[WLANnews] Links or it didn't happen!

Hirschgott hirschgott at unkonstruktiv.de
Do Jan 3 15:48:31 CET 2013


Hallo Liste,

eine schöne Studie zum Thema Anonymität im Netz wird im sehr
empfehlenswerten Buch "HCI Remixed" zitiert.

----- cut -----
Example 1: Anonymity
In Murray Turoff’s conferencing systems, participants could choose a pen
name, use their real name, or decide to be anonymous. Hiltz and Turoff
wrote, “The motivation of the sender of an anonymous message or
conference comment is self-protection. However, anonymity can have some
very important social consequences for the groups. As [one of our
conferences] points out . . . the use of anonymity can promote
interaction, objectivity, and problem solving . . . e.g., one would not
have to worry about unpopular ideas, etc.”
(p. 95). These observations led us to ask in our 1982 grant proposal
whether “anonymity caused by difficulty in [identifying] speakers, poor
resolution of physical detail, and use of ‘alias’ options, might prove
significant in affective responses,” and we raised the matter again in
our American Psychologist paper (Kiesler, Siegler, and McGuire 1984).
Anonymity later became a primary factor in SIDE theory (Postmes et al.
2005).
----- cut -----
Turoff, M. 1972. Delphi Conferencing: Computer-Based Conferencing with
Anonymity.
Technological Forecasting and Social Change, 3, 159–204.

----- cut -----
“Beyond Being There” eventually challenged researchers to design
communication tools that contribute added value to face-to-face
interactions. This challenge essentially revisits ideas previously
articulated by Vannevar Bush (1945), Douglas Engelbart (1962), J. C. R.
Licklider (1960), Marshall McLuhan (1994), Ted Nelson (1974), and other
proponents of computation as a means to augment human performance. Like
those researchers, Hollan and Stornetta were interested in designing
tools to extend human communication capacities rather than to replace
face-to-face interactions.
More specifically, Hollan and Stornetta argued that the ways
computational media support asynchronous, anonymous, and automatically
archived communications could provide interactions superior to F2F.
----- cut -----


Mehr Informationen über die Mailingliste WLANnews