Legitimate by design: towards trusted virtual community environments

Legitimacy is a key part of the social requirements specification for a trusted virtual community environment (VCE). If an environment is not seen as legitimate, social conflicts may reduce community benefits like trade and e-commerce. Legitimacy must be built into a VCE at design time, or it may not be possible at all. This can be done using a legitimacy requirements framework (LRF) which interprets historical "rights" in terms of ownership of generic VCE objects. This involves more than merely specifying who has the right to do what to what, because objects may contain other objects, objects may be dependent, rights may interact, groups may have rights, and there may be rights to rights. A LRF could be used by software designers to derive legitimacy requirements for a wide variety of multi-user systems, from chat rooms to virtual realities. It would draw focus to common problems, and aid their common solution. A simple LRF is presented to provide a basis for designers of virtual social environments to copy, discuss or deviate from.

[1]  P. Brey The ethics of representation and action in virtual reality , 2020, Ethics and Information Technology.

[2]  Priscilla M. Regan Legislating Privacy: Technology, Social Values, and Public Policy , 1995, The Handbook of Privacy Studies.

[3]  T. Tyler,et al.  The Social Psychology of Procedural Justice , 1988 .

[4]  Wendy A. Kellogg,et al.  Social translucence: an approach to designing systems that support social processes , 2000, TCHI.

[5]  Baldwin Fd In Web we trust , 2000 .

[6]  Randall Davis,et al.  The digital dilemma , 2001, CACM.

[7]  Noël Coward,et al.  Private Lives , 1930 .

[8]  Irma Becerra-Fernandez,et al.  Managing trust and commitment in collaborative supply chain relationships , 2001, CACM.

[9]  Petra Schubert,et al.  The pivotal role of community building in electronic commerce , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[10]  R. McQueen,et al.  A Cognitive Three-Process Model of Computer-Mediated Group Interaction , 2000 .

[11]  Oren Etzioni,et al.  Privacy interfaces for information management , 1999, CACM.

[12]  Ronald K. Stamper,et al.  Social norms in requirements analysis: an outline of MEASUR , 1994 .

[13]  Mark Fischetti,et al.  Weaving the web - the original design and ultimate destiny of the World Wide Web by its inventor , 1999 .

[14]  Dan L. Burk,et al.  Copyrightable functions and patentable speech , 2001, CACM.

[15]  Marko Čupić,et al.  Online communities – Designing Usability, Supporting Sociability , 2003 .

[16]  A. de Moor,et al.  Empowering communities: A method for the legitimate user-driven specification of network information systems , 1999 .

[17]  D. Hindman The Virtual Community: Homesteading on the Electronic Frontier , 1996 .

[18]  Lawrence Lessig,et al.  Code and Other Laws of Cyberspace , 1999 .

[19]  Jenny Preece,et al.  Online Communities: Designing Usability and Supporting Sociability , 2000 .

[20]  Jin H. Im,et al.  Privacy , 2002, Encyclopedia of Information Systems.

[21]  J. Reidenberg Governing Networks and Rule-Making in Cyberspace , 1996 .

[22]  J. Rawls Justice as Fairness , 2001 .

[23]  J. Locke,et al.  The Second Treatise of Civil Government , 1986 .

[24]  Brian Whitworth,et al.  Voting before discussing: computer voting as social communication , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.

[25]  J. S. Adams,et al.  Inequity In Social Exchange , 1965 .

[26]  Murray Turoff,et al.  Computer‐mediated communication requirements for group support , 1991 .

[27]  R. Zajonc SOCIAL FACILITATION. , 1965, Science.

[28]  Mary Beth Rosson,et al.  I get by with a little help from my cyber-friends: Sharing stories of good and bad times on the Web , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.

[29]  Starr Roxanne Hiltz,et al.  Network Nation: Human Communication Via Computer , 1979 .

[30]  Mark S. Ackerman,et al.  The Intellectual Challenge of CSCW: The Gap Between Social Requirements and Technical Feasibility , 2000, Hum. Comput. Interact..

[31]  B. Latané,et al.  Spatial clustering in the conformity game: Dynamic social impact in electronic groups. , 1996 .

[32]  Joe Podolsky,et al.  City of bits: space, place and the infobahn , 1995, CSOC.