Explore chapters and articles related to this topic
Sharing Information
Published in Kirk Hausman, Sustainable Enterprise Architecture, 2011
A single e-mail message can be redirected to one or more e-mail addresses through an e-mail mailing list application, sometimes referred to as a “listserv” after the popular mailing list application. An e-mail sent to [email protected] can easily reach all of the e-mail addresses associated with this address by relaying a copy of the message to each member of the mailing list audience. Mailing lists are used for many purposes (see Figure 6.6): Announcements. Mailing lists can be used for one-way communication to a large audience or other group of e-mail accounts. Typically, access rights to send to these mailing lists are restricted to a single individual or authorized source. Announcements are transmitted in a one-way fashion, with all ReplyTo responses returned to the sender or dropped into a discard folder, depending on the mailing list configuration. Discussions. Some mailing lists allow anyone to send e-mail messages to all recipients. These mailing lists allow discussion among members and may include the ability for outside parties to inject e-mail messages targeted to the included group. Because discussion lists can include two-way communications, they can aid in rapid participation from multiple group members collaborating on a task or project. This quality can also lead to virtual arguments conducted by rapid back-and-forth e-mail messages in what is essentially a public forum. The very ease and speed of e-mail communication, coupled with the emotional anonymity of interaction with technology rather than face to face with another individual, can lead to impassioned arguments termed “flame wars.” The architect might consider enacting a mediation function or transmission delay to reduce this potential by allowing a cooling-off period between messages.Moderated lists. To manage content submitted to a mailing list, particularly discussion lists, a mailing list can be configured for moderation. E-mail messages sent to a moderated list address are forwarded to an assigned moderator, who must approve the message before it is retransmitted to the mailing list audience. This imposes some delay in the relay of e-mail messages and can impose a heavy time cost for the assigned moderator of an active list.Common point of contact. Lists may also be used to provide a common point of contact, such as [email protected], which can then relay customer communications to the proper individual recipients. This simplifies routing of communications to targeted operational recipients.
Exploring Users Interested in 3D Food Printing and Their Attitudes: Case of the Employees of a Kitchen Appliance Company
Published in International Journal of Human–Computer Interaction, 2022
Yağmur Kocaman, Aslı Ermiş-Mert, Oğuzhan Özcan
Gayler et al. (2018)’s approach has a direction in this sense. They surveyed three communities they expect to be early adopters of 3DFP (3DFP mailing list, 3D printing forums, and computer science students). Despite being a small-scale study, the results create novel and fertile courses for 3DFP research. We believe this fertility of results is related to participants’ interest, who were willing to offer their ideas related to 3DFP. The predispositions of interested participants may entail opportunities in the product development process. For example, we may expect a fruitful approach from those who are more familiar with technology in general, as Gayler et al. (2018) showed in their study. These participants may be more open to talking about issues related to the development of the technology.
Editorial of the Special Issue on Following User Pathways: Key Contributions and Future Directions in Cross-Platform Social Media Research
Published in International Journal of Human–Computer Interaction, 2018
Margeret Hall, Athanasios Mazarakis, Martin Chorley, Simon Caton
While standards may be evolving, the current status is that publicly posted data have implicit informed consent attached (Jordan, 2018; Zimmer, 2010). However, in the case of actively recruited participants or apps that take data outside of normal personal privacy settings, informed consent must continue to be in place as the standards of human subject research demand. Still, due to the nature of the data and its harvesting, the line between observational and interactive research is thin. In their work on qualitative research across social media, Eysenbach and Till (2001, 1105) pose a useful series of questions with regard to the need for informed consent in social media studies: Intrusiveness—Discuss to what degree the research conducted is intrusive (“passive” analysis of internet postings versus active involvement in the community by participating in communications)Perceived privacy—Discuss (preferably in consultation with members of the community) the level of perceived privacy of the community (Is it a closed group requiring registration? What is the membership size? What are the group norms?)Vulnerability—Discuss how vulnerable the community is: for example, a mailing list for victims of sexual abuse or AIDS patients will be a highly vulnerable communityPotential harm—As a result of the above considerations, discuss whether the intrusion of the researcher or publication of results has the potential to harm individuals or the community as a wholeInformed consent—Discuss whether informed consent is required or can be waived (If it is required how will it be obtained?)Confidentiality—How can the anonymity of participants be protected (if verbatim quotes are given originators can be identified easily using search engines, thus informed consent is always required)Intellectual property rights—In some cases, participants may not seek anonymity, but publicity, so that use of postings without attribution may not be appropriate.