SlideShare a Scribd company logo
Chapter 14:  Mediated Communication  ,[object Object],[object Object],[object Object],[object Object]
Evolution of Human Communication ,[object Object],[object Object]
History of Written Communication ,[object Object],[object Object]
[object Object],[object Object],Two Systems of Writing
Problems Understanding Written Language   ,[object Object],[object Object],[object Object]
Viewing Communication Multidimensionally (p. 307) Book Newspaper Magazine Film Videotape CD Rom Book Newspaper Magazine Film Videotape Billboard  CD ROM Microphone Ham Radio Live Radio Live TV Chat Rooms Public Speech or a Series of Speeches Mass Audience  Videotape Film Videotape Film Interactive TV Interactive Computer  Formal Meeting Speeches & Questions Large Group Meeting E-mail with Copies Letter with Copies E-mail with Copies Letter with Copies Teleconference Videoconference Chat Rooms Interactive Computer Live Group Discussion Small Group Interaction Memo/Letter E-mail Voice mail Virtual Reality Memo/Letter E-mail Voice Mail Art  Telephone Computer Mediated Communication Video Phone C.B. Radio Live Conversation Dyadic Interaction Level of Mediation Potential Receivers
Media and Dyadic Communication  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Media and Group Communication ,[object Object],[object Object],[object Object],[object Object]
Mediated Public Communication ,[object Object],[object Object]
Computer Mediated Communication (CMC) Brief History of CMC Located on pp. 312-313.
Two Types ,[object Object],[object Object]
Walther’s  Social Information Processing  (SIP) Theory
Walther (1996) proposed that CMC and face-to-face (FtF) interactions were functional equivalents of each other, but online relationships needed more time to develop.   SIP theorizes that individuals interacting online will adapt existing communicative cues to replace the lack of cues in the CMC situations caused by a like of nonverbal communication (touch, feel, taste, smell, proximity, etc.).
Three Primary Assumptions ,[object Object],[object Object],[object Object]
CMC & CA
Wrench, Fiore, & McCroskey (2006) ,[object Object],[object Object],[object Object],[object Object]
Wrench & Punyanunt-Carter (2007) – Fill out the CMCA Scales (pp. 405-407) ,[object Object],[object Object],[object Object],[object Object]
Future Considerations   ,[object Object],[object Object]

More Related Content

What's hot

Unit 1 Mass media and its importance
Unit 1 Mass media and its importanceUnit 1 Mass media and its importance
Unit 1 Mass media and its importance
Department of English MKBU
 
Communication ways
Communication waysCommunication ways
Communication ways
Joshua Marín
 
Communication
CommunicationCommunication
Communication
Ankit Kumar
 
Mass Communication 01 - Basic Concepts
Mass Communication 01 - Basic ConceptsMass Communication 01 - Basic Concepts
Mass Communication 01 - Basic Concepts
Satrio Arismunandar
 
COM300 - Week 2, Monday
COM300 - Week 2, MondayCOM300 - Week 2, Monday
COM300 - Week 2, MondayKathy Gill
 
Mass Media and Communication:- Introduction
Mass Media and Communication:-  IntroductionMass Media and Communication:-  Introduction
Mass Media and Communication:- Introduction
Department of English MKBU
 
Communication Lecture 2
Communication Lecture 2Communication Lecture 2
Communication Lecture 2mrjtpants
 
Mass communication ppt
Mass communication pptMass communication ppt
Mass communication ppt
Ayesha Khalid
 
Bottoms Up - The Cocktail Party Problem
Bottoms Up - The Cocktail Party ProblemBottoms Up - The Cocktail Party Problem
Bottoms Up - The Cocktail Party ProblemPatricia Hill
 
Channels & barriers of communication
Channels & barriers of communicationChannels & barriers of communication
Channels & barriers of communication
The sagacious
 
Bbai pom u3.3 communication
Bbai pom u3.3 communicationBbai pom u3.3 communication
Bbai pom u3.3 communication
Rai University
 
Introduction to communication
Introduction to communicationIntroduction to communication
Introduction to communication
Shilpa K P
 
ProRe12 midterm report
ProRe12 midterm reportProRe12 midterm report
ProRe12 midterm reportUlrich Lehner
 
COMMUNICATION PROCESSES, PRINCIPLES, AND ETHICS: communication barrier
COMMUNICATION PROCESSES, PRINCIPLES, AND ETHICS: communication barrierCOMMUNICATION PROCESSES, PRINCIPLES, AND ETHICS: communication barrier
COMMUNICATION PROCESSES, PRINCIPLES, AND ETHICS: communication barrier
iamclaii
 
Communication - Part 1
Communication - Part 1Communication - Part 1
Communication - Part 1
Jeevan Kumar
 
Communication and Entertainment
Communication and EntertainmentCommunication and Entertainment
Communication and Entertainment
Shiksha Chaturvedi
 
Channel Expansion Theory
Channel Expansion TheoryChannel Expansion Theory
Channel Expansion Theory
Sheena Nyros M.A.
 
Communication as a phenomenon of psychology
Communication as a phenomenon of psychologyCommunication as a phenomenon of psychology
Communication as a phenomenon of psychology
Eneutron
 

What's hot (20)

Unit 1 Mass media and its importance
Unit 1 Mass media and its importanceUnit 1 Mass media and its importance
Unit 1 Mass media and its importance
 
Communication
CommunicationCommunication
Communication
 
Communication ways
Communication waysCommunication ways
Communication ways
 
Communication
CommunicationCommunication
Communication
 
Mass Communication 01 - Basic Concepts
Mass Communication 01 - Basic ConceptsMass Communication 01 - Basic Concepts
Mass Communication 01 - Basic Concepts
 
COM300 - Week 2, Monday
COM300 - Week 2, MondayCOM300 - Week 2, Monday
COM300 - Week 2, Monday
 
Mass Media and Communication:- Introduction
Mass Media and Communication:-  IntroductionMass Media and Communication:-  Introduction
Mass Media and Communication:- Introduction
 
Communication Lecture 2
Communication Lecture 2Communication Lecture 2
Communication Lecture 2
 
Speech com 1
Speech com 1Speech com 1
Speech com 1
 
Mass communication ppt
Mass communication pptMass communication ppt
Mass communication ppt
 
Bottoms Up - The Cocktail Party Problem
Bottoms Up - The Cocktail Party ProblemBottoms Up - The Cocktail Party Problem
Bottoms Up - The Cocktail Party Problem
 
Channels & barriers of communication
Channels & barriers of communicationChannels & barriers of communication
Channels & barriers of communication
 
Bbai pom u3.3 communication
Bbai pom u3.3 communicationBbai pom u3.3 communication
Bbai pom u3.3 communication
 
Introduction to communication
Introduction to communicationIntroduction to communication
Introduction to communication
 
ProRe12 midterm report
ProRe12 midterm reportProRe12 midterm report
ProRe12 midterm report
 
COMMUNICATION PROCESSES, PRINCIPLES, AND ETHICS: communication barrier
COMMUNICATION PROCESSES, PRINCIPLES, AND ETHICS: communication barrierCOMMUNICATION PROCESSES, PRINCIPLES, AND ETHICS: communication barrier
COMMUNICATION PROCESSES, PRINCIPLES, AND ETHICS: communication barrier
 
Communication - Part 1
Communication - Part 1Communication - Part 1
Communication - Part 1
 
Communication and Entertainment
Communication and EntertainmentCommunication and Entertainment
Communication and Entertainment
 
Channel Expansion Theory
Channel Expansion TheoryChannel Expansion Theory
Channel Expansion Theory
 
Communication as a phenomenon of psychology
Communication as a phenomenon of psychologyCommunication as a phenomenon of psychology
Communication as a phenomenon of psychology
 

Viewers also liked

Caligramas De 4º Eso2009
Caligramas De 4º Eso2009Caligramas De 4º Eso2009
Caligramas De 4º Eso2009Carmen Marqués
 
SynthèSe Finale Ok Odp
SynthèSe Finale Ok OdpSynthèSe Finale Ok Odp
SynthèSe Finale Ok Odpdelage
 
Organisation Espace Odp
Organisation Espace OdpOrganisation Espace Odp
Organisation Espace Odpdelage
 
Brandywine Battlefield
Brandywine BattlefieldBrandywine Battlefield
Brandywine Battlefieldstiegmar
 
VoIP Recording
VoIP RecordingVoIP Recording
VoIP RecordingMundo Contact
 
Gestión Avanzada de Redes Multiservicio
Gestión Avanzada de Redes MultiservicioGestión Avanzada de Redes Multiservicio
Gestión Avanzada de Redes MultiservicioMundo Contact
 
Segmentación Efectiva de Clientes
Segmentación Efectiva de ClientesSegmentación Efectiva de Clientes
Segmentación Efectiva de ClientesMundo Contact
 
Dhcp
DhcpDhcp

Viewers also liked (8)

Caligramas De 4º Eso2009
Caligramas De 4º Eso2009Caligramas De 4º Eso2009
Caligramas De 4º Eso2009
 
SynthèSe Finale Ok Odp
SynthèSe Finale Ok OdpSynthèSe Finale Ok Odp
SynthèSe Finale Ok Odp
 
Organisation Espace Odp
Organisation Espace OdpOrganisation Espace Odp
Organisation Espace Odp
 
Brandywine Battlefield
Brandywine BattlefieldBrandywine Battlefield
Brandywine Battlefield
 
VoIP Recording
VoIP RecordingVoIP Recording
VoIP Recording
 
Gestión Avanzada de Redes Multiservicio
Gestión Avanzada de Redes MultiservicioGestión Avanzada de Redes Multiservicio
Gestión Avanzada de Redes Multiservicio
 
Segmentación Efectiva de Clientes
Segmentación Efectiva de ClientesSegmentación Efectiva de Clientes
Segmentación Efectiva de Clientes
 
Dhcp
DhcpDhcp
Dhcp
 

Similar to Chapter14

Communication - \"The way to excel in today\'s world
Communication - \"The way to excel in today\'s worldCommunication - \"The way to excel in today\'s world
Communication - \"The way to excel in today\'s world
Abhilash Alphonso
 
Deepthi
DeepthiDeepthi
Deepthi
Vilayil Graphics
 
Deepthi
DeepthiDeepthi
Deepthi
Vilayil Graphics
 
Computer mediated communication (cmc) as a subject
Computer mediated communication (cmc) as a subjectComputer mediated communication (cmc) as a subject
Computer mediated communication (cmc) as a subject
uhandai
 
Rider Mass Media Summer 2008 Week One Lectures
Rider Mass Media Summer 2008 Week One LecturesRider Mass Media Summer 2008 Week One Lectures
Rider Mass Media Summer 2008 Week One LecturesSuzanne Carbonaro
 
Types of Information Communication
Types of Information CommunicationTypes of Information Communication
Types of Information CommunicationNIRANJAN MOHAPATRA
 
Computer mediated communication
Computer mediated communication Computer mediated communication
Computer mediated communication
Boutkhil Guemide
 
The Mass Of Mass Communication Essay
The Mass Of Mass Communication EssayThe Mass Of Mass Communication Essay
The Mass Of Mass Communication Essay
Write My Paper Online Hoboken
 
Online Culture and language
Online Culture and languageOnline Culture and language
Online Culture and languageDavid Phillips
 
MEDIA-INFORMATION-LITERACY-LESSON-3.pptx
MEDIA-INFORMATION-LITERACY-LESSON-3.pptxMEDIA-INFORMATION-LITERACY-LESSON-3.pptx
MEDIA-INFORMATION-LITERACY-LESSON-3.pptx
LOVELITAFERNANDO
 
1.[1 3]a study-on_global_communication_in_english_language
1.[1 3]a study-on_global_communication_in_english_language1.[1 3]a study-on_global_communication_in_english_language
1.[1 3]a study-on_global_communication_in_english_languageAlexander Decker
 
Blogs, Media And The Classroom
Blogs, Media And The ClassroomBlogs, Media And The Classroom
Blogs, Media And The Classroom
Peter Cullen
 
Week 2 Evolution2009
Week 2 Evolution2009Week 2 Evolution2009
Week 2 Evolution2009Peg Achterman
 
Baym, nancy k. (2015). personal connections in the digital age
Baym, nancy k. (2015). personal connections in the digital ageBaym, nancy k. (2015). personal connections in the digital age
Baym, nancy k. (2015). personal connections in the digital age
RAJU852744
 
COM 300 - Week 2
COM 300 - Week 2COM 300 - Week 2
COM 300 - Week 2Kathy Gill
 
Introduction to Communication
Introduction to CommunicationIntroduction to Communication
Introduction to Communication
ErnestoDDolosoJr
 
A study on_global_communication_in_english_language
A study on_global_communication_in_english_languageA study on_global_communication_in_english_language
A study on_global_communication_in_english_languageAlexander Decker
 

Similar to Chapter14 (20)

Cmc overview
Cmc overviewCmc overview
Cmc overview
 
Communication - \"The way to excel in today\'s world
Communication - \"The way to excel in today\'s worldCommunication - \"The way to excel in today\'s world
Communication - \"The way to excel in today\'s world
 
Office auto
Office autoOffice auto
Office auto
 
Deepthi
DeepthiDeepthi
Deepthi
 
Deepthi
DeepthiDeepthi
Deepthi
 
Computer mediated communication (cmc) as a subject
Computer mediated communication (cmc) as a subjectComputer mediated communication (cmc) as a subject
Computer mediated communication (cmc) as a subject
 
Rider Mass Media Summer 2008 Week One Lectures
Rider Mass Media Summer 2008 Week One LecturesRider Mass Media Summer 2008 Week One Lectures
Rider Mass Media Summer 2008 Week One Lectures
 
Types of Information Communication
Types of Information CommunicationTypes of Information Communication
Types of Information Communication
 
Computer mediated communication
Computer mediated communication Computer mediated communication
Computer mediated communication
 
The Mass Of Mass Communication Essay
The Mass Of Mass Communication EssayThe Mass Of Mass Communication Essay
The Mass Of Mass Communication Essay
 
Online Culture and language
Online Culture and languageOnline Culture and language
Online Culture and language
 
MEDIA-INFORMATION-LITERACY-LESSON-3.pptx
MEDIA-INFORMATION-LITERACY-LESSON-3.pptxMEDIA-INFORMATION-LITERACY-LESSON-3.pptx
MEDIA-INFORMATION-LITERACY-LESSON-3.pptx
 
1.[1 3]a study-on_global_communication_in_english_language
1.[1 3]a study-on_global_communication_in_english_language1.[1 3]a study-on_global_communication_in_english_language
1.[1 3]a study-on_global_communication_in_english_language
 
Blogs, Media And The Classroom
Blogs, Media And The ClassroomBlogs, Media And The Classroom
Blogs, Media And The Classroom
 
Week 2 Evolution2009
Week 2 Evolution2009Week 2 Evolution2009
Week 2 Evolution2009
 
Baym, nancy k. (2015). personal connections in the digital age
Baym, nancy k. (2015). personal connections in the digital ageBaym, nancy k. (2015). personal connections in the digital age
Baym, nancy k. (2015). personal connections in the digital age
 
Edu8719 presentation
Edu8719 presentationEdu8719 presentation
Edu8719 presentation
 
COM 300 - Week 2
COM 300 - Week 2COM 300 - Week 2
COM 300 - Week 2
 
Introduction to Communication
Introduction to CommunicationIntroduction to Communication
Introduction to Communication
 
A study on_global_communication_in_english_language
A study on_global_communication_in_english_languageA study on_global_communication_in_english_language
A study on_global_communication_in_english_language
 

More from Jason Wrench

Risk Communication Presentation
Risk Communication PresentationRisk Communication Presentation
Risk Communication Presentation
Jason Wrench
 
30 Minute Lecture Presentation
30 Minute Lecture Presentation30 Minute Lecture Presentation
30 Minute Lecture Presentation
Jason Wrench
 
Harassment Of Slamantha
Harassment Of SlamanthaHarassment Of Slamantha
Harassment Of SlamanthaJason Wrench
 
Inclusive Education
Inclusive EducationInclusive Education
Inclusive EducationJason Wrench
 
Family Systems Theory
Family Systems TheoryFamily Systems Theory
Family Systems TheoryJason Wrench
 
3 C’S Of Corporate Communication
3 C’S Of Corporate Communication3 C’S Of Corporate Communication
3 C’S Of Corporate CommunicationJason Wrench
 
Course Intro&1 1
Course Intro&1 1Course Intro&1 1
Course Intro&1 1Jason Wrench
 
Multiple Sexualities
Multiple SexualitiesMultiple Sexualities
Multiple SexualitiesJason Wrench
 
Hate, Stereotyping, & Prejudice
Hate, Stereotyping, & PrejudiceHate, Stereotyping, & Prejudice
Hate, Stereotyping, & PrejudiceJason Wrench
 
Homophobia Workshop
Homophobia WorkshopHomophobia Workshop
Homophobia Workshop
Jason Wrench
 
Basic Research Design
Basic Research DesignBasic Research Design
Basic Research DesignJason Wrench
 

More from Jason Wrench (20)

Risk Communication Presentation
Risk Communication PresentationRisk Communication Presentation
Risk Communication Presentation
 
30 Minute Lecture Presentation
30 Minute Lecture Presentation30 Minute Lecture Presentation
30 Minute Lecture Presentation
 
Harassment Of Slamantha
Harassment Of SlamanthaHarassment Of Slamantha
Harassment Of Slamantha
 
Inclusive Education
Inclusive EducationInclusive Education
Inclusive Education
 
Family Systems Theory
Family Systems TheoryFamily Systems Theory
Family Systems Theory
 
Dewey
DeweyDewey
Dewey
 
3 C’S Of Corporate Communication
3 C’S Of Corporate Communication3 C’S Of Corporate Communication
3 C’S Of Corporate Communication
 
Course Intro&1 1
Course Intro&1 1Course Intro&1 1
Course Intro&1 1
 
Unit 2 5
Unit 2 5Unit 2 5
Unit 2 5
 
Unit 1 3
Unit 1 3Unit 1 3
Unit 1 3
 
Unit 1 5
Unit 1 5Unit 1 5
Unit 1 5
 
Unit 2 4
Unit 2 4Unit 2 4
Unit 2 4
 
Unit 2 3
Unit 2 3Unit 2 3
Unit 2 3
 
Unit 2 2
Unit 2 2Unit 2 2
Unit 2 2
 
Unit 2 1
Unit 2 1Unit 2 1
Unit 2 1
 
Unit 1 4
Unit 1 4Unit 1 4
Unit 1 4
 
Multiple Sexualities
Multiple SexualitiesMultiple Sexualities
Multiple Sexualities
 
Hate, Stereotyping, & Prejudice
Hate, Stereotyping, & PrejudiceHate, Stereotyping, & Prejudice
Hate, Stereotyping, & Prejudice
 
Homophobia Workshop
Homophobia WorkshopHomophobia Workshop
Homophobia Workshop
 
Basic Research Design
Basic Research DesignBasic Research Design
Basic Research Design
 

Recently uploaded

GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 

Recently uploaded (20)

GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 

Chapter14

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Viewing Communication Multidimensionally (p. 307) Book Newspaper Magazine Film Videotape CD Rom Book Newspaper Magazine Film Videotape Billboard CD ROM Microphone Ham Radio Live Radio Live TV Chat Rooms Public Speech or a Series of Speeches Mass Audience Videotape Film Videotape Film Interactive TV Interactive Computer Formal Meeting Speeches & Questions Large Group Meeting E-mail with Copies Letter with Copies E-mail with Copies Letter with Copies Teleconference Videoconference Chat Rooms Interactive Computer Live Group Discussion Small Group Interaction Memo/Letter E-mail Voice mail Virtual Reality Memo/Letter E-mail Voice Mail Art Telephone Computer Mediated Communication Video Phone C.B. Radio Live Conversation Dyadic Interaction Level of Mediation Potential Receivers
  • 7.
  • 8.
  • 9.
  • 10. Computer Mediated Communication (CMC) Brief History of CMC Located on pp. 312-313.
  • 11.
  • 12. Walther’s Social Information Processing (SIP) Theory
  • 13. Walther (1996) proposed that CMC and face-to-face (FtF) interactions were functional equivalents of each other, but online relationships needed more time to develop. SIP theorizes that individuals interacting online will adapt existing communicative cues to replace the lack of cues in the CMC situations caused by a like of nonverbal communication (touch, feel, taste, smell, proximity, etc.).
  • 14.
  • 16.
  • 17.
  • 18.