Tuesday, December 04, 2007

Dissertation research plan: To investigate the trends/ impact/ social etiquettes of E-communities, danger, benefit and miscommunication they bring

1. e-community definition and general information about
2. Benefits of being a member of e-communities
3. Danger and miscommunication from e-communities
4. Etiquette Examples
5. Summary of evidence supporting the Hypothesis
6. Explanation of methodological approach of investigation.

1. e-community definition and general information about
E-community – is a group of people, which can or can not first of all or originally communicate or cooperate through the Internet. E-communities also became the additional form of communication among the people, who know each other in real life. Dawn of ‘information age’ found groups who preferred virtual communication rather then real eye-to-eye polilogue. A "Computer-mediated community" (CMC) uses the social software to adjust actions of the participants. E-community of a type is responsible for common creation of the open initial software sometimes refers to as development by community. Essential socio-technical change followed from fast increase the Internet - based social networks
Today, virtual community or on-line community can be used freely for a variety of social groups cooperating through the Internet. It not necessarily means that there is a strong obligation among the members. Email the list of distribution can have hundreds members and communications, which take place, can be simply information (questions, and the answers are sent by mail), but the members can remain the relative strangers.
The various virtual communities have various levels of interaction and participation among their members. It settles down from addition of the comments either attributes to blog or post of government of the message to a competition against other people in on-line games of a video such as MMORPGS. It is not enough than differing from traditional social groups or clubs; the virtual communities frequently divide themselves in clans or even are separated to form new communities.
Ability to cooperate with likeminded persons instantly from everywhere on the Earth has significant benefits, but virtual communities have bred some fear and criticism. The valid (virtual) communities can serve as dangerous hunting field for on-line criminals, such as the thieves of identity and stalkers, with children are especially in danger. Others are afraid, that spending too much time in the virtual communities can have negative consequences on real- world interaction.
There are some promptings, which conduct the people to bring in the contribution to the virtual communities. Various dialogue means of the information become ever large resources, sharing by knowledge. Many from these communities are highly joint and also establish their own unique culture.

2. Benefit of being the member of e-communities
a) Recognition
The recognition is important for the online contributors such as, in general, individuals want a recognition for their contributions, some have named this Egoboo. To a degree it is enterprise of an individual, the contributions will be probably increased to degree that the contribution is seen to community as a whole and to a degree where there is some recognition of the contributions of the man. … powerful effects apparently of trivial markers of a recognition (for example designated as “the official assistant”) was commented in set of dialogue communities …”
One of the key components of encouraging reputation should allow the investors be known or to not be anonymous. When is involved in illegal actions, hackers of the computer should protect their personal identities with pseudonyms. If hackers use the same nicknames repeatedly, it can help authorities to trace them. However, hackers refuse to change their pseudonyms regularly, because the status connected to a specific nickname would be lost.
The structures and reputation are clearly obvious in on-line communities today. Amazon.com – is in an urgent moment, as all investors allow to create structures concerning themselves and their contributions are measured by community. Myspace.com encourages complex structures for the members, where they can share all kinds of the information concerning what music they love, their heroes, etc. In addition to this, many communities give stimulus for assistance. For example, many forums give you departure by mail. The members can spend these items in the virtual store. EBay - is an example of e-community, where the reputation is very important, because it is used to have the sizes reliable from whom that you will do potentially business with. With eBay, you have an opportunity to estimate your experience with somebody, and they, similarly, can estimate you. It has effect on the account of reputation.
b) Sense of Efficiency
The individuals can bring in the valuable information, because the certificate comes to an end somewhat of efficiency, that is, a sense, that they had some effect on this environment. There is well-advanced literature of research, which has shown, how important sensation of efficiency is, both the creation regular and contributions of high quality to group can help individuals to believe, that they have influence on group and support their own self-image as the effective man.
c) Sense of Community
The people, in general, are rather social beings, and it motivates to many people, which is necessary to answer directly for their contributions. The most e-communities allow the people to answer back the contributions (that is much Blogs allows the comment from the readers, you can answer back posts of a forum, and so on). (3)

3. Danger and miscommunication from e-communities

For each boon there is always downside-such takes place with the Internet, which became not only information highway, but also and children's platform for individuals, who aspires to damage to others As San Diego criminal defense attorneys of protection quickly find out, so useful and interesting, as the Internet can be, a lot of information about Internet users resides online and an enterprising criminal knows where and how to find it.
MySpace.com has answered proactively these incidents, bringing the children's expert of safety aboard. Besides two businessmen, who created the code to a trace the status of the attitudes MySpace.com of judicial claim of the person of the users, social lawyers website's of organization of a network, have warned.
Another website with similar functions also was closed after the prevention (warning) from MySpace.com. Jared the Dealer by candles, who began DatingAnyone.com in April, has told MySpace.com further required, that it(he) does not let out the initial code for the project. MySpace.com naked his(its) teeth in the letter of the Dealer by candles writing, that the site has broken the laws of California against cabin and federal laws of the trade mark. The attorney of protection of a criminal of Chicago follows these managing principles from the criminal Illinois Criminal Code:
(A) the man makes prosecution cyber when he or she it is conscious and without the lawful justification, on at least 2 separate happen, disturb other man with the help of electronic communication and: (1) at any time transfers threat direct, or future wholly harm, sexual attack, conclusion, or restriction, and the threat is directed to the that man, or the member of family of that man, or (2) places that man or member of family of that man in a reasonable presentiment direct
, or future wholly harm, sexual attack, conclusion, or restriction.
(B) As is used in this Section:
"Disturb" means to participate in knowledge and deliberate rate of the behaviour directed on the certain man, which annoys, torments, or terrorizes that man.
The fact, that the man has ability to cooperate with others anonymously, is one of the strongest promptings for individuals, who - independent internal offender, because many are under false impression, that they can not be caught. It, probably, was true, in one year 1989 before cyber prosecution has arrived in attention of authorities of the country, but in 2005, the cases (business) of prosecution cyber have increased to 443 from 196 in 2004. In many cases, the man, who is pursued, can never have of personal contact with offender.
Cyber the prosecution can include use Email to disturb a victim directly, sending by mail victim? S the name, call to number, or address Email in newsgroup or room (place) of friendly conversation to petition before prosecution of the third person of a victim, preparation websites, developed to disturb a victim, showing personal or pornographical material involving a victim, or use of the computer to access a victim? The management of various dialogue communities also knows this statistics, however, coming to the agreement that they can do to prevent prosecution cyber, proves also, as difficult. Most of all agree, that they have the obligation to their users to ensure sufficient managing principles, which clearly determine what types of behavior are inadmissible, consequence of such behavior and steps, which are in a place to order policy. Many from these companies of the Internet now keep of the lawyers, to define how they can protect their interests, as well as to protect their members from cyber stalkers.

4. Examples of the etiquette
There are many sites which confirm real danger of on-line internal violence, send by mail information to train their users concerning prosecution cyber, alongside with the recommendations of a type, it would be better for you
1. not to say your real name to the strangers
2. To create sort - neutral username for addresses your electronic mail or nicknames of friendly conversation.
3. To use illogical samples for your password
4. Never give your password to anyone, especially, if who - requests that it in email or instant message.
5. To change your password frequently
6. To instruct children never to distribute to their real name, address, or telephone number, dialogue without your sanction.
7. To not distribute number of a credit card in a unsafe environment.
If you are pursued, you ought
1. To send the message to offender. Do it by the clear warning, that the contact is undesirable. Stop all communications, and hold a copy of all messages.
2. To register obedient with offenders of ISP provider.
3. Message of the Filter
4. To receive the help from WHO@ either NCVC or Cyber Angels
5. To establish a paper trace.
6. To register prosecution, are in a police department
7. To save all messages, written and registered
8. To hold all copies from houses (Stalkers, as is known, interrupt and will steal things.)
9. If you receive email with the very much certain threat, enter contact to your local lawful department of realization.
Cyber stalker could leave for the physical world and tempt you for the first meeting; will destroy your house, workplace or vehicle; send threat or obscene mail; also doff the offensive and excessive reference on the phone.
The e-communities are maintained to be responsible to supply the certificate of their communication to a case, such as E-mail logs may be presented to demonstrate the E-mail traffic to the victim’s computer, membership information and copies of Email messages they have sent to the defendant. Such message will usually have the URL at the top of the message. The numbers on the top are significant as they are able to tie the message to the computer, which has the account that sent the message. Information regarding the server or E-mail account used by the defendant may be presented. Testimony from AOL, Yahoo, MSN, or other Internet Service Provider (ISP) representatives may be presented with regards to the defendant Email, use of web sites, or use of chat rooms.(2)

5. Summary of evidence supporting the Hypothesis
This dissertation will include imperical research to show evidence of the hypothesis in question. This will be made up of primary and secondary data that has been collected. The kind of research is the information from members of e-communities. These will help to see an obective picture of the situation and impact of e-communities on their members. This can be made by asking or interviewering the definite circle of people who deal with the Internet. The secondary data will be based on already printed information on this topic. The resourses of the Internet itsself can be used. Also this may be achieved by looking through and in details some criminal cases to show that e-communities can bring discommunication. This can be collected from criminal archives given in libraries or in the police archives.
Hypothesis: to prove that E-communities have not only positive features, that is recognition, sense of efficiency, sense of community. They also possess some serious and dangerous impacts on potential members of these communities.

6. Explanation of methodological approach of investigation
Once I have found all the data and information that I need to get to answer the topic in question sufficiently. The methodology I have used is qualitative and is aimed to provide a critical approach in my interpretation into my case study. Some information, such as definition of e-communities and their impact on the members will be given from the members themselves and from printed versions of the information on focus. Besides, the information in need will be given from interviews and forums where people discuss the problems of unhonesty in e-community relations. Some data how to prevent oneself from stealing in the Internet will be given to support the topic. In addition, books, articles and internet sites will develop my dissertation more.


1.http://www.criminallawyergroup.com/criminal-defense/should-myspace-orkut-online-domestic-violence-crimes.php
2.http://www.truman.missouri.edu/uploads/Publications/Scott%20and%20Johnson%20Online%20Communities.pdf
3.http://en.wikipedia.org/wiki/Virtual_community
4. Anderson, B. (1983). Imagined Communities: Reflections on the Origin and Spread of Nationalism. London: Verso.
5. Smith, M. "Voices from the WELL: The Logic of the Virtual Commons" UCLA Department of Sociology

No comments: