Much social behavior on the Internet is self-policing and self-regulating. This article, comprised essentially of excerpted user postings on the Internet, represents, in the truest sense, the info tech culture that has developed over the years on the wide area networks - and especially attitudes toward what has become appropriate and inappropriate in this environment.
[Editor's Note: All items are reprinted here by permission of the authors (or of email list moderators when authors were not traceable in archives and/or credited in the original posts).]
Both the TA and the students were outraged by the complaints they received from list readers who objected to being asked fundamental questions that ought to be dealt with by the students themselves. The root cause appears to be that neither the TA nor the students had any idea who was at the other end of the line. All they saw was a computer that should be giving them answers.
What was said to them repeatedly is this. The courtesy issue is that traffic on BIOSPH-L is voluntary. If you want people to take the time to answer your questions, indicate you have done some legwork on your own and have a genuine problem looking for additional information. Otherwise, you are soaking up volunteer resources which could be better used to meet needs not answered elsewhere.
Dan Yurman ( 1994). Electronic message to RISKS- LIST, February 18. (Reprinted in RISKS-FORUM Digest, Tuesday. 22 February 1994, Volume 15 : Issue 57.)
The main things I see happening are:
Untraceable source (1994). Electronic message to online-news@marketplace.com, March 2.
Reminder for everyone: Be sure there is exactly one blank line between the headers and the article, and don't indent the first line of the article! (Some machines have a line-eater that munches the start of your posting if it's indented.)
James "Kibo" Parry (1992). Usenet article to art.prose.d, April 30.
This TAP letter is an example of the danger of participating in letter-bombing and why such is considered poor netiquette. It results in clogging up peoples' mailboxes with unwanted letters (I should probably include this one in that category), and causes a lot of unproductive time to be spent in cleaning up the aftermath.
In this electronic network age, it is too easy to launch a thousand e-ships (or more) at the press of a single keystroke. I personally will not participate in such an endeavor. And I always assume a request to forward a form letter is a hoax, unless and until I have reasonable evidence to the contrary. Whereas the TAP letter is not a hoax (it is based on sincerely-held misunderstandings), I cannot believe that Jamie Love would have sent it had he understood the facts.
M. Stuart Lynn (1994). Posted to taskforce@ivory.educom.edu by Mike Roberts
ietpubs@ucdavis.edu |