Sunday, April 19, 2009

Session 7

“find the official rules governing the site you're studying for your final project”
I located a variety of “official” that are implemented to govern the sites I am studying (http://sejarahkita.blogspot.com/; http://www.polarhome.com/pipermail/nasional-a/2002-October/000051.html). The sheer amount of the documents was overwhelming and many of them were difficult to digest, which echoes what Grimes et al call the “obfuscated code.” By looking at the documents “in totality,” as Grimes et al do in their study of social games and role-playing games, it is possible to identify two broad patterns of administrative mechanism, as Grimes et al illustrate in their study. According to Grimes et al, “[t]he first mechanism for governance is through the use of source code, or the actual software itself. In the physical world, we are bound by certain laws of physics and nature. These types of laws cannot be changed or challenged; they simply exist.” One example of “source code” from polarhome.com may be a document entitled “GNU General Public License” (http://www.polarhome.com/service/COPYING.html). It outlines terms and conditions for software use, specifically concerning copying, distribution and modification. An example of source code from blooger.com could be “Blogger Feature” (http://www.blogger.com/features), which lists and describes technological features at users’ disposal.

The second mechanism of official rules, as Grimes et al suggest, falls into a broad notion of “civil code.” The authors note that “[i]n virtual worlds, civil code is determined by an elaborate mosaic of legal documents and policies. . . . These individual governing documents contain all of the written codified laws for a virtual world. The corpus of all of the governing documents for each particular virtual world creates the contractual framework for governance of that virtual world.” There are several examples of civil code that I have found. For instance, “Netiquette” on polarhome.com is basically a (situational) code of conduct for users to abide by when they have one-to-one communication and/or one-to-many communication (http://www.polarhome.com/service/netiquette.html). Another example of civil code might be versions of privacy statement that I found on both sites (http://www.polarhome.com/service/privacy.html; http://www.blogger.com/privacy). These documents provide a rough framework as to how the sites monitor personal information and clarify why the sites ask users to provide certain personal information (for authorization purposes).

Here are some other official rules I have looked at:
Legal notices http://www.polarhome.com/service/legal.html
Polarhome.com policy http://www.polarhome.com/service/policy.html
Sponsors http://www.polarhome.com/sponsor.php
FAQs http://www.polarhome.com/faq/cache/1.html
Blogger Feature http://www.blogger.com/features
Blogger: About Us http://www.blogger.com/about
Blogger Terms of Service http://www.blogger.com/terms.g
Blogger Content Policy http://www.blogger.com/content.g
What is the “Flag” button? http://help.blogger.com/bin/answer.py?answer=42517
Digital Millennium Copyright Act: http://www.google.com/blogger_dmca.html

“Find three examples on the site where one or more rules have been broken, specifically in the form of interpersonal conflict (i.e. not just spam posts).”
I found this part of the exercise quite challenging. One reason for the difficulty I encountered might be that the sites (and content) I am studying for final project do not necessarily revolve around (or provoke) interpersonal conflict. My final project examines aspects of knowledge production in three social network site and how that compares to traditional (and peer-reviewed) equivalent in print. So far I have not observed any offensive behaviors to an extent that they might be equated with emotionally distressed “rogue users” in Gazan’s study or a violent “sociopath” in Dibbell’s study.

Madison identifies seven broad features of social software. I believe the sites I selected encompass at least three of such characteristics: open-source software (polarhome.com); weblog (blogger.com); and collaborative authoring technologies (Wikipedia). [Madison 161] For this part of the exercise, I decided to focus mainly on the weblog site. I did not choose polar.com because it primarily functions as a listserv thus does not always generate unless users decide to respond to one another through their postings (I have not come across any of such examples so far). I focused on blogger.com because out of the three, the site is most interactive in a sense that there are a number of comments threads generated by users of the blog.

The Kollock and Smith article points out “conflict” sometimes arises rather subtly (i.e. “freerider problems”) thus does not become as apparent as such an instance as the shooting debacle Dibbell discusses. I have come across a few instances that may reflect the subtle “violation” of the official rules on blogger.com, especially concerning content policy. Blogger.com’s Content policy reads:
IMPERSONATION: We do not allow impersonation of others through our services in a manner that is intended to or does mislead or confuse others [http://www.blogger.com/content.g; italics are mine]. What follows are examples of comments that I personally found confusing and misleading. The first example is a comment posted by a mysterious user, Donny Wijaya (https://www.blogger.com/comment.g?blogID=23220868&postID=5243843385212201672). His “comment” consists of a list of web links whose content does not seem to reflect that of the post he is responding to. The post excerpts passages from a 2005 commentary that talks about the significance of a political pamphlet from the 1940s in Indonesian nationalism written by a prominent intellectual at the time. Moreover, he does not offer any explanation as to why he posted the links to these sites. Another example of a puzzling comment comes from a user by the name of “the” (https://www.blogger.com/comment.g?blogID=23220868&postID=2954424863626470003). Similarly, “the” encourages the author of the blog to visit his/her blogs which have no bearing of the post she/he is commenting on. Lastly, there is a comment by “barb michelen” (https://www.blogger.com/comment.g?blogID=23220868&postID=7484466398330664858), who in response to an essay about a brief history of the Siliwangi unit of the Indonesian Army, brings up a topic of dieting and again provides a link to a site that helps users find work at home jobs (yourtypingbiz.info). Given my limited experience with social computing, I am not certain what the site administrators or software developers could do to monitor the posting of confusing and misleading information, although further refinement of the software might help scan or identify such information. At this level of interaction, it is probably up to the self-awareness of individual users as to what is considered respectable behavior. And perhaps confusing and misleading behavior is inevitable in interpersonal communication because, as Kollock and Smith suggest, there is an inherent tension, online or offline, between “individual and collective rationality” thus what an individual considers suitable may turn out odd and out of context in a group setting.

3 comments:

  1. I agree it’s difficult to find many violations of TOS of an interpersonal nature on a platform like blogging where often the communication is one-sided. The examples of the spam comments you mention happen often and can be a nuisance but ultimately do not cause much harm. I don't think those who commented off-topic really thought that their comments were suitable I think they just wanted to direct traffic to their own blog. I wonder why the authors of the blog don’t just delete those comments.
    Anyway, one violation of the TOS that happens a lot on blogs is posted music illegally. Though sometimes even when bloggers have permission of the artists blog posts are still taken down. Here’s a link to a blog that’s moving due to the frustration of too many DMCA notices. http://drakescyberresidence.blogspot.com/2009/04/so-were-shutting-this-place-down-check.html

    ReplyDelete
  2. Wow, sounds like you have a good grasp on your final project...much more so than I have. I guess I better get crackin'. I agree that in sites where information exchange is the central rather than user interaction, it would be inherently more difficult to find examples of interpersonal conflict. I agree with Molly that these examples of irrelevant links & self-promotion would fall under spamming. Spamming interrupts the flow of the thread and confusing comments can discourage further comments (though the opposite could be true, too). Are there any examples that you've come across of people disputing another user's contributions? Subject popularity and the number of contributors also affects the amount of conflict. It seems like many rogue users break rules for attention, but less active sites like these (in terms of number of comments) might not appeal to attention-seeking griefers or flame baiters.

    ReplyDelete
  3. Is is common to see abuses of blog comments. I think the solution to this problem is giving more power to the blog owner and reader. The ownwer should be able to give warning and delete blog comments. For persistent abusers, the blog owner should be able to ban the user. An even better idea is something called "hellban" method. The abuser can see his comments and think everthing is normal but all his commoments are invisible to other users. For blog readers, there should be some kind of flagging tools available, the reader should be able to flag a comment as "ads", "offensive" etc. When certain number of flag threshholds are reached, the comment should be automatically reported to the blog owner or admin, appropriate actions can be done about them.

    ReplyDelete