Concept 3: Effective Internet Communication Combines Technical and Communicative Competence


 


Internet communication are not ‘invisible’: because they are new (to most of us) and change the rules about communication we can’t divorce (say) writing skill from knowing what an email program does when it store messages. Both aspects are essential.


“Effective Internet communication combines technical and communicative competence.” (Allen, n.d.)    


 


            The Internet developed as a parallel venue for freedom of expression. Its appeal lies in the ability of any individual to express ideas and emotions without fetter to a wide range of audience. Over the years, the modes of Internet communication evolved to accommodate personal and commercial purposes. Blogging emerged as a venue for personal journal of individuals while websites emerged as a venue for product distribution. Personal and commercial purposes also intersected via advertising and other proprietary arrangements in blog sites and emails.


            The thing is there are more than 1.4 billion Internet users around the world, which is roughly 21 percent of the more than 6.6 billion total world population (Miniwatts Marketing Group, 2008). On one hand, this represents a significant percentage since the Internet is present in almost every country. On the other hand, the concentration of Internet users in Asia, Europe and Latin America means that the Internet has not fully penetrated world population.


            This only represents the volume of Internet use and not the extent or quality of Internet communications or exchanges. Many Internet users are surfers but not everybody can communicate online by composing emails for work application, chatting not only with social circles but also with business partners, and maintaining a blog or updating a website. Although many people create blogs and websites not everybody can draw their intended audience or effectively communicate their intended ideas, which is especially important for work or business related purposes as well as proprietary benefits. This is also the reason why the Internet has become a source of useful and junk information that requires people to distinguish facts or truth from sham.


            In addition, not everybody can optimize the various communication tools and uses of the Internet. This is because the Internet is not simply a venue of expression but a system that involves technical know-how. In the case of email, writing a message is as important as organizing emails into folders, attaching files, updating the address book, sending the message to selected addresses or to all the addresses saved in the email account. These are technical information that supports effective communication. In blogs and websites, postings and content are as important as the assignment of keywords to aid browser searches and organizing the site to improve navigability and readability to communicate its content better.


            Internet communication involves communicating through a different kind of system that also involves different rules in both the content and presentation of content. An email intended for hundreds of people would be burdensome if sent to people individually, if large files cannot be sent online, or if one has to remember or manually type the email address when unable to use the address book. In blogs and websites, the impact of the content would change without a readable font, a pleasing background, or the necessary links.


            While many people can communicate through the Internet, not all people can effectively communicate online. This is because effective communication involves knowledge of the workings of online communication tools as much as depth of knowledge on topics and issues. Competency in both technical and content expertise determines the success of Internet communications.


Site 1: Botluk, D. (1998). Features – Internet communications tools. Retrieved June 20, 2008, from http://www.llrx.com/features/tools.htm


 


            The site describes the different Internet communications tools such as email, chat and website. It describes the possible problems that users can encounter such as the selection of the best website offering email services such as Yahoo or Google. However, it was not able to explain in-depth the technical terms that Internet communication users are likely to experience. This is a useful site because it highlights the importance of technical knowledge of Internet communications to understand and use file transfer protocol (FTP) for websites and chat channels in chat sites. The website provides a guide to Internet communication tools in the legal profession.  


Site 2: Bucher, H. (2002). Crisis communication and the internet: Risk and trust in a global media. First Monday, 7(4). Retrieved June 20, 2008, from
URL: http://firstmonday.org/issues/issue7_4/bucher/index.html


 


            The site discusses the risk and trust issues arising in Internet communications especially in the context of 9/11. The phenomenon has changed the uses of information communication and importance in influencing and linking people. The focus of the article is on accountability for the content posted on the Internet. This supports the importance of depth of knowledge as well as presentation of Internet communication content in order to drive down the intended point to readers to ensure accountability in the exercise of freedom of expression. Effective Internet communications happens by considering content and content presentation. The website features peer reviewed articles on various Internet-related topics.    


Concept 4: Reflective Communicative Practice


“The lack of formalised rules on the Internet (or rather, the wide array of rules applying with subtle differences in different contexts) requires that effective, advanced Internet users be more self-reflective about their communicative practice than is normally the case.” (Allen, n.d.)


 


            Reflection is an important communicative practice in Internet communications for a number of reasons. One, there is a lot of information available on the Internet ranging from personal experiences to formal studies and official information. This means the need to consider various factors in selecting information to believe or use and data to discard. Another, the freedom to access the Internet means that people have varying intentions for posting information on the web that could range from personal expression, proprietary purposes, or advocacies varying in degree.


            This enabled the advantage of providing people with access to a venue of expression that was largely non-existent without the Internet. This has in effect made the world a smaller place since information can be sent to any person living in any country in real time. The bounds of the Internet are yet to be seen as it continuous to evolve in utility. However, this also resulted to a number of problems. One is the moral issue of Internet content since adult content is viewable even by children surfing the net. This raised concerns towards its effect on society in general and in the long-term. The other is the security issue since some kinds of information has accumulated in value. Information can be used for different purposes regardless of the intention of the writer. Once, information is posted on the Internet its influence can no longer be controlled and dependent on its use and people’s reactions.


            This implies the importance of understanding the context of the information with the same importance as the consideration of the content itself. There are two sides to Internet communication. One side is that of the reader and the other side is that of the writer. Both carry different perspectives on information available on the web because of differences in purpose and intended outcome. However, it often happens that the perspectives meet when the reader also becomes a source of information. When this happens, the user becomes conscious about considering not only the content found but also the author and the context of the information. This then leads to an online communicator that is conscious about the impact and use of information sent through the Internet.


            The extent of freedom possible by the Internet has resulted to the prerogative for individuals to cough up any possible idea, object or occurrence. What distinguishes effective communicators from the rest of the flock is the consciousness of the source regarding the implication of sending the information through the web and the readers in recognizing the context of information found on the Internet. The virtual community is a parallel of our society, which means that Internet communication should reflect the norms valued by society. It is only in recognizing the importance of reflective Internet communication that we can make sense of the chaos that is the Internet, how we stand in relation to the Internet, and how we can make the Internet create change in individuals through well thought of information.


Site 1: Edwards, S. L., & Bruce, C. (2002). Reflective Internet searching: An action research model. The Learning Organisation, 9(3/4), 80-188. Retrieved June 20, 2008, from http://eprints.qut.edu.au/archive/00000992/01/Reflective_Internet_Searching.pdf


 


 


            The journal article focuses on reflective searching of Internet communications by applying action research that draws on experiences with Internet searching and sifting through data and using the experience to derive ways of easing future Internet searches. This highlights the value of reflection on the part of Internet researchers in considering the identification of the data they need. Although the article focused on the content of online learning, reflective researching applies to any context of Internet communication. The site and journal is hosted by a university with a technology-based thrust that also offers online courses so that the data is based on its experiences.    


Site 2: Borbely, P. (n.d.). How can our ‘Net skills and knowledge be enhanced by a


conceptual understanding of the Internet?. Retrieved June 20, 2008, from http://study.gelatinpixel.com/files/Internet_conceptual_understanding_pub08.pdf


 


            The article does not deal directly with reflective communications but it does explain the importance of conceptual understanding of the Internet in improving information communications skills. A conceptual understanding of the Internet provides us with an idea of what Internet communication means, its value to us and to other people, and what we can do with it. By gaining this insight, writers become conscious of how they communicate on the Internet to achieve their intentions or purpose. The site provides various articles on various topics including Internet communications to aid students in learning through the Internet or becoming an effective Internet communicator.


Concept 5: The Mobility of Electronic Digital Data


“Email and similar forms of asynchronous communication carry with them the possibility for rapid, efficient, almost invisible ‘multiplication’ of the addresses to which communication is being sent. Functions such as carbon copying, forwarding and so on enable the most rapid form of communication ‘expansion’ – bringing other people into communicative circuits – yet seen.” (Allen, n.d.)


            The Internet is not only a tool for expression but also a tool for information sharing. This means that information although intended for a particular group of people can reach a wider audience. Electronic data carries the nature of easy sharing because data can be stored in files as well as sent to many people simultaneously. In the case of email, messages can be forwarded and send as bulk message to many people. With regard to websites, URL addresses can be copied and sent to different people for clicking to connect to the original website.


            This involves not only benefits but also created problems. One benefit of electronic data mobility is the ability to communicate with people simultaneously. Unlike snail mail that takes time for the message to reach the recipient and for the reply to each the sender, email can be sent in a matter of seconds to any number of person around the world. Personally, this works when sending messages to family members or friends by selecting the addresses in the address book as recipients of the email. At the workplace, this also works in sending notices to various departments especially in cases on large or overseas companies. Another benefit is the ability of email mobility to support real time communication, although there may be seconds of delay for messages to pass through the Internet superhighway. This means that messages can be sent easily and responses can be made immediately.


            However, data mobility also contributes problems. Spam email from companies or individuals seeking to advertise their products and services could invade our email inbox. Websites providing email services have implemented anti-spam email options to ease the inconvenience of sifting wanted from unwanted emails. The senders of spam mails obtained our email addresses through our communications with other people. In making online purchases, signing up for subscriptions, and engaging online customer service our email address becomes part of a virtual address book and through automated messaging programs sends us unwanted emails. In the case of the sharing of URL addresses, the viewers can include not only the recipient but also other people with access to the computer or have links to the recipient of the URL address, people that the sender may not intend to gain access to the website.


            These benefits and problems form part of the nature of the Internet, which supports multi-dimensional networking. This means that through electronic data mobility, links emerge between the sender and the network of the recipient through data sharing. Online chain letters reflect the mobility of electronic data and the creation of links even among strangers since the message is passed from the sender to various recipients who forward the message to their respective networks. It can happen that the recipient can even receive his original message as a forwarded message. In the case of an email from an employee to another voicing out complaints about the manager, this has the possibility of reaching the manager via the mobility of electronic data that enables the transfer of messages from person to person with the sender not having any control over the range that the message can reach.


Site 1: ZDNet. (2008). Optimizing efficiency with integrated information. Retrieved June 20, 2008, from http://whitepapers.zdnet.com/abstract.aspx?&docid=346128&promo=100607

            The article focuses on the manner that information is collated and organized into a useful manner for various purposes. In the case of business firms, market data relies on information for advertising campaigns and market information is made by collecting information through online surveys or the collation of information received during online transactions made by consumers such as email and URL addresses. This supports the contention that the mobility of electronic data could lead to people unintentionally widening their networks. The site features various Internet and computer issues from computer purchasing options, to hardware and software options, and Internet connections.


Site 2: Computer Networks. (2008). Retrieved June 20, 2008, from http://www.dmccormick.org/network1.htm


 


            The article discusses networking as a systems and communication issue. As a systems issue, networking involves considerations such as the creation of networking connections and the assignment of IP address as connectors. As a communication issue, networking involves the creation of links between and among individuals and business firms. Networking has evolved over the past years in terms of functionality and utility providing opportunities for appropriation or exploitation. This further explains networking as the result of the mobility of electronic information since information flows is largely uncontrollable. The site is authored by a private organization and the site solely focused on computer and information networking.


Concept 7: Netiquette   


“An overwhelming and many-faceted aspect of using email and similar asynchronous communication systems over the Internet is ‘Netiquette’. Netiquette describes ‘good’ and ‘bad’ conduct in online communication (amongst other forms of Internet use). But what is important about Netiquette is the concept that there are these ‘agreed’ rules of what is good and bad.” (Allen, n.d.)


            Internet communications has become an alternative social process of self-expression and relationship building. As a new process, no formal rules have yet to be established. Informal rules are derived from norms in social interactions in the physical world. This means that people interacting through the Internet have to create rules of conduct through their experiences and influences on other people. Rules commonly recognized and practiced by various people are important in establishing a common ground within which to communicate and build different types of relationships.


            However, this is a rather complex and long process giving rise to different problems. One problem that could arise in the determination of rules is value differences since some actions are acceptable to some people but not to other people. This means that conflict is likely to arise if not inevitable in Internet communications. Another problem is the degree of openness of people to differences or diversity since exclusivists tend to impose rules on other people, without regard for possible differences in opinion. Again, the outcome is conflict.


            Conflict over the rules has implications on the effectiveness of Internet communications. Conflict can overshadow the meaning and value of the message communicated just because the manner of expressing this does not conform to the rules practiced by the recipient or reader. Conflict can also lead to serious consequences, such as the failure to agree on contracts negotiated online or misunderstanding of the intentions of parties especially in the electronic context.


            In chatting, there are designated chat rooms focusing on different interests such as educational or social including adult sites. This implies the application of the rules on room designation. As such, adult sites are for adult topics and educational sites if including young people is for learning. However, occasionally there are people invading chat rooms and introducing topics or threads that are totally unrelated to the focus of the chat room. In addition, blog posts and discussion threads in websites opened for comments mean that any people reading the content can give their comments or opinions. However, it is not uncommon for comments to focus on other aspects such as the author or the website when the comment options pertain to the article. It also happens that in discussion threads, people suddenly interrupt by introducing an unrelated topic or making unrelated and unwanted comments instead of contributing valuable information in resolving the question or issue posted. There are more situations highlighting the importance of rules in Internet dealings that many have experienced.


             Efforts have been made to establish rules on Internet dealing such as the provision of rules contained in terms and conditions in signing up for chat services and establishing blog sites. However, this will not be able to address completely the entirety of Internet communications. Nevertheless, these comprise a start in the effort to make the Internet experience pleasant and comfortable for all users. It also helps that there is a consensus over the importance of establishing rules in Internet socialization since the acceptance of this need alone results to people conscious about the propriety of their expressions shared online.


Site 1: Netiquette (Internet Etiquette). (n.d.). Retrieved June 20, 2008, from http://www.livinginternet.com/i/ia_nq.htm


 


            The site focuses on netiquette by providing a definition of the concept and discussing the specific norms involved in sending messages, replying to messages, and maintaining confidentiality to ensure that only the information intended to become public are shared as well as in handling sensitive information. The information provides detailed examples of specific situations that many people have also experienced. However, the information only relates to chatting and emails when there are other areas of Internet communications that also require rules, albeit some of the rules can apply in general. The website covers everything related to living in the virtual community.


Site 2: The core rules of netiquette. (n.d.). Retrieved June 20, 2008, from http://www.albion.com/netiquette/corerules.html


 


            The page provides excerpts from the book on netiquette by Virginia Shea. The content provides insights into the general behavior of people in using the Internet and engaging in Internet communications to ensure peaceful and pleasurable virtual experience. Some of rules include respecting other people in the same manner as in the physical world as well as sharing expert knowledge when needed to help other people requiring the information. This elaborates on the contention that people need to exercise the same level of human relations in the virtual world as in the physical world to achieve a good experience and ensure that other people also have a pleasant virtual experience. The website is dedicated to explaining netiquette to guide people on how achieve a meaningful virtual experience.


 


Bibliography


 


           


Allen,M . (n.d) Internet communications, concepts document. Metaphors of use and communication differentiation. Retrieved May 7, 2008 from http://webct.curtin.edu.au/SCRIPT/305033_a/scripts/serve_hom


 


Borbely, P. (n.d.). How can our ‘Net skills and knowledge be enhanced by a conceptual understanding of the Internet?. Retrieved June 20, 2008, from http://study.gelatinpixel.com/files/Internet_conceptual_understanding_pub08.pdf


 


Botluk, D. (1998). Features – Internet communications tools. Retrieved June 20, 2008, from http://www.llrx.com/features/tools.htm


 


Bucher, H. (2002). Crisis communication and the internet: Risk and trust in a global media. First Monday, 7(4). Retrieved June 20, 2008, from
URL: http://firstmonday.org/issues/issue7_4/bucher/index.html


 


Computer Networks. (2008). Retrieved June 20, 2008, from http://www.dmccormick.org/network1.htm 


 


Edwards, S. L., & Bruce, C. (2002). Reflective Internet searching: An action research model. The Learning Organisation, 9(3/4), 80-188. Retrieved June 20, 2008, from http://eprints.qut.edu.au/archive/00000992/01/Reflective_Internet_Searching.pdf


 


 


Miniwatts Marketing Group. (2008). Internet world stats. Retrieved June 20, 2008, from http://www.internetworldstats.com/stats.htm


 


Netiquette (Internet Etiquette). (n.d.). Retrieved June 20, 2008, from http://www.livinginternet.com/i/ia_nq.htm


 


The core rules of netiquette. (n.d.). Retrieved June 20, 2008, from http://www.albion.com/netiquette/corerules.html


 


ZDNet. (2008). Optimizing efficiency with integrated information. Retrieved June 20, 2008, from http://whitepapers.zdnet.com/abstract.aspx?&docid=346128&promo=100607


 



Credit:ivythesis.typepad.com


0 comments:

Post a Comment

 
Top