Podcasting and Really Simple Syndication (RSS)

Author(s):  
Anna C. McFadden

The simple nature of podcasting and Really Simple Syndication (RSS) belies the power for change embodied in them, either singly or in tandem. On the surface, podcasting is merely the recording of an audio file in MP3 format for sharing on the Internet, an MP3 player or some other device; this chapter covers the history and technical aspects of that process. Podcasting and the RSS feeds that keep consumers of podcasting connected to the source are examined as part of a larger movement in computer mediated collaboration that centers on mobility, immediacy, and interactivity. Podcasting, as a personal tool or an organizationally managed one is examined in terms of types of podcasts, their current applications and future trends that can be anticipated in their use..

2018 ◽  
Vol 17 (2) ◽  
pp. 169
Author(s):  
Aceng Ruhendi Saifullah

Dalam dekade terakhir, kajian tentang  relasi bahasa, media, dan teknologi komunikasi telah menjadi kajian lintas disiplin yang menarik  perhatian para ahli dari berbagai disiplin ilmu. Lebih khusus, dalam kaitannya dengan kajian wacana  di Internet, penggunaan bahasa di Internet  dipandang sebagai pertanda lahirnya “new genre” sekaligus sebagai the state of the art dalam kajian wacana, yang dikenal sebagai kajian computer mediated discourse analysis (CMDA).  Dalam konteks perkembangan itu, kajian ini dimaksudkan untuk merumuskan model  analisis relasi bahasa dan Internet berbasis CMDA. Pertanyaannya, “sejauh mana paradigma CMDA  dapat dirumuskan sebagai model pengembangan analisis relasi bahasa dan Internet. Kajian ini menemukan, bahwa ragam bahasa di Internet tidak sepenuhnya menunjukkan ciri-ciri ragam tulis, akan tetapi cenderung menunjukkan ciri-ciri “ragam lisan yang dituliskan”. Di samping itu, ditemukan pula, bahwa konteks media dan konteks situasi komunikasi tampak berpengaruh secara signifikan dalam menentukan makna suatu tuturan di Internet.  Dengan demikian, paradigma CMDA dalam kajian wacana di Internet tampak relevan digunakan, terutama untuk mengindentifikasi ragam bahasa dan makna tuturan di Internet.Kata kunci: konteks media; konteks situasi komunikasi; Internet; computer mediated discourse analysis (CMDA)In the last decade, the study of language relations, media, and communications technology has become an interdisciplinary study that attracts the attention of experts from various disciplines. More specifically, in relation to the study of discourse on the Internet, the use of language on the Internet is seen as a sign of the birth of "new genre" as well as the state of the art in discourse studies, known as computer mediated discourse analysis (CMDA). In the context of this development, this study is intended to formulate models of analysis of language and Internet relationships based on CMDA. The question centers on the extent to which the CMDA paradigm can be formulated as a model for the development of language and Internet relation analysis. This study reveals that the variety of languages on the Internet does not fully show the characteristics of writing, but tends to show the characteristics of "written verbal". In addition, the analysis showed that the context of the media and the context of the communication situation seemed to have a significant effect on determining the meaning of a speech on the Internet. Thus, the CMDA paradigm in the study of discourse on the Internet seems relevant to use, especially to identify the variety of languages and meanings of speech on the Internet.Keywords: media context; context of communication situation; Internet; computer mediated discourse analysis (CMDA)


2013 ◽  
pp. 198-223
Author(s):  
Darren D. Chadwick ◽  
Chris Fullwood ◽  
Caroline J. Wesson

This chapter provides insight into the nature of online engagement by people with intellectual disabilities, the extent and quality of this engagement in terms of the access that people have, and how people with intellectual disabilities present themselves in the online world. The authors of this chapter provide an overview of the extant literature on intellectual disability, identity, and the Internet. The chapter begins by outlining issues around Internet use and access by people with intellectual disabilities, including potential barriers. It then moves on to address online behaviour and the potential benefits of Internet use for people with intellectual disabilities. The chief focus of the chapter follows, describing the manner in which computer mediated communication affects how people with intellectual disabilities present themselves in the online world as well as considering the role that family members and supporters play in the development and management of people’s online identities. Finally, the chapter introduces future directions for research into intellectual disability, identity, and the Internet.


Author(s):  
Helen Joanne Wall ◽  
Linda K. Kaye

The growth in computer-mediated communication has created real challenges for society; in particular, the internet has become an important resource for “convincing” or persuading a person to make a decision. From a cybersecurity perspective, online attempts to persuade someone to make a decision has implications for the radicalisation of individuals. This chapter reviews multiple definitions and theories relating to decision making to consider the applicability of these to online decision making in areas such as buying behaviour, social engineering, and radicalisation. Research investigating online decision making is outlined and the point is made that research examining online research has a different focus than research exploring online decision making. The chapter concludes with some key questions for scholars and practitioners. In particular, it is noted that online decision making cannot be explained by one single model, as none is sufficient in its own capacity to underpin all forms of online behaviour.


2012 ◽  
pp. 944-959 ◽  
Author(s):  
Stepan Konecny

Mass media often presents a warped image of the Internet as an unreliable environment in which nobody can be trusted. In this entry, the authors describe lying on the Internet both in the context of lying in the real world and with respect to the special properties of computer-mediated communication (CMC). They deal with the most frequent motives for lying online, such as increasing one’s attractiveness or experimenting with identities. They also take into account the various environments of the Internet and their individual effects on various properties of lying. The current methods for detecting lies and the potential for future computer-linguistic analysis of hints for lying in electronic communication are also considered.


Author(s):  
Darren D. Chadwick ◽  
Chris Fullwood ◽  
Caroline J. Wesson

This chapter provides insight into the nature of online engagement by people with intellectual disabilities, the extent and quality of this engagement in terms of the access that people have, and how people with intellectual disabilities present themselves in the online world. The authors of this chapter provide an overview of the extant literature on intellectual disability, identity, and the Internet. The chapter begins by outlining issues around Internet use and access by people with intellectual disabilities, including potential barriers. It then moves on to address online behaviour and the potential benefits of Internet use for people with intellectual disabilities. The chief focus of the chapter follows, describing the manner in which computer mediated communication affects how people with intellectual disabilities present themselves in the online world as well as considering the role that family members and supporters play in the development and management of people’s online identities. Finally, the chapter introduces future directions for research into intellectual disability, identity, and the Internet.


Author(s):  
Robert Andrew Dunn

Modern identity has been shaped by technology, which has in turn shaped theories in understanding identity. How one communicates who they are to others is given limitless possibilities by the advent of the Internet and computer-mediated environments. Thus, identity theory today must take into account computer-mediated communication theory and research. Such research indicates four ways in which identity is affected by technology. First, researchers have discussed the differences between an individual’s true identity and the virtual identity he or she presents, via self-selected text and images, to an online world. Second, researchers have discussed how the Internet can provide both protective anonymity for those who seek it and cathartic disclosure for those who need it. Third, researchers have discussed ways in which users pursue both reflective virtual lives online and role-play with identities, often multiple identities. Fourth, researchers have conducted experiments that reflect the impact that virtual identity has on the practice of communication and the impact communication has on the presentation of the self.


Author(s):  
Muhammad Yaasir Khodabacchus

In our global community, the Internet, the issue of copyright is increasing. The International Maritime Bureau (IMB) reported over thousands of incidents this year compared to three hundred only ten years ago. Although laws and other ways have been intended to protect the rights of content developers and describe restrictions that can be placed on copying materials, pirate users always find a way to breach the protection. Base on this fact, a new method has been implemented using biometrics as it is described in the following chapters. This paper was developed taking into consideration one of the most widely used biometrics which is the fingerprint. Precisely, the aim of the system includes embedding the fingerprint into an audio file which can only be read using the fingerprint of the registered user.


Author(s):  
Aminu Bello Usman ◽  
Jairo A. Gutierrez ◽  
Abdullahi Baffa Bichi

The internet of things (IoT) is expected to influence both architecture and infrastructure of current and future smart cities vision. Thus, the requirement and effectiveness of making cities smarter demands suitable provision of secure and efficient communication networks between IoT networking devices. Trust-based routing protocols play an important role in IoT for secure information exchange and communications between IoT networking elements. Thus, this chapter presents the foundation of trust-based protocols from social science to IoT for secure smart city environments. The chapter outlines and discusses the key ideas, notions, and theories that may help the reader to understand the current status and the possible future trends of trust-based protocols in IoT networks for smart cities. The chapter also discusses the implications, requirements, and future research challenges of trust-based protocols in IoT for smart cities.


2010 ◽  
pp. 1771-1779
Author(s):  
Karen S. Nantz ◽  
Norman A. Garrett

Education over the Internet is going to be so big it is going to make e-mail usage look like a rounding error. John Chambers, Cisco Systems, New York Times, November 17, 1990 Web-based courses (Mesher, 1999) are defined as those where the entire course is taken on the Internet. In some courses, there may be an initial meeting for orientation. Proctored exams may also be given, either from the source of the Web-based course or off-site at a testing facility. The Internet-based course becomes a virtual classroom with a syllabus, course materials, chat space, discussion list, and e-mail services (Resmer, 1999). Navarro (2000) provides a further definition: a fully interactive, multimedia approach. Current figures indicate that 12% of Internet users in the United States use the Internet to take an online course for credit toward a degree of some kind (Horrigan, 2006). That number is indicative of the rapid proliferation of online courses over the past several years. The Web-enhanced course is a blend with the components of the traditional class while making some course materials available on a Web site, such as course syllabi, assignments, data files, and test reviews. Additional elements of a Web-enhanced course can include online testing, a course listserver, instructor-student e-mail, collaborative activities using RSS feeds and related technologies, and other activities on the Internet. One of the biggest concerns about Web-based courses is that users will become socially isolated. The Pew Internet and America Life Project found that online communities provide a vibrant social community (Horrigan, Rainie, & Fox, 2001). Clearly, students are not concerned or feel that other benefits outweigh the potential drawbacks. According to government research (Waits and Lewis, 2003), during the 2000-2001 academic year alone, an estimated 118,100 different credit courses were offered via distance education (with the bulk of that using Internet-based methods) by 2- and 4-year institutions in the United States. Over 3 million students were registered in these courses. Navarro (2000) suggests that faculty members are far more likely to start by incorporating Internet components into a traditional course rather than directly offering Web-based courses. These Web-enhanced courses might be considered the transition phase to the new paradigm of Internet-based courses. Rich learning environments are being created, with a shift from single tools to the use of multiple online tools, both to enhance traditional courses and to better facilitate online courses (Teles, 2002).


Author(s):  
Michael Derntl

Blogs are an easy-to-use, free alternative to classic means of computer-mediated communication. Moreover, they are authentically aligned with web activity patterns of today’s students. The body of studies on integrating and implementing blogs in various educational settings has grown rapidly recently; however, it is often difficult to distill practical advice from these studies since the application contexts, pedagogical objectives, and research methodology differ greatly. This paper takes a step toward an improved understanding of employing blogs in education by presenting a follow-up case study on using blogs as reflective journals in an undergraduate computer-science lab course. This study includes lessons learned and adaptations following from the first-time application, the underlying pedagogical strategy, and a detailed analysis and discussion of blogging activity data obtained from RSS feeds and LMS logs.


Sign in / Sign up

Export Citation Format

Share Document