7.248.65) 295.852 ms 309.635 ms 309.849 ms

Sonntag, 15. Juni 2008

FTP

The FTP is a very good way to transport data packages from one computer to the other. What I found interesting was the I had access to quite a lot of files, and as I was not sure if I picked the right one went through both folders available.
What would be interesting to me is how access can be controlled when using FTP.

The result of task 2. to find out a specific word in a file by using FTP was
"Capitalization matters" (hope I spelled corrctly).

Telnet task

After my start up difficulties I found the telnet thing working astonishingly smoothly. Everything worked fine. Bennahum is luckily not a two common name for authors so only two results were coming up. I liked the feature with the e-mail to my Curtin e-mail very much.

Results for author with the name of Bennahum:

1. Managed care : financial, legal, and ethical issues
2. Dance & community : Congress on Research in Dance


Email from DEAKIN UNI LIB

none Record 1 of 2TITLE Managed care : financial, legal, and ethical issues / edited by David A. Bennahum.PUBLISHED Cleveland, OH : Pilgrim Press, 1999.PHYS DESCR p. cm.SERIES The Pilgrim library of ethics.CONTENTS 1. The Crisis Called Managed Care / David A. Bennahum -- Pt. 1. Legal Issues. 2. The Historical Roots of Managed Care / Jake Spidle. 3. How Law and Regulation Shape Managed Care / Robert L. Schwartz. 4. Implications for Vulnerable Populations / Jay A. Jacobson -- Pt. 2. Financial Issues. 5. The Economics of Managed Care / Max D. Bennett. 6. Financial Incentives to Physicians / David H. Johnson. 7. Impacts on Medicaid and the Uninsured / Daniel J. Derksen, Saverio Sava and Arthur Kaufman. 8. Impacts on Public Teaching Hospitals / Stephen W. McKernan. 9. Impacts on Biomedical Research / Laura Weiss Roberts, Janet L. Brody and Teddy D. Warner / [et al.] -- Pt. 3. Ethical Issues. 10. The Ethics of Managed Care / Joan McIver Gibson. 11. Gatekeepers and Gatekeeping / Richard H. Rubin. 12. Futility and Extraordinary Care / Lawrence J. Schneiderman. 13. Persons with HIV Disease / Bruce Williams. 14. Persons with Mental Illness / Laura Weiss Roberts, Kathryn Fraser and Diana Quinn / [et al.]. 15. Religion and Pastoral Care / B. Gail Joralemon and David Hartenberger. 16. What Does the Future Hold for Managed Care? / Mary Anderlik -- App. Managed Care Information Resources / Kirsten R. Shelstad.SUMMARY "Managed Care takes a hard, balanced look at the realities of managed health care, assembling the key decision makers in the Albuquerque, New Mexico, health care area - from the CEO of the hospital system to the director of managed care, a home health care specialist, a lawyer, chaplains, and professors at the medical school - to examine the critical issues facing managed care today."--BOOK JACKET.NOTES Includes bibliographical references.SUBJECT Managed care plans (Medical care) Managed care plans (Medical care) -- Economic aspects. Managed care plans (Medical care) -- Moral and ethical aspects.OTHER AUTH Bennahum, David A., 1936- LOCATION CALL NO. STATUS1 > DU MELB 362.104258 Ben/Mcf AVAILABLE


// Script broken into two blocks. There is a in the document.write in
// the script above which IE is lax about. See bugs 4553030/31, 5047193.
var doc = document
var form = document.form
var form1 = document.form1
var form2 = document.form2
var errno = 0
arg=window.location.search;//AK
if (!refreshing) {
if (arg.length > 6 && arg.substring(0, 7) == 'bgcolor')
color(arg.substring(8, arg.length))
f = eval('parent.' + self.name + 'Init')
if (f)
f()
}
// Note: the tag is defined in main.js and written out when a given
// frame's html is created.
/**Enable backspace for text editing*/
if (NN>=5){
setBkspEvtHndlr("input");//specifically for text elements. checkboxes/radio will not affect normal execution
setBkspEvtHndlr("textarea");
setBkspEvtHndlr("browse");
}




Email from DEAKIN UNI LIB

None Record 2 of 2AUTHOR Congress on Research in Dance. Conference (2005 : Tallahassee, Fla.)TITLE Dance & community : Congress on Research in Dance, Spring 2005 conference, Florida State University, Tallahassee, Florida / [Ninotchka Bennahum & Tresa M. Randall, co-editors]PUBLISHED New York, NY : Produced by the Print Center, Inc., c2005.PHYS DESCR 278 p. : ill. ; 28 cm.NOTES Conference papers from a proceeding held Mar. 7-10, 2005, Florida State University, Tallahassee, Dept. of Dance. Includes bibliographical references.SUBJECT Dance -- Social aspects -- Congresses. Dance -- Study and teaching -- Congresses. Dance -- Research -- Congresses. Dance -- Congresses.OTHER AUTH Bennahum, Ninotchka. Randall, Tresa. Congress on Research in Dance.OTHER TI Dance and community. Congress on Research in Dance, Spring 2005 conference. LOCATION CALL NO. STATUS1 > DU MELB 792.8 Cor/Idc 2005 AVAILABLE


// Script broken into two blocks. There is a in the document.write in
// the script above which IE is lax about. See bugs 4553030/31, 5047193.
var doc = document
var form = document.form
var form1 = document.form1
var form2 = document.form2
var errno = 0
arg=window.location.search;//AK
if (!refreshing) {
if (arg.length > 6 && arg.substring(0, 7) == 'bgcolor')
color(arg.substring(8, arg.length))
f = eval('parent.' + self.name + 'Init')
if (f)
f()
}
// Note: the tag is defined in main.js and written out when a given
// frame's html is created.
/**Enable backspace for text editing*/
if (NN>=5){
setBkspEvtHndlr("input");//specifically for text elements. checkboxes/radio will not affect normal execution
setBkspEvtHndlr("textarea");
setBkspEvtHndlr("browse");
}

Samstag, 7. Juni 2008

Stefans start Net11 and 5 most important things for blogging

O.k., I suppose I am somewhat of a late starter, but it took my some time to overcome several technical hurdles. After speaking to the network administrator it became clearly that these people did not have any switch for the supportive / helpful mood.

At first I had to recognize that the Wlan I normally use is blocked for blogserver, telnet and ftp.
Great! So what to do. I decided than to try the network of my local university.

Superb, blogs allowed. Unfortunately they decided for financial reasons to work with Linux, clearly not to supportive for all kind of free of charge standard downloads.
After hours of unsuccessful attemts I decided to give up.

Now I finally made it, got a network without blogging restriction and a normal windows nt system. So now I hope to be able to catch up slowly.


So here is my idea what are the 5 most important things to keep in mind in respect of blogging:

1. Be aware that the net is open to each and everybody as such you can find a great range of things in it including your blog so think about privace.
2. Moof users behave appropriate but some have negative intentions like to rip you of doing harm your computer so one has always to be cautious.
3. As such everthing should be approached with reasonable common sense, e.g do not enter banking and credit card details or personal information, avoid downloads from unknwon sources. 4. Make the bog itself clearly sturctured it helps readers to find their way through.
5. Think about what you want to achieve with your blog first, and then choose the appropriate content and layout.