Abuse / Misuse of Messaging / E1

Misuse of the process will depend on the nature and concerns of participants. Possibilities include :

Deliberate misuse of another's name is only likely to arise in rare cases. Falsification of identity may be detected by an observant assistant when the message is delivered or processed. Then it can quickly be corrected by a verbal announcement and a written message. This problem is more serious if the message is printed and person has already left the conference. A simple solution is described in Identity / E2.

Tampering with message boxes and removal of messages from boxes is again only likely to occur in special situations. Boxes can be locked or supervised, or abandoned altogether for hand collection.

Given the "pump priming" precedent (see Pump Priming / E3), participants may wish to ensure that the process as a whole is not subject to editorial manipulation. It is in this connection that the editorial committee option could be valuable (see Editorial Committee / E4). Sticking the original messages onto a wall display also allays fears (see Wall Space / Horus Wall Display / I7)


Return to [Table of Contents] [People's Voices] [Information Habitat]