Expanding the Public Sphere Through Computer-Mediated Communication: Political Discussion About Abortion in a Usenet Newsgroup

Total Page:16

File Type:pdf, Size:1020Kb

Expanding the Public Sphere Through Computer-Mediated Communication: Political Discussion About Abortion in a Usenet Newsgroup Expanding the Public Sphere through Computer-Mediated Communication: Political Discussion about Abortion in a Usenet Newsgroup by Steven Michael Schneider B.A., Political Communication (1981) George Washington University M.A., Communications (1988) University of Pennsylvania Submitted to the Department of Political Science in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in Political Science at the Massachusetts Institute of Technology June 1997 c 1997 Massachusetts Institute of Technology Signature of Author: Department of Political Science May 2, 1997 Certified by: Joshua Cohen Professor of Political Science and Philosophy Thesis Supervisor Accepted by: Barry R. Posen Professor of Political Science Chair, Graduate Program Committee Expanding the Public Sphere through Computer-Mediated Communication: Political Discussion about Abortion in a Usenet Newsgroup by Steven M. Schneider Submitted to the Department of Political Science on May 2, 1997 in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in Political Science ABSTRACT This thesis examines a conversation about abortion that occurred within the Usenet news- group “talk.abortion” between April 1, 1994 and March 31, 1995. It tests the hypothesis that the form of discourse fostered by computer mediated discussion provides opportuni- ties to expand the informal zone of the public sphere. Specific criteria by which a public sphere can be evaluated for its goodness of fit with the idealized public sphere described by Habermas are proposed and applied to the ongoing conversation. The conversation analyzed consisted of nearly 46,000 messages written by almost three thousand authors in nearly 8,500 different threads. The public sphere created by the par- ticipants in the newsgroup was found to be diverse and reciprocal, but lacking in equality and quality. Equality, achieved with equal distribution of voice among the speakers, was not found in the newsgroup conversation, as participation was highly concentrated among a few participants. Quality, measured by the tendency of participants in the newsgroup to stay “on-topic,” was also lacking in the group. On the other hand, the conversation was found to be highly diverse, as its size contracted and expanded considerably over time, and the participants included both a consistent, regular group as well as a subset of constantly changing contributors. Finally, the authors in the newsgroup were reciprocal with many others, and groups of participants were not systematically excluded from interaction by other groups. Newsgroups are unquestionably a component of the informal zone of the public sphere. Thus, it is suggested that the definition of the public sphere be expanded to include all forms of “associational space,” providing the opportunity for citizens to converse with each other. Even those forms of associational space with no clearly identified political activity resulting from the discussions contribute to the opinion- and will-formation exer- cise that is the function of the public sphere in a democratic society. Usenet newsgroups provide extensive opportunities for individuals to comment freely and autonomously on topics of public concern, and more importantly to engage in public discourse with other citizens about these issues. Thesis Supervisor: Joshua Cohen Title: Professor of Political Science and Philosophy Contents Acknowledgements 7 1 Computers, Conversation and Democracy 8 1.1 talk.abortion – August 9, 1994 . 10 1.2 Democracy and Discussion . 11 2 The Public Sphere 14 2.1 Discourse and the Public Sphere . 15 2.2 The Idealized Public Sphere . 17 2.3 The Liberal Public Sphere . 26 2.4 Dimensions of the Public Sphere . 31 2.5 The Informal Public Sphere . 40 3 Technology & the Public Sphere 43 3.1 Technology and the Shape of the Public Sphere . 43 3.2 Computer mediated Discussion . 47 3.3 Usenet: An Arena Of Computer Mediated Discussion . 51 3.4 The Social and Political Structure of Usenet . 54 4 Abortion Discourse in the Public Sphere 57 4.1 Historic Overview of Abortion Policy in the United States . 58 4.2 Abortion Discourse in the Public Sphere . 63 5 Measuring the Public Sphere 69 5.1 Study Design . 69 5.2 Dimensions of the Public Sphere . 72 6 Analyzing the talk.abortion Newsgroup 76 3 CONTENTS 4 6.1 Authors, Threads and Messages in talk.abortion . 76 6.2 Message and Author Reciprocity.................. 90 6.3 Abortion Density and Metacommunication Density . 95 7 The Expanding Public Sphere 101 A talk.abortion: August 9, 1994 107 B Density Scores 163 C Supplemental Analysis 167 List of Figures 3.1 Structure of a Newsgroup Post . 53 4.1 Articles in Popular Press Related to Abortion, 1930-1996 . 65 6.1 Comparison of Newspaper and Newsgroup Activity . 78 6.2 Authors, Messages and Threads Available Day . 79 6.3 Authors Entering, Exiting and Continuing by Day . 81 6.4 Threads Starting, Ending and Continuing by Day . 82 6.5 Concentration of Authorship . 83 C.1 Number of Messages Posted by Authors . 168 C.2 Number of Threads Posted To by Authors . 169 C.3 Spread of Days Between First and Last Message Posted by Authors 170 C.4 Number of Days with Messages Posted by Authors . 171 C.5 Number of Messages Posted To Thread . 172 C.6 Number of Authors Posting To Thread...............173 C.7 Spread of Days Between First and Last Message Posted To Thread 174 C.8 Number of Days With Messages Posted To Thread . 175 5 List of Tables 6.1 Summary of Activity in Usenet Newsgroup talk.abortion, April 1994 – March 1995 . 77 6.2 Categorization of Authors by Number of Messages . 85 6.3 Messages, Threads, Spread and Days of Author Groups . 86 6.4 Comparison of Messages to Threads and Days by Author Groups . 87 6.5 Categorization of Threads by Number of Messages . 89 6.6 Messages, Authors, Days and Spread of Threads by Decile . 90 6.7 Message Reciprocity By Author Groups . 92 6.8 Author Reciprocity By Author Groups............... 94 6.9 Number and Percent of Reciprocated Authors By Author Groups . 95 6.10 Correlation between Density Scores and Characteristics of Au- thors and Threads . 98 6.11 Abortion Density and Metacommunication Density By Author Groups . 99 6.12 Abortion Density and Metacommunication Density By Thread Deciles . 100 A.1 Articles available on talk.abortion newsgroup, August 9, 1994 . 107 A.2 Authors Posting articles available on talk.abortion newsgroup, Au- gust 9, 1994 . 117 A.3 Pro-life gunman kills two in FL: First 50 Articles from Sample Thread on talk.abortion newsgroup, August 9, 1994 . 122 B.1 Words Used to Calculate Abortion Density Scores . 163 B.1 Words Used to Calculate Abortion Density Scores . 164 B.1 Words Used to Calculate Abortion Density Scores . 165 B.2 Words Used to Calculate Metacommunication Density Scores . 166 6 Acknowledgements When one takes eight years to complete a dissertation, the list of those who have substantively and spiritually participated grows quite long. At the risk of being incomplete, I’d like to acknowledge the help of many mentors, friends, colleagues and family members. Professors Joshua Cohen, W. Russell Neuman, Stephen Ansolabehere, Hayward Alker, Michael Lipsky and Richard Valelly were all gen- erous with their time, guidance and willingness to serve on various incarnations of my thesis committee. In addition, David Coker, Marion Just, David Hakken, Bill Harrell, Marteen Heyboer, Michael Hochberg, Lee McKnight, Shawn O’Donnell, Nancy Roob, Patricia Seybolt, Michael Spitzer, Bill Thisleton and Linda Weber provided valued assistance and guidance. My family – most especially my wife, Laura Horvath – exhibited patience beyond what anyone could have expected, and for that I am forever grateful. To Addy, thanks for letting Mom put you to bed all those nights I had to work late, and for being willing to talk to me on the phone all those mornings I had to leave early. I only wish our friend, Andy Peik, could have celebrated with us. It is to his memory, and to his spirit as a scholar and a teacher, that this thesis is dedicated. 7 Chapter 1 Computers, Conversation and Democracy “Can we talk?” Comedian Joan Rivers got a lot a laughs with this line in the 1980s. But the answer we get when applying this question to citizens in our democracy is no laughing matter. Increasingly, it seems, the answer is “no.” And therein lies a se- rious problem for democracy. For a society composed of individuals who lack the skills and opportunities to engage others in discussions about public issues cannot long sustain itself as a democracy. The will of the community in a democracy is always created through a running discussion between majority and minority, through free consideration of arguments for and against a policy or idea. This discussion takes place not only in the formal institutions of government, but also in the informal settings of public life: political meetings, newspapers, books and other vehicles of public opinion. A democracy without public opinion is a contra- diction in terms (Kelsen 1961, 287). “Democracy begins in conversation,” wrote John Dewey (Post 1993, 171). “There can be no strong democratic legitimacy without ongoing talk,” argues Benjamin Barber (1984, 174) . Bruce Agre (1989, 6) agrees: “Dialogue as the first obligation of citizenship”. “Much of modern, democratic politics consists of talk” (Huspek & Kendall 1991, 1). 8 CHAPTER 1. COMPUTERS, CONVERSATION AND DEMOCRACY 9 This thesis is an analysis of an emerging kind of political talk or discourse: that which takes place over a computer network. More specifically, it is a case study of the conversation about abortion that took place within a Usenet newsgroup over the course of one year. It tests the hypothesis that the newly emergent form of discourse fostered by computer mediated discussion provides an opportunity to revitalize the public sphere in a manner consistent with the goals of participatory democracy.
Recommended publications
  • The Freedom of Speech at Risk in Cyberspace: Obscenity Doctrine and a Frightened University's Censorship of Sex on the Internet
    NOTES THE FREEDOM OF SPEECH AT RISK IN CYBERSPACE: OBSCENITY DOCTRINE AND A FRIGHTENED UNIVERSITY'S CENSORSHIP OF SEX ON THE INTERNET JEFFREY E. FAUCETrE INTRODUcTION On November 8, 1994, Carnegie Mellon University (CMU) removed' a small handful of topics from among the thousands of Usenet newsgroups2 subscribed to by the university computer sys- tem and available on the Internet' .because they contained en- coded sexually explicit images Under the new policy announced by Erwin Steinberg, university vice provost for education, none of the university's 9,000 computers would list the approximately forty newsgroups.5 The newsgroups that were censored are all known as "binaries,"6 and they contain, among other things, encoded imag- 1. Despite the University's restriction on the sexually explicit newsgioups, techno- logically adept students can circumvent the policy by accessing the groups through other file servers. However, for the purposes of this Note, the efforts of these enterprising students are not important when compared with the symbolic effect of the censorship. 2. These newsgroups are "bulletin board-style discussion groups" that can be read from, responded to, and downloaded to an individual's computer. See David Landis, Ex- ploring the Online Universe, USA TODAY, Oct. 7, 1993, at 4D. The Usenet newsgroups are available worldwide via Internet. See id. 3. The Internet is the most commonly known "wide area network" (WAN). It "evolved from networks established by the Department of Defense and the National Science Foundation. [The] Internet connects various government, university, and corporate entities, spans 137 nations, and has at least fifteen million users." Eric Schlachter, Cyberspace, the Free Market and the Free Marketplace of Ideas: Recognizing Legal Differ- ences in Computer Bulletin Board Functions, 16 HASTINGS COMM.
    [Show full text]
  • Against Cyberanarchy"
    AGAINST "AGAINST CYBERANARCHY" By David G. Posit TABLE OF CONTENTS I. IN TRO DUCTION .....................................................................................................1365 II. UNEXCEPTIONALISM IN CYBERSPACE ................................................................... 1366 III. SETTLED PRINCIPLES ............................................................................................ 1371 IV . FUNCTIONAL IDENTITY ......................................................................................... 1373 V . SC A LE ...................................................................................................................1376 V I. E FFEC TS ................................................................................................................ 138 1 V II. CON SEN T ..............................................................................................................1384 V III. CONCLUDING THOUGHTS .....................................................................................1386 I. INTRODUCTION It makes me indignant when I hear a work Blamed not because it's crude or graceless but Only because it's new... Had the Greeks hated the new the way we do, Whatever would have been able to grow to be old?' Professor Jack Goldsmith's Against Cyberanarchy2 has become one of the most influential articles in the cyberspace law canon. The position he sets forth-what I call "Unexceptionalism"-rests on two main premises. The first is that activity in cyberspace is "functionally identical to
    [Show full text]
  • Usenet News HOWTO
    Usenet News HOWTO Shuvam Misra (usenet at starcomsoftware dot com) Revision History Revision 2.1 2002−08−20 Revised by: sm New sections on Security and Software History, lots of other small additions and cleanup Revision 2.0 2002−07−30 Revised by: sm Rewritten by new authors at Starcom Software Revision 1.4 1995−11−29 Revised by: vs Original document; authored by Vince Skahan. Usenet News HOWTO Table of Contents 1. What is the Usenet?........................................................................................................................................1 1.1. Discussion groups.............................................................................................................................1 1.2. How it works, loosely speaking........................................................................................................1 1.3. About sizes, volumes, and so on.......................................................................................................2 2. Principles of Operation...................................................................................................................................4 2.1. Newsgroups and articles...................................................................................................................4 2.2. Of readers and servers.......................................................................................................................6 2.3. Newsfeeds.........................................................................................................................................6
    [Show full text]
  • The Internet Is a Semicommons
    GRIMMELMANN_10_04_29_APPROVED_PAGINATED 4/29/2010 11:26 PM THE INTERNET IS A SEMICOMMONS James Grimmelmann* I. INTRODUCTION As my contribution to this Symposium on David Post’s In Search of Jefferson’s Moose1 and Jonathan Zittrain’s The Future of the Internet,2 I’d like to take up a question with which both books are obsessed: what makes the Internet work? Post’s answer is that the Internet is uniquely Jeffersonian; it embodies a civic ideal of bottom-up democracy3 and an intellectual ideal of generous curiosity.4 Zittrain’s answer is that the Internet is uniquely generative; it enables its users to experiment with new uses and then share their innovations with each other.5 Both books tell a story about how the combination of individual freedom and a cooperative ethos have driven the Internet’s astonishing growth. In that spirit, I’d like to suggest a third reason that the Internet works: it gets the property boundaries right. Specifically, I see the Internet as a particularly striking example of what property theorist Henry Smith has named a semicommons.6 It mixes private property in individual computers and network links with a commons in the communications that flow * Associate Professor, New York Law School. My thanks for their comments to Jack Balkin, Shyam Balganesh, Aislinn Black, Anne Chen, Matt Haughey, Amy Kapczynski, David Krinsky, Jonathon Penney, Chris Riley, Henry Smith, Jessamyn West, and Steven Wu. I presented earlier versions of this essay at the Commons Theory Workshop for Young Scholars (Max Planck Institute for the Study of Collective Goods), the 2007 IP Scholars conference, the 2007 Telecommunications Policy Research Conference, and the December 2009 Symposium at Fordham Law School on David Post’s and Jonathan Zittrain’s books.
    [Show full text]
  • Congressional Record—Senate S9017
    June 26, 1995 CONGRESSIONAL RECORD — SENATE S9017 the problems of decolonization. It has After this history, the image of puter networks, I believe Congress outlived its purpose. Rather than President Nelson Mandela—a man im- must act and do so in a constitutional search for a new purpose for this Coun- prisoned for 27 years in his fight manner to help parents who are under cil, we should ask whether it should against apartheid—handing the World assault in this day and age. There is a exist at all. Cup trophy to the white captain of the flood of vile pornography, and we must Mr. President, the other major area rugby team is indeed a powerful sym- act to stem this growing tide, because, for reform is in our thinking about bol of the dramatic changes in South in the words of Judge Robert Bork, it what the United Nations is and what Africa. Throughout the country, whites incites perverted minds. I refer to its role should be in American foreign and blacks alike celebrated the victory Judge Bork from the Spectator article policy. We cannot expect the United of the Springboks, the mascot of the that I have permission to insert in the Nations to be clearer in purpose than is national team. RECORD. its most powerful member state. Mr. President, I join with the inter- My bill, again, is S. 892, and provides At its core, the United Nations is a national community in congratulating just this sort of constitutional, nar- collection of sovereign states and is be- the people of South Africa on winning rowly focused assistance in protecting holden to them for guidance, funding, the rugby World Cup.
    [Show full text]
  • Religious Technology Center V. Netcom On-Line Communications
    Richmond Journal of Law and Technology Volume 3 | Issue 1 Article 7 1997 Religious Technology Center v. Netcom On-Line Communications Services, Inc.: The Knowledge Standard for Contributory Copyright Infringement and the Fair Use Doctrine Eugene A. Burcher [email protected] Anna M. Hughes University of Richmond, [email protected] Follow this and additional works at: http://scholarship.richmond.edu/jolt Part of the Intellectual Property Law Commons, and the Internet Law Commons Recommended Citation Eugene A. Burcher & Anna M. Hughes, Religious Technology Center v. Netcom On-Line Communications Services, Inc.: The Knowledge Standard for Contributory Copyright Infringement and the Fair Use Doctrine, 3 Rich. J.L. & Tech 5 (1997). Available at: http://scholarship.richmond.edu/jolt/vol3/iss1/7 This Notes & Comments is brought to you for free and open access by UR Scholarship Repository. It has been accepted for inclusion in Richmond Journal of Law and Technology by an authorized administrator of UR Scholarship Repository. For more information, please contact [email protected]. Religious Technology Center v. Netcom On-Line Communications Services, Inc. Internet Service Providers: The Knowledge Standard for Contributory Copyright Infringement and The Fair Use Defense By Eugene A. Burcher and Anna M. Hughes[*] July 15, 1996 Cite as: Eugene A. Burcher & Anna M. Hughes, Casenote, Religious Tech. Ctr. v. Netcome On-Line Communications, Inc.: Internet Service Providers: The Knowledge Standard for Contributory Copyright Infringement and The Fair Use Defense, 3 RICH. J.L. TECH. 5 (1997) <http://www.richmond.edu/jolt/v3i1/burhugh.html>[**]. I. Introduction II. The Technology A. The Internet B.
    [Show full text]
  • Jargon File, Version 4.0.0, 24 Jul 1996
    JARGON FILE, VERSION 4.0.0, 24 JUL 1996 This is the Jargon File, a comprehensive compendium of hacker slang illuminating many aspects of hackish tradition, folklore, and humor. This document (the Jargon File) is in the public domain, to be freely used, shared, and modified. There are (by intention) no legal restraints on what you can do with it, but there are traditions about its proper use to which many hackers are quite strongly attached. Please extend the courtesy of proper citation when you quote the File, ideally with a version number, as it will change and grow over time. (Examples of appropriate citation form: "Jargon File 4.0.0" or "The on-line hacker Jargon File, version 4.0.0, 24 JUL 1996".) The Jargon File is a common heritage of the hacker culture. Over the years a number of individuals have volunteered considerable time to maintaining the File and been recognized by the net at large as editors of it. Editorial responsibilities include: to collate contributions and suggestions from others; to seek out corroborating information; to cross-reference related entries; to keep the file in a consistent format; and to announce and distribute updated versions periodically. Current volunteer editors include: Eric Raymond [email protected] Although there is no requirement that you do so, it is considered good form to check with an editor before quoting the File in a published work or commercial product. We may have additional information that would be helpful to you and can assist you in framing your quote to reflect not only the letter of the File but its spirit as well.
    [Show full text]
  • Contributory Liability for Access Providers: Solving the Conundrum Digitalization Has Placed on Copyright Laws
    Federal Communications Law Journal Volume 49 Issue 2 Article 8 2-1997 Contributory Liability for Access Providers: Solving the Conundrum Digitalization Has Placed on Copyright Laws Wendy M. Melone Indiana University School of Law Follow this and additional works at: https://www.repository.law.indiana.edu/fclj Part of the Communications Law Commons, Intellectual Property Law Commons, and the Internet Law Commons Recommended Citation Melone, Wendy M. (1997) "Contributory Liability for Access Providers: Solving the Conundrum Digitalization Has Placed on Copyright Laws," Federal Communications Law Journal: Vol. 49 : Iss. 2 , Article 8. Available at: https://www.repository.law.indiana.edu/fclj/vol49/iss2/8 This Note is brought to you for free and open access by the Law School Journals at Digital Repository @ Maurer Law. It has been accepted for inclusion in Federal Communications Law Journal by an authorized editor of Digital Repository @ Maurer Law. For more information, please contact [email protected]. NOTE Contributory Liability for Access Providers: Solving the Conundrum Digitalization Has Placed on Copyright Laws Wendy M. Melone* INTRODUCTION .................................. 491 I. THE PLAYBOy AND SEGA APPROACHES ................. 495 11. THE INAPPROPRIATENESS OF APPLYING STRAIGHT VICARIOUS LIABILITY .................... 499 HII. SETTING THE RECORD STRAIGHT: RELIGIOUS TECHNOLOGY CENTER V. NETCOM AND CONFLICTING LEGISLATION WITHIN THE Nil COPYRIGHT ACT OF 1995 501 A. ContributoryLiability Is the Best Standardfor Access Providers ................ 501 B. The NIT CopyrightAct of 1995 Imposes Impossible Burdens Upon Access Providers ....... 504 CONCLUSION .................................... 506 INTRODUCTION With the explosion of bulletin board services (BBS)l on the Internet,2 * B.A. University of Florida, 1994; candidate for Doctor of Jurisprudence, Indiana University School of Law-Bloomington, 1997.
    [Show full text]
  • (Computer-Mediated) Communication
    Submitted by Dipl-Ing. Robert Ecker Submitted at Analysis of Computer- Department of Telecooperation Mediated Discourses Supervisor and First Examiner Univ.-Prof. Mag. Dr. Focusing on Automated Gabriele Anderst-Kotsis Second Examiner Detection and Guessing o. Univ.-Prof. Dipl.-Ing. Dr. Michael Schrefl of Structural Sender- August 2017 Receiver Relations Doctoral Thesis to obtain the academic degree of Doktor der technischen Wissenschaften in the Doctoral Program Technische Wissenschaften JOHANNES KEPLER UNIVERSITY LINZ Altenbergerstraße 69 4040 Linz, Osterreich¨ www.jku.at DVR 0093696 Kurzfassung Formen der computervermittelten Kommunikation (CvK) sind allgegenwärtig und beein- flussen unser Leben täglich. Facebook, Myspace, Skype, Twitter, WhatsApp und YouTube produzieren große Mengen an Daten - ideal für Analysen. Automatisierte Tools für die Diskursanalyse verarbeiten diese enormen Mengen an computervermittelten Diskursen schnell. Diese Dissertation beschreibt die Entwicklung und Struktur einer Software- Architektur für ein automatisiertes Tool, das computervermittelte Diskurse analysiert, um die Frage “Wer kommuniziert mit wem?” zu jedem Zeitpunkt zu beantworten. Die Zuweisung von Empfängern zu jeder einzelnen Nachricht ist ein wichtiger Schritt. Direkte Adressierung hilft, wird aber nicht in jeder Nachricht verwendet. Populäre Kommunikationsmodelle und die am weitesten verbreiteten CvK-Systeme werden untersucht. Das zugrunde liegende Kommunikationsmodell verdeutlicht die wesentlichen Elemente von CvK und zeigt, wie diese Kommunikation
    [Show full text]
  • Identity and Deception in the Virtual Community Identity and Deception in the Virtual Community
    2/2/2021 Identity and Deception in the Virtual Community Identity and Deception in the Virtual Community Judith S. Donath MIT Media Lab Prepared for: Kollock, P. and Smith M. (eds). Communities in Cyberspace. London: Routledge Available in Croatian, as Identitet i prijevare u virtualnoj zajednici, (translation courtesy of The Institute of Ethnology and Folklore Research) or in Greek, as ΤΑΥΤΟΤΗΤΑ ΚΑΙ ΕΞΑΠΑΤΗΣΗ ΣΤΗΝ ΔΥΝΗΤΙΚΗ (VIRTUAL) ΚΟΙΝΟΤΗΤΑ Identity and the virtual community Identity plays a key role in virtual communities. In communication, which is the primary activity, knowing the identity of those with whom you communicate is essential for understanding and evaluating an interaction. Yet in the disembodied world of the virtual community, identity is also ambiguous. Many of the basic cues about personality and social role we are accustomed to in the physical world are absent. The goal of this paper is to understand how identity is established in an online community and to examine the effects of identity deception and the conditions that give rise to it. In the physical world there is an inherent unity to the self, for the body provides a compelling and convenient definition of identity. The norm is: one body, one identity. Though the self may be complex and mutable over time and circumstance, the body provides a stabilizing anchor. Said Sartre in Being and Nothingness, ``I am my body to the extent that I am,'' The virtual world is different. It is composed of information rather than matter. Information spreads and diffuses; there is no law of the conservation of information. The inhabitants of this impalpable space are also diffuse, free from the body's unifying anchor.
    [Show full text]
  • E-Mail Editors: Gatekeepers Or Facilitators?
    DOCUMENT RESUME ED 366 010 CS 508 416 AUTHOR Morris, Merrill TITLE E-Mail Editcrs: Gatekeepers or Facilitators? PUB DATE Aug 93 NOTE 25p.; Paper presented at the Annual Meeting of the Association for Education in Journalism and Mass Communication (76th, Kansas City, MO, August 11-14, 1993). PUB TYPE Speeches/Conference Papers (150) Reports Research/Technical (143) EDRS PRICE MF01/PC01 Plus Postage. DESCRIPTORS Communication Research; *Editing; *Editors; *Electronic Mail; Higher Education; Mass Media; Questionnaires; Research Needs IDENTIFIERS Communication Context; *Computer Mediated Communication; *USENET ABSTRACT An exploratory study focused on identifying editing values of a new mass medium, computer discussion groups known as Usenet newsgroups. A Usenet newsgroup is defined as a collection of articles grouped loosely by subject and accessible by nearly anyone with a computer and a modem. At present, most newsgroup users are affiliated with universities, the government, or the computer industry. Questionnaires were sent via e-mail to all current Usenet moderators. Of the 70 moderators who indicated they edited postings, 33 returned completed surveys. Results indicated that:(1) 72.7% of the moderators said that editing was either somewhat important or very important to group members;(2) for the most part, the moderators are not professional editors;(3) editing standards are not generally high;(4) the values of usefulness and "flaming" were influential for the moderators; and (5) the moderators used 75% to 100% of the postings to their newsgroup, with most using nearly all the submissions. Findings suggest that the moderators act more as facilitators than gatekeepers in the usual journalistic sense; and that, if computer communication is indeed a new mass medium, mass communication researchers must consider new models for understanding it.
    [Show full text]
  • Democratic Participation in the Discursive Management of Usenet
    Proceedings of the 35th Hawaii International Conference on System Sciences - 2002 1 Democratic Participation in the Discursive Management of Usenet John C. Paolillo, SLIS and Informatics and David Heald, Computer Science Indiana University, Bloomington <[email protected]> <[email protected]> voters can take advantage of the increased information Abstract available to them, and the greater freedom (i.e., the ability to “vote in one’s pajamas”) and lower costs [11] Internet voting, sometimes proposed as a means of afforded by online voting will thereby ameliorate past enhancing democratic participation, is partly inspired problems of potentially uninformed, apathetic elector- by the democratic process of newsgroup creation on ates and limited access to the polls on account of loca- Usenet. To better understand how online voting might tion, disability, race, etc. These forecasts raise the ex- influence democratic participation more generally, we pectation of higher election turnouts, including among conducted an empirical investigation into the voting traditionally disenfranchised groups. activity on newsgroups in the comp hierarchy of Use- In much this spirit of optimism, the Spring 2000 net since 1989. Counter to expectation, participation Arizona Democratic Party primary offered voters the does not appear to be organized into factions or interest option of casting online and mail-in ballots in addition groups, but rather there are distinct, individualized pat- to more traditional voting options. This experiment terns of voting. At a coarser level of analysis, some was not entirely successful, however, and it was chal- interest-based patterns do emerge, but these appear to lenged early on by voting-rights groups who feared that correspond to frequent individual voters instead of co- problems of differential access to the Internet could lead herent groups of voters.
    [Show full text]