2. Online Communication Tools: Online Communication Refers to Communication Via Networked Computers

Total Page:16

File Type:pdf, Size:1020Kb

2. Online Communication Tools: Online Communication Refers to Communication Via Networked Computers Online Communication tools 2. Online Communication tools: Online communication refers to communication via networked computers. It encompasses synchronous communication (communication in real time via chat with all participants at their computers at the same time); asynchronous communication (communication in a delayed fashion by computer, such as e-mail); and the reading and writing of online documents via the World Wide Web. Online communication is a new phenomenon, having first come into existence toward the end of the 20th century. It is growing at one of the fastest rates of any new form of communication in human history. Online communication represents the most important development in human communication. The tools or ways used to communicate through internet are as follows: 2.1 Electronic Mail: Electronic mail (email or e-mail) is a method of exchanging digital messages from an author to one or more recipients. Modern email operates across the Internet or other computer networks. Email systems are based on a store-and-forward model. Email servers accept, forward, deliver and store messages. Neither the users nor their computers are required to be online simultaneously; they need connection only, typically to an email server, for as long as it takes to send or receive messages. 2.1.1 Internet E-mail services There are two ways to get e-mail over the Internet. One is by using an e-mail client program installed in the user's computer, and the other is Web-based e-mail accessible from a Web browser. Very often, mail can be sent and received on the same service via both e-mail client programs and web browsers. 1) The email client program- Tied to Computer: The use of a mail program installed in the user's computer, such as Outlook, is often richer in features than web-based mail called an "e-mail client," 2) Web-based E-Mail - From Any Computer: Web e-mail means to use the program you have to browse it on the internet. The term also refers to a web e-mail service that is provided by a web e-mail provider for example Yahoo, Hotmail, and Gmail. The advantage of a webmail client is that you can access it anywhere where there is internet and you only need to browse the URL. Internet - A new era of Communication Page 5 Online Communication tools 2.1.2 E-mail address An email address identifies an email box to which email messages are delivered. For example; [email protected], [email protected], [email protected] Email address has three parts, which are as follows; 1) User name: The first part is your username. You set up the username with your internet provider or e-mail service. It might be a form of your name or your nickname. Your service provider (Yahoo, Gmail) makes sure no one else on their system already has that name. 2) @ sign: The second part of your e-mail address is @ (at) symbol. 3) Domain part: The domain name appears after @ symbol and identifies the internet domain that handles your email. It can be further broken down into two parts: the name of the server that handles the e-mail (yahoo or hotmail) and the top-level domain, often "com," "gov" or "edu," which stand for commercial business, government agency and educational institution, respectively. 2.1.3 Parts of an e-mail message A basic email message is made up of seven parts. 1) Recipient¶s E-mail address: The first thing in composing an email is the recipient's address. This is entered before composing the body of the email. This field is usually found in one of the spaces above the message. When sending a message to multiple recipients, be sure to separate all addresses with a comma. 2) Cc and Bcc: Another option when sending a message to multiple recipients is to use the Carbon copy, and Blind carbon copy fields. When using the Cc feature, all recipients can see the email Internet - A new era of Communication Page 6 Online Communication tools addresses of everyone the message was sent to. If you want your communication to be more private, choose the Bcc and the identities of the other recipients will not be shown. 3) Date and Time Stamp: The date and time is usually included automatically somewhere in the message. 4) Subject Line: The subject line is the first part of email that the recipient will see. When entering the subject line be sure to include important information such as what the email is about. If you don't include any subject line, your message could be mistaken for spam and deleted without being read. 5) Body: The body is where you actually write the message. Message can be anything from a professional memo or a letter to friend or family member. Try to avoid writing too much. If you have a lot of information that needs to be sent includes it as an attached file. 6) Attachments: Attachments are similar to enclosures in traditional mail. If you have files that you want to share with your recipient's you can include them as attachments to the email. 7) Signature: Some email systems allow you to enter a signature that will appear automatically at the bottom of every message you send. This feature is optional. 2.1.4 Advantages of Email in Business The advantages of email in business can be seen in small and large organizations. 1) Rapid Communication: Email communications blaze through the internet with amazing speed. This speed allows businesses to work at a faster pace and communicate more effectively. Email can also be used to rapidly disseminate information to multiple employees at the same time. 2) Decreased Cost: The biggest business advantage of using email is the cost savings. The overhead to maintain an email system is relatively low. Small businesses can utilize free online email Internet - A new era of Communication Page 7 Online Communication tools services for no cost beyond their computer and internet connection expenses. The decreased costs for businesses can be seen in their postage usage, telephony expenses and even travel expenses. 3) Data Transfer: Before email was available, the transfer of data was a time consuming and tedious task. Information was stored in large files or in large documents and then shipped to the place where data was needed. Now data transfer can occur rapidly, with little down time on information. 4) Security: Email is a more secure method of communication than letters or faxes. Letters or faxes can be intercepted fairly easily at a business since a physical movement of the information must occur. Emails can create a record of the information in a safe environment that is easily backed up for future use. 5) Marketing: Email marketing allows a business to reach customers in a more economical manner. Marketing and advertisements can be sent to a customer or a group of potential customers. This speedy dissemination of marketing materials increases sales and decreases the time between the start of a marketing campaign and customer purchases. 2.2 Online Chat: The expression online chat comes from the word chat which means "informal conversation´. Online chat refers to communication over the Internet that offers an instantaneous transmission of text-based messages from sender to receiver; hence the delay for visual access to the sent message shall not hamper the flow of communications in any of the directions. Online chat may address as well point-to-point communications as well as multicast communications from one sender to many receivers. 2.2.1 Types of online Chat There are two types of online chat 1) Web Based Chat room: The web based chat rooms (chat room or group chat) are actually virtual forums which allow the messages to be written and read by all of the individuals that exist in the Internet - A new era of Communication Page 8 Online Communication tools internet room. Web-based chat rooms can be located throughout the internet on pages such as fan club websites, online gaming sites and personal websites, among others. Individuals can discuss a variety of topics, including computers, games, movies, music. Many popular search engines have their own chat platform and can be run under most operating systems, provided that the software that allows you to communicate with others in the chat room has been installed. Advantages and Benefits of Chat room: Chat rooms have been shown to have many benefits to different people since their inception. y Privacy is one of the most important advantages of chat rooms. You don't have to reveal your identity to others because you can use any available user name. Also, chat rooms are a place where people can judge you on thoughts and ideas rather than appearance. y Chat rooms provide relaxed discussion in a stress-free environment. A person can find people all over the world to discuss subjects without being judged on how they look. A chat room with someone watching over the conversation and halting any harassment is a great way for individuals to connect without fear and let their beliefs is discussed openly. y The chat room has been a way of creating study groups without the hassle of actually getting together. Entire classes can meet in a chat while sharing notes, discussing topics and giving opinions the may have held back in class for lack of time. 2) Real Time Chat: Real-time chat or instant messaging offers users the ability to communicate in real time with individuals who have been added to a ³buddy´ list.
Recommended publications
  • Flashback As a Rhetorical Online Battleground
    http://www.diva-portal.org This is the published version of a paper published in Social Media + Society. Citation for the original published paper (version of record): Blomberg, H., Stier, J. (2019) Flashback as a rhetorical online battleground: Debating the (dis)guise of the Nordic Resistance Movement Social Media + Society https://doi.org/10.1177/2056305118823336 Access to the published version may require subscription. N.B. When citing this work, cite the original published paper. Permanent link to this version: http://urn.kb.se/resolve?urn=urn:nbn:se:du-29134 SMSXXX10.1177/2056305118823336Social Media <span class="symbol" cstyle="Mathematical">+</span> SocietyBlomberg and Stier 823336research-article20192019 Article Social Media + Society January-March 2019: 1 –10 Flashback as a Rhetorical Online © The Author(s) 2019 Article reuse guidelines: sagepub.com/journals-permissions Battleground: Debating the (Dis)guise DOI:https://doi.org/10.1177/2056305118823336 10.1177/2056305118823336 of the Nordic Resistance Movement journals.sagepub.com/home/sms Helena Blomberg1 and Jonas Stier2 Abstract The right-wing Swedish Nordic Resistance Movement (NRM) is increasingly active on social media. Using discursive psychology, this text explores the rhetorical organization of text and rhetorical resources used on the Swedish online forum Flashback. The aim is to reveal and problematize truth claims about NRM made by antagonists and protagonists. Questions are (1) how and what do NRM antagonists and protagonists convey in Flashback posts about NRM, and its ideology and members? (2) how do NRM antagonists and protagonists make truth claims about NRM in Flashback posts? The empirical material consisting of 1546 Flashback posts analyzed to identify typical discussions on “NMR’s true nature”; accomplished social actions stemming from the posts.
    [Show full text]
  • Monitoring of Online Offenders by Researchers
    SGOC STUDYING GROUP ON ORGANISED CRIME https://sgocnet.org Sifting through the Net: Monitoring of Online Offenders by Researchers Research note Sifting through the Net: Monitoring of Online Offenders by Researchers David Décary-Hétu and Judith Aldridge* Abstract: Criminologists have traditionally used official records, interviews, surveys, and observation to gather data on offenders. Over the past two decades, more and more illegal activities have been conducted on or facilitated by the Internet. This shift towards the virtual is important for criminologists as traces of offenders’ activities can be accessed and monitored, given the right tools and techniques. This paper will discuss three techniques that can be used by criminologists looking to gather data on offenders who operate online: 1) mirroring, which takes a static image of an online resource like websites or forums; 2) monitoring, which involves an on- going observation of static and dynamic resources like websites and forums but also online marketplaces and chat rooms and; 3) leaks, which involve downloading of data placed online by offenders or left by them unwittingly. This paper will focus on how these tools can be developed by social scientists, drawing in part on our experience developing a tool to monitor online drug “cryptomarkets” like Silk Road and its successors. Special attention will be given to the challenges that researchers may face when developing their own custom tool, as well as the ethical considerations that arise from the automatic collection of data online. Keywords: Cybercrime – Internet research methods – Crawler – Cryptomarkets avid e cary- e tu is Assistant Professor at the School of Criminology, University of Montreal, and Researcher at the International Centre of Comparative Criminology (ICCC).
    [Show full text]
  • 3.3.5.Haulath.Pdf
    CONTENTS SL. PAGE NO. ARTICLE NO 1 DATA PRE-PROCESSING FOR EFFECTIVE INTRUSION DETECTION RIYAD AM 5 2. AN ENHANCED AUTHENTICATION SYSTEM USING MULTIMODAL BIOMETRICS MOHAMED BASHEER. K.P DR.T. ABDUL RAZAK 9 6. GRADIENT FEATURE EXTRACTION USING FOR MALAYALAM PALM LEAF DOCUMENT IMAGEGEENA K.P 19 7. INTERNET ADDICTION JESNA K 23 8. VANETS AND ITS APPLICATION: PRESENT AND FUTURE.JISHA K 26 9. DISTRIBUTED OPERATING SYSTEM AND AMOEBAKHAIRUNNISA K 30 5. INDIVIDUAL SOCIAL MEDIA USAGE POLICY: ORGANIZATION INFORMATION SECURITY THROUGH DATA MINING REJEESH.E1, MOHAMED JAMSHAD K2, ANUPAMA M3 34 3. APPLICATION OF DATA MINING TECHNIQUES ON NETWORK SECURITY O.JAMSHEELA 38 4. SECURITY PRIVACY AND TRUST IN SOCIAL MEDIAMS HAULATH K 43 10. SECURITY AND PRIVACY ISSUES AND SOLUTIONS FOR WIRELESS SYSTEM NETWORKS (WSN) AND RFID RESHMA M SHABEER THIRUVAKALATHIL 45 11. ARTIFICIAL INTELLIGENCE IN CYBER DEFENSESHAMEE AKTHAR. K. ASKARALI. K.T 51 SECURITY PRIVACY AND TRUST IN SOCIAL MEDIA Haulath K, Assistant professor, Department of Computer Science, EMEA College, Kondotty. [email protected] Abstract— Channels social interactions using 2. Social Blogs extremely accessible and scalable publishing A blog (a truncation of the expression weblog) is a methods over the internet. Connecting individuals, discussion or informational site published on communities, organization. Exchange of idea Sharing the World Wide Web consisting of discrete entries message and collaboration through security privacy (“posts”) typically displayed in reverse chronological and trust. order (the most recent post appears first). Until 2009, Classification of Social Media blogs were usually the work of a single individual, occasionally of a small group, and often covered a 1.
    [Show full text]
  • The Blogging Artist: a Genre-Analysis Approach
    Tarih Kültür ve Sanat Ara ştırmaları Dergisi (ISSN: 2147-0626) Journal of History Culture and Art Research Vol. 2, No. 2, June 2013 Revue des Recherches en Histoire Culture et Art Copyright © Karabuk University http://kutaksam.karabuk.edu.tr/index.php اث ار وا وا Özel Sayı/Special Issue (English Studies ) DOI: 10.7596/taksad.v2i2.220 The Blogging Artist: a Genre-Analysis Approach ∗ Anda-Elena Cre ţiu ∗∗ Abstract Building on the now classic approaches to Discourse Analysis offered by Swales and Bhatia, the present paper tries to establish the benefits and value of applying the method of Genre Analysis to teaching English for Art Purposes, with a focus on a more recent Internet genre, that of the artist’s blog (weblog). The artist’s blog is seen as part of the greater genre of the weblog, which has already been classified into a number of subgenres. The paper proposes yet another dimension to be added to those already considered when classifying the weblogs: the dimension of “occupational-oriented content” as a descriptive for further classifications; it also tries to uncover the generic features of this type of discourse. The ultimate aim of this study is, on the one hand, that of providing art students with the necessary know-how of using the weblog genre for their current and future professional purposes, as part of the complex system of genres devised by the artistic discourse community in order to communicate both within and without itself, and, on the other hand, to help students use their knowledge of the English language to create such a discourse type in order to obtain maximum benefits.
    [Show full text]
  • The Internet Is a Semicommons
    GRIMMELMANN_10_04_29_APPROVED_PAGINATED 4/29/2010 11:26 PM THE INTERNET IS A SEMICOMMONS James Grimmelmann* I. INTRODUCTION As my contribution to this Symposium on David Post’s In Search of Jefferson’s Moose1 and Jonathan Zittrain’s The Future of the Internet,2 I’d like to take up a question with which both books are obsessed: what makes the Internet work? Post’s answer is that the Internet is uniquely Jeffersonian; it embodies a civic ideal of bottom-up democracy3 and an intellectual ideal of generous curiosity.4 Zittrain’s answer is that the Internet is uniquely generative; it enables its users to experiment with new uses and then share their innovations with each other.5 Both books tell a story about how the combination of individual freedom and a cooperative ethos have driven the Internet’s astonishing growth. In that spirit, I’d like to suggest a third reason that the Internet works: it gets the property boundaries right. Specifically, I see the Internet as a particularly striking example of what property theorist Henry Smith has named a semicommons.6 It mixes private property in individual computers and network links with a commons in the communications that flow * Associate Professor, New York Law School. My thanks for their comments to Jack Balkin, Shyam Balganesh, Aislinn Black, Anne Chen, Matt Haughey, Amy Kapczynski, David Krinsky, Jonathon Penney, Chris Riley, Henry Smith, Jessamyn West, and Steven Wu. I presented earlier versions of this essay at the Commons Theory Workshop for Young Scholars (Max Planck Institute for the Study of Collective Goods), the 2007 IP Scholars conference, the 2007 Telecommunications Policy Research Conference, and the December 2009 Symposium at Fordham Law School on David Post’s and Jonathan Zittrain’s books.
    [Show full text]
  • AI – ARTISTIC INTELLIGENCE? MACHINE and ARTIST COLLABORATE THROUGH AI March 14
    1 Get creative Vocabulary Creativity; copying Grammar Past perfect simple and past perfect continuous Reading A blog Listening A podcast Speaking Discussing a problem Writing A review Presentations Using visuals Creativity is intelligence having fun. (Albert Einstein) What does the quote mean? Do you agree with it? Do you think intelligence and creativity are closely connected? Vocabulary Creativity 1 Read the text. Do you use any of the strategies in How to be the text? Do you use any other strategies when you’re thinking of new ideas? more creative 2 Match the meaning of the phrases in bold to the GET TIRED: A psychological study by Mareike Wieth words in blue in the text. and Rose Zacks found that the best ideas often 1 In the next 15 years, people could have their brains emerge when you’re feeling tired, and daydreaming zapped to make them more creative. promotes creativity. Some studies show that we are 2 Did you know that washing your hair with your eyes most productive at 2.55 pm, just after lunch, when we are feeling sleepy. So next time you get stuck, wait closed can awaken your other senses? until you’re tired – it may work for you! 3 We wanted a new idea for the design but didn’t come up with anything. Then a walk in the park inspired us. GET MOVING: The co-founder of Apple, Steve Jobs, loved taking long walks. They used to help 4 Camila dreamed of being an athlete and she him dream up new ideas for products.
    [Show full text]
  • THE SIGNIFICANCE of AVATARS for INTERNET FORUMS USERS Mikail PUŞKİN1
    Cilt: 4/Sayı: 6 Temmuz İMGELEM ISSN: 2602- 4446 2020 THE SIGNIFICANCE OF AVATARS FOR INTERNET FORUMS USERS Mikail PUŞKİN1 ABSTRACT The questions of virtual representation and online identity are growing in salience for academicians ever since the inception of the Internet. Although the main flow of public online interaction and research into it have shifted towards social networks such as Facebook, Twitter and Instagram, or audio-visual environments of digital games, online forums still occupy a sizable niche for thematic and more professional or hobby-oriented communication. Current paper is analyzing one of the main visual elements used to create identity of forum users, the avatars: small (usually static) images that users choose to represent their virtual selves with. The focus of this research is on the degree of attachment and the kinds of meanings that users attribute to their avatars in online forums’ asynchronous interactive environments. This research applies grounded theory approach and relies heavily on triangulation of data collection and coding. The implemented sampling strategies are typical case sampling on the forums selection level, criterion sampling on the respondents’ replies level and subsequent diversity case sampling as means of collected data reduction. Coding procedures are applied consecutively as follows: open coding, selective coding, theoretical coding, resulting in 29 sets of data produced from 75 pages of raw data. The main findings suggest that key factor determining users’ attitude towards their avatars is the forum thematic. As a result, although overall attitude patterns diversity is rather high, such patterns are consistent and stable within the specific microcosms of individual forums.
    [Show full text]
  • Management Policies and Procedures
    MANAGEMENT POLICIES AND PROCEDURES Social Media Communications Number: 212 Approved by: Donna Dreska, City Manager Effective Date: 12-02-2010 Page 1 of 14 I. PURPOSE The purpose of this policy is to provide uniform guidelines by which information regarding City activities, issues, initiatives, and policies will be disseminated using social media tools; to provide guidance for employee use of social media; to outline the City’s policy for assessing and managing comments and replies posted on City of Reno social media assets; to provide guidance on the use of linked websites; and to describe the procedures for retaining records of social media posts. II. REVISION HISTORY 12-02-10 Adopted III. REFERENCES The procedures outlined in Section VIII, Paragraph B in policy number 104, “Workplace Monitoring,” apply to the activities described in this policy. Both the “Computer Usage” (303) and the “Electronic Data Transmission” policies (304) apply to the following, in their entirety. The definition of “Internet,” Item VI (E) in policy number 304, is construed to include all social networking tools as described below. Activities described below will also be held to the standards of policy 306 “Website Protocol,” as they apply to social media assets, which will be considered an extension of the City’s website for this purpose. Information released under this policy must conform to “Media Communications and Release of Public Information” policy number 201. All City communications, including those related to social media, should be developed within the guidelines in the current Strategic Communications Plan. The City’s current Crisis Communications Procedures and Emergency Communications Procedures supersede the procedures described herein, when appropriate.
    [Show full text]
  • A Study of Internet Based Community Interactions
    Virtual Online Communities: A Study of Internet Based Community Interactions A dissertation presented to the faculty of the Scripps College of Communication of Ohio University In partial fulfillment of the requirements for the degree Doctor of Philosophy Adrian M. Budiman August 2008 This dissertation titled Virtual Communities Online: A Study of Internet Based Community Interactions by ADRIAN M. BUDIMAN has been approved for the School of Media Arts and Studies and the Scripps College of Communication by Drew McDaniel Professor of Telecommunications Gregory J. Shepherd Dean, Scripps College of Communication ii Abstract BUDIMAN, ADRIAN M., Ph.D., August 2008, Mass Communication Virtual Online Communities: A Study of Internet Based Community Interactions (167 pp.) Director of Dissertation: Drew McDaniel The aim of this research was to better understand virtual online communities (VOCs), that is, communities that are formed and maintained through the Internet. This research was guided by four research questions: What do participants in VOCs actually seek? How does a participant critically evaluate information produced in VOCs? What differences do VOC members perceive between their online community experiences compared to their experiences in real-life face-to-face communities? In what ways might a VOC shape its members’ views toward political and social change? The methodology employed was participant observation of 20 informants within their online and offline realms plus in-depth interviews with each informant. Interviews and observations were conducted from 2005 – 2007. This research identified two different types of VOCs: dependent and self- contained VOCs. Dependent VOCs act as extensions to already existent face-to-face communities while self-sustained VOCs are communities where relationships between members are formed, developed, and nurtured purely through virtual encounters on the Internet based on shared interests.
    [Show full text]
  • Dowthwaite, Liz (2018) Crowdfunding Webcomics
    CROWDFUNDING WEBCOMICS: THE ROLE OF INCENTIVES AND RECIPROCITY IN MONETISING FREE CONTENT Liz Dowthwaite Thesis submitted to the University of Nottingham for the degree of Doctor of Philosophy September 2017 Liz Dowthwaite Crowdfunding Webcomics: The Role of Incentives and Reciprocity in Monetising Free Content Thesis submitted to the School of Engineering, University of Nottingham, in partial fulfilment of the requirements for the degree of Doctor of Philosophy. © September 2017 Supervisors: Robert J Houghton Alexa Spence Richard Mortier i To my parents, and James. ii Doug Savage, 2007 http://www.savagechickens.com/2007/05/morgan-freeman.html “They’re not paying for the content. They’re paying for the people.” Jack Conte, founder of Patreon “We ascribe to the idealistic notion that audiences don’t pay for things because they’re forced to, but because they care about the stuff that they love and want it to continue to grow.” Hank Green, founder of Subbable iii CROWDFUNDING WEBCOMICS – LIZ DOWTHWAITE – AUGUST 2017 ABSTRACT The recent phenomenon of internet-based crowdfunding has enabled the creators of new products and media to share and finance their work via networks of fans and similarly-minded people instead of having to rely on established corporate intermediaries and traditional business models. This thesis examines how the creators of free content, specifically webcomics, are able to monetise their work and find financial success through crowdfunding and what factors, social and psychological, support this process. Consistent with crowdfunding being both a large-scale social process yet based on the interactions of individuals (albeit en mass), this topic was explored at both micro- and macro-level combining methods from individual interviews through to mass scraping of data and large-scale questionnaires.
    [Show full text]
  • How to Have Computer
    MANKATO COMPUTER TECHNOLOGY UNIVERSITY FINDING FUN ON YOUR COMPUTER Watching Videos and Listening to Music. Playing Games. HOW TO HAVE Finding Random Fun Stuff. COMPUTER Learning Something New. FUN Using Social Networking. Having Fun Without the Internet. Exploring Computers as a Hobby. If you're in the mood for instant entertainment, look no further than your computer. HOW TO HAVE No matter what you like to do for fun, you've got endless options. COMPUTER Have computer fun by checking out new games, chatting with your friends, learning something new, exploring computers as a hobby, FUN watching funny videos or even creating your own content to share. As long as your computer works, you'll never have to be bored again. WATCHING VIDEOS AND LISTENING TO MUSIC WATCH ORIGINAL CONTENT ON YOUTUBE. • YouTube has videos of anything you'd like to see, from silly videos of cats making weird noises to footage of the Apollo Mission. • Search for a topic you're into or check out a popular channel and subscribe. • YouTube is also a great way to check out music videos. Search for your favorite songs, artists, and albums to check out their corresponding visuals. • If you're into gaming, check out YouTube Gaming at https://gaming.youtube.com. Here you'll find gaming-specific content, including live streams of gamers playing your favorite titles. MAKE YOUR OWN YOUTUBE VIDEO. • Want to go viral? A great way to have fun on the computer is making your own videos and putting them online. Here are some video ideas to get you started: Start vlogging.
    [Show full text]
  • Parenting and Digital Media : from the Early Web to Contemporary Digital
    Research Publication Collection Faculty of Arts & Design 2016 Peer Reviewed Journal Article Citation: Lupton, D., Pedersen, S., and Thomas, G. M. (2016) Parenting and Digital Media: From the Early Web to Contemporary Digital Society. Sociology Compass, 10: 730–743. doi: 10.1111/soc4.12398 Find this item Copyright: ©2016 Wiley-Blackwell Version: This is the peer reviewed version of this article which has been published in final form in Sociology Compass at https://doi.org/10.1111/soc4.12398. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Self-Archiving. Changes resulting from the publishing process may not be reflected in this document. Parenting and Digital Media: From the Early Web to Contemporary Digital Society Deborah Lupton, News & Media Research Centre, Faculty of Arts & Design, University of Canberra, Australia Sarah Pedersen, Department of Communication, Marketing and Media, Aberdeen Business School, Robert Gordon University, UK Gareth M Thomas, School of Social Sciences, Cardiff University, UK This is a post-print (accepted author’s version) of an article published in Sociology Compass (2016), 10(8), 730—743. Abstract Parents have accessed websites, online discussion forums and blogs for advice, information and support since the early days of the World Wide Web. In this article, we review the literature in sociology and related social research addressing the ways in which digital media have been used for parenting-related purposes. We begin with the longer-established media of parenting websites, online discussion forums, blogs, email, mobile phones and message and video services and then move on to the newer technologies of social media and apps.
    [Show full text]