11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

332 Net Neutrality• Do not post bulky graphics or other attachmentsunless the group is designed for them.• Avoid “ad hominem” (to the person) attacks whendiscussing disagreements.• Do not post in ALL CAPS, which is interpreted as“shouting.”• Check your postings for proper spelling <strong>and</strong> grammar.On the other h<strong>and</strong>, avoid “flaming” other usersfor their spelling or grammar errors.• When replying to an existing message, includeenough <strong>of</strong> the original message to provide context foryour reply, but no more.• If you know the answer to a question or problemraised by another user, send it to that user by e-mail.That way the newsgroup doesn’t get cluttered up withdozens <strong>of</strong> versions <strong>of</strong> the same information.In 1994, a firm <strong>of</strong> immigration attorneys enraged much<strong>of</strong> the online community by posting messages <strong>of</strong>fering theirservices in each <strong>of</strong> the thous<strong>and</strong>s <strong>of</strong> different newsgroups.“Spam” was born. Technically savvy users responded bycreating “cancelbots” or programs that attempt to detect<strong>and</strong> automatically delete postings containing spam. Today,spam is mainly conveyed by e-mail, with mail servers <strong>and</strong>client programs <strong>of</strong>fering various options for blocking it(see spam).Netiquette in the 21st CenturyIn the new century, newsgroups <strong>and</strong> traditional conferencingsystems have diminished in importance, but e-mailis more pervasive than ever, <strong>and</strong> a variety <strong>of</strong> new onlinemedia have emerged (see, for example, blogs <strong>and</strong> blogging).Many <strong>of</strong> the tried-<strong>and</strong>-true rules for newsgroup postingsapply as well to other media, but there are also newconsiderations.As many politicians <strong>and</strong> business executives havelearned to their dismay, e-mail must be assumed to beessentially as permanent as a h<strong>and</strong>written letter. Similarly,blogs, postings to sites such as MySpace (see social networking),<strong>and</strong> other online content can be copied, linkedto, archived, or otherwise persist for many years. Today’sintemperate remarks may emerge years later when a prospectiveemployer “googles” a job c<strong>and</strong>idate.Blogs are meant to link <strong>and</strong> be linked to, so issues <strong>of</strong>properly crediting material <strong>and</strong> respecting copyright canbe important. This can also apply to contributions to content-sharingsites <strong>and</strong> to articles for wikis (see wikis <strong>and</strong>Wikipedia); Wikipedia has evolved a rather comprehensiveset <strong>of</strong> st<strong>and</strong>ards whereby readers can “flag” content that isproblematic.Further ReadingHousley, Sharon. “Blog <strong>and</strong> RSS Feed Etiquette.” Available online.URL: http://www.small-business-s<strong>of</strong>tware.net/blog-etiquette.htm. Accessed August 16, 2007.Kallos, Judith. Because Netiquette Matters! Your ComprehensiveGuide to E-mail Etiquette <strong>and</strong> Proper <strong>Technology</strong> Use. Philadelphia:Xlibris 2004.McKay, Dawn Rosenberg. “Email Etiquette.” Available online.URL: http://careerplanning.about.com/od/communication/a/email_etiquette.htm. Accessed August 16, 2007.Netiquette Home Page. Available online. URL: http://www.albion.com/netiquette/. Accessed August 16, 2007.Strawbridge, Matthew. Netiquette: Internet Etiquette in the Age <strong>of</strong>the Blog. Cambridge, U.K.: S<strong>of</strong>tware Reference Ltd., 2006.Von Rospach, Chuq. “A Primer on How to Work with the UsenetCommunity.” Available online. URL: http://faqs.cs.uu.nl/nadir/usenet/primer/part1.html.Accessed August 16, 2007.Net NeutralityIn recent years there has been growing concern that Internetusers may eventually be treated differently by service providersdepending on the kind <strong>of</strong> data they download or thekind <strong>of</strong> application programs they use online. Advocates <strong>of</strong>network (or net) neutrality (see for example Cerf, Vincent)want legislation that would bar cable, DSL, or other providers(see broadb<strong>and</strong> <strong>and</strong> Internet service provider) frommaking such distinctions, such as by charging content providershigher fees for high volumes <strong>of</strong> data or even blockingcertain applications. Advocates <strong>of</strong> net neutrality believe that,since there are rather limited choices for broadb<strong>and</strong> Internetservice, discrimination on the basis <strong>of</strong> Web content couldlead to a loss <strong>of</strong> freedom for consumers <strong>and</strong> providers alike.Critics <strong>of</strong> the net neutrality proposal tend to discountsuch concerns. One analogy they use is traditional mail.Users can choose different types <strong>of</strong> shipping service, buthaving overnight service available does not mean that packagescannot be delivered using cheaper means. Likewise,they believe that the market can provide “tiers” <strong>of</strong> Internetservice without disenfranchising any providers or users.Increasing concern about the issue began in 2005 whenthe Federal Communications Commission announcedthat broadb<strong>and</strong> (cable <strong>and</strong> DSL) Internet would be treatedunder the less stringent Title I information service underthe Communications Act <strong>of</strong> 1934, rather than being treatedunder Title II as a “common carrier” like traditional phoneservice. At the same time, the agency issued policy guidelinesthat promoted free access, consumer choice, <strong>and</strong> competition.However these guidelines have no legal force.In June 2007 the Federal Trade Commission (FTC) moreor less sided with the critics <strong>of</strong> net neutrality by urgingregulators to be careful about imposing rules that wouldprevent providers from innovating in <strong>of</strong>fering premium services.Meanwhile two proposed net neutrality bills failed topass Congress in 2006. However, in July 2008 the FCC in a3-2 decision ordered Comcast, the largest U.S. cable serviceprovider, to stop degrading service to users who used filesharingprotocols.It should be noted that a number <strong>of</strong> rules restrictingcertain kinds <strong>of</strong> Internet access already exist. Major serviceproviders have agreements called “peering arrangements”that specify how certain kinds <strong>of</strong> transmissions will beh<strong>and</strong>led. Many service providers also block certain dataports to reduce the spread <strong>of</strong> spam by insecure systems ortry to restrict the use <strong>of</strong> peer-to-peer (P2P) systems (seefile-sharing <strong>and</strong> p2p networks).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!