Entry
Reader's guide
Entries A-Z
Subject index
CommuniTree
CommuniTree was a San Francisco–based electronic bulletin-board service (BBS) begun in 1978 as a social experiment in free speech and community building. Closed as a result of vandalism by young users in 1982, CommuniTree's destruction is one of the earliest documented examples of deviant user behavior in an online environment.
Before CommuniTree, BBSs were constructed as computerized metaphors for physical bulletin boards: They were places to post information, arranged alphabetically or by date. But as virtual-community expert Howard Rheingold observes, “CommuniTree, starting with its name, was specifically focused on the notion of using BBSs to build community, at a time when most other BBSers were still more interested in the technology itself.” In 1978, programmer Jon James designed CommuniTree's software to resemble a tree structure, with each line of conversation functioning as a branch, flourishing or dying based on user interest.
CommuniTree was emblematic of the spirit of “virtual hippiedom” that pervaded the online world of the 1970s and 1980s. As Rheingold recalls it, CommuniTree was a space of freewheeling conversations, held with no censorship or moderation whatsoever. But CommuniTree's “gods” couldn't know that the introduction of the Apple computer to American schools would change the social climate of virtual communities forever. In 1982, students (mostly boys) began getting connected to BBSs using school-contributed computers and modems. They quickly discovered the Tree's telephone number, logged on, and began participating.
Chopping Down the Tree
As Internet researcher Allucquère Rosanne (Sandy) Stone reports, the young boys who happened upon CommuniTree “appeared uninspired by the relatively intellectual and spiritual air of the ongoing debates, and they proceeded to express their dissatisfaction in ways appropriate to their age, sex and language abilities.” Within a short time, the Tree was covered with obscene and scatological messages. In her analysis of one of the first documented cases of deviant behavior in an online setting, Stone defends the young experimenters, and points out that not all of them necessarily wanted to wreck the conferences on CommuniTree. Rather, she observes, “entering control codes into the Apple's operating system from a remote location was an exploratory operation similar to swinging a crow-bar in a darkened pottery factory.”
Unfortunately, CommuniTree—which had been designed expressly to allow its users freedom from censorship of any kind—couldn't withstand the onslaught of young users. The BBS had no means of deleting unwelcome messages, and no way to monitor messages as they arrived into the system. After a few months, CommuniTree's hard disk crashed, and the BBS closed permanently. The death of CommuniTree, argues Stone, imparted hard lessons for virtual hippies “about what was and what was not possible in a unstructured and unprotected conference environment.” In new observations in the 2000 edition of his 1994 book Virtual Community, Howard Rheingold concurs, arguing that “attention-seeking through aggression” has probably destroyed more virtual communities than any other single factor.
New Forms of Self-Protection
Since the fall of CommuniTree, online community architects have included more stringent measures of surveillance and social control in their environments. Some are software-based, such as the controls designed to filter spammers. Others depended on human vigilance, such as the security measures taken to discourage hackers and “script kiddies” in chat forums. Still others, like the numerical post-ranking system used by members the of Web message board http://Slashdot.org, began as a result of community self-restraint in the face of unrelenting trolls (pointlessly hostile posters). In addition, some cyberspace forums now require users to authenticate their identities online, either by demanding that they use their real names, by telephone verification systems, or (in the most sophisticated forums) via key encryption methods. Forums requiring authentication cite the popular research sentiment that anonymity is the single biggest cause of deviant behavior online.
...
- Art, Music, and Performance
- Business and Commerce
- http://Amazon.com
- http://MP3.com
- Business-to-Business
- Cookies
- Customer Relationship Management
- Digital Cash
- Disintermediation
- E-Commerce
- Harold Innis
- Internet Service Providers
- Jakob Nielsen
- Jeff Bezos
- Knowledge Management
- Local Area Network
- Margaret Whitman
- Metrics
- Napster
- Narrowcasting
- Personalization
- Peter Drucker
- Security
- Stephen M. Case
- Steven P. Jobs
- Telecommuting
- Trademark
- Video Conferencing
- William H. Gates, III
- Cyberculture
- “A Manifesto for Cyborgs”
- Neuromancer
- The New Hacker's Dictionary
- The Soul of a New Machine
- Understanding Media: The Extensions of Man
- Allucquère Rosanne Stone
- Avatar
- Blog
- Bruce Sterling
- CommuniTree
- Convergence
- Cyberculture
- Cyberethics
- Cyberfeminism
- Cyberpunk
- Cyberspace
- Cyberwarfare
- Donna J. Haraway
- Electronic Civil Disobedience
- Electronic Democracy
- Electronic Frontier Foundation
- Emoticons
- Esther Dyson
- Gender and New Media
- Habitat
- Hacking, Cracking, and Phreaking
- Hacktivism
- Howard Rheingold
- Instant Messaging
- Interactvity
- John Perry Barlow
- Killer Application
- LambdaMOO
- Marshall McLuhan
- Meme
- Metrics
- Mitchell Kapor
- Nicholas Negroponte
- Online Journalism
- Peer-to-Peer
- Race and Ethnicity and New Media
- Sherry Turkle
- Virtual Community
- William Gibson
- Hacking
- 2600: The Hacker Quarterly
- The New Hacker's Dictionary
- CommuniTree
- Computer Emergency Response Team
- Copyleft
- Cyberculture
- Cyberethics
- Cyberwarfare
- DeCSS
- Electronic Civil Disobedience
- Electronic Frontier Foundation
- Encryption and Cryptography
- Eric Raymond
- Hacking, Cracking, and Phreaking
- Hacktivism
- John Perry Barlow
- Mitchell Kapor
- Richard Stallman
- Security
- Virus
- Legal Topics
- 2600: Hacker Quarterly
- Bernstein vs. the U.S. Department of State
- United States vs. Thomas
- Anonymity
- Carnivore
- Child Online Protection Act and Child Online Privacy Protection Act
- Communications Decency Act
- Copyleft
- Copyright
- DeCSS
- Digital Millennium Copyright Act
- Electronic Civil Disobedience
- Electronic Communications Privacy Act
- Electronic Frontier Foundation
- Hacking, Cracking, and Phreaking
- Linking
- Napster
- Obscenity
- Pamela Samuelson
- Privacy
- Security
- Networks and Networking
- ARPANET
- BITNET
- Broadband
- Browser
- Bulletin Board Systems
- Cellular Telephony
- CommuniTree
- Community Networking
- Distributed Computing
- Firewall
- Freenet (Community Network)
- Freenet (File-Sharing Network)
- Internet
- Internet Appliances
- Internet Corporation for Assigned Names and Numbers
- Internet Engineering Task Force
- Internet Relay Chat
- Internet Service Providers
- LISTSERV
- Local Area Network
- Marc Andreessen
- Markup Languages
- Minitel
- MUDs and MOOs
- Napster
- Newsgroups
- Peer-to-Peer
- PLATO
- Satellite Networks
- Short Messaging System
- Telephony
- Tim Berners-Lee
- Usability
- vBNS
- Videotex
- Whole Earth ‘Lectronic Link’
- Wireless Application Protocol
- Wireless Networks
- World Wide Web
- Open-Source Software
- Organizations and Labs
- Association for Computing Machinery
- Computer Emergency Response Team
- Electronic Frontier Foundation
- Institute of Electrical and Electronic Engineers
- Internet Corporation for Assigned Names and Numbers
- Internet Engineering Task Force
- Media Lab, Massachusetts Institute of Technology
- SIGGRAPH
- SRI International
- World Wide Web Consortium
- Xerox Palo Alto Research Center
- People
- Alan Kay
- Alan Turing
- Allucquère Rosanne Stone
- Anita Borg
- Bill Joy
- Brenda Laurel
- Brian Eno
- Bruce Sterling
- Claude Shannon
- Daniel Sandin
- Donna Hoffman
- Donna J. Haraway
- Douglas Englebart
- Edward Tufte
- Eric Raymond
- Esther Dyson
- George Lucas
- Hal Varian
- Hans Moravec
- Harold Innis
- Howard Rheingold
- Ivan Sutherland
- J. C. R. Licklider
- Jakob Nielsen
- Jaron Lanier
- Jeff Bezos
- John Carmack
- John Perry Barlow
- John von Neumann
- Kai Krause
- Laurie Anderson
- Lawrence Lessig
- Manuel Castells
- Marc Andreessen
- Margaret Whitman
- Marshall McLuhan
- Marvin Minsky
- Michael Joyce
- Mitchell Kapor
- Nam June Paik
- Nicholas Negroponte
- Pamela Samuelson
- Pattie Maes
- Peter Drucker
- Raymond Kurzweil
- Richard Stallman
- Robert Moog
- Rodney Brooks
- Seymour Papert
- Sherry Turkle
- Stephen M. Case
- Steven P. Jobs
- Stewart Brand
- Theodor Holm (Ted) Nelson
- Thomas DeFanti
- Tim Berners-Lee
- Vannevar Bush
- Vinton Cerf
- W. Daniel Hillis
- William Gibson
- William H. Gates, III
- Social Issues
- Access
- Anonymity
- Carnivore
- Cyberethics
- Cyberfeminism
- Cyberwarfare
- Digital Divide
- Disposal of Computers
- Education and Computers
- Electronic Civil Disobedience
- Electronic Democracy
- Encryption and Cryptography
- Gender and New Media
- Hacking, Cracking, and Phreaking
- Hacktivism
- Obscenity
- Patent
- Privacy
- Race and Ethnicity and New Media
- Security
- Spam
- Technological Determinism
- Universal Design
- Virtual Community
- Technology
- ARPANET
- Authoring Tools
- Bluetooth
- Broadband
- Browser
- Bulletin Board Systems
- Carnivore
- CAVE
- CD-R, CD-ROM, and DVD
- Cellular Telphony
- Chat
- Codec
- Compression
- Computer-Supported Collaborative Work
- Content Filtering
- Cookies
- DeCSS
- Desktop Video
- Digital Asset Management
- Digital Subscriber Line
- Digital Television
- Distributed Computing
- Emulation
- Encryption and Cryptography
- Expert Systems
- Firewall
- Flash
- Graphical User Interface
- Habitat
- Hypermedia
- Hypertext
- Instant Messaging
- Interactive Television
- Internet
- Internet Appliances
- Internet Relay Chart
- Java
- Linux
- Local Area Network
- Markup Languages
- MIDI
- Minitel
- MP3
- MPEG
- Object-Oriented Programming
- Optical Character Recognition
- Optical Computing and Networking
- Peer-to-Peer
- Personal Digital Assistants
- Photoshop
- Qube
- Robotics
- Satellite Networks
- Shockwave
- Short Messaging System
- Sketchpad
- Software Agents
- Streaming Media
- Telecommuting
- Telephony
- vBNS
- Videoconferencing
- Videotex
- Virus
- Wireless Application Protocol
- Wireless Networks
- World Wide Web
- Writing
- “A Manifesto for Cyborgs”
- “As We May Think”
- “Man-Computer Symbiosis”
- “The Cathedral and the Bazaar”
- 2600: The Hacker Quarterly
- Neuromancer
- The New Hacker's Dictionary
- The Soul of a New Machine
- Understanding Media: The Extensions of Man
- Bruce Sterling
- Cyberpunk
- Electronic Publishing
- Emoticons
- Hypertext
- Michael Joyce
- William Gibson
- Loading...
Get a 30 day FREE TRIAL
-
Watch videos from a variety of sources bringing classroom topics to life
-
Read modern, diverse business cases
-
Explore hundreds of books and reference titles
Sage Recommends
We found other relevant content for you on other Sage platforms.
Have you created a personal profile? Login or create a profile so that you can save clips, playlists and searches