Реферат по предмету "Иностранный язык"


Journalism Essay Research Paper The following paper

Journalism Essay, Research Paper

The following paper was recently presented by Kamlesh Ramji

VIRTUAL COMMUNITIES IN JAPAN

1. Abstract

In recent years, virtual communities have proliferated thanks to the converging technologies of telecommunications and computing. In the United States, numerous virtual communities exist in the form of bulletin boards, newsgroups, computer conferencing, etc. and have been expanding

its scope beyond the national boundaries. But, those virtual communities

originating in the United States carry heavy American-biased culture which

members often take for granted because of the long history of domination

in developing computer networks by American organizations. As examples

of alternative virtual cultures, this paper presents major virtual

communities in Japan which originated in Japan and mainly sustained by

people in Japan.

2. Introduction and Background

The convergence of telecommunication and computer technologies has enabled

networking of people regardless of their geographical and temporal

differences. The scope of such computer networks has been expanding

exponentially since the first extensive comp uter network, ARPANET, was

created in 1968 by the Advanced Research Projects Agency of the U.S.

Department of Defense (now DARPA, the Defense Advanced Research Projects

Agency). Now its successor, Internet, comprises 1.7 million computers in

more than 1 25 countries (Stix, 1993); most of them at universities,

government agencies and companies. As such computer networks have

expanded beyond the small communities of scientific researchers and been

applied in a variety of fields such as education and busin ess,

communication through such computer networks is beginning to alter the

ways in which people interact with one another in formal and informal

ways.

2.1. Computer-Mediated Communication (CMC)

The term, computer-mediated communication (CMC) or computer-based

communication, encompasses: computer networks, electronic mail, electronic

bulletin boards service (BBS), and computer conferencing. CMC has been

fairly well studied in educational setting s, as a supplemental to

traditional classroom teaching or as a deliverly mode of distance

education because of its distinct characteristics which make it different

from any other media. Poster (1990) notes that CMC substitutes writing

for spoken conversa tions and extends the domain of writing to cover areas

of communication that previously were limited to face-to-face

interactions, mail, and the telephone.

CMC, up to now, is mainly limited to textual communication where most of

the social cues are stripped off. People only see text on the computer

screen in standardized formats which contains no dynamic personal

information such as tones of one’s voice or

undescrivable facial expressions. ‘Phatic’ aspects of the face-to-face

conversation are minimal in CMC, which sometimes exacerbates communication

anxiety when the sender gets no reply (Feenberg, 1989).

The advantage of such text-based communication is that it reduces

discriminatory communication patterns based on physical and social cues

such as gender, race, socio-economic status, physical features, etc., and

enhances the interaction with one another.

As a result, CMC destabilizes existing hierarchies in relationships and

rehierarchize communications according to criteria that were previously

irrelevant (Poster, 1990). The text-based communication also augments the

interaction with ideas generated t hrough discussions. In CMC, people

tend to focus on the message more than the messenger, and the availability

of an archived transcript of the proceedings facilitates review of

previous comments and discussion, focusing on important ideas and

concepts.

Another important aspect of this standardized texual communication is an

individual’s great control of his/her self image presented to other

people. In most cases, the only identity an individual user has is a

“handle” name which may be, and most often is expected to be, fictional.

Anonymity is complete and identity is fictionalized in the structure of

the communication. Poster (1990) contends that “computer conversations

construct a new configuration of the process of self-constitution.”

Communicate rs can compose themselves as characters in the process of

writing, inventing themselves from their feelings, their needs, their

ideas, their desires, their social position, their political views, their

economic circumstances, their family situation – thei r entire humanity.

In this sense, CMC is used for what Morioka (1993) calls “ishiki tsushin

(conscious communication)”. “Ishiki tsushin”, according to Morioka, is

the communication for the purpose of social interaction itself, which is

distinguised from “joho tsushin (info rmation communication)”. Goffman

(1959) argued that individuals deliberately “give” and inadvertently “give

off” signs that provide others with information about how to respond.

Because of its anonymous nature of CMC, communicators can manipulate image

s of themselves much better than in face-to-face situations and present

themselves anyway they want to be thought of. By doing so, people can

fulfil the unmet desire to be a person whom they want to be.

In one sense, CMC enhances the sense of personal freedom and individualism

by reducing the ‘existential’ engagement of the self in its communications

(Feenberg, 1989). On the other hand, Poster (1990) contends that the CMC

users are bounded in many ways:

first, to the new, computerized system of positioning subjects in symbolic

exchanges; second, by the prior constituting of the self, typically the

experience of that self as restricting, evoking the sense of transgression

when that self may be concealed o r suspended; finally to the language

used in the conversation, with all its semantic, ideological and cultural

specificity, a specificity which does not diminish when converted into

ASCII codes.

CMC is usually asynchronous although there are also some synchronous

applications. The advantage of asynchronous communications is that people

can read, reply or send messages at their convenience. It is not only a

matter of personal convenience; it mea ns communication crosses time as

well as space. Poster (1990) argues that CMC disperse the subject,

dislocating it temporally and spatially. CMC also has multiple-receiver

addressability. People can send a message to any number of people as long

as the receiver has access to the electronic community.

2.2. Virtual Communities

Marshall McLuhan (1964) said that the global media information networking

would make us live in a global village. Subsequently, Webber (1967)

argued the “nonplace community” which existed beyond any geographical

boundaries. According to Webber, the trad itional concept of

“communities” which is geographically bounded should be replaced by the

concept of “communities” of accessibility. Thanks to the modern

communication technologies, now communities can exist regardless of

members’ geographical locations . In Jessie Bernard’s (1973) terms, CMC

changes “the significance of space for human relationships. . . . we do

not need the concept of community at all to understand how a society

operates.” Hiltz and Turoff (1978) extends this view by saying that:

We will become the Network Nation, exchanging vast amounts of both

information and social-emotional communications with colleagues, friends,

and “strangers” who share similar interests. . . . we will become a

“global village” . . . An individual will, lit erally, be able to work,

shop, or be educated by or with persons anywhere in the nation or in the

world.

CMC builds nonplace communities of common interests, affinity, and

association. They are called “online communities”, “electronic

communities”, or “virtual communities.” Those usually exist in the forms

of online discussion groups such as those found on

the global Internet and USENET computer networks, commercial videotex

systems, and personal computer bulletin boards. Such communities are

dynamic; many people come and go at any time in the life of a community.

There are two kinds of virtual commun ities. The first one is the

community where members know one another and usually have met

face-to-face. CMC (especially electronic mail) is used mainly to maintain

their routine communication, discuss issues relevant to the members, or

collaborate on so me projects. The second category is the community where

members do not necessarily know one another, but share common interests,

value systems, or goals. CMC (especially BBS and computer conferencing)

is used mainly to exchange information and ideas. T he major differences

of such virtual communities from traditional communities are: 1) the

freedom from geographical limitation; 2) the accessibility at one’s own

convenience; 3) the retrievability of information/messages; and 4) the

limitation of communicati ve acts to textual messages.

Those communities, however, are not entirely new and completely different

from traditional communities. Morioka (1993) argues that those virtual

communities are just the geographical expansion of traditional communities

in the sense that the members of a

communitiy use CMC as a means to discuss and exchange information instead

of meeting face-to-face.

In addition to the above mentioned communities, another kind of

communities exist in computer networks, which can be called “communities

of anonymity [ tokumeisei no komyuniti]” (Morioka, 1993). These

communities of anonymity are the communities whose me mbers are anonymous

and share virtual spaces for their self-expression which may not be

possible in the situation that they have to identify themselves. In such

virtual spaces, people play whatever role they want to play, knowing other

people are also p resenting created images of themselves. In many

computer bulletin boards, it is well known that some people use opposite

sex’s handle names (i.e., a man uses a female name or a woman uses a male

name) and play the role of the opposite sex to their own. I n such

communities, people enjoy the virtual aspects of communication per se.

In summary, there are basically three kinds of virtual communities: 1) the

ones totally overlapping with physical communities; 2) the ones

overlapping with physical communities to some degree; and 3) the ones

totally separated from physical communities.

3. Computer-Mediated Communication in Japan (Pasokon-Tsushin)

Most of the computer networks in early days started in the United States. In Japan which seems to be such a technologically advanced society, the computer-mediated communication has not been as prevalent as that in the U.S. According to Hiroshi Inose, director general of the National Center for Science Information Systems, Japan’s computer networks are estimated to be lag behind those of the U.S. by about 10 years (Hamilton, 1993). There are several reasons for the unpopularity of computer-mediated communication in Japan.

First of all, in business Japanese people still tend to rely on face-to-face communication instead of doing business through some mediated communications, mainly because of the high context culture of Japan where people tend to read between lines a lot w ith the help of social cues such as facial expressions, tone of voice, the posture, etc. In addition, as most business people in Japan do not have individual offices and have no need to use e-mail to contact others in the office, LAN has not been widely implemented. It has begun to be used only recently with the “downsizing” trend.

Secondly, unlike most parts of the U.S. where local telephone charge is a flat rate regardless of the number of calls and the total communication time, Japan’s local telephone service is charged per minute. It has discouraged people to have modems at hom e.

Thirdly, there have been a negative stereotypical image about people indulging in computer communications who are pejoratively called “Otaku-zoku” meaning unsociable home-bound people.

Lastly, the majority of average Japanese have never learned to use a keyboard; in addition, unlike typing English, typing Japanese requires additional key strokes for inputting by Roma-ji which is a way of transcribing Japanese phonetically into the Lati n alphabet, selecting appropriate Kanji, and shifting the mode of characters between Hiragana and Katakana. This may be the main reason why facsimile is more common than e-mails in business communication.

In Japan, there are two distinct realms of computer-mediated communication, each of which seems to have little interest in or awareness of the other. In the following, one realm called “pasokon tsuushin” is discribed followed by the other, “Internet”, re alm.

“Pasokon tsuushin” refers to public access BBSs and commercial online services to which personal computers at home or in offices are connected. Recently, such computer networks are gaining popularity among people who are not so-called “techie” and commer cial online services such as NIFTY-Serve of Fujitsu and PC-VAN of NEC (the two biggest commercial computer networks in Japan which have about 540,000 members and 578,000 members respectively in August, 1993) are showing a tremendous growth in their memers hip. NIFTY-Serve is affiliated with CompuServe in U.S. and members of NIFTY-Serve can have access to CompuServe without any additional fees. In a similar vain PC-VAN has an affiliation with GEIS (General Electric Information Services) and members of PC- VAN can have access to GEnie.

The number of total users of computer networks in Japan is estimated to be around 1,5 to 2 millions including some overlaps in membership (Nikkei Communications, 1993). Most of the commercial computer networks had not been interconnected, but recently ma jor ones began to be interconnected through their electronic services. Now both NIFTY-Serve and PC-VAN are connected to the Internet though connection is limited to the exchange of electronic mail messages.

According to a survey of 969 users of commercial computer networks (Kawakami, et al. 1993), the largest number of people answered that the motive of using the computer network was to obtain the information they want. However, it is noticeable that a larg e number of people also listed interpersonal communication (e.g., to exchange e-mails with friends, to have discussion with those who have same interests, to find a new friend, to express his/her own opinions and ideas, to communicate anonymously, etc.) a s the motive to use computer networks.

Recently, people in business also started to utilize such commercial computer networks for the communication with their customers such as user supports and product supports.

3.1. Communication Styles in Computer Conferencing

Among many services offered in computer networks, computer conferencing such as SIG (special interest group) and Forum is the most popular and thus the most profitable service for commercial network service providers (more than 60% of the total access tim e is dedicated to such conferencing). At present the PC-VAN has about 150 such SIGs and the NIFTY-Serve has approximately 290 Forums. A Forum or a SIG is further divided into several conferences of specific topics under a general theme of a particular F orum or SIG. Most participants of the Forums or SIGs use handle names so that anonymity is maintained for those who don’t want to disclose their personal identities. Moreover, in the NIFTY-Serve there is a function called “Home Party” where members crea te their own passwords for a particular party and set up a small informal meeting place. The number of members in a Home Party ranges from a few to over 100 during the last few years.

Those SIGs and Forums are managed by so-called SYSOP (system operator) or SIGOP (special interest group operator), who usually are computer network enthusiasts and volunteer to spare their time in running the confernces. Some SIGOPs are admitted to becom e one after applying for establishing a SIG; Some are entrusted by a network operation center; and others were asked by the previous ones. Those SIGOPs sometimes appoint sub-operators and board leaders as occasion demands. Usually there is no tangible reward for being a SIGOP/SYSOP. The degree of influence a SIGOP/SYSOP has on the nature of discussion in the SIG varies.

Because commercial networks are trying to avoid cancellation of membership by users as much as possible and most SIGS and Forums are moderated by SYSOPs or SIGOPs, discussions in these SIGS and Forums maintain relatively high quality and “flaming” message s are usually elimitated.

In those Japanese online communities, people who read messages in computer conferencing but do not usually reply are called ROM (read only members) (In U.S. those are called “lurkers”.) and those who actively participate in the conferences are called RAM (random access members or radical active

members). One study showed that 83% of the people who subscribed to a conference had never “spoken” and, among those who had spoken at least once, the two-third of them had spoken less than three times (Kawakami, 1993). It is common in computer conferencing that a few people speak a

lot while a majority of people only “listen.”

Kawakami (1993) listed six reasons why ROM outnumbered RAM a great deal:

1. reluctance to speak to people whom they don’t know; 2. resistance to participate in the group which has been already formed and developed without them; 3. lack of expertise to participate and fear of being evaluated by others; 4. difficulty of deciding to what extent they should disclose themselves to others; 5. worry of not knowing how clearly they make themselves understood; and 6. fear of getting criticism from others.

It should be noted that a ROM in one conference may be a RAM in another

conference and a RAM in one conference may be a ROM in another conference;

ROM and RAM are not the labels attached to individuals but the roles in

one particular conference.

3.2. Emoticon (Emotional Icon)

Because computer-mediated communication is basically texual communication which lacks in social and nonverbal cues seen in face-to-face conversations, unintended confrontation often occurs as the result of misunderstanding. One way to lessen this problem is the use of “emoticons” or “smileys” to complement the lack of social cues in CMC. Interestingly, smileys (or emoticons) used in Japanese

computer networks are a little different from those used in American or European networks, reflecting its unique culture.

typical smileys used in typical emoticons used in

U.S./European networks Japanese networks

regular smile (^_^) regular smile

sad (^o^;>) Excuse me!

wink (^ ^;) cold sweat

) very happy (^o^) happy

Wow! (*^o^*) exciting

Grim (_o_) I’m sorry

| anger (^ . ^) girl’s smile

smile with glasses (*^_^*;)sorry

:^) happy face (;_;) weeping

:^( unhappy (^_^;; awkward

As you see, smileys used in U.S./European networks have to be looked at sideways while emoticons used in Japanese networks are not. According to a study of the major nationwide noncommercial computer network in Japan, JUNET, by Nojima (1993), smileys are used to show (a) an affection or (b) that it’s meant as a joke. The use of smileys to indicate a joke is also common in American/European networks, but its use to show an affection without any specific indication is unique to Japanese networks. In add ition, Nojima also pointed out that sometimes smileys are used to apologize some possible offense.

In high context cultures such as Japanese which rely heavily on contextual cues to communicate, people tend to pay special attentions to the politeness, appropriateness, the non-offensiveness, etc. even in textual computer-mediated communications. It is debatable that the use of smileys and emoticons is the best way to compensate for the lack of contexual cues; however, it is true that such smileys and emoticons are the cultural products of virtual communities.

In addition to the emoticons, a variety of colloquialism such as dialects and infant languages, or vocalization of non-verbal behaviors are being employed to convey some contextual information which is difficult to be transmitted via text only.

3.3. On-Line and Off-Line Meetings

People who get to know one another through computer networks often gather physically as well. This is called off-line meetings (or Ohumi). Usually such off-line meetings are held within a specific SIG or Forum where the dates and places are posted and m embers reply to them indicating if they’re going to attend or not. Kuroiwa (1993) points out that most of the members who attend such off-line meetings are those who are active in having chat (real-time electronic conversation) in each SIG or Forum; not necessarily active in participating in the discussion of the SIG or Forum itself. He hypothesizes that it is because off-line meetings are considered to be the extension of online chat.

Both on-line chat and off-line meetings are the communication by those who share the same virtual or physical space at a particular moment. It is different from a regular on-line discussion which is asynchronous and where spontenaity is minimal. From a business perspective, off-line meetings are considred to highten the members’ sense of belongingness to the specific SIG or Forum which holds a meeting and strongthen the cohesiveness among its members. It usually results in the overall increase of part icipation in the SIG or Forum.

However, not all kinds of Forums or SIGs are holding such off-line meetings. Those Forums or SIGs whose main purpose is to exchange information such as computer-related ones usually don’t hold any off-line meetings. On the other hand, the Forums or SIGs relating to lighter subjects such as hobby, living, music, sports, etc. tend to hold off-line meetings.

Many people who attended those off-line meetings mentioned that they did not feel like meeting another member for the first time. This tendency seems to be stronger in this kinds of off-line meetings (face-to-face meetings after participating Forums or S IGs online) than in the meetings

held after some initial telephone conversations. Kuroiwa (1993) explains that it is because in CMC people discuss topics more in depth and rather informally. Sometimes a phenomenon called “network-high” (which has been discussed in the news group, fj.soc.media, ) occurs when a newcomer to a computer conference such as a Forum or SIG becomes addicted to the conference.

4. Internet in Japan

Internet is the massive world-wide network of computers, comprising of thousands of smaller regional networks and connecting over 4 million users scattered throughout the globe . Although Internet is somewhat new in Japan, currently there are 21,252 Inte rnet hosts in Japan (Quarterman & Carl-Mitchell, 1993). Apart from the commercial networks such as the NIFTY-Serve and the PC-VAN, such Internet hosts in Japan provide academic communities with network infrastracture to facilitate collaboration and infor mation exchange among researchers and scholars. Unlike the Internet in U.S. which is gaining tremendous popularity even among those who are not within the academic communities, Internet in Japan is still somewhat limited to researchers in universities, people in research laboratories of consumer electronic or computer manufacturers, and students in computer scinece.

The advancement of Internet in Japan has been somewhat slow compared with that in the United States due to several reasons listed below.

1. Centralized computing has been dominant in Japan, used by banks, security houses and railway systems, etc., and even ministries like the Ministry of Education and the Agriculture Ministry have their own networks that are not linked to each other. 2. LAN has not been widely implemented in offices. Even those companies who have implemented LANs don’t have much interest in interconnecting with others. 3. Computer manufacturers in Japan such as IBM, Fujitsu, Hitachi, NEC, and DEC have been using proprietary network protocols, which has made internetworking difficult. 4. The TCP/IP protocol has not been recognized as a standard protocol. 5. Routers have not been readily available with support and training in the Japanese language since most routers have been developed in U.S. and their design requires detailed knowledge of a variety of protocols. 6. Postal regulation and high cost of leased lines have not encouraged personal communication on networks. NTT has been making a big effort to make ISDN a nation-wide service while keeping leased lines relatively expensive. As a result, the ISDN service is available in most cities in Japan but the cost to use leased lines has been kept high. 7. With a population largely concentrated in a few urban centers in the same time zone, not much demand for delayed network communication. 8. There have been several incompatible methods of encoding Japanese texts (a 10,000 plus character system) into computers. (This is detailed in the following section.)

4.1. Japanese Encoding Methods

As mentioned above, one of the reasons why the advancement of Internet in Japan has been somewhat slow compared with that in the United States is because of the difficulty of handling Japanese text in computer networking. Since there are different encodi ng methods (JIS, Shift-JIS, and EUC) to input Japanese as well as different character sets, it is not as simple as using the ASCII character set to exchange Japanese texts between different machines.

JIS (Japanese Industrial Standards) encoding is being used for external

information interchange (i.e., moving information between computer

systems) such as e-mail since JIS encoding is not very efficient for

internal storage or processing on computer syst ems. JIS encoding makes

use of seven-bit for representing two-byte characters and escape sequences

to switch between one-byte seven-bit ASCII and two-byte seven-bit Kanji

character modes. All the Japanese texts which are composed with encoding

methods ot her than JIS have to be converted to JIS encoding before being

sent out as e-mail (Lunde, 1993).

Another encoding method, Shift-JIS encoding, was originally developed by ASCII Corporation in collaboration with Microsoft and is widely used as the internal code for Japanese PCs and KanjiTalk (the Japanese operating system for Apple Machintosh) as well as the millions of inexpensive portable Japanese language waapuro (word processors) that have flooded the market. It is a combination of a one-byte eight-bit code and a two-byte eight-bit kanji code, and uses no escape sequences. The conversion between Shift-JIS and JIS requires a complex algorithm (Lunde, 1993).

The third encoding method, EUC (Extended UNIX Code) was developed by AT&T UNIX Pacific and is implemented as the internal code for most UNIX workstations configured to support Japanese. EUC is a two-byte eight-bit code and supports not only Japanese but multiple character sets within a single text stream. Although EUC does not make use of escape sequences as JIS does, EUC encoding is closely related to JIS encoding and conversion between EUC and JIS is easier (Lunde, 1993).

4.2. N1net

The first attempt to build a nation-wide academic network, the N1 project, was started in 1974. With the support from the Ministry of Education, three universities (Tokyo, Kyoto, and Tohoku), a common carrier (NTT), and three computer manufacturers (Hita chi, Fujitsu and NEC) participated in the project. The N1 protocol developed in the project was modeled after the ARPANET protocol. This network was the very first WAN which employed the commercial packet-switching service called DDX -P, the domestic Ja panese X.25 network started by NTT in 1980 (Ishida, 1992).

At that time, encoding Japanese texts was still difficult and the

significance of electronic mails and news exchange facilities had not been

fully realized yet. Unlike the American counterpart, the N1net was a

resource-sharing network but not an interper sonal communication network.

On the other hand, the specification of the N1 protocol has been made

public and the N1 protocol became the only network protocol in widespread

use for linking heterogeneous computers (Ishida, 1992).

4.3. JUNET

JUNET (Japanese Unix NETwork) is the first nationwide noncommercial computer network designed for e-mail/e-news exchange. It was started experimentally in October 1984 by connecting two public universities (Tokyo Institute of Technology, and Tokyo Univer sity) and one private university (Keio University) through public telephone lines (at 9600bps) with UUCP (Unix to Unix Copy) protocol. JUNET utilizes UUCP connections instead of full IP connections and its services are basically limited to news and elec tronic mail. When JUNET began, international communications had to be in English or romanized Japanese, but later Kanji support in a windowed user interface to the messaging systems was included. Since then the amount of public traffic as well as JUNET membership has increased dramatically (Shapard, 1993). Subsequently the network has expanded throug




Не сдавайте скачаную работу преподавателю!
Данный реферат Вы можете использовать для подготовки курсовых проектов.

Поделись с друзьями, за репост + 100 мильонов к студенческой карме :

Пишем реферат самостоятельно:
! Как писать рефераты
Практические рекомендации по написанию студенческих рефератов.
! План реферата Краткий список разделов, отражающий структура и порядок работы над будующим рефератом.
! Введение реферата Вводная часть работы, в которой отражается цель и обозначается список задач.
! Заключение реферата В заключении подводятся итоги, описывается была ли достигнута поставленная цель, каковы результаты.
! Оформление рефератов Методические рекомендации по грамотному оформлению работы по ГОСТ.

Читайте также:
Виды рефератов Какими бывают рефераты по своему назначению и структуре.