💾 Archived View for spam.works › mirrors › textfiles › internet › leviatha captured on 2023-11-14 at 10:24:36.

View Raw

More Information

⬅️ Previous capture (2023-06-14)

-=-=-=-=-=-=-
















                        Searching for the Leviathan in Usenet








                                      A Thesis

                                    Presented to


                 The Faculty of the Department of Political Science

                             San Jose State University


                               In Partial Fulfillment


                         of the Requirements for the Degree

                                   Master of Arts





                                         By

                               Richard Clark MacKinnon


                                   December, 1992























                                APPROVED FOR THE DEPARTMENT OF POLITICAL

                                SCIENCE



                                __________________________________________

                                ___

                                         Dr. William McCraw



                                __________________________________________

                                ___


                                         Dr. Kenneth Peter



                                __________________________________________

                                ___

                                         Dr. Ronald Sylvia



                                APPROVED FOR THE UNIVERSITY



                                __________________________________________

                                ___






                                        Abstract

                        Searching for the Leviathan in Usenet


                             by Richard Clark MacKinnon

          The purpose of this thesis is to identify signs of Thomas Hobbes'

          Leviathan in the Usenet computer conferencing network.  Certainly

          nothing that the Usenet users can experience can compare to the

          Hobbesian scenario in which persons are forced to give up the

          right to govern themselves in exchange for personal safety.  This

          is certainly true on the surface, but there is another level of

          interaction within Usenet other than user-to-user.  It is the

          level of the users' "personae," and it is at this level of

          understanding that the fear of vanishing from existence is ever

          present and near.  For personae within Usenet, life can be

          described as "solitary, poor, nasty, brutish, and short."  And it

          is for their sakes that this researcher has searched for and

          found a Leviathan in Usenet.






                                        Contents


             Introduction ...........................................1


             Hobbes, Leviathan, and Usenet ..........................3


             Usenet is a Distinct Society ...........................8


             The Notion of Persona .................................14


             Personae are Persons ..................................21


             The Powers ............................................25


             The Pursuit of Powers .................................32


             Death .................................................37


             Living in Moderation ..................................43


             Looking for the Leviathan .............................55


             Conclusion ............................................59


             Appendix ..............................................66


             Glossary ..............................................85


             Bibliography ..........................................92



























                                           iv






                                      Introduction

          The purpose of this thesis is to identify signs of Thomas Hobbes'

          Leviathan in the Usenet computer conferencing network.  Defined

          as "that mortal god, to which we owe under the immortal God; our

          peace and defence,"1 Leviathan in a computer conferencing network

          is the institution of censorship or moderation of the messages

          written by the network's users.  According  to Hobbes, living in

          fear of death or wounds disposes men to obey a common power.2

          Certainly nothing that the Usenet users can experience can

          compare to the Hobbesian scenario in which persons are forced to

          give up the right to govern themselves in exchange for personal

          safety.  This is certainly true on the surface, but there is

          another level of interaction within Usenet other than user-to-

          user.  It is the level of the users' "personae," and it is at

          this level of understanding that the fear of vanishing from

          existence is ever present and near.  For personae within Usenet,

          life can be described as "solitary, poor, nasty, brutish, and

          short."3  And it is for their sakes that this researcher has

          searched for and found a Leviathan in Usenet.


          In order to argue this work, this paper is organized into short

          sections or chapters designed around major points.  The first

          chapter introduces the reader to Hobbes, _________
                                                   Leviathan, and Usenet.

          A glossary is provided to assist with technical computer

          terminology and an appendix contains relatively hard to find

          Usenet documentation.  The argument itself consists of seven

          points and a survey of two hundred randomly selected Usenet

          articles.  The survey was conducted to find measurable signs of

          the Leviathan as described in the argument.  The findings show

          the degree to which Leviathan is present in Usenet.  Each chapter

          states its purpose in the opening paragraphs and is concluded

          with a summary of the points covered therein.  In this way it is

          possible to lead the reader through the theoretical worlds of

          _________
          Leviathan and the Usenet persona.  At the end of the argument is

          a conclusion which summarizes all seven points and focuses on the

          most difficult ones.  And lastly, the thesis concludes with a

          short discussion of future research considerations.












                1Thomas Hobbes, _________
                                Leviathan, Edited by Michael Oakeshott (New

          York:  Macmillan Publishing Co., 1962), 132.


                2Hobbes, 82.


                3Hobbes, 100.



                                           1






                              Hobbes, _________
                                      Leviathan, and Usenet

             Hobbes' _________
                     Leviathan was selected for this thesis primarily

          because it is a system of knowledge developed for the purpose of

          understanding the genesis of government.  This system of

          knowledge for understanding the "matter, forme and power" of

          society, originally advanced during Cromwell's tenure, was

          published in 1651.  The controversial title implied that the

          monarchy was the political manifestation of the Biblical beast

          and the work was considered scandalous.


          Hobbes scholar Herbert Schneider explains that the choice of the

          title is curious because the mythological Leviathan is

          consistently the symbol of the "powers of evil, "4  rightfully

          upsetting the supporters of the Crown.  Yet it is clear when

          Hobbes describes the Leviathan as the "mortal god"5 on earth that

          he does not share the common diabolical connotation.  Certainly

          Hobbes was aware of this discrepancy and it is likely he intended

          for the discrepancy to further define his concept of a Leviathan

          rising from the people.  There is no doubt that such a "beast"

          would need to be menacing and powerful in order to convince

          people that their lives are safer with it than in their own

          hands.  The Leviathan is the generation of the Commonwealth, that

          entity consisting in the powers of all people which can protect

          them from their enemies.  Hobbes' critics were quick to equate

          the evil beast with government, thus putting Hobbes at odds with

          the regime indeed, with any government.  It is possible that

          Hobbes selected the Leviathan symbol in part to convey that

          government is a necessary evil given humans' inclination to

          destroy one another without it.  Even this notion brought Hobbes

          criticism as a paranoid anti-establishmentarian.  While he admits

          to a level of paranoia commensurate to being born the "twin of

          fear," he is emphatically not anti-establishment--in fact, he

          would have supported either Cromwell or the King as long as one

          of them possessed absolute power to govern as a Leviathan.  Given

          his dim view of human nature, his predilection toward paranoia,

          and the execution of the King, one cannot blame Hobbes for

          desiring peace and order at any price.

          Though never the intentional sum and highlight of his political,

          religious, ethical, and philosophical view, _________
                                                      Leviathan has

          nevertheless emerged as such.  This is because of Hobbes'

          precision in the use of language and his plain treatment and

          analysis of socially sensitive matter.  In his lifetime _________
                                                                  Leviathan

          earned Hobbes the enmity of many who had formerly been his

          friends.  Today it is still popularly trivialized as a dark and

          heretical treatise written by a paranoid exile.  But Hobbes'




                4Herbert W. Schneider, "The Piety of Hobbes," in ______
                                                                 Thomas

          ______ __ ___ ____
          Hobbes in His Time, eds. Ralph Ross, Herbert W. Schneider, and

          Theodore Waldman (Minneapolis:  University of Minnesota Press,

          1974), 86.


                5Hobbes, 132.



                                           3




                                           4


          admirers and students appreciate the giant work for what it is--a

          reconstitution of civil society from its most basic element.  He

          begins his book with the ambitious sentence, "Concerning the

          thoughts of man, I will consider them first singly, and

          afterwards in train, or dependence upon one another."6


          Considering that his goal is to explain governance, one would

          expect that a beginning begun with a discussion of the "single

          thought" would immediately proceed to more developed concepts

          such as the rights of kings.  Not so.  After describing the

          nature of thought, he discusses the senses, imagination, dreams,

          the development of speech, passions, virtue, and the

          categorization of all knowledge.  It is not until Chapter Sixteen

          that he defines what a person is and in Chapter Eighteen he

          finally addresses the rights of sovereigns.  It is an

          understatement to say that Hobbes is thorough in his endeavor.

          Although this thesis focuses on the generation of Leviathan (at

          the end of Chapter Seventeen), it is important to realize that

          this study covers only a quarter of the book.

          The result is a self-contained, interlocking structure with every

          word defined and every conclusion logically sound.  In the

          writing of his book, Hobbes incidentally produced the first

          comprehensive attempt at the theory of language.  In other words,

          Hobbes had to develop a theory of language to accurately describe

          his theory of the commonwealth.  Richard Tuck remarks that

          _________
          Leviathan is the "first unquestionably great philosophical work"

          in English.7  Prior to _________
                                 Leviathan, all scholarly works of import

          were written in Latin, French, German, or ancient Greek.8


          Since his endeavor was intentionally comprehensive, his treatise

          is unusually suitable for examining any and all societies--

          including those that did not exist in his time and as in the case

          of Usenet, arguably do not exist now.  This is possible because

          the treatise is presented mostly in general terms, giving it

          broad applicability and timelessness.  While it is true that

          _________
          Leviathan is a product of troubled times, Hobbes' sparing

          references to Britain merely illustrate his points and do not

          confine them to that island.  Additionally, his masterful

          understanding of philosophy beyond the realm of politics is

          useful in the establishment of personae and their virtual society

          of Usenet.

          Usenet is the largest computer conferencing network in the world.

          The network is composed of an estimated 2.3 million users at

          45,000 sites worldwide.  Most sites are academic institutions or

          high technology companies, but commercial and publicly supported




                6Hobbes, 21.


                7Richard Tuck, ______
                               Hobbes (Oxford:  Oxford UP, Clarendon,

          1957),  vii.


                8And undoubtedly, Chinese and Italian.




                                           5


          access is available to any interested group or individuals.

          Usenet users can send private messages to one another via

          electronic mail.  The mail can reach many sites on the planet

          within seconds.  The users can also write public messages known

          as "articles."  These articles are divided into approximately

          4,000 thousand categories called "newsgroups."  Newsgroups range

          in topics from political theory to baseball.  The current volume

          of articles is 14,000 daily.9


          Despite its size, Usenet has no central authority which monitors

          access or content.  All control, if any, is exercised at the site

          level.  Sites determine whether to provide access to users or

          whether they want to provide a "feed" or connection to a

          potential site.  Users and sites may remain on the net as long as

          the sites that provide them with access continue to do so.

          Usenet articles are distributed using a "store and forward"

          method.  This means that when a user writes an article, the

          original article is stored at his or her site and a copy is

          forwarded via telephone or leased line to neighboring sites.

          Because the associated costs of storage and forwarding can become

          very high, economics may have more of an impact over local

          control than anything else.  A company, for example, may decide

          to restrict users from participating in any of the recreational

          newsgroups because the volume in those groups is high and their

          business value is low.  Still, some organizations may opt to

          control content for other reasons.  For example, a high school

          may decide to block participation in sexually-oriented

          newsgroups.  However, thousands of users around the world enjoy

          unrestricted access to newsgroups containing articles from the

          technologically informative to the obscene.  Depending on the

          user consulted, Usenet can be an anarchic or a highly regulated

          medium of communication.


















                9Brian Reid, ______ __________ _______
                             Usenet Readership Summary (Palo Alto,

          California:  Network Measurement Project at the DEC Western

          Research Laboratory, March 1992), lines 22-28.  The lines are

          cited rather than page numbers because the document was received

          electronically without pagination.






                              Usenet is a Distinct Society

          In order to apply Hobbes' political philosophy to Usenet, it is

          important to establish the distinctness of the Usenet society.

          Distinctness assures that Usenet differs enough from the external

          world--the reality outside of Usenet--to provide a unique

          laboratory to cultivate new insights and new conclusions.  The

          argument for distinctness consists of Usenet's two-dimensional

          nature, its creation of an explicit language to describe its

          "physical" reality, its interference in the transfer of the

          social structure from the external world, and its ability to

          compensate for the lack of a complete social structure by

          developing a parallel or alternate structure to that of the

          external world.


          Although Usenet is designed to facilitate communication among

          computer users, it is restricted to written communication;

          therefore, it mitigates the amount and quality of communication

          possible among them.  Much like unintroduced penpals can never

          know the "real" persons behind their letters, Usenet users can

          never know the "real" persons behind the articles.  It is not

          possible to capture the range of interpersonal interaction with

          only the written word, transforming Usenet into a two-dimensional

          substitute for three-dimensional, "face-to-face" communication.

          As a result there is a deception in the medium that often

          distorts the meaning of a message, much as a carnival mirror

          distorts the reflection of a person:  what is "said" is not

          necessarily what is "heard," or more accurately, what is written

          is often misinterpreted.  Since ambiguity has this deceptive

          effect in the external world, Usenet participants are especially

          susceptible to ambiguous statements, implied meanings, and

          sarcastic remarks.  Whereas external world users can find clues

          to meaning in facial expressions and voice control, Usenet

          participants cannot.  But more importantly, the lack of cues

          available during "face-to-face" communication points not only to

          the absence of  faces, but to the absence of all physical

          reality.

          Lacking physical reality, Usenet users must create an explicit,

          written language to convey meaning as well as emotion, physical

          qualities, and action. As a society based in language, it relies

          heavily on symbol, analogy, and metaphor to re-create or transfer

          physical matter and actions from the external world.  But since

          these re-creations are merely metaphors for, or "analogs" of

          their physical counterparts, Usenet can never be a mirror image

          of the external world.


          Usenet users are unable to "bring" with them their respective

          social structures because the limitations of written

          communication deconstruct their external world social structure.

          These social structures consist of the norms, mores, and

          traditions which guide the users'  interaction as members of the

          external society.  The computer medium inhibits computer users

          from transferring these social structures to Usenet.  This

          inhibition resulting from the absence of or limitations on

          physical proximity, "face-to-face" interaction, and non-verbal


                                           8




                                           9


          cues, is discussed and analyzed at length in Elizabeth Reid's

          _____________  _____________ ___ _________ __ ________ _____
          Electropolis:  Communication and Community on Internet Relay

          ____
          Chat.   Reid exposes the failings of computer-mediated, i.e.,

          written,  communication as follows:



                Words, as we use them in speech, fail to express what they

            really mean once they are deprived of the subtleties of speech

            and the non-verbal cues that we assume will accompany it. . .

            . It is not only the meanings of sentences that become

            problematic in computer-mediated communication.  The standards

            of behavior that are normally decided upon by verbal-cues are

            not clearly indicated when information is purely textual.10

          The deprivation of the "subtleties" is exactly what makes

          communication and interaction among Usenet users different from a

          room full of computer users.  Computer users, as do all persons,

          learn standards of behavior from their respective social

          structures.  As Reid suggests, these standards are reinforced by

          "subtleties of speech and non-verbal cues."  But within Usenet,

          users limited to written communication are denied the full range

          of verbal and non-verbal cues customary to interpersonal

          communication and required for reinforcing behavioral standards.

          In the external world,  behavioral standards dictate that one

          should not provoke a visibly angry man, but in Usenet the

          absence, or least the distortion, of visible anger interferes

          with that standard of behavior.


          Despite the limitations of a society based upon written

          communication, Usenet users are able to compensate.  The

          "interference" or distortion caused by the written medium forces

          Usenet users to confront what Reid calls the deconstruction of

          the "traditional methods for expressing community" by developing

          "alternate or parallel methods."11  In this way, Usenet has

          become an alternate or distinct society from the external world.

          Usenet's parallel method or analog for conveying mores, norms,

          and traditions is known as "netiquette."  As the term implies, it

          is literally "network etiquette" and it helps to reinforce the

          standards of behavior that users might miss from the lack of

          non-verbal cues.  Several attempts have been made to summarize

          the norms of  "netiquette."  The most widely cited is Gene

          Spafford's series of documents12, which he compiled and edited

          from the suggestions of Usenet users.  Either heeded or ignored

          by many, the estimates of the validity of Spafford's guidelines

          vary, but they are often invoked to resolve a dispute or to




                10Elizabeth Reid, "Electropolis:  Communication and

          Community on Internet Relay Chat," thesis, (Melbourne, Australia:

          University of Melbourne UP:  1991), lines 495-505.


                11Reid, lines 200-206.


                12These documents are included in the Appendix.




                                           10


          "advise" one another.  In the following example, "Jack" from the

          University of  California at Irvine advises "Bill" from The

          Netherlands of a breach of "netiquette":



                Your reply to my post gave me mixed messages.  Some of

            your comments are cruel.  Your flame should have been sent

            directly to me via e-mail.13

          Since enforcement of "netiquette" begins with the individual

          users, consensual interpretation by the Usenet public determines

          the "law."  If a user's action offends one person in 10 million,

          that action is probably a slight breach, but nothing of wider

          concern; however, if an action results in thirty complaints, then

          it usually is treated more seriously.  "Netiquette" then, is the

          Usenet analog for the external world's system of mores, norms,

          and tradition.  While not a precise duplication of the external

          world's social structure, "netiquette" provides Usenet users with

          guidelines or standards of behavior.  Chuq Von Rospach, author of

          _ ______ __ ___ __ ____ ____ ___ ______ _________
          A Primer on How to Work with the USENET Community, writes,



                . . . for USENET to function properly those people must be

            able to interact in productive ways.  This document is

            intended as a guide to using the net in ways that will be

            pleasant and productive for everyone.  This document is not

            intended to teach you how to use USENET.  Instead, it is a

            guide to using it politely, effectively and efficiently.14

          It will be recalled that Reid suggests non-verbals cues reinforce

          the standards of behavior in the external world.  Just as

          "netiquette" developed into the Usenet analog for standards of

          behavior, a system of written cues has developed as an analog to

          reinforce those standards.  These cues, known as "emoticons" make

          use of non-standard punctuation, spelling, capitalization, and

          special keyboard characters to convey action, emotion, and

          emphasis.  An excerpt from Spafford's guidelines follows:



                The net has developed a symbol called the smiley face.  It

            looks like ":-)" and points out sections of articles with

            humorous intent.  No matter how broad the humor or satire, it

            is safer to remind people that you are being funny.15




                13All such examples are exerpts from actual Usenet

          communication.  The original punctuation and spacing has been

          left intact to preserve the intent of the message.  In the

          interest of privacy, the authors' surnames have been suppressed.


                14Chuq Von Rospach, _ ______ __ ___ __ ____ ____ ___ ______
                                    A Primer on How to Work With the USENET

          _________
          Community.  Compiled by Gene Spafford, 1987, lines 14-16.  See

          the Appendix for the complete text.


                15Von Rospach, lines 112-114.




                                           11


          This guideline emphasizes the use of emoticons to convey humor in

          order to avoid the consequences of ambiguous or sarcastic

          statements, but does not show the variety of possibilities, as in

          the following examples:



                Steve,

                        hahahahahahahhahahahahahahahahahahahahaa

                        *sniff* waaaaaaaaaaaaaaaaaaaaaaaaahhhhhh



                I laughed, i cried....that post was GREAT! :-)



                Amusedly,

                                -Mirth-

          In this message, "-Mirth-" from the Massachusetts Institute of

          Technology, has no difficulty sharing his or her amusement with

          an earlier "post" or message of  Steve's.  Note the use of the

          asterisks in "*sniff*" to convey action as opposed to simply

          saying "I sniffed," as is done later.  Of course, the

          capitalization in "GREAT" indicates emphasis, presumably

          enthusiasm given the presence of the "smiley."  Consider the next

          example from a user at Dalhousie University in Halifax, Canada:



                You know, I agree with everything you said. However, you

            loosely fall into the dweeb category by admitting you actually

            READ most of the damn thing. It brings no fame to its creator,

            but only humiliation to the human species (or does Kibo not

            fit into the homo sapien sapien category? Maybe there is a

            better division for an individual who's life is overwhelmed by

            USENET? homo sappy postus?)    *shakes his head, almost

            embarassed that he has a 4 line .sig, let alone a 950 line

            one*

          This article is an excerpt from a discussion on whether having a

          "950 line"  signature on an article is a violation of

          "netiquette."  The Canadian user agrees that a lengthy signature

          is a violation and becomes embarrassed when he realizes that his

          own "4 line .sig" is considered too long by most interpretations

          of "netiquette."  He conveys this realization by using asterisks

          to simulate the shaking of his head.


          To summarize, it is important to establish the distinctness of

          Usenet from the society of the external world so that new

          insights and new conclusions may be cultivated from the

          application of Hobbes' political philosophy.  This distinctness

          is established by Usenet's explicit language for conveying

          meaning, emotion, and action to a two-dimensional environment.

          Although Usenet users are able to compensate for the lack of a

          physical reality, their parallels or "analogs" with the outside

          world have resulted in a distinct reality of their own.






                                 The Notion of Persona

          The high level of interaction between Usenet users in their

          distinct society results in the development of "personae."  The

          following discussion explores this development, the personae's

          ability to portray Usenet users to one another, the derivation of

          their "actions" from words, and the conditions for their

          existence.


          Usenet is distinguished from other written media by the level of

          interaction among its users.  A printed newspaper, for example,

          offers its readers a one-way medium.  Generally, a newspaper is a

          medium for the writers to communicate to their readers and not

          with them; however, the Opinion/Editorial page does provide for

          selected reader response.  There the opinions expressed are

          personal and not necessarily the view of the newspaper's staff.

          These opinions may be compelling or inane, but it is the names

          attached that remind one that there are individuals at the

          source.  These individuals, through the interaction of their

          opinions, briefly create a sense of community.  Granted, such a

          community is a fleeting one at best, for often the emergent

          dialogue is not a dialogue at all, but a set of coincident

          monologues submitted in reaction to a piece of news.  Any

          repartee is unintentional and possibly staged--selected--by the

          editor to represent a diversity of views.  In Usenet, dialogue is

          spontaneous and unedited, and the individuals at the source are

          users who frequently contribute on a regular basis.  The most

          active users contribute over fifty articles per week each.16

          This high level of interaction among Usenet users creates a more

          permanent sense of community than among a newspaper's readership.

          Accordingly, this high level of interaction among users provides

          opportunities to develop relationships.

          It has been established that the medium of written communication

          interferes with the transfer of the users' external world social

          structures into Usenet.  By the same means,  written

          communication interferes with the transfer of the users'

          personalities and unique qualities as well.  The result is the

          creation of "personae" which are as distinct from the users as

          Usenet society is distinct from the external world.  The external

          world of the users is a world of myriad objects to be sense-

          perceived ultimately to be desired or avoided.17  The nature of

          the users' known universe possesses physical characteristics that

          can be sense-perceived either directly or indirectly via

          technological extension of the senses or a combination of these

          accompanied by scientific deduction.  Words signify the memory of




                16UUNET Technologies, Inc., ___ __ ____ __________ __ ____
                                            Top 25 News Submitters by User

          __ ______ __ ________ ___ ___ ____  _ _____
          by Number of Articles for the Last  2 weeks (Falls Church,

          Virginia: July 24, 1992).


                17Hobbes, 48.





                                           14




                                           15


          sensory experience and thought18, but the physical things of the

          external world exist independently of the words which describe

          them.  Though important, words are not required for the existence

          of the things to which they refer.  But within Usenet, words are

          the sole means of characterizing the network's universe.  Thus,

          wordsmanship in Usenet is a far more valued skill than it is in

          the external world.  Consequently, possession or lack of this

          skill can inadvertently give the Usenet user a radically

          different persona from him or herself.  Accordingly,  a command

          of written language can empower a persona in Usenet beyond the

          relative strength of its user in the external world.


          The degree to which Usenet users resemble their personae seems to

          vary.  The representation of a user within Usenet is the

          attempted transfer of the user's individuality into a Usenet

          persona.  The user has some control over the representation and

          the extent to which the persona resembles himself or herself.  A

          representation is transparent when the user attempts to represent

          him or herself as he or she is; a representation is translucent

          when the Usenet persona is only a shadow of the user; and

          accordingly, a representation is opaque when the persona does not

          resemble the user at all.

          A user can spend a great amount of energy wondering about the

          "real" users behind the personae with which he or she interacts.

          In all cases where there is no direct knowledge of another user,

          if one cares, one must rely upon the word of that user as to

          whether that persona is an accurate representation.  Since it is

          in effect that user's word which is in question, relying upon it

          offers little relief.  Without direct or revealed knowledge, the

          pursuit of the true nature of representations is a matter for

          speculation.  Therefore, until the full truth is known, it is a

          common and expedient practice  to "forget" about the users behind

          the personae  so that any purported resemblance or dissimilarity

          of personae to users can be treated as if it does not matter.19


          Since Usenet is a medium for communication, any resemblance it

          may have to external world society necessarily must be reduced to

          written form.  Physical actions such as activating a computer or

          restricting access to another user's account are actions

          completed by users and not by their Usenet personae.  Users have

          physical form and are able to manipulate physical objects such as

          power switches and keyboards, but their Usenet personae have no

          physical form.  Therefore any interaction among  personae must be

          derived from the written words of their users.  Note that actions

          derived from written messages do not correspond exactly to those

          of the respective users.  For example, the action of a persona




                18Hobbes, 33.


                19We commonly "forget" complications for the sake of

          simplicity.  For example, it is simpler to think of the sun

          "rising" than it is to think of the earth turning.




                                           16


          which is "smiling," corresponds to the action of a user who is

          typing.  Although the action of "smiling" is derived from the

          words that the user types, the actions do not correspond exactly

          because the user may or may not be smiling and the persona is

          probably not "typing."


          It is the high level of interaction among Usenet users which

          gives their personae "life."  In fact, a single response to one's

          statement is sufficient to generate a persona.  That response,

          though minimal, is the foundation of existence within Usenet.  It

          is obvious that a response implies a cause or stimulus worthy of

          reaction; however it is less obvious that by implication it

          signifies an acknowledgement of that cause.  In terms of "cause"

          and "effect," a characteristic of the effect is the

          substantiation of its cause's existence.  In terms of Usenet, a

          response substantiates the existence of a statement.  This may

          seem trivial until it is recalled that Usenet personae are

          created as a result of the interaction among Usenet users.  This

          interaction consists of the cycle of statement and response.  The

          existence of the personae, therefore, is tied to that cycle.

          One may wonder why interaction is a prerequisite for a persona's

          existence.  In a written world such as Usenet, there is a

          stricter burden of proof for existence than Descartes requires in

          the external world.  A user can read and contemplate the words of

          another user, but unless there is a visible, i.e., written,

          response via his persona, the action of reading and contemplating

          goes unnoticed.  If a user is unnoticed, then he or she is not

          interacting with other users.  Because personae are created as a

          result of interaction, reading and contemplating alone are

          insufficient to generate or maintain the existence of a persona.

          As shown, "Cogito ergo sum" is an insufficient measure of

          existence within Usenet.  If all users kept their thoughts to

          themselves, they certainly would be assured of their own

          existences, but Usenet would be reduced to a non-interactive,

          indistinct, written medium.  Without some sort of response beyond

          interior cogitation, there is nothing to be perceived by other

          Usenet users.  "Network existentialism" is therefore more

          skeptical than Decartes' externalism can account for.


          However, a dialectical approach can be used to establish a

          measure for existence  within Usenet.  Whereas "I think,

          therefore I am" is insufficient for this purpose, so too is "I

          write, therefore I am."  Again, without a visible response, a

          written statement remains isolated and apparently unperceived--a

          persona's existence is neither generated nor substantiated.  A

          further modification to the premise results in, "I am perceived,

          therefore I am."  Suddenly the Usenet user is no longer alone,

          for to be perceived requires another.  The visible response, "I

          hear you" generates and substantiates the existence of the first

          user's persona, whereby a reply would perform the same function

          for the second user's persona.  The visible response is evidence

          of perception.  Without that response, the perception remains as

          an interior cogitation of the would-be respondent and does

          nothing to substantiate the existence of either user's persona.




                                           17


          The visible cycle of cause and effect, the users' statements,

          responses, restatements, and correspondence ensures the viability

          of the personae of both users.  When extended beyond them to the

          multitude of the personae within Usenet, the existence of all of

          them is assured.


          Where the parallel between dialectical existence in Usenet to

          independent existence in the external world might be difficult to

          follow, the parallel for the quality of life is more apparent.

          As in other aspects of the comparison of Usenet to the external

          world, persona existence is distinct from user existence.  Users

          require air, food, water, and other essentials for basic

          existence.  Personae, lacking physical form, do not require

          physical sustenance; nonetheless, they are dependent upon three

          essential conditions for existence.

          The first condition is the continued association between the user

          and the persona.  The loss of the user's access to Usenet severs

          the association to his or her persona.  Once Usenet loses its

          utility to the user, the continued association to the persona is

          threatened.  In other words, a persona's existence is dependent

          upon a user's access to Usenet; and a user maintains access to

          Usenet so long as Usenet remains useful.


          The second condition is the visible demonstration of presence.

          While Usenet may have great utility to a passive user,20 the lack

          of interaction with other users does not create a persona which

          exists in a way previously defined as existence within Usenet.

          The passive user remains outside the boundary of Usenet existence

          and his or her actions are unnoticed to "life" within.  This

          study concerns itself with those users who choose to participate.

          The third condition is that the participation is continuous.  A

          persona belonging to a user who is prevented, unable, or

          unwilling to continue to participate will continue to exist until

          the memory of that existence is forgotten by the other users.


          In summary, the two-dimensional nature of Usenet, caused by the

          medium of written communication, forces the development of

          personae among interacting users.  Further, the derived actions

          of the personae from the words of the users are distinct from the

          physical actions of the users.  Also there is sufficient

          distinctness to allow users to "forget" that they are interacting

          with representations of other users and not the users themselves.

          Finally, the personae exist dialectically21 and will continue to



                20A passive user is a user who does not or cannot

          communicate with other users, e.g., while using a library's

          online catalog.


                21

                  Prior to the "first cause," participant A is isolated in

          silence and unaware of "self" and "other"--existence is

          undefined.  Participant B, like A, is also alone and ignorant.

          Spontaneously, participant A wonders aloud, "What is my purpose,

          if any?"  B, surprised by the break in the silence and the

          presence of another, replies, "I don't know, but let's find out




                                           18


          exist as long as Usenet retains its utility to the users and the

          users continue to participate continuously via the cycle of

          statement and response.















































          together."  The phenomenon of mutual awareness implies the

          simultaneous awareness of the other and the self.  This

          rudimentary confirmation of existence-dependent-upon-another,

          i.e., co-existence, is sufficient enough to allow participants A

          and B to pursue the purposes of their existence together.






                                  Personae are Persons

          Having established the distinctness of Usenet's society and its

          persona population, it is possible to proceed with a preliminary

          parallel to _________
                      Leviathan.  Establishing the parallel between persons

          and personae will allow for the subsequent application of Hobbes'

          political philosophy to Usenet.  This parallel is established in

          the following discussion of Hobbes' definition of "person," the

          actions of personae, and the special form of representation known

          as "impersonation."


          Hobbes writes,



                A person is he, _____ _____ __ _______ ___ ___________
                                whose words or actions are considered,

            ______ ___ ____ __ __ ____________ ___ _____ __ _______ __
            either his own, or as representing the words or actions of

            _______ ___
            another man . . . When they are considered his own, then is he

            called a _______ ______
                     natural person:  and when they are considered as

            representing the words and actions of another, then is he a

            _______ __ __________ ______
            feigned or artificial person."22

          Having established that personae represent users to one another

          in Usenet, this definition seems to suggest that personae are

          indeed persons.  To explain, according to Hobbes a persona

          represents the "words or actions of another man." Indeed, a

          persona represents the words and actions of a user.  Further,

          Hobbes defines "personation" as "to act or represent oneself."23

          This being the precise purpose for personae in Usenet,

          "personation" is alternately definable as the "generation of a

          persona."  Therefore, in terms of Hobbes, Usenet users must

          "personate" themselves via personae because written communication

          prevents the users from acting and representing themselves in

          person.  In other words, personae are the Usenet analogs for

          persons in the external world.

          While it is true that a persona's actions represent the actions

          of a user, the distinctness of the persona from the user allows

          for the distinctness of the persona's actions.  Recall that all

          persona actions must necessarily be derived from the written

          responses of the users.  When a user writes a hostile message to

          another user, his or her persona in effect "attacks" the persona

          of the recipient.  Whether a persona is actually responsible for

          or "owns" the "attack," Hobbes writes:



                Of persons artificial, some have their words and actions

            _____
            owned by those whom they represent.  And then the person is

            the _____
                actor; and he that owneth his words and actions, is the





                22Hobbes, 125.  Hobbes tends to emphasize with

          capitalization and italics.  This emphasis will be preserved in

          all selected passages and quotations.


                23Hobbes, 125.



                                           21




                                           22


            AUTHOR:  in which case the actor acteth by authority.24

          Strictly interpreted, personae are "artificial persons" because

          their words and actions are owned by the users whom they

          represent, but since it is common and expedient to "forget" that

          personae are representations of users, it is possible to

          understand how a persona's actions can be interpreted as the

          persona's own.  Although Hobbes does not say specifically, he

          suggests that accountability for one's own actions is the

          consequence of acting as "owner" of the actions or with

          "authority."25  Accordingly, the expedience of "forgetting" may

          lead one to treat a persona as the author of its actions,

          thereby expecting accountability from the persona for the

          actions.  This is an unrealistic expectation, given that a

          persona is but a representation of a user who is the owner of its

          actions.  From this it follows that a user seeking to evade

          accountability for his actions might attempt to exploit the

          expedience of "forgetting" by acting through another user's

          persona.  By impostering or "impersonation," he or she can create

          a persona that appears to represent the personality and unique

          qualities of another user.  Because of the expedience of

          "forgetting" and the uncertainty regarding the degree of

          representation (transparent, translucent, or opaque) between

          users and personae, "impersonation" is a more serious violation

          of trust in Usenet than it is in the external world.  Reid

          writes, "The illegitimate use of  [personae] can cause anger on

          the part of their rightful users and sometimes deep feelings of

          guilt on the part of the perpetrators."26


          "Impersonation" is classified as an opaque representation since

          the persona is intended to represent someone other than the user

          behind it; however, not all opaque representations are

          impersonations.  A user seeking complete anonymity for personal

          privacy reasons might consider an opaque representation; however,

          a translucent representation is more common.  A translucent

          representation is typified by the user who wishes to interact via

          a pseudonym.  For the same reasons that an author would elect to

          use a pen name, a translucent representation is useful in masking

          the user's identity in certain situations.  When the user is not

          seeking to evade accountability for his or her actions, he or she

          is not "impersonating."

          To review, having established the distinctness of Usenet's

          society and its persona population, it is possible to proceed

          with a preliminary parallel to _________
                                         Leviathan.  This parallel

          establishes that personae "act or represent the words or actions"




                24Hobbes, 125.


                25Hobbes, 126.


                26Elizabeth M. Reid, "Electropolis: Communication and

          Community on Internet Relay Chat" (thesis, University of

          Melbourne, 1991), lines 1139-1141.




                                           23


          of their users.  Additionally, expedience allows one to treat a

          person's words or actions as the persona's own.  This being

          Hobbes' definition for "personation," personae are therefore the

          Usenet analogs for persons in the external world.  Further, a

          user may exploit that expedience and "impersonate" another user

          to evade the consequences of his or her actions.  Finally, this

          preliminary parallel between Usenet and _________
                                                  Leviathan clears the way

          for further analysis of the latter and the development of analogs

          within the former.






                                       The Powers

          Given the preliminary parallel between personae and Hobbes'

          "persons," it is possible to establish a further parallel between

          _________
          Leviathan and Usenet. Hobbes explains that persons possess

          certain powers.  The discussion continues with the consideration

          of these powers and development of their Usenet analogs.  On the

          subject of power, Hobbes begins,



                _______ _____
                Natural power, is the eminence of the faculties of body,

            or mind:  as extraordinary strength, form, prudence, arts,

            eloquence, liberality, nobility.  ____________
                                              Instrumental are those

            powers, which acquired by these, or by fortune, are means and

            instruments to acquire more: . . .27

          Three of these natural powers are severely limited in their

          transfer to Usenet society because Usenet personae lack physical

          form.  They are strength, form, and arts.  Obviously, physical

          strength is irrelevant in any environment devoid of physical

          things, but a Usenet persona can have strength relative to other

          personae.  In terms of Usenet, strength is one's ability to

          "execute an attack."  It will be recalled that the action of

          "attack," like all actions in Usenet, must be derived from the

          cycle of statement and response.  Therefore, "strength" in Usenet

          is one's ability to write a potent or even, vehement statement.


          The power of "form" comes from one's physical makeup.  In

          essence, it is the effect that one's appearance has on others.

          According to Hobbes, "form is power; because being a promise of

          good, it recommendeth men to the favour of women and

          strangers."28  Like "strength" it transfers poorly into Usenet

          because personae lack physical form.  Yet it has an analogous

          counterpart:  "form" in terms of Usenet, comes from the

          impression one makes on others, not with one's physique, but with

          one's words.  Even a pseudonym can convey form, as "Spartan"

          brings to mind images of frugality and warriors and "Damsel"

          connotes femininity and distress.  "Form" can extend to actual

          word choice when academic language can make a persona "appear"

          more scholarly, or when language laden with scientific jargon

          might bring to mind images of laboratory coats and measurement

          instruments.  Granted, while these images are not the clear,

          consistent images conveyed by "form" in the external world--in

          fact, they probably vary depending on the perceiver--they do

          serve to add a "face" to a name and a personality to the words.

          It is only natural to want to "fill in the blanks" that Usenet's

          analog for "form" leaves empty.

          Regarding the power of arts, Hobbes writes,






                27Hobbes, 72.


                28Hobbes, 73.



                                           25




                                           26


                Arts of public use, as fortification, making of engines,

            and other instruments of war; because they confer to defence,

            and victory, are power:  and though the true mother of them,

            be science, namely mathematics;  yet, because they are brought

            into the light, by the hand of the artificer, they be

            esteemed, the midwife passing with the vulgar for the mother,

            as his issue.29

          Since Usenet is a non-physical environment, the notion of

          "defence," like that of strength, must be derived from the cycle

          of statement and response.  Having established that "strength" in

          Usenet is one's ability to write a potent statement, then it

          follows that "arts" in Usenet, because they "confer to defence,"

          must be one's ability to write a rebuttal.


          In contrast, the powers of "prudence" and "liberality" are

          transferred to Usenet almost completely.  "Liberality" is

          intended by Hobbes to mean "generosity."  He writes,



                Also riches joined with liberality, is power; because it

            procureth friends, and servants:  without liberality, not so;

            because in this case they defend not; but expose men to envy,

            as a prey.30

          "Liberality" can be combined with things other than riches to

          produce the same effect.  Consider the act of restraining oneself

          from easily humiliating a subordinate in public or the act of

          freely and genuinely offering one's assistance to the

          uninitiated.  These acts of kindness bolster one's liberality.

          Additionally, they are actions easily transferred to written

          form.

          On the subject of prudence, Hobbes writes,



                When the thoughts of a man, that has a design in hand,

            running over a multitude of things, observes how they conduce

            to that design; or what design they may conduce unto; if his

            observations be such as are not easy, or usual, this wit of

            his is called PRUDENCE;  and depends on much experience, and

            memory of the like things, and their consequences

            heretofore.31

          Here Hobbes explains that "prudence" comes from "much experience"

          leading to "unusual observations" or insight.  A person's

          prudence transfers to his or her persona because they share one

          and the same mind and experiences, despite the fact that

          expedience may permit one to "forget" this fact.  Only when one's

          writing ability interferes with one's attempt to communicate




                29Hobbes, 73.


                30Hobbes, 72.


                31Hobbes, 61.




                                           27


          prudently does a persona seem less prudent in Usenet than the

          user does in the external world.


          Unlike the previously discussed powers, where it is clear that

          some have more exact Usenet analogs than others, the transferral

          of "nobility" to Usenet presents difficulty.  Hobbes explains,



                Nobility is power, not in all places, but only in those

            commonwealths, where it has privileges:  for in such

            privileges, consisteth their power.32

          One's privileges come from the recognition by others of one's

          rank or nobility.  Unless one conveyed one's nobility through a

          pseudonym or name such as "Dr. Oakeshott" or by the use of

          revealing information such as "My father, Senator Kennedy says .

          . . ," it is not likely that external world nobility will have

          relevance to Usenet society.  Additionally, in cases where

          external world nobility is transferred, the privileges and

          respect are not as forthcoming as expected.  Perhaps this is

          because persons of nobility, accustomed to the "trappings" of the

          elite, find that without these "trappings" in Usenet, their

          nobility is nothing more than words.  However, nobility does

          exist in Usenet.  Users such as Spafford, the frequently cited

          authority on "netiquette," seem to enjoy much deference when

          "making appearances" in Usenet.  For example, because Spafford is

          famous, other users may be less visibly critical of his

          statements while he is "present."

          "Eloquence," is possibly the most important power in Usenet.

          Hobbes probably included eloquence among the powers because it

          enables one to communicate, not only functionally, but with

          finesse.  Hobbes writes:  "Eloquence is power, because it is

          seeming prudence."33  The skill of writing enables one to have

          "a way with words" or eloquence.  Moreover, in a world where

          words are primary to existence and serve as the sole mode of

          communication and activity, their importance cannot be

          exaggerated.  In _____ ________
                           Emily Postnews, author Brad Templeton reminds

          the uninitiated user that "sloppy spelling in a purely written

          forum sends out the same silent messages that soiled clothing

          would when addressing an audience."34  On the other hand,

          actually wearing soiled clothing while accessing Usenet has

          absolutely no effect on one's persona.  The premium that Usenet

          places on spelling, and writing skills in general, inflates the

          Usenet analog for eloquence beyond its relative worth in the

          external world.





                32Hobbes, 73.


                33Hobbes, 73.


                34Brad Templeton, _____ ________
                                  Emily Postnews, compiled by Gene

          Spafford, 1991, lines 241-245.  See Appendix for complete text.




                                           28


          Hobbes discusses additional powers which rely on or operate in

          conjunction with those already considered.  Among those

          additional powers are "affability" and united power.


          The power of "affability" seems similar to that of "liberality."

          "Liberality" was described earlier with the examples of public

          restraint with subordinates and generosity with the use of one's

          powers.  Strictly speaking, these qualities of graciousness more

          accurately describe the power of "affability."  If one reviews

          Hobbes' definition of "liberality," one will notice that

          "liberality" is power when "joined" with riches.  Clearly, Hobbes

          is concerned with "riches" when he writes of "liberality" because

          "it procureth friends, and servants."  Hobbes believes that

          "liberality" or generosity with one's riches is a power because

          friends and servants contribute to one's defense.

          The external world concept of "riches" does not easily translate

          into a world without physical or material wealth, but the

          development of the analog is possible nonetheless.  In the

          external world, money is used to barter for goods and services.

          In Usenet, goods do not exist.  On the other hand, services are

          abundant:  sharing one's knowledge is a service.  Assisting a new

          user is a service.  These services may be traded in Usenet

          analogously to their trade in the external world.  Therefore, the

          Usenet analog for "riches" is "services."  This conclusion

          returns one to the original observation that "liberality" and

          "affability" appear to share the same definition. With respect to

          Usenet, indeed they do.


          Finally, the power of united power or power "united by consent"

          is described below:



                The greatest of human powers, is that which is compounded

            of the powers of most men, united by consent, in one person,

            natural, or civil, that has the use of all their powers

            depending on his will."35

          It is premature to discuss why persons would want to unite their

          powers in a single person before it has been considered why they

          would want to pursue powers for themselves.  But since Hobbes

          includes this power with the rest, it is important to note that a

          power "which is compounded of the powers of most men" is the

          "greatest of human powers."  While this may be true in the

          external world, the nature of Usenet's written medium may

          subordinate united power to the power of "eloquence," since it is

          "eloquence" which enables users to create the environment where

          unity takes place.








                35Hobbes, 72.






                                 The Pursuit of Powers

          Given the discussion of Hobbes' "powers" and the development of

          their respective analogs in Usenet, it is possible to discuss and

          develop the pursuit of powers in the external world and in

          Usenet.  This will be done by examining the benefits of power,

          the need for continuous participation to retain one's powers, and

          the effect of using one's powers to confront or compete with

          another person or persona.


          With respect to the benefits of power, Hobbes writes,


                [Powers] . . . are the means and instruments to acquire

            more:  as riches, reputation, friends, and the secret working

            of God, which men call good luck.36

          The benefits of power then are riches, reputation, friends, and

          good luck.  One will discover that these benefits are in some

          instances powers themselves, and that the pursuit of power

          appears to be an end in itself.


          Riches are perhaps the most difficult of the benefits of power to

          transfer to Usenet society.  In the external world, riches are

          clear--they are the signs and objects of material wealth, such as

          money and possessions.  Given that Usenet lacks a physical

          environment, an analog for material wealth, money, or possessions

          is nonsensical.  However, it has been established that

          "services," as in sharing one's knowledge, is the analog for

          "riches."

          Reputation is significant in both the external world and Usenet.

          It is the most important benefit of power in Usenet society.

          Hobbes does not provide a simple definition with which one can

          grasp the full meaning of reputation; in fact, he defines

          reputation contextually in the definitions of other powers.

          Consider the following passage:



                Reputation of power, is power; because it draweth with it

            the adherence of those that need protection.  So is reputation

            of love of a man's country, called popularity, for the same

            reason.  Also, what quality soever maketh a man beloved, or

            feared of many; or the reputation of such quality, is power;

            because it is a means to have the assistance, and service of

            many.  Good success is power; because it maketh reputation of

            wisdom, or good fortune; which makes men either fear him; or

            rely on him. . . . Reputation of prudence in the conduct of

            peace or war, is power; because to prudent men, we commit the

            government of ourselves, more willingly than to others.37

          Broadly defined,  reputation is the publicly held estimate of

          one's worth.  With that in mind, Hobbes' definition of reputation




                36Hobbes, 72.


                37Hobbes, 72-73.



                                           32




                                           33


          in the context of other powers make more sense.  This being the

          case, reputation is the publicly held estimate of one's powers.

          For example, one may be an excellent cook known only within the

          private circle of one's friends, but once one establishes a

          reputation outside of that private circle, the estimate of one's

          excellence may be held publicly.  In this case, the power of

          one's prudence in cooking is amplified by one's reputation, and

          Hobbes tells us that in the first line of that passage when he

          says "reputation of power, is power."  It is in this sense of

          power begetting power that the importance of reputation is

          heightened in the external world.  To the extent that reputation

          is the most important power in Usenet, the following discussion

          of the Usenet analog for reputation is critical.


          In Usenet, one's powers, such as strength and eloquence, are

          expressed by participating in the cycle of statements and

          responses.  Only in this way can one's powers be perceived,

          substantiated, measured, and ranked by others.  The resulting

          comparisons made among personae establish the public estimation

          of one's worth.  This reputation-making process of comparison and

          worth is supported with the following two quotations from Hobbes:


                "Virtue generally, in all sorts of subjects, is somewhat

            that is valued for eminence; and consisteth in comparison."38


                "For let a man, as most men do, rate themselves at the

            highest value they can; yet their true value is no more, than

            it is esteemed by others."39

          Indeed, Hobbes makes it clear that reputation serves to set a

          "market price" for one's worth.  He implies that although

          reputation can amplify one's strengths, it can expose one's

          weaknesses to greater scrutiny, thereby devaluating others'

          personal estimate of those strengths.  And with respect to

          Usenet, reputation is the collective memory of the comparisons of

          past cycles of statement and response.


          Hobbes believes that the possession of friends is a benefit of

          power.  The Usenet "public" that forms one's reputation consists

          of many personae, some of which are one's friends.  During the

          cycle of the statement and response, the participants and the

          observers rate and compare the participants' expressions of their

          powers.  This comparison reveals degrees of affinities among

          personae, that is, they may "take sides" on an issue.  These

          affinities are guided by what is described by Hobbes as

          passions,40 which include but are not limited to appetite,





                38Hobbes, 59.


                39Hobbes, 73.


                40Hobbes, 47.




                                           34


          desire, love, aversion, hate, joy, and grief.41  Those personae

          whose passions move them together out of common affinity become

          friends, supporters, and allies.  Those whose passions

          disassociate them may become enemies.  A persona's friends enable

          it to establish and build its reputation, thereby increasing its

          power, whereas its enemies seek to discredit it, thereby reducing

          its power.  There is no inherent quality such as "good" or "evil"

          that distinguishes one's friends from one's enemies; what is

          knowable is only that the former seek to support and increase

          one's power, and the latter seek its attenuation.


           The benefit of power known as "luck" describes one's ability to

          "know the secret working of God."  Certainly Hobbes does not mean

          direct knowledge of God, but he does want to acknowledge the

          power of those who tend to draw "stronger hands" than others.

          The most important analog for luck in Usenet is one's ability to

          draw friends.  While it is true that one's friends come from

          those who observe one's actions, luck guides one to act

          fortuitously in places likely to attract many and the most

          reliable of them.

          In order to acquire the benefits of power, it is necessary to

          continuously participate in the cycle of statement and response.

          Although reputation is a benefit of power and a power, because it

          amplifies the other powers, the duration of that effect becomes

          important.  If one's reputation is held by the public in

          collective memory, it follows that one's reputation is

          recalculated after each participation, with the readjusted

          reputation replacing the older reputation in the collective

          memory.  Thus one's reputation lasts until it is forgotten.  As

          one's reputation fades from memory, so fades one's power.

          However, to fade completely violates the condition of existence

          for continuous participation; therefore, to avoid the fading of

          one's power and the cessation of existence, one must continuously

          participate in the cycle of statement and response.


          To summarize, the objects or benefits of power are riches,

          reputation, friends, and luck.  Of these benefits, reputation is

          the most important in Usenet because it is a benefit of power and

          a power in itself.  It enables one to increase one's power by

          amplifying beyond the private circle into the public arena.  By

          subjecting one's powers to perception, substantialization,

          comparison, and rating, reputation is created by participating in

          the cycle of statement and response.  Reputation sets the "fair

          market" value for one's worth which may be higher or lower than

          one's own estimation.  Reputation is stored in the collective

          memory of past participation in the cycle of statement and

          response.  And finally, the duration of one's reputation depends

          upon one's continuous participation in the cycle of statement and

          response.





                41Hobbes, 50.






                                         Death

          Where previously, the definition of power, its benefits and their

          Usenet analogs have been discussed, it is possible to explore in

          terms of Usenet, the pursuit of power, the notion of "death," and

          the competition for powers.


          The possession of certain benefits of power, such as reputation,

          is power in itself; however, possession of power alone seems not

          to be enough.  In revisiting the following passage on power, it

          is important to focus on Hobbes' use of "more:"


                [Powers] . . . are the means and instruments to acquire

            more:  as riches, reputation, friends, and the secret working

            of God, which men call good luck.42

            Hobbes does not say, for example, that powers are the means to

          acquire riches, reputation, friends and good luck.  He says that

          powers are the means to acquire "more."  This suggests that

          Hobbes believes that the simple acquisition of powers is not

          enough.  In fact, it is clear from the following passage that

          there is no limit as to how much can be acquired:



                And the cause of this, is not always that a man hopes for

            more intensive delight, than he has already attained to; or

            that he cannot be content with a moderate power:  but because

            he cannot assure the power and means to live well, which he

            hath present, without the acquisition of more.43

          As can be seen, the acquisition of "more" assures one's present

          power and "means to live well."  This implies an active life of

          acquisition, not a leisurely life where one waits for power to

          come to him or her.  Hobbes is saying that if one wants the

          assurance of one's "present means to live well," one must acquire

          "more."  Hobbes is very clear on this point when he uses the word

          "restless" in the following passage.  Note that "restless" should

          not be interpreted  as "fidgety," but rather, more literally as

          "without rest":


                So that in the first place, I put for a general

            inclination of all mankind, a perpetual and restless desire of

            power after power, that ceaseth only in death.44

          This indictment of "mankind" clears the way for a discussion of

          "death."  According to Hobbes, death in the external world is the

          cessation of all movement, for men consist of a complex

          combination of motions ranging from one's limbs to one's






                42Hobbes, 72.


                43Hobbes, 80.


                44Hobbes, 80.



                                           37




                                           38


          dreams.45  These motions, "begun in generation, and continued

          without interruption through their whole life"46 distinguish the

          living from the not.


          The Usenet analog for life is also derived from motions, the

          motion of the cycle of statement and response, and it is

          predicated upon the satisfaction of the three conditions for a

          Usenet persona's existence:  enough utility to assure the

          continued association between the user and the persona, the

          visible demonstration of one's presence via a persona, and

          continuous participation in the cycle of statement and response.

          Without the satisfaction of these conditions, a persona cannot

          exist.  It is clear from the conditions that utility and

          participation are essential:  Usenet must remain useful to the

          user and the user must continuously assert the existence of his

          or her persona by participating in the cycle of statement and

          response.

          The effect of participation in this cycle is the creation and

          development of one's reputation.  Those personae whose

          reputations are highly valued attract a sufficient number of

          responses with which to perpetuate additional cycles for

          statement and response.  Those personae with poorly valued

          reputations may at first generate an intense cycle based on

          criticism of another and defense, but often come to be ignored

          and forced to face exclusion, obscurity, and thereby "death."

          For example,  well-regarded personae only need to participate

          occasionally to insure that they are not forgotten, because the

          resultant cycle of statement and response will generate enough

          interest to maintain their reputations, and thereby their

          existence.  It is also possible that little known personae may

          establish temporary notoriety for themselves by making outrageous

          statements before returning to obscurity after their cycle has

          run its course.


          By far, the great majority of personae enjoy neither fame nor

          ignominy, for their participation merely consists of "skirmishes"

          and banter.  To illustrate this case, it is common for one to

          state an opinion, draw criticism, and rebut it.  The participants

          in this short cycle are then compared, rated, and their

          respective reputations adjusted in the collective memory.  But

          consider the case where one is subjected to an undue amount of

          criticism.  If the "assault" is without merit, as in the second

          illustration, one may choose to ignore it; but if the criticism

          is based on truth, one may feel compelled to defend his or her

          reputation.  Hobbes explains this compulsion as a "right" when he

          says,


                THE RIGHT OF NATURE, which writers commonly call ___
                                                                 jus




                45Hobbes, 23-27.


                46Hobbes, 47.




                                           39


            ________
            naturale, is the liberty each man hath, to use his own power,

            as he will himself, for the preservation of his own nature;

            that is to say, of his own life; and consequently, of doing

            any thing, which in his own judgment, and reason, he shall

            conceive to be the aptest means thereunto.47

          As it has been shown, reputation is the "tote board" of a

          persona's existence within Usenet; therefore, to defend one's

          reputation is to exercise one's natural right to self-

          preservation in Usenet.  But even relatively minor "skirmishes"

          can lead to larger "battles," because the drive to acquire "more"

          can accelerate the cycle of statement and response into a

          reputation-making machine.    Consider the effect of the

          "perpetual and restless desire of power after power" and the

          lengths that Hobbes believes a person will go to assure the

          acquisition of "more."  In Usenet, the analog for an attack

          designed for quick reputational gain is called a "flame."

          Perhaps named for their inflammatory nature, "flames" tend to be

          ad hominem, argumentative, and often have little to do with the

          original discussions in which they develop.  The extremely

          personal nature of "flames" often draws one to respond

          reflexively with a statement even more insulting or offensive

          than the original.  Again, the motivation to participate in such

          an exchange is to publicly defend one's reputation.  A cycle

          containing ad hominem exchanges can gain momentum very quickly,

          attracting outside attention to its participants.  As the number

          of observers increases, the reputational stakes of the

          participants increase.  This has the effect of luring some of the

          observers from the "sidelines" into the cycle as well, causing

          the spread of the"war."  Sometimes compared to "storms," because

          they appear without warning, wreak havoc, and subside just as

          unpredictably, "flame wars" can start over spelling, grammar,

          semantics, or any seemingly trivial issue.


          Since "flame wars" can dominate or otherwise interfere with the

          discussion of non-participants, the "wars" tend to diminish the

          utility of Usenet to those non-participants.  Since utility is

          among the conditions of existence within Usenet, if enough non-

          participants feel the utility of their participation in Usenet is

          substantially threatened by a "flame war," the warring

          participants have nothing to gain reputationally and much to

          lose.  In fact, once a "flame war" loses its audience, the

          participants not only lose those who would judge and compare

          their actions, but more importantly, a war offensive, annoying,

          or useless enough to drive away its observers will probably cause

          a net loss to the reputations of its participants.

          Although "flame wars" are generally discouraged because they are

          so disruptive, they persist, and are commonly found in newsgroups

          oriented toward social issues and controversy.  However, the

          relatively sedate technical discussion newsgroups have their

          share.  The notoriously disruptive, and futile, cycle of "Macs




                47Hobbes, 103.




                                           40


          are better than PCs" is a recurring "flame war" which many users

          try to extinguish as quickly as it begins, by refusing to

          participate.  It should be noted that a special newsgroup,

          "alt.flame," exists for the specific purpose of being a place

          where one can participate in a "flame war" without being

          disruptive to the discussions in the rest of the newsgroups, a

          sort of "O.K. Corral."  It is common to see someone write, "Let's

          take this discussion to alt.flame."


          The following passage from _________
                                     Leviathan may shed light on why

          "flaming" and contention in general occurs:


                ____ __ __________ ____ ___________
                Love of contention from competition.  Competition of

            riches, honour, command, or other power, inclineth to

            contention, enmity, and war:  because the way of one

            competitor, to the attaining of his desire, is to kill,

            subdue, supplant, or repel the other.48

          In the preceding passage, Hobbes suggests that persons engage in

          lethal competition in order to acquire powers and their benefits.

          In terms of Usenet, "flaming" allows them to increase their

          reputations at the expense of others.


          In summary, it is clear that personae must restlessly participate

          in the cycle of statement and response, which is primary to their

          existence within Usenet and which allows them to acquire more

          powers, as in reputation.  It is also understood that such

          continuous participation, especially that of "flaming," is

          contentious and that one's reputation is subject to damage.  The

          question remains, how contentious can the Usenet environment for

          participation become, before the conditions to maintain the

          existence of one's persona become so difficult to meet that one

          is driven to surrender his or her powers to a single authority?






















                48Hobbes, 81.






                                  Living in Moderation

          This section includes a discussion of an actual Usenet example of

          the cycle of statement and response, the alternatives to the

          outright surrender of one's powers, and the submission to

          moderation.  The following series of articles are messages from a

          Usenet newsgroup oriented towards the discussion of evil.  Topics

          in the newsgroup drift between "tales from the dark side"49 to

          the plotting of murder.  This example is the beginning portion of

          a cycle of statement and response involving five personae

          discussing the fate of one of their teaching assistants and the

          moral and legal implications of the discussion itself.  The

          personae are "Paul" from the University of Maryland at College

          Park, a user at Youngstown State University,  a user at Malaspina

          College,"Jon" from Netcom Online Communications Services, and a

          user at the University of Maine.  All articles are included in

          their entirety without editing to preserve the "realism" of the

          discussion.  Paul writes,



                With one single, simple, trivial, insignificant event, my

            life has been thrown into utter chaos.

                I'm graduating this semester, or was. My TA insists I did

            not turn in a significant amount of assignments for her class.

            This is incorrect, and I have no way of proving it to her. As

            such, see [___
                       sic] is giving me an F. Despite the large amount of

            work I did, and my good test grades, she will not even

            consider a D.  Mind you this is an insignificant little one

            credit Physical Education course. I explained that I had no

            money to take a course during the summer ($300), was leaving

            in the summer for Ca., was on my way to grad school, and that

            this little incident was really fucking up my life. She

            proceeded to give me, while power-tripping and in an

            authoritative manner, the 'real world and responsibility'

            speech. As though this fucking class and this little blonde

            puke were representative of the real world. Needless to say, I

            am irate.

                What I would like from you are suggestions to make her

            life a living hell. I considered killing her, or driving by

            her house with an uzi, but I don't want to go to jail, at

            least not over her. Any suggestions from the subtle to

            extravagant will be considered. Nothing she could easily trace

            me to.

                I anxiously await your response.....

          Paul is apparently disappointed with his poor grade, but it is

          never clear whether he actually intends to act on the advice he

          solicits or whether he is simply attempting to gain sympathy from

          others by sharing his plight.  His first response arrives from

          the University of Maryland user.  It will be recalled that this

          response satisfies Paul's conditions for existence--it proves




                49John Gilmore, ___________ _________ ____________ ____ _
                                Alternative Newsgroup Hierarchies, Part I,

          edited by Gene Spafford, 1992, line 147.



                                           43




                                           44


          that he is not isolated and alone:



                Heh... I'm starting to like this gal.  She must really

            like watching you squirm.  Heh.  You could post her name,

            address, etc so every horny geek can give her a call.  A

            slight description, so they can pretend that they know her

            well... scare the hell out of her.  My guess, though, is that

            she'd like it too much.  Ah well...

                Don't you see it??????  Come on, man... it *IS*

            representative of the whole world.  You are getting dicked

            over in a way you never ever expected!!  Some small

            "insignifigant" person is ruining your life. You better learn

            fast... or you are not going to fare well at all.

                Why are you so worried about her misery being traced to

            you?  She doesn't mind that *you* know how very screwed you

            are.  *SHE* doesn't mind telling you *to your face* exactly

            how she is going to do it.  Illegal is bad...yep.  Proof  is

            tricky... but avoidable.  I suggest printing this out,

            (assuming you save it), and deleting it immediately.

                Okay... right now I'm more on her side than yours... but

            since you asked....

                Two words:  Sexual Harrasment.

                Just as difficult to prove/disprove as the homework issue.

            Just as likely to ruin her life.  I mean... how would you like

            to be the girl who was *so* desperate to find a date, she was

            blackmailing her student?  Heh.

                No offence to you... but this works even better if you are

            unattractive.

                :)

                Actually... this may even be what she is trying to do...

            how do *I* know?  You said you handed the HW in, right?

            Okay... so she "lost" it.  Maybe she wants something in return

            for "finding" the homework.  Start telling all your friends

            how she keeps coming on to you, and got really pissed when you

            turned her down... and that she hinted that she would ruin

            your grade if you didn't play along.  About this time, you

            want to start recording conversations with this babe... keep

            saying that you are *desperate* to do well in this class...

            you'd do *anything* to make up for it... what could you do?

            You, obviously, may want to edit out these portions of the

            conversation.  :)  See what responce you get.  Ask her out.

            Bring sex into the conversation.  Go back, now, and mention to

            your friends that she *really is* going to ruin your grade

            since you didn't play along.  Get really upset.  Become

            hysterical... say that you don't really care and that you'll

            go ahead and do what she wants... you just want to graduate.

            Call her with someone in the room.  Assuming that she didn't

            want you to trade affection for your grade... I'n sitll not

            ruling this out as a possibility... she will most probably

            turn you down quite loudly.  Your friend may even overhear

            this if she is *really* loud.  As some of your friends to help

            decide what you should do.  Eventually, this will come to

            someone's attention... etc.  If things don't look good, keep




                                           45


            telling the school authorities that you are going to take the

            matter to a more public setting if they don't fix things with

            your grade.  This usually makes them jump.  Even if she

            doesn't get in trouble... you should most certainly get your

            grade.  Depending on how well you play it... you might even

            get to make $$ writing about it... touring... etc.  Don't

            make up dates and times that you cannot account for her

            location.  If you say she was harassing you and she was with

            30 people playing nude twister... your story is shot to hell.

            Write stuff down, and memorize it.

                Ok.  You have the tools... it all depends on how well you

            play it

                ....Send me a copy of your book.

                Take Care.

          Note the tone of the Maryland user's response.  At first he or

          she mocks Paul by "siding" with the teaching assistant, but

          eventually the user describes a plan of action.  Also note that

          the user has to resort to non-standard punctuation,

          capitalization, and asterisks to convey emphasis since the

          traditional non-verbal methods of controlling voice pitch and

          volume are unavailable.  There is even the presence of emoticons

          to indicate that the user is smiling at those points in the

          response.  But again, it is still uncertain whether this user

          expects his or her advice to be taken seriously or whether the

          exchange is merely an exercise to help Paul vent his frustration.


          The next response to Paul's statement comes from Youngstown State

          University.  Generally, only two personae are needed to

          substantiate one another's existences, but in this case, this

          third user from Youngstown, rather  than Paul, serves to

          substantiate the existence of the Maryland user:


                If by some chance, you can get her address & soc. security

            number, I have heard that a really effective harassment goes

            like this:

                 Call the I.R.S.

                Say, "I'm (name of TA ), and I think I made a mistake on

            my 1040,       could you check your records?"

                Supply address & social, if asked for them.

                With luck, she gets audited.

                Probably kinder to just shoot her.

          This response clearly contains more humor than the previous two,

          provided that one agrees that death is preferable to a tax audit,

          but it is still difficult to tell whether or not this is a

          harmless, but "dark" discussion or a conspiracy to commit a

          felony.  The fourth participant, a user from Malaspina College is

          apparently not amused when he or she writes,



                Please consider the implications of this conversation.

            This is an extrordinarily offensive and demeaning exchange

            with possible legal implications. Your conversations

            contribute to the oppression of women and completely undermine

            the human values you profess to acquire at college. Remember




                                           46


            that your commentari}iesare read by many people throughout the

            world and reflect not only on you, but on the institutions you

            represent.  All of us in the college and university community

            have a strong personal responsibility to ensure that our

            colleagues--women in particular--are protected from abusive,

            offensive, demeaning, belittling, harrassing, and threatening

            language. There is NO EXCUSE for this exchange in any

            conference.  Fourteen women in Montreal were massacrd 2 years

            ago by a man whose ideas reflected the same crap you are

            exchanging. I am profoundly disturbed and ashamed that people

            who profess intellectual skills will engage in this kind of

            hate exchange. I am new to conference activity but fully

            intend to do whatever is necessary to protect my colleagues

            from thissort of abuse.

          This user is risking confrontation by "scolding" and attempting

          to shame the other users for their actions.  Despite the name of

          the current newsgroup, alt.evil, this user is convinced that this

          discussion has no place in "any conference." In the terms of this

          study, this user is "attacking" the reputations of the other

          three.  The first user to respond to the "attack" is Jon from

          Netcom:



                Who died and appointed you net.cop?

                What a joke!  You could easily argue that this TA's

            actions contribute to the oppression of men.  Further, as to

            the "values" one acquires at college, this is bullshit.  The

            only "values" most people learn at college is what case of

            beer is cheapest, or how best to make money.

                Pahleeezee.  I think you give it more importance than it

            has.  Especially in this newsgroup, which exists to promote

            and discuss evil.  Not social responsibility.  There are news

            groups for that purpose.  Just look.  You would probably be

            happier there.  Sorry, but this group is not going to mutate

            into alt.fuzzy.warm.feeling.inside because it bothers you.

                Don't you get it?  *This is alt.evil*.  It is a newsgroup,

            not a conference.  It is not about social responsibility.

                Good luck, idiot.  Have you ever heard of *Freedom of

            Speech?*  You are clearly living in a fantasy world, and

            appear to believe you somehow are powerful.  Ha Ha Ha.  What a

            shit head you are.

          Note that Jon's first sentence, "Who died and appointed you

          net.cop?" is extremely sarcastic and rhetorical.  Its intent is

          not to elicit a truthful response, but to embarass the Malaspina

          College user for assuming an authoritative role.  Jon then

          proceeds to return the "attack" by questioning the validity of

          the values acquired at college.  This tactic actually pits Jon's

          "prudence" in college experience against that of the user from

          Malaspina, and may actually have more of a bearing on the

          calculation of his reputation than everything else that he says.

          After this point, his response quickly becomes an ad hominem

          attack, mocking the Malaspina user and calling him names.  This

          message is an example of a "flame," and as such, it is

          interesting to observe that aside from the first sentence, it




                                           47


          does not specifically have anything to do with Paul's original

          statement.


          The fifth and final user in this example is from the University

          of Maine:


                No moralizing on who's right or wrong, we are talking

            about evil not ethics.  sugar in the gas tank should

            crystalize in the fuel lines, or use sand and ruin the engine,

            figure a way to give her lice (there's a# of varieties esp.

            pubic) or plant drugs on her etc. If you or any of your I.M.F.

            team are captured thesecretary will disavow any knowledge of

            your actions. -HAVE FUN

          Again, note the humorous tone.  Given that all of the responses

          had elements of humor, it is entirely possible that the Malaspina

          College user violated an alt.evil norm by dispelling their

          fantasy plot.  The Malaspina user also may not have "picked up"

          on the humor given the interference of the medium and the

          inadequacies of emoticons and other devices to convey non-verbal

          information.  Of particular interest in this last message is the

          opening sentence, ". . . we are talking about evil not ethics."

          By stating the purpose of the cycle and the newsgroup, this user

          effectively pits his "prudence" in alt.evil interaction against

          the previous two users'; and by immediately returning to the

          topic at hand with the remainder of his message, this user is

          attempting to extinguish the disruptive "flames."


          It will be recalled that these articles are only the first five

          in a cycle of statement and response.  It should also be noted

          that the number of observers of this cycle, if any, is unknown,

          but that this figure is estimated to be five times the number of

          participants.50  At the conclusion of each statement or response,

          the participants and the observers privately estimate the worth

          of each participant:  the sum of that worth, held in the

          collective memory, is their reputation.

          Given this detailed discussion of the cycle of statement and

          response, it is useful to recall the remaining question:  how

          contentious can the Usenet environment for participation become,

          before the conditions to maintain the existence of one's persona

          become so difficult to meet, that one is driven to surrender his

          powers to a single authority?  The following discussion prepares

          one to answer by first considering the alternatives to the

          outright surrender of one's powers.  For this purpose the

          following passage from _________
                                 Leviathan is useful:



                _____ _________ ____ ____ __ _____  ____ ____ __ ______ __
                Civil obedience from love of ease.  From fear of death, or

            ______
            wounds.  Desire of ease, and sensual delight, disposeth men to




                50Brian, Reid, ______ __________ _______
                               Usenet Readership Summary (Palo Alto,

          California:  Network Measurement Project at the DEC Western

          Research Laboratory, March 1992), lines 22-28.  See Appendix.




                                           48


            obey a common power:  because by such desires, a man doth

            abandon the protection that might be hoped for from his own

            industry, and labour.  Fear of death, and wounds, disposeth to

            the same; and for the same reason.51

          From this passage it is clear that Hobbes recognizes that the

          rest-less "pursuit of power after power" takes its toll on

          persons who are as inclined to ease as they are to contention.

          The balance between these opposing desires appears to be the

          "fear of death, and wounds."  It follows then, that it is the

          fear of death and wounds that persuades persons to abandon their

          pursuit of powers and surrender themselves to the power of

          another.  This notion is apparent in Usenet, but it appears that

          there are other alternatives short of complete surrender.  As

          discussed, one may ignore a user who interferes with the utility

          of one's access to Usenet.  Additionally, to solve disputes and

          facilitate the interaction, one may voluntarily adhere to the

          general principles described as "netiquette" as outlined by

          Spafford.  Next to be discussed is an actual example from Usenet

          which invokes Spafford's guidelines and the practice of using

          "kill files" to systematically ignore disruptive users.


          It will be recalled that Gene Spafford compiles and distributes a

          series of guidelines designed to facilitate the smooth

          interaction between Usenet participants, but since there is no

          Usenet government to enforce them, the guidelines remain

          informal.  Nonetheless, many individuals voluntarily abide by

          them and insist that others do the same.  In the following

          example, "David" attempts to persuade "Bill" to use some self-

          restraint and conform to Spafford's guidelines:


                Why don't you respond in private mail, and ask the person

            you are sending to to summarize. This prevents clutter, which

            this posting is as well. If everyone posted a response to

            every PC related hardware question they saw, this newsgroup

            would quickly become too bulky to work with.

          In this article, David is responding to an earlier message of

          Bill's.  Apparently, Bill had previously responded publicly to

          someone else's question.  In all likelihood, the question was a

          common one and Bill's response was a common answer.  Tired of

          seeing both "frequently asked questions" and their responses,

          David asks Bill in this article to observe the Usenet "courtesy"

          of responding to such questions in private.  It should be noted

          that David is relying on the following section from Spafford's

          guidelines:



                One of the biggest problems we have on the network is that

            when someone asks a question, many people send out identical

            answers.  When this happens, dozens of identical answers pour

            through the net.  Mail your answer to the person and suggest




                51Hobbes, 81.




                                           49


            that they summarize to the network.  This way the net will

            only see a single copy of the answers, no matter how many

            people answer the question.52

          In Bill's response to David, "IMHO" is the common abbreviation

          for "in my humble opinion":



                My understanding is that these groups are for the

            unfettered exchange of  information. IMHO, too much band-width

            is used attempting to restrict use of the NET. I, for one,

            like to read like the answers. It's a lot easier for everyone

            than E-mailing the posters and asking them to share

            individually. Lot of recipients of NET-knowledge do NOT take

            the extra effort to summarize. It's easy enough to ignore

            threads which have nothing to offer. We're a divers bunch..

            one person's "clutter" may be another's insight. There are

            first-timer joining these groups every day. Remember our

            roots. I have no problem with FAQ being FAQs. (Frequently

            Asked Questions being Frequently Answered Questions)

          Obviously Bill opts to ignore Spafford's guidelines and runs the

          risk of being ignored by those he annoys with his "clutter."

          Concerned that already too much time has been spent discussing

          the issue, David replies,



                I suggest this is way off the topic of comp.sys.ibm.pc, if

            we really have to continue this discussion let's finish it in

            email.


          David could be right.  "comp.sys.ibm.pc" is a technical newsgroup

          for the discussion of IBM personal computers.  Participants

          receive hundreds of messages daily and very few have the patience

          for non-technical discussions in the newsgroup such as Bill's and

          David's.  It is very likely that both Bill and David are already

          being ignored.


          Sometimes the situation arises where a user will offend or annoy

          another so severely that simply ignoring the user runs the risk

          of  encountering him and being offended and annoyed at a later

          date.  To remedy this situation, Usenet users have at their

          disposal a utility known as a "kill file."  Basically an

          electronic filter, a "kill file" allows a user to screen out or

          block the message of another user.  A "kill file" can contain the

          names of several users and sites, as well as offensive words,

          effectively preventing the display of potentially unwanted

          messages.  Note that a "kill file" does not actually destroy

          Usenet articles, but merely shields the owner of the file from

          their existence.  "Kill files" are an extreme method of self-

          censoring because they take the power of decision away from the

          "kill file" owner.  Many users still prefer to run the risk of




                52Von Rospach, lines 176-181.




                                           50


          re-encountering annoyances than to subjugate themselves to an

          automatic censor; however, the following example of gratuitous

          "flaming" makes the originator of the statement a prime candidate

          for countless "kill files" within reading range of the message:



                WHAT?!?!?! You deleted the FUCKING expletives you PUSSY-

            STARVED DICKSUCKING BASTARD? What the FUCK kind of newsgroup

            do you think this is?

                This aint FUCKING rec.tv.family-channel.

                Leave the FUCKING expletives in, it annoys the SHIT out of

            me when ASSHOLES [do that] . . .

          However, the threat of "kill files" do not necessarily prevent or

          curb disruptive behavior.  Mark from Denver illustrates this:


                So put me in your kill-file, dac.  Simple solution.  What

            makes you think I give a hoot about *what* you think of my

            writing?  I post for my own enjoyment.

                Not yours.  Live with it.

          Of course, Mark should probably think twice about such a

          challenge if his name begins to appear in too many "kill files."


           As the amount of clutter or "noise"53 increases, more and more

          users voluntarily submit to "moderation."  A moderated newsgroup

          prevents unapproved statements from being distributed.  All

          statements are submitted to a moderator who screens the messages

          for content, posts the appropriate ones, and rejects the ones he

          feels are unfit for the discussion.  In the case of a moderated

          newsgroup, the moderator has tremendous control of one's network

          existence.

          The price or reward for such restraint is the decrease of noise

          and the increase of relevant information.  Moderated newsgroups

          are not without problems and as David reminds us, "one person's

          'clutter' may be another's insight."  Additionally, the degree of

          censorship varies from moderator to moderator.  In the case of

          "comp.dcom.telecom," a moderated newsgroup dedicated to

          telecommunications issues, many individuals are unable to

          tolerate its highly-opinionated moderator, Patrick Townson.  As a

          result, they have created an alternative or unrestricted

          newsgroup called "alt.dcom.telecom."  To this day Pat's group

          remains very popular while the much smaller alternative group is

          commonly cluttered with articles critical of  him.  This offers

          little choice for users who desire the volume of messages in the

          moderated group, but deplore Pat's degree of restraint.


          To summarize this section of the discussion, the maintenance of

          the existence of a persona requires users to continuously

          participate in the cycle of statement and response.  As a result



                53The commonly used term for "clutter,"  which comes from

          the technical phrase "signal-to-noise ratio," which basically

          means that the less interference there is, the cleaner the signal

          will be.




                                           51


          of this participation, the users both establish or maintain their

          persona's reputation and benefits from the utility of Usenet.  As

          a matter of participation, the users may receive challenges to

          their statements or "actions" and may also challenge the

          statements or "actions" of others.  In rare cases, they may

          participate in or observe a cycle that generates "flames" or

          escalates into a "flame war."  This sort of message and other

          messages they find personally uninteresting, offensive, or

          annoying decreases the utility of Usenet for them and threatens

          the existence of their persona.  To protect themselves from this

          threat, they have the alternatives of ignoring the offensive

          articles, requesting that offensive users conform to

          "netiquette," "killing" the offensive users by placing them in

          their "kill file," or participating in a moderated newsgroup.






                               Looking for the Leviathan

          It has been established that in a contentious environment,

          offensive or uninteresting articles may diminish Usenet's utility

          to its users.  As a result, users may opt to restrict their

          participation to the moderation of another user.  In terms of

          Usenet, too many attacks and disruptive actions by other personae

          threaten their existence to the point that they may consider

          surrendering themselves to the control of another persona.  It is

          on this level, the level of the personae, that Hobbes' _________
                                                                 Leviathan

          operates.  The following discussion describes and analyzes a

          random survey of the participation within Usenet and the degree

          to which the participation is moderated.


          If one were to search for a Leviathan in Usenet, one would

          obviously begin with the moderated newsgroups because the

          discussions therein consist of articles previously approved by a

          "common power."  However, there are other less obvious

          indications of restraint such as conformity to or compliance with

          "netiquette" as a general guide to behavior; and conformity to or

          compliance with Spafford's more specific set of guidelines.

          A survey was conducted on a randomly selected sample of two

          hundred Usenet articles.  The articles were selected from a list

          of 3,971 existing newsgroups with each group having equal chances

          for selection.  A computer program was written to randomly select

          a newsgroup from the list from which it randomly selected an

          article.  The selected article became part of the sample

          population.  If the newsgroup did not contain any articles, the

          computer program selected another newsgroup until the sample

          population was equal to two hundred.


          After the sample population was determined, each article was

          examined for signs or indication of a Leviathan.  These

          indicators were operationalized as "Leviathan Factors" with each

          increase in factor representing a greater sign or indication of

          coercion.  The "Leviathan Factors" (LF) are described as follows:



          Leviathan Factor       Description


















                                           55




                                           56


                    0         No signs of coercion to conform or

                              self-restraint.


                    1         Unmindful conformity to/compliance

                              with "netiquette" such as the use of

                              "emoticons" or other characters to

                              convey physical actions.

                    2         Reference to "netiquette" as means of

                              conformity/compliance.


                    3         Reference to Spafford's guidelines.

                              More specific than LF 2.


                    4         Article is from a moderated newsgroup

                              or is otherwise censored.


                      Table 1.  The operationalization of Leviathan

          The factors are at the ordinal level of measurement such that LF

          4 means "more Leviathan" than LF 3, but it does not mean than LF

          2 represents twice as much as LF 1.  Given the operationalization

          of Leviathan as "Leviathan Factors," it was possible to read each

          article and ask:  Does this article contain any signs of coercion

          to obey a common power?  If an article contained more than one

          indicator, then it was coded with the greatest LF for which it

          satisfied the requirements.  The findings help one to conclude

          "how much" of a Leviathan is present in Usenet.  A survey of the

          sample population produced the following figures shown in Table

          2,



                           LF          Frequency     Percentage


                            0             162           81.0


                            1             14             7.0

                            2              3             1.5


                            3              2             1.0

                            4             19             9.5


                          Total           200           100.0



              Table 2.  Articles containing progressive signs of Leviathan

          Based on the data, 9.5% of the articles surveyed showed the

          greatest amount of Leviathan (LF 4), and 81% showed no signs of

          Leviathan (LF 0).  It was expected that there would be

          progressively fewer articles with each increasing factor of

          Leviathan, but the unusual distribution for LF 1-3 suggests

          possible operationalization problems.  In retrospect, it was not

          correct to identify "emoticons" as a form of Leviathan because

          they are signs of compensation for the medium of written

          communication and not necessarily signs of compliance to or

          conformity with "netiquette."  The unexpectedly high number of




                                           57


          observations coded LF 1 bear this out.  Additionally, the sample

          size did not support a five-way breakdown with any degree of

          accuracy between the extremes of LF 0 and LF 4.  This resulted in

          a negligible difference between the number of observations coded

          LF 2 and LF 3 from which a meaningful conclusion can be drawn.

          In order to account for operationalization and sample size

          problems, the data can be presented in Table 3 in a way to

          emphasize the measured extremes.


                   LF               Frequency          Percentage

                   0-1                 176                 88


                   2-4                 24                  12


                  Total                200                 100


                     Table 3.  Articles showing signs of a Leviathan

          Presented in this way, the articles are divided into two

          consolidated categories.  The first category, LF 0-1, consists of

          articles with no measured signs of a Leviathan, including

          "emoticons" which are indicators of compensation and not

          coercion.  The second category, LF 2-4, consists of articles

          which do contain signs of a Leviathan.  This category describes

          the range of articles including those in which someone asks

          another to observe "netiquette" to articles submitted under

          moderation.  Based on the findings, some measure of Leviathan is

          present in 12% of the articles surveyed.






                                       Conclusion

          The conclusion consists of a summary of the major points, a

          discussion of the quantitative study, and a consideration of the

          avenues for research.


          This study has sought to establish seven major points.  First,

          Usenet is a distinct society because the exclusively, written

          medium keeps much of the three-dimensional, external world out.

          Second, personae are created by the interaction of Usenet users.

          A user always interacts with the personae of other users because

          it is impossible to interact ___________________
                                       three-dimensionally via a written

          medium.  This always being the case, expediency allows one to

          "forget" that interaction is via personae.  Third, Hobbes helps

          prove that personae are persons within Usenet.  Fourth, like

          persons, personae have powers, although they may be different.

          Fifth, users participate in Usenet to maximize its utility, thus

          persona existence is tied to user participation and utility.

          Sixth, participation may become contentious or uninteresting,

          thereby decreasing Usenet's utility and threatening personae

          existence; however, users can increasingly subject their

          participation to restraint.  Seventh, to maximize Usenet's

          utility and to maintain personae existence, some users may decide

          to allow another person to control or moderate the extent of

          their participation, thus controlling or moderating the existence

          of their personae.

          The following is a review of each point:


          1.   ______ __ _ ________ _______ _______ ___ ____________
               Usenet is a distinct society because the exclusively,

          _______ ______ _____ ____ __ ___ __________________ ________
          written medium keeps much of the three-dimensional, external

          _____ ____
          world out.  With the help of Elizabeth Reid's work, it has been

          established that the written medium of Usenet "filters" or

          interferes with communication among users.  The effect of this

          interference is the "deprivation of the subtleties" of verbal and

          non-verbal communication.  Reid's research suggests that such

          subtleties reinforce the standards of behavior in the external

          world.  Without that reinforcement, Usenet users have had to

          develop "alternate or parallel" standards of behavior such as

          "netiquette" and Gene Spafford's guidelines.  This compensation

          for the shortcomings of the medium plus the development of new

          written language subtleties known as "emoticons" has enabled

          Usenet to become a society distinct from that of the external

          world.

          2.   ________ ___ _______ __ ___ ___________ __ ______ ______  _
               Personae are created by the interaction of Usenet users.  A

          ____ ______ _________ ____ ___ ________ __ _____ _____ _______ __
          user always interacts with the personae of other users because it

          __ __________ __ ________ ___________________ ___ _ _______
          is impossible to interact three-dimensionally via a written

          _______  ____ ______ _____ ___ _____ __________ ______ ___ __
          medium.  This always being the case, expediency allows one to

          ________ ____ ___________ __ ___ _________
          "forget" that interaction is via personae.  This is perhaps the

          most difficult point to establish because it relies upon the

          notion of "persona."  Furthermore, it is the most critical point,

          because it is on the level of the personae, not the users, upon

          which Hobbes' _________
                        Leviathan operates.


          To review the notion of "persona," one must understand the

          perspective of the user.  From the user's standpoint, he or she


                                           59




                                           60


          accesses Usenet because it satisfies some personal need that is,

          it has utility.  During the course of accessing, the user may

          decide that writing an article, rather than exclusively reading,

          will increase Usenet's utility.  When the user drafts the article

          it is probable that he or she has one or more recipient users in

          mind.  It is here that the notion of "persona" arises.  If the

          user thought about what information was used to create the

          "image" of the recipient in mind, the user would discover that

          surprisingly little is actually known.  Yet, gender, stature,

          appearance, intelligence, and other characteristics are somehow

          attributed, sight unseen, to the recipient user.  This is only

          natural for the user to want to "fill in the blanks" which the

          written medium leaves open.  Moreover, if the user realized that

          any information garnered about the recipient user was probably

          unverified externally to Usenet, he or she should come to the

          conclusion that the recipient user may bear little resemblance to

          the user he or she has in mind.


          This distinction between a user in Usenet and the "actual" user

          in the external world is in the concept of "persona."  Although

          the user preparing to send the message may not realize it, as far

          as other users are concerned, he or she is a persona as well.

          Therefore, all users of Usenet interact with one another via

          personae.  Moreover, the personae are perceived to engage in a

          range of pursuits which is derived from the words of the users.

          For every exchange of articles at the level of the users, there

          is an analogous "action" at the level of the personae.

          Furthermore, the existence of the personae depends entirely upon

          the users' willingness to continue accessing Usenet.  With this

          complex duality always present, it is often expedient for users

          to "forget" the dichotomy between user and persona, but for the

          purposes of this thesis, it can never be forgotten because it is

          on the level of the personae upon which the concepts of _________
                                                                  Leviathan

          are established to operate.

          3.   ______ _____ _____ ____ ________ ___ _______ ______ _______
               Hobbes helps prove that personae are persons within Usenet.

          With the notion of "persona" having been established, it is

          possible to establish a preliminary parallel to Hobbes' political

          philosophy in _________
                        Leviathan.  This is done by using Hobbes'

          definition of "person" to prove that personae are indeed analogs

          for persons in Usenet.  This proof clears the way to apply

          Hobbesian theory to personae rather than users.


          4.   ____ ________ ________ ____ _______ ________ ____ ___ __
               Like persons, personae have powers, although they may be

          __________
          different.  During this stage of the discussion, further

          parallels are drawn from Hobbes' "persons" to Usenet personae.

          These parallels include the several powers which Hobbes suggests

          are possessed in persons.  Among these powers are "extraordinary

          strength, form, prudence, arts, eloquence, liberality, and

          nobility."  From these powers of the external world, Usenet

          analogs are developed to "fill in the blanks" or add form and

          personality to the images of one another in the minds of all

          users.  Of these powers, "eloquence," is supreme in Usenet

          because finesse in language is highly valued in a world of words.

          5.   _____ ___________ __ ______ __ ________ ___ ________ ____
               Users participate in Usenet to maximize its utility, thus




                                           61


          _______ _________ __ ____ __ ____ _____________ ___ ________
          persona existence is tied to user participation and utility.

          Here the benefits of powers are examined by analyzing Hobbes'

          relevant passages and developing Usenet analogs.  It is

          established that the personae, like persons, are inclined to

          pursue "power after power" to insure their "present means."  On

          the level of the users, this pursuit of power is actually a

          continuous cycle of statement and response intended to maximize

          the utility of Usenet.  Their reputations are the "collective

          memory" of their participation in the cycle.  As long as

          continuous participation is provided by the users, the existence

          of their personae is insured.


          6.   _____________ ___ ______ ___________ __ ______________
               Participation may become contentious or uninteresting,

          _______ __________ ________ _______ ___ ___________ ________
          thereby decreasing Usenet's utility and threatening personae

          __________ ________ _____ ___ ____________ _______ _____
          existence; however, users can increasingly subject their

          _____________ __ __________
          participation to restraint.  As a matter of participating in the

          cycle of statement and response, users may encounter offensive or

          insulting articles called "flames."  These articles and others

          which "clutter" the various newsgroups threaten the utility of

          Usenet to the users.  To bolster utility, users have several

          alternatives other than moderation.  They may ignore the

          offensive or uninteresting articles, conform to the "netiquette"

          standards of behavior, or block the display of "clutter" from

          their screens.  On the level of the personae, the "flames" are

          perceived as "attacks" which ultimately threaten their existence.

          In "fear of wounds, or death," they may be forced to surrender

          themselves to the protection of a common power.

          7.   __ ________ ________ _______ ___ __ ________ ________
               To maximize Usenet's utility and to maintain personae

          __________ ____ _____ ___ ______ __ _____ _______ ______ __
          existence, some users may decide to allow another person to

          _______ __ ________ ___ ______ __ _____ ______________ ____
          control or moderate the extent of their participation, thus

          ___________ __ __________ ___ _________ __ _____ _________
          controlling or moderating the existence of their personae.  In

          this point, a sample cycle of statement and response is analyzed

          leading to the discussion of moderation as the last resort to

          coping with the "clutter" or "noise" in the newsgroups.  On the

          level of the personae, moderation represents the joint surrender

          of their individual powers to common power for the purpose of

          preserving their existence in a hostile environment.


          The quantitative portion of this study raises provocative

          questions regarding trends towards moderation in a forum hailed

          by many as a "modemocracy" and a realization of the "global

          village."  A future study could track the frequency of the

          Leviathan in Usenet over a period of several months.  These data

          could be contrasted with the failure of a completely moderated,

          alternate to Usenet formerly known as "InModeration."  Perhaps

          the combination of moderated and unmoderated newsgroups in Usenet

          points to the utility of "choice" and "freedom" which

          "InModeration" might have underestimated.  Additionally, refined

          operationalization and a larger sample size might provide more

          insight into the less obvious manifestations of the Leviathan in

          Usenet.

          Although this thesis has been limited to the Hobbesian

          perspective on the origins of government, future researchers

          should be encouraged to employ other theoretical visions to the




                                           62


          study of Usenet, or of the internet in general.  The simple act

          of searching for proof within the internet may more readily

          fasten the theories' nuances in a student's mind than traditional

          philosophical study.  Where social studies were always possible,

          internet studies present an equally complex, but more easily

          observable, self-documenting society.


          This theorist also recognizes and encourages the need for more

          behavioral research.  While normative study is valuable in its

          own right, numerical analysis of internet society is needed.  It

          is important to know the distribution of the various degrees of

          representation of users by personae, how the number of users

          affects the generation of  government, and the number and types

          of and reasons for selecting one polity over another.  These

          lines of inquiry do not, of course, cover the entire range, but

          they do suggest that the entirety of political science can

          benefit from internet studies.

          Political scientists are not the first social scientists to

          explore this very new area.  Current research in internet studies

          reveals that insufficient ethical guidelines are available for

          guiding research and there exists considerable debate over how to

          proceed.  For example, this researcher is the sole political

          scientist on a large, research team which is investigating

          computer mediated communication.  Due to the global distances

          between them, the researchers are represented by personae which

          include scholars of English, communication, linguistics, theater,

          sociology, and history.  The qualitative portion of the research

          involves content analysis of the communication of a specific

          group of network individuals.  Issues of privacy and intellectual

          property have arisen.  It is still an unresolved question whether

          the research team should admonish the subjects and then seek

          their permission for further study to be conducted.  It is still

          uncertain whether the study requires a human research waiver.  It

          is still debatable if this kind of analysis is closer to literary

          criticism than behavioral science.  It is still unknown whether

          published research should give the subjects credit for their

          statements or should withhold their names to protect their

          identities.  Despite these compelling questions, the computer

          allows one to cross traditional boundaries--it enables the writer

          to measure and the scientist to write--and to mix and combine

          elements from previously disparate fields.  The problems

          described, of course, issue from the combination of scholars of

          literature with social scientists.  A solution probably lies in

          acknowledging the unresolved nature of that combination once the

          interdisciplinary novelty subsides.  The point, however, is that

          fertile ground for research has been uncovered and that the

          process of how it should be tilled has begun.  To miss the

          opportunity to influence the process would be a major misfortune

          for political science.






                                        Appendix

          This section contains some of Gene Spafford's guidelines because

          they may not be readily available to most readers.  No permission

          was obtained because the documents are freely distributable.  The

          guidelines are reprinted here in a smaller point size to preserve

          their original format and page layout.  Despite this

          accommodation, there are still some formatting problems because

          the margins in the original documents are much narrower than is

          permitted in a thesis.  Additionally, this appendix contains four

          computer generated maps based on Brian Reid's ______ __________
                                                        Usenet Readership

          _______ ______
          Summary Report for April 9, 1991 and a glossary of technical

          terms.



          Original-from: chuq@sun.COM (Chuq Von Rospach)


          [Most recent change: 7 September 1987 by spaf@purdue.edu (Gene

          Spafford)]




                        A Primer on How to Work With the USENET Community


                                       Chuq Von Rospach






            *** You now have access to Usenet, a big network of thousands

          of

            computers.  Other documents or your system administrator will

          provide


            detailed technical documentation.  This message describes the

          Usenet

            culture and customs that have developed over time.  All new

          users should


            read this message to find out how Usenet works. ***

            *** (Old users could read it, too, to refresh their memories.)

          ***



            USENET is a large collection of computers that share data with

          each other.


            It is the people on these computers that make USENET worth the

          effort, and

            for USENET to function properly those people must be able to

          interact in


            productive ways.  This document is intended as a guide to using

          the net in


                                           66




                                           67


            ways that will be pleasant and productive for everyone.



            This document is not intended to teach you how to use USENET.

          Instead, it


            is a guide to using it politely, effectively and efficiently.

            Communication by computer is new to almost everybody, and there

          are


            certain aspects that can make it a frustrating experience until

          you get

            used to them.  This document should help you avoid the worst

          traps.



            The easiest way to learn how to use USENET is to watch how

          others use it.


            Start reading the news and try to figure out what people are

          doing and

            why.  After a couple of weeks you will start understanding why

          certain


            things are done and what things shouldn't be done.  There are

          documents

            available describing the technical details of how to use the

          software.


            These are different depending on which programs you use to

          access the

            news.  You can get copies of these from your system

          administrator.  If you


            do not know who that person is, they can be contacted on most

          systems by

            mailing to account "usenet".





                     Never Forget that the Person on the Other Side is

          Human



            Because your interaction with the network is through a computer

          it is easy

            to forget that there are people "out there." Situations arise

          where


            emotions erupt into a verbal free-for-all that can lead to hurt

          feelings.




                                           68


            Please remember that people all over the world are reading your

          words.  Do


            not attack people if you cannot persuade them with your

          presentation of

            the facts.  Screaming, cursing, and abusing others only serves

          to make


            people think less of you and less willing to help you when you

          need it.



            If you are upset at something or someone, wait until you have

          had a chance

            to calm down and think about it.  A cup of coffee or a good

          night's sleep


            works wonders on your perspective.  Hasty words create more

          problems than

            they solve.  Try not to say anything to others you would not

          say to them


            in person in a room full of people.



                                             Be Brief



            Never say in ten words what you can say in fewer.  Say it

          succinctly and

            it will have a greater impact.  Remember that the longer you

          make your


            article, the fewer people will bother to read it.



                         Your Postings Reflect Upon You -- Be Proud of Them



            Most people on USENET will know you only by what you say and

          how well you

            say it.  They may someday be your co-workers or friends.  Take

          some time


            to make sure each posting is something that will not embarrass

          you later.

            Minimize your spelling errors and make sure that the article is

          easy to


            read and understand.  Writing is an art and to do it well

          requires

            practice.  Since much of how people judge you on the net is

          based on your




                                           69


            writing, such time is well spent.



                                      Use Descriptive Titles



            The subject line of an article is there to enable a person with

          a limited


            amount of time to decide whether or not to read your article.

          Tell people

            what the article is about before they read it.  A title like

          "Car for


            Sale" to rec.autos does not help as much as "66 MG Midget for

          sale:

            Beaverton OR." Don't expect people to read your article to find

          out what


            it is about because many of them won't bother.  Some sites

          truncate the

            length of the subject line to 40 characters so keep your

          subjects short


            and to the point.



                                    Think About Your Audience



            When you post an article, think about the people you are trying

          to

            reach.  Asking UNIX(*) questions on rec.autos will not reach as

          many


            of the people you want to reach as if you asked them on

            comp.unix.questions or comp.unix.wizards.  Try to get the most


            appropriate audience for your message, not the widest.



            It is considered bad form to post both to misc.misc, soc.net-

          people,

            or misc.wanted and to some other newsgroup.  If it belongs in

          that


            other newsgroup, it does not belong in misc.misc, soc.net-

          people,

            or misc.wanted.



            If your message is of interest to a limited geographic area

          (apartments,




                                           70


            car sales, meetings, concerts, etc...), restrict the

          distribution of the


            message to your local area.  Some areas have special newsgroups

          with

            geographical limitations, and the recent versions of the news

          software


            allow you to limit the distribution of material sent to world-

          wide

            newsgroups.  Check with your system administrator to see what

          newsgroups


            are available and how to use them.



            If you want to try a test of something, do not use a world-wide

          newsgroup!

            Messages in misc.misc that say "This is a test" are likely to

          cause


            large numbers of caustic messages to flow into your mailbox.

          There are

            newsgroups that are local to your computer or area that should

          be used.


            Your system administrator can tell you what they are.



                                Be Careful with Humor and Sarcasm



            Without the voice inflections and body language of personal

            communications, it is easy for a remark meant to be funny to be


            misinterpreted.  Subtle humor tends to get lost, so take steps

          to make

            sure that people realize you are trying to be funny.  The net

          has


            developed a symbol called the smiley face.  It looks like ":-)"

          and points

            out sections of articles with humorous intent.  No matter how

          broad the


            humor or satire, it is safer to remind people that you are

          being funny.



            But also be aware that quite frequently satire is posted

          without any

            explicit indications.  If an article outrages you strongly, you


            should ask yourself if it just may have been unmarked satire.




                                           71


            Several self-proclaimed connoisseurs refuse to use smiley

          faces, so


            take heed or you may make a temporary fool of yourself.



                                     Only Post a Message Once



            Avoid posting messages to more than one newsgroup unless you

          are sure

            it is appropriate.  If you do post to multiple newsgroups, do

          not


            post to each group separately.  Instead, specify all the groups

          on a

            single copy of the message.  This reduces network overhead and

          lets


            people who subscribe to more than one of those groups see the

          message

            once instead of having to wade through each copy.



                         Please Rotate Messages With Questionable Content



            Certain newsgroups (such as rec.humor) have messages in them

          that may


            be offensive to some people.  To make sure that these messages

          are

            not read unless they are explicitly requested, these messages

          should


            be encrypted.  The standard encryption method is to rotate each

            letter by thirteen characters so that an "a" becomes an "n".

          This is


            known on the network as "rot13" and when you rotate a message

          the

            word "rot13" should be in the "Subject:" line.  Most of the

          software


            used to read usenet articles have some way of encrypting and

            decrypting messages.  Your system administrator can tell you

          how the


            software on your system works, or you can use the Unix command

          "tr

            [a-z][A-Z] [n-z][a-m][N-Z][A-M]". (Note that some versions of

          Unix


            don't require the [] in the "tr" command.  In fact, some




                                           72


          systems will


            get upset if you use them in an unquoted manner.  The following

            should work for everyone, but may be shortened on some systems:


                  tr '[a-m][n-z][A-M][N-Z]' '[n-z][a-m][N-Z][A-M]'

            Don't forget the single quotes!)



                               Summarize What You are Following Up



            When you are following up someone's article, please summarize

          the parts of


            the article to which you are responding.  This allows readers

          to

            appreciate your comments rather than trying to remember what

          the original


            article said.  It is also possible for your response to get to

          some sites

            before the original article.



            Summarization is best done by including appropriate quotes from

          the


            original article.  Do not include the entire article since it

          will

            irritate the people who have already seen it.  Even if you are

          responding


            to the entire article, summarize only the major points you are

          discussing.



                                   When Summarizing, Summarize!



            When you request information from the network, it is common

          courtesy to

            report your findings so that others can benefit as well.  The

          best way of


            doing this is to take all the responses that you received and

          edit them

            into a single article that is posted to the places where you

          originally


            posted your question.  Take the time to strip headers, combine

          duplicate

            information, and write a short summary.  Try to credit the

          information to




                                           73


            the people that sent it to you, where possible.



                                 Use Mail, Don't Post a Follow-up



            One of the biggest problems we have on the network is that when

          someone


            asks a question, many people send out identical answers.  When

          this

            happens, dozens of identical answers pour through the net.

          Mail your


            answer to the person and suggest that they summarize to the

          network.  This

            way the net will only see a single copy of the answers, no

          matter how many


            people answer the question.



            If you post a question, please remind people to send you the

          answers by

            mail and offer to summarize them to the network.



                 Read All Follow-ups and Don't Repeat What Has Already Been

          Said



            Before you submit a follow-up to a message, read the rest of

          the messages


            in the newsgroup to see whether someone has already said what

          you want to

            say.  If someone has, don't repeat it.



                             Be Careful About Copyrights and Licenses



            Once something is posted onto the network, it is effectively in

          the public


            domain.  When posting material to the network, keep in mind

          that material

            that is UNIX-related may be restricted by the license you or

          your company


            signed with AT&T and be careful not to violate it.  You should

          also be

            aware that posting movie reviews, song lyrics, or anything else

          published




                                           74


            under a copyright could cause you, your company, or the net

          itself to be


            held liable for damages, so we highly recommend caution in

          using this

            material.



                                   Cite Appropriate References



            If you are using facts to support a cause, state where they

          came from.


            Don't take someone else's ideas and use them as your own.  You

          don't want

            someone pretending that your ideas are theirs; show them the

          same respect.



                               Mark or Rotate Answers and Spoilers



            When you post something (like a movie review that discusses a

          detail of


            the plot) which might spoil a surprise for other people, please

          mark your

            message with a warning so that they can skip the message.

          Another


            alternative would be to use the "rot13" protocol to encrypt the

          message so

            it cannot be read accidentally.  When you post a message with a

          spoiler in


            it make sure the word "spoiler" is part of the "Subject:" line.



                                Spelling Flames Considered Harmful



            Every few months a plague descends on USENET called the

          spelling flame.

            It starts out when someone posts an article correcting the

          spelling or


            grammar in some article.  The immediate result seems to be for

          everyone on

            the net to turn into a 6th grade English teacher and pick apart

          each other's


            postings for a few weeks.  This is not productive and tends to

          cause




                                           75


            people who used to be friends to get angry with each other.



            It is important to remember that we all make mistakes, and that

          there are


            many users on the net who use English as a second language.  If

          you feel

            that you must make a comment on the quality of a posting,

          please do so by


            mail, not on the network.



                                     Don't Overdo Signatures



            Signatures are nice, and many people can have a signature added

          to their

            postings automatically by placing it in a file called

          "$HOME/.signature".


            Don't overdo it.  Signatures can tell the world something about

          you, but

            keep them short.  A signature that is longer than the message

          itself is


            considered to be in bad taste.  The main purpose of a signature

          is to help

            people locate you on the net, not learn your life story.  Every

          signature


            should include your return address relative to a well known

          site on the

            network.  Your system administrator can give this to you.





                                  Summary of Things to Remember




                 Never forget that the person on the other side is human


                 Be brief

                 Your postings reflect upon you; be proud of them


                 Use descriptive titles

                 Think about your audience


                 Be careful with humor and sarcasm

                 Only post a message once




                                           76


                 Please rotate material with questionable content


                 Summarize what you are following up

                 Use mail, don't post a follow-up


                 Read all follow-ups and don't repeat what has already been

          said

                 Be careful about copyrights and licenses


                 Cite appropriate references

                 When summarizing, summarize


                 Mark or rotate answers or spoilers

                 Spelling flames considered harmful


                 Don't overdo signatures




          (*)UNIX is a registered trademark of AT&T.



          -----------


                This document is in the public domain and may be reproduced

          or

                excerpted by anyone wishing to do so.


          ----------

          Gene Spafford


          Dept. of Computer Sciences, Purdue University, W. Lafayette IN

          47907-2004

          Internet:  spaf@cs.purdue.edu   uucp:

          ...!{decwrl,gatech,ucbvax}!purdue!spaf




                                           77


          Original-from: mark@cbosgd.att.com (Mark Horton)


          [Most recent change: 17 September 1987 by spaf@purdue.edu (Gene

          Spafford)]



          This message describes some of the rules of conduct on Usenet.

          The rules

          vary depending on the newsgroup.



          Some newsgroups are intended for discussions and some for

          announcements


          or queries.  It is not usually a good idea to carry on

          discussions in

          newsgroups that are designated otherwise.  It is never a good

          idea to


          carry on "meta-discussions" about whether a given discussion is

          appropriate -- such traffic mushrooms until nobody can find

          articles


          that belong.  If you are unhappy with what some user said, send

          him/her

          mail, don't post it.



          Before posting, think about where your article is going.  If it's


          posted to a "comp", "news", "misc", "soc", "sci", "rec" or "talk"

          newsgroup, it will probably go to the USA, Canada, Europe, Korea,

          and


          Australia.  Certain articles are only of local interest (e.g.

          used car

          ads) and it is inappropriate to post them to the whole world.

          Use the


          "Distribution" feature to restrict distribution to your local

          area.  If

          you don't know how to use this feature, read "Frequently

          Submitted


          Items" in another article in news.announce.newusers.



          Don't post announcements regarding major news events (e.g. the

          space

          shuttle has just exploded!) to news groups.  By the time most

          people


          receive such items, they will long since have been informed by

          conventional media.  If you wish to discuss such an event on the




                                           78


          net,


          use the "misc.headlines" newsgroup.



          Announcement of professional products or services on Usenet is

          allowed;

          however, since someone else is paying the phone bills for this,

          it is


          important that it be of overall benefit to Usenet.  Post to the

          appropriate newsgroup -- comp.newprod -- never to a general

          purpose


          newsgroup such as "misc.misc".  Clearly mark your article as a

          product

          announcement in the subject.  Never repeat these -- one article

          per


          product at the most; preferably group everything into one

          article.

          Advertising hype is especially frowned upon -- stick to technical


          facts.  Obnoxious or inappropriate announcements or articles

          violating

          this policy will generally be rejected.  This policy is, of

          course,


          subject to change if it becomes a problem.



          Some newsgroups are moderated.  In these groups, you cannot post

          directly, either by convention or because the software prevents

          it.  To


          post to these newsgroups, send mail to the moderator. Examples:



          Newsgroup      Moderator      Purpose

          ---------           ---------           -------


          news.announce.important cbosgd!announce Important announcements

          for everyone

          comp.std.c               cbosgd!std-c        ANSI C standards

          discussion


          comp.std.unix       ut-sally!std-unix   ANSI Unix standards

          discussion

          comp.std.mumps      plus5!std-mumps     ANSI Mumps standards

          discussion


          comp.unix           cbosgd!unix         Discussion of Unix*

          features and bugs




                                           79


          Some newsgroups have special purpose rules:



          Newsgroup      Rules


          ---------           -----

          news.announce.importantModerated, no direct postings, important

          things only.


          misc.wanted         Queries, "I want an x", "Anyone want my x?".

          No

                              discussions. Don't post to more than one

          xxx.wanted.


                                        Use the smallest appropriate wanted

          (e.g. used car

                                        ads to nj.wanted.)


                                        Requests for sources, termcaps,

          etc. should go to the

                                        "comp.sources.wanted" newsgroup.


          rec.humor                Clean humor only; anything offensive

          must be rotated;

                                        no discussions -- humor only.

          Discussions go in


                                        rec.humor.d

          rec.arts.movies          Don't post anything revealing part of a

          movie


                                        without marking it (spoiler) in the

          subject.

          rec.arts.*                    Same as movies -- mark spoilers in

          the subject line.


          news.groups              Discussions about new groups: whether to

          create

                                        them and what to call them.  Don't

          post yes/no


                                        votes, mail them to the author

          misc.test                     Use the smallest test group

          possible, e.g.


                                        "test" or "ucb.test".  Say in the

          body of the

                                        message what you are testing.



          It is perfectly legal to reproduce short extracts of a

          copyrighted work


          for critical purposes, but reproduction in whole is strictly and




                                           80


          explicitly forbidden by US and international copyright law.

          (Otherwise,


          there would be no way for the artist to make money, and there

          would

          thus be less motive for people to go to the trouble of making

          their art


          available at all.  The crime of theft is as serious in this

          context as

          any other, even though you may not have to pick locks, mask your

          face,


          or conceal merchandise.)



          All opinions or statements made in messages posted to Usenet

          should be

          taken as the opinions of the person who wrote the message.  They

          do not


          necessarily represent the opinions of the employer of that

          person, the

          owner of the computer from which the message was posted, or

          anyone


          involved with Usenet or the underlying networks of which Usenet

          is made

          up.  All responsibility for statements made in Usenet messages

          rests


          with the individual posting the message.



          Posting of information on Usenet is to be viewed as similar to

          publication.  Because of this, do not post instructions for how

          to do


          some illegal act (such as jamming radar or obtaining cable TV

          service

          illegally); also do not ask how to do illegal acts by posting to

          the


          net.



          If you have a standard signature you like to append to your

          articles,

          put it in a file called .signature in your home directory.

          "postnews"


          and "inews" will automatically append it to your article.  Please

          keep

          your signatures concise, as people do not appreciate seeing




                                           81


          lengthy


          signatures, nor paying the phone bills to repeatedly transmit

          them.  2

          or 3 lines are usually plenty.  Sometimes it is also appropriate

          to add


          another line or two for addresses on other major networks where

          you can

          be reached (e.g., ARPA, CSnet, Bitnet).  Long signatures are


          definitely frowned upon.  DO NOT include drawings, pictures,

          maps, or

          other graphics in your signature -- it is not the appropriate

          place


          for such material and viewed as rude by other readers.



          If you post an article and remember something you've left out or

          realize you've made a factual error, you can cancel the article

          and (if


          cancelled quickly enough) prevent its distribution.  Then you can

          correct whatever was wrong and post a new copy.  In "rn" and


          "readnews", an article that you posted can be cancelled with the

          "C"

          command.  Be aware, however, that some people may have already

          read the


          incorrect version so the sooner you cancel something, the better.

          --


          Gene Spafford

          Dept. of Computer Sciences, Purdue University, W. Lafayette IN

          47907-2004


          Internet:  spaf@cs.purdue.edu   uucp:

          ...!{decwrl,gatech,ucbvax}!purdue!spaf




                                           82


          Original-from: ofut@gatech.edu (A. Jeff Offutt VI)


          [Most recent change: 7 September 1987 by spaf@purdue.edu (Gene

          Spafford)]



          I would like to take a moment to share some of my knowledge of

          writing

          style.  If you read the pointers below, remember: it's easy to

          agree


          that they make sense but it's much harder to apply them.



          References:

           Cunningham and Pearsall, "How to Write For the World of Work"


           Strunk & White, "Elements of Style"



          The above references are both excellent books.  Cunningham is a

          standard in Tech writing classes and won an award for the best

          tech


          writing book from the Association for Teaching of Technical

          Writing.  I

          was lucky enough to take a class from him as an undergraduate.

          Strunk


          is a standard in college composition classes.  Other ideas here

          come

          from my own experience on the net and hints from other people.



          This is a "long article". The rest of it is simply a list of

          pointers.



                         Writing style:



           * Write *below* the readers' reading level.  The avg. person in

          the US


             reads on a 5th grade level. The avg. professional reads on

          about the 12th

             grade level.



           * Keep paragraphs short and sweet.  Keep sentences shorter and

          sweeter.


             This means "concise," not cryptic.




                                           83


           * White space is not wasted space -- it greatly improves

          clarity.



           * Pick your words to have only *one* meaning.  Vagueness is

          considered


             artistic by literary critics.  We are not being literary here.



           * People can only grasp about seven things at once.  This means

          ideas in a

             paragraph, major sections, etc..



           * There are several variations on any one sentence.  A passive,

          questioning


             or negative sentence takes longer to read.




                         Net style:



           * Subtlety is not communicated well in written form - especially

          over a


             computer.



           * The above applies to humor as well. (rec.humor, of course, not

          included.)



           * When being especially "flame-boyant", I find it helpful to go

          the bathroom

             before actually sending.  Then, I often change the tone

          considerably.



           * Subject lines should be used very carefully.  How much time

          have you


             wasted reading articles with a misleading subject line?



           * References need to be made.  When you answer mail, you have

          the original

             message fresh in your mind.  When I receive your answer, I

          don't.



           * It's *much* easier to read a mixture of upper and lower case




                                           84


          letters.



           * Leaving out articles (such as "the," "a," "an," etc.) for

          "brevity"


             mangles the meaning of your sentences and takes longer to

          read. It saves

             you time at the expense of your reader.



           * Be careful of contextual meanings of words. For instance, I

          used "articles"


             just now.  In the context of netnews, it has a different

          meaning than I

             intended.



           * Remember - this is an international network.



           * Remember - your future employers may be reading your articles.



          'Nuff said.



          These pointers are all easily supported by arguments and

          research.


          There's a lot more to say, but....

          --


          Gene Spafford

          Dept. of Computer Sciences, Purdue University, W. Lafayette IN

          47907-2004


          Internet:  spaf@cs.purdue.edu   uucp:

          ...!{decwrl,gatech,ucbvax}!purdue!spafOriginal-author:

          brad@looking.on.ca (Brad Templeton)

          Archive-name: emily-postnews/part1


          Last-change: 30 Nov 91 by brad@looking.on.ca (Brad Templeton)




          **NOTE: this is intended to be satirical.  If you do not

          recognize


            it as such, consult a doctor or professional comedian.  The

            recommendations in this article should recognized for what


            they are -- admonitions about what NOT to do.




                                           85





                         "Dear Emily Postnews"



               Emily Postnews, foremost authority on proper net behaviour,


               gives her advice on how to act on the net.



          =================================================================

          ===



          Dear Miss Postnews: How long should my signature be? --

          verbose@noisy



          A: Dear Verbose: Please try and make your signature as long as

          you

          can.  It's much more important than your article, of course, so

          try


          to have more lines of signature than actual text.



          Try to include a large graphic made of ASCII characters, plus

          lots of

          cute quotes and slogans.  People will never tire of reading these


          pearls of wisdom again and again, and you will soon become

          personally

          associated with the joy each reader feels at seeing yet another


          delightful repeat of your signature.



          Be sure as well to include a complete map of USENET with each

          signature, to show how anybody can get mail to you from any site

          in


          the world.  Be sure to include Internet gateways as well.  Also

          tell

          people on your own site how to mail to you.  Give independent


          addresses for Internet, UUCP, and BITNET, even if they're all the

          same.



          Aside from your reply address, include your full name, company

          and


          organization.  It's just common courtesy -- after all, in some




                                           86


          newsreaders people have to type an *entire* keystroke to go back

          to


          the top of your article to see this information in the header.



          By all means include your phone number and street address in

          every

          single article.  People are always responding to usenet articles

          with


          phone calls and letters.  It would be silly to go to the extra

          trouble

          of including this information only in articles that need a

          response by


          conventional channels!

                              ------


          Dear Emily: Today I posted an article and forgot to include my

          signature.  What should I do?  -- forgetful@myvax



          A: Dear Forgetful: Rush to your terminal right away and post an


          article that says, "Oops, I forgot to post my signature with that

          last

          article.  Here it is."



          Since most people will have forgotten your earlier article,


          (particularly since it dared to be so boring as to not have a

          nice,

          juicy signature) this will remind them of it.  Besides, people

          care


          much more about the signature anyway.  See the previous letter

          for

          more important details.



          Also, be sure to include your signature TWICE in each article.

          That


          way you're sure people will read it.



                              ------

          Dear Ms. Postnews: I couldn't get mail through to somebody on

          another


          site.  What should I do? -- eager@beaver.dam




                                           87


          A: Dear Eager: No problem, just post your message to a group that

          a


          lot of people read.  Say, "This is for John Smith.  I couldn't

          get

          mail through so I'm posting it.  All others please ignore."



          This way tens of thousands of people will spend a few seconds

          scanning


          over and ignoring your article, using up over 16 man-hours their

          collective time, but you will be saved the terrible trouble of


          checking through Usenet maps or looking for alternate routes.

          Just

          think, if you couldn't distribute your message to 30,000 other


          computers, you might actually have to (gasp) call directory

          assistance

          for 60 cents, or even phone the person.  This can cost as much as

          a


          few DOLLARS (!) for a 5 minute call!



          And certainly it's better to spend 10 to 20 dollars of other

          people's

          money distributing the message then for you to have to waste $9

          on an


          overnight letter, or even 29 cents on a stamp!



          Don't forget.  The world will end if your message doesn't get

          through,

          so post it as many places as you can.



                              ------


          Q: What about a test message?



          A: It is important, when testing, to test the entire net.  Never

          test

          merely a subnet distribution when the whole net can be done.

          Also put


          "please ignore" on your test messages, since we all know that

          everybody always skips a message with a line like that.  Don't

          use a


          subject like "My sex is female but I demand to be addressed as




                                           88


          male."


          because such articles are read in depth by all USEnauts.



                              ------

          Q: Somebody just posted that Roman Polanski directed Star Wars.

          What


          should I do?



          A: Post the correct answer at once!  We can't have people go on

          believing that!  Very good of you to spot this.  You'll probably

          be


          the only one to make the correction, so post as soon as you can.

          No

          time to lose, so certainly don't wait a day, or check to see if


          somebody else has made the correction.



          And it's not good enough to send the message by mail.  Since

          you're

          the only one who really knows that it was Francis Coppola, you

          have to


          inform the whole net right away!



                              ------

          Q: I read an article that said, "reply by mail, I'll summarize."

          What


          should I do?



          A: Post your response to the whole net.  That request applies

          only to

          dumb people who don't have something interesting to say.  Your


          postings are much more worthwhile than other people's, so it

          would be

          a waste to reply by mail.



                              ------


          Q: I collected replies to an article I wrote, and now it's time

          to

          summarize.  What should I do?




                                           89


          A: Simply concatenate all the articles together into a big file

          and


          post that.  On USENET, this is known as a summary.  It lets

          people

          read all the replies without annoying newsreaders getting in the

          way.


          Do the same when summarizing a vote.



                              ------

          Q: I saw a long article that I wish to rebut carefully, what

          should I


          do?



          A: Include the entire text with your article, particularly the

          signature, and include your comments closely packed between the

          lines.


          Be sure to post, and not mail, even though your article looks

          like a

          reply to the original.  Everybody *loves* to read those long


          point-by-point debates, especially when they evolve into name-

          calling

          and lots of "Is too!" -- "Is not!" -- "Is too, twizot!"

          exchanges.



          Be sure to follow-up everything, and never let another person get

          in


          the last word on a net debate.  Why, if people let other people

          have

          the last word, then discussions would actually stop!  Remember,

          other


          net readers aren't nearly as clever as you, and if somebody posts

          something wrong, the readers can't possibly realize that on their

          own


          without your elucidations.  If somebody gets insulting in their

          net

          postings, the best response is to get right down to their level

          and


          fire a return salvo.  When I read one net person make an

          insulting

          attack on another, I always immediately take it as gospel unless

          a




                                           90


          rebuttal is posted.  It never makes me think less of the

          insulter, so


          it's your duty to respond.



                              ------

          Q: How can I choose what groups to post in?



          A: Pick as many as you can, so that you get the widest audience.


          After all, the net exists to give you an audience.  Ignore those

          who

          suggest you should only use groups where you think the article is


          highly appropriate.  Pick all groups where anybody might even be

          slightly interested.



          Always make sure followups go to all the groups.  In the rare

          event


          that you post a followup which contains something original, make

          sure

          you expand the list of groups.  Never include a "Followup-to:"

          line in


          the header, since some people might miss part of the valuable

          discussion in the fringe groups.



                              ------


          Q: How about an example?



          A: Ok.  Let's say you want to report that Gretzky has been traded

          from

          the Oilers to the Kings.  Now right away you might think


          rec.sport.hockey would be enough.  WRONG.  Many more people might

          be

          interested.  This is a big trade!  Since it's a NEWS article, it


          belongs in the news.* hierarchy as well.  If you are a news

          admin, or

          there is one on your machine, try news.admin.  If not, use

          news.misc.



          The Oilers are probably interested in geology, so try

          sci.geo.fluids.




                                           91


          He is a big star, so post to sci.astro, and sci.space because

          they are


          also interested in stars.  And of course comp.dcom.telecom

          because he

          was born in the birthplace of the telephone.  And because he's


          Canadian, post to soc.culture.Ontario.southwestern.  But that

          group

          doesn't exist, so cross-post to news.groups suggesting it should

          be


          created.  With this many groups of interest, your article will be

          quite bizarre, so post to talk.bizarre as well.  (And post to


          comp.std.mumps, since they hardly get any articles there, and a

          "comp"

          group will propagate your article further.)



          You may also find it is more fun to post the article once in each


          group.  If you list all the newsgroups in the same article, some

          newsreaders will only show the the article to the reader once!

          Don't


          tolerate this.



                              ------

          Q: How do I create a newsgroup?



          A: The easiest way goes something like "inews -C newgroup ....",

          and


          while that will stir up lots of conversation about your new

          newsgroup,

          it might not be enough.



          First post a message in news.groups describing the group.  This

          is a


          "call for discussion."  (If you see a call for discussion,

          immediately

          post a one line message saying that you like or dislike the

          group.)


          When proposing the group, pick a name with a TLA (three-letter

          acronym) that will be understood only by "in" readers of the

          group.




                                           92


          After the call for discussion, post the call for flames, followed

          by a


          call for arguments about the name and a call for run-on puns.

          Eventually make a call for "votes." USENET is a democracy, so

          voters


          can now all post their votes to ensure they get to all 30,000

          machines

          instead of just the person counting. Every few days post a long


          summary of all the votes so that people can complain about bad

          mailers

          and double votes.  It means you'll be more popular and get lots

          of


          mail.  At the end of 21 days you can post the vote results so

          that

          people can argue about all the technical violations of the

          guidelines


          you made.  Blame them on the moderator-of-the-week for

          news.announce.newgroups.  Then your group might be created.



          To liven up discussion, choose a good cross-match for your

          hierarchy


          and group.  For example, comp.race.formula1 or soc.vlsi.design

          would

          be good group names.  If you want your group created quickly,

          include


          an interesting word like "sex" or "activism."  To avoid limiting

          discussion, make the name as broad as possible, and don't forget

          that


          TLA.



          If possible, count votes from a leaf site with a once-a-week

          polled

          connection to botswanavax.  Schedule the vote during your relay

          site's


          head crash if possible.



          Under no circumstances use the trial group method, because it

          eliminates the discussion, flame, pun, voting and guideline-

          violation


          accusation phases, thus taking all the fun out of it.  To create

          an




                                           93


          ALT group, simply issue the creation command.  Then issue an

          rmgroup


          and some more newgroup messages to save other netters the trouble

          of

          doing that part.



                              ------


          Q: I cant spell worth a dam.  I hope your going too tell me what

          to

          do?



          A: Don't worry about how your articles look.  Remember it's the


          message that counts, not the way it's presented.  Ignore the fact

          that

          sloppy spelling in a purely written forum sends out the same

          silent


          messages that soiled clothing would when addressing an audience.



                              ------

          Q: How should I pick a subject for my articles?



          A: Keep it short and meaningless.  That way people will be forced

          to


          actually read your article to find out what's in it.  This means

          a

          bigger audience for you, and we all know that's what the net is

          for.


          If you do a followup, be sure and keep the same subject, even if

          it's

          totally meaningless and not part of the same discussion.  If you


          don't, you won't catch all the people who are looking for stuff

          on the

          original topic, and that means less audience for you.



                              ------


          Q: What sort of tone should I take in my article?



          A: Be as outrageous as possible.  If you don't say outlandish

          things,

          and fill your article with libelous insults of net people, you




                                           94


          may not


          stick out enough in the flood of articles to get a response.  The

          more

          insane your posting looks, the more likely it is that you'll get

          lots


          of followups.  The net is here, after all, so that you can get

          lots of

          attention.



          If your article is polite, reasoned and to the point, you may

          only get


          mailed replies.  Yuck!



                              ------

          Q: The posting software suggested I had too long a signature and

          too


          many lines of included text in my article.  What's the best

          course?



          A: Such restrictions were put in the software for no reason at

          all, so

          don't even try to figure out why they might apply to your

          article.


          Turns out most people search the net to find nice articles that

          consist of the complete text of an earlier article plus a few

          lines.



          In order to help these people, fill your article with dummy

          original


          lines to get past the restrictions.  Everybody will thank you for

          it.



          For your signature, I know it's tough, but you will have to read

          it in

          with the editor.  Do this twice to make sure it's firmly in

          there.  By


          the way, to show your support for the free distribution of

          information, be sure to include a copyright message forbidding


          transmission of your article to sites whose USENET politics you

          don't

          like.




                                           95




          Also, if you do have a lot of free time and want to trim down the

          text

          in your article, be sure to delete some of the attribution lines

          so


          that it looks like the original author of -- say -- a plea for

          world

          peace actually wrote the followup calling for the nuking of

          Bermuda.



                              ------


          Q: They just announced on the radio that the United States has

          invaded

          Iraq.  Should I post?



          A: Of course.  The net can reach people in as few as 3 to 5 days.


          It's the perfect way to inform people about such news events long

          after the broadcast networks have covered them.  As you are

          probably


          the only person to have heard the news on the radio, be sure to

          post

          as soon as you can.



                              ------


          Q: I have this great joke.  You see, these three strings walk

          into a

          bar...



          A: Oh dear.  Don't spoil it for me.  Submit it to rec.humor, and

          post


          it to the moderator of rec.humor.funny at the same time.  I'm

          sure

          he's never seen that joke.



                              ------


          Q: What computer should I buy?  An Atari ST or an Amiga?



          A: Cross post that question to the Atari and Amiga groups.  It's

          an

          interesting and novel question that I am sure they would love to




                                           96


          investigate in those groups.  There is no need to read the groups

          in


          advance or examine the "frequently asked question" lists to see

          if the

          topic has already been dealt with.  In fact, you don't need to

          read


          the group at all, and you can tell people that in your query.



                              ------

          Q: What about other important questions?  How should I know when

          to


          post?



          A: Always post them.  It would be a big waste of your time to

          find a

          knowledgeable user in one of the groups and ask through private

          mail


          if the topic has already come up.  Much easier to bother

          thousands of

          people with the same question.



                              ------


          Q: Somebody just posted a query to the net, and I want to get the

          answer too.  What should I do?



          A: Immediately post a following, including the complete text of

          the


          query.  At the bottom add, "Me too!"  If somebody else has done

          this,

          follow up their article and add "Me three," or whatever number is


          appropriate.  Don't forget your full signature.  After all, if

          you

          just mail the original poster and ask for a copy of the answers,

          you


          will simply clutter the poster's mailbox, and save people who do

          answer the question the joyful duty of noting all the "me (n)s"

          and


          sending off all the multiple copies.



                              ------




                                           97


          Q: What is the measure of a worthwhile group?



          A: Why, it's Volume, Volume, Volume.  Any group that has lots of

          noise


          in it must be good.  Remember, the higher the volume of material

          in a

          group, the higher percentage of useful, factual and insightful


          articles you will find.  In fact, if a group can't demonstrate a

          high

          enough volume, it should be deleted from the net.



                              ------


          Q: Emily, I'm having a serious disagreement with somebody on the

          net.

          I tried complaints to his sysadmin, organizing mail campaigns,

          called


          for his removal from the net and phoning his employer to get him

          fired.  Everybody laughed at me.  What can I do?



          A: Go to the daily papers.  Most modern reporters are top-notch


          computer experts who will understand the net, and your problems,

          perfectly.  They will print careful, reasoned stories without any


          errors at all, and surely represent the situation properly to the

          public.  The public will also all act wisely, as they are also

          fully


          cognizant of the subtle nature of net society.



          Papers never sensationalize or distort, so be sure to point out

          things

          like racism and sexism wherever they might exist.  Be sure as

          well


          that they understand that all things on the net, particularly

          insults,

          are meant literally.  Link what transpires on the net to the

          causes of


          the Holocaust, if possible.  If regular papers won't take the

          story,

          go to a tabloid paper -- they are always interested in good

          stories.




                                           98


          By arranging all this free publicity for the net, you'll become

          very


          well known.  People on the net will wait in eager anticipation

          for

          your every posting, and refer to you constantly.  You'll get more

          mail


          than you ever dreamed possible -- the ultimate in net success.



                              ------

          Q: What does foobar stand for?



          A: It stands for you, dear.


          --

          Gene Spafford


          Software Engineering Research Center & Dept. of Computer Sciences

          Purdue University, W. Lafayette IN 47907-1398


          Internet:  spaf@cs.purdue.edu phone:  (317) 494-7825






                                        Glossary



          Address:  If a computer is multiuser or belongs to a network,

             addresses are used to differentiate the various users.  An

             address is often the user's name, such as "rich" or

             "spartan."  To differentiate between the "rich" using

             "SJSUVM1" and the "rich" using "portal," an addressing scheme

             is used, e.g., "rich@portal."  This is pronounced "rich at

             portal."  This form of addressing is known as "internet-

             style."  Other forms of addressing exist, such as

             "portal!rich," but internet-style addressing is emerging as

             the standard form of address across networks.


          Bulletin board system:  Also known as "BBS."  See "conferencing."


          Computer: At its most basic level, it is an electronic device

             capable of carrying out millions of instructions per second.

             The instructions it executes are determined by its

             programming or software.  The software enables the computer

             to performs tasks such as word processing, numerical

             calculation and communication.


          Conferencing:  This is a form of electronic mail which requires a

             specialized type of communication software.  Rather than

             being sent to a specific user, a message is distributed

             across the network or internet as an open letter.  These open

             letters are organized by the conferencing software into

             categories of interest, such as "cat lovers" and "Italian

             culture."  Users subscribe only to the categories that

             interest them and ignore the rest.  Tens of thousands of

             personal computers around the world are dedicated to

             providing conferences between their users.  Known as

             "bulletin board systems" or BBS's, they provide a important

             source of information for users with similar interests.  Some

             BBS's belong to a network of BBS's using the same

             conferencing software.  This allows local users to

             "conference" with users at other sites.


          E-mail:  Users can send written messages to one another using a

             special form of communication software called electronic

             mail.  Provided that both users' sites have electronic mail

             and that both sites belong to gatewayed networks, electronic

             mail is an amazingly fast and efficient way for users to

             communicate.  The Internet network (not to be confused with

             the general term "internet") spans the globe and transmits

             mail between sites within seconds.  Slower networks, such as

             Fidonet, can take hours or even days.  Mail delivery is

             limited by the speed of the slowest network along the

             delivery route.  For example, if a machine is a gateway

             between the Internet and the Fidonet networks, mail can take

             seconds to reach the gateway via the Internet and then a few

             days to reach its destination site within Fidonet.



                                           85




                                           86


          Feed:  The Usenet connection between two sites.  The site that

             provides the connection "feeds" the site that wants it.


          Fidonet:  A network of personal computers running the Fido

             bulletin board system software.


          Gateway:  A computer that belongs to at least two networks and is

             registered with each network's NIC.  A gateway computer

             allows users and computers from one side of the gateway to

             communicate with users and computers on the other side.  A

             machine serving as a gateway to several networks can be a

             sort of network hub.  The proliferation of gateway sites has

             facilitated the linking of previously isolated networks.  The

             global community of linked networks is known as the

             "internet."


          Internet:  The internet is the global community of linked

             networks.  It is essentially a network of networks.  The

             National Science Foundation's network or NSFNet is

             confusingly known as the Internet.  The Internet is a high-

             speed network linking the nation's military and research

             institutions with corporations and foreign institutions

             around the world.  While only a part of the internet, the

             Internet is considered its backbone because of its high-speed

             connectivity.  Because of  increasing demand for commercial

             access, the Internet is being restructured as the National

             Research and Education Network (NREN).  Management for this

             new network will be contracted out to a consortium of private

             corporations.


          Kill file:  Blocks the display of the articles originating from

             the users and sites listed in the file.


          Moderation:  A moderated newsgroups requires all users to seek

             approval prior to posting an article.


          Multiuser:  See "user."


          Networks:  One or more computers linked for the purpose of

             communicating or of sharing resources such as printers and

             disk drives.


          Newsgroup:  The categories of discussion available via Usenet.

             There are currently approximately 4,000.


          Site:  This is another term for a computer.  Most often it is

             associated with multiuser computers or computers in a

             network.  Sites have names such as "SJSUVM1," "sjsumcs," and

             "portal."  These names are used to differentiate one computer

             in a network from another.  A similar term is "node."  A node

             almost always refers to a computer in a network.


          System Administrator:  Each user is regulated by his site or

             system administrator and each administrator relies upon his




                                           87


             neighboring site administrators for connectivity within the

             network.  Generally, the administrator is liable for the

             actions of his users, but there is a debate over the extent

             of this liability.


          Usenet:  The largest conferencing system in the world.  The

             Usenet software is used by sites within the UUCP network.  It

             is composed of an estimated 10 million users at one million

             sites whose messages are divided into over a thousand

             categories called "newsgroups."  It is claimed that its

             volume of messages is doubling every two months.  To

             participate in Usenet, a site must have Usenet software and

             be a node within UUCP or the Internet.  Usenet messages can

             spread to other networks via gateways.  These gateways

             convert messages to the format used by their own network's

             conferencing software.  In this manner, Fidonet users can

             receive Usenet messages as Fido "echoes," as they are called

             in the Fidonet conferencing jargon.


          User:  The person who operates the computer.  The user operates

             the computer via software.  The user interacts with the

             software usually via a keyboard, video monitor and printer.

             A "single-user machine" is a computer that can only

             accommodate one user at a time.  A "multiuser machine" is a

             computer that can interact with several users simultaneously.

             This implies that the computer has more than one keyboard or

             point of interaction.  A point of interaction is commonly

             known as a terminal.




                                           88




                                           89




                                           90




                                           91






                                      Bibliography



          Blum, Deborah.  "Studies on Beauty Raise a Number of Ugly

              Findings."  ___ _________ ________
                          San Francisco Examiner.  16 February 1992, B10.


          Bowle, John.  ______ ___ ___ _______
                        Hobbes and His Critics.  New York:  Barnes and

              Noble, Inc., 1969.


          Eachard, John.  ___ _______ _____ __ ______ __________
                          Mr. Hobbs's State of Nature Considered.

              Liverpool:  Liverpool UP, 1958.


          Frey, Donnalyn and Rick Adams.  _____  _ _________ __ __________
                                          !%@::  A Directory of Electronic

              ____ __________ _ ________
              Mail Addressing & Networks.  Sebastopol, California:

              O'Reilly and Associates, 1990.


          Galvin, Christopher J.  "Micropopulists Speak Up."  __________
                                                              Compuserve

              ________
              Magazine, July 1991, 12.


          Hobbes, Thomas.  __________
                           Leviathan.  Edited by Michael Oakeshott.  New

              York:  Macmillan Publishing Co., 1962.


          James, D.G.  ___ ____ __ ______
                       The Life of Reason.  London, New York, and Toronto:

              Longmans, Green and Co., 1949.


          Horton, Mark.  Untitled.  Part of a series of documents compiled

              and distributed by Gene Spafford, news.announce.newusers

              Usenet newsgroup, 1987.


          O'Brien, Michael.  "Playing in the MUD."  _________ ________
                                                    SunExpert Magazine,

              May 1992, 19.


          Offut, A. Jeff.  Untitled.  Part of a series of documents

              compiled and distributed by Gene Spafford,

              news.announce.newusers Usenet newsgroup, 1987.


          Reid, Brian.  ______ __________ _______ ______
                        Usenet Readership Summary Report.  Palo Alto,

              California:  Network Measurement Project at the DEC Western

              Research Laboratory, March 1992.


          Reid, Elizabeth.  "Electropolis:  Communication and Community on

              Internet Relay Chat."  thesis, University of Melbourne,

              1991.


          Ross, Ralph, Herbert W. Schneider, and Theodore Waldman, eds.

              ______ ______ __ ___ ____
              Thomas Hobbes in His Time.  Minneapolis:  University of

              Minnesota Press, 1974.


          SRI International, _________  _______ _______
                             Internet:  Getting Started.  Menlo Park,

              California:  SRI International, Network Information Systems

              Center, 1992.


          Brad Templeton.  ____ _____ ________
                           Dear Emily Postnews.  Part of a series of

              documents compiled and distributed by Gene Spafford,


                                           92




                                           93


              news.announce.newusers Usenet newsgroup, 1991.


          Tuck, Richard.  ______
                          Hobbes.  Oxford and New York:  Oxford UP, 1989.


          Von Rospach, Chuq.  _ ______ __ ___ __ ____ ____ ___ ______
                              A Primer on How to Work with the Usenet

              _________
              Community.  Part of a series of documents distributed by

              Gene Spafford, news.announce.newusers Usenet newsgroup,

              1987.


          Warrender, Howard.  ___ _________ __________ __ ______
                              The Political Philosophy of Hobbes.  Oxford:

              Oxford UP (Clarendon), 1957.


          Wolin, Sheldon.  ________ ___ ______
                           Politics and Vision.  Boston:  Little, Brown and

              Company, 1960.




                                           94