skip to main content
10.1145/99186.99245acmconferencesArticle/Chapter ViewAbstractPublication PagesuccsConference Proceedingsconference-collections
Article
Free Access

Averting one's eyes: ethical approaches to postmastering

Authors Info & Claims
Published:01 August 1990Publication History

ABSTRACT

Being an electronic postmaster requires diligence, knowledge of mailing systems on many mail networks and host operating systems, and the ability to sit in front of a workstation, trying to decipher bounced mail hearders, for long hours every week.

It also requires that the postmasters be scrupulously ethical about the confidentiality of the mail that passes in front of them, despite the fact that sometimes in order to clear up a mail problem the text of the message comes up on the screen.

This paper explores some strategies used by campus postmasters on several campuses, and discusses some relevant issues of security, ethics and responsible behavior.

References

  1. 1.Ema-Lynne Bogue, a doctoral candidate in Social Work at the University of Michigan, and a SPSSx consultant, did all the SPSSx programming. She also taught me how to interpret the results, helped me pinpoint places to explore further, and encouraged me to learn a great deal about statistics while doing this project.Google ScholarGoogle Scholar
  2. 2.Text in this paper is defined to be the content of the message; the information that the user is transmitting.Google ScholarGoogle Scholar
  3. 3.Postmasters sometimes see messages in which the headers have been so thoroughly mangled that the origins are completely mysterious. For this reason, by the way, it's a good idea to include your name and electronic mail address at the end of your message, so that your recipient will know what you think your address is in case of problems.Google ScholarGoogle Scholar
  4. 4.Or, as another put it, "Users put the most astonishing thinks in electronic mail, and assume that nobody will ever see it. It never fails to amaze me the things that people to say to each other over electronic mail that they probably don't say to each other in the bextroom."Google ScholarGoogle Scholar
  5. 5.For those of you who may be unfamiliar with the "smiley face" in electronic communications, turn the page sideways. The ) is a mouth.Google ScholarGoogle Scholar
  6. 6.One anecdote is particularly telling. To quote the respondent: {The story starts with a description of a bug in a miler that left a number of messages in the postmaster's queue. The respondent describes his usual practice of reading only the first 30 lines, since usually those 30 lines are only header material.}Google ScholarGoogle Scholar
  7. 7.One postmaster called these trapped messages "bounce-ograms".Google ScholarGoogle Scholar
  8. 8.Not all respondents made comments, of course, which is why sometimes the numbers in these sections dealing with commentary don't always add up.Google ScholarGoogle Scholar
  9. 9.Mailing lists are deemed for the purposes of this paper to be public or semi-public lists or digests, such as Info- IBMPC, INTER-L, or other such public discussions. Private mailing lists, such as those created by individual users and which are not open for the public to join, are not included.Google ScholarGoogle Scholar
  10. 10.Electronic Communications Privacy Act.Google ScholarGoogle Scholar

Index Terms

  1. Averting one's eyes: ethical approaches to postmastering

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                SIGUCCS '90: Proceedings of the 18th annual ACM SIGUCCS conference on User services
                August 1990
                447 pages
                ISBN:0897914066
                DOI:10.1145/99186

                Copyright © 1990 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 1 August 1990

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • Article

                Acceptance Rates

                Overall Acceptance Rate123of170submissions,72%
              • Article Metrics

                • Downloads (Last 12 months)1
                • Downloads (Last 6 weeks)0

                Other Metrics

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader