Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Introduction

Netiquette “N etiquette” is derived by merging the words


“network” and “etiquette.” By its very construc-
tion, netiquette means net-etiquette or etiquette
of the N etwork. In general terms, this refers to
etiquette on computer networks. M ore specifi-
cally the term “netiquette” has been described
by N etcom Services as “T he conventions of
Larry S cheuermann and
politeness recognized on U senet and in mailing
Gary Taylor lists.”
T he technological advances which have
brought us the interconnected network of com-
puters called the Internet has also brought us a
cultural web which expands the globe. T his web
“transcends geographic boundaries and legal
jurisdictions. Something quite legal in one place
The authors may not be elsewhere…”(M ultiN et, 1996).
Larry Scheuermannis Professor of Quantitative Methods, in And, one might add, something polite in one
the Business Systems, Analysis, and Technology Department, place may be unacceptable in another.
University of Southwestern Louisiana, Lafayette, Louisiana, In the context of the new Internet global
USA. culture, attempts are being made to identify
Gary Taylor is Southwest Region Contracts Representative common standards of etiquette. T he most
for Airborne Express Corporation, Plano, Texas, USA. frequently cited netiquette suggestions are
identified in the following pages.
Abstract
Netiquette is derived by merging the words network and Netiquette rules
etiquette. More specifically the term netiquette has been
described as the conventions of politeness recognized on By definition etiquette and ethics are closely
Usenet and in mailing lists. In the context of the new Internet related. Etiquette being defined as “convention-
global culture, attempts are being made to identify common al rules of personal behavior in polite society”;
standards of etiquette. Literally hundreds of specific neti- and, ethics as “relating to morals, treating of
quette suggestions are published. Identifies the following moral questions; morally correct; honorable.”
most frequently cited specific suggestions for online users: (Concise Oxford Dictionary). Kelly (1996) says
think first; write in upper and lower case; avoid abbrevia- that a few authors of netiquette articles prefer to
tions; be concise; avoid smileys; don’t flame; don’t take use the word “nethics” for “monstrous breaches
offense easily; don’t evangelize; and know the audience. of netiquette,” and reserve the word netiquette
Netiquette breaches do not always bring retribution. Most for petty breaches. M ost, however, do not make
breaches of politeness and courtesy may do no more than this distinction and use the term netiquette
reflect poorly on the individual user. One who knows the rules when referring to both moral issues and stan-
of this new culture may well have an advantage over one dards of politeness.
who does not.

General netiquette recommendations


Perhaps to identify the most important neti-
quette rules, two authors have used a ten com-
mandment format. T his highlights the most
significant rules in a humorous way. A distinc-
tive feature of the Internet is the lack of an
authority who is able to command, so a list of
Internet Research: Electronic Networking Applications and Policy
Volume 7 · Number 4 · 1997 · pp. 269–273 “commandments” is sure to amuse a few on-
© MCBUniversity Press · ISSN 1066-2243 line users. Following are two sets of netiquette
269
Netiquette Internet Research: Electronic Networking Applications and Policy
Larry Scheuermann and Gary Taylor Volume 7 · Number 4 · 1997 · 269–273

commandments. T he first has to do with mon- the most frequently cited specific suggestions
ster breaches of netiquette and the second with for online users:
petty breaches. T his gives a reader a total of 20 • T hink first. M essages can be forwarded or
commandments to follow. Even though the next copied. N ever write while angry. It may even
20 rules are by no means definitive, they offer a be better to wait a day to think of the possible
very good beginning to anyone desiring to be outcomes before responding in haste.
good and polite while interacting in the world of • W rite in upper and lower case. U PPER C ASE
cyberspace. ON LY looks like SH OU T IN G and lower
T he ten commandments of computer ethics case only is difficult to read.
(Rinaldi, 1996a) are: • Avoid abbreviations. “pls fwd pod atn amy
I. T hou shalt not use a computer to harm asap” may make perfect sense to a seasoned
other people. employee in a delivery company but would be
II. T hou shalt not interfere with other peo- meaningless to anyone else. (Please forward
ple’s computer work. proof-of-delivery to the attention of Amy as
III. T hou shalt not snoop around in other soon as possible) Even if the receiver knows
people’s files. familiar abbreviations the complete words are
IV. T hou shalt not use a computer to steal. still easier to read.
V. T hou shalt not use a computer to bear • Be concise. Brief, well-written notes usually
false witness. have far more impact than those filled with
VI. T hou shalt not use or copy software for unneeded extra verbiage. Well placed line
which you have not paid. spacing can also emphasize information and
VII. T hou shalt not use other people’s comput- make e-mail notes much easier to read.
er resources without authorization. • Avoid smileys (or emoticons as they are some-
VIII. T hou shalt not appropriate other people’s times called. People don’t read with their
intellectual output. heads sideways to the monitor. And anyway,
IX. T hou shalt think about the social conse- they’re confusing. What does this mean? ~:-)-
quences of the program you write. C urly headed guy with a cigarette in his
X. T hou shalt use a computer in ways that mouth? I don’t know either. People either
show consideration and respect. love emoticons or hate them. M ost netiquette
articles actually promote their limited use to
T he ten commandments of etiquette (Brake- help replace facial expressions and other
man, 1995) are: body language. A few emoticons are easy to
I. N ever forget that the person on the other understand. M ost are not. Even those which
side is a human being. are clear – a smile :-) and a frown :-( need to
II. Be brief. be viewed in context, as smiles and frowns
III. Be proud of your messages. can be used for satire. C ontext and word
IV. U se descriptive subject headings in your choice are much better ways to relay feeling.
messages. • Don’t flame. T his is a good place for the
V. T hink about your audience. golden rule. Respond to others in e-mail
VI. Be careful with humor and sarcasm. conversations the same as if the conversation
VII. Summarize what you are following up. were face-to-face. Flames are insults or crude
VIII. G ive back to the community. remarks sent to other network users. Flames
IX. D o not repeat what has been said. take focus away from the substance of a
X. C ite appropriate references. discussion.
• Don’t take offense easily. Some messages are
not sent to tease or deride. Just because
Specific netiquette suggestions
someone comments on how nice the weather
T he two lists of commandments above give happens to be in his part of the world that day
general recommendations for proper netiquette. he is not necessarily chiding the other parts of
Literally hundreds of specific netiquette sugges- the world for having less favorable weather.
tions are published in the articles cited in the • Don’t evangelize. It is much better to offer a
bibliography of this research. T he following are humble opinion and write with reason and
270
Netiquette Internet Research: Electronic Networking Applications and Policy
Larry Scheuermann and Gary Taylor Volume 7 · Number 4 · 1997 · 269–273

diplomacy than to preach. As Reverend Bob Promotion of desirable netiquette


C rispen (1996) put it: “Everyone is tempted
T he debate over C anter & Siegel’s unabashed
from time to time to evangelize, to stride
disregard for etiquette norms highlights a
boldly into the enemy’s camp and throw
debate which is as unsettled today as it was in
down the gauntlet. We will never see the end
1994 when the infamous postings took place.
of people who pop up on comp.sys.intel
Who, if anyone, will control what is and is not
praising M acs and Amigas; who send mail to
permitted on the Internet? A partial answer is
the SKEPT IC list that flying saucers really,
that no one can “control” the netiquette of
truly do exist; who enlighten the Buddhist
millions of users, but online service providers
groups that they’re all bound for hell, and on
and employers can “promote” desirable
and on.”
netiquette.
• K now the audience. M ost news groups have
their own expectations. Reading a news
group a while before posting to it is good Influence of online service providers
advice.
Service providers set their own rules about who
may or may not have accounts. Account privi-
Netiquette rules for advertising leges may be revoked if behavior is in violation
of the service provider’s policy. T his is what
In the first days of the Internet advertising was
happened to the law firm, C anter & Siegel,
prohibited. T he Acceptable U se Policy of the
mentioned earlier. T hey lost their service
N ational Science Foundation excluded all
provider accounts. T his may be the only reason
forms of advertising. T he more recent C om-
mercial Information Exchange in its Acceptable C anter & Siegel stopped the ads. It was surely
U se Policy does not have this prohibition not because they felt any personal grief at violat-
(G unn, 1994). StarD ate Publishing (1996) ing a netiquette rule. As quoted from an article
offers several suggested rules for the kind of written by Paul J. Kelly (1996):
H ere’s what they wrote in their book, H ow to M ake
advertising which is generally not acceptable to a Fortune on the Information S uperhighway: Along
online services and users of the Internet. Two of your journey, someone may try to tell you that in
StarD ate’s “rules” are: order to be a good N et “citizen” you must follow
Rule # 1: N ever place blatant advertisements in the rules of the C yberspace community. D on’t
N ews groups unless that group is listen. T he only laws with which you should
concern yourself are those passed by the country,
specifically for advertising purposes.
state, and city in which you truly live. T he only
G enerally, this means that ads can ethics you should adopt as you pursue wealth on
only be placed in some sort of classi- the I-way are those dictated by the religious faith
fied section. you have chosen to follow and your own good
Rule # 2: N ever e-mail information to people conscience.
who have not requested it. Sending
M ost Internet Service Providers have an
junk mail is the most cardinal of sins
“Acceptable U se Policy” which defines what is
on any network!
expected from the user in exchange for the
Both of these “rules” were challenged not long service provided. Violations of the acceptable
ago by the law firm C anter & Siegel. C anter & use policy may result in loss of service privileges.
Siegel sent mass mailings over the Internet to M ultiN et (1996) has posted their Acceptable
over 5,000 online discussion groups (Jecht, U se Policy for access on the Internet. In addition
1994). T he result was anger by many recipients. to dropping accounts, some providers set up
Some, annoyed by C anter & Siegel’s breach of “cancelbots” which can delete posts which have
netiquette norms, themselves breached neti- been sent to a large number of unrelated groups
quette rules in retaliation. Some sent “mail (Kelly, 1996). Aside from the debate which
bombs” (large files of useless data) to C anter & surrounds having someone other than the origi-
Siegel. Others requested information hoping the nator canceling posts, it is doubtful that cancel-
mailings would increase the law firm’s cost bots will stop all who are intent on breaching a
(Kelly, 1996). netiquette rule for their one personal gain.
271
Netiquette Internet Research: Electronic Networking Applications and Policy
Larry Scheuermann and Gary Taylor Volume 7 · Number 4 · 1997 · 269–273

Influence of employers Influence of governments


Employers who offer their employees access to F raud and the distribution of child pornogra-
noncompany networks generally also set stan- phy are crimes regardless of the technology
dards for Internet use. Wagner (1996) says that used, and governments are becoming increas-
pornography and hate speech are usually pro- ingly involved in trying to curb the use of the
hibited. Airborne Express (1996) allows Inter- Internet by criminals (H olt, 1995). Even
net access but reminds employees: though police debate methods and lawmakers
Access to networks that are world-wide in nature
argue over jurisdictions, it is generally felt that,
expose Airborne to potential liability for every
inappropriate E-mail message sent. Employees even in cyberspace, governments will have
with access to this business tool must use it appro- some influence over the most grievous neti-
priately. Inappropriate use of E-mail can: quette violations.
• harm Airborne’s public image, potentially
resulting in loss of business
• disclose confidential information Conclusion
• defame customers, competitors, or employees
• violate customers’ or employees’ privacy and While online service providers, employers, and
other rights governments each encourage good N et behav-
• expose Airborne to allegations of improper ior by punishing major netiquette breaches, it is
discrimination, business practices, or
the individual users who play the biggest role in
employment practices
• disrupt computer systems through excessive encouraging netiquette standards of politeness
volumes, disclosure of information in E-mail and courtesy. A user who does not write con-
which aids hackers, and other factors. cisely will have fewer readers than one who
T he E-mail system exists for the sole purpose of does. A “flame-thrower” may get a kick out of
facilitating the business of Airborne Express. All E-
mail messages are company property and Airborne
tossing out a personal insult only to find that his
reserves the right to monitor E-mail messages. subsequent messages are deleted before they
are read. An advertiser may receive scores of
Employers are one group which can effectively
requests for additional literature and find out
set rules of conduct and see to it that the rules are
later that most requests were from uninterested
followed. As one K-M art employee found when
online users who were upset about receiving
he linked his home page to his employer’s home
unsolicited ads in their electronic mail boxes.
page. T his might not have been a problem,
N etiquette breaches do not always bring retri-
reports Wagner (1996) if he had not also linked a
bution. M ost breaches of politeness and cour-
site which “spoofed the controversy over Internet
tesy may do no more than reflect poorly on the
pornography” to his own home page. T he links
individual user. One who knows the rules of
tied users of the K-M art home page to a site
which did not reflect K-M art’s standards. T he this new culture may well have an advantage
result in this case was the employee was fired. over one who does not.
Florida Atlantic U niversity (1996) has been a
leader in defining acceptable and unacceptable References and further reading
behavior for employees and students. T he FAU
“C ode of C omputing Practice” is offered as a Airborne Freight Corporation (1996), from an internal
standard which is available from the Florida Airborne memo on electronic mail usage policy,
5 August.
Atlantic U niversity home page for free distribu-
Brakeman, L. (1995), “ E-mail Lists are the Ultimate Electronic
tion to other employers and institutions.
Penpals,” Managed Healthcare, Vol. 5, July, p. 50.
Florida Atlantic U niversity encourages its
Crispen, Rev. B. (1996), Crispen’s ROADMAP: Netiquette.
students to act in “an ethical, responsible, and
Quoted by his son Patrick Crispen in an article also
polite manner” when working with “computer-
titled Netiquette. available: http://www.duke.edu/
mediated communications.” By being able to ~alok/English/map.htm.
threaten disciplinary action, expulsion, termina- Ellsworth, J.H. and Ellsworth, M.V. (1996), “Acceptable and
tion, or prosecution there is a good probability unacceptable uses of the Internet,” The Internet
its students and employees will behave while Business Book, available: http://www.oak-ridge.com/
working on university equipment. ibbch4pl.html.
272
Netiquette Internet Research: Electronic Networking Applications and Policy
Larry Scheuermann and Gary Taylor Volume 7 · Number 4 · 1997 · 269–273

Ethics and the Internet. RFC1087 (1989), Internet Activities Netcom On-Line Communication Services (1996), Netiquette,
Board, available: http://www.cis.ohio-state.edu/htbin/ available: http://wfn-shop.prince. ..cript?query=
rfc/rfc1087.html. netiquette.
Florida Atlantic University Code of Computing Practice, Netiquette (1996), available: http://www.engin.umich…
(1996), Computing Ethics, available: http://www.fau. usenet/Netiquette.html.
edu:80/irm/aiss/gtit/c_ethics.htm. Netiquette Guidelines (1996), RFC1855, Internet Activities
GCICUsnet Help: Netiquette (1996), Netiquette or How to Board, available: http://arganet.tenagra.com/ Tena-
Avoid Being Flamed, available: http://ecco.bsee. gra/rfc1855.html.
swin….usenet/netiquette.html. Rinaldi, A. (1996a), The Ten Commandments for Computer
Gunn, A. (1994), “ The importance of Netiquette,” Byte, Ethics from the Computer Ethics Institute. The Net:
March, p. 32. User Guidelines and Netiquette, available: http://www.
fau.edu/rinaldi/net/ten.html.
Holt, M. (1995), “ For adults only,” New Scientist, July,
pp. 25-7. Rinaldi, A. (1996b), World Wide Web. The Net: User Guide-
lines and Netiquette, available: http://www.fau.edu/
Jecht, J. (1994), “ Lawyers’ ad challenges rules of rinaldi/net/web.html.
‘Netiquette“ ’, New Scientist, July, p. 19.
Shea, V. (1996), Netiquette, Albion Books, San Francisco, CA,
Kelly, P. J. (1996), “ Netiquette and Nethics” from Back to Internet Samples, available: http://bookfair.com/Ser-
Netropolitan Life, Mind your Manners, available: vices/Albion/bookNetiquette/0963702513p83.html. &
http://www-home.calumet.yorku.ca/pkelly/www/ http://bookfair.com/Services/albion/samNetiquette/096
nquette.htm. 3702513sam1.html.
MultiNet: Acceptable Use Policy (1996), Available http:// StarDate (1996), Netiquette – Advertising, available:
www.multinet.net/policy.html. http://www.en.utexas.e…erce/stardate.html#Net.
Net Etiquette (1996), Available: gopher://trout.nosc. Wagner, M. (1996), “ Firms spell out appropriate use of Internet
mil:70/00/.computer-info/E-mail/netiquette. for employees,” Computerworld, February, pp. 58-9.

273

You might also like