27 resultados para computer-mediated communication

em Aston University Research Archive


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Der vorliegende Beitrag untersucht die Frage, in welchem Maße sich Institutionen, die niederdeutsche Kulturszene und individuelle Sprecher des Niederdeutschen moderne Kommunikationstechnologien wie das Internet zunutze machen und ob computervermittelte Kommunikation helfen kann, dem Rückgang des Niederdeutschen Einhalt zu gebieten. Die grundsätzliche Herangehensweise ist eine soziolinguistische, die das Internet als sozialen Handlungsraum versteht, in dem Individuen und Institutionen kommunizieren. Für eine derartige Perspektive stehen weniger das Medium oder das Genre im Mittelpunkt des Interesses als vielmehr das kommunizierende Individuum und die Sprachgemeinschaft, in diesem Fall die virtuelle Sprachgemeinschaft. Based on studies that analyse the potential of computer-mediated communication (cmc) to help fight language shift in lesser-used languages, this paper discusses the situation of Low German in Northern Germany. Over the last three decades, Low German has lost more than half of its active speakers. The article raises the question of whether and, if so, how Low German speakers make use of cmc to stem this tide. Following a sociolinguistic approach focussed on the individual speakers who use the Internet as a space for social interaction, it gives an overview of the discursive field of Low German on the internet and analyses in detail the most popular Low German discussion board. It shows that one of the main obstacles to a more successful use of cmc can be found in speakers' complex attitude toward written Low German. © Franz Steiner Verlag Stuttgart.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Drawing on the newest findings of politeness research, this paper proposes an interactionally grounded approach to computer-mediated discourse (CMD). Through the analysis of naturally occurring text-based synchronous interactions of a virtual team the paper illustrates that the interactional politeness approach can account for linguistic phenomena not yet fully explored in computer-mediated discourse analysis. Strategies used for compensating for the lack of audio-visual information in computer-mediated communication, strategies to compensate for the technological constraints of the medium, and strategies to aid interaction management are examined from an interactional politeness viewpoint and compared to the previous findings of CMD analysis. The conclusion of this preliminary research suggests that the endeavour to communicate along the lines of politeness norms in a work-based virtual environment contradicts some of the previous findings of CMD research (unconventional orthography, capitalization, economizing), and that other areas (such as emoticons, backchannel signals and turn-taking strategies) need to be revisited and re-examined from an interactional perspective to fully understand how language functions in this merely text-based environment.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Digital Business Discourse offers a distinctively language- and discourse-centered approach to digitally mediated business and professional communication, providing a timely and comprehensive assessment of the current digital communication practices of today's organisations and workplaces. It is the first dedicated publication to address how computer-mediated communication technologies affect institutional discourse practices, bringing together scholarship from a range of disciplinary backgrounds, including organisational and management studies, rhetorical and communication studies, communication training and discourse analysis. Covering a wide spectrum of communication technologies, such as email, instant messaging, message boards, Twitter, corporate blogs and consumer reviews, the chapters gather research drawing on empirical data from real professional contexts. In this way, the book contributes to both academic scholarship and business communication training, enabling researchers, trainers and practitioners to deepen their understanding of the impact of new communication technologies on professional and corporate communication practices.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose - One of the principal organizational developments in the last decade has been the pervasive influence of computer mediated communication (CMC) tools. The purpose of this paper is to closely interrogate the day-to-day role of e-mail in explicating, influencing and shaping social and information interactions within an organization. Design/methodology/approach - A series of in-depth interviews (n = 29) were undertaken to elicit employee opinions on their e-mail adaptation, experiences and practices. Findings - The paper provides insights into the polymorphic role of e-mail, particularly the way in which it is adapted by individuals within the organization. Specifically, it shows how this tool interacts within day-to-day work activities and tasks. Research limitations/implications - This paper investigates only one CMC tool, e-mail, although it is envisaged that this initial work will be used to raise a new understanding of the socially skilled adaptation of other CMC tools by employees as well as leaders. Practical implications- Previously unreported insights into employee opinion are delineated in order to provide a focus from which organizations can train and develop their employees and leaders to maximise knowledge creation within the organization. Originality/value - This study assesses CMC from an under-researched "real-life" perspective in which everyday interactions are used to understand employee reactions to e-mail communication and hence foster an atmosphere in which these interactions assist organizational development.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study focuses on the interactional functions of non-standard spelling, in particular letter repetition, used in text-based computer-mediated communication as a means of non-verbal signalling. The aim of this paper is to assess the current state of non-verbal cue research in computer-mediated discourse and demonstrate the need for a more comprehensive and methodologically rigorous exploration of written non-verbal signalling. The study proposes a contextual and usage-centered view of written paralanguage. Through illustrative, close linguistic analyses the study proves that previous approaches to non-standard spelling based on their relation to the spoken word might not account for the complexities of this CMC cue, and in order to further our understanding of their interactional functions it is more fruitful to describe the role they play during the contextualisation of the verbal messages. The interactional sociolinguistic approach taken in the analysis demonstrates the range of interactional functions letter repetition can achieve, including contribution to the inscription of socio-emotional information into writing, to the evoking of auditory cues or to a display of informality through using a relaxed writing style.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Digital Business Discourse offers a distinctively language- and discourse-centered approach to digitally mediated business and professional communication, providing a timely and comprehensive assessment of the current digital communication practices of today's organisations and workplaces. It is the first dedicated publication to address how computer-mediated communication technologies affect institutional discourse practices, bringing together scholarship from a range of disciplinary backgrounds, including organisational and management studies, rhetorical and communication studies, communication training and discourse analysis. Covering a wide spectrum of communication technologies, such as email, instant messaging, message boards, Twitter, corporate blogs and consumer reviews, the chapters gather research drawing on empirical data from real professional contexts. In this way, the book contributes to both academic scholarship and business communication training, enabling researchers, trainers and practitioners to deepen their understanding of the impact of new communication technologies on professional and corporate communication practices.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Based on close examinations of instant message (IM) interactions, this chapter argues that an interactional sociolinguistic approach to computer-mediated language use could provide explanations for phenomena that previously could not be accounted for in computer-mediated discourse analysis (CMDA). Drawing on the theoretical framework of relational work (Locher, 2006), the analysis focuses on non-task oriented talk and its function in forming and establishing communication norms in the team, as well as micro-level phenomena, such as hesitation, backchannel signals and emoticons. The conclusions of this preliminary research suggest that the linguistic strategies used for substituting audio-visual signals are strategically used in discursive functions and have an important role in relational work

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Witnesses often experience lengthy delays prior to being interviewed, during which their memories inevitably decay. Video-communication technology - favored by intergovernmental organizations for playing larger roles in judicial processes - might circumvent some of the resourcing problems that can exacerbate such delays. However, whereas video-mediation might facilitate expeditious interviewing, it might also harm rapport-building, make witnesses uncomfortable, and thereby undermine the quality and detail of their reports. Participants viewed a crime film and were interviewed either one day later via video-link, one day later face-to-face, or 1-2 weeks later face-to-face. Video-mediation neither influenced the detail or the accuracy of participants' reports, nor their ratings of the quality of the interviews. However, participants who underwent video-mediated interviews after a short delay gave more accurate, detailed reports than participants who waited longer to be interviewed face-to-face. This study provides initial empirical evidence that video-mediated communication (VMC) could facilitate the expeditious conduct of high-quality investigative interviews. © 2013 © 2013 Taylor & Francis.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Queueing theory is an effective tool in the analysis of canputer camrunication systems. Many results in queueing analysis have teen derived in the form of Laplace and z-transform expressions. Accurate inversion of these transforms is very important in the study of computer systems, but the inversion is very often difficult. In this thesis, methods for solving some of these queueing problems, by use of digital signal processing techniques, are presented. The z-transform of the queue length distribution for the Mj GY jl system is derived. Two numerical methods for the inversion of the transfom, together with the standard numerical technique for solving transforms with multiple queue-state dependence, are presented. Bilinear and Poisson transform sequences are presented as useful ways of representing continuous-time functions in numerical computations.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Flow control in Computer Communication systems is generally a multi-layered structure, consisting of several mechanisms operating independently at different levels. Evaluation of the performance of networks in which different flow control mechanisms act simultaneously is an important area of research, and is examined in depth in this thesis. This thesis presents the modelling of a finite resource computer communication network equipped with three levels of flow control, based on closed queueing network theory. The flow control mechanisms considered are: end-to-end control of virtual circuits, network access control of external messages at the entry nodes and the hop level control between nodes. The model is solved by a heuristic technique, based on an equivalent reduced network and the heuristic extensions to the mean value analysis algorithm. The method has significant computational advantages, and overcomes the limitations of the exact methods. It can be used to solve large network models with finite buffers and many virtual circuits. The model and its heuristic solution are validated by simulation. The interaction between the three levels of flow control are investigated. A queueing model is developed for the admission delay on virtual circuits with end-to-end control, in which messages arrive from independent Poisson sources. The selection of optimum window limit is considered. Several advanced network access schemes are postulated to improve the network performance as well as that of selected traffic streams, and numerical results are presented. A model for the dynamic control of input traffic is developed. Based on Markov decision theory, an optimal control policy is formulated. Numerical results are given and throughput-delay performance is shown to be better with dynamic control than with static control.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

A method is proposed to offer privacy in computer communications, using symmetric product block ciphers. The security protocol involved a cipher negotiation stage, in which two communicating parties select privately a cipher from a public cipher space. The cipher negotiation process includes an on-line cipher evaluation stage, in which the cryptographic strength of the proposed cipher is estimated. The cryptographic strength of the ciphers is measured by confusion and diffusion. A method is proposed to describe quantitatively these two properties. For the calculation of confusion and diffusion a number of parameters are defined, such as the confusion and diffusion matrices and the marginal diffusion. These parameters involve computationally intensive calculations that are performed off-line, before any communication takes place. Once they are calculated, they are used to obtain estimation equations, which are used for on-line, fast evaluation of the confusion and diffusion of the negotiated cipher. A technique proposed in this thesis describes how to calculate the parameters and how to use the results for fast estimation of confusion and diffusion for any cipher instance within the defined cipher space.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In an exploding and fluctuating construction market, managers are facing a challenge, which is how to manage business on a wider scale and to utilize modern developments in information technology to promote productivity. The extraordinary development of telecommunications and computer technology makes it possible for people to plan, lead, control, organize and manage projects from a distance without the need to be on site on a daily basis. A modern management known as distance management (DM) or remote management is emerging. Physical distance no longer determines the boundary of management since managers can now operate projects through virtual teams that organize manpower, material and production without face-to-face communication. What organization prototype could overcome psychological and physical barriers to reengineer a successful project through information technology? What criteria distinguishes the adapted way of communication of individual activities in a teamwork and assist the integration of an efficient and effective communication between face-to-face and a physical distance? The entire methodology has been explained through a case application on refuse incineration plant projects in Taiwan.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This research describes the development of a groupware system which adds security services to a Computer Supported Cooperative Work system operating over the Internet. The security services use cryptographic techniques to provide a secure access control service and an information protection service. These security services are implemented as a protection layer for the groupware system. These layers are called External Security Layer (ESL) and Internal Security Layer (ISL) respectively. The security services are sufficiently flexible to allow the groupware system to operate in both synchronous and asynchronous modes. The groupware system developed - known as Secure Software Inspection Groupware (SecureSIG) - provides security for a distributed group performing software inspection. SecureSIG extends previous work on developing flexible software inspection groupware (FlexSIG) Sahibuddin, 1999). The SecureSIG model extends the FlexSIG model, and the prototype system was added to the FlexSIG prototype. The prototype was built by integrating existing software, communication and cryptography tools and technology. Java Cryptography Extension (JCE) and Internet technology were used to build the prototype. To test the suitability and transparency of the system, an evaluation was conducted. A questionnaire was used to assess user acceptability.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The research is concerned with the terminological problems that computer users experience when they try to formulate their knowledge needs and attempt to access information contained in computer manuals or online help systems while building up their knowledge. This is the recognised but unresolved problem of communication between the specialist and the layman. The initial hypothesis was that computer users, through their knowledge of language, have some prior knowledge of the subdomain of computing they are trying to come to terms with, and that language can be a facilitating mechanism, or an obstacle, in the development of that knowledge. Related to this is the supposition that users have a conceptual apparatus based on both theoretical knowledge and experience of the world, and of several domains of special reference related to the environment in which they operate. The theoretical argument was developed by exploring the relationship between knowledge and language, and considering the efficacy of terms as agents of special subject knowledge representation. Having charted in a systematic way the territory of knowledge sources and types, we were able to establish that there are many aspects of knowledge which cannot be represented by terms. This submission is important, as it leads to the realisation that significant elements of knowledge are being disregarded in retrieval systems because they are normally expressed by language elements which do not enjoy the status of terms. Furthermore, we introduced the notion of `linguistic ease of retrieval' as a challenge to more conventional thinking which focuses on retrieval results.