Skip to main content icon/video/no-internet

CommuniTree was a San Francisco–based electronic bulletin-board service (BBS) begun in 1978 as a social experiment in free speech and community building. Closed as a result of vandalism by young users in 1982, CommuniTree's destruction is one of the earliest documented examples of deviant user behavior in an online environment.

Before CommuniTree, BBSs were constructed as computerized metaphors for physical bulletin boards: They were places to post information, arranged alphabetically or by date. But as virtual-community expert Howard Rheingold observes, “CommuniTree, starting with its name, was specifically focused on the notion of using BBSs to build community, at a time when most other BBSers were still more interested in the technology itself.” In 1978, programmer Jon James designed CommuniTree's software to resemble a tree structure, with each line of conversation functioning as a branch, flourishing or dying based on user interest.

CommuniTree was emblematic of the spirit of “virtual hippiedom” that pervaded the online world of the 1970s and 1980s. As Rheingold recalls it, CommuniTree was a space of freewheeling conversations, held with no censorship or moderation whatsoever. But CommuniTree's “gods” couldn't know that the introduction of the Apple computer to American schools would change the social climate of virtual communities forever. In 1982, students (mostly boys) began getting connected to BBSs using school-contributed computers and modems. They quickly discovered the Tree's telephone number, logged on, and began participating.

Chopping Down the Tree

As Internet researcher Allucquère Rosanne (Sandy) Stone reports, the young boys who happened upon CommuniTree “appeared uninspired by the relatively intellectual and spiritual air of the ongoing debates, and they proceeded to express their dissatisfaction in ways appropriate to their age, sex and language abilities.” Within a short time, the Tree was covered with obscene and scatological messages. In her analysis of one of the first documented cases of deviant behavior in an online setting, Stone defends the young experimenters, and points out that not all of them necessarily wanted to wreck the conferences on CommuniTree. Rather, she observes, “entering control codes into the Apple's operating system from a remote location was an exploratory operation similar to swinging a crow-bar in a darkened pottery factory.”

Unfortunately, CommuniTree—which had been designed expressly to allow its users freedom from censorship of any kind—couldn't withstand the onslaught of young users. The BBS had no means of deleting unwelcome messages, and no way to monitor messages as they arrived into the system. After a few months, CommuniTree's hard disk crashed, and the BBS closed permanently. The death of CommuniTree, argues Stone, imparted hard lessons for virtual hippies “about what was and what was not possible in a unstructured and unprotected conference environment.” In new observations in the 2000 edition of his 1994 book Virtual Community, Howard Rheingold concurs, arguing that “attention-seeking through aggression” has probably destroyed more virtual communities than any other single factor.

New Forms of Self-Protection

Since the fall of CommuniTree, online community architects have included more stringent measures of surveillance and social control in their environments. Some are software-based, such as the controls designed to filter spammers. Others depended on human vigilance, such as the security measures taken to discourage hackers and “script kiddies” in chat forums. Still others, like the numerical post-ranking system used by members the of Web message board http://Slashdot.org, began as a result of community self-restraint in the face of unrelenting trolls (pointlessly hostile posters). In addition, some cyberspace forums now require users to authenticate their identities online, either by demanding that they use their real names, by telephone verification systems, or (in the most sophisticated forums) via key encryption methods. Forums requiring authentication cite the popular research sentiment that anonymity is the single biggest cause of deviant behavior online.

...

  • Loading...
locked icon

Sign in to access this content

Get a 30 day FREE TRIAL

  • Watch videos from a variety of sources bringing classroom topics to life
  • Read modern, diverse business cases
  • Explore hundreds of books and reference titles

Sage Recommends

We found other relevant content for you on other Sage platforms.

Loading