⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc1746.txt

📁 著名的RFC文档,其中有一些文档是已经翻译成中文的的.
💻 TXT
📖 第 1 页 / 共 4 页
字号:
Network Working Group                                         B. ManningRequest for Comments: 1746                                           ISICategory: Informational                                       D. Perkins                                                             Houston ISD                                                           December 1994                    Ways to Define User ExpectationsStatus of this Memo   This memo provides information for the Internet community.  This memo   does not specify an Internet standard of any kind.  Distribution of   this memo is unlimited.Abstract   This paper covers basic fundamentals that must be understood when one   defines, interprets, or implements methods to control user   expectations on or over the Internet.1. Background   User agreements are a form of acceptable use policy (AUP) are an   implicit part of internetworking since they place parameters on user   expectation.  They define the desired and expected behaviour of those   who participate.  Everyone has one, whether published or not.  This   applies to networks that provide transit paths for other networks as   well as end sites and the individual users that use systems.  A   better understanding of an AUP, and how to formulate one seems to be   increasingly important as the global net encompases new  environments   as varied as K12 schools and real-time systems.  AUP's are used to   determine pricing, customer base, type and quality of service   metrics, and a host of other provider services.2. Components of an Agreement   In defining your particular agreement there are three areas that must   be addressed.  They are where you get service from, who your peers   are, and whom you provide service to.  A good understanding of these   concepts will make or break the policies you formulate.2.1  Where you get service from   Each entity gets its service from one or more other providers,   either a level three service, such as IP transit, or a level two   service, such as circuits.  The provider of such services usually has   an policy in the form of an agreement or contract specifying termsManning & Perkins                                               [Page 1]RFC 1746            Ways to Define User Expectations       December 1994   and conditions of use. This forms the basis for the type of service   offerings that you as an entity can provide.  If you get service from   several providers,  all of them need to be considered in the   formation of policy.2.2 Who your peers are   Are your policies consistent with those offered by your peers?  In   many cases, the formation of policy will define who your peers are.   It is important to clearly identify which areas you intend to reach   and the community you wish to be a contributing, productive part of.   Once this is clear, formulate polices along those lines.2.3 Who you provide service to   It is required that you inform those who use your services just what   your policies are.  Without this information, it will be almost   impossible for them to distinguish what to expect from your service   offering. Without a clear policy it is possible that litigation may   ensue. It is important to reflect community standards in the creation   of policy.3. Some Issues to consider   IP provided services can be complex.  They comprise both information   and communication.  In the formulation of policy it is critical that   the policy provide for security and access to information and   communication while ensuring that the resource use does not   overburden the system's capabilities. These conflicting demands must   be analyzed and a synthesis arrived at.  This hints a fourth   component of an AUP, that it has a method to extract compliance.   This is so site specific that further analysis will not be attempted   here.   Some items that should be considered in the formation of policy are:        - privacy                       - morals & ethics        - freedom of expression         - legal constraints        - safety                        - harassment        - plagiarism                    - resource utilization        - indemnification               - targeted areas of interest        - expected behaviours           - remedies and recourse   This should not be considered as an exhaustive list but as pointers   for those types of things to be considered when policy is formed.Manning & Perkins                                               [Page 2]RFC 1746            Ways to Define User Expectations       December 19944. Security Considerations   Security and Liability issues are not discussed in this memo.5. Summary   User Agreements are here to stay. As the Interconnected mesh of   networks grows, the choices presented to end-users mandate that   provider/user expectations are clearly presented. Use of these   guidelines will help create a clearer, better defined environment for   everyone.Authors' Addresses   Bill Manning   USC/Information Sciences Institute   4676 Admiralty Way   Marina del Rey, CA 90292   Phone: 822-1511   EMail: bmanning@isi.edu   Don Perkins   Instructional Media Services   Houston Independent School District   3830 Richmond   Houston, TX 77027   EMail: dperkins@tenet.eduManning & Perkins                                               [Page 3]RFC 1746            Ways to Define User Expectations       December 1994Example   For further reference on some acceptable use policies, see the   following materials archived in Armadillo--The Texas Studies Gopher:   Name=Acceptable and Unacceptable Use of Net Resources (K12)   Type=1   Host=chico.rice.edu   Port=1170   Path=1/More/Acceptable   or:   http://chico.rice.edu/armadillo   If these resources are not available to you, you may want to review   the attached policy and justification that is in use by an NSF   sponsored project on K12 networking. It provides a view on the   thinking process and actual Agreement that was worked out for this   project.The Internetworked School: A Policy for the Future*Barry J. Fishman and Roy D. Pea School of Education and Social PolicyNorthwestern UniversityNote:   The CoVis Network Use Policy itself appears as an appendix to this   article.Introduction   The next five years will radically change the ways that schools   relate to the world around them as global computer networks--long the   exclusive domain of higher education and private industry--link up to   primary and secondary schools. The Internet, a network made up of   many smaller contributing networks, represents a powerful educational   resource unlike anything that precedes it. Its potential for   education grows with the establishment of each new connection.   For the first time, schoolchildren have the means for simple, direct   contact with millions of adults in a forum that masks their physical   youth and presents them as virtual equals. However, just as the new   kid in school has to learn new social codes and rituals to fit in,   schools must learn some of the practices and etiquette of the   Internet. Of course, the established denizens of the Internet will   soon have some adjusting to do as well, with thousands (or millions)Manning & Perkins                                               [Page 4]RFC 1746            Ways to Define User Expectations       December 1994   of new kids knocking electronically at their doors. Since the   Internet was not designed with children in mind, many potentially   difficult issues must be discussed by both the education and the   Internet communities.   This article presents a framework for thinking about some of the   issues that are essential to making the initial encounter between   schools and the Internet successful. It also presents an excerpt of a   policy that embodies our approach to resolving those issues.Expanding Access, Expanding Horizons   For roughly the past decade, schools increasingly have participated   in specialized computer networks such as the NGS/TERC Kidsnetwork,   the Intercultural Learning Network, and FidoNet, as well as for-   profit services such as CompuServe, America Online, and Prodigy. The   majority of these projects were conducted on networks, where   teachers' or students' messages could not be read by anyone beyond a   predetermined audience composed of other students and teachers. These   projects made it possible for students and teachers to communicate   with their peers in faraway places and pioneered some pedagogical   uses of networks for computer-mediated communication and   collaborative project work that will carry over to the Internet.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -