Примечание:
From Berger, A. A. (2000). Media and communication research methods (p. 113). Thousand Oaks, CA: Sage.
From Spradley, J. P. (1979). The ethnographic interview. London: Har- court Brace Jovanovich.
3. Spradley, J. P. (1979), pp. 78-91. See Note 2.
See Schensul, J. J., LeCompte, M., Nastasi, В. К., & Borgatti, S. (1999). Advanced ethnographic methods (Chapter 2). Walnut Creek, CA: AltaMira.
From McQuarrie, E. F. (1998). Customer visits: Building a better market focus. Thousand Oaks, CA: Sage.
Adapted from materials prepared by Communication Development Com pany, West Des Moines, Iowa.
Gourgey, H., & Smith, E. B. (1996). Consensual hallucination: Cyber space and the creation of an interpretive community. Text and Performance Quar terly. 16, 233-247.
See Robbins, K. (1996), Into the image: Culture and politics in the field oj vision (Chapter 4). New York: Routledge.
The Forum on the Ethics of Fair Practices for Collecting Social Science Data in Cyberspace, with a special section of the scholarly journal The Information Society, illustrates the variety of positions about ethical guidelines in online social research.
From Lindlof, T. R., & Shatzer, M. (1998). Media ethnography in\irtual space: Strategies, limits and possibilities. Journal of Broadcasting and Electronic Media, 42(2), 170-190.
Smith, M. (1993). Voices from the WELL: The logic of the virtual com mons. Text available from Smithm@nicc0.5scnet.ucla.edu.
Correll, S. (1995). The ethnography of an electronic bar: The Lesbian Cafe. Journal of Contemporary Ethnography, 24, 270-298.
Garton, L., & Well man, B. (1995). Social impacts of electronic mai in or ganizations: A review of the research literature. In B. R. Burleson (Ed.), Communi cation Yearbook 18 (pp. 434-453). Thousand Oaks, CA: Sage.
Workman, J. P. (1992). Use of electronic mail in a participant observation study. Qualitative Sociology, 15, 419-425.
Huff, C. W., & Rosenberg, J. (1989). The on-line voyeur: Promises and pit falls of observing electronic interaction. Behavior, Research Methods, Instru ments & Computers, 21(2), 166-172.
16. Edings, J. (1994). How the Internet works. Emeryville, CA: Ziff-Davis.
Bym, N. K. (1995). From practice to culture on Usenet. In S. L. Star (Ed.), Cultures of computing (pp. 29-52). Cambridge, MA: Blackwell.
Myers, D. (1987). Anonymity is part of the magic: Individual manipula tion of computer-mediated communication contexts. Qualitative Sociology, 10, 251-266.
19.Kent, P. (1994). Ten minute guide to the Internet. Indianapolis, IN: Alpha.
Wellman, В., Salaff, J., Dimitrova, D., Garton, L., Guilia, M., & Haythorn- thwaite, С (1996). Computer networks as social networks: Collaborative work, telework, and virtual community. Annual Review of Psychology, 22. 213-229.
Snyder, J. (1997). Groupware: Colonizing new ground for industrious net works. Available: www.Techweb.com/se/directlink.cgi7NWC199603l5.
22. From an article by Kakutani, M. (2000, June 27). When the geeks get snide. New York Times, p. В1.
23. Borsook, P. (2000). Cyberselfish. New York: Putnam.
For more cyberterms, see the Ultimate Silicon Valley Slang Page at www.sabram.com/site/slang/html.
Based on a study conducted by Belk, R., Wallendorf, M, & Sherry, J. (1991). The sacred and the profane in consumer behavior: Theodicy on the odys- sey. In Belk, R. (Ed.), Highways and buyways: Naturalistic researchfrom the con sumer odyssey (pp. 59-101). Provo, UT: Association for Consumer Research.
