Journalism Essay, Research Paper
The following paper was recently presented by Kamlesh Ramji
VIRTUAL COMMUNITIES IN JAPAN
1. Abstract
In recent years, virtual communities have proliferated thanks to the converging technologies of telecommunications and computing. In the United States, numerous virtual communities exist in the form of bulletin boards, newsgroups, computer conferencing, etc. and have been expanding
its scope beyond the national boundaries. But, those virtual communities
originating in the United States carry heavy American-biased culture which
members often take for granted because of the long history of domination
in developing computer networks by American organizations. As examples
of alternative virtual cultures, this paper presents major virtual
communities in Japan which originated in Japan and mainly sustained by
people in Japan.
2. Introduction and Background
The convergence of telecommunication and computer technologies has enabled
networking of people regardless of their geographical and temporal
differences. The scope of such computer networks has been expanding
exponentially since the first extensive comp uter network, ARPANET, was
created in 1968 by the Advanced Research Projects Agency of the U.S.
Department of Defense (now DARPA, the Defense Advanced Research Projects
Agency). Now its successor, Internet, comprises 1.7 million computers in
more than 1 25 countries (Stix, 1993); most of them at universities,
government agencies and companies. As such computer networks have
expanded beyond the small communities of scientific researchers and been
applied in a variety of fields such as education and busin ess,
communication through such computer networks is beginning to alter the
ways in which people interact with one another in formal and informal
ways.
2.1. Computer-Mediated Communication (CMC)
The term, computer-mediated communication (CMC) or computer-based
communication, encompasses: computer networks, electronic mail, electronic
bulletin boards service (BBS), and computer conferencing. CMC has been
fairly well studied in educational setting s, as a supplemental to
traditional classroom teaching or as a deliverly mode of distance
education because of its distinct characteristics which make it different
from any other media. Poster (1990) notes that CMC substitutes writing
for spoken conversa tions and extends the domain of writing to cover areas
of communication that previously were limited to face-to-face
interactions, mail, and the telephone.
CMC, up to now, is mainly limited to textual communication where most of
the social cues are stripped off. People only see text on the computer
screen in standardized formats which contains no dynamic personal
information such as tones of one’s voice or
undescrivable facial expressions. ‘Phatic’ aspects of the face-to-face
conversation are minimal in CMC, which sometimes exacerbates communication
anxiety when the sender gets no reply (Feenberg, 1989).
The advantage of such text-based communication is that it reduces
discriminatory communication patterns based on physical and social cues
such as gender, race, socio-economic status, physical features, etc., and
enhances the interaction with one another.
As a result, CMC destabilizes existing hierarchies in relationships and
rehierarchize communications according to criteria that were previously
irrelevant (Poster, 1990). The text-based communication also augments the
interaction with ideas generated t hrough discussions. In CMC, people
tend to focus on the message more than the messenger, and the availability
of an archived transcript of the proceedings facilitates review of
previous comments and discussion, focusing on important ideas and
concepts.
Another important aspect of this standardized texual communication is an
individual’s great control of his/her self image presented to other
people. In most cases, the only identity an individual user has is a
“handle” name which may be, and most often is expected to be, fictional.
Anonymity is complete and identity is fictionalized in the structure of
the communication. Poster (1990) contends that “computer conversations
construct a new configuration of the process of self-constitution.”
Communicate rs can compose themselves as characters in the process of
writing, inventing themselves from their feelings, their needs, their
ideas, their desires, their social position, their political views, their
economic circumstances, their family situation – thei r entire humanity.
In this sense, CMC is used for what Morioka (1993) calls “ishiki tsushin
(conscious communication)”. “Ishiki tsushin”, according to Morioka, is
the communication for the purpose of social interaction itself, which is
distinguised from “joho tsushin (info rmation communication)”. Goffman
(1959) argued that individuals deliberately “give” and inadvertently “give
off” signs that provide others with information about how to respond.
Because of its anonymous nature of CMC, communicators can manipulate image
s of themselves much better than in face-to-face situations and present
themselves anyway they want to be thought of. By doing so, people can
fulfil the unmet desire to be a person whom they want to be.
In one sense, CMC enhances the sense of personal freedom and individualism
by reducing the ‘existential’ engagement of the self in its communications
(Feenberg, 1989). On the other hand, Poster (1990) contends that the CMC
users are bounded in many ways:
first, to the new, computerized system of positioning subjects in symbolic
exchanges; second, by the prior constituting of the self, typically the
experience of that self as restricting, evoking the sense of transgression
when that self may be concealed o r suspended; finally to the language
used in the conversation, with all its semantic, ideological and cultural
specificity, a specificity which does not diminish when converted into
ASCII codes.
CMC is usually asynchronous although there are also some synchronous
applications. The advantage of asynchronous communications is that people
can read, reply or send messages at their convenience. It is not only a
matter of personal convenience; it mea ns communication crosses time as
well as space. Poster (1990) argues that CMC disperse the subject,
dislocating it temporally and spatially. CMC also has multiple-receiver
addressability. People can send a message to any number of people as long
as the receiver has access to the electronic community.
2.2. Virtual Communities
Marshall McLuhan (1964) said that the global media information networking
would make us live in a global village. Subsequently, Webber (1967)
argued the “nonplace community” which existed beyond any geographical
boundaries. According to Webber, the trad itional concept of
“communities” which is geographically bounded should be replaced by the
concept of “communities” of accessibility. Thanks to the modern
communication technologies, now communities can exist regardless of
members’ geographical locations . In Jessie Bernard’s (1973) terms, CMC
changes “the significance of space for human relationships. . . . we do
not need the concept of community at all to understand how a society
operates.” Hiltz and Turoff (1978) extends this view by saying that:
We will become the Network Nation, exchanging vast amounts of both
information and social-emotional communications with colleagues, friends,
and “strangers” who share similar interests. . . . we will become a
“global village” . . . An individual will, lit erally, be able to work,
shop, or be educated by or with persons anywhere in the nation or in the
world.
CMC builds nonplace communities of common interests, affinity, and
association. They are called “online communities”, “electronic
communities”, or “virtual communities.” Those usually exist in the forms
of online discussion groups such as those found on
the global Internet and USENET computer networks, commercial videotex
systems, and personal computer bulletin boards. Such communities are
dynamic; many people come and go at any time in the life of a community.
There are two kinds of virtual commun ities. The first one is the
community where members know one another and usually have met
face-to-face. CMC (especially electronic mail) is used mainly to maintain
their routine communication, discuss issues relevant to the members, or
collaborate on so me projects. The second category is the community where
members do not necessarily know one another, but share common interests,
value systems, or goals. CMC (especially BBS and computer conferencing)
is used mainly to exchange information and ideas. T he major differences
of such virtual communities from traditional communities are: 1) the
freedom from geographical limitation; 2) the accessibility at one’s own
convenience; 3) the retrievability of information/messages; and 4) the
limitation of communicati ve acts to textual messages.
Those communities, however, are not entirely new and completely different
from traditional communities. Morioka (1993) argues that those virtual
communities are just the geographical expansion of traditional communities
in the sense that the members of a
communitiy use CMC as a means to discuss and exchange information instead
of meeting face-to-face.
In addition to the above mentioned communities, another kind of
communities exist in computer networks, which can be called “communities
of anonymity [ tokumeisei no komyuniti]” (Morioka, 1993). These
communities of anonymity are the communities whose me mbers are anonymous
and share virtual spaces for their self-expression which may not be
possible in the situation that they have to identify themselves. In such
virtual spaces, people play whatever role they want to play, knowing other
people are also p resenting created images of themselves. In many
computer bulletin boards, it is well known that some people use opposite
sex’s handle names (i.e., a man uses a female name or a woman uses a male
name) and play the role of the opposite sex to their own. I n such
communities, people enjoy the virtual aspects of communication per se.
In summary, there are basically three kinds of virtual communities: 1) the
ones totally overlapping with physical communities; 2) the ones
overlapping with physical communities to some degree; and 3) the ones
totally separated from physical communities.
3. Computer-Mediated Communication in Japan (Pasokon-Tsushin)
Most of the computer networks in early days started in the United States. In Japan which seems to be such a technologically advanced society, the computer-mediated communication has not been as prevalent as that in the U.S. According to Hiroshi Inose, director general of the National Center for Science Information Systems, Japan’s computer networks are estimated to be lag behind those of the U.S. by about 10 years (Hamilton, 1993). There are several reasons for the unpopularity of computer-mediated communication in Japan.
First of all, in business Japanese people still tend to rely on face-to-face communication instead of doing business through some mediated communications, mainly because of the high context culture of Japan where people tend to read between lines a lot w ith the help of social cues such as facial expressions, tone of voice, the posture, etc. In addition, as most business people in Japan do not have individual offices and have no need to use e-mail to contact others in the office, LAN has not been widely implemented. It has begun to be used only recently with the “downsizing” trend.
Secondly, unlike most parts of the U.S. where local telephone charge is a flat rate regardless of the number of calls and the total communication time, Japan’s local telephone service is charged per minute. It has discouraged people to have modems at hom e.
Thirdly, there have been a negative stereotypical image about people indulging in computer communications who are pejoratively called “Otaku-zoku” meaning unsociable home-bound people.
Lastly, the majority of average Japanese have never learned to use a keyboard; in addition, unlike typing English, typing Japanese requires additional key strokes for inputting by Roma-ji which is a way of transcribing Japanese phonetically into the Lati n alphabet, selecting appropriate Kanji, and shifting the mode of characters between Hiragana and Katakana. This may be the main reason why facsimile is more common than e-mails in business communication.
In Japan, there are two distinct realms of computer-mediated communication, each of which seems to have little interest in or awareness of the other. In the following, one realm called “pasokon tsuushin” is discribed followed by the other, “Internet”, re alm.
“Pasokon tsuushin” refers to public access BBSs and commercial online services to which personal computers at home or in offices are connected. Recently, such computer networks are gaining popularity among people who are not so-called “techie” and commer cial online services such as NIFTY-Serve of Fujitsu and PC-VAN of NEC (the two biggest commercial computer networks in Japan which have about 540,000 members and 578,000 members respectively in August, 1993) are showing a tremendous growth in their memers hip. NIFTY-Serve is affiliated with CompuServe in U.S. and members of NIFTY-Serve can have access to CompuServe without any additional fees. In a similar vain PC-VAN has an affiliation with GEIS (General Electric Information Services) and members of PC- VAN can have access to GEnie.
The number of total users of computer networks in Japan is estimated to be around 1,5 to 2 millions including some overlaps in membership (Nikkei Communications, 1993). Most of the commercial computer networks had not been interconnected, but recently ma jor ones began to be interconnected through their electronic services. Now both NIFTY-Serve and PC-VAN are connected to the Internet though connection is limited to the exchange of electronic mail messages.
According to a survey of 969 users of commercial computer networks (Kawakami, et al. 1993), the largest number of people answered that the motive of using the computer network was to obtain the information they want. However, it is noticeable that a larg e number of people also listed interpersonal communication (e.g., to exchange e-mails with friends, to have discussion with those who have same interests, to find a new friend, to express his/her own opinions and ideas, to communicate anonymously, etc.) a s the motive to use computer networks.
Recently, people in business also started to utilize such commercial computer networks for the communication with their customers such as user supports and product supports.
3.1. Communication Styles in Computer Conferencing
Among many services offered in computer networks, computer conferencing such as SIG (special interest group) and Forum is the most popular and thus the most profitable service for commercial network service providers (more than 60% of the total access tim e is dedicated to such conferencing). At present the PC-VAN has about 150 such SIGs and the NIFTY-Serve has approximately 290 Forums. A Forum or a SIG is further divided into several conferences of specific topics under a general theme of a particular F orum or SIG. Most participants of the Forums or SIGs use handle names so that anonymity is maintained for those who don’t want to disclose their personal identities. Moreover, in the NIFTY-Serve there is a function called “Home Party” where members crea te their own passwords for a particular party and set up a small informal meeting place. The number of members in a Home Party ranges from a few to over 100 during the last few years.
Those SIGs and Forums are managed by so-called SYSOP (system operator) or SIGOP (special interest group operator), who usually are computer network enthusiasts and volunteer to spare their time in running the confernces. Some SIGOPs are admitted to becom e one after applying for establishing a SIG; Some are entrusted by a network operation center; and others were asked by the previous ones. Those SIGOPs sometimes appoint sub-operators and board leaders as occasion demands. Usually there is no tangible reward for being a SIGOP/SYSOP. The degree of influence a SIGOP/SYSOP has on the nature of discussion in the SIG varies.
Because commercial networks are trying to avoid cancellation of membership by users as much as possible and most SIGS and Forums are moderated by SYSOPs or SIGOPs, discussions in these SIGS and Forums maintain relatively high quality and “flaming” message s are usually elimitated.
In those Japanese online communities, people who read messages in computer conferencing but do not usually reply are called ROM (read only members) (In U.S. those are called “lurkers”.) and those who actively participate in the conferences are called RAM (random access members or radical active
members). One study showed that 83% of the people who subscribed to a conference had never “spoken” and, among those who had spoken at least once, the two-third of them had spoken less than three times (Kawakami, 1993). It is common in computer conferencing that a few people speak a
lot while a majority of people only “listen.”
Kawakami (1993) listed six reasons why ROM outnumbered RAM a great deal:
1. reluctance to speak to people whom they don’t know; 2. resistance to participate in the group which has been already formed and developed without them; 3. lack of expertise to participate and fear of being evaluated by others; 4. difficulty of deciding to what extent they should disclose themselves to others; 5. worry of not knowing how clearly they make themselves understood; and 6. fear of getting criticism from others.
It should be noted that a ROM in one conference may be a RAM in another
conference and a RAM in one conference may be a ROM in another conference;
ROM and RAM are not the labels attached to individuals but the roles in
one particular conference.
3.2. Emoticon (Emotional Icon)
Because computer-mediated communication is basically texual communication which lacks in social and nonverbal cues seen in face-to-face conversations, unintended confrontation often occurs as the result of misunderstanding. One way to lessen this problem is the use of “emoticons” or “smileys” to complement the lack of social cues in CMC. Interestingly, smileys (or emoticons) used in Japanese
computer networks are a little different from those used in American or European networks, reflecting its unique culture.
typical smileys used in typical emoticons used in
U.S./European networks Japanese networks
:^) happy face (;_;) weeping
:^( unhappy (^_^;; awkward
As you see, smileys used in U.S./European networks have to be looked at sideways while emoticons used in Japanese networks are not. According to a study of the major nationwide noncommercial computer network in Japan, JUNET, by Nojima (1993), smileys are used to show (a) an affection or (b) that it’s meant as a joke. The use of smileys to indicate a joke is also common in American/European networks, but its use to show an affection without any specific indication is unique to Japanese networks. In add ition, Nojima also pointed out that sometimes smileys are used to apologize some possible offense.
In high context cultures such as Japanese which rely heavily on contextual cues to communicate, people tend to pay special attentions to the politeness, appropriateness, the non-offensiveness, etc. even in textual computer-mediated communications. It is debatable that the use of smileys and emoticons is the best way to compensate for the lack of contexual cues; however, it is true that such smileys and emoticons are the cultural products of virtual communities.
In addition to the emoticons, a variety of colloquialism such as dialects and infant languages, or vocalization of non-verbal behaviors are being employed to convey some contextual information which is difficult to be transmitted via text only.
3.3. On-Line and Off-Line Meetings
People who get to know one another through computer networks often gather physically as well. This is called off-line meetings (or Ohumi). Usually such off-line meetings are held within a specific SIG or Forum where the dates and places are posted and m embers reply to them indicating if they’re going to attend or not. Kuroiwa (1993) points out that most of the members who attend such off-line meetings are those who are active in having chat (real-time electronic conversation) in each SIG or Forum; not necessarily active in participating in the discussion of the SIG or Forum itself. He hypothesizes that it is because off-line meetings are considered to be the extension of online chat.
Both on-line chat and off-line meetings are the communication by those who share the same virtual or physical space at a particular moment. It is different from a regular on-line discussion which is asynchronous and where spontenaity is minimal. From a business perspective, off-line meetings are considred to highten the members’ sense of belongingness to the specific SIG or Forum which holds a meeting and strongthen the cohesiveness among its members. It usually results in the overall increase of part icipation in the SIG or Forum.
However, not all kinds of Forums or SIGs are holding such off-line meetings. Those Forums or SIGs whose main purpose is to exchange information such as computer-related ones usually don’t hold any off-line meetings. On the other hand, the Forums or SIGs relating to lighter subjects such as hobby, living, music, sports, etc. tend to hold off-line meetings.
Many people who attended those off-line meetings mentioned that they did not feel like meeting another member for the first time. This tendency seems to be stronger in this kinds of off-line meetings (face-to-face meetings after participating Forums or S IGs online) than in the meetings
held after some initial telephone conversations. Kuroiwa (1993) explains that it is because in CMC people discuss topics more in depth and rather informally. Sometimes a phenomenon called “network-high” (which has been discussed in the news group, fj.soc.media, ) occurs when a newcomer to a computer conference such as a Forum or SIG becomes addicted to the conference.
4. Internet in Japan
Internet is the massive world-wide network of computers, comprising of thousands of smaller regional networks and connecting over 4 million users scattered throughout the globe . Although Internet is somewhat new in Japan, currently there are 21,252 Inte rnet hosts in Japan (Quarterman & Carl-Mitchell, 1993). Apart from the commercial networks such as the NIFTY-Serve and the PC-VAN, such Internet hosts in Japan provide academic communities with network infrastracture to facilitate collaboration and infor mation exchange among researchers and scholars. Unlike the Internet in U.S. which is gaining tremendous popularity even among those who are not within the academic communities, Internet in Japan is still somewhat limited to researchers in universities, people in research laboratories of consumer electronic or computer manufacturers, and students in computer scinece.
The advancement of Internet in Japan has been somewhat slow compared with that in the United States due to several reasons listed below.
1. Centralized computing has been dominant in Japan, used by banks, security houses and railway systems, etc., and even ministries like the Ministry of Education and the Agriculture Ministry have their own networks that are not linked to each other. 2. LAN has not been widely implemented in offices. Even those companies who have implemented LANs don’t have much interest in interconnecting with others. 3. Computer manufacturers in Japan such as IBM, Fujitsu, Hitachi, NEC, and DEC have been using proprietary network protocols, which has made internetworking difficult. 4. The TCP/IP protocol has not been recognized as a standard protocol. 5. Routers have not been readily available with support and training in the Japanese language since most routers have been developed in U.S. and their design requires detailed knowledge of a variety of protocols. 6. Postal regulation and high cost of leased lines have not encouraged personal communication on networks. NTT has been making a big effort to make ISDN a nation-wide service while keeping leased lines relatively expensive. As a result, the ISDN service is available in most cities in Japan but the cost to use leased lines has been kept high. 7. With a population largely concentrated in a few urban centers in the same time zone, not much demand for delayed network communication. 8. There have been several incompatible methods of encoding Japanese texts (a 10,000 plus character system) into computers. (This is detailed in the following section.)
4.1. Japanese Encoding Methods
As mentioned above, one of the reasons why the advancement of Internet in Japan has been somewhat slow compared with that in the United States is because of the difficulty of handling Japanese text in computer networking. Since there are different encodi ng methods (JIS, Shift-JIS, and EUC) to input Japanese as well as different character sets, it is not as simple as using the ASCII character set to exchange Japanese texts between different machines.
JIS (Japanese Industrial Standards) encoding is being used for external
information interchange (i.e., moving information between computer
systems) such as e-mail since JIS encoding is not very efficient for
internal storage or processing on computer syst ems. JIS encoding makes
use of seven-bit for representing two-byte characters and escape sequences
to switch between one-byte seven-bit ASCII and two-byte seven-bit Kanji
character modes. All the Japanese texts which are composed with encoding
methods ot her than JIS have to be converted to JIS encoding before being
sent out as e-mail (Lunde, 1993).
Another encoding method, Shift-JIS encoding, was originally developed by ASCII Corporation in collaboration with Microsoft and is widely used as the internal code for Japanese PCs and KanjiTalk (the Japanese operating system for Apple Machintosh) as well as the millions of inexpensive portable Japanese language waapuro (word processors) that have flooded the market. It is a combination of a one-byte eight-bit code and a two-byte eight-bit kanji code, and uses no escape sequences. The conversion between Shift-JIS and JIS requires a complex algorithm (Lunde, 1993).
The third encoding method, EUC (Extended UNIX Code) was developed by AT&T UNIX Pacific and is implemented as the internal code for most UNIX workstations configured to support Japanese. EUC is a two-byte eight-bit code and supports not only Japanese but multiple character sets within a single text stream. Although EUC does not make use of escape sequences as JIS does, EUC encoding is closely related to JIS encoding and conversion between EUC and JIS is easier (Lunde, 1993).
4.2. N1net
The first attempt to build a nation-wide academic network, the N1 project, was started in 1974. With the support from the Ministry of Education, three universities (Tokyo, Kyoto, and Tohoku), a common carrier (NTT), and three computer manufacturers (Hita chi, Fujitsu and NEC) participated in the project. The N1 protocol developed in the project was modeled after the ARPANET protocol. This network was the very first WAN which employed the commercial packet-switching service called DDX -P, the domestic Ja panese X.25 network started by NTT in 1980 (Ishida, 1992).
At that time, encoding Japanese texts was still difficult and the
significance of electronic mails and news exchange facilities had not been
fully realized yet. Unlike the American counterpart, the N1net was a
resource-sharing network but not an interper sonal communication network.
On the other hand, the specification of the N1 protocol has been made
public and the N1 protocol became the only network protocol in widespread
use for linking heterogeneous computers (Ishida, 1992).
4.3. JUNET
JUNET (Japanese Unix NETwork) is the first nationwide noncommercial computer network designed for e-mail/e-news exchange. It was started experimentally in October 1984 by connecting two public universities (Tokyo Institute of Technology, and Tokyo Univer sity) and one private university (Keio University) through public telephone lines (at 9600bps) with UUCP (Unix to Unix Copy) protocol. JUNET utilizes UUCP connections instead of full IP connections and its services are basically limited to news and elec tronic mail. When JUNET began, international communications had to be in English or romanized Japanese, but later Kanji support in a windowed user interface to the messaging systems was included. Since then the amount of public traffic as well as JUNET membership has increased dramatically (Shapard, 1993). Subsequently the network has expanded throug
! |
Как писать рефераты Практические рекомендации по написанию студенческих рефератов. |
! | План реферата Краткий список разделов, отражающий структура и порядок работы над будующим рефератом. |
! | Введение реферата Вводная часть работы, в которой отражается цель и обозначается список задач. |
! | Заключение реферата В заключении подводятся итоги, описывается была ли достигнута поставленная цель, каковы результаты. |
! | Оформление рефератов Методические рекомендации по грамотному оформлению работы по ГОСТ. |
→ | Виды рефератов Какими бывают рефераты по своему назначению и структуре. |