Essay Instructions: I need a professional complete dissertation for master degree. I will provide my dissertation research plan so you have to complete my dissertation chapter by chapter according to my Dissertation research plan.
Beside, all the sentence on my dissertation must the writer's own idea and own words, do not plagiarism from internet please. And reference, citation or bibliography must be clear and academic. if it is necessary ,you can provide a footnote on my dissertation.
here is my Dissertation research plan:
Topic: To investigate the trends/ impact/ social etiquettes of E-communities, danger, benefit and miscommunication they bring.
This research plan addresses the following:
? Background: 1 E-community definition and general information about.
? Main body: 2. Benefits of being a member of E-communities.
3. Etiquette Examples.
4. Danger and miscommunication from E-communities.
5. Summary of evidence supporting the Hypothesis
6. Explanation of methodological approach of investigation.
? Conclusion: further thinking
Background
1. E-community definition and general information about)
E-community – is a group of people, which can or can not first of all or originally communicate or cooperate through the Internet. E-communities also became the additional form of communication among the people, who know each other in real life. Dawn of ‘information age’ found groups who persevered virtual communication rather then real eye-to-eye polilogue. A "Computer-mediated community" (CMC) uses the social software to adjust actions of the participants. E-community of a type is responsible for common creation of the open initial software sometimes refers to as development by community. Essential socio-technical change followed from fast increase the Internet - based social networks.
A Community is an online resource that allows members of the association who share a common interest to communicate, share ideas, pose questions and distribute electronic resources. They are an ideal tool for committees group to share information in a timely and cost-effective manner. Each division, section, chapter, interest group, committee and executive will have its own Community limited to its unique membership.Each E- Community is made up of three sections: news; discussion forums; and a document archive.
• News: this section is where announcements, notices, and press releases can be posted for members of the Community.
• Discussion Forums: Each Community can have an unlimited number of discussion forums in which wide discussions by members can be carried out. Then, Members will post messages within a discussion forum which others can respond to, provide feedback on or make comments about it.
• Document Archive ~ An online repository of documents such as newsletters, reports, position statements, forms, and other types of electronic documents relevant to the interests of the Community’s members.
The purpose of the e-Communities Group is to provide a platform for research into issues that currently constrain the utility of community activity on the internet. Computer support for community activity presents the potential for transcending boundaries that have typically constrained social interaction. The internet provides the opportunity for individuals with abstruse interests to find support from like minded people distributed across the globe.
Currently the benefits of such electronically based communities are restricted to the few individuals with high quality internet connections. As technology improves, there will certainly be a growth in demand for access to community support. Current technology is a limiting factor. Coherent use of this novel medium will require new ways to monitor and support community development to ensure that individuals can extract the maximum benefit available. In addition, the low level operation of the internet needs to be tuned to this purpose to best accommodate the vast number of potential participants.
Today, virtual community or on-line community can be used freely for a variety of social groups cooperating through the Internet. It not necessarily means that there is a strong obligation among the members. Email the list of distribution can have hundreds members and communications, which take place, can be simply information (questions, and the answers are sent by mail), but the members can remain the relative strangers.
The various virtual communities have various levels of interaction and participation among their members. It settles down from addition of the comments either attributes to blog or post of government of the message to a competition against other people in on-line games of a video such as MMORPGS. It is not enough than differing from traditional social groups or clubs; the virtual communities frequently divide themselves in clans or even are separated to form new communities.
Ability to cooperate with likeminded persons instantly from everywhere on the Earth has significant benefits, but virtual communities have bred some fear and criticism. The valid (virtual) communities can serve as dangerous hunting field for on-line criminals, such as the thieves of identity and stalkers, with children are especially in danger. Others are afraid, that spending too much time in the virtual communities can have negative consequences on real- world interaction.
There are some promptings, which conduct the people to bring in the contribution to the virtual communities. Various dialogue means of the information become ever large resources, sharing by knowledge. Many from these communities are highly joint and also establish their own unique culture.
Main body:
2. Benefit of being the member of e-communities
a) Recognition
The recognition is important for the online contributors such as, in general, individuals want recognition for their contributions, some have named this Egoboo. To a degree it is enterprise of an individual, the contributions will be probably increased to degree that the contribution is seen to community as a whole and to a degree where there is some recognition of the contributions of the man. … powerful effects apparently of trivial markers of a recognition (for example designated as “the official assistant”) was commented in set of dialogue communities …”
One of the key components of encouraging reputation should allow the investors be known or to not be anonymous. When is involved in illegal actions, hackers of the computer should protect their personal identities with pseudonyms. If hackers use the same nicknames repeatedly, it can help authorities to trace them. However, hackers refuse to change their pseudonyms regularly, because the status connected to a specific nickname would be lost.
The structures and reputation are clearly obvious in on-line communities today. Amazon.com – is in an urgent moment, as all investors allow to create structures concerning themselves and their contributions are measured by community. Myspace.com encourages complex structures for the members, where they can share all kinds of the information concerning what music they love, their heroes, etc. In addition to this, many communities give stimulus for assistance. For example, many forums give you departure by mail. The members can spend these items in the virtual store. EBay - is an example of e-community, where the reputation is very important, because it is used to have the sizes reliable from whom that you will do potentially business with. With eBay, you have an opportunity to estimate your experience with somebody, and they, similarly, can estimate you. It has effect on the account of reputation.
b) Sense of Efficiency
The individuals can bring in the valuable information, because the certificate comes to an end somewhat of efficiency, that is, a sense, that they had some effect on this environment. There is well-advanced literature of research, which has shown, how important sensation of efficiency is, both the creation regular and contributions of high quality to group can help individuals to believe, that they have influence on group and support their own self-image as the effective man.
c) Sense of Community
The people, in general, are rather social beings, and it motivates to many people, which is necessary to answer directly for their contributions. The most e-communities allow the people to answer back the contributions (that is much Blogs allows the comment from the readers, you can answer back posts of a forum, and so on). (3)
3. Examples of the etiquette
There are many sites which confirm real danger of on-line internal violence, send by mail information to train their users concerning prosecution cyber, alongside with the recommendations of a type, it would be better for you
1. Not to say your real name to the strangers
2. To create sort - neutral username for addresses your electronic mail or nicknames of friendly conversation.
3. To use illogical samples for your password
4. Never give your password to anyone, especially, if who - requests that it in email or instant message.
5. To change your password frequently
6. To instruct children never to distribute to their real name, address, or telephone number, dialogue without your sanction.
7. To not distribute number of a credit card in a unsafe environment.
If you are pursued, you ought
1. To send the message to offender. Do it by the clear warning, that the contact is undesirable. Stop all communications, and hold a copy of all messages.
2. To register obedient with offenders of ISP provider.
3. Message of the Filter
4. To receive the help from WHO@ either NCVC or Cyber Angels
5. To establish a paper trace.
6. To register prosecution, are in a police department
7. To save all messages, written and registered
8. To hold all copies from houses (Stalkers, as is known, interrupt and will steal things.)
9. If you receive email with the very much certain threat, enter contact to your local lawful department of realization.
Cyber stalker could leave for the physical world and tempt you for the first meeting; will destroy your house, workplace or vehicle; send threat or obscene mail; also doof the offensive and excessive reference on the phone.
The e-communities are maintained to be responsible to supply the certificate of their communication to a case, such as E-mail logs may be presented to demonstrate the E-mail traffic to the victim’s computer, membership information and copies of Email messages they have sent to the defendant. Such message will usually have the URL at the top of the message. The numbers on the top are significant as they are able to tie the message to the computer, which has the account that sent the message. Information regarding the server or E-mail account used by the defendant may be presented. Testimony from AOL, Yahoo, MSN, or other Internet Service Provider (ISP) representatives may be presented with regards to the defendant Email, use of web sites, or use of chat rooms.(2)
4. Danger and miscommunication from e-communities
For each boon there is always downside-such takes place with the Internet, which became not only information highway, but also and children's platform for individuals, who aspires to damage to others As San Diego criminal defense attorneys of protection quickly find out, so useful and interesting, as the Internet can be, a lot of information about Internet users resides online and an enterprising criminal knows where and how to find it.
MySpace.com has answered proactively these incidents, bringing the children's expert of safety aboard. Besides two businessmen, who created the code to a trace the status of the attitudes MySpace.com of judicial claim of the person of the users, social lawyers website's of organization of a network, have warned.
Another website with similar functions also was closed after the prevention(warning) from MySpace.com. Jared the Dealer by candles, who began DatingAnyone.com in April, has told MySpace.com further required, that it(he) does not let out the initial code for the project. MySpace.com naked his(its) teeth in the letter of the Dealer by candles writing, that the site has broken the laws of California against cabin and federal laws of the trade mark.
The attorney of protection of a criminal of Chicago follows these managing principles from the criminal Illinois Criminal Code:
(A) the man makes prosecution cyber when he or she it is conscious and without the lawful justification, on at least 2 separate happen, disturb other man with the help of electronic communication and: (1) at any time transfers threat direct, or future wholly harm, sexual attack, conclusion, or restriction, and the threat is directed to the that man, or the member of family of that man, or (2) places that man or member of family of that man in a reasonable presentiment direct
, or future wholly harm, sexual attack, conclusion, or restriction.
(B) As is used in this Section:
"Disturb" means to participate in knowledge and deliberate rate of the behavior directed on the certain man, which annoys, torments, or terrorizes that man.
The fact, that the man has ability to cooperate with others anonymously, is one of the strongest promptings for individuals, who - independent internal offender, because many are under false impression, that they can not be caught. It, probably, was true, in one year 1989 before cyber prosecution has arrived in attention of authorities of the country, but in 2005, the cases (business) of prosecution cyber have increased to 443 from 196 in 2004. In many cases, the man, who is pursued, can never have of personal contact with offender.
Cyber the prosecution can include use Email to disturb a victim directly, sending by mail victim? S the name, call to number, or address Email in newsgroup or room (place) of friendly conversation to petition before prosecution of the third person of a victim, preparation websites, developed to disturb a victim, showing personal or pornographically material involving a victim, or use of the computer to access a victim? The management of various dialogue communities also knows this statistics, however, coming to the agreement that they can do to prevent prosecution cyber, proves also, as difficult. Most of all agree, that they have the obligation to their users to ensure sufficient managing principles, which clearly determine what types of behavior are inadmissible, consequence of such behavior and steps, which are in a place to order policy. Many from these companies of the Internet now keep of the lawyers, to define how they can protect their interests, as well as to protect their members from cyber stalkers.
5. Summary of evidence supporting the Hypothesis
Hypothesis: to prove that E-communities have not only positive features, that is recognition, sense of efficiency, sense of community. They also possess some serious and dangerous impacts on potential members of these communities.
This dissertation will include empirical research to show evidence of the hypothesis in question. This will be made up of primary and secondary data that has been collected. The kind of research is the information from members of e-communities. These will help to see an objective picture of the situation and impact of e-communities on their members. This can be made by asking or interviewer the definite circle of people who deal with the Internet. The secondary data will be based on already printed information on this topic. The recourses of the Internet itself can be used. Also this may be achieved by looking through and in details some criminal cases studies to show that e-communities can bring miscommunication. This can be collected from criminal archives given in libraries or in the police archives.
6. Explanation of methodological approach of investigation
Once I have found all the data and information that I need to get to answer the topic in question sufficiently. The methodology I have used is qualitative and is aimed to provide a critical approach in my interpretation into my case study. Some information, such as definition of e-communities and their impact on the members will be given from the members themselves and from printed versions of the information on focus. Besides, the information in need will be given from interviews and forums where people discuss the problems of unhonest in e-community relations. Some data how to prevent oneself from stealing in the Internet will be given to support the topic. In addition, books, articles and internet sites will develop my dissertation more.
We all are people who the Internet every day . We do want or not all we are members of one big legion—e-community. One and the same person can be a member of thousands of communities. These can be chats, msn, icq, forums, stores, clubs of interest, what not.
The aim of my work is to investigate the trends/ impact/ social etiquettes of E-communities, danger, benefit and miscommunication they bring. So, I will use qualitative methodology and it is aimed to provide a critical approach in my interpretation into my case study. The qualitative information will be reflected in enumeration what person should do not to be robbed in the internet, then analysis of psychological reasons why people tend to this kind of virtual communication. With the help of the given qualitative information we will see all the aspects of e-communities existing.
Conclusion
E-communities are not only about technology, but community participation.
The real purpose of E-communities is to strengthen relationship within the community. The internet is not about technology, but about communicating more effectively with family, friends and with our fellow citizens. The most important thing I have realized that in a world where the technology is changing constantly, the important thing in any business or community venture is human relationships. In a fast changing and increasing complex with the interconnected world, the only thing we can rely on is relationships with other people. So may communities come to Blog with questions about what to buy- what to stuff to get, but that is the easiest part of the problem to solve.
Any the hard part is understanding how technology and internet are changing our relationship.
Reference :
1.http://www.criminallawyergroup.com/criminal-defense/should-myspace-orkut-online-domestic-violence-crimes.php
2.http://www.truman.missouri.edu/uploads/Publications/Scott%20and%20Johnson%20Online%20Communities.pdf
3.http://en.wikipedia.org/wiki/Virtual_community
4. Anderson, B. (1983). Imagined Communities: Reflections on the Origin and Spread of Nationalism. London: Verso.
5. Smith, M. "Voices from the WELL: The Logic of the Virtual Commons" UCLA Department of Sociology.
6. http://www.cis.strath.ac.uk/research/e-communities/
7.http://www.si.umich.edu/~presnick/courses/winter03/684/index.htm
8.http://www.uta.fi/laitokset/ISI/english/projects/project10.html
9.http://66.249.93.104/search?q=cache:6ll9Z8WuTdwJ:www.artsci.wustl.edu/~dhui/HuiEngage2005.pdf+impact+in++E-communities&hl=en&gl=uk&ct=clnk&cd=6
http://www.artsci.wustl.edu/~dhui/HuiEngage2005.pdf
10. http://www.newrules.org/retail/carbondale.html
11.http://www.cla.ca/members/index.htm
There are faxes for this order.