6. Message System Mores616. Message System MoresThe great art of living easy and happy in society is to study proper behaviour, and even with ourmost intimate friends to observe politeness; otherwise we will insensibly treat each other with adegree of rudeness, and each will find himself despised in some measure by the other. --BOSWELL, London Journal (Dec.1, 1762)What is this?This section is an essay on manners, that is, message system manners. Laurel in its variousreleases has been in use for over three years at the time of this writing. In this time manypatterns of message system user behavior have been discovered, and doubtless many more suchpatterns will be discovered in the future. This section gathers together several observations ofLaurel user behavior in an effort to spread understanding of this new electronic message mediumand to instruct users in proper behavior.The contents of this section may be divided into roughly two kinds, objective observations ofmessage system social phenomena and definitely biased suggestions of standards. The opinionsexpressed herein are solely those of the author. These opinions are not based on scientific studiesor samples, but rather on certain gut feelings that have evolved through a close association withLaurel since its inception. I expect that several of the opinions set down here will receivevigorous debate, but so much the better to spread the word.A brief outline of this section follows.Communication patternsA brief discussion of structures within whichcommunication takes place.The wrong numberWhat to do when you receive a message intended forsomeone else.Rudeness and vulgarityWhy it appears in electronic mail.Message system costsHow the way we pay for communication affects whatwe say.Unsolicited mailWhat it is and when it is or isn't appropriate.The chain reactionA description of a phenomenon peculiar to electronicmail. The Reply-To feature and how it helps.Miscellaneous distribution list peccadillosDistribution list etiquette.Off-the-record responsesWhen and when not to publish.Hardcopy formsHow to permanently engrave messages properly.MasqueradingAnonymous (or worse) messages.Wizards vs. naive usersHow to keep arcana to yourself.The moral of this taleBe considerate of others."fpXFf g^qnZfrDnXInW^L,U( gPs gM,p< gKa<! gI< gGI gF!> gD7) g@#: g>O g=/d g;e.3 g9U g7; g4^( g0' xy&' /! g-3'  #' +i g){'  g'' ' % g#' + g!' 3' - g.+'  g@'  gR ' * gd '  gv'  g'  gA gK'8 gI&: gGI gF$J gDZX gB@ g@;( g> g;W g9 L g7?! g6(B g4^G g2;! g0K g.= g-3 N g+i g';# g&,> g$aM g"T g &4 g5 gus gp2+ g96* gnK gY g/ g gH g U g U=]M6. Message System Mores65present. The sender is also able to speak his or her piece completely, without any interveningexchanges with the recipients that might moderate the entire business. This situation is enhancedwhen the recipients are not named directly, but are addressed indirectly through an impersonaldistribution list. This imbalance in feelings between sender and recipient has wide rangingconsequences.An obvious consequence of this imbalance is that opinions expressed and the language used toexpress them in messages can be wildly inappropiate to the customs and expectations of therecipients of such a message. A reader may justifiably feel slapped in the face by a message heor she considers to be in extremely bad taste.When rebuked for such behavior, errant senders have been known to say "I didn't intend it thatway!" This is not good enough. The damage has already been done. The only remedy is forsenders to think about what they are saying and to whom they are saying it. The message systemto date has been fairly unrestricted. Only as long as the society of message system users practicesself-restraint will such a free-wheeling communication medium be tolerated. There are severalmeans of applying institutional censorship to the message system traffic, means that we hope willnever need to be implemented.Message system costsMany of the problems associated with improper use of the message system are exacerbated(caused?) by the lack of charging for message system usage. In nearly all other modes ofcommunication, "sending a message" implies a certain cost (or risk) which rises with the numberof recipients that are being reached. Free speech is, in this sense, not free at all. Certainly in afree society, one can say what one pleases, but not without paying for the means to say it. Letme illustrate this with some examples.In nearly every communication medium, costs for the use of that medium are borne by thesender of messages. Postal mail requires the sender to pay for a stamp for each copy of amessage that is sent. Telephone service is charged to the originator of calls, and each call (ingeneral) goes to only one recipient. Broadcasting messages via radio or television requires a largeinvestment on the part of the sender. The costs of printing handbills or posters are likewiseborne by their authors. Public speeches, if they are to reach a large audience, require use ofsound systems, etc., that are paid for by the speaker.It may be argued that recipients do pay some of the costs for using some of these systems.However, these costs (the price of a radio receiver, basic telephone service, etc.) are generallyconstant; they do not increase as received message usage increases. A receiver's cost forelectronic mail is similar in this respect in that the cost of a workstation on which Laurel runs isborne by the receiver.Some other modes of communication do require explicit payment by the receiver. Commercialfilms, books, magazines and records fall into this category. However, publication of thesematerials does involve a substantial financial risk. Material that is not likely to be well-received isseldom published, and when it is, large costs are often incurred by the publisher."fpXFf g_*5 g]K T g[V gYT gW gTy0, gR> gP7) gO. gK? gI$6 gH/0 gFHd gD}K gBI g@ g<\s g8pW g7 M g5U*5 g3f g1+5 g/& g,F g*4& g(] g'#^ g%XE g#,3 g!6 gQ#7 g$= g!9 g@$ g' g P g< g h gUR g=Y$LAUREL MANUAL66Electronic mail as implemented in Laurel and Grapevine has a very different cost structure. Thecost for a sender is minimal. It essentially consists of the time it takes to compose and send amessage. If time is considered the major cost factor, then it is the recipients who pay dearly forthe messages they receive. When the amount of time each recipient spends on a message sent toa large distribution list (even if a quick scan of part of the message followed by a Delete), issummed over all recipients, this is easily much more than the time consumed by the sender ofthat message.While we would like to keep the free structure of a message system, where any user can send anymessage to any other users, this freedom must be used with some care. When electronic messagesystems become widespread, they will undoubtedly change their cost structures to match those ofthe more traditional communication systems.Unsolicited mailThe existence of large public distribution lists in our message system makes it easy for a sender toreach a very wide audience. Each distribution list has a distinct purpose, e.g., lists of peopleinterested in particular topics, lists of employees in certain organizations, lists of members ofparticular projects, etc. Some lists are used primarily to keep track of all users of the messagesystem. These include such lists as AllPA^.PA, AllES^.ES, etc., which contain the names of allindividuals in those particular registries. There are also some lists maintained on a purelygeographical basis, e.g., PaloAlto^.PA, which lists all message system users in Palo Alto,California. This is not necessarily the same as AllPA^.pa, which includes people in the PA registry, but who maynot actually work in Palo Alto.The audiences addressed by these lists should not be considered a captive audience for all usersof the message system. The purpose of any distribution list may be discovered by any user (in aregistry served by Grapevine) by running the Maintain.laurel program and using the Type Entrycommand for that list (Appendix B). The purpose of the list will be printed in the Remark: entryfor that list. Although all lists are (currently) available for use by any message system user, manylists, e.g., Allx^.x where x is a registry name should not be used by anyone who doesn't have avery good reason for doing so.Many distribution lists exist for the enjoyment of their members who wish to receive items ofinterest to them. One should feel free to send an anouncement of an upcoming musical event inNorthern California, for instance, to Music^.PA. Such a message is quite inappropriate to send toAllPA^.PA, PaloAlto^.PA, etc. There are lists of message system users who have agreed to sufferthrough any and all messages. These lists (Junk^.PA, various CrankMail.dl files, etc.) are the onlylists to which ridiculous messages may be sent without incurring the justifiable wrath of messagesystem users.A Laurel user should understand when a message is appropriate to send to all people in his orher work group. Social values are different in different locations, and the members of each groupshould understand what they are. It has been observed that messages that are sent to audienceswider than the sender's immediate group are the ones that cause the most trouble.$fptpXt gfp g_:& g]K-4 g[): gYV gWNup gV!#9 gTV gP Q gO0. gMO\ gK+ gFs gCpL gA7* g?^ g>&)9 g<\!> g:] g8 F  g6 tD vt g5U g2pF g0;7) g.qN g,[ g*G g)spspspA g'F g#Z g" // g ?b gt@ g Y g6+ g gZ g"@ g $; gCQ g gGbs gCp\ gB%Q g@[)4 g>X g<(3 g:up$6 g90= g5S g3K g2)/].A]+E-]' g$a] P]%F ]Z gV g(twt gv'H g gp#< g,2 g%@ g D. g <\LAUREL MANUAL68The measures taken within Laurel to counteract the chain reaction phenomenon involve use of aspecial header field in messages called the Reply-To: field. Please note the spelling of "Reply-To": it contains a hyphen.When an answer to a message containing a Reply-To: field is initiated with the Answer command,only the name(s) listed in that field (plus your own name in the copies field) are put into theanswer form as recipients. In conjunction with the automatic addition of Reply-To: fields upondelivery, this gives a simple mechanism to break the chain of replies.When a message is sent with the Deliver command, if that message contains a large number ofrecipients or any public distribution lists, and it has no Reply-To: field, then the delivery isinterrupted pending user interaction to specify what kind of Reply-To: field is desired. A promptwill appear in the feedback region specifying the number of recipients and the number ofdistribution lists to which the message is being sent. It also asks you to choose a "Reply-To"option, with the reminder"ESC = answers to self only, A = answers to all, DEL = cancel delivery."At this point you must choose one of these options; delivery is postponed until you do so.The recommended option when sending to a large list is for you to strike the ESC key. This willautomatically insert a Reply-To: field, where is your name. Anyone who receivessuch a message and who initiates a response by using the Answer command will begin editing aform that includes only you and himself or herself as recipients.There are situations in which replying to the entire list of original recipients is appropriate. Thesesituations include sending technical messages to members of a project, scheduling queries forbackgammon nights, etc. In these cases, strike an A (upper or lower case) for your "Reply-To"choice. This will send the message without a Reply-To: field, so that recipients who use Answerwill get forms with all recipient names and lists included as recipients.If you are hopelessly confused by this, or you realize that you would like to edit the Reply-To:field slightly, then strike the DEL key (actually any key other than ESC or A) in answer to the "Reply-To" prompt. The Reply-To: line will be added to your message anyway, but the messagewill not be sent. At this point you may edit your message, perhaps adding a few extra names tothe Reply-To: field, and then invoke the Deliver command again.Note that you are not bothered by this prompt if you have already included a Reply-To: field inyour message. The reasoning behind this is that if a Reply-To: field is already in the outgoingmessage, then you must have already noticed the wide distribution of the message and takenappropriate steps. Good for you!One final note on this topic. Although Laurel provides these mechanisms to help break chainreactions, the ultimate responsibility for messages sent lies with their senders. Always check thelist of recipients in any message you are about to send. Excuses of the form "Laurel let it getaway." are feeble indeed.$fptpXt gfp g_L g]K<% g[ gX8up gVD_ gTyI gRF gO=up" gMrH gKO gI= gH:% gFH1Ctptptp gA I g=#*tp g;Q g:9up g89A g4^ g2= g123tp# g/hHu g-pI g*+ V g(`tpt&p g&.. g$C g#)up gV g00 gT g/! gH gR g(/1 g] 2 g field whenperforming such services for your audience.A note of caution is in order here. Messages should be considered PRIVATE, unless otherwiseindicated. If your intention is to publish the responses, then by all means make that intentionclear in the same message that poses the original question. If your message did not make thatintention clear, and you decide that you would like to publish the responses, then follow up oneach response asking whether you may do so.If the intention to publish responses is clearly indicated in the original message, then publicationof any response is fine, as long as that response does not explicitly mention that it should beconsidered private.Hardcopy formsThe message system in Xerox is used for communication about Xerox related business and forpersonal messages. It is appropriate to put onto Xerox internal memo forms (electronicallygenerated or not) only those messages whose purpose is related to Xerox business. (Thecorporation has specific guidelines relating to the use of the Xerox logo, internal memo forms,etc. Common sense is all you need to derive these guidelines for yourself.) Many of the featuresand defaults of Laurel have been designed to allow users of the message system to behaveproperly with respect to these guidelines.If a message you send to others is intended to be a Xerox internal memo, include a PrintForm:InternalMemo line in its header. When your recipients print this message in the normal way, themessage will appear as an internal memo. On the other hand, if a message is truly frivolous, aPrintForm: Blank line in the header of your message is likely to prevent inappropriate printing.Refrain from mentioning any custom hardcopy form in a PrintFrom: field unless you know thatall of your recipients have included that custom form in their Laurel profiles."fpXFf g_s+ g[pJ gX2H gVgI gT" gQ+A# gO`Q gK'> gJ#T gEs gB%pT g@[G g>T g<G g:+ g74( g5:& g3@ g2)@ g0_+ g,A# g+"R g)W g$s g!Yp< gB g; gJ g/b gd? g* g(> g]H g_ g ` g M g 3O g =^ LAUREL MANUAL70Although it is possible to change the default hardcopy form (used for those messages that do notcontain a PrintForm: field), this change should not be made unless you have a real need to do so.The Blank form is adequate for most hardcopies, and special printing is possible using the Form{brackets} in the hardcopy submenu on a case-by-case basis.MasqueradingOn occasion, people have received messages from fictitious senders, or even worse, from someonemasquerading as another real message system user. This is a most serious breach of messagesystem etiquette, and should be considered so by all message system users.A fictitious From: field is legitimate when a valid Sender: field is included. For instance,messages that are properly signed with an organization's name, say "The Laurel Group", may besent by explicitly typing a "From: The Laurel Group" line in the message header. Laurel willnotice that a From: field is already there, and it will include a Sender: line in thedelivered message instead of its usual From: line. Any time you receive a messagethat has a strange From: field, you may check the Sender: field for the actual sender.By a "masquerader" I mean someone who subverts the normal mechanisms embedded in thestandard message system programs to send messages of dubious value, without having his or hername appear in such messages. This action is possible not only in electronic message systems, butin other more traditional communication media as well. Masquerading as another may be acriminal act when committed using traditional communication media, with penalties specified inlaws that prohibit libel, slander and fraud. Other situations, such as telephone "breathers", aresimilarly outlawed.At this time, I do not know of any court cases involving libel, slander, etc. in an electronic mailcontext. Such cases are sure to arise when electronic mail does become more widespread.Masquerading in the message system is not cute or clever. Don't do it. Wizards vs. naive usersThis section is addressed mainly to the wizards who should know better. The population ofmessage system users covers a broad range from those who have knowledge of the most arcanedetails of a system to those who just barely understand the basics of using that system. Whenyou send a message to a wide audience, be considerate of the naive users, who may get confusedby technical jargon.This admonition extends to those who are using a new, restricted program. It does not help arecipient to hear "Oh you're using that old program. Well, I guess you're stuck." Just don'tmention such things to users who cannot take advantage of them.The moral of this taleThe moral of all this is simple: Be considerate. As we strive toward this goal, everyone's use ofthe message system will become even more of a joy than it already is.$fptpXt gfp g_K g]KM g[P u gYpup1 gU*s gQpG gO7$ gN#J gJ] gH!< gG"; gEQ7* gC^ gAV g>JP g<<! g: W g8 K g7;# g5UG g3 g0H g.M J g,H g's g$pG g"#7 g > g%<" gZ g] g"< gS? gs gUpB g E : g C=[ TIMESROMAN  TIMESROMAN  HELVETICA TIMESROMAN  TIMESROMAN TIMESROMAN  TIMESROMAN TIMESROMAN ) 28 AIQj/T Rlaurel6-6.bravoBrotzJuly 22, 1981 5:36 PM