Computer-Mediated Communication (CMC)

One-to-One CMC

E-Mail Basics: @'s, Smileys, Angle Brackets, and Sigs

Tracking Down E-Mail (and Other) Addresses

Paddling Through the Patois: Net Jargon

Common abbreviations in e-mail are:

BTW  	By The Way                    		LOL  Laughing Out Loud

GD&R  Grinning, Ducking, and Running     	L8R  [see you] Later

IMHO 	In My Humble Opinion               	FAQ  Frequently Asked Questions

ROTFL     Rolling On The Floor Laughing      	RTFM Read the Fucking Manual

Smileys or emoticons

Emoticons are punctuation marks that, when viewed sideways, resemble little smiley faces

:)

:-)  smiley with a nose            		:-O  shock

Q:-) smiley with a beret      			:(   sadness, disappointment

;)   irony or flirtation (a wink)       	:]   goofiness

:-p  derision (tongue sticking out)     	8-)  smiley with glasses

See also, Dave Barry's emoticons, from Dave Barry in Cyberspace. (Local mirror.)

Angle brackets (the greater-than/less-than signs: <>) to indicate something akin to stage directions in a play.

E.g., humility might be suggested like this:

<digging toe in sand>
Thank you for the kind words in your last message.

Or, the thrill of discovery might be indicated like this:

<slapping forehead>

I think it would be fun to run a newspaper!

Internet equivalents to underlining, italics, boldface, superscripts, or other common typographic conventions:

_Putting an underscore before/after a phase equals underlining._

Asterisks before/after a word indicate *emphasis* (as if it were
italicized or bolded).


ALL CAPITALS also signifies EMPHASIS, but USING ALL CAPS ALL THE
TIME IS LIKE SHOUTING AND IS DISCOURAGED IN E-MAIL.

Sign Your Messages with a "Sig"

  1. Many e-mail systems will automatically append a signature (or sig) to every message.
  2. Should be short (no more than five lines) and about 70 characters (or less) wide.

My own sig flirts with these limitations:

Jeremy Butler
jbutler@ua.edu
ScreenSite http://www.tcf.ua.edu/ScreenSite/
Telecommunication & Film/University of Alabama/Tuscaloosa

Quoting a Message

  1. When replying, it's good to quote a small portion of a msg to give the context of your reply
  2. Don't quote more than is necessary
  3. Often > signs ("angle brackets" or "greater-than signs") are used to signify quoted material
>Tried to run NS Nav 3 on my office's Mac computer. Someone else did the
>installation. It crashes the entire machine when you load it. KER-blooey!
> Any idea what the prob is?


How e-mail works

Attachments and Related Problems

Free Web-based E-mail Services

Accessing Your Own E-mail When You're Not at Home


Many-to-Many CMC: Listserving and Newsgrouping

Clerical Robots: LISTSERV, Listprocessor, Maiser, and Majordomo

Indexes and Digests

 

 

 Worldwide LISTSERV® statistics 
(Wed, 20 May 1998)
 

Number of public lists 18,452
Number of local lists 61,130
Total number of lists 79,582
Total membership (public+local) 29,748,499
Total messages delivered today 26,397,893
Total delivered using LSMTP™ 13,877,964
(52.6% of total)

Finding Lists

  1. CataList, the official catalog of LISTSERV® lists
  2. The List of Lists
  3. ScreenSite's listing of film/TV-related discussion groups

Required Lists for TCF 389

  1. NewsScan
  2. TCF389@tcf.ua.edu
  3. Internet Tourbus

Use bamamail.ua.edu (for UA accounts) or Web access to your preferred account and subscribe to these three lists.


Usenet: It's Kind of Like E-Mail, But Not Really

Usenet = bulletin boards in a hallway.

Newsgroups

Usenet Pointers

  1. Use a newsreader program or Netscape Navigator to access newsgroups
  2. Newsgroups are arranged in hierarchies
  3. Read the FAQ's (Frequently Asked Questions) before posting
  4. Binary files and images may be attached to msgs using UUENCODE
  5. Many Usenet resources have been collected at http://www.duke.edu/~mg/usenet/

A few film/TV newsgroups:

Cult movies              			alt.cult-movies
Stanley Kubrick                    		alt.movies.kubrick
Steven Spielberg                   		alt.movies.spielberg
SFX                      			alt.movies.visual-effects
Martin Scorsese                    		alt.movies.scorsese

Class newsgroups:

Forums are only open to students enrolled in the class and are hosted by WebCT.


Instantaneous ("Real-Time") CMC


CMC Hazards

1. E-mail (In)Security

2. Flames and Flame Wars

3. E-Mail Fraud: Spam and Fake Messages

One of my e-mail boxes is very susceptible to spam. Here's a week's sample:

List of spam e-mail

Examining the message headers can often tell you where the message really came from. Sam Spade software automates the process.

You can then track down the contact persons for the real source.

 

How to deal with spammers

4. E-Mail Obesity: Keeping Your Mailbox Lean and Mean

  1. Squirrel away a copy of the list's instructions so that you might unsubscribe quickly. It's a good idea to start a folder containing list instructions.
  2. If the volume of a list is too great, switch to a digest or index version of it.
  3. Don't subscribe to more than one list at a time. Get a sense of how busy a new list is before you add new ones.
  4. Review the list's archives to see how many messages are in it. SCREEN-L and many other lists have archives that are available via e-mail, and/or the World Wide Web.
  5. If you are having trouble with the robot, contact the human who maintains it; but make an effort to resolve the problem on your own first. Otherwise, depending on how harried the human is, you may be told RTFM.
  6. Sample the list's Usenet newsgroup (if one exists) to see how busy it is.

5. E-Mail Viruses and Other Hoaxes

Computer viruses are a real and significant problem, but, currently, you cannot catch one simply by reading an e-mail message.

However, you may be infected by opening an attachment to an e-mail message. In fact, in 1999 e-mail became the most common way of transporting viruses--bypassing the floppy disk as the most common carrier.

Most of these are "macro" or script viruses that live in Microsoft Word documents. Never open a Word document--even from a friend--unless you've been told, in advance, that it will be sent to you. Even then, you might want to check with the person before opening it.

(The Melissa [March 1999] and Love Bug [May 2000] viruses masked themselves as notes from friends.)

You can separate the hoaxes from the real threats by visiting:

6. Sexual (And Other) Harassment in CMC


Bibliography

  1. International Computer Security Association, Fifth Annual ICSA Computer Virus Prevalence Survey: 1999.

Last revised: May 16, 2000 6:05 PM
Comments: jbutler@ua.edu