Wednesday, February 4, 2009

Conceptual Research and Reflection Project

The Internet and World Wide Web are networks and spaces with no clear boundaries (Parker, 2009) - where the faces and personalities of users are relatively hidden behind computer screens and firewalls – and yet they are possibly the fastest growing areas in modern communication.

By referring to the
NET11 Concepts document (Allen.n.d.), even novice internet users should be able to approach the set tasks with confidence.

Listed below, are four concepts that are vital to any internet communications journey.
_______________________________________
Concept 7: Netiquette

“...users must themselves contribute to the proper functioning of the Internet as a communication system that no-one is in ‘charge’ of the net and we all must exercise an ethic of maintenance, taking responsibility for doing it ‘right’." (Allen, n.d.)

"Good communication practice on the internet is not something one ‘learns’, but something one ‘practices’ so as to teach others, less familiar than yourself, how it is done." (Allen, n.d.)

"Netiquette seems to apply almost entirely to communication: email, online chat, and so on...[however]...A poorly designed website doesn’t do more than prompt us to move on to the next one.” (Allen, n. d.)

Definition, Discussion and Reflection

The extended quote above (Allen,n.d.) can be shortened to just a few words: 'contribute responsibly', 'practice', and 'review' - all recommended actions for an active internet user.

Netiquette is a contraction of the words ‘network’ and ‘etiquette’ and relates to unwritten rules of conduct while communicating online (Shea, 1990-2006). There are no 'laws' defining online behaviour, in the same sense as there are written
'laws' (CALC, 2009) for public conduct.

As the other person is usually not visible, netiquette is indispensable in online communication (Concept 8, Allen, n.d.). There may also be a delay between when the message was sent and when it gets read. (Concept 1, Allen, n.d.).

Signs that help facilitate face-to-face communication like facial expression, gestures, posture, and vocalisations, are absent in plain text (Shea, 1990-2006).
Practicing netiquette can assist to overcome the lack of cues which could cause conflict through ambiguity (Turnage, 2007).

The Webster Dictionary Online defines
'Netiquette' as “conventions of politeness on 'Usenet', a ‘world-wide distributed discussion system’(IA, 2008) such as refraining from advertising your business while posting in a non-business forum, or not posting the same message across different forums (Parker, 2009)."
In her book Netiquette, Shea (1990-2006) lists behavioural rules to follow such as treat others the same way you want them to treat you, respect other people's time and bandwidth, respect other people's privacy, don't use capitals, if you wouldn't do it offline - don't do it online, and be forgiving of other people's mistakes.

Netiquette, however has a much broader application than just Usenet (Shea 1990-2006). It applies to personal communications like email, chat, Twitter; larger group connections like discussion boards, and even to global Web pages, where asking questions without first checking to see if they were previously asked in the FAQ section, is considered rude (Golladay, 1998). In fact, all of the curriculum tasks for NET11 have needed some form of internet communication process, so observing netiquette continues to be vital.

Some of the areas where different netiquette conventions were found include ICQ chat (2009)and Twitter short messaging (2009).

On ICQ chat, @ means you are directing your message to a particular person. This is also used on Twitter, which uses other conventions, like shortened URL's (2009) to keep messages under the 140 character limit. It is also polite to 'Direct' (private message) a new follower to say 'thanks for the follow'. A Twictionary (2009) was also found, which gave a list of some words used only on Twitter, like Twittiquette, or Twitter etiquette.

Checking the screen prior to entering a message in chat programs, helps the conversation to remain on the same topic until everyone has added their thoughts - a challenge when there is a large group of people participating.

Email messaging (iOM, 2009) the most popular form of internet communication, as a system of communication between two computers, was developed by Ray Tomlinson in October 1971 (BBC, 2001).

Since 1971, the growth of the internet and World Wide Web has improved the speed of communication worldwide, but has also given rise to conflict (Turnage, 2007), especially from negative behaviours like 'flaming' (Shea, 2006). This is largely due to the fact that visual, auditory and other cues are missing.

The phenomenal growth of online communication and the lack of standard written laws have meant that users need to ensure they are contributing responsibly, practicing, and always reviewing before they press the 'Enter' key.

(Total 547 words:disregards references in brackets)

Annotations
Title 1:


Shea, Virginia (1990-2006) Netiquette. Albion Books.

Site:
http://www.albion.com/netiquette/book/index.html

Although originally written in 1990 and not peer-reviewed, the basic communication concepts in Netiquette, are still applicable today.


The main appeal of the book is that
Shea (a Princeton graduate who has held an IT job in Silicon Valley since 1980) clearly and simply states everyday, commonsense rules and courtesies that are easy to follow and put into practice.

If a handbook were given with the purchase of a computer/internet connection bundle, Netiquette would be a great choice.

As Guy Kawasaki wrote in the Foreword there are plenty of other books, but if you want to read original content and not rehashed downloads, this is it!

(97 words)

Title 2:

Turnage, A. K. (2007). Email flaming behaviours and organizational conflict. Journal of Computer-Mediated Communication, 13 (1), article 3.

Site: http://jcmc.indiana.edu/vol13/issue1/turnage.html

In this article Turnage (2007) explored whether the 'flaming' or 'bad' netiquette behaviour (excessive use of CAPITALS, exclamation marks!!! and question marks???) described in literature was still considered flaming, by asking participants to assess messages typically found in emails.

Turnage highlighted the potential damage that can occur in communication particularly with reference to workplace and organizational conflict, as a result of plain text messages that include excessive use of 'flaming' symbols and gave recommendations for good email communication practices.

Published in 2007, this article contains current content, addresses pertinent issues, is peer-reviewed, and contributes to good email communication practice and netiquette in general.

(103 words)

_______________________________________

Concept 8: The Invisibility of Difference
Two quotes with slightly differing aspects:
“The daily practice of electronic communication is shaped by over-familiarity with one’s own computer system, and a tendency to assume that...everyone is operating within compatible and similar systems.” (Allen. n.d.)

“All forms of internet communication are affected to some degree by the invisibility of difference...Advanced internet users are mindful of the way in which communications lose some or much of their original context...” (Allen.n.d)

Definition, Discussion and Reflection

The Invisibility of Difference refers to the responsibility which all internet users have, of making sure that the content they produce is not only accessible to everyone (or specific Web users if it is a private communication), but in a broader sense that it also helps to facilitate a supportive online community.

Two aspects of the ‘Invisibility of Difference’ are explored briefly in the above quotes (Allen, n. d.), both of which are extremely important in terms of ensuring accessibility.

Firstly, communication on the internet has an ‘unknown’ aspect, hence the term ‘invisibility’.

Correspondence we send may appear very different to the recipient, as a result of varying computer configurations (OSU, 2008), internet capabilities (YC, 2008), software used, and even the length of time between dispatch and receipt of a message.

A good example of software differences is that for Macquarie University and Curtin University courses through Open Universities Australia , assignments are generally submitted using Microsoft Word 1997-2003 as an email attachment. This is despite the fact that new computers are loaded with newer software. It is, however, a responsible measure to ensure that no students are disadvantaged as a result of their personal resources.

Each person also has different life experiences, so no two people will see the world with exactly the same view. It is important to remember that the recipients of internet communications do not share the same personal life experiences as the sender (despite original content remaining the same) so aspects like context and intention may not transfer with the document (Wenz, 2008).

Secondly, it is important to ensure that communications are as straightforward as possible, to prepare for and counter ambiguity and context dissipation.

The World Wide Web Consortium (W3C) is an organisation that develops guidelines, software, specifications, and tools to help guide the web to its full potenetial and ensure longevity.

"The social value of the Web is that it enables human communication, commerce, and opportunities to share knowledge. One of W3C's primary goals is to make these benefits available to all people, whatever their hardware, software, network infrastructure, native language, culture, geographical location, or physical or mental ability." ( W3C, 2007)

The most important aspect of the quote above, is that while the Web facilitates communication, commerce and sharing, it would not be possible without some form of consensus in application design (Head, 1999) and engineering - which, along with providing accessibility to all regardless of race, creed, ability, culture, language, or location, are the primary goals of the W3C (W3C, 2007).

Moss (2005) argues that the W3C, far from being inclusive, are actually distancing the users that they proudly claim to be involving, through their recommendations to provide links to text-only Web pages (for users who cannot access a page with images and alternative text with captions). He claims that this practice is akin to providing a separate side-entrance to premises that have unaccessible main entrances (eg stairs). Instead of including, it is alienating.

'Invisibility of Difference' therefore relates to the total inclusion of all Web users. It is the responsibility of every individual, from the general public to internet media producers, to ensure that their Web communications are accessible to other users and produced with an ethical identity that strives to recognize, challenge and promote a supportive online community (Beaudoin, 2009).

(500 words)
Annotations
Title 1:

Moss, Trenton. The case against text-only Web (February 7, 2005). Retrieved February 4, 2009, from Computer User

Site 1:
http://www.computeruser.com/articles/daily/8,10,1,0207,05.html

W3C urges web designers to ensure that their pages can be accessed by all people (by adding things like written tags to represent images), enabling text-readers to announce what each picture represents.

However Moss claims that W3C recommend that a text-only version of the page also be added and that this defeats the initial purpose of the W3C standards.


Moss believes that W3C is relevant for all internet users, not just those with impairments. Any changes to this equality are detrimental to some people.

The article is not peer-reviewed, referring to Trenton Moss as president of Webcredible, a business specialising in Web usability and accessibility.

(105 words)

Title 2:

Beaudoin, Dr Beau Basel. (2009) Columbia College, Chicago. 'Culture, Race and Media Course', Department of Television and Media. Retrieved February 5, 2009.

Site 2:

http://www.cultureraceandmedia.com/mod/resource/view.php?id=14

Despite being an overview of a university course which covers all forms of media, the value in this site is that it acknowledges the pervasiveness of all media including internet content.

The 'Course Objectives' outline six points that are imperative for an informed understanding of culture, race, disability and other pertinent issues.

The Columbia College Faculty aim to nurture their students to respect, recognize, challenge and improve the images of minority and disadvantaged community groups. This enables graduates to promote and foster a supportive community through the production of media that is sensitive to issues, responsible and aware.

(98 words)

________________________________________

Concept 19: Public and Private
“All public asynchronous conversations carry with them private sub-texts and possibilities...very often we forget the extent of our audience...[and]...We focus on the individual or individuals with whom we are directly communicating and...As a result, discussions can become too narrowly focused, or too personally contextualised, thus alienating other(s)...” (Allen,n.d.)


Discussion and Reflection
Originally relating to
email lists, this concept applied to discussions posted on the NET11 WebCt Board, and refers to the nature of communication on a forum. Discussion boards and public forums, are not the place for messages that could be construed as private in nature.
'Concept 19:Public and Private' also relates to 'Concept 7:Netiquette'. Both state that internet users should adhere to some form of regulation to avoid potentially offending others.

Perhaps due to the NET11 course being wholly online, the nature of discussions has sometimes approached that of private discourse.

Suler (2004) coined a phrase for this behaviour: 'the online disinhibition effect', or the tendency of some people to engage in behaviours while online, that they would not display offline.

Concern voiced (Message 2069) by one student on the WebCt after messages (Module2: Chat Task ‘Social Anxiety’ Thread, January 15, 2009 Message 1962), in particular Message 2052,had been posted.

Debate surrounding which messages have inappropriate content is multi-layered and depends largely on the circumstances.

If the WebCt forum had worldwide distribution, then perhaps private content would be better sent directly to the recipient. The context of private details being promoted on a world stage can be completely acceptable but depends upon the site used. One example of a Web site where the author clearly steps outside conventional boundaries, is maddox.xmission.com.

Lange (2007) conducted an ethnographic study on the development of relationships on popular social networking site (SNS) YouTube. She discovered that there were two main types of active members. 'Publicly private' members (openly shared their identity but not videos), and 'privately public' members (shared their videos but kept personal details private).

In the NET11 example given earlier, the nature of the offending 'private postings' on WebCt was more akin to team-building exercises - usually part of any effort to build the morale of co-workers or in this case, students.

Effective communication with peers, requires a caring, safe environment where the individual is respected, encouraged and fostered (Himmelstein, 2009). The 'Social Anxiety' thread is just one of many instances where students in NET11 felt comfortable to share personal problems, believing that they would be supported - and they definitely were.

An unfortunate side-effect of posting private content in a public forum is the case of Heather Armstrong. Armstrong posted what she claimed were 'caricature sketches' of her co-workers onto her online public journal, Dooce. One year after the commencement of her entries, she was fired for the content of that blog (Waters, 2005). Her employers decided to 'protect the integrity of their brand and trade secrets', leading to the ultimate question of what is deemed appropriate or 'acceptable free speech in the workplace'? (Fletcher, 2008:10)

Despite never mentioning her co-workers or company by name, Armstrong chose a highly public forum rather that a personal diary in which to post her private reflections (Fletcher, 2008:38), meaning there was every chance her written words would come back to haunt her (Fletcher, 2008:9).

Knowing when and how to communicate is a large part of participating on the Web. No manual dictates global internet behaviour. There will always be variations to what is appropriate due to personal experience.

Web users need to be respectful and responsible in their interactions. This concept could be simplified to read "online behaviour should remain responsibly within respectful boundaries".

(550 words)

Annotations

Title 1: 'The Best Page in the Universe'

Site 1: http://maddox.xmission.com/

This page is possibly the most politically incorrect page on the Web. The author, who does not identify his name, has written article after article about themes that most people would never say let alone write - and on a public forum that is accessible to everyone including children.

Perhaps the most intriguing thing about this Web site is not so much the content on the front page, but the links (eg email me, FAQ etc) that just lead to alternate pages describing how great the owner is and how unfortunate (although more descriptive words are used) the rest of mankind is, that they are not.

(105 words)

Title 2:

Lange, P.G. (2007) 'Publicly private and privately public: Social networking on YouTube', Journal of Computer-Mediated Communication, 13(1), article 18.

Site 2: http://jcmc.indiana.edu/vol13/issue1/lange.html

This peer-reviewed article examines relationships on the social networking site You Tube.

Of special interest to Concept 19, are some of the behaviours which users of this site exhibit when sharing video files.

It was found that some You Tube users were happy to share their videos but not their identity. Lange labelled these social networkers 'privately public', whereas the sharing of profiles but not of videos was referred to as 'publicly private' (Lange, 2007:1).

Lange also refers (2007:4) to literature where some scholars suggest that it is the growth in communication technologies that is starting to erode the traditional boundaries between 'public' and 'private'.

(93 words)

_________________________________________

Concept 26: Privacy and Security
“The internet’s great strength is its openness. It would not flourish, nor work efficiently, if it did not encourage people to share material, and to identify themselves for the purposes of networking people as well as computers. However, as a consequence, internet users are vulnerable to various threats...carefully guarding...personal data...only give out personal information when absolutely necessary.” (Allen,n.d.)

Discussion and Reflection

The area of internet privacy and security is one that is increasingly being publicized due to unfortunate incidents like Online banking scams and identity theft. Social networking sites appear to have been the latest targets.

Recent attacks reported to the Better Business Bureau(BBB, 2009) in the USA, detail how scams and frauds have been operating on social networking sites by taking over the identity of a registered user.

Privacy and security incorporates many levels of Web usage.

The most important thing to remember is to guard your personal details!

This is as simple as not sharing passwords, addresses, phone numbers, personal account numbers, especially on public forums. If an email message is received asking for sensitive information, it is best to speak with an employee of that company in person. For example, if a bank contacts you by email - it is best to verify the query first at your local branch. If the query is from someone you don't know, report it. There are many 'Banking Scams' that look genuine but are not.

There are many unscrupulous people who try to take advantage of the open nature of the World Wide Web, and there have been some quite unfortunate incidents.

Security scams including the recent conviction of two Queensland men over a Nigerian oil industry scam, have netted the fraudsters in excess of $4.3 million.

Some internet fraudsters send out professional-looking emails, like this one which the Australian Tax Office was alerted to.

A good preventative rule, is to try and divide your email inbox to divert suspected spam mail to a separate folder. Yahoo! has a blog that details the changes you can make to your Yahoo! email account. Other email providers have similar sites set up.

It is also important to have a good virus software program installed on your computer, as well as a spyware remover. This should prevent the majority of unsavoury and spam mail from reaching you and potentially destroying your computer.

It is important to realise that no security software will be impervious to threat 100% of the time, because as the programs get better, the amount of fraudulent activity will increase and also improve. Just recently, the new Windows 7 operating software was found to have security risks (Winder, 2009).

More and more options continue to be available to the general public through the World Wide Web.

The unfortunate side-effect of increased internet traffic, phenomenally fast and powerful computer hardware, and the improvement of software programs is that fraud and unscrupulous people also increase their knowledge and become more technologically advanced.

Put simply, it needs to be a priority to safe-guard personal details and invest in good computer protection software to ensure that time spent on the internet is not an invitation for thieves to walk into your privacy and take over your life.

(472 words)

Annotations

Title 1: <www.terror.net>: How Modern Terrorism Uses the Internet

Site 1: http://www.usip.org/pubs/specialreports/sr116.html

The United States Institute of Peace wrote a review of this book in March 2006.

It lists fascinating details about how, even back in 1998, approximately half of the USA designated 'Foreign Terrorist Organisations" had fully functioning Web Sites.

The book continues, by stating that unfortunately, the agencies that deal with these issues have been focussing on the over-rated cyber-terrorism and cyber-warfare threat aspects of these sites and have largely ignored the numerous other uses that terrorists make of the internet on a daily basis. These uses include:

"...psychological warfare and propaganda to highly instrumental uses such as fundraising, recruitment, data mining, and coordination of actions..."

It's time to think of better ways to defend the free speech of peaceful internet-using citizens, without violating their privacy, while still developing an awareness of and increased vigilance for, the uses that terror agencies have on the internet.

(145 words)

Title 2: Public Key Infrastructure

Site2:http://www.packtpub.com/article/public-key-infrastructure-pki-other-concepts-cryptography-cissp

This site looks at ways to encrypt information sent over the internet so that is not understandable. This process is cryptography: the art and science of "transforming plaintext to scrambled text and vice versa" (Srinisavan, 2009).

Public Key Infrastructure, or PKI, provides a way for information to be sent over the internet that assures integrity, confidentiality, authentication and non-repudiation (Srinivasan, 2009).

Non-repudiation is the security measure used in PKI where verification of message delivery and receipt is made through the use of a 'Time Stamp'. The Time Stamp is a trail, useful for auditors (Srinivasan, 2009).

This is similar to the method used by all the Open University Tertiary partners, to verify that an electronic submission has been made (ie Assignment).

The author of this article is a CEO, Trainer, specialist in IT (Internet Technology) and IS (internet Security) who is leading the world from his Indian home base.

(149 words)

_______________________________

Despite the vastness of the World Wide Web and the speed with which the area of communications technology is progressing, there are still basic tenets that, despite the lack of one cohesive manual of standards, apply to behaviour while online.

The thirty-three concepts from the NET11 course (Allen, n.d.) are a wonderful tool for a new internet user to read, reflect about and put into practice.

Overall, communication on the internet needs to observe levels of decency (netiquette), be aware that all internet users will differ with regard to experiences, computer configurations and ability levels (Invisibility of difference), be aware of when and where to speak publicly or privately (public and private), protect their life and be aware of scamming (privacy and security).

If internet users approach their time on the World Wide Web with caution, their time will be more enjoyable and they will learn more.

_____________________________________

Bibliography
Allen, Matthew (n.d.) NET11: Internet Communications Concepts Document, Retrieved December 10, 2008, from Curtin University, http://webct.curtin.edu.au/SCRIPT/305033_b/scripts/serve_home

Armstrong, H. (2009) dooce.com Retrieved February 5, 2009, from http://www.dooce.com/about

Australian Bankers Association (ABS, 2009), Scams and Swindlers, Security and Fraud Prevention, Retrieved February 5, 2009, from http://www.bankers.asn.au/default.aspx?ArticleID=980

Australian Bureau of Statistics (ABS). (2007-2008) 8146.0 Household Use of Information Technology, Australia, 2007-08 (No. 8146.0) Latest ISSUE Released at 11:30 AM (CANBERRA TIME) 18/12/2008. Canberra, Australian Capital Territory: Author. Retrieved February 4, 2009, from
http://www.abs.gov.au/ausstats/abs@.nsf/mediareleasesbyCatalogue/180CCDDCB50AFA02CA257522001A3F4B?Opendocument

Australian Competition and Consumer Commission (ACCC, 2009), Banking and Online Scams, Scam Watch. Retrieved February 4, 2009, from http://www.scamwatch.gov.au/content/index.phtml/tag/BankingOnlineAccountScams

Australian Government Attorney General's Department (AGAGD, 2004), ID Theft - A kit to prevent and respond to identity theft, Crime Prevention, National Crime Prevention Programme. Retrieved February 4, 2009, from http://www.ag.gov.au/agd/WWW/ncphome.nsf/D2801B61EABE80A2CA256809001328BA/41EA80A3A81A49D8CA256E1A0002A738

Australian Government: Australian Communications and Media Authority (ACMA, 2009), January 2009 Australian Taxation Office Warning of Tax Refund Scam, Current Scams - Spam and eSecurity, Retrieved February 6, 2009, from http://www.acma.gov.au/WEB/STANDARD/pc=PC_310566

BBCNews: In Depth: dotlife (BBC, 2001), Happy Birthday To You (October 8, 2001). Retrieved February 4, 2009, from
http://news.bbc.co.uk/2/hi/in_depth/sci_tech/2000/dot_life/1586229.stm

Beaudoin, B. B. (2009) 'Culture, Race and Media Course', Department of Television and Media. Columbia College of Chicago. Retrieved February 5, 2009, from
http://www.cultureraceandmedia.com/mod/resource/view.php?id=14

Berners-Lee, Tim. (2009) World Wide Web Consortium-Leading the Web to its Full Potential. Retrieved January 9, 2009, from http://www.w3.org/

Berners-Lee, Tim. (2007) Global Focus. Retrieved January 9, 2009, from, http://www.w3.org/2005/02/W3C-Global-Focus.html

Blood, R. (2005) Heather Armstrong: Bloggers on Blogging, Rebecca's Pocket, Retrieved January 20, 2009, from http://www.rebeccablood.net/bloggerson/heatherarmstrong.html

cnet Download.com (July 15, 2000) Microsoft Office 1997 Standard Edition Free Download. Retrieved February 5, 2009, from http://www.download.com/Microsoft-Office-97-Standard-Edition/3000-2075_4-10947654.html

Commonwealth of Australia Library of Congress (CALC, 2009), Guide to Law Online: Australia, Retrieved February 4, 2009, http://www.loc.gov/law/help/guide/nations/australia.php

Curtin University (2009) Retrieved January 15, 2009, from http://webct.curtin.edu.au/SCRIPT/305033_b/scripts/student/serve_bulletin?COMPILETHREAD+1962

Daniel, Philip D. (2008) Internet Smiley Face Guide. Retrieved January 20, 2009, from http://www.newbie.net/SmileyFAQ/index.html

Fairfax Newspapers (4.03pm, January 7, 2009), Australians charged in Nigerian Scam, The Age Newspaper, Retrieved February 5, 2009, from http://www.theage.com.au/news/technology/security/australians-charged-in-nigerian-scam/2009/01/07/1231004089791.html

Fletcher, P. (2008) Blogging ourselves into subjection: A Foucauldian analysis of the dismissal of Heather Armstrong. Honours Thesis. Curtin University of Technology. Retrieved February 6, 2009, from The agonistic blogger. http://therealestatemarketingmaven.com/wp-content/uploads/2009/02/thesis.pdf

Golladay, G. J. et al (1998) Current Concepts Review - Internet Resources for Orthopaedic Surgeons: Netiquette page 4. Journal of Bone and Joint Surgery 80:1525-32 (1998). Retrieved January 20, 2009, from Google Scholar http://www.ejbjs.org/cgi/content/full/80/10/1525

Head, Alison J. (1999)Websites for Users With Disabilities Design Evaluation Checklist. Retrieved January 9, 2009, from http://www.metromemetics.com/theexcerpts/013001_disability.asp

Himmelstein, A. (2009) Best Communication: A Key to Growing Your Business. The Alternative Board-Scotsdale. Retrieved February 6, 2009, from http://www.tab-scottsdale.com/tabscottsdale/2008/12/better-communication-a-key-to-growing-your-business.html

ICQ Chat, Retrieved January 2, 2009, from http://www.icq.com/

ihotdesk Online Magazine(iOM, 2009), Email: most popular form of communication (June 5, 2008). Retrieved February 4, 2009, from
http://www.ihotdesk.com/article/18626486/%60Email%20most%20popular%20form%20of%20communication%60

Internet RFC/FYI/STD/BCP Archives (IA). (2008) Frequently asked Questions,
Retrieved February 4, 2009, from
http://www.faqs.org/faqs/usenet/what-is/part1/

Lange, P.G. (2007) 'Publicly private and privately public: Social networking on YouTube', Journal of Computer-Mediated Communication, 13(1), article 18. http://jcmc.indiana.edu/vol13/issue1/lange.html

Maddox.xmission.com (1997) The Best Page in the Universe. Retrieved January 31, 2009, from http://maddox.xmission.com/

Moss, Trenton. (2005) The case-against a text-only Web. ComputerUser. Retrieved February 5, 2009, from http://www.computeruser.com/articles/daily/8,10,1,0207,05.html

Ohio State University (OSU, March 31, 2008),Minimum and Recommended Computer Configurations, Retrieved February 5, 2009, from http://8help.osu.edu/918.html

Parker, Philip M. (2009) Webster's Online Dictionary, Retrieved January 20, 2009 from
http://www.websters-online-dictionary.org/

Queensland State Government. Email Lists. Retrieved January 20, 2009, from http://lists.dpi.qld.gov.au/

<scambusters.org> The Five Most Common Social Networking Scams. Retrieved February 6, 2009, from http://www.scambusters.org/socialnetworking.html

Shea, Virginia (1990-2006) Netiquette. Albion Books. Retrieved January 20, 2009, from http://www.albion.com/netiquette/book/index.html

Srinivasan, M. L. (2009) Public Key Infrastructure Retrieved February 6, 2009, from http://www.packtpub.com/article/public-key-infrastructure-pki-other-concepts-cryptography-cissp

Suler, John. (2004) The Online Disinhibition Effect, CyberPsychology & Behaviour. Volume 7, Number 3, 2004. C. Mary Ann Leibert Inc. http://www-usr.rider.edu/~suler/psycyber/disinhibit.html

Top Ten Reviews (2009) Anti-Spyware Software. Retrieved February 6, 2009, from http://anti-spyware-review.toptenreviews.com/

Top Ten Reviews (2009) Anti-Virus Software. Retrieved February 6, 2009, from http://anti-virus-software-review.toptenreviews.com/

Top Ten Reviews (2009) Social Networking Sites. Retrieved February 6, 2009, from http://social-networking-websites-review.toptenreviews.com/

Turnage, A. K. (2007). Email flaming behaviours and organizational conflict. Journal of Computer-Mediated Communication, 13 (1), article 3.
Retrieved January 20, 2009, from
http://jcmc.indiana.edu/vol13/issue1/turnage.html

Twictionary (2009). PBwiki.com. Retrieved February 2, 2009, from http://twictionary.pbwiki.com/FrontPage&saved=1

Twitter Short Messaging (2009). Twitter.com.Retrieved January 28, 2009, from http://twitter.com/TessaG

Waters, D. (2005) Digital Citizens: The Blogger. BBC NEWS Entertainment Retrieved February 4, 2009, from BBC News, http://news.bbc.co.uk/2/hi/entertainment/4683815.stm

<wbztv.com> (January 13, 2009) BBB Warns of Dangerous Social Networking Scams. CBS News Corporation. Retrieved February 5, 2009, from http://wbztv.com/consumer/technology/facebook.online.scams.2.906953.html

Weiman, G. (2004) www.terror.net: How Modern Terrorism Uses the Internet. Retrieved January 9, 2009, from http://www.usip.org/pubs/specialreports/sr116.html

Wenz, K. (2008)Cybertextspace: Conceptualization. University of Kassel. Retrieved December 9, 2008, from Curtin University http://www.cyberartsweb.org/cpace/ht/wenz/conceptualization.html

Winder, D.Microsoft Admits it Messed up Windows 7 Security Retrieved February 6, 2009, from http://www.itwire.com/content/view/23084/1231/

Yahoo! (2009) Retrieved February 6, 2009, from http://au.overview.mail.yahoo.com/

Yahoo! blog (2009) Retrieved February 6, 2009, from http://www.ymailau.com/

Yahoo! email accounts (2009) Retrieved February 6, 2009, from http://au.overview.mail.yahoo.com/products/compare

yourcompare.com.au (YC, 2008) Broadband Guide Internet Plan Finder Retrieved February 5, 2009, from http://broadbandguide.com.au/choice

_______________________________