Words On The Web
Words On The Web
Words On The Web
Edited by
First Published in Paperback in 2000 by Intellect Books, FAE, Earl Richards Road North, Exeter EX2 6AS, UK First Published in USA in 2000 by Intellect Books, ISBS, 5804 N.E. Hassalo St, Portland, Oregon 97213-3644, USA Copyright 2000 Intellect Ltd All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission. Consulting Editor: Cover Design: Copy Editor: Masoud Yazdani Sam Robinson Lucy Kind
A catalogue record for this book is available from the British Library Electronic ISBN 1-84150-867-5/ISBN 1-871516-56-0
Contents
Introduction
1
2 3
Scholarly Email Discussion List Postings: a single new genre of academic communication?
Helmut Gruber 36
52
Maintaining the Virtual Community: use of politeness strategies in an email discussion group
Sandra Harrison 69
11 Electronic Mail, Communication and Social Identity: a social psychological analysis of computer-mediated group interaction
Jacqueline Taylor 96
Bibliography
iv
Introduction
Developments in computer networking over the last decade have provided language with a whole range of new spaces in which to work and play. The studies in this collection investigate the ways in which language use and language itself is adapting to the new computer-based media through which it is increasingly channelled. Some of the papers were adapted from presentations at a workshop on Computer Mediated Communication organised by Lyn Pemberton at the Sociolinguistics Symposium 1997 in Cardiff, others are developed from presentations at the Writing and Computers Conference run by both the editors in Brighton 1997 and others were commissioned specifically for the collection. The aim has been to give coverage of as wide a range of approaches and phenomena possible at every level of interest to students of language, from the mechanics of replicating paralinguistic features in email to the pragmatics of multilingual communication and from the grammatical features of Web page anchor text to the negotiation of meaning in an email discussion on traditional song. The approaches used in the studies range from corpus-based statistics through to experimental psycholinguistics, social identity theory, systemic linguistics and conversation analysis. One informal measure of the diversity of approaches is the amount of overlap in bibliographical references: only one work, Sherry Turkles Life on Screen, was referenced in more than one chapter, vividly demonstrating the range of quite different perspectives which can usefully be employed in studying the domain. The papers in the first part of the collection focus on issues of language structure in networked and computer-supported communication. The first two chapters, though very different in emphasis, share a concern with the written representation of complex conceptual structures. In Chapter 1, Jaime Henriquez describes the subtle interplay between the implementation choices made by the developers of the World Wide Web, particularly the hypertext link mechanism, and the way readers engage with web documents. Taking a writers perspective, he uses the notion of web authoring as writing without prepositions to suggest ways for both writers and software designers to overcome the new problems which people face when reading web documents. One of the most promising uses for the WWW is, of course, learning. In Chapter 2, Bernard Scott introduces Conversation Theory as a way of modelling complex knowledge domains and suggests that it is particularly relevant for course design and communication in a hypertext environment such as the web. Conversation Theory offers a principled approach to addressing some of the concerns expressed by Henriquez over the undefined semantics of the current generation of hypertext links in web documents. In Chapter 3, Einat Amitay investigates the language used in the anchors of hypertext links in web documents, describing, for instance, the different effects of using a definite rather than an indefinite article when referring to a linked page. The incorporation of what are essentially operating instructions into a written document is quite a novel phenomenon (paper pages dont usually include a turn here instruction, 1
Introduction
communication in the group. This type of negotiation of meaning can be particularly fraught when metaphorical language is used and users need to be aware of potential difficulties if communication is to succeed. Jacqui Taylors study in Chapter 11 focuses on the effects of group identity and self identification on behaviour within email groups. It was found that contrary to previous findings, users who could be personally identified in fact tended to produce more uninhibited contributions than those who remained anonymous. Taylor argues for more research to allow for a culmination of results and a clarification of inconsistent results across studies. The rate of change in CMC behaviour is such that a rolling programme of this type of research effort is surely needed if we are to understand the effects of the new media on language and behaviour. The final chapter is a reminder that whereas most CMC studies are concerned with communication through a computer, other important category of CMC might be termed communication for a computer. Lus Prez-Gonzlez describes the effects on natural interaction that arise when one participant, in this case a call taker for an ambulance service, is constrained by the demands of software which processes the callers information. Linguistic analysis here is of immediate practical use, as a description of the structure and content of the callers contributions can be a useful tool in weeding out bogus calls. However, Prez-Gonzlez also shows that the constraints imposed by the software can result in a mismatch of interactional styles, with the call takers need for efficiency at odds with the needs of an emotional and confused caller. This is obviously a point that must be taken into account in the design of human-computer dialogues. Both the first and last chapters of the collection point to lessons for the design of systems, and this may be a useful topic on which to conclude this introduction. The software we use for communication, whether in Chat rooms, video conferences, email or the web, is of very recent manufacture and is far from fixed in design. CMC researchers are engaged in the exciting work of observing as practices change and conventions form, but they are also in a strong position, if they will take up the challenge, to influence through their observations the design of the very software via which we will communicate in the future.
Lyn Pemberton Simon Shurville
University of Brighton
Loss of Context
The author of a web page need not know who is setting up a link to their page; it is also true that the author cannot know this. Consequently, the readers entry path is unpredictable. There is no way to know what web page a reader just came from, or what is likely to be in their mind because of it. Writers of books have some assurance that attentive readers are following the sequence laid out for them in previous pages. Even if readers are less than cooperative, authors can comfort themselves with the knowledge that they have provided a sequence of which readers can avail themselves if they wish. Writers of web pages may also have provided such a sequence, but they have considerably less assurance that readers followed it or are even aware of it. To be sure, book readers may be interrupted or may lose the thread of the authors argument. But with printed material the remedy is apparent. The thread exists and its location is known - it is on the previous pages. Web page readers come to a page from an unknown and unknowable previous page. As a result, web page authors cannot count on readers having seen, or being able to easily retrieve, preparatory material. Context built up over several pages essential for allowing an author to make complex arguments or clarify subtle concepts suddenly becomes unreliable. Directional links reduce an authors reach to a single web page, turning writers of books or articles into writers of one-page flyers. Arguably, only subjects and subject treatments capable of being covered on a single web page are truly suited to the medium as it exists. Providing preparatory material for readers to absorb and refer back to if necessary seems hardly worth the authors time, because some percentage of readers will not enter by way of the authors A page, but rather from someone elses A page, or from a page of search results. As stated in the last chapter and similar helpful asides lose their effectiveness. The overall effect on readers is to deprive them of context. The effect on authors is to limit their options for helping readers master difficult concepts. Furthermore, since readers may arrive unprepared, authors must either write for a general audience which lacks any specialised knowledge, or risk irritating those who cannot handle (and did not expect) more advanced material. Two current aspects of the web aggravate the problem of directional links: full-text searching; the way browser programs such as Navigator or Explorer display pages.
Full-text searching
A full-text search produces a page of links to pages whose text contains one or more words specified by the reader. Frequently a search yields thousands of links, the majority of which are irrelevant. The ones which are relevant are just as likely to dump the reader into the middle of a sequence as at the beginning. Search results from a subject-indexed search engine (such as Yahoo) are much more likely to lead a reader to introductory material (often home pages), and give authors some opportunity to 6
No boundaries
Space involves more than simply near and far; spatial organisation also involves boundaries, i.e. the division of space into areas. As well as distance, teleportation removes boundaries and this has implications for the organisation of information and its retrieval. Material within a boundary is related. It often has a single author or a single subject. Furthermore, it has an structure distinct from the material outside the boundary. The boundary both encloses and informs - herein lies something different, something new. In addition, the boundary often provides information about its contents. The common injunction notwithstanding, books are judged by their covers. A carefully designed cover draws in the intended audience, and discourages those who are likely to be disappointed by the contents. It communicates the subject, the author, the treatment, and the expected level of knowledge. Instant links eliminate boundaries and thus eliminate another form of preparatory information. Without a cover, authors lose a prime opportunity to warn readers of prerequisites, quantity and complexity of material, area covered (or not), language, and intended audience. Either authors must provide this information in some other way, or readers must go without.
No boundary negotiation
A lack of boundaries also affects the actions of readers. Where there are no boundaries, there is no need to negotiate boundaries. Putting down one book and beginning to read another is very different from clicking a link. Not only is more preparatory information involved in the former, more preparatory actions are involved. The ease with which one can teleport around the web makes the process of moving from page to page less noticeable and since all pages are equally available, the process of moving from area to area, crossing boundaries, is equally unmarked. This lowered effort has a dramatic effect upon who reads a web page, and how. When a process can be accomplished with less effort, it can be more casually engaged in. A casual reader is an uncommitted reader. This implies not only that readers of web pages will quickly click away from a page that does not meet their (immediate) need; it also implies that they will casually click to a page that may not be relevant since, even if the page is found to be irrelevant, the cost is quite small. Directional links, as noted above, make it difficult to provide preparatory information: instant links make it seem less worthwhile to provide any. If readers appear to lose less by ignoring preparatory information, they are more likely to do so. That this lowered cost is deceptive (the immediate effort is less, but the effort over the long run will likely be more) is easy to overlook. Consequently, readers are less likely to select a web page, and more likely simply to encounter it. Two fundamental issues in communication are affected by this aspect of the web what is the point being made, and who is the audience. As to the former, the instant 9
1.5. Conclusion
Links provide interactivity for the reader, allow choice and involvement, and permit multiple paths to information, thereby supporting multiple reader points-of-view, and encouraging access to new information. As the preceding analysis has shown, web links also place a greater load on the reader. Readers have to carry or supply more context, comprehend and remember arbitrary structures, deal with a lack of preparatory information, and cope with unspecified relationships between pages. It is important that we, as web developers and web page authors, do whatever we can do to ease the readers burden in this new medium, either directly, through improved page and site design, or indirectly, through urging the makers of web browsers to make appropriate changes. Realising that web links are like one-way doors, that travel by link is like teleportation, and that writing with links is like writing without prepositions can help us remain mindful of the problems as well as the potential of the World Wide Web.
Notes
1. 2. By convention, URLs may provide some information to those familiar with how to read them, but there is no guarantee of its utility. It is also the case that authors and readers tend to assign meanings to inherently generic links, creating, by their shared understanding of the task, classes of links, which are widely, if only vaguely, understood.
12
13
2.2
Conversation Theory
Although CT may be elaborated as a general theory of human communication and social interaction, here, for the sake of brevity, we shall interpret it as a theory of learning and teaching, in which one participant (the teacher) wishes to expound a body of knowledge to a second participant (the learner). We shall refer to parts of the body of knowledge as topics, reserving the term concept for the mental procedures that indicate understanding of a topic. We shall refer to particular instantiations or models of topics as relations, defined with respect to a canonical universe of discourse or modelling facility. Pasks formal definition of a concept is that it is a procedure for recognising, reproducing or maintaining a relation (see Figure 1). Corresponding to the idea of a body of subject matter being a knowable, coherent whole, Pask distinguishes cognitive organisations that are self-reproducing system of concepts (see Figure 2). Pask refers to such systems as psychological (p-) individuals. A major innovation of conversation theory is that psychological unities are not necessarily in one-to-one correspondence with biological unities. Pask refers to the latter as mechanical (m-) individuals. Thus one brain may house several conceptual systems as p-individuals and several brains may house one conceptual system as a single p-individual (as in the distributed cognition of a team at work). Figure 3 shows what Pask calls the skeleton of a conversation. It depicts the situation in which two participants, learner and teacher, are in conversation about a topic. By distinguishing particular concepts from the systems of which they are a part, it is possible to distinguish how and why levels of Figure 1. Pasks formal definition of a concept. 14
2.3
Essentially, what we are summarising here is an algebra of understanding (Pask, Kallikourdis and Scott, 1973). We begin with the basic idea that a body of knowledge or subject matter consists of a set of topics related one to another. We distinguish two basic forms of relations between topics - entailment relations and relations of analogy. Examples of entailment relations are shown in Figure 4, while the analogy relation is shown in Figure 5. Graphical representations of relations of entailment and analogy are referred to as entailment structures. Figure 4 is a simple entailment structure, one without analogies. It shows that understanding topic A entails the prior understanding of topics B and C. Figure 5 shows that topics in one universe of discourse are related analogically to topics in a second universe of discourse. The important point to appreciate is that the existence of analogy relations reveals a variety of learning routes (or, as later, possible narrative forms). In the example, there are three main choices - learning about universes 1 and 2 separately and then learning about the form of the analogy that relates them or learning about one of the universes, say universe 1, then learning about the form of the
16
Figure 8. A flow chart representation of a task structure (the example is a simple control process for maintaining the value of variable Z as a function of input variable X with a target value Y).
Third, topics within an entailment structure or mesh may be unzipped, that is, analysed further in order to reveal sub-topics. For example, the topic table may be unzipped to reveal subtopics concerned with having legs or having a flat surface . Fourth, an entailment structure or mesh fragment may be embedded within a larger hierarchical form. For example, topics to do with furniture may be embedded within a larger structure of topics concerned with human dwellings. The operations of unzipping and embedding are depicted in Figure 11. We arrive at the concept of coherence by modelling organisational closure within a system of concepts. Strawson (1992) expresses the general idea thus:
Let us imagine ... the model of an elaborate network, a system, of connected items, concepts, such that the function of ... each concept could ... be properly understood only by grasping its connections with the others, its place in the system ... there will be no reason to worry if, in the process of tracing connections from one point to another of the network, we find ourselves returning to our starting point .... the general charge of circularity would lose its sting for we might have moved in a wide, revealing, and illuminating circle.
We can model organisational closure as follows. Imagine that the edges of the 18
Figure 10. Local cyclicity added for a larger fragment of an entailment structure.
Figure 11. Embedding and unzipping an entailment structure to form larger structures.
entailment structure extend until they meet, as in Figure 12. Where the meeting of opposing edges, top and bottom, left and right results in a torus (Figure 13). Pask refers to this model of an organisationally closed systems of concepts as a globally cyclic entailment mesh. Having modelled conceptual coherence as a globally cyclic entailment mesh, we can now retrace our steps in order to articulate the concept of a narrative structure and to reveal the set of possible narrative structures that a particular knowledge structure may engender.
a head topic is distinguished with a supporting set of subordinate, entailed topics that are its conceptual support and justification from that perspective. In essence this corresponds to the act of isolating a hierarchical entailment structure from the entailment mesh in which it is embedded. Pask refers to this operation as pruning. The only cyclic connections permitted in a pruned structure are those that relate two or more simple structures analogically (as in Figure 5); in principle and, at least, potentially, the adoption of a perspective calls forth one or more particular universes of discourse, which can be conceived of as multidimensional spaces in which possible relations may be recognised, constructed and maintained. As earlier, Pasks generic term for a canonical version of such universes is modelling facility. Where the topic hierarchy is a simple entailment structure with one head topic and where the context does indeed serve as a universe of discourse that supports the permitted operations on relations, then the topic hierarchy may, by a suitable semantic, be placed in one to one correspondence with the task structures that operationally specify the content of those topics. That is, in general, where concepts are executable as operations, there is an isomorphism between the declarative aspects of conceptualisation concerned with saying why something is what it is, and the procedural aspects of conceptualisation concerned with saying how operations are carried out, how the concepts may be modelled or instantiated as relations in a particular context (modelling facility or universe). The combination of conceptual coherence with executability of operations as the basis for an epistemology or model of knowledge is not peculiar to Pask, although he perhaps has developed the most detailed models. Rescher (1973, 1977) refers to conceptual idealism combined with a methodological pragmatism. George (1973) succinctly states that a theory is a model together with its interpretation. Miller and
20
World Wide Web. CT provides a well-tried methodology for knowledge and task analysis and a transparent, pedagogically-sound semantics for classifying types of hypertext link (Scott, 1998). [Editors note: CT modelling therefore offers a principled approach to addressing some of the concerns expressed by Henriquez, in Chapter 1 of this volume, over the uncertainty engendered by the lack of semantically typed hypertext links as they are implemented in the WWW.]
Acknowledgement
I wish to thank my colleague, Steve Ryan, for his support and helpful suggestions during the writing of this chapter.
24
3.2 Methodology
A corpus of web pages was collected and the linguistic features of the anchor text appearing on the pages were analysed. The Home Corpus comprises 155 HTML files and is a collection of personal home-pages submitted after a request to several mailing lists and newsgroups. These will obviously be a self-selecting sample, rather than a random one, and their nature will be determined by the mail lists and newsgroups on which the request for participation was posted. However, we believe they serve their purpose of furnishing a wide range of personal home pages for study.
Figure 1.
Group One The words which appear on the screen (excluding, for technical reasons, the words which appear in image form). Total number of words: 48,963 Group Two The words (a subset of Group One) which form the anchors. Total number of words: 7391.
26
Anchors in Context
Figure 2.
35 words of a frequency list taken from the British National Corpus (BNC), which includes 100,000,000 words, shows the similarities and dissimilarities shown in Table 2. There are 10 items in each list which do not appear in the other. For the BNC the items can be divided into four groups: was and had, which relate to tense and aspect; he, his, they, she and we, which relate to person; but and which, coherence related items; not. The BNC frequency list contains all the tense variations for the verbs to have and to be (with the sole exception of am), while the Home corpus frequency list includes only the present tense of these verbs. This suggests that there is a strong preference for using the present tense in writing home-pages. Since home-pages are collections of persistent facts about people, it is perhaps not surprising to find that the tense used for writing them is the present. The fact that web pages are relatively easy to update may also be a factor here. The fact that there are no third person animate pronouns in the Home Corpus top 35 frequency list suggests that a conversational tone in the home pages, with interaction between the author, writing in the first person singular, and the reader, referred to in the second person. In general writing, the words but and which are used mostly to connect two clauses, to create a longer, more complex sentence, or to expand the context of a noun phrase, again, raising its internal complexity. From the absence of these words from the corpus we can infer that people tend to write short, simple sentences on their home pages, avoiding more complex structures which would involve greater processing effort from readers and run the risk of misunderstandings and ambiguities. The word and, however, is less problematic to process and is used on home pages as a connective between two simple sentences, noun phrases and so on. 28
Anchors in Context
We would suggest two possible explanations for the absence of not. The first is that the informal style adopted by home page authors would lead them to choose the contracted form of negative verb forms (cant, wont, dont and so on) rather than the full form. In addition, it may also run counter to the straightforward setting out the facts perspective that people want to create. From the 10 words which appear in the Home Corpus top 35 frequency list and not in the BNC list we can learn more about the stylistic preferences of the authors of the hypertext documents. These 10 words can also be divided into groups: the first group includes the words my, m (found in the contracted form Im) and me. The existence of this group reinforces the claim made earlier that the language used on home pages tends to be direct and informal; the second group consists of university and research, strong indicators of the content of the Home Corpus: it is a collection of home pages of people who work in universities and are involved in research; the third group is made up of language and information which can be associated with both the content of the documents (research and universities), and with home pages and hypertext; the final group of words is page, here and home, whose use is in part at least a reflection of the tendency to conceptualise a home page in spatial terms, as a place in hyperspace.
29
Whalley (1993) suggests that we can place different types of reader-author relations on a continuum, with genres such as the course reader or distance learning text characterised by a great deal of cohesive reference, at the author control end of the scale, and hypertext-like works such as encyclopaedias and reference manuals characterised by little cohesive reference, at the reader control end. He also suggests that the amorphous links provided by hypertext do not provide any true cohesive 30
Anchors in Context
of the in the university of at the on the home page I am to the department of for the and the is a from the the university natural language if you cognitive science to be I have of my click here
reference. If everything is related to everything then essentially no cohesion is provided. These two researchers pinpoint the reason for inserting more physical instruction into the body of hypertext. These verbal directions as to where the reader should go from a certain point in the text are part of the convention of writing hypertext documents, probably because people find that there is a need for more guidance in reading such a spatially complex text. All the phenomena studied in the above paragraphs seem to indicate that authors do their best to facilitate their readers experience of their pages. They use direct and informal language. They avoid complex linguistic structures. They use the present tense, avoiding negatives and counterfactuals. They treat the page as a physical space and suggest that that the document is in the here and now. Above all they try to assist the readers by supplying them with guidelines on how to read their pages.
31
One way hypertext authors can minimise the possible confusion of readers in this multiplicity of documents is to use definite and indefinite articles to make explicit
Table 4.
The (almost) Complete Guide to WWW in Israel The Adaptive Hypertext and Hypermedia Homepage The Argus Clearing House The Back 40: Archaeology The Beggars Opera The Book of the Courtier The Brown University Home Page The Center For Cognitive Science The Centre for the Easily Amused (C*E*A) The Chesapeake Bay Bolide: The Chronicles of England The Clickable Anthony The Coconut Veranda The comp.fonts Home Page The Data Mine The Day the Universe Went All Funny: The Duke of Edinburghs Award International Association The Dukes of Hazzard. Yeeha! The Electronic Neanderthal Woodworker The Electrotechnical Laboratory The English-Norwegian parallel corpus project The Faerie Queene The Fine Print The Fortune 500 firms, 1996 The Fountain of Moravec The Fowre Hymnes The Free On-line Dictionary of Computing The Gaelic college The Garden of the World Project The Geological Society of America The Gernsback Continuum The Goodies The Guardian newspaper on-line The Hazardous Materials Sheet for Women The HCI Research school in Stockholm The history of king Richard the Thirde The home page of my thesis The homeopathic fallacy in learning from hypertext The HPSG Workshop The Humanist Web The Integration of AM/FM and Work Management The Interdisciplinary Weekly Tea Seminar The Irish Chess Archive The Java programming Language The Java Repository The JRR Tolkien Information Page- Info about my favorite author. The Koine Greek Verb: Tense and Aspect. The Korin Richmond Repository. The Lady of May The Language Software Helpdesk The Language Software Helpdesk The Language Technology Group The last of the greats - Alice and Peters 50th Birthday Party The Legal Stuff (how you can/cannot use this) The LINGUIST Network The Living Room: HOT LINKS The LTG crew The lunar calendar of Tablet Mamari, Journal de la The MainStay BBS ADDRESS BOOK
32
Anchors in Context
what the reader ought to assume as basic world knowledge and what they are not expected to know. Akmajian et al. (1995) describe the rle of definite and indefinite articles as the indicating cues for presuppositions and given-new information. Since a single hypertext document can be accessed from many directions, authors tend to introduce information in a very cautious way, using determiners to characterise the information given, and to let the reader know the immediate context of this information. Let us examine the occurrence of the definite article in anchors. Table 4 includes all
Table 4 (cont.).
The Mammoth Saga The Migraine Project The Modern English Collection The Music Room: Claire & Her Music. The Natural Language Processing Group in the Department of AI. The Net, BBC TV The New Age The NLP Software Registry Homepage The normal home page - only for local users The Official Homepage of Toad The Wet Sprocketone of the best bands ever! The Pearl Dive The Pixel Forge: Hand Hammered Special Effects (slow load; lotta pictures) The Poetry Corner The Press Room: Media lies and distortions. NEW!!! The Program, ITV The Sacred Chao The Sacred Chao The Scotland index The Semantics and Pragmatics of Lexical Aspect Features. The SFEP-ED-L homepage The Shepheardes Calender The Simpsons; The Sinclair Archive The Sinclair ZX Spectrum Switchboard The Skylight: Life On Mars? The Spam Filter The Sunsite Gaelic homepage The Syntax and Semantics of Predication The Tony Godwin Memorial Trust homepage The Tree of Life Home Page The University of Berkeley Museum of Paleontology The University of Cambridge The University of Edinburgh The Unofficial Haitian Home Page The Vicarious Learner Project The Virtual Earth The Voyager CD-Rom The Windows 95 FAQs The WWW Virtual Library The WWW Virtual Library The WWW yellow pages of Israel The Zero Point Knowledge Unit the authors page here the Centre for Cognitive Science the DEFACTO project the Department of AI the DRAFTER project the GIST project the Human Communication Research Centre the list of publications the NLP group the release announcement the University of Edinburgh the webmaster
33
3.4 Conclusions
The linguistic devices used in hypertext can thus be explained in the following way. Authors introduce themselves and their environment to the reader, describing the context of their document with the most explicit information, giving name, place and sometime even date. This well-described context allows them to refer to their document as being here and other hypertext documents as being there or elsewhere. When the author wants to introduce new information, or refer to an outside document they simply assert its existence by naming it and thus defining and inserting new facts into the document. The only knowledge needed in order to navigate between documents, then, is the understanding that each hypertext document has a local environment and if the reader wants to know more about one of the facts introduced by the author, all they have to do is click this new fact and jump to its local environment. Of course such a jump might show the fact and its explained context but 34
Anchors in Context
it would probably introduce more factual objects in the new local context. Action words such as here, this, back to and home page, within the hypertext writing convention, act as cues and road signs as to where a starting point can be found. These words appear to be used in similar contexts and syntactic structure, facilitating orientation within and between documents. This illustration of the hypertext document local context can also support and explain the findings, retrieved from the Home Corpus, that there is no proportion between the length of documents and the number of links they contain - too many unfamiliar objects in one local context can create distraction and incoherent text (Charney, 1994). Since the local environment of hypertext documents appears to be the whole HTML file, the number of new inserted linked-objects is limited within their physical surroundings. It seems that the structure of paragraphs has no affect on the number of inserted links and that the latter is restricted to fit coherence limitations. Although it can sometimes seem that there is no real order and method in writing hypertext documents, the findings in this chapter suggest that there are pragmatic reasons for the consistent choices made by hypertext authors in their use of a wide range of linguistic devices.
35
4. Scholarly Email Discussion List Postings: a single new genre of academic communication?
Helmut Gruber
4.1 Introduction
Present day computer technology offers a wide variety of synchronous and asynchronous forms of computer-mediated communication (CMC). One question which arises in this context is whether each (technologically defined) different form of CMC has to be viewed as a communicative genre of its own or if within a single mode of CMC different linguistic genres may be found. In a comprehensive quantitative study, Yates compared CMC data from email conference systems with written and spoken data-samples (Yates, 1996). His results seem to indicate that email communication displays linguistic properties which set it apart from both written and spoken modes of communication. However, Yates and Graddol (1996), examining different kinds of CMC such as video-conferencing, Internet Relay Chat (IRC) and conference system data, show that CMC cannot be viewed as a single genre but must be divided into several distinctive forms of communication. Chos (1996) study of email communication in an administrative setting indicates that despite some shared linguistic features between messages, there is also considerable individual variance between messages of the same type of CMC. Cho attributes this inter-individual variance to the fact that no stable genre expectations have yet been developed by email users. This chapter presents some results of a study on email communication in scholarly discussion lists, which establish a new form of academic discussion (1). I apply a combination of quantitative and qualitative discourse analytic methods to investigate whether discussion list communication can be viewed as a single communicative genre or if even in this limited domain of CMC different subgenres have yet evolved.
36
4.4 Results
Spoken, written or something else? Results of the quantitative analysis
It is a widespread view that email communication is a hybrid form of speech, situated somewhere between spoken and written discourse (Ferrara, Brunner and Whittemore, 1991; Ekhlund, 1986; Yates, 1996) (2). Therefore, in order to arrive at a first, rough and descriptive characterisation of the email messages under investigation I adopted some categories of Chafe and Danielewiczs (1987) investigation of differences between spoken and written academic discourse. Some additional categories were added to account for characteristics of the data which seemed to be relevant. In this step of the investigation, two discussions of my database were analysed, one from the LINGUIST list (sex and language, 17 contributions), and one from the ETHNO list (O.J. Simpson debate, 30 contributions). Table 1 provides an overview of the results. Numbers are either relative frequency counts, or else they show the frequency of the respective category per 1000 words. This measure was used for some categories to allow a direct comparison with Chafe and Danielewiczs results). Because of space restrictions the comparison between Chafe and Danielewiczs (1987) results and the outcomes of this study have to be very short. At a rather superficial level of quantitative analysis it turns out that the only major difference between the texts of the two lists concerns the length of contributions, i.e. postings to the LINGUIST list are approximately twice as long as postings to the ETHNO list. In all other categories 38
39
4.5 Conclusion
The quantitative results seemed to suggest that scholarly email discussions form a single genre which can be characterised by features of academic letter writing as well as oral communication, thus showing the typical hybrid text-characteristics which are attributed to email communication in many investigations. This first view would lead to the conclusion that a stable genre which we could call scholarly email discussion list posting has already evolved. However, a closer qualitative analysis of one single textual feature, namely quoting, revealed that there are marked differences between postings to the two lists. Direct quoting was typical for reactive postings to the LINGUIST list, whereas indirect quoting was typical for contributions to the ETHNO list. Thus, the question posed at the beginning of this chapter cannot be answered unambiguously - it is impossible to speak of a single genre of scholarly email postings, rather it seems that different sub-genres have evolved which share certain linguistic features on the macro level, but also reflect the orientation of contributors towards discussions and the discussion process in their micro-textual structure. Therefore it seems sensible to differentiate between a genre of asynchronous email communication which comprises different sub-genres, a differentiation which Swales conception does not allow for, but which is provided by Mauranens (1993) functional and Berkenkotter and Huckins (1995) sociocognitive approaches. The results of this study suggest that subscribers to the two different discussion lists seem (apart from their overall aim of discussing certain interesting and relevant topics) to be oriented towards slightly different communicative goals: whereas LINGUIST contributors produce their texts also for an overhearing audience, ETHNO subscribers seem to adopt an insider perspective which may exclude others from the discussions. A plausible explanation might be that people mailing to the LINGUIST list, with its high volume of messages and large and varied readership, realise that they cannot assume acquaintance in their readers with previous postings, while contributors to the ETHNO list, with its tighter focus and possibly more assiduous user group, can safely take knowledge of this context in their readers for granted.
Notes
(1) I restrict the use of the term discussion list to academic discussion lists in the context of this paper (although there are estimations that up to 40,000 public discussion lists exist on the Internet; McElhearn, 1996, personal email). They should be distinguished from newsgroups which cover a wide range of popular, social and scientific topics and which can be joined by anybody who has access to the Internet. Scholarly discussion lists, on the other hand, can only be joined if a user sends a subscribe command to the respective servers Internet address. Thus, discussion list subscribers are, in principle, those persons who are in some sense members of the discourse community (Swales, 1990) of a certain academic field and not netsurfers who found a discussion list by chance. (2) This view presupposes a continuum between a spoken and written pole. For the moment I shall let this assumption go unquestioned.
43
Desktop video conferencing is becoming increasingly available in both institutional and private settings as a cheaper alternative to traditional video conferencing (Ehlers and Steinfiel, 1992). This chapter reports on a study of human-human interactions mediated through desktop video conferencing and explores the ways in which communicative resources different from those used in face-to-face communication are used in the ongoing activity. The study focuses particularly on how the video pictures sent and received are oriented to and employed as communicative resources. The cornerstone of the information society, the Internet, has brought text-based communication towards synchronous interaction. For example, the Talk program in Unix allows two users to share the screen for simultaneous typing and the text version of Internet Relay Chat can connect a number of discussants at the same time. [Editors note: Todd and Walker discuss the use of such facilities in Chapter 7]. But recently desktop video conferencing systems have become available for use over modem lines and the Internet. These systems can provide a moving image of a participant, so that the other is represented visually (as themselves, not as a blockie, avatar or other such representation of a person in the visual multi-user domains, for example Bowers et al. 1996). In CU-SeeMe video conferencing, it is possible to link two sites via video picture, sound and text (typed either on the video picture itself or in a separate Talk/Chat window). According to some experts, CU-SeeMe, the video conference program which was used to link two student groups in a set of seminars analysed below, may be the harbinger of things to come (Angiolillo et al., 1997, p. 64). My data come from a university course (from Spring 1995) in which a personal (as opposed to institutionalised video studio) video conferencing program on the Internet was used. This low-cost, though highly effective, video conferencing solution resembles those applied in other educational contexts, as reported in Sattler (1995). The data recorded from this virtual seminar makes it possible not only to see how the seminar was managed via the link, but also to find out what was new and different from face-to-face and audio interactions (or even from video studio and TV-watching activities). From general observations and a closer data analysis, the conclusion can be drawn that, depending on the material setting of the room and the position of
44
5.2
Many studies on human-computer interaction deal with sharing, be it sharing the linguistic code as a tool to act with the computer, or, particularly in the case of virtual reality and video conferencing, the feeling of shared presence. Often research on these topics is conducted by asking the users afterwards how they felt about the encounter (Muhlbach et al., 1995). The methodology used in this study is to analyse these semiotically complex encounters using Conversation Analysis, in order to grasp the interpretative work and participation frameworks (Goodwin, 1986, p. 285) observable in the situation. The approach is that of interaction studies, which is an umbrella term for analyses in which different human interactional environments are studied to better understand how the individual realises the communicative potential in their use of language, gaze direction, posture and gestures. In this view, language is strongly rooted in the situation, and its meaning cannot be divorced from the moment of its use. Thus, meaning making is studied as a local and emerging phenomenon in ongoing human practices in real time. In the words of Boden (1990, p. 200), structure is actualized in the interactional work of temporally and spatially located activities whose constitutive meaning is discovered in the lived-work of producing them.
45
The recordings
At the Finnish end the site was in fact an office-turned-into-a seminar/video conference room and at the Swedish end, a computer lab. Figure 1 shows the general outline of the room used for the video conferences in Finland, while Figure 2 is a snapshot of screen activity in the middle of a seminar, taken from the recording camera No. 5. During the seminars, in addition to the two recordings made in the room in Finland (Figure 1), a third recording was collected from another site connected to a so-called
46
CU-SeeMe as MeSee(what)UC
One of the important differences between face-to-face discussions and those which take place through video conferencing is that, via the feedback screen which displays the camera image of the user, we can monitor what the other can see of ourselves, and vice versa. This is quite an extension to our normal face-to-face awareness of the self and the other (Schutz, 1980) . However, particularly in those video conference setups which involve a changing camera angle, information about the nature of ones own video picture is required because otherwise it is impossible to estimate how one is seen by the other.
General observations
In their interaction, the participants usually constructed the situation as happening in two places (for example, this end, that end). The Finnish students tended to objectify both the incoming and sent video picture, and also the sound from Sweden. Sometimes, communicating through video conferencing resulted in specific orientations of gaze and posture in the room; the participation framework of the Finnish students near the computer with a sending camera (No. 1 in Figure 1), loudspeakers, and video picture to type on gave clear indications that they felt themselves to be sharing a common space with their Swedish partners. To give an example, at one point, two female students at the Finnish end turned their heads away from the screen to look directly at the current speaker who was in the same room as they were, at exactly the same time. A closer examination showed that the head turns 47
Particularly in the first seminar in which the audio link was one-way, i.e. only one party could speak at a time, typing was used at the other end to talk. For instance, at one point, the teachers helper in Finland urges the teacher in Sweden to go on talking (there was doubt at the Swedish end whether they could be heard in Finland) by typing on the video picture: TALK NOW!!!!!!!!! PHIL. The teacher reacted to this, saying we are talking though this could not be heard in Finland. The attempt at securing the intersubjective understanding of a working audio connection was not very successful, because of the choice of wording. TALK NOW was interpreted as why dont you start talking instead of go on talking as it was intended in the situation. As often happens with typing on the screen, the text was left there until further text was typed in. This had interactional consequences, as the moment of the turn with its meaning passed, and the theoretical ambiguity (cf. Schegloff, 1984) of a disembodied written sentence could play a part in the unfolding interaction subsequently (see below). Later in the interaction, the teacher requested a typed confirmation about the status of reception at the other site. He formulated his words as a request for a special wording - Kerttu can you type that thats ok, you can hear us fine. Kerttus reply on the screen shows her orientation to the message as a request for typing certain words: WE CAN HEAR YOU FINE. This way, intersubjectivity about the meaning of the words on the screen is achieved and there is no danger of a wrong reading at the Swedish end. Thus, increasing degrees of specificity are needed to resolve repair sequences and requests for clarification. Out of sequence Text on video picture can participate for a longer period of time in the ongoing 50
5.5 Conclusion
In CU-SeeMe video conferencing seminars, securing mutual understanding becomes a joint achievement. The video-mediated images of the other and of oneself objectify the interactional situation, and they may result in observation rather than participation, displacing the participant from direct to indirect social experience. The material circumstances make it such that typing on the video picture, because of its nontransient character, is similar to disembodied writing. A participants motivated transcription of speech can therefore become part of abstract asynchronous communication in which the production and interpretation of text are separated: we get a glimpse of the synchronous/asynchronous division in the making. In this case study, we can see a transition from mediated human-human interaction towards mediated human-text interaction.
Acknowledgements
This contribution was written during a visit to the Communication Department of Aalborg University, Denmark, made possible by a research scholarship from the Academy of Finland. I would like to thank Paul McIlvenny for his useful comments.
51
54
55
Hypothesis
To answer the research questions set out above, we developed the following informal hypothesis:
Online users in these three languages use a variety of semasiographs, logographs, and orthographic deviations to convey orality, but the extent of these additions and deviations varies among the three languages according to type of writing system and prevailing cultural traditions regarding the burden of contextuality.
Based on this hypothesis, we derived the following sub-hypotheses on each of the languages under discussion. With English, we expected to find a modest number of additions and deviations because the English writing system combines phonographic and logographic elements, making it more susceptible to alteration than Japanese. As the most commonly used language on the Internet and in computer-mediated communication, English is subject to the largest number of idiosyncratic additions and deviations from the largest number of users. Alteration in English is constrained, however, by logographic elements that make serious deviations difficult to understand and by a writing tradition that places the burden of contextuality on writers to express themselves clearly. With Japanese, we expected the smallest number of additions and deviations because Japanese writing is based on a mixed system of writing that combines the kana syllabary with Chinese characters, which are logographic. In both types of writing, orthographic alteration distorts the graphs, which destroys readability. Although Japanese writing traditions place the burden of contextuality on the reader, which encourages writers to express themselves honestly in an aesthetically pleasing style, the writing system constrains the number of additions and deviations that are possible without distorting meaning excessively. With Korean, we expected to find the greatest number of additions and deviations because the Korean writing system is a featural system that closely reflects the morphophonemic structure of the language through a small number of phonetic graphs organised into a variety of easily distinguishable syllables. Korean follows a deep orthography that indicates only irregular phonological changes. In online communication, however, we predict that, to give their messages orality, writers will follow a shallow orthography that corresponds closely to spoken Korean. This will, along with various additions, result in considerable deviation from standard Korean orthography. Like Japanese, the Korean rhetorical tradition places the burden of contextuality on readers. Writers are expected to express themselves freely, which contributes to the expression of orality in online communication.
56
59
in the chatroom setting. The popularity of comic books (manga) in Japan may help explain the relatively large number of visually stimulating semasiographs and phonographic additions and deviations. The latter occur regularly in comics, and are to a certain degree regularised. The use of a small katakana /tsu/ to indicate a final glottal stop is an example of the influence of comics. All three languages showed some similarity regarding speech acts with greetings being the most common speech act in chatroom situations across all three languages. Greetings appear frequently in chatrooms as participants enter and leave. An active chatroom will have many more greetings than a less active one. Beyond greetings, English and Korean had more in common, particularly in the use of speech acts to express pleasure and sadness. Apologies and praise were found relatively infrequently in English and Korean, which perhaps reflects a greater sense of informality in English 60
and Korean online discourse. This is supported by the greater amount of praise and apologies found in the Japanese data. This reflects the emphasis on social distance and appropriate use of formulaic expressions in speech between strangers in Japanese. The data also revealed that young people, particularly teenagers, dominated chatrooms. The English data were the most diverse in age, whereas the Korean data reflected the predominance of teenagers in chatrooms. Newsgroup users in Japanese and Korean tended to be in their twenties, mostly university students, whereas English newsgroups show a wider range of age (when it is possible to tell). Language-specific findings revealed several interesting phenomena. Many deviations and additions in English follow a regular pattern, forming part of an emerging online register. Logographs such as IMHO, FYI, LOL, and semasiographic additions such as :-) have become common and are used routinely. Korean and Japanese show a more idiosyncratic pattern within broad regular patterns. English 61
6.4 Conclusion
In this study, we found that orality in computer-mediated communication, particularly synchronous discourse, was constrained significantly by the writing system and wordprocessing technology. Despite these constraints, we found that users of online communications developed a variety of ways to convey orality in expressive speech acts by creating new expressions while drawing on slang, popular culture, and oral traditions. We also found that the standardisation of orality has begun in English, which suggests that idiosyncratic orality may be fading from online communication in English as ever-growing number of users increases the demand for codification of conventions. It may also suggest that orality in online communication is rooted deeply in language-specific rhetorical traditions, which come to the fore as the number of users increases. Users of the three languages discussed here may be able to break away from the constraints of the writing system, but in doing so they come face to face with rhetorical traditions that impose demands for a new linguistic order.
62
7.2
The study began by considering the extent to which multilingualism is naturallyoccurring on chat-sites. The log files of ten talkers were studied for periods of time 64
65
68
8. Maintaining the Virtual Community: use of politeness strategies in an email discussion group
Sandra Harrison
8.1 Introduction
Computer-mediated communication (CMC) has acquired a general reputation for lack of politeness, and in particular flaming - sending rude or aggressive emails - has attracted considerable research interest since the early work into the effects of its lack of social cues in CMC contexts (Kiesler, Siegel and McGuire, 1984). Yet computermediated communication has also generated considerable enthusiasm among participants, and for many it has been an important source of support and friendship (Rheingold, 1992). The popularity of email discussion lists is demonstrated by the number available which is estimated to be about 11,000 (Vitale, 1996). Although the overt purpose of these lists is often transactional, in practice a major part of their function is interactional - Korenman and Wyatt (1996) investigating group dynamics in an email discussion list found that many respondents mentioned the sense of community which they gained from participation (1996, p. 233) [See also Matthews, Chapter 9 of this volume]. The research discussed in this paper uses Brown and Levinsons (1987) work on politeness to investigate politeness strategies in the text of an exemplary email discussion. It examines a successful email discussion in order to establish some of the strategies which contributed to its success, and to perhaps provide a benchmark which could be used for comparison with less successful discussions. In this context, I have taken success to mean that in general participants were satisfied with the themes chosen for discussion, that questions usually elicited a response and that participants could handle disagreement without hostility.
8.2
Politeness strategies
Central to Brown and Levinsons analysis of politeness strategies is the concept of face and the face-threatening act (1987, p.62). Face is ones public self-image, and Brown and Levinson distinguish between positive face, which is a persons desire to be liked, valued and understood; and negative face, which is a persons desire to act freely and without hindrance. Face can be threatened in many ways, for example a hearers face may be threatened when a speaker gives an order, makes a request, 69
Negative strategies
Negative politeness strategies relate directly to the hearers need for freedom from imposition. They are what society in general normally understands by politeness. They show deference or minimise the imposition, and they have the effect of increasing or maintaining social distance. In the sample negative strategies include occasional use of conventional politeness, for example Sorry for the cross-posting, folks. Here the writer is apologising because people who belong to more than one list might receive more than one copy of this message. However, in the same sentence folks is a positive strategy which is working to reduce the distancing effect of the apology. Coupland et al (1988) note that Brown and Levinson do not believe that strategies can be mixed (Brown and Levinson, 1987, p.17), but just as Coupland et al found overlapping sets of face-related strategies in spoken discourse (1988, p.255), the current study reveals a rich interplay of strategies within individual messages. 75
Positive strategies
Positive strategies relate directly to the hearers need to be liked and valued, and they create a positive relationship with the hearer by claiming common opinions, attitudes and knowledge, or by praising or agreeing with the hearer. They have the effect of reducing social distance between the participants. But positive strategies are also risky - they imply a degree of familiarity which could cause offence, and for this reason their use in society is relatively limited. It is therefore remarkable that by far the greatest number of politeness strategies found in this sample fall into the positive category. Positive strategies are varied and widespread, and greatly exceed negative strategies, both in quantity and variety. Time and again a writer will express interest and give compliments such as This is an interesting question, I think E makes an interesting point when he says..., I think this is a great idea!. Often a writer will claim in-group membership by using first names or nicknames, by using familiar language or in-group jargon such as Your friend and netdreg, Back to dissing ARRGH. Within this category, Brown and Levinson identify the sub-strategy of contraction and ellipsis. This too is widespread in the sample, Want to learn more...?, The moral of the story?. There are instances of the positive strategies of seeking agreement and avoiding disagreement - I agree with Es points..., True, though I believe..., I appreciate your post a great deal and by and large agree with it, but.... When a writer wishes to contradict another participant, it seems to be considered particularly important within the group either to say something positive about the other participant, or to find an area of agreement, or at least to avoid overt disagreement. This is perhaps one of the key reasons why this group functions in a generally harmonious way - disagreements are handled politely and do not normally lead to conflict. Positive hedging has been discussed above in the Two messages section. In the sample there are many examples of hedges used in this positive way, for example, I think it was relatively successful, where the double hedges of think and relatively are used to modify the writers claim to success. It is clearly considered necessary that 76
Bald on record
Finally, the face-threatening act can be bald on record, that is, made directly, without mitigation. An example from the data is Write to me and Ill try to help. This kind of strategy can be used in an emergency, or when there is a power difference between the speaker and the hearer, for example when a teacher is talking to a child or when the imposition is against the speaker, which is what we have here. In the data, we also find bald on record which demonstrates an informal and easy relationship between participants, as in Oh stop it, E!. This example forms part of a humorous exchange, and is combined in the same message with the positive strategy of joking. As one might expect, there are very few instances of bald on record strategies. Most of those which do occur tend to strengthen the group an invitation, an imposition on the speaker, a joke rather than realise a power differential.
8.8. Conclusion
In this short sample from Megabyte University, we can observe the successful negotiation of several face-threatening acts - requests, invitations, criticism, disagreement and advice. This is achieved mainly through the use of a wide range of positive politeness strategies. There are some instances of other types of strategy but these too are often used in a positive way - bald on record to demonstrate a closeness expressed by insult humour, negative strategies to minimise the writers authority, and off-record strategies to give advice without appearing to impose it. This indicates that the boundaries between the different types of politeness strategies are not always as clear cut as Brown and Levinson suggest, a finding which is supported by the frequent mixing of strategies in the data, where different kinds of strategies may be used to mitigate one face-threatening act. We find positive politeness used in the way described by Brown and Levinson, to create a generally positive atmosphere rather than to mitigate a specific facethreatening act. This is achieved by the use of informality, in-group language and the expression of shared interests. However, in contrast to Brown and Levinson, we also find positive strategies directed at specific face-threatening acts, particularly when a 77
Acknowledgement
The author would like to thank the writers of the two messages for permission to print and use them in this paper.
78
9.2 Background
The following section considers background concepts important for the interpretation of the evidence in the study, beginning with some aspects that differentiate the public subscription computer-mediated communication (CMC) fora from the workplace or 79
This is particularly relevant for CMC groups where the participants are paying to use the system. Unless their communication needs are met the individuals are unlikely to continue generating dialogues. In transactional dialogues, exchanges of information justify language production, but the purpose of interactional language production is less easily understood, and possibly more intriguing. The construction and presentation of self is one answer - in considering why people exercise their language abilities Dennett (1991) suggests the construction of self for the individual human as being the product of a web of words and deeds, leading to his assertion that you are what you speak. This human ability to use language to construct identities is exercised naturally throughout the course of our everyday interactions and there is no reason to suppose that computer mediated interactions should lack this imperative. Berger and Luckmann (1967) recognise the importance of conversation in the social construction of reality, a concept that Jones (1995) believes has been overlooked in many of the contrived, task-based, examinations of CMC usage. Indeed the intentions behind dialogues on commercial CMC networks may even have been misunderstood by the service providers themselves. Carpenter (1983, cited in Baym, 1995, p.9) observes that what CompuServe apparently didnt realize when they first put together their potpourri of consumer goods is that people are not crying out for airline schedules and biorhythms, but to talk to one another. Whether they are exchanging information or sharing realities, people appear to need communication with others. This need to communicate with each other has been demonstrated in the past by the proliferation of the household telephone. Research to ascertain reasons for the use of the household telephone measured two factors that are relevant to this study: sociability and instrumentality (Dimmick, Sikan and Patterson, 1994). Interactional dialogues support sociability, and transactional dialogues support instrumentality. Dimmick et al. found a balance in telephone use, with users who reported high gratification for sociability having a corresponding low for instrumentality, and vice versa. Literacy is a prerequisite to CMC but writing is more than just another way of producing language, it offers the human an opportunity to off-load memories. Putting memories into the external environment creates the potential for literate societies to evolve what Dennett (1991) called a different virtual architecture for their cognitive processing. Another difference that literacy appears to encourage is a perspective on language focused on form rather than on content. Ellis and Beattie (1993) argue that it is the 80
Results
The main hypothesis of this study required the transactional and interactional dialogue to be compared. Transactional dialogue showed a statistically significant difference between the two fora in the predicted direction (t = 2.163, d.f.= 1,70; p<0.05), i.e. the Computer Professionals Forum discussions contained more transactional acts than the New Age Forum discussions. Interactional dialogue also showed a statistically significant difference in the predicted direction (t = 2.000, d.f.= 1,70; p<0.05). Both fora contained comments to support the assumption that participants were in cohesive groups. The following is a particularly striking example of group solidarity both for its expression and its content (participants are numbered for ease of reference): New 1: 2: 1: Age Forum Teb, Chole wants to know our mantra Tell her, some others may not know it Chole, Were right and the rest of the world is wrong!!!! 81
Rather than just accepting the filtering out of social cues, participants added comments (in italics in the examples) to describe actions and emotions in support of their contributions, and in response to contributions from others, a textual version of the emoticons used in some email interactions or perhaps a reflection of the textual structures used in MUDs and MOOs. For example: Computer Professional Forum 1: Hows Terry doing with WinCim2 (noticing he isnt here) New Age Forum 1: Oh, but she wasnt running off killing people over imaginary boundaries (snort) New Age Forum 1: Let me offer a few facts. conquest 2: (listening)
This last example, as well as adding another dimension to the message by the addition of the sob annotation, also mentions a real-life meeting, suggesting that the participants also meet outside the online forum. Participants gave no impression of living in a fantasy world or of experiencing a total absorption that took them out of their physical environments. Comments were made that invited the Cybercommunity to share their reality, for example: Computer Professional Forum 1: Babys crying again, wifes asking me to mind the baby. 2: Im trying to keep an eye on Frost on TV 3: My other half is watching TV, three labradors are fast asleep New Age Forum 1: It sure is hard to type while eating BBQ ribs and a kitty sitting on your mousepad purring
82
83
Discussion
The purpose of the second study was to examine the relationship between the content of the fora dialogues and the communication intention of the members. The perceived intentions reported by members did support the original hypothesis examined in Study One. Members of the forum with a concrete external focus, Computer Professionals, intended more information-based, transactional, conferencing, while members of the forum exploring a more abstract, emotional, concept intended to have more interactional dialogues. However, when intentions were compared with performance, results were not consistent for both fora. Computer Professionals members reported that their online conferencing activities were more concerned with information transactions than social interactions. New Age Forum members reported their activities as more balanced 84
9.5 Conclusion
This research had two main purposes: to examine the content of dialogues generated in public fora; to consider how these dialogues satisfied the communication needs of the participants. Study One examined dialogue content and reported that the forum with an external focus did concentrate more on information exchange, and the forum exploring an abstract emotional concept did contain more interactional dialogue. Two other issues of further interest were identified as: the use of multiple context spaces; the desire for supplementary communication channels. Each issue contains elements of interest to social psychologists and further research is needed to gain a fuller understanding of these new human activities. One group maintained multiple context spaces throughout their conferences. This made the dialogues difficult to follow, and resulted in a public space populated by dyadic exchanges. However, when looked at as complete conference texts, rather than exchange by exchange, it can be seen that they hold a superficial resemblance to the action of many television dramas, or soaps - short sequences of dialogue with rapidly changing scenes, requiring the reader to hold in memory multiple open context spaces. For anyone first viewing a soap, without the shared history, scenes can be confusing and the dialogue dull. It is necessary to know the characters before meaning can be extracted from what appears to be mundane or trite. These conferences could be satisfying because they offer an opportunity to develop interactive online drama, living soaps. When Baym (1995) reported on the uses of messages posted to Usenet, an extremely popular network, she identified the most popular newsgroup as that which carried gossip about soap operas. She found that in the message environment CMC could create a dynamic and rich community filled with social nuance and emotion. Synchronous conferences offer further opportunities for creation of social worlds. 85
86
10. Literal or Loose Talk: the negotiation of meaning on an internet discussion list
Sonja Launspach
10.1 Introduction
This paper presents the negotiation of meaning for a disputed term on the Internet list, Fasola, which discusses Shape Note (Sacred Harp) singing, an American hymnody tradition. The hypothesis argues that it is not a lack of context that requires the negotiation of the term in dispute, but the overabundance of contextual assumptions that participants bring to the interaction. The paper explores the rles played in the dispute by this broadened context as well as by definitions of community. First, the relevant theoretical concepts will be discussed; then the data analysis and concluding discussion will be presented.
Loose Talk
Another element relevant to the analysis is Sperber and Wilsons notion of loose use of language, the everyday use of metaphoric or figurative language (1991). In loose use, an utterance does not literally represent the state of affairs it describes. Instead, there is an interpretive resemblance; that is, any object can be used to represent any other object it resembles (Blakemore, 1992, p. 161). An utterance is an interpretive representation to the degree that it resembles another in semantic and logical properties. Loose use can be an effective way to communicate propositions as long as the hearer has some way to select which logical and contextual implications the speaker intends to convey. The hearer has the responsibility for identifying the appropriate contextual implications for an utterance; that is, the implication that represents the thought being communicated. Usually, the hearer derives the contextual implications of an utterance from the content of the utterance and the context (the cognitive environment). Further, contextual implications may be strongly or weakly implicated. Strong implicatures have tighter constraints on hearers choices, while weak implicatures have fewer constraints on contextual assumptions. Loose or metaphoric use often conveys a range of partly strong, partly weak implicatures.
Definitions of Community
On the list, the participants assume they have the Shape Note (SN) community in common. But what does it mean to be a part of a community on the Internet? Licklider and Taylor (1968) speculate that communities on the Internet would be shaped by common interests rather than geographic space. Stone (1991) elaborates on this idea, stating that virtual communities are collection points for the common beliefs and practices of people who are physically separated. Instead of physical or geographic space, the Internet provides users with a socially produced space as a basis for a community (Jones, 1995). In the case of the Fasola discussion list, this is indeed a community that is geographically separated. Moreover, the list is often the single connection to the SN community that some participants have, since they live in places that do not have a SN singing group. Therefore, for many singers, the list provides an important connective function. However, Jones (1995, p.12) states that connection does not inherently make for community, nor does it lead to any necessary exchange of information, meaning or sense making at all. The assumption of a unified community is one of the notions that 88
10.3
The data is taken from the Fasola discussion list of Shape Note or Sacred Harp music, a traditional style of hymn singing in four part harmony that is sung a cappella. The notes are written in different geometric shapes, representing intervals, rather than in the standard European musical notation. The discussion of the meaning and applicability of the term raunchy to SN music took place over a period of four days. There were a total of 41 messages in all, ranging in length from 4 - 121 lines, the average being 25 lines. There were a total of 23 participants, with 6 who posted 2 or more messages. These participants included 7 women, 13 men and 3 people whose gender was not immediately evident from their name. The discussion did not appear to be dominated by a few participants, since more than half of the messages, 24, were sent by individuals posting once. The primary objector to the term raunchy posted 7 times and the original user of the term 3 times. The topic thread developed as follows - the initial message with the disputed term raunchy was posted, followed by a response objecting to the use of the term. Next, the original poster tried to explain the context of his first message. At this point in the discussion, other participants had already begun to post their interpretation of the term, either in the original context or just their own individual interpretation. The original objector posted dictionary definitions of the disputed terms (several others came into dispute along the way), as a means of supporting their claim. The original poster later sent a message that explicitly stated what the term implied for him in relation to SN music. Other messages, both pro and con, were posted, some of which degenerated into name calling and professional and class-based insults. At the end, other participants stepped in, both to move the discussion away from the disputed terms and to enforce the list standards of conduct. One difficulty of designing turns, that is, writing posts for Internet discussion lists is the problem of recipient design. In addition to any intended recipient, there are also the ratified overhearers, those who are not presently participating in the 89
95
11. Electronic Mail, Communication and Social Identity: a social psychological analysis of computer-mediated group interaction
Jacqueline Taylor
11.1 Introduction
Computer-mediated communication (CMC) systems are often used to link geographically separate individuals, allowing them to conduct group-based project work at a distance. However, it is unclear how using these systems affects some facets of group work. In 1990, Huber suggested that much of the theory for small group interaction needed to be re-examined in a computer-supported context. Since then, researchers have started to investigate whether the social psychological literature on group interaction can be used to understand computer-mediated group interaction (Adrianson and Hjelmquist, 1991). However, systematic research has rarely been conducted within realistic contexts; rather it has tended to study inexperienced participants in artificial situations. A second criticism of much of the research into CMC is that it frequently does not address the social interactions that occur within groups, but rather concentrates on the outcome of group work (Finholt et al., 1990). There has been very little research on the way that CMC affects the way individuals perceive each other and the group, and the relationship between these perceptions and the style and content of communication. The remainder of this introduction will review research into the effects of CMC on group communication and interpersonal perception, the different theoretical explanations for the findings, and the rationale and hypotheses for the study reported here.
Group communication
Using email for communication between group members has been shown to have a number of effects on the content and style of group discussion. In particular three effects have frequently been observed - flaming, self-disclosure and balance of participation. Steele (1983) defines flaming as to speak incessantly and/or rabidly on some relatively uninteresting subject or with a patently ridiculous attitude. A more recent definition of flaming is a message that uses derogatory, obscene or inappropriate 96
Interpersonal perception
The absence of social cues in CMC is widely hypothesised to affect interpersonal perception and result in the treatment of others, resulting in a depersonalised manner. For example, Sproull and Kiesler (1991) propose that the lack of cues in CMC creates the equivalent of a tribe of masked and robed individuals. However, they collected no interpersonal data to substantiate this hypothesis. Perceptions of group members 97
Theoretical explanations
Two different approaches have been used to explain CMC effects, one focusing on the reduced social context cues and the other on a change in social identity. In both, the concept of de-individuation (the process of losing ones distinctiveness and sense of personal identity) is central. The principal difference is that the reduced social context cues approach proposes that email is de-individuating, compared to face-to-face interaction, while the social identity approach proposes that email can be deindividuating or individuating, depending on the context in which email is used. Sproull and Kiesler (1991) propose that the reduced social context cues in CMC lead to less regard for other users and reduced audience awareness, and that this results in reduced inhibition in group members, leading to increased levels of self-disclosure and flaming. However, there are a number of major problems with this theory. Firstly, studies have shown differences in degree of flaming across different CMC conditions (e.g. Smolensky, Carmody and Halcomb, 1990), indicating that it cannot be the medium per se which is influencing communication behaviour. Moreover, even though this theory emphasises intrapersonal and interpersonal processes as mediating the effects of CMC, researchers have failed to collect user perceptions of each other and of the group. According to social identity theory, two important conditions influence de-individuation - the sense of group identity and the degree of personal identifiability to other group members. De-individuation is shown in those groups where the group is emphasised more than the individual and where levels of personal identifiability are low (Turner, Hogg, Oakes, Reicher and Wetherall, 1987). Social identity theory predicts that when individuals are de-individuated, adherence to group norms is high. Spears, Lea and Lee (1990) explain the normative and anti-normative effects of CMC using the social identity approach. However, although Spears et al. (1990) did find support for social identity theory (in the de-individuated conditions group members attitudes moved in line with the group norms), they did not measure other factors involved in computer-mediated group interaction (for example group cohesion, flaming or self-disclosure). There are a number of methodological problems with the research reported in this review. Specifically, most of the research was conducted in the laboratory, using artificial designs and procedures. For example, the size of discussion groups was small, 98
11.2 Method
In total, 48 participants (37 males and 11 females) responded to a request posted on a number of different email networks within the UK. Participants were randomly assigned to groups of six with the constraint that each group contained at least one female participant. Participants were geographically dispersed and care was taken to ensure that volunteers from the same electronic network were not placed in the same groups. No one had previously met or spoken to another member of their group. A 2 x 2 between subjects factorial design was employed, with Personal Identifiability (Low or High) and Group Salience (Individual or Group) as the independent variables. Two discussion groups were assigned to each condition. Personal Identifiability was manipulated by providing those in the High Identifiability condition with an electronic biographic database containing details of each group member. Participants in the Low Identifiability condition were given only the email 99
11.3 Results
The analysis of the data will be considered in two sections - group communication and interpersonal perception.
Group communication
The transcripts were coded blind by the researcher (i.e. all information that could be used to identify conditions or participants was removed). This coding noted the incidence of flaming and self-disclosure. Two types of flaming were differentiated type A consisted of abusive or impolite comments directed towards participants while type B consisted of general comments containing uninhibited language. Self-disclosure was defined as any comments that revealed something private about the person. Tables 1, 2 and 3 show the total number of self-disclosure and flaming comments per condition. It can be seen that participants receiving a Low level of Identifiability produced very few examples of either kind of flaming. The observed frequencies were compared against expected values of equal distribution and they were not equally distributed for either type of flaming. Flaming therefore did not occur evenly across conditions and it can be seen that Identifiability was the significant factor in both types of flaming. Contrary to previous research it was the individuated, High Identifiability conditions that produced the most flaming not the impersonal, Low Identifiability conditions. Group Salience had little effect, with those in the Group and Individual conditions producing similar numbers of both types of flame. The incidence of self-disclosure, illustrated in Table 3, indicates that the more that is known about other members of the group (i.e. High Identifiability groups), the more a person will disclose about themselves. Frequency of self-disclosure across conditions was significantly and strongly affected by the experimental manipulations. Participants were also asked if they felt more open to discussion of the topic using email, compared to face-to-face discussion. Those receiving High Identifiability reported feeling significantly more open to discussions than those receiving Low Identifiability, supporting the data in Table 3. 100
Table 4 shows the means and standard deviations for the number of messages sent per person in each condition over the two-week period. It can be seen that Identifiability has a strong and statistically significant effect on message-sending activity - participants receiving High Identifiability sent significantly more messages than those receiving Low Identifiability. The Group Salience manipulation had no significant effect, however there is a nearly significant interaction between Salience and Identifiability. This is probably due to the differences in message-sending activity between the Low and High conditions of groups receiving Individual Salience. When the standard deviations are examined it can be seen that there is more variability in the High Identifiability groups, while standard deviations are lower for the Low Identifiability groups indicating a more balanced distribution of messages sent by each group member. In summary, it appears that Identifiability is a significant factor affecting uninhibited communication, where the more that is known about other members of the group then the more that people are prepared to flame and self-disclose. Limiting the amount of identifying information produces a more balanced discussion, although there was also less communication occurring in these groups.
Inter-personal perception
Interpersonal perception was measured on seven-point Likert-type rating scale, where -3 indicated disagreement and +3 indicated agreement with a statement. As shown in Table 5, the Identifiability manipulation strongly and significantly affected perceptions of group cohesion, with more group cohesion occurring in the High Identifiability groups. The Group Salience manipulation was not significant. Both of these findings are contrary to predictions. Perceptions of other group members were generally favourable, as shown in Table 6. It can be seen that participants receiving Group Salience and High Identifiability liked other group members the most, although this interaction was not statistically significant. 101
11.4
Discussion
This study had two main purposes. The first was to consider the way that group Chi=42.62; df=1; p<0.001 members perceptions of the group relate to group interaction and in particular to Table 3. Frequency of self-disclosure. investigate whether social identity theory could be used to explain the effects of CMC. The second aim was to examine group interaction in realistic email discussion groups where the contexts had been manipulated to provide emphasis on a personal individual identity or an impersonal social identity. The first conclusion to be drawn from the data presented here is that there is no support for the view that impersonal or de-individuated contexts encourage uninhibited communication either in quantity or in quality. In fact the evidence here directly contradicts that found by Kiesler, Siegal and McGuire (1984). It was the conditions in which participants could be personally identified that produced higher levels of flaming and self-disclosure. Hence the rather technologically deterministic arguments of Sproull and Kiesler (1991) regarding the effects of reduced social context cues are unfounded. More complex processes and factors are involved in influencing communication in electronic groups particularly as regards the extent to which people obey the social norms that govern communication and interaction in face-to-face contexts. Whatever leads to anti-normative behaviour in CMC systems, anonymity does not appear to be the critical factor. If one takes the view that flaming and selfdisclosure are more socio-emotional rather than task-based discussion, then the provision of personal information has encouraged and facilitated the groups to interact at that level. Whether this can be seen as a positive release of socio-emotional interaction or a negative release cannot be ascertained from this study - further research is needed. Within this relatively realistic context, the prediction of more balanced participation in groups receiving limited identifying information was confirmed (Dubrovsky et al., 1991), although there was also less communication occurring in these groups. The implications of this are important as regards the conclusions that can be drawn about the consequences of the use of CMC systems. It would appear that in circumstances where a high level of interactive discussion is desirable, this could be achieved by providing a means for the participants to obtain information about the other members of the group. However, if equality of participation is the critical goal then the 102
Table 4. Mean number of messages sent in each condition (standard deviations in parentheses).
anonymity of group members should be preserved. It is difficult to give guidelines on how to realise both high level of discussion and equal participation; further work needs to be conducted in this area. The importance of believing oneself to be part of a group has been shown elsewhere to affect behaviour significantly (Tajfel, 1981). However, despite the vast literature in face-to-face group research, much of the previous CMC research has ignored group cohesion. Moreover, despite the implication of changes in interpersonal perception as a mediating influence in some theories of CMC (Sproull and Kiesler, 1991), measurements of interpersonal perception have not been collected. The study presented in this chapter produced an unexpected set of significant group cohesion
Table 5. Mean responses to the item: How cohesive was your group?.
103
Table 6. Mean responses to the item: Did you like the other participants?
findings, contrary to the predictions based on social identity theory. It was the manipulation of Personal Identifiability, not Group Salience, which significantly affected perceptions of group cohesion. Also contrary to social identity theory, the results showed that more group cohesion was perceived in groups receiving identifying information. However, it is not clear whether Identifiability directly affected these perceptions or whether they are affected by the increases in communication activity or uninhibited communication that occurred in these groups. It may be that group cohesion operates differently in computer-mediated groups and that the lack of non-verbal cues qualitatively affects interpersonal perception. The relationship between self-disclosure and group cohesion shown in previous face-toface group research (Elias et al., 1989) was shown in this study, yet it is not clear whether self-disclosure encouraged group cohesion or vice versa. In conclusion, the research has contributed to an understanding of how the contexts of email affect group interaction, in particular where the levels of social identity of group members were investigated. Further research is needed to collect user perceptions of flaming to identify whether flaming is perceived as normative or antinormative and standard measures need to be specified for flaming and self-disclosure. Further research is also needed into group cohesion. This is particularly important considering the group research which emphasises the important role that group cohesion plays in the performance and productivity of groups at work. Such results may have important implications for the implementation of Computer Supported Cooperative Work (CSCW) and CMC systems. Other aspects of the context such as tasktype also need to be studied. Such work will contribute towards a culmination of results across contexts to help determine which features of CMC technology produce various outcomes and may also help clarify inconsistent results across studies. In the discussion of the findings from this study, it was suggested that some group processes 104
105
Figure 1.
108
Our corpus shows that the interrogative series is the structural constituent of emergency calls which best illustrates the effects of computer mediation in this professional setting. Consequently, the discussion in the remainder of this chapter will concentrate on the computer-mediated interaction which takes place between C and CT within the interrogative series.
Example 1 038 CT: 039 C: 040 041 042 043 060 061 062 063 064 065 066 CT: C:
CT: C:
Sample B.4 (038-066; abridged) enwhats the problem? (0.5) (theres > somebuddy (.) actinsuspiciousl- <) = hullo? yeah. = m still here. = = > theres somebuddy actin suspiciously. < (.) uhm- Ithink its aston roa:d. (...) = righten w- howre they acting suspiciously? its not like- I dont know, they were very close tthe windows like (.) (trying to bang the windows) (3.5) (I cameround the back. = I went jst like) ( ) (1.0) (knockem round ( ) somebuddy ( ) f somebuddy else.)
Second, CTs probes for information should yield a highly precise location of the ongoing incident: 110
The management of calls reporting incidents which involve actual or potential emergencies should shed light on issues such as descriptions of suspects, whether they are armed, whether they are still present at the scene or the direction and means of their flight (Zimmerman, 1992b, p. 422): Example 3 013 CT: 014 015 016 C: 017 CT: 018 019 C: 020 CT: 021 C: Sample B.8 (013-021) what does she looks like? (0.1) whats she wearin? turquoise blue jacket, (0.5) turquoise blue je:ans] blue jea:ns] .h how old is she? nineteen twenny.
Zimmerman (1992b, p. 423) offers the following illustration of a DP from his corpus: 23:03 2270 5 Av. N. pergun p1 comp says people are shooting guns at that address no one shot yet. Says they will shoot cops. Then hung up
The first line in this DP indicates the address of the emergency and the time at which 111
112
020 021
CT: C:
025 027
CT: C:
031
CT:
The most immediate implication of the CAD-systems influence on the assembly of DP is that CT is often required to abide by the geography of the electronic data form, such that certain issues have to be necessarily elicited before others. In this connection, let us consider Whalens (1994, p. 5) sample of a typical CAD data-form in Figure 2. The CAD form displayed above has a bearing on the ordering of CTs probes for information, as no less than five of the slots must be compulsorily filled before the emergency-report can be electronically transmitted to the actual dispatcher of assistance. These codes are represented in bold characters and correspond to the nature of the emergency (INC), its location (LOC), the priority granted to the request of help (PR), the phone number at the location (PHO) and, finally, the internal extension number of the incumbent CT (SRC). According to our corpus, the compartmentalised layout of the CAD sheets is to be held responsible for the lack of interactional flexibility which CT sometimes exhibits when interacting with an emotionally strained C. The electronic mediation in the negotiation between C and CT is not restricted to the order of the questions, but extends also to the constraints governing the processing 114
of the incoming information. The data provided by C have to be coded according to the institutionally relevant conventions; in other words, CTs duty is to represent the incident in organisationally acceptable codes. Consequently, CTs need to accommodate Cs responses within a single slot and, thereby, to choose each code with maximum precision has interactonal consequences. As was mentioned above, the nature of the current incident is one of the pieces of information relevant to the DP. This being so, CTs attempt to obtain a reliable categorisation of the emergency and to secure a precise account of the incident from C will often require additional of clarificatory questions: Example 6 005 C: 006 007 008 009 010 011 012 Sample B.8 (005-012) = hello. = theres a youngirlt (.) marine centre widda flick knife. (1.0) shes following old peopleround for money. (1.0) shes followingem aroundr askingem for money? = = no = shes followi::n them. (1.0) she asked me but I said no::. Sample B.26 (005-016; abridged) 115
CT: C:
Example 7
Another interactional issue which is subject to electronic mediation is the elicitation and processing of the location of the incident, as locations must be entered as either an exact address; a street hundred block; a landmark (preceded by a landmark designator...) that the CAD system recognizes and will then replace, as the form is transmitted to the dispatcher, with the landmarks official address; or an intersection (Whalen, 1994, p. 26). Our corpus illustrates this point with multiple examples of locational formulations which must be re-elaborated so that CT is able to enter them in the CAD system, as in Example 9 below: Example 9 002 CT: 003 C: 004 CT: 005 C: 006 CT: 007 C: 008 CT: 009 C: 010 CT: 011 012 C: Sample A.17 (002-012) fire service whats di address? its flat o:ne h, flat one, .h hundredn te:n h, a hundredn te:n, summerfield roa:d, hundredn ten summerfield road, wolly range h h. (0.5) en wherebouts in summerfield road is it? its halfway do- its off withington road.
There are also examples of CTs preference for map-based formulations of location rather than compass-based ones:
116
CT: C:
Finally, the interactional relationship which holds between C and CT is determined by the nature of the emergency at issue. Issues such as the description of suspects or the means of their flight, to give just two examples, do not have to be elucidated in canonical calls to the fire brigade, although they are usually crucial for the assembly of DP in calls to the police. In other words, not all the slots displayed in the CAD dataform are to be necessarily filled in all cases. More specifically, typing certain codes at the INC slot would seem to render some of the remaining slots idle, thus waiving the need for CT to probe for certain elements of information. Our corpus demonstrates that the interrogative series in section B calls is the most complex as regards the number of institutional requirements to be met and the amount of ancillary information to be provided by C. The source of the problem, the presence of guns or knifes, the number of suspects, descriptions or time-lapse between the occurrence of the incident and the time of the call are some well-documented constituents of DP in section B calls. As far as section A and C calls are concerned, it is noteworthy that the location of the troublesome incident deserves maximum attention, while the account of Cs reasons for the categorisation of the incident as a current or impending emergency is often dispensed with by CT. Prez-Gonzlez (1999) attests the existence of important differences in the length of the interrogative series across incident-types. A number of reasons are proposed to account for this trend. Although space restrictions preclude discussing this aspect in detail, let us note that, in sections A and C, the callers are aware of the imminence of the reported event. Accordingly, they feel empowered to challenge some of CTs directions and, in some cases, to impose a specific line of action on the institutional interactant. For their part, callers participating in section B encounters have to argue for, rather than simply report, the problematic nature of a given event. This correlates with a more submissive interactional status on the part of C, such that the ensuing interaction abides by the canonical expectations which govern the unfolding of conversation in institutional settings.
118
Bibliography
Adrianson, L., and Hjelmquist, E. (1991). Group processes in face-to-face and computer-mediated communication. Behaviour and Information Technology, 10:4, 281-296. Akmajian A., R.A. Demers, A.K. Farmer and R.M. Harnish. (1995). Linguistics: An Introduction to Language and Communication. 4th Edition. Cambridge, Mass.: MIT Press. Angell, D. and B. Heslop. (1994). The Elements of E-Mail Style: Communicate Effectively via Electronic Mail. Reading, Mass.: Addison-Wesley. Angiolillo, J.S., H.E. Blanchard, E.W. Israelski and A. Man. (1997). Technology constraints of videomediated communication. In Finn, K.E., Sellen, A.J. and Wilbur, S.B. (eds),Video-mediated Communication, pp. 51-73. New Jersey: Lawrence Erlbaum Associates. Aronoff, M. (1994). Spelling as Culture. In W. C. Watt (ed.),Writing Systems and Cognition: Perspectives from Psychology, Physiology, Linguistics, and Semiotics, pp. 67-86. Dordrecht: Kluwer Academic Publishers. Ausubel, D. P. (1968). Educational Psychology. New York: Holt, Rinehart and Winston. Berkenkotter, M. and T. Huckin. (1995). Genre Knowledge in Disciplinary Communication. Cognition/ Culture/ Power . Hillsdale, N.J.: Lawrence Erlbaum. Blakemore, D. (1992). Understanding Utterances. Oxford: Blackwell. Boden, D. (1990). The world as it happens: Ethnomethodology and Conversation Analysis. In Ritzer, G. (ed), Frontiers of Social Theory, pp. 185-213. New York: Columbia University Press. Bowers, J., J. Pycock, J. and J. OBrien. (1996). Talk and embodiment in collaborative virtual environments. In CHI96 Electronic proceedings, http://www.acm.org/sigchi/chi96/proceedings/papers/Bowers/jb_txt.ht. Bowers, J. and J. Churcher. (1988). Local and global structuring of computer-mediated-communication: Developing linguistic perspectives on CSCW in COSMOS in CSCW 88. Proceedings of the conference on Computer-supported cooperative work, pp. 125- 139. Portland: ACM. Britton, K. and A.C. Graesser (eds). (1996). Models of Understanding Text . Hillsdale, NJ: Lawrence Erlbaum Associates. Brown, P. and S.C. Levinson. (1978). Politeness: Some universals in language usage. 1987 reissue. Cambridge: Cambridge University Press. Burks, A. (1949). Icon, Index and Symbol. In Philosophical and Phenomenological Research IX/4, June 1949, pp. 673-689. Buxton, W.A.S. (1997). Living in augmented reality: ubiquitous media and reactive environments. In Finn, K.E., Sellen, A.J. and Wilbur, S.B. (eds). Video-mediated Communication. Hillsdale, N.J.: Lawrence Erlbaum Associates, 1997. Cathcart, R. S. and L.A. Samovar. (1992). Small Group Communication. Dubuque, IA: WCB Publishers. Chafe, W. and J. Danielewicz. (1987). Properties of Spoken and Written Language. In Horowitz, R., Samuels, J. (eds). Comprehending Oral and Written Language, pp. 83-113. San Diego: Academic Press. Charney, D. (1994). The Effect of Hypertext on Processes of Reading and Writing. In C. L. Selfe and S. Hilligoss (eds). Literacy and Computers: The Complications of Teaching and Learning with Technology. New York: The Modern Language Association of America. Cho, N. (1996). Linguistic Features of Electronic Mail: Results from a Pilot Study. Paper presented at the Australian and New Zealand Communication Association Annual Conference, Brisbane, July 1996. Conklin J. (1987). Hypertext: An Introduction and Survey. In IEEE Computer, 20/9, pp. 17-41.
119
120
Bibliography
Gruber, H. (1996b). Aspects of power and communication in scholarly e-mail discussion lists. Excluding practices and peer-group formation. Paper presented at the 1st Knowledge and Discourse Conference, Hongkong, June 1996. Hagge, J. and C. Kostelnick. (1989). Linguistic Politeness in Professional Prose: A Discourse Analysis of Auditors Suggestion Letters, with Implications for Business and Communication Pedagogy. Written Communication, 6, pp. 312-39. Halliday, M. A. K. (1978). Language as Social Semiotic: The Social Interpretation of Language and Meaning. London: Edward Arnold. Herring, S. C. (1994). Politeness in computer culture: Why women thank and men flame. In Bucholtz, M., Liang, A. C., Sutton, L. and Hines, C. (eds.) Cultural Performances: Proceedings of the Third Berkeley Women and Language Conference. Berkeley: Berkeley Women and Language Group, pp. 278-294. Huber, G. P. (1990). A theory of the effects of advanced IT on organizational design, intelligence and decision-making. Academy of Management Review. 15:1, pp. 47-71. Ikeda, K.A. (1996). Social Psychological Approach to Networked Reality. IEICE Transactions on Information and Systems, E77D(12), pp. 1390-1396. Jones, S. (1995). Understanding community in the information age. In S. Jones (ed.), Cybersociety Computermediated Communication and Community, pp. 11-35. Thousand Oak: Sage. Katz S. M. (1996). Distribution of context words and phrases in text and language modelling. Natural Language Engineering. 2:1, pp. 15-59. Kiesler, S. and Sproull, L. (1986). Response effects in the electronic survey. Public Opinion Quarterly, 50, pp. 402-413. Kiesler, S., Siegal, J. and T. W. McGuire. (1984). Social psychological aspects of CMC. American Psychologist. 39:10, pp. 1123-1134. Kim, C. (1990). Hangul ui yoksa wa mirae [The History and Future of Hangul]. Seoul: Yolhwadang. Korenman, J. and Wyatt, N. (1996). Group Dynamics in an E-Mail Forum In Herring, S. (ed.), ComputerMediated Communication: Linguistic, Social and Cross-Cultural Perspectives. Amsterdam: John Benjamins, pp. 225-242. Landow G.P. (1992). Hypertext. The Johns Hopkins University Press, Baltimore, USA. Launspach, S. (1994). Just my thoughts... A look at the use of mitigation in electronic discourse. Paper presented at the 8th Annual International Conference on Pragmatics and Language Learning, University of Illinois, Mar 30-Apr 2, 1994, Urbana, IL.. Laurillard, D. (1993). Rethinking Higher Education. London: Routledge. Lea, M. (1992). Contexts of Computer-Mediated Communication. London: Harvester-Wheatsheaf. Lea, M., OShea, T. and Fung, P. (1991). CMC and CSCW: A Bibliography. Milton Keynes: Open University, 1991. Lee, C. (1994). PC tongsin i chongsonyondul ui ono saenghwal e michinun yonghyang [The Influence of Computer-Mediated Communication on Teenagers]. Unpublished report submitted to the Seoul YMCA. Lee, K-m. (1963). Kugo pyogibop ui yoksajok yongu [A Study on the History of the Korean Writing System]. Seoul: Hanguk Yonguwon. Licklider, J.C.R. and R. Taylor. (1968). The computer as a communication device. Science and Technology, 76, pp. 21-31. Linell, P. and T. Luckman. (1991). Asymmetries in dialogue: some conceptual preliminaries, in Markov, I. and K. Foppa (eds.) Asymmetries of Dialogue, 1-20. Hemel Hempstead: Harvester Wheatsheaf. Lyytinen, K., Maaranen, P. and Knuuttila, J. (1994). Groups are not always the same: an analysis of group behaviours in electronic meeting systems. CSCW 2:4, pp. 261-284.
121
122
Bibliography
Reichenbach H. (1947). Token-reflexive words. In Elements of Symbolic Logic. New York: The Free Press Reid, E. (1995). Virtual Worlds: Culture and Imagination. In S. G. Jones (ed) Cybersociety: Computer-mediated communication and community, pp. 164-183. London: Sage. Rescher, N. (1973). Conceptual Idealism. Oxford: Basil Blackwell. Rescher, N. (1977). Methodological Pragmatism. Oxford: Basil Blackwell. Rheingold, H. (1992). A Slice of Life in my Virtual Community http://condorito.metro.msus.edu/sliceoflife.html (accessed 1 May 1997) Rowntree, D. (1990). Teaching Through Self-Instruction. London: Kogan Page. Rubinstein, J. (1973). City Police. New York: Farrar, Straus and Giroux. Sacks, H. (1992). Harvey Sacks Lectures on Conversation 1964-1972, edited by G. Jefferson. Oxford: Blackwell. Sacks, H., Schegloff, E. and G. Jefferson. (1974). A simpliest systematics for the organization of Turn-Taking in conversation. Language, 50, pp. 697-735. Sampson, G. (1985). Writings Systems. Stanford: Stanford University Press. Schutz, A. (1962). Collected Papers. Vol. 1. Den Hague: Martinus Nijhoff. Scott, B. (1999). CASTE revisited: principles of course design in a hypertext environment. In Hammond, N. (ed.), International Handbook of Learning Technology in Psychology. London: Psychology Press. Scott, B. (1993). Working with Gordon: developing and applying Conversation Theory (1968-1978). Systems Research, 10:3, pp. 167-182. Searle, J. R. (1976). A Taxonomy of Illucutionary Acts. In J. R. Searle, Expression and Meaning: Studies in the Theory of Speech Acts, pp. 1-29. Cambridge: Cambridge University Press. Sellars W. (1956). Empiricism and the Philosophy of Mind. In Herbert Feigl and Michael Scriven, eds., Minnesota Studies in the Philosophy of Science, Volume I: The Foundations of Science and the Concepts of Psychology and Psychoanalysis, pp. 253-329. University of Minnesota Press. http://csmaclab-www.uchicago.edu/philosophyProject/sellars/epm.html Shearing, C. (1974). Dial-a-cop: a study of police mobilisation. In Akers, R. and E. Sagarin (eds.) Crime Prevention and Social Control, pp. 77-88. London and New York: Praeguer Publishers. Siegal, J., Dubrovsky, V., Kiesler, S. and T. McGuire. (1986). Group processes in CMC. Organizational Behaviour and Human Decision Processes, 37, pp. 157-187. Smolensky, M. W., Carmody, M. A., and C. G. Halcomb. (1990). The influence of task type, group structure and extraversion on uninhibited speech in CMC. Computers in Human Behaviour, 6, pp. 261-272. Spearman, C. (1923). The Nature of Intelligence and the Principles of Cognition. London: Macmillan. Spears, R., Lea, M. and S. Lee. (1990). De-individuation and group polarisation in CMC. British Journal of Social Psychology, 29, pp. 121-134. Sperber, D. and D. Wilson. (1991). Loose Talk. In S. Davis (ed.), Pragmatics, a Reader, 550-563, New York: Oxford University Press. Sperber, D. and D. Wilson. (1986). Relevance: Communication and Cognition. Oxford: Blackwell. Sproull, L. and S. Kiesler. (1991). Connections: New Ways of Working in the Networked Organization. London: MIT Press. Steele, G. L. (1983). The Hackers Dictionary. New York: Harper and Row. Stone, A. R. (1991). Will the real body please stand up? Boundary stories about virtual cultures. In M. Benedickt (ed.), Cyberspace, pp. 81-118. Cambridge: MIT Press. Strawson, P. F. (1992). Analysis and Metaphysics. London: Oxford University Press. Swales, J. (1990). Genre Analysis. Cambridge: C.U.P. Tajfel, H. (1981). Human Groups and Social Categories. Cambridge: Cambridge University Press.
123
124
intellect
BOOKS
www.intellectbooks.com