💾 Archived View for spam.works › mirrors › textfiles › internet › leviatha captured on 2023-06-14 at 17:25:20.
-=-=-=-=-=-=-
Searching for the Leviathan in Usenet A Thesis Presented to The Faculty of the Department of Political Science San Jose State University In Partial Fulfillment of the Requirements for the Degree Master of Arts By Richard Clark MacKinnon December, 1992 APPROVED FOR THE DEPARTMENT OF POLITICAL SCIENCE __________________________________________ ___ Dr. William McCraw __________________________________________ ___ Dr. Kenneth Peter __________________________________________ ___ Dr. Ronald Sylvia APPROVED FOR THE UNIVERSITY __________________________________________ ___ Abstract Searching for the Leviathan in Usenet by Richard Clark MacKinnon The purpose of this thesis is to identify signs of Thomas Hobbes' Leviathan in the Usenet computer conferencing network. Certainly nothing that the Usenet users can experience can compare to the Hobbesian scenario in which persons are forced to give up the right to govern themselves in exchange for personal safety. This is certainly true on the surface, but there is another level of interaction within Usenet other than user-to-user. It is the level of the users' "personae," and it is at this level of understanding that the fear of vanishing from existence is ever present and near. For personae within Usenet, life can be described as "solitary, poor, nasty, brutish, and short." And it is for their sakes that this researcher has searched for and found a Leviathan in Usenet. Contents Introduction ...........................................1 Hobbes, Leviathan, and Usenet ..........................3 Usenet is a Distinct Society ...........................8 The Notion of Persona .................................14 Personae are Persons ..................................21 The Powers ............................................25 The Pursuit of Powers .................................32 Death .................................................37 Living in Moderation ..................................43 Looking for the Leviathan .............................55 Conclusion ............................................59 Appendix ..............................................66 Glossary ..............................................85 Bibliography ..........................................92 iv Introduction The purpose of this thesis is to identify signs of Thomas Hobbes' Leviathan in the Usenet computer conferencing network. Defined as "that mortal god, to which we owe under the immortal God; our peace and defence,"1 Leviathan in a computer conferencing network is the institution of censorship or moderation of the messages written by the network's users. According to Hobbes, living in fear of death or wounds disposes men to obey a common power.2 Certainly nothing that the Usenet users can experience can compare to the Hobbesian scenario in which persons are forced to give up the right to govern themselves in exchange for personal safety. This is certainly true on the surface, but there is another level of interaction within Usenet other than user-to- user. It is the level of the users' "personae," and it is at this level of understanding that the fear of vanishing from existence is ever present and near. For personae within Usenet, life can be described as "solitary, poor, nasty, brutish, and short."3 And it is for their sakes that this researcher has searched for and found a Leviathan in Usenet. In order to argue this work, this paper is organized into short sections or chapters designed around major points. The first chapter introduces the reader to Hobbes, _________ Leviathan, and Usenet. A glossary is provided to assist with technical computer terminology and an appendix contains relatively hard to find Usenet documentation. The argument itself consists of seven points and a survey of two hundred randomly selected Usenet articles. The survey was conducted to find measurable signs of the Leviathan as described in the argument. The findings show the degree to which Leviathan is present in Usenet. Each chapter states its purpose in the opening paragraphs and is concluded with a summary of the points covered therein. In this way it is possible to lead the reader through the theoretical worlds of _________ Leviathan and the Usenet persona. At the end of the argument is a conclusion which summarizes all seven points and focuses on the most difficult ones. And lastly, the thesis concludes with a short discussion of future research considerations. 1Thomas Hobbes, _________ Leviathan, Edited by Michael Oakeshott (New York: Macmillan Publishing Co., 1962), 132. 2Hobbes, 82. 3Hobbes, 100. 1 Hobbes, _________ Leviathan, and Usenet Hobbes' _________ Leviathan was selected for this thesis primarily because it is a system of knowledge developed for the purpose of understanding the genesis of government. This system of knowledge for understanding the "matter, forme and power" of society, originally advanced during Cromwell's tenure, was published in 1651. The controversial title implied that the monarchy was the political manifestation of the Biblical beast and the work was considered scandalous. Hobbes scholar Herbert Schneider explains that the choice of the title is curious because the mythological Leviathan is consistently the symbol of the "powers of evil, "4 rightfully upsetting the supporters of the Crown. Yet it is clear when Hobbes describes the Leviathan as the "mortal god"5 on earth that he does not share the common diabolical connotation. Certainly Hobbes was aware of this discrepancy and it is likely he intended for the discrepancy to further define his concept of a Leviathan rising from the people. There is no doubt that such a "beast" would need to be menacing and powerful in order to convince people that their lives are safer with it than in their own hands. The Leviathan is the generation of the Commonwealth, that entity consisting in the powers of all people which can protect them from their enemies. Hobbes' critics were quick to equate the evil beast with government, thus putting Hobbes at odds with the regime indeed, with any government. It is possible that Hobbes selected the Leviathan symbol in part to convey that government is a necessary evil given humans' inclination to destroy one another without it. Even this notion brought Hobbes criticism as a paranoid anti-establishmentarian. While he admits to a level of paranoia commensurate to being born the "twin of fear," he is emphatically not anti-establishment--in fact, he would have supported either Cromwell or the King as long as one of them possessed absolute power to govern as a Leviathan. Given his dim view of human nature, his predilection toward paranoia, and the execution of the King, one cannot blame Hobbes for desiring peace and order at any price. Though never the intentional sum and highlight of his political, religious, ethical, and philosophical view, _________ Leviathan has nevertheless emerged as such. This is because of Hobbes' precision in the use of language and his plain treatment and analysis of socially sensitive matter. In his lifetime _________ Leviathan earned Hobbes the enmity of many who had formerly been his friends. Today it is still popularly trivialized as a dark and heretical treatise written by a paranoid exile. But Hobbes' 4Herbert W. Schneider, "The Piety of Hobbes," in ______ Thomas ______ __ ___ ____ Hobbes in His Time, eds. Ralph Ross, Herbert W. Schneider, and Theodore Waldman (Minneapolis: University of Minnesota Press, 1974), 86. 5Hobbes, 132. 3 4 admirers and students appreciate the giant work for what it is--a reconstitution of civil society from its most basic element. He begins his book with the ambitious sentence, "Concerning the thoughts of man, I will consider them first singly, and afterwards in train, or dependence upon one another."6 Considering that his goal is to explain governance, one would expect that a beginning begun with a discussion of the "single thought" would immediately proceed to more developed concepts such as the rights of kings. Not so. After describing the nature of thought, he discusses the senses, imagination, dreams, the development of speech, passions, virtue, and the categorization of all knowledge. It is not until Chapter Sixteen that he defines what a person is and in Chapter Eighteen he finally addresses the rights of sovereigns. It is an understatement to say that Hobbes is thorough in his endeavor. Although this thesis focuses on the generation of Leviathan (at the end of Chapter Seventeen), it is important to realize that this study covers only a quarter of the book. The result is a self-contained, interlocking structure with every word defined and every conclusion logically sound. In the writing of his book, Hobbes incidentally produced the first comprehensive attempt at the theory of language. In other words, Hobbes had to develop a theory of language to accurately describe his theory of the commonwealth. Richard Tuck remarks that _________ Leviathan is the "first unquestionably great philosophical work" in English.7 Prior to _________ Leviathan, all scholarly works of import were written in Latin, French, German, or ancient Greek.8 Since his endeavor was intentionally comprehensive, his treatise is unusually suitable for examining any and all societies-- including those that did not exist in his time and as in the case of Usenet, arguably do not exist now. This is possible because the treatise is presented mostly in general terms, giving it broad applicability and timelessness. While it is true that _________ Leviathan is a product of troubled times, Hobbes' sparing references to Britain merely illustrate his points and do not confine them to that island. Additionally, his masterful understanding of philosophy beyond the realm of politics is useful in the establishment of personae and their virtual society of Usenet. Usenet is the largest computer conferencing network in the world. The network is composed of an estimated 2.3 million users at 45,000 sites worldwide. Most sites are academic institutions or high technology companies, but commercial and publicly supported 6Hobbes, 21. 7Richard Tuck, ______ Hobbes (Oxford: Oxford UP, Clarendon, 1957), vii. 8And undoubtedly, Chinese and Italian. 5 access is available to any interested group or individuals. Usenet users can send private messages to one another via electronic mail. The mail can reach many sites on the planet within seconds. The users can also write public messages known as "articles." These articles are divided into approximately 4,000 thousand categories called "newsgroups." Newsgroups range in topics from political theory to baseball. The current volume of articles is 14,000 daily.9 Despite its size, Usenet has no central authority which monitors access or content. All control, if any, is exercised at the site level. Sites determine whether to provide access to users or whether they want to provide a "feed" or connection to a potential site. Users and sites may remain on the net as long as the sites that provide them with access continue to do so. Usenet articles are distributed using a "store and forward" method. This means that when a user writes an article, the original article is stored at his or her site and a copy is forwarded via telephone or leased line to neighboring sites. Because the associated costs of storage and forwarding can become very high, economics may have more of an impact over local control than anything else. A company, for example, may decide to restrict users from participating in any of the recreational newsgroups because the volume in those groups is high and their business value is low. Still, some organizations may opt to control content for other reasons. For example, a high school may decide to block participation in sexually-oriented newsgroups. However, thousands of users around the world enjoy unrestricted access to newsgroups containing articles from the technologically informative to the obscene. Depending on the user consulted, Usenet can be an anarchic or a highly regulated medium of communication. 9Brian Reid, ______ __________ _______ Usenet Readership Summary (Palo Alto, California: Network Measurement Project at the DEC Western Research Laboratory, March 1992), lines 22-28. The lines are cited rather than page numbers because the document was received electronically without pagination. Usenet is a Distinct Society In order to apply Hobbes' political philosophy to Usenet, it is important to establish the distinctness of the Usenet society. Distinctness assures that Usenet differs enough from the external world--the reality outside of Usenet--to provide a unique laboratory to cultivate new insights and new conclusions. The argument for distinctness consists of Usenet's two-dimensional nature, its creation of an explicit language to describe its "physical" reality, its interference in the transfer of the social structure from the external world, and its ability to compensate for the lack of a complete social structure by developing a parallel or alternate structure to that of the external world. Although Usenet is designed to facilitate communication among computer users, it is restricted to written communication; therefore, it mitigates the amount and quality of communication possible among them. Much like unintroduced penpals can never know the "real" persons behind their letters, Usenet users can never know the "real" persons behind the articles. It is not possible to capture the range of interpersonal interaction with only the written word, transforming Usenet into a two-dimensional substitute for three-dimensional, "face-to-face" communication. As a result there is a deception in the medium that often distorts the meaning of a message, much as a carnival mirror distorts the reflection of a person: what is "said" is not necessarily what is "heard," or more accurately, what is written is often misinterpreted. Since ambiguity has this deceptive effect in the external world, Usenet participants are especially susceptible to ambiguous statements, implied meanings, and sarcastic remarks. Whereas external world users can find clues to meaning in facial expressions and voice control, Usenet participants cannot. But more importantly, the lack of cues available during "face-to-face" communication points not only to the absence of faces, but to the absence of all physical reality. Lacking physical reality, Usenet users must create an explicit, written language to convey meaning as well as emotion, physical qualities, and action. As a society based in language, it relies heavily on symbol, analogy, and metaphor to re-create or transfer physical matter and actions from the external world. But since these re-creations are merely metaphors for, or "analogs" of their physical counterparts, Usenet can never be a mirror image of the external world. Usenet users are unable to "bring" with them their respective social structures because the limitations of written communication deconstruct their external world social structure. These social structures consist of the norms, mores, and traditions which guide the users' interaction as members of the external society. The computer medium inhibits computer users from transferring these social structures to Usenet. This inhibition resulting from the absence of or limitations on physical proximity, "face-to-face" interaction, and non-verbal 8 9 cues, is discussed and analyzed at length in Elizabeth Reid's _____________ _____________ ___ _________ __ ________ _____ Electropolis: Communication and Community on Internet Relay ____ Chat. Reid exposes the failings of computer-mediated, i.e., written, communication as follows: Words, as we use them in speech, fail to express what they really mean once they are deprived of the subtleties of speech and the non-verbal cues that we assume will accompany it. . . . It is not only the meanings of sentences that become problematic in computer-mediated communication. The standards of behavior that are normally decided upon by verbal-cues are not clearly indicated when information is purely textual.10 The deprivation of the "subtleties" is exactly what makes communication and interaction among Usenet users different from a room full of computer users. Computer users, as do all persons, learn standards of behavior from their respective social structures. As Reid suggests, these standards are reinforced by "subtleties of speech and non-verbal cues." But within Usenet, users limited to written communication are denied the full range of verbal and non-verbal cues customary to interpersonal communication and required for reinforcing behavioral standards. In the external world, behavioral standards dictate that one should not provoke a visibly angry man, but in Usenet the absence, or least the distortion, of visible anger interferes with that standard of behavior. Despite the limitations of a society based upon written communication, Usenet users are able to compensate. The "interference" or distortion caused by the written medium forces Usenet users to confront what Reid calls the deconstruction of the "traditional methods for expressing community" by developing "alternate or parallel methods."11 In this way, Usenet has become an alternate or distinct society from the external world. Usenet's parallel method or analog for conveying mores, norms, and traditions is known as "netiquette." As the term implies, it is literally "network etiquette" and it helps to reinforce the standards of behavior that users might miss from the lack of non-verbal cues. Several attempts have been made to summarize the norms of "netiquette." The most widely cited is Gene Spafford's series of documents12, which he compiled and edited from the suggestions of Usenet users. Either heeded or ignored by many, the estimates of the validity of Spafford's guidelines vary, but they are often invoked to resolve a dispute or to 10Elizabeth Reid, "Electropolis: Communication and Community on Internet Relay Chat," thesis, (Melbourne, Australia: University of Melbourne UP: 1991), lines 495-505. 11Reid, lines 200-206. 12These documents are included in the Appendix. 10 "advise" one another. In the following example, "Jack" from the University of California at Irvine advises "Bill" from The Netherlands of a breach of "netiquette": Your reply to my post gave me mixed messages. Some of your comments are cruel. Your flame should have been sent directly to me via e-mail.13 Since enforcement of "netiquette" begins with the individual users, consensual interpretation by the Usenet public determines the "law." If a user's action offends one person in 10 million, that action is probably a slight breach, but nothing of wider concern; however, if an action results in thirty complaints, then it usually is treated more seriously. "Netiquette" then, is the Usenet analog for the external world's system of mores, norms, and tradition. While not a precise duplication of the external world's social structure, "netiquette" provides Usenet users with guidelines or standards of behavior. Chuq Von Rospach, author of _ ______ __ ___ __ ____ ____ ___ ______ _________ A Primer on How to Work with the USENET Community, writes, . . . for USENET to function properly those people must be able to interact in productive ways. This document is intended as a guide to using the net in ways that will be pleasant and productive for everyone. This document is not intended to teach you how to use USENET. Instead, it is a guide to using it politely, effectively and efficiently.14 It will be recalled that Reid suggests non-verbals cues reinforce the standards of behavior in the external world. Just as "netiquette" developed into the Usenet analog for standards of behavior, a system of written cues has developed as an analog to reinforce those standards. These cues, known as "emoticons" make use of non-standard punctuation, spelling, capitalization, and special keyboard characters to convey action, emotion, and emphasis. An excerpt from Spafford's guidelines follows: The net has developed a symbol called the smiley face. It looks like ":-)" and points out sections of articles with humorous intent. No matter how broad the humor or satire, it is safer to remind people that you are being funny.15 13All such examples are exerpts from actual Usenet communication. The original punctuation and spacing has been left intact to preserve the intent of the message. In the interest of privacy, the authors' surnames have been suppressed. 14Chuq Von Rospach, _ ______ __ ___ __ ____ ____ ___ ______ A Primer on How to Work With the USENET _________ Community. Compiled by Gene Spafford, 1987, lines 14-16. See the Appendix for the complete text. 15Von Rospach, lines 112-114. 11 This guideline emphasizes the use of emoticons to convey humor in order to avoid the consequences of ambiguous or sarcastic statements, but does not show the variety of possibilities, as in the following examples: Steve, hahahahahahahhahahahahahahahahahahahahaa *sniff* waaaaaaaaaaaaaaaaaaaaaaaaahhhhhh I laughed, i cried....that post was GREAT! :-) Amusedly, -Mirth- In this message, "-Mirth-" from the Massachusetts Institute of Technology, has no difficulty sharing his or her amusement with an earlier "post" or message of Steve's. Note the use of the asterisks in "*sniff*" to convey action as opposed to simply saying "I sniffed," as is done later. Of course, the capitalization in "GREAT" indicates emphasis, presumably enthusiasm given the presence of the "smiley." Consider the next example from a user at Dalhousie University in Halifax, Canada: You know, I agree with everything you said. However, you loosely fall into the dweeb category by admitting you actually READ most of the damn thing. It brings no fame to its creator, but only humiliation to the human species (or does Kibo not fit into the homo sapien sapien category? Maybe there is a better division for an individual who's life is overwhelmed by USENET? homo sappy postus?) *shakes his head, almost embarassed that he has a 4 line .sig, let alone a 950 line one* This article is an excerpt from a discussion on whether having a "950 line" signature on an article is a violation of "netiquette." The Canadian user agrees that a lengthy signature is a violation and becomes embarrassed when he realizes that his own "4 line .sig" is considered too long by most interpretations of "netiquette." He conveys this realization by using asterisks to simulate the shaking of his head. To summarize, it is important to establish the distinctness of Usenet from the society of the external world so that new insights and new conclusions may be cultivated from the application of Hobbes' political philosophy. This distinctness is established by Usenet's explicit language for conveying meaning, emotion, and action to a two-dimensional environment. Although Usenet users are able to compensate for the lack of a physical reality, their parallels or "analogs" with the outside world have resulted in a distinct reality of their own. The Notion of Persona The high level of interaction between Usenet users in their distinct society results in the development of "personae." The following discussion explores this development, the personae's ability to portray Usenet users to one another, the derivation of their "actions" from words, and the conditions for their existence. Usenet is distinguished from other written media by the level of interaction among its users. A printed newspaper, for example, offers its readers a one-way medium. Generally, a newspaper is a medium for the writers to communicate to their readers and not with them; however, the Opinion/Editorial page does provide for selected reader response. There the opinions expressed are personal and not necessarily the view of the newspaper's staff. These opinions may be compelling or inane, but it is the names attached that remind one that there are individuals at the source. These individuals, through the interaction of their opinions, briefly create a sense of community. Granted, such a community is a fleeting one at best, for often the emergent dialogue is not a dialogue at all, but a set of coincident monologues submitted in reaction to a piece of news. Any repartee is unintentional and possibly staged--selected--by the editor to represent a diversity of views. In Usenet, dialogue is spontaneous and unedited, and the individuals at the source are users who frequently contribute on a regular basis. The most active users contribute over fifty articles per week each.16 This high level of interaction among Usenet users creates a more permanent sense of community than among a newspaper's readership. Accordingly, this high level of interaction among users provides opportunities to develop relationships. It has been established that the medium of written communication interferes with the transfer of the users' external world social structures into Usenet. By the same means, written communication interferes with the transfer of the users' personalities and unique qualities as well. The result is the creation of "personae" which are as distinct from the users as Usenet society is distinct from the external world. The external world of the users is a world of myriad objects to be sense- perceived ultimately to be desired or avoided.17 The nature of the users' known universe possesses physical characteristics that can be sense-perceived either directly or indirectly via technological extension of the senses or a combination of these accompanied by scientific deduction. Words signify the memory of 16UUNET Technologies, Inc., ___ __ ____ __________ __ ____ Top 25 News Submitters by User __ ______ __ ________ ___ ___ ____ _ _____ by Number of Articles for the Last 2 weeks (Falls Church, Virginia: July 24, 1992). 17Hobbes, 48. 14 15 sensory experience and thought18, but the physical things of the external world exist independently of the words which describe them. Though important, words are not required for the existence of the things to which they refer. But within Usenet, words are the sole means of characterizing the network's universe. Thus, wordsmanship in Usenet is a far more valued skill than it is in the external world. Consequently, possession or lack of this skill can inadvertently give the Usenet user a radically different persona from him or herself. Accordingly, a command of written language can empower a persona in Usenet beyond the relative strength of its user in the external world. The degree to which Usenet users resemble their personae seems to vary. The representation of a user within Usenet is the attempted transfer of the user's individuality into a Usenet persona. The user has some control over the representation and the extent to which the persona resembles himself or herself. A representation is transparent when the user attempts to represent him or herself as he or she is; a representation is translucent when the Usenet persona is only a shadow of the user; and accordingly, a representation is opaque when the persona does not resemble the user at all. A user can spend a great amount of energy wondering about the "real" users behind the personae with which he or she interacts. In all cases where there is no direct knowledge of another user, if one cares, one must rely upon the word of that user as to whether that persona is an accurate representation. Since it is in effect that user's word which is in question, relying upon it offers little relief. Without direct or revealed knowledge, the pursuit of the true nature of representations is a matter for speculation. Therefore, until the full truth is known, it is a common and expedient practice to "forget" about the users behind the personae so that any purported resemblance or dissimilarity of personae to users can be treated as if it does not matter.19 Since Usenet is a medium for communication, any resemblance it may have to external world society necessarily must be reduced to written form. Physical actions such as activating a computer or restricting access to another user's account are actions completed by users and not by their Usenet personae. Users have physical form and are able to manipulate physical objects such as power switches and keyboards, but their Usenet personae have no physical form. Therefore any interaction among personae must be derived from the written words of their users. Note that actions derived from written messages do not correspond exactly to those of the respective users. For example, the action of a persona 18Hobbes, 33. 19We commonly "forget" complications for the sake of simplicity. For example, it is simpler to think of the sun "rising" than it is to think of the earth turning. 16 which is "smiling," corresponds to the action of a user who is typing. Although the action of "smiling" is derived from the words that the user types, the actions do not correspond exactly because the user may or may not be smiling and the persona is probably not "typing." It is the high level of interaction among Usenet users which gives their personae "life." In fact, a single response to one's statement is sufficient to generate a persona. That response, though minimal, is the foundation of existence within Usenet. It is obvious that a response implies a cause or stimulus worthy of reaction; however it is less obvious that by implication it signifies an acknowledgement of that cause. In terms of "cause" and "effect," a characteristic of the effect is the substantiation of its cause's existence. In terms of Usenet, a response substantiates the existence of a statement. This may seem trivial until it is recalled that Usenet personae are created as a result of the interaction among Usenet users. This interaction consists of the cycle of statement and response. The existence of the personae, therefore, is tied to that cycle. One may wonder why interaction is a prerequisite for a persona's existence. In a written world such as Usenet, there is a stricter burden of proof for existence than Descartes requires in the external world. A user can read and contemplate the words of another user, but unless there is a visible, i.e., written, response via his persona, the action of reading and contemplating goes unnoticed. If a user is unnoticed, then he or she is not interacting with other users. Because personae are created as a result of interaction, reading and contemplating alone are insufficient to generate or maintain the existence of a persona. As shown, "Cogito ergo sum" is an insufficient measure of existence within Usenet. If all users kept their thoughts to themselves, they certainly would be assured of their own existences, but Usenet would be reduced to a non-interactive, indistinct, written medium. Without some sort of response beyond interior cogitation, there is nothing to be perceived by other Usenet users. "Network existentialism" is therefore more skeptical than Decartes' externalism can account for. However, a dialectical approach can be used to establish a measure for existence within Usenet. Whereas "I think, therefore I am" is insufficient for this purpose, so too is "I write, therefore I am." Again, without a visible response, a written statement remains isolated and apparently unperceived--a persona's existence is neither generated nor substantiated. A further modification to the premise results in, "I am perceived, therefore I am." Suddenly the Usenet user is no longer alone, for to be perceived requires another. The visible response, "I hear you" generates and substantiates the existence of the first user's persona, whereby a reply would perform the same function for the second user's persona. The visible response is evidence of perception. Without that response, the perception remains as an interior cogitation of the would-be respondent and does nothing to substantiate the existence of either user's persona. 17 The visible cycle of cause and effect, the users' statements, responses, restatements, and correspondence ensures the viability of the personae of both users. When extended beyond them to the multitude of the personae within Usenet, the existence of all of them is assured. Where the parallel between dialectical existence in Usenet to independent existence in the external world might be difficult to follow, the parallel for the quality of life is more apparent. As in other aspects of the comparison of Usenet to the external world, persona existence is distinct from user existence. Users require air, food, water, and other essentials for basic existence. Personae, lacking physical form, do not require physical sustenance; nonetheless, they are dependent upon three essential conditions for existence. The first condition is the continued association between the user and the persona. The loss of the user's access to Usenet severs the association to his or her persona. Once Usenet loses its utility to the user, the continued association to the persona is threatened. In other words, a persona's existence is dependent upon a user's access to Usenet; and a user maintains access to Usenet so long as Usenet remains useful. The second condition is the visible demonstration of presence. While Usenet may have great utility to a passive user,20 the lack of interaction with other users does not create a persona which exists in a way previously defined as existence within Usenet. The passive user remains outside the boundary of Usenet existence and his or her actions are unnoticed to "life" within. This study concerns itself with those users who choose to participate. The third condition is that the participation is continuous. A persona belonging to a user who is prevented, unable, or unwilling to continue to participate will continue to exist until the memory of that existence is forgotten by the other users. In summary, the two-dimensional nature of Usenet, caused by the medium of written communication, forces the development of personae among interacting users. Further, the derived actions of the personae from the words of the users are distinct from the physical actions of the users. Also there is sufficient distinctness to allow users to "forget" that they are interacting with representations of other users and not the users themselves. Finally, the personae exist dialectically21 and will continue to 20A passive user is a user who does not or cannot communicate with other users, e.g., while using a library's online catalog. 21 Prior to the "first cause," participant A is isolated in silence and unaware of "self" and "other"--existence is undefined. Participant B, like A, is also alone and ignorant. Spontaneously, participant A wonders aloud, "What is my purpose, if any?" B, surprised by the break in the silence and the presence of another, replies, "I don't know, but let's find out 18 exist as long as Usenet retains its utility to the users and the users continue to participate continuously via the cycle of statement and response. together." The phenomenon of mutual awareness implies the simultaneous awareness of the other and the self. This rudimentary confirmation of existence-dependent-upon-another, i.e., co-existence, is sufficient enough to allow participants A and B to pursue the purposes of their existence together. Personae are Persons Having established the distinctness of Usenet's society and its persona population, it is possible to proceed with a preliminary parallel to _________ Leviathan. Establishing the parallel between persons and personae will allow for the subsequent application of Hobbes' political philosophy to Usenet. This parallel is established in the following discussion of Hobbes' definition of "person," the actions of personae, and the special form of representation known as "impersonation." Hobbes writes, A person is he, _____ _____ __ _______ ___ ___________ whose words or actions are considered, ______ ___ ____ __ __ ____________ ___ _____ __ _______ __ either his own, or as representing the words or actions of _______ ___ another man . . . When they are considered his own, then is he called a _______ ______ natural person: and when they are considered as representing the words and actions of another, then is he a _______ __ __________ ______ feigned or artificial person."22 Having established that personae represent users to one another in Usenet, this definition seems to suggest that personae are indeed persons. To explain, according to Hobbes a persona represents the "words or actions of another man." Indeed, a persona represents the words and actions of a user. Further, Hobbes defines "personation" as "to act or represent oneself."23 This being the precise purpose for personae in Usenet, "personation" is alternately definable as the "generation of a persona." Therefore, in terms of Hobbes, Usenet users must "personate" themselves via personae because written communication prevents the users from acting and representing themselves in person. In other words, personae are the Usenet analogs for persons in the external world. While it is true that a persona's actions represent the actions of a user, the distinctness of the persona from the user allows for the distinctness of the persona's actions. Recall that all persona actions must necessarily be derived from the written responses of the users. When a user writes a hostile message to another user, his or her persona in effect "attacks" the persona of the recipient. Whether a persona is actually responsible for or "owns" the "attack," Hobbes writes: Of persons artificial, some have their words and actions _____ owned by those whom they represent. And then the person is the _____ actor; and he that owneth his words and actions, is the 22Hobbes, 125. Hobbes tends to emphasize with capitalization and italics. This emphasis will be preserved in all selected passages and quotations. 23Hobbes, 125. 21 22 AUTHOR: in which case the actor acteth by authority.24 Strictly interpreted, personae are "artificial persons" because their words and actions are owned by the users whom they represent, but since it is common and expedient to "forget" that personae are representations of users, it is possible to understand how a persona's actions can be interpreted as the persona's own. Although Hobbes does not say specifically, he suggests that accountability for one's own actions is the consequence of acting as "owner" of the actions or with "authority."25 Accordingly, the expedience of "forgetting" may lead one to treat a persona as the author of its actions, thereby expecting accountability from the persona for the actions. This is an unrealistic expectation, given that a persona is but a representation of a user who is the owner of its actions. From this it follows that a user seeking to evade accountability for his actions might attempt to exploit the expedience of "forgetting" by acting through another user's persona. By impostering or "impersonation," he or she can create a persona that appears to represent the personality and unique qualities of another user. Because of the expedience of "forgetting" and the uncertainty regarding the degree of representation (transparent, translucent, or opaque) between users and personae, "impersonation" is a more serious violation of trust in Usenet than it is in the external world. Reid writes, "The illegitimate use of [personae] can cause anger on the part of their rightful users and sometimes deep feelings of guilt on the part of the perpetrators."26 "Impersonation" is classified as an opaque representation since the persona is intended to represent someone other than the user behind it; however, not all opaque representations are impersonations. A user seeking complete anonymity for personal privacy reasons might consider an opaque representation; however, a translucent representation is more common. A translucent representation is typified by the user who wishes to interact via a pseudonym. For the same reasons that an author would elect to use a pen name, a translucent representation is useful in masking the user's identity in certain situations. When the user is not seeking to evade accountability for his or her actions, he or she is not "impersonating." To review, having established the distinctness of Usenet's society and its persona population, it is possible to proceed with a preliminary parallel to _________ Leviathan. This parallel establishes that personae "act or represent the words or actions" 24Hobbes, 125. 25Hobbes, 126. 26Elizabeth M. Reid, "Electropolis: Communication and Community on Internet Relay Chat" (thesis, University of Melbourne, 1991), lines 1139-1141. 23 of their users. Additionally, expedience allows one to treat a person's words or actions as the persona's own. This being Hobbes' definition for "personation," personae are therefore the Usenet analogs for persons in the external world. Further, a user may exploit that expedience and "impersonate" another user to evade the consequences of his or her actions. Finally, this preliminary parallel between Usenet and _________ Leviathan clears the way for further analysis of the latter and the development of analogs within the former. The Powers Given the preliminary parallel between personae and Hobbes' "persons," it is possible to establish a further parallel between _________ Leviathan and Usenet. Hobbes explains that persons possess certain powers. The discussion continues with the consideration of these powers and development of their Usenet analogs. On the subject of power, Hobbes begins, _______ _____ Natural power, is the eminence of the faculties of body, or mind: as extraordinary strength, form, prudence, arts, eloquence, liberality, nobility. ____________ Instrumental are those powers, which acquired by these, or by fortune, are means and instruments to acquire more: . . .27 Three of these natural powers are severely limited in their transfer to Usenet society because Usenet personae lack physical form. They are strength, form, and arts. Obviously, physical strength is irrelevant in any environment devoid of physical things, but a Usenet persona can have strength relative to other personae. In terms of Usenet, strength is one's ability to "execute an attack." It will be recalled that the action of "attack," like all actions in Usenet, must be derived from the cycle of statement and response. Therefore, "strength" in Usenet is one's ability to write a potent or even, vehement statement. The power of "form" comes from one's physical makeup. In essence, it is the effect that one's appearance has on others. According to Hobbes, "form is power; because being a promise of good, it recommendeth men to the favour of women and strangers."28 Like "strength" it transfers poorly into Usenet because personae lack physical form. Yet it has an analogous counterpart: "form" in terms of Usenet, comes from the impression one makes on others, not with one's physique, but with one's words. Even a pseudonym can convey form, as "Spartan" brings to mind images of frugality and warriors and "Damsel" connotes femininity and distress. "Form" can extend to actual word choice when academic language can make a persona "appear" more scholarly, or when language laden with scientific jargon might bring to mind images of laboratory coats and measurement instruments. Granted, while these images are not the clear, consistent images conveyed by "form" in the external world--in fact, they probably vary depending on the perceiver--they do serve to add a "face" to a name and a personality to the words. It is only natural to want to "fill in the blanks" that Usenet's analog for "form" leaves empty. Regarding the power of arts, Hobbes writes, 27Hobbes, 72. 28Hobbes, 73. 25 26 Arts of public use, as fortification, making of engines, and other instruments of war; because they confer to defence, and victory, are power: and though the true mother of them, be science, namely mathematics; yet, because they are brought into the light, by the hand of the artificer, they be esteemed, the midwife passing with the vulgar for the mother, as his issue.29 Since Usenet is a non-physical environment, the notion of "defence," like that of strength, must be derived from the cycle of statement and response. Having established that "strength" in Usenet is one's ability to write a potent statement, then it follows that "arts" in Usenet, because they "confer to defence," must be one's ability to write a rebuttal. In contrast, the powers of "prudence" and "liberality" are transferred to Usenet almost completely. "Liberality" is intended by Hobbes to mean "generosity." He writes, Also riches joined with liberality, is power; because it procureth friends, and servants: without liberality, not so; because in this case they defend not; but expose men to envy, as a prey.30 "Liberality" can be combined with things other than riches to produce the same effect. Consider the act of restraining oneself from easily humiliating a subordinate in public or the act of freely and genuinely offering one's assistance to the uninitiated. These acts of kindness bolster one's liberality. Additionally, they are actions easily transferred to written form. On the subject of prudence, Hobbes writes, When the thoughts of a man, that has a design in hand, running over a multitude of things, observes how they conduce to that design; or what design they may conduce unto; if his observations be such as are not easy, or usual, this wit of his is called PRUDENCE; and depends on much experience, and memory of the like things, and their consequences heretofore.31 Here Hobbes explains that "prudence" comes from "much experience" leading to "unusual observations" or insight. A person's prudence transfers to his or her persona because they share one and the same mind and experiences, despite the fact that expedience may permit one to "forget" this fact. Only when one's writing ability interferes with one's attempt to communicate 29Hobbes, 73. 30Hobbes, 72. 31Hobbes, 61. 27 prudently does a persona seem less prudent in Usenet than the user does in the external world. Unlike the previously discussed powers, where it is clear that some have more exact Usenet analogs than others, the transferral of "nobility" to Usenet presents difficulty. Hobbes explains, Nobility is power, not in all places, but only in those commonwealths, where it has privileges: for in such privileges, consisteth their power.32 One's privileges come from the recognition by others of one's rank or nobility. Unless one conveyed one's nobility through a pseudonym or name such as "Dr. Oakeshott" or by the use of revealing information such as "My father, Senator Kennedy says . . . ," it is not likely that external world nobility will have relevance to Usenet society. Additionally, in cases where external world nobility is transferred, the privileges and respect are not as forthcoming as expected. Perhaps this is because persons of nobility, accustomed to the "trappings" of the elite, find that without these "trappings" in Usenet, their nobility is nothing more than words. However, nobility does exist in Usenet. Users such as Spafford, the frequently cited authority on "netiquette," seem to enjoy much deference when "making appearances" in Usenet. For example, because Spafford is famous, other users may be less visibly critical of his statements while he is "present." "Eloquence," is possibly the most important power in Usenet. Hobbes probably included eloquence among the powers because it enables one to communicate, not only functionally, but with finesse. Hobbes writes: "Eloquence is power, because it is seeming prudence."33 The skill of writing enables one to have "a way with words" or eloquence. Moreover, in a world where words are primary to existence and serve as the sole mode of communication and activity, their importance cannot be exaggerated. In _____ ________ Emily Postnews, author Brad Templeton reminds the uninitiated user that "sloppy spelling in a purely written forum sends out the same silent messages that soiled clothing would when addressing an audience."34 On the other hand, actually wearing soiled clothing while accessing Usenet has absolutely no effect on one's persona. The premium that Usenet places on spelling, and writing skills in general, inflates the Usenet analog for eloquence beyond its relative worth in the external world. 32Hobbes, 73. 33Hobbes, 73. 34Brad Templeton, _____ ________ Emily Postnews, compiled by Gene Spafford, 1991, lines 241-245. See Appendix for complete text. 28 Hobbes discusses additional powers which rely on or operate in conjunction with those already considered. Among those additional powers are "affability" and united power. The power of "affability" seems similar to that of "liberality." "Liberality" was described earlier with the examples of public restraint with subordinates and generosity with the use of one's powers. Strictly speaking, these qualities of graciousness more accurately describe the power of "affability." If one reviews Hobbes' definition of "liberality," one will notice that "liberality" is power when "joined" with riches. Clearly, Hobbes is concerned with "riches" when he writes of "liberality" because "it procureth friends, and servants." Hobbes believes that "liberality" or generosity with one's riches is a power because friends and servants contribute to one's defense. The external world concept of "riches" does not easily translate into a world without physical or material wealth, but the development of the analog is possible nonetheless. In the external world, money is used to barter for goods and services. In Usenet, goods do not exist. On the other hand, services are abundant: sharing one's knowledge is a service. Assisting a new user is a service. These services may be traded in Usenet analogously to their trade in the external world. Therefore, the Usenet analog for "riches" is "services." This conclusion returns one to the original observation that "liberality" and "affability" appear to share the same definition. With respect to Usenet, indeed they do. Finally, the power of united power or power "united by consent" is described below: The greatest of human powers, is that which is compounded of the powers of most men, united by consent, in one person, natural, or civil, that has the use of all their powers depending on his will."35 It is premature to discuss why persons would want to unite their powers in a single person before it has been considered why they would want to pursue powers for themselves. But since Hobbes includes this power with the rest, it is important to note that a power "which is compounded of the powers of most men" is the "greatest of human powers." While this may be true in the external world, the nature of Usenet's written medium may subordinate united power to the power of "eloquence," since it is "eloquence" which enables users to create the environment where unity takes place. 35Hobbes, 72. The Pursuit of Powers Given the discussion of Hobbes' "powers" and the development of their respective analogs in Usenet, it is possible to discuss and develop the pursuit of powers in the external world and in Usenet. This will be done by examining the benefits of power, the need for continuous participation to retain one's powers, and the effect of using one's powers to confront or compete with another person or persona. With respect to the benefits of power, Hobbes writes, [Powers] . . . are the means and instruments to acquire more: as riches, reputation, friends, and the secret working of God, which men call good luck.36 The benefits of power then are riches, reputation, friends, and good luck. One will discover that these benefits are in some instances powers themselves, and that the pursuit of power appears to be an end in itself. Riches are perhaps the most difficult of the benefits of power to transfer to Usenet society. In the external world, riches are clear--they are the signs and objects of material wealth, such as money and possessions. Given that Usenet lacks a physical environment, an analog for material wealth, money, or possessions is nonsensical. However, it has been established that "services," as in sharing one's knowledge, is the analog for "riches." Reputation is significant in both the external world and Usenet. It is the most important benefit of power in Usenet society. Hobbes does not provide a simple definition with which one can grasp the full meaning of reputation; in fact, he defines reputation contextually in the definitions of other powers. Consider the following passage: Reputation of power, is power; because it draweth with it the adherence of those that need protection. So is reputation of love of a man's country, called popularity, for the same reason. Also, what quality soever maketh a man beloved, or feared of many; or the reputation of such quality, is power; because it is a means to have the assistance, and service of many. Good success is power; because it maketh reputation of wisdom, or good fortune; which makes men either fear him; or rely on him. . . . Reputation of prudence in the conduct of peace or war, is power; because to prudent men, we commit the government of ourselves, more willingly than to others.37 Broadly defined, reputation is the publicly held estimate of one's worth. With that in mind, Hobbes' definition of reputation 36Hobbes, 72. 37Hobbes, 72-73. 32 33 in the context of other powers make more sense. This being the case, reputation is the publicly held estimate of one's powers. For example, one may be an excellent cook known only within the private circle of one's friends, but once one establishes a reputation outside of that private circle, the estimate of one's excellence may be held publicly. In this case, the power of one's prudence in cooking is amplified by one's reputation, and Hobbes tells us that in the first line of that passage when he says "reputation of power, is power." It is in this sense of power begetting power that the importance of reputation is heightened in the external world. To the extent that reputation is the most important power in Usenet, the following discussion of the Usenet analog for reputation is critical. In Usenet, one's powers, such as strength and eloquence, are expressed by participating in the cycle of statements and responses. Only in this way can one's powers be perceived, substantiated, measured, and ranked by others. The resulting comparisons made among personae establish the public estimation of one's worth. This reputation-making process of comparison and worth is supported with the following two quotations from Hobbes: "Virtue generally, in all sorts of subjects, is somewhat that is valued for eminence; and consisteth in comparison."38 "For let a man, as most men do, rate themselves at the highest value they can; yet their true value is no more, than it is esteemed by others."39 Indeed, Hobbes makes it clear that reputation serves to set a "market price" for one's worth. He implies that although reputation can amplify one's strengths, it can expose one's weaknesses to greater scrutiny, thereby devaluating others' personal estimate of those strengths. And with respect to Usenet, reputation is the collective memory of the comparisons of past cycles of statement and response. Hobbes believes that the possession of friends is a benefit of power. The Usenet "public" that forms one's reputation consists of many personae, some of which are one's friends. During the cycle of the statement and response, the participants and the observers rate and compare the participants' expressions of their powers. This comparison reveals degrees of affinities among personae, that is, they may "take sides" on an issue. These affinities are guided by what is described by Hobbes as passions,40 which include but are not limited to appetite, 38Hobbes, 59. 39Hobbes, 73. 40Hobbes, 47. 34 desire, love, aversion, hate, joy, and grief.41 Those personae whose passions move them together out of common affinity become friends, supporters, and allies. Those whose passions disassociate them may become enemies. A persona's friends enable it to establish and build its reputation, thereby increasing its power, whereas its enemies seek to discredit it, thereby reducing its power. There is no inherent quality such as "good" or "evil" that distinguishes one's friends from one's enemies; what is knowable is only that the former seek to support and increase one's power, and the latter seek its attenuation. The benefit of power known as "luck" describes one's ability to "know the secret working of God." Certainly Hobbes does not mean direct knowledge of God, but he does want to acknowledge the power of those who tend to draw "stronger hands" than others. The most important analog for luck in Usenet is one's ability to draw friends. While it is true that one's friends come from those who observe one's actions, luck guides one to act fortuitously in places likely to attract many and the most reliable of them. In order to acquire the benefits of power, it is necessary to continuously participate in the cycle of statement and response. Although reputation is a benefit of power and a power, because it amplifies the other powers, the duration of that effect becomes important. If one's reputation is held by the public in collective memory, it follows that one's reputation is recalculated after each participation, with the readjusted reputation replacing the older reputation in the collective memory. Thus one's reputation lasts until it is forgotten. As one's reputation fades from memory, so fades one's power. However, to fade completely violates the condition of existence for continuous participation; therefore, to avoid the fading of one's power and the cessation of existence, one must continuously participate in the cycle of statement and response. To summarize, the objects or benefits of power are riches, reputation, friends, and luck. Of these benefits, reputation is the most important in Usenet because it is a benefit of power and a power in itself. It enables one to increase one's power by amplifying beyond the private circle into the public arena. By subjecting one's powers to perception, substantialization, comparison, and rating, reputation is created by participating in the cycle of statement and response. Reputation sets the "fair market" value for one's worth which may be higher or lower than one's own estimation. Reputation is stored in the collective memory of past participation in the cycle of statement and response. And finally, the duration of one's reputation depends upon one's continuous participation in the cycle of statement and response. 41Hobbes, 50. Death Where previously, the definition of power, its benefits and their Usenet analogs have been discussed, it is possible to explore in terms of Usenet, the pursuit of power, the notion of "death," and the competition for powers. The possession of certain benefits of power, such as reputation, is power in itself; however, possession of power alone seems not to be enough. In revisiting the following passage on power, it is important to focus on Hobbes' use of "more:" [Powers] . . . are the means and instruments to acquire more: as riches, reputation, friends, and the secret working of God, which men call good luck.42 Hobbes does not say, for example, that powers are the means to acquire riches, reputation, friends and good luck. He says that powers are the means to acquire "more." This suggests that Hobbes believes that the simple acquisition of powers is not enough. In fact, it is clear from the following passage that there is no limit as to how much can be acquired: And the cause of this, is not always that a man hopes for more intensive delight, than he has already attained to; or that he cannot be content with a moderate power: but because he cannot assure the power and means to live well, which he hath present, without the acquisition of more.43 As can be seen, the acquisition of "more" assures one's present power and "means to live well." This implies an active life of acquisition, not a leisurely life where one waits for power to come to him or her. Hobbes is saying that if one wants the assurance of one's "present means to live well," one must acquire "more." Hobbes is very clear on this point when he uses the word "restless" in the following passage. Note that "restless" should not be interpreted as "fidgety," but rather, more literally as "without rest": So that in the first place, I put for a general inclination of all mankind, a perpetual and restless desire of power after power, that ceaseth only in death.44 This indictment of "mankind" clears the way for a discussion of "death." According to Hobbes, death in the external world is the cessation of all movement, for men consist of a complex combination of motions ranging from one's limbs to one's 42Hobbes, 72. 43Hobbes, 80. 44Hobbes, 80. 37 38 dreams.45 These motions, "begun in generation, and continued without interruption through their whole life"46 distinguish the living from the not. The Usenet analog for life is also derived from motions, the motion of the cycle of statement and response, and it is predicated upon the satisfaction of the three conditions for a Usenet persona's existence: enough utility to assure the continued association between the user and the persona, the visible demonstration of one's presence via a persona, and continuous participation in the cycle of statement and response. Without the satisfaction of these conditions, a persona cannot exist. It is clear from the conditions that utility and participation are essential: Usenet must remain useful to the user and the user must continuously assert the existence of his or her persona by participating in the cycle of statement and response. The effect of participation in this cycle is the creation and development of one's reputation. Those personae whose reputations are highly valued attract a sufficient number of responses with which to perpetuate additional cycles for statement and response. Those personae with poorly valued reputations may at first generate an intense cycle based on criticism of another and defense, but often come to be ignored and forced to face exclusion, obscurity, and thereby "death." For example, well-regarded personae only need to participate occasionally to insure that they are not forgotten, because the resultant cycle of statement and response will generate enough interest to maintain their reputations, and thereby their existence. It is also possible that little known personae may establish temporary notoriety for themselves by making outrageous statements before returning to obscurity after their cycle has run its course. By far, the great majority of personae enjoy neither fame nor ignominy, for their participation merely consists of "skirmishes" and banter. To illustrate this case, it is common for one to state an opinion, draw criticism, and rebut it. The participants in this short cycle are then compared, rated, and their respective reputations adjusted in the collective memory. But consider the case where one is subjected to an undue amount of criticism. If the "assault" is without merit, as in the second illustration, one may choose to ignore it; but if the criticism is based on truth, one may feel compelled to defend his or her reputation. Hobbes explains this compulsion as a "right" when he says, THE RIGHT OF NATURE, which writers commonly call ___ jus 45Hobbes, 23-27. 46Hobbes, 47. 39 ________ naturale, is the liberty each man hath, to use his own power, as he will himself, for the preservation of his own nature; that is to say, of his own life; and consequently, of doing any thing, which in his own judgment, and reason, he shall conceive to be the aptest means thereunto.47 As it has been shown, reputation is the "tote board" of a persona's existence within Usenet; therefore, to defend one's reputation is to exercise one's natural right to self- preservation in Usenet. But even relatively minor "skirmishes" can lead to larger "battles," because the drive to acquire "more" can accelerate the cycle of statement and response into a reputation-making machine. Consider the effect of the "perpetual and restless desire of power after power" and the lengths that Hobbes believes a person will go to assure the acquisition of "more." In Usenet, the analog for an attack designed for quick reputational gain is called a "flame." Perhaps named for their inflammatory nature, "flames" tend to be ad hominem, argumentative, and often have little to do with the original discussions in which they develop. The extremely personal nature of "flames" often draws one to respond reflexively with a statement even more insulting or offensive than the original. Again, the motivation to participate in such an exchange is to publicly defend one's reputation. A cycle containing ad hominem exchanges can gain momentum very quickly, attracting outside attention to its participants. As the number of observers increases, the reputational stakes of the participants increase. This has the effect of luring some of the observers from the "sidelines" into the cycle as well, causing the spread of the"war." Sometimes compared to "storms," because they appear without warning, wreak havoc, and subside just as unpredictably, "flame wars" can start over spelling, grammar, semantics, or any seemingly trivial issue. Since "flame wars" can dominate or otherwise interfere with the discussion of non-participants, the "wars" tend to diminish the utility of Usenet to those non-participants. Since utility is among the conditions of existence within Usenet, if enough non- participants feel the utility of their participation in Usenet is substantially threatened by a "flame war," the warring participants have nothing to gain reputationally and much to lose. In fact, once a "flame war" loses its audience, the participants not only lose those who would judge and compare their actions, but more importantly, a war offensive, annoying, or useless enough to drive away its observers will probably cause a net loss to the reputations of its participants. Although "flame wars" are generally discouraged because they are so disruptive, they persist, and are commonly found in newsgroups oriented toward social issues and controversy. However, the relatively sedate technical discussion newsgroups have their share. The notoriously disruptive, and futile, cycle of "Macs 47Hobbes, 103. 40 are better than PCs" is a recurring "flame war" which many users try to extinguish as quickly as it begins, by refusing to participate. It should be noted that a special newsgroup, "alt.flame," exists for the specific purpose of being a place where one can participate in a "flame war" without being disruptive to the discussions in the rest of the newsgroups, a sort of "O.K. Corral." It is common to see someone write, "Let's take this discussion to alt.flame." The following passage from _________ Leviathan may shed light on why "flaming" and contention in general occurs: ____ __ __________ ____ ___________ Love of contention from competition. Competition of riches, honour, command, or other power, inclineth to contention, enmity, and war: because the way of one competitor, to the attaining of his desire, is to kill, subdue, supplant, or repel the other.48 In the preceding passage, Hobbes suggests that persons engage in lethal competition in order to acquire powers and their benefits. In terms of Usenet, "flaming" allows them to increase their reputations at the expense of others. In summary, it is clear that personae must restlessly participate in the cycle of statement and response, which is primary to their existence within Usenet and which allows them to acquire more powers, as in reputation. It is also understood that such continuous participation, especially that of "flaming," is contentious and that one's reputation is subject to damage. The question remains, how contentious can the Usenet environment for participation become, before the conditions to maintain the existence of one's persona become so difficult to meet that one is driven to surrender his or her powers to a single authority? 48Hobbes, 81. Living in Moderation This section includes a discussion of an actual Usenet example of the cycle of statement and response, the alternatives to the outright surrender of one's powers, and the submission to moderation. The following series of articles are messages from a Usenet newsgroup oriented towards the discussion of evil. Topics in the newsgroup drift between "tales from the dark side"49 to the plotting of murder. This example is the beginning portion of a cycle of statement and response involving five personae discussing the fate of one of their teaching assistants and the moral and legal implications of the discussion itself. The personae are "Paul" from the University of Maryland at College Park, a user at Youngstown State University, a user at Malaspina College,"Jon" from Netcom Online Communications Services, and a user at the University of Maine. All articles are included in their entirety without editing to preserve the "realism" of the discussion. Paul writes, With one single, simple, trivial, insignificant event, my life has been thrown into utter chaos. I'm graduating this semester, or was. My TA insists I did not turn in a significant amount of assignments for her class. This is incorrect, and I have no way of proving it to her. As such, see [___ sic] is giving me an F. Despite the large amount of work I did, and my good test grades, she will not even consider a D. Mind you this is an insignificant little one credit Physical Education course. I explained that I had no money to take a course during the summer ($300), was leaving in the summer for Ca., was on my way to grad school, and that this little incident was really fucking up my life. She proceeded to give me, while power-tripping and in an authoritative manner, the 'real world and responsibility' speech. As though this fucking class and this little blonde puke were representative of the real world. Needless to say, I am irate. What I would like from you are suggestions to make her life a living hell. I considered killing her, or driving by her house with an uzi, but I don't want to go to jail, at least not over her. Any suggestions from the subtle to extravagant will be considered. Nothing she could easily trace me to. I anxiously await your response..... Paul is apparently disappointed with his poor grade, but it is never clear whether he actually intends to act on the advice he solicits or whether he is simply attempting to gain sympathy from others by sharing his plight. His first response arrives from the University of Maryland user. It will be recalled that this response satisfies Paul's conditions for existence--it proves 49John Gilmore, ___________ _________ ____________ ____ _ Alternative Newsgroup Hierarchies, Part I, edited by Gene Spafford, 1992, line 147. 43 44 that he is not isolated and alone: Heh... I'm starting to like this gal. She must really like watching you squirm. Heh. You could post her name, address, etc so every horny geek can give her a call. A slight description, so they can pretend that they know her well... scare the hell out of her. My guess, though, is that she'd like it too much. Ah well... Don't you see it?????? Come on, man... it *IS* representative of the whole world. You are getting dicked over in a way you never ever expected!! Some small "insignifigant" person is ruining your life. You better learn fast... or you are not going to fare well at all. Why are you so worried about her misery being traced to you? She doesn't mind that *you* know how very screwed you are. *SHE* doesn't mind telling you *to your face* exactly how she is going to do it. Illegal is bad...yep. Proof is tricky... but avoidable. I suggest printing this out, (assuming you save it), and deleting it immediately. Okay... right now I'm more on her side than yours... but since you asked.... Two words: Sexual Harrasment. Just as difficult to prove/disprove as the homework issue. Just as likely to ruin her life. I mean... how would you like to be the girl who was *so* desperate to find a date, she was blackmailing her student? Heh. No offence to you... but this works even better if you are unattractive. :) Actually... this may even be what she is trying to do... how do *I* know? You said you handed the HW in, right? Okay... so she "lost" it. Maybe she wants something in return for "finding" the homework. Start telling all your friends how she keeps coming on to you, and got really pissed when you turned her down... and that she hinted that she would ruin your grade if you didn't play along. About this time, you want to start recording conversations with this babe... keep saying that you are *desperate* to do well in this class... you'd do *anything* to make up for it... what could you do? You, obviously, may want to edit out these portions of the conversation. :) See what responce you get. Ask her out. Bring sex into the conversation. Go back, now, and mention to your friends that she *really is* going to ruin your grade since you didn't play along. Get really upset. Become hysterical... say that you don't really care and that you'll go ahead and do what she wants... you just want to graduate. Call her with someone in the room. Assuming that she didn't want you to trade affection for your grade... I'n sitll not ruling this out as a possibility... she will most probably turn you down quite loudly. Your friend may even overhear this if she is *really* loud. As some of your friends to help decide what you should do. Eventually, this will come to someone's attention... etc. If things don't look good, keep 45 telling the school authorities that you are going to take the matter to a more public setting if they don't fix things with your grade. This usually makes them jump. Even if she doesn't get in trouble... you should most certainly get your grade. Depending on how well you play it... you might even get to make $$ writing about it... touring... etc. Don't make up dates and times that you cannot account for her location. If you say she was harassing you and she was with 30 people playing nude twister... your story is shot to hell. Write stuff down, and memorize it. Ok. You have the tools... it all depends on how well you play it ....Send me a copy of your book. Take Care. Note the tone of the Maryland user's response. At first he or she mocks Paul by "siding" with the teaching assistant, but eventually the user describes a plan of action. Also note that the user has to resort to non-standard punctuation, capitalization, and asterisks to convey emphasis since the traditional non-verbal methods of controlling voice pitch and volume are unavailable. There is even the presence of emoticons to indicate that the user is smiling at those points in the response. But again, it is still uncertain whether this user expects his or her advice to be taken seriously or whether the exchange is merely an exercise to help Paul vent his frustration. The next response to Paul's statement comes from Youngstown State University. Generally, only two personae are needed to substantiate one another's existences, but in this case, this third user from Youngstown, rather than Paul, serves to substantiate the existence of the Maryland user: If by some chance, you can get her address & soc. security number, I have heard that a really effective harassment goes like this: Call the I.R.S. Say, "I'm (name of TA ), and I think I made a mistake on my 1040, could you check your records?" Supply address & social, if asked for them. With luck, she gets audited. Probably kinder to just shoot her. This response clearly contains more humor than the previous two, provided that one agrees that death is preferable to a tax audit, but it is still difficult to tell whether or not this is a harmless, but "dark" discussion or a conspiracy to commit a felony. The fourth participant, a user from Malaspina College is apparently not amused when he or she writes, Please consider the implications of this conversation. This is an extrordinarily offensive and demeaning exchange with possible legal implications. Your conversations contribute to the oppression of women and completely undermine the human values you profess to acquire at college. Remember 46 that your commentari}iesare read by many people throughout the world and reflect not only on you, but on the institutions you represent. All of us in the college and university community have a strong personal responsibility to ensure that our colleagues--women in particular--are protected from abusive, offensive, demeaning, belittling, harrassing, and threatening language. There is NO EXCUSE for this exchange in any conference. Fourteen women in Montreal were massacrd 2 years ago by a man whose ideas reflected the same crap you are exchanging. I am profoundly disturbed and ashamed that people who profess intellectual skills will engage in this kind of hate exchange. I am new to conference activity but fully intend to do whatever is necessary to protect my colleagues from thissort of abuse. This user is risking confrontation by "scolding" and attempting to shame the other users for their actions. Despite the name of the current newsgroup, alt.evil, this user is convinced that this discussion has no place in "any conference." In the terms of this study, this user is "attacking" the reputations of the other three. The first user to respond to the "attack" is Jon from Netcom: Who died and appointed you net.cop? What a joke! You could easily argue that this TA's actions contribute to the oppression of men. Further, as to the "values" one acquires at college, this is bullshit. The only "values" most people learn at college is what case of beer is cheapest, or how best to make money. Pahleeezee. I think you give it more importance than it has. Especially in this newsgroup, which exists to promote and discuss evil. Not social responsibility. There are news groups for that purpose. Just look. You would probably be happier there. Sorry, but this group is not going to mutate into alt.fuzzy.warm.feeling.inside because it bothers you. Don't you get it? *This is alt.evil*. It is a newsgroup, not a conference. It is not about social responsibility. Good luck, idiot. Have you ever heard of *Freedom of Speech?* You are clearly living in a fantasy world, and appear to believe you somehow are powerful. Ha Ha Ha. What a shit head you are. Note that Jon's first sentence, "Who died and appointed you net.cop?" is extremely sarcastic and rhetorical. Its intent is not to elicit a truthful response, but to embarass the Malaspina College user for assuming an authoritative role. Jon then proceeds to return the "attack" by questioning the validity of the values acquired at college. This tactic actually pits Jon's "prudence" in college experience against that of the user from Malaspina, and may actually have more of a bearing on the calculation of his reputation than everything else that he says. After this point, his response quickly becomes an ad hominem attack, mocking the Malaspina user and calling him names. This message is an example of a "flame," and as such, it is interesting to observe that aside from the first sentence, it 47 does not specifically have anything to do with Paul's original statement. The fifth and final user in this example is from the University of Maine: No moralizing on who's right or wrong, we are talking about evil not ethics. sugar in the gas tank should crystalize in the fuel lines, or use sand and ruin the engine, figure a way to give her lice (there's a# of varieties esp. pubic) or plant drugs on her etc. If you or any of your I.M.F. team are captured thesecretary will disavow any knowledge of your actions. -HAVE FUN Again, note the humorous tone. Given that all of the responses had elements of humor, it is entirely possible that the Malaspina College user violated an alt.evil norm by dispelling their fantasy plot. The Malaspina user also may not have "picked up" on the humor given the interference of the medium and the inadequacies of emoticons and other devices to convey non-verbal information. Of particular interest in this last message is the opening sentence, ". . . we are talking about evil not ethics." By stating the purpose of the cycle and the newsgroup, this user effectively pits his "prudence" in alt.evil interaction against the previous two users'; and by immediately returning to the topic at hand with the remainder of his message, this user is attempting to extinguish the disruptive "flames." It will be recalled that these articles are only the first five in a cycle of statement and response. It should also be noted that the number of observers of this cycle, if any, is unknown, but that this figure is estimated to be five times the number of participants.50 At the conclusion of each statement or response, the participants and the observers privately estimate the worth of each participant: the sum of that worth, held in the collective memory, is their reputation. Given this detailed discussion of the cycle of statement and response, it is useful to recall the remaining question: how contentious can the Usenet environment for participation become, before the conditions to maintain the existence of one's persona become so difficult to meet, that one is driven to surrender his powers to a single authority? The following discussion prepares one to answer by first considering the alternatives to the outright surrender of one's powers. For this purpose the following passage from _________ Leviathan is useful: _____ _________ ____ ____ __ _____ ____ ____ __ ______ __ Civil obedience from love of ease. From fear of death, or ______ wounds. Desire of ease, and sensual delight, disposeth men to 50Brian, Reid, ______ __________ _______ Usenet Readership Summary (Palo Alto, California: Network Measurement Project at the DEC Western Research Laboratory, March 1992), lines 22-28. See Appendix. 48 obey a common power: because by such desires, a man doth abandon the protection that might be hoped for from his own industry, and labour. Fear of death, and wounds, disposeth to the same; and for the same reason.51 From this passage it is clear that Hobbes recognizes that the rest-less "pursuit of power after power" takes its toll on persons who are as inclined to ease as they are to contention. The balance between these opposing desires appears to be the "fear of death, and wounds." It follows then, that it is the fear of death and wounds that persuades persons to abandon their pursuit of powers and surrender themselves to the power of another. This notion is apparent in Usenet, but it appears that there are other alternatives short of complete surrender. As discussed, one may ignore a user who interferes with the utility of one's access to Usenet. Additionally, to solve disputes and facilitate the interaction, one may voluntarily adhere to the general principles described as "netiquette" as outlined by Spafford. Next to be discussed is an actual example from Usenet which invokes Spafford's guidelines and the practice of using "kill files" to systematically ignore disruptive users. It will be recalled that Gene Spafford compiles and distributes a series of guidelines designed to facilitate the smooth interaction between Usenet participants, but since there is no Usenet government to enforce them, the guidelines remain informal. Nonetheless, many individuals voluntarily abide by them and insist that others do the same. In the following example, "David" attempts to persuade "Bill" to use some self- restraint and conform to Spafford's guidelines: Why don't you respond in private mail, and ask the person you are sending to to summarize. This prevents clutter, which this posting is as well. If everyone posted a response to every PC related hardware question they saw, this newsgroup would quickly become too bulky to work with. In this article, David is responding to an earlier message of Bill's. Apparently, Bill had previously responded publicly to someone else's question. In all likelihood, the question was a common one and Bill's response was a common answer. Tired of seeing both "frequently asked questions" and their responses, David asks Bill in this article to observe the Usenet "courtesy" of responding to such questions in private. It should be noted that David is relying on the following section from Spafford's guidelines: One of the biggest problems we have on the network is that when someone asks a question, many people send out identical answers. When this happens, dozens of identical answers pour through the net. Mail your answer to the person and suggest 51Hobbes, 81. 49 that they summarize to the network. This way the net will only see a single copy of the answers, no matter how many people answer the question.52 In Bill's response to David, "IMHO" is the common abbreviation for "in my humble opinion": My understanding is that these groups are for the unfettered exchange of information. IMHO, too much band-width is used attempting to restrict use of the NET. I, for one, like to read like the answers. It's a lot easier for everyone than E-mailing the posters and asking them to share individually. Lot of recipients of NET-knowledge do NOT take the extra effort to summarize. It's easy enough to ignore threads which have nothing to offer. We're a divers bunch.. one person's "clutter" may be another's insight. There are first-timer joining these groups every day. Remember our roots. I have no problem with FAQ being FAQs. (Frequently Asked Questions being Frequently Answered Questions) Obviously Bill opts to ignore Spafford's guidelines and runs the risk of being ignored by those he annoys with his "clutter." Concerned that already too much time has been spent discussing the issue, David replies, I suggest this is way off the topic of comp.sys.ibm.pc, if we really have to continue this discussion let's finish it in email. David could be right. "comp.sys.ibm.pc" is a technical newsgroup for the discussion of IBM personal computers. Participants receive hundreds of messages daily and very few have the patience for non-technical discussions in the newsgroup such as Bill's and David's. It is very likely that both Bill and David are already being ignored. Sometimes the situation arises where a user will offend or annoy another so severely that simply ignoring the user runs the risk of encountering him and being offended and annoyed at a later date. To remedy this situation, Usenet users have at their disposal a utility known as a "kill file." Basically an electronic filter, a "kill file" allows a user to screen out or block the message of another user. A "kill file" can contain the names of several users and sites, as well as offensive words, effectively preventing the display of potentially unwanted messages. Note that a "kill file" does not actually destroy Usenet articles, but merely shields the owner of the file from their existence. "Kill files" are an extreme method of self- censoring because they take the power of decision away from the "kill file" owner. Many users still prefer to run the risk of 52Von Rospach, lines 176-181. 50 re-encountering annoyances than to subjugate themselves to an automatic censor; however, the following example of gratuitous "flaming" makes the originator of the statement a prime candidate for countless "kill files" within reading range of the message: WHAT?!?!?! You deleted the FUCKING expletives you PUSSY- STARVED DICKSUCKING BASTARD? What the FUCK kind of newsgroup do you think this is? This aint FUCKING rec.tv.family-channel. Leave the FUCKING expletives in, it annoys the SHIT out of me when ASSHOLES [do that] . . . However, the threat of "kill files" do not necessarily prevent or curb disruptive behavior. Mark from Denver illustrates this: So put me in your kill-file, dac. Simple solution. What makes you think I give a hoot about *what* you think of my writing? I post for my own enjoyment. Not yours. Live with it. Of course, Mark should probably think twice about such a challenge if his name begins to appear in too many "kill files." As the amount of clutter or "noise"53 increases, more and more users voluntarily submit to "moderation." A moderated newsgroup prevents unapproved statements from being distributed. All statements are submitted to a moderator who screens the messages for content, posts the appropriate ones, and rejects the ones he feels are unfit for the discussion. In the case of a moderated newsgroup, the moderator has tremendous control of one's network existence. The price or reward for such restraint is the decrease of noise and the increase of relevant information. Moderated newsgroups are not without problems and as David reminds us, "one person's 'clutter' may be another's insight." Additionally, the degree of censorship varies from moderator to moderator. In the case of "comp.dcom.telecom," a moderated newsgroup dedicated to telecommunications issues, many individuals are unable to tolerate its highly-opinionated moderator, Patrick Townson. As a result, they have created an alternative or unrestricted newsgroup called "alt.dcom.telecom." To this day Pat's group remains very popular while the much smaller alternative group is commonly cluttered with articles critical of him. This offers little choice for users who desire the volume of messages in the moderated group, but deplore Pat's degree of restraint. To summarize this section of the discussion, the maintenance of the existence of a persona requires users to continuously participate in the cycle of statement and response. As a result 53The commonly used term for "clutter," which comes from the technical phrase "signal-to-noise ratio," which basically means that the less interference there is, the cleaner the signal will be. 51 of this participation, the users both establish or maintain their persona's reputation and benefits from the utility of Usenet. As a matter of participation, the users may receive challenges to their statements or "actions" and may also challenge the statements or "actions" of others. In rare cases, they may participate in or observe a cycle that generates "flames" or escalates into a "flame war." This sort of message and other messages they find personally uninteresting, offensive, or annoying decreases the utility of Usenet for them and threatens the existence of their persona. To protect themselves from this threat, they have the alternatives of ignoring the offensive articles, requesting that offensive users conform to "netiquette," "killing" the offensive users by placing them in their "kill file," or participating in a moderated newsgroup. Looking for the Leviathan It has been established that in a contentious environment, offensive or uninteresting articles may diminish Usenet's utility to its users. As a result, users may opt to restrict their participation to the moderation of another user. In terms of Usenet, too many attacks and disruptive actions by other personae threaten their existence to the point that they may consider surrendering themselves to the control of another persona. It is on this level, the level of the personae, that Hobbes' _________ Leviathan operates. The following discussion describes and analyzes a random survey of the participation within Usenet and the degree to which the participation is moderated. If one were to search for a Leviathan in Usenet, one would obviously begin with the moderated newsgroups because the discussions therein consist of articles previously approved by a "common power." However, there are other less obvious indications of restraint such as conformity to or compliance with "netiquette" as a general guide to behavior; and conformity to or compliance with Spafford's more specific set of guidelines. A survey was conducted on a randomly selected sample of two hundred Usenet articles. The articles were selected from a list of 3,971 existing newsgroups with each group having equal chances for selection. A computer program was written to randomly select a newsgroup from the list from which it randomly selected an article. The selected article became part of the sample population. If the newsgroup did not contain any articles, the computer program selected another newsgroup until the sample population was equal to two hundred. After the sample population was determined, each article was examined for signs or indication of a Leviathan. These indicators were operationalized as "Leviathan Factors" with each increase in factor representing a greater sign or indication of coercion. The "Leviathan Factors" (LF) are described as follows: Leviathan Factor Description 55 56 0 No signs of coercion to conform or self-restraint. 1 Unmindful conformity to/compliance with "netiquette" such as the use of "emoticons" or other characters to convey physical actions. 2 Reference to "netiquette" as means of conformity/compliance. 3 Reference to Spafford's guidelines. More specific than LF 2. 4 Article is from a moderated newsgroup or is otherwise censored. Table 1. The operationalization of Leviathan The factors are at the ordinal level of measurement such that LF 4 means "more Leviathan" than LF 3, but it does not mean than LF 2 represents twice as much as LF 1. Given the operationalization of Leviathan as "Leviathan Factors," it was possible to read each article and ask: Does this article contain any signs of coercion to obey a common power? If an article contained more than one indicator, then it was coded with the greatest LF for which it satisfied the requirements. The findings help one to conclude "how much" of a Leviathan is present in Usenet. A survey of the sample population produced the following figures shown in Table 2, LF Frequency Percentage 0 162 81.0 1 14 7.0 2 3 1.5 3 2 1.0 4 19 9.5 Total 200 100.0 Table 2. Articles containing progressive signs of Leviathan Based on the data, 9.5% of the articles surveyed showed the greatest amount of Leviathan (LF 4), and 81% showed no signs of Leviathan (LF 0). It was expected that there would be progressively fewer articles with each increasing factor of Leviathan, but the unusual distribution for LF 1-3 suggests possible operationalization problems. In retrospect, it was not correct to identify "emoticons" as a form of Leviathan because they are signs of compensation for the medium of written communication and not necessarily signs of compliance to or conformity with "netiquette." The unexpectedly high number of 57 observations coded LF 1 bear this out. Additionally, the sample size did not support a five-way breakdown with any degree of accuracy between the extremes of LF 0 and LF 4. This resulted in a negligible difference between the number of observations coded LF 2 and LF 3 from which a meaningful conclusion can be drawn. In order to account for operationalization and sample size problems, the data can be presented in Table 3 in a way to emphasize the measured extremes. LF Frequency Percentage 0-1 176 88 2-4 24 12 Total 200 100 Table 3. Articles showing signs of a Leviathan Presented in this way, the articles are divided into two consolidated categories. The first category, LF 0-1, consists of articles with no measured signs of a Leviathan, including "emoticons" which are indicators of compensation and not coercion. The second category, LF 2-4, consists of articles which do contain signs of a Leviathan. This category describes the range of articles including those in which someone asks another to observe "netiquette" to articles submitted under moderation. Based on the findings, some measure of Leviathan is present in 12% of the articles surveyed. Conclusion The conclusion consists of a summary of the major points, a discussion of the quantitative study, and a consideration of the avenues for research. This study has sought to establish seven major points. First, Usenet is a distinct society because the exclusively, written medium keeps much of the three-dimensional, external world out. Second, personae are created by the interaction of Usenet users. A user always interacts with the personae of other users because it is impossible to interact ___________________ three-dimensionally via a written medium. This always being the case, expediency allows one to "forget" that interaction is via personae. Third, Hobbes helps prove that personae are persons within Usenet. Fourth, like persons, personae have powers, although they may be different. Fifth, users participate in Usenet to maximize its utility, thus persona existence is tied to user participation and utility. Sixth, participation may become contentious or uninteresting, thereby decreasing Usenet's utility and threatening personae existence; however, users can increasingly subject their participation to restraint. Seventh, to maximize Usenet's utility and to maintain personae existence, some users may decide to allow another person to control or moderate the extent of their participation, thus controlling or moderating the existence of their personae. The following is a review of each point: 1. ______ __ _ ________ _______ _______ ___ ____________ Usenet is a distinct society because the exclusively, _______ ______ _____ ____ __ ___ __________________ ________ written medium keeps much of the three-dimensional, external _____ ____ world out. With the help of Elizabeth Reid's work, it has been established that the written medium of Usenet "filters" or interferes with communication among users. The effect of this interference is the "deprivation of the subtleties" of verbal and non-verbal communication. Reid's research suggests that such subtleties reinforce the standards of behavior in the external world. Without that reinforcement, Usenet users have had to develop "alternate or parallel" standards of behavior such as "netiquette" and Gene Spafford's guidelines. This compensation for the shortcomings of the medium plus the development of new written language subtleties known as "emoticons" has enabled Usenet to become a society distinct from that of the external world. 2. ________ ___ _______ __ ___ ___________ __ ______ ______ _ Personae are created by the interaction of Usenet users. A ____ ______ _________ ____ ___ ________ __ _____ _____ _______ __ user always interacts with the personae of other users because it __ __________ __ ________ ___________________ ___ _ _______ is impossible to interact three-dimensionally via a written _______ ____ ______ _____ ___ _____ __________ ______ ___ __ medium. This always being the case, expediency allows one to ________ ____ ___________ __ ___ _________ "forget" that interaction is via personae. This is perhaps the most difficult point to establish because it relies upon the notion of "persona." Furthermore, it is the most critical point, because it is on the level of the personae, not the users, upon which Hobbes' _________ Leviathan operates. To review the notion of "persona," one must understand the perspective of the user. From the user's standpoint, he or she 59 60 accesses Usenet because it satisfies some personal need that is, it has utility. During the course of accessing, the user may decide that writing an article, rather than exclusively reading, will increase Usenet's utility. When the user drafts the article it is probable that he or she has one or more recipient users in mind. It is here that the notion of "persona" arises. If the user thought about what information was used to create the "image" of the recipient in mind, the user would discover that surprisingly little is actually known. Yet, gender, stature, appearance, intelligence, and other characteristics are somehow attributed, sight unseen, to the recipient user. This is only natural for the user to want to "fill in the blanks" which the written medium leaves open. Moreover, if the user realized that any information garnered about the recipient user was probably unverified externally to Usenet, he or she should come to the conclusion that the recipient user may bear little resemblance to the user he or she has in mind. This distinction between a user in Usenet and the "actual" user in the external world is in the concept of "persona." Although the user preparing to send the message may not realize it, as far as other users are concerned, he or she is a persona as well. Therefore, all users of Usenet interact with one another via personae. Moreover, the personae are perceived to engage in a range of pursuits which is derived from the words of the users. For every exchange of articles at the level of the users, there is an analogous "action" at the level of the personae. Furthermore, the existence of the personae depends entirely upon the users' willingness to continue accessing Usenet. With this complex duality always present, it is often expedient for users to "forget" the dichotomy between user and persona, but for the purposes of this thesis, it can never be forgotten because it is on the level of the personae upon which the concepts of _________ Leviathan are established to operate. 3. ______ _____ _____ ____ ________ ___ _______ ______ _______ Hobbes helps prove that personae are persons within Usenet. With the notion of "persona" having been established, it is possible to establish a preliminary parallel to Hobbes' political philosophy in _________ Leviathan. This is done by using Hobbes' definition of "person" to prove that personae are indeed analogs for persons in Usenet. This proof clears the way to apply Hobbesian theory to personae rather than users. 4. ____ ________ ________ ____ _______ ________ ____ ___ __ Like persons, personae have powers, although they may be __________ different. During this stage of the discussion, further parallels are drawn from Hobbes' "persons" to Usenet personae. These parallels include the several powers which Hobbes suggests are possessed in persons. Among these powers are "extraordinary strength, form, prudence, arts, eloquence, liberality, and nobility." From these powers of the external world, Usenet analogs are developed to "fill in the blanks" or add form and personality to the images of one another in the minds of all users. Of these powers, "eloquence," is supreme in Usenet because finesse in language is highly valued in a world of words. 5. _____ ___________ __ ______ __ ________ ___ ________ ____ Users participate in Usenet to maximize its utility, thus 61 _______ _________ __ ____ __ ____ _____________ ___ ________ persona existence is tied to user participation and utility. Here the benefits of powers are examined by analyzing Hobbes' relevant passages and developing Usenet analogs. It is established that the personae, like persons, are inclined to pursue "power after power" to insure their "present means." On the level of the users, this pursuit of power is actually a continuous cycle of statement and response intended to maximize the utility of Usenet. Their reputations are the "collective memory" of their participation in the cycle. As long as continuous participation is provided by the users, the existence of their personae is insured. 6. _____________ ___ ______ ___________ __ ______________ Participation may become contentious or uninteresting, _______ __________ ________ _______ ___ ___________ ________ thereby decreasing Usenet's utility and threatening personae __________ ________ _____ ___ ____________ _______ _____ existence; however, users can increasingly subject their _____________ __ __________ participation to restraint. As a matter of participating in the cycle of statement and response, users may encounter offensive or insulting articles called "flames." These articles and others which "clutter" the various newsgroups threaten the utility of Usenet to the users. To bolster utility, users have several alternatives other than moderation. They may ignore the offensive or uninteresting articles, conform to the "netiquette" standards of behavior, or block the display of "clutter" from their screens. On the level of the personae, the "flames" are perceived as "attacks" which ultimately threaten their existence. In "fear of wounds, or death," they may be forced to surrender themselves to the protection of a common power. 7. __ ________ ________ _______ ___ __ ________ ________ To maximize Usenet's utility and to maintain personae __________ ____ _____ ___ ______ __ _____ _______ ______ __ existence, some users may decide to allow another person to _______ __ ________ ___ ______ __ _____ ______________ ____ control or moderate the extent of their participation, thus ___________ __ __________ ___ _________ __ _____ _________ controlling or moderating the existence of their personae. In this point, a sample cycle of statement and response is analyzed leading to the discussion of moderation as the last resort to coping with the "clutter" or "noise" in the newsgroups. On the level of the personae, moderation represents the joint surrender of their individual powers to common power for the purpose of preserving their existence in a hostile environment. The quantitative portion of this study raises provocative questions regarding trends towards moderation in a forum hailed by many as a "modemocracy" and a realization of the "global village." A future study could track the frequency of the Leviathan in Usenet over a period of several months. These data could be contrasted with the failure of a completely moderated, alternate to Usenet formerly known as "InModeration." Perhaps the combination of moderated and unmoderated newsgroups in Usenet points to the utility of "choice" and "freedom" which "InModeration" might have underestimated. Additionally, refined operationalization and a larger sample size might provide more insight into the less obvious manifestations of the Leviathan in Usenet. Although this thesis has been limited to the Hobbesian perspective on the origins of government, future researchers should be encouraged to employ other theoretical visions to the 62 study of Usenet, or of the internet in general. The simple act of searching for proof within the internet may more readily fasten the theories' nuances in a student's mind than traditional philosophical study. Where social studies were always possible, internet studies present an equally complex, but more easily observable, self-documenting society. This theorist also recognizes and encourages the need for more behavioral research. While normative study is valuable in its own right, numerical analysis of internet society is needed. It is important to know the distribution of the various degrees of representation of users by personae, how the number of users affects the generation of government, and the number and types of and reasons for selecting one polity over another. These lines of inquiry do not, of course, cover the entire range, but they do suggest that the entirety of political science can benefit from internet studies. Political scientists are not the first social scientists to explore this very new area. Current research in internet studies reveals that insufficient ethical guidelines are available for guiding research and there exists considerable debate over how to proceed. For example, this researcher is the sole political scientist on a large, research team which is investigating computer mediated communication. Due to the global distances between them, the researchers are represented by personae which include scholars of English, communication, linguistics, theater, sociology, and history. The qualitative portion of the research involves content analysis of the communication of a specific group of network individuals. Issues of privacy and intellectual property have arisen. It is still an unresolved question whether the research team should admonish the subjects and then seek their permission for further study to be conducted. It is still uncertain whether the study requires a human research waiver. It is still debatable if this kind of analysis is closer to literary criticism than behavioral science. It is still unknown whether published research should give the subjects credit for their statements or should withhold their names to protect their identities. Despite these compelling questions, the computer allows one to cross traditional boundaries--it enables the writer to measure and the scientist to write--and to mix and combine elements from previously disparate fields. The problems described, of course, issue from the combination of scholars of literature with social scientists. A solution probably lies in acknowledging the unresolved nature of that combination once the interdisciplinary novelty subsides. The point, however, is that fertile ground for research has been uncovered and that the process of how it should be tilled has begun. To miss the opportunity to influence the process would be a major misfortune for political science. Appendix This section contains some of Gene Spafford's guidelines because they may not be readily available to most readers. No permission was obtained because the documents are freely distributable. The guidelines are reprinted here in a smaller point size to preserve their original format and page layout. Despite this accommodation, there are still some formatting problems because the margins in the original documents are much narrower than is permitted in a thesis. Additionally, this appendix contains four computer generated maps based on Brian Reid's ______ __________ Usenet Readership _______ ______ Summary Report for April 9, 1991 and a glossary of technical terms. Original-from: chuq@sun.COM (Chuq Von Rospach) [Most recent change: 7 September 1987 by spaf@purdue.edu (Gene Spafford)] A Primer on How to Work With the USENET Community Chuq Von Rospach *** You now have access to Usenet, a big network of thousands of computers. Other documents or your system administrator will provide detailed technical documentation. This message describes the Usenet culture and customs that have developed over time. All new users should read this message to find out how Usenet works. *** *** (Old users could read it, too, to refresh their memories.) *** USENET is a large collection of computers that share data with each other. It is the people on these computers that make USENET worth the effort, and for USENET to function properly those people must be able to interact in productive ways. This document is intended as a guide to using the net in 66 67 ways that will be pleasant and productive for everyone. This document is not intended to teach you how to use USENET. Instead, it is a guide to using it politely, effectively and efficiently. Communication by computer is new to almost everybody, and there are certain aspects that can make it a frustrating experience until you get used to them. This document should help you avoid the worst traps. The easiest way to learn how to use USENET is to watch how others use it. Start reading the news and try to figure out what people are doing and why. After a couple of weeks you will start understanding why certain things are done and what things shouldn't be done. There are documents available describing the technical details of how to use the software. These are different depending on which programs you use to access the news. You can get copies of these from your system administrator. If you do not know who that person is, they can be contacted on most systems by mailing to account "usenet". Never Forget that the Person on the Other Side is Human Because your interaction with the network is through a computer it is easy to forget that there are people "out there." Situations arise where emotions erupt into a verbal free-for-all that can lead to hurt feelings. 68 Please remember that people all over the world are reading your words. Do not attack people if you cannot persuade them with your presentation of the facts. Screaming, cursing, and abusing others only serves to make people think less of you and less willing to help you when you need it. If you are upset at something or someone, wait until you have had a chance to calm down and think about it. A cup of coffee or a good night's sleep works wonders on your perspective. Hasty words create more problems than they solve. Try not to say anything to others you would not say to them in person in a room full of people. Be Brief Never say in ten words what you can say in fewer. Say it succinctly and it will have a greater impact. Remember that the longer you make your article, the fewer people will bother to read it. Your Postings Reflect Upon You -- Be Proud of Them Most people on USENET will know you only by what you say and how well you say it. They may someday be your co-workers or friends. Take some time to make sure each posting is something that will not embarrass you later. Minimize your spelling errors and make sure that the article is easy to read and understand. Writing is an art and to do it well requires practice. Since much of how people judge you on the net is based on your 69 writing, such time is well spent. Use Descriptive Titles The subject line of an article is there to enable a person with a limited amount of time to decide whether or not to read your article. Tell people what the article is about before they read it. A title like "Car for Sale" to rec.autos does not help as much as "66 MG Midget for sale: Beaverton OR." Don't expect people to read your article to find out what it is about because many of them won't bother. Some sites truncate the length of the subject line to 40 characters so keep your subjects short and to the point. Think About Your Audience When you post an article, think about the people you are trying to reach. Asking UNIX(*) questions on rec.autos will not reach as many of the people you want to reach as if you asked them on comp.unix.questions or comp.unix.wizards. Try to get the most appropriate audience for your message, not the widest. It is considered bad form to post both to misc.misc, soc.net- people, or misc.wanted and to some other newsgroup. If it belongs in that other newsgroup, it does not belong in misc.misc, soc.net- people, or misc.wanted. If your message is of interest to a limited geographic area (apartments, 70 car sales, meetings, concerts, etc...), restrict the distribution of the message to your local area. Some areas have special newsgroups with geographical limitations, and the recent versions of the news software allow you to limit the distribution of material sent to world- wide newsgroups. Check with your system administrator to see what newsgroups are available and how to use them. If you want to try a test of something, do not use a world-wide newsgroup! Messages in misc.misc that say "This is a test" are likely to cause large numbers of caustic messages to flow into your mailbox. There are newsgroups that are local to your computer or area that should be used. Your system administrator can tell you what they are. Be Careful with Humor and Sarcasm Without the voice inflections and body language of personal communications, it is easy for a remark meant to be funny to be misinterpreted. Subtle humor tends to get lost, so take steps to make sure that people realize you are trying to be funny. The net has developed a symbol called the smiley face. It looks like ":-)" and points out sections of articles with humorous intent. No matter how broad the humor or satire, it is safer to remind people that you are being funny. But also be aware that quite frequently satire is posted without any explicit indications. If an article outrages you strongly, you should ask yourself if it just may have been unmarked satire. 71 Several self-proclaimed connoisseurs refuse to use smiley faces, so take heed or you may make a temporary fool of yourself. Only Post a Message Once Avoid posting messages to more than one newsgroup unless you are sure it is appropriate. If you do post to multiple newsgroups, do not post to each group separately. Instead, specify all the groups on a single copy of the message. This reduces network overhead and lets people who subscribe to more than one of those groups see the message once instead of having to wade through each copy. Please Rotate Messages With Questionable Content Certain newsgroups (such as rec.humor) have messages in them that may be offensive to some people. To make sure that these messages are not read unless they are explicitly requested, these messages should be encrypted. The standard encryption method is to rotate each letter by thirteen characters so that an "a" becomes an "n". This is known on the network as "rot13" and when you rotate a message the word "rot13" should be in the "Subject:" line. Most of the software used to read usenet articles have some way of encrypting and decrypting messages. Your system administrator can tell you how the software on your system works, or you can use the Unix command "tr [a-z][A-Z] [n-z][a-m][N-Z][A-M]". (Note that some versions of Unix don't require the [] in the "tr" command. In fact, some 72 systems will get upset if you use them in an unquoted manner. The following should work for everyone, but may be shortened on some systems: tr '[a-m][n-z][A-M][N-Z]' '[n-z][a-m][N-Z][A-M]' Don't forget the single quotes!) Summarize What You are Following Up When you are following up someone's article, please summarize the parts of the article to which you are responding. This allows readers to appreciate your comments rather than trying to remember what the original article said. It is also possible for your response to get to some sites before the original article. Summarization is best done by including appropriate quotes from the original article. Do not include the entire article since it will irritate the people who have already seen it. Even if you are responding to the entire article, summarize only the major points you are discussing. When Summarizing, Summarize! When you request information from the network, it is common courtesy to report your findings so that others can benefit as well. The best way of doing this is to take all the responses that you received and edit them into a single article that is posted to the places where you originally posted your question. Take the time to strip headers, combine duplicate information, and write a short summary. Try to credit the information to 73 the people that sent it to you, where possible. Use Mail, Don't Post a Follow-up One of the biggest problems we have on the network is that when someone asks a question, many people send out identical answers. When this happens, dozens of identical answers pour through the net. Mail your answer to the person and suggest that they summarize to the network. This way the net will only see a single copy of the answers, no matter how many people answer the question. If you post a question, please remind people to send you the answers by mail and offer to summarize them to the network. Read All Follow-ups and Don't Repeat What Has Already Been Said Before you submit a follow-up to a message, read the rest of the messages in the newsgroup to see whether someone has already said what you want to say. If someone has, don't repeat it. Be Careful About Copyrights and Licenses Once something is posted onto the network, it is effectively in the public domain. When posting material to the network, keep in mind that material that is UNIX-related may be restricted by the license you or your company signed with AT&T and be careful not to violate it. You should also be aware that posting movie reviews, song lyrics, or anything else published 74 under a copyright could cause you, your company, or the net itself to be held liable for damages, so we highly recommend caution in using this material. Cite Appropriate References If you are using facts to support a cause, state where they came from. Don't take someone else's ideas and use them as your own. You don't want someone pretending that your ideas are theirs; show them the same respect. Mark or Rotate Answers and Spoilers When you post something (like a movie review that discusses a detail of the plot) which might spoil a surprise for other people, please mark your message with a warning so that they can skip the message. Another alternative would be to use the "rot13" protocol to encrypt the message so it cannot be read accidentally. When you post a message with a spoiler in it make sure the word "spoiler" is part of the "Subject:" line. Spelling Flames Considered Harmful Every few months a plague descends on USENET called the spelling flame. It starts out when someone posts an article correcting the spelling or grammar in some article. The immediate result seems to be for everyone on the net to turn into a 6th grade English teacher and pick apart each other's postings for a few weeks. This is not productive and tends to cause 75 people who used to be friends to get angry with each other. It is important to remember that we all make mistakes, and that there are many users on the net who use English as a second language. If you feel that you must make a comment on the quality of a posting, please do so by mail, not on the network. Don't Overdo Signatures Signatures are nice, and many people can have a signature added to their postings automatically by placing it in a file called "$HOME/.signature". Don't overdo it. Signatures can tell the world something about you, but keep them short. A signature that is longer than the message itself is considered to be in bad taste. The main purpose of a signature is to help people locate you on the net, not learn your life story. Every signature should include your return address relative to a well known site on the network. Your system administrator can give this to you. Summary of Things to Remember Never forget that the person on the other side is human Be brief Your postings reflect upon you; be proud of them Use descriptive titles Think about your audience Be careful with humor and sarcasm Only post a message once 76 Please rotate material with questionable content Summarize what you are following up Use mail, don't post a follow-up Read all follow-ups and don't repeat what has already been said Be careful about copyrights and licenses Cite appropriate references When summarizing, summarize Mark or rotate answers or spoilers Spelling flames considered harmful Don't overdo signatures (*)UNIX is a registered trademark of AT&T. ----------- This document is in the public domain and may be reproduced or excerpted by anyone wishing to do so. ---------- Gene Spafford Dept. of Computer Sciences, Purdue University, W. Lafayette IN 47907-2004 Internet: spaf@cs.purdue.edu uucp: ...!{decwrl,gatech,ucbvax}!purdue!spaf 77 Original-from: mark@cbosgd.att.com (Mark Horton) [Most recent change: 17 September 1987 by spaf@purdue.edu (Gene Spafford)] This message describes some of the rules of conduct on Usenet. The rules vary depending on the newsgroup. Some newsgroups are intended for discussions and some for announcements or queries. It is not usually a good idea to carry on discussions in newsgroups that are designated otherwise. It is never a good idea to carry on "meta-discussions" about whether a given discussion is appropriate -- such traffic mushrooms until nobody can find articles that belong. If you are unhappy with what some user said, send him/her mail, don't post it. Before posting, think about where your article is going. If it's posted to a "comp", "news", "misc", "soc", "sci", "rec" or "talk" newsgroup, it will probably go to the USA, Canada, Europe, Korea, and Australia. Certain articles are only of local interest (e.g. used car ads) and it is inappropriate to post them to the whole world. Use the "Distribution" feature to restrict distribution to your local area. If you don't know how to use this feature, read "Frequently Submitted Items" in another article in news.announce.newusers. Don't post announcements regarding major news events (e.g. the space shuttle has just exploded!) to news groups. By the time most people receive such items, they will long since have been informed by conventional media. If you wish to discuss such an event on the 78 net, use the "misc.headlines" newsgroup. Announcement of professional products or services on Usenet is allowed; however, since someone else is paying the phone bills for this, it is important that it be of overall benefit to Usenet. Post to the appropriate newsgroup -- comp.newprod -- never to a general purpose newsgroup such as "misc.misc". Clearly mark your article as a product announcement in the subject. Never repeat these -- one article per product at the most; preferably group everything into one article. Advertising hype is especially frowned upon -- stick to technical facts. Obnoxious or inappropriate announcements or articles violating this policy will generally be rejected. This policy is, of course, subject to change if it becomes a problem. Some newsgroups are moderated. In these groups, you cannot post directly, either by convention or because the software prevents it. To post to these newsgroups, send mail to the moderator. Examples: Newsgroup Moderator Purpose --------- --------- ------- news.announce.important cbosgd!announce Important announcements for everyone comp.std.c cbosgd!std-c ANSI C standards discussion comp.std.unix ut-sally!std-unix ANSI Unix standards discussion comp.std.mumps plus5!std-mumps ANSI Mumps standards discussion comp.unix cbosgd!unix Discussion of Unix* features and bugs 79 Some newsgroups have special purpose rules: Newsgroup Rules --------- ----- news.announce.importantModerated, no direct postings, important things only. misc.wanted Queries, "I want an x", "Anyone want my x?". No discussions. Don't post to more than one xxx.wanted. Use the smallest appropriate wanted (e.g. used car ads to nj.wanted.) Requests for sources, termcaps, etc. should go to the "comp.sources.wanted" newsgroup. rec.humor Clean humor only; anything offensive must be rotated; no discussions -- humor only. Discussions go in rec.humor.d rec.arts.movies Don't post anything revealing part of a movie without marking it (spoiler) in the subject. rec.arts.* Same as movies -- mark spoilers in the subject line. news.groups Discussions about new groups: whether to create them and what to call them. Don't post yes/no votes, mail them to the author misc.test Use the smallest test group possible, e.g. "test" or "ucb.test". Say in the body of the message what you are testing. It is perfectly legal to reproduce short extracts of a copyrighted work for critical purposes, but reproduction in whole is strictly and 80 explicitly forbidden by US and international copyright law. (Otherwise, there would be no way for the artist to make money, and there would thus be less motive for people to go to the trouble of making their art available at all. The crime of theft is as serious in this context as any other, even though you may not have to pick locks, mask your face, or conceal merchandise.) All opinions or statements made in messages posted to Usenet should be taken as the opinions of the person who wrote the message. They do not necessarily represent the opinions of the employer of that person, the owner of the computer from which the message was posted, or anyone involved with Usenet or the underlying networks of which Usenet is made up. All responsibility for statements made in Usenet messages rests with the individual posting the message. Posting of information on Usenet is to be viewed as similar to publication. Because of this, do not post instructions for how to do some illegal act (such as jamming radar or obtaining cable TV service illegally); also do not ask how to do illegal acts by posting to the net. If you have a standard signature you like to append to your articles, put it in a file called .signature in your home directory. "postnews" and "inews" will automatically append it to your article. Please keep your signatures concise, as people do not appreciate seeing 81 lengthy signatures, nor paying the phone bills to repeatedly transmit them. 2 or 3 lines are usually plenty. Sometimes it is also appropriate to add another line or two for addresses on other major networks where you can be reached (e.g., ARPA, CSnet, Bitnet). Long signatures are definitely frowned upon. DO NOT include drawings, pictures, maps, or other graphics in your signature -- it is not the appropriate place for such material and viewed as rude by other readers. If you post an article and remember something you've left out or realize you've made a factual error, you can cancel the article and (if cancelled quickly enough) prevent its distribution. Then you can correct whatever was wrong and post a new copy. In "rn" and "readnews", an article that you posted can be cancelled with the "C" command. Be aware, however, that some people may have already read the incorrect version so the sooner you cancel something, the better. -- Gene Spafford Dept. of Computer Sciences, Purdue University, W. Lafayette IN 47907-2004 Internet: spaf@cs.purdue.edu uucp: ...!{decwrl,gatech,ucbvax}!purdue!spaf 82 Original-from: ofut@gatech.edu (A. Jeff Offutt VI) [Most recent change: 7 September 1987 by spaf@purdue.edu (Gene Spafford)] I would like to take a moment to share some of my knowledge of writing style. If you read the pointers below, remember: it's easy to agree that they make sense but it's much harder to apply them. References: Cunningham and Pearsall, "How to Write For the World of Work" Strunk & White, "Elements of Style" The above references are both excellent books. Cunningham is a standard in Tech writing classes and won an award for the best tech writing book from the Association for Teaching of Technical Writing. I was lucky enough to take a class from him as an undergraduate. Strunk is a standard in college composition classes. Other ideas here come from my own experience on the net and hints from other people. This is a "long article". The rest of it is simply a list of pointers. Writing style: * Write *below* the readers' reading level. The avg. person in the US reads on a 5th grade level. The avg. professional reads on about the 12th grade level. * Keep paragraphs short and sweet. Keep sentences shorter and sweeter. This means "concise," not cryptic. 83 * White space is not wasted space -- it greatly improves clarity. * Pick your words to have only *one* meaning. Vagueness is considered artistic by literary critics. We are not being literary here. * People can only grasp about seven things at once. This means ideas in a paragraph, major sections, etc.. * There are several variations on any one sentence. A passive, questioning or negative sentence takes longer to read. Net style: * Subtlety is not communicated well in written form - especially over a computer. * The above applies to humor as well. (rec.humor, of course, not included.) * When being especially "flame-boyant", I find it helpful to go the bathroom before actually sending. Then, I often change the tone considerably. * Subject lines should be used very carefully. How much time have you wasted reading articles with a misleading subject line? * References need to be made. When you answer mail, you have the original message fresh in your mind. When I receive your answer, I don't. * It's *much* easier to read a mixture of upper and lower case 84 letters. * Leaving out articles (such as "the," "a," "an," etc.) for "brevity" mangles the meaning of your sentences and takes longer to read. It saves you time at the expense of your reader. * Be careful of contextual meanings of words. For instance, I used "articles" just now. In the context of netnews, it has a different meaning than I intended. * Remember - this is an international network. * Remember - your future employers may be reading your articles. 'Nuff said. These pointers are all easily supported by arguments and research. There's a lot more to say, but.... -- Gene Spafford Dept. of Computer Sciences, Purdue University, W. Lafayette IN 47907-2004 Internet: spaf@cs.purdue.edu uucp: ...!{decwrl,gatech,ucbvax}!purdue!spafOriginal-author: brad@looking.on.ca (Brad Templeton) Archive-name: emily-postnews/part1 Last-change: 30 Nov 91 by brad@looking.on.ca (Brad Templeton) **NOTE: this is intended to be satirical. If you do not recognize it as such, consult a doctor or professional comedian. The recommendations in this article should recognized for what they are -- admonitions about what NOT to do. 85 "Dear Emily Postnews" Emily Postnews, foremost authority on proper net behaviour, gives her advice on how to act on the net. ================================================================= === Dear Miss Postnews: How long should my signature be? -- verbose@noisy A: Dear Verbose: Please try and make your signature as long as you can. It's much more important than your article, of course, so try to have more lines of signature than actual text. Try to include a large graphic made of ASCII characters, plus lots of cute quotes and slogans. People will never tire of reading these pearls of wisdom again and again, and you will soon become personally associated with the joy each reader feels at seeing yet another delightful repeat of your signature. Be sure as well to include a complete map of USENET with each signature, to show how anybody can get mail to you from any site in the world. Be sure to include Internet gateways as well. Also tell people on your own site how to mail to you. Give independent addresses for Internet, UUCP, and BITNET, even if they're all the same. Aside from your reply address, include your full name, company and organization. It's just common courtesy -- after all, in some 86 newsreaders people have to type an *entire* keystroke to go back to the top of your article to see this information in the header. By all means include your phone number and street address in every single article. People are always responding to usenet articles with phone calls and letters. It would be silly to go to the extra trouble of including this information only in articles that need a response by conventional channels! ------ Dear Emily: Today I posted an article and forgot to include my signature. What should I do? -- forgetful@myvax A: Dear Forgetful: Rush to your terminal right away and post an article that says, "Oops, I forgot to post my signature with that last article. Here it is." Since most people will have forgotten your earlier article, (particularly since it dared to be so boring as to not have a nice, juicy signature) this will remind them of it. Besides, people care much more about the signature anyway. See the previous letter for more important details. Also, be sure to include your signature TWICE in each article. That way you're sure people will read it. ------ Dear Ms. Postnews: I couldn't get mail through to somebody on another site. What should I do? -- eager@beaver.dam 87 A: Dear Eager: No problem, just post your message to a group that a lot of people read. Say, "This is for John Smith. I couldn't get mail through so I'm posting it. All others please ignore." This way tens of thousands of people will spend a few seconds scanning over and ignoring your article, using up over 16 man-hours their collective time, but you will be saved the terrible trouble of checking through Usenet maps or looking for alternate routes. Just think, if you couldn't distribute your message to 30,000 other computers, you might actually have to (gasp) call directory assistance for 60 cents, or even phone the person. This can cost as much as a few DOLLARS (!) for a 5 minute call! And certainly it's better to spend 10 to 20 dollars of other people's money distributing the message then for you to have to waste $9 on an overnight letter, or even 29 cents on a stamp! Don't forget. The world will end if your message doesn't get through, so post it as many places as you can. ------ Q: What about a test message? A: It is important, when testing, to test the entire net. Never test merely a subnet distribution when the whole net can be done. Also put "please ignore" on your test messages, since we all know that everybody always skips a message with a line like that. Don't use a subject like "My sex is female but I demand to be addressed as 88 male." because such articles are read in depth by all USEnauts. ------ Q: Somebody just posted that Roman Polanski directed Star Wars. What should I do? A: Post the correct answer at once! We can't have people go on believing that! Very good of you to spot this. You'll probably be the only one to make the correction, so post as soon as you can. No time to lose, so certainly don't wait a day, or check to see if somebody else has made the correction. And it's not good enough to send the message by mail. Since you're the only one who really knows that it was Francis Coppola, you have to inform the whole net right away! ------ Q: I read an article that said, "reply by mail, I'll summarize." What should I do? A: Post your response to the whole net. That request applies only to dumb people who don't have something interesting to say. Your postings are much more worthwhile than other people's, so it would be a waste to reply by mail. ------ Q: I collected replies to an article I wrote, and now it's time to summarize. What should I do? 89 A: Simply concatenate all the articles together into a big file and post that. On USENET, this is known as a summary. It lets people read all the replies without annoying newsreaders getting in the way. Do the same when summarizing a vote. ------ Q: I saw a long article that I wish to rebut carefully, what should I do? A: Include the entire text with your article, particularly the signature, and include your comments closely packed between the lines. Be sure to post, and not mail, even though your article looks like a reply to the original. Everybody *loves* to read those long point-by-point debates, especially when they evolve into name- calling and lots of "Is too!" -- "Is not!" -- "Is too, twizot!" exchanges. Be sure to follow-up everything, and never let another person get in the last word on a net debate. Why, if people let other people have the last word, then discussions would actually stop! Remember, other net readers aren't nearly as clever as you, and if somebody posts something wrong, the readers can't possibly realize that on their own without your elucidations. If somebody gets insulting in their net postings, the best response is to get right down to their level and fire a return salvo. When I read one net person make an insulting attack on another, I always immediately take it as gospel unless a 90 rebuttal is posted. It never makes me think less of the insulter, so it's your duty to respond. ------ Q: How can I choose what groups to post in? A: Pick as many as you can, so that you get the widest audience. After all, the net exists to give you an audience. Ignore those who suggest you should only use groups where you think the article is highly appropriate. Pick all groups where anybody might even be slightly interested. Always make sure followups go to all the groups. In the rare event that you post a followup which contains something original, make sure you expand the list of groups. Never include a "Followup-to:" line in the header, since some people might miss part of the valuable discussion in the fringe groups. ------ Q: How about an example? A: Ok. Let's say you want to report that Gretzky has been traded from the Oilers to the Kings. Now right away you might think rec.sport.hockey would be enough. WRONG. Many more people might be interested. This is a big trade! Since it's a NEWS article, it belongs in the news.* hierarchy as well. If you are a news admin, or there is one on your machine, try news.admin. If not, use news.misc. The Oilers are probably interested in geology, so try sci.geo.fluids. 91 He is a big star, so post to sci.astro, and sci.space because they are also interested in stars. And of course comp.dcom.telecom because he was born in the birthplace of the telephone. And because he's Canadian, post to soc.culture.Ontario.southwestern. But that group doesn't exist, so cross-post to news.groups suggesting it should be created. With this many groups of interest, your article will be quite bizarre, so post to talk.bizarre as well. (And post to comp.std.mumps, since they hardly get any articles there, and a "comp" group will propagate your article further.) You may also find it is more fun to post the article once in each group. If you list all the newsgroups in the same article, some newsreaders will only show the the article to the reader once! Don't tolerate this. ------ Q: How do I create a newsgroup? A: The easiest way goes something like "inews -C newgroup ....", and while that will stir up lots of conversation about your new newsgroup, it might not be enough. First post a message in news.groups describing the group. This is a "call for discussion." (If you see a call for discussion, immediately post a one line message saying that you like or dislike the group.) When proposing the group, pick a name with a TLA (three-letter acronym) that will be understood only by "in" readers of the group. 92 After the call for discussion, post the call for flames, followed by a call for arguments about the name and a call for run-on puns. Eventually make a call for "votes." USENET is a democracy, so voters can now all post their votes to ensure they get to all 30,000 machines instead of just the person counting. Every few days post a long summary of all the votes so that people can complain about bad mailers and double votes. It means you'll be more popular and get lots of mail. At the end of 21 days you can post the vote results so that people can argue about all the technical violations of the guidelines you made. Blame them on the moderator-of-the-week for news.announce.newgroups. Then your group might be created. To liven up discussion, choose a good cross-match for your hierarchy and group. For example, comp.race.formula1 or soc.vlsi.design would be good group names. If you want your group created quickly, include an interesting word like "sex" or "activism." To avoid limiting discussion, make the name as broad as possible, and don't forget that TLA. If possible, count votes from a leaf site with a once-a-week polled connection to botswanavax. Schedule the vote during your relay site's head crash if possible. Under no circumstances use the trial group method, because it eliminates the discussion, flame, pun, voting and guideline- violation accusation phases, thus taking all the fun out of it. To create an 93 ALT group, simply issue the creation command. Then issue an rmgroup and some more newgroup messages to save other netters the trouble of doing that part. ------ Q: I cant spell worth a dam. I hope your going too tell me what to do? A: Don't worry about how your articles look. Remember it's the message that counts, not the way it's presented. Ignore the fact that sloppy spelling in a purely written forum sends out the same silent messages that soiled clothing would when addressing an audience. ------ Q: How should I pick a subject for my articles? A: Keep it short and meaningless. That way people will be forced to actually read your article to find out what's in it. This means a bigger audience for you, and we all know that's what the net is for. If you do a followup, be sure and keep the same subject, even if it's totally meaningless and not part of the same discussion. If you don't, you won't catch all the people who are looking for stuff on the original topic, and that means less audience for you. ------ Q: What sort of tone should I take in my article? A: Be as outrageous as possible. If you don't say outlandish things, and fill your article with libelous insults of net people, you 94 may not stick out enough in the flood of articles to get a response. The more insane your posting looks, the more likely it is that you'll get lots of followups. The net is here, after all, so that you can get lots of attention. If your article is polite, reasoned and to the point, you may only get mailed replies. Yuck! ------ Q: The posting software suggested I had too long a signature and too many lines of included text in my article. What's the best course? A: Such restrictions were put in the software for no reason at all, so don't even try to figure out why they might apply to your article. Turns out most people search the net to find nice articles that consist of the complete text of an earlier article plus a few lines. In order to help these people, fill your article with dummy original lines to get past the restrictions. Everybody will thank you for it. For your signature, I know it's tough, but you will have to read it in with the editor. Do this twice to make sure it's firmly in there. By the way, to show your support for the free distribution of information, be sure to include a copyright message forbidding transmission of your article to sites whose USENET politics you don't like. 95 Also, if you do have a lot of free time and want to trim down the text in your article, be sure to delete some of the attribution lines so that it looks like the original author of -- say -- a plea for world peace actually wrote the followup calling for the nuking of Bermuda. ------ Q: They just announced on the radio that the United States has invaded Iraq. Should I post? A: Of course. The net can reach people in as few as 3 to 5 days. It's the perfect way to inform people about such news events long after the broadcast networks have covered them. As you are probably the only person to have heard the news on the radio, be sure to post as soon as you can. ------ Q: I have this great joke. You see, these three strings walk into a bar... A: Oh dear. Don't spoil it for me. Submit it to rec.humor, and post it to the moderator of rec.humor.funny at the same time. I'm sure he's never seen that joke. ------ Q: What computer should I buy? An Atari ST or an Amiga? A: Cross post that question to the Atari and Amiga groups. It's an interesting and novel question that I am sure they would love to 96 investigate in those groups. There is no need to read the groups in advance or examine the "frequently asked question" lists to see if the topic has already been dealt with. In fact, you don't need to read the group at all, and you can tell people that in your query. ------ Q: What about other important questions? How should I know when to post? A: Always post them. It would be a big waste of your time to find a knowledgeable user in one of the groups and ask through private mail if the topic has already come up. Much easier to bother thousands of people with the same question. ------ Q: Somebody just posted a query to the net, and I want to get the answer too. What should I do? A: Immediately post a following, including the complete text of the query. At the bottom add, "Me too!" If somebody else has done this, follow up their article and add "Me three," or whatever number is appropriate. Don't forget your full signature. After all, if you just mail the original poster and ask for a copy of the answers, you will simply clutter the poster's mailbox, and save people who do answer the question the joyful duty of noting all the "me (n)s" and sending off all the multiple copies. ------ 97 Q: What is the measure of a worthwhile group? A: Why, it's Volume, Volume, Volume. Any group that has lots of noise in it must be good. Remember, the higher the volume of material in a group, the higher percentage of useful, factual and insightful articles you will find. In fact, if a group can't demonstrate a high enough volume, it should be deleted from the net. ------ Q: Emily, I'm having a serious disagreement with somebody on the net. I tried complaints to his sysadmin, organizing mail campaigns, called for his removal from the net and phoning his employer to get him fired. Everybody laughed at me. What can I do? A: Go to the daily papers. Most modern reporters are top-notch computer experts who will understand the net, and your problems, perfectly. They will print careful, reasoned stories without any errors at all, and surely represent the situation properly to the public. The public will also all act wisely, as they are also fully cognizant of the subtle nature of net society. Papers never sensationalize or distort, so be sure to point out things like racism and sexism wherever they might exist. Be sure as well that they understand that all things on the net, particularly insults, are meant literally. Link what transpires on the net to the causes of the Holocaust, if possible. If regular papers won't take the story, go to a tabloid paper -- they are always interested in good stories. 98 By arranging all this free publicity for the net, you'll become very well known. People on the net will wait in eager anticipation for your every posting, and refer to you constantly. You'll get more mail than you ever dreamed possible -- the ultimate in net success. ------ Q: What does foobar stand for? A: It stands for you, dear. -- Gene Spafford Software Engineering Research Center & Dept. of Computer Sciences Purdue University, W. Lafayette IN 47907-1398 Internet: spaf@cs.purdue.edu phone: (317) 494-7825 Glossary Address: If a computer is multiuser or belongs to a network, addresses are used to differentiate the various users. An address is often the user's name, such as "rich" or "spartan." To differentiate between the "rich" using "SJSUVM1" and the "rich" using "portal," an addressing scheme is used, e.g., "rich@portal." This is pronounced "rich at portal." This form of addressing is known as "internet- style." Other forms of addressing exist, such as "portal!rich," but internet-style addressing is emerging as the standard form of address across networks. Bulletin board system: Also known as "BBS." See "conferencing." Computer: At its most basic level, it is an electronic device capable of carrying out millions of instructions per second. The instructions it executes are determined by its programming or software. The software enables the computer to performs tasks such as word processing, numerical calculation and communication. Conferencing: This is a form of electronic mail which requires a specialized type of communication software. Rather than being sent to a specific user, a message is distributed across the network or internet as an open letter. These open letters are organized by the conferencing software into categories of interest, such as "cat lovers" and "Italian culture." Users subscribe only to the categories that interest them and ignore the rest. Tens of thousands of personal computers around the world are dedicated to providing conferences between their users. Known as "bulletin board systems" or BBS's, they provide a important source of information for users with similar interests. Some BBS's belong to a network of BBS's using the same conferencing software. This allows local users to "conference" with users at other sites. E-mail: Users can send written messages to one another using a special form of communication software called electronic mail. Provided that both users' sites have electronic mail and that both sites belong to gatewayed networks, electronic mail is an amazingly fast and efficient way for users to communicate. The Internet network (not to be confused with the general term "internet") spans the globe and transmits mail between sites within seconds. Slower networks, such as Fidonet, can take hours or even days. Mail delivery is limited by the speed of the slowest network along the delivery route. For example, if a machine is a gateway between the Internet and the Fidonet networks, mail can take seconds to reach the gateway via the Internet and then a few days to reach its destination site within Fidonet. 85 86 Feed: The Usenet connection between two sites. The site that provides the connection "feeds" the site that wants it. Fidonet: A network of personal computers running the Fido bulletin board system software. Gateway: A computer that belongs to at least two networks and is registered with each network's NIC. A gateway computer allows users and computers from one side of the gateway to communicate with users and computers on the other side. A machine serving as a gateway to several networks can be a sort of network hub. The proliferation of gateway sites has facilitated the linking of previously isolated networks. The global community of linked networks is known as the "internet." Internet: The internet is the global community of linked networks. It is essentially a network of networks. The National Science Foundation's network or NSFNet is confusingly known as the Internet. The Internet is a high- speed network linking the nation's military and research institutions with corporations and foreign institutions around the world. While only a part of the internet, the Internet is considered its backbone because of its high-speed connectivity. Because of increasing demand for commercial access, the Internet is being restructured as the National Research and Education Network (NREN). Management for this new network will be contracted out to a consortium of private corporations. Kill file: Blocks the display of the articles originating from the users and sites listed in the file. Moderation: A moderated newsgroups requires all users to seek approval prior to posting an article. Multiuser: See "user." Networks: One or more computers linked for the purpose of communicating or of sharing resources such as printers and disk drives. Newsgroup: The categories of discussion available via Usenet. There are currently approximately 4,000. Site: This is another term for a computer. Most often it is associated with multiuser computers or computers in a network. Sites have names such as "SJSUVM1," "sjsumcs," and "portal." These names are used to differentiate one computer in a network from another. A similar term is "node." A node almost always refers to a computer in a network. System Administrator: Each user is regulated by his site or system administrator and each administrator relies upon his 87 neighboring site administrators for connectivity within the network. Generally, the administrator is liable for the actions of his users, but there is a debate over the extent of this liability. Usenet: The largest conferencing system in the world. The Usenet software is used by sites within the UUCP network. It is composed of an estimated 10 million users at one million sites whose messages are divided into over a thousand categories called "newsgroups." It is claimed that its volume of messages is doubling every two months. To participate in Usenet, a site must have Usenet software and be a node within UUCP or the Internet. Usenet messages can spread to other networks via gateways. These gateways convert messages to the format used by their own network's conferencing software. In this manner, Fidonet users can receive Usenet messages as Fido "echoes," as they are called in the Fidonet conferencing jargon. User: The person who operates the computer. The user operates the computer via software. The user interacts with the software usually via a keyboard, video monitor and printer. A "single-user machine" is a computer that can only accommodate one user at a time. A "multiuser machine" is a computer that can interact with several users simultaneously. This implies that the computer has more than one keyboard or point of interaction. A point of interaction is commonly known as a terminal. 88 89 90 91 Bibliography Blum, Deborah. "Studies on Beauty Raise a Number of Ugly Findings." ___ _________ ________ San Francisco Examiner. 16 February 1992, B10. Bowle, John. ______ ___ ___ _______ Hobbes and His Critics. New York: Barnes and Noble, Inc., 1969. Eachard, John. ___ _______ _____ __ ______ __________ Mr. Hobbs's State of Nature Considered. Liverpool: Liverpool UP, 1958. Frey, Donnalyn and Rick Adams. _____ _ _________ __ __________ !%@:: A Directory of Electronic ____ __________ _ ________ Mail Addressing & Networks. Sebastopol, California: O'Reilly and Associates, 1990. Galvin, Christopher J. "Micropopulists Speak Up." __________ Compuserve ________ Magazine, July 1991, 12. Hobbes, Thomas. __________ Leviathan. Edited by Michael Oakeshott. New York: Macmillan Publishing Co., 1962. James, D.G. ___ ____ __ ______ The Life of Reason. London, New York, and Toronto: Longmans, Green and Co., 1949. Horton, Mark. Untitled. Part of a series of documents compiled and distributed by Gene Spafford, news.announce.newusers Usenet newsgroup, 1987. O'Brien, Michael. "Playing in the MUD." _________ ________ SunExpert Magazine, May 1992, 19. Offut, A. Jeff. Untitled. Part of a series of documents compiled and distributed by Gene Spafford, news.announce.newusers Usenet newsgroup, 1987. Reid, Brian. ______ __________ _______ ______ Usenet Readership Summary Report. Palo Alto, California: Network Measurement Project at the DEC Western Research Laboratory, March 1992. Reid, Elizabeth. "Electropolis: Communication and Community on Internet Relay Chat." thesis, University of Melbourne, 1991. Ross, Ralph, Herbert W. Schneider, and Theodore Waldman, eds. ______ ______ __ ___ ____ Thomas Hobbes in His Time. Minneapolis: University of Minnesota Press, 1974. SRI International, _________ _______ _______ Internet: Getting Started. Menlo Park, California: SRI International, Network Information Systems Center, 1992. Brad Templeton. ____ _____ ________ Dear Emily Postnews. Part of a series of documents compiled and distributed by Gene Spafford, 92 93 news.announce.newusers Usenet newsgroup, 1991. Tuck, Richard. ______ Hobbes. Oxford and New York: Oxford UP, 1989. Von Rospach, Chuq. _ ______ __ ___ __ ____ ____ ___ ______ A Primer on How to Work with the Usenet _________ Community. Part of a series of documents distributed by Gene Spafford, news.announce.newusers Usenet newsgroup, 1987. Warrender, Howard. ___ _________ __________ __ ______ The Political Philosophy of Hobbes. Oxford: Oxford UP (Clarendon), 1957. Wolin, Sheldon. ________ ___ ______ Politics and Vision. Boston: Little, Brown and Company, 1960. 94