Online, the entire system is under our control. No event can happen without the system having a regulating pressure on it. This makes it easy to record and publish people's actions.
Therefore, create an AuditTrail. A record tracking who did what and when. Often that means a VersionHistory or a ChangeLog? with some identifying information, particularly with some way to determine NetworkDistance between the sources of transactions.
With names attached to actions, we can use PeerPressure to EnforceResponsibility to adhere to the CommunityExpectation""s. We can also follow people's action whom we trust, the RoleModel""s we can learn from (but only from OpenProcess). [SoftSecurity]
On the other hand, the system can also use the AuditTrail to automatically control access. Too many swear words and you're off the system, buddy. [HardSecurity]
But, there are serious privacy issues with tracing people's actions everywhere. One minimally needs an AuditTrail wherever one needs ReversibleChange, or perhaps in even fewer circumstances than that. If you go overboard, you will violate the social trust. That is just as large a failure as letting people bandy about irresponsibly.
Without ForgiveAndForget, an AuditTrail becomes a liability waiting to happen. Don't remember FlameWar""s forever; don't remember mistakes forever.
What's wrong with this assessment is that this only is true if the subject is a) aware of his visibility, b) thinks someone may be watching, and c) is afraid of that person. To the latter point, fear of the other person's power will only occur after another visible demonstration of that power, say to another individual within the panopticon.
An alternate explanation of self-regulation is impression. If you want to impress me, and I am watching or even might be watching, you will behave according to what image you want to impress upon me. I may not have any power over you, but only over myself. For instance, when trying to impress a potential mate in a bar, avoid getting disastrously drunk.
A real-world example: CliffordStoll found a user being very active on one of his systems in Berkeley, after a long period of inactivity. Part of that activity was attacking military research institutions. He traced the source IP of the login to a machine in another institution, and back through a series of machines to a dialup in West Germany. The hackers were arrested and tried. The machine logs were an AuditTrail.