Legitimacy, defined as fairness plus public good, is a proposed necessary online and physical community requirement. As Fukuyama notes, legitimate societies tend to prosper, while others ignore legitimacy at their peril. Online communities are social-technical systems (STS), built upon social requirements as well as technical ones like bandwidth. As technical problems are increasingly solved, social problems like spam rise in relevance. If software can do almost anything in cyberspace, there is still the challenge of what should it do? Guidelines are needed. We suggest that online communities could decide information rights as communities decide physical action rights, by a legitimacy analysis. This requires a framework to specify social rights in information terms. To bridge the social-technical gap, between what communities want and technology does, rights must be translated into information terms. Our framework has four elements: information actors (people, groups, agents), information objects (persona, containers, items, comments, mail, votes), information methods (create, delete, edit, view, move, display, transfer and delegate), and the information context. The conclusions apply to any social-technical community, and we apply the framework to the case of Wikipedia.


Online Community Information Object Bulletin Board Public Ownership Information Term 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ackerman, M.S.: The Intellectual Challenge of CSCW: the Gap Between Social Requirements and Technical Feasibility. Human-Computer Interaction 15(2), 179–203 (2000)CrossRefGoogle Scholar
  2. 2.
    Alter, S.: Which life cycle — Work system, information system, or software? Communications of the AIS 7(17), 1–52 (2001)Google Scholar
  3. 3.
    Geen, R.G., Gange, J.J.: Social facilitation: Drive theory and beyond. In: Blumberg, H.H., Hare, A.P., Kent, V., Davis, M. (eds.) Small Groups and Social Interaction, vol. 1, pp. 141–153 (1983)Google Scholar
  4. 4.
    Grudin, J.: The Computer Reaches Out: The historical continuity of user interface design. In: Proceedings of CHI 1990. ACM SIGCHI Conference, Seattle, Wash., USA (1990)Google Scholar
  5. 5.
    Kuutti, K.: Activity Theory as a Potential Framework for Human Computer Interaction Research. In: Nardi, B.A. (ed.) Context and Consciousness: Activity Theory and Human-Computer Interaction, The MIT Press, Cambridge (1996)Google Scholar
  6. 6.
    Lessig, L.: Code and other laws of cyberspace. Basic Books, New York (1999)Google Scholar
  7. 7.
    Locke, J.: An essay concerning the true original extent and end of civil government: Second of ’Two Treatises on Government’ (1690), ch. 5, section 27. In: Somerville, J., Santoni, R.E. (eds.) Social and Political Philosophy, pp. 169–204. Anchor, New York (1963)Google Scholar
  8. 8.
    Rawls, J.: Justice as Fairness. Harvard University Press, Cambridge (2001)Google Scholar
  9. 9.
    Shannon, C.E., Weaver, W.: The Mathematical Theory of Communication. University of Illinois Press, Urbana (1949)MATHGoogle Scholar
  10. 10.
    Whitworth, B., de Moor, A.: Legitimate by design: Towards trusted virtual community environments. Behaviour & Information Technology 22(1), 31–51 (2003)CrossRefGoogle Scholar
  11. 11.
    Whitworth, B.: Social-technical Systems. In: Ghaoui, C. (ed.) Encyclopedia of Human Computer Interaction, pp. 533–541. Idea Group, Hershey (2006), Google Scholar
  12. 12.
    Whitworth, B., Whitworth, E.: Reducing spam by closing the social-technical gap. Computer, 38–45 (October 2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Brian Whitworth
    • 1
  • Aldo de Moor
    • 2
  • Tong Liu
    • 1
  1. 1.Massey University (Albany)AucklandNew Zealand
  2. 2.STARLabVrije Universiteit BrusselBrusselsBelgium

Personalised recommendations