<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.expertiza.ncsu.edu/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Becreswe</id>
	<title>Expertiza_Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.expertiza.ncsu.edu/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Becreswe"/>
	<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Special:Contributions/Becreswe"/>
	<updated>2026-05-18T12:20:46Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.41.0</generator>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_2&amp;diff=2158</id>
		<title>CSC 379:Week 5, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_2&amp;diff=2158"/>
		<updated>2007-08-05T05:26:44Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* Poor Accountability */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Certification Processes for E-Voting Systems=&lt;br /&gt;
==Study Guide==&lt;br /&gt;
&lt;br /&gt;
===Hidden Standards / Certification tests / Poor Accountability===&lt;br /&gt;
E-voting is a very tricky issue. Large programs are such difficult things to userstand an fully verify that many times the only person that fully knows what a program does is the person, or people that wrote it. For this reason the E-voting systems should be under much stricter review and testing than normal voting. However right now there are not strict enough tests for these machines and there are not set in stone standards that every e-voting machine must live up to. &lt;br /&gt;
&lt;br /&gt;
California currently has the best review system for voting in the United States. They have a &amp;quot;red&amp;quot; team of testers that try and disturb the voting process. They try to manipulate the voting count. The source code for the e-voting machines is also under review. This is a much more aggresive stance towards holding the companies that make e-voting systems accountable. &lt;br /&gt;
&lt;br /&gt;
Researchers that went through the code that controls e-voting machines in Ohio made by Diebold Elections Systems. They reported that there were flaws in the system that would allow one person to cast many electronic votes. Issues like this need to be discovered early and are the primary reason that e-voting systems should be more thoroughly tested by any and all states that use them. There should be a publicly viewable federal standard for e-voting that should be enforced in all the states. This would make it so that no state officials or buisness people could simply look the other way. For a state's e-voting systems to really be trustworthy, there needs to be some other entity holding that state accountable for its e-voting machines.&lt;br /&gt;
&lt;br /&gt;
*[http://www.newscientist.com/article.ns?id=dn3987 http://www.newscientist.com/article.ns?id=dn3987]&lt;br /&gt;
*[http://www.pcworld.com/article/id,135199-page,1/article.html http://www.pcworld.com/article/id,135199-page,1/article.html]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/E-voting#Analysis_of_electronic_voting http://en.wikipedia.org/wiki/E-voting]&lt;br /&gt;
*[http://www.cpsr.org/prevsite/conferences/cfp93/waskell.html http://www.cpsr.org/prevsite/conferences/cfp93/waskell.html]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Vested Interest===&lt;br /&gt;
One of the problems about the voting machine certification process is that so few people are actually involved in the process. The small number of people allows for a vested interest among a number of them to have a large sway, making the certification process less than objective. Vested interest could allow for problems to be ignored so that voting systems can be certified. Obviously, such a bias is unethical and could compromise the certification process causing it to be a poor measure of the voting software's reliability.&lt;br /&gt;
&lt;br /&gt;
There are two groups of people involved in the certification process and thus two possible vested interests to consider: those of the company producing the voting machine and those of the company testing the voting machine. The company producing the voting machine obviously have vested interest towards their product being certified. In fact, in most cases, they can only make sales if their products are certified. Therefore, the entire revenue procured by voting systems depends on certification. Also, in most cases, if the product isn't certified, the company would have to wait an entire year before they would have the possibility again.&lt;br /&gt;
&lt;br /&gt;
The organization that actually certifies products also has vested interest. This is mainly because this organization is a company given the ability by the government to certify voting machines. Since it is a company, the employees typically care very much whether their company is making money. The money it makes is paid by the company producing the voting machine and not the government. This is prime concern for a conflict of interest. Also, the movement to modernize voting in the United States can only become larger if machines are actually certified and used in elections. The growth of this movement is important to companies certifying voting machines because it means more potential market for them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/politics/security/news/2003/12/61637 E-Voting Undermined by Sloppiness] Kim Zetter, Wired&lt;br /&gt;
* [http://government.zdnet.com/?p=2823 E-voting certification company faulted for lax procedures] ZDNet&lt;br /&gt;
&lt;br /&gt;
===Whistleblowing===&lt;br /&gt;
Since the software used for voting machines is proprietary, very few people have the chance to discover or check for flaws. At the same time, most of these people work for the company that produced the voting machine and therefore have vested interest in the certification of the voting machines. This extremely private process depends on whistleblowers to point out flaws not found in the certification process. Unfortunately, most such whistleblowers have met the same sad fates as others in the software industry; they have been fired, demoted, and/or challenged in court. Since the requirement for voting software is merely that it be certified, when a whistleblower publicly notifies that the software has been wrongly certified, it is typically used in an election before the whistleblower's claims are verified.&lt;br /&gt;
&lt;br /&gt;
In the case of Diebold's voting software, Stephen Heller blew the whistle on uncertified software present in a voting system to be used in an election. The software was used in the election anyway and Heller now faces possible prison time. In the case of VoteHere's voting software, Dan Spillane, a software tester employed at VoteHere allegedly planned to raise unsolved issues with the voting software in a meeting with state certifiers. He was fired before the meeting took place and the software was certified.&lt;br /&gt;
* [http://www.verifiedvotingfoundation.org/article.php?id=6138 Whistleblower Lawsuit Points to Weaknesses in Electronic Voting Technology] Holli Riebeek, IEEE Spectrum Online&lt;br /&gt;
* [http://www.huffingtonpost.com/peter-soby-jr/whistleblower-charged-wit_b_16411.html Whistleblower Charged With Three Felonies for Exposing Diebold's Crimes] Peter Soby, Jr., The Huffington Post&lt;br /&gt;
* [http://www.wired.com/politics/law/news/2003/02/57831 Voting Software Firm Gets Sued] Joanna Glasner, Wired&lt;br /&gt;
&lt;br /&gt;
==Table of Contents==&lt;br /&gt;
# What is Electronic voting? An Overview of the Possibilities and Procedures&lt;br /&gt;
#* [http://www.howstuffworks.com/e-voting1.htm How E-Voting will work] Kevin Bosner, Howstuffworks &lt;br /&gt;
#* [http://cse.stanford.edu/class/cs201/projects-95-96/electronic-vote-counting/recommendations.html The Future of electronic elections] Stanford.edu &lt;br /&gt;
#* [http://www.acm.org/usacm/Issues/EVoting.htm E-Voting Standards] USACM Policy Brief &lt;br /&gt;
# The Existing System and an Impetus for a Change in the Way We Vote&lt;br /&gt;
#* [http://www.ncseonline.org/NLE/CRSreports/Risk/rsk-55.cfm?&amp;amp;CFID=8654825&amp;amp;CFTOKEN=11050776 Voting Technologies in the United States] Eric A. Fischer, Congressional Research Service&lt;br /&gt;
#* [http://archives.cnn.com/2000/ALLPOLITICS/stories/12/11/latimes.votecount/index.html A 'modern' democracy that can't count votes] CNN- LA Times&lt;br /&gt;
#* [http://www.fcw.com/civic/articles/2001/0402/web-itaa-04-02-01.asp Americans support voting upgrades] Dibya Sarkar, FCW&lt;br /&gt;
#* [http://lorrie.cranor.org/voting/essay.html Voting After Florida: No Easy Answers] Lorrie Faith Cranor&lt;br /&gt;
#* [http://www.todaysengineer.org/policyperspectives/feb_01features/evoting.html Electronic Voting Technology: Can We Be Spared a Repeat of Election 2000?] Robert Bellinger&lt;br /&gt;
# Dangers Associated with Electronic voting&lt;br /&gt;
#* [http://web.mit.edu/newsoffice/nr/2001/voting1.html MIT-Caltech study votes for paper ballots, levers, scanning devices] MIT&lt;br /&gt;
#* [http://www.wired.com/politics/law/news/2000/07/37504 Report says E-Voting is unsafe] Lynn Burke, Wired&lt;br /&gt;
#* [http://www.freerepublic.com/forum/a3a14864c36c3.htm E-voting -- prospects and problems] Douglas W. Jones, Free Republic&lt;br /&gt;
#* [http://technews.acm.org/articles/2001-3/0117w.html#item9 Let's not rush into electronic voting] Dan Gillmor, Mercury News Online&lt;br /&gt;
#* [http://cnnstudentnews.cnn.com/2001/TECH/computing/01/15/electronic.voting.idg/ Electronic voting systems face obstacles to adoption] Patrick Thibodeau, CNN&lt;br /&gt;
#* [http://www.notablesoftware.com/Papers/Risks2114.html Internet and Electronic Voting] Dave Farber &amp;amp; Peter G. Neumann, The Risks Digest&lt;br /&gt;
#* [http://catless.ncl.ac.uk/Risks/2.42.html#subj4 Computerized Voting - No Standards and a Lot of Questions] Ron Newman Statement on Electronic Voting Rebecca Mercuri&lt;br /&gt;
# Legal Issues&lt;br /&gt;
#* [http://www.usdoj.gov/crt/voting/intro/intro_b.htm The Voting Rights Act Of 1965] United States Department of Justice&lt;br /&gt;
#* (fixed link) [http://www.notablesoftware.com/Papers/FECRM.html The FEC Proposed Voting Systems Standard Update] Dr. Rebecca Mercuri&lt;br /&gt;
#* [http://www.wired.com/politics/law/news/2003/10/60713 Time to Recall E-Vote Machines?]  Kim Zetter, Wired&lt;br /&gt;
#* (fixed link) [http://www.votehere.net/news/archive04/040604.php VoteHere Releases VHTi Reference Source Code Implementation] Dennis Kucinch, VoteHere&lt;br /&gt;
# Planning for the Future - The Proponents View&lt;br /&gt;
#* [http://www.wired.com/news/politics/0,1283,40141,00.html The case for electronic voting] Farhad Manjoo, Wired&lt;br /&gt;
#* (modified link) [http://www.encyclopedia.com/doc/1G1-102714941.html Hart InterCivic's eSlate Electronic Voting System Delivers Fast, Accurate Results During Texas' Spring Elections.] Business Wire&lt;br /&gt;
#* [http://web.mit.edu/newsoffice/nr/2000/voting.html MIT, Caltech join forces to develop reliable, uniform US voting machine] MIT&lt;br /&gt;
#* [http://asia.cnn.com/2000/TECH/computing/11/08/e.voting.no.gamble.idg/ Experts: E-voting could have prevented U.S. election confusion] Rick Perera, Brian Fonseca, Martyn Williams and Terho Uimonen, CNN&lt;br /&gt;
#* [http://news.cnet.com/news/0-1005-200-3873615.html Commentary: Electronic voting likely to emerge a winner] Christopher Baum CNET&lt;br /&gt;
#* [http://www.acm.org/crossroads/xrds2-4/voting.html Electronic Voting: Computerized polls may save money, protect privacy] Lorrie Faith Cranor&lt;br /&gt;
#* [http://www.wired.com/news/ebiz/0,1272,61045,00.html Australia moves to E-voting] Kim Zetter, Wired&lt;br /&gt;
# Related Sites (Electronic voting providers)&lt;br /&gt;
#* [http://www.hartis.com/ Hart Intercivic]&lt;br /&gt;
#* [http://www.guardianvoting.com/ Guardian Voting Systems]&lt;br /&gt;
#* [http://www.sequoiavote.com/article.php?id=51 Sequoia]&lt;br /&gt;
&lt;br /&gt;
==Prompt==&lt;br /&gt;
'''Recently there have been many concerns about the certification processes for e-voting systems such as the inability to determine methods used during the certification process and what parts of the e-voting system were not adequately tested.  Examine concerns surrounding the certification processes and their ethical implications.  Provide links to groups that have investigated the problems you cite and if possible, responses made by the manufacturer/provider of the e-voting system and/or voting district(s) that use the system.'''&lt;br /&gt;
&lt;br /&gt;
'''Briefly discuss how individuals and groups have participated in whistleblowing on this topic (methods used, actions taken).'''&lt;br /&gt;
&lt;br /&gt;
===Related External Links===&lt;br /&gt;
* [http://www.eac.gov/ United States Election Assistance Commission]&lt;br /&gt;
* [http://www.wired.com/politics/law/news/2003/02/57831 Voting Software Firm Gets Sued - WIRED]&lt;br /&gt;
* [http://www.nytimes.com/2007/07/28/us/28vote.html?ex=1343620800&amp;amp;en=985acc7423727bdf&amp;amp;ei=5124&amp;amp;partner=permalink&amp;amp;exprod=permalink New York Times - Scientists’ Tests Hack Into Electronic Voting Machines in California and Elsewhere]&lt;br /&gt;
&lt;br /&gt;
===Related Class Website Links===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic/ http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic/]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_2&amp;diff=2157</id>
		<title>CSC 379:Week 5, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_2&amp;diff=2157"/>
		<updated>2007-08-05T05:26:25Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* Hidden Standards / Certification tests */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Certification Processes for E-Voting Systems=&lt;br /&gt;
==Study Guide==&lt;br /&gt;
&lt;br /&gt;
===Hidden Standards / Certification tests / Poor Accountability===&lt;br /&gt;
E-voting is a very tricky issue. Large programs are such difficult things to userstand an fully verify that many times the only person that fully knows what a program does is the person, or people that wrote it. For this reason the E-voting systems should be under much stricter review and testing than normal voting. However right now there are not strict enough tests for these machines and there are not set in stone standards that every e-voting machine must live up to. &lt;br /&gt;
&lt;br /&gt;
California currently has the best review system for voting in the United States. They have a &amp;quot;red&amp;quot; team of testers that try and disturb the voting process. They try to manipulate the voting count. The source code for the e-voting machines is also under review. This is a much more aggresive stance towards holding the companies that make e-voting systems accountable. &lt;br /&gt;
&lt;br /&gt;
Researchers that went through the code that controls e-voting machines in Ohio made by Diebold Elections Systems. They reported that there were flaws in the system that would allow one person to cast many electronic votes. Issues like this need to be discovered early and are the primary reason that e-voting systems should be more thoroughly tested by any and all states that use them. There should be a publicly viewable federal standard for e-voting that should be enforced in all the states. This would make it so that no state officials or buisness people could simply look the other way. For a state's e-voting systems to really be trustworthy, there needs to be some other entity holding that state accountable for its e-voting machines.&lt;br /&gt;
&lt;br /&gt;
*[http://www.newscientist.com/article.ns?id=dn3987 http://www.newscientist.com/article.ns?id=dn3987]&lt;br /&gt;
*[http://www.pcworld.com/article/id,135199-page,1/article.html http://www.pcworld.com/article/id,135199-page,1/article.html]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/E-voting#Analysis_of_electronic_voting http://en.wikipedia.org/wiki/E-voting]&lt;br /&gt;
*[http://www.cpsr.org/prevsite/conferences/cfp93/waskell.html http://www.cpsr.org/prevsite/conferences/cfp93/waskell.html]&lt;br /&gt;
&lt;br /&gt;
===Poor Accountability===&lt;br /&gt;
&lt;br /&gt;
===Vested Interest===&lt;br /&gt;
One of the problems about the voting machine certification process is that so few people are actually involved in the process. The small number of people allows for a vested interest among a number of them to have a large sway, making the certification process less than objective. Vested interest could allow for problems to be ignored so that voting systems can be certified. Obviously, such a bias is unethical and could compromise the certification process causing it to be a poor measure of the voting software's reliability.&lt;br /&gt;
&lt;br /&gt;
There are two groups of people involved in the certification process and thus two possible vested interests to consider: those of the company producing the voting machine and those of the company testing the voting machine. The company producing the voting machine obviously have vested interest towards their product being certified. In fact, in most cases, they can only make sales if their products are certified. Therefore, the entire revenue procured by voting systems depends on certification. Also, in most cases, if the product isn't certified, the company would have to wait an entire year before they would have the possibility again.&lt;br /&gt;
&lt;br /&gt;
The organization that actually certifies products also has vested interest. This is mainly because this organization is a company given the ability by the government to certify voting machines. Since it is a company, the employees typically care very much whether their company is making money. The money it makes is paid by the company producing the voting machine and not the government. This is prime concern for a conflict of interest. Also, the movement to modernize voting in the United States can only become larger if machines are actually certified and used in elections. The growth of this movement is important to companies certifying voting machines because it means more potential market for them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/politics/security/news/2003/12/61637 E-Voting Undermined by Sloppiness] Kim Zetter, Wired&lt;br /&gt;
* [http://government.zdnet.com/?p=2823 E-voting certification company faulted for lax procedures] ZDNet&lt;br /&gt;
&lt;br /&gt;
===Whistleblowing===&lt;br /&gt;
Since the software used for voting machines is proprietary, very few people have the chance to discover or check for flaws. At the same time, most of these people work for the company that produced the voting machine and therefore have vested interest in the certification of the voting machines. This extremely private process depends on whistleblowers to point out flaws not found in the certification process. Unfortunately, most such whistleblowers have met the same sad fates as others in the software industry; they have been fired, demoted, and/or challenged in court. Since the requirement for voting software is merely that it be certified, when a whistleblower publicly notifies that the software has been wrongly certified, it is typically used in an election before the whistleblower's claims are verified.&lt;br /&gt;
&lt;br /&gt;
In the case of Diebold's voting software, Stephen Heller blew the whistle on uncertified software present in a voting system to be used in an election. The software was used in the election anyway and Heller now faces possible prison time. In the case of VoteHere's voting software, Dan Spillane, a software tester employed at VoteHere allegedly planned to raise unsolved issues with the voting software in a meeting with state certifiers. He was fired before the meeting took place and the software was certified.&lt;br /&gt;
* [http://www.verifiedvotingfoundation.org/article.php?id=6138 Whistleblower Lawsuit Points to Weaknesses in Electronic Voting Technology] Holli Riebeek, IEEE Spectrum Online&lt;br /&gt;
* [http://www.huffingtonpost.com/peter-soby-jr/whistleblower-charged-wit_b_16411.html Whistleblower Charged With Three Felonies for Exposing Diebold's Crimes] Peter Soby, Jr., The Huffington Post&lt;br /&gt;
* [http://www.wired.com/politics/law/news/2003/02/57831 Voting Software Firm Gets Sued] Joanna Glasner, Wired&lt;br /&gt;
&lt;br /&gt;
==Table of Contents==&lt;br /&gt;
# What is Electronic voting? An Overview of the Possibilities and Procedures&lt;br /&gt;
#* [http://www.howstuffworks.com/e-voting1.htm How E-Voting will work] Kevin Bosner, Howstuffworks &lt;br /&gt;
#* [http://cse.stanford.edu/class/cs201/projects-95-96/electronic-vote-counting/recommendations.html The Future of electronic elections] Stanford.edu &lt;br /&gt;
#* [http://www.acm.org/usacm/Issues/EVoting.htm E-Voting Standards] USACM Policy Brief &lt;br /&gt;
# The Existing System and an Impetus for a Change in the Way We Vote&lt;br /&gt;
#* [http://www.ncseonline.org/NLE/CRSreports/Risk/rsk-55.cfm?&amp;amp;CFID=8654825&amp;amp;CFTOKEN=11050776 Voting Technologies in the United States] Eric A. Fischer, Congressional Research Service&lt;br /&gt;
#* [http://archives.cnn.com/2000/ALLPOLITICS/stories/12/11/latimes.votecount/index.html A 'modern' democracy that can't count votes] CNN- LA Times&lt;br /&gt;
#* [http://www.fcw.com/civic/articles/2001/0402/web-itaa-04-02-01.asp Americans support voting upgrades] Dibya Sarkar, FCW&lt;br /&gt;
#* [http://lorrie.cranor.org/voting/essay.html Voting After Florida: No Easy Answers] Lorrie Faith Cranor&lt;br /&gt;
#* [http://www.todaysengineer.org/policyperspectives/feb_01features/evoting.html Electronic Voting Technology: Can We Be Spared a Repeat of Election 2000?] Robert Bellinger&lt;br /&gt;
# Dangers Associated with Electronic voting&lt;br /&gt;
#* [http://web.mit.edu/newsoffice/nr/2001/voting1.html MIT-Caltech study votes for paper ballots, levers, scanning devices] MIT&lt;br /&gt;
#* [http://www.wired.com/politics/law/news/2000/07/37504 Report says E-Voting is unsafe] Lynn Burke, Wired&lt;br /&gt;
#* [http://www.freerepublic.com/forum/a3a14864c36c3.htm E-voting -- prospects and problems] Douglas W. Jones, Free Republic&lt;br /&gt;
#* [http://technews.acm.org/articles/2001-3/0117w.html#item9 Let's not rush into electronic voting] Dan Gillmor, Mercury News Online&lt;br /&gt;
#* [http://cnnstudentnews.cnn.com/2001/TECH/computing/01/15/electronic.voting.idg/ Electronic voting systems face obstacles to adoption] Patrick Thibodeau, CNN&lt;br /&gt;
#* [http://www.notablesoftware.com/Papers/Risks2114.html Internet and Electronic Voting] Dave Farber &amp;amp; Peter G. Neumann, The Risks Digest&lt;br /&gt;
#* [http://catless.ncl.ac.uk/Risks/2.42.html#subj4 Computerized Voting - No Standards and a Lot of Questions] Ron Newman Statement on Electronic Voting Rebecca Mercuri&lt;br /&gt;
# Legal Issues&lt;br /&gt;
#* [http://www.usdoj.gov/crt/voting/intro/intro_b.htm The Voting Rights Act Of 1965] United States Department of Justice&lt;br /&gt;
#* (fixed link) [http://www.notablesoftware.com/Papers/FECRM.html The FEC Proposed Voting Systems Standard Update] Dr. Rebecca Mercuri&lt;br /&gt;
#* [http://www.wired.com/politics/law/news/2003/10/60713 Time to Recall E-Vote Machines?]  Kim Zetter, Wired&lt;br /&gt;
#* (fixed link) [http://www.votehere.net/news/archive04/040604.php VoteHere Releases VHTi Reference Source Code Implementation] Dennis Kucinch, VoteHere&lt;br /&gt;
# Planning for the Future - The Proponents View&lt;br /&gt;
#* [http://www.wired.com/news/politics/0,1283,40141,00.html The case for electronic voting] Farhad Manjoo, Wired&lt;br /&gt;
#* (modified link) [http://www.encyclopedia.com/doc/1G1-102714941.html Hart InterCivic's eSlate Electronic Voting System Delivers Fast, Accurate Results During Texas' Spring Elections.] Business Wire&lt;br /&gt;
#* [http://web.mit.edu/newsoffice/nr/2000/voting.html MIT, Caltech join forces to develop reliable, uniform US voting machine] MIT&lt;br /&gt;
#* [http://asia.cnn.com/2000/TECH/computing/11/08/e.voting.no.gamble.idg/ Experts: E-voting could have prevented U.S. election confusion] Rick Perera, Brian Fonseca, Martyn Williams and Terho Uimonen, CNN&lt;br /&gt;
#* [http://news.cnet.com/news/0-1005-200-3873615.html Commentary: Electronic voting likely to emerge a winner] Christopher Baum CNET&lt;br /&gt;
#* [http://www.acm.org/crossroads/xrds2-4/voting.html Electronic Voting: Computerized polls may save money, protect privacy] Lorrie Faith Cranor&lt;br /&gt;
#* [http://www.wired.com/news/ebiz/0,1272,61045,00.html Australia moves to E-voting] Kim Zetter, Wired&lt;br /&gt;
# Related Sites (Electronic voting providers)&lt;br /&gt;
#* [http://www.hartis.com/ Hart Intercivic]&lt;br /&gt;
#* [http://www.guardianvoting.com/ Guardian Voting Systems]&lt;br /&gt;
#* [http://www.sequoiavote.com/article.php?id=51 Sequoia]&lt;br /&gt;
&lt;br /&gt;
==Prompt==&lt;br /&gt;
'''Recently there have been many concerns about the certification processes for e-voting systems such as the inability to determine methods used during the certification process and what parts of the e-voting system were not adequately tested.  Examine concerns surrounding the certification processes and their ethical implications.  Provide links to groups that have investigated the problems you cite and if possible, responses made by the manufacturer/provider of the e-voting system and/or voting district(s) that use the system.'''&lt;br /&gt;
&lt;br /&gt;
'''Briefly discuss how individuals and groups have participated in whistleblowing on this topic (methods used, actions taken).'''&lt;br /&gt;
&lt;br /&gt;
===Related External Links===&lt;br /&gt;
* [http://www.eac.gov/ United States Election Assistance Commission]&lt;br /&gt;
* [http://www.wired.com/politics/law/news/2003/02/57831 Voting Software Firm Gets Sued - WIRED]&lt;br /&gt;
* [http://www.nytimes.com/2007/07/28/us/28vote.html?ex=1343620800&amp;amp;en=985acc7423727bdf&amp;amp;ei=5124&amp;amp;partner=permalink&amp;amp;exprod=permalink New York Times - Scientists’ Tests Hack Into Electronic Voting Machines in California and Elsewhere]&lt;br /&gt;
&lt;br /&gt;
===Related Class Website Links===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic/ http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic/]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_2&amp;diff=2156</id>
		<title>CSC 379:Week 5, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_2&amp;diff=2156"/>
		<updated>2007-08-05T05:17:52Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* Hidden Standards / Certification tests */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Certification Processes for E-Voting Systems=&lt;br /&gt;
==Study Guide==&lt;br /&gt;
&lt;br /&gt;
===Hidden Standards / Certification tests===&lt;br /&gt;
E-voting is a very tricky issue. Large programs are such difficult things to userstand an fully verify that many times the only person that fully knows what a program does is the person, or people that wrote it. For this reason the E-voting systems should be under much stricter review and testing than normal voting. However right now there are not strict enough tests for these machines and there are not set in stone standards that every e-voting machine must live up to.&lt;br /&gt;
&lt;br /&gt;
*[http://www.newscientist.com/article.ns?id=dn3987 http://www.newscientist.com/article.ns?id=dn3987]&lt;br /&gt;
*[http://www.pcworld.com/article/id,135199-page,1/article.html http://www.pcworld.com/article/id,135199-page,1/article.html]&lt;br /&gt;
&lt;br /&gt;
===Poor Accountability===&lt;br /&gt;
&lt;br /&gt;
===Vested Interest===&lt;br /&gt;
One of the problems about the voting machine certification process is that so few people are actually involved in the process. The small number of people allows for a vested interest among a number of them to have a large sway, making the certification process less than objective. Vested interest could allow for problems to be ignored so that voting systems can be certified. Obviously, such a bias is unethical and could compromise the certification process causing it to be a poor measure of the voting software's reliability.&lt;br /&gt;
&lt;br /&gt;
There are two groups of people involved in the certification process and thus two possible vested interests to consider: those of the company producing the voting machine and those of the company testing the voting machine. The company producing the voting machine obviously have vested interest towards their product being certified. In fact, in most cases, they can only make sales if their products are certified. Therefore, the entire revenue procured by voting systems depends on certification. Also, in most cases, if the product isn't certified, the company would have to wait an entire year before they would have the possibility again.&lt;br /&gt;
&lt;br /&gt;
The organization that actually certifies products also has vested interest. This is mainly because this organization is a company given the ability by the government to certify voting machines. Since it is a company, the employees typically care very much whether their company is making money. The money it makes is paid by the company producing the voting machine and not the government. This is prime concern for a conflict of interest. Also, the movement to modernize voting in the United States can only become larger if machines are actually certified and used in elections. The growth of this movement is important to companies certifying voting machines because it means more potential market for them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/politics/security/news/2003/12/61637 E-Voting Undermined by Sloppiness] Kim Zetter, Wired&lt;br /&gt;
* [http://government.zdnet.com/?p=2823 E-voting certification company faulted for lax procedures] ZDNet&lt;br /&gt;
&lt;br /&gt;
===Whistleblowing===&lt;br /&gt;
Since the software used for voting machines is proprietary, very few people have the chance to discover or check for flaws. At the same time, most of these people work for the company that produced the voting machine and therefore have vested interest in the certification of the voting machines. This extremely private process depends on whistleblowers to point out flaws not found in the certification process. Unfortunately, most such whistleblowers have met the same sad fates as others in the software industry; they have been fired, demoted, and/or challenged in court. Since the requirement for voting software is merely that it be certified, when a whistleblower publicly notifies that the software has been wrongly certified, it is typically used in an election before the whistleblower's claims are verified.&lt;br /&gt;
&lt;br /&gt;
In the case of Diebold's voting software, Stephen Heller blew the whistle on uncertified software present in a voting system to be used in an election. The software was used in the election anyway and Heller now faces possible prison time. In the case of VoteHere's voting software, Dan Spillane, a software tester employed at VoteHere allegedly planned to raise unsolved issues with the voting software in a meeting with state certifiers. He was fired before the meeting took place and the software was certified.&lt;br /&gt;
* [http://www.verifiedvotingfoundation.org/article.php?id=6138 Whistleblower Lawsuit Points to Weaknesses in Electronic Voting Technology] Holli Riebeek, IEEE Spectrum Online&lt;br /&gt;
* [http://www.huffingtonpost.com/peter-soby-jr/whistleblower-charged-wit_b_16411.html Whistleblower Charged With Three Felonies for Exposing Diebold's Crimes] Peter Soby, Jr., The Huffington Post&lt;br /&gt;
* [http://www.wired.com/politics/law/news/2003/02/57831 Voting Software Firm Gets Sued] Joanna Glasner, Wired&lt;br /&gt;
&lt;br /&gt;
==Table of Contents==&lt;br /&gt;
# What is Electronic voting? An Overview of the Possibilities and Procedures&lt;br /&gt;
#* [http://www.howstuffworks.com/e-voting1.htm How E-Voting will work] Kevin Bosner, Howstuffworks &lt;br /&gt;
#* [http://cse.stanford.edu/class/cs201/projects-95-96/electronic-vote-counting/recommendations.html The Future of electronic elections] Stanford.edu &lt;br /&gt;
#* [http://www.acm.org/usacm/Issues/EVoting.htm E-Voting Standards] USACM Policy Brief &lt;br /&gt;
# The Existing System and an Impetus for a Change in the Way We Vote&lt;br /&gt;
#* [http://www.ncseonline.org/NLE/CRSreports/Risk/rsk-55.cfm?&amp;amp;CFID=8654825&amp;amp;CFTOKEN=11050776 Voting Technologies in the United States] Eric A. Fischer, Congressional Research Service&lt;br /&gt;
#* [http://archives.cnn.com/2000/ALLPOLITICS/stories/12/11/latimes.votecount/index.html A 'modern' democracy that can't count votes] CNN- LA Times&lt;br /&gt;
#* [http://www.fcw.com/civic/articles/2001/0402/web-itaa-04-02-01.asp Americans support voting upgrades] Dibya Sarkar, FCW&lt;br /&gt;
#* [http://lorrie.cranor.org/voting/essay.html Voting After Florida: No Easy Answers] Lorrie Faith Cranor&lt;br /&gt;
#* [http://www.todaysengineer.org/policyperspectives/feb_01features/evoting.html Electronic Voting Technology: Can We Be Spared a Repeat of Election 2000?] Robert Bellinger&lt;br /&gt;
# Dangers Associated with Electronic voting&lt;br /&gt;
#* [http://web.mit.edu/newsoffice/nr/2001/voting1.html MIT-Caltech study votes for paper ballots, levers, scanning devices] MIT&lt;br /&gt;
#* [http://www.wired.com/politics/law/news/2000/07/37504 Report says E-Voting is unsafe] Lynn Burke, Wired&lt;br /&gt;
#* [http://www.freerepublic.com/forum/a3a14864c36c3.htm E-voting -- prospects and problems] Douglas W. Jones, Free Republic&lt;br /&gt;
#* [http://technews.acm.org/articles/2001-3/0117w.html#item9 Let's not rush into electronic voting] Dan Gillmor, Mercury News Online&lt;br /&gt;
#* [http://cnnstudentnews.cnn.com/2001/TECH/computing/01/15/electronic.voting.idg/ Electronic voting systems face obstacles to adoption] Patrick Thibodeau, CNN&lt;br /&gt;
#* [http://www.notablesoftware.com/Papers/Risks2114.html Internet and Electronic Voting] Dave Farber &amp;amp; Peter G. Neumann, The Risks Digest&lt;br /&gt;
#* [http://catless.ncl.ac.uk/Risks/2.42.html#subj4 Computerized Voting - No Standards and a Lot of Questions] Ron Newman Statement on Electronic Voting Rebecca Mercuri&lt;br /&gt;
# Legal Issues&lt;br /&gt;
#* [http://www.usdoj.gov/crt/voting/intro/intro_b.htm The Voting Rights Act Of 1965] United States Department of Justice&lt;br /&gt;
#* (fixed link) [http://www.notablesoftware.com/Papers/FECRM.html The FEC Proposed Voting Systems Standard Update] Dr. Rebecca Mercuri&lt;br /&gt;
#* [http://www.wired.com/politics/law/news/2003/10/60713 Time to Recall E-Vote Machines?]  Kim Zetter, Wired&lt;br /&gt;
#* (fixed link) [http://www.votehere.net/news/archive04/040604.php VoteHere Releases VHTi Reference Source Code Implementation] Dennis Kucinch, VoteHere&lt;br /&gt;
# Planning for the Future - The Proponents View&lt;br /&gt;
#* [http://www.wired.com/news/politics/0,1283,40141,00.html The case for electronic voting] Farhad Manjoo, Wired&lt;br /&gt;
#* (modified link) [http://www.encyclopedia.com/doc/1G1-102714941.html Hart InterCivic's eSlate Electronic Voting System Delivers Fast, Accurate Results During Texas' Spring Elections.] Business Wire&lt;br /&gt;
#* [http://web.mit.edu/newsoffice/nr/2000/voting.html MIT, Caltech join forces to develop reliable, uniform US voting machine] MIT&lt;br /&gt;
#* [http://asia.cnn.com/2000/TECH/computing/11/08/e.voting.no.gamble.idg/ Experts: E-voting could have prevented U.S. election confusion] Rick Perera, Brian Fonseca, Martyn Williams and Terho Uimonen, CNN&lt;br /&gt;
#* [http://news.cnet.com/news/0-1005-200-3873615.html Commentary: Electronic voting likely to emerge a winner] Christopher Baum CNET&lt;br /&gt;
#* [http://www.acm.org/crossroads/xrds2-4/voting.html Electronic Voting: Computerized polls may save money, protect privacy] Lorrie Faith Cranor&lt;br /&gt;
#* [http://www.wired.com/news/ebiz/0,1272,61045,00.html Australia moves to E-voting] Kim Zetter, Wired&lt;br /&gt;
# Related Sites (Electronic voting providers)&lt;br /&gt;
#* [http://www.hartis.com/ Hart Intercivic]&lt;br /&gt;
#* [http://www.guardianvoting.com/ Guardian Voting Systems]&lt;br /&gt;
#* [http://www.sequoiavote.com/article.php?id=51 Sequoia]&lt;br /&gt;
&lt;br /&gt;
==Prompt==&lt;br /&gt;
'''Recently there have been many concerns about the certification processes for e-voting systems such as the inability to determine methods used during the certification process and what parts of the e-voting system were not adequately tested.  Examine concerns surrounding the certification processes and their ethical implications.  Provide links to groups that have investigated the problems you cite and if possible, responses made by the manufacturer/provider of the e-voting system and/or voting district(s) that use the system.'''&lt;br /&gt;
&lt;br /&gt;
'''Briefly discuss how individuals and groups have participated in whistleblowing on this topic (methods used, actions taken).'''&lt;br /&gt;
&lt;br /&gt;
===Related External Links===&lt;br /&gt;
* [http://www.eac.gov/ United States Election Assistance Commission]&lt;br /&gt;
* [http://www.wired.com/politics/law/news/2003/02/57831 Voting Software Firm Gets Sued - WIRED]&lt;br /&gt;
* [http://www.nytimes.com/2007/07/28/us/28vote.html?ex=1343620800&amp;amp;en=985acc7423727bdf&amp;amp;ei=5124&amp;amp;partner=permalink&amp;amp;exprod=permalink New York Times - Scientists’ Tests Hack Into Electronic Voting Machines in California and Elsewhere]&lt;br /&gt;
&lt;br /&gt;
===Related Class Website Links===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic/ http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic/]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_2&amp;diff=2155</id>
		<title>CSC 379:Week 5, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_2&amp;diff=2155"/>
		<updated>2007-08-05T05:14:21Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* Hidden Standards / Certification tests */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Certification Processes for E-Voting Systems=&lt;br /&gt;
==Study Guide==&lt;br /&gt;
&lt;br /&gt;
===Hidden Standards / Certification tests===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[http://www.newscientist.com/article.ns?id=dn3987 http://www.newscientist.com/article.ns?id=dn3987]&lt;br /&gt;
*[http://www.pcworld.com/article/id,135199-page,1/article.html http://www.pcworld.com/article/id,135199-page,1/article.html]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/E-voting#Analysis_of_electronic_voting http://en.wikipedia.org/wiki/E-voting]&lt;br /&gt;
*[http://www.cpsr.org/prevsite/conferences/cfp93/waskell.html http://www.cpsr.org/prevsite/conferences/cfp93/waskell.html]&lt;br /&gt;
&lt;br /&gt;
===Poor Accountability===&lt;br /&gt;
&lt;br /&gt;
===Vested Interest===&lt;br /&gt;
One of the problems about the voting machine certification process is that so few people are actually involved in the process. The small number of people allows for a vested interest among a number of them to have a large sway, making the certification process less than objective. Vested interest could allow for problems to be ignored so that voting systems can be certified. Obviously, such a bias is unethical and could compromise the certification process causing it to be a poor measure of the voting software's reliability.&lt;br /&gt;
&lt;br /&gt;
There are two groups of people involved in the certification process and thus two possible vested interests to consider: those of the company producing the voting machine and those of the company testing the voting machine. The company producing the voting machine obviously have vested interest towards their product being certified. In fact, in most cases, they can only make sales if their products are certified. Therefore, the entire revenue procured by voting systems depends on certification. Also, in most cases, if the product isn't certified, the company would have to wait an entire year before they would have the possibility again.&lt;br /&gt;
&lt;br /&gt;
The organization that actually certifies products also has vested interest. This is mainly because this organization is a company given the ability by the government to certify voting machines. Since it is a company, the employees typically care very much whether their company is making money. The money it makes is paid by the company producing the voting machine and not the government. This is prime concern for a conflict of interest. Also, the movement to modernize voting in the United States can only become larger if machines are actually certified and used in elections. The growth of this movement is important to companies certifying voting machines because it means more potential market for them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/politics/security/news/2003/12/61637 E-Voting Undermined by Sloppiness] Kim Zetter, Wired&lt;br /&gt;
* [http://government.zdnet.com/?p=2823 E-voting certification company faulted for lax procedures] ZDNet&lt;br /&gt;
&lt;br /&gt;
===Whistleblowing===&lt;br /&gt;
Since the software used for voting machines is proprietary, very few people have the chance to discover or check for flaws. At the same time, most of these people work for the company that produced the voting machine and therefore have vested interest in the certification of the voting machines. This extremely private process depends on whistleblowers to point out flaws not found in the certification process. Unfortunately, most such whistleblowers have met the same sad fates as others in the software industry; they have been fired, demoted, and/or challenged in court. Since the requirement for voting software is merely that it be certified, when a whistleblower publicly notifies that the software has been wrongly certified, it is typically used in an election before the whistleblower's claims are verified.&lt;br /&gt;
&lt;br /&gt;
In the case of Diebold's voting software, Stephen Heller blew the whistle on uncertified software present in a voting system to be used in an election. The software was used in the election anyway and Heller now faces possible prison time. In the case of VoteHere's voting software, Dan Spillane, a software tester employed at VoteHere allegedly planned to raise unsolved issues with the voting software in a meeting with state certifiers. He was fired before the meeting took place and the software was certified.&lt;br /&gt;
* [http://www.verifiedvotingfoundation.org/article.php?id=6138 Whistleblower Lawsuit Points to Weaknesses in Electronic Voting Technology] Holli Riebeek, IEEE Spectrum Online&lt;br /&gt;
* [http://www.huffingtonpost.com/peter-soby-jr/whistleblower-charged-wit_b_16411.html Whistleblower Charged With Three Felonies for Exposing Diebold's Crimes] Peter Soby, Jr., The Huffington Post&lt;br /&gt;
* [http://www.wired.com/politics/law/news/2003/02/57831 Voting Software Firm Gets Sued] Joanna Glasner, Wired&lt;br /&gt;
&lt;br /&gt;
==Table of Contents==&lt;br /&gt;
# What is Electronic voting? An Overview of the Possibilities and Procedures&lt;br /&gt;
#* [http://www.howstuffworks.com/e-voting1.htm How E-Voting will work] Kevin Bosner, Howstuffworks &lt;br /&gt;
#* [http://cse.stanford.edu/class/cs201/projects-95-96/electronic-vote-counting/recommendations.html The Future of electronic elections] Stanford.edu &lt;br /&gt;
#* [http://www.acm.org/usacm/Issues/EVoting.htm E-Voting Standards] USACM Policy Brief &lt;br /&gt;
# The Existing System and an Impetus for a Change in the Way We Vote&lt;br /&gt;
#* [http://www.ncseonline.org/NLE/CRSreports/Risk/rsk-55.cfm?&amp;amp;CFID=8654825&amp;amp;CFTOKEN=11050776 Voting Technologies in the United States] Eric A. Fischer, Congressional Research Service&lt;br /&gt;
#* [http://archives.cnn.com/2000/ALLPOLITICS/stories/12/11/latimes.votecount/index.html A 'modern' democracy that can't count votes] CNN- LA Times&lt;br /&gt;
#* [http://www.fcw.com/civic/articles/2001/0402/web-itaa-04-02-01.asp Americans support voting upgrades] Dibya Sarkar, FCW&lt;br /&gt;
#* [http://lorrie.cranor.org/voting/essay.html Voting After Florida: No Easy Answers] Lorrie Faith Cranor&lt;br /&gt;
#* [http://www.todaysengineer.org/policyperspectives/feb_01features/evoting.html Electronic Voting Technology: Can We Be Spared a Repeat of Election 2000?] Robert Bellinger&lt;br /&gt;
# Dangers Associated with Electronic voting&lt;br /&gt;
#* [http://web.mit.edu/newsoffice/nr/2001/voting1.html MIT-Caltech study votes for paper ballots, levers, scanning devices] MIT&lt;br /&gt;
#* [http://www.wired.com/politics/law/news/2000/07/37504 Report says E-Voting is unsafe] Lynn Burke, Wired&lt;br /&gt;
#* [http://www.freerepublic.com/forum/a3a14864c36c3.htm E-voting -- prospects and problems] Douglas W. Jones, Free Republic&lt;br /&gt;
#* [http://technews.acm.org/articles/2001-3/0117w.html#item9 Let's not rush into electronic voting] Dan Gillmor, Mercury News Online&lt;br /&gt;
#* [http://cnnstudentnews.cnn.com/2001/TECH/computing/01/15/electronic.voting.idg/ Electronic voting systems face obstacles to adoption] Patrick Thibodeau, CNN&lt;br /&gt;
#* [http://www.notablesoftware.com/Papers/Risks2114.html Internet and Electronic Voting] Dave Farber &amp;amp; Peter G. Neumann, The Risks Digest&lt;br /&gt;
#* [http://catless.ncl.ac.uk/Risks/2.42.html#subj4 Computerized Voting - No Standards and a Lot of Questions] Ron Newman Statement on Electronic Voting Rebecca Mercuri&lt;br /&gt;
# Legal Issues&lt;br /&gt;
#* [http://www.usdoj.gov/crt/voting/intro/intro_b.htm The Voting Rights Act Of 1965] United States Department of Justice&lt;br /&gt;
#* (fixed link) [http://www.notablesoftware.com/Papers/FECRM.html The FEC Proposed Voting Systems Standard Update] Dr. Rebecca Mercuri&lt;br /&gt;
#* [http://www.wired.com/politics/law/news/2003/10/60713 Time to Recall E-Vote Machines?]  Kim Zetter, Wired&lt;br /&gt;
#* (fixed link) [http://www.votehere.net/news/archive04/040604.php VoteHere Releases VHTi Reference Source Code Implementation] Dennis Kucinch, VoteHere&lt;br /&gt;
# Planning for the Future - The Proponents View&lt;br /&gt;
#* [http://www.wired.com/news/politics/0,1283,40141,00.html The case for electronic voting] Farhad Manjoo, Wired&lt;br /&gt;
#* (modified link) [http://www.encyclopedia.com/doc/1G1-102714941.html Hart InterCivic's eSlate Electronic Voting System Delivers Fast, Accurate Results During Texas' Spring Elections.] Business Wire&lt;br /&gt;
#* [http://web.mit.edu/newsoffice/nr/2000/voting.html MIT, Caltech join forces to develop reliable, uniform US voting machine] MIT&lt;br /&gt;
#* [http://asia.cnn.com/2000/TECH/computing/11/08/e.voting.no.gamble.idg/ Experts: E-voting could have prevented U.S. election confusion] Rick Perera, Brian Fonseca, Martyn Williams and Terho Uimonen, CNN&lt;br /&gt;
#* [http://news.cnet.com/news/0-1005-200-3873615.html Commentary: Electronic voting likely to emerge a winner] Christopher Baum CNET&lt;br /&gt;
#* [http://www.acm.org/crossroads/xrds2-4/voting.html Electronic Voting: Computerized polls may save money, protect privacy] Lorrie Faith Cranor&lt;br /&gt;
#* [http://www.wired.com/news/ebiz/0,1272,61045,00.html Australia moves to E-voting] Kim Zetter, Wired&lt;br /&gt;
# Related Sites (Electronic voting providers)&lt;br /&gt;
#* [http://www.hartis.com/ Hart Intercivic]&lt;br /&gt;
#* [http://www.guardianvoting.com/ Guardian Voting Systems]&lt;br /&gt;
#* [http://www.sequoiavote.com/article.php?id=51 Sequoia]&lt;br /&gt;
&lt;br /&gt;
==Prompt==&lt;br /&gt;
'''Recently there have been many concerns about the certification processes for e-voting systems such as the inability to determine methods used during the certification process and what parts of the e-voting system were not adequately tested.  Examine concerns surrounding the certification processes and their ethical implications.  Provide links to groups that have investigated the problems you cite and if possible, responses made by the manufacturer/provider of the e-voting system and/or voting district(s) that use the system.'''&lt;br /&gt;
&lt;br /&gt;
'''Briefly discuss how individuals and groups have participated in whistleblowing on this topic (methods used, actions taken).'''&lt;br /&gt;
&lt;br /&gt;
===Related External Links===&lt;br /&gt;
* [http://www.eac.gov/ United States Election Assistance Commission]&lt;br /&gt;
* [http://www.wired.com/politics/law/news/2003/02/57831 Voting Software Firm Gets Sued - WIRED]&lt;br /&gt;
* [http://www.nytimes.com/2007/07/28/us/28vote.html?ex=1343620800&amp;amp;en=985acc7423727bdf&amp;amp;ei=5124&amp;amp;partner=permalink&amp;amp;exprod=permalink New York Times - Scientists’ Tests Hack Into Electronic Voting Machines in California and Elsewhere]&lt;br /&gt;
&lt;br /&gt;
===Related Class Website Links===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic/ http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic/]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_2&amp;diff=2154</id>
		<title>CSC 379:Week 5, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_2&amp;diff=2154"/>
		<updated>2007-08-05T05:14:06Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* Hidden Standards / Certification tests */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Certification Processes for E-Voting Systems=&lt;br /&gt;
==Study Guide==&lt;br /&gt;
&lt;br /&gt;
===Hidden Standards / Certification tests===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.newscientist.com/article.ns?id=dn3987 http://www.newscientist.com/article.ns?id=dn3987]&lt;br /&gt;
[http://www.pcworld.com/article/id,135199-page,1/article.html http://www.pcworld.com/article/id,135199-page,1/article.html]&lt;br /&gt;
[http://en.wikipedia.org/wiki/E-voting#Analysis_of_electronic_voting http://en.wikipedia.org/wiki/E-voting]&lt;br /&gt;
[http://www.cpsr.org/prevsite/conferences/cfp93/waskell.html http://www.cpsr.org/prevsite/conferences/cfp93/waskell.html]&lt;br /&gt;
&lt;br /&gt;
===Poor Accountability===&lt;br /&gt;
&lt;br /&gt;
===Vested Interest===&lt;br /&gt;
One of the problems about the voting machine certification process is that so few people are actually involved in the process. The small number of people allows for a vested interest among a number of them to have a large sway, making the certification process less than objective. Vested interest could allow for problems to be ignored so that voting systems can be certified. Obviously, such a bias is unethical and could compromise the certification process causing it to be a poor measure of the voting software's reliability.&lt;br /&gt;
&lt;br /&gt;
There are two groups of people involved in the certification process and thus two possible vested interests to consider: those of the company producing the voting machine and those of the company testing the voting machine. The company producing the voting machine obviously have vested interest towards their product being certified. In fact, in most cases, they can only make sales if their products are certified. Therefore, the entire revenue procured by voting systems depends on certification. Also, in most cases, if the product isn't certified, the company would have to wait an entire year before they would have the possibility again.&lt;br /&gt;
&lt;br /&gt;
The organization that actually certifies products also has vested interest. This is mainly because this organization is a company given the ability by the government to certify voting machines. Since it is a company, the employees typically care very much whether their company is making money. The money it makes is paid by the company producing the voting machine and not the government. This is prime concern for a conflict of interest. Also, the movement to modernize voting in the United States can only become larger if machines are actually certified and used in elections. The growth of this movement is important to companies certifying voting machines because it means more potential market for them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/politics/security/news/2003/12/61637 E-Voting Undermined by Sloppiness] Kim Zetter, Wired&lt;br /&gt;
* [http://government.zdnet.com/?p=2823 E-voting certification company faulted for lax procedures] ZDNet&lt;br /&gt;
&lt;br /&gt;
===Whistleblowing===&lt;br /&gt;
Since the software used for voting machines is proprietary, very few people have the chance to discover or check for flaws. At the same time, most of these people work for the company that produced the voting machine and therefore have vested interest in the certification of the voting machines. This extremely private process depends on whistleblowers to point out flaws not found in the certification process. Unfortunately, most such whistleblowers have met the same sad fates as others in the software industry; they have been fired, demoted, and/or challenged in court. Since the requirement for voting software is merely that it be certified, when a whistleblower publicly notifies that the software has been wrongly certified, it is typically used in an election before the whistleblower's claims are verified.&lt;br /&gt;
&lt;br /&gt;
In the case of Diebold's voting software, Stephen Heller blew the whistle on uncertified software present in a voting system to be used in an election. The software was used in the election anyway and Heller now faces possible prison time. In the case of VoteHere's voting software, Dan Spillane, a software tester employed at VoteHere allegedly planned to raise unsolved issues with the voting software in a meeting with state certifiers. He was fired before the meeting took place and the software was certified.&lt;br /&gt;
* [http://www.verifiedvotingfoundation.org/article.php?id=6138 Whistleblower Lawsuit Points to Weaknesses in Electronic Voting Technology] Holli Riebeek, IEEE Spectrum Online&lt;br /&gt;
* [http://www.huffingtonpost.com/peter-soby-jr/whistleblower-charged-wit_b_16411.html Whistleblower Charged With Three Felonies for Exposing Diebold's Crimes] Peter Soby, Jr., The Huffington Post&lt;br /&gt;
* [http://www.wired.com/politics/law/news/2003/02/57831 Voting Software Firm Gets Sued] Joanna Glasner, Wired&lt;br /&gt;
&lt;br /&gt;
==Table of Contents==&lt;br /&gt;
# What is Electronic voting? An Overview of the Possibilities and Procedures&lt;br /&gt;
#* [http://www.howstuffworks.com/e-voting1.htm How E-Voting will work] Kevin Bosner, Howstuffworks &lt;br /&gt;
#* [http://cse.stanford.edu/class/cs201/projects-95-96/electronic-vote-counting/recommendations.html The Future of electronic elections] Stanford.edu &lt;br /&gt;
#* [http://www.acm.org/usacm/Issues/EVoting.htm E-Voting Standards] USACM Policy Brief &lt;br /&gt;
# The Existing System and an Impetus for a Change in the Way We Vote&lt;br /&gt;
#* [http://www.ncseonline.org/NLE/CRSreports/Risk/rsk-55.cfm?&amp;amp;CFID=8654825&amp;amp;CFTOKEN=11050776 Voting Technologies in the United States] Eric A. Fischer, Congressional Research Service&lt;br /&gt;
#* [http://archives.cnn.com/2000/ALLPOLITICS/stories/12/11/latimes.votecount/index.html A 'modern' democracy that can't count votes] CNN- LA Times&lt;br /&gt;
#* [http://www.fcw.com/civic/articles/2001/0402/web-itaa-04-02-01.asp Americans support voting upgrades] Dibya Sarkar, FCW&lt;br /&gt;
#* [http://lorrie.cranor.org/voting/essay.html Voting After Florida: No Easy Answers] Lorrie Faith Cranor&lt;br /&gt;
#* [http://www.todaysengineer.org/policyperspectives/feb_01features/evoting.html Electronic Voting Technology: Can We Be Spared a Repeat of Election 2000?] Robert Bellinger&lt;br /&gt;
# Dangers Associated with Electronic voting&lt;br /&gt;
#* [http://web.mit.edu/newsoffice/nr/2001/voting1.html MIT-Caltech study votes for paper ballots, levers, scanning devices] MIT&lt;br /&gt;
#* [http://www.wired.com/politics/law/news/2000/07/37504 Report says E-Voting is unsafe] Lynn Burke, Wired&lt;br /&gt;
#* [http://www.freerepublic.com/forum/a3a14864c36c3.htm E-voting -- prospects and problems] Douglas W. Jones, Free Republic&lt;br /&gt;
#* [http://technews.acm.org/articles/2001-3/0117w.html#item9 Let's not rush into electronic voting] Dan Gillmor, Mercury News Online&lt;br /&gt;
#* [http://cnnstudentnews.cnn.com/2001/TECH/computing/01/15/electronic.voting.idg/ Electronic voting systems face obstacles to adoption] Patrick Thibodeau, CNN&lt;br /&gt;
#* [http://www.notablesoftware.com/Papers/Risks2114.html Internet and Electronic Voting] Dave Farber &amp;amp; Peter G. Neumann, The Risks Digest&lt;br /&gt;
#* [http://catless.ncl.ac.uk/Risks/2.42.html#subj4 Computerized Voting - No Standards and a Lot of Questions] Ron Newman Statement on Electronic Voting Rebecca Mercuri&lt;br /&gt;
# Legal Issues&lt;br /&gt;
#* [http://www.usdoj.gov/crt/voting/intro/intro_b.htm The Voting Rights Act Of 1965] United States Department of Justice&lt;br /&gt;
#* (fixed link) [http://www.notablesoftware.com/Papers/FECRM.html The FEC Proposed Voting Systems Standard Update] Dr. Rebecca Mercuri&lt;br /&gt;
#* [http://www.wired.com/politics/law/news/2003/10/60713 Time to Recall E-Vote Machines?]  Kim Zetter, Wired&lt;br /&gt;
#* (fixed link) [http://www.votehere.net/news/archive04/040604.php VoteHere Releases VHTi Reference Source Code Implementation] Dennis Kucinch, VoteHere&lt;br /&gt;
# Planning for the Future - The Proponents View&lt;br /&gt;
#* [http://www.wired.com/news/politics/0,1283,40141,00.html The case for electronic voting] Farhad Manjoo, Wired&lt;br /&gt;
#* (modified link) [http://www.encyclopedia.com/doc/1G1-102714941.html Hart InterCivic's eSlate Electronic Voting System Delivers Fast, Accurate Results During Texas' Spring Elections.] Business Wire&lt;br /&gt;
#* [http://web.mit.edu/newsoffice/nr/2000/voting.html MIT, Caltech join forces to develop reliable, uniform US voting machine] MIT&lt;br /&gt;
#* [http://asia.cnn.com/2000/TECH/computing/11/08/e.voting.no.gamble.idg/ Experts: E-voting could have prevented U.S. election confusion] Rick Perera, Brian Fonseca, Martyn Williams and Terho Uimonen, CNN&lt;br /&gt;
#* [http://news.cnet.com/news/0-1005-200-3873615.html Commentary: Electronic voting likely to emerge a winner] Christopher Baum CNET&lt;br /&gt;
#* [http://www.acm.org/crossroads/xrds2-4/voting.html Electronic Voting: Computerized polls may save money, protect privacy] Lorrie Faith Cranor&lt;br /&gt;
#* [http://www.wired.com/news/ebiz/0,1272,61045,00.html Australia moves to E-voting] Kim Zetter, Wired&lt;br /&gt;
# Related Sites (Electronic voting providers)&lt;br /&gt;
#* [http://www.hartis.com/ Hart Intercivic]&lt;br /&gt;
#* [http://www.guardianvoting.com/ Guardian Voting Systems]&lt;br /&gt;
#* [http://www.sequoiavote.com/article.php?id=51 Sequoia]&lt;br /&gt;
&lt;br /&gt;
==Prompt==&lt;br /&gt;
'''Recently there have been many concerns about the certification processes for e-voting systems such as the inability to determine methods used during the certification process and what parts of the e-voting system were not adequately tested.  Examine concerns surrounding the certification processes and their ethical implications.  Provide links to groups that have investigated the problems you cite and if possible, responses made by the manufacturer/provider of the e-voting system and/or voting district(s) that use the system.'''&lt;br /&gt;
&lt;br /&gt;
'''Briefly discuss how individuals and groups have participated in whistleblowing on this topic (methods used, actions taken).'''&lt;br /&gt;
&lt;br /&gt;
===Related External Links===&lt;br /&gt;
* [http://www.eac.gov/ United States Election Assistance Commission]&lt;br /&gt;
* [http://www.wired.com/politics/law/news/2003/02/57831 Voting Software Firm Gets Sued - WIRED]&lt;br /&gt;
* [http://www.nytimes.com/2007/07/28/us/28vote.html?ex=1343620800&amp;amp;en=985acc7423727bdf&amp;amp;ei=5124&amp;amp;partner=permalink&amp;amp;exprod=permalink New York Times - Scientists’ Tests Hack Into Electronic Voting Machines in California and Elsewhere]&lt;br /&gt;
&lt;br /&gt;
===Related Class Website Links===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic/ http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic/]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_2&amp;diff=2153</id>
		<title>CSC 379:Week 5, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_2&amp;diff=2153"/>
		<updated>2007-08-05T05:13:25Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* Hidden Standards / Certification tests */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Certification Processes for E-Voting Systems=&lt;br /&gt;
==Study Guide==&lt;br /&gt;
&lt;br /&gt;
===Hidden Standards / Certification tests===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.newscientist.com/article.ns?id=dn3987 http://www.newscientist.com/article.ns?id=dn3987]&lt;br /&gt;
&lt;br /&gt;
[http://www.pcworld.com/article/id,135199-page,1/article.html http://www.pcworld.com/article/id,135199-page,1/article.html]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/E-voting#Analysis_of_electronic_voting http://en.wikipedia.org/wiki/E-voting#Analysis_of_electronic_voting]&lt;br /&gt;
&lt;br /&gt;
[http://www.cpsr.org/prevsite/conferences/cfp93/waskell.html http://www.cpsr.org/prevsite/conferences/cfp93/waskell.html]&lt;br /&gt;
&lt;br /&gt;
===Poor Accountability===&lt;br /&gt;
&lt;br /&gt;
===Vested Interest===&lt;br /&gt;
One of the problems about the voting machine certification process is that so few people are actually involved in the process. The small number of people allows for a vested interest among a number of them to have a large sway, making the certification process less than objective. Vested interest could allow for problems to be ignored so that voting systems can be certified. Obviously, such a bias is unethical and could compromise the certification process causing it to be a poor measure of the voting software's reliability.&lt;br /&gt;
&lt;br /&gt;
There are two groups of people involved in the certification process and thus two possible vested interests to consider: those of the company producing the voting machine and those of the company testing the voting machine. The company producing the voting machine obviously have vested interest towards their product being certified. In fact, in most cases, they can only make sales if their products are certified. Therefore, the entire revenue procured by voting systems depends on certification. Also, in most cases, if the product isn't certified, the company would have to wait an entire year before they would have the possibility again.&lt;br /&gt;
&lt;br /&gt;
The organization that actually certifies products also has vested interest. This is mainly because this organization is a company given the ability by the government to certify voting machines. Since it is a company, the employees typically care very much whether their company is making money. The money it makes is paid by the company producing the voting machine and not the government. This is prime concern for a conflict of interest. Also, the movement to modernize voting in the United States can only become larger if machines are actually certified and used in elections. The growth of this movement is important to companies certifying voting machines because it means more potential market for them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/politics/security/news/2003/12/61637 E-Voting Undermined by Sloppiness] Kim Zetter, Wired&lt;br /&gt;
* [http://government.zdnet.com/?p=2823 E-voting certification company faulted for lax procedures] ZDNet&lt;br /&gt;
&lt;br /&gt;
===Whistleblowing===&lt;br /&gt;
Since the software used for voting machines is proprietary, very few people have the chance to discover or check for flaws. At the same time, most of these people work for the company that produced the voting machine and therefore have vested interest in the certification of the voting machines. This extremely private process depends on whistleblowers to point out flaws not found in the certification process. Unfortunately, most such whistleblowers have met the same sad fates as others in the software industry; they have been fired, demoted, and/or challenged in court. Since the requirement for voting software is merely that it be certified, when a whistleblower publicly notifies that the software has been wrongly certified, it is typically used in an election before the whistleblower's claims are verified.&lt;br /&gt;
&lt;br /&gt;
In the case of Diebold's voting software, Stephen Heller blew the whistle on uncertified software present in a voting system to be used in an election. The software was used in the election anyway and Heller now faces possible prison time. In the case of VoteHere's voting software, Dan Spillane, a software tester employed at VoteHere allegedly planned to raise unsolved issues with the voting software in a meeting with state certifiers. He was fired before the meeting took place and the software was certified.&lt;br /&gt;
* [http://www.verifiedvotingfoundation.org/article.php?id=6138 Whistleblower Lawsuit Points to Weaknesses in Electronic Voting Technology] Holli Riebeek, IEEE Spectrum Online&lt;br /&gt;
* [http://www.huffingtonpost.com/peter-soby-jr/whistleblower-charged-wit_b_16411.html Whistleblower Charged With Three Felonies for Exposing Diebold's Crimes] Peter Soby, Jr., The Huffington Post&lt;br /&gt;
* [http://www.wired.com/politics/law/news/2003/02/57831 Voting Software Firm Gets Sued] Joanna Glasner, Wired&lt;br /&gt;
&lt;br /&gt;
==Table of Contents==&lt;br /&gt;
# What is Electronic voting? An Overview of the Possibilities and Procedures&lt;br /&gt;
#* [http://www.howstuffworks.com/e-voting1.htm How E-Voting will work] Kevin Bosner, Howstuffworks &lt;br /&gt;
#* [http://cse.stanford.edu/class/cs201/projects-95-96/electronic-vote-counting/recommendations.html The Future of electronic elections] Stanford.edu &lt;br /&gt;
#* [http://www.acm.org/usacm/Issues/EVoting.htm E-Voting Standards] USACM Policy Brief &lt;br /&gt;
# The Existing System and an Impetus for a Change in the Way We Vote&lt;br /&gt;
#* [http://www.ncseonline.org/NLE/CRSreports/Risk/rsk-55.cfm?&amp;amp;CFID=8654825&amp;amp;CFTOKEN=11050776 Voting Technologies in the United States] Eric A. Fischer, Congressional Research Service&lt;br /&gt;
#* [http://archives.cnn.com/2000/ALLPOLITICS/stories/12/11/latimes.votecount/index.html A 'modern' democracy that can't count votes] CNN- LA Times&lt;br /&gt;
#* [http://www.fcw.com/civic/articles/2001/0402/web-itaa-04-02-01.asp Americans support voting upgrades] Dibya Sarkar, FCW&lt;br /&gt;
#* [http://lorrie.cranor.org/voting/essay.html Voting After Florida: No Easy Answers] Lorrie Faith Cranor&lt;br /&gt;
#* [http://www.todaysengineer.org/policyperspectives/feb_01features/evoting.html Electronic Voting Technology: Can We Be Spared a Repeat of Election 2000?] Robert Bellinger&lt;br /&gt;
# Dangers Associated with Electronic voting&lt;br /&gt;
#* [http://web.mit.edu/newsoffice/nr/2001/voting1.html MIT-Caltech study votes for paper ballots, levers, scanning devices] MIT&lt;br /&gt;
#* [http://www.wired.com/politics/law/news/2000/07/37504 Report says E-Voting is unsafe] Lynn Burke, Wired&lt;br /&gt;
#* [http://www.freerepublic.com/forum/a3a14864c36c3.htm E-voting -- prospects and problems] Douglas W. Jones, Free Republic&lt;br /&gt;
#* [http://technews.acm.org/articles/2001-3/0117w.html#item9 Let's not rush into electronic voting] Dan Gillmor, Mercury News Online&lt;br /&gt;
#* [http://cnnstudentnews.cnn.com/2001/TECH/computing/01/15/electronic.voting.idg/ Electronic voting systems face obstacles to adoption] Patrick Thibodeau, CNN&lt;br /&gt;
#* [http://www.notablesoftware.com/Papers/Risks2114.html Internet and Electronic Voting] Dave Farber &amp;amp; Peter G. Neumann, The Risks Digest&lt;br /&gt;
#* [http://catless.ncl.ac.uk/Risks/2.42.html#subj4 Computerized Voting - No Standards and a Lot of Questions] Ron Newman Statement on Electronic Voting Rebecca Mercuri&lt;br /&gt;
# Legal Issues&lt;br /&gt;
#* [http://www.usdoj.gov/crt/voting/intro/intro_b.htm The Voting Rights Act Of 1965] United States Department of Justice&lt;br /&gt;
#* (fixed link) [http://www.notablesoftware.com/Papers/FECRM.html The FEC Proposed Voting Systems Standard Update] Dr. Rebecca Mercuri&lt;br /&gt;
#* [http://www.wired.com/politics/law/news/2003/10/60713 Time to Recall E-Vote Machines?]  Kim Zetter, Wired&lt;br /&gt;
#* (fixed link) [http://www.votehere.net/news/archive04/040604.php VoteHere Releases VHTi Reference Source Code Implementation] Dennis Kucinch, VoteHere&lt;br /&gt;
# Planning for the Future - The Proponents View&lt;br /&gt;
#* [http://www.wired.com/news/politics/0,1283,40141,00.html The case for electronic voting] Farhad Manjoo, Wired&lt;br /&gt;
#* (modified link) [http://www.encyclopedia.com/doc/1G1-102714941.html Hart InterCivic's eSlate Electronic Voting System Delivers Fast, Accurate Results During Texas' Spring Elections.] Business Wire&lt;br /&gt;
#* [http://web.mit.edu/newsoffice/nr/2000/voting.html MIT, Caltech join forces to develop reliable, uniform US voting machine] MIT&lt;br /&gt;
#* [http://asia.cnn.com/2000/TECH/computing/11/08/e.voting.no.gamble.idg/ Experts: E-voting could have prevented U.S. election confusion] Rick Perera, Brian Fonseca, Martyn Williams and Terho Uimonen, CNN&lt;br /&gt;
#* [http://news.cnet.com/news/0-1005-200-3873615.html Commentary: Electronic voting likely to emerge a winner] Christopher Baum CNET&lt;br /&gt;
#* [http://www.acm.org/crossroads/xrds2-4/voting.html Electronic Voting: Computerized polls may save money, protect privacy] Lorrie Faith Cranor&lt;br /&gt;
#* [http://www.wired.com/news/ebiz/0,1272,61045,00.html Australia moves to E-voting] Kim Zetter, Wired&lt;br /&gt;
# Related Sites (Electronic voting providers)&lt;br /&gt;
#* [http://www.hartis.com/ Hart Intercivic]&lt;br /&gt;
#* [http://www.guardianvoting.com/ Guardian Voting Systems]&lt;br /&gt;
#* [http://www.sequoiavote.com/article.php?id=51 Sequoia]&lt;br /&gt;
&lt;br /&gt;
==Prompt==&lt;br /&gt;
'''Recently there have been many concerns about the certification processes for e-voting systems such as the inability to determine methods used during the certification process and what parts of the e-voting system were not adequately tested.  Examine concerns surrounding the certification processes and their ethical implications.  Provide links to groups that have investigated the problems you cite and if possible, responses made by the manufacturer/provider of the e-voting system and/or voting district(s) that use the system.'''&lt;br /&gt;
&lt;br /&gt;
'''Briefly discuss how individuals and groups have participated in whistleblowing on this topic (methods used, actions taken).'''&lt;br /&gt;
&lt;br /&gt;
===Related External Links===&lt;br /&gt;
* [http://www.eac.gov/ United States Election Assistance Commission]&lt;br /&gt;
* [http://www.wired.com/politics/law/news/2003/02/57831 Voting Software Firm Gets Sued - WIRED]&lt;br /&gt;
* [http://www.nytimes.com/2007/07/28/us/28vote.html?ex=1343620800&amp;amp;en=985acc7423727bdf&amp;amp;ei=5124&amp;amp;partner=permalink&amp;amp;exprod=permalink New York Times - Scientists’ Tests Hack Into Electronic Voting Machines in California and Elsewhere]&lt;br /&gt;
&lt;br /&gt;
===Related Class Website Links===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic/ http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic/]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_2&amp;diff=2152</id>
		<title>CSC 379:Week 5, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_2&amp;diff=2152"/>
		<updated>2007-08-05T05:13:06Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* Hidden Standards / Certification tests */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Certification Processes for E-Voting Systems=&lt;br /&gt;
==Study Guide==&lt;br /&gt;
&lt;br /&gt;
===Hidden Standards / Certification tests===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.newscientist.com/article.ns?id=dn3987 http://www.newscientist.com/article.ns?id=dn3987]&lt;br /&gt;
[http://www.pcworld.com/article/id,135199-page,1/article.html http://www.pcworld.com/article/id,135199-page,1/article.html]&lt;br /&gt;
[http://en.wikipedia.org/wiki/E-voting#Analysis_of_electronic_voting http://en.wikipedia.org/wiki/E-voting#Analysis_of_electronic_voting]&lt;br /&gt;
[http://www.cpsr.org/prevsite/conferences/cfp93/waskell.html http://www.cpsr.org/prevsite/conferences/cfp93/waskell.html]&lt;br /&gt;
&lt;br /&gt;
===Poor Accountability===&lt;br /&gt;
&lt;br /&gt;
===Vested Interest===&lt;br /&gt;
One of the problems about the voting machine certification process is that so few people are actually involved in the process. The small number of people allows for a vested interest among a number of them to have a large sway, making the certification process less than objective. Vested interest could allow for problems to be ignored so that voting systems can be certified. Obviously, such a bias is unethical and could compromise the certification process causing it to be a poor measure of the voting software's reliability.&lt;br /&gt;
&lt;br /&gt;
There are two groups of people involved in the certification process and thus two possible vested interests to consider: those of the company producing the voting machine and those of the company testing the voting machine. The company producing the voting machine obviously have vested interest towards their product being certified. In fact, in most cases, they can only make sales if their products are certified. Therefore, the entire revenue procured by voting systems depends on certification. Also, in most cases, if the product isn't certified, the company would have to wait an entire year before they would have the possibility again.&lt;br /&gt;
&lt;br /&gt;
The organization that actually certifies products also has vested interest. This is mainly because this organization is a company given the ability by the government to certify voting machines. Since it is a company, the employees typically care very much whether their company is making money. The money it makes is paid by the company producing the voting machine and not the government. This is prime concern for a conflict of interest. Also, the movement to modernize voting in the United States can only become larger if machines are actually certified and used in elections. The growth of this movement is important to companies certifying voting machines because it means more potential market for them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/politics/security/news/2003/12/61637 E-Voting Undermined by Sloppiness] Kim Zetter, Wired&lt;br /&gt;
* [http://government.zdnet.com/?p=2823 E-voting certification company faulted for lax procedures] ZDNet&lt;br /&gt;
&lt;br /&gt;
===Whistleblowing===&lt;br /&gt;
Since the software used for voting machines is proprietary, very few people have the chance to discover or check for flaws. At the same time, most of these people work for the company that produced the voting machine and therefore have vested interest in the certification of the voting machines. This extremely private process depends on whistleblowers to point out flaws not found in the certification process. Unfortunately, most such whistleblowers have met the same sad fates as others in the software industry; they have been fired, demoted, and/or challenged in court. Since the requirement for voting software is merely that it be certified, when a whistleblower publicly notifies that the software has been wrongly certified, it is typically used in an election before the whistleblower's claims are verified.&lt;br /&gt;
&lt;br /&gt;
In the case of Diebold's voting software, Stephen Heller blew the whistle on uncertified software present in a voting system to be used in an election. The software was used in the election anyway and Heller now faces possible prison time. In the case of VoteHere's voting software, Dan Spillane, a software tester employed at VoteHere allegedly planned to raise unsolved issues with the voting software in a meeting with state certifiers. He was fired before the meeting took place and the software was certified.&lt;br /&gt;
* [http://www.verifiedvotingfoundation.org/article.php?id=6138 Whistleblower Lawsuit Points to Weaknesses in Electronic Voting Technology] Holli Riebeek, IEEE Spectrum Online&lt;br /&gt;
* [http://www.huffingtonpost.com/peter-soby-jr/whistleblower-charged-wit_b_16411.html Whistleblower Charged With Three Felonies for Exposing Diebold's Crimes] Peter Soby, Jr., The Huffington Post&lt;br /&gt;
* [http://www.wired.com/politics/law/news/2003/02/57831 Voting Software Firm Gets Sued] Joanna Glasner, Wired&lt;br /&gt;
&lt;br /&gt;
==Table of Contents==&lt;br /&gt;
# What is Electronic voting? An Overview of the Possibilities and Procedures&lt;br /&gt;
#* [http://www.howstuffworks.com/e-voting1.htm How E-Voting will work] Kevin Bosner, Howstuffworks &lt;br /&gt;
#* [http://cse.stanford.edu/class/cs201/projects-95-96/electronic-vote-counting/recommendations.html The Future of electronic elections] Stanford.edu &lt;br /&gt;
#* [http://www.acm.org/usacm/Issues/EVoting.htm E-Voting Standards] USACM Policy Brief &lt;br /&gt;
# The Existing System and an Impetus for a Change in the Way We Vote&lt;br /&gt;
#* [http://www.ncseonline.org/NLE/CRSreports/Risk/rsk-55.cfm?&amp;amp;CFID=8654825&amp;amp;CFTOKEN=11050776 Voting Technologies in the United States] Eric A. Fischer, Congressional Research Service&lt;br /&gt;
#* [http://archives.cnn.com/2000/ALLPOLITICS/stories/12/11/latimes.votecount/index.html A 'modern' democracy that can't count votes] CNN- LA Times&lt;br /&gt;
#* [http://www.fcw.com/civic/articles/2001/0402/web-itaa-04-02-01.asp Americans support voting upgrades] Dibya Sarkar, FCW&lt;br /&gt;
#* [http://lorrie.cranor.org/voting/essay.html Voting After Florida: No Easy Answers] Lorrie Faith Cranor&lt;br /&gt;
#* [http://www.todaysengineer.org/policyperspectives/feb_01features/evoting.html Electronic Voting Technology: Can We Be Spared a Repeat of Election 2000?] Robert Bellinger&lt;br /&gt;
# Dangers Associated with Electronic voting&lt;br /&gt;
#* [http://web.mit.edu/newsoffice/nr/2001/voting1.html MIT-Caltech study votes for paper ballots, levers, scanning devices] MIT&lt;br /&gt;
#* [http://www.wired.com/politics/law/news/2000/07/37504 Report says E-Voting is unsafe] Lynn Burke, Wired&lt;br /&gt;
#* [http://www.freerepublic.com/forum/a3a14864c36c3.htm E-voting -- prospects and problems] Douglas W. Jones, Free Republic&lt;br /&gt;
#* [http://technews.acm.org/articles/2001-3/0117w.html#item9 Let's not rush into electronic voting] Dan Gillmor, Mercury News Online&lt;br /&gt;
#* [http://cnnstudentnews.cnn.com/2001/TECH/computing/01/15/electronic.voting.idg/ Electronic voting systems face obstacles to adoption] Patrick Thibodeau, CNN&lt;br /&gt;
#* [http://www.notablesoftware.com/Papers/Risks2114.html Internet and Electronic Voting] Dave Farber &amp;amp; Peter G. Neumann, The Risks Digest&lt;br /&gt;
#* [http://catless.ncl.ac.uk/Risks/2.42.html#subj4 Computerized Voting - No Standards and a Lot of Questions] Ron Newman Statement on Electronic Voting Rebecca Mercuri&lt;br /&gt;
# Legal Issues&lt;br /&gt;
#* [http://www.usdoj.gov/crt/voting/intro/intro_b.htm The Voting Rights Act Of 1965] United States Department of Justice&lt;br /&gt;
#* (fixed link) [http://www.notablesoftware.com/Papers/FECRM.html The FEC Proposed Voting Systems Standard Update] Dr. Rebecca Mercuri&lt;br /&gt;
#* [http://www.wired.com/politics/law/news/2003/10/60713 Time to Recall E-Vote Machines?]  Kim Zetter, Wired&lt;br /&gt;
#* (fixed link) [http://www.votehere.net/news/archive04/040604.php VoteHere Releases VHTi Reference Source Code Implementation] Dennis Kucinch, VoteHere&lt;br /&gt;
# Planning for the Future - The Proponents View&lt;br /&gt;
#* [http://www.wired.com/news/politics/0,1283,40141,00.html The case for electronic voting] Farhad Manjoo, Wired&lt;br /&gt;
#* (modified link) [http://www.encyclopedia.com/doc/1G1-102714941.html Hart InterCivic's eSlate Electronic Voting System Delivers Fast, Accurate Results During Texas' Spring Elections.] Business Wire&lt;br /&gt;
#* [http://web.mit.edu/newsoffice/nr/2000/voting.html MIT, Caltech join forces to develop reliable, uniform US voting machine] MIT&lt;br /&gt;
#* [http://asia.cnn.com/2000/TECH/computing/11/08/e.voting.no.gamble.idg/ Experts: E-voting could have prevented U.S. election confusion] Rick Perera, Brian Fonseca, Martyn Williams and Terho Uimonen, CNN&lt;br /&gt;
#* [http://news.cnet.com/news/0-1005-200-3873615.html Commentary: Electronic voting likely to emerge a winner] Christopher Baum CNET&lt;br /&gt;
#* [http://www.acm.org/crossroads/xrds2-4/voting.html Electronic Voting: Computerized polls may save money, protect privacy] Lorrie Faith Cranor&lt;br /&gt;
#* [http://www.wired.com/news/ebiz/0,1272,61045,00.html Australia moves to E-voting] Kim Zetter, Wired&lt;br /&gt;
# Related Sites (Electronic voting providers)&lt;br /&gt;
#* [http://www.hartis.com/ Hart Intercivic]&lt;br /&gt;
#* [http://www.guardianvoting.com/ Guardian Voting Systems]&lt;br /&gt;
#* [http://www.sequoiavote.com/article.php?id=51 Sequoia]&lt;br /&gt;
&lt;br /&gt;
==Prompt==&lt;br /&gt;
'''Recently there have been many concerns about the certification processes for e-voting systems such as the inability to determine methods used during the certification process and what parts of the e-voting system were not adequately tested.  Examine concerns surrounding the certification processes and their ethical implications.  Provide links to groups that have investigated the problems you cite and if possible, responses made by the manufacturer/provider of the e-voting system and/or voting district(s) that use the system.'''&lt;br /&gt;
&lt;br /&gt;
'''Briefly discuss how individuals and groups have participated in whistleblowing on this topic (methods used, actions taken).'''&lt;br /&gt;
&lt;br /&gt;
===Related External Links===&lt;br /&gt;
* [http://www.eac.gov/ United States Election Assistance Commission]&lt;br /&gt;
* [http://www.wired.com/politics/law/news/2003/02/57831 Voting Software Firm Gets Sued - WIRED]&lt;br /&gt;
* [http://www.nytimes.com/2007/07/28/us/28vote.html?ex=1343620800&amp;amp;en=985acc7423727bdf&amp;amp;ei=5124&amp;amp;partner=permalink&amp;amp;exprod=permalink New York Times - Scientists’ Tests Hack Into Electronic Voting Machines in California and Elsewhere]&lt;br /&gt;
&lt;br /&gt;
===Related Class Website Links===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic/ http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic/]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_2&amp;diff=2141</id>
		<title>CSC 379:Week 5, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_2&amp;diff=2141"/>
		<updated>2007-08-05T01:14:23Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* Table of Contents */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Certification Processes for E-Voting Systems=&lt;br /&gt;
==Study Guide==&lt;br /&gt;
&lt;br /&gt;
===Hidden Standards / Certification tests===&lt;br /&gt;
http://www.cpsr.org/prevsite/conferences/cfp93/waskell.html&lt;br /&gt;
&lt;br /&gt;
===Poor Accountability===&lt;br /&gt;
&lt;br /&gt;
===Vested Interest===&lt;br /&gt;
One of the problems about the voting machine certification process is that so few people are actually involved in the process. The small number of people allows for a vested interest among a number of them to have a large sway, making the certification process less than objective. Vested interest could allow for problems to be ignored so that voting systems can be certified. Obviously, such a bias is unethical and could compromise the certification process causing it to be a poor measure of the voting software's reliability.&lt;br /&gt;
&lt;br /&gt;
There are two groups of people involved in the certification process and thus two possible vested interests to consider: those of the company producing the voting machine and those of the company testing the voting machine. The company producing the voting machine obviously have vested interest towards their product being certified. In fact, in most cases, they can only make sales if their products are certified. Therefore, the entire revenue procured by voting systems depends on certification. Also, in most cases, if the product isn't certified, the company would have to wait an entire year before they would have the possibility again.&lt;br /&gt;
&lt;br /&gt;
The organization that actually certifies products also has vested interest. This is mainly because this organization is a company given the ability by the government to certify voting machines. Since it is a company, the employees typically care very much whether their company is making money. The money it makes is paid by the company producing the voting machine and not the government. This is prime concern for a conflict of interest. Also, the movement to modernize voting in the United States can only become larger if machines are actually certified and used in elections. The growth of this movement is important to companies certifying voting machines because it means more potential market for them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/politics/security/news/2003/12/61637 E-Voting Undermined by Sloppiness] Kim Zetter, Wired&lt;br /&gt;
* [http://government.zdnet.com/?p=2823 E-voting certification company faulted for lax procedures] ZDNet&lt;br /&gt;
&lt;br /&gt;
===Whistleblowing===&lt;br /&gt;
Since the software used for voting machines is proprietary, very few people have the chance to discover or check for flaws. At the same time, most of these people work for the company that produced the voting machine and therefore have vested interest in the certification of the voting machines. This extremely private process depends on whistleblowers to point out flaws not found in the certification process. Unfortunately, most such whistleblowers have met the same sad fates as others in the software industry; they have been fired, demoted, and/or challenged in court. Since the requirement for voting software is merely that it be certified, when a whistleblower publicly notifies that the software has been wrongly certified, it is typically used in an election before the whistleblower's claims are verified.&lt;br /&gt;
&lt;br /&gt;
In the case of Diebold's voting software, Stephen Heller blew the whistle on uncertified software present in a voting system to be used in an election. The software was used in the election anyway and Heller now faces possible prison time. In the case of VoteHere's voting software, Dan Spillane, a software tester employed at VoteHere allegedly planned to raise unsolved issues with the voting software in a meeting with state certifiers. He was fired before the meeting took place and the software was certified.&lt;br /&gt;
* [http://www.verifiedvotingfoundation.org/article.php?id=6138 Whistleblower Lawsuit Points to Weaknesses in Electronic Voting Technology] Holli Riebeek, IEEE Spectrum Online&lt;br /&gt;
* [http://www.huffingtonpost.com/peter-soby-jr/whistleblower-charged-wit_b_16411.html Whistleblower Charged With Three Felonies for Exposing Diebold's Crimes] Peter Soby, Jr., The Huffington Post&lt;br /&gt;
* [http://www.wired.com/politics/law/news/2003/02/57831 Voting Software Firm Gets Sued] Joanna Glasner, Wired&lt;br /&gt;
&lt;br /&gt;
==Table of Contents==&lt;br /&gt;
# What is Electronic voting? An Overview of the Possibilities and Procedures&lt;br /&gt;
#* [http://www.howstuffworks.com/e-voting1.htm How E-Voting will work] Kevin Bosner, Howstuffworks &lt;br /&gt;
#* [http://cse.stanford.edu/class/cs201/projects-95-96/electronic-vote-counting/recommendations.html The Future of electronic elections] Stanford.edu &lt;br /&gt;
#* [http://www.acm.org/usacm/Issues/EVoting.htm E-Voting Standards] USACM Policy Brief &lt;br /&gt;
# The Existing System and an Impetus for a Change in the Way We Vote&lt;br /&gt;
#* [http://www.ncseonline.org/NLE/CRSreports/Risk/rsk-55.cfm?&amp;amp;CFID=8654825&amp;amp;CFTOKEN=11050776 Voting Technologies in the United States] Eric A. Fischer, Congressional Research Service&lt;br /&gt;
#* [http://archives.cnn.com/2000/ALLPOLITICS/stories/12/11/latimes.votecount/index.html A 'modern' democracy that can't count votes] CNN- LA Times&lt;br /&gt;
#* [http://www.fcw.com/civic/articles/2001/0402/web-itaa-04-02-01.asp Americans support voting upgrades] Dibya Sarkar, FCW&lt;br /&gt;
#* [http://lorrie.cranor.org/voting/essay.html Voting After Florida: No Easy Answers] Lorrie Faith Cranor&lt;br /&gt;
#* [http://www.todaysengineer.org/policyperspectives/feb_01features/evoting.html Electronic Voting Technology: Can We Be Spared a Repeat of Election 2000?] Robert Bellinger&lt;br /&gt;
# Dangers Associated with Electronic voting&lt;br /&gt;
#* [http://web.mit.edu/newsoffice/nr/2001/voting1.html MIT-Caltech study votes for paper ballots, levers, scanning devices] MIT&lt;br /&gt;
#* [http://www.wired.com/politics/law/news/2000/07/37504 Report says E-Voting is unsafe] Lynn Burke, Wired&lt;br /&gt;
#* [http://www.freerepublic.com/forum/a3a14864c36c3.htm E-voting -- prospects and problems] Douglas W. Jones, Free Republic&lt;br /&gt;
#* [http://technews.acm.org/articles/2001-3/0117w.html#item9 Let's not rush into electronic voting] Dan Gillmor, Mercury News Online&lt;br /&gt;
#* [http://cnnstudentnews.cnn.com/2001/TECH/computing/01/15/electronic.voting.idg/ Electronic voting systems face obstacles to adoption] Patrick Thibodeau, CNN&lt;br /&gt;
#* [http://www.notablesoftware.com/Papers/Risks2114.html Internet and Electronic Voting] Dave Farber &amp;amp; Peter G. Neumann, The Risks Digest&lt;br /&gt;
#* [http://catless.ncl.ac.uk/Risks/2.42.html#subj4 Computerized Voting - No Standards and a Lot of Questions] Ron Newman Statement on Electronic Voting Rebecca Mercuri&lt;br /&gt;
# Legal Issues&lt;br /&gt;
#* [http://www.usdoj.gov/crt/voting/intro/intro_b.htm The Voting Rights Act Of 1965] United States Department of Justice&lt;br /&gt;
#* (fixed link) [http://www.notablesoftware.com/Papers/FECRM.html The FEC Proposed Voting Systems Standard Update] Dr. Rebecca Mercuri&lt;br /&gt;
#* [http://www.wired.com/politics/law/news/2003/10/60713 Time to Recall E-Vote Machines?]  Kim Zetter, Wired&lt;br /&gt;
#* (fixed link) [http://www.votehere.net/news/archive04/040604.php VoteHere Releases VHTi Reference Source Code Implementation] Dennis Kucinch, VoteHere&lt;br /&gt;
# Planning for the Future - The Proponents View&lt;br /&gt;
#* [http://www.wired.com/news/politics/0,1283,40141,00.html The case for electronic voting] Farhad Manjoo, Wired&lt;br /&gt;
#* (modified link) [http://www.encyclopedia.com/doc/1G1-102714941.html Hart InterCivic's eSlate Electronic Voting System Delivers Fast, Accurate Results During Texas' Spring Elections.] Business Wire&lt;br /&gt;
#* [http://web.mit.edu/newsoffice/nr/2000/voting.html MIT, Caltech join forces to develop reliable, uniform US voting machine] MIT&lt;br /&gt;
#* [http://asia.cnn.com/2000/TECH/computing/11/08/e.voting.no.gamble.idg/ Experts: E-voting could have prevented U.S. election confusion] Rick Perera, Brian Fonseca, Martyn Williams and Terho Uimonen, CNN&lt;br /&gt;
#* [http://news.cnet.com/news/0-1005-200-3873615.html Commentary: Electronic voting likely to emerge a winner] Christopher Baum CNET&lt;br /&gt;
#* [http://www.acm.org/crossroads/xrds2-4/voting.html Electronic Voting: Computerized polls may save money, protect privacy] Lorrie Faith Cranor&lt;br /&gt;
#* [http://www.wired.com/news/ebiz/0,1272,61045,00.html Australia moves to E-voting] Kim Zetter, Wired&lt;br /&gt;
# Related Sites (Electronic voting providers)&lt;br /&gt;
#* [http://www.hartis.com/ Hart Intercivic]&lt;br /&gt;
#* [http://www.guardianvoting.com/ Guardian Voting Systems]&lt;br /&gt;
#* [http://www.sequoiavote.com/article.php?id=51 Sequoia]&lt;br /&gt;
&lt;br /&gt;
==Prompt==&lt;br /&gt;
'''Recently there have been many concerns about the certification processes for e-voting systems such as the inability to determine methods used during the certification process and what parts of the e-voting system were not adequately tested.  Examine concerns surrounding the certification processes and their ethical implications.  Provide links to groups that have investigated the problems you cite and if possible, responses made by the manufacturer/provider of the e-voting system and/or voting district(s) that use the system.'''&lt;br /&gt;
&lt;br /&gt;
'''Briefly discuss how individuals and groups have participated in whistleblowing on this topic (methods used, actions taken).'''&lt;br /&gt;
&lt;br /&gt;
===Related External Links===&lt;br /&gt;
* [http://www.eac.gov/ United States Election Assistance Commission]&lt;br /&gt;
* [http://www.wired.com/politics/law/news/2003/02/57831 Voting Software Firm Gets Sued - WIRED]&lt;br /&gt;
* [http://www.nytimes.com/2007/07/28/us/28vote.html?ex=1343620800&amp;amp;en=985acc7423727bdf&amp;amp;ei=5124&amp;amp;partner=permalink&amp;amp;exprod=permalink New York Times - Scientists’ Tests Hack Into Electronic Voting Machines in California and Elsewhere]&lt;br /&gt;
&lt;br /&gt;
===Related Class Website Links===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic/ http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic/]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_4&amp;diff=1957</id>
		<title>CSC 379:Week 4, Group 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_4&amp;diff=1957"/>
		<updated>2007-07-28T20:59:59Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* Steps to Take to Mitigate Invasion of Privacy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Biometrics and Privacy of Genetic Data=&lt;br /&gt;
A concern with ID cards that contain biometric information is that once one is stolen, it would be more difficult for someone to reclaim their identity as the nature of the representation of biometric data that would be used would be something that would not change over a person’s lifetime (e.g. fingerprints or eye-scan)[http://en.wikipedia.org/wiki/Biometrics#Common_biometric_characteristics].  Thus for technologies that rely solely on the biometric data contained within the IDs to establish identity, once a card is stolen, ones “identity” may never be able to be reclaimed.&lt;br /&gt;
&lt;br /&gt;
Ethical issues related to privacy of genetic data follow closely with this topic since it suffers from similar issues as biometrics, although genetic data is much more invasive to ones privacy as society becomes more able to interpret it.  There have been discussions of a constitutional amendment to prohibit genetic discrimination.  If ones genetic information is made available, or information derived from, it opens the person to an increased threat of discrimination (jobs, insurance, social), as well as other threats to privacy not yet realized, but that will likely be realized within ones lifetime as there becomes a greater capability to interpret genetic data.&lt;br /&gt;
&lt;br /&gt;
'''What types of protections should be afforded to biometric data compared to other types of data?  For genetic data?  Should biometric/genetic data be incorporated into various technology from ID cards to diagnostic equipment?  Examine ethical issues related storage and use.'''&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant External Links:===&lt;br /&gt;
The National Science and Technology Council some good resources related to biometrics and privacy issues.&lt;br /&gt;
* [http://www.biometrics.gov/ReferenceRoom/Introduction.aspx Introduction to Biometrics]&lt;br /&gt;
* [http://www.biometrics.gov/nstc/publications.aspx Biometrics and Privacy]&lt;br /&gt;
&lt;br /&gt;
Wikipedia's article on biometrics:&lt;br /&gt;
[http://en.wikipedia.org/wiki/Biometrics http://en.wikipedia.org/wiki/Biometrics]&lt;br /&gt;
&lt;br /&gt;
EFF has an introduction to some concerns voiced about biometrics:&lt;br /&gt;
[http://www.eff.org/Privacy/Surveillance/biometrics/ http://www.eff.org/Privacy/Surveillance/biometrics/]&lt;br /&gt;
&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/web/identity/ http://ethics.csc.ncsu.edu/privacy/web/identity/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What are Biometrics?==&lt;br /&gt;
A biometric is a measure of some physical or behavioural characteristic of an individual. These measurements can then be used to identify and individual or at least aid in confirming a claimed identity. Some examples of human characteristics that can be conveniently captured in a biometric include: Fingerprints, Retinal scan, Voice, Signature, DNA, Gait. After your individual information is recorded it can be used in a biometric system.&lt;br /&gt;
&lt;br /&gt;
===The Purpose of Biometrics===&lt;br /&gt;
Biometric systems have several purposes. They can verify that a person is who they claim to be by checking your information against the data the system has on you. A biometric system can identify you without you telling the system who you are by your physiological or behavioral characteristics. And biometric systems can also be used to screen individuals. The system may raise a flag or alert the police if it identifies you as being on its watch list.&lt;br /&gt;
&lt;br /&gt;
===Flaws in Biometric Systems===&lt;br /&gt;
These systems are not flawless though. Depending on what characteristic is being measured, there is often a significant chance of error. Each biometric has its own false accept rate and false reject rate. A false accept rate is the chance that the biometric verifies that you are who you claim to be, when you actually aren't. The higher the percent chance for a false acceptance, the easier the system is to fool. A false reject rate is the chance that a system says you are lying about who you claim to be when you are telling the truth. The false accept rate and false reject rate of a particular biometric should be taken into account when designing an identification or verification system.&lt;br /&gt;
&lt;br /&gt;
==Physiological Biometric Systems==&lt;br /&gt;
===Facial Identification===&lt;br /&gt;
Facial identification can either identify people based on the image of their face or a thermal scan of their face.  At first glance this seems to be a sound method, after all it's how people identify each other without technology.  Unfortunately, there are several issues with implementing it as a technology.  For cosmetic scans, the image can look very different based on lighting or could be fooled with makeup.  In addition, both facial and thermal scans will change as people age.  While one of the easiest and least obtrusive means of identification, it is also one of the least accurate and most easily fooled.&lt;br /&gt;
&lt;br /&gt;
===Fingerprint===&lt;br /&gt;
Fingerprint identification is one of the most widely used biometric means of identification in the world today.  The ridges of the skin on the finger are taken and compared to known records taken in the past.  It is well suited to its task for several reasons.  A person's fingerprints do not change as they age nor are they easily copied.  In addition they are completely unique.  Due to its widespread use there are fewer personal issues with the scanning of fingerprints than some other biometric identifiers.&lt;br /&gt;
&lt;br /&gt;
===Hand veins===&lt;br /&gt;
Similar to fingerprints, the lines of the hand may also be used for identification.  It is harder to fool than a fingerprint scan, but also slightly less accurate.  It is also more vulnerable to changes over time than fingerprints and sometimes harder to tell the difference between the scans of two individuals.  &lt;br /&gt;
&lt;br /&gt;
===Eye scans===&lt;br /&gt;
There are two kinds of eye scans, one that scans the retina(blood vessels) and the other that scans the iris(colored part).  Both of these share the advantage of scanning an internal organ which is less vulnerable to damage over time.  Both suffer from a difficulty in building a database to compare to due to how they have to scan in addition to a lack of public approval for getting their eyes scanned.  People associate the technology with something they would see in a movie and pair it will a loss of privacy as is the case in such movies.&lt;br /&gt;
&lt;br /&gt;
===DNA scans===&lt;br /&gt;
DNA is the most accurate way of identifying a person.  Nobody, with the exception of identical twins, will have the same DNA.  Unfortunately, a sample from someone else will allow a fraudulent person to trick the system.  In addition, collecting information for a database to compare scans to would be a major issue, as most people do not want to go in to a government office to have their DNA sampled.  This brings up the next issue, because it is so accurate there is would be a massive loss of anonymity which would receive large public backlash. &lt;br /&gt;
&lt;br /&gt;
==Ethical Issues Surrounding Biometrics==&lt;br /&gt;
===The Permanence of Biometric Identification===&lt;br /&gt;
Many forms of biometric data do not expire. While a person's face or voice may change some as they age, for the most part your physical and behavioral characteristics are going to stay the same throughout your life. &lt;br /&gt;
&lt;br /&gt;
With current forms of identification your can, for example, change your password or get a new credit card or driver's licence or passport. For the most part with biometric identification, you can't simply change your information (short of surgery). This posses a large privacy issue. Not only will anonymity be almost impossible in a world were biometric identification is the norm, but identity theft will be every more devastating because one can't simply adopt new identifying data to defeat the thief.&lt;br /&gt;
&lt;br /&gt;
===Biometrics as a Means of Discrimination===&lt;br /&gt;
If a particular biometric can not be measured on a person-- they are missing a finger, for example-- then inherently that person is going to seem more suspicious. Administrators of the system might think: &amp;quot;Sure maybe they have a legitimate reason for not doing the fingerprint ID, but maybe they are trying to bypass the system.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Biometrics systems could be used in small scale discriminatory screening processes such as stores using a biometric ID system to deny business to those found guilty of shoplifting in the past.&lt;br /&gt;
&lt;br /&gt;
===Steps to Take to Mitigate Invasion of Privacy===&lt;br /&gt;
Paraphrased from the [http://www.bioprivacy.org/ IBG BioPrivacy Initiative]&lt;br /&gt;
&lt;br /&gt;
* Biometric systems should only be expanded when absolutely necessary.&lt;br /&gt;
* Systems should not be expanded without public knowledge. &lt;br /&gt;
* Biometric information should not be used as a universal unique identifier. &amp;lt;br&amp;gt;&amp;quot;Universal unique identifiers facilitate the gathering and collection of personal information from various databases, and can represent a significant threat to privacy if misused.&amp;quot;&lt;br /&gt;
* These systems should not store more information about an individual than is absolutely necessary to verify the individual's identity.&lt;br /&gt;
&lt;br /&gt;
==Links and Resources==&lt;br /&gt;
* [http://www.anu.edu.au/people/Roger.Clarke/DV/Biometrics.html Biometrics and Privacy] by Roger Clarke&lt;br /&gt;
* [http://www.eff.org/Privacy/Surveillance/biometrics/ Who's watching you?] by William Abernathy and Lee Tien&lt;br /&gt;
* [http://www.bioprivacy.org/ IBG BioPrivacy Initiative]&lt;br /&gt;
* [http://www.biometricwatch.com/privacy.htm Biometric News Portal]&lt;br /&gt;
* [http://www.pcworld.com/article/id,81444-page,1/article.html Biometrics: Security Boon or Busting Privacy?] by Saumya Roy&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Biometrics Good ol' Wikipedia]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_4&amp;diff=1945</id>
		<title>CSC 379:Week 4, Group 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_4&amp;diff=1945"/>
		<updated>2007-07-28T15:34:24Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* Links and Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Biometrics and Privacy of Genetic Data=&lt;br /&gt;
A concern with ID cards that contain biometric information is that once one is stolen, it would be more difficult for someone to reclaim their identity as the nature of the representation of biometric data that would be used would be something that would not change over a person’s lifetime (e.g. fingerprints or eye-scan)[http://en.wikipedia.org/wiki/Biometrics#Common_biometric_characteristics].  Thus for technologies that rely solely on the biometric data contained within the IDs to establish identity, once a card is stolen, ones “identity” may never be able to be reclaimed.&lt;br /&gt;
&lt;br /&gt;
Ethical issues related to privacy of genetic data follow closely with this topic since it suffers from similar issues as biometrics, although genetic data is much more invasive to ones privacy as society becomes more able to interpret it.  There have been discussions of a constitutional amendment to prohibit genetic discrimination.  If ones genetic information is made available, or information derived from, it opens the person to an increased threat of discrimination (jobs, insurance, social), as well as other threats to privacy not yet realized, but that will likely be realized within ones lifetime as there becomes a greater capability to interpret genetic data.&lt;br /&gt;
&lt;br /&gt;
'''What types of protections should be afforded to biometric data compared to other types of data?  For genetic data?  Should biometric/genetic data be incorporated into various technology from ID cards to diagnostic equipment?  Examine ethical issues related storage and use.'''&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant External Links:===&lt;br /&gt;
The National Science and Technology Council some good resources related to biometrics and privacy issues.&lt;br /&gt;
* [http://www.biometrics.gov/ReferenceRoom/Introduction.aspx Introduction to Biometrics]&lt;br /&gt;
* [http://www.biometrics.gov/nstc/publications.aspx Biometrics and Privacy]&lt;br /&gt;
&lt;br /&gt;
Wikipedia's article on biometrics:&lt;br /&gt;
[http://en.wikipedia.org/wiki/Biometrics http://en.wikipedia.org/wiki/Biometrics]&lt;br /&gt;
&lt;br /&gt;
EFF has an introduction to some concerns voiced about biometrics:&lt;br /&gt;
[http://www.eff.org/Privacy/Surveillance/biometrics/ http://www.eff.org/Privacy/Surveillance/biometrics/]&lt;br /&gt;
&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/web/identity/ http://ethics.csc.ncsu.edu/privacy/web/identity/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What are Biometrics?==&lt;br /&gt;
A biometric is a measure of some physical or behavioural characteristic of an individual. These measurements can then be used to identify and individual or at least aid in confirming a claimed identity. Some examples of human characteristics that can be conveniently captured in a biometric include: Fingerprints, Retinal scan, Voice, Signature, DNA, Gait. After your individual information is recorded it can be used in a biometric system.&lt;br /&gt;
&lt;br /&gt;
===The Purpose of Biometrics===&lt;br /&gt;
Biometric systems have several purposes. They can verify that a person is who they claim to be by checking your information against the data the system has on you. A biometric system can identify you without you telling the system who you are by your physiological or behavioral characteristics. And biometric systems can also be used to screen individuals. The system may raise a flag or alert the police if it identifies you as being on its watch list.&lt;br /&gt;
&lt;br /&gt;
===Flaws in Biometric Systems===&lt;br /&gt;
These systems are not flawless though. Depending on what characteristic is being measured, there is often a significant chance of error. Each biometric has its own false accept rate and false reject rate. A false accept rate is the chance that the biometric verifies that you are who you claim to be, when you actually aren't. The higher the percent chance for a false acceptance, the easier the system is to fool. A false reject rate is the chance that a system says you are lying about who you claim to be when you are telling the truth. The false accept rate and false reject rate of a particular biometric should be taken into account when designing an identification or verification system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Ethical Issues Surrounding Biometrics==&lt;br /&gt;
===The Permanence of Biometric Identification===&lt;br /&gt;
Many forms of biometric data do not expire. While a person's face or voice may change some as they age, for the most part your physical and behavioral characteristics are going to stay the same throughout your life. &lt;br /&gt;
&lt;br /&gt;
With current forms of identification your can, for example, change your password or get a new credit card or driver's licence or passport. For the most part with biometric identification, you can't simply change your information (short of surgery). This posses a large privacy issue. Not only will anonymity be almost impossible in a world were biometric identification is the norm, but identity theft will be every more devastating because one can't simply adopt new identifying data to defeat the theif.&lt;br /&gt;
&lt;br /&gt;
===Biometrics as a Means of Discrimination===&lt;br /&gt;
If a particular biometric can not be measured on a person-- they are missing a finger, for example-- then inherently that person is going to seem more suspicious. Administrators of the system might think: &amp;quot;Sure maybe they have a legitimate reason for not doing the fingerprint ID, but maybe they are trying to bypass the system.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Biometrics systems could be used in small scale discriminatory screening processes such as stores using a biometric ID system to deny business to those found guilty of shoplifting in the past.&lt;br /&gt;
&lt;br /&gt;
===Steps to Take to Mitigate Invasion of Privacy===&lt;br /&gt;
Paraphrased from the [http://www.bioprivacy.org/ IBG BioPrivacy Initiative]&lt;br /&gt;
&lt;br /&gt;
* Biometric systems should only be expanded when absolutely necessary.&lt;br /&gt;
* Systems should not be expanded without public knowledge. &lt;br /&gt;
* Biometric information should not be used as a universal unique identifier. &amp;lt;br&amp;gt;&amp;quot;Universal unique identifiers facilitate the gathering and collection of personal information from various databases, and can represent a significant threat to privacy if misused.&amp;quot;&lt;br /&gt;
* These systems should not store more information about an individual than is absolutely necessary to verify or identify the individual.&lt;br /&gt;
&lt;br /&gt;
==Links and Resources==&lt;br /&gt;
* [http://www.anu.edu.au/people/Roger.Clarke/DV/Biometrics.html Biometrics and Privacy] by Roger Clarke&lt;br /&gt;
* [http://www.eff.org/Privacy/Surveillance/biometrics/ Who's watching you?] by William Abernathy and Lee Tien&lt;br /&gt;
* [http://www.bioprivacy.org/ IBG BioPrivacy Initiative]&lt;br /&gt;
* [http://www.biometricwatch.com/privacy.htm Biometric News Portal]&lt;br /&gt;
* [http://www.pcworld.com/article/id,81444-page,1/article.html Biometrics: Security Boon or Busting Privacy?] by Saumya Roy&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Biometrics Good ol' Wikipedia]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_4&amp;diff=1944</id>
		<title>CSC 379:Week 4, Group 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_4&amp;diff=1944"/>
		<updated>2007-07-28T15:33:56Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* What are Biometrics? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Biometrics and Privacy of Genetic Data=&lt;br /&gt;
A concern with ID cards that contain biometric information is that once one is stolen, it would be more difficult for someone to reclaim their identity as the nature of the representation of biometric data that would be used would be something that would not change over a person’s lifetime (e.g. fingerprints or eye-scan)[http://en.wikipedia.org/wiki/Biometrics#Common_biometric_characteristics].  Thus for technologies that rely solely on the biometric data contained within the IDs to establish identity, once a card is stolen, ones “identity” may never be able to be reclaimed.&lt;br /&gt;
&lt;br /&gt;
Ethical issues related to privacy of genetic data follow closely with this topic since it suffers from similar issues as biometrics, although genetic data is much more invasive to ones privacy as society becomes more able to interpret it.  There have been discussions of a constitutional amendment to prohibit genetic discrimination.  If ones genetic information is made available, or information derived from, it opens the person to an increased threat of discrimination (jobs, insurance, social), as well as other threats to privacy not yet realized, but that will likely be realized within ones lifetime as there becomes a greater capability to interpret genetic data.&lt;br /&gt;
&lt;br /&gt;
'''What types of protections should be afforded to biometric data compared to other types of data?  For genetic data?  Should biometric/genetic data be incorporated into various technology from ID cards to diagnostic equipment?  Examine ethical issues related storage and use.'''&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant External Links:===&lt;br /&gt;
The National Science and Technology Council some good resources related to biometrics and privacy issues.&lt;br /&gt;
* [http://www.biometrics.gov/ReferenceRoom/Introduction.aspx Introduction to Biometrics]&lt;br /&gt;
* [http://www.biometrics.gov/nstc/publications.aspx Biometrics and Privacy]&lt;br /&gt;
&lt;br /&gt;
Wikipedia's article on biometrics:&lt;br /&gt;
[http://en.wikipedia.org/wiki/Biometrics http://en.wikipedia.org/wiki/Biometrics]&lt;br /&gt;
&lt;br /&gt;
EFF has an introduction to some concerns voiced about biometrics:&lt;br /&gt;
[http://www.eff.org/Privacy/Surveillance/biometrics/ http://www.eff.org/Privacy/Surveillance/biometrics/]&lt;br /&gt;
&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/web/identity/ http://ethics.csc.ncsu.edu/privacy/web/identity/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What are Biometrics?==&lt;br /&gt;
A biometric is a measure of some physical or behavioural characteristic of an individual. These measurements can then be used to identify and individual or at least aid in confirming a claimed identity. Some examples of human characteristics that can be conveniently captured in a biometric include: Fingerprints, Retinal scan, Voice, Signature, DNA, Gait. After your individual information is recorded it can be used in a biometric system.&lt;br /&gt;
&lt;br /&gt;
===The Purpose of Biometrics===&lt;br /&gt;
Biometric systems have several purposes. They can verify that a person is who they claim to be by checking your information against the data the system has on you. A biometric system can identify you without you telling the system who you are by your physiological or behavioral characteristics. And biometric systems can also be used to screen individuals. The system may raise a flag or alert the police if it identifies you as being on its watch list.&lt;br /&gt;
&lt;br /&gt;
===Flaws in Biometric Systems===&lt;br /&gt;
These systems are not flawless though. Depending on what characteristic is being measured, there is often a significant chance of error. Each biometric has its own false accept rate and false reject rate. A false accept rate is the chance that the biometric verifies that you are who you claim to be, when you actually aren't. The higher the percent chance for a false acceptance, the easier the system is to fool. A false reject rate is the chance that a system says you are lying about who you claim to be when you are telling the truth. The false accept rate and false reject rate of a particular biometric should be taken into account when designing an identification or verification system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Ethical Issues Surrounding Biometrics==&lt;br /&gt;
===The Permanence of Biometric Identification===&lt;br /&gt;
Many forms of biometric data do not expire. While a person's face or voice may change some as they age, for the most part your physical and behavioral characteristics are going to stay the same throughout your life. &lt;br /&gt;
&lt;br /&gt;
With current forms of identification your can, for example, change your password or get a new credit card or driver's licence or passport. For the most part with biometric identification, you can't simply change your information (short of surgery). This posses a large privacy issue. Not only will anonymity be almost impossible in a world were biometric identification is the norm, but identity theft will be every more devastating because one can't simply adopt new identifying data to defeat the theif.&lt;br /&gt;
&lt;br /&gt;
===Biometrics as a Means of Discrimination===&lt;br /&gt;
If a particular biometric can not be measured on a person-- they are missing a finger, for example-- then inherently that person is going to seem more suspicious. Administrators of the system might think: &amp;quot;Sure maybe they have a legitimate reason for not doing the fingerprint ID, but maybe they are trying to bypass the system.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Biometrics systems could be used in small scale discriminatory screening processes such as stores using a biometric ID system to deny business to those found guilty of shoplifting in the past.&lt;br /&gt;
&lt;br /&gt;
===Steps to Take to Mitigate Invasion of Privacy===&lt;br /&gt;
Paraphrased from the [http://www.bioprivacy.org/ IBG BioPrivacy Initiative]&lt;br /&gt;
&lt;br /&gt;
* Biometric systems should only be expanded when absolutely necessary.&lt;br /&gt;
* Systems should not be expanded without public knowledge. &lt;br /&gt;
* Biometric information should not be used as a universal unique identifier. &amp;lt;br&amp;gt;&amp;quot;Universal unique identifiers facilitate the gathering and collection of personal information from various databases, and can represent a significant threat to privacy if misused.&amp;quot;&lt;br /&gt;
* These systems should not store more information about an individual than is absolutely necessary to verify or identify the individual.&lt;br /&gt;
&lt;br /&gt;
==Links and Resources==&lt;br /&gt;
* [http://www.anu.edu.au/people/Roger.Clarke/DV/Biometrics.html Biometrics and Privacy] by Roger Clarke&lt;br /&gt;
* [http://www.eff.org/Privacy/Surveillance/biometrics/ Who's watching you?] by William Abernathy and Lee Tien&lt;br /&gt;
* [http://www.bioprivacy.org/ IBG BioPrivacy Initiative]&lt;br /&gt;
* [http://www.biometricwatch.com/privacy.htm Biometric News Portal]&lt;br /&gt;
* [http://www.pcworld.com/article/id,81444-page,1/article.html Biometrics: Security Boon or Busting Privacy?] bySaumya Roy&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Biometrics Good ol' Wikipedia]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_4&amp;diff=1943</id>
		<title>CSC 379:Week 4, Group 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_4&amp;diff=1943"/>
		<updated>2007-07-28T14:45:19Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* What are Biometrics? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Biometrics and Privacy of Genetic Data=&lt;br /&gt;
A concern with ID cards that contain biometric information is that once one is stolen, it would be more difficult for someone to reclaim their identity as the nature of the representation of biometric data that would be used would be something that would not change over a person’s lifetime (e.g. fingerprints or eye-scan)[http://en.wikipedia.org/wiki/Biometrics#Common_biometric_characteristics].  Thus for technologies that rely solely on the biometric data contained within the IDs to establish identity, once a card is stolen, ones “identity” may never be able to be reclaimed.&lt;br /&gt;
&lt;br /&gt;
Ethical issues related to privacy of genetic data follow closely with this topic since it suffers from similar issues as biometrics, although genetic data is much more invasive to ones privacy as society becomes more able to interpret it.  There have been discussions of a constitutional amendment to prohibit genetic discrimination.  If ones genetic information is made available, or information derived from, it opens the person to an increased threat of discrimination (jobs, insurance, social), as well as other threats to privacy not yet realized, but that will likely be realized within ones lifetime as there becomes a greater capability to interpret genetic data.&lt;br /&gt;
&lt;br /&gt;
'''What types of protections should be afforded to biometric data compared to other types of data?  For genetic data?  Should biometric/genetic data be incorporated into various technology from ID cards to diagnostic equipment?  Examine ethical issues related storage and use.'''&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant External Links:===&lt;br /&gt;
The National Science and Technology Council some good resources related to biometrics and privacy issues.&lt;br /&gt;
* [http://www.biometrics.gov/ReferenceRoom/Introduction.aspx Introduction to Biometrics]&lt;br /&gt;
* [http://www.biometrics.gov/nstc/publications.aspx Biometrics and Privacy]&lt;br /&gt;
&lt;br /&gt;
Wikipedia's article on biometrics:&lt;br /&gt;
[http://en.wikipedia.org/wiki/Biometrics http://en.wikipedia.org/wiki/Biometrics]&lt;br /&gt;
&lt;br /&gt;
EFF has an introduction to some concerns voiced about biometrics:&lt;br /&gt;
[http://www.eff.org/Privacy/Surveillance/biometrics/ http://www.eff.org/Privacy/Surveillance/biometrics/]&lt;br /&gt;
&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/web/identity/ http://ethics.csc.ncsu.edu/privacy/web/identity/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What are Biometrics?==&lt;br /&gt;
A biometric is a measure of some physical or behavioural characteristic of an individual. These measurements can then be used to identify and individual or at least aid in confirming a claimed identity. Some examples of human characterisitcs that can be convieniently caputred in a biometric include: Fingerprints, Retinal scan, Voice, Signature, DNA, Gait. After your individual information is recorded it can be used in a biometric system.&lt;br /&gt;
&lt;br /&gt;
===The Purpose of Biometrics===&lt;br /&gt;
Biometric systems have several purposes. They can verify that a person is who they claim to be by checking your information against the data the system has on you. A biometric system can identify you without you telling the system who you are by your physiological or behavioral characteristics. And biometric systems can also be used to screen individuals. The system may raise a flag or alert the police if it identifies you as being on its watch list.&lt;br /&gt;
&lt;br /&gt;
===Flaws in Biometric Systems===&lt;br /&gt;
These systems are not flawless though. Depending on what characteristic is being measured, there is often a significant chance of error. Each biometric has its own false accept rate and false reject rate. A false accept rate is the chance that the biometric verifies that you are who you claim to be, when you actually aren't. The higher the percent chance for a false acceptance, the easier the system is to fool. A false reject rate is the chance that a system says you are lieing about who you claim to be when you are telling the truth. The false accept rate and false reject rate of a particualar biometric should be taken into account when designing an identification or verification system.&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_4&amp;diff=1942</id>
		<title>CSC 379:Week 4, Group 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_4&amp;diff=1942"/>
		<updated>2007-07-28T14:43:58Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* What are Biometrics? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Biometrics and Privacy of Genetic Data=&lt;br /&gt;
A concern with ID cards that contain biometric information is that once one is stolen, it would be more difficult for someone to reclaim their identity as the nature of the representation of biometric data that would be used would be something that would not change over a person’s lifetime (e.g. fingerprints or eye-scan)[http://en.wikipedia.org/wiki/Biometrics#Common_biometric_characteristics].  Thus for technologies that rely solely on the biometric data contained within the IDs to establish identity, once a card is stolen, ones “identity” may never be able to be reclaimed.&lt;br /&gt;
&lt;br /&gt;
Ethical issues related to privacy of genetic data follow closely with this topic since it suffers from similar issues as biometrics, although genetic data is much more invasive to ones privacy as society becomes more able to interpret it.  There have been discussions of a constitutional amendment to prohibit genetic discrimination.  If ones genetic information is made available, or information derived from, it opens the person to an increased threat of discrimination (jobs, insurance, social), as well as other threats to privacy not yet realized, but that will likely be realized within ones lifetime as there becomes a greater capability to interpret genetic data.&lt;br /&gt;
&lt;br /&gt;
'''What types of protections should be afforded to biometric data compared to other types of data?  For genetic data?  Should biometric/genetic data be incorporated into various technology from ID cards to diagnostic equipment?  Examine ethical issues related storage and use.'''&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant External Links:===&lt;br /&gt;
The National Science and Technology Council some good resources related to biometrics and privacy issues.&lt;br /&gt;
* [http://www.biometrics.gov/ReferenceRoom/Introduction.aspx Introduction to Biometrics]&lt;br /&gt;
* [http://www.biometrics.gov/nstc/publications.aspx Biometrics and Privacy]&lt;br /&gt;
&lt;br /&gt;
Wikipedia's article on biometrics:&lt;br /&gt;
[http://en.wikipedia.org/wiki/Biometrics http://en.wikipedia.org/wiki/Biometrics]&lt;br /&gt;
&lt;br /&gt;
EFF has an introduction to some concerns voiced about biometrics:&lt;br /&gt;
[http://www.eff.org/Privacy/Surveillance/biometrics/ http://www.eff.org/Privacy/Surveillance/biometrics/]&lt;br /&gt;
&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/web/identity/ http://ethics.csc.ncsu.edu/privacy/web/identity/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What are Biometrics?==&lt;br /&gt;
A biometric is a measure of some physical or behavioural characteristic of an individual. These measurements can then be used to identify and individual or at least aid in confirming a claimed identity. Some examples of human characterisitcs that can be convieniently caputred in a biometric include: Fingerprints, Retinal scan, Voice, Signature, DNA, Gait. After your individual information is recorded it can be used in a biometric system.&lt;br /&gt;
&lt;br /&gt;
Biometric systems have several purposes. They can verify that a person is who they claim to be by checking your information against the data the system has on you. A biometric system can identify you without you telling the system who you are by your physiological or behavioral characteristics. And biometric systems can also be used to screen individuals. The system may raise a flag or alert the police if it identifies you as being on its watch list.&lt;br /&gt;
&lt;br /&gt;
These systems are not flawless though. Depending on what characteristic is being measured, there is often a significant chance of error. Each biometric has its own false accept rate and false reject rate. A false accept rate is the chance that the biometric verifies that you are who you claim to be, when you actually aren't. The higher the percent chance for a false acceptance, the easier the system is to fool. A false reject rate is the chance that a system says you are lieing about who you claim to be when you are telling the truth. The false accept rate and false reject rate of a particualar biometric should be taken into account when designing an identification or verification system.&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_4&amp;diff=1941</id>
		<title>CSC 379:Week 4, Group 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_4&amp;diff=1941"/>
		<updated>2007-07-28T14:35:48Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* Biometrics and Privacy of Genetic Data */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Biometrics and Privacy of Genetic Data=&lt;br /&gt;
A concern with ID cards that contain biometric information is that once one is stolen, it would be more difficult for someone to reclaim their identity as the nature of the representation of biometric data that would be used would be something that would not change over a person’s lifetime (e.g. fingerprints or eye-scan)[http://en.wikipedia.org/wiki/Biometrics#Common_biometric_characteristics].  Thus for technologies that rely solely on the biometric data contained within the IDs to establish identity, once a card is stolen, ones “identity” may never be able to be reclaimed.&lt;br /&gt;
&lt;br /&gt;
Ethical issues related to privacy of genetic data follow closely with this topic since it suffers from similar issues as biometrics, although genetic data is much more invasive to ones privacy as society becomes more able to interpret it.  There have been discussions of a constitutional amendment to prohibit genetic discrimination.  If ones genetic information is made available, or information derived from, it opens the person to an increased threat of discrimination (jobs, insurance, social), as well as other threats to privacy not yet realized, but that will likely be realized within ones lifetime as there becomes a greater capability to interpret genetic data.&lt;br /&gt;
&lt;br /&gt;
'''What types of protections should be afforded to biometric data compared to other types of data?  For genetic data?  Should biometric/genetic data be incorporated into various technology from ID cards to diagnostic equipment?  Examine ethical issues related storage and use.'''&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant External Links:===&lt;br /&gt;
The National Science and Technology Council some good resources related to biometrics and privacy issues.&lt;br /&gt;
* [http://www.biometrics.gov/ReferenceRoom/Introduction.aspx Introduction to Biometrics]&lt;br /&gt;
* [http://www.biometrics.gov/nstc/publications.aspx Biometrics and Privacy]&lt;br /&gt;
&lt;br /&gt;
Wikipedia's article on biometrics:&lt;br /&gt;
[http://en.wikipedia.org/wiki/Biometrics http://en.wikipedia.org/wiki/Biometrics]&lt;br /&gt;
&lt;br /&gt;
EFF has an introduction to some concerns voiced about biometrics:&lt;br /&gt;
[http://www.eff.org/Privacy/Surveillance/biometrics/ http://www.eff.org/Privacy/Surveillance/biometrics/]&lt;br /&gt;
&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/web/identity/ http://ethics.csc.ncsu.edu/privacy/web/identity/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What are Biometrics?==&lt;br /&gt;
A biometric is a measure of some physical or behavioural characteristic of an individual. These measurements can then be used to identify and individual or at least aid in confirming a claimed identity. Some examples of human characterisitcs that can be convieniently caputred in a biometric include: Fingerprints, Retinal scan, Voice, Signature, DNA, Gait. After your individual information is recorded it can be used in a biometric system.&lt;br /&gt;
&lt;br /&gt;
Biometric systems have several purposes. They can verify that a person is who they claim to be by checking your information against the data the system has on you. A biometric system can identify you without you telling the system who you are by your physiological or behavioral characteristics. And biometric systems can also be used to screen individuals. The system may raise a flag or alert the police if it identifies you as being on it's watch list.&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1692</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1692"/>
		<updated>2007-07-15T07:35:11Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* Ethical considerations of international usage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
&lt;br /&gt;
There are 4 conditions that make up the different Creative Commons licenses:&lt;br /&gt;
;Attribution: All Creative Commons licenses require attribution as specified by the original work's creator when the work is used, distributed, or modified whether in its original form or as a derivative work.&lt;br /&gt;
;Noncommercial: The original work may only be used, distributed, or modified only for noncommercial purposes whether the work is in its original form or as a derivative work.&lt;br /&gt;
;No derivative works: The original work may be used or distributed, but may not be used in any form of derivative work.&lt;br /&gt;
;Share alike: Derivative works based upon the original work may only be distributed under an identical license to the original work.&lt;br /&gt;
&lt;br /&gt;
These conditions are combined in various forms to make the six main Creative Commons licenses:&lt;br /&gt;
# Attribution (by)&lt;br /&gt;
# Attribution Non-commerical (by-nc)&lt;br /&gt;
# Attribution Non-commercial Share Alike (by-nc-sa)&lt;br /&gt;
# Attribution Non-commercial No Derivatives (by-nc-nd)&lt;br /&gt;
# Attribution No Derivatives (by-nd)&lt;br /&gt;
# Attribution Share Alike (by-sa)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|&lt;br /&gt;
*Creator of work can grant specific permissions for re-use of work&lt;br /&gt;
*Rights and conditions of others to use work are more clearly laid out&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Must be careful to choose appropriate license to retain the desired amount of control over the work&lt;br /&gt;
*Must specifically designate work as licensed under Creative Commons&lt;br /&gt;
*Users of Creative Commons-licensed works must be careful when combining works with different licenses&lt;br /&gt;
|&lt;br /&gt;
*There is a disclaimer of warranty that the individual granting the license has the right to do so&lt;br /&gt;
*Certain provisions of the license change between countries&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Copyright&lt;br /&gt;
|&lt;br /&gt;
*Automatically granted to created works, even without notice&lt;br /&gt;
*Reserves all rights for the creator&lt;br /&gt;
|&lt;br /&gt;
*Can cause confusion, since it applies without notice of copyright&lt;br /&gt;
*Those wishing to reuse copyrighted works must seek explicit permission&lt;br /&gt;
|&lt;br /&gt;
*Easy to violate copyright unintentionally, since notification of copyright is not required&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|&lt;br /&gt;
*Requires any modified and released versions to have source code available, and to stay under the GPL&lt;br /&gt;
*Maintains free software environment&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Incompatible with closed-source (commercial) development&lt;br /&gt;
*Once something is under the GPL, it essentially must stay under GPL&lt;br /&gt;
|&lt;br /&gt;
*&amp;quot;Locked-in&amp;quot; to GPL&lt;br /&gt;
*Forces ideology behind GPL on users of GPL'd content&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Lesser GPL (LGPL)&lt;br /&gt;
|&lt;br /&gt;
*Allows non-GPL software to link with LGPL'd libraries&lt;br /&gt;
*Less restrictive than GPL&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Largely discouraged by GPL proponents&lt;br /&gt;
|&lt;br /&gt;
*Allows free software to be used in proprietary projects&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|BSD-style Licenses&lt;br /&gt;
|&lt;br /&gt;
*Non-copyleft - modified versions aren't required to be free, more flexible&lt;br /&gt;
*Allows modified versions to be released under alternate licenses&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Modified versions can become incorporated into proprietary projects&lt;br /&gt;
*Original BSD license had an annoying &amp;quot;advertisement&amp;quot; clause&lt;br /&gt;
|&lt;br /&gt;
*Free code can be made proprietary&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Public Domain&lt;br /&gt;
|&lt;br /&gt;
*Work is released from copyright&lt;br /&gt;
*Work can be used by anyone else without restriction&lt;br /&gt;
|&lt;br /&gt;
*Any rights by the creator are forfeited&lt;br /&gt;
|&lt;br /&gt;
*Creator retains no rights to work&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Creative Commons licenses are good way for people to clarify what should and should not be done with their work. It lets you pick and choose what rights to reserve. CC licensing must also be indicated, whereas copyright requires no notification. A CC license is a good way to distribute the works you have created and protect the people who download it. If you did not create the work though, you of course cannot give others the right to use it as they see fit. So unless the media outlet is all the creator of all the media they distribute, a CC won't help protect the public.&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
* [http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
With a Creative Commons license you can allow people to share in your creative work and add to or change things while at the same time reserving which rights you want without giving the public complete free reign over your work. This gives creators more options than normal copyright. This benefit the public but can also benefit the creator by giving them a way to get their work out to the public easier without giving up all their rights to their work.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A Creative Commons license does have some disadvantages though. Once you pick which license to use, you can't take it back. You can choose to stop licensing your work that way but anyone that already has a copy of your work under the old license can forever use it to the full extent that old license permits. Also the most restrictive Creative Commons licenses will still allow restrictive verbatim copying with attribution and non-commercial purposes. This is less than just copyright and may not be restrictive enough for widespread use within the business community. It seems Creative Commons licenses are targeted more towards giving the public greater use and currently don't suite everyone's needs.&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;br /&gt;
&lt;br /&gt;
There are different project groups working to promote the adoption of Creative Commons licenses internationally. They promote but also help adapt the licenses so that they fit with a given country's laws.&lt;br /&gt;
&lt;br /&gt;
An obvious ethical consideration for a international copyright system is that the creator of a work cannot protect their rights if the violator is in another country that does not wish to enforce the licenses. Also legal precedence regarding Creative Commons licenses from one country wouldn't necessarily be recognized by another country. Because the countries of the world don't have a joint judicial system there must a certain amount of trust and understanding between countries in order to protect the rights of all the creative citizens involved. For this reason I think that Creative Commons licenses are a good step in the right direction, but they aren't enough to replace international agreements regarding intellectual property.&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1691</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1691"/>
		<updated>2007-07-15T07:34:50Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* Adoption of license */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
&lt;br /&gt;
There are 4 conditions that make up the different Creative Commons licenses:&lt;br /&gt;
;Attribution: All Creative Commons licenses require attribution as specified by the original work's creator when the work is used, distributed, or modified whether in its original form or as a derivative work.&lt;br /&gt;
;Noncommercial: The original work may only be used, distributed, or modified only for noncommercial purposes whether the work is in its original form or as a derivative work.&lt;br /&gt;
;No derivative works: The original work may be used or distributed, but may not be used in any form of derivative work.&lt;br /&gt;
;Share alike: Derivative works based upon the original work may only be distributed under an identical license to the original work.&lt;br /&gt;
&lt;br /&gt;
These conditions are combined in various forms to make the six main Creative Commons licenses:&lt;br /&gt;
# Attribution (by)&lt;br /&gt;
# Attribution Non-commerical (by-nc)&lt;br /&gt;
# Attribution Non-commercial Share Alike (by-nc-sa)&lt;br /&gt;
# Attribution Non-commercial No Derivatives (by-nc-nd)&lt;br /&gt;
# Attribution No Derivatives (by-nd)&lt;br /&gt;
# Attribution Share Alike (by-sa)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|&lt;br /&gt;
*Creator of work can grant specific permissions for re-use of work&lt;br /&gt;
*Rights and conditions of others to use work are more clearly laid out&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Must be careful to choose appropriate license to retain the desired amount of control over the work&lt;br /&gt;
*Must specifically designate work as licensed under Creative Commons&lt;br /&gt;
*Users of Creative Commons-licensed works must be careful when combining works with different licenses&lt;br /&gt;
|&lt;br /&gt;
*There is a disclaimer of warranty that the individual granting the license has the right to do so&lt;br /&gt;
*Certain provisions of the license change between countries&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Copyright&lt;br /&gt;
|&lt;br /&gt;
*Automatically granted to created works, even without notice&lt;br /&gt;
*Reserves all rights for the creator&lt;br /&gt;
|&lt;br /&gt;
*Can cause confusion, since it applies without notice of copyright&lt;br /&gt;
*Those wishing to reuse copyrighted works must seek explicit permission&lt;br /&gt;
|&lt;br /&gt;
*Easy to violate copyright unintentionally, since notification of copyright is not required&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|&lt;br /&gt;
*Requires any modified and released versions to have source code available, and to stay under the GPL&lt;br /&gt;
*Maintains free software environment&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Incompatible with closed-source (commercial) development&lt;br /&gt;
*Once something is under the GPL, it essentially must stay under GPL&lt;br /&gt;
|&lt;br /&gt;
*&amp;quot;Locked-in&amp;quot; to GPL&lt;br /&gt;
*Forces ideology behind GPL on users of GPL'd content&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Lesser GPL (LGPL)&lt;br /&gt;
|&lt;br /&gt;
*Allows non-GPL software to link with LGPL'd libraries&lt;br /&gt;
*Less restrictive than GPL&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Largely discouraged by GPL proponents&lt;br /&gt;
|&lt;br /&gt;
*Allows free software to be used in proprietary projects&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|BSD-style Licenses&lt;br /&gt;
|&lt;br /&gt;
*Non-copyleft - modified versions aren't required to be free, more flexible&lt;br /&gt;
*Allows modified versions to be released under alternate licenses&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Modified versions can become incorporated into proprietary projects&lt;br /&gt;
*Original BSD license had an annoying &amp;quot;advertisement&amp;quot; clause&lt;br /&gt;
|&lt;br /&gt;
*Free code can be made proprietary&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Public Domain&lt;br /&gt;
|&lt;br /&gt;
*Work is released from copyright&lt;br /&gt;
*Work can be used by anyone else without restriction&lt;br /&gt;
|&lt;br /&gt;
*Any rights by the creator are forfeited&lt;br /&gt;
|&lt;br /&gt;
*Creator retains no rights to work&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Creative Commons licenses are good way for people to clarify what should and should not be done with their work. It lets you pick and choose what rights to reserve. CC licensing must also be indicated, whereas copyright requires no notification. A CC license is a good way to distribute the works you have created and protect the people who download it. If you did not create the work though, you of course cannot give others the right to use it as they see fit. So unless the media outlet is all the creator of all the media they distribute, a CC won't help protect the public.&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
* [http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
With a Creative Commons license you can allow people to share in your creative work and add to or change things while at the same time reserving which rights you want without giving the public complete free reign over your work. This gives creators more options than normal copyright. This benefit the public but can also benefit the creator by giving them a way to get their work out to the public easier without giving up all their rights to their work.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A Creative Commons license does have some disadvantages though. Once you pick which license to use, you can't take it back. You can choose to stop licensing your work that way but anyone that already has a copy of your work under the old license can forever use it to the full extent that old license permits. Also the most restrictive Creative Commons licenses will still allow restrictive verbatim copying with attribution and non-commercial purposes. This is less than just copyright and may not be restrictive enough for widespread use within the business community. It seems Creative Commons licenses are targeted more towards giving the public greater use and currently don't suite everyone's needs.&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;br /&gt;
&lt;br /&gt;
There are different project groups working to promote the adoption of Creative Commons licenses internationally. They promote but also help adapt the licenses so that they fit with a given country's laws.&lt;br /&gt;
&lt;br /&gt;
An obvious ethical consideration for a international copyright system is that the creator of a work cannot protect their rights if the violator is in another country that does not wish to enforce the licenses. Also legal precedence regarding Creative Commons licenses from one country wouldn't necessarily be recognized by another country. Because the countries of the world don't have a joint judicial system there must a certain amount of trust and understanding between countries in order to protect the rights of all the creative citizens involved. For this reason I think that Creative Commons licenses are a good step in the right direction, but they aren't enough to replace international agreements regarding intellectual property.&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1690</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1690"/>
		<updated>2007-07-15T07:34:31Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* Ethical considerations / Obstacles to adoption */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
&lt;br /&gt;
There are 4 conditions that make up the different Creative Commons licenses:&lt;br /&gt;
;Attribution: All Creative Commons licenses require attribution as specified by the original work's creator when the work is used, distributed, or modified whether in its original form or as a derivative work.&lt;br /&gt;
;Noncommercial: The original work may only be used, distributed, or modified only for noncommercial purposes whether the work is in its original form or as a derivative work.&lt;br /&gt;
;No derivative works: The original work may be used or distributed, but may not be used in any form of derivative work.&lt;br /&gt;
;Share alike: Derivative works based upon the original work may only be distributed under an identical license to the original work.&lt;br /&gt;
&lt;br /&gt;
These conditions are combined in various forms to make the six main Creative Commons licenses:&lt;br /&gt;
# Attribution (by)&lt;br /&gt;
# Attribution Non-commerical (by-nc)&lt;br /&gt;
# Attribution Non-commercial Share Alike (by-nc-sa)&lt;br /&gt;
# Attribution Non-commercial No Derivatives (by-nc-nd)&lt;br /&gt;
# Attribution No Derivatives (by-nd)&lt;br /&gt;
# Attribution Share Alike (by-sa)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|&lt;br /&gt;
*Creator of work can grant specific permissions for re-use of work&lt;br /&gt;
*Rights and conditions of others to use work are more clearly laid out&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Must be careful to choose appropriate license to retain the desired amount of control over the work&lt;br /&gt;
*Must specifically designate work as licensed under Creative Commons&lt;br /&gt;
*Users of Creative Commons-licensed works must be careful when combining works with different licenses&lt;br /&gt;
|&lt;br /&gt;
*There is a disclaimer of warranty that the individual granting the license has the right to do so&lt;br /&gt;
*Certain provisions of the license change between countries&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Copyright&lt;br /&gt;
|&lt;br /&gt;
*Automatically granted to created works, even without notice&lt;br /&gt;
*Reserves all rights for the creator&lt;br /&gt;
|&lt;br /&gt;
*Can cause confusion, since it applies without notice of copyright&lt;br /&gt;
*Those wishing to reuse copyrighted works must seek explicit permission&lt;br /&gt;
|&lt;br /&gt;
*Easy to violate copyright unintentionally, since notification of copyright is not required&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|&lt;br /&gt;
*Requires any modified and released versions to have source code available, and to stay under the GPL&lt;br /&gt;
*Maintains free software environment&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Incompatible with closed-source (commercial) development&lt;br /&gt;
*Once something is under the GPL, it essentially must stay under GPL&lt;br /&gt;
|&lt;br /&gt;
*&amp;quot;Locked-in&amp;quot; to GPL&lt;br /&gt;
*Forces ideology behind GPL on users of GPL'd content&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Lesser GPL (LGPL)&lt;br /&gt;
|&lt;br /&gt;
*Allows non-GPL software to link with LGPL'd libraries&lt;br /&gt;
*Less restrictive than GPL&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Largely discouraged by GPL proponents&lt;br /&gt;
|&lt;br /&gt;
*Allows free software to be used in proprietary projects&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|BSD-style Licenses&lt;br /&gt;
|&lt;br /&gt;
*Non-copyleft - modified versions aren't required to be free, more flexible&lt;br /&gt;
*Allows modified versions to be released under alternate licenses&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Modified versions can become incorporated into proprietary projects&lt;br /&gt;
*Original BSD license had an annoying &amp;quot;advertisement&amp;quot; clause&lt;br /&gt;
|&lt;br /&gt;
*Free code can be made proprietary&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Public Domain&lt;br /&gt;
|&lt;br /&gt;
*Work is released from copyright&lt;br /&gt;
*Work can be used by anyone else without restriction&lt;br /&gt;
|&lt;br /&gt;
*Any rights by the creator are forfeited&lt;br /&gt;
|&lt;br /&gt;
*Creator retains no rights to work&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Creative Commons licenses are good way for people to clarify what should and should not be done with their work. It lets you pick and choose what rights to reserve. CC licensing must also be indicated, whereas copyright requires no notification. A CC license is a good way to distrubute the works you have created and protect the people who download it. If you did not create the work though, you of course cannot give others the right to use it as they see fit. So unless the media outlet is all the creator of all the media they distrubute, a CC won't help protect the public.&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
* [http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
With a Creative Commons license you can allow people to share in your creative work and add to or change things while at the same time reserving which rights you want without giving the public complete free reign over your work. This gives creators more options than normal copyright. This benefit the public but can also benefit the creator by giving them a way to get their work out to the public easier without giving up all their rights to their work.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A Creative Commons license does have some disadvantages though. Once you pick which license to use, you can't take it back. You can choose to stop licensing your work that way but anyone that already has a copy of your work under the old license can forever use it to the full extent that old license permits. Also the most restrictive Creative Commons licenses will still allow restrictive verbatim copying with attribution and non-commercial purposes. This is less than just copyright and may not be restrictive enough for widespread use within the business community. It seems Creative Commons licenses are targeted more towards giving the public greater use and currently don't suite everyone's needs.&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;br /&gt;
&lt;br /&gt;
There are different project groups working to promote the adoption of Creative Commons licenses internationally. They promote but also help adapt the licenses so that they fit with a given country's laws.&lt;br /&gt;
&lt;br /&gt;
An obvious ethical consideration for a international copyright system is that the creator of a work cannot protect their rights if the violator is in another country that does not wish to enforce the licenses. Also legal precedence regarding Creative Commons licenses from one country wouldn't necessarily be recognized by another country. Because the countries of the world don't have a joint judicial system there must a certain amount of trust and understanding between countries in order to protect the rights of all the creative citizens involved. For this reason I think that Creative Commons licenses are a good step in the right direction, but they aren't enough to replace international agreements regarding intellectual property.&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1689</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1689"/>
		<updated>2007-07-15T07:34:07Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* Ethical considerations of international usage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
&lt;br /&gt;
There are 4 conditions that make up the different Creative Commons licenses:&lt;br /&gt;
;Attribution: All Creative Commons licenses require attribution as specified by the original work's creator when the work is used, distributed, or modified whether in its original form or as a derivative work.&lt;br /&gt;
;Noncommercial: The original work may only be used, distributed, or modified only for noncommercial purposes whether the work is in its original form or as a derivative work.&lt;br /&gt;
;No derivative works: The original work may be used or distributed, but may not be used in any form of derivative work.&lt;br /&gt;
;Share alike: Derivative works based upon the original work may only be distributed under an identical license to the original work.&lt;br /&gt;
&lt;br /&gt;
These conditions are combined in various forms to make the six main Creative Commons licenses:&lt;br /&gt;
# Attribution (by)&lt;br /&gt;
# Attribution Non-commerical (by-nc)&lt;br /&gt;
# Attribution Non-commercial Share Alike (by-nc-sa)&lt;br /&gt;
# Attribution Non-commercial No Derivatives (by-nc-nd)&lt;br /&gt;
# Attribution No Derivatives (by-nd)&lt;br /&gt;
# Attribution Share Alike (by-sa)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|&lt;br /&gt;
*Creator of work can grant specific permissions for re-use of work&lt;br /&gt;
*Rights and conditions of others to use work are more clearly laid out&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Must be careful to choose appropriate license to retain the desired amount of control over the work&lt;br /&gt;
*Must specifically designate work as licensed under Creative Commons&lt;br /&gt;
*Users of Creative Commons-licensed works must be careful when combining works with different licenses&lt;br /&gt;
|&lt;br /&gt;
*There is a disclaimer of warranty that the individual granting the license has the right to do so&lt;br /&gt;
*Certain provisions of the license change between countries&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Copyright&lt;br /&gt;
|&lt;br /&gt;
*Automatically granted to created works, even without notice&lt;br /&gt;
*Reserves all rights for the creator&lt;br /&gt;
|&lt;br /&gt;
*Can cause confusion, since it applies without notice of copyright&lt;br /&gt;
*Those wishing to reuse copyrighted works must seek explicit permission&lt;br /&gt;
|&lt;br /&gt;
*Easy to violate copyright unintentionally, since notification of copyright is not required&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|&lt;br /&gt;
*Requires any modified and released versions to have source code available, and to stay under the GPL&lt;br /&gt;
*Maintains free software environment&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Incompatible with closed-source (commercial) development&lt;br /&gt;
*Once something is under the GPL, it essentially must stay under GPL&lt;br /&gt;
|&lt;br /&gt;
*&amp;quot;Locked-in&amp;quot; to GPL&lt;br /&gt;
*Forces ideology behind GPL on users of GPL'd content&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Lesser GPL (LGPL)&lt;br /&gt;
|&lt;br /&gt;
*Allows non-GPL software to link with LGPL'd libraries&lt;br /&gt;
*Less restrictive than GPL&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Largely discouraged by GPL proponents&lt;br /&gt;
|&lt;br /&gt;
*Allows free software to be used in proprietary projects&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|BSD-style Licenses&lt;br /&gt;
|&lt;br /&gt;
*Non-copyleft - modified versions aren't required to be free, more flexible&lt;br /&gt;
*Allows modified versions to be released under alternate licenses&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Modified versions can become incorporated into proprietary projects&lt;br /&gt;
*Original BSD license had an annoying &amp;quot;advertisement&amp;quot; clause&lt;br /&gt;
|&lt;br /&gt;
*Free code can be made proprietary&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Public Domain&lt;br /&gt;
|&lt;br /&gt;
*Work is released from copyright&lt;br /&gt;
*Work can be used by anyone else without restriction&lt;br /&gt;
|&lt;br /&gt;
*Any rights by the creator are forfeited&lt;br /&gt;
|&lt;br /&gt;
*Creator retains no rights to work&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Creative Commons licenses are good way for people to clarify what should and should not be done with their work. It lets you pick and choose what rights to reserve. CC licensing must also be indicated, whereas copyright requires no notification. A CC license is a good way to distrubute the works you have created and protect the people who download it. If you did not create the work though, you of course cannot give others the right to use it as they see fit. So unless the media outlet is all the creator of all the media they distrubute, a CC won't help protect the public.&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
* [http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
With a Creative Commons license you can allow people to share in your creative work and add to or change things while at the same time reserving which rights you want without giving the public complete free reign over your work. This gives creators more options than normal copyright. This benifits the public but can also benifit the creator by giving them a way to get their work out to the public easier without giving up all their rights to their work. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A Creative Commons license does have some disadvantages though. Once you pick which license to use, you can't take it back. You can choose to stop licensing your work that way but anyone that already has a copy of your work under the old license can forever use it to the full extent that old license permits. Also the most restrictive Creative Commons licenses will still allow restrictive verbatim copying with attribution and non-commercial purposes. This is less than just copyright and may not be restrictive enough for widespread use within the business community. It seems Creative Commons licenses are targeted more towards giving the public greater use and currently don't suite everyone's needs.&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;br /&gt;
&lt;br /&gt;
There are different project groups working to promote the adoption of Creative Commons licenses internationally. They promote but also help adapt the licenses so that they fit with a given country's laws.&lt;br /&gt;
&lt;br /&gt;
An obvious ethical consideration for a international copyright system is that the creator of a work cannot protect their rights if the violator is in another country that does not wish to enforce the licenses. Also legal precedence regarding Creative Commons licenses from one country wouldn't necessarily be recognized by another country. Because the countries of the world don't have a joint judicial system there must a certain amount of trust and understanding between countries in order to protect the rights of all the creative citizens involved. For this reason I think that Creative Commons licenses are a good step in the right direction, but they aren't enough to replace international agreements regarding intellectual property.&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1688</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1688"/>
		<updated>2007-07-15T07:32:26Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* Ethical considerations of international usage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
&lt;br /&gt;
There are 4 conditions that make up the different Creative Commons licenses:&lt;br /&gt;
;Attribution: All Creative Commons licenses require attribution as specified by the original work's creator when the work is used, distributed, or modified whether in its original form or as a derivative work.&lt;br /&gt;
;Noncommercial: The original work may only be used, distributed, or modified only for noncommercial purposes whether the work is in its original form or as a derivative work.&lt;br /&gt;
;No derivative works: The original work may be used or distributed, but may not be used in any form of derivative work.&lt;br /&gt;
;Share alike: Derivative works based upon the original work may only be distributed under an identical license to the original work.&lt;br /&gt;
&lt;br /&gt;
These conditions are combined in various forms to make the six main Creative Commons licenses:&lt;br /&gt;
# Attribution (by)&lt;br /&gt;
# Attribution Non-commerical (by-nc)&lt;br /&gt;
# Attribution Non-commercial Share Alike (by-nc-sa)&lt;br /&gt;
# Attribution Non-commercial No Derivatives (by-nc-nd)&lt;br /&gt;
# Attribution No Derivatives (by-nd)&lt;br /&gt;
# Attribution Share Alike (by-sa)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|&lt;br /&gt;
*Creator of work can grant specific permissions for re-use of work&lt;br /&gt;
*Rights and conditions of others to use work are more clearly laid out&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Must be careful to choose appropriate license to retain the desired amount of control over the work&lt;br /&gt;
*Must specifically designate work as licensed under Creative Commons&lt;br /&gt;
*Users of Creative Commons-licensed works must be careful when combining works with different licenses&lt;br /&gt;
|&lt;br /&gt;
*There is a disclaimer of warranty that the individual granting the license has the right to do so&lt;br /&gt;
*Certain provisions of the license change between countries&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Copyright&lt;br /&gt;
|&lt;br /&gt;
*Automatically granted to created works, even without notice&lt;br /&gt;
*Reserves all rights for the creator&lt;br /&gt;
|&lt;br /&gt;
*Can cause confusion, since it applies without notice of copyright&lt;br /&gt;
*Those wishing to reuse copyrighted works must seek explicit permission&lt;br /&gt;
|&lt;br /&gt;
*Easy to violate copyright unintentionally, since notification of copyright is not required&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|&lt;br /&gt;
*Requires any modified and released versions to have source code available, and to stay under the GPL&lt;br /&gt;
*Maintains free software environment&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Incompatible with closed-source (commercial) development&lt;br /&gt;
*Once something is under the GPL, it essentially must stay under GPL&lt;br /&gt;
|&lt;br /&gt;
*&amp;quot;Locked-in&amp;quot; to GPL&lt;br /&gt;
*Forces ideology behind GPL on users of GPL'd content&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Lesser GPL (LGPL)&lt;br /&gt;
|&lt;br /&gt;
*Allows non-GPL software to link with LGPL'd libraries&lt;br /&gt;
*Less restrictive than GPL&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Largely discouraged by GPL proponents&lt;br /&gt;
|&lt;br /&gt;
*Allows free software to be used in proprietary projects&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|BSD-style Licenses&lt;br /&gt;
|&lt;br /&gt;
*Non-copyleft - modified versions aren't required to be free, more flexible&lt;br /&gt;
*Allows modified versions to be released under alternate licenses&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Modified versions can become incorporated into proprietary projects&lt;br /&gt;
*Original BSD license had an annoying &amp;quot;advertisement&amp;quot; clause&lt;br /&gt;
|&lt;br /&gt;
*Free code can be made proprietary&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Public Domain&lt;br /&gt;
|&lt;br /&gt;
*Work is released from copyright&lt;br /&gt;
*Work can be used by anyone else without restriction&lt;br /&gt;
|&lt;br /&gt;
*Any rights by the creator are forfeited&lt;br /&gt;
|&lt;br /&gt;
*Creator retains no rights to work&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Creative Commons licenses are good way for people to clarify what should and should not be done with their work. It lets you pick and choose what rights to reserve. CC licensing must also be indicated, whereas copyright requires no notification. A CC license is a good way to distrubute the works you have created and protect the people who download it. If you did not create the work though, you of course cannot give others the right to use it as they see fit. So unless the media outlet is all the creator of all the media they distrubute, a CC won't help protect the public.&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
* [http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
With a Creative Commons license you can allow people to share in your creative work and add to or change things while at the same time reserving which rights you want without giving the public complete free reign over your work. This gives creators more options than normal copyright. This benifits the public but can also benifit the creator by giving them a way to get their work out to the public easier without giving up all their rights to their work. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A Creative Commons license does have some disadvantages though. Once you pick which license to use, you can't take it back. You can choose to stop licensing your work that way but anyone that already has a copy of your work under the old license can forever use it to the full extent that old license permits. Also the most restrictive Creative Commons licenses will still allow restrictive verbatim copying with attribution and non-commercial purposes. This is less than just copyright and may not be restrictive enough for widespread use within the business community. It seems Creative Commons licenses are targeted more towards giving the public greater use and currently don't suite everyone's needs.&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;br /&gt;
&lt;br /&gt;
There are different project groups working to promote the adoption of Creative Commons licenses internationally. They promote but also help adapt the licenses so that they fit with a given country's laws. &lt;br /&gt;
&lt;br /&gt;
An obvious ethical consideration for a international copyright system is that the creator of a work cannot protect their rights if the violator is in another country that does not wish to enforce the licenses. Also legal precidence reguarding Creative Commons licenses from one country wouldn't necissarily be recognized by another country. Because the countries of the world don't have a joint judicial system there must a certain amount of trust and understanding between countries in order to protect the rights of all the creative citizens involved. For this reason I think that Creative Commons licenses are a good step in the right direction, but they aren't enough to replace international agreements reguarding intellectual property.&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1687</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1687"/>
		<updated>2007-07-15T07:10:18Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* Ethical considerations / Obstacles to adoption */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
&lt;br /&gt;
There are 4 conditions that make up the different Creative Commons licenses:&lt;br /&gt;
;Attribution: All Creative Commons licenses require attribution as specified by the original work's creator when the work is used, distributed, or modified whether in its original form or as a derivative work.&lt;br /&gt;
;Noncommercial: The original work may only be used, distributed, or modified only for noncommercial purposes whether the work is in its original form or as a derivative work.&lt;br /&gt;
;No derivative works: The original work may be used or distributed, but may not be used in any form of derivative work.&lt;br /&gt;
;Share alike: Derivative works based upon the original work may only be distributed under an identical license to the original work.&lt;br /&gt;
&lt;br /&gt;
These conditions are combined in various forms to make the six main Creative Commons licenses:&lt;br /&gt;
# Attribution (by)&lt;br /&gt;
# Attribution Non-commerical (by-nc)&lt;br /&gt;
# Attribution Non-commercial Share Alike (by-nc-sa)&lt;br /&gt;
# Attribution Non-commercial No Derivatives (by-nc-nd)&lt;br /&gt;
# Attribution No Derivatives (by-nd)&lt;br /&gt;
# Attribution Share Alike (by-sa)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|&lt;br /&gt;
*Creator of work can grant specific permissions for re-use of work&lt;br /&gt;
*Rights and conditions of others to use work are more clearly laid out&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Must be careful to choose appropriate license to retain the desired amount of control over the work&lt;br /&gt;
*Must specifically designate work as licensed under Creative Commons&lt;br /&gt;
*Users of Creative Commons-licensed works must be careful when combining works with different licenses&lt;br /&gt;
|&lt;br /&gt;
*There is a disclaimer of warranty that the individual granting the license has the right to do so&lt;br /&gt;
*Certain provisions of the license change between countries&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Copyright&lt;br /&gt;
|&lt;br /&gt;
*Automatically granted to created works, even without notice&lt;br /&gt;
*Reserves all rights for the creator&lt;br /&gt;
|&lt;br /&gt;
*Can cause confusion, since it applies without notice of copyright&lt;br /&gt;
*Those wishing to reuse copyrighted works must seek explicit permission&lt;br /&gt;
|&lt;br /&gt;
*Easy to violate copyright unintentionally, since notification of copyright is not required&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|&lt;br /&gt;
*Requires any modified and released versions to have source code available, and to stay under the GPL&lt;br /&gt;
*Maintains free software environment&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Incompatible with closed-source (commercial) development&lt;br /&gt;
*Once something is under the GPL, it essentially must stay under GPL&lt;br /&gt;
|&lt;br /&gt;
*&amp;quot;Locked-in&amp;quot; to GPL&lt;br /&gt;
*Forces ideology behind GPL on users of GPL'd content&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Lesser GPL (LGPL)&lt;br /&gt;
|&lt;br /&gt;
*Allows non-GPL software to link with LGPL'd libraries&lt;br /&gt;
*Less restrictive than GPL&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Largely discouraged by GPL proponents&lt;br /&gt;
|&lt;br /&gt;
*Allows free software to be used in proprietary projects&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|BSD-style Licenses&lt;br /&gt;
|&lt;br /&gt;
*Non-copyleft - modified versions aren't required to be free, more flexible&lt;br /&gt;
*Allows modified versions to be released under alternate licenses&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Modified versions can become incorporated into proprietary projects&lt;br /&gt;
*Original BSD license had an annoying &amp;quot;advertisement&amp;quot; clause&lt;br /&gt;
|&lt;br /&gt;
*Free code can be made proprietary&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Public Domain&lt;br /&gt;
|&lt;br /&gt;
*Work is released from copyright&lt;br /&gt;
*Work can be used by anyone else without restriction&lt;br /&gt;
|&lt;br /&gt;
*Any rights by the creator are forfeited&lt;br /&gt;
|&lt;br /&gt;
*Creator retains no rights to work&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Creative Commons licenses are good way for people to clarify what should and should not be done with their work. It lets you pick and choose what rights to reserve. CC licensing must also be indicated, whereas copyright requires no notification. A CC license is a good way to distrubute the works you have created and protect the people who download it. If you did not create the work though, you of course cannot give others the right to use it as they see fit. So unless the media outlet is all the creator of all the media they distrubute, a CC won't help protect the public.&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
* [http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
With a Creative Commons license you can allow people to share in your creative work and add to or change things while at the same time reserving which rights you want without giving the public complete free reign over your work. This gives creators more options than normal copyright. This benifits the public but can also benifit the creator by giving them a way to get their work out to the public easier without giving up all their rights to their work. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A Creative Commons license does have some disadvantages though. Once you pick which license to use, you can't take it back. You can choose to stop licensing your work that way but anyone that already has a copy of your work under the old license can forever use it to the full extent that old license permits. Also the most restrictive Creative Commons licenses will still allow restrictive verbatim copying with attribution and non-commercial purposes. This is less than just copyright and may not be restrictive enough for widespread use within the business community. It seems Creative Commons licenses are targeted more towards giving the public greater use and currently don't suite everyone's needs.&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;br /&gt;
&lt;br /&gt;
'''nap''': I think that CC is adapted for international use, but there are specific notes about this in the FAQ, I think. Maybe international agreements provide a basis for CC, since it is based in copyright? I'm not sure about this one...&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1686</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1686"/>
		<updated>2007-07-15T07:06:53Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* Ethical considerations / Obstacles to adoption */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
&lt;br /&gt;
There are 4 conditions that make up the different Creative Commons licenses:&lt;br /&gt;
;Attribution: All Creative Commons licenses require attribution as specified by the original work's creator when the work is used, distributed, or modified whether in its original form or as a derivative work.&lt;br /&gt;
;Noncommercial: The original work may only be used, distributed, or modified only for noncommercial purposes whether the work is in its original form or as a derivative work.&lt;br /&gt;
;No derivative works: The original work may be used or distributed, but may not be used in any form of derivative work.&lt;br /&gt;
;Share alike: Derivative works based upon the original work may only be distributed under an identical license to the original work.&lt;br /&gt;
&lt;br /&gt;
These conditions are combined in various forms to make the six main Creative Commons licenses:&lt;br /&gt;
# Attribution (by)&lt;br /&gt;
# Attribution Non-commerical (by-nc)&lt;br /&gt;
# Attribution Non-commercial Share Alike (by-nc-sa)&lt;br /&gt;
# Attribution Non-commercial No Derivatives (by-nc-nd)&lt;br /&gt;
# Attribution No Derivatives (by-nd)&lt;br /&gt;
# Attribution Share Alike (by-sa)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|&lt;br /&gt;
*Creator of work can grant specific permissions for re-use of work&lt;br /&gt;
*Rights and conditions of others to use work are more clearly laid out&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Must be careful to choose appropriate license to retain the desired amount of control over the work&lt;br /&gt;
*Must specifically designate work as licensed under Creative Commons&lt;br /&gt;
*Users of Creative Commons-licensed works must be careful when combining works with different licenses&lt;br /&gt;
|&lt;br /&gt;
*There is a disclaimer of warranty that the individual granting the license has the right to do so&lt;br /&gt;
*Certain provisions of the license change between countries&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Copyright&lt;br /&gt;
|&lt;br /&gt;
*Automatically granted to created works, even without notice&lt;br /&gt;
*Reserves all rights for the creator&lt;br /&gt;
|&lt;br /&gt;
*Can cause confusion, since it applies without notice of copyright&lt;br /&gt;
*Those wishing to reuse copyrighted works must seek explicit permission&lt;br /&gt;
|&lt;br /&gt;
*Easy to violate copyright unintentionally, since notification of copyright is not required&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|&lt;br /&gt;
*Requires any modified and released versions to have source code available, and to stay under the GPL&lt;br /&gt;
*Maintains free software environment&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Incompatible with closed-source (commercial) development&lt;br /&gt;
*Once something is under the GPL, it essentially must stay under GPL&lt;br /&gt;
|&lt;br /&gt;
*&amp;quot;Locked-in&amp;quot; to GPL&lt;br /&gt;
*Forces ideology behind GPL on users of GPL'd content&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Lesser GPL (LGPL)&lt;br /&gt;
|&lt;br /&gt;
*Allows non-GPL software to link with LGPL'd libraries&lt;br /&gt;
*Less restrictive than GPL&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Largely discouraged by GPL proponents&lt;br /&gt;
|&lt;br /&gt;
*Allows free software to be used in proprietary projects&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|BSD-style Licenses&lt;br /&gt;
|&lt;br /&gt;
*Non-copyleft - modified versions aren't required to be free, more flexible&lt;br /&gt;
*Allows modified versions to be released under alternate licenses&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Modified versions can become incorporated into proprietary projects&lt;br /&gt;
*Original BSD license had an annoying &amp;quot;advertisement&amp;quot; clause&lt;br /&gt;
|&lt;br /&gt;
*Free code can be made proprietary&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Public Domain&lt;br /&gt;
|&lt;br /&gt;
*Work is released from copyright&lt;br /&gt;
*Work can be used by anyone else without restriction&lt;br /&gt;
|&lt;br /&gt;
*Any rights by the creator are forfeited&lt;br /&gt;
|&lt;br /&gt;
*Creator retains no rights to work&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Creative Commons licenses are good way for people to clarify what should and should not be done with their work. It lets you pick and choose what rights to reserve. CC licensing must also be indicated, whereas copyright requires no notification. A CC license is a good way to distrubute the works you have created and protect the people who download it. If you did not create the work though, you of course cannot give others the right to use it as they see fit. So unless the media outlet is all the creator of all the media they distrubute, a CC won't help protect the public.&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
* [http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
With a Creative Commons license you can allow people to share in your creative work and add to or change things while at the same time reserving which rights you want without giving the public complete free reign over your work. This gives creators more options than normal copyright. This benifits the public but can also benifit the creator by giving them a way to get their work out to the public easier without giving up all their rights to their work. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A Creative Commons license does have some disadvantages though. Once you pick which license to use, you can't take it back. You can choose to stop licensing your work that way but anyone that already has a copy of your work under the old license can forever use it to the full extent that old license permits. Also the most restrictive Creative Commons licenses will still allow restrictive verbatim copying with attribution and non-commercial purposes. This is less than just copyright and may not be restrictive enough for widespread use within the business community. It seems Creative Commons licenses are targeted more towards giving the public greater use and currently don't suite everyone's needs.&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;br /&gt;
&lt;br /&gt;
'''nap''': I think that CC is adapted for international use, but there are specific notes about this in the FAQ, I think. Maybe international agreements provide a basis for CC, since it is based in copyright? I'm not sure about this one...&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1685</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1685"/>
		<updated>2007-07-15T07:06:38Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* Ethical considerations / Obstacles to adoption */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
&lt;br /&gt;
There are 4 conditions that make up the different Creative Commons licenses:&lt;br /&gt;
;Attribution: All Creative Commons licenses require attribution as specified by the original work's creator when the work is used, distributed, or modified whether in its original form or as a derivative work.&lt;br /&gt;
;Noncommercial: The original work may only be used, distributed, or modified only for noncommercial purposes whether the work is in its original form or as a derivative work.&lt;br /&gt;
;No derivative works: The original work may be used or distributed, but may not be used in any form of derivative work.&lt;br /&gt;
;Share alike: Derivative works based upon the original work may only be distributed under an identical license to the original work.&lt;br /&gt;
&lt;br /&gt;
These conditions are combined in various forms to make the six main Creative Commons licenses:&lt;br /&gt;
# Attribution (by)&lt;br /&gt;
# Attribution Non-commerical (by-nc)&lt;br /&gt;
# Attribution Non-commercial Share Alike (by-nc-sa)&lt;br /&gt;
# Attribution Non-commercial No Derivatives (by-nc-nd)&lt;br /&gt;
# Attribution No Derivatives (by-nd)&lt;br /&gt;
# Attribution Share Alike (by-sa)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|&lt;br /&gt;
*Creator of work can grant specific permissions for re-use of work&lt;br /&gt;
*Rights and conditions of others to use work are more clearly laid out&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Must be careful to choose appropriate license to retain the desired amount of control over the work&lt;br /&gt;
*Must specifically designate work as licensed under Creative Commons&lt;br /&gt;
*Users of Creative Commons-licensed works must be careful when combining works with different licenses&lt;br /&gt;
|&lt;br /&gt;
*There is a disclaimer of warranty that the individual granting the license has the right to do so&lt;br /&gt;
*Certain provisions of the license change between countries&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Copyright&lt;br /&gt;
|&lt;br /&gt;
*Automatically granted to created works, even without notice&lt;br /&gt;
*Reserves all rights for the creator&lt;br /&gt;
|&lt;br /&gt;
*Can cause confusion, since it applies without notice of copyright&lt;br /&gt;
*Those wishing to reuse copyrighted works must seek explicit permission&lt;br /&gt;
|&lt;br /&gt;
*Easy to violate copyright unintentionally, since notification of copyright is not required&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|&lt;br /&gt;
*Requires any modified and released versions to have source code available, and to stay under the GPL&lt;br /&gt;
*Maintains free software environment&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Incompatible with closed-source (commercial) development&lt;br /&gt;
*Once something is under the GPL, it essentially must stay under GPL&lt;br /&gt;
|&lt;br /&gt;
*&amp;quot;Locked-in&amp;quot; to GPL&lt;br /&gt;
*Forces ideology behind GPL on users of GPL'd content&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Lesser GPL (LGPL)&lt;br /&gt;
|&lt;br /&gt;
*Allows non-GPL software to link with LGPL'd libraries&lt;br /&gt;
*Less restrictive than GPL&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Largely discouraged by GPL proponents&lt;br /&gt;
|&lt;br /&gt;
*Allows free software to be used in proprietary projects&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|BSD-style Licenses&lt;br /&gt;
|&lt;br /&gt;
*Non-copyleft - modified versions aren't required to be free, more flexible&lt;br /&gt;
*Allows modified versions to be released under alternate licenses&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Modified versions can become incorporated into proprietary projects&lt;br /&gt;
*Original BSD license had an annoying &amp;quot;advertisement&amp;quot; clause&lt;br /&gt;
|&lt;br /&gt;
*Free code can be made proprietary&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Public Domain&lt;br /&gt;
|&lt;br /&gt;
*Work is released from copyright&lt;br /&gt;
*Work can be used by anyone else without restriction&lt;br /&gt;
|&lt;br /&gt;
*Any rights by the creator are forfeited&lt;br /&gt;
|&lt;br /&gt;
*Creator retains no rights to work&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Creative Commons licenses are good way for people to clarify what should and should not be done with their work. It lets you pick and choose what rights to reserve. CC licensing must also be indicated, whereas copyright requires no notification. A CC license is a good way to distrubute the works you have created and protect the people who download it. If you did not create the work though, you of course cannot give others the right to use it as they see fit. So unless the media outlet is all the creator of all the media they distrubute, a CC won't help protect the public.&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
* [http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
With a Creative Commons license you can allow people to share in your creative work and add to or change things while at the same time reserving which rights you want without giving the public complete free reign over your work. This gives creators more options than normal copyright. This benifits the public but can also benifit the creator by giving them a way to get their work out to the public easier without giving up all their rights to their work. &lt;br /&gt;
&lt;br /&gt;
A Creative Commons license does have some disadvantages though. Once you pick which license to use, you can't take it back. You can choose to stop licensing your work that way but anyone that already has a copy of your work under the old license can forever use it to the full extent that old license permits. Also the most restrictive Creative Commons licenses will still allow restrictive verbatim copying with attribution and non-commercial purposes. This is less than just copyright and may not be restrictive enough for widespread use within the business community. It seems Creative Commons licenses are targeted more towards giving the public greater use and currently don't suite everyone's needs.&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;br /&gt;
&lt;br /&gt;
'''nap''': I think that CC is adapted for international use, but there are specific notes about this in the FAQ, I think. Maybe international agreements provide a basis for CC, since it is based in copyright? I'm not sure about this one...&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1684</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1684"/>
		<updated>2007-07-15T06:49:29Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* Adoption of license */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
&lt;br /&gt;
There are 4 conditions that make up the different Creative Commons licenses:&lt;br /&gt;
;Attribution: All Creative Commons licenses require attribution as specified by the original work's creator when the work is used, distributed, or modified whether in its original form or as a derivative work.&lt;br /&gt;
;Noncommercial: The original work may only be used, distributed, or modified only for noncommercial purposes whether the work is in its original form or as a derivative work.&lt;br /&gt;
;No derivative works: The original work may be used or distributed, but may not be used in any form of derivative work.&lt;br /&gt;
;Share alike: Derivative works based upon the original work may only be distributed under an identical license to the original work.&lt;br /&gt;
&lt;br /&gt;
These conditions are combined in various forms to make the six main Creative Commons licenses:&lt;br /&gt;
# Attribution (by)&lt;br /&gt;
# Attribution Non-commerical (by-nc)&lt;br /&gt;
# Attribution Non-commercial Share Alike (by-nc-sa)&lt;br /&gt;
# Attribution Non-commercial No Derivatives (by-nc-nd)&lt;br /&gt;
# Attribution No Derivatives (by-nd)&lt;br /&gt;
# Attribution Share Alike (by-sa)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|&lt;br /&gt;
*Creator of work can grant specific permissions for re-use of work&lt;br /&gt;
*Rights and conditions of others to use work are more clearly laid out&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Must be careful to choose appropriate license to retain the desired amount of control over the work&lt;br /&gt;
*Must specifically designate work as licensed under Creative Commons&lt;br /&gt;
*Users of Creative Commons-licensed works must be careful when combining works with different licenses&lt;br /&gt;
|&lt;br /&gt;
*There is a disclaimer of warranty that the individual granting the license has the right to do so&lt;br /&gt;
*Certain provisions of the license change between countries&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Copyright&lt;br /&gt;
|&lt;br /&gt;
*Automatically granted to created works, even without notice&lt;br /&gt;
*Reserves all rights for the creator&lt;br /&gt;
|&lt;br /&gt;
*Can cause confusion, since it applies without notice of copyright&lt;br /&gt;
*Those wishing to reuse copyrighted works must seek explicit permission&lt;br /&gt;
|&lt;br /&gt;
*Easy to violate copyright unintentionally, since notification of copyright is not required&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|&lt;br /&gt;
*Requires any modified and released versions to have source code available, and to stay under the GPL&lt;br /&gt;
*Maintains free software environment&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Incompatible with closed-source (commercial) development&lt;br /&gt;
*Once something is under the GPL, it essentially must stay under GPL&lt;br /&gt;
|&lt;br /&gt;
*&amp;quot;Locked-in&amp;quot; to GPL&lt;br /&gt;
*Forces ideology behind GPL on users of GPL'd content&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Lesser GPL (LGPL)&lt;br /&gt;
|&lt;br /&gt;
*Allows non-GPL software to link with LGPL'd libraries&lt;br /&gt;
*Less restrictive than GPL&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Largely discouraged by GPL proponents&lt;br /&gt;
|&lt;br /&gt;
*Allows free software to be used in proprietary projects&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|BSD-style Licenses&lt;br /&gt;
|&lt;br /&gt;
*Non-copyleft - modified versions aren't required to be free, more flexible&lt;br /&gt;
*Allows modified versions to be released under alternate licenses&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Modified versions can become incorporated into proprietary projects&lt;br /&gt;
*Original BSD license had an annoying &amp;quot;advertisement&amp;quot; clause&lt;br /&gt;
|&lt;br /&gt;
*Free code can be made proprietary&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Public Domain&lt;br /&gt;
|&lt;br /&gt;
*Work is released from copyright&lt;br /&gt;
*Work can be used by anyone else without restriction&lt;br /&gt;
|&lt;br /&gt;
*Any rights by the creator are forfeited&lt;br /&gt;
|&lt;br /&gt;
*Creator retains no rights to work&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Creative Commons licenses are good way for people to clarify what should and should not be done with their work. It lets you pick and choose what rights to reserve. CC licensing must also be indicated, whereas copyright requires no notification. A CC license is a good way to distrubute the works you have created and protect the people who download it. If you did not create the work though, you of course cannot give others the right to use it as they see fit. So unless the media outlet is all the creator of all the media they distrubute, a CC won't help protect the public.&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
* [http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
'''nap''': All CC licenses will still allow at the most restrictive verbatim copying with attribution and non-commercial purposes, which is more than just copyright, so there might be resistance to this.&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;br /&gt;
&lt;br /&gt;
'''nap''': I think that CC is adapted for international use, but there are specific notes about this in the FAQ, I think. Maybe international agreements provide a basis for CC, since it is based in copyright? I'm not sure about this one...&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1683</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1683"/>
		<updated>2007-07-15T06:49:01Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* Adoption of license */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
&lt;br /&gt;
There are 4 conditions that make up the different Creative Commons licenses:&lt;br /&gt;
;Attribution: All Creative Commons licenses require attribution as specified by the original work's creator when the work is used, distributed, or modified whether in its original form or as a derivative work.&lt;br /&gt;
;Noncommercial: The original work may only be used, distributed, or modified only for noncommercial purposes whether the work is in its original form or as a derivative work.&lt;br /&gt;
;No derivative works: The original work may be used or distributed, but may not be used in any form of derivative work.&lt;br /&gt;
;Share alike: Derivative works based upon the original work may only be distributed under an identical license to the original work.&lt;br /&gt;
&lt;br /&gt;
These conditions are combined in various forms to make the six main Creative Commons licenses:&lt;br /&gt;
# Attribution (by)&lt;br /&gt;
# Attribution Non-commerical (by-nc)&lt;br /&gt;
# Attribution Non-commercial Share Alike (by-nc-sa)&lt;br /&gt;
# Attribution Non-commercial No Derivatives (by-nc-nd)&lt;br /&gt;
# Attribution No Derivatives (by-nd)&lt;br /&gt;
# Attribution Share Alike (by-sa)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|&lt;br /&gt;
*Creator of work can grant specific permissions for re-use of work&lt;br /&gt;
*Rights and conditions of others to use work are more clearly laid out&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Must be careful to choose appropriate license to retain the desired amount of control over the work&lt;br /&gt;
*Must specifically designate work as licensed under Creative Commons&lt;br /&gt;
*Users of Creative Commons-licensed works must be careful when combining works with different licenses&lt;br /&gt;
|&lt;br /&gt;
*There is a disclaimer of warranty that the individual granting the license has the right to do so&lt;br /&gt;
*Certain provisions of the license change between countries&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Copyright&lt;br /&gt;
|&lt;br /&gt;
*Automatically granted to created works, even without notice&lt;br /&gt;
*Reserves all rights for the creator&lt;br /&gt;
|&lt;br /&gt;
*Can cause confusion, since it applies without notice of copyright&lt;br /&gt;
*Those wishing to reuse copyrighted works must seek explicit permission&lt;br /&gt;
|&lt;br /&gt;
*Easy to violate copyright unintentionally, since notification of copyright is not required&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|&lt;br /&gt;
*Requires any modified and released versions to have source code available, and to stay under the GPL&lt;br /&gt;
*Maintains free software environment&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Incompatible with closed-source (commercial) development&lt;br /&gt;
*Once something is under the GPL, it essentially must stay under GPL&lt;br /&gt;
|&lt;br /&gt;
*&amp;quot;Locked-in&amp;quot; to GPL&lt;br /&gt;
*Forces ideology behind GPL on users of GPL'd content&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Lesser GPL (LGPL)&lt;br /&gt;
|&lt;br /&gt;
*Allows non-GPL software to link with LGPL'd libraries&lt;br /&gt;
*Less restrictive than GPL&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Largely discouraged by GPL proponents&lt;br /&gt;
|&lt;br /&gt;
*Allows free software to be used in proprietary projects&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|BSD-style Licenses&lt;br /&gt;
|&lt;br /&gt;
*Non-copyleft - modified versions aren't required to be free, more flexible&lt;br /&gt;
*Allows modified versions to be released under alternate licenses&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Modified versions can become incorporated into proprietary projects&lt;br /&gt;
*Original BSD license had an annoying &amp;quot;advertisement&amp;quot; clause&lt;br /&gt;
|&lt;br /&gt;
*Free code can be made proprietary&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Public Domain&lt;br /&gt;
|&lt;br /&gt;
*Work is released from copyright&lt;br /&gt;
*Work can be used by anyone else without restriction&lt;br /&gt;
|&lt;br /&gt;
*Any rights by the creator are forfeited&lt;br /&gt;
|&lt;br /&gt;
*Creator retains no rights to work&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Creative Commons licenses are good way for people to clarify what should and should not be done with their work. It lets you pick and choose what rights to reserve. CC licensing must also be indicated, whereas copyright requires no notification. A CC license is a good way to distrubute the works you have created and protect the people who download it. If you did not create the work though, you of course cannot give others the right to use it as they see fit. So unless the media outlet is all the creator of all the media they distrubute, a CC won't help protect the public.&lt;br /&gt;
&lt;br /&gt;
'''Links''' (if applicable)&lt;br /&gt;
* [http://google.com google]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
'''nap''': All CC licenses will still allow at the most restrictive verbatim copying with attribution and non-commercial purposes, which is more than just copyright, so there might be resistance to this.&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;br /&gt;
&lt;br /&gt;
'''nap''': I think that CC is adapted for international use, but there are specific notes about this in the FAQ, I think. Maybe international agreements provide a basis for CC, since it is based in copyright? I'm not sure about this one...&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1682</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1682"/>
		<updated>2007-07-15T06:41:25Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* Adoption of license */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
&lt;br /&gt;
There are 4 conditions that make up the different Creative Commons licenses:&lt;br /&gt;
;Attribution: All Creative Commons licenses require attribution as specified by the original work's creator when the work is used, distributed, or modified whether in its original form or as a derivative work.&lt;br /&gt;
;Noncommercial: The original work may only be used, distributed, or modified only for noncommercial purposes whether the work is in its original form or as a derivative work.&lt;br /&gt;
;No derivative works: The original work may be used or distributed, but may not be used in any form of derivative work.&lt;br /&gt;
;Share alike: Derivative works based upon the original work may only be distributed under an identical license to the original work.&lt;br /&gt;
&lt;br /&gt;
These conditions are combined in various forms to make the six main Creative Commons licenses:&lt;br /&gt;
# Attribution (by)&lt;br /&gt;
# Attribution Non-commerical (by-nc)&lt;br /&gt;
# Attribution Non-commercial Share Alike (by-nc-sa)&lt;br /&gt;
# Attribution Non-commercial No Derivatives (by-nc-nd)&lt;br /&gt;
# Attribution No Derivatives (by-nd)&lt;br /&gt;
# Attribution Share Alike (by-sa)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|&lt;br /&gt;
*Creator of work can grant specific permissions for re-use of work&lt;br /&gt;
*Rights and conditions of others to use work are more clearly laid out&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Must be careful to choose appropriate license to retain the desired amount of control over the work&lt;br /&gt;
*Must specifically designate work as licensed under Creative Commons&lt;br /&gt;
*Users of Creative Commons-licensed works must be careful when combining works with different licenses&lt;br /&gt;
|&lt;br /&gt;
*There is a disclaimer of warranty that the individual granting the license has the right to do so&lt;br /&gt;
*Certain provisions of the license change between countries&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Copyright&lt;br /&gt;
|&lt;br /&gt;
*Automatically granted to created works, even without notice&lt;br /&gt;
*Reserves all rights for the creator&lt;br /&gt;
|&lt;br /&gt;
*Can cause confusion, since it applies without notice of copyright&lt;br /&gt;
*Those wishing to reuse copyrighted works must seek explicit permission&lt;br /&gt;
|&lt;br /&gt;
*Easy to violate copyright unintentionally, since notification of copyright is not required&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|&lt;br /&gt;
*Requires any modified and released versions to have source code available, and to stay under the GPL&lt;br /&gt;
*Maintains free software environment&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Incompatible with closed-source (commercial) development&lt;br /&gt;
*Once something is under the GPL, it essentially must stay under GPL&lt;br /&gt;
|&lt;br /&gt;
*&amp;quot;Locked-in&amp;quot; to GPL&lt;br /&gt;
*Forces ideology behind GPL on users of GPL'd content&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Lesser GPL (LGPL)&lt;br /&gt;
|&lt;br /&gt;
*Allows non-GPL software to link with LGPL'd libraries&lt;br /&gt;
*Less restrictive than GPL&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Largely discouraged by GPL proponents&lt;br /&gt;
|&lt;br /&gt;
*Allows free software to be used in proprietary projects&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|BSD-style Licenses&lt;br /&gt;
|&lt;br /&gt;
*Non-copyleft - modified versions aren't required to be free, more flexible&lt;br /&gt;
*Allows modified versions to be released under alternate licenses&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Modified versions can become incorporated into proprietary projects&lt;br /&gt;
*Original BSD license had an annoying &amp;quot;advertisement&amp;quot; clause&lt;br /&gt;
|&lt;br /&gt;
*Free code can be made proprietary&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Public Domain&lt;br /&gt;
|&lt;br /&gt;
*Work is released from copyright&lt;br /&gt;
*Work can be used by anyone else without restriction&lt;br /&gt;
|&lt;br /&gt;
*Any rights by the creator are forfeited&lt;br /&gt;
|&lt;br /&gt;
*Creator retains no rights to work&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Creative Commons licenses are good way for people to clarify what should and should not be done with their work. It lets you pick and choose what rights to reserve. CC licensing must also be indicated, whereas copyright requires no notification. &lt;br /&gt;
&lt;br /&gt;
'''Links''' (if applicable)&lt;br /&gt;
* [http://google.com google]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
'''nap''': All CC licenses will still allow at the most restrictive verbatim copying with attribution and non-commercial purposes, which is more than just copyright, so there might be resistance to this.&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;br /&gt;
&lt;br /&gt;
'''nap''': I think that CC is adapted for international use, but there are specific notes about this in the FAQ, I think. Maybe international agreements provide a basis for CC, since it is based in copyright? I'm not sure about this one...&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1681</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1681"/>
		<updated>2007-07-15T06:26:26Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* Adoption of license */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
&lt;br /&gt;
There are 4 conditions that make up the different Creative Commons licenses:&lt;br /&gt;
;Attribution: All Creative Commons licenses require attribution as specified by the original work's creator when the work is used, distributed, or modified whether in its original form or as a derivative work.&lt;br /&gt;
;Noncommercial: The original work may only be used, distributed, or modified only for noncommercial purposes whether the work is in its original form or as a derivative work.&lt;br /&gt;
;No derivative works: The original work may be used or distributed, but may not be used in any form of derivative work.&lt;br /&gt;
;Share alike: Derivative works based upon the original work may only be distributed under an identical license to the original work.&lt;br /&gt;
&lt;br /&gt;
These conditions are combined in various forms to make the six main Creative Commons licenses:&lt;br /&gt;
# Attribution (by)&lt;br /&gt;
# Attribution Non-commerical (by-nc)&lt;br /&gt;
# Attribution Non-commercial Share Alike (by-nc-sa)&lt;br /&gt;
# Attribution Non-commercial No Derivatives (by-nc-nd)&lt;br /&gt;
# Attribution No Derivatives (by-nd)&lt;br /&gt;
# Attribution Share Alike (by-sa)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|&lt;br /&gt;
*Creator of work can grant specific permissions for re-use of work&lt;br /&gt;
*Rights and conditions of others to use work are more clearly laid out&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Must be careful to choose appropriate license to retain the desired amount of control over the work&lt;br /&gt;
*Must specifically designate work as licensed under Creative Commons&lt;br /&gt;
*Users of Creative Commons-licensed works must be careful when combining works with different licenses&lt;br /&gt;
|&lt;br /&gt;
*There is a disclaimer of warranty that the individual granting the license has the right to do so&lt;br /&gt;
*Certain provisions of the license change between countries&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Copyright&lt;br /&gt;
|&lt;br /&gt;
*Automatically granted to created works, even without notice&lt;br /&gt;
*Reserves all rights for the creator&lt;br /&gt;
|&lt;br /&gt;
*Can cause confusion, since it applies without notice of copyright&lt;br /&gt;
*Those wishing to reuse copyrighted works must seek explicit permission&lt;br /&gt;
|&lt;br /&gt;
*Easy to violate copyright unintentionally, since notification of copyright is not required&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|&lt;br /&gt;
*Requires any modified and released versions to have source code available, and to stay under the GPL&lt;br /&gt;
*Maintains free software environment&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Incompatible with closed-source (commercial) development&lt;br /&gt;
*Once something is under the GPL, it essentially must stay under GPL&lt;br /&gt;
|&lt;br /&gt;
*&amp;quot;Locked-in&amp;quot; to GPL&lt;br /&gt;
*Forces ideology behind GPL on users of GPL'd content&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Lesser GPL (LGPL)&lt;br /&gt;
|&lt;br /&gt;
*Allows non-GPL software to link with LGPL'd libraries&lt;br /&gt;
*Less restrictive than GPL&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Largely discouraged by GPL proponents&lt;br /&gt;
|&lt;br /&gt;
*Allows free software to be used in proprietary projects&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|BSD-style Licenses&lt;br /&gt;
|&lt;br /&gt;
*Non-copyleft - modified versions aren't required to be free, more flexible&lt;br /&gt;
*Allows modified versions to be released under alternate licenses&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Modified versions can become incorporated into proprietary projects&lt;br /&gt;
*Original BSD license had an annoying &amp;quot;advertisement&amp;quot; clause&lt;br /&gt;
|&lt;br /&gt;
*Free code can be made proprietary&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Public Domain&lt;br /&gt;
|&lt;br /&gt;
*Work is released from copyright&lt;br /&gt;
*Work can be used by anyone else without restriction&lt;br /&gt;
|&lt;br /&gt;
*Any rights by the creator are forfeited&lt;br /&gt;
|&lt;br /&gt;
*Creator retains no rights to work&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Creative Commons licenses are good way for people to clarify what should and should not be done with their work. A Creative Commons license lets you pick and choose what rights to reserve. CC licensing must also be indicated, whereas copyright requires no notification.&lt;br /&gt;
&lt;br /&gt;
'''Links''' (if applicable)&lt;br /&gt;
* [http://google.com google]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
'''nap''': All CC licenses will still allow at the most restrictive verbatim copying with attribution and non-commercial purposes, which is more than just copyright, so there might be resistance to this.&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;br /&gt;
&lt;br /&gt;
'''nap''': I think that CC is adapted for international use, but there are specific notes about this in the FAQ, I think. Maybe international agreements provide a basis for CC, since it is based in copyright? I'm not sure about this one...&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1680</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1680"/>
		<updated>2007-07-15T06:12:34Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* Provisions of Creative Commons License */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
&lt;br /&gt;
There are 4 conditions that make up the different Creative Commons licenses:&lt;br /&gt;
;Attribution: All Creative Commons licenses require attribution as specified by the original work's creator when the work is used, distributed, or modified whether in its original form or as a derivative work.&lt;br /&gt;
;Noncommercial: The original work may only be used, distributed, or modified only for noncommercial purposes whether the work is in its original form or as a derivative work.&lt;br /&gt;
;No derivative works: The original work may be used or distributed, but may not be used in any form of derivative work.&lt;br /&gt;
;Share alike: Derivative works based upon the original work may only be distributed under an identical license to the original work.&lt;br /&gt;
&lt;br /&gt;
These conditions are combined in various forms to make the six main Creative Commons licenses:&lt;br /&gt;
# Attribution (by)&lt;br /&gt;
# Attribution Non-commerical (by-nc)&lt;br /&gt;
# Attribution Non-commercial Share Alike (by-nc-sa)&lt;br /&gt;
# Attribution Non-commercial No Derivatives (by-nc-nd)&lt;br /&gt;
# Attribution No Derivatives (by-nd)&lt;br /&gt;
# Attribution Share Alike (by-sa)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|&lt;br /&gt;
*Creator of work can grant specific permissions for re-use of work&lt;br /&gt;
*Rights and conditions of others to use work are more clearly laid out&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Must be careful to choose appropriate license to retain the desired amount of control over the work&lt;br /&gt;
*Must specifically designate work as licensed under Creative Commons&lt;br /&gt;
*Users of Creative Commons-licensed works must be careful when combining works with different licenses&lt;br /&gt;
|&lt;br /&gt;
*There is a disclaimer of warranty that the individual granting the license has the right to do so&lt;br /&gt;
*Certain provisions of the license change between countries&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Copyright&lt;br /&gt;
|&lt;br /&gt;
*Automatically granted to created works, even without notice&lt;br /&gt;
*Reserves all rights for the creator&lt;br /&gt;
|&lt;br /&gt;
*Can cause confusion, since it applies without notice of copyright&lt;br /&gt;
*Those wishing to reuse copyrighted works must seek explicit permission&lt;br /&gt;
|&lt;br /&gt;
*Easy to violate copyright unintentionally, since notification of copyright is not required&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|&lt;br /&gt;
*Requires any modified and released versions to have source code available, and to stay under the GPL&lt;br /&gt;
*Maintains free software environment&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Incompatible with closed-source (commercial) development&lt;br /&gt;
*Once something is under the GPL, it essentially must stay under GPL&lt;br /&gt;
|&lt;br /&gt;
*&amp;quot;Locked-in&amp;quot; to GPL&lt;br /&gt;
*Forces ideology behind GPL on users of GPL'd content&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Lesser GPL (LGPL)&lt;br /&gt;
|&lt;br /&gt;
*Allows non-GPL software to link with LGPL'd libraries&lt;br /&gt;
*Less restrictive than GPL&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Largely discouraged by GPL proponents&lt;br /&gt;
|&lt;br /&gt;
*Allows free software to be used in proprietary projects&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|BSD-style Licenses&lt;br /&gt;
|&lt;br /&gt;
*Non-copyleft - modified versions aren't required to be free, more flexible&lt;br /&gt;
*Allows modified versions to be released under alternate licenses&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Modified versions can become incorporated into proprietary projects&lt;br /&gt;
*Original BSD license had an annoying &amp;quot;advertisement&amp;quot; clause&lt;br /&gt;
|&lt;br /&gt;
*Free code can be made proprietary&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Public Domain&lt;br /&gt;
|&lt;br /&gt;
*Work is released from copyright&lt;br /&gt;
*Work can be used by anyone else without restriction&lt;br /&gt;
|&lt;br /&gt;
*Any rights by the creator are forfeited&lt;br /&gt;
|&lt;br /&gt;
*Creator retains no rights to work&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
'''nap''': I think there should be an emphasis on how CC licenses clarify what people can do with pages, and that CC licensing must be indicated, whereas copyright requires no notification&lt;br /&gt;
&lt;br /&gt;
Yes the groups should adopt it blah blah blah.&lt;br /&gt;
&lt;br /&gt;
Some more stuff.&lt;br /&gt;
&lt;br /&gt;
Blah blah blah.&lt;br /&gt;
&lt;br /&gt;
'''Links''' (if applicable)&lt;br /&gt;
* [http://google.com google]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
'''nap''': All CC licenses will still allow at the most restrictive verbatim copying with attribution and non-commercial purposes, which is more than just copyright, so there might be resistance to this.&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;br /&gt;
&lt;br /&gt;
'''nap''': I think that CC is adapted for international use, but there are specific notes about this in the FAQ, I think. Maybe international agreements provide a basis for CC, since it is based in copyright? I'm not sure about this one...&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1679</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1679"/>
		<updated>2007-07-15T06:12:22Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: /* Provisions of Creative Commons License */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
&lt;br /&gt;
There are 4 conditions that make up the different Creative Commons licenses:&lt;br /&gt;
;Attribution: All Creative Commons licenses require attribution as specified by the original work's creator when the work is used, distributed, or modified whether in its original form or as a derivative work.&lt;br /&gt;
;Noncommercial: The origginal work may only be used, distributed, or modified only for noncommercial purposes whether the work is in its original form or as a derivative work.&lt;br /&gt;
;No derivative works: The original work may be used or distributed, but may not be used in any form of derivative work.&lt;br /&gt;
;Share alike: Derivative works based upon the original work may only be distributed under an identical license to the original work.&lt;br /&gt;
&lt;br /&gt;
These conditions are combined in various forms to make the six main Creative Commons licenses:&lt;br /&gt;
# Attribution (by)&lt;br /&gt;
# Attribution Non-commerical (by-nc)&lt;br /&gt;
# Attribution Non-commercial Share Alike (by-nc-sa)&lt;br /&gt;
# Attribution Non-commercial No Derivatives (by-nc-nd)&lt;br /&gt;
# Attribution No Derivatives (by-nd)&lt;br /&gt;
# Attribution Share Alike (by-sa)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|&lt;br /&gt;
*Creator of work can grant specific permissions for re-use of work&lt;br /&gt;
*Rights and conditions of others to use work are more clearly laid out&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Must be careful to choose appropriate license to retain the desired amount of control over the work&lt;br /&gt;
*Must specifically designate work as licensed under Creative Commons&lt;br /&gt;
*Users of Creative Commons-licensed works must be careful when combining works with different licenses&lt;br /&gt;
|&lt;br /&gt;
*There is a disclaimer of warranty that the individual granting the license has the right to do so&lt;br /&gt;
*Certain provisions of the license change between countries&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Copyright&lt;br /&gt;
|&lt;br /&gt;
*Automatically granted to created works, even without notice&lt;br /&gt;
*Reserves all rights for the creator&lt;br /&gt;
|&lt;br /&gt;
*Can cause confusion, since it applies without notice of copyright&lt;br /&gt;
*Those wishing to reuse copyrighted works must seek explicit permission&lt;br /&gt;
|&lt;br /&gt;
*Easy to violate copyright unintentionally, since notification of copyright is not required&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|&lt;br /&gt;
*Requires any modified and released versions to have source code available, and to stay under the GPL&lt;br /&gt;
*Maintains free software environment&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Incompatible with closed-source (commercial) development&lt;br /&gt;
*Once something is under the GPL, it essentially must stay under GPL&lt;br /&gt;
|&lt;br /&gt;
*&amp;quot;Locked-in&amp;quot; to GPL&lt;br /&gt;
*Forces ideology behind GPL on users of GPL'd content&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Lesser GPL (LGPL)&lt;br /&gt;
|&lt;br /&gt;
*Allows non-GPL software to link with LGPL'd libraries&lt;br /&gt;
*Less restrictive than GPL&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Largely discouraged by GPL proponents&lt;br /&gt;
|&lt;br /&gt;
*Allows free software to be used in proprietary projects&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|BSD-style Licenses&lt;br /&gt;
|&lt;br /&gt;
*Non-copyleft - modified versions aren't required to be free, more flexible&lt;br /&gt;
*Allows modified versions to be released under alternate licenses&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Modified versions can become incorporated into proprietary projects&lt;br /&gt;
*Original BSD license had an annoying &amp;quot;advertisement&amp;quot; clause&lt;br /&gt;
|&lt;br /&gt;
*Free code can be made proprietary&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Public Domain&lt;br /&gt;
|&lt;br /&gt;
*Work is released from copyright&lt;br /&gt;
*Work can be used by anyone else without restriction&lt;br /&gt;
|&lt;br /&gt;
*Any rights by the creator are forfeited&lt;br /&gt;
|&lt;br /&gt;
*Creator retains no rights to work&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
'''nap''': I think there should be an emphasis on how CC licenses clarify what people can do with pages, and that CC licensing must be indicated, whereas copyright requires no notification&lt;br /&gt;
&lt;br /&gt;
Yes the groups should adopt it blah blah blah.&lt;br /&gt;
&lt;br /&gt;
Some more stuff.&lt;br /&gt;
&lt;br /&gt;
Blah blah blah.&lt;br /&gt;
&lt;br /&gt;
'''Links''' (if applicable)&lt;br /&gt;
* [http://google.com google]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
'''nap''': All CC licenses will still allow at the most restrictive verbatim copying with attribution and non-commercial purposes, which is more than just copyright, so there might be resistance to this.&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;br /&gt;
&lt;br /&gt;
'''nap''': I think that CC is adapted for international use, but there are specific notes about this in the FAQ, I think. Maybe international agreements provide a basis for CC, since it is based in copyright? I'm not sure about this one...&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_3&amp;diff=1488</id>
		<title>CSC 379:Week 1, Group 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_3&amp;diff=1488"/>
		<updated>2007-07-07T13:28:17Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Spam-Blocking Techniques ==&lt;br /&gt;
&amp;lt;B&amp;gt;Domain Blocking&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A spam-blocking technique which consists of redirecting to &amp;quot;junk&amp;quot; email boxes or filtering entirely all emails from specific web domains which have been blacklisted for spamming in the past.&amp;lt;/I&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Domain-level blocking is an easy and cost-effective way to curtail large numbers of email addresses from which spam is sent.  The blocking of a single domain can block an infinite number of possible addresses in that domain.&lt;br /&gt;
**Blacklists used for domain-level blocking may be shared among numerous email providers, thus protecting subscribers to one service from spam sent to subscribers of any collaborating service.&lt;br /&gt;
**As there is typically a fee associated with acquiring a domain, spammers using blocked domains must pay to purchase a new domain if they are blacklisted.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Though purchasing domains is associated with a cost, it is typically a marginal expense and well within the budget of major spammers worldwide.  Thus, blocking a domain does little to prevent a spammer from spamming from a different domain.&lt;br /&gt;
**Though spam may originate from one address in a domain, blocking the entire domain may result in the blacklisting of multiple addresses of individuals or corporations which have not engaged in spam, and therefore should not have the receipt of their mail blocked.&lt;br /&gt;
**When a web domain previously blacklisted changes ownership, the new owners may remain blacklisted due to the actions of the previous owners, and at no fault of their own.&lt;br /&gt;
**Much spam is sent through &amp;quot;spoofed&amp;quot; email addresses in which the sending domain is misrepresented.  Blocking such a domain may prevent the receipt of email from a domain which is not associated with spam.&lt;br /&gt;
**Spam can be sent from &amp;quot;zombie&amp;quot; machines infected by malware which sends spam, but owned by individuals unaware that their machines are engaging in spamming.  Blocking the domains of these machines would block the receipt of mail from innocent users.&lt;br /&gt;
**Spam, especially spam from &amp;quot;zombie&amp;quot; machines, can come from typically reputable domains with thousands or millions of users.  Blocking such domains may degrade the quality of email service provided to a service's users to an unacceptable level.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt; &amp;lt;BR&amp;gt;&lt;br /&gt;
With so many ways to accidentally block non-spamming email addresses, the ethics of domain-level blocking are questionable at best.  The goal of blocking spam is to make email more productive by eliminating messages which would clearly be considered &amp;quot;junk&amp;quot; by the vast majority of users.  Taking a serious chance on intercepting email from well-intentioned addresses, therefore, runs counter to the goal of making the communications more productive.  Perhaps with a feature to unblock specific addresses from a domain and to receive all messages from a &amp;quot;junk&amp;quot; mailbox, this strategy would be more acceptable.  In its most basic form, however, the high probability of blocking non-spamming users challenges this method's claim to validity.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*[http://www.joewein.de/sw/spam-bl-e.htm List of Blacklisted Domains]&lt;br /&gt;
*[http://www.blacklistedip.com/ IP Blacklist Monitoring Service]&lt;br /&gt;
*[http://ezinearticles.com/?Blocking-Domain-Spam-Senders&amp;amp;id=374858 Article on Spam which Includes Domain Blocking]&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Prior Approval&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A spam-blocking technique in which a sender must request the permission of either a user or an email provider before mail can be received by that user or a client of that provider.  This generally takes one of two forms, either the use of a CAPTCHA which a sender must pass in order for an email to be delivered, or a whitelist, controlled by a recipient, which explicitly states the only addresses from which email is received.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;CAPTCHA Approach&amp;lt;/I&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Completely eliminates the ability of computer controlled spamming &amp;quot;bots&amp;quot; to send mail to an address.&lt;br /&gt;
**Allows all mail from human users who can and will evaluate the CAPTCHA, thereby avoiding forcefully blocking well-intentioned human-sent mail.&lt;br /&gt;
**Discourages spam sent from human sources to many addresses, as such sending would involved the evaluation of numerous CAPTCHAs&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**For the same reason that this method discourages spam sent from humans to many addresses, it also discourages worthwhile messages sent to many addresses.&lt;br /&gt;
**Eliminates or severely hampers the user's ability to receive solicited automated emails.&lt;br /&gt;
**Does not strictly eliminate spam from human sources.&lt;br /&gt;
**Prevents the receipt of mail from the young, the old, the disabled, or others who may be incapable of evaluating the CAPTCHA&lt;br /&gt;
**Depending on the implementation of the system, a sender may not expect to be required to complete a CAPTCHA confirmation, and may assume that his or her message has been sent when it has not.&lt;br /&gt;
**Rather than eliminating the burden of wasted time and stress imposed by spam, this approach merely shifts it from the receiver to the sender, and imposes it for all emails rather than just spam.&amp;lt;BR&amp;gt;&lt;br /&gt;
**Advancing technology makes designing CAPTCHAs which are one step ahead of computer readability increasingly difficult with time.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
At face value, the CAPTCHA Prior Approval method for controlling spam seems inherently more ethical than the domain blocking approach.  However, this approach, too, has the potential to block solicited emails, both from automated services and from those without the ability, knowledge, expectation, or patience to fill out CAPTCHA forms.   It could therefore be argued that this approach unfairly targets and limits the ability of various demographic groups, mentioned above, to send email.  However, the biggest ethical challenge to the CAPTCHA approach is to ask what, exactly, it does to eliminate the burdens of spam.  After all, the act of eliminating spam is hardly an end in and of itself.  The point of all spam-controlling technologies is to save time, stress, and annoyance for the users of email.  It could be legitimately argued that this approach, while it does cut down on the number of spam messages received by an address, itself creates the same sort of burdens which spam imposes, and thereby does little or nothing to improve the usability of email.  The burden of one spam message is merely the time and effort required to read a subject line, identify a message as spam, and click the &amp;quot;delete&amp;quot; button.  The CAPTCHA approach eliminates automated spam, and should be lauded for that fact. However, it isn't too far-fetched to say that more time and effort is required to evaluate and answer a CAPTCHA, sometimes multiple times, depending on a user's skill or experience with the tests, than would be required to delete, en-masse, the spam which would be received if this technique were not used at all.  In essence, then, this approach merely shifts the burden of wasted time from sender to recipient, and to force such a waste of time on someone who may be busy, who may be sending an important email, is arguably just as unethical as forcing a recipient to delete messages at a time of his or her own choosing.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;The Whitelist Approach&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Allows a user complete and total control over from whom the user wishes to receive email.&lt;br /&gt;
**Completely blocks all unwanted mail from addresses which are not pre-approved.&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Fails to block any unsolicited or unwanted messages from pre-approved addresses.&lt;br /&gt;
**Blocks all email from addresses not pre-approved, regardless of content, sender, situation, or potential benefit to the recipient.&lt;br /&gt;
**Eliminates the user's ability to receive desired or solicited email from unknown addresses.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Certainly, it would be difficult to defend the ethical nature of forcing users of an email service to employ a whitelist of approved addresses.  Whether for business or personal use, the importance of receiving mail from unknown addresses - friends with new or changed email addresses, business associates, new contacts, new clients, individuals who discovered a business via the web - is undeniable in daily life.  This approach may eliminate nearly all spam messages, with the exception of spam from individuals the recipient knows, but in the process it impacts the usability of email overall in a very severe, very negative fashion.  For many purposes, if an email address cannot receive mail from unknown addresses, it is entirely useless.  This approach essentially elevates the errors of the domain blocking approach to an entirely new level of severity.  While it may be valuable for applications such as parental controls and monitoring of children on the Internet, this approach is essentially useless for the purpose of blocking spam alone.  To force it on a user is to offer a substandard email service, which may be unethical and is certainly undesirable.  That said, however, there seems to be nothing wrong with &amp;lt;I&amp;gt;allowing&amp;lt;/I&amp;gt; users to choose a whitelist option for controlling email, should they so desire.  For a particular email address with specific uses and only a few potential senders, or for an individual who does not wish to be bothered by any unsolicited email whatsoever and who doesn't mind the hassle of learning of new individuals' email addresses by another means, this is an entirely viable option.  It is hardly unethical, of course, for a user to choose to seclude themselves from all but a handful of email addresses voluntarily.&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Note that a combination of the above two approaches eliminates many of the problems posed by each.  The use of a CAPTCHA authentication system, along with a whitelist of addresses for which the CAPTCHA is bypassed, is a particularly good solution relative to the others discussed here.  In such a scenario, unknown email may be received, but spam is effectively blocked or made time-prohibitive.  Many of the problems with the CAPTCHA scheme are addressed, as a CAPTCHA only needs to be completed once, after which an address can be added to a user's whitelist, and unrestricted communication may continue.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.captcha.net/ The CAPTCHA Project]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.earthlink.net/software/free/spamblocker/faq/ Earthlink SpamBlocker FAQ - CAPTCHA/Whitelist Approach]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.netmanners.com/email-whitelist-etiquette.html Article Explaining and Instructing in the Use of Whitelists]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Charge for Sent E-Mail&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A method which consists of levying a fee against the sender of an email for each message sent, akin to the electronic equivalent of a postage stamp&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Eliminates the positive revenue of sending spam messages, making their sending an undesirable business practice.&lt;br /&gt;
**Provides revenue ostensibly for the upkeep and improvement of email networks&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Could make mass emails cost-prohibitive for individuals who need to send out large numbers of messages, or for non-profit organizations.&lt;br /&gt;
**Users who already pay between ten and fifty dollars each month for internet service are likely to react poorly to being told that they have to pay more for emails.&lt;br /&gt;
**Raises the cost of internet access in general, making it less affordable to lower-income individuals.&lt;br /&gt;
**Logistically, imposing a fee on such a global medium as email would prove difficult if not impossible.&lt;br /&gt;
**Distribution, use, and escalation of the fee would probably become an issue in time.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The ethical nature of imposing a fee for emails is hardly a cut-and-dry question.  There does not seem to be anything unethical about charging a reasonable price for a service rendered, and using the revenue from that fee in a responsible manner.  However, many would say that it is unethical to charge an exorbitant or excessive fee, or to use the revenue generated by such a fee for irresponsible purposes.  Some would argue that current Internet Service Provider charges are already excessive, and that adding a fee for email would only exacerbate an already prevalent problem.  One essential question comes down to whether the fee for sent emails is to be used specifically to discourage spam, or whether internet providers might come to rely upon it as another stream of revenue, and as such, seek to maximize the profits they could gain from the fee by consistently raising the price of sending an email.  Clearly, the ethics of one use of the fee are an entirely different matter than the ethics of the other.  Also, with email being such a pervasive and worldwide phenomenon as it is, the logistics of ethically levying the fee across national boundaries, in various currencies, and in areas where corruption of public office runs rife, becomes a serious issue.  It goes without being said that no first-world organization would like to propose a global fee structure which, in another part of the world, might help to finance corrupt leaders, oppressive and inhumane public policies, or terrorism.  Thus, the question to whom, ultimately, the revenue of the fee is to be distributed must also be addressed.  Also, it would be undesirable for respectable nonprofit organizations to be effectively banned from using mass emails through an inability to afford the necessary postage cost.  However, provided that all of these issues could be settled satisfactorily, that there could be exceptions, as with United States postage, for nonprofit organizations, that the revenues were used ethically and fairly, and that the fee was nominal at most, charging a fee for emails sent does seem to be, when properly handled, an ethical proposal.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.consumeraffairs.com/news04/2006/02/email_postage.html AOL to Consider Charging for Emails]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.infowars.com/articles/ps/internet_tax_email_tax_is_coming.htm Article on a Possible Email Tax]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.snopes.com/business/taxes/bill602p.asp An Email Tax Hoax Exposed]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Opt-In for Commercial E-Mail&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A technique in which all commercial senders of email would require for a user to take action to choose to have commercial email sent to their address before they would receive any such mailings.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Eliminates all unsolicited commercial emails.&lt;br /&gt;
**Allows the user to receive any commercial emails which he or she may choose.&lt;br /&gt;
**Does not limit messages sent for personal or nonprofit use.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Disallows any potentially desirable commercial emails of which the user is not aware.&lt;br /&gt;
**Requires that companies use other, typically more expensive media to initially contact potential customers.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Opt-in commercial mailings eliminate all commercial emails not specifically solicited, and, contrary to all above approaches, do nothing to limit or discourage personal or nonprofit use of email in the process.  Perhaps it could be argued that requiring all commercial emails to be opt-in would impose somewhat of a burden on companies, but with the availability of other forms of advertising, especially Internet advertising, this would be a marginal burden at worst, and a small price to pay for the near-total elimination of spam.  While there are still some minor issues with this solution, such as the possibility that users might occasionally get a spam message that they end up putting to good use, these such concerns are not exactly ethical in nature, and, all in all, the solution of requiring opt-in lists for commercial emails seems like an ethical way to address the problem of spam.  However, in practicality, so-called opt in selections are by set to send emails by default, making them, in fact, the much less-desirable form of an opt-out program.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.clickz.com/showPage.html?page=3499691 Building an Opt-In Email List]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spamhaus.org/mailinglists.html Comparison of Various Opt-In / Opt-Out Programs as Related to Spam]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spambutcher.com/art1/486278/ Commentary on the Ambiguity of &amp;quot;Opt-In&amp;quot; Programs]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Domain Authentication&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Domain-authentication technologies are used to ensure that a sender's domain is not forged or &amp;quot;spoofed.&amp;quot; (1)&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Prevents spammers from hiding their location.&lt;br /&gt;
**Allows ISPs and others to hold spammers responsible for their spam.&lt;br /&gt;
**Discourages spam and other unethical e-mail.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**A standard way of doing domain authentication must be decided on.&lt;br /&gt;
**There are several companies that have say in how to do domain authentication, making it harder to reach a concensus.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Domain authentication would go a long way to helping ISPs and the government to hold the spammers responsible. Right now a spammer can mask their location so in essence they are sending you anonymous emails. After a standard for domain authentication is in place people will be able to see the actual person that sent the email. No more spoofing. This solution takes a little power away from the average emailer, but the ability to spoof is not an ability with any practical and ethical use.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://e-com.ic.gc.ca/epic/site/ecic-ceac.nsf/en/gv00298e.html Electronic Commerce in Canada]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://lwn.net/Articles/188685/ Domain Keys for email sender authentication]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.eweek.com/article2/0,4149,1430976,00.asp Yahoo Proposes Anti-Spam Standard For Internet]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Bounties&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;There is &amp;quot;a new proposal gaining momentum at the Federal Trade Commission that would award hard-cash bounties to ordinary citizens who help arrest the bane of email marketing today: spam&amp;quot;[http://www.econtentmag.com/Articles/ArticleReader.aspx?CategoryID=3&amp;amp;ArticleID=7616]&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages&lt;br /&gt;
**The average Joe could help find the offending spammers and stop them from filling our mailboxes&lt;br /&gt;
**Spammers would be more warry of sending out spam when they know that the person they are sending it to could get a nice reward for turning them in&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Greedy vigilanties would begin turning companies that had some technical violation.&lt;br /&gt;
**Well meaning companies that fail to meat some small specification my be eaten alive by the piranas that are the general public trying to make some quick cash&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&lt;br /&gt;
I don't think allowing the general public to collect bounties on companies that have made some small technical violation is a good idea. This would greatly hinder business because every small company would have to be experts on the law just to send out a well meaning email to their customers. It might be ok hold the really big businesses to a standard like this but small businesses can't afford to have a lawyer proof-read all of their email that they send out. With the definition of spam being somewhat gray, offering a bounty for anyone who catches spammers is at best going to waste a lot of time looking into these claims. &amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.econtentmag.com/Articles/ArticleReader.aspx?CategoryID=3&amp;amp;ArticleID=7616 Spam Bounties: Legitimate Email Marketers at Risk]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.eweek.com/article2/0,1759,1648051,00.asp Bounties Are Not the Answer to Spam]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.technewsworld.com/story/36816.html Laws, Bounties, International Cooperation Fighting Spam]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;The &amp;quot;Goodmail&amp;quot; Approach&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;The Goodmail approach is where a company can pay a certain amount to have their emails bypass the spam filters of their customers. The idea is that if a company is willing to pay to send you an email they aren't a scam or some phishing attempt.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages&lt;br /&gt;
**If each message you send costs a fraction of a cent then the recipient is more likely to get just legitimate email.&lt;br /&gt;
**If companies have to pay to send advertising email, then they might worker harder to specifically target their email.&lt;br /&gt;
**Companies will also send you mail less frequently if they have to pay for it.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**If a company can't afford to pay the fee then they lose a formerly free mode of advertising.&lt;br /&gt;
**Nonprofit Organizations would not be able to afford to pay the fee&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The Goodmail approach has very strict guidelines about which applicants they accept based on spam-complaint records. &amp;quot;Goodmail has rejected more than 75% of the companies that have applied for its Certified Email program, according to the company's chief executive, Richard Gingras.&amp;quot; [http://www.spamdailynews.com/publish/Goodmail_rejecting_three_quarters_of_applicants.asp] This means that there is a company out there deciding who should and who should not be allowed to send email. This is very unethical in my opinion. They should allow the fee itself to do the talking, if a company wishes to pay the fee then they can bypass the spam filters. This will go a long way to helping ensure the email one gets is legitimate. By allowing the goodmail people to decide who is and isn't allowed to use their service is just asking for corruption.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spamdailynews.com/publish/Goodmail_rejecting_three_quarters_of_applicants.asp Goodmail rejecting three quarters of applicants]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spamdailynews.com/publish/Goodmail_CertifiedEmail_will_not_reduce_spam.asp Goodmail: CertifiedEmail will not reduce spam]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://news.com.com/Leading+ISPs+sign+up+for+Goodmail+antispam+service/2100-7355_3-6189298.html Leading ISPs sign up for Goodmail antispam service]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Escrow Bonds&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A concept which involves email senders to pay an amount to an escrow service, the sum of which is released back to the sender if a message is not marked by the recipient as spam, but is lost if the message is identified as spam.  Variations include adding whitelists for which the escrow is bypassed, and blacklists for which the deposit is automatically lost.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Imposes a fee for emails which is only charged in the case of messages identified as spam.&lt;br /&gt;
**Makes spam cost-prohibitive while all other emails, commercial or otherwise, remain free.&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Requires the financing of third-party escrow agencies, allowing a new avenue of exploitation of the fee.&lt;br /&gt;
**Necessitates an effective online micro-payment system.&lt;br /&gt;
**Allows for the charging as spam of any messages marked as spam, perhaps accidentally, falsely, or maliciously, by the recipient.&lt;br /&gt;
**Requires that the logistics of independent escrow agencies for all emails sent in any countries be satisfactorily addressed.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The concept of an independent escrow system for emails does not inherently seem to pose any sort of ethical dilemma.  Such a scenario appears to address many of the concerns with the email postage solution, as, in this scheme, all non-spam emails are free.  However, while the concept does not pose any ethical concerns in principle, in practice, several problems arise.  Mainly, financing of the escrow services could possibly lead to concerns.  Multiple tiers of service, high costs, or &amp;quot;preferred&amp;quot; senders who could bypass escrow blacklists with spam could lead to corruption which would be, in all practicality, unethical.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://8stars.org/a/2003/03/13/more-on-fighting-spam/ A Spam Escrow Proposal]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.si.umich.edu/about-SI/news-detail.htm?NewsItemID=416 University of Michigan Proposal for A Spam Escrow Service]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.itu.int/osg/spu/spam/contributions/Spam%20economics-abm.pdf PDF Presentation on an Economic Bond Solution to Spam]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_3&amp;diff=1487</id>
		<title>CSC 379:Week 1, Group 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_3&amp;diff=1487"/>
		<updated>2007-07-07T13:28:10Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Spam-Blocking Techniques ==&lt;br /&gt;
&amp;lt;B&amp;gt;Domain Blocking&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A spam-blocking technique which consists of redirecting to &amp;quot;junk&amp;quot; email boxes or filtering entirely all emails from specific web domains which have been blacklisted for spamming in the past.&amp;lt;/I&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Domain-level blocking is an easy and cost-effective way to curtail large numbers of email addresses from which spam is sent.  The blocking of a single domain can block an infinite number of possible addresses in that domain.&lt;br /&gt;
**Blacklists used for domain-level blocking may be shared among numerous email providers, thus protecting subscribers to one service from spam sent to subscribers of any collaborating service.&lt;br /&gt;
**As there is typically a fee associated with acquiring a domain, spammers using blocked domains must pay to purchase a new domain if they are blacklisted.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Though purchasing domains is associated with a cost, it is typically a marginal expense and well within the budget of major spammers worldwide.  Thus, blocking a domain does little to prevent a spammer from spamming from a different domain.&lt;br /&gt;
**Though spam may originate from one address in a domain, blocking the entire domain may result in the blacklisting of multiple addresses of individuals or corporations which have not engaged in spam, and therefore should not have the receipt of their mail blocked.&lt;br /&gt;
**When a web domain previously blacklisted changes ownership, the new owners may remain blacklisted due to the actions of the previous owners, and at no fault of their own.&lt;br /&gt;
**Much spam is sent through &amp;quot;spoofed&amp;quot; email addresses in which the sending domain is misrepresented.  Blocking such a domain may prevent the receipt of email from a domain which is not associated with spam.&lt;br /&gt;
**Spam can be sent from &amp;quot;zombie&amp;quot; machines infected by malware which sends spam, but owned by individuals unaware that their machines are engaging in spamming.  Blocking the domains of these machines would block the receipt of mail from innocent users.&lt;br /&gt;
**Spam, especially spam from &amp;quot;zombie&amp;quot; machines, can come from typically reputable domains with thousands or millions of users.  Blocking such domains may degrade the quality of email service provided to a service's users to an unacceptable level.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt; &amp;lt;BR&amp;gt;&lt;br /&gt;
With so many ways to accidentally block non-spamming email addresses, the ethics of domain-level blocking are questionable at best.  The goal of blocking spam is to make email more productive by eliminating messages which would clearly be considered &amp;quot;junk&amp;quot; by the vast majority of users.  Taking a serious chance on intercepting email from well-intentioned addresses, therefore, runs counter to the goal of making the communications more productive.  Perhaps with a feature to unblock specific addresses from a domain and to receive all messages from a &amp;quot;junk&amp;quot; mailbox, this strategy would be more acceptable.  In its most basic form, however, the high probability of blocking non-spamming users challenges this method's claim to validity.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*[http://www.joewein.de/sw/spam-bl-e.htm List of Blacklisted Domains]&lt;br /&gt;
*[http://www.blacklistedip.com/ IP Blacklist Monitoring Service]&lt;br /&gt;
*[http://ezinearticles.com/?Blocking-Domain-Spam-Senders&amp;amp;id=374858 Article on Spam which Includes Domain Blocking]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Prior Approval&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A spam-blocking technique in which a sender must request the permission of either a user or an email provider before mail can be received by that user or a client of that provider.  This generally takes one of two forms, either the use of a CAPTCHA which a sender must pass in order for an email to be delivered, or a whitelist, controlled by a recipient, which explicitly states the only addresses from which email is received.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;CAPTCHA Approach&amp;lt;/I&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Completely eliminates the ability of computer controlled spamming &amp;quot;bots&amp;quot; to send mail to an address.&lt;br /&gt;
**Allows all mail from human users who can and will evaluate the CAPTCHA, thereby avoiding forcefully blocking well-intentioned human-sent mail.&lt;br /&gt;
**Discourages spam sent from human sources to many addresses, as such sending would involved the evaluation of numerous CAPTCHAs&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**For the same reason that this method discourages spam sent from humans to many addresses, it also discourages worthwhile messages sent to many addresses.&lt;br /&gt;
**Eliminates or severely hampers the user's ability to receive solicited automated emails.&lt;br /&gt;
**Does not strictly eliminate spam from human sources.&lt;br /&gt;
**Prevents the receipt of mail from the young, the old, the disabled, or others who may be incapable of evaluating the CAPTCHA&lt;br /&gt;
**Depending on the implementation of the system, a sender may not expect to be required to complete a CAPTCHA confirmation, and may assume that his or her message has been sent when it has not.&lt;br /&gt;
**Rather than eliminating the burden of wasted time and stress imposed by spam, this approach merely shifts it from the receiver to the sender, and imposes it for all emails rather than just spam.&amp;lt;BR&amp;gt;&lt;br /&gt;
**Advancing technology makes designing CAPTCHAs which are one step ahead of computer readability increasingly difficult with time.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
At face value, the CAPTCHA Prior Approval method for controlling spam seems inherently more ethical than the domain blocking approach.  However, this approach, too, has the potential to block solicited emails, both from automated services and from those without the ability, knowledge, expectation, or patience to fill out CAPTCHA forms.   It could therefore be argued that this approach unfairly targets and limits the ability of various demographic groups, mentioned above, to send email.  However, the biggest ethical challenge to the CAPTCHA approach is to ask what, exactly, it does to eliminate the burdens of spam.  After all, the act of eliminating spam is hardly an end in and of itself.  The point of all spam-controlling technologies is to save time, stress, and annoyance for the users of email.  It could be legitimately argued that this approach, while it does cut down on the number of spam messages received by an address, itself creates the same sort of burdens which spam imposes, and thereby does little or nothing to improve the usability of email.  The burden of one spam message is merely the time and effort required to read a subject line, identify a message as spam, and click the &amp;quot;delete&amp;quot; button.  The CAPTCHA approach eliminates automated spam, and should be lauded for that fact. However, it isn't too far-fetched to say that more time and effort is required to evaluate and answer a CAPTCHA, sometimes multiple times, depending on a user's skill or experience with the tests, than would be required to delete, en-masse, the spam which would be received if this technique were not used at all.  In essence, then, this approach merely shifts the burden of wasted time from sender to recipient, and to force such a waste of time on someone who may be busy, who may be sending an important email, is arguably just as unethical as forcing a recipient to delete messages at a time of his or her own choosing.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;The Whitelist Approach&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Allows a user complete and total control over from whom the user wishes to receive email.&lt;br /&gt;
**Completely blocks all unwanted mail from addresses which are not pre-approved.&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Fails to block any unsolicited or unwanted messages from pre-approved addresses.&lt;br /&gt;
**Blocks all email from addresses not pre-approved, regardless of content, sender, situation, or potential benefit to the recipient.&lt;br /&gt;
**Eliminates the user's ability to receive desired or solicited email from unknown addresses.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Certainly, it would be difficult to defend the ethical nature of forcing users of an email service to employ a whitelist of approved addresses.  Whether for business or personal use, the importance of receiving mail from unknown addresses - friends with new or changed email addresses, business associates, new contacts, new clients, individuals who discovered a business via the web - is undeniable in daily life.  This approach may eliminate nearly all spam messages, with the exception of spam from individuals the recipient knows, but in the process it impacts the usability of email overall in a very severe, very negative fashion.  For many purposes, if an email address cannot receive mail from unknown addresses, it is entirely useless.  This approach essentially elevates the errors of the domain blocking approach to an entirely new level of severity.  While it may be valuable for applications such as parental controls and monitoring of children on the Internet, this approach is essentially useless for the purpose of blocking spam alone.  To force it on a user is to offer a substandard email service, which may be unethical and is certainly undesirable.  That said, however, there seems to be nothing wrong with &amp;lt;I&amp;gt;allowing&amp;lt;/I&amp;gt; users to choose a whitelist option for controlling email, should they so desire.  For a particular email address with specific uses and only a few potential senders, or for an individual who does not wish to be bothered by any unsolicited email whatsoever and who doesn't mind the hassle of learning of new individuals' email addresses by another means, this is an entirely viable option.  It is hardly unethical, of course, for a user to choose to seclude themselves from all but a handful of email addresses voluntarily.&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Note that a combination of the above two approaches eliminates many of the problems posed by each.  The use of a CAPTCHA authentication system, along with a whitelist of addresses for which the CAPTCHA is bypassed, is a particularly good solution relative to the others discussed here.  In such a scenario, unknown email may be received, but spam is effectively blocked or made time-prohibitive.  Many of the problems with the CAPTCHA scheme are addressed, as a CAPTCHA only needs to be completed once, after which an address can be added to a user's whitelist, and unrestricted communication may continue.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.captcha.net/ The CAPTCHA Project]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.earthlink.net/software/free/spamblocker/faq/ Earthlink SpamBlocker FAQ - CAPTCHA/Whitelist Approach]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.netmanners.com/email-whitelist-etiquette.html Article Explaining and Instructing in the Use of Whitelists]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Charge for Sent E-Mail&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A method which consists of levying a fee against the sender of an email for each message sent, akin to the electronic equivalent of a postage stamp&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Eliminates the positive revenue of sending spam messages, making their sending an undesirable business practice.&lt;br /&gt;
**Provides revenue ostensibly for the upkeep and improvement of email networks&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Could make mass emails cost-prohibitive for individuals who need to send out large numbers of messages, or for non-profit organizations.&lt;br /&gt;
**Users who already pay between ten and fifty dollars each month for internet service are likely to react poorly to being told that they have to pay more for emails.&lt;br /&gt;
**Raises the cost of internet access in general, making it less affordable to lower-income individuals.&lt;br /&gt;
**Logistically, imposing a fee on such a global medium as email would prove difficult if not impossible.&lt;br /&gt;
**Distribution, use, and escalation of the fee would probably become an issue in time.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The ethical nature of imposing a fee for emails is hardly a cut-and-dry question.  There does not seem to be anything unethical about charging a reasonable price for a service rendered, and using the revenue from that fee in a responsible manner.  However, many would say that it is unethical to charge an exorbitant or excessive fee, or to use the revenue generated by such a fee for irresponsible purposes.  Some would argue that current Internet Service Provider charges are already excessive, and that adding a fee for email would only exacerbate an already prevalent problem.  One essential question comes down to whether the fee for sent emails is to be used specifically to discourage spam, or whether internet providers might come to rely upon it as another stream of revenue, and as such, seek to maximize the profits they could gain from the fee by consistently raising the price of sending an email.  Clearly, the ethics of one use of the fee are an entirely different matter than the ethics of the other.  Also, with email being such a pervasive and worldwide phenomenon as it is, the logistics of ethically levying the fee across national boundaries, in various currencies, and in areas where corruption of public office runs rife, becomes a serious issue.  It goes without being said that no first-world organization would like to propose a global fee structure which, in another part of the world, might help to finance corrupt leaders, oppressive and inhumane public policies, or terrorism.  Thus, the question to whom, ultimately, the revenue of the fee is to be distributed must also be addressed.  Also, it would be undesirable for respectable nonprofit organizations to be effectively banned from using mass emails through an inability to afford the necessary postage cost.  However, provided that all of these issues could be settled satisfactorily, that there could be exceptions, as with United States postage, for nonprofit organizations, that the revenues were used ethically and fairly, and that the fee was nominal at most, charging a fee for emails sent does seem to be, when properly handled, an ethical proposal.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.consumeraffairs.com/news04/2006/02/email_postage.html AOL to Consider Charging for Emails]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.infowars.com/articles/ps/internet_tax_email_tax_is_coming.htm Article on a Possible Email Tax]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.snopes.com/business/taxes/bill602p.asp An Email Tax Hoax Exposed]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Opt-In for Commercial E-Mail&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A technique in which all commercial senders of email would require for a user to take action to choose to have commercial email sent to their address before they would receive any such mailings.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Eliminates all unsolicited commercial emails.&lt;br /&gt;
**Allows the user to receive any commercial emails which he or she may choose.&lt;br /&gt;
**Does not limit messages sent for personal or nonprofit use.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Disallows any potentially desirable commercial emails of which the user is not aware.&lt;br /&gt;
**Requires that companies use other, typically more expensive media to initially contact potential customers.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Opt-in commercial mailings eliminate all commercial emails not specifically solicited, and, contrary to all above approaches, do nothing to limit or discourage personal or nonprofit use of email in the process.  Perhaps it could be argued that requiring all commercial emails to be opt-in would impose somewhat of a burden on companies, but with the availability of other forms of advertising, especially Internet advertising, this would be a marginal burden at worst, and a small price to pay for the near-total elimination of spam.  While there are still some minor issues with this solution, such as the possibility that users might occasionally get a spam message that they end up putting to good use, these such concerns are not exactly ethical in nature, and, all in all, the solution of requiring opt-in lists for commercial emails seems like an ethical way to address the problem of spam.  However, in practicality, so-called opt in selections are by set to send emails by default, making them, in fact, the much less-desirable form of an opt-out program.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.clickz.com/showPage.html?page=3499691 Building an Opt-In Email List]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spamhaus.org/mailinglists.html Comparison of Various Opt-In / Opt-Out Programs as Related to Spam]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spambutcher.com/art1/486278/ Commentary on the Ambiguity of &amp;quot;Opt-In&amp;quot; Programs]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Domain Authentication&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Domain-authentication technologies are used to ensure that a sender's domain is not forged or &amp;quot;spoofed.&amp;quot; (1)&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Prevents spammers from hiding their location.&lt;br /&gt;
**Allows ISPs and others to hold spammers responsible for their spam.&lt;br /&gt;
**Discourages spam and other unethical e-mail.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**A standard way of doing domain authentication must be decided on.&lt;br /&gt;
**There are several companies that have say in how to do domain authentication, making it harder to reach a concensus.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Domain authentication would go a long way to helping ISPs and the government to hold the spammers responsible. Right now a spammer can mask their location so in essence they are sending you anonymous emails. After a standard for domain authentication is in place people will be able to see the actual person that sent the email. No more spoofing. This solution takes a little power away from the average emailer, but the ability to spoof is not an ability with any practical and ethical use.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://e-com.ic.gc.ca/epic/site/ecic-ceac.nsf/en/gv00298e.html Electronic Commerce in Canada]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://lwn.net/Articles/188685/ Domain Keys for email sender authentication]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.eweek.com/article2/0,4149,1430976,00.asp Yahoo Proposes Anti-Spam Standard For Internet]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Bounties&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;There is &amp;quot;a new proposal gaining momentum at the Federal Trade Commission that would award hard-cash bounties to ordinary citizens who help arrest the bane of email marketing today: spam&amp;quot;[http://www.econtentmag.com/Articles/ArticleReader.aspx?CategoryID=3&amp;amp;ArticleID=7616]&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages&lt;br /&gt;
**The average Joe could help find the offending spammers and stop them from filling our mailboxes&lt;br /&gt;
**Spammers would be more warry of sending out spam when they know that the person they are sending it to could get a nice reward for turning them in&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Greedy vigilanties would begin turning companies that had some technical violation.&lt;br /&gt;
**Well meaning companies that fail to meat some small specification my be eaten alive by the piranas that are the general public trying to make some quick cash&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&lt;br /&gt;
I don't think allowing the general public to collect bounties on companies that have made some small technical violation is a good idea. This would greatly hinder business because every small company would have to be experts on the law just to send out a well meaning email to their customers. It might be ok hold the really big businesses to a standard like this but small businesses can't afford to have a lawyer proof-read all of their email that they send out. With the definition of spam being somewhat gray, offering a bounty for anyone who catches spammers is at best going to waste a lot of time looking into these claims. &amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.econtentmag.com/Articles/ArticleReader.aspx?CategoryID=3&amp;amp;ArticleID=7616 Spam Bounties: Legitimate Email Marketers at Risk]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.eweek.com/article2/0,1759,1648051,00.asp Bounties Are Not the Answer to Spam]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.technewsworld.com/story/36816.html Laws, Bounties, International Cooperation Fighting Spam]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;The &amp;quot;Goodmail&amp;quot; Approach&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;The Goodmail approach is where a company can pay a certain amount to have their emails bypass the spam filters of their customers. The idea is that if a company is willing to pay to send you an email they aren't a scam or some phishing attempt.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages&lt;br /&gt;
**If each message you send costs a fraction of a cent then the recipient is more likely to get just legitimate email.&lt;br /&gt;
**If companies have to pay to send advertising email, then they might worker harder to specifically target their email.&lt;br /&gt;
**Companies will also send you mail less frequently if they have to pay for it.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**If a company can't afford to pay the fee then they lose a formerly free mode of advertising.&lt;br /&gt;
**Nonprofit Organizations would not be able to afford to pay the fee&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The Goodmail approach has very strict guidelines about which applicants they accept based on spam-complaint records. &amp;quot;Goodmail has rejected more than 75% of the companies that have applied for its Certified Email program, according to the company's chief executive, Richard Gingras.&amp;quot; [http://www.spamdailynews.com/publish/Goodmail_rejecting_three_quarters_of_applicants.asp] This means that there is a company out there deciding who should and who should not be allowed to send email. This is very unethical in my opinion. They should allow the fee itself to do the talking, if a company wishes to pay the fee then they can bypass the spam filters. This will go a long way to helping ensure the email one gets is legitimate. By allowing the goodmail people to decide who is and isn't allowed to use their service is just asking for corruption.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spamdailynews.com/publish/Goodmail_rejecting_three_quarters_of_applicants.asp Goodmail rejecting three quarters of applicants]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spamdailynews.com/publish/Goodmail_CertifiedEmail_will_not_reduce_spam.asp Goodmail: CertifiedEmail will not reduce spam]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://news.com.com/Leading+ISPs+sign+up+for+Goodmail+antispam+service/2100-7355_3-6189298.html Leading ISPs sign up for Goodmail antispam service]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Escrow Bonds&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A concept which involves email senders to pay an amount to an escrow service, the sum of which is released back to the sender if a message is not marked by the recipient as spam, but is lost if the message is identified as spam.  Variations include adding whitelists for which the escrow is bypassed, and blacklists for which the deposit is automatically lost.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Imposes a fee for emails which is only charged in the case of messages identified as spam.&lt;br /&gt;
**Makes spam cost-prohibitive while all other emails, commercial or otherwise, remain free.&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Requires the financing of third-party escrow agencies, allowing a new avenue of exploitation of the fee.&lt;br /&gt;
**Necessitates an effective online micro-payment system.&lt;br /&gt;
**Allows for the charging as spam of any messages marked as spam, perhaps accidentally, falsely, or maliciously, by the recipient.&lt;br /&gt;
**Requires that the logistics of independent escrow agencies for all emails sent in any countries be satisfactorily addressed.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The concept of an independent escrow system for emails does not inherently seem to pose any sort of ethical dilemma.  Such a scenario appears to address many of the concerns with the email postage solution, as, in this scheme, all non-spam emails are free.  However, while the concept does not pose any ethical concerns in principle, in practice, several problems arise.  Mainly, financing of the escrow services could possibly lead to concerns.  Multiple tiers of service, high costs, or &amp;quot;preferred&amp;quot; senders who could bypass escrow blacklists with spam could lead to corruption which would be, in all practicality, unethical.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://8stars.org/a/2003/03/13/more-on-fighting-spam/ A Spam Escrow Proposal]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.si.umich.edu/about-SI/news-detail.htm?NewsItemID=416 University of Michigan Proposal for A Spam Escrow Service]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.itu.int/osg/spu/spam/contributions/Spam%20economics-abm.pdf PDF Presentation on an Economic Bond Solution to Spam]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_3&amp;diff=1486</id>
		<title>CSC 379:Week 1, Group 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_3&amp;diff=1486"/>
		<updated>2007-07-07T13:27:50Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Spam-Blocking Techniques ==&lt;br /&gt;
&amp;lt;B&amp;gt;Domain Blocking&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A spam-blocking technique which consists of redirecting to &amp;quot;junk&amp;quot; email boxes or filtering entirely all emails from specific web domains which have been blacklisted for spamming in the past.&amp;lt;/I&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Domain-level blocking is an easy and cost-effective way to curtail large numbers of email addresses from which spam is sent.  The blocking of a single domain can block an infinite number of possible addresses in that domain.&lt;br /&gt;
**Blacklists used for domain-level blocking may be shared among numerous email providers, thus protecting subscribers to one service from spam sent to subscribers of any collaborating service.&lt;br /&gt;
**As there is typically a fee associated with acquiring a domain, spammers using blocked domains must pay to purchase a new domain if they are blacklisted.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Though purchasing domains is associated with a cost, it is typically a marginal expense and well within the budget of major spammers worldwide.  Thus, blocking a domain does little to prevent a spammer from spamming from a different domain.&lt;br /&gt;
**Though spam may originate from one address in a domain, blocking the entire domain may result in the blacklisting of multiple addresses of individuals or corporations which have not engaged in spam, and therefore should not have the receipt of their mail blocked.&lt;br /&gt;
**When a web domain previously blacklisted changes ownership, the new owners may remain blacklisted due to the actions of the previous owners, and at no fault of their own.&lt;br /&gt;
**Much spam is sent through &amp;quot;spoofed&amp;quot; email addresses in which the sending domain is misrepresented.  Blocking such a domain may prevent the receipt of email from a domain which is not associated with spam.&lt;br /&gt;
**Spam can be sent from &amp;quot;zombie&amp;quot; machines infected by malware which sends spam, but owned by individuals unaware that their machines are engaging in spamming.  Blocking the domains of these machines would block the receipt of mail from innocent users.&lt;br /&gt;
**Spam, especially spam from &amp;quot;zombie&amp;quot; machines, can come from typically reputable domains with thousands or millions of users.  Blocking such domains may degrade the quality of email service provided to a service's users to an unacceptable level.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt; &amp;lt;BR&amp;gt;&lt;br /&gt;
With so many ways to accidentally block non-spamming email addresses, the ethics of domain-level blocking are questionable at best.  The goal of blocking spam is to make email more productive by eliminating messages which would clearly be considered &amp;quot;junk&amp;quot; by the vast majority of users.  Taking a serious chance on intercepting email from well-intentioned addresses, therefore, runs counter to the goal of making the communications more productive.  Perhaps with a feature to unblock specific addresses from a domain and to receive all messages from a &amp;quot;junk&amp;quot; mailbox, this strategy would be more acceptable.  In its most basic form, however, the high probability of blocking non-spamming users challenges this method's claim to validity.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*[http://www.joewein.de/sw/spam-bl-e.htm List of Blacklisted Domains]&lt;br /&gt;
*[http://www.blacklistedip.com/ IP Blacklist Monitoring Service]&lt;br /&gt;
*[http://ezinearticles.com/?Blocking-Domain-Spam-Senders&amp;amp;id=374858 Article on Spam which Includes Domain Blocking]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Prior Approval&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A spam-blocking technique in which a sender must request the permission of either a user or an email provider before mail can be received by that user or a client of that provider.  This generally takes one of two forms, either the use of a CAPTCHA which a sender must pass in order for an email to be delivered, or a whitelist, controlled by a recipient, which explicitly states the only addresses from which email is received.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;CAPTCHA Approach&amp;lt;/I&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Completely eliminates the ability of computer controlled spamming &amp;quot;bots&amp;quot; to send mail to an address.&lt;br /&gt;
**Allows all mail from human users who can and will evaluate the CAPTCHA, thereby avoiding forcefully blocking well-intentioned human-sent mail.&lt;br /&gt;
**Discourages spam sent from human sources to many addresses, as such sending would involved the evaluation of numerous CAPTCHAs&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**For the same reason that this method discourages spam sent from humans to many addresses, it also discourages worthwhile messages sent to many addresses.&lt;br /&gt;
**Eliminates or severely hampers the user's ability to receive solicited automated emails.&lt;br /&gt;
**Does not strictly eliminate spam from human sources.&lt;br /&gt;
**Prevents the receipt of mail from the young, the old, the disabled, or others who may be incapable of evaluating the CAPTCHA&lt;br /&gt;
**Depending on the implementation of the system, a sender may not expect to be required to complete a CAPTCHA confirmation, and may assume that his or her message has been sent when it has not.&lt;br /&gt;
**Rather than eliminating the burden of wasted time and stress imposed by spam, this approach merely shifts it from the receiver to the sender, and imposes it for all emails rather than just spam.&amp;lt;BR&amp;gt;&lt;br /&gt;
**Advancing technology makes designing CAPTCHAs which are one step ahead of computer readability increasingly difficult with time.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
At face value, the CAPTCHA Prior Approval method for controlling spam seems inherently more ethical than the domain blocking approach.  However, this approach, too, has the potential to block solicited emails, both from automated services and from those without the ability, knowledge, expectation, or patience to fill out CAPTCHA forms.   It could therefore be argued that this approach unfairly targets and limits the ability of various demographic groups, mentioned above, to send email.  However, the biggest ethical challenge to the CAPTCHA approach is to ask what, exactly, it does to eliminate the burdens of spam.  After all, the act of eliminating spam is hardly an end in and of itself.  The point of all spam-controlling technologies is to save time, stress, and annoyance for the users of email.  It could be legitimately argued that this approach, while it does cut down on the number of spam messages received by an address, itself creates the same sort of burdens which spam imposes, and thereby does little or nothing to improve the usability of email.  The burden of one spam message is merely the time and effort required to read a subject line, identify a message as spam, and click the &amp;quot;delete&amp;quot; button.  The CAPTCHA approach eliminates automated spam, and should be lauded for that fact. However, it isn't too far-fetched to say that more time and effort is required to evaluate and answer a CAPTCHA, sometimes multiple times, depending on a user's skill or experience with the tests, than would be required to delete, en-masse, the spam which would be received if this technique were not used at all.  In essence, then, this approach merely shifts the burden of wasted time from sender to recipient, and to force such a waste of time on someone who may be busy, who may be sending an important email, is arguably just as unethical as forcing a recipient to delete messages at a time of his or her own choosing.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;The Whitelist Approach&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Allows a user complete and total control over from whom the user wishes to receive email.&lt;br /&gt;
**Completely blocks all unwanted mail from addresses which are not pre-approved.&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Fails to block any unsolicited or unwanted messages from pre-approved addresses.&lt;br /&gt;
**Blocks all email from addresses not pre-approved, regardless of content, sender, situation, or potential benefit to the recipient.&lt;br /&gt;
**Eliminates the user's ability to receive desired or solicited email from unknown addresses.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Certainly, it would be difficult to defend the ethical nature of forcing users of an email service to employ a whitelist of approved addresses.  Whether for business or personal use, the importance of receiving mail from unknown addresses - friends with new or changed email addresses, business associates, new contacts, new clients, individuals who discovered a business via the web - is undeniable in daily life.  This approach may eliminate nearly all spam messages, with the exception of spam from individuals the recipient knows, but in the process it impacts the usability of email overall in a very severe, very negative fashion.  For many purposes, if an email address cannot receive mail from unknown addresses, it is entirely useless.  This approach essentially elevates the errors of the domain blocking approach to an entirely new level of severity.  While it may be valuable for applications such as parental controls and monitoring of children on the Internet, this approach is essentially useless for the purpose of blocking spam alone.  To force it on a user is to offer a substandard email service, which may be unethical and is certainly undesirable.  That said, however, there seems to be nothing wrong with &amp;lt;I&amp;gt;allowing&amp;lt;/I&amp;gt; users to choose a whitelist option for controlling email, should they so desire.  For a particular email address with specific uses and only a few potential senders, or for an individual who does not wish to be bothered by any unsolicited email whatsoever and who doesn't mind the hassle of learning of new individuals' email addresses by another means, this is an entirely viable option.  It is hardly unethical, of course, for a user to choose to seclude themselves from all but a handful of email addresses voluntarily.&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Note that a combination of the above two approaches eliminates many of the problems posed by each.  The use of a CAPTCHA authentication system, along with a whitelist of addresses for which the CAPTCHA is bypassed, is a particularly good solution relative to the others discussed here.  In such a scenario, unknown email may be received, but spam is effectively blocked or made time-prohibitive.  Many of the problems with the CAPTCHA scheme are addressed, as a CAPTCHA only needs to be completed once, after which an address can be added to a user's whitelist, and unrestricted communication may continue.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.captcha.net/ The CAPTCHA Project]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.earthlink.net/software/free/spamblocker/faq/ Earthlink SpamBlocker FAQ - CAPTCHA/Whitelist Approach]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.netmanners.com/email-whitelist-etiquette.html Article Explaining and Instructing in the Use of Whitelists]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Charge for Sent E-Mail&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A method which consists of levying a fee against the sender of an email for each message sent, akin to the electronic equivalent of a postage stamp&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Eliminates the positive revenue of sending spam messages, making their sending an undesirable business practice.&lt;br /&gt;
**Provides revenue ostensibly for the upkeep and improvement of email networks&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Could make mass emails cost-prohibitive for individuals who need to send out large numbers of messages, or for non-profit organizations.&lt;br /&gt;
**Users who already pay between ten and fifty dollars each month for internet service are likely to react poorly to being told that they have to pay more for emails.&lt;br /&gt;
**Raises the cost of internet access in general, making it less affordable to lower-income individuals.&lt;br /&gt;
**Logistically, imposing a fee on such a global medium as email would prove difficult if not impossible.&lt;br /&gt;
**Distribution, use, and escalation of the fee would probably become an issue in time.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The ethical nature of imposing a fee for emails is hardly a cut-and-dry question.  There does not seem to be anything unethical about charging a reasonable price for a service rendered, and using the revenue from that fee in a responsible manner.  However, many would say that it is unethical to charge an exorbitant or excessive fee, or to use the revenue generated by such a fee for irresponsible purposes.  Some would argue that current Internet Service Provider charges are already excessive, and that adding a fee for email would only exacerbate an already prevalent problem.  One essential question comes down to whether the fee for sent emails is to be used specifically to discourage spam, or whether internet providers might come to rely upon it as another stream of revenue, and as such, seek to maximize the profits they could gain from the fee by consistently raising the price of sending an email.  Clearly, the ethics of one use of the fee are an entirely different matter than the ethics of the other.  Also, with email being such a pervasive and worldwide phenomenon as it is, the logistics of ethically levying the fee across national boundaries, in various currencies, and in areas where corruption of public office runs rife, becomes a serious issue.  It goes without being said that no first-world organization would like to propose a global fee structure which, in another part of the world, might help to finance corrupt leaders, oppressive and inhumane public policies, or terrorism.  Thus, the question to whom, ultimately, the revenue of the fee is to be distributed must also be addressed.  Also, it would be undesirable for respectable nonprofit organizations to be effectively banned from using mass emails through an inability to afford the necessary postage cost.  However, provided that all of these issues could be settled satisfactorily, that there could be exceptions, as with United States postage, for nonprofit organizations, that the revenues were used ethically and fairly, and that the fee was nominal at most, charging a fee for emails sent does seem to be, when properly handled, an ethical proposal.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.consumeraffairs.com/news04/2006/02/email_postage.html AOL to Consider Charging for Emails]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.infowars.com/articles/ps/internet_tax_email_tax_is_coming.htm Article on a Possible Email Tax]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.snopes.com/business/taxes/bill602p.asp An Email Tax Hoax Exposed]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Opt-In for Commercial E-Mail&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A technique in which all commercial senders of email would require for a user to take action to choose to have commercial email sent to their address before they would receive any such mailings.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Eliminates all unsolicited commercial emails.&lt;br /&gt;
**Allows the user to receive any commercial emails which he or she may choose.&lt;br /&gt;
**Does not limit messages sent for personal or nonprofit use.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Disallows any potentially desirable commercial emails of which the user is not aware.&lt;br /&gt;
**Requires that companies use other, typically more expensive media to initially contact potential customers.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Opt-in commercial mailings eliminate all commercial emails not specifically solicited, and, contrary to all above approaches, do nothing to limit or discourage personal or nonprofit use of email in the process.  Perhaps it could be argued that requiring all commercial emails to be opt-in would impose somewhat of a burden on companies, but with the availability of other forms of advertising, especially Internet advertising, this would be a marginal burden at worst, and a small price to pay for the near-total elimination of spam.  While there are still some minor issues with this solution, such as the possibility that users might occasionally get a spam message that they end up putting to good use, these such concerns are not exactly ethical in nature, and, all in all, the solution of requiring opt-in lists for commercial emails seems like an ethical way to address the problem of spam.  However, in practicality, so-called opt in selections are by set to send emails by default, making them, in fact, the much less-desirable form of an opt-out program.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.clickz.com/showPage.html?page=3499691 Building an Opt-In Email List]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spamhaus.org/mailinglists.html Comparison of Various Opt-In / Opt-Out Programs as Related to Spam]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spambutcher.com/art1/486278/ Commentary on the Ambiguity of &amp;quot;Opt-In&amp;quot; Programs]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Domain Authentication&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Domain-authentication technologies are used to ensure that a sender's domain is not forged or &amp;quot;spoofed.&amp;quot; (1)&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Prevents spammers from hiding their location.&lt;br /&gt;
**Allows ISPs and others to hold spammers responsible for their spam.&lt;br /&gt;
**Discourages spam and other unethical e-mail.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**A standard way of doing domain authentication must be decided on.&lt;br /&gt;
**There are several companies that have say in how to do domain authentication, making it harder to reach a concensus.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Domain authentication would go a long way to helping ISPs and the government to hold the spammers responsible. Right now a spammer can mask their location so in essence they are sending you anonymous emails. After a standard for domain authentication is in place people will be able to see the actual person that sent the email. No more spoofing. This solution takes a little power away from the average emailer, but the ability to spoof is not an ability with any practical and ethical use.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://e-com.ic.gc.ca/epic/site/ecic-ceac.nsf/en/gv00298e.html Electronic Commerce in Canada]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://lwn.net/Articles/188685/ Domain Keys for email sender authentication]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.eweek.com/article2/0,4149,1430976,00.asp Yahoo Proposes Anti-Spam Standard For Internet]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Bounties&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;There is &amp;quot;a new proposal gaining momentum at the Federal Trade Commission that would award hard-cash bounties to ordinary citizens who help arrest the bane of email marketing today: spam&amp;quot;[http://www.econtentmag.com/Articles/ArticleReader.aspx?CategoryID=3&amp;amp;ArticleID=7616]&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages&lt;br /&gt;
**The average Joe could help find the offending spammers and stop them from filling our mailboxes&lt;br /&gt;
**Spammers would be more warry of sending out spam when they know that the person they are sending it to could get a nice reward for turning them in&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Greedy vigilanties would begin turning companies that had some technical violation.&lt;br /&gt;
**Well meaning companies that fail to meat some small specification my be eaten alive by the piranas that are the general public trying to make some quick cash&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&lt;br /&gt;
I don't think allowing the general public to collect bounties on companies that have made some small technical violation is a good idea. This would greatly hinder business because every small company would have to be experts on the law just to send out a well meaning email to their customers. It might be ok hold the really big businesses to a standard like this but small businesses can't afford to have a lawyer proof-read all of their email that they send out. With the definition of spam being somewhat gray, offering a bounty for anyone who catches spammers is at best going to waste a lot of time looking into these claims. &amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.econtentmag.com/Articles/ArticleReader.aspx?CategoryID=3&amp;amp;ArticleID=7616 Spam Bounties: Legitimate Email Marketers at Risk]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.eweek.com/article2/0,1759,1648051,00.asp Bounties Are Not the Answer to Spam]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.technewsworld.com/story/36816.html Laws, Bounties, International Cooperation Fighting Spam]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;The &amp;quot;Goodmail&amp;quot; Approach&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;The Goodmail approach is where a company can pay a certain amount to have their emails bypass the spam filters of their customers. The idea is that if a company is willing to pay to send you an email they aren't a scam or some phishing attempt.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages&lt;br /&gt;
**If each message you send costs a fraction of a cent then the recipient is more likely to get just legitimate email.&lt;br /&gt;
**If companies have to pay to send advertising email, then they might worker harder to specifically target their email.&lt;br /&gt;
**Companies will also send you mail less frequently if they have to pay for it.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**If a company can't afford to pay the fee then they lose a formerly free mode of advertising.&lt;br /&gt;
**Nonprofit Organizations would not be able to afford to pay the fee&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The Goodmail approach has very strict guidelines about which applicants they accept based on spam-complaint records. &amp;quot;Goodmail has rejected more than 75% of the companies that have applied for its Certified Email program, according to the company's chief executive, Richard Gingras.&amp;quot; [http://www.spamdailynews.com/publish/Goodmail_rejecting_three_quarters_of_applicants.asp] This means that there is a company out there deciding who should and who should not be allowed to send email. This is very unethical in my opinion. They should allow the fee itself to do the talking, if a company wishes to pay the fee then they can bypass the spam filters. This will go a long way to helping ensure the email one gets is legitimate. By allowing the goodmail people to decide who is and isn't allowed to use their service is just asking for corruption.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spamdailynews.com/publish/Goodmail_rejecting_three_quarters_of_applicants.asp Goodmail rejecting three quarters of applicants]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spamdailynews.com/publish/Goodmail_CertifiedEmail_will_not_reduce_spam.asp Goodmail: CertifiedEmail will not reduce spam]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://news.com.com/Leading+ISPs+sign+up+for+Goodmail+antispam+service/2100-7355_3-6189298.html Leading ISPs sign up for Goodmail antispam service]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Escrow Bonds&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A concept which involves email senders to pay an amount to an escrow service, the sum of which is released back to the sender if a message is not marked by the recipient as spam, but is lost if the message is identified as spam.  Variations include adding whitelists for which the escrow is bypassed, and blacklists for which the deposit is automatically lost.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Imposes a fee for emails which is only charged in the case of messages identified as spam.&lt;br /&gt;
**Makes spam cost-prohibitive while all other emails, commercial or otherwise, remain free.&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Requires the financing of third-party escrow agencies, allowing a new avenue of exploitation of the fee.&lt;br /&gt;
**Necessitates an effective online micro-payment system.&lt;br /&gt;
**Allows for the charging as spam of any messages marked as spam, perhaps accidentally, falsely, or maliciously, by the recipient.&lt;br /&gt;
**Requires that the logistics of independent escrow agencies for all emails sent in any countries be satisfactorily addressed.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The concept of an independent escrow system for emails does not inherently seem to pose any sort of ethical dilemma.  Such a scenario appears to address many of the concerns with the email postage solution, as, in this scheme, all non-spam emails are free.  However, while the concept does not pose any ethical concerns in principle, in practice, several problems arise.  Mainly, financing of the escrow services could possibly lead to concerns.  Multiple tiers of service, high costs, or &amp;quot;preferred&amp;quot; senders who could bypass escrow blacklists with spam could lead to corruption which would be, in all practicality, unethical.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://8stars.org/a/2003/03/13/more-on-fighting-spam/ A Spam Escrow Proposal]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.si.umich.edu/about-SI/news-detail.htm?NewsItemID=416 University of Michigan Proposal for A Spam Escrow Service]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.itu.int/osg/spu/spam/contributions/Spam%20economics-abm.pdf PDF Presentation on an Economic Bond Solution to Spam]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_3&amp;diff=1485</id>
		<title>CSC 379:Week 1, Group 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_3&amp;diff=1485"/>
		<updated>2007-07-07T13:26:49Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Spam-Blocking Techniques ==&lt;br /&gt;
&amp;lt;B&amp;gt;Domain Blocking&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A spam-blocking technique which consists of redirecting to &amp;quot;junk&amp;quot; email boxes or filtering entirely all emails from specific web domains which have been blacklisted for spamming in the past.&amp;lt;/I&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Domain-level blocking is an easy and cost-effective way to curtail large numbers of email addresses from which spam is sent.  The blocking of a single domain can block an infinite number of possible addresses in that domain.&lt;br /&gt;
**Blacklists used for domain-level blocking may be shared among numerous email providers, thus protecting subscribers to one service from spam sent to subscribers of any collaborating service.&lt;br /&gt;
**As there is typically a fee associated with acquiring a domain, spammers using blocked domains must pay to purchase a new domain if they are blacklisted.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Though purchasing domains is associated with a cost, it is typically a marginal expense and well within the budget of major spammers worldwide.  Thus, blocking a domain does little to prevent a spammer from spamming from a different domain.&lt;br /&gt;
**Though spam may originate from one address in a domain, blocking the entire domain may result in the blacklisting of multiple addresses of individuals or corporations which have not engaged in spam, and therefore should not have the receipt of their mail blocked.&lt;br /&gt;
**When a web domain previously blacklisted changes ownership, the new owners may remain blacklisted due to the actions of the previous owners, and at no fault of their own.&lt;br /&gt;
**Much spam is sent through &amp;quot;spoofed&amp;quot; email addresses in which the sending domain is misrepresented.  Blocking such a domain may prevent the receipt of email from a domain which is not associated with spam.&lt;br /&gt;
**Spam can be sent from &amp;quot;zombie&amp;quot; machines infected by malware which sends spam, but owned by individuals unaware that their machines are engaging in spamming.  Blocking the domains of these machines would block the receipt of mail from innocent users.&lt;br /&gt;
**Spam, especially spam from &amp;quot;zombie&amp;quot; machines, can come from typically reputable domains with thousands or millions of users.  Blocking such domains may degrade the quality of email service provided to a service's users to an unacceptable level.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt; &amp;lt;BR&amp;gt;&lt;br /&gt;
With so many ways to accidentally block non-spamming email addresses, the ethics of domain-level blocking are questionable at best.  The goal of blocking spam is to make email more productive by eliminating messages which would clearly be considered &amp;quot;junk&amp;quot; by the vast majority of users.  Taking a serious chance on intercepting email from well-intentioned addresses, therefore, runs counter to the goal of making the communications more productive.  Perhaps with a feature to unblock specific addresses from a domain and to receive all messages from a &amp;quot;junk&amp;quot; mailbox, this strategy would be more acceptable.  In its most basic form, however, the high probability of blocking non-spamming users challenges this method's claim to validity.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*[http://www.joewein.de/sw/spam-bl-e.htm List of Blacklisted Domains]&lt;br /&gt;
*[http://www.blacklistedip.com/ IP Blacklist Monitoring Service]&lt;br /&gt;
*[http://ezinearticles.com/?Blocking-Domain-Spam-Senders&amp;amp;id=374858 Article on Spam which Includes Domain Blocking]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Prior Approval&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A spam-blocking technique in which a sender must request the permission of either a user or an email provider before mail can be received by that user or a client of that provider.  This generally takes one of two forms, either the use of a CAPTCHA which a sender must pass in order for an email to be delivered, or a whitelist, controlled by a recipient, which explicitly states the only addresses from which email is received.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;CAPTCHA Approach&amp;lt;/I&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Completely eliminates the ability of computer controlled spamming &amp;quot;bots&amp;quot; to send mail to an address.&lt;br /&gt;
**Allows all mail from human users who can and will evaluate the CAPTCHA, thereby avoiding forcefully blocking well-intentioned human-sent mail.&lt;br /&gt;
**Discourages spam sent from human sources to many addresses, as such sending would involved the evaluation of numerous CAPTCHAs&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**For the same reason that this method discourages spam sent from humans to many addresses, it also discourages worthwhile messages sent to many addresses.&lt;br /&gt;
**Eliminates or severely hampers the user's ability to receive solicited automated emails.&lt;br /&gt;
**Does not strictly eliminate spam from human sources.&lt;br /&gt;
**Prevents the receipt of mail from the young, the old, the disabled, or others who may be incapable of evaluating the CAPTCHA&lt;br /&gt;
**Depending on the implementation of the system, a sender may not expect to be required to complete a CAPTCHA confirmation, and may assume that his or her message has been sent when it has not.&lt;br /&gt;
**Rather than eliminating the burden of wasted time and stress imposed by spam, this approach merely shifts it from the receiver to the sender, and imposes it for all emails rather than just spam.&amp;lt;BR&amp;gt;&lt;br /&gt;
**Advancing technology makes designing CAPTCHAs which are one step ahead of computer readability increasingly difficult with time.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
At face value, the CAPTCHA Prior Approval method for controlling spam seems inherently more ethical than the domain blocking approach.  However, this approach, too, has the potential to block solicited emails, both from automated services and from those without the ability, knowledge, expectation, or patience to fill out CAPTCHA forms.   It could therefore be argued that this approach unfairly targets and limits the ability of various demographic groups, mentioned above, to send email.  However, the biggest ethical challenge to the CAPTCHA approach is to ask what, exactly, it does to eliminate the burdens of spam.  After all, the act of eliminating spam is hardly an end in and of itself.  The point of all spam-controlling technologies is to save time, stress, and annoyance for the users of email.  It could be legitimately argued that this approach, while it does cut down on the number of spam messages received by an address, itself creates the same sort of burdens which spam imposes, and thereby does little or nothing to improve the usability of email.  The burden of one spam message is merely the time and effort required to read a subject line, identify a message as spam, and click the &amp;quot;delete&amp;quot; button.  The CAPTCHA approach eliminates automated spam, and should be lauded for that fact. However, it isn't too far-fetched to say that more time and effort is required to evaluate and answer a CAPTCHA, sometimes multiple times, depending on a user's skill or experience with the tests, than would be required to delete, en-masse, the spam which would be received if this technique were not used at all.  In essence, then, this approach merely shifts the burden of wasted time from sender to recipient, and to force such a waste of time on someone who may be busy, who may be sending an important email, is arguably just as unethical as forcing a recipient to delete messages at a time of his or her own choosing.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;The Whitelist Approach&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Allows a user complete and total control over from whom the user wishes to receive email.&lt;br /&gt;
**Completely blocks all unwanted mail from addresses which are not pre-approved.&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Fails to block any unsolicited or unwanted messages from pre-approved addresses.&lt;br /&gt;
**Blocks all email from addresses not pre-approved, regardless of content, sender, situation, or potential benefit to the recipient.&lt;br /&gt;
**Eliminates the user's ability to receive desired or solicited email from unknown addresses.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Certainly, it would be difficult to defend the ethical nature of forcing users of an email service to employ a whitelist of approved addresses.  Whether for business or personal use, the importance of receiving mail from unknown addresses - friends with new or changed email addresses, business associates, new contacts, new clients, individuals who discovered a business via the web - is undeniable in daily life.  This approach may eliminate nearly all spam messages, with the exception of spam from individuals the recipient knows, but in the process it impacts the usability of email overall in a very severe, very negative fashion.  For many purposes, if an email address cannot receive mail from unknown addresses, it is entirely useless.  This approach essentially elevates the errors of the domain blocking approach to an entirely new level of severity.  While it may be valuable for applications such as parental controls and monitoring of children on the Internet, this approach is essentially useless for the purpose of blocking spam alone.  To force it on a user is to offer a substandard email service, which may be unethical and is certainly undesirable.  That said, however, there seems to be nothing wrong with &amp;lt;I&amp;gt;allowing&amp;lt;/I&amp;gt; users to choose a whitelist option for controlling email, should they so desire.  For a particular email address with specific uses and only a few potential senders, or for an individual who does not wish to be bothered by any unsolicited email whatsoever and who doesn't mind the hassle of learning of new individuals' email addresses by another means, this is an entirely viable option.  It is hardly unethical, of course, for a user to choose to seclude themselves from all but a handful of email addresses voluntarily.&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Note that a combination of the above two approaches eliminates many of the problems posed by each.  The use of a CAPTCHA authentication system, along with a whitelist of addresses for which the CAPTCHA is bypassed, is a particularly good solution relative to the others discussed here.  In such a scenario, unknown email may be received, but spam is effectively blocked or made time-prohibitive.  Many of the problems with the CAPTCHA scheme are addressed, as a CAPTCHA only needs to be completed once, after which an address can be added to a user's whitelist, and unrestricted communication may continue.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.captcha.net/ The CAPTCHA Project]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.earthlink.net/software/free/spamblocker/faq/ Earthlink SpamBlocker FAQ - CAPTCHA/Whitelist Approach]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.netmanners.com/email-whitelist-etiquette.html Article Explaining and Instructing in the Use of Whitelists]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Charge for Sent E-Mail&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A method which consists of levying a fee against the sender of an email for each message sent, akin to the electronic equivalent of a postage stamp&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Eliminates the positive revenue of sending spam messages, making their sending an undesirable business practice.&lt;br /&gt;
**Provides revenue ostensibly for the upkeep and improvement of email networks&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Could make mass emails cost-prohibitive for individuals who need to send out large numbers of messages, or for non-profit organizations.&lt;br /&gt;
**Users who already pay between ten and fifty dollars each month for internet service are likely to react poorly to being told that they have to pay more for emails.&lt;br /&gt;
**Raises the cost of internet access in general, making it less affordable to lower-income individuals.&lt;br /&gt;
**Logistically, imposing a fee on such a global medium as email would prove difficult if not impossible.&lt;br /&gt;
**Distribution, use, and escalation of the fee would probably become an issue in time.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The ethical nature of imposing a fee for emails is hardly a cut-and-dry question.  There does not seem to be anything unethical about charging a reasonable price for a service rendered, and using the revenue from that fee in a responsible manner.  However, many would say that it is unethical to charge an exorbitant or excessive fee, or to use the revenue generated by such a fee for irresponsible purposes.  Some would argue that current Internet Service Provider charges are already excessive, and that adding a fee for email would only exacerbate an already prevalent problem.  One essential question comes down to whether the fee for sent emails is to be used specifically to discourage spam, or whether internet providers might come to rely upon it as another stream of revenue, and as such, seek to maximize the profits they could gain from the fee by consistently raising the price of sending an email.  Clearly, the ethics of one use of the fee are an entirely different matter than the ethics of the other.  Also, with email being such a pervasive and worldwide phenomenon as it is, the logistics of ethically levying the fee across national boundaries, in various currencies, and in areas where corruption of public office runs rife, becomes a serious issue.  It goes without being said that no first-world organization would like to propose a global fee structure which, in another part of the world, might help to finance corrupt leaders, oppressive and inhumane public policies, or terrorism.  Thus, the question to whom, ultimately, the revenue of the fee is to be distributed must also be addressed.  Also, it would be undesirable for respectable nonprofit organizations to be effectively banned from using mass emails through an inability to afford the necessary postage cost.  However, provided that all of these issues could be settled satisfactorily, that there could be exceptions, as with United States postage, for nonprofit organizations, that the revenues were used ethically and fairly, and that the fee was nominal at most, charging a fee for emails sent does seem to be, when properly handled, an ethical proposal.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.consumeraffairs.com/news04/2006/02/email_postage.html AOL to Consider Charging for Emails]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.infowars.com/articles/ps/internet_tax_email_tax_is_coming.htm Article on a Possible Email Tax]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.snopes.com/business/taxes/bill602p.asp An Email Tax Hoax Exposed]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Opt-In for Commercial E-Mail&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A technique in which all commercial senders of email would require for a user to take action to choose to have commercial email sent to their address before they would receive any such mailings.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Eliminates all unsolicited commercial emails.&lt;br /&gt;
**Allows the user to receive any commercial emails which he or she may choose.&lt;br /&gt;
**Does not limit messages sent for personal or nonprofit use.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Disallows any potentially desirable commercial emails of which the user is not aware.&lt;br /&gt;
**Requires that companies use other, typically more expensive media to initially contact potential customers.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Opt-in commercial mailings eliminate all commercial emails not specifically solicited, and, contrary to all above approaches, do nothing to limit or discourage personal or nonprofit use of email in the process.  Perhaps it could be argued that requiring all commercial emails to be opt-in would impose somewhat of a burden on companies, but with the availability of other forms of advertising, especially Internet advertising, this would be a marginal burden at worst, and a small price to pay for the near-total elimination of spam.  While there are still some minor issues with this solution, such as the possibility that users might occasionally get a spam message that they end up putting to good use, these such concerns are not exactly ethical in nature, and, all in all, the solution of requiring opt-in lists for commercial emails seems like an ethical way to address the problem of spam.  However, in practicality, so-called opt in selections are by set to send emails by default, making them, in fact, the much less-desirable form of an opt-out program.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.clickz.com/showPage.html?page=3499691 Building an Opt-In Email List]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spamhaus.org/mailinglists.html Comparison of Various Opt-In / Opt-Out Programs as Related to Spam]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spambutcher.com/art1/486278/ Commentary on the Ambiguity of &amp;quot;Opt-In&amp;quot; Programs]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Domain Authentication&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Domain-authentication technologies are used to ensure that a sender's domain is not forged or &amp;quot;spoofed.&amp;quot; (1)&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Prevents spammers from hiding their location.&lt;br /&gt;
**Allows ISPs and others to hold spammers responsible for their spam.&lt;br /&gt;
**Discourages spam and other unethical e-mail.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**A standard way of doing domain authentication must be decided on.&lt;br /&gt;
**There are several companies that have say in how to do domain authentication, making it harder to reach a concensus.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Domain authentication would go a long way to helping ISPs and the government to hold the spammers responsible. Right now a spammer can mask their location so in essence they are sending you anonymous emails. After a standard for domain authentication is in place people will be able to see the actual person that sent the email. No more spoofing. This solution takes a little power away from the average emailer, but the ability to spoof is not an ability with any practical and ethical use.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://e-com.ic.gc.ca/epic/site/ecic-ceac.nsf/en/gv00298e.html Electronic Commerce in Canada]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://lwn.net/Articles/188685/ Domain Keys for email sender authentication]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.eweek.com/article2/0,4149,1430976,00.asp Yahoo Proposes Anti-Spam Standard For Internet]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Bounties&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;There is &amp;quot;a new proposal gaining momentum at the Federal Trade Commission that would award hard-cash bounties to ordinary citizens who help arrest the bane of email marketing today: spam&amp;quot;[http://www.econtentmag.com/Articles/ArticleReader.aspx?CategoryID=3&amp;amp;ArticleID=7616]&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages&lt;br /&gt;
**The average Joe could help find the offending spammers and stop them from filling our mailboxes&lt;br /&gt;
**Spammers would be more warry of sending out spam when they know that the person they are sending it to could get a nice reward for turning them in&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Greedy vigilanties would begin turning companies that had some technical violation.&lt;br /&gt;
**Well meaning companies that fail to meat some small specification my be eaten alive by the piranas that are the general public trying to make some quick cash&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&lt;br /&gt;
I don't think allowing the general public to collect bounties on companies that have made some small technical violation is a good idea. This would greatly hinder business because every small company would have to be experts on the law just to send out a well meaning email to their customers. It might be ok hold the really big businesses to a standard like this but small businesses can't afford to have a lawyer proof-read all of their email that they send out. With the definition of spam being somewhat gray, offering a bounty for anyone who catches spammers is at best going to waste a lot of time looking into these claims. &amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.econtentmag.com/Articles/ArticleReader.aspx?CategoryID=3&amp;amp;ArticleID=7616 Spam Bounties: Legitimate Email Marketers at Risk]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.eweek.com/article2/0,1759,1648051,00.asp Bounties Are Not the Answer to Spam]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.technewsworld.com/story/36816.html Laws, Bounties, International Cooperation Fighting Spam]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;The &amp;quot;Goodmail&amp;quot; Approach&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;The Goodmail approach is where a company can pay a certain amount to have their emails bypass the spam filters of their customers. The idea is that if a company is willing to pay to send you an email they aren't a scam or some phishing attempt.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages&lt;br /&gt;
**If each message you send costs a fraction of a cent then the recipient is more likely to get just legitimate email.&lt;br /&gt;
**If companies have to pay to send advertising email, then they might worker harder to specifically target their email.&lt;br /&gt;
**Companies will also send you mail less frequently if they have to pay for it.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**If a company can't afford to pay the fee then they lose a formerly free mode of advertising.&lt;br /&gt;
**Nonprofit Organizations would not be able to afford to pay the fee&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The Goodmail approach has very strict guidelines about which applicants they accept based on spam-complaint records. &amp;quot;Goodmail has rejected more than 75% of the companies that have applied for its Certified Email program, according to the company's chief executive, Richard Gingras.&amp;quot; [http://www.spamdailynews.com/publish/Goodmail_rejecting_three_quarters_of_applicants.asp] This means that there is a company out there deciding who should and who should not be allowed to send email. This is very unethical in my opinion. They should allow the fee itself to do the talking, if a company wishes to pay the fee then they can bypass the spam filters. This will go a long way to helping ensure the email one gets is legitimate. By allowing the goodmail people to decide who is and isn't allowed to use their service is just asking for corruption.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spamdailynews.com/publish/Goodmail_rejecting_three_quarters_of_applicants.asp Goodmail rejecting three quarters of applicants]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spamdailynews.com/publish/Goodmail_CertifiedEmail_will_not_reduce_spam.asp Goodmail: CertifiedEmail will not reduce spam]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://news.com.com/Leading+ISPs+sign+up+for+Goodmail+antispam+service/2100-7355_3-6189298.html Leading ISPs sign up for Goodmail antispam service]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Escrow Bonds&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A concept which involves email senders to pay an amount to an escrow service, the sum of which is released back to the sender if a message is not marked by the recipient as spam, but is lost if the message is identified as spam.  Variations include adding whitelists for which the escrow is bypassed, and blacklists for which the deposit is automatically lost.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Imposes a fee for emails which is only charged in the case of messages identified as spam.&lt;br /&gt;
**Makes spam cost-prohibitive while all other emails, commercial or otherwise, remain free.&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Requires the financing of third-party escrow agencies, allowing a new avenue of exploitation of the fee.&lt;br /&gt;
**Necessitates an effective online micro-payment system.&lt;br /&gt;
**Allows for the charging as spam of any messages marked as spam, perhaps accidentally, falsely, or maliciously, by the recipient.&lt;br /&gt;
**Requires that the logistics of independent escrow agencies for all emails sent in any countries be satisfactorily addressed.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The concept of an independent escrow system for emails does not inherently seem to pose any sort of ethical dilemma.  Such a scenario appears to address many of the concerns with the email postage solution, as, in this scheme, all non-spam emails are free.  However, while the concept does not pose any ethical concerns in principle, in practice, several problems arise.  Mainly, financing of the escrow services could possibly lead to concerns.  Multiple tiers of service, high costs, or &amp;quot;preferred&amp;quot; senders who could bypass escrow blacklists with spam could lead to corruption which would be, in all practicality, unethical.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://8stars.org/a/2003/03/13/more-on-fighting-spam/ A Spam Escrow Proposal]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.si.umich.edu/about-SI/news-detail.htm?NewsItemID=416 University of Michigan Proposal for A Spam Escrow Service]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.itu.int/osg/spu/spam/contributions/Spam%20economics-abm.pdf PDF Presentation on an Economic Bond Solution to Spam]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_3&amp;diff=1482</id>
		<title>CSC 379:Week 1, Group 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_3&amp;diff=1482"/>
		<updated>2007-07-07T13:07:17Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Spam-Blocking Techniques ==&lt;br /&gt;
&amp;lt;B&amp;gt;Domain Blocking&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A spam-blocking technique which consists of redirecting to &amp;quot;junk&amp;quot; email boxes or filtering entirely all emails from specific web domains which have been blacklisted for spamming in the past.&amp;lt;/I&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Domain-level blocking is an easy and cost-effective way to curtail large numbers of email addresses from which spam is sent.  The blocking of a single domain can block an infinite number of possible addresses in that domain.&lt;br /&gt;
**Blacklists used for domain-level blocking may be shared among numerous email providers, thus protecting subscribers to one service from spam sent to subscribers of any collaborating service.&lt;br /&gt;
**As there is typically a fee associated with acquiring a domain, spammers using blocked domains must pay to purchase a new domain if they are blacklisted.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Though purchasing domains is associated with a cost, it is typically a marginal expense and well within the budget of major spammers worldwide.  Thus, blocking a domain does little to prevent a spammer from spamming from a different domain.&lt;br /&gt;
**Though spam may originate from one address in a domain, blocking the entire domain may result in the blacklisting of multiple addresses of individuals or corporations which have not engaged in spam, and therefore should not have the receipt of their mail blocked.&lt;br /&gt;
**When a web domain previously blacklisted changes ownership, the new owners may remain blacklisted due to the actions of the previous owners, and at no fault of their own.&lt;br /&gt;
**Much spam is sent through &amp;quot;spoofed&amp;quot; email addresses in which the sending domain is misrepresented.  Blocking such a domain may prevent the receipt of email from a domain which is not associated with spam.&lt;br /&gt;
**Spam can be sent from &amp;quot;zombie&amp;quot; machines infected by malware which sends spam, but owned by individuals unaware that their machines are engaging in spamming.  Blocking the domains of these machines would block the receipt of mail from innocent users.&lt;br /&gt;
**Spam, especially spam from &amp;quot;zombie&amp;quot; machines, can come from typically reputable domains with thousands or millions of users.  Blocking such domains may degrade the quality of email service provided to a service's users to an unacceptable level.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt; &amp;lt;BR&amp;gt;&lt;br /&gt;
With so many ways to accidentally block non-spamming email addresses, the ethics of domain-level blocking are questionable at best.  The goal of blocking spam is to make email more productive by eliminating messages which would clearly be considered &amp;quot;junk&amp;quot; by the vast majority of users.  Taking a serious chance on intercepting email from well-intentioned addresses, therefore, runs counter to the goal of making the communications more productive.  Perhaps with a feature to unblock specific addresses from a domain and to receive all messages from a &amp;quot;junk&amp;quot; mailbox, this strategy would be more acceptable.  In its most basic form, however, the high probability of blocking non-spamming users challenges this method's claim to validity.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*[http://www.joewein.de/sw/spam-bl-e.htm List of Blacklisted Domains]&lt;br /&gt;
*[http://www.blacklistedip.com/ IP Blacklist Monitoring Service]&lt;br /&gt;
*[http://ezinearticles.com/?Blocking-Domain-Spam-Senders&amp;amp;id=374858 Article on Spam which Includes Domain Blocking]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Prior Approval&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A spam-blocking technique in which a sender must request the permission of either a user or an email provider before mail can be received by that user or a client of that provider.  This generally takes one of two forms, either the use of a CAPTCHA which a sender must pass in order for an email to be delivered, or a whitelist, controlled by a recipient, which explicitly states the only addresses from which email is received.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;CAPTCHA Approach&amp;lt;/I&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Completely eliminates the ability of computer controlled spamming &amp;quot;bots&amp;quot; to send mail to an address.&lt;br /&gt;
**Allows all mail from human users who can and will evaluate the CAPTCHA, thereby avoiding forcefully blocking well-intentioned human-sent mail.&lt;br /&gt;
**Discourages spam sent from human sources to many addresses, as such sending would involved the evaluation of numerous CAPTCHAs&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**For the same reason that this method discourages spam sent from humans to many addresses, it also discourages worthwhile messages sent to many addresses.&lt;br /&gt;
**Eliminates or severely hampers the user's ability to receive solicited automated emails.&lt;br /&gt;
**Does not strictly eliminate spam from human sources.&lt;br /&gt;
**Prevents the receipt of mail from the young, the old, the disabled, or others who may be incapable of evaluating the CAPTCHA&lt;br /&gt;
**Depending on the implementation of the system, a sender may not expect to be required to complete a CAPTCHA confirmation, and may assume that his or her message has been sent when it has not.&lt;br /&gt;
**Rather than eliminating the burden of wasted time and stress imposed by spam, this approach merely shifts it from the receiver to the sender, and imposes it for all emails rather than just spam.&amp;lt;BR&amp;gt;&lt;br /&gt;
**Advancing technology makes designing CAPTCHAs which are one step ahead of computer readability increasingly difficult with time.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
At face value, the CAPTCHA Prior Approval method for controlling spam seems inherently more ethical than the domain blocking approach.  However, this approach, too, has the potential to block solicited emails, both from automated services and from those without the ability, knowledge, expectation, or patience to fill out CAPTCHA forms.   It could therefore be argued that this approach unfairly targets and limits the ability of various demographic groups, mentioned above, to send email.  However, the biggest ethical challenge to the CAPTCHA approach is to ask what, exactly, it does to eliminate the burdens of spam.  After all, the act of eliminating spam is hardly an end in and of itself.  The point of all spam-controlling technologies is to save time, stress, and annoyance for the users of email.  It could be legitimately argued that this approach, while it does cut down on the number of spam messages received by an address, itself creates the same sort of burdens which spam imposes, and thereby does little or nothing to improve the usability of email.  The burden of one spam message is merely the time and effort required to read a subject line, identify a message as spam, and click the &amp;quot;delete&amp;quot; button.  The CAPTCHA approach eliminates automated spam, and should be lauded for that fact. However, it isn't too far-fetched to say that more time and effort is required to evaluate and answer a CAPTCHA, sometimes multiple times, depending on a user's skill or experience with the tests, than would be required to delete, en-masse, the spam which would be received if this technique were not used at all.  In essence, then, this approach merely shifts the burden of wasted time from sender to recipient, and to force such a waste of time on someone who may be busy, who may be sending an important email, is arguably just as unethical as forcing a recipient to delete messages at a time of his or her own choosing.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;The Whitelist Approach&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Allows a user complete and total control over from whom the user wishes to receive email.&lt;br /&gt;
**Completely blocks all unwanted mail from addresses which are not pre-approved.&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Fails to block any unsolicited or unwanted messages from pre-approved addresses.&lt;br /&gt;
**Blocks all email from addresses not pre-approved, regardless of content, sender, situation, or potential benefit to the recipient.&lt;br /&gt;
**Eliminates the user's ability to receive desired or solicited email from unknown addresses.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Certainly, it would be difficult to defend the ethical nature of forcing users of an email service to employ a whitelist of approved addresses.  Whether for business or personal use, the importance of receiving mail from unknown addresses - friends with new or changed email addresses, business associates, new contacts, new clients, individuals who discovered a business via the web - is undeniable in daily life.  This approach may eliminate nearly all spam messages, with the exception of spam from individuals the recipient knows, but in the process it impacts the usability of email overall in a very severe, very negative fashion.  For many purposes, if an email address cannot receive mail from unknown addresses, it is entirely useless.  This approach essentially elevates the errors of the domain blocking approach to an entirely new level of severity.  While it may be valuable for applications such as parental controls and monitoring of children on the Internet, this approach is essentially useless for the purpose of blocking spam alone.  To force it on a user is to offer a substandard email service, which may be unethical and is certainly undesirable.  That said, however, there seems to be nothing wrong with &amp;lt;I&amp;gt;allowing&amp;lt;/I&amp;gt; users to choose a whitelist option for controlling email, should they so desire.  For a particular email address with specific uses and only a few potential senders, or for an individual who does not wish to be bothered by any unsolicited email whatsoever and who doesn't mind the hassle of learning of new individuals' email addresses by another means, this is an entirely viable option.  It is hardly unethical, of course, for a user to choose to seclude themselves from all but a handful of email addresses voluntarily.&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Note that a combination of the above two approaches eliminates many of the problems posed by each.  The use of a CAPTCHA authentication system, along with a whitelist of addresses for which the CAPTCHA is bypassed, is a particularly good solution relative to the others discussed here.  In such a scenario, unknown email may be received, but spam is effectively blocked or made time-prohibitive.  Many of the problems with the CAPTCHA scheme are addressed, as a CAPTCHA only needs to be completed once, after which an address can be added to a user's whitelist, and unrestricted communication may continue.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.captcha.net/ The CAPTCHA Project]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.earthlink.net/software/free/spamblocker/faq/ Earthlink SpamBlocker FAQ - CAPTCHA/Whitelist Approach]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.netmanners.com/email-whitelist-etiquette.html Article Explaining and Instructing in the Use of Whitelists]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Charge for Sent E-Mail&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A method which consists of levying a fee against the sender of an email for each message sent, akin to the electronic equivalent of a postage stamp&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Eliminates the positive revenue of sending spam messages, making their sending an undesirable business practice.&lt;br /&gt;
**Provides revenue ostensibly for the upkeep and improvement of email networks&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Could make mass emails cost-prohibitive for individuals who need to send out large numbers of messages, or for non-profit organizations.&lt;br /&gt;
**Users who already pay between ten and fifty dollars each month for internet service are likely to react poorly to being told that they have to pay more for emails.&lt;br /&gt;
**Raises the cost of internet access in general, making it less affordable to lower-income individuals.&lt;br /&gt;
**Logistically, imposing a fee on such a global medium as email would prove difficult if not impossible.&lt;br /&gt;
**Distribution, use, and escalation of the fee would probably become an issue in time.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The ethical nature of imposing a fee for emails is hardly a cut-and-dry question.  There does not seem to be anything unethical about charging a reasonable price for a service rendered, and using the revenue from that fee in a responsible manner.  However, many would say that it is unethical to charge an exorbitant or excessive fee, or to use the revenue generated by such a fee for irresponsible purposes.  Some would argue that current Internet Service Provider charges are already excessive, and that adding a fee for email would only exacerbate an already prevalent problem.  One essential question comes down to whether the fee for sent emails is to be used specifically to discourage spam, or whether internet providers might come to rely upon it as another stream of revenue, and as such, seek to maximize the profits they could gain from the fee by consistently raising the price of sending an email.  Clearly, the ethics of one use of the fee are an entirely different matter than the ethics of the other.  Also, with email being such a pervasive and worldwide phenomenon as it is, the logistics of ethically levying the fee across national boundaries, in various currencies, and in areas where corruption of public office runs rife, becomes a serious issue.  It goes without being said that no first-world organization would like to propose a global fee structure which, in another part of the world, might help to finance corrupt leaders, oppressive and inhumane public policies, or terrorism.  Thus, the question to whom, ultimately, the revenue of the fee is to be distributed must also be addressed.  Also, it would be undesirable for respectable nonprofit organizations to be effectively banned from using mass emails through an inability to afford the necessary postage cost.  However, provided that all of these issues could be settled satisfactorily, that there could be exceptions, as with United States postage, for nonprofit organizations, that the revenues were used ethically and fairly, and that the fee was nominal at most, charging a fee for emails sent does seem to be, when properly handled, an ethical proposal.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.consumeraffairs.com/news04/2006/02/email_postage.html AOL to Consider Charging for Emails]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.infowars.com/articles/ps/internet_tax_email_tax_is_coming.htm Article on a Possible Email Tax]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.snopes.com/business/taxes/bill602p.asp An Email Tax Hoax Exposed]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Opt-In for Commercial E-Mail&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A technique in which all commercial senders of email would require for a user to take action to choose to have commercial email sent to their address before they would receive any such mailings.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Eliminates all unsolicited commercial emails.&lt;br /&gt;
**Allows the user to receive any commercial emails which he or she may choose.&lt;br /&gt;
**Does not limit messages sent for personal or nonprofit use.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Disallows any potentially desirable commercial emails of which the user is not aware.&lt;br /&gt;
**Requires that companies use other, typically more expensive media to initially contact potential customers.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Opt-in commercial mailings eliminate all commercial emails not specifically solicited, and, contrary to all above approaches, do nothing to limit or discourage personal or nonprofit use of email in the process.  Perhaps it could be argued that requiring all commercial emails to be opt-in would impose somewhat of a burden on companies, but with the availability of other forms of advertising, especially Internet advertising, this would be a marginal burden at worst, and a small price to pay for the near-total elimination of spam.  While there are still some minor issues with this solution, such as the possibility that users might occasionally get a spam message that they end up putting to good use, these such concerns are not exactly ethical in nature, and, all in all, the solution of requiring opt-in lists for commercial emails seems like an ethical way to address the problem of spam.  However, in practicality, so-called opt in selections are by set to send emails by default, making them, in fact, the much less-desirable form of an opt-out program.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.clickz.com/showPage.html?page=3499691 Building an Opt-In Email List]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spamhaus.org/mailinglists.html Comparison of Various Opt-In / Opt-Out Programs as Related to Spam]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spambutcher.com/art1/486278/ Commentary on the Ambiguity of &amp;quot;Opt-In&amp;quot; Programs]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Domain Authentication&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Domain-authentication technologies are used to ensure that a sender's domain is not forged or &amp;quot;spoofed.&amp;quot; (1)&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Prevents spammers from hiding their location.&lt;br /&gt;
**Allows ISPs and others to hold spammers responsible for their spam.&lt;br /&gt;
**Discourages spam and other unethical e-mail.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**A standard way of doing domain authentication must be decided on.&lt;br /&gt;
**There are several companies that have say in how to do domain authentication, making it harder to reach a concensus.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Domain authentication would go a long way to helping ISPs and the government to hold the spammers responsible. Right now a spammer can mask their location so in essence they are sending you anonymous emails. After a standard for domain authentication is in place people will be able to see the actual person that sent the email. No more spoofing. This solution takes a little power away from the average emailer, but the ability to spoof is not an ability with any practical and ethical use.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://e-com.ic.gc.ca/epic/site/ecic-ceac.nsf/en/gv00298e.html Electronic Commerce in Canada]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://lwn.net/Articles/188685/ Domain Keys for email sender authentication]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.eweek.com/article2/0,4149,1430976,00.asp Yahoo Proposes Anti-Spam Standard For Internet]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Bounties&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;The &amp;quot;Goodmail&amp;quot; Approach&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;The Goodmail approach is where a company can pay a certain amount to have their emails bypass the spam filters of their customers. The idea is that if a company is willing to pay to send you an email they aren't a scam or some phishing attempt.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages&lt;br /&gt;
**If each message you send costs a fraction of a cent then the recipient is more likely to get just legitimate email.&lt;br /&gt;
**If companies have to pay to send advertising email, then they might worker harder to specifically target their email.&lt;br /&gt;
**Companies will also send you mail less frequently if they have to pay for it.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**If a company can't afford to pay the fee then they lose a formerly free mode of advertising.&lt;br /&gt;
**Nonprofit Organizations would not be able to afford to pay the fee&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The Goodmail approach has very strict guidelines about which applicants they accept based on spam-complaint records. &amp;quot;Goodmail has rejected more than 75% of the companies that have applied for its Certified Email program, according to the company's chief executive, Richard Gingras.&amp;quot; [http://www.spamdailynews.com/publish/Goodmail_rejecting_three_quarters_of_applicants.asp] This means that there is a company out there deciding who should and who should not be allowed to send email. This is very unethical in my opinion. They should allow the fee itself to do the talking, if a company wishes to pay the fee then they can bypass the spam filters. This will go a long way to helping ensure the email one gets is legitimate. By allowing the goodmail people to decide who is and isn't allowed to use their service is just asking for corruption.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spamdailynews.com/publish/Goodmail_rejecting_three_quarters_of_applicants.asp Goodmail rejecting three quarters of applicants]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spamdailynews.com/publish/Goodmail_CertifiedEmail_will_not_reduce_spam.asp Goodmail: CertifiedEmail will not reduce spam]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://news.com.com/Leading+ISPs+sign+up+for+Goodmail+antispam+service/2100-7355_3-6189298.html Leading ISPs sign up for Goodmail antispam service]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Escrow Bonds&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A concept which involves email senders to pay an amount to an escrow service, the sum of which is released back to the sender if a message is not marked by the recipient as spam, but is lost if the message is identified as spam.  Variations include adding whitelists for which the escrow is bypassed, and blacklists for which the deposit is automatically lost.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Imposes a fee for emails which is only charged in the case of messages identified as spam.&lt;br /&gt;
**Makes spam cost-prohibitive while all other emails, commercial or otherwise, remain free.&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Requires the financing of third-party escrow agencies, allowing a new avenue of exploitation of the fee.&lt;br /&gt;
**Necessitates an effective online micro-payment system.&lt;br /&gt;
**Allows for the charging as spam of any messages marked as spam, perhaps accidentally, falsely, or maliciously, by the recipient.&lt;br /&gt;
**Requires that the logistics of independent escrow agencies for all emails sent in any countries be satisfactorily addressed.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The concept of an independent escrow system for emails does not inherently seem to pose any sort of ethical dilemma.  Such a scenario appears to address many of the concerns with the email postage solution, as, in this scheme, all non-spam emails are free.  However, while the concept does not pose any ethical concerns in principle, in practice, several problems arise.  Mainly, financing of the escrow services could possibly lead to concerns.  Multiple tiers of service, high costs, or &amp;quot;preferred&amp;quot; senders who could bypass escrow blacklists with spam could lead to corruption which would be, in all practicality, unethical.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://8stars.org/a/2003/03/13/more-on-fighting-spam/ A Spam Escrow Proposal]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.si.umich.edu/about-SI/news-detail.htm?NewsItemID=416 University of Michigan Proposal for A Spam Escrow Service]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.itu.int/osg/spu/spam/contributions/Spam%20economics-abm.pdf PDF Presentation on an Economic Bond Solution to Spam]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_3&amp;diff=1481</id>
		<title>CSC 379:Week 1, Group 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_3&amp;diff=1481"/>
		<updated>2007-07-07T13:06:24Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Spam-Blocking Techniques ==&lt;br /&gt;
&amp;lt;B&amp;gt;Domain Blocking&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A spam-blocking technique which consists of redirecting to &amp;quot;junk&amp;quot; email boxes or filtering entirely all emails from specific web domains which have been blacklisted for spamming in the past.&amp;lt;/I&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Domain-level blocking is an easy and cost-effective way to curtail large numbers of email addresses from which spam is sent.  The blocking of a single domain can block an infinite number of possible addresses in that domain.&lt;br /&gt;
**Blacklists used for domain-level blocking may be shared among numerous email providers, thus protecting subscribers to one service from spam sent to subscribers of any collaborating service.&lt;br /&gt;
**As there is typically a fee associated with acquiring a domain, spammers using blocked domains must pay to purchase a new domain if they are blacklisted.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Though purchasing domains is associated with a cost, it is typically a marginal expense and well within the budget of major spammers worldwide.  Thus, blocking a domain does little to prevent a spammer from spamming from a different domain.&lt;br /&gt;
**Though spam may originate from one address in a domain, blocking the entire domain may result in the blacklisting of multiple addresses of individuals or corporations which have not engaged in spam, and therefore should not have the receipt of their mail blocked.&lt;br /&gt;
**When a web domain previously blacklisted changes ownership, the new owners may remain blacklisted due to the actions of the previous owners, and at no fault of their own.&lt;br /&gt;
**Much spam is sent through &amp;quot;spoofed&amp;quot; email addresses in which the sending domain is misrepresented.  Blocking such a domain may prevent the receipt of email from a domain which is not associated with spam.&lt;br /&gt;
**Spam can be sent from &amp;quot;zombie&amp;quot; machines infected by malware which sends spam, but owned by individuals unaware that their machines are engaging in spamming.  Blocking the domains of these machines would block the receipt of mail from innocent users.&lt;br /&gt;
**Spam, especially spam from &amp;quot;zombie&amp;quot; machines, can come from typically reputable domains with thousands or millions of users.  Blocking such domains may degrade the quality of email service provided to a service's users to an unacceptable level.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt; &amp;lt;BR&amp;gt;&lt;br /&gt;
With so many ways to accidentally block non-spamming email addresses, the ethics of domain-level blocking are questionable at best.  The goal of blocking spam is to make email more productive by eliminating messages which would clearly be considered &amp;quot;junk&amp;quot; by the vast majority of users.  Taking a serious chance on intercepting email from well-intentioned addresses, therefore, runs counter to the goal of making the communications more productive.  Perhaps with a feature to unblock specific addresses from a domain and to receive all messages from a &amp;quot;junk&amp;quot; mailbox, this strategy would be more acceptable.  In its most basic form, however, the high probability of blocking non-spamming users challenges this method's claim to validity.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*[http://www.joewein.de/sw/spam-bl-e.htm List of Blacklisted Domains]&lt;br /&gt;
*[http://www.blacklistedip.com/ IP Blacklist Monitoring Service]&lt;br /&gt;
*[http://ezinearticles.com/?Blocking-Domain-Spam-Senders&amp;amp;id=374858 Article on Spam which Includes Domain Blocking]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Prior Approval&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A spam-blocking technique in which a sender must request the permission of either a user or an email provider before mail can be received by that user or a client of that provider.  This generally takes one of two forms, either the use of a CAPTCHA which a sender must pass in order for an email to be delivered, or a whitelist, controlled by a recipient, which explicitly states the only addresses from which email is received.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;CAPTCHA Approach&amp;lt;/I&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Completely eliminates the ability of computer controlled spamming &amp;quot;bots&amp;quot; to send mail to an address.&lt;br /&gt;
**Allows all mail from human users who can and will evaluate the CAPTCHA, thereby avoiding forcefully blocking well-intentioned human-sent mail.&lt;br /&gt;
**Discourages spam sent from human sources to many addresses, as such sending would involved the evaluation of numerous CAPTCHAs&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**For the same reason that this method discourages spam sent from humans to many addresses, it also discourages worthwhile messages sent to many addresses.&lt;br /&gt;
**Eliminates or severely hampers the user's ability to receive solicited automated emails.&lt;br /&gt;
**Does not strictly eliminate spam from human sources.&lt;br /&gt;
**Prevents the receipt of mail from the young, the old, the disabled, or others who may be incapable of evaluating the CAPTCHA&lt;br /&gt;
**Depending on the implementation of the system, a sender may not expect to be required to complete a CAPTCHA confirmation, and may assume that his or her message has been sent when it has not.&lt;br /&gt;
**Rather than eliminating the burden of wasted time and stress imposed by spam, this approach merely shifts it from the receiver to the sender, and imposes it for all emails rather than just spam.&amp;lt;BR&amp;gt;&lt;br /&gt;
**Advancing technology makes designing CAPTCHAs which are one step ahead of computer readability increasingly difficult with time.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
At face value, the CAPTCHA Prior Approval method for controlling spam seems inherently more ethical than the domain blocking approach.  However, this approach, too, has the potential to block solicited emails, both from automated services and from those without the ability, knowledge, expectation, or patience to fill out CAPTCHA forms.   It could therefore be argued that this approach unfairly targets and limits the ability of various demographic groups, mentioned above, to send email.  However, the biggest ethical challenge to the CAPTCHA approach is to ask what, exactly, it does to eliminate the burdens of spam.  After all, the act of eliminating spam is hardly an end in and of itself.  The point of all spam-controlling technologies is to save time, stress, and annoyance for the users of email.  It could be legitimately argued that this approach, while it does cut down on the number of spam messages received by an address, itself creates the same sort of burdens which spam imposes, and thereby does little or nothing to improve the usability of email.  The burden of one spam message is merely the time and effort required to read a subject line, identify a message as spam, and click the &amp;quot;delete&amp;quot; button.  The CAPTCHA approach eliminates automated spam, and should be lauded for that fact. However, it isn't too far-fetched to say that more time and effort is required to evaluate and answer a CAPTCHA, sometimes multiple times, depending on a user's skill or experience with the tests, than would be required to delete, en-masse, the spam which would be received if this technique were not used at all.  In essence, then, this approach merely shifts the burden of wasted time from sender to recipient, and to force such a waste of time on someone who may be busy, who may be sending an important email, is arguably just as unethical as forcing a recipient to delete messages at a time of his or her own choosing.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;The Whitelist Approach&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Allows a user complete and total control over from whom the user wishes to receive email.&lt;br /&gt;
**Completely blocks all unwanted mail from addresses which are not pre-approved.&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Fails to block any unsolicited or unwanted messages from pre-approved addresses.&lt;br /&gt;
**Blocks all email from addresses not pre-approved, regardless of content, sender, situation, or potential benefit to the recipient.&lt;br /&gt;
**Eliminates the user's ability to receive desired or solicited email from unknown addresses.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Certainly, it would be difficult to defend the ethical nature of forcing users of an email service to employ a whitelist of approved addresses.  Whether for business or personal use, the importance of receiving mail from unknown addresses - friends with new or changed email addresses, business associates, new contacts, new clients, individuals who discovered a business via the web - is undeniable in daily life.  This approach may eliminate nearly all spam messages, with the exception of spam from individuals the recipient knows, but in the process it impacts the usability of email overall in a very severe, very negative fashion.  For many purposes, if an email address cannot receive mail from unknown addresses, it is entirely useless.  This approach essentially elevates the errors of the domain blocking approach to an entirely new level of severity.  While it may be valuable for applications such as parental controls and monitoring of children on the Internet, this approach is essentially useless for the purpose of blocking spam alone.  To force it on a user is to offer a substandard email service, which may be unethical and is certainly undesirable.  That said, however, there seems to be nothing wrong with &amp;lt;I&amp;gt;allowing&amp;lt;/I&amp;gt; users to choose a whitelist option for controlling email, should they so desire.  For a particular email address with specific uses and only a few potential senders, or for an individual who does not wish to be bothered by any unsolicited email whatsoever and who doesn't mind the hassle of learning of new individuals' email addresses by another means, this is an entirely viable option.  It is hardly unethical, of course, for a user to choose to seclude themselves from all but a handful of email addresses voluntarily.&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Note that a combination of the above two approaches eliminates many of the problems posed by each.  The use of a CAPTCHA authentication system, along with a whitelist of addresses for which the CAPTCHA is bypassed, is a particularly good solution relative to the others discussed here.  In such a scenario, unknown email may be received, but spam is effectively blocked or made time-prohibitive.  Many of the problems with the CAPTCHA scheme are addressed, as a CAPTCHA only needs to be completed once, after which an address can be added to a user's whitelist, and unrestricted communication may continue.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.captcha.net/ The CAPTCHA Project]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.earthlink.net/software/free/spamblocker/faq/ Earthlink SpamBlocker FAQ - CAPTCHA/Whitelist Approach]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.netmanners.com/email-whitelist-etiquette.html Article Explaining and Instructing in the Use of Whitelists]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Charge for Sent E-Mail&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A method which consists of levying a fee against the sender of an email for each message sent, akin to the electronic equivalent of a postage stamp&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Eliminates the positive revenue of sending spam messages, making their sending an undesirable business practice.&lt;br /&gt;
**Provides revenue ostensibly for the upkeep and improvement of email networks&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Could make mass emails cost-prohibitive for individuals who need to send out large numbers of messages, or for non-profit organizations.&lt;br /&gt;
**Users who already pay between ten and fifty dollars each month for internet service are likely to react poorly to being told that they have to pay more for emails.&lt;br /&gt;
**Raises the cost of internet access in general, making it less affordable to lower-income individuals.&lt;br /&gt;
**Logistically, imposing a fee on such a global medium as email would prove difficult if not impossible.&lt;br /&gt;
**Distribution, use, and escalation of the fee would probably become an issue in time.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The ethical nature of imposing a fee for emails is hardly a cut-and-dry question.  There does not seem to be anything unethical about charging a reasonable price for a service rendered, and using the revenue from that fee in a responsible manner.  However, many would say that it is unethical to charge an exorbitant or excessive fee, or to use the revenue generated by such a fee for irresponsible purposes.  Some would argue that current Internet Service Provider charges are already excessive, and that adding a fee for email would only exacerbate an already prevalent problem.  One essential question comes down to whether the fee for sent emails is to be used specifically to discourage spam, or whether internet providers might come to rely upon it as another stream of revenue, and as such, seek to maximize the profits they could gain from the fee by consistently raising the price of sending an email.  Clearly, the ethics of one use of the fee are an entirely different matter than the ethics of the other.  Also, with email being such a pervasive and worldwide phenomenon as it is, the logistics of ethically levying the fee across national boundaries, in various currencies, and in areas where corruption of public office runs rife, becomes a serious issue.  It goes without being said that no first-world organization would like to propose a global fee structure which, in another part of the world, might help to finance corrupt leaders, oppressive and inhumane public policies, or terrorism.  Thus, the question to whom, ultimately, the revenue of the fee is to be distributed must also be addressed.  Also, it would be undesirable for respectable nonprofit organizations to be effectively banned from using mass emails through an inability to afford the necessary postage cost.  However, provided that all of these issues could be settled satisfactorily, that there could be exceptions, as with United States postage, for nonprofit organizations, that the revenues were used ethically and fairly, and that the fee was nominal at most, charging a fee for emails sent does seem to be, when properly handled, an ethical proposal.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.consumeraffairs.com/news04/2006/02/email_postage.html AOL to Consider Charging for Emails]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.infowars.com/articles/ps/internet_tax_email_tax_is_coming.htm Article on a Possible Email Tax]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.snopes.com/business/taxes/bill602p.asp An Email Tax Hoax Exposed]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Opt-In for Commercial E-Mail&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A technique in which all commercial senders of email would require for a user to take action to choose to have commercial email sent to their address before they would receive any such mailings.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Eliminates all unsolicited commercial emails.&lt;br /&gt;
**Allows the user to receive any commercial emails which he or she may choose.&lt;br /&gt;
**Does not limit messages sent for personal or nonprofit use.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Disallows any potentially desirable commercial emails of which the user is not aware.&lt;br /&gt;
**Requires that companies use other, typically more expensive media to initially contact potential customers.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Opt-in commercial mailings eliminate all commercial emails not specifically solicited, and, contrary to all above approaches, do nothing to limit or discourage personal or nonprofit use of email in the process.  Perhaps it could be argued that requiring all commercial emails to be opt-in would impose somewhat of a burden on companies, but with the availability of other forms of advertising, especially Internet advertising, this would be a marginal burden at worst, and a small price to pay for the near-total elimination of spam.  While there are still some minor issues with this solution, such as the possibility that users might occasionally get a spam message that they end up putting to good use, these such concerns are not exactly ethical in nature, and, all in all, the solution of requiring opt-in lists for commercial emails seems like an ethical way to address the problem of spam.  However, in practicality, so-called opt in selections are by set to send emails by default, making them, in fact, the much less-desirable form of an opt-out program.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.clickz.com/showPage.html?page=3499691 Building an Opt-In Email List]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spamhaus.org/mailinglists.html Comparison of Various Opt-In / Opt-Out Programs as Related to Spam]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spambutcher.com/art1/486278/ Commentary on the Ambiguity of &amp;quot;Opt-In&amp;quot; Programs]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Domain Authentication&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Domain-authentication technologies are used to ensure that a sender's domain is not forged or &amp;quot;spoofed.&amp;quot; (1)&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Prevents spammers from hiding their location.&lt;br /&gt;
**Allows ISPs and others to hold spammers responsible for their spam.&lt;br /&gt;
**Discourages spam and other unethical e-mail.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**A standard way of doing domain authentication must be decided on.&lt;br /&gt;
**There are several companies that have say in how to do domain authentication, making it harder to reach a concensus.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Domain authentication would go a long way to helping ISPs and the government to hold the spammers responsible. Right now a spammer can mask their location so in essence they are sending you anonymous emails. After a standard for domain authentication is in place people will be able to see the actual person that sent the email. No more spoofing. This solution takes a little power away from the average emailer, but the ability to spoof is not an ability with any practical and ethical use.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://e-com.ic.gc.ca/epic/site/ecic-ceac.nsf/en/gv00298e.html Electronic Commerce in Canada]&lt;br /&gt;
[http://lwn.net/Articles/188685/ Domain Keys for email sender authentication]&lt;br /&gt;
[http://www.eweek.com/article2/0,4149,1430976,00.asp Yahoo Proposes Anti-Spam Standard For Internet]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Bounties&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;The &amp;quot;Goodmail&amp;quot; Approach&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;The Goodmail approach is where a company can pay a certain amount to have their emails bypass the spam filters of their customers. The idea is that if a company is willing to pay to send you an email they aren't a scam or some phishing attempt.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages&lt;br /&gt;
**If each message you send costs a fraction of a cent then the recipient is more likely to get just legitimate email.&lt;br /&gt;
**If companies have to pay to send advertising email, then they might worker harder to specifically target their email.&lt;br /&gt;
**Companies will also send you mail less frequently if they have to pay for it.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**If a company can't afford to pay the fee then they lose a formerly free mode of advertising.&lt;br /&gt;
**Nonprofit Organizations would not be able to afford to pay the fee&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The Goodmail approach has very strict guidelines about which applicants they accept based on spam-complaint records. &amp;quot;Goodmail has rejected more than 75% of the companies that have applied for its Certified Email program, according to the company's chief executive, Richard Gingras.&amp;quot; [http://www.spamdailynews.com/publish/Goodmail_rejecting_three_quarters_of_applicants.asp] This means that there is a company out there deciding who should and who should not be allowed to send email. This is very unethical in my opinion. They should allow the fee itself to do the talking, if a company wishes to pay the fee then they can bypass the spam filters. This will go a long way to helping ensure the email one gets is legitimate. By allowing the goodmail people to decide who is and isn't allowed to use their service is just asking for corruption.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spamdailynews.com/publish/Goodmail_rejecting_three_quarters_of_applicants.asp Goodmail rejecting three quarters of applicants]&lt;br /&gt;
[http://www.spamdailynews.com/publish/Goodmail_CertifiedEmail_will_not_reduce_spam.asp Goodmail: CertifiedEmail will not reduce spam]&lt;br /&gt;
[http://news.com.com/Leading+ISPs+sign+up+for+Goodmail+antispam+service/2100-7355_3-6189298.html Leading ISPs sign up for Goodmail antispam service]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Escrow Bonds&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A concept which involves email senders to pay an amount to an escrow service, the sum of which is released back to the sender if a message is not marked by the recipient as spam, but is lost if the message is identified as spam.  Variations include adding whitelists for which the escrow is bypassed, and blacklists for which the deposit is automatically lost.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Imposes a fee for emails which is only charged in the case of messages identified as spam.&lt;br /&gt;
**Makes spam cost-prohibitive while all other emails, commercial or otherwise, remain free.&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Requires the financing of third-party escrow agencies, allowing a new avenue of exploitation of the fee.&lt;br /&gt;
**Necessitates an effective online micro-payment system.&lt;br /&gt;
**Allows for the charging as spam of any messages marked as spam, perhaps accidentally, falsely, or maliciously, by the recipient.&lt;br /&gt;
**Requires that the logistics of independent escrow agencies for all emails sent in any countries be satisfactorily addressed.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The concept of an independent escrow system for emails does not inherently seem to pose any sort of ethical dilemma.  Such a scenario appears to address many of the concerns with the email postage solution, as, in this scheme, all non-spam emails are free.  However, while the concept does not pose any ethical concerns in principle, in practice, several problems arise.  Mainly, financing of the escrow services could possibly lead to concerns.  Multiple tiers of service, high costs, or &amp;quot;preferred&amp;quot; senders who could bypass escrow blacklists with spam could lead to corruption which would be, in all practicality, unethical.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://8stars.org/a/2003/03/13/more-on-fighting-spam/ A Spam Escrow Proposal]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.si.umich.edu/about-SI/news-detail.htm?NewsItemID=416 University of Michigan Proposal for A Spam Escrow Service]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.itu.int/osg/spu/spam/contributions/Spam%20economics-abm.pdf PDF Presentation on an Economic Bond Solution to Spam]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_3&amp;diff=1480</id>
		<title>CSC 379:Week 1, Group 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_3&amp;diff=1480"/>
		<updated>2007-07-07T13:04:00Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Spam-Blocking Techniques ==&lt;br /&gt;
&amp;lt;B&amp;gt;Domain Blocking&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A spam-blocking technique which consists of redirecting to &amp;quot;junk&amp;quot; email boxes or filtering entirely all emails from specific web domains which have been blacklisted for spamming in the past.&amp;lt;/I&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Domain-level blocking is an easy and cost-effective way to curtail large numbers of email addresses from which spam is sent.  The blocking of a single domain can block an infinite number of possible addresses in that domain.&lt;br /&gt;
**Blacklists used for domain-level blocking may be shared among numerous email providers, thus protecting subscribers to one service from spam sent to subscribers of any collaborating service.&lt;br /&gt;
**As there is typically a fee associated with acquiring a domain, spammers using blocked domains must pay to purchase a new domain if they are blacklisted.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Though purchasing domains is associated with a cost, it is typically a marginal expense and well within the budget of major spammers worldwide.  Thus, blocking a domain does little to prevent a spammer from spamming from a different domain.&lt;br /&gt;
**Though spam may originate from one address in a domain, blocking the entire domain may result in the blacklisting of multiple addresses of individuals or corporations which have not engaged in spam, and therefore should not have the receipt of their mail blocked.&lt;br /&gt;
**When a web domain previously blacklisted changes ownership, the new owners may remain blacklisted due to the actions of the previous owners, and at no fault of their own.&lt;br /&gt;
**Much spam is sent through &amp;quot;spoofed&amp;quot; email addresses in which the sending domain is misrepresented.  Blocking such a domain may prevent the receipt of email from a domain which is not associated with spam.&lt;br /&gt;
**Spam can be sent from &amp;quot;zombie&amp;quot; machines infected by malware which sends spam, but owned by individuals unaware that their machines are engaging in spamming.  Blocking the domains of these machines would block the receipt of mail from innocent users.&lt;br /&gt;
**Spam, especially spam from &amp;quot;zombie&amp;quot; machines, can come from typically reputable domains with thousands or millions of users.  Blocking such domains may degrade the quality of email service provided to a service's users to an unacceptable level.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt; &amp;lt;BR&amp;gt;&lt;br /&gt;
With so many ways to accidentally block non-spamming email addresses, the ethics of domain-level blocking are questionable at best.  The goal of blocking spam is to make email more productive by eliminating messages which would clearly be considered &amp;quot;junk&amp;quot; by the vast majority of users.  Taking a serious chance on intercepting email from well-intentioned addresses, therefore, runs counter to the goal of making the communications more productive.  Perhaps with a feature to unblock specific addresses from a domain and to receive all messages from a &amp;quot;junk&amp;quot; mailbox, this strategy would be more acceptable.  In its most basic form, however, the high probability of blocking non-spamming users challenges this method's claim to validity.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*[http://www.joewein.de/sw/spam-bl-e.htm List of Blacklisted Domains]&lt;br /&gt;
*[http://www.blacklistedip.com/ IP Blacklist Monitoring Service]&lt;br /&gt;
*[http://ezinearticles.com/?Blocking-Domain-Spam-Senders&amp;amp;id=374858 Article on Spam which Includes Domain Blocking]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Prior Approval&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A spam-blocking technique in which a sender must request the permission of either a user or an email provider before mail can be received by that user or a client of that provider.  This generally takes one of two forms, either the use of a CAPTCHA which a sender must pass in order for an email to be delivered, or a whitelist, controlled by a recipient, which explicitly states the only addresses from which email is received.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;CAPTCHA Approach&amp;lt;/I&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Completely eliminates the ability of computer controlled spamming &amp;quot;bots&amp;quot; to send mail to an address.&lt;br /&gt;
**Allows all mail from human users who can and will evaluate the CAPTCHA, thereby avoiding forcefully blocking well-intentioned human-sent mail.&lt;br /&gt;
**Discourages spam sent from human sources to many addresses, as such sending would involved the evaluation of numerous CAPTCHAs&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**For the same reason that this method discourages spam sent from humans to many addresses, it also discourages worthwhile messages sent to many addresses.&lt;br /&gt;
**Eliminates or severely hampers the user's ability to receive solicited automated emails.&lt;br /&gt;
**Does not strictly eliminate spam from human sources.&lt;br /&gt;
**Prevents the receipt of mail from the young, the old, the disabled, or others who may be incapable of evaluating the CAPTCHA&lt;br /&gt;
**Depending on the implementation of the system, a sender may not expect to be required to complete a CAPTCHA confirmation, and may assume that his or her message has been sent when it has not.&lt;br /&gt;
**Rather than eliminating the burden of wasted time and stress imposed by spam, this approach merely shifts it from the receiver to the sender, and imposes it for all emails rather than just spam.&amp;lt;BR&amp;gt;&lt;br /&gt;
**Advancing technology makes designing CAPTCHAs which are one step ahead of computer readability increasingly difficult with time.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
At face value, the CAPTCHA Prior Approval method for controlling spam seems inherently more ethical than the domain blocking approach.  However, this approach, too, has the potential to block solicited emails, both from automated services and from those without the ability, knowledge, expectation, or patience to fill out CAPTCHA forms.   It could therefore be argued that this approach unfairly targets and limits the ability of various demographic groups, mentioned above, to send email.  However, the biggest ethical challenge to the CAPTCHA approach is to ask what, exactly, it does to eliminate the burdens of spam.  After all, the act of eliminating spam is hardly an end in and of itself.  The point of all spam-controlling technologies is to save time, stress, and annoyance for the users of email.  It could be legitimately argued that this approach, while it does cut down on the number of spam messages received by an address, itself creates the same sort of burdens which spam imposes, and thereby does little or nothing to improve the usability of email.  The burden of one spam message is merely the time and effort required to read a subject line, identify a message as spam, and click the &amp;quot;delete&amp;quot; button.  The CAPTCHA approach eliminates automated spam, and should be lauded for that fact. However, it isn't too far-fetched to say that more time and effort is required to evaluate and answer a CAPTCHA, sometimes multiple times, depending on a user's skill or experience with the tests, than would be required to delete, en-masse, the spam which would be received if this technique were not used at all.  In essence, then, this approach merely shifts the burden of wasted time from sender to recipient, and to force such a waste of time on someone who may be busy, who may be sending an important email, is arguably just as unethical as forcing a recipient to delete messages at a time of his or her own choosing.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;The Whitelist Approach&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Allows a user complete and total control over from whom the user wishes to receive email.&lt;br /&gt;
**Completely blocks all unwanted mail from addresses which are not pre-approved.&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Fails to block any unsolicited or unwanted messages from pre-approved addresses.&lt;br /&gt;
**Blocks all email from addresses not pre-approved, regardless of content, sender, situation, or potential benefit to the recipient.&lt;br /&gt;
**Eliminates the user's ability to receive desired or solicited email from unknown addresses.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Certainly, it would be difficult to defend the ethical nature of forcing users of an email service to employ a whitelist of approved addresses.  Whether for business or personal use, the importance of receiving mail from unknown addresses - friends with new or changed email addresses, business associates, new contacts, new clients, individuals who discovered a business via the web - is undeniable in daily life.  This approach may eliminate nearly all spam messages, with the exception of spam from individuals the recipient knows, but in the process it impacts the usability of email overall in a very severe, very negative fashion.  For many purposes, if an email address cannot receive mail from unknown addresses, it is entirely useless.  This approach essentially elevates the errors of the domain blocking approach to an entirely new level of severity.  While it may be valuable for applications such as parental controls and monitoring of children on the Internet, this approach is essentially useless for the purpose of blocking spam alone.  To force it on a user is to offer a substandard email service, which may be unethical and is certainly undesirable.  That said, however, there seems to be nothing wrong with &amp;lt;I&amp;gt;allowing&amp;lt;/I&amp;gt; users to choose a whitelist option for controlling email, should they so desire.  For a particular email address with specific uses and only a few potential senders, or for an individual who does not wish to be bothered by any unsolicited email whatsoever and who doesn't mind the hassle of learning of new individuals' email addresses by another means, this is an entirely viable option.  It is hardly unethical, of course, for a user to choose to seclude themselves from all but a handful of email addresses voluntarily.&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Note that a combination of the above two approaches eliminates many of the problems posed by each.  The use of a CAPTCHA authentication system, along with a whitelist of addresses for which the CAPTCHA is bypassed, is a particularly good solution relative to the others discussed here.  In such a scenario, unknown email may be received, but spam is effectively blocked or made time-prohibitive.  Many of the problems with the CAPTCHA scheme are addressed, as a CAPTCHA only needs to be completed once, after which an address can be added to a user's whitelist, and unrestricted communication may continue.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.captcha.net/ The CAPTCHA Project]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.earthlink.net/software/free/spamblocker/faq/ Earthlink SpamBlocker FAQ - CAPTCHA/Whitelist Approach]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.netmanners.com/email-whitelist-etiquette.html Article Explaining and Instructing in the Use of Whitelists]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Charge for Sent E-Mail&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A method which consists of levying a fee against the sender of an email for each message sent, akin to the electronic equivalent of a postage stamp&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Eliminates the positive revenue of sending spam messages, making their sending an undesirable business practice.&lt;br /&gt;
**Provides revenue ostensibly for the upkeep and improvement of email networks&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Could make mass emails cost-prohibitive for individuals who need to send out large numbers of messages, or for non-profit organizations.&lt;br /&gt;
**Users who already pay between ten and fifty dollars each month for internet service are likely to react poorly to being told that they have to pay more for emails.&lt;br /&gt;
**Raises the cost of internet access in general, making it less affordable to lower-income individuals.&lt;br /&gt;
**Logistically, imposing a fee on such a global medium as email would prove difficult if not impossible.&lt;br /&gt;
**Distribution, use, and escalation of the fee would probably become an issue in time.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The ethical nature of imposing a fee for emails is hardly a cut-and-dry question.  There does not seem to be anything unethical about charging a reasonable price for a service rendered, and using the revenue from that fee in a responsible manner.  However, many would say that it is unethical to charge an exorbitant or excessive fee, or to use the revenue generated by such a fee for irresponsible purposes.  Some would argue that current Internet Service Provider charges are already excessive, and that adding a fee for email would only exacerbate an already prevalent problem.  One essential question comes down to whether the fee for sent emails is to be used specifically to discourage spam, or whether internet providers might come to rely upon it as another stream of revenue, and as such, seek to maximize the profits they could gain from the fee by consistently raising the price of sending an email.  Clearly, the ethics of one use of the fee are an entirely different matter than the ethics of the other.  Also, with email being such a pervasive and worldwide phenomenon as it is, the logistics of ethically levying the fee across national boundaries, in various currencies, and in areas where corruption of public office runs rife, becomes a serious issue.  It goes without being said that no first-world organization would like to propose a global fee structure which, in another part of the world, might help to finance corrupt leaders, oppressive and inhumane public policies, or terrorism.  Thus, the question to whom, ultimately, the revenue of the fee is to be distributed must also be addressed.  Also, it would be undesirable for respectable nonprofit organizations to be effectively banned from using mass emails through an inability to afford the necessary postage cost.  However, provided that all of these issues could be settled satisfactorily, that there could be exceptions, as with United States postage, for nonprofit organizations, that the revenues were used ethically and fairly, and that the fee was nominal at most, charging a fee for emails sent does seem to be, when properly handled, an ethical proposal.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.consumeraffairs.com/news04/2006/02/email_postage.html AOL to Consider Charging for Emails]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.infowars.com/articles/ps/internet_tax_email_tax_is_coming.htm Article on a Possible Email Tax]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.snopes.com/business/taxes/bill602p.asp An Email Tax Hoax Exposed]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Opt-In for Commercial E-Mail&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A technique in which all commercial senders of email would require for a user to take action to choose to have commercial email sent to their address before they would receive any such mailings.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Eliminates all unsolicited commercial emails.&lt;br /&gt;
**Allows the user to receive any commercial emails which he or she may choose.&lt;br /&gt;
**Does not limit messages sent for personal or nonprofit use.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Disallows any potentially desirable commercial emails of which the user is not aware.&lt;br /&gt;
**Requires that companies use other, typically more expensive media to initially contact potential customers.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Opt-in commercial mailings eliminate all commercial emails not specifically solicited, and, contrary to all above approaches, do nothing to limit or discourage personal or nonprofit use of email in the process.  Perhaps it could be argued that requiring all commercial emails to be opt-in would impose somewhat of a burden on companies, but with the availability of other forms of advertising, especially Internet advertising, this would be a marginal burden at worst, and a small price to pay for the near-total elimination of spam.  While there are still some minor issues with this solution, such as the possibility that users might occasionally get a spam message that they end up putting to good use, these such concerns are not exactly ethical in nature, and, all in all, the solution of requiring opt-in lists for commercial emails seems like an ethical way to address the problem of spam.  However, in practicality, so-called opt in selections are by set to send emails by default, making them, in fact, the much less-desirable form of an opt-out program.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.clickz.com/showPage.html?page=3499691 Building an Opt-In Email List]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spamhaus.org/mailinglists.html Comparison of Various Opt-In / Opt-Out Programs as Related to Spam]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spambutcher.com/art1/486278/ Commentary on the Ambiguity of &amp;quot;Opt-In&amp;quot; Programs]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Domain Authentication&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Domain-authentication technologies are used to ensure that a sender's domain is not forged or &amp;quot;spoofed.&amp;quot; (1)&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Prevents spammers from hiding their location.&lt;br /&gt;
**Allows ISPs and others to hold spammers responsible for their spam.&lt;br /&gt;
**Discourages spam and other unethical e-mail.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**A standard way of doing domain authentication must be decided on.&lt;br /&gt;
**There are several companies that have say in how to do domain authentication, making it harder to reach a concensus.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Domain authentication would go a long way to helping ISPs and the government to hold the spammers responsible. Right now a spammer can mask their location so in essence they are sending you anonymous emails. After a standard for domain authentication is in place people will be able to see the actual person that sent the email. No more spoofing. This solution takes a little power away from the average emailer, but the ability to spoof is not an ability with any practical and ethical use.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://e-com.ic.gc.ca/epic/site/ecic-ceac.nsf/en/gv00298e.html Electronic Commerce in Canada]&lt;br /&gt;
[http://lwn.net/Articles/188685/ Domain Keys for email sender authentication]&lt;br /&gt;
[http://www.eweek.com/article2/0,4149,1430976,00.asp Yahoo Proposes Anti-Spam Standard For Internet]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Bounties&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;The &amp;quot;Goodmail&amp;quot; Approach&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;The Goodmail approach is where a company can pay a certain amount to have their emails bypass the spam filters of their customers. The idea is that if a company is willing to pay to send you an email they aren't a scam or some phishing attempt.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages&lt;br /&gt;
**If each message you send costs a fraction of a cent then the recipient is more likely to get just legitimate email.&lt;br /&gt;
**If companies have to pay to send advertising email, then they might worker harder to specifically target their email.&lt;br /&gt;
**Companies will also send you mail less frequently if they have to pay for it.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**If a company can't afford to pay the fee then they lose a formerly free mode of advertising.&lt;br /&gt;
**Nonprofit Organizations would not be able to afford to pay the fee&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The Goodmail approach has very strict guidelines about which applicants they accept based on spam-complaint records. &amp;quot;Goodmail has rejected more than 75% of the companies that have applied for its Certified Email program, according to the company's chief executive, Richard Gingras.&amp;quot; [http://www.spamdailynews.com/publish/Goodmail_rejecting_three_quarters_of_applicants.asp] This means that there is a company out there deciding who should and who should not be allowed to send email. This is very unethical in my opinion. They should allow the fee itself to do the talking, if a company wishes to pay the fee then they can bypass the spam filters. This will go a long way to helping ensure the email one gets is legitimate. By allowing the goodmail people to decide who is and isn't allowed to use their service is just asking for corruption.&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Escrow Bonds&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A concept which involves email senders to pay an amount to an escrow service, the sum of which is released back to the sender if a message is not marked by the recipient as spam, but is lost if the message is identified as spam.  Variations include adding whitelists for which the escrow is bypassed, and blacklists for which the deposit is automatically lost.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Imposes a fee for emails which is only charged in the case of messages identified as spam.&lt;br /&gt;
**Makes spam cost-prohibitive while all other emails, commercial or otherwise, remain free.&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Requires the financing of third-party escrow agencies, allowing a new avenue of exploitation of the fee.&lt;br /&gt;
**Necessitates an effective online micro-payment system.&lt;br /&gt;
**Allows for the charging as spam of any messages marked as spam, perhaps accidentally, falsely, or maliciously, by the recipient.&lt;br /&gt;
**Requires that the logistics of independent escrow agencies for all emails sent in any countries be satisfactorily addressed.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The concept of an independent escrow system for emails does not inherently seem to pose any sort of ethical dilemma.  Such a scenario appears to address many of the concerns with the email postage solution, as, in this scheme, all non-spam emails are free.  However, while the concept does not pose any ethical concerns in principle, in practice, several problems arise.  Mainly, financing of the escrow services could possibly lead to concerns.  Multiple tiers of service, high costs, or &amp;quot;preferred&amp;quot; senders who could bypass escrow blacklists with spam could lead to corruption which would be, in all practicality, unethical.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://8stars.org/a/2003/03/13/more-on-fighting-spam/ A Spam Escrow Proposal]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.si.umich.edu/about-SI/news-detail.htm?NewsItemID=416 University of Michigan Proposal for A Spam Escrow Service]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.itu.int/osg/spu/spam/contributions/Spam%20economics-abm.pdf PDF Presentation on an Economic Bond Solution to Spam]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_3&amp;diff=1476</id>
		<title>CSC 379:Week 1, Group 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_3&amp;diff=1476"/>
		<updated>2007-07-07T12:43:28Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Spam-Blocking Techniques ==&lt;br /&gt;
&amp;lt;B&amp;gt;Domain Blocking&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A spam-blocking technique which consists of redirecting to &amp;quot;junk&amp;quot; email boxes or filtering entirely all emails from specific web domains which have been blacklisted for spamming in the past.&amp;lt;/I&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Domain-level blocking is an easy and cost-effective way to curtail large numbers of email addresses from which spam is sent.  The blocking of a single domain can block an infinite number of possible addresses in that domain.&lt;br /&gt;
**Blacklists used for domain-level blocking may be shared among numerous email providers, thus protecting subscribers to one service from spam sent to subscribers of any collaborating service.&lt;br /&gt;
**As there is typically a fee associated with acquiring a domain, spammers using blocked domains must pay to purchase a new domain if they are blacklisted.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Though purchasing domains is associated with a cost, it is typically a marginal expense and well within the budget of major spammers worldwide.  Thus, blocking a domain does little to prevent a spammer from spamming from a different domain.&lt;br /&gt;
**Though spam may originate from one address in a domain, blocking the entire domain may result in the blacklisting of multiple addresses of individuals or corporations which have not engaged in spam, and therefore should not have the receipt of their mail blocked.&lt;br /&gt;
**When a web domain previously blacklisted changes ownership, the new owners may remain blacklisted due to the actions of the previous owners, and at no fault of their own.&lt;br /&gt;
**Much spam is sent through &amp;quot;spoofed&amp;quot; email addresses in which the sending domain is misrepresented.  Blocking such a domain may prevent the receipt of email from a domain which is not associated with spam.&lt;br /&gt;
**Spam can be sent from &amp;quot;zombie&amp;quot; machines infected by malware which sends spam, but owned by individuals unaware that their machines are engaging in spamming.  Blocking the domains of these machines would block the receipt of mail from innocent users.&lt;br /&gt;
**Spam, especially spam from &amp;quot;zombie&amp;quot; machines, can come from typically reputable domains with thousands or millions of users.  Blocking such domains may degrade the quality of email service provided to a service's users to an unacceptable level.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt; &amp;lt;BR&amp;gt;&lt;br /&gt;
With so many ways to accidentally block non-spamming email addresses, the ethics of domain-level blocking are questionable at best.  The goal of blocking spam is to make email more productive by eliminating messages which would clearly be considered &amp;quot;junk&amp;quot; by the vast majority of users.  Taking a serious chance on intercepting email from well-intentioned addresses, therefore, runs counter to the goal of making the communications more productive.  Perhaps with a feature to unblock specific addresses from a domain and to receive all messages from a &amp;quot;junk&amp;quot; mailbox, this strategy would be more acceptable.  In its most basic form, however, the high probability of blocking non-spamming users challenges this method's claim to validity.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*[http://www.joewein.de/sw/spam-bl-e.htm List of Blacklisted Domains]&lt;br /&gt;
*[http://www.blacklistedip.com/ IP Blacklist Monitoring Service]&lt;br /&gt;
*[http://ezinearticles.com/?Blocking-Domain-Spam-Senders&amp;amp;id=374858 Article on Spam which Includes Domain Blocking]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Prior Approval&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A spam-blocking technique in which a sender must request the permission of either a user or an email provider before mail can be received by that user or a client of that provider.  This generally takes one of two forms, either the use of a CAPTCHA which a sender must pass in order for an email to be delivered, or a whitelist, controlled by a recipient, which explicitly states the only addresses from which email is received.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;CAPTCHA Approach&amp;lt;/I&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Completely eliminates the ability of computer controlled spamming &amp;quot;bots&amp;quot; to send mail to an address.&lt;br /&gt;
**Allows all mail from human users who can and will evaluate the CAPTCHA, thereby avoiding forcefully blocking well-intentioned human-sent mail.&lt;br /&gt;
**Discourages spam sent from human sources to many addresses, as such sending would involved the evaluation of numerous CAPTCHAs&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**For the same reason that this method discourages spam sent from humans to many addresses, it also discourages worthwhile messages sent to many addresses.&lt;br /&gt;
**Eliminates or severely hampers the user's ability to receive solicited automated emails.&lt;br /&gt;
**Does not strictly eliminate spam from human sources.&lt;br /&gt;
**Prevents the receipt of mail from the young, the old, the disabled, or others who may be incapable of evaluating the CAPTCHA&lt;br /&gt;
**Depending on the implementation of the system, a sender may not expect to be required to complete a CAPTCHA confirmation, and may assume that his or her message has been sent when it has not.&lt;br /&gt;
**Rather than eliminating the burden of wasted time and stress imposed by spam, this approach merely shifts it from the receiver to the sender, and imposes it for all emails rather than just spam.&amp;lt;BR&amp;gt;&lt;br /&gt;
**Advancing technology makes designing CAPTCHAs which are one step ahead of computer readability increasingly difficult with time.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
At face value, the CAPTCHA Prior Approval method for controlling spam seems inherently more ethical than the domain blocking approach.  However, this approach, too, has the potential to block solicited emails, both from automated services and from those without the ability, knowledge, expectation, or patience to fill out CAPTCHA forms.   It could therefore be argued that this approach unfairly targets and limits the ability of various demographic groups, mentioned above, to send email.  However, the biggest ethical challenge to the CAPTCHA approach is to ask what, exactly, it does to eliminate the burdens of spam.  After all, the act of eliminating spam is hardly an end in and of itself.  The point of all spam-controlling technologies is to save time, stress, and annoyance for the users of email.  It could be legitimately argued that this approach, while it does cut down on the number of spam messages received by an address, itself creates the same sort of burdens which spam imposes, and thereby does little or nothing to improve the usability of email.  The burden of one spam message is merely the time and effort required to read a subject line, identify a message as spam, and click the &amp;quot;delete&amp;quot; button.  The CAPTCHA approach eliminates automated spam, and should be lauded for that fact. However, it isn't too far-fetched to say that more time and effort is required to evaluate and answer a CAPTCHA, sometimes multiple times, depending on a user's skill or experience with the tests, than would be required to delete, en-masse, the spam which would be received if this technique were not used at all.  In essence, then, this approach merely shifts the burden of wasted time from sender to recipient, and to force such a waste of time on someone who may be busy, who may be sending an important email, is arguably just as unethical as forcing a recipient to delete messages at a time of his or her own choosing.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;The Whitelist Approach&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Allows a user complete and total control over from whom the user wishes to receive email.&lt;br /&gt;
**Completely blocks all unwanted mail from addresses which are not pre-approved.&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Fails to block any unsolicited or unwanted messages from pre-approved addresses.&lt;br /&gt;
**Blocks all email from addresses not pre-approved, regardless of content, sender, situation, or potential benefit to the recipient.&lt;br /&gt;
**Eliminates the user's ability to receive desired or solicited email from unknown addresses.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Certainly, it would be difficult to defend the ethical nature of forcing users of an email service to employ a whitelist of approved addresses.  Whether for business or personal use, the importance of receiving mail from unknown addresses - friends with new or changed email addresses, business associates, new contacts, new clients, individuals who discovered a business via the web - is undeniable in daily life.  This approach may eliminate nearly all spam messages, with the exception of spam from individuals the recipient knows, but in the process it impacts the usability of email overall in a very severe, very negative fashion.  For many purposes, if an email address cannot receive mail from unknown addresses, it is entirely useless.  This approach essentially elevates the errors of the domain blocking approach to an entirely new level of severity.  While it may be valuable for applications such as parental controls and monitoring of children on the Internet, this approach is essentially useless for the purpose of blocking spam alone.  To force it on a user is to offer a substandard email service, which may be unethical and is certainly undesirable.  That said, however, there seems to be nothing wrong with &amp;lt;I&amp;gt;allowing&amp;lt;/I&amp;gt; users to choose a whitelist option for controlling email, should they so desire.  For a particular email address with specific uses and only a few potential senders, or for an individual who does not wish to be bothered by any unsolicited email whatsoever and who doesn't mind the hassle of learning of new individuals' email addresses by another means, this is an entirely viable option.  It is hardly unethical, of course, for a user to choose to seclude themselves from all but a handful of email addresses voluntarily.&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Note that a combination of the above two approaches eliminates many of the problems posed by each.  The use of a CAPTCHA authentication system, along with a whitelist of addresses for which the CAPTCHA is bypassed, is a particularly good solution relative to the others discussed here.  In such a scenario, unknown email may be received, but spam is effectively blocked or made time-prohibitive.  Many of the problems with the CAPTCHA scheme are addressed, as a CAPTCHA only needs to be completed once, after which an address can be added to a user's whitelist, and unrestricted communication may continue.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.captcha.net/ The CAPTCHA Project]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.earthlink.net/software/free/spamblocker/faq/ Earthlink SpamBlocker FAQ - CAPTCHA/Whitelist Approach]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.netmanners.com/email-whitelist-etiquette.html Article Explaining and Instructing in the Use of Whitelists]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Charge for Sent E-Mail&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A method which consists of levying a fee against the sender of an email for each message sent, akin to the electronic equivalent of a postage stamp&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Eliminates the positive revenue of sending spam messages, making their sending an undesirable business practice.&lt;br /&gt;
**Provides revenue ostensibly for the upkeep and improvement of email networks&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Could make mass emails cost-prohibitive for individuals who need to send out large numbers of messages, or for non-profit organizations.&lt;br /&gt;
**Users who already pay between ten and fifty dollars each month for internet service are likely to react poorly to being told that they have to pay more for emails.&lt;br /&gt;
**Raises the cost of internet access in general, making it less affordable to lower-income individuals.&lt;br /&gt;
**Logistically, imposing a fee on such a global medium as email would prove difficult if not impossible.&lt;br /&gt;
**Distribution, use, and escalation of the fee would probably become an issue in time.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The ethical nature of imposing a fee for emails is hardly a cut-and-dry question.  There does not seem to be anything unethical about charging a reasonable price for a service rendered, and using the revenue from that fee in a responsible manner.  However, many would say that it is unethical to charge an exorbitant or excessive fee, or to use the revenue generated by such a fee for irresponsible purposes.  Some would argue that current Internet Service Provider charges are already excessive, and that adding a fee for email would only exacerbate an already prevalent problem.  One essential question comes down to whether the fee for sent emails is to be used specifically to discourage spam, or whether internet providers might come to rely upon it as another stream of revenue, and as such, seek to maximize the profits they could gain from the fee by consistently raising the price of sending an email.  Clearly, the ethics of one use of the fee are an entirely different matter than the ethics of the other.  Also, with email being such a pervasive and worldwide phenomenon as it is, the logistics of ethically levying the fee across national boundaries, in various currencies, and in areas where corruption of public office runs rife, becomes a serious issue.  It goes without being said that no first-world organization would like to propose a global fee structure which, in another part of the world, might help to finance corrupt leaders, oppressive and inhumane public policies, or terrorism.  Thus, the question to whom, ultimately, the revenue of the fee is to be distributed must also be addressed.  Also, it would be undesirable for respectable nonprofit organizations to be effectively banned from using mass emails through an inability to afford the necessary postage cost.  However, provided that all of these issues could be settled satisfactorily, that there could be exceptions, as with United States postage, for nonprofit organizations, that the revenues were used ethically and fairly, and that the fee was nominal at most, charging a fee for emails sent does seem to be, when properly handled, an ethical proposal.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.consumeraffairs.com/news04/2006/02/email_postage.html AOL to Consider Charging for Emails]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.infowars.com/articles/ps/internet_tax_email_tax_is_coming.htm Article on a Possible Email Tax]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.snopes.com/business/taxes/bill602p.asp An Email Tax Hoax Exposed]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Opt-In for Commercial E-Mail&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A technique in which all commercial senders of email would require for a user to take action to choose to have commercial email sent to their address before they would receive any such mailings.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Eliminates all unsolicited commercial emails.&lt;br /&gt;
**Allows the user to receive any commercial emails which he or she may choose.&lt;br /&gt;
**Does not limit messages sent for personal or nonprofit use.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Disallows any potentially desirable commercial emails of which the user is not aware.&lt;br /&gt;
**Requires that companies use other, typically more expensive media to initially contact potential customers.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Opt-in commercial mailings eliminate all commercial emails not specifically solicited, and, contrary to all above approaches, do nothing to limit or discourage personal or nonprofit use of email in the process.  Perhaps it could be argued that requiring all commercial emails to be opt-in would impose somewhat of a burden on companies, but with the availability of other forms of advertising, especially Internet advertising, this would be a marginal burden at worst, and a small price to pay for the near-total elimination of spam.  While there are still some minor issues with this solution, such as the possibility that users might occasionally get a spam message that they end up putting to good use, these such concerns are not exactly ethical in nature, and, all in all, the solution of requiring opt-in lists for commercial emails seems like an ethical way to address the problem of spam.  However, in practicality, so-called opt in selections are by set to send emails by default, making them, in fact, the much less-desirable form of an opt-out program.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.clickz.com/showPage.html?page=3499691 Building an Opt-In Email List]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spamhaus.org/mailinglists.html Comparison of Various Opt-In / Opt-Out Programs as Related to Spam]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spambutcher.com/art1/486278/ Commentary on the Ambiguity of &amp;quot;Opt-In&amp;quot; Programs]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Domain Authentication&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Domain-authentication technologies are used to ensure that a sender's domain is not forged or &amp;quot;spoofed.&amp;quot; (1)&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Prevents spammers from hiding their location.&lt;br /&gt;
**Allows ISPs and others to hold spammers responsible for their spam.&lt;br /&gt;
**Discourages spam and other unethical e-mail.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**A standard way of doing domain authentication must be decided on.&lt;br /&gt;
**There are several companies that have say in how to do domain authentication, making it harder to reach a concensus.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Domain authentication would go a long way to helping ISPs and the government to hold the spammers responsible. Right now a spammer can mask their location so in essence they are sending you anonymous emails. After a standard for domain authentication is in place people will be able to see the actual person that sent the email. No more spoofing. This solution takes a little power away from the average emailer, but the ability to spoof is not an ability with any practical and ethical use.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://e-com.ic.gc.ca/epic/site/ecic-ceac.nsf/en/gv00298e.html Electronic Commerce in Canada]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Bounties&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;The &amp;quot;Goodmail&amp;quot; Approach&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Escrow Bonds&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A concept which involves email senders to pay an amount to an escrow service, the sum of which is released back to the sender if a message is not marked by the recipient as spam, but is lost if the message is identified as spam.  Variations include adding whitelists for which the escrow is bypassed, and blacklists for which the deposit is automatically lost.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Imposes a fee for emails which is only charged in the case of messages identified as spam.&lt;br /&gt;
**Makes spam cost-prohibitive while all other emails, commercial or otherwise, remain free.&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Requires the financing of third-party escrow agencies, allowing a new avenue of exploitation of the fee.&lt;br /&gt;
**Necessitates an effective online micro-payment system.&lt;br /&gt;
**Allows for the charging as spam of any messages marked as spam, perhaps accidentally, falsely, or maliciously, by the recipient.&lt;br /&gt;
**Requires that the logistics of independent escrow agencies for all emails sent in any countries be satisfactorily addressed.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The concept of an independent escrow system for emails does not inherently seem to pose any sort of ethical dilemma.  Such a scenario appears to address many of the concerns with the email postage solution, as, in this scheme, all non-spam emails are free.  However, while the concept does not pose any ethical concerns in principle, in practice, several problems arise.  Mainly, financing of the escrow services could possibly lead to concerns.  Multiple tiers of service, high costs, or &amp;quot;preferred&amp;quot; senders who could bypass escrow blacklists with spam could lead to corruption which would be, in all practicality, unethical.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://8stars.org/a/2003/03/13/more-on-fighting-spam/ A Spam Escrow Proposal]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.si.umich.edu/about-SI/news-detail.htm?NewsItemID=416 University of Michigan Proposal for A Spam Escrow Service]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.itu.int/osg/spu/spam/contributions/Spam%20economics-abm.pdf PDF Presentation on an Economic Bond Solution to Spam]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_3&amp;diff=1475</id>
		<title>CSC 379:Week 1, Group 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_3&amp;diff=1475"/>
		<updated>2007-07-07T12:42:55Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Spam-Blocking Techniques ==&lt;br /&gt;
&amp;lt;B&amp;gt;Domain Blocking&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A spam-blocking technique which consists of redirecting to &amp;quot;junk&amp;quot; email boxes or filtering entirely all emails from specific web domains which have been blacklisted for spamming in the past.&amp;lt;/I&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Domain-level blocking is an easy and cost-effective way to curtail large numbers of email addresses from which spam is sent.  The blocking of a single domain can block an infinite number of possible addresses in that domain.&lt;br /&gt;
**Blacklists used for domain-level blocking may be shared among numerous email providers, thus protecting subscribers to one service from spam sent to subscribers of any collaborating service.&lt;br /&gt;
**As there is typically a fee associated with acquiring a domain, spammers using blocked domains must pay to purchase a new domain if they are blacklisted.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Though purchasing domains is associated with a cost, it is typically a marginal expense and well within the budget of major spammers worldwide.  Thus, blocking a domain does little to prevent a spammer from spamming from a different domain.&lt;br /&gt;
**Though spam may originate from one address in a domain, blocking the entire domain may result in the blacklisting of multiple addresses of individuals or corporations which have not engaged in spam, and therefore should not have the receipt of their mail blocked.&lt;br /&gt;
**When a web domain previously blacklisted changes ownership, the new owners may remain blacklisted due to the actions of the previous owners, and at no fault of their own.&lt;br /&gt;
**Much spam is sent through &amp;quot;spoofed&amp;quot; email addresses in which the sending domain is misrepresented.  Blocking such a domain may prevent the receipt of email from a domain which is not associated with spam.&lt;br /&gt;
**Spam can be sent from &amp;quot;zombie&amp;quot; machines infected by malware which sends spam, but owned by individuals unaware that their machines are engaging in spamming.  Blocking the domains of these machines would block the receipt of mail from innocent users.&lt;br /&gt;
**Spam, especially spam from &amp;quot;zombie&amp;quot; machines, can come from typically reputable domains with thousands or millions of users.  Blocking such domains may degrade the quality of email service provided to a service's users to an unacceptable level.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt; &amp;lt;BR&amp;gt;&lt;br /&gt;
With so many ways to accidentally block non-spamming email addresses, the ethics of domain-level blocking are questionable at best.  The goal of blocking spam is to make email more productive by eliminating messages which would clearly be considered &amp;quot;junk&amp;quot; by the vast majority of users.  Taking a serious chance on intercepting email from well-intentioned addresses, therefore, runs counter to the goal of making the communications more productive.  Perhaps with a feature to unblock specific addresses from a domain and to receive all messages from a &amp;quot;junk&amp;quot; mailbox, this strategy would be more acceptable.  In its most basic form, however, the high probability of blocking non-spamming users challenges this method's claim to validity.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*[http://www.joewein.de/sw/spam-bl-e.htm List of Blacklisted Domains]&lt;br /&gt;
*[http://www.blacklistedip.com/ IP Blacklist Monitoring Service]&lt;br /&gt;
*[http://ezinearticles.com/?Blocking-Domain-Spam-Senders&amp;amp;id=374858 Article on Spam which Includes Domain Blocking]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Prior Approval&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A spam-blocking technique in which a sender must request the permission of either a user or an email provider before mail can be received by that user or a client of that provider.  This generally takes one of two forms, either the use of a CAPTCHA which a sender must pass in order for an email to be delivered, or a whitelist, controlled by a recipient, which explicitly states the only addresses from which email is received.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;CAPTCHA Approach&amp;lt;/I&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Completely eliminates the ability of computer controlled spamming &amp;quot;bots&amp;quot; to send mail to an address.&lt;br /&gt;
**Allows all mail from human users who can and will evaluate the CAPTCHA, thereby avoiding forcefully blocking well-intentioned human-sent mail.&lt;br /&gt;
**Discourages spam sent from human sources to many addresses, as such sending would involved the evaluation of numerous CAPTCHAs&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**For the same reason that this method discourages spam sent from humans to many addresses, it also discourages worthwhile messages sent to many addresses.&lt;br /&gt;
**Eliminates or severely hampers the user's ability to receive solicited automated emails.&lt;br /&gt;
**Does not strictly eliminate spam from human sources.&lt;br /&gt;
**Prevents the receipt of mail from the young, the old, the disabled, or others who may be incapable of evaluating the CAPTCHA&lt;br /&gt;
**Depending on the implementation of the system, a sender may not expect to be required to complete a CAPTCHA confirmation, and may assume that his or her message has been sent when it has not.&lt;br /&gt;
**Rather than eliminating the burden of wasted time and stress imposed by spam, this approach merely shifts it from the receiver to the sender, and imposes it for all emails rather than just spam.&amp;lt;BR&amp;gt;&lt;br /&gt;
**Advancing technology makes designing CAPTCHAs which are one step ahead of computer readability increasingly difficult with time.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
At face value, the CAPTCHA Prior Approval method for controlling spam seems inherently more ethical than the domain blocking approach.  However, this approach, too, has the potential to block solicited emails, both from automated services and from those without the ability, knowledge, expectation, or patience to fill out CAPTCHA forms.   It could therefore be argued that this approach unfairly targets and limits the ability of various demographic groups, mentioned above, to send email.  However, the biggest ethical challenge to the CAPTCHA approach is to ask what, exactly, it does to eliminate the burdens of spam.  After all, the act of eliminating spam is hardly an end in and of itself.  The point of all spam-controlling technologies is to save time, stress, and annoyance for the users of email.  It could be legitimately argued that this approach, while it does cut down on the number of spam messages received by an address, itself creates the same sort of burdens which spam imposes, and thereby does little or nothing to improve the usability of email.  The burden of one spam message is merely the time and effort required to read a subject line, identify a message as spam, and click the &amp;quot;delete&amp;quot; button.  The CAPTCHA approach eliminates automated spam, and should be lauded for that fact. However, it isn't too far-fetched to say that more time and effort is required to evaluate and answer a CAPTCHA, sometimes multiple times, depending on a user's skill or experience with the tests, than would be required to delete, en-masse, the spam which would be received if this technique were not used at all.  In essence, then, this approach merely shifts the burden of wasted time from sender to recipient, and to force such a waste of time on someone who may be busy, who may be sending an important email, is arguably just as unethical as forcing a recipient to delete messages at a time of his or her own choosing.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;The Whitelist Approach&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Allows a user complete and total control over from whom the user wishes to receive email.&lt;br /&gt;
**Completely blocks all unwanted mail from addresses which are not pre-approved.&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Fails to block any unsolicited or unwanted messages from pre-approved addresses.&lt;br /&gt;
**Blocks all email from addresses not pre-approved, regardless of content, sender, situation, or potential benefit to the recipient.&lt;br /&gt;
**Eliminates the user's ability to receive desired or solicited email from unknown addresses.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Certainly, it would be difficult to defend the ethical nature of forcing users of an email service to employ a whitelist of approved addresses.  Whether for business or personal use, the importance of receiving mail from unknown addresses - friends with new or changed email addresses, business associates, new contacts, new clients, individuals who discovered a business via the web - is undeniable in daily life.  This approach may eliminate nearly all spam messages, with the exception of spam from individuals the recipient knows, but in the process it impacts the usability of email overall in a very severe, very negative fashion.  For many purposes, if an email address cannot receive mail from unknown addresses, it is entirely useless.  This approach essentially elevates the errors of the domain blocking approach to an entirely new level of severity.  While it may be valuable for applications such as parental controls and monitoring of children on the Internet, this approach is essentially useless for the purpose of blocking spam alone.  To force it on a user is to offer a substandard email service, which may be unethical and is certainly undesirable.  That said, however, there seems to be nothing wrong with &amp;lt;I&amp;gt;allowing&amp;lt;/I&amp;gt; users to choose a whitelist option for controlling email, should they so desire.  For a particular email address with specific uses and only a few potential senders, or for an individual who does not wish to be bothered by any unsolicited email whatsoever and who doesn't mind the hassle of learning of new individuals' email addresses by another means, this is an entirely viable option.  It is hardly unethical, of course, for a user to choose to seclude themselves from all but a handful of email addresses voluntarily.&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Note that a combination of the above two approaches eliminates many of the problems posed by each.  The use of a CAPTCHA authentication system, along with a whitelist of addresses for which the CAPTCHA is bypassed, is a particularly good solution relative to the others discussed here.  In such a scenario, unknown email may be received, but spam is effectively blocked or made time-prohibitive.  Many of the problems with the CAPTCHA scheme are addressed, as a CAPTCHA only needs to be completed once, after which an address can be added to a user's whitelist, and unrestricted communication may continue.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.captcha.net/ The CAPTCHA Project]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.earthlink.net/software/free/spamblocker/faq/ Earthlink SpamBlocker FAQ - CAPTCHA/Whitelist Approach]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.netmanners.com/email-whitelist-etiquette.html Article Explaining and Instructing in the Use of Whitelists]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Charge for Sent E-Mail&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A method which consists of levying a fee against the sender of an email for each message sent, akin to the electronic equivalent of a postage stamp&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Eliminates the positive revenue of sending spam messages, making their sending an undesirable business practice.&lt;br /&gt;
**Provides revenue ostensibly for the upkeep and improvement of email networks&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Could make mass emails cost-prohibitive for individuals who need to send out large numbers of messages, or for non-profit organizations.&lt;br /&gt;
**Users who already pay between ten and fifty dollars each month for internet service are likely to react poorly to being told that they have to pay more for emails.&lt;br /&gt;
**Raises the cost of internet access in general, making it less affordable to lower-income individuals.&lt;br /&gt;
**Logistically, imposing a fee on such a global medium as email would prove difficult if not impossible.&lt;br /&gt;
**Distribution, use, and escalation of the fee would probably become an issue in time.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The ethical nature of imposing a fee for emails is hardly a cut-and-dry question.  There does not seem to be anything unethical about charging a reasonable price for a service rendered, and using the revenue from that fee in a responsible manner.  However, many would say that it is unethical to charge an exorbitant or excessive fee, or to use the revenue generated by such a fee for irresponsible purposes.  Some would argue that current Internet Service Provider charges are already excessive, and that adding a fee for email would only exacerbate an already prevalent problem.  One essential question comes down to whether the fee for sent emails is to be used specifically to discourage spam, or whether internet providers might come to rely upon it as another stream of revenue, and as such, seek to maximize the profits they could gain from the fee by consistently raising the price of sending an email.  Clearly, the ethics of one use of the fee are an entirely different matter than the ethics of the other.  Also, with email being such a pervasive and worldwide phenomenon as it is, the logistics of ethically levying the fee across national boundaries, in various currencies, and in areas where corruption of public office runs rife, becomes a serious issue.  It goes without being said that no first-world organization would like to propose a global fee structure which, in another part of the world, might help to finance corrupt leaders, oppressive and inhumane public policies, or terrorism.  Thus, the question to whom, ultimately, the revenue of the fee is to be distributed must also be addressed.  Also, it would be undesirable for respectable nonprofit organizations to be effectively banned from using mass emails through an inability to afford the necessary postage cost.  However, provided that all of these issues could be settled satisfactorily, that there could be exceptions, as with United States postage, for nonprofit organizations, that the revenues were used ethically and fairly, and that the fee was nominal at most, charging a fee for emails sent does seem to be, when properly handled, an ethical proposal.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.consumeraffairs.com/news04/2006/02/email_postage.html AOL to Consider Charging for Emails]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.infowars.com/articles/ps/internet_tax_email_tax_is_coming.htm Article on a Possible Email Tax]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.snopes.com/business/taxes/bill602p.asp An Email Tax Hoax Exposed]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Opt-In for Commercial E-Mail&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A technique in which all commercial senders of email would require for a user to take action to choose to have commercial email sent to their address before they would receive any such mailings.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Eliminates all unsolicited commercial emails.&lt;br /&gt;
**Allows the user to receive any commercial emails which he or she may choose.&lt;br /&gt;
**Does not limit messages sent for personal or nonprofit use.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Disallows any potentially desirable commercial emails of which the user is not aware.&lt;br /&gt;
**Requires that companies use other, typically more expensive media to initially contact potential customers.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Opt-in commercial mailings eliminate all commercial emails not specifically solicited, and, contrary to all above approaches, do nothing to limit or discourage personal or nonprofit use of email in the process.  Perhaps it could be argued that requiring all commercial emails to be opt-in would impose somewhat of a burden on companies, but with the availability of other forms of advertising, especially Internet advertising, this would be a marginal burden at worst, and a small price to pay for the near-total elimination of spam.  While there are still some minor issues with this solution, such as the possibility that users might occasionally get a spam message that they end up putting to good use, these such concerns are not exactly ethical in nature, and, all in all, the solution of requiring opt-in lists for commercial emails seems like an ethical way to address the problem of spam.  However, in practicality, so-called opt in selections are by set to send emails by default, making them, in fact, the much less-desirable form of an opt-out program.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.clickz.com/showPage.html?page=3499691 Building an Opt-In Email List]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spamhaus.org/mailinglists.html Comparison of Various Opt-In / Opt-Out Programs as Related to Spam]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spambutcher.com/art1/486278/ Commentary on the Ambiguity of &amp;quot;Opt-In&amp;quot; Programs]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Domain Authentication&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Domain-authentication technologies are used to ensure that a sender's domain is not forged or &amp;quot;spoofed.&amp;quot; (1)&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Prevents spammers from hiding their location.&lt;br /&gt;
**Allows ISPs and others to hold spammers responsible for their spam.&lt;br /&gt;
**Discourages spam and other unethical e-mail.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**A standard way of doing domain authentication must be decided on.&lt;br /&gt;
**There are several companies that have say in how to do domain authentication, making it harder to reach a concensus.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Domain authentication would go a long way to helping ISPs and the government to hold the spammers responsible. Right now a spammer can mask their location so in essence they are sending you anonymous emails. After a standard for domain authentication is in place people will be able to see the actual person that sent the email. No more spoofing. This solution takes a little power away from the average emailer, but the ability to spoof is not an ability with any practical and ethical use.&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://e-com.ic.gc.ca/epic/site/ecic-ceac.nsf/en/gv00298e.html Electronic Commerce in Canada]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Bounties&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;The &amp;quot;Goodmail&amp;quot; Approach&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Escrow Bonds&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A concept which involves email senders to pay an amount to an escrow service, the sum of which is released back to the sender if a message is not marked by the recipient as spam, but is lost if the message is identified as spam.  Variations include adding whitelists for which the escrow is bypassed, and blacklists for which the deposit is automatically lost.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Imposes a fee for emails which is only charged in the case of messages identified as spam.&lt;br /&gt;
**Makes spam cost-prohibitive while all other emails, commercial or otherwise, remain free.&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Requires the financing of third-party escrow agencies, allowing a new avenue of exploitation of the fee.&lt;br /&gt;
**Necessitates an effective online micro-payment system.&lt;br /&gt;
**Allows for the charging as spam of any messages marked as spam, perhaps accidentally, falsely, or maliciously, by the recipient.&lt;br /&gt;
**Requires that the logistics of independent escrow agencies for all emails sent in any countries be satisfactorily addressed.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The concept of an independent escrow system for emails does not inherently seem to pose any sort of ethical dilemma.  Such a scenario appears to address many of the concerns with the email postage solution, as, in this scheme, all non-spam emails are free.  However, while the concept does not pose any ethical concerns in principle, in practice, several problems arise.  Mainly, financing of the escrow services could possibly lead to concerns.  Multiple tiers of service, high costs, or &amp;quot;preferred&amp;quot; senders who could bypass escrow blacklists with spam could lead to corruption which would be, in all practicality, unethical.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://8stars.org/a/2003/03/13/more-on-fighting-spam/ A Spam Escrow Proposal]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.si.umich.edu/about-SI/news-detail.htm?NewsItemID=416 University of Michigan Proposal for A Spam Escrow Service]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.itu.int/osg/spu/spam/contributions/Spam%20economics-abm.pdf PDF Presentation on an Economic Bond Solution to Spam]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_3&amp;diff=1474</id>
		<title>CSC 379:Week 1, Group 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_3&amp;diff=1474"/>
		<updated>2007-07-07T12:41:40Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Spam-Blocking Techniques ==&lt;br /&gt;
&amp;lt;B&amp;gt;Domain Blocking&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A spam-blocking technique which consists of redirecting to &amp;quot;junk&amp;quot; email boxes or filtering entirely all emails from specific web domains which have been blacklisted for spamming in the past.&amp;lt;/I&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Domain-level blocking is an easy and cost-effective way to curtail large numbers of email addresses from which spam is sent.  The blocking of a single domain can block an infinite number of possible addresses in that domain.&lt;br /&gt;
**Blacklists used for domain-level blocking may be shared among numerous email providers, thus protecting subscribers to one service from spam sent to subscribers of any collaborating service.&lt;br /&gt;
**As there is typically a fee associated with acquiring a domain, spammers using blocked domains must pay to purchase a new domain if they are blacklisted.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Though purchasing domains is associated with a cost, it is typically a marginal expense and well within the budget of major spammers worldwide.  Thus, blocking a domain does little to prevent a spammer from spamming from a different domain.&lt;br /&gt;
**Though spam may originate from one address in a domain, blocking the entire domain may result in the blacklisting of multiple addresses of individuals or corporations which have not engaged in spam, and therefore should not have the receipt of their mail blocked.&lt;br /&gt;
**When a web domain previously blacklisted changes ownership, the new owners may remain blacklisted due to the actions of the previous owners, and at no fault of their own.&lt;br /&gt;
**Much spam is sent through &amp;quot;spoofed&amp;quot; email addresses in which the sending domain is misrepresented.  Blocking such a domain may prevent the receipt of email from a domain which is not associated with spam.&lt;br /&gt;
**Spam can be sent from &amp;quot;zombie&amp;quot; machines infected by malware which sends spam, but owned by individuals unaware that their machines are engaging in spamming.  Blocking the domains of these machines would block the receipt of mail from innocent users.&lt;br /&gt;
**Spam, especially spam from &amp;quot;zombie&amp;quot; machines, can come from typically reputable domains with thousands or millions of users.  Blocking such domains may degrade the quality of email service provided to a service's users to an unacceptable level.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt; &amp;lt;BR&amp;gt;&lt;br /&gt;
With so many ways to accidentally block non-spamming email addresses, the ethics of domain-level blocking are questionable at best.  The goal of blocking spam is to make email more productive by eliminating messages which would clearly be considered &amp;quot;junk&amp;quot; by the vast majority of users.  Taking a serious chance on intercepting email from well-intentioned addresses, therefore, runs counter to the goal of making the communications more productive.  Perhaps with a feature to unblock specific addresses from a domain and to receive all messages from a &amp;quot;junk&amp;quot; mailbox, this strategy would be more acceptable.  In its most basic form, however, the high probability of blocking non-spamming users challenges this method's claim to validity.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*[http://www.joewein.de/sw/spam-bl-e.htm List of Blacklisted Domains]&lt;br /&gt;
*[http://www.blacklistedip.com/ IP Blacklist Monitoring Service]&lt;br /&gt;
*[http://ezinearticles.com/?Blocking-Domain-Spam-Senders&amp;amp;id=374858 Article on Spam which Includes Domain Blocking]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Prior Approval&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A spam-blocking technique in which a sender must request the permission of either a user or an email provider before mail can be received by that user or a client of that provider.  This generally takes one of two forms, either the use of a CAPTCHA which a sender must pass in order for an email to be delivered, or a whitelist, controlled by a recipient, which explicitly states the only addresses from which email is received.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;CAPTCHA Approach&amp;lt;/I&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Completely eliminates the ability of computer controlled spamming &amp;quot;bots&amp;quot; to send mail to an address.&lt;br /&gt;
**Allows all mail from human users who can and will evaluate the CAPTCHA, thereby avoiding forcefully blocking well-intentioned human-sent mail.&lt;br /&gt;
**Discourages spam sent from human sources to many addresses, as such sending would involved the evaluation of numerous CAPTCHAs&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**For the same reason that this method discourages spam sent from humans to many addresses, it also discourages worthwhile messages sent to many addresses.&lt;br /&gt;
**Eliminates or severely hampers the user's ability to receive solicited automated emails.&lt;br /&gt;
**Does not strictly eliminate spam from human sources.&lt;br /&gt;
**Prevents the receipt of mail from the young, the old, the disabled, or others who may be incapable of evaluating the CAPTCHA&lt;br /&gt;
**Depending on the implementation of the system, a sender may not expect to be required to complete a CAPTCHA confirmation, and may assume that his or her message has been sent when it has not.&lt;br /&gt;
**Rather than eliminating the burden of wasted time and stress imposed by spam, this approach merely shifts it from the receiver to the sender, and imposes it for all emails rather than just spam.&amp;lt;BR&amp;gt;&lt;br /&gt;
**Advancing technology makes designing CAPTCHAs which are one step ahead of computer readability increasingly difficult with time.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
At face value, the CAPTCHA Prior Approval method for controlling spam seems inherently more ethical than the domain blocking approach.  However, this approach, too, has the potential to block solicited emails, both from automated services and from those without the ability, knowledge, expectation, or patience to fill out CAPTCHA forms.   It could therefore be argued that this approach unfairly targets and limits the ability of various demographic groups, mentioned above, to send email.  However, the biggest ethical challenge to the CAPTCHA approach is to ask what, exactly, it does to eliminate the burdens of spam.  After all, the act of eliminating spam is hardly an end in and of itself.  The point of all spam-controlling technologies is to save time, stress, and annoyance for the users of email.  It could be legitimately argued that this approach, while it does cut down on the number of spam messages received by an address, itself creates the same sort of burdens which spam imposes, and thereby does little or nothing to improve the usability of email.  The burden of one spam message is merely the time and effort required to read a subject line, identify a message as spam, and click the &amp;quot;delete&amp;quot; button.  The CAPTCHA approach eliminates automated spam, and should be lauded for that fact. However, it isn't too far-fetched to say that more time and effort is required to evaluate and answer a CAPTCHA, sometimes multiple times, depending on a user's skill or experience with the tests, than would be required to delete, en-masse, the spam which would be received if this technique were not used at all.  In essence, then, this approach merely shifts the burden of wasted time from sender to recipient, and to force such a waste of time on someone who may be busy, who may be sending an important email, is arguably just as unethical as forcing a recipient to delete messages at a time of his or her own choosing.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;The Whitelist Approach&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Allows a user complete and total control over from whom the user wishes to receive email.&lt;br /&gt;
**Completely blocks all unwanted mail from addresses which are not pre-approved.&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Fails to block any unsolicited or unwanted messages from pre-approved addresses.&lt;br /&gt;
**Blocks all email from addresses not pre-approved, regardless of content, sender, situation, or potential benefit to the recipient.&lt;br /&gt;
**Eliminates the user's ability to receive desired or solicited email from unknown addresses.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Certainly, it would be difficult to defend the ethical nature of forcing users of an email service to employ a whitelist of approved addresses.  Whether for business or personal use, the importance of receiving mail from unknown addresses - friends with new or changed email addresses, business associates, new contacts, new clients, individuals who discovered a business via the web - is undeniable in daily life.  This approach may eliminate nearly all spam messages, with the exception of spam from individuals the recipient knows, but in the process it impacts the usability of email overall in a very severe, very negative fashion.  For many purposes, if an email address cannot receive mail from unknown addresses, it is entirely useless.  This approach essentially elevates the errors of the domain blocking approach to an entirely new level of severity.  While it may be valuable for applications such as parental controls and monitoring of children on the Internet, this approach is essentially useless for the purpose of blocking spam alone.  To force it on a user is to offer a substandard email service, which may be unethical and is certainly undesirable.  That said, however, there seems to be nothing wrong with &amp;lt;I&amp;gt;allowing&amp;lt;/I&amp;gt; users to choose a whitelist option for controlling email, should they so desire.  For a particular email address with specific uses and only a few potential senders, or for an individual who does not wish to be bothered by any unsolicited email whatsoever and who doesn't mind the hassle of learning of new individuals' email addresses by another means, this is an entirely viable option.  It is hardly unethical, of course, for a user to choose to seclude themselves from all but a handful of email addresses voluntarily.&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Note that a combination of the above two approaches eliminates many of the problems posed by each.  The use of a CAPTCHA authentication system, along with a whitelist of addresses for which the CAPTCHA is bypassed, is a particularly good solution relative to the others discussed here.  In such a scenario, unknown email may be received, but spam is effectively blocked or made time-prohibitive.  Many of the problems with the CAPTCHA scheme are addressed, as a CAPTCHA only needs to be completed once, after which an address can be added to a user's whitelist, and unrestricted communication may continue.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.captcha.net/ The CAPTCHA Project]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.earthlink.net/software/free/spamblocker/faq/ Earthlink SpamBlocker FAQ - CAPTCHA/Whitelist Approach]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.netmanners.com/email-whitelist-etiquette.html Article Explaining and Instructing in the Use of Whitelists]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Charge for Sent E-Mail&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A method which consists of levying a fee against the sender of an email for each message sent, akin to the electronic equivalent of a postage stamp&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Eliminates the positive revenue of sending spam messages, making their sending an undesirable business practice.&lt;br /&gt;
**Provides revenue ostensibly for the upkeep and improvement of email networks&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Could make mass emails cost-prohibitive for individuals who need to send out large numbers of messages, or for non-profit organizations.&lt;br /&gt;
**Users who already pay between ten and fifty dollars each month for internet service are likely to react poorly to being told that they have to pay more for emails.&lt;br /&gt;
**Raises the cost of internet access in general, making it less affordable to lower-income individuals.&lt;br /&gt;
**Logistically, imposing a fee on such a global medium as email would prove difficult if not impossible.&lt;br /&gt;
**Distribution, use, and escalation of the fee would probably become an issue in time.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The ethical nature of imposing a fee for emails is hardly a cut-and-dry question.  There does not seem to be anything unethical about charging a reasonable price for a service rendered, and using the revenue from that fee in a responsible manner.  However, many would say that it is unethical to charge an exorbitant or excessive fee, or to use the revenue generated by such a fee for irresponsible purposes.  Some would argue that current Internet Service Provider charges are already excessive, and that adding a fee for email would only exacerbate an already prevalent problem.  One essential question comes down to whether the fee for sent emails is to be used specifically to discourage spam, or whether internet providers might come to rely upon it as another stream of revenue, and as such, seek to maximize the profits they could gain from the fee by consistently raising the price of sending an email.  Clearly, the ethics of one use of the fee are an entirely different matter than the ethics of the other.  Also, with email being such a pervasive and worldwide phenomenon as it is, the logistics of ethically levying the fee across national boundaries, in various currencies, and in areas where corruption of public office runs rife, becomes a serious issue.  It goes without being said that no first-world organization would like to propose a global fee structure which, in another part of the world, might help to finance corrupt leaders, oppressive and inhumane public policies, or terrorism.  Thus, the question to whom, ultimately, the revenue of the fee is to be distributed must also be addressed.  Also, it would be undesirable for respectable nonprofit organizations to be effectively banned from using mass emails through an inability to afford the necessary postage cost.  However, provided that all of these issues could be settled satisfactorily, that there could be exceptions, as with United States postage, for nonprofit organizations, that the revenues were used ethically and fairly, and that the fee was nominal at most, charging a fee for emails sent does seem to be, when properly handled, an ethical proposal.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.consumeraffairs.com/news04/2006/02/email_postage.html AOL to Consider Charging for Emails]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.infowars.com/articles/ps/internet_tax_email_tax_is_coming.htm Article on a Possible Email Tax]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.snopes.com/business/taxes/bill602p.asp An Email Tax Hoax Exposed]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Opt-In for Commercial E-Mail&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A technique in which all commercial senders of email would require for a user to take action to choose to have commercial email sent to their address before they would receive any such mailings.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Eliminates all unsolicited commercial emails.&lt;br /&gt;
**Allows the user to receive any commercial emails which he or she may choose.&lt;br /&gt;
**Does not limit messages sent for personal or nonprofit use.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Disallows any potentially desirable commercial emails of which the user is not aware.&lt;br /&gt;
**Requires that companies use other, typically more expensive media to initially contact potential customers.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Opt-in commercial mailings eliminate all commercial emails not specifically solicited, and, contrary to all above approaches, do nothing to limit or discourage personal or nonprofit use of email in the process.  Perhaps it could be argued that requiring all commercial emails to be opt-in would impose somewhat of a burden on companies, but with the availability of other forms of advertising, especially Internet advertising, this would be a marginal burden at worst, and a small price to pay for the near-total elimination of spam.  While there are still some minor issues with this solution, such as the possibility that users might occasionally get a spam message that they end up putting to good use, these such concerns are not exactly ethical in nature, and, all in all, the solution of requiring opt-in lists for commercial emails seems like an ethical way to address the problem of spam.  However, in practicality, so-called opt in selections are by set to send emails by default, making them, in fact, the much less-desirable form of an opt-out program.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.clickz.com/showPage.html?page=3499691 Building an Opt-In Email List]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spamhaus.org/mailinglists.html Comparison of Various Opt-In / Opt-Out Programs as Related to Spam]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spambutcher.com/art1/486278/ Commentary on the Ambiguity of &amp;quot;Opt-In&amp;quot; Programs]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Domain Authentication&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Domain-authentication technologies are used to ensure that a sender's domain is not forged or &amp;quot;spoofed.&amp;quot; (1)&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Prevents spammers from hiding their location.&lt;br /&gt;
**Allows ISPs and others to hold spammers responsible for their spam.&lt;br /&gt;
**Discourages spam and other unethical e-mail.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**A standard way of doing domain authentication must be decided on.&lt;br /&gt;
**There are several companies that have say in how to do domain authentication, making it harder to reach a concensus.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Domain authentication would go a long way to helping ISPs and the government to hold the spammers responsible. Right now a spammer can mask their location so in essence they are sending you anonymous emails. After a standard for domain authentication is in place people will be able to see the actual person that sent the email. No more spoofing. This solution takes a little power away from the average emailer, but the ability to spoof is not an ability with any practical and ethical use.&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://e-com.ic.gc.ca/epic/site/ecic-ceac.nsf/en/gv00298e.html]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Bounties&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;The &amp;quot;Goodmail&amp;quot; Approach&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Escrow Bonds&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A concept which involves email senders to pay an amount to an escrow service, the sum of which is released back to the sender if a message is not marked by the recipient as spam, but is lost if the message is identified as spam.  Variations include adding whitelists for which the escrow is bypassed, and blacklists for which the deposit is automatically lost.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Imposes a fee for emails which is only charged in the case of messages identified as spam.&lt;br /&gt;
**Makes spam cost-prohibitive while all other emails, commercial or otherwise, remain free.&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Requires the financing of third-party escrow agencies, allowing a new avenue of exploitation of the fee.&lt;br /&gt;
**Necessitates an effective online micro-payment system.&lt;br /&gt;
**Allows for the charging as spam of any messages marked as spam, perhaps accidentally, falsely, or maliciously, by the recipient.&lt;br /&gt;
**Requires that the logistics of independent escrow agencies for all emails sent in any countries be satisfactorily addressed.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The concept of an independent escrow system for emails does not inherently seem to pose any sort of ethical dilemma.  Such a scenario appears to address many of the concerns with the email postage solution, as, in this scheme, all non-spam emails are free.  However, while the concept does not pose any ethical concerns in principle, in practice, several problems arise.  Mainly, financing of the escrow services could possibly lead to concerns.  Multiple tiers of service, high costs, or &amp;quot;preferred&amp;quot; senders who could bypass escrow blacklists with spam could lead to corruption which would be, in all practicality, unethical.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://8stars.org/a/2003/03/13/more-on-fighting-spam/ A Spam Escrow Proposal]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.si.umich.edu/about-SI/news-detail.htm?NewsItemID=416 University of Michigan Proposal for A Spam Escrow Service]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.itu.int/osg/spu/spam/contributions/Spam%20economics-abm.pdf PDF Presentation on an Economic Bond Solution to Spam]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_3&amp;diff=1473</id>
		<title>CSC 379:Week 1, Group 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_3&amp;diff=1473"/>
		<updated>2007-07-07T12:41:01Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Spam-Blocking Techniques ==&lt;br /&gt;
&amp;lt;B&amp;gt;Domain Blocking&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A spam-blocking technique which consists of redirecting to &amp;quot;junk&amp;quot; email boxes or filtering entirely all emails from specific web domains which have been blacklisted for spamming in the past.&amp;lt;/I&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Domain-level blocking is an easy and cost-effective way to curtail large numbers of email addresses from which spam is sent.  The blocking of a single domain can block an infinite number of possible addresses in that domain.&lt;br /&gt;
**Blacklists used for domain-level blocking may be shared among numerous email providers, thus protecting subscribers to one service from spam sent to subscribers of any collaborating service.&lt;br /&gt;
**As there is typically a fee associated with acquiring a domain, spammers using blocked domains must pay to purchase a new domain if they are blacklisted.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Though purchasing domains is associated with a cost, it is typically a marginal expense and well within the budget of major spammers worldwide.  Thus, blocking a domain does little to prevent a spammer from spamming from a different domain.&lt;br /&gt;
**Though spam may originate from one address in a domain, blocking the entire domain may result in the blacklisting of multiple addresses of individuals or corporations which have not engaged in spam, and therefore should not have the receipt of their mail blocked.&lt;br /&gt;
**When a web domain previously blacklisted changes ownership, the new owners may remain blacklisted due to the actions of the previous owners, and at no fault of their own.&lt;br /&gt;
**Much spam is sent through &amp;quot;spoofed&amp;quot; email addresses in which the sending domain is misrepresented.  Blocking such a domain may prevent the receipt of email from a domain which is not associated with spam.&lt;br /&gt;
**Spam can be sent from &amp;quot;zombie&amp;quot; machines infected by malware which sends spam, but owned by individuals unaware that their machines are engaging in spamming.  Blocking the domains of these machines would block the receipt of mail from innocent users.&lt;br /&gt;
**Spam, especially spam from &amp;quot;zombie&amp;quot; machines, can come from typically reputable domains with thousands or millions of users.  Blocking such domains may degrade the quality of email service provided to a service's users to an unacceptable level.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt; &amp;lt;BR&amp;gt;&lt;br /&gt;
With so many ways to accidentally block non-spamming email addresses, the ethics of domain-level blocking are questionable at best.  The goal of blocking spam is to make email more productive by eliminating messages which would clearly be considered &amp;quot;junk&amp;quot; by the vast majority of users.  Taking a serious chance on intercepting email from well-intentioned addresses, therefore, runs counter to the goal of making the communications more productive.  Perhaps with a feature to unblock specific addresses from a domain and to receive all messages from a &amp;quot;junk&amp;quot; mailbox, this strategy would be more acceptable.  In its most basic form, however, the high probability of blocking non-spamming users challenges this method's claim to validity.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*[http://www.joewein.de/sw/spam-bl-e.htm List of Blacklisted Domains]&lt;br /&gt;
*[http://www.blacklistedip.com/ IP Blacklist Monitoring Service]&lt;br /&gt;
*[http://ezinearticles.com/?Blocking-Domain-Spam-Senders&amp;amp;id=374858 Article on Spam which Includes Domain Blocking]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Prior Approval&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A spam-blocking technique in which a sender must request the permission of either a user or an email provider before mail can be received by that user or a client of that provider.  This generally takes one of two forms, either the use of a CAPTCHA which a sender must pass in order for an email to be delivered, or a whitelist, controlled by a recipient, which explicitly states the only addresses from which email is received.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;CAPTCHA Approach&amp;lt;/I&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Completely eliminates the ability of computer controlled spamming &amp;quot;bots&amp;quot; to send mail to an address.&lt;br /&gt;
**Allows all mail from human users who can and will evaluate the CAPTCHA, thereby avoiding forcefully blocking well-intentioned human-sent mail.&lt;br /&gt;
**Discourages spam sent from human sources to many addresses, as such sending would involved the evaluation of numerous CAPTCHAs&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**For the same reason that this method discourages spam sent from humans to many addresses, it also discourages worthwhile messages sent to many addresses.&lt;br /&gt;
**Eliminates or severely hampers the user's ability to receive solicited automated emails.&lt;br /&gt;
**Does not strictly eliminate spam from human sources.&lt;br /&gt;
**Prevents the receipt of mail from the young, the old, the disabled, or others who may be incapable of evaluating the CAPTCHA&lt;br /&gt;
**Depending on the implementation of the system, a sender may not expect to be required to complete a CAPTCHA confirmation, and may assume that his or her message has been sent when it has not.&lt;br /&gt;
**Rather than eliminating the burden of wasted time and stress imposed by spam, this approach merely shifts it from the receiver to the sender, and imposes it for all emails rather than just spam.&amp;lt;BR&amp;gt;&lt;br /&gt;
**Advancing technology makes designing CAPTCHAs which are one step ahead of computer readability increasingly difficult with time.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
At face value, the CAPTCHA Prior Approval method for controlling spam seems inherently more ethical than the domain blocking approach.  However, this approach, too, has the potential to block solicited emails, both from automated services and from those without the ability, knowledge, expectation, or patience to fill out CAPTCHA forms.   It could therefore be argued that this approach unfairly targets and limits the ability of various demographic groups, mentioned above, to send email.  However, the biggest ethical challenge to the CAPTCHA approach is to ask what, exactly, it does to eliminate the burdens of spam.  After all, the act of eliminating spam is hardly an end in and of itself.  The point of all spam-controlling technologies is to save time, stress, and annoyance for the users of email.  It could be legitimately argued that this approach, while it does cut down on the number of spam messages received by an address, itself creates the same sort of burdens which spam imposes, and thereby does little or nothing to improve the usability of email.  The burden of one spam message is merely the time and effort required to read a subject line, identify a message as spam, and click the &amp;quot;delete&amp;quot; button.  The CAPTCHA approach eliminates automated spam, and should be lauded for that fact. However, it isn't too far-fetched to say that more time and effort is required to evaluate and answer a CAPTCHA, sometimes multiple times, depending on a user's skill or experience with the tests, than would be required to delete, en-masse, the spam which would be received if this technique were not used at all.  In essence, then, this approach merely shifts the burden of wasted time from sender to recipient, and to force such a waste of time on someone who may be busy, who may be sending an important email, is arguably just as unethical as forcing a recipient to delete messages at a time of his or her own choosing.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;The Whitelist Approach&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Allows a user complete and total control over from whom the user wishes to receive email.&lt;br /&gt;
**Completely blocks all unwanted mail from addresses which are not pre-approved.&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Fails to block any unsolicited or unwanted messages from pre-approved addresses.&lt;br /&gt;
**Blocks all email from addresses not pre-approved, regardless of content, sender, situation, or potential benefit to the recipient.&lt;br /&gt;
**Eliminates the user's ability to receive desired or solicited email from unknown addresses.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Certainly, it would be difficult to defend the ethical nature of forcing users of an email service to employ a whitelist of approved addresses.  Whether for business or personal use, the importance of receiving mail from unknown addresses - friends with new or changed email addresses, business associates, new contacts, new clients, individuals who discovered a business via the web - is undeniable in daily life.  This approach may eliminate nearly all spam messages, with the exception of spam from individuals the recipient knows, but in the process it impacts the usability of email overall in a very severe, very negative fashion.  For many purposes, if an email address cannot receive mail from unknown addresses, it is entirely useless.  This approach essentially elevates the errors of the domain blocking approach to an entirely new level of severity.  While it may be valuable for applications such as parental controls and monitoring of children on the Internet, this approach is essentially useless for the purpose of blocking spam alone.  To force it on a user is to offer a substandard email service, which may be unethical and is certainly undesirable.  That said, however, there seems to be nothing wrong with &amp;lt;I&amp;gt;allowing&amp;lt;/I&amp;gt; users to choose a whitelist option for controlling email, should they so desire.  For a particular email address with specific uses and only a few potential senders, or for an individual who does not wish to be bothered by any unsolicited email whatsoever and who doesn't mind the hassle of learning of new individuals' email addresses by another means, this is an entirely viable option.  It is hardly unethical, of course, for a user to choose to seclude themselves from all but a handful of email addresses voluntarily.&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Note that a combination of the above two approaches eliminates many of the problems posed by each.  The use of a CAPTCHA authentication system, along with a whitelist of addresses for which the CAPTCHA is bypassed, is a particularly good solution relative to the others discussed here.  In such a scenario, unknown email may be received, but spam is effectively blocked or made time-prohibitive.  Many of the problems with the CAPTCHA scheme are addressed, as a CAPTCHA only needs to be completed once, after which an address can be added to a user's whitelist, and unrestricted communication may continue.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.captcha.net/ The CAPTCHA Project]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.earthlink.net/software/free/spamblocker/faq/ Earthlink SpamBlocker FAQ - CAPTCHA/Whitelist Approach]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.netmanners.com/email-whitelist-etiquette.html Article Explaining and Instructing in the Use of Whitelists]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Charge for Sent E-Mail&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A method which consists of levying a fee against the sender of an email for each message sent, akin to the electronic equivalent of a postage stamp&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Eliminates the positive revenue of sending spam messages, making their sending an undesirable business practice.&lt;br /&gt;
**Provides revenue ostensibly for the upkeep and improvement of email networks&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Could make mass emails cost-prohibitive for individuals who need to send out large numbers of messages, or for non-profit organizations.&lt;br /&gt;
**Users who already pay between ten and fifty dollars each month for internet service are likely to react poorly to being told that they have to pay more for emails.&lt;br /&gt;
**Raises the cost of internet access in general, making it less affordable to lower-income individuals.&lt;br /&gt;
**Logistically, imposing a fee on such a global medium as email would prove difficult if not impossible.&lt;br /&gt;
**Distribution, use, and escalation of the fee would probably become an issue in time.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The ethical nature of imposing a fee for emails is hardly a cut-and-dry question.  There does not seem to be anything unethical about charging a reasonable price for a service rendered, and using the revenue from that fee in a responsible manner.  However, many would say that it is unethical to charge an exorbitant or excessive fee, or to use the revenue generated by such a fee for irresponsible purposes.  Some would argue that current Internet Service Provider charges are already excessive, and that adding a fee for email would only exacerbate an already prevalent problem.  One essential question comes down to whether the fee for sent emails is to be used specifically to discourage spam, or whether internet providers might come to rely upon it as another stream of revenue, and as such, seek to maximize the profits they could gain from the fee by consistently raising the price of sending an email.  Clearly, the ethics of one use of the fee are an entirely different matter than the ethics of the other.  Also, with email being such a pervasive and worldwide phenomenon as it is, the logistics of ethically levying the fee across national boundaries, in various currencies, and in areas where corruption of public office runs rife, becomes a serious issue.  It goes without being said that no first-world organization would like to propose a global fee structure which, in another part of the world, might help to finance corrupt leaders, oppressive and inhumane public policies, or terrorism.  Thus, the question to whom, ultimately, the revenue of the fee is to be distributed must also be addressed.  Also, it would be undesirable for respectable nonprofit organizations to be effectively banned from using mass emails through an inability to afford the necessary postage cost.  However, provided that all of these issues could be settled satisfactorily, that there could be exceptions, as with United States postage, for nonprofit organizations, that the revenues were used ethically and fairly, and that the fee was nominal at most, charging a fee for emails sent does seem to be, when properly handled, an ethical proposal.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.consumeraffairs.com/news04/2006/02/email_postage.html AOL to Consider Charging for Emails]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.infowars.com/articles/ps/internet_tax_email_tax_is_coming.htm Article on a Possible Email Tax]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.snopes.com/business/taxes/bill602p.asp An Email Tax Hoax Exposed]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Opt-In for Commercial E-Mail&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A technique in which all commercial senders of email would require for a user to take action to choose to have commercial email sent to their address before they would receive any such mailings.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Eliminates all unsolicited commercial emails.&lt;br /&gt;
**Allows the user to receive any commercial emails which he or she may choose.&lt;br /&gt;
**Does not limit messages sent for personal or nonprofit use.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Disallows any potentially desirable commercial emails of which the user is not aware.&lt;br /&gt;
**Requires that companies use other, typically more expensive media to initially contact potential customers.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Opt-in commercial mailings eliminate all commercial emails not specifically solicited, and, contrary to all above approaches, do nothing to limit or discourage personal or nonprofit use of email in the process.  Perhaps it could be argued that requiring all commercial emails to be opt-in would impose somewhat of a burden on companies, but with the availability of other forms of advertising, especially Internet advertising, this would be a marginal burden at worst, and a small price to pay for the near-total elimination of spam.  While there are still some minor issues with this solution, such as the possibility that users might occasionally get a spam message that they end up putting to good use, these such concerns are not exactly ethical in nature, and, all in all, the solution of requiring opt-in lists for commercial emails seems like an ethical way to address the problem of spam.  However, in practicality, so-called opt in selections are by set to send emails by default, making them, in fact, the much less-desirable form of an opt-out program.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.clickz.com/showPage.html?page=3499691 Building an Opt-In Email List]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spamhaus.org/mailinglists.html Comparison of Various Opt-In / Opt-Out Programs as Related to Spam]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spambutcher.com/art1/486278/ Commentary on the Ambiguity of &amp;quot;Opt-In&amp;quot; Programs]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Domain Authentication&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Domain-authentication technologies are used to ensure that a sender's domain is not forged or &amp;quot;spoofed.&amp;quot; (1)&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Prevents spammers from hiding their location.&lt;br /&gt;
**Allows ISPs and others to hold spammers responsible for their spam.&lt;br /&gt;
**Discourages spam and other unethical e-mail.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**A standard way of doing domain authentication must be decided on.&lt;br /&gt;
**There are several companies that have say in how to do domain authentication, making it harder to reach a concensus.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Domain authentication would go a long way to helping ISPs and the government to hold the spammers responsible. Right now a spammer can mask their location so in essence they are sending you anonymous emails. After a standard for domain authentication is in place people will be able to see the actual person that sent the email. No more spoofing. This solution takes a little power away from the average emailer, but the ability to spoof is not an ability with any practical and ethical use.&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
(1)[http://e-com.ic.gc.ca/epic/site/ecic-ceac.nsf/en/gv00298e.html]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Bounties&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;The &amp;quot;Goodmail&amp;quot; Approach&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Escrow Bonds&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A concept which involves email senders to pay an amount to an escrow service, the sum of which is released back to the sender if a message is not marked by the recipient as spam, but is lost if the message is identified as spam.  Variations include adding whitelists for which the escrow is bypassed, and blacklists for which the deposit is automatically lost.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Imposes a fee for emails which is only charged in the case of messages identified as spam.&lt;br /&gt;
**Makes spam cost-prohibitive while all other emails, commercial or otherwise, remain free.&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Requires the financing of third-party escrow agencies, allowing a new avenue of exploitation of the fee.&lt;br /&gt;
**Necessitates an effective online micro-payment system.&lt;br /&gt;
**Allows for the charging as spam of any messages marked as spam, perhaps accidentally, falsely, or maliciously, by the recipient.&lt;br /&gt;
**Requires that the logistics of independent escrow agencies for all emails sent in any countries be satisfactorily addressed.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The concept of an independent escrow system for emails does not inherently seem to pose any sort of ethical dilemma.  Such a scenario appears to address many of the concerns with the email postage solution, as, in this scheme, all non-spam emails are free.  However, while the concept does not pose any ethical concerns in principle, in practice, several problems arise.  Mainly, financing of the escrow services could possibly lead to concerns.  Multiple tiers of service, high costs, or &amp;quot;preferred&amp;quot; senders who could bypass escrow blacklists with spam could lead to corruption which would be, in all practicality, unethical.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://8stars.org/a/2003/03/13/more-on-fighting-spam/ A Spam Escrow Proposal]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.si.umich.edu/about-SI/news-detail.htm?NewsItemID=416 University of Michigan Proposal for A Spam Escrow Service]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.itu.int/osg/spu/spam/contributions/Spam%20economics-abm.pdf PDF Presentation on an Economic Bond Solution to Spam]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_3&amp;diff=1472</id>
		<title>CSC 379:Week 1, Group 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_3&amp;diff=1472"/>
		<updated>2007-07-07T12:26:30Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Spam-Blocking Techniques ==&lt;br /&gt;
&amp;lt;B&amp;gt;Domain Blocking&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A spam-blocking technique which consists of redirecting to &amp;quot;junk&amp;quot; email boxes or filtering entirely all emails from specific web domains which have been blacklisted for spamming in the past.&amp;lt;/I&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Domain-level blocking is an easy and cost-effective way to curtail large numbers of email addresses from which spam is sent.  The blocking of a single domain can block an infinite number of possible addresses in that domain.&lt;br /&gt;
**Blacklists used for domain-level blocking may be shared among numerous email providers, thus protecting subscribers to one service from spam sent to subscribers of any collaborating service.&lt;br /&gt;
**As there is typically a fee associated with acquiring a domain, spammers using blocked domains must pay to purchase a new domain if they are blacklisted.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Though purchasing domains is associated with a cost, it is typically a marginal expense and well within the budget of major spammers worldwide.  Thus, blocking a domain does little to prevent a spammer from spamming from a different domain.&lt;br /&gt;
**Though spam may originate from one address in a domain, blocking the entire domain may result in the blacklisting of multiple addresses of individuals or corporations which have not engaged in spam, and therefore should not have the receipt of their mail blocked.&lt;br /&gt;
**When a web domain previously blacklisted changes ownership, the new owners may remain blacklisted due to the actions of the previous owners, and at no fault of their own.&lt;br /&gt;
**Much spam is sent through &amp;quot;spoofed&amp;quot; email addresses in which the sending domain is misrepresented.  Blocking such a domain may prevent the receipt of email from a domain which is not associated with spam.&lt;br /&gt;
**Spam can be sent from &amp;quot;zombie&amp;quot; machines infected by malware which sends spam, but owned by individuals unaware that their machines are engaging in spamming.  Blocking the domains of these machines would block the receipt of mail from innocent users.&lt;br /&gt;
**Spam, especially spam from &amp;quot;zombie&amp;quot; machines, can come from typically reputable domains with thousands or millions of users.  Blocking such domains may degrade the quality of email service provided to a service's users to an unacceptable level.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt; &amp;lt;BR&amp;gt;&lt;br /&gt;
With so many ways to accidentally block non-spamming email addresses, the ethics of domain-level blocking are questionable at best.  The goal of blocking spam is to make email more productive by eliminating messages which would clearly be considered &amp;quot;junk&amp;quot; by the vast majority of users.  Taking a serious chance on intercepting email from well-intentioned addresses, therefore, runs counter to the goal of making the communications more productive.  Perhaps with a feature to unblock specific addresses from a domain and to receive all messages from a &amp;quot;junk&amp;quot; mailbox, this strategy would be more acceptable.  In its most basic form, however, the high probability of blocking non-spamming users challenges this method's claim to validity.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*[http://www.joewein.de/sw/spam-bl-e.htm List of Blacklisted Domains]&lt;br /&gt;
*[http://www.blacklistedip.com/ IP Blacklist Monitoring Service]&lt;br /&gt;
*[http://ezinearticles.com/?Blocking-Domain-Spam-Senders&amp;amp;id=374858 Article on Spam which Includes Domain Blocking]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Prior Approval&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A spam-blocking technique in which a sender must request the permission of either a user or an email provider before mail can be received by that user or a client of that provider.  This generally takes one of two forms, either the use of a CAPTCHA which a sender must pass in order for an email to be delivered, or a whitelist, controlled by a recipient, which explicitly states the only addresses from which email is received.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;CAPTCHA Approach&amp;lt;/I&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Completely eliminates the ability of computer controlled spamming &amp;quot;bots&amp;quot; to send mail to an address.&lt;br /&gt;
**Allows all mail from human users who can and will evaluate the CAPTCHA, thereby avoiding forcefully blocking well-intentioned human-sent mail.&lt;br /&gt;
**Discourages spam sent from human sources to many addresses, as such sending would involved the evaluation of numerous CAPTCHAs&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**For the same reason that this method discourages spam sent from humans to many addresses, it also discourages worthwhile messages sent to many addresses.&lt;br /&gt;
**Eliminates or severely hampers the user's ability to receive solicited automated emails.&lt;br /&gt;
**Does not strictly eliminate spam from human sources.&lt;br /&gt;
**Prevents the receipt of mail from the young, the old, the disabled, or others who may be incapable of evaluating the CAPTCHA&lt;br /&gt;
**Depending on the implementation of the system, a sender may not expect to be required to complete a CAPTCHA confirmation, and may assume that his or her message has been sent when it has not.&lt;br /&gt;
**Rather than eliminating the burden of wasted time and stress imposed by spam, this approach merely shifts it from the receiver to the sender, and imposes it for all emails rather than just spam.&amp;lt;BR&amp;gt;&lt;br /&gt;
**Advancing technology makes designing CAPTCHAs which are one step ahead of computer readability increasingly difficult with time.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
At face value, the CAPTCHA Prior Approval method for controlling spam seems inherently more ethical than the domain blocking approach.  However, this approach, too, has the potential to block solicited emails, both from automated services and from those without the ability, knowledge, expectation, or patience to fill out CAPTCHA forms.   It could therefore be argued that this approach unfairly targets and limits the ability of various demographic groups, mentioned above, to send email.  However, the biggest ethical challenge to the CAPTCHA approach is to ask what, exactly, it does to eliminate the burdens of spam.  After all, the act of eliminating spam is hardly an end in and of itself.  The point of all spam-controlling technologies is to save time, stress, and annoyance for the users of email.  It could be legitimately argued that this approach, while it does cut down on the number of spam messages received by an address, itself creates the same sort of burdens which spam imposes, and thereby does little or nothing to improve the usability of email.  The burden of one spam message is merely the time and effort required to read a subject line, identify a message as spam, and click the &amp;quot;delete&amp;quot; button.  The CAPTCHA approach eliminates automated spam, and should be lauded for that fact. However, it isn't too far-fetched to say that more time and effort is required to evaluate and answer a CAPTCHA, sometimes multiple times, depending on a user's skill or experience with the tests, than would be required to delete, en-masse, the spam which would be received if this technique were not used at all.  In essence, then, this approach merely shifts the burden of wasted time from sender to recipient, and to force such a waste of time on someone who may be busy, who may be sending an important email, is arguably just as unethical as forcing a recipient to delete messages at a time of his or her own choosing.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;The Whitelist Approach&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Allows a user complete and total control over from whom the user wishes to receive email.&lt;br /&gt;
**Completely blocks all unwanted mail from addresses which are not pre-approved.&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Fails to block any unsolicited or unwanted messages from pre-approved addresses.&lt;br /&gt;
**Blocks all email from addresses not pre-approved, regardless of content, sender, situation, or potential benefit to the recipient.&lt;br /&gt;
**Eliminates the user's ability to receive desired or solicited email from unknown addresses.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Certainly, it would be difficult to defend the ethical nature of forcing users of an email service to employ a whitelist of approved addresses.  Whether for business or personal use, the importance of receiving mail from unknown addresses - friends with new or changed email addresses, business associates, new contacts, new clients, individuals who discovered a business via the web - is undeniable in daily life.  This approach may eliminate nearly all spam messages, with the exception of spam from individuals the recipient knows, but in the process it impacts the usability of email overall in a very severe, very negative fashion.  For many purposes, if an email address cannot receive mail from unknown addresses, it is entirely useless.  This approach essentially elevates the errors of the domain blocking approach to an entirely new level of severity.  While it may be valuable for applications such as parental controls and monitoring of children on the Internet, this approach is essentially useless for the purpose of blocking spam alone.  To force it on a user is to offer a substandard email service, which may be unethical and is certainly undesirable.  That said, however, there seems to be nothing wrong with &amp;lt;I&amp;gt;allowing&amp;lt;/I&amp;gt; users to choose a whitelist option for controlling email, should they so desire.  For a particular email address with specific uses and only a few potential senders, or for an individual who does not wish to be bothered by any unsolicited email whatsoever and who doesn't mind the hassle of learning of new individuals' email addresses by another means, this is an entirely viable option.  It is hardly unethical, of course, for a user to choose to seclude themselves from all but a handful of email addresses voluntarily.&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Note that a combination of the above two approaches eliminates many of the problems posed by each.  The use of a CAPTCHA authentication system, along with a whitelist of addresses for which the CAPTCHA is bypassed, is a particularly good solution relative to the others discussed here.  In such a scenario, unknown email may be received, but spam is effectively blocked or made time-prohibitive.  Many of the problems with the CAPTCHA scheme are addressed, as a CAPTCHA only needs to be completed once, after which an address can be added to a user's whitelist, and unrestricted communication may continue.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.captcha.net/ The CAPTCHA Project]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.earthlink.net/software/free/spamblocker/faq/ Earthlink SpamBlocker FAQ - CAPTCHA/Whitelist Approach]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.netmanners.com/email-whitelist-etiquette.html Article Explaining and Instructing in the Use of Whitelists]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Charge for Sent E-Mail&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A method which consists of levying a fee against the sender of an email for each message sent, akin to the electronic equivalent of a postage stamp&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Eliminates the positive revenue of sending spam messages, making their sending an undesirable business practice.&lt;br /&gt;
**Provides revenue ostensibly for the upkeep and improvement of email networks&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Could make mass emails cost-prohibitive for individuals who need to send out large numbers of messages, or for non-profit organizations.&lt;br /&gt;
**Users who already pay between ten and fifty dollars each month for internet service are likely to react poorly to being told that they have to pay more for emails.&lt;br /&gt;
**Raises the cost of internet access in general, making it less affordable to lower-income individuals.&lt;br /&gt;
**Logistically, imposing a fee on such a global medium as email would prove difficult if not impossible.&lt;br /&gt;
**Distribution, use, and escalation of the fee would probably become an issue in time.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The ethical nature of imposing a fee for emails is hardly a cut-and-dry question.  There does not seem to be anything unethical about charging a reasonable price for a service rendered, and using the revenue from that fee in a responsible manner.  However, many would say that it is unethical to charge an exorbitant or excessive fee, or to use the revenue generated by such a fee for irresponsible purposes.  Some would argue that current Internet Service Provider charges are already excessive, and that adding a fee for email would only exacerbate an already prevalent problem.  One essential question comes down to whether the fee for sent emails is to be used specifically to discourage spam, or whether internet providers might come to rely upon it as another stream of revenue, and as such, seek to maximize the profits they could gain from the fee by consistently raising the price of sending an email.  Clearly, the ethics of one use of the fee are an entirely different matter than the ethics of the other.  Also, with email being such a pervasive and worldwide phenomenon as it is, the logistics of ethically levying the fee across national boundaries, in various currencies, and in areas where corruption of public office runs rife, becomes a serious issue.  It goes without being said that no first-world organization would like to propose a global fee structure which, in another part of the world, might help to finance corrupt leaders, oppressive and inhumane public policies, or terrorism.  Thus, the question to whom, ultimately, the revenue of the fee is to be distributed must also be addressed.  Also, it would be undesirable for respectable nonprofit organizations to be effectively banned from using mass emails through an inability to afford the necessary postage cost.  However, provided that all of these issues could be settled satisfactorily, that there could be exceptions, as with United States postage, for nonprofit organizations, that the revenues were used ethically and fairly, and that the fee was nominal at most, charging a fee for emails sent does seem to be, when properly handled, an ethical proposal.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.consumeraffairs.com/news04/2006/02/email_postage.html AOL to Consider Charging for Emails]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.infowars.com/articles/ps/internet_tax_email_tax_is_coming.htm Article on a Possible Email Tax]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.snopes.com/business/taxes/bill602p.asp An Email Tax Hoax Exposed]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Opt-In for Commercial E-Mail&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A technique in which all commercial senders of email would require for a user to take action to choose to have commercial email sent to their address before they would receive any such mailings.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Eliminates all unsolicited commercial emails.&lt;br /&gt;
**Allows the user to receive any commercial emails which he or she may choose.&lt;br /&gt;
**Does not limit messages sent for personal or nonprofit use.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Disallows any potentially desirable commercial emails of which the user is not aware.&lt;br /&gt;
**Requires that companies use other, typically more expensive media to initially contact potential customers.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Opt-in commercial mailings eliminate all commercial emails not specifically solicited, and, contrary to all above approaches, do nothing to limit or discourage personal or nonprofit use of email in the process.  Perhaps it could be argued that requiring all commercial emails to be opt-in would impose somewhat of a burden on companies, but with the availability of other forms of advertising, especially Internet advertising, this would be a marginal burden at worst, and a small price to pay for the near-total elimination of spam.  While there are still some minor issues with this solution, such as the possibility that users might occasionally get a spam message that they end up putting to good use, these such concerns are not exactly ethical in nature, and, all in all, the solution of requiring opt-in lists for commercial emails seems like an ethical way to address the problem of spam.  However, in practicality, so-called opt in selections are by set to send emails by default, making them, in fact, the much less-desirable form of an opt-out program.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.clickz.com/showPage.html?page=3499691 Building an Opt-In Email List]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spamhaus.org/mailinglists.html Comparison of Various Opt-In / Opt-Out Programs as Related to Spam]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spambutcher.com/art1/486278/ Commentary on the Ambiguity of &amp;quot;Opt-In&amp;quot; Programs]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Domain Authentication&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Domain-authentication technologies are used to ensure that a sender's domain is not forged or &amp;quot;spoofed.&amp;quot; &amp;lt;/i&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Bounties&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;The &amp;quot;Goodmail&amp;quot; Approach&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Escrow Bonds&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A concept which involves email senders to pay an amount to an escrow service, the sum of which is released back to the sender if a message is not marked by the recipient as spam, but is lost if the message is identified as spam.  Variations include adding whitelists for which the escrow is bypassed, and blacklists for which the deposit is automatically lost.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Imposes a fee for emails which is only charged in the case of messages identified as spam.&lt;br /&gt;
**Makes spam cost-prohibitive while all other emails, commercial or otherwise, remain free.&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Requires the financing of third-party escrow agencies, allowing a new avenue of exploitation of the fee.&lt;br /&gt;
**Necessitates an effective online micro-payment system.&lt;br /&gt;
**Allows for the charging as spam of any messages marked as spam, perhaps accidentally, falsely, or maliciously, by the recipient.&lt;br /&gt;
**Requires that the logistics of independent escrow agencies for all emails sent in any countries be satisfactorily addressed.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The concept of an independent escrow system for emails does not inherently seem to pose any sort of ethical dilemma.  Such a scenario appears to address many of the concerns with the email postage solution, as, in this scheme, all non-spam emails are free.  However, while the concept does not pose any ethical concerns in principle, in practice, several problems arise.  Mainly, financing of the escrow services could possibly lead to concerns.  Multiple tiers of service, high costs, or &amp;quot;preferred&amp;quot; senders who could bypass escrow blacklists with spam could lead to corruption which would be, in all practicality, unethical.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://8stars.org/a/2003/03/13/more-on-fighting-spam/ A Spam Escrow Proposal]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.si.umich.edu/about-SI/news-detail.htm?NewsItemID=416 University of Michigan Proposal for A Spam Escrow Service]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.itu.int/osg/spu/spam/contributions/Spam%20economics-abm.pdf PDF Presentation on an Economic Bond Solution to Spam]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_3&amp;diff=1471</id>
		<title>CSC 379:Week 1, Group 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_3&amp;diff=1471"/>
		<updated>2007-07-07T12:24:06Z</updated>

		<summary type="html">&lt;p&gt;Becreswe: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Spam-Blocking Techniques ==&lt;br /&gt;
&amp;lt;B&amp;gt;Domain Blocking&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A spam-blocking technique which consists of redirecting to &amp;quot;junk&amp;quot; email boxes or filtering entirely all emails from specific web domains which have been blacklisted for spamming in the past.&amp;lt;/I&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Domain-level blocking is an easy and cost-effective way to curtail large numbers of email addresses from which spam is sent.  The blocking of a single domain can block an infinite number of possible addresses in that domain.&lt;br /&gt;
**Blacklists used for domain-level blocking may be shared among numerous email providers, thus protecting subscribers to one service from spam sent to subscribers of any collaborating service.&lt;br /&gt;
**As there is typically a fee associated with acquiring a domain, spammers using blocked domains must pay to purchase a new domain if they are blacklisted.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Though purchasing domains is associated with a cost, it is typically a marginal expense and well within the budget of major spammers worldwide.  Thus, blocking a domain does little to prevent a spammer from spamming from a different domain.&lt;br /&gt;
**Though spam may originate from one address in a domain, blocking the entire domain may result in the blacklisting of multiple addresses of individuals or corporations which have not engaged in spam, and therefore should not have the receipt of their mail blocked.&lt;br /&gt;
**When a web domain previously blacklisted changes ownership, the new owners may remain blacklisted due to the actions of the previous owners, and at no fault of their own.&lt;br /&gt;
**Much spam is sent through &amp;quot;spoofed&amp;quot; email addresses in which the sending domain is misrepresented.  Blocking such a domain may prevent the receipt of email from a domain which is not associated with spam.&lt;br /&gt;
**Spam can be sent from &amp;quot;zombie&amp;quot; machines infected by malware which sends spam, but owned by individuals unaware that their machines are engaging in spamming.  Blocking the domains of these machines would block the receipt of mail from innocent users.&lt;br /&gt;
**Spam, especially spam from &amp;quot;zombie&amp;quot; machines, can come from typically reputable domains with thousands or millions of users.  Blocking such domains may degrade the quality of email service provided to a service's users to an unacceptable level.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt; &amp;lt;BR&amp;gt;&lt;br /&gt;
With so many ways to accidentally block non-spamming email addresses, the ethics of domain-level blocking are questionable at best.  The goal of blocking spam is to make email more productive by eliminating messages which would clearly be considered &amp;quot;junk&amp;quot; by the vast majority of users.  Taking a serious chance on intercepting email from well-intentioned addresses, therefore, runs counter to the goal of making the communications more productive.  Perhaps with a feature to unblock specific addresses from a domain and to receive all messages from a &amp;quot;junk&amp;quot; mailbox, this strategy would be more acceptable.  In its most basic form, however, the high probability of blocking non-spamming users challenges this method's claim to validity.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*[http://www.joewein.de/sw/spam-bl-e.htm List of Blacklisted Domains]&lt;br /&gt;
*[http://www.blacklistedip.com/ IP Blacklist Monitoring Service]&lt;br /&gt;
*[http://ezinearticles.com/?Blocking-Domain-Spam-Senders&amp;amp;id=374858 Article on Spam which Includes Domain Blocking]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Prior Approval&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A spam-blocking technique in which a sender must request the permission of either a user or an email provider before mail can be received by that user or a client of that provider.  This generally takes one of two forms, either the use of a CAPTCHA which a sender must pass in order for an email to be delivered, or a whitelist, controlled by a recipient, which explicitly states the only addresses from which email is received.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;CAPTCHA Approach&amp;lt;/I&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Completely eliminates the ability of computer controlled spamming &amp;quot;bots&amp;quot; to send mail to an address.&lt;br /&gt;
**Allows all mail from human users who can and will evaluate the CAPTCHA, thereby avoiding forcefully blocking well-intentioned human-sent mail.&lt;br /&gt;
**Discourages spam sent from human sources to many addresses, as such sending would involved the evaluation of numerous CAPTCHAs&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**For the same reason that this method discourages spam sent from humans to many addresses, it also discourages worthwhile messages sent to many addresses.&lt;br /&gt;
**Eliminates or severely hampers the user's ability to receive solicited automated emails.&lt;br /&gt;
**Does not strictly eliminate spam from human sources.&lt;br /&gt;
**Prevents the receipt of mail from the young, the old, the disabled, or others who may be incapable of evaluating the CAPTCHA&lt;br /&gt;
**Depending on the implementation of the system, a sender may not expect to be required to complete a CAPTCHA confirmation, and may assume that his or her message has been sent when it has not.&lt;br /&gt;
**Rather than eliminating the burden of wasted time and stress imposed by spam, this approach merely shifts it from the receiver to the sender, and imposes it for all emails rather than just spam.&amp;lt;BR&amp;gt;&lt;br /&gt;
**Advancing technology makes designing CAPTCHAs which are one step ahead of computer readability increasingly difficult with time.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
At face value, the CAPTCHA Prior Approval method for controlling spam seems inherently more ethical than the domain blocking approach.  However, this approach, too, has the potential to block solicited emails, both from automated services and from those without the ability, knowledge, expectation, or patience to fill out CAPTCHA forms.   It could therefore be argued that this approach unfairly targets and limits the ability of various demographic groups, mentioned above, to send email.  However, the biggest ethical challenge to the CAPTCHA approach is to ask what, exactly, it does to eliminate the burdens of spam.  After all, the act of eliminating spam is hardly an end in and of itself.  The point of all spam-controlling technologies is to save time, stress, and annoyance for the users of email.  It could be legitimately argued that this approach, while it does cut down on the number of spam messages received by an address, itself creates the same sort of burdens which spam imposes, and thereby does little or nothing to improve the usability of email.  The burden of one spam message is merely the time and effort required to read a subject line, identify a message as spam, and click the &amp;quot;delete&amp;quot; button.  The CAPTCHA approach eliminates automated spam, and should be lauded for that fact. However, it isn't too far-fetched to say that more time and effort is required to evaluate and answer a CAPTCHA, sometimes multiple times, depending on a user's skill or experience with the tests, than would be required to delete, en-masse, the spam which would be received if this technique were not used at all.  In essence, then, this approach merely shifts the burden of wasted time from sender to recipient, and to force such a waste of time on someone who may be busy, who may be sending an important email, is arguably just as unethical as forcing a recipient to delete messages at a time of his or her own choosing.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;The Whitelist Approach&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Allows a user complete and total control over from whom the user wishes to receive email.&lt;br /&gt;
**Completely blocks all unwanted mail from addresses which are not pre-approved.&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Fails to block any unsolicited or unwanted messages from pre-approved addresses.&lt;br /&gt;
**Blocks all email from addresses not pre-approved, regardless of content, sender, situation, or potential benefit to the recipient.&lt;br /&gt;
**Eliminates the user's ability to receive desired or solicited email from unknown addresses.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Certainly, it would be difficult to defend the ethical nature of forcing users of an email service to employ a whitelist of approved addresses.  Whether for business or personal use, the importance of receiving mail from unknown addresses - friends with new or changed email addresses, business associates, new contacts, new clients, individuals who discovered a business via the web - is undeniable in daily life.  This approach may eliminate nearly all spam messages, with the exception of spam from individuals the recipient knows, but in the process it impacts the usability of email overall in a very severe, very negative fashion.  For many purposes, if an email address cannot receive mail from unknown addresses, it is entirely useless.  This approach essentially elevates the errors of the domain blocking approach to an entirely new level of severity.  While it may be valuable for applications such as parental controls and monitoring of children on the Internet, this approach is essentially useless for the purpose of blocking spam alone.  To force it on a user is to offer a substandard email service, which may be unethical and is certainly undesirable.  That said, however, there seems to be nothing wrong with &amp;lt;I&amp;gt;allowing&amp;lt;/I&amp;gt; users to choose a whitelist option for controlling email, should they so desire.  For a particular email address with specific uses and only a few potential senders, or for an individual who does not wish to be bothered by any unsolicited email whatsoever and who doesn't mind the hassle of learning of new individuals' email addresses by another means, this is an entirely viable option.  It is hardly unethical, of course, for a user to choose to seclude themselves from all but a handful of email addresses voluntarily.&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Note that a combination of the above two approaches eliminates many of the problems posed by each.  The use of a CAPTCHA authentication system, along with a whitelist of addresses for which the CAPTCHA is bypassed, is a particularly good solution relative to the others discussed here.  In such a scenario, unknown email may be received, but spam is effectively blocked or made time-prohibitive.  Many of the problems with the CAPTCHA scheme are addressed, as a CAPTCHA only needs to be completed once, after which an address can be added to a user's whitelist, and unrestricted communication may continue.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.captcha.net/ The CAPTCHA Project]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.earthlink.net/software/free/spamblocker/faq/ Earthlink SpamBlocker FAQ - CAPTCHA/Whitelist Approach]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.netmanners.com/email-whitelist-etiquette.html Article Explaining and Instructing in the Use of Whitelists]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Charge for Sent E-Mail&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A method which consists of levying a fee against the sender of an email for each message sent, akin to the electronic equivalent of a postage stamp&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Eliminates the positive revenue of sending spam messages, making their sending an undesirable business practice.&lt;br /&gt;
**Provides revenue ostensibly for the upkeep and improvement of email networks&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Could make mass emails cost-prohibitive for individuals who need to send out large numbers of messages, or for non-profit organizations.&lt;br /&gt;
**Users who already pay between ten and fifty dollars each month for internet service are likely to react poorly to being told that they have to pay more for emails.&lt;br /&gt;
**Raises the cost of internet access in general, making it less affordable to lower-income individuals.&lt;br /&gt;
**Logistically, imposing a fee on such a global medium as email would prove difficult if not impossible.&lt;br /&gt;
**Distribution, use, and escalation of the fee would probably become an issue in time.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The ethical nature of imposing a fee for emails is hardly a cut-and-dry question.  There does not seem to be anything unethical about charging a reasonable price for a service rendered, and using the revenue from that fee in a responsible manner.  However, many would say that it is unethical to charge an exorbitant or excessive fee, or to use the revenue generated by such a fee for irresponsible purposes.  Some would argue that current Internet Service Provider charges are already excessive, and that adding a fee for email would only exacerbate an already prevalent problem.  One essential question comes down to whether the fee for sent emails is to be used specifically to discourage spam, or whether internet providers might come to rely upon it as another stream of revenue, and as such, seek to maximize the profits they could gain from the fee by consistently raising the price of sending an email.  Clearly, the ethics of one use of the fee are an entirely different matter than the ethics of the other.  Also, with email being such a pervasive and worldwide phenomenon as it is, the logistics of ethically levying the fee across national boundaries, in various currencies, and in areas where corruption of public office runs rife, becomes a serious issue.  It goes without being said that no first-world organization would like to propose a global fee structure which, in another part of the world, might help to finance corrupt leaders, oppressive and inhumane public policies, or terrorism.  Thus, the question to whom, ultimately, the revenue of the fee is to be distributed must also be addressed.  Also, it would be undesirable for respectable nonprofit organizations to be effectively banned from using mass emails through an inability to afford the necessary postage cost.  However, provided that all of these issues could be settled satisfactorily, that there could be exceptions, as with United States postage, for nonprofit organizations, that the revenues were used ethically and fairly, and that the fee was nominal at most, charging a fee for emails sent does seem to be, when properly handled, an ethical proposal.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also:&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.consumeraffairs.com/news04/2006/02/email_postage.html AOL to Consider Charging for Emails]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.infowars.com/articles/ps/internet_tax_email_tax_is_coming.htm Article on a Possible Email Tax]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.snopes.com/business/taxes/bill602p.asp An Email Tax Hoax Exposed]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Opt-In for Commercial E-Mail&amp;lt;/B&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A technique in which all commercial senders of email would require for a user to take action to choose to have commercial email sent to their address before they would receive any such mailings.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Eliminates all unsolicited commercial emails.&lt;br /&gt;
**Allows the user to receive any commercial emails which he or she may choose.&lt;br /&gt;
**Does not limit messages sent for personal or nonprofit use.&lt;br /&gt;
*Disadvantages&lt;br /&gt;
**Disallows any potentially desirable commercial emails of which the user is not aware.&lt;br /&gt;
**Requires that companies use other, typically more expensive media to initially contact potential customers.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
Opt-in commercial mailings eliminate all commercial emails not specifically solicited, and, contrary to all above approaches, do nothing to limit or discourage personal or nonprofit use of email in the process.  Perhaps it could be argued that requiring all commercial emails to be opt-in would impose somewhat of a burden on companies, but with the availability of other forms of advertising, especially Internet advertising, this would be a marginal burden at worst, and a small price to pay for the near-total elimination of spam.  While there are still some minor issues with this solution, such as the possibility that users might occasionally get a spam message that they end up putting to good use, these such concerns are not exactly ethical in nature, and, all in all, the solution of requiring opt-in lists for commercial emails seems like an ethical way to address the problem of spam.  However, in practicality, so-called opt in selections are by set to send emails by default, making them, in fact, the much less-desirable form of an opt-out program.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.clickz.com/showPage.html?page=3499691 Building an Opt-In Email List]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spamhaus.org/mailinglists.html Comparison of Various Opt-In / Opt-Out Programs as Related to Spam]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.spambutcher.com/art1/486278/ Commentary on the Ambiguity of &amp;quot;Opt-In&amp;quot; Programs]&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Domain Authentication&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Bounties&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;The &amp;quot;Goodmail&amp;quot; Approach&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Escrow Bonds&amp;lt;/B&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;A concept which involves email senders to pay an amount to an escrow service, the sum of which is released back to the sender if a message is not marked by the recipient as spam, but is lost if the message is identified as spam.  Variations include adding whitelists for which the escrow is bypassed, and blacklists for which the deposit is automatically lost.&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
*Advantages:&lt;br /&gt;
**Imposes a fee for emails which is only charged in the case of messages identified as spam.&lt;br /&gt;
**Makes spam cost-prohibitive while all other emails, commercial or otherwise, remain free.&lt;br /&gt;
*Disadvantages:&lt;br /&gt;
**Requires the financing of third-party escrow agencies, allowing a new avenue of exploitation of the fee.&lt;br /&gt;
**Necessitates an effective online micro-payment system.&lt;br /&gt;
**Allows for the charging as spam of any messages marked as spam, perhaps accidentally, falsely, or maliciously, by the recipient.&lt;br /&gt;
**Requires that the logistics of independent escrow agencies for all emails sent in any countries be satisfactorily addressed.&lt;br /&gt;
&amp;lt;I&amp;gt;Is it Ethical?&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
The concept of an independent escrow system for emails does not inherently seem to pose any sort of ethical dilemma.  Such a scenario appears to address many of the concerns with the email postage solution, as, in this scheme, all non-spam emails are free.  However, while the concept does not pose any ethical concerns in principle, in practice, several problems arise.  Mainly, financing of the escrow services could possibly lead to concerns.  Multiple tiers of service, high costs, or &amp;quot;preferred&amp;quot; senders who could bypass escrow blacklists with spam could lead to corruption which would be, in all practicality, unethical.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;I&amp;gt;See Also&amp;lt;/I&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://8stars.org/a/2003/03/13/more-on-fighting-spam/ A Spam Escrow Proposal]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.si.umich.edu/about-SI/news-detail.htm?NewsItemID=416 University of Michigan Proposal for A Spam Escrow Service]&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://www.itu.int/osg/spu/spam/contributions/Spam%20economics-abm.pdf PDF Presentation on an Economic Bond Solution to Spam]&lt;/div&gt;</summary>
		<author><name>Becreswe</name></author>
	</entry>
</feed>