Verified Document

Security Issues Of Online Communities Term Paper

Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are: (1) a minimum level of interactivity; (2) a variety of communicators; (3) a minimum level of sustained membership; and (4) a virtual common-public-space where a significant portion of interactive computer mediated groups occur (Weinreich, 1997). The notion of interactivity will be shown to be central to virtual settlements. Further, it will be shown that virtual settlements can be defined as a cyber-place that is symbolically delineated by topic of interest and within which a significant proportion of interrelated interactive computer mediated group communication occurs (Weinreich, 1997). It also follows that the existence of a virtual settlement demonstrates the existence of an associated virtual community (Weinreich, 1997).

It has been argued by some sociologists that our understanding of community begins with an examination of interaction and that leads to commitment to a given place and group. Both communities and virtual communities are composed of groups. Previous research defines group as a number of persons who communicate with one another often over a span of time, and who are few enough so that each person is able to communicate with all the others, not at second hand, through other people, but face-to-face. Additionally, a chance meeting of casual acquaintances does not count as a group.

Other researchers indicate that it is possible just by counting interactions to map out a group quantitatively distinct from others. The impact of new technologies suggests that our understanding of what makes up a primary human group needs to be radically changed. This is because interactive-group-communication no longer requires face-to-face communication and is not restricted to a few people. The extent to which online communities are dependent on interactive communication represents a significant departure from the more traditional mass media forms and emphasizes the need for a paradigm shift by media researchers. At the same time the advent of online communities has further highlighted the importance of human interactions.

Characteristics of Online Communities

Other researchers have interactivity is not a characteristic of the medium, rather that it is the extent to which messages in a sequence relate to each other, and especially the extent to which later messages recount the relatedness of earlier messages. Interactivity is an expression of the extent to which in a given series of communication exchanges, any third or later transmission is related to the degree to which previous exchanges referred to even earlier transmissions. This definition of interactivity recognizes three levels of communication: two-way non-interactive communication; reactive communication (or quasi-interactive); and fully interactive communication. Two-way communication is present as soon as messages flow bilaterally. Reactive communication is when in addition to a bilateral exchange, later messages refer to earlier ones. Fully interactive communication requires that later messages in any sequence take into account not just messages that preceded them, but also the manner in which previous messages were reactive. In this manner interactivity forms a social reality.

The literature regarding online communities is insistent that interactive communication is a necessary condition for a series of computer mediated messages to demonstrate the existence of a virtual community. Some researchers have defined online communities as a set of on-going many-sided interactions that occur predominantly in and through computers linked via telecommunications networks. Rheingold stated that virtual communities result from public discussions with sufficient human feeling to form webs of personal relationships in cyberspace. This is because online communities are long-term, computer-mediated conversations they are both indirectly acknowledging the interactive nature of virtual communities. Long-term meaningful discussions or conversations require interactivity.

The second necessary condition of an online community is a variety of communicators, which is linked to the first condition of interactivity. Clearly, if there is only one communicator there can be no interactivity. It is commonly understood that online communities exist within cyber-space. Some authors have noted the connection between common-virtual public space and virtual community. Fernback and Thompson (1995) define virtual communities as social relationships forged in cyberspace through repeated contact within a specified boundary or place that is symbolically delineated by topic of interest. Therefore, some researchers have indicated that an online community needs a virtual-space, but at the same time a virtual community is not equivalent to its...

This is because this requirement distinguishes a virtual settlement from private communication where postings go directly from one individual to another with no common virtual-place. A similar process can be noted in non-virtual human settlements where there is often overlap in the citizenship and allegiances and where a variety of social structures exist. At the same time the notion of common public space raises the issue of when an area of cyberspace consists of one or many virtual settlements.
As noted above, some of the first online communities resulted from the online bulletin board services of the mid-1970s. It is likely that these early bulletin board services were accurately associated with the label virtual communities because the necessary conditions specified here were met. However, these early systems were not originally connected to the Internet and as such often catered to geographic localities. Users were likely to participate in many of the discussion areas contained on the bulletin boards so that user interaction was often at the level of the bulletin board services. The virtual common-public space was the bulletin board itself.

Economic Aspects of Online Communities never-ending endeavor of the corporate world is the establishment of trust in business relationships. Contracts that end with a handshake come only after many hours of negotiation, compromise, face-to-face meetings and telephone conversations. These contacts detail the boundaries of an agreement and clarify a system of personal trust between the parties. The trust established through personal contacts, however, does not easily transcend to e-business, where documents are exchanged over Internet. The Electronic Signatures in Global and National Commerce Act (E-Signature Act) was signed into law on June 30, 2000 as a resolution.

The Act established a manner in which an electronic signature (e-signature) can substitute for an actual written signature.

The Act's goal was to put contracts in electronic form with electronic signatures on equal footing with their paper-based counterparts. The act says an electronic contract, signature or record is legally equivalent to a hard-copy contract, signature or record. It attempts to provide the consumer with an opportunity to make an informed choice in deciding whether to use an electronic signature. The Act requires the consumer's consent to using an e-signature but fails to detail the technical requirements of an electronic or digital signature or recommend implementation models.

E-signatures can be obtained through secured processes, such as secret passwords or digital fingerprints, or clicking an acceptance button on a Web page. It defines an electronic signature as "an electronic sound, symbol, or process, attached to or logically associated with a contract or other record and executed or adopted by a person with the intent to sign the record." This lets vendors offer a range of options for signing electronic documents. Many of these options, however, do not take into account the risks inherent in electronic signatures, including fraud and the liability for insecure signatures. Flaws in e-signature software may result in susceptibility to hackers and identity theft.

The use of an electronic signature is more efficient for the corporation - it creates less paperwork, an organized method in which to track signed documents, and none of the hassles of in-person meetings and negotiations. That being said, it is beneficial to the corporate world to have access to the appropriate software with which to contract electronically. Since the consumer must also be appraised of his right to stop using the electronic form and continue contracting in paper form, it is significant to portray the electronic process in the most desirable light.

As unethical as it sounds, businesses have the most to gain from electronic signatures. The option of an e-signature makes it easier for consumers to accept contractual obligations. It is not unusual for individuals to download software or other products from the Internet while clicking through the host of limitations on liability that producers have placed on their products. As people in online communities have become accustomed to instantaneously purchasing and receiving products without a traditional writing, much of the public has become careless. Many consumers fail to read the disclaimers, and very well may enter into contracts without the proper reflection a written instrument usually attains.

The consumers belonging to the online community, and the corporation selling the goods must also be protected, from exposure of private information and damaging lawsuits. The corporate world would necessitate the results of studies conducted on e-signatures and their effect on…

Sources used in this document:
Bibliography

Al-Saggaf, Y. & Williamson, K. Online Communities in Saudi Arabia: Evaluating the Impact on Culture Through Online Semi-Structured Interviews. Volume 5,

No. 3, Art. 24 - September 2004

AnchorDesk Staff. (2000). Sign of Trouble: The Problem with E-Signatures.

Retrieved April 9, 2005, from ZDNet AnchorDesk Web site: http://reivews- zdnet.com.com/AnchorDesk/4630-6033_4204767.html?tag=print
2003. Retrieved April 16, 2005 from http://www.technologyforfinance.com/FeaturePrint.asp?FeatureID=94
Legalized E-Signatures Bring Convenience, risk. (2000). Retrieved April 7, 2005, from CNN.com: Technology Web site: http://archives.cnn.com/2000/TECH/computing/09/29/e.signature/
Reed, C. (2004). The European Legal Framework for E-Commerce. Retrieved April 9, 2005, from Business Forum Web site: http://www.ebusinessforum.gr
Tiner, John. Regulation and Consolidation in the Financial Industry. Speech to the IIF Spring Conference. Retrieved April 16, 2005, at http://www.fsa.gov.uk
Systems. Retrieved April 19, 2005 from the Moss District Court Web site: http://www.mosstingrett.no/info/legal.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Issues in Cloud Computing
Words: 1450 Length: 5 Document Type: Data Analysis Chapter

Despite these concerns however the world's largest companies still actively promote and routinely hype the value of cloud computing without mentioning the myriad of risk associated with this platform, despite its continual maturation from a security and stability standpoint [2]. An example of this is type of hype is when Microsoft's Steve Balmer described cloud computing as the next frontier and Dr. Ajei Gopal verified that the cloud is there

Security Issues in IEEE Wlan
Words: 6613 Length: 20 Document Type: Term Paper

Despite its clear benefits and advantages in terms of ease of use and cost effectiveness, there are certain risks associated with wireless networking. These risks are discussed further below. Review of the Literature. Security Risks Associated with IEEE WLAN 802.11. The applications for wireless communication technology continue to develop and expand; today, at least, the 802.11b is the standard of choice for wireless router communication used with network installation (Gonazles & Higby

Thematic Analysis of Security Issues
Words: 20201 Length: 78 Document Type: Dissertation

Security Study Travel and tourism are major industries in European countries such as Greece. The hotel industry is dedicated to making the accommodations for their patrons as enjoyable as possible. This means ensuring that hotel guests, visitors, and staff have a safe and secure environment. It is for this reason that many of the larger hotel chains have their own private security personnel who are entrusted to maintain the safety of

Homeland Security Issues and Counterfeit Cosmetics
Words: 1225 Length: 4 Document Type: Research Paper

COUNTERFEIT COSMETICS & HOMELAND SECURITY ISSUES Problem Identification Counterfeit cosmetics are prevalent specifically over the Internet on such websites as Ebay. These cosmetics are dangerous and cause severe problems even death among those who purchase and use these products. The U.S. Department of Homeland Security (DHS) is reported to be conducting an investigation of the major counterfeit cosmetic manufacturing rings that are producing and selling products reported to contain "high concentrations of

Online Counseling
Words: 1273 Length: 4 Document Type: Term Paper

Online Therapy Given the prevalence and permeation of digital discourse, it is not surprising that psychological counseling can now be conducted online. Online counseling provides similar sets of services to clients as in-person counseling, albeit the scope of services will be limited to the restrictions of the technology. One of the benefits of online counseling is that it permits individuals to transcend both geography and time with regards to scheduling services

Security Awareness the Weakest Link
Words: 8202 Length: 30 Document Type: Case Study

To offer an information security awareness training curriculum framework to promote consistency across government (15). Security awareness is needed to ensure the overall security of the information infrastructure. Security awareness programs is the can help organizations communicate their security information policies, as well as tips for users, to help keep systems secure, and the practices the entire organization should be utilizing. However, as Kolb and Abdullah reiterate, "security awareness is not

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now