home *** CD-ROM | disk | FTP | other *** search
Text File | 1994-06-10 | 147.9 KB | 2,880 lines |
- Voices from the WELL:
- The Logic of the Virtual Commons
-
-
-
- Marc A. Smith
- Department of Sociology
- U.C.L.A.
-
-
- Submitted in partial fulfillment of the Master's Requirements
-
-
-
- Committee:
- Professor Peter Kollock
- Professor John Heritage
-
-
- Correspondence regarding this essay may be sent to Marc Smith, Department
- of Sociology, U.C.L.A., Los Angeles, CA 90024. Email may be sent to
- SMITHM@NICCO.SSCNET.UCLA.EDU.
-
-
-
- Its hard enough to love someone
- when they're right close at home
- don't you think I know its hard honey
- squeezing sugar from the phone
-
- - Bonnie Raitt
-
- The Road's My Middle Name,
- from Nick of Time, Capitol Records
-
-
-
-
-
-
- ABSTRACT: The recent development of virtual communities, sites of social
- interaction predominantly mediated by computers and telecommunications
- networks, provides a unique opportunity to study the mechanisms by which
- collectivities generate and maintain the commitment of their participants
- in a new social terrain. Using the analytical framework developed in
- studies of intentional communities and collective action dilemmas, this
- paper examines the unique obstacles to collective action and the commitment
- mechanisms used to overcome them in a particular virtual community, the
- WELL. Drawing upon ethnographic and interview data, this community is
- evaluated in terms of the community's capacity, or lack thereof, to
- overcome obstacles to organization and elicit appropriate participation in
- the production of desired collective goods.
-
-
- Table of Contents:
-
- Introduction: Social Dilemmas in Virtual Spaces 4
- Cyberspace and Virtual Worlds 5
- Method 9
- The Structure of the WELL 11
- The Character of Virtual Space 14
- Theory 18
- Theories of Communities and Collective Action 18
- Towards a definition of community 20
- The Elements of Successful Community 21
-
- The Construction of Commitment 22
- Economies of Commitment 24
- The Character of Collective Goods 24
- Accounting Systems and Misunderstandings 25
-
- Data 28
- Collective Goods in a Virtual Space 28
- Social Capital 28
- Knowledge Capital 30
- Communion 34
- Obstacles to the provision of collective goods 35
- Population Pressures 36
- Participation 37
- Transgressions and Sanctions 37
- Stolen Files and Justice
- Decorum 44
- The Weird Raid on Misc
- Discussion 48
-
- Suggestions for Future Research 49
- Conclusion 49
-
-
-
- Introduction: Social Dilemmas in Virtual Spaces
-
- A virtual community is a set of on-going many-sided interactions that
- occur predominantly in and through computers linked via
- telecommunications networks. They are a fairly recent phenomena and
- one that is rapidly developing as more people come to have access to
- computers and data networks. The virtual spaces constructed by these
- technologies are not only new, they have some fundamental differences
- from more familiar terrain of interaction. Virtual spaces change the
- kinds of communication that can be exchanged between individuals and
- alter the economies of communication and organization. As a result
- many familiar and common social process must be adapted to the virtual
- environment and some do not transfer well at all. One aspect of
- interaction remains constant however; virtual communities, like all
- groups to some extent, must face the social dilemma that individually
- rational behavior can often lead to collectively irrational outcomes.
- The purpose of this paper is to begin to examine how community and
- cooperation emerges and is maintained in groups that interact
- predominantly within virtual spaces.
-
- As yet, virtual communities are somewhat esoteric and have attracted
- only limited attention from the social science community. Many
- questions about virtual communities remain unanswered, and many more
- unasked. No detailed work has yet addressed the questions, for
- example, of how virtual communities form and mature, how relations
- within these communities differ from relations in "real-space", or how
- the dynamics of group organization and operation in virtual
- communities differs from and is similar to communities based upon
- physical copresence. But like their real-space counterparts, virtual
- communities face the challenge of maintaining their member's
- commitment, monitoring and sanctioning their behavior, ensuring the
- continued production of essential resources and organizing their
- distribution. The dynamic and evolving character of these groups
- provides a unique opportunity to study the emergence of endogenous
- order in a group. Simultaneously, the novel aspects of interaction in
- virtual spaces offers an illuminating contrast to interactions that
- occur through other media, including face-to-face interaction.
-
- Many communities have the potential to organize their members so as to
- produce a collective good, something that no individual member of the
- community could provide for themselves if they had acted alone. Some
- goods are tangible, like common pastures or irrigation systems, others
- are intangible goods like goodwill, trust, and identity. However,
- this potential is not always realized. As Mancur Olson noted, "if the
- members of some group have a common interest or objective, and if they
- would all be better off if that objective were achieved, it [does not
- necessarily follow] that the individuals in that group ... act to
- achieve that objective." (p. 1, 1965) There are many obstacles that
- stand in the way of the production of collective goods and even
- success can be fragile, especially when it is possible to draw from a
- good without contributing to its production. Nonetheless, despite
- arguments to the contrary (Hardin, 1968), many groups do succeed in
- producing goods in common. And, as Elinor Ostrom's work illustrates,
- some communities have succeeded in doing so for centuries (1991). The
- question this raises is: what contributes to the successful provision
- of collective goods? How is cooperation achieved and maintained in
- the face of a temptation to defect?
-
- Virtual communities produce a variety of collective goods. They allow
- people of like interests to come together with little cost, help them
- exchange ideas and coordinate their activities, and provide the kind
- of identification and feeling of membership found in face-to-face
- interaction. In the process they face familiar problems of defection,
- free-riding and other forms of disruptive behavior although in new and
- sometimes very unexpected ways. The novelty of the medium means that
- the rules and practices that lead to a successful virtual community
- are not yet well known or set fast in a codified formal system.
-
- Cyberspace and Virtual Worlds
- Virtual interaction is often said to occur in a unique kind of space,
- a cyberspace, constructed in and through computers and networks. This
- term was coined by William Gibson in his visionary novel Neuromancer.
- Gibson described a new technologically constructed social space in
- which much of the commerce, communication and interaction among human
- beings and their constructed agents would take place. In the novel
- Gibson gives his own description of cyberspace,
-
- "Cyberspace. A consensual hallucination experienced daily by billions
- of legitimate operators, in every nation... a graphic representation
- of data abstracted from the banks of every computer in the human
- system. Unthinkable complexity. Lines of light ranged in the
- nonspace of the mind, clusters and constellations of data. Like city
- lights, receding" Gibson's cyberspace remains in part in the realm of
- science fiction. But much of what he described has already taken on
- very real form. The global interconnection of computers via phone and
- data networks has created the foundation for a seamless system of
- communication between machines designed specifically for the storage
- and manipulation of signs. Cyberspace, then, can be understood as a
- vast territory , a space of representations. While human beings have
- inhabited representational spaces for a very long time, we have never
- been able to create representations with the ease and flexibility
- possible in cyberspace. This is important because with each new
- development in the technologies of representation, from the printing
- press to satellite communication, there has been a reworking of the
- kinds of representations and social relationships that are possible to
- maintain.
-
- Gibson envisioned cyberspace as two related technologies, the first
- provided the individual connecting to cyberspace with a complete
- sensorium, enclosing the user in a totally computer generated reality.
- Connected directly to a computer, wires connected directly to the
- nervous system, an artificial set of sense data would be constructed
- and delivered to a credulous mind. The fact that no such technology
- yet exists does not invalidate Gibson's vision, mistaking far less
- sophisticated representations for reality is already common and does
- not require such complex technology. Nonetheless, research and
- development of this kind of technology is advancing rapidly,
- compelling visual cyberspaces (often termed "photo realistic") are
- available now and will become widespread after the further refinement
- and decline in the cost of processing power. Direct contact between a
- machine and a human mind may be a bit further off, but is a subject of
- research that has promising and disturbing implications. In contrast,
- the second element of Gibson's cyberspace is very much a reality.
- This is the matrix, the densely intertwined networks of networks,
- lines of communication linking millions of computers around the world.
- While sensual cyberspaces may have profound effects on our perception
- and understanding of reality, even when limited to the comparatively
- pedestrian medium of text, the matrix is already having visible
- effects.
-
- Computer networking was pioneered by the United State's Defense
- Department's Advanced Research Projects Agency (ARPA) which funded the
- development of the first wide area network (WAN), the ARPANET, in
- 1969. The ARPANET has since grown exponentially and inspired many
- additional networks. It has since been integrated into the INTERNET
- (1983), a globe spanning "network of networks" supporting over fifteen
- million users. The ArpaNet/INTERNET was joined by the USENET (1979),
- the BITNET (1981) and the FIDONET (1983). These large scale networks
- are supplemented by the proliferation of independent Bulletin Board
- Systems (BBSs) run from individual microcomputers and medium to
- large-scale information services like Compuserve, GEnie, and the WELL.
- While not all of these networks are unified or managed by a single
- regulating body, many are interconnected: users on one network can
- often utilize many of the resources available on the others through
- gateways. This list does not exhaust the number of networks in
- existence, John Quarterman's 1990 book on the subject, The Matrix,
- lists over 900 networks. That number may already be surpassed.
- Within these vast networks interconnections of another kind have
- formed: social networks of people who have come together virtually,
- that is via computers and networks, to interact with others for a
- myriad number of purposes. A number of methods exist to facilitate
- communication between individuals and groups via these networks. The
- simplest is electronic mail (email). Email allows for one-to-one or
- one-to-many communication between any individuals who have a valid
- email address on the same network or on a network that can be
- gatewayed to. Effectively, this means that some 15 million people are
- accessible to one another instantaneously and without regard for
- distance. Using tools to enhance email, some groups have created
- "lists" than ease the process of collecting email addresses.
- Some lists provide a single address for mail that is to be forwarded
- to every member of the list. The largest of these lists have as many
- as 15,000 subscribers located all around the planet. At last check,
- there were more than 2,400 lists carried on the INTERNET alone on
- subjects ranging from dentistry to religion to quantum physics. New
- lists are created on a daily basis while some old lists fall inactive.
- Conferencing systems, information services and BBSs fill out the range
- of virtual communications. These systems share a great deal in
- common, differing mostly in terms of size, commercial status, and
- focus. These systems tend to be centralized, that is supported by
- computers at a single location although accessed by computers all over
- the world. Conferencing systems focus on providing the tools for the
- facilitation of discussions. BBSs and information services do this as
- well, but additional emphasis may be placed on services like software
- libraries, weather and stock reports, and airline reservations. Often
- information services are operated on a for-profit basis.
-
- Whichever system people use, they frequently develop relations with
- other users that have some stability and longevity. This should not
- be surprising considering the ease with which network systems allow
- individuals to find others with like interests. Networks are in many
- ways dynamic electronic "Schelling" points (Schelling, 1960). In The
- Strategy of Conflict, Schelling developed the idea of natural and
- constructed points that focus interactions, places that facilitate
- connections with people interested in a participating in a common line
- of action. The clock at Grand Central Station is an example, as are
- singles bars and market places. Each is a space designated as a point
- of congregation for people of like interests. Networks enhance the
- flexibility of Schelling points by radically altering the economies of
- their production and use. Members of these virtual social networks
- frequently identify their groups (and groups of groups) as "virtual
- communities". The use of the term "virtual" may be confusing for
- those who do not know its use within the computer literate community
- where "virtual" is used to mean "in effect", a surrogate. For
- example, virtual memory is not memory in the conventional sense, it is
- not composed of memory chips, but is instead the use of a hard drive
- to simulate chip-based memory. In the context of community, then, the
- term is used to emphasize not the ersatz nature of the community but
- rather that a seemingly non-existent medium is used to facilitate and
- maintain one. Virtual communities are communities "in effect". The
- use of the term "community" to describe these social formations may be
- contested, but it is the argument of this paper that virtual
- communities are indeed communities.
-
- Virtual communities developed soon after the first computer networks
- were created in the late 1960s. But it was not until the wide
- proliferation of microcomputers in the late 1970s that there were
- enough computer owners to create collective organizations outside of
- the defense and military establishment. Often fairly small, many
- groups used Bulletin Board Systems run as non-profit collective goods
- to facilitate their interactions and exchanges. In addition to local
- non commercial or semi-commercial BBSs, large systems, used by tens of
- thousands of individuals, most notably Compuserve, GEnie, Prodigy,
- America On-line, and the WELL have been created and run for profit.
- Despite the fact that both kinds of systems provide mostly the
- exchange of unadorned text, users of these systems have come to feel
- that they participate in a community that fulfills many of the roles
- more commonly found in traditional face-to-face communities.
- Interaction in virtual spaces share many of the characteristics of
- "real" interaction, people discuss, argue, fight, reconcile, amuse,
- and offend just as much and perhaps more in a virtual community. But
- virtual communities are also starkly different. In a virtual
- interaction nothing but words are normally exchanged. Interaction
- involves the creation of personality, nuance, identity and "self" with
- only the tools of texts . But the differences may not be as sharp as
- they first seem, as Erving Goffman showed, real life too is an act of
- authorship, of constant image management and careful presentation.
- Face-to-face interaction is a rich canvass with which to paint, but it
- is one loaded with the indelible "stigma" of social identities. In a
- virtual world participants are washed clean of the stigmata of their
- real "selves" and are free to invent new ones to their tastes. Escape
- is not total, however, participants are revealed in virtual
- communities, they "give off" as well as give signals as happens in
- face-to-face interaction, but with a far more reliable mask. This is
- just one way in which virtual interaction and virtual communities
- differ from "real" ones.
-
- These differences do not necessarily exclude virtual communities from
- the category of legitimate communities. While interaction with a
- virtual community is peculiar in many ways, this does not mean that
- very familiar kinds of social interaction do not take place within
- them. Rather, it is the ways that common and familiar forms of
- interaction are transplanted into and transformed by virtual spaces
- that is of particular interest.
-
- Method
- This paper offers a structured ethnographic account of the production
- of collective goods in a virtual community, of the processes that
- maintain those goods and the processes that block or disrupt such
- production. It is structured broadly by the theories of collective
- action dilemmas and seeks to address some general theoretical claims
- made by that school of theory. I have let these theories direct my
- ethnographic data collection and will use them to frame and analyze
- that data.
-
- Ethnographic data was drawn from a single virtual community, the Whole
- Earth 'Lectronic Link (WELL). The WELL is a relatively old virtual
- community, established in 1986 by the Point Foundation. The WELL is a
- for-profit organization, access is billed at two dollars per hour. It
- is physically located in Sausalito, California and is composed of four
- Sequent computers, an array of disk drives providing four gigabytes of
- storage, and multiple telephone and Internet connections. It is
- currently used by over 6600 people located all over the world although
- a large majority of the users live in the San Francisco Bay area .
- The WELL is not the only virtual community, nor is it necessarily the
- model for all the others that exist. As a result the generalizability
- of conclusions drawn from the WELL is not certain and comparative
- analysis is certainly called for. However, this is beyond the scope
- of this paper. Nonetheless, the WELL has pioneered and developed the
- concepts and practices of community in a virtual space, making it a
- useful starting point for an analysis of this phenomena.
-
- I collected data by logging into the WELL from my personal computer,
- using the UCLA connection to the Internet to connect me with the WELL.
- Unlike face-to-face interaction, interaction through the WELL produces
- a fairly durable artifact, indeed it could be argued that interaction
- takes place through the construction of artifacts that are then made
- publicly visible. This allowed me to collect faithful records of
- interactions among a wide variety of groups and over a large period of
- time. The artifactual remains of interaction in the WELL go beyond
- audio and video recordings of interactions in that no aspect of the
- interaction is missed. However, the subjective meanings that were
- constructed in these interactions must reconstructed just like audio
- and video records.
-
- The WELL is structured by software called Picospan which organizes
- interaction into a series of conferences which may have any number of
- subordinate topics. There are currently 223 public conferences open
- to any user of the WELL, each of which may have anywhere from 1 to 500
- or more sub-topics. Data was collected by copying contributions to
- public conferences to files that were then transferred back to my
- personal computer for examination and analysis. The WELL also offers
- a variety of back-channels of communication. Users may email one
- another or open private conferences that are accessible only to those
- who are invited by their owner. The contents of email and private
- conferences were not available to me.
-
- To illustrate certain significant processes, I will present segments
- of interactions that took place in the WELL. I will set off materials
- drawn from the WELL in the following manner:
-
- Topic 1050: Experts On The WELL
- # 57: Banter with a strange device (jrc) Thu, Sep 17, '92 (15:38) 5
- lines
-
-
- the key between "f" and "h" on my old keyboard broke, so I can't move
- to any conferences. My new keyboard doesn't wanna work. I may commit
- indecencies, but I'll have to do them ri'ht here.
-
- I will always present the entire posting and have not edited any of
- the contents. However, posts are single turns in a much larger and
- longer series of exchanges. Due to the length of most topics, it is
- necessary to lift particular posts out of their series and highlight
- them. In so doing I will attempt to summarize the context of the
- posting as faithfully as possible.
-
- In addition to reading and selecting posts from WELL conferences, I
- engaged in a series of interviews with participants of various
- interactions of particular interest. Interviews were carried out
- "on-line", that is through email or in a public conference. Some
- additional information was gathered through telephone conversations
- with members of the WELL community. In addition, I attended the
- WELL's Summer Picnic, held in San Francisco on July 19, 1992, one of
- the occasional face-to-face meetings organized by members of the WELL.
- This meeting allowed me to gather information about the social status
- of WELL members that could not easily be derived from contact via the
- WELL itself.
-
- Data was collected and examined in terms of its relevance to the
- central theoretical assumptions and conclusions of collective action
- theory. In particular, I looked for examples of individuals being
- encouraged to participate, the returns on participation, and the kinds
- of disruptions that raise the question of monitoring and sanctioning
- systems. These aspects address the construction of commitment in the
- virtual community and mechanisms that are enacted to maintain and
- defend it against the endemic temptations that threaten to dissolve
- the systems that maintain the collective goods produced in the WELL.
- At each point, the unique character of virtual interaction will be
- highlighted to illustrate the special challenges and opportunities of
- this terrain.
-
- This paper will proceed in three stages. First, because many people
- have as yet never experienced virtual spaces, I will provide a
- description of the development of networks and systems like the WELL.
- This description will be further elaborated in the following sections.
- Next, I turn to the theories of community and collective action.
- Finally, I will examine specific data drawn from the WELL in terms of
- the theoretical framework developed in the preceding section.
-
- The Structure of the WELL
-
- The WELL is in many ways a single program called Picospan. Written by
- Marcus Watts in 1984 and since refined and embellished by many others,
- Picospan constructs and maintains a hierarchy that sorts and
- identifies messages created by its users (see appendix A for a
- schematic diagram of the WELL). As a result of its segmented
- architecture, Picospan allows thousands of individual discussions to
- progress simultaneously without loss of coherency or much limitation
- on the activities of individual participants. At the top most level
- of the Picospan hierarchy are conferences, broad subject categories of
- interest. Conferences include subjects such as current events,
- telecommunications, agriculture, erotica, philosophy, and over
- two-hundred others at the time of this writing (see appendix B for a
- list of all current conferences). Picospan is noted for its
- flexibility and openness to individual control. While conferences can
- be created only with special permission, any user, from the oldest
- hand to the newest user, can create a new topic with the use of a
- single, simple command. This power allows interaction in the WELL to
- share the phenomena in conversation whereby the topic shifts from
- subject to subject. The difference in Picospan is that more than one
- subject may be maintained at one time: as new topics are spawned, new
- "threads" are added to the conference while old conferences are
- sometimes deleted or removed to an archive after a long period of
- inactivity. Within each conference there many be anywhere from one to
- many hundred topics (see appendix C for a list of topics in the
- "Virtual Communities" conference). A topic is often more specific
- than a conference. All contributions to a conference are placed in
- one topic or another at the discretion of the individual contributor.
- A posting is an individual's contribution to a topic. A posting can
- be anywhere from zero to many hundreds of lines of text, although the
- average posting is approximately eight-lines in length. Individuals
- post their contributions serially, following all other contributions
- that have already been made to a topic.
-
-
-
- A posting is always accompanied by a header generated by Picospan. In
- this sample posting:
-
- Topic 1050: Experts On The WELL
- # 3: Stephen David Fishman (sfish) Tue, Sep 15, '92 (12:26) 2 lines
-
- I have a Mac LC with a Seiko color monitor. All of a sudden the picture has
- started shaking. What could be causing this? (It's very annoying.)
-
- the top line identifies the number of the topic within its conference
- . This posting was drawn from the News conference, one of the oldest
- and most heavily used conferences in the WELL. Following the topic
- number is the topic title. Topics are given titles by their creators.
- Any WELL user may create a new topic at any time in any public
- conference using a single command. The second line of the topic
- header identifies the number of the posting in the topic. Each
- posting is added to the topic and numbered serially in chronological
- order. Following the posting number is the pseudonym, this is a line
- of text that the poster may change to anything they want. Often, as
- in this case, the "pseud" is the full name of the poster, however this
- is not always the case. Many members change their pseudonym to
- contain a nickname or some meta-commentary on their posts or the posts
- of others. For example,
-
- Topic 1050: Experts On The WELL
- # 4: Will Work for Pay (chuck3) Tue, Sep 15, '92 (13:19) 1 line
-
- The blow dryer. (Or any squirrel-cage motor like that.)
-
- Topic 1050: Experts On The WELL
- # 7: Cosmic litterbox (darlis) Tue, Sep 15, '92 (14:48) 2 lines
-
- And -- this is silly, I know, but -- have you checked to be sure that all
- the connectors are plugged in nice and tight?
-
- The word in parentheses is the "userid", a unique identifier that is
- stamped on every contribution the member makes in the WELL. While the
- pseudonym is modifiable by the member, the userid is not. There have
- been some cases in which member's changed their userid with the
- cooperation of WELL management or by opening a new account, userids
- remain a fairly stable marking. Finally, the posting is time and date
- stamped and the length of the posting noted. The length is important
- as a signal to the reader about how much of their attention this
- posting will take. Since there is virtually no limit on the length of
- a posting, some members contribute hundreds of lines (either of their
- own words or transcriptions from other sources). WELL etiquette calls
- for very long posts to be "hidden" although this does not happen as
- often as some members claim it should. Hidden posts display only the
- header when read normally. Members must explicitly request the
- contents of a hidden post, allowing them to skip over long
- contributions.
-
- Each conference is managed by a conference host, an individual or
- small group that attends to the technical and social management of the
- conference's contents. Hosts encourage participation, guide the
- discussions, and are sometimes deferred to in conflicts. Hosts do
- wield significant powers not available to non-host participants.
- Hosts may exclude a member from access to their conference, may
- "freeze" a topic (making additional contribution impossible), and
- generally hold some moral authority as a result. The WELL's guidebook
- for hosts defines the powers of a host as:
-
- The host of a conference has the right and power to censor responses,
- freeze topics, retire topics and kill (delete) topics where he/she
- sees fit. The host of a conference also has the right to ban users
- whom the host judges to be nuisances within his or her conference from
- further participation in that conference. This is a serious move and
- should be discussed in the Backstage conference before being
- undertaken. For lack of other technical means, "banning" can be
- enforced by censoring postings of the banned user.
-
- However, the use of these powers by hosts is subject to extensive
- informal social controls and are, as a result, rarely used without
- careful consideration. The issue of the powers weilded by hosts will
- be addressed below. Any member of the WELL may enter any public
- conference and post a contribution to any topic. In addition any user
- may create new topics. New topics are frequently generated but not
- all attract attention.
-
- Each member of the WELL has certain rights, some that are a product of
- the architecture of the Picospan program and some that have been
- developed and refined through many years of discussion and conflict.
- Most central is the member's right to control the use of their
- contributions. The principle is identified by a phrase often used in
- the WELL and posted at its main "entrance": "You Own Your Own Words"
- (YOYOW) (Figure1.).
-
-
- Type your userid or newuser to register
- login: msmith
- Password:
- Last login: Mon Jun 1 11:57:26 from julia.math.ucla.
- DYNIX(R)
- Copyright 1984 Sequent Computer Systems, Inc.
-
- You own your own words. This means that you are responsible for the
- words that you post on the WELL and that reproduction of those words
- without your permission in any medium outside of the WELL's conferencing
- system may be challenged by you, the author.
-
- ==========================================================================
- For a recorded message with WELL System Status information call:
- 1-800-326-8354 from within the 48 contiguous United States.
- ==========================================================================
-
-
- ** The WELL will be off-line for BACKUPS, Wednesday, June 3
- ** from 4:30am PDT until approximately 09:00am PDT
-
- This is a schedule change from the previously announced
- downtime we had planned from 4 till 9 am Tuesday.
-
- =========================================================================
-
- PicoSpan T3.3; designed by Marcus Watts
- copyright 1984 NETI; licensed by Unicon Inc.
- Figure 1. A sample WELL login screen.
-
- This means that no other user, including hosts and staff, may alter
- the words a member enters into the WELL. Users may not edit their
- words once posted, although they may delete them entirely through a
- command known as "scribble". These norms and restrictions are
- intended to rule out revisionism, abuses of power and censorship.
-
- The Character of Virtual Space
- A virtual space has some generic qualities that distinguish it from
- the space of face-to-face interactions. In many ways virtual
- communities are modern incarnations of the committees of
- correspondence of the eighteenth and nineteenth century. Like those
- groups formed around the political and scientific interests of the
- day, virtual communities are composed of groups brought together by a
- common interest and separated by potentially great distance. However,
- unlike the committees, virtual communities are not limited by the
- speed of man on horseback or even the steam engine, but are granted
- near instantaneous communication by the speed of computers and data
- networks. The increased speed and the unique qualities and powers of
- computer network based communication makes the dynamics of virtual
- communities distinct from committees of correspondence. The
- differences in the medium of communication have effects on the kinds
- of interactions that can take place and how the interactions that do
- occur can progress and unfold. For example, slow media that introduce
- long delays into turn-taking reduces the interactively of an social
- exchange and can lead to more cautious (and thus, perhaps, more
- detailed and exact) messages. Media can vary in terms of the
- ambiguity they introduce to the messages passed through them. Some
- media provide a certain audience, that is the target of a message can
- be selected without fear of additional surveillance. If you do not
- know who might be in the room it makes sense to watch what you say.
- Further, some media prevent the identity of message creators to be
- known with certainty if at all. With so much variation in different
- kinds of media it is not hard to imagine that their character alters
- the kinds of messages that are sent through it, and, by extension, the
- kinds of social action and interaction that will develop around it.
- This is not technological determinism, but rather a solid materialism:
- technologies change the fabric of the material world which in turn
- changes the social world. The terrain of interaction in virtual
- communities is different in some powerful and subtle ways, some forms
- of interaction translate well into a virtual space, others do not. In
- all cases, people are actively drawing upon their understanding of
- interaction and improvising in the gaps, some of which are cavernous.
-
- There are six aspects of virtual interaction that have a significant
- impact on the kinds of interaction that can take place within them.
- First, virtual interaction is aspatial, increasing distance does not
- effect the kind of interactions possible. As a result the economies
- of copresence are superseded and assembly becomes possible for groups
- spread widely across the planet. This may have profound implications
- on the organization of space; just as the telegraph enabled the
- construction of the modern multi-national corporation by solving the
- problem of control from a distance, virtual spaces may undermine the
- economies that lead to the development of cities. Indeed, there is a
- growing movement for the relocation of many business activities to
- rural areas. This is made possible by the ease and economy of
- electronic communication that makes any space as good as any other.
- As a result criteria other than proximity can determine the selection
- of sites for various activities. Second, virtual interaction via
- systems like the WELL is asynchronous. While not all virtual
- interaction is this way (notable exceptions include the IRC system and
- the growing proliferation of MUDs ), conferencing systems and email do
- allow interaction partners to participate in a staggered fashion. One
- person leaves a message and at some other time another reads and
- responds to it. This has a major impact on the coordination necessary
- for the assembly of a group. Face-to-face interaction requires a high
- level of coordination since all participants must be copresent in both
- time and space. Conferencing systems, by contrast, allow people
- separated by time zones, work schedules, and other activities to
- interact with minimal coordination. Despite the lack of immediate
- interaction, the interactions created in many conferencing systems do
- exhibit a high level of responsiveness and dynamism usually associated
- with real-time interaction.
-
- The current text-only nature of most virtual interaction leads to
- another unique aspect: without copresence, participants are acorporal
- to one another. This may have profound implications since many of the
- process of group formation and control involve either the application
- or potential for application of force to the body. In a virtual
- space, there are no bodies. As noted before, while the communications
- "bandwidth" of most communities is quite rich and capable of nuance
- and fine texture through the use of communications devices like voice,
- gesture, posture, dress, and a host of other symbol equipment, most
- virtual communities allow their participants to signal each other only
- through the use of text.
-
- The absence of the body in virtual interactions might lead some to
- dismiss the possibility of virtual community. Indeed, interaction in
- a virtual space has been described as "having your everything
- amputated" Rather than preclude the formation of community, however,
- the effective absence of the body in virtual interaction
- simultaneously highlights the role of the body in real-space while
- liberating the individual from many of the restrictions inherent in
- bodies. And while telephone conversations are also acorporal, virtual
- communities also have the capacity to facilitate the interaction of
- large groups of people, far beyond telephone conferencing could
- reasonably support. Further, as noted above, because participants are
- not limited to real-time interaction, the task of coordinating
- interaction participants is greatly eased. In addition, the qualities
- of being aspatial and potentially asynchronous expands the pool of
- potential participants of virtual communities beyond that of most
- space-bound ones. It is not uncommon to settle into a long and
- satisfying discussion with someone who lives on a different continent
- while in a virtual community. But without the power of presence to
- enforce sanctions and evoke communion, written and virtual communities
- face unique challenges, a point I will take up again in this paper.
-
- Closely related to the acorporeality of virtual interaction is its
- limited "bandwidth" . Most users of the WELL and other virtual
- communities use computers equipped with telephone-line interfaces
- (modems) that allow for the exchange of information at speeds of 2400
- baud (bits-per-second) to 14,400 baud. These speeds effectively limit
- the quantity of data that can effectively be transmitted. As a result
- interaction in virtual communities remains firmly entrenched in a
- text-only environment. This has some interesting effects. The first
- is that virtual interaction is relatively astigmatic. As Goffman used
- the term, stigma are markings or behaviors that locate an individual
- in a particular social status. While many stigma can have negative
- connotations, stigma also mark positively valued social status.
- Without the ability to present ones self to others in virtual
- interaction, many of the stigma associated with people are filtered
- out. Race, gender, age, body shape, and appearance, the most common
- information we "give-off" to others in interaction, are absent in a
- virtual space. The result can be both positive and negative: the
- information we give-off helps to coordinate social interaction,
- identifies likely interaction partners, and may serve to minimize
- conflict by identifying likely antagonisms. Without such signals
- additional work must be done to enable interaction and to signal
- status and location to other potential interactants. At the same
- time, this limitation makes discrimination more difficult. The result
- may be that participants judge each other more on the "content of
- their character" than any other status marking.
-
- Finally, the preceding five characteristics combine to make virtual
- interaction fairly anonymous. This leads directly to issues of
- identity in a virtual space. In many virtual spaces anonymity is
- complete. Participants may change their names at will and no record
- is kept connecting names with real-world identities. Such anonymity
- has been sought out by some participants in virtual interactions
- because of its potential to liberate one from existing or enforced
- identities. However, many systems, including the WELL, have found
- that complete anonymity leads to a lack of accountability. As a
- result, while all members of the WELL may alter a pseudonym that
- accompanies each contribution the make, their userid remains constant
- and a unambiguous link to their identity. However, even this fairly
- rigorous identification system has limitations. There is no guarantee
- that a person acting under a particular userid is in fact that person
- or is the kind of person they present themselves as. The ambiguity of
- identity has led some people to gender-switching, or to giving vent to
- aspects of their personality they would otherwise keep under wraps.
- Virtual sociopathy seems to strike a small but stable percentage of
- participants in virtual interaction. Nonetheless, identity does
- remain in a virtual space. Since the userid remains a constant in all
- interactions, people often come to invest certain expectations and
- evaluations in the user of that id. It is possible to develop status
- in a virtual community that works to prevent the participant from
- acting in disruptive ways lest their status be revoked.
-
-
- Figure2. Summary of defining characteristics of Virtual Communities.
- The arrow denotes a derivative effect.
-
- Theory
- In this section I will examine some work that bears closely on the
- development and dynamics of the WELL. A significant body of theory
- has developed to address the question of collective action and the
- provision of collective goods but first I should note that there has
- been some useful and high quality research on the role of electronic
- communication in groups. The effects of email on organizations has
- been discussed by Zuboff (1988), Kerr and Hiltz (1982), and Chesebro
- and Bonsall (1989). Generally, their studies have been limited to an
- examination of email and their findings to the fact that electronic
- communication alters the hierarchy of communication within
- organizations, often resulting in shifts of power. These works offer
- some insight into virtual communities but suffer from one
- short-coming: all concern themselves with organizations in which order
- has been imposed by an external force. Most of the email systems
- studied have been inserted into existing institutional structures and
- thus offer little insight into the emergence of new collectivities or
- their maintenance through the use of electronic communication. The
- virtual community studied in this paper does not have an over-arching
- institutional structure to explain why its members are present or to
- offer an external source of power for imposing order on the
- interactions found within themselves.
-
- As a result, the central questions asked by theories of collective
- action are underscored: how is order achieved and maintained in the
- absence of external authority? The common appeal to external
- authority simply begs the question of order for two reasons. First,
- there is the empirical evidence of groups endogenously creating the
- order they need to produce and consume the goods they need and want.
- Second, appeals to external authority ignore the second order
- cooperation necessary for the existence of the external authority.
- Endogenous order is logically prior to exogenous order.
-
- Theories of Communities and Collective Action
- The term community is ambiguous. It is used to describe groups that
- range from neighbors to nations and levels of solidarity from the
- personal to the professional. Generically, a community can be
- understood as a set of on-going social relations bound together by a
- common interest or shared circumstance. As a result, communities may
- be intentional or unintentional, a community's participants may
- purposely join together or be thrust into membership by circumstance.
- Intentional communities are of particular interest because they raise
- more questions about the reasons and causes for their emergence than
- do unintentional ones. Where unintentional communities are amenable
- to structural explanations, economic, social, and political forces are
- often directly evident, explaining intentional communities requires an
- inquiry into the motives of its participants.
-
- Despite the ease with which the term is used, there is no single
- characteristic that easily defines what a community is or identifies a
- particular social formation as a community without ambiguity. The
- level of solidarity evident in a community, for example, can vary
- greatly and communities can often be competitive rather than
- cooperative. While the term community is often associated with the
- notion of cooperation and collective contribution to a common good,
- exclusive focus on this aspect of community obscures the fact that
- communities, even those clearly engaged in the construction of
- collective goods, are frequently marked by conflict and divisiveness.
- Nonetheless, the presence of cooperative action is indeed a
- distinguishing mark of communities; a community can be said to have
- failed when it is no longer able to foster any cooperation among its
- members.
-
- Network theory, by providing useful tools for the illustration of the
- structure of communities, may be able to provide more exact
- definitions of community in the form of particular geometries of
- social networks. Communities might be definable as a set of
- overlapping networks of communication that remain stable for some
- duration and, in their intentional form, are capable of acting
- collectively towards a particular end. Strong communities might be
- marked by high levels of interconnectivity and frequent interaction
- along those network connections. By contrast, networks that are
- arranged in severely hierarchical forms along the lines of a formal
- organization do not fulfill one of the commonly held conditions of
- community: while communities may certainly have governing bodies and
- be stratified, they are not normally rigidly or formally structured.
- The dynamism of a set of social interactions and the autonomy of their
- participants may help distinguish a community from other otherwise
- similar social groups. Most importantly, a network model may be able
- to empirically illustrate what may be the single defining
- characteristic of a community: boundaries. The kind of boundary that
- defines a community is a major determinant of the kind of community,
- intentional or not, that it contains. An unintentional community can
- be defined as one that has externally enforced boundaries. The
- process of membership in a community, therefore, may be an active or
- passive one.
-
- Often, definitions of community include the existence of commonly held
- ideas, perceptions, and understandings. For Michael Taylor (1987),
- for example, "... community... mean[s] a group of people (i) who have
- beliefs and values in common, (ii) whose relations are direct and
- many-sided and (iii) who practice generalized as well as balanced
- reciprocity." (p. 23) This definition has many strengths. It opens
- up the question of the relationship between intersubjectivity and
- community, makes explicit the range and richness of interactions with
- a community, and suggests a potentially powerful criteria of
- evaluation. The first element is not as simple as it may seem. While
- in many communities members do indeed share common cognitive
- processes, ideological homogeneity is not a necessary condition of
- community. It may be entirely absent in unintentional communities and
- only minimal in intentional ones. Nonetheless, many communities are
- marked by their commonly held and constructed ideologies and it can be
- argued that widely held and accepted ideas that explain, justify and
- compel continued individual contribution to a collective's projects
- often pay a critical and decisive role in community formation and
- survival. Ideas matter and their role should not be dismissed or
- ignored. Nonetheless, capturing their effect with precision has been
- a notoriously difficult task, it is easy to get lost down the long and
- rocky road of cultural studies and ideological critique. The process
- whereby an individual comes to perceive and embrace an idea, and in so
- doing accept or reject a line of action, touches upon the central
- questions of consciousness.
-
- Taylor's last point is of special importance. The presence of
- generalized as well as balanced reciprocity is further illustration of
- the diversity of community relations, but I assume that Taylor places
- special value on the presence of generalized reciprocity. Since one
- of the defining characteristics of community is its comparatively long
- duration, and given the advantages of credit systems, communities are
- often able to support systems of generalized reciprocity.
- Essentially, communities may provide resources for the redress of
- infractions and forfeitures of debts that might not otherwise be
- redeemable. Social pressure, from insult to incarceration, to make
- good on all debts helps communities maintain the essential collective
- good of trust. The benefit of maintaining a generalized accounting
- system (one that allows for credit and does not demand intensive
- monitoring) is supported by experimental research (Kollock, 1992) in
- which it was found that generalized accounting systems yield much
- greater mutual benefit than tight systems that demanded in-kind
- exchanges at all turns.
-
- Towards a definition of community
- Cooperation, communication, duration, stability, interconnectivity,
- structure, boundaries, intersubjectivity, and generalized accounting
- systems, however inexact, are all certainly characteristics of
- community and at worst are useful guides to their identification and
- evaluation. Nonetheless, even the unanimous presence of each of these
- characteristics does not ensure the success of a community. I noted
- earlier that a community could be considered a failure when it is
- incapable of fostering any level of cooperation among its members.
- Such a community is perhaps one in name only. A successful community,
- by contrast, is capable of directing individual action towards the
- construction and maintenance of goods that could not be created by
- individuals acting in isolation. There are many familiar collective
- goods; common pastures, air and watersheds, and fishing groups are
- common examples. But, despite the existence of many notable
- exceptions, collective goods are difficult to maintain and are often
- short lived. The continued production and availability of any
- collective good depends upon the existence of a sufficient level of
- commitment of the community's members and the application of
- appropriate systems of monitoring and sanctioning. But every
- collective good is plagued by some form of a collective action
- dilemma, a situation in which actions that are rational for individual
- members of the collective are irrational, that is either less
- beneficial or even tragic, when repeated across a collectivity. At
- each moment of their participation in the production of a collective
- good individuals face the, sometimes latent, choice to commit to some
- aspect of collective action or to defect from participating. This
- choice is framed by the fact that the reward for defection is often
- greater than that for cooperation. The result is a pervasive
- temptation to escape the demands of collectives while remaining within
- them in order to reap their rewards. As a result, communities can be
- fragile things. Collectives must exercise two forms of power to
- maintain their common goods, first, they must restrain and punish
- individual actions that exploit or undermine collective goods through
- monitoring and sanctioning, and second, maintain the commitment of
- members to continued participation and contribution through rituals
- and other practices that increase the individual's identification with
- the group and acceptance of its demands. Since neither form of power
- is easily achieved or maintained a number of theories have developed
- to identify and explain the reasons some communities are successful
- and others fail.
-
- The Elements of Successful Community
- While there is fairly wide-spread agreement that these two forms of
- power are the definitive elements of successful communities, there is
- far less agreement as to how to create and most effectively wield
- these forms of power. Mancur Olson, for example, stresses the
- importance of group size on its likelihood of success. He argues that
- size is inversely related to success, as a group grows the costs of
- communication and coordination rise threatening the existence of the
- collective. This is an idea that has attracted a great deal of
- criticism. Michael Taylor (1987) argues that "Olson's first claim in
- support of the "size" effect... is not necessarily true. It holds
- only where costs unavoidably increases with size or where there is
- imperfect jointness or rivalness or both. Most goods, however,
- exhibit some divisibility, and most public goods interactions exhibit
- some rivalness." (p. 11) As a result, Taylor believes that "The size
- effect that I think should be taken most seriously is the increased
- difficulty of conditional cooperation in larger groups." (p.13) Small
- groups do possess a special quality that enables them to maintain
- themselves with greater ease than larger groups. In particular, small
- groups are usually able to provide high levels of communication
- between each member of the group while maintaining high levels of
- surveillance of each members activities, especially his or her
- contributions and withdrawals to and from the group's resources. This
- "small group effect" is a powerful one, but it does not exclude or
- even explain the possibility of successful large groups. One
- significant aspect of virtual communication may be the way in which it
- alters the economies of communication and coordination, thus making it
- possible for larger groups to "succeed" with less effort and
- difficulty.
-
- If size is not a necessary determinant of success, what is? Rosabeth
- Moss Kanter, Michael Taylor, Michael Hechter, and Peter Kollock have
- various answers. Each focuses on a somewhat different aspect of the
- organization and practices a group employs to explain the group's
- likely success or failure. Briefly, Kanter focuses on the
- construction of commitment, identifying three broad methods for its
- construction. Hechter provides a schematic of the steps necessary for
- a good to be effectively produced. Taylor looks at the kinds of goods
- to be produced, revealing that the character of a good in many ways
- controls the ease with which it and those who produce and consume it
- may be controlled. Kollock, in contrast, looks at the systems of
- monitoring employed by members of a collective and the effect of
- distortion on communication between members to identify methods which
- reliably yield more productive arrangements.
-
-
- The Construction of Commitment
- The availability of communication is not alone sufficient for
- successful organization. Those paths of communication must be used to
- engender commitment and to enforce compliance. Kanter (1972) examines
- intentional communities to identify the mechanisms by which they
- maintained sufficient levels of commitment in each of their members.
- She recognizes that particular material practices have
- phenomenological impact. Some, in particular circumstances, can have
- the effect of generating in their subjects self-restraint and willing
- contribution to the production of collective goods. The general
- presence of such inclinations is often referred to as solidarity. But
- Kanter does not suggest that communities survive by goodwill alone.
- She notes that the presence of practices that enable surveillance and
- effective control over pay-offs, both sanctions and rewards, are the
- real foundation of successful communities and provides a short catalog
- of commitment mechanisms that were present in the successful examples
- of the intentional communities she surveys, where success is equated
- with the longevity of the collective. Success in her study is defined
- as the survival of a group longer than one 25 year generation. She
- examines data on 30 examples of historical intentional "utopian"
- communities that flourished in the United States from 1780 to 1860,
- seeking in each indicators of the presence of particular strategies in
- each category of commitment maintenance. Successful communities
- fostered attachment, dependence, and obedience through the reduction
- of individual difference, the provision of a common risk and share of
- collective goods, and the maintenance of distinct boundaries with
- everything not in-group.
-
- Kanter identifies three elements of the process of producing
- individual commitment to a community, the cognitive, cathectic and
- evaluative. Cognitive processes involve the evaluation of potential
- profits and costs of participation in a collective labor, cathectic
- process entail the emotional and affective bonds created between
- coparticipants in a collective labor, and evaluative process entail
- the use and acceptance of the collective's standards of behavior. A
- collective's success, according to Kanter, is directly related to its
- capacity to foster and maintain all three forms of connection between
- the individual and the collectivity.
-
- Kanter further divides cognitive mechanisms into sacrifices and
- investments. The former increases the "costs" of membership, while
- the latter increases the benefits of continued membership. All
- collectives make use of strategies to manage these forms of
- contribution. But commitment mechanisms need not necessarily involve
- the evaluations of cost and benefit implied in these above categories.
- Cathectic commitment involves emotional attachments to relations
- within the collective and are thus not directly dependent on the
- continued return on the investment of participation. Emotional
- involvement in a collective takes two forms: renunciation and
- communion. The former highlights the abandonment or diminishment of
- relations outside the collective, the latter highlights the process of
- incorporating group identification into individual identity.
- Communion involves the positive construction of affective solidarity.
- Ritual practices, sometimes woven into productive practices, restate
- and reassert the ideological principles that justify membership and
- commitment. Evaluative commitment involves the use and acceptance of
- the collective's schema of interpretation of their behavior and the
- behavior of others. This inevitably involves moral judgments of
- proper conduct and contribution. To the extent that a collective is
- able to capture central elements of identity within group practices of
- validated meanings, the individual is bound more closely and tightly
- to the group.
-
- Each of these processes takes place within the WELL, albeit with
- modification. The communities in Kanter's study are all face-to-face
- communities of people who have an economic dependence upon one
- another. This condition does not hold in the WELL where its members
- come together to satisfy needs and wants beyond their immediate
- material survival. Nonetheless, interactions within the WELL do
- exhibit these processes and are perhaps more important there since no
- physical coercion is possible. The costs of membership in the WELL
- are primarily money and time, the payoff useful knowledge and
- membership in a collectivity. Attachment is generated quite strongly
- at times, creating a condition known as "Well Addiction" in which
- members find themselves participating in the WELL to the exclusion of
- other activities. The generation of communion effects will be taken
- up again below.
-
- Economies of Commitment
- Hechter (1988) develops this theme further. He notes that monitoring
- and sanctioning systems have their own economies and their relative
- costs determine whether groups can bring them into use and to what
- effect. Furthermore, there are a number of steps that must be taken
- before these mechanisms can be put into use. First, there is the
- entrepreneurial task of organizational design, or production rules,
- the costs of which can be prohibitive. Second, collective acceptance
- of a particular production scheme must be achieved. It is here that
- conflicting interests and preferences complicate the process of
- collective organization. Third, the production rules must be
- maintained. Individual commitment must be maintained and defectors
- identified and punishment applied. This involves the problem of
- assurance, the conviction that committed contribution to the
- collective good will be reciprocated by all interaction partners.
- Hechter argues for the necessity of formal rules and controls:
- "Whatever its specific causes, sub-optimal production of the joint
- good leads the group to unravel. In order to attain optimal
- production, formal controls that assure high levels of compliance with
- production (and distribution) rules by monitoring and sanctioning
- group members must be adopted." (p. 18) The dilemma facing groups is
- that such systems of organization are themselves collective goods
- which must be produced and maintained: "Yet since these controls are
- themselves a collective-good, their establishment has been difficult
- to explain from choice-theoretic premises." (p. 18)
-
- The construction of formal systems of regulation has been repeatedly
- avoided by the members of the WELL, a point that offers some evidence
- critical of Hechter's argument. Members of the WELL have diverse
- backgrounds but seem to share an unwillingness to construct
- regulations and formal sanctioning systems for their interactions.
- Nonetheless, a number of collective goods continue to be produced as
- will be noted below.
-
- The Character of Collective Goods Michael Taylor's work (1987) expands
- on Hechter's system by describing the kinds of collective
- organizations that are possible and their relations to the goods they
- seek to control. He examines the type of goods groups can produce,
- categorizing them on the basis of the type of boundaries that can be
- placed around them and the manner in which they are produced and
- consumed. For example goods can be excludable or not. An excludable
- good offers the collective the power of denying access to anyone who
- does not contribute to its production. Goods can be rival or not:
- some goods are diminished by their consumption: two people can not eat
- the same bite of food. Further, some forms of consumption reduce the
- value of the remaining resource (for example adding pollution to a
- stream.) But not all goods are rival and some are even strongly
- anti-rival: information can in some cases be like this. [Ex: the more
- widely accurate knowledge of AIDS is distributed the more developed
- the common good. Further, a newspaper, once read, is not necessarily
- diminished in value.] Similarly, some goods are divisible: it is
- possible to quantize the good, electrical power is an example, while
- others are not, public safety while expressible in terms of a crime
- rate is not easily decomposed into units of safety. Some goods are
- exhaustible and others renewable. Fossil fuels are a primary example
- of the former. But many goods have rates of sustainable use,
- fisheries, pasture land, and pools of credit can regenerate
- themselves. Nonetheless, even a renewable resource can be exhausted
- by overuse. Some goods require active production while others require
- regulated access. Resources are not only collectively drawn from but
- also collectively contributed to. A common pool resource can be more
- than physical resources like fish or pasture-land. CPRs can also be
- social organizations themselves. Markets, judicial systems, and
- communities are all common resources. These kinds of resources have
- the added element that they must be actively reconstructed, where fish
- will remain in the sea whether they are fished or not, a judicial
- system will not persist without the continued contribution of all of
- its participants. Further, institutions are just one form of a social
- common pool resources. The far less formal settings that enable
- particular kinds of interaction are also common goods.
-
- The goods produced and maintained in the WELL are primarily the
- product of on-going discussions and the relationships that they enable
- and embody. In Taylor's schema, the WELL's goods are not very
- excludable, the contents of public conferences are open to all
- members. However, the existence of backchannels of communication,
- such as email, and private conferences, allow for some goods to be
- excluded. Indeed, private conferences, as a result of their enhanced
- capacity to exclude access to some other group of members, are able to
- produces certain goods that could not otherwise be generated. For
- example, private conferences often contain discussions of sensitive or
- personal issues that rely upon a high level of trust between
- co-participants. But, whether public or private, the goods in the
- WELL are not rival, increased use of the information generated by the
- WELL, as is the case with many forms of information, does not diminish
- its value. Furthermore, the goods derived from the WELL are not very
- quantizable, although access to the WELL is. These qualities mean
- that the WELL is faced with a difficult task as a result of the
- qualities of the goods it produces. Without control over the
- boundaries surrounding goods, Taylor suggests, the likelihood of
- continued successful production is diminished. An illustration of this
- is offered below.
-
- Accounting Systems and Misunderstandings
- Kollock (1992) extends Taylor's examination of the nature of the
- collective goods a group seeks to produce by including the
- communications environment. Some environments allow for easy
- communication between members of a collective or partners in a trade.
- In such cases individuals are able to express and display their
- intentions, either to cooperate or defect, and thus may be able to
- create a situation of assurance. Once assured of cooperation, members
- may themselves be more inclined to cooperate. However, many
- environments make such communication and display difficult or
- ambiguous. In cases where communication can not be relied upon
- coordination and thus cooperation becomes more difficult. This is
- especially true when the criteria of sanctioning is rigid and
- retaliatory. In cases when a defection is met quickly with a
- counter-defection, cooperation quickly dissolves. However, when
- defection is met with a more relaxed accounting system, cooperation is
- more likely to be maintained. This is especially true when
- communication, and thus certainty that a partner did in fact defect,
- is ambiguous and capable of generating "false positives".
-
- Moving from a restricted to a general accounting system is by no means
- an easy task. At the very least it is necessary that someone take on
- the entrepreneurial task of creating a more relaxed system and drawing
- a significant number of members into acceptance of these rules.
- Members often have strong grounds for refusing to cooperate,
- especially if they do not believe that others will abide by the rules
- or if there are outstanding "debts" they would be required to abandon.
- Creating a sense of assurance, then, requires a great deal of work and
- public demonstrations of acceptance. The frequent disputes that
- emerge in the WELL have led some people to believe that a more relaxed
- accounting system is necessary and they have started topics to garner
- public acceptance of the system:
-
- Topic 104: THE SLACK COMPACT: A General Custom to Replace Rules
- # 1: My other account is on the Internet (boswell) Wed, May 20, '92
- (11:04) 32 lines
- TTHE SLACK COMPACT:
-
- In the name of Gopod, Amen. We, whose names are underwritten, the Loyal
- Users of the WELL, by the Grace of Gopod, of Internet, of PCConnect, of CPN
- and PacBell e&.
-
- Having undertaken for the Glory of Gopod, and Advancement of the Universal
- Connectivity, and the Honour of our System and Virtual Community, to create
- the finest telecommunications colony in Cyberspace; do by these presents,
- solemnly and mutually in the Presence of Gopod and one of another, covenant
- and combine ourselves together into a civil Body swearing to cut each other
- slack at all times, IN ALL CONFERENCES SAVE ONE, and in all manner possible
- for our better Ordering and the Preservation of Online Peace of Mind, and
- Furtherance of the Ends aforesaid; And by Virtue hereof to enact,
- constitute, and frame, this solumn compact of the STATE OF SLACK, that it
- shall enable us to respond in a forthright manner or to create topics as we
- so choose and yet recall that the GIVING OF SLACK shall be held to be the
- state as shall be thought most meet and convenient for the General good of
- the WELL and all other systems that we shall inhabit; unto which we promise
- all due submission and obedience.
-
- In Witness whereof we have hereunto subscribed our names at well.sf.ca.us
- the Month of May, in the Reign of our Sovereign Sysop, fig of Mill
- Valley,Sausalito, and California Anno Domini, 1992.
-
-
- While some members embraced this effort,
-
- Topic 104: THE SLACK COMPACT: A General Custom to Replace Rules
- # 13: Andrew L. Alden (alden) Wed, May 20, '92 (14:22) 5 lines
-
- As the descendant of a signer of the Mayflower Compact, I am honored to
- affix my name and userid herebelow to the document hereinabove and for now
- and hereafter.
-
- Andrew L. Alden alden
-
- Topic 104: THE SLACK COMPACT: A General Custom to Replace Rules
- # 14: Frank Miles (fhm) Wed, May 20, '92 (14:25) 1 line
-
- Slack, yes, by all means.
-
- others reacted with a significant amount of resistance:
-
- Topic 104: THE SLACK COMPACT: A General Custom to Replace Rules
- # 6: set phasers on scribble (axon) Wed, May 20, '92 (13:00) 11
- lines
-
-
- very amusing, gerard. you want to rip off my words and ship them to
- the worldnet, you want to drag a cadre of filthy camp-followers
- through my parlor, you want to build your online reputation on the
- creativity and effort of brighter lights than yourself, and then you
- want me to give you *slack*?
-
- i've got your slack right here, pal. go fuck yourself, wheelock. and
- the horse you rode in on.
-
- The move to institute this compact, like many other calls for the
- reform of behavior on the WELL, yielded no formal rules or clearly
- developed set of new normative standards. But by bringing the issue
- into public discussion, it may have served to highlight the problem in
- the minds of the members and provide some standard by which
- evaluations of behavior will be made in the future.
-
-
- Data:
- Collective Goods in a Virtual Space Despite the lack of physical
- contact and the minimal exchange of material goods between members of
- virtual communities, a number of goods are produced and consumed.
-
- Topic 29: What does the Well *do* for users?
- # 1: another user (gail) Sun, Nov 17, '91 (14:59) 25 lines
-
- When I started, I wanted information.
- Then I wanted to play and frolic... using my theater background.
- Then I wanted to be sincere and contradictory and fully human.
- Then I wanted interaction, brilliant intellectual syntheses and paradoxes
- and great collaborative problem solving.
- Then I wanted community.
- Then I wanted inspired group improvisation with emotion, spirit and
- analytical thought all permitted and appreciated.
- Then I wanted not to get in anybody's way.
- Then I wanted to be able to sit at an ascii conf. table or firecircle or
- whatever and chime in whether I was agreeing or questioning, and to be
- confident that if it wasn't important, my remarks would be properly ignored.
-
- The best to me is personal epiphanies and clarifications of different world
- views, and perhaps best when actually serendipitous... but this is a matter
- of taste and trust, I've just grown up with disdain for the synthetic, and
- had to learn to question as well as honor that disdain.
-
- I'm still here out of a mixture of gratitude and a kind of rash bravado taht
- if there's no reason for this, I'll be able to tell, and I'll stop posting.
-
- My doubts have to do with my lack of specific useful knowlege.
-
- What keeps us here?
-
- These goods can be categorized as various forms of capital. Members
- of the WELL produce two forms of capital in abundance, although not
- every member of the community is able to make equal use of these
- resources. The first form of capital is social network capital, the
- WELL expands the number of social relations available to an
- individual. This is also understood to be the primary mission of the
- management and staff of the WELL:
-
- Matisse Enzer - Tue 14 Apr 1992 in Topic 46:
- WELL Customer Support Policy
-
- The main thing that The WELL provides is a computer conferencing
- environment. This is a place for people to meet each other and
- exchange ideas and thoughts in a conversational fashion. After
- access, our next priority is the maintainance of the conferencing
- environment and helping people to use the basic features of that
- environment: Reading conferences, Posting in conferences and Finding
- material you are interested in.The main thing that The WELL provides
- is a computer conferencing environment.
-
- Other organizations do this as well: churches, clubs, and associations
- provide individuals with new contacts and expand their potential and
- realized networks, but the WELL and other virtual communities provides
- instant access to ongoing relationships with an even larger and more
- diverse group of people than most face-to-face organizations provide.
- Further, because virtual communities can rely on the structure of
- computer software, individuals can quickly seek out and join groups
- interested in exactly the same interests they hold. While it is
- impossible to pick up the phone and ask to be connected with a group
- of people interested in Jazz or comic books, or raising a child with
- disabilities, that is exactly what virtual communities provide. In
- effect the segmented architecture of virtual communities can be
- imagined as a vast convention with groups congregating around signs
- that advertise their intended topic of discussion. The result is a
- kind of electronically maintained set of Schelling points, social
- magnets for particular interests. This is reflected in the statements
- of members of the WELL who frequently cite access to other people as
- one of the main purposes for their community:
-
- Topic 28: WELL's Mission Statement -- What Would it Be if it Existed?
- # 1: Sharon Fisher (slf) Mon, May 4, '92 (09:18) 2 lines
-
- Bringing people in touch with each other, who might not otherwise meet, to
- discuss all types of issues.
-
- Topic 28: WELL's Mission Statement -- What Would it Be if it Existed?
- # 2: demontiki (jdevoto) Mon, May 4, '92 (09:53) 3 lines
-
- Providing ways to communicate.
- Building communities.
- Tying people into the world net.
-
- Topic 28: WELL's Mission Statement -- What Would it Be if it Existed?
- # 6: Matisse Enzer (matisse) Tue, May 5, '92 (19:26) 10 lines
-
- Here's a "statement of core values" the staff came up with last July -
- we felt that this was a good PRELUDE to a mission statement, but is
- not a mission statement itself:
-
- The WELL's core values are building and maintaining
- RELIABLE, EXPANDING, COLLABORATIVE telecomputing systems
- that support and environment of stimulating conversation
- and ENCOURAGE CREATIVITY, DIVERSITY and TOLERANCE
-
- Topic 28: WELL's Mission Statement -- What Would it Be if it Existed?
- # 42: Matisse Enzer (matisse) Sat, May 16, '92 (15:51) 5 lines
-
- The new version of the WELL brochure will say:
-
- ACCESS TO PEOPLE AND IDEAS
-
-
- Topic 28: WELL's Mission Statement -- What Would it Be if it Existed?
- # 52: Larry Moss (lsm) Wed, May 20, '92 (13:25) 12 lines
-
- Ok, here's a sketch for a small piece of a statement:
- Bringing people together means more than just having them occupy the same
- space at the same time. In electronic communication, we find aspects of
- *community* which are sometimes similar to, and somtimes different than,
- the communities we are all part of. For example, politeness, anger, and
- friendliness show up on the WELL, and by now there are norms (but not
- hard-and-fast rules). Also, the WELL tries to be a worldwide community
- and still have a small-scale feel. Part of our purpose is to
- investigate "virtual community", to find out what works and what
- doesn't. As a self-conscious virtual community, we hope that our
- experience will be useful in building others.
-
- These networks established around particular subjects are themselves a
- collective good, but they are also the foundation for two other goods,
- knowledge capital and communion. Other goods no doubt exist, but
- these categories capture much of the goods the community produces.
- The first is a feature of most communities but is especially
- pronounced in the WELL and other virtual communities as a result of
- the heavy presence of symbolic manipulators, a term for individuals
- whose profession involves the creation, use, and modification of
- representations. The definition is clearly broad and perhaps does not
- cut cleanly, there is a sense in which all humans are symbolic
- manipulators, but the term seeks to highlight the fact that WELL
- members are likely to be lawyers, teachers, musicians, programmers,
- and writers. They are typically professionals of one sort or another
- who are at home with text and have a facility with ideas and their
- manipulation. As a result they are a population that is, perhaps,
- more likely to value information and have a continuing demand for
- unconventional information.
-
- Topic 22: Dealing With Strangeness
- # 12: Not His Real Name (rbr) Sun, Apr 26, '92 (15:32) 2 lines
-
- Why would someone who didn't want to learn anything sign on to the WELL in
- the first place?
-
- For these people, the WELL serves as an information resource of a kind
- that no collection of reference books can match. In this "information
- age", the problem many symbolic manipulators face is not a lack of
- information but a glut. Faced with vast quantities of information,
- getting just the right piece can be a formidable task. The WELL acts
- as an organic knowledge filter; each of its thousands of users sift
- through large amounts of information, they often hold expertise on
- one subject or another, and each can be drawn upon by others in the
- community. One of the most common phrases in the WELL is "Does
- anybody know..." This is best illustrated by a topic in the News
- Conference entitled "Experts on the Well" which has the explicit
- purpose of bringing the collective knowledge of the group to bear on
- any individual's question or problem.
-
- Topic 1050: Experts On The WELL
- By: All The Fits That's News (phanson) on Mon, Sep 14, '92
- 315 responses so far
-
- Continued from topic 1023 ... got a question or problem that only an
- expert can answer or solve? Well, we got lots of experts right here
- on the WELL ... ask your question here, and watch the answers come
- rolling in ...
-
- Questions range widely, from the technical:
-
- Topic 1050: Experts On The WELL
- # 3: Stephen David Fishman (sfish) Tue, Sep 15, '92 (12:26) 2 lines
-
- I have a Mac LC with a Seiko color monitor. All of a sudden the picture has
- started shaking. What could be causing this? (It's very annoying.)
-
- Topic 1050: Experts On The WELL
- # 4: Will Work for Pay (chuck3) Tue, Sep 15, '92 (13:19) 1 line
-
- The blow dryer. (Or any squirrel-cage motor like that.)
-
- Topic 1050: Experts On The WELL
- # 5: Call me Fishmeal (pk) Tue, Sep 15, '92 (13:22) 1 line
-
- An electric clock next to the monitor.
-
- To the culinary,
-
- Topic 1050: Experts On The WELL
- # 15: Frag Botch (jpgordon) Wed, Sep 16, '92 (10:49) 9 lines
-
- Here's something that's been puzzling me for quite a while.
-
- How is caviar removed from the sturgeon?
- Now, obviously, the easy way is to kill the fish, yank out the eggs, end
- of story. But that seems wasteful to me, since mama sturgeon could have
- lots of years of caviar-making, so I wonder if some caviar is removed frothe
- fish non-fatally?
-
- Vegetarians who occasionally crave fisheggs want to know.
-
-
-
- To the practical,
-
- Topic 1050: Experts On The WELL
- # 82: Steven Schiff (stevens) Sun, Sep 20, '92 (22:17) 2 lines
-
- Any Bay Area financial institutions that still offer free checking accounts,
- no per-check charges, no minimum balance?
-
- Replies are not guaranteed, however:
-
- Topic 1050: Experts On The WELL
- #157: Jordan S. Gruber (jordan) Fri, Sep 25, '92 (17:13) 4 lines
-
- I just wanted to say that this is the first time I've asked a serious
- question of the "Experts" and felt like I've been totally blown off
- by people who weren't very open, nice, or understanding. You know who
- you are.
-
- In part this is due to the individual personalities of the members of the WELL:
-
- Topic 1050: Experts On The WELL
- #158: Howard Rheingold (hlr) Fri, Sep 25, '92 (17:21) 1 line
-
- He's a well-known asshole, Jordan. Don't let it throw you.
-
- Topic 1050: Experts On The WELL
- #160: Fewer Distractions (hudu) Fri, Sep 25, '92 (19:04) 2 lines
-
- Why struggle to answer a hard question when you can change the subject
- instead? It's the Expert Way.
-
- Since in many cases the information passed up and back within the WELL
- can have great value for the appropriate individual, the question that
- comes to fore is why would anyone pay two dollars an hour to give away
- valuable knowledge. The answer does not lie within the technology: a
- for-profit venture called the American Information Exchange (AMIX) was
- founded in 1991 on the principle that information is a commodity that
- should be exchanged for a fee. Using the similar technologies as used
- by the WELL, AMIX sells knowledge for prices that range from a dollar
- to many thousands. In contrast, the WELL operates on a kind of gift
- economy. The WELL offers a different good than monetary gain, it
- offers status within a group. Being knowledgeable in the WELL and
- being free with your knowledge is a sure way to gain status, friends,
- and visibility. As with any community, the WELL's most effective
- reward is recognition. As a result visible reciprocity is a major
- means of increasing status. There is no requirement on the WELL that
- answers be given however, or that members even read the Experts topic.
- As a result, the topic must provide participants with some reason to
- continue. In the absence of tangible rewards, like payment, the
- Experts topic relies on recognizing cooperative experts and
- reasserting the purpose and order that should hold in the topic. When
- irritated, participants may act to disparage the topic or the
- questioner. Doing so calls the continued existence of the conference
- into question:
-
- Topic 1050: Experts On The WELL
- #163: Mister Shotgun, exercising his rights (jeffreyp) Fri, Sep 25, '92
- (20:40) 1 line
-
- Those who request free advice get what they pay for.
-
- Reasserting the nature of the topic is often all that is necessary to regain its
- momentum:
-
- Topic 1050: Experts On The WELL
- #164: Howard Rheingold (hlr) Fri, Sep 25, '92 (21:08) 3 lines
-
- That hasn't been the spirit of this topic in the past. People have
- often been able to get good answers here, along with all the
- predictable smart-assery. I'd like to see that continue.
-
- Topic 1050: Experts On The WELL
- #166: Really Doddering Greying Dreadnaught (onezie) Fri, Sep 25, '92
- (21:56) 5 lines
-
- >#164
-
- It indeed has NOT been the spirit of this topic in the past. And
- 'twould be a real loss if jeffreyp's attitude prevailed in this
- topic in the future.
-
- Accusations of guilt provide a way of locating blame for a disruption, but they
- do not return the topic to its
- collaborative decorum. Frequently, a call to solidarity and understanding does
- the trick:
-
- Topic 1050: Experts On The WELL
- #167: hope is an obligation (jdevoto) Fri, Sep 25, '92 (22:39) 3
- lines
-
- Well, sometimes no one knows the answer. When that happens, questioners
- sometimes need to remember that answering is a gift, not a requirement,
- and attitudinize accordingly. We all help in this topic when we can.
-
- But failure to receive recognition for a contribution can be the source of some
- irritation and disruption in a
- discussion. For example, in a topic about the extension of access to systems
- like the WELL to low income
- and other non-technical people a member of the WELL offered a pointer to a
- system in operation in the
- San Francisco area. When another member gave credit for the pointer to a third
- party, she was irritated
- enough to create a new topic and post the following:
-
-
- Topic 60: What am I doing here?
- # 1: Kathleen Creighton (casey) Tue, Aug 11, '92 (22:39) 22 lines
-
- Something I've posted in this conference has been (again) blatantly ignored.
- This is the third or fourth time this happened *in this conference*. It
- happens to women all the time, but it's the first time that it's happened
- systematically and repeatedly *to me*.
-
- I don't understand what the problem is.
-
- Perhaps I don't have any credibility in this field? WELLbeings who've
- been involved in telecomm issues on the WELL for some time know better.
- In fact, it generally has not been old-timers who've been doing this to
- me because they know that I have researched these issues in certain venues
- for quite some time.
-
- Perhaps it's because my user id isn't "hlr"? Well, these are issues near
- and dear to Howard's heart, but I know he's working his rear end off for
- this book and like anyone else, he's having to *research*. He didn't
- wake up one morning knowing everything there is to know about this subject.
-
- I could repeat my "credentials" (which I have to do occasionally) but I
- have a feeling it wouldn't make any difference.
-
- I will say this, though. I'm sick to death of it.
-
- The collected intelligence and memory to be found in virtual
- communities has led some to speculate about their power to amplify
- mental capacity and there is some evidence to support the idea: a
- collective mind is a powerful force. But participation and
- contribution in such exchanges are not uniform or of equal quality.
- The exchange of information in the WELL is a form of commodity, and as
- with any valued good, it is not distributed equally. However, while
- not every question is or can be answered, once answered any member of
- the WELL has equal access. Most of the WELL is "public", it is
- accessible to all users .
-
- Despite the frequency with which WELL-members make use of their
- community as an information resource, it is by no means limited to an
- information market. The kinds of relations maintained within the WELL
- are diverse, as diverse, or nearly so, as found within a face-to-face
- community. While relations that depend on the copresence of bodies
- are clearly impossible, this does not mean that relations within the
- WELL are impersonal or dehumanized. Far from it. The third
- collective good in the WELL is communion. By this I mean to capture
- the sense of membership that is found in more traditional communities.
- Membership is, along with community, an ill defined term. At minimum,
- membership involves rights, obligations, and some modification of
- identity. Communion also suggests a non-instrumental contact with the
- group, an emotional bond. But can people come to have emotional
- attachments to one another without ever facing each other? As the
- history of romantic correspondence shows, the answer is emphatically
- yes. And this can be seen again in the WELL. WELL-beings, or
- WELL-ites, often turn to one another for more than information that
- can be parlayed into other forms of capital. Within the WELL people
- turn to each other for support during crises and camaraderie during
- triumphs.
-
- Topic 29: What does the Well *do* for users?
- # 3: Woody Liswood (woody) Tue, Nov 19, '91 (20:05) 4 lines
-
- Because the WELL is my personal support group. A place for ideas about what
- I'm interested in, where everyone is equal, where ideas count more than
- the person putting them forward, and besides, its fun.
- --Woody
-
- A conference on the practical and the emotional challenges of
- unemployment opened on the WELL at the beginning of this summer,
- on-going discussions and grieving for the death of loved-ones
- continue, and an on-line funeral followed the death of a prominent
- WELL-member. The capacity to organize and focus the energies of a
- widely scattered group is one of the most powerful aspects of virtual
- interaction, a power that is frequently applied to the emotional and
- personal needs of members of the community:
-
- Topic 9: WELL as Collaborative Tool
- # 79: Gail Williams (gail) Thu, Oct 1, '92 (16:35) 12 lines
-
-
- A collaboration for which the Well is a tool-to-make community is going on
- in topic 401 in parenting.
-
- Bunch of well folks got together to make bright colorful tie-dies lab coats
- for lhary who's undergoing hospitalization for leukemia. And they decided
- to buy him a wall hanging as well, for the most colorful room on the floor.
- People joined in online to raise trhe money for th egift.
-
- Should anyone doubt for a moment that the tool can work wonders... or want
- to join in the support network, g parenting.
-
- Obstacles to the provision of collective goods
-
- For all the positive goods virtual communities like the WELL are able
- to produce there are equally challenging obstacles to their continued
- production. The obstacles to the continued existence and development
- of the WELL involve maintaining membership, expanding that membership,
- socializing new members, maintaining the infrastructure of the
- community (the computer's hardware and communications systems), and
- dealing with the potentially disruptive actions of its members. If
- members find the cost of participation, for whatever reason, is too
- great, and subsequently withdraw, the community and the goods it
- produces will collapse. Alternatively, if members find that they are
- able to enjoy the benefits of the collective good without contributing
- to its production, then, too, the community may collapse for want of
- active participants.
-
- Virtual communities are no exception to this dilemma. The continued
- existence of the web of social networks, upon which the other
- collective goods are built, depends upon a number of factors. First,
- members must come to the WELL. The WELL is a quintessential
- intentional community. Unlike communities that form as an accident of
- place or circumstance, individuals must take a series of complex and
- very intentional steps to go to the WELL. It is unlikely that anyone
- would arrive there even accidentally. Therefore, individuals must
- find something of value in the WELL. Given the wide availability of
- other virtual communities, this challenge is even greater: no borders
- constrain nor does any personal influence or sanction compel
- individuals to participate in the WELL. Indeed, at $2/hour, a fairly
- effective fence blocks casual access. And while technical advantages
- may draw some users to some systems, for example America On-line, a
- competing information system, offers an elegant, appealing and
- intuitive graphical interface to its community and its information
- services, the WELL, by comparison, offers no windows, mouse support,
- icons, or graphics, only pure ASCII . The continued success of the
- WELL can be explained only by the one thing that it has exclusively:
- its members. Individuals may not come to the WELL because of the
- people who are already there (although personal referral is a common
- route for newusers and the reputation of the WELL is widely known in
- the on-line community) but they often stay (and leave) because of
- them. Many of the subjects discussed on the WELL (although not all)
- can be found elsewhere, but the discussions often merely act as a
- structure around which lasting relationships are built.
-
- Population Pressures While attracting members is a significant task
- for communities, retaining members and socializing new members is even
- more so. Currently the WELL is undergoing a massive immigration. As
- the population of computer-literate people who have access to
- telecommunications resources has grown, so has the size of the WELL.
- Starting with a mere 150 users in 1985, the WELL grew to 1,500 users
- by 1987, 3,000 users by 1989, and has exploded to over 6,000 members
- currently. The recent connection of the WELL to the much larger
- Internet promises to bring even more newusers into the community.
- Currently 300 newusers signon each month. However, population
- pressures have transformed what was once a small village into a
- burgeoning town on the verge of becoming a city. The change has not
- thrilled some members who have decided to leave the community. About
- 150 users signoff the system each month, although it is not clear how
- many do so because of growth nor how many are old versus recent users.
- The result is a net growth of 150 users.
-
- Participation
- Despite the influx of new users, most users of the WELL do not
- actively participate in its construction. Recent statistical analysis
- shows that 50% of all postings in the WELL are generated by 1%, some
- seventy people, from the larger 7000 person population.
-
- Topic 880: WELL posting stats
- #100: Jim Rutt (jimrutt) Tue, May 26, '92 (08:23) 13 lines
-
- Well Posting has gotten a little bit more concentrated since January 1991:
-
- Top N% of WELL subscribers produced
- % of total postings January 1991 May 1992
-
- 50 1 1
- 80 4 3.3
- 90 6.5 5.8
- 95 10 8.5
- 99 16 15.4
-
- Members who do not post (commonly referred to as "Lurkers") do help
- support the community. Access to the WELL requires payment and even
- inactive use of the WELL helps maintain it. However, the WELL has
- suffered to some extent because of the limited participation and steps
- have been taken to expand member's activity. However, these efforts
- have not had any great effect on participation.
-
- Transgressions and Sanctions Much research on violations of community
- standards stresses the importance of sanctions. In these works,
- sanctions are seen as a form of boundary, a fundamental condition of
- successful communities and collective goods. Sanctions are necessary
- to lock out transgressing members from the good they are disturbing.
- This has been a particularly difficult task for the WELL because of
- its ideological tenets. Virtual communities, however, have a number
- of technically facilitated tools at their disposal to provide various
- kinds of sanctions. Members of the community can be denied their
- right to enter the community, either temporarily or permanently.
- However, the same individual might be able to enter the community
- using a different identity. The value of virtual identities
- (sometimes referred to as on-line persona) provide some restraint on
- this practice while always offering the possibility of new-beginnings.
- Alternatively, a member may be denied the right to continue to
- contribute to the community, their ability to write to the discussion
- can be cut-off. However, since continued contribution is actually the
- good being produced, doing so can be counter-productive. As a
- temporary sanction however, this can be useful. In addition,
- humiliating stigma can be added to the user's identifying markings, or
- a public repudiation of their activities can be made. Each of these
- techniques is unilateral, the owners/operators/governing bodies of
- virtual communities can decide to enact any of these sanctions without
- regard to the actions of their subject. By comparison, public
- apologies require some cooperation.
-
- Since continued participation in the various discussions that make up
- the WELL is the main form of contribution individuals make to the
- collective (in addition to their hourly fee and, in some cases,
- technical and administrative contributions) the right of individuals
- to remove or withdraw their contribution is of central concern to the
- collective. The WELL's policy concern contributions has been worked
- out through a long and intense process. The resulting policy is that
- the WELL recognizes the ownership of all contributions by their
- contributor. This policy is often referred to as YOYOW (You own your
- own words). The YOYOW policy has resolved many problems that face
- virtual communities, especially concerning the quotation of
- contributions found in the WELL in outside services or publications.
- The YOYOW policy encourages continued contribution by protecting and
- retaining all external uses to their contributor. The policy
- contrasts starkly with that of other, often larger, commercial
- services, such as Prodigy and Compuserve, which claim ownership of all
- contributions made within their systems.
-
- The YOYOW policy is extended in private conferences. A private
- conference is an option open to all members of the WELL. On request a
- member can create a conference that is both invisible and inaccessible
- to all other users unless they are informed of its existence and
- invited to participate. There are a number of private conferences on
- the WELL, and the number has grown recently as the influx of newusers
- has created a strain on the public conferences. This strain is
- related to the problems of socializing newusers to the history and
- norms of interaction in the WELL. Private conferences are used as a
- kind of "virtual suburbs" where old users can relax with other
- hand-picked members. Private conferences are used for other reasons
- as well. The Men on the WELL and Women on the WELL conferences
- require permission to enter them from their hosts. This is intended
- to screen out all members of the opposite gender from participation.
- In addition there are a number of private conferences geared to the
- discussion of sensitive issues. For example, private conferences
- exist for the discussion of sexual abuse and substance dependency,
- although these by no means exhaust the topics of private conferences.
-
- A widely held norm coupled with technical limits to access form the
- boundaries of private conferences. No one who has not been added to a
- special list (called a ".ulist") can access a private conference and
- participants to such conferences are granted access on the basis of
- their willingness not to discuss or repost messages exchanged within
- private conferences. These restrictions are important for private
- conferences to engender a sufficient level of trust to allow
- participants to express otherwise embarrassing or sensitive or just
- personal information to one another. Therefore, it makes sense that
- violations of this trust are grounds for the application of sanctions.
- However, as the following case illustrates, the WELL has been
- unwilling to implement formal sanctioning systems. This has led to a
- number of problems.
-
- Some background is necessary to illustrate this case. Over the past
- year the WELL has suffered from a series of technical problems. As
- the membership of the WELL has expanded the hardware and staff needed
- to maintain it have been strained beyond their limit. The result is
- frequent system crashes which make the WELL inaccessible to all users,
- sometimes for an extended period of time. The frequency of these
- service failures has generated a substantial amount of irritation and
- criticism and led some of the most frequent users of the WELL to be
- concerned about its future. A group of concerned members, a
- significant number of which were hosts of various conferences, created
- a private conference to discuss the future of the WELL. Proposals
- were put forth about the potential need to resite the WELL community,
- either on another system like GEnie, or in a new set of hardware owned
- and operated by the hosts themselves. This discussion at times became
- heated and confrontational. Given the importance of the topic, some
- members suggested that a private conference was an inappropriate forum
- for the discussion. It was decided that more people be invited to
- participate in the existing private conference and that it would then
- be made public. However, because of the kinds of heated contributions
- to this conference, the group decided that the existing conference
- would be deleted and a new public one created in its place. However,
- prior to its deletion, one of the participants copied the entire
- conference to a file in his personal directory. While it was stored
- there another user was able to copy the file to his directory. He
- then proceeded to email a number of members of the WELL who had not be
- party to the private conference alerting them to the existence and
- contents of this file. This transgression was quickly discovered and
- a new topic was created to discuss the infraction. The topic revealed
- that there was consensus that a norm or rule of the WELL had been
- violated.
-
-
- policy.111.29: Cliff Figallo (fig) Mon 22 Jun 92 12:07
-
- I was informed of this episode on Saturday. I chose not to take any action
- since to begin using root privilege at this point to delete files contained
- in a user's home directory is not the sort of precedent I want to set in my
- last month here.
-
- I will say, though, that on the face of it, making private conference
- material publicly readable is unethical given our understing of the nature
- of private communication in this medium. We all know that people will say
- things privately that they would not say publicly. We all know that to dash
- the expectations of privacy ruins trust not only in the system but in each
- other. We have a loose system here because we want it to be that way. We
- could all move to other more secure commercial systems if security was our
- main concern. But we have to be able to trust each other to some extent to
- have what the WELL has.
-
- If the perpetrator feels betrayed by the existence or methods of the
- Backroom conference, that is one thing. To hold private discussions hostage
- as a sort of punishment is not the way to make things right.
-
- But while private conferences are recognized as private, there exists no formal
- sanction for transgression
- of this norm. Given the potentially sensitive nature of any private conference,
- a number of users called for
- a sanction to be applied to the offending member.
-
- policy.111.32: Kim L. Serkes (kls) Mon 22 Jun 92 12:16
-
- Cliff slipped in...
-
- And the question still is: how do we deal with someone who's committing
- such a grave breach of our ethical standards?
-
- It's clearly wrong, the violation is clearly willful. Suspend the account,
- now.
-
- Suspension of the user's account is functionally equivalent to excommunication
- and is the most serious
- sanction available to the WELL. Perhaps for that reason and the WELL's
- libertarian philosophy, it is
- also the least commonly imposed. In the history of the WELL only two people
- have been banished and
- then only after extensive and long-term disruptive behavior. However, the
- appeal to norms without
- sanctions was recognized as a problematic solution:
-
-
-
- policy.111.39: Jon Lebkowsky (jonl) Mon 22 Jun 92 12:59
-
- > As long as private conference hosts make it clear that copying the private
- > material outside of the conference is verboten, we should have no problems.
-
- But at the moment we do have a rather serious problem, and it's not so
- much the specific act as what the response should be. I'm not sure that
- suspension is the answer, but if there's a serious breach, there should
- be a consequence. Determining the consequence is going to be tough if
- work case by case according to context, perhaps what we really need
- is a set of rules and a clearly stated sanction for particular breachers:
- e.g.: if you port private conference material to a public forum without
- permission, the result will be [fill in the blank, I'm not good at
- punishment].
-
- policy.111.43: Kim L. Serkes (kls) Mon 22 Jun 92 13:26
-
- Damn right, Scott!
-
- The stolen files are copies of material that the present holder was never
- intended to see. The topics were removed from the conference before this
- person was added to the ulist. This person has no right to the material.
- This person has no right to make the material public, as was done several
- times over the weekend by posting it.
- Further, this person has not merely _failed_ to preserve the privacy of
- this material, but has actively made it available to others, and to any
- curious person who knows where to look.
-
- I feel that when there is an egregious violation such as this, the WELL has
- a duty to take action.
-
- While some blame may attach to the person who originally copied the files,
- that was simple (near unto simple-minded, but let the pern who hasn't
- locked himself out of his own WELL account cast the first synapse...)
- negligence. The present holder of those files is acting with evident
- malice. Since this is persistent and wilful, and since other, innocent
- parties, are being harmed, compulsion is called for.
-
- This is an example of what Hechter identified as the first step of the
- organization necessary for the creation of a collective goods
- producing organization: the entrepreneurial construction of rules and
- a system to enforce them. However, Hechter assumes that this process
- must be successful for a collective to continue to produce their
- goods. The members and management of the WELL show a strong
- reluctance to produce such formal controls, despite the fact that
- transgressions of this norm do threaten the collective good.
-
-
- policy.111.51: Howard Rheingold (hlr) Mon 22 Jun 92 17:41
-
- I think Cliff's caution is well-founded. Do we REALLY want to give the
- WELL the power -- and the responsibility -- to police what people keep
- in their private file areas?
-
- We could solve some problems by encrypting private conferences, but
- who has the responsibility to prevent members of the conference, who
- legitimately have the decryption keys, from printing out the plaintext
- and leaving it on their desks? Either physically or virtually?
-
- I don't think that rules are going to cover this. Trust has to be a
- norm, not a rule. And communities need to be informed when there are
- untrustworthy people about.
-
- And I don't think we are ever going to achieve the kind of privacy
- we thought was possible here before the duck incident. Clearly, he is
- an example of the kind of person who strongly believes that the ends
- justify the means. You can't stop people like that. You can, however,
- let it be known that you have reason not to trust them. Ultimately, I
- think that's our only recourse.
-
- Nonetheless, some members of the WELL felt strongly that a already existent rule
- or norm had been
- violated and demanded formal sanctioning from the management of the WELL, the
- only agent with the
- power to deny member's access to the community.
-
- policy.111.55: Bob Ulius (rebop) Mon 22 Jun 92 19:30
-
-
- What kls said. Exactly.
-
- Either distributing contents of a private conference is wrong, or it isn't.
- Either posting private email is wrong, or it isn't. I tend to think both go
- against what the majority of users here would like to see. And if true,
- someone needs to do more than ignore transgressors. Like jstraw, I believe,
- said above, without any rules and teeth here we have a field day.
-
- Faced with the possibility that WELL management would not impose a sanction,
- members turned to forms
- of sanctioning that were within their control:
-
- policy.111.62: Andrew L. Alden (alden) Mon 22 Jun 92 20:54
-
- Why don't we do what we did to whats-his-name who lifted some gab from
- politics and posted it elsewhere without permission? That is, expose him to
- full public opprobrium. Isn't anyone ready to name names and use our only
- weapon?
-
-
-
-
- policy.111.63: Michael Newman (jstraw) Mon 22 Jun 92 21:15
-
- that was a public conf
-
- if TPTB , who offer private confs as part of this system's service are not
- willing to create an enforce a rule that simply states "distribute the
- contents of a private conf and you're outta here" then they are gutless in
- the extreme
-
- this isn't such a case specific incedent, allowing duck to get away with
- this calls into question the viability of all private confs
-
- there is only one way to counter the scenario in Scotts #42
-
- I think the hosts of any private conf duck is on the ulist of should
- boot him at once
-
- The topic quickly polarized along the lines of formal - informal
- sanctions. Those who supported the idea of informal sanctions argued
- in part that the media in which their interactions took place ruled
- out the possibility of effective sanctions, at least in part because
- the variety of transgressions could not be codified sufficiently to
- allow for a just application of sanctions.
-
- policy.111.65: pseud (hank) Mon 22 Jun 92 21:28
-
- I feel about as uninvolved in this as it's possible to get, for a
- longtime WELL user/host -- I wasn't aware of or invited to the
- private conf, nor sent any copies or pointers to files, nor even
- reading often enough to see much of what`s been posted and scribbled.
-
- It seems to me to be yet another iteration of the old old WELL
- argument -- do we want rules, and thereby create a higher power
- than ourselves responsible to enforce them, or can we use this
- tool to become neighbors if not friends?
-
- In real neighborhoods people chop down one another's trees, drain
- stormwater into one another's basements, ding one another`s cars,
- break one another's windows, keep one another up all night or early
- in the morning ... how is this different? Do we call the cops every time?
-
- Seems to me the people who didn't invite me to get all upset about this
- in the first place did me an honor. I recommend scolding, tsking, and
- relaxing about the whole thing -- and that people with private conferences
- forbid any copying of material by anyone, member or not, of the material
- if they want control of it and think they can somehow, someway enforce that.
- I don`t see any hope of such control working in cyberspace, and think we
- may have to get used to it or be supplanted by people who don't freak out
- when it happens.
-
- Through backchannels of communication (email) the management of the
- WELL contacted the offender and encouraged him to delete the illicit
- files. While it is not clear what forms of sanction had an effect,
- the offender left the system of his own accord within a week of the
- discovery of his actions. In the process, he deleted many of his
- contributions to the WELL.
-
- policy.111.230: Michael Newman (jstraw) Tue 30 Jun 92 06:56
-
- duck has deleted almost all of his directory
-
- policy.111.233: Pete Hanson (phanson) Tue 30 Jun 92 11:54
-
- He also hasn't logged in since Jun 24.
-
-
- Following his departure the discussion continued with some members expressing
- regret at his absence and
- others partially satisfied but still calling for formal rules and sanctions.
-
- Decorum
- Fundamental to any community is the maintenance of a decorum that
- encourages the continued membership and participation of all
- participants. If some members become hostile, abusive, or visibly
- violate the system of reciprocity, other members may become reluctant
- to continue to participate. The problem exists in the WELL as much as
- in physical communities, perhaps more so for its acorporeality.
- Without the threat of physical sanction, some participants in the WELL
- find that they are more free to vent their frustrations or give free
- reign to their more hostile inclinations by attacking, mocking, or
- disrupting conversations and interactions. In some cases this can be
- tolerated within institutional bounds. The WELL, as most other
- virtual communities, has special locations for "flaming", the term
- used to describe excessively aggressive or abusive interactions. Some
- sections are marked as "free-fire" zones where people interact at
- their own peril. Surprisingly, these areas attract a great deal of
- attention and participation. A problem arises when such behavior
- occurs in unmarked areas. Inappropriate behavior has been the source
- of much discussion and conflict in the WELL where the community has
- been founded on principles of maximum individual freedom.
-
- Part of the problem is that boundaries remain somewhat undefined in
- the community and in most cases are not backed by publicly recognized
- norms or sanctions. This is especially problematic when the
- collective goods produced require the maintenance of a decorum that
- encourages continued contribution. Since most of the goods produced
- in the WELL are generated through a process of discussion, maintaining
- the tone of discussion becomes a major requirement for the continued
- success of the collective. This is problematic for a number of
- reasons. Discussions are fragile things. They are susceptible to
- disruption from misinterpreted messages, from a failure to stay on
- topic, and from interruption. Furthermore, disruption can be highly
- context dependent. The WELL has a number of conferences, most notably
- the Weird conference, in which no rules of order are claimed to exist.
- This makes Weird a particularly rough-and-tumble place in the WELL.
- Character assignation, ridicule, parody, and invective are common
- features of discussion in Weird. However, so long as this behavior
- remained bounded by the limits of the conference, the content of Weird
- did not often interfere with the interactions found in other
- conferences.
-
- However, early this summer, a group of Weird members invaded a
- conference entitled Misc. While Misc shares the somewhat unfocused
- nature of Weird, it is not intended to be as confrontational. Members
- of Weird added new topics to the conference that had no relevance to
- the flow of the discussion so far and added new posts to existing
- topics that sought to derail the flow of the topic. The raid
- immediately generated a new topic to discuss the policy about
- conference disruptions. As is common for incidents like this one in
- the WELL, the discussion quickly polarized between those calling for
- the creation of new rules and those who wanted to keep conflict
- resolution in the realm of informal sanctions.
-
- Topic 99: Policy regarding deliberate disruption of conferences
- # 1: Kim L. Serkes (kls) Tue, Apr 21, '92 (13:34) 23 lines
-
- I'm opening this with an (edited) repost of a response from hosts, my
- apologies to those who read it there.
-
- I, for one, want to get the message across that other people have different
- goals and visions of what can be done here, that you cannot disrespect them
- and disrupt their pursuit of those goals.
-
- The space addressed by "g weird" is, practically speaking, infinite. If the
- shape of that space doesn't suit what you want to do, you can create another.
- But attacking, to use Boswell's own metaphor, someone else's space is not
- acceptable.
-
- There are no limits on what you can do in "weird." There are limits
- on what can be done in other conferences. The fact that some people want
- to spend their (online) lives in free-fall, that they (claim) to have
- dissolved their egos and don't care about anything, doesn't affect the
- fact that others want to spend some time in a space where up and down
- are defined, where there is gravity, where boundaries exist.
-
- I believe that it should be established that the hosts and users of a
- conference have a reasonable expectation that they will not be subjected
- to intentional disruption.
-
-
- While at first glance it seems that such rules are essential for the continued
- existence of order in the
- community, the problems of monitoring and enforcement of such rules are
- significant. Because the
- WELL is constructed out of symbolic messages, it is subject to the same problems
- as the task of defining
- pornography:
-
- Topic 99: Policy regarding deliberate disruption of conferences
- # 2: Cliff Figallo (fig) Tue, Apr 21, '92 (13:42) 16 lines
-
- How do you define a "deliberate disruption of conferences"?
- If someone has a good train of conversation going in a topic and
- another user deliberately changes the subject or pronounces the
- topic "bogus" or "assinine", would that qualify? Would a Reagan
- Republican entering the Environment conference qualify? What if
- the Weird Raid had been less gross but was nevertheless planned to
- subtley drift every topic in another direction?
-
- How was the Weird Raid of more consequence than the sum total of
- certain individuals' disruptive effects on other individuals' posts
- spread out through many conferences over time? Do conferences have
- more rights than individuals?
-
- I'm just pointing out here that formal enforcement is, once again,
- full of pitfalls and could lead to unwanted results in the wrong
- hands.
-
- Nonetheless, there is reason to accept that disruption is a problem for the
- community and that the lack of
- protections or recourse creates limits on the kinds of interaction possible in
- the WELL:
-
- Topic 99: Policy regarding deliberate disruption of conferences
- # 7: Kim L. Serkes (kls) Tue, Apr 21, '92 (16:00) 29 lines
-
- Fig's points are good ones, of course. Those concerns are the reason
- that I'm not trying to codify what constitutes "disruption," but to
- leave those questions open. I think that a gang descending on a conference
- and posting off-topic or hostile responses in many topics constitutes
- disruption. A lone nut (to coin a phrase) zapping through a conference
- doing the same thing would be distruptive, too.
-
- The thought in my mind, as I started this topic, was not to "legislate"
- a precise definition of "disruptive," but to discuss whether such is
- an acceptable part of life on the WELL.
-
- I don't think that an _a priori_ definition is essential to the discussion.
- Conduct that would be disruptive in one conference might be acceptable in
- another. The question comes down to, in my view, is there any point to
- having defined conferences, with hosts and users allowed to shape them,
- or is the WELL a place where anyone can do anything, anywhere, any time?
-
- Of course, this discussion is formed in the context of the present incident.
- I believe that what happened in Misc would be regarded as disruptive in
- any conference, at any time. The perpetrators admit that their intent
- was disruption. It might stand as an example of disruption, not to
- exclude less serious incidents, or ignore the possibility of more serious ones.
-
- Likewise, I don't want this to be a "trial," or to be a forum calling for
- imposition of sanctions. That can be dealt with on a case by case basis,
- as it should be.
-
- The motive here is to determine what the underlying principle is, to attempt
- to indicate in a general way what's expected.
-
- Despite such arguments, the WELL is very reluctant to impose rules. However,
- they may be reason to
- believe that informal sanctions do work:
-
- Topic 99: Policy regarding deliberate disruption of conferences
- # 10: Jeanne DeVoto (jdevoto) Tue, Apr 21, '92 (16:06) 6 lines
-
- Well, it seems to me that the underlying principle is that you shouldn't
- fuck around with what other people are trying to do unless the entertainment
- and/or educational value outweighs the annoyance and disruption.
-
- This is not something that should require a policy statement; it should be
- intuitively obvious to anyone with enough of a forebrain to learn to type.
-
- Topic 99: Policy regarding deliberate disruption of conferences
- # 11: Howard Rheingold (hlr) Tue, Apr 21, '92 (16:17) 8 lines
-
- It seems that way, doesn't it? I wonder why it isn't?
-
- I think there is a strong temptation to blow off steam here, whether
- it is in a mean-spirited, cranky, or fun-loving way.
-
- I think the way norms are enforced are by endless braindeadening,
- increasingly hostile discussion. The punishment for transgressions is
- to have it expand to fill your attention.
-
- Nonetheless, this incident resulting in no formal rules or consensus
- on informal rules. The WELL remains subject to these disruptions.
-
- These episodes illustrate some of the problems facing a virtual
- community. First, many of the kinds of actions that are considered to
- be violations are only defined after the fact: too much of the
- environment is new and many actions can not be predicted. Second, the
- range of sanctions available to the community are not fine-grained
- enough to deal with minor infractions. Banishment, either from a
- conference or from the WELL as a whole is the only punitive sanction
- available and is often considered to be too severe for most
- transgressions. Informal sanctions in the form of ridicule, diatribe,
- and denunciation do have an effect but while they are capable of
- punishing offenders they are not very effective means to resolving
- conflicts. The WELL is armed with tools of repressive sanctions but
- not well stocked with restitutive sanctions. In part this is due to
- the nature of the media. In the transgression in question, the files
- that were "stolen" could have been stored anywhere on the system. To
- locate every copy would require that the management of the WELL scan
- every file it has stored. While technically feasible, this line of
- action is considered to violate the privacy of the community's members
- and is not a sure method of recovering all the copies of the files
- since it is possible to store them in a completely different system
- with little effort.
-
- The absence of a formal conflict resolution systems leaves the WELL
- vulnerable to the inevitable clashes that emerge between its members
- and the discovery of new ways to violate community norms.
- Nonetheless, the existing system seems to provide adequate resolution:
-
- " ` I mentioned that the WELL had a method of online dispute
- resolution which did not involve throwing people off the system,'
- Kapor said. 'I didn't mention that this works by endless rehashing of
- issues intermixed with invective until everyone is too tired to go
- on.' ("Socialising in Cyberspace", New Scientist, 16 May 1992)
-
- While this form of resolution through exhaustion can be said to work
- to a certain extent (the WELL continues to exist and grow) it is not
- the optimal form of organization. The conflict resulted in the
- departure of a regular and active member of the community and with him
- the withdrawal of his frequent contributions to the collective goods
- produced in the WELL. But, as Mancur Olson noted, the potential for a
- more efficient form of organization does not mean that such a form
- will be instituted. It has been argued in the WELL that formal rules
- are inappropriate to the medium in which the WELL exists. With the
- nearly limitless (un)real estate of cyberspace at their disposal it
- makes no sense to regulate behavior and impose limits on what remains
- a nascent form of interaction. Nonethless, as these examples make
- clear, challenges await those who wish to settle this terrain.
-
- Discussion:
- The most interesting questions about virtual spaces are not directly
- related to technology. Despite the intimate relationship between the
- tools and the actions built from or with those tools, it is the social
- understanding of a tool that determines its use. The distinction
- between tools and their use is sometimes not apparent, when tools
- become complex, and their name shifts to technology, the role of
- social interaction is often overlooked. The result is technological
- determinism, an unwarranted focus on the tool in place of its user.
- Therefore, it is important to locate a discussion and study of the
- ways in which new tools create new terrain for social interaction in
- the realm of social knowledge and interaction. Despite the unique
- qualities of the social spaces to be found in virtual worlds, people
- do not enter new terrains empty-handed. We carry with us the
- sum-total of our experience and expectations generated in more
- familiar social spaces. No matter how revolutionary the technology,
- our use of virtual spaces is evolutionary. The point of greatest
- interest, then, is that at which an old expectation collides with a
- new material force and new social structures are born through
- improvisation and negotiation. The medium is not the message, but it
- does shape and channel the kinds of messages it carries.
- But when a medium is very flexible and capable of some complexity,
- the ways in which a medium effects its contents can become less fixed.
- New technologies are sites of rapid creation, the event horizon of the
- social. Furthermore, the act of creation is rarely an individual one,
- without a collective effort the task of creation is often an
- overwhelming task.
-
-
- Suggestions for Future Research
- There has been so little research on virtual interaction that much
- basic work remains to be done. First, no census of virtual
- communities has taken place nor have there been any analyses of usage
- patterns or growth. Virtual communities offer unique opportunities
- for generating and collecting data on social interaction. The
- amenability of computer systems to searching, relating, and collecting
- data on processes they manage means that greater empirical rigor can
- be ensured in all forms of studies. However, it also raises some
- important ethical questions that connect social science research to
- the ethical and moral debates in the computer and information
- industries. I think the most promising path for further research
- involves the application of network analysis methods. These methods,
- which focus on the patterns of connections between individuals,
- promise to provide rigorous empirical maps of sets of social
- interactions. A process that is enhanced and improved by the presence
- of the phenomenon in a virtual environment.
-
- Conclusion:
- Governance and control: Herding mice The incidents described here
- provide evidence to dismiss the idea that interaction in virtual
- spaces is fixed, determined, and easily controlled and directed.
- Control over the physical technology of a virtual space is no
- guarantee of control over the social actions that occur within it.
- Intractable communities often defy the rule of their owners in many
- ways. Nonetheless, the power over the physical hardware along with
- the legal right to exercise that power, endows owners and managers of
- virtual spaces almost god-like control over individual users. Users
- can be banished, silenced, or publicly denounced with no chance of
- resistance. However, despite the existence of these powers, as shown
- here, it is often the case that they cannot or will not be used.
- These sanctions are often to coarse and too extreme for normal use.
- More subtle sanctions are needed and available to the community. If,
- as would seem to be the case, more social interaction will soon take
- place within virtual spaces, the question and challenges of social
- organization must be faced. The form of organization in place in the
- WELL is a kind of benign anarchy. It is questionable wheather this
- method can or will be applied to other virtual communities. While
- other systes, such as Prodigy and GEnie, operate with an absolutist
- regime, it may be possible that the economies of interaction and
- organization in virtual spaces makes a more anarchic form of
- organization a realizable and effective alternative. The history of
- the WELL provides empirical evidence that a mixture of public and
- private control over a collective good can effectively sustain the
- production and distribution of that good. In addition, it illustrates
- the fact that the character of a collective good is an essential
- element of the kinds of organizations that can be constructed to
- produce and maintain it. The peculiar qualities of information and
- interaction make the collective goods produced in the WELL sustainable
- in the absence of any significant formal sanctioning system. The
- exciting potential of virtual communities is that this capacity may be
- extendable back into the real-space of face-to-face interaction.
-
-
-
-
- Appendix A:
- The Structure of The WELL
-
-
-
-
-
-
-
- Appendix B:
- The WELL Conferences
-
- Best of the WELL - vintage material (g best)
- WELL "Screenzine" digest (g zine)
- Index listing of new topics in all conferences (g newtops)
-
- Social Responsibility and Politics
- ----------------------------------
-
- Amnesty International (g amnesty) Liberty (g liberty)
- Current Events (g curr) Non Profits (g non)
- Environment (g env) Peace (g peace)
- Firearms (g firearms) Politics (g pol)
- First Amendment (g first) Telecom Law (g tcl)
- Gulf War (g gulf) Veterans (g vets)
- Socialism (g workers)
-
- Electronic Frontier Foundation (g eff)
- Computers, Freedom & Privacy (g cfp)
- Computer Professionals for Social Responsibility (g cpsr)
-
- Media and Communications
- ------------------------
-
- Bioinfo (g bioinfo) Periodical/Newsletter (g per)
- Computer Journalism (g cj) Photography (g pho)
- Info Age (g boing) Radio (g rad)
- Media (g media) Technical Writers (g tec))
- Microtimes (g microx) Telecommunications (g tele)
- Mondo 2000 (g mondo) Usenet (g usenet)
- Muchomedia (g mucho) Video (g vid)
- Netweaver (g netweaver) Virtual Reality (g vr)
- Networld (g networld) Whole Earth Review (g we)
- Packet Radio (g packet) Zines/Factsheet Five (g f5)
-
- Business and Livelihood
- -----------------------
-
- Agriculture (g agri) Legal (g legal)
- Classifieds (g cla) One Person Business (g one)
- Consultants (g consult) The Future (g fut)
- Consumers (g cons) Translators (g trans)
- Entrepreneurs (g entre) Work (g work)
- Investments (g invest)
-
- Body - Mind - Health
- --------------------
-
- Aging (g gray) Jewish (g jew)
- AIDS (g aids) Men on the WELL* (g mow)
- Buddhist (g wonderland) Mind (g mind)
- Christian (g cross) Philosophy (g phi)
- Dreams (g dream) Psychology (g psy)
- Emotional Health** (g private) Recovery*** (g recovery)
- Erotica (g eros) Sexuality (g sex)
- Fringes of Reason (g fringes) Spirituality (g spirit)
- Health (g heal) Women on the WELL# (g wow)
- Holistic (g holi) Drugs (g drugs)
- * Private conference - mail flash for entry
- ** Private conference - mail wooly for entry
- *** Private conference - mail dhawk for entry
- # Private conference - mail reva for entry
-
-
- Cultures
- --------
-
- Archives (g arc) Spanish (g spanish)
- Buddhist (g wonderland) Pacific Rim (g pacrim)
- German (g german) Tibet (g tibet)
- Irish (g irish) Travel (g tra)
- Italian (g ital) History (g hist)
- Jewish (g jew) Virtual Communities (g vc)
-
- Place
- -----
-
- Berkeley (g berk) Northwest (g nw)
- East Coast (g east) Oakland CA (g oak)
- Environment (g env) Pacific Rim (g pacrim)
- Geography (g geo) Peninsula (g pen)
- Hawaii (g aloha) San Francisco (g sanfran)
- Midwest (g midwest) Southern USA (g south)
- North Bay (g north) Tibet (g tibet)
-
- Interactions
- ------------
-
- Couples (g couples) News (g news)
- Disability (g disability) Nightowls## (g owl)
- Gay (g gay) Parenting (g par)
- Gay (private)# (g gaypriv) Scams (g scam)
- Interview (g inter) Singles (g singles)
- Kids 91 (g kids) True Confessions (g tru)
- Miscellaneous (g misc) Unclear (g unclear)
- Weird (g weird)
-
- # Private Conference - mail hudu for entry
- ## Open from Midnight to 6 am
-
- Arts and Letters
- ----------------
-
- Art Com Electronic Net (g acen) Photography (g pho)
- Art and Graphics (g gra) Poetry (g poetry)
- Band** (g band) Radio (g rad)
- Books (g books) Science Fiction (g sf)
- Comics (g comics) Songwriters (g song)
- Design (g design) Bay Area Siggraph (g siggraph)
- MIDI (g midi) Theater (g theater)
- Movies (g movies) WELL Writer's Workshop* (g www)
- Muchomedia (g mucho) Words (g words)
- NAPLPS (g naplps) Writers (g wri)
- On Stage (g onstage) Zines/Factsheet Five (g f5)
-
- * Private Conference - mail sonia for entry
- ** Private Conference - mail tnf or rik for entry (for working musicians)
-
- Recreation
- ----------
-
- Bicycles (g bike) Gardening (g gard)
- Boating (g boat) Motorcycling (g ride)
- Cooking (g cook) Motoring (g car)
- Flying (g flying) Pets (g pets)
- Games (g games) Sports (g sports)
-
-
- Entertainment
- -------------
-
- Audio-videophilia (g aud) Movies (g movies)
- Bay Area Tonight# (g bat) Music (g music)
- CD's (g cd) Restaurant (g rest)
- Comics (g comics) Star Trek (g trek)
- Fun (g fun) Television (g tv)
- Jokes (g jokes)
-
- # Updated daily
-
- Education and Planning
- ----------------------
-
- Apple Library User's Group (g alug) Science (g science)
- Brainstorming (g brain) Indexing (g indexing)
- Design (g design) Network Integrations (g origin)
- Education (g ed) Transportation (g transport)
- Energy (g power) Whole Earth Review (g we)
- Homeowners (g home) Earthquake (g quake)
- Co-Housing (g coho)
-
- Grateful Dead
- -------------
-
- Grateful Dead (g gd) Deadplan* (g dp)
- Deadlit (g deadlit) Feedback (g feedback)
- GD Hour (g gdh) Tapes (g tapes)
- Tickets (g tix) Tours (g tours)
- Grapevine** (g grape)
-
- * Private Conference - mail tnf for entry
- ** Private Conference - mail rebop or phred for entry
-
- Computers
- ---------
-
- AI/Forth/Realtime (g realtime) NAPLPS (g naplps)
- Amiga (g amiga) NeXt (g next)
- Apple (g apple) OS/2 (g os2)
- Art and Graphics (g gra) Printers (g print)
- Computer Books (g cbook) Programmer's Net (g net)
- Desktop Publishing (g desk) Bay Area Siggraph (g siggraph)
- Hacking (g hack) Software Design (g sdc)
- Hypercard (g hype) Software/Programming (g software)
- IBM PC (g ibm) Software Support (g ssc)
- Lans (g lan) Unix (g unix)
- Laptop (g lap) Virtual Reality (g vr)
- Macintosh (g mac) Windows (g windows)
- Mactech (g mactech) Word Processing (g word)
- MIDI (g midi) CP/M (g cpm)
- Mac System7 (g mac7) Scientific computing (g scicomp)
-
- The WELL Itself
- ---------------
-
- Deeper (g deeper) Hosts (g host)
- Entry (g ent) Policy (g policy)
- General (g gentech) System News (g sysnews)
- Help (g help) Test (g test)
- Users (g users)
-
-
-
-
- Appendix C:
- The Virtual Communities Conference
-
- Welcome to Virtual Communities!
-
- Topic - Number of responses - Header
-
- 2 0 Conference Announcements
- <topic is frozen>
- 3 144 Introductions
- 6 9 Pointers to Relevant Topics Elsewhere in the WELL
- 7 177 The WELL as a community
- 8 64 Communities within the WELL
- 9 78 WELL as Collaborative Tool
- <linked topic>
- 10 109 Public Internet Access
- <linked topic>
- 11 199 AMIX - American Information Exchange
- <linked topic>
- 12 254 MUDs and MUSEs
- <linked topic>
- 13 61 You and your individual relationship with the WELL Community
- 14 51 Science and The Net
- <linked topic>
- 15 28 Habitat - a virtual community in Japan
- 16 151 Are you a *LURKER*???
- 17 10 The NSF's Internet Resource Guide
- 18 179 The WELL of the Future
- <linked topic>
- 19 1 Hosts, Moderators, Fair-witnesses... Those Who Commit to Being There
- 20 71 Online Personae: Boon or Bete Noir?
- 21 120 Oldtimers and Newusers
- 22 56 Dealing With Strangeness
- 23 9 The Roots of Computer Conferencing
- 24 42 The WELL in transition
- 25 70 Private conferences....the new virtual suburbs?
- 26 70 What are the characteristics of "community?" What makes one?
- 27 21 Using Metaphors to Describe Online Culture -- what are the limits?
- 28 52 WELL's Mission Statement -- What Would it Be if it Existed?
- 29 10 What does the Well *do* for users?
- <linked topic>
- 30 6 Online Community and Shared Work
- 31 31 What makes the Well special?
- 32 30 Those darn ineffable variations of virtual place
- 33 182 Online Governance
- 34 10 Control, Responsibility, and Commitment
- 35 33 WELLness
- 36 36 WELL Diaspora
- <linked topic>
- 37 12 On-Line Suicide
- 38 148 Online Metadiscussion as a Source of Irresolvable Conflict
- <linked topic>
- 39 6 The Salon, the Show, the Festival as Community
- 40 432 Designing an Electronic Democracy: What Does It Really Mean?
- <linked topic>
- 41 13 Businesses in the Virtual World
- 42 20 Other Virtual Communities
- 44 20 Communities, affinity groups, cliques, gangs: degrees of affiliation.
- 45 5 Usenet and Newsgroups as Virtual Communities
- 46 9 Realtime Communities? Chatlines, CB, IRC
- 47 21 College and identity, real and virtual community
- 48 16 The Wired Society and Crime Reduction
- <linked topic>
- 49 65 Metaphors for the WELL Experience
- <linked topic>
- 50 107 Zen and the Art of the Internet
- <linked topic>
- 51 206 Oral History of Bozo Filters on the WELL
- <linked topic>
- 52 21 Online Addiction/Obsession
- 53 17 Virtual Community vs. Christian Community
- <linked topic>
- 54 33 Online conversation--what do *you* like?
- <linked topic>
- 55 324 GEnie censorship
- <linked topic>
- 56 27 Picturing the Well: Numbers that tell the whole story.
- 57 45 Can Non-virtual Intentional Communities Be Developed "On-line"?
- <linked topic>
- 58 25 What do you know about radical right nets and BBSes?
- <linked topic>
- 59 34 Networks for Neighborhoods - encouraging digital diversity
- <linked topic>
- 60 68 What am I doing here?
- 61 97 Rules for fighting fair
- 62 20 Mindell & VCs
- 64 8 IRC basics
- <linked topic>
- 65 3 The Compassionate Party
- 66 89 Re-design the sdc conference?
- <linked topic>
- 67 80 Early Impressions of the Well
- <linked topic>
- 68 16 Living in a Virtual Tourist Town
- 69 20 Respect and Disrespect, Perception and Reality
- 70 16 From Virtual to Actual
- 71 26 I'm famous (on the WELL)
- 72 45 Sex in virtual communities
- <linked topic>
- 73 32 A Look At On-Line Relationships.
- 74 53 The Feeling of 'Place' on the WELL
- <linked topic>
-
-
-
-
- Works Cited
-
- Bullock, Kari, and John Baden. 1977. "Comunes and the Logic of the
- Commons." Pp. 182-99 in Managing the Commons, edited by Garrett
- Hardin and John Baden. San Francisco: Freeman.
-
- Curtis, Pavel. 1991. "Mudding: Social Phenomena in Text-Based Virtual
- Realities", Unpublished manuscript.
-
- Gibson, William, Neuromancer, 1984. New York: Ace.
-
- Hardin, Garrett. 1968. "The Tragedy of the Commons." Science
- 162:1243-48
-
- Hechter, Michael. 1990. "The Emergence of Cooperative Social
- Institutions." Pp. 13-33 in Social Institutions: Their Emergence,
- Maintenance, and Effects, edited by Michael Hechter, Karl-Dieter Opp,
- and Reinhard Wippler. New York: Aldine.
-
- Kanter, Rosabeth Moss "Commitment and Social Organization: A Study of
- Commitment Mechanisms in Utopian Communities," American Sociological
- Review 33:4 (August, 1968): 499-516.
-
- Kiesler, Sara "The Hidden Messages in Computer Networks," Harvard
- Business Review, January-February 1986.
-
- Kollock, P. 1992. "The Social Construction of Exchange," Advances in
- Group Processes, Vol. 9, 1992, Pp. 89-112.
-
- Kollock, P. 1991. "The Emergence of Cooperation in an Uncertain World:
- The Role of Generalized and Restricted Accounting Systems." Paper
- presented at the Annual Meeting of the American Sociological
- Association.
-
- Kollock, P. 1992. "The Emergence of Markets and Networks: An
- Experimental Study of Uncertainty, Commitment, and Trust." Paper
- presented at the Fourth Annoual International Conference of the
- Society for the Advancement of Socio-Economics, Irvine, 1992.
-
- Licklider, J.C.R. Robert Taylor, and E. Herbert, "The Computer as a
- Communication Device," International Science and Technology, April
- 1978.
-
- Messick, David M., and Marilynn B. Brewer. 1983. "Solving Social
- Dilemmas." Pp. 11-44 in Review of Personality and Social Psycology
- (Vol. 4), edited by L. Wheeler and P. Shaver. Beverly Hills, CA:
- Sage.
-
- Morningstar, Chip and F. Ranfdall Farmer. "The Lessons of Lucasfilm's
- Habitat" in Cyberspace, ed. Michael Benedickt, 1991, Cambridge: MIT
- Press.
-
- Oldenburg, Ray "The Great Good Place: Cafes, Coffee Shops, Community
- Centers, Beauty Parlors, General Stores, Bars, Hangouts, and How They
- Get You Through The Day," New York: Paragon House, 1991.
-
- Olson. Mancur, Jr. 1965. The Logic of Collective Acton. Cambridge, MA:
- Harvard University Press.
-
- Orbell, John, and Robyn Dawes. 1981. "Social Dilemmas." Pp. 37-65 in
- Progress in Applied Social Psychology (Vol. 1), edited by G.M.
- Stephenson and J.M. Davis. New York: Wiley and Sons.
-
- Ostrom, Elinor, Governing the Commons: The Evolution of Institutions
- for Collective Action. New York: Cambridge University Press, 1991.
-
- Quarterman, John S. The Matrix: Computer Networks and Conferencing
- Systems Worldwide, Bedford Massachusetts: Digital Press, 1990.
-
- Rheingold, Howard "Tools for Thought," Simon & Schuster 1986.
-
- Schelling, Thomas C. The Strategy of Conflict. 1960.
-
- Stone, Allucquere Rosanne, "Will the Real Body Please Stand Up?:
- Boundary Stories about Virtual Cultures", in Cyberspace, ed. Michael
- Benedickt, 1991, Cambridge: MIT Press.
-
- Taylor, Michael. 1987. The Possibility of Cooperation. Cambridge:
- Cambridge University Press. (pp. 125-79).
-
- Zuboff, Shoshana. In the Age of the Smart Machine: The Future of Work
- and Power, New York: Basic Books, 1988.
-
- Gibson, Neuromancer, p. 51. As a newly (re-)revealed territory,
- cyberspace evokes in many the visionary zeal created by previous
- frontiers. Utopic visions of new Albion, dreams of vast potential and
- wealth, and hopes for freedom and self realization abound in
- discussions of cyberspace. There is no doubt that cyberspace is a
- frontier, one that has opened up within the existing territorial
- bounds of society, and that it is one that may invalidate some of
- those bounds. It is a special kind of frontier: in this frontier
- there are no indigenous populations to displace, and with that absence
- the need to construct ideological justifications of manifest destiny
- and white-man's burden are also absent. But the fact that cyberspace
- is currently only sparsely populated does not mean that it is morally
- neutral. Far from it. What already exists in cyberspace, the vast
- collections of data and technologically instantiated systems of human
- organizations, are replete with human interest and ends. We should no
- more expect cyberspace to be exclusively a site of emancipation and
- self-realization than we should have expected the new world to be.
-
- Stone (1991) reports that the first Bulletin Board System (BBS), the
- CommuniTree, went online in May of 1978 in San Francisco. A BBS is
- often a fairly simple system, composed of a computer managed by
- special software connected to one or more modems (telephone
- interfaces) and phone lines. Typically a BBS will allow people to
- connect to it via a computer, modem and phone line, and, once
- connected, to leave messages for other users, upload (send) and
- download (receive) software, text files, and high resolution pictures,
- and even connect to one or more of the larger networks such as the
- Internet. BBS's are often run as a hobby, allowing access for little
- or no fee. In many cases, these systems are the site of the
- grass-roots growth of technologically mediated communities. BBSs
- range in size from a few users to hundreds.
-
- There are other objects that can be exchanged through virtual spaces.
- Software is perhaps the most common. Many systems allow software to
- be stored for later retreival by members of the community, and
- contribution to the collective's library of software is a common form
- of exchange. Images, often of photographic quality, along with
- computer generated artwork is also a common object of exchange. A
- significant minority of these images are sexually explicit, but they
- are also often of scientific or technical interest. As networks are
- increasingly refined they will be able to carry larger loads of
- information at greater speeds. As a result, the forms of
- representation will undoubtedly expand beyond the current text and
- limited graphics. Speech, music, moving images, and complex models
- will likely pass through networks with ease. How this will effect
- virtual communities based on text is an open and interesting question.
-
- The WELL has recently connected to the INTERNET, widening the scope of
- affordable access to encompass anywhere in the world with an INTERNET
- connection. The INTERNET currently serves 76 countries on 7
- continents and is accessed by over 15 million people. [Current data
- has been requested from John Quarterman of Matrix Industries, a
- company that specializes in network connectivity in general and the
- Internet in particular.]
-
- An alternative form of the header is generated by a program called
- "extract". This program creates a single line header like the
- following: policy.111.65: pseud (hank) Mon 22 Jun 92 21:28
-
- THE WELL HOST'S MANUAL, section 1.3, number 2. IRC stands for
- Internet Relay Chat. It is a multichannel text "CB" system in which
- users of the Internet are able to send messages to all others who
- have logged into the same "channel" at the same time. The IRC draws
- users from all over the planet.
-
- The term MUD (Multi-User Dimension) is used as a generic description
- for a multi-person virtual space in which users are able to perform
- textual equivelants of interaction in "real-time", that is
- synchronously. It differs from the IRC in that user are also able to
- construct and manipulate a wide variety of objects. As a result MUDs
- may provide a more complex environment for interaction than IRC.
-
- The term "bandwidth" is used to describe the carrying capacity of a
- communications medium. While bandwidth is often used in terms of
- quantifyable units like bits-per-second, even narrow bandwidth lines
- can carry nuanced and expressive messages. However, a narrow
- bandwidth line does sometimes preclude the exchange of various kinds
- of symbols. For example, most computer networks are currently
- incapable of exchanging full-motion video images.
-
- John Perry Barlow, Mondo 2000, Issue #1, p. 24
-
- A userid is a unique lable each member of the WELL community selects
- to identify their contributions to the community. Userids, however,
- need not have any relation to the individual's given or legal name.
- As a result, while the participant's on-line identity collects the
- results of their interaction, no connection is necessarily made to the
- "real" person.
- Defining what is sufficient can not be accomplished in the abstract,
- but it is clear that certain collective tasks do not require as much
- commitment as others. Where the economies of monitoring and
- sanctioning systems are favorable it may be possible for a collective
- to produce a common good with minimal self-generated commitment. In
- place of commitment effective coercion ensures sufficient contribution
- and regulated consumption.
-
- This term is introduced by Elinor Ostrom to describe collectively
- produced resources.
-
- However, there are private conferences, which are accesible only to
- those whose names are added to a list (called a .ulist) by the
- conference's creator. Private conferences have recently grown rapidly
- in number in the WELL, a point I will take up again below. ASCII
- stands for the American Standard Code for Information Interchange.
- Pronounced "Az-key", the term means that only letters and numbers are
- displayed within the Well, no facility is available for presenting
- graphics, pictures, sounds, or images. The result is a minimal
- environment that, nonetheless, supports a wide band of expression.
-
- Files on the WELL, like most UNIX-based systems, can be protected in
- various ways. Files can be public and readable and writable by anyone
- on the system, or read-only, or completely private. The file in
- question here was initially written as publicly read and writeable and
- later made private. It was in the intervening time that the file was
- copied.
-
- I use the term libertarian here loosely to denote a distinct
- disinclination to formal control systems and a reluctance to create or
- accept a higher authority and not to associate all members of the WELL
- with the Libertarian party or its specific platform or philosophy.
- Nonetheless, there is a visible segment of the WELL that does identify
- itself as Libertarian.
-
- Acronyms are a common form of expression in the WELL. TPTB = The
- Powers That BE.
-
- Mitchell Kapor, founder of the Electronic Frontier Foundation (EFF)
- and member of the WELL.
-
-