Netiquette

From Wikipedia, the free encyclopedia

Jump to: navigation, search

Netiquette, a portmanteau of "net etiquette", is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855.[1] However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community. The points most strongly emphasized about USENET netiquette often include using simple electronic signatures, and avoiding multiposting, cross-posting, off-topic posting, hijacking a discussion thread, and other techniques used to minimize the effort required to read a post or a thread. Netiquette guidelines posted by IBM for employees utilizing Second Life in an official capacity, however, focus on basic professionalism, maintaining a tenable work environment, and protecting IBM's intellectual property.[2] Similarly, some Usenet guidelines call for use of unabbreviated English[3][4] while users of online chat protocols like IRC and instant messaging protocols like SMS often encourage just the opposite, bolstering use of SMS language.

Contents

[edit] History

Netiquette originated prior to the emergence of the world wide web in 1989. Text-based email, Telnet, Usenet, Gopher, Wais, and FTP dominated internet traffic, which was primarily used by educational and research bodies. At that time, it was considered somewhat indecent to make commercial public postings and the limitations of insecure, text-only communications demanded the community have a common set of rules. The term "netiquette" has been in use since as early as 1988, as evidenced by early posts of the satirical Dear Emily Postnews column.[5]

[edit] Common characteristics

Variations in etiquette between communities using similar technologies can be seen when comparing standards governing wiki editors: IBM's Redwiki guidelines threaten the loss of editing privileges over factual mistakes,[6] while Memory Alpha[7] and other public wikis take the open-source-inspired line that "false or misleading information" should simply be corrected, barring apparent malice. However, both projects urge editors not to permit themselves a sense of ownership over a given article, as does Wikipedia.[8]

Common rules for e-mail[9] and USENET such as avoiding flamewars and spam are constant across most mediums and communities. Another rule is to avoid typing in ALL CAPS, which is considered to be the equivalent of shouting or yelling. Other commonly shared points, such as remembering that one's posts are (or can easily be made) public, are generally intuitively understood by publishers of web pages and posters to USENET, although this rule is somewhat flexible depending on the environment. On more private protocols, however, such as email and SMS, some users take the privacy of their posts for granted. One-on-one communications, such as private messages on chat forums and direct SMSes, may be considered more private than other such protocols, but infamous breaches surround even these relatively private media. For example, Paris Hilton's Sidekick PDA was cracked in 2005, resulting in the publication of her private photos, SMS history, address book, etc.[10]

More substantially, an uncivil group email sent by Cerner CEO Neal Patterson to managers of a facility in Kansas City concerning "Cerner's declining work ethic" read, in part, "The parking lot is sparsely used at 8 A.M.; likewise at 5 P.M. As managers - you either do not know what your EMPLOYEES are doing; or YOU do not CARE ... In either case, you have a problem and you will fix it or I will replace you."[11] After the email was forwarded to hundreds of other employees, it quickly leaked to the public. On the day that the email was posted to Yahoo!, Cerner's stock price fell by over 22%[12] from a high of $1.5 billion USD.[13]

Beyond matters of basic courtesy and privacy, email syntax (defined by RFC 2822) allows for different types of recipients. The primary recipient, defined by the To: line, can reasonably be expected to respond, but recipients of carbon copies cannot be, although they still might.[14] Likewise, misuse of the CC/BCC functions in lieu of traditional mailing lists can result in serious technical issues. In late 2007, employees of the United States Department of Homeland Security used large CC lists in place of a mailing list to broadcast messages to several hundred users. Misuse of the "reply to all" caused the number of responses to that message to quickly expand to some 2 million messages, bringing down their mail server.[15] In cases like this, rules of netiquette have to do with efficient sharing of resources and ensuring that the associated technology continues to function rather than more basic etiquette.

[edit] See also

[edit] References

  1. ^ "RFC 1855: Netiquette Guidelines". http://www.dtcc.edu/cs/rfc1855.html. Retrieved on 2007-08-18. 
  2. ^ IBM Issues Employee Conduct Rules For Second Life - IBM - InformationWeek
  3. ^ "Zen and the Art of the Internet - Usenet News". http://www.cs.indiana.edu/docproject/zen/zen-1.0_6.html#SEC44. Retrieved on 2007-08-18. 
  4. ^ "Links to Prof. Timo Salmi's FAQ material". http://lipas.uwasa.fi/~ts/http://tsfaq.html. Retrieved on 2007-08-18. 
  5. ^ Dear Emily Postnews (An alternate USENET netiquette guide)Evidence of use of "netiquette" from 1988
  6. ^ IBM Wikis - RedWIKI - Writing guidelines and etiquette
  7. ^ Memory Alpha:Introduction - Memory Alpha, the Star Trek Wiki
  8. ^ Wikipedia:Ownership of articles
  9. ^ The Complete Idiot's Guide to... Writing Well By Laurie Rozakis, http://books.google.com/books?id=YFIEfqL48AMC&pg=PA348&dq=netiquette&ie=ISO-8859-1&sig=t9ZuKcbWOymIy9oNrRAy9ZfAikI#PPA348,M1
  10. ^ Paris Hilton's hacked Sidekick releases unedited tell-all - Engadget
  11. ^ Zero to $1 Billion - Apr. 27, 2006
  12. ^ ITworld.com - Unix security: Proprietary email
  13. ^ E-Mail Rules: A Business Guide to Managing Policies, Security, and Legal Issues for E-Mail and Digital Communications By Randolph Kahn & Nancy Flynn http://books.google.com/books?id=Q9CbhiflZh0C&pg=PA45&dq=netiquette&ie=ISO-8859-1&sig=5jsrxx0u3qWX1_d4KXCl-_4Tc_4#PPA47,M1
  14. ^ http://articles.techrepublic.com.com/5100-10878_11-1043085.html Electronic office etiquette
  15. ^ DHS flunks e-mail administration 101, causes mini-DDoS

This article was originally based on material from the Free On-line Dictionary of Computing, which is licensed under the GFDL.

[edit] External links

Personal tools