Preventing Digital Divides in Email

What you send

What's here

  • Forwarding:

- Personal email
- Chain letters
- Email petitions
- Virus warnings
- In general

Forwarding personal email to groups

It is considered extremely rude to forward personal email to mailing lists or Usenet without the original author's permission.

- Arlene Rinaldi, The Net: User Guidelines and Netiquette, Electronic Communications

 
 

Forwarding chain letters

There are many things that I think are important, and if I started a chain letter for each of them, everyone on the planet would be crushed under the weight of my good intentions.

Always ask yourself the question 'If everyone using the network were to do this, would it be Good or Bad' and if the answer is Bad, don't you do it, and politely tell everyone who does it not to do it. The system we are using operates best when everyone cooperates and does not use more than they need. Chain letters are not Good because if everyone sends them the system rapidly breaks down.

- Johann Beda, Johann's AIDS/HIV Email Chain Letter Page

Consequences

Probably the biggest risk for hoax messages is their ability to multiply. Most people send on the hoax messages to everyone in their address books but consider if they only sent them on to 10 people. The first person (the first generation) sends it to 10, each member of that group of 10 (the second generation) sends it to 10 others or 100 messages and so on.

Generation 1: 10
Generation 2: 100
Generation 3: 1,000
Generation 4: 10,000
Generation 5: 100,000
Generation 6: 1,000,000

As you can see, by the sixth generation there are a million e-mail messages being processed by our mail servers. The capacity to handle these messages must be paid for by the users or, if it is not paid for, the mail servers slow down to a crawl or crash. Note that this example only forwards the message to 10 people at each generation while people who forward real hoax messages often send them to many times that number.

- US Department of Energy Computer Incident Advisory Capability (CIAC) team, The Risk and Cost of Hoaxes

Forwarding email petitions

The e-petition is one of the worst kinds of e-mail chain letters. These messages usually tell an emotionally-charged (and extremely one-sided) story, then beg you to add your name to the bottom and send it to 'everyone you know.' We want to do so out of a sense of duty and because we really want to make a difference. Unfortunately, we don't typically consider the integrity and validity the e-mail. At the very least, most e-petitions are pitifully ineffective. At the most, they pose a very real threat to the privacy of those who sign.

Break the Chain recommends against 'signing' any e-petition, no matter how real it seems or how passionate you are about the cause. However, if your conscience won't let you dismiss a petition out of hand, see if it passes the Seven Tests of Armchair Activism...

- Break the Chain, Armchair Activism

See also Break the Chain's Alternatives to Armchair Activism, which includes signing a web petition as a distant last option, with strong privacy warnings.

 

Forwarding virus warnings

Please remember that spreading a virus hoax is only marginally less bad than spreading an actual virus. Don't forward warnings about viruses or other Internet threats without checking the facts at one of the many hoax debunking sites.

- Carol Daniels, PC Update Online - The magazine of the Melbourne PC User Group, Editorial October 1998

Reliable virus & hoax info

   
 

Forwarding in general

I'd recommend very rarely forwarding anything, and then only after thorough research. I've had Internet access since 1995 and I've never received anything containing instructions to 'send this to everyone you know' which wasn't either a hoax or a total waste of time. A good example: those messages supposedly from primary school kids who 'just want to see how far their email will go' - generally the email account in question shuts down pretty smartly due to overload - see Consequences.

- Val

 
   
 

Asking people to sign online polls

...the results of an online 'poll' in which thousands or even millions of users participate cannot be extrapolated to anything, because those results tell you only about the opinions of those who participated.

...scientific polling has a long, reliable history, whereas 'straw polling' has a long history of total unreliability.

As long as they are meant as entertainment, and as long as users understand what their results communicate, there's no reason to lose much sleep over online polls.

- Chris Suellentrop, Why Online Polls Are Bunk, 12 January 2000

 
   
 

Attaching files

Never send a file when a message will do. When you send a file you are saying, 'You have lots of time to waste. I want you to download the file. Remember that you downloaded it. Remember where you downloaded it. Remember the name of it. Decompress it using a utility that I assume you have.* Open it with an application that I assume you have. If you don't have the decompression utility or application, write back to me to ask me to send it another way.'

After a person has downloaded and opened a file, he has the privilege of reading a three-paragraph message in a font that he doesn't own. Of course, this file could have been copied and pasted into a message in three clicks of a mouse.

- Guy Kawasaki, Email Etiquette, The Computer Curmudgeon,
Hayden Books 1993-01

* Also, check it for viruses before you open it! - Val

   
 

Virus protection

Bare Minimum Safety Check List

  • Keep your operating system up to date
  • Install and maintain anti-virus software
  • Only use current email software
  • Be suspicious of all email attachments
  • Consider using a personal firewall
  • Check what programs are running on your system at start up
  • Consider encrypting sensitive information
  • Back up your files
  • Make sure you have a 'boot disk'
  • Keep passwords safe
  • Do some research - knowledge is your most valuable tool

- CASE (Computing Assistance, Support & Education), presentation notes from meeting of 19 February 2002 on Virus protection

 

Page created 28 January 2002; last updated 26 October 2005