Give an example of a breaching experiment that can be used for Text Messaging or Instant Messaging or Online?
I am working on a paper about how Harold Garfinkel would conduct a breaching experiment that can be used for non face-to-face communication, such as Text Messaging, Instant Messaging, or Online Chat rooms. PLEASE HELP!
No comments:
Post a Comment