Online or Off, We’re Still Human

Today, there are two different types of communities: traditional and virtual

Today, there are two different types of communities: traditional and virtual. As members, we learn to establish a point of presence and navigate the nuances of each as we plug in and out several times a day.

And while we can’t easily hide who we are in the real world, the Internet provides anonymity and an opportunity to be whoever you want to be. Just like the adage, on the Internet, nobody knows you’re a dog. In the virtual world, time zones, age, gender and ethnicity don’t exist.

It’s a world without boundaries where people can create new identities or pseudonyms and do things they otherwise couldn’t do. But, in this world, it’s easy to get swept away, to say inappropriate things and to forget that on the other end of the network, there is a real person who has feelings and fears, opinions and objections. This is when it’s always good to remind ourselves of the following rules of netiquette[1]:

    1. Remember the human
    2. Adhere to the same standards of behavior online that you follow in real life
    3. Know where you are in cyberspace
    4. Respect other people’s time and bandwidth
    5. Make yourself look good online
    6. Share expert knowledge
    7. Help keep the flame wars under control
    8. Respect other people’s privacy
    9. Don’t abuse your power
    10. Be forgiving of other people’s mistakes

On CA Communities, our members abide by three core values:transparency, authenticity and trust. We exercise transparency by staying in constant contact with other members and making helpful information readily available. We present our authentic selves whether in the office or on a product community.

And we build trust by having direct, honest online conversations about our solutions. We believe that every point of interaction on message boards, in chats, through tech tips or webcasts is a chance to create a positive experience. All day, every day we try to:

  • See past the computer screen to the end recipient and put ourselves in that person’s shoes because, at one point, we too had questions.
  • Use an appropriate tone and clearly communicate meaning to help prevent misinterpretation.
  • Strike a balance between promoting free expression and establishing a reserved rapport.

Having netiquette isn’t just a reflection on us as individuals, but as a community and a company as a whole. The golden rule, Do unto others as you’d have others do unto you, still holds true today in both our traditional and virtual communities. So, consider your monitor or laptop screen a mirror at times before clicking post or send. And remember, even on a faceless platform, we’re all human and deserve respect.

[1] Shea, Virginia._Netiquette_Albion_Web. 26 March, 2014.

Written by

CA Community

CA Community is the blog manager’s account used to post general updates and news items.

Published in


View this topic
  • James Holland

    This is great. Hooray for Disney’s imagineers!

    become a new brand in the share market research with its accurate research. Proven
    itself always right whether market is bull or bear. Last week all paid clients
    booked handsome profit in NIFTY, BANKINIFTY & STOCKS. Now for the coming
    week we expect more correction can come in NIFTY as the IRAQ issue is getting
    more tense, If it happens more then you will see a sharp fall in all world marketNSE BSE, STOCK TIPSbecause as we know all world run on
    crude & most of the crude comes from IRAQ. So be ready for a sharp fall so
    sell will be the best strategy for next week also. Traders can make a sell
    position in NIFTY around 7600-7650 with stoploss 7750 for the target of
    7300-7200.One can also make a sell call NIFTY 50 stocks as per NIFTY levels. You
    can also take our two days free trial to check our accuracy. For further updates
    you can visit our website.



  • king lear

    testing comment functionality, please do not publish this

  • Love the personal pic 🙂

    • CAHighlight

      Thank you!

  • Plutora Inc

    This is a good case study. 2.3 sec’s off a login transaction is big.

  • While the analysts were hyping DevOps, I posted the oversight of not including security as part of that discussion as you are highlighting here. Instead of just talking DevOps, it should be DOS (what’s old is new again 🙂 – DevOpsSec. As a previous AppDev person, it’s the app, who’s using it, why and where rather than the device and having the service available.

    As you rightly point, out Security should be baked into the solution.

    Nice Post and Timely!


    • CAHighlight

      Thank you for your feedback Michele. Agreed – security cannot be overlooked. Appreciate your input!

  • Mitesh

    I would love a printed copy

  • Lars Johansson

    I love the idea of BYOID! This makes me choose if I am almost anonymous (with my Hotmail Nicname) or official with identity from an official organisation. My Identity Provider will attach identity with right level of LoA according to the need of the Service provider.

    • CAHighlight

      Thank you for your comment. BYOID has tangible benefits for end users and relying parties but it also has to be weighed in the balance with potential risks and liability concerns. It will be interesting to see how BYOID plays out in the enterprise.