The Old Puppet Masters: Content Moderation on Computer Bulletin Board Systems

Total Page:16

File Type:pdf, Size:1020Kb

The Old Puppet Masters: Content Moderation on Computer Bulletin Board Systems THE OLD PUPPET MASTERS: CONTENT MODERATION ON COMPUTER BULLETIN BOARD SYSTEMS A Thesis submitted to the Faculty of the Graduate School of Arts and Sciences of Georgetown University in partial fulfillment of the requirements for the degree of Masters of Arts in Communication, Culture and Technology By Kevin Ackermann, B.J. Washington, DC August 12, 2020 Copyright 2020 by Kevin Ackermann All Rights Reserved ii THE OLD PUPPET MASTERS: CONTENT MODERATION ON COMPUTER BULLETIN BOARD SYSTEMS Kevin Ackermann, B.J. Thesis Advisor: Meg Leta Jones, Ph.D. ABSTRACT As monopolistic digital platforms have seized enough power over speech to become the “new governors” of speech, a robust discourse surrounding the contemporary legal and market forces that shape content moderation has emerged. However, this discourse is missing solid historical roots in the earliest days of digitally mediated moderation on hobbyist computer bulletin board systems. Building off the work of Kevin Driscoll, using oral histories and archival research, I examined what regulatory forces impacted how system operators and BBS callers practiced content moderation. This research found that on hobbyist computer bulletin board systems, content moderation was viewed more as an act of community formation than through the lens of balancing censorship and free speech rights. SysOps were the puppet masters who had ultimate control over how code and normative forces could regulate the content and community that was allowed on their bulletin boards. Each BBS could be entirely different depending on the whims of the SysOp. but many BBSs treated the expectations of speech and civility as directly analogous to having real people in one’s home. Ultimately, this thesis endeavors to be part of the tide of new scholarship that aims to complicate existing narratives of networked histories so that we might begin to understand the contemporary regulatory forces shaping our digital world. iii I truly could write another thesis chronicling my appreciation for those who have helped me achieve this goal. As a compromise, here’s a collection of little notes to the ones who have pushed, inspired and lifted me up over the last few years. To Dr. Jones: If there is one person who has made my graduate school experience worth it, it’s you. Not only did you push me with the literal constant opportunities and ideas that you threw my way, you also were there to help me back up when I bit off more than I could chew. Most importantly, in our countless meetings over the last couple years, you showed me that I didn’t have to sacrifice fun or creativity to be a successful academic. Everyone in my life could tell when I left one of our meetings because they always left me feeling genuinely inspired and confident in my ability to add to this world. Thank you. Thank you. Thank you. To my mom, dad, sister and brother in law: You have always loved and supported me, even when that’s not been an easy thing to do. Thanks for letting me call and talk about random tech policy and the importance of old computer networks. Thanks for always accompanying me on my walks to and from campus. I love you all so so much. To Will: You make me feel so lucky. Thank you for being patient with me and for always supporting me. There is literally no other person with whom I would rather (or would be able to) be quarantined in a one-bedroom apartment for (at least) six months. To Leslie Harris: Thank you for being a reader on my thesis. More than that, thank you for providing me with such a strong, critical baseline of knowledge about speech. I never left your class feeling that I hadn’t sufficiently exhausted my brain. To Dan Bouk: Thank you for being a super fun person to work with, for being a reader on this project, and for helping me feel comfortable and confident to try new things in my beginning academic career. To all of my friends: ily so much. :’) xoxo After writing these little messages none of them feel worthy to express how truly grateful I am for all of you. The poverty of language will never cease to hold me back, I say, prefacing a gigantic written project. I wish I could telepathically beam a stream of pure happiness and warmth directly to each and every one of you. Love, Kevin iv Table of Contents CHAPTER 1 – LITERATURE REVIEW ........................................................................ 1 Introduction ................................................................................................................. 1 Digital Speech and Public Discourse ........................................................................... 2 Section 230 ................................................................................................................. 4 Platform Governance ................................................................................................... 6 Content Moderation..................................................................................................... 8 Content Moderation and Scale ................................................................................... 11 Historiography of the Net .......................................................................................... 14 Conclusion ................................................................................................................ 16 CHAPTER 2 – METHODS ........................................................................................... 17 How the Work Was Approached ............................................................................... 17 Archival Documents .................................................................................................. 18 Oral Histories ............................................................................................................ 20 How Analysis Was Conducted .................................................................................. 21 CHAPTER 3 – RESEARCH AND ANALYSIS ............................................................ 23 What Are Bulletin Board Systems? ........................................................................... 23 Content Moderation = Community Formation ........................................................... 24 The Fluidity of Code as a Regulatory Force ............................................................... 25 Not Platform Governance but Home Rules ................................................................ 26 Digital World Is the Real World ................................................................................ 27 v SysOps Are the Puppet Masters ................................................................................. 30 Puppet Masters, but Kind Puppet Masters.................................................................. 31 Differing Expectations of Behavior ........................................................................... 32 The Part about Written Norms ................................................................................... 33 You Must Be This Technologically Minded to Ride This BBS .................................. 40 What Is AOL? ........................................................................................................... 41 Cathy Chandler and Harold Curtice ........................................................................... 42 Areas of Future Research .......................................................................................... 44 CHAPTER 4 – CONCLUSION .................................................................................... 45 REFERENCES ............................................................................................................. 46 vi Chapter 1 Literature Review Introduction The current conversation around digital content moderation is largely focused on Section 230 of the Communications Decency Act. The conversation swirls incessantly between the need to eliminate Section 230, the need to reform Section 230, and the need to protect Section 230 at all costs. The landscape of digital networks today is drastically different than it was when computer bulletin board systems (BBSs) were the main source of civilian networking, but examining this time before Section 230 provided legislated immunity to internet service providers will allow us to, at a minimum, stop myopically focusing on legal forces as the only thing that can regulate a conversation in cyberspace. Historical research around early computer networks contains a unique tension between feast and famine. While looking for literature within academia for critical analysis of computer bulletin board systems, one is met with almost exclusively no information save for a paragraph or two recognizing the network’s existence. Kevin Driscoll is one of the only scholars doing work to recontextualize alternative early computer networks. Because there is so little existing literature on the subject, each interview and archival document I’ve found has felt like a feast of information. Even when I’m unsure of exactly what to do with the information, there’s a euphoria of discovery in which I have to stop and tell someone about a cool new (admittedly mundane in the grand scheme of things) fact I’ve learned. While there is little critical conversation around alternative early networks, the conversation around content moderation and digital governance is bountiful. This 1 literature review will first survey work that is being done to contextualize digital speech’s role in the broader public discourse. Then, I will
Recommended publications
  • What Is Peer-To-Peer File Transfer? Bandwidth It Can Use
    sharing, with no cap on the amount of commonly used to trade copyrighted music What is Peer-to-Peer file transfer? bandwidth it can use. Thus, a single NSF PC and software. connected to NSF’s LAN with a standard The Recording Industry Association of A peer-to-peer, or “P2P,” file transfer 100Mbps network card could, with KaZaA’s America tracks users of this software and has service allows the user to share computer files default settings, conceivably saturate NSF’s begun initiating lawsuits against individuals through the Internet. Examples of P2P T3 (45Mbps) internet connection. who use P2P systems to steal copyrighted services include KaZaA, Grokster, Gnutella, The KaZaA software assesses the quality of material or to provide copyrighted software to Morpheus, and BearShare. the PC’s internet connection and designates others to download freely. These services are set up to allow users to computers with high-speed connections as search for and download files to their “Supernodes,” meaning that they provide a How does use of these services computers, and to enable users to make files hub between various users, a source of available for others to download from their information about files available on other create security issues at NSF? computers. users’ PCs. This uses much more of the When configuring these services, it is computer’s resources, including bandwidth possible to designate as “shared” not only the and processing capability. How do these services function? one folder KaZaA sets up by default, but also The free version of KaZaA is supported by the entire contents of the user’s computer as Peer to peer file transfer services are highly advertising, which appears on the user well as any NSF network drives to which the decentralized, creating a network of linked interface of the program and also causes pop- user has access, to be searchable and users.
    [Show full text]
  • File Transmission Methods Monday, October 5, 2020
    File Transmission Methods Monday, October 5, 2020 File Transmission Methods Slide 1 of 28 - File Transmission Methods Introduction Slide notes Welcome to the File Transmission Methods course. Page 1 of 31 File Transmission Methods Monday, October 5, 2020 Slide 2 of 28 - Disclaimer Slide notes While all information in this document is believed to be correct at the time of writing, this Computer Based Training (CBT) is for educational purposes only and does not constitute official Centers for Medicare & Medicaid Services (CMS) instructions for the MMSEA Section 111 implementation. All affected entities are responsible for following the instructions found at the following link: GHP Web Page Link. Page 2 of 31 File Transmission Methods Monday, October 5, 2020 Slide 3 of 28 - Course Overview Slide notes The topics in this course include an introduction to the three data transmission methods, registration guidelines, the Login ID and Password for the Section 111 Coordination of Benefits Secure Web site (COBSW), a brief discussion on the profile report, and a detailed discussion on Connect:Direct, Secure File Transfer Protocol (SFTP) and Hypertext Transfer Protocol over Secure Socket Layer (HTTPS). Page 3 of 31 File Transmission Methods Monday, October 5, 2020 Slide 4 of 28 - Data Transmission Methods Slide notes There are three separate methods of data transmission that Section 111 Responsible Reporting Entities (RREs) may utilize. Connect:Direct via the CMSNet, SFTP over the Internet to the Section 111 SFTP Server, and HTTPS file upload and download over the Internet using the Section 111 COBSW. Your choice is dependent on your current capabilities and the volume of data to be exchanged.
    [Show full text]
  • Using Internet Or Windows Explorer to Upload Your Site
    Quick Start Using Internet or Windows Explorer to Upload Your Site Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting account. You use an FTP client to transfer your Web site from your local computer to your hosting account. This transfer is often referred to as “uploading.” NOTE: Internet Explorer 7 does not support uploading to FTP sites. If you have Internet Explorer 7 and want to upload files to your site you will either need to use Windows Explorer (explained below) or another FTP client. Getting Your FTP Settings You will need the following information from your FTP settings in order to use Internet Explorer to upload your Web site: FTP User Name. The user name for your hosting account. FTP Password. Your password for your hosting account. FTP Site URL. The URL of the FTP site for your domain name, for example, f t p://www.coolexample.com, where coolexample.com is the name of your Web site. If you are missing any of this information, you can log in to your Account Manager to find your user name, password, and URL. Copyright© 2007 1 Quick Start Using Internet or Windows Explorer to Upload Your Site Using Internet Explorer 6 to Upload Files Once you have your FTP settings, you're ready to connect to your Web server and start using Internet Explorer 6 to upload your Web site. If you are using Internet Explorer 7, you must use the instructions for Using Windows Explorer to Upload Files, which begin on page 4 of this document.
    [Show full text]
  • Information Technology: Applications DLIS408
    Information Technology: Applications DLIS408 Edited by: Jovita Kaur INFORMATION TECHNOLOGY: APPLICATIONS Edited By Jovita Kaur Printed by LAXMI PUBLICATIONS (P) LTD. 113, Golden House, Daryaganj, New Delhi-110002 for Lovely Professional University Phagwara DLP-7765-079-INFO TECHNOLOGY APPLICATION C-4713/012/02 Typeset at: Shubham Composers, Delhi Printed at: Sanjay Printers & Publishers, Delhi SYLLABUS Information Technology: Applications Objectives: • To understand the applications of Information technology in organizations. • To appreciate how information technology can help to improve decision-making in organizations. • To appreciate how information technology is used to integrate the business disciplines. • To introduce students to business cases, so they learn to solve business problems with information technology. • To introduce students to the strategic applications of information technology. • To introduce students to the issues and problems involved in building complex systems and organizing information resources. • To introduce students to the social implications of information technology. • To introduce students to the management of information systems. S. No. Topics Library automation: Planning and implementation, Automation of housekeeping operations – Acquisition, 1. Cataloguing, Circulation, Serials control OPAC Library management. 2. Library software packages: RFID, LIBSYS, SOUL, WINISIS. 3. Databases: Types and generations, salient features of select bibliographic databases. 4. Communication technology: Fundamentals communication media and components. 5. Network media and types: LAN, MAN, WAN, Intranet. 6. Digital, Virtual and Hybrid libraries: Definition and scope. Recent development. 7. Library and Information Networks with special reference to India: DELNET, INFLIBNET, ERNET, NICNET. Internet—based resources and services Browsers, search engines, portals, gateways, electronic journals, mailing 8. list and scholarly discussion lists, bulletin board, computer conference and virtual seminars.
    [Show full text]
  • A Review of MS-DOS Bulletin Board Software Suitable for Long Distance
    DOCUMENT RESUME ED 353 977 IR 015 940 AUTHOR Sessa, Anneliese TITLE A Review of MS-DOS Bulletin Board Software Sui:able for Long Distance Learning. PUB DATE 89 NOTE 7p.; For a related paper, see IR 015 939. PUB TYPE Information Analyses (070) Viewpoints (Opinion/Position Papers, Essays, etc.)(120) EDRS PRICE MFO1 /PCO1 Plus Postage. DESCRIPTORS 'Computer Networks; *Computer Software; Databases; Distance Education; *Electronic Mail; Online Systems; *Telecommunications IDENTIFIERS *MS DOS; NYCENET ABSTRACT This paper describes the advantages of using computer bulletin boards systems (BBS) for distance learning, including the use of the New York City Education Network (NYCENET) to access various databases and to communica1. with individuals or the public. Questions to be answered in order to determine the most appropriate software for running a BBS are listed; and the following public domain and shareware BBS software packages suitable for setting up a BBS for long distance learning are reviewed: Magpie, QBBS, PC Board, RBBS, and Opus. One commercial program--The Bread Board System (TBBS)--is also considered. A 1992 update of the information presented in this paper is appended. (ALF) *********************************************************************** Reproductions supplied by EDRS are the best that can be made from the original document. *********************************************************************** U.S DEPARTMENT OF FOUCATION Orfice of Educahonal Research and inproernent EDUCATIONAL RESOURCES INFORMATION CENTER IERICI This aoc umeni has oeen ,ecnoau, ea as I ece.ved I,Or- the person or organ catn, ortglnabng CM.otc-haflgesnel.ebetn,a0elc,,,rlo A Review of MS-DOS Bulletin Board Software reproduchondeahly Po.nts of v.e. or of:Pn'OnS Staled do.cu Suitable for Long distance Learning men! do r,01 necessanly epresent nIlor oil Reviewed By Anneliese Sessa (1989) OERI poshon The idea of using a computer for long distance learningis not very new.
    [Show full text]
  • Recognizing Legal Differences in Computer Bulletin Board Functions Eric Goldman Santa Clara University School of Law, [email protected]
    Santa Clara Law Santa Clara Law Digital Commons Faculty Publications Faculty Scholarship 1-1-1993 Cyberspace, the Free Market and the Free Marketplace of Ideas: Recognizing Legal Differences in Computer Bulletin Board Functions Eric Goldman Santa Clara University School of Law, [email protected] Follow this and additional works at: http://digitalcommons.law.scu.edu/facpubs Part of the Law Commons Recommended Citation 16 Hastings Comm. & Ent. L.J. 87 This Article is brought to you for free and open access by the Faculty Scholarship at Santa Clara Law Digital Commons. It has been accepted for inclusion in Faculty Publications by an authorized administrator of Santa Clara Law Digital Commons. For more information, please contact [email protected]. Cyberspace, the Free Market and the Free Marketplace of Ideas: Recognizing Legal Differences in Computer Bulletin Board Functions by ERIC SCHLACHTER* Table of Contents I. Difficult Issues Resulting from Changing Technologies.. 89 A. The Emergence of BBSs as a Communication M edium ............................................. 91 B. The Need for a Law of Cyberspace ................. 97 C. The Quest for the Appropriate Legal Analogy Applicable to Sysops ................................ 98 II. Breaking Down Computer Bulletin Board Systems Into Their Key Characteristics ................................ 101 A. Who is the Sysop? ......... 101 B. The Sysop's Control ................................. 106 C. BBS Functions ...................................... 107 1. Message Functions ..............................
    [Show full text]
  • The Kermit File Transfer Protocol
    THE KERMIT FILE TRANSFER PROTOCOL Frank da Cruz February 1985 This is the original manuscript of the Digital Press book Kermit, A File Transfer Protocol, ISBN 0-932976-88-6, Copyright 1987, written in 1985 and in print from 1986 until 2001. This PDF file was produced by running the original Scribe markup-language source files through the Scribe publishing package, which still existed on an old Sun Solaris computer that was about to be shut off at the end of February 2016, and then converting the resulting PostScript version to PDF. Neither PostScript nor PDF existed in 1985, so this result is a near miracle, especially since the last time this book was "scribed" was on a DECSYSTEM-20 for a Xerox 9700 laser printer (one of the first). Some of the tables are messed up, some of the source code comes out in the wrong font; there's not much I can do about that. Also (unavoidably) the page numbering is different from the printed book and of couse the artwork is missing. Bear in mind Kermit protocol and software have seen over 30 years of progress and development since this book was written. All information herein regarding the Kermit Project, how to get Kermit software, or its license or status, etc, is no longer valid. The Kermit Project at Columbia University survived until 2011 but now it's gone and all Kermit software was converted to Open Source at that time. For current information, please visit the New Open Source Kermit Project website at http://www.kermitproject.org (as long as it lasts).
    [Show full text]
  • Performance of Linear-Type Mobile Data Transmission
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 8, AUGUST 2011 2451 Performance of Linear-Type Mobile Data Transmission Chen-Yuan Chuang, Yi-Bing Lin, Fellow, IEEE, and Yu-Tien Yeh Abstract—In Next Generation Network (NGN), IP Multimedia Subsystem (IMS) plays an important role to offer IP-based multimedia services. Based on Chunghwa Telecom’s NGN/IMS, we develop linear-type data transmission applications such as Bulletin Board System (BBS) or forum-based websites to deliver new articles to the mobile users. We propose the push-N method that pushes every N articles from the BBS server to the user. When the user actually connects to the BBS, the not-yet-pushed messages are pulled by the user. Our study indicates that by selecting appropriate N values, push-N can balance against the push and the pull operations, and therefore improves the user access experience without wasting too much network resources. Index Terms—Forum-based website applications, mobile data transmission, IP multimedia subsystem (IMS). I. INTRODUCTION N Next Generation Network (NGN), IP Multimedia Sub- I system (IMS) supports IP-based broadband multimedia services through mobile devices [1], [2]. Chunghwa Telecom Fig. 1. A simplified NGN/IMS architecture. (CHT), Taiwan, has deployed one of the largest commer- cial NGN/IMS in Asia to provision enhanced voice, video, Based on CHT’s NGN/IMS, we have developed mobile and Internet-based multimedia services. The current CHT data transmission applications that allow pull or push of NGN/IMS capacity can accommodate commercial operation information from an application server (Figure 1 (4)) to a UE for about five hundred thousand subscribers.
    [Show full text]
  • Electronic Bulletin Boards for Business, Education and Leisure
    Visions in Leisure and Business Volume 6 Number 1 Article 6 1987 Electronic Bulletin Boards for Business, Education and Leisure Kent L. Gustafson University of Georgia Charles Connor University of Georgia Follow this and additional works at: https://scholarworks.bgsu.edu/visions Recommended Citation Gustafson, Kent L. and Connor, Charles (1987) "Electronic Bulletin Boards for Business, Education and Leisure," Visions in Leisure and Business: Vol. 6 : No. 1 , Article 6. Available at: https://scholarworks.bgsu.edu/visions/vol6/iss1/6 This Article is brought to you for free and open access by the Journals at ScholarWorks@BGSU. It has been accepted for inclusion in Visions in Leisure and Business by an authorized editor of ScholarWorks@BGSU. ELECTRONIC BULLETIN BOARDS FOR BUSINESS, EDUCATION AND LEISURE BY DR. KENT L. GUSTAFSON, PROFESSOR AND CHARLES CONNOR, RESEARCH ASSOCIATE DEPARTMENT OF EDUCATIONAL MEDIA AND TECHNOLOGY THE UNIVERSITY OF GEORGIA ATHENS, GEORGIA 30602 ABSTRACT Electronic communication is one example of how technology is impacting and changing lifestyles. The result of this technology is one of benefiting the individual, especially since the cost of this technology is within the reach of most families. ELECTRONIC BULLETIN BOARDS FOR BUSINESS, EDUCATION AND LEISURE INTRODUCTION Using computers to communicate with other people and to forward and store messages has been possible for many years. But until recently, this capability was available to only a limited number of people due to expense and technical difficulty. However, with the advent and rapid acquisition of personal computers, the ability to communicate electronically has become readily available in offices and homes. Personal computers have made the costs of electronic communication inexpensive due to the low costs of both the host computer and personal computers used to communicate with it� Microcomputers costing less than $1,000 can serve as the host computer and home computers with required communication equipment and programs can be purchased for under $500.
    [Show full text]
  • Liste Des BBS Pour Montréal, Code Régional (514) Avec Une Liste De 479 Numéros
    Liste des BBS pour Montréal, code régional (514) avec une liste de 479 numéros Volume 10, Numéro 5 Date de mise à jour : Dimanche 2 Avril 1995 Mise à Jour toutes les deux semaines par Steve Monteith & Audrey Seddon via « Juxtaposition BBS » maintenant depuis 11ans Copyright (C) 1985/95 par Steve Monteith Tous droits réservés (reproduit avec l’autorisation de l’auteur) - Traduction en Français du texte original - Nom du BBS Téléphone BD MA $FL Commentaires !? 345-8654 28 IB NYB Download,Very strange !Power News Node 1 494-4740 28 IB NYB 167/346,16 reseaux de msgs !Power News Node 2 494-9203 28 IB NYB FileGate Hub, 3.8gig !SASSy V! 891-8032 96 IB NYB 24hrs,free speech /\/egatif Club 435-0515 14 IB VYF AM/AP/ST/C=/CC/IB/MA 420.01 348-1492 14 IB VYB (down)WWIVnet@20354,Cegep ABS International Canada 937-7451 14 IB VNF Fido-FM-UseNet,Latin,RA Acres of Diamonds BBS 699-5872 28 IB NYB Msgs,CD-Rom Action BBS 425-2271 14 IB NYB 1gig,games Adults Only BBS Line 1 668-9677 14 IB YYB F167/322,Msgs,Internet Adults Only BBS Line 2 668-8410 14 IB YYB Adultlink,CD's,Doors Adults Only BBS Line 3 668-0842 14 IB VYB New User Validation Line Advanced BBS 623-2182 24 IB NYF FrancoMedia Agenda World BBS 694-0703 14 IB VYB F167122 Home of BOOKNET Agora 982-5002 14 IB NYB Ecology related Aigle Noir BBS 273-2314 14 IB NYB (down)Internet,GIFs Aigle Royal 429-5408 28 IB NYB F167/815,4CDs,Adulte,NETs Air Alias 323-7521 14 IB NYB FlyNet,Parachut,Aviat,F717 Alexandria 323-8495 14 IB NYB Search light, 2-CDROMS Alien Connection BBS 654-1701 14 IB NYB 2 Gigs,CDROM,Renegade Aliens War BBS 642-9261 14 IB NYB Doors,PhobiaNet,Programming Alley Cat Node 1 527-9924 28 IB VYB F167/195,Wildcat Dist.
    [Show full text]
  • The Virtual Community of an Online Classroom: Participant
    AN ABSTRACT OF THE THESIS OF Terri L. Johanson for the degree of Doctor of Education in Education presented on January 24, 1996. Title: The Virtual Community of an Online Classroom: Participant Interactions in a Community College Writing Class Delivered by Computer-Mediated Communication (CMC). Redacted for Privacy Abstract approved: rry' 3>/jc This qualitative study describes and interprets the interactions of participants in a community college writing class delivered by computer-mediated communication (CMC). The class represented a best practice model of learner-centered instruction in a CMC class. The description and the discussion are framed by five aspects of CMC instruction: (1) context; (2) technology; (3) communication; (4) learning; and (5) community. Offered via a computer bulletin board system (BBS), the class was an ongoing asynchronous electronic meeting. The participants actively accessed the class to interact and collaborate at all hours of the day and night and on almost every day of the term. The relational communication style adopted by the students reflected the formality, immediacy, and social presence of the instructor. Expressing the tone of friendly letters, most of the messages combined salutations, personal or social content, task-oriented content, closing comments and signatures. The mix of assignments and activities required students to act and interact individually, collaboratively and cooperatively. The students accepted the responsibility for interaction and initiated a majority of the messages. The instructor's
    [Show full text]
  • The PLATO System : a Study in the Diffusion of an Innovation
    University of Massachusetts Amherst ScholarWorks@UMass Amherst Doctoral Dissertations 1896 - February 2014 1-1-1987 The PLATO system : a study in the diffusion of an innovation. Francis D. Driscoll University of Massachusetts Amherst Follow this and additional works at: https://scholarworks.umass.edu/dissertations_1 Recommended Citation Driscoll, Francis D., "The PLATO system : a study in the diffusion of an innovation." (1987). Doctoral Dissertations 1896 - February 2014. 4265. https://scholarworks.umass.edu/dissertations_1/4265 This Open Access Dissertation is brought to you for free and open access by ScholarWorks@UMass Amherst. It has been accepted for inclusion in Doctoral Dissertations 1896 - February 2014 by an authorized administrator of ScholarWorks@UMass Amherst. For more information, please contact [email protected]. THE PLATO SYSTEM: A STUDY IN THE DIFFUSION OF AN INNOVATION A Dissertation Presented By Francis D. Driscoll Submitted to the Graduate School of the versity of Massachusetts in partial fulfillment of the requirements for the degree of DOCTOR OF EDUCATION September 1987 School of Education © Copyright by Francis D. Driscoll 1987 All Rights Reserved THE PLATO SYSTEM: A STUDY IN THE DIFFUSION OF AN INNOVATION A Dissertation Presented By FRANCIS D. DRISCOLL Approved as to style and content by; C William C. Wolf, Ji^., chairperson of Committee 1 \ -7 Klaus Schultz, Member / ;; /I Z Conrad A. Wogrin, Member George urch,Meeting''Ch.wtinq Dean School of Education ACKNOWLEDGEMENTS This study required the cooperation of many people. I am grateful to iny committee for their willingness to serve and help. Special thanks go to Bill Wolf for his guidance, enthusiasm and responsiveness to my efforts.
    [Show full text]