<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.expertiza.ncsu.edu/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jcsmith2</id>
	<title>Expertiza_Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.expertiza.ncsu.edu/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jcsmith2"/>
	<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Special:Contributions/Jcsmith2"/>
	<updated>2026-05-20T13:43:54Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.41.0</generator>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=17003</id>
		<title>CSC 379 SUM2008:Week 5, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=17003"/>
		<updated>2008-08-10T03:05:26Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Open Source System */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Open Non-Proprietary Technology vs. Closed Proprietary Technology =&lt;br /&gt;
&lt;br /&gt;
The issues surrounding electronic voting have highlighted the concerns of use of open non-proprietary technology vs. closed proprietary technology.  On the one side, closed proprietary technology allegedly safeguards voting security by making it impossible for outsiders to discover vulnerabilities by analyzing the code.  On the other side, open technology encourages more eyes to look over the code, and may find vulnerabilities in advance, in time to correct them.  What bearing does this discussion have on other types of software systems?  Should other systems with high social value also have open non-proprietary licenses to increase accountability, or do the risks of open licensing outweigh the benefits?  &lt;br /&gt;
&lt;br /&gt;
Examine how the experience with electronic voting applies to other critical software systems (e.g., software used for port security, handling medical records, or managing a payroll).  What are the costs and benefits of open non-proprietary technology vs. closed proprietary technology for such applications?  Are there applications where one or the other should clearly be used?  Are there applications for which neither is appropriate?  Please explain your answers.&lt;br /&gt;
&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
&lt;br /&gt;
==Electronic Voting==&lt;br /&gt;
&lt;br /&gt;
The voting apparatuses that have been employed in any democratic election process, including ballots, lever systems, and DRE (direct-recording electronic) voting machines, have a history of intrinsic vulnerabilities and illusory public trust. To fully understand why all voting apparatuses are flawed, one must know the design specifications, the basics of which are summarized neatly in Michael Shamos, Ph.D.'s six commandments for voting system design (listed in order of consensual public importance):&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
#''Thou shalt keep each voter's choices an inviolable secret.''&lt;br /&gt;
#''Thou shalt allow each eligible voter to vote only once, and only for those offices for which she is authorized to cast a vote.''&lt;br /&gt;
#''Thou shalt not permit tampering with thy voting system, nor the exchange of gold for votes.''&lt;br /&gt;
#''Thou shalt report all votes accurately.''&lt;br /&gt;
#''Thy voting system shall remain operable throughout each election.''&lt;br /&gt;
#''Thou shalt keep an audit trail to detect sins against Commandments II-IV, but thy audit trail shall not violate Commandment I.''[http://cpsr.org/prevsite/conferences/cfp93/shamos.html/#2b]&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
Successful implementation of such a system is a practical impossibility.  The chief contradiction lies between commandments '''I''' and '''VI''':  one cannot successfully audit a set of votes in which each voter's selections are guaranteed to be secret.  That is, the disconnect between vote capture and vote reporting, as required by the primary commandment precludes a reliable audit.  And so the historical solution to this dilemma has been to always maintain the secrecy of each vote, while relaxing the audit requirement to allow the use of merely &amp;quot;good-enough&amp;quot; solutions.&lt;br /&gt;
&lt;br /&gt;
==Proprietary Systems==&lt;br /&gt;
===Advantages===&lt;br /&gt;
A leading proponent of proprietary software is Microsoft. They argue that requiring users to pay for software as a product increases funding for the research and development of software. They claim that per-copy fees maximize the profitability of software development.&lt;br /&gt;
&lt;br /&gt;
When it comes to market revenue, closed source software especially creates greater commercial activity over free software.&lt;br /&gt;
&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
&lt;br /&gt;
*Closed systems require the public to trust a private entity to have done due diligence in manufacturing a robust technical solution, and to trust that the system is impervious to tampering by maligned parties. &lt;br /&gt;
*Keeping system design closed to the public does not necessarily prevent interested parties from viewing that design; lax security policies, outright bribery, or simple carelessness may lead to [http://www.wired.com/politics/onlinerights/news/2003/10/61014 public exposure of that design].&lt;br /&gt;
&lt;br /&gt;
==Open Source Systems==&lt;br /&gt;
===Advantages===&lt;br /&gt;
An obvious benefit is that open source code, available to all, is usually free.&lt;br /&gt;
&lt;br /&gt;
Another convenience of open source code is that bugs are usually found faster and can be fixed by the user(s) who comes across it. Instead of waiting for a new release of the software with the bug corrected, open source code can also be redistributed to bring a corrected version to everyone immediately.&lt;br /&gt;
&lt;br /&gt;
Support for open source software, just as the software itself, is easily accessible. With so many people able to view the code, theoretically any number of them could offer support.&lt;br /&gt;
&lt;br /&gt;
Possibly the biggest advantage of open source software is the fact that everybody has the right and ability to modify and tweak the source code. This allows for implementation in other software and adaptability to a changing environment.&lt;br /&gt;
&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
*If a system design is open to public inspection, then anyone is free to locate vulnerabilities within that system without reporting them to codebase maintainers; those vulnerabilities could be used for private gain.&lt;br /&gt;
*Even if a published system design is purported to be used; that does not guarantee that it is so.  It is feasible that an organization could claim to use published source code, but then use a different system altogether in the actual implementation.&lt;br /&gt;
*One of the strengths of open source projects is that ''more eyes'' seems to imply better code, but in highly specialized systems, the general public may lack the technical expertise to properly evaluate or improve them.  Certainly basic bugs and glaring security flaws may be addressed by the public, but more nuanced vulnerabilities require highly skilled minds to detect.&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
* [http://cpsr.org/prevsite/conferences/cfp93/shamos.html/ Electronic Voting - Evaluating the Threat] Michael Ian Shamos, Ph.D., J.D.  March 1993.&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
* [http://www.technewsworld.com/story/56938.html?welcome=1218234164 Open Source, Transparency and Electronic Voting] John P. Mello, Jr., ''LinuxInsider''.  Apr 18, 2007.&lt;br /&gt;
* [http://www.wired.com/politics/onlinerights/news/2003/10/61014 E-Vote Software Leaked Online] Kim Zetter, ''Wired''. Oct 29, 2003.&lt;br /&gt;
* [http://rawstory.com/news/2005/Diebold_insider__alleges_company_plagued_1206.html Diebold insider alleges company plagued by technical woes, Diebold defends 'sterling' record] Miriam Raftery, ''Raw Story''. Dec 6, 2005.&lt;br /&gt;
* [http://avirubin.com/vote.pdf Analysis of an Electronic Voting System (pdf)] Tadayoshi Kohno, et al. Johns Hopkins University Information Security Institute. July 23, 2003.&lt;br /&gt;
* [http://timjimnetworktech.wikidot.com/advantages-disadvantages-of-open-source Advantages Disadvantages Of Open Source]&lt;br /&gt;
* [http://itmanagement.earthweb.com/osrc/article.php/3758486 Datamation - Closed Source vs. Open Source in Desktop Linux] Matt Hartley, July 12, 2008.&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=17002</id>
		<title>CSC 379 SUM2008:Week 5, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=17002"/>
		<updated>2008-08-10T03:05:13Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Voting Systems */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Open Non-Proprietary Technology vs. Closed Proprietary Technology =&lt;br /&gt;
&lt;br /&gt;
The issues surrounding electronic voting have highlighted the concerns of use of open non-proprietary technology vs. closed proprietary technology.  On the one side, closed proprietary technology allegedly safeguards voting security by making it impossible for outsiders to discover vulnerabilities by analyzing the code.  On the other side, open technology encourages more eyes to look over the code, and may find vulnerabilities in advance, in time to correct them.  What bearing does this discussion have on other types of software systems?  Should other systems with high social value also have open non-proprietary licenses to increase accountability, or do the risks of open licensing outweigh the benefits?  &lt;br /&gt;
&lt;br /&gt;
Examine how the experience with electronic voting applies to other critical software systems (e.g., software used for port security, handling medical records, or managing a payroll).  What are the costs and benefits of open non-proprietary technology vs. closed proprietary technology for such applications?  Are there applications where one or the other should clearly be used?  Are there applications for which neither is appropriate?  Please explain your answers.&lt;br /&gt;
&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
&lt;br /&gt;
==Electronic Voting==&lt;br /&gt;
&lt;br /&gt;
The voting apparatuses that have been employed in any democratic election process, including ballots, lever systems, and DRE (direct-recording electronic) voting machines, have a history of intrinsic vulnerabilities and illusory public trust. To fully understand why all voting apparatuses are flawed, one must know the design specifications, the basics of which are summarized neatly in Michael Shamos, Ph.D.'s six commandments for voting system design (listed in order of consensual public importance):&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
#''Thou shalt keep each voter's choices an inviolable secret.''&lt;br /&gt;
#''Thou shalt allow each eligible voter to vote only once, and only for those offices for which she is authorized to cast a vote.''&lt;br /&gt;
#''Thou shalt not permit tampering with thy voting system, nor the exchange of gold for votes.''&lt;br /&gt;
#''Thou shalt report all votes accurately.''&lt;br /&gt;
#''Thy voting system shall remain operable throughout each election.''&lt;br /&gt;
#''Thou shalt keep an audit trail to detect sins against Commandments II-IV, but thy audit trail shall not violate Commandment I.''[http://cpsr.org/prevsite/conferences/cfp93/shamos.html/#2b]&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
Successful implementation of such a system is a practical impossibility.  The chief contradiction lies between commandments '''I''' and '''VI''':  one cannot successfully audit a set of votes in which each voter's selections are guaranteed to be secret.  That is, the disconnect between vote capture and vote reporting, as required by the primary commandment precludes a reliable audit.  And so the historical solution to this dilemma has been to always maintain the secrecy of each vote, while relaxing the audit requirement to allow the use of merely &amp;quot;good-enough&amp;quot; solutions.&lt;br /&gt;
&lt;br /&gt;
==Proprietary Systems==&lt;br /&gt;
===Advantages===&lt;br /&gt;
A leading proponent of proprietary software is Microsoft. They argue that requiring users to pay for software as a product increases funding for the research and development of software. They claim that per-copy fees maximize the profitability of software development.&lt;br /&gt;
&lt;br /&gt;
When it comes to market revenue, closed source software especially creates greater commercial activity over free software.&lt;br /&gt;
&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
&lt;br /&gt;
*Closed systems require the public to trust a private entity to have done due diligence in manufacturing a robust technical solution, and to trust that the system is impervious to tampering by maligned parties. &lt;br /&gt;
*Keeping system design closed to the public does not necessarily prevent interested parties from viewing that design; lax security policies, outright bribery, or simple carelessness may lead to [http://www.wired.com/politics/onlinerights/news/2003/10/61014 public exposure of that design].&lt;br /&gt;
&lt;br /&gt;
==Open Source System==&lt;br /&gt;
===Advantages===&lt;br /&gt;
An obvious benefit is that open source code, available to all, is usually free.&lt;br /&gt;
&lt;br /&gt;
Another convenience of open source code is that bugs are usually found faster and can be fixed by the user(s) who comes across it. Instead of waiting for a new release of the software with the bug corrected, open source code can also be redistributed to bring a corrected version to everyone immediately.&lt;br /&gt;
&lt;br /&gt;
Support for open source software, just as the software itself, is easily accessible. With so many people able to view the code, theoretically any number of them could offer support.&lt;br /&gt;
&lt;br /&gt;
Possibly the biggest advantage of open source software is the fact that everybody has the right and ability to modify and tweak the source code. This allows for implementation in other software and adaptability to a changing environment.&lt;br /&gt;
&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
*If a system design is open to public inspection, then anyone is free to locate vulnerabilities within that system without reporting them to codebase maintainers; those vulnerabilities could be used for private gain.&lt;br /&gt;
*Even if a published system design is purported to be used; that does not guarantee that it is so.  It is feasible that an organization could claim to use published source code, but then use a different system altogether in the actual implementation.&lt;br /&gt;
*One of the strengths of open source projects is that ''more eyes'' seems to imply better code, but in highly specialized systems, the general public may lack the technical expertise to properly evaluate or improve them.  Certainly basic bugs and glaring security flaws may be addressed by the public, but more nuanced vulnerabilities require highly skilled minds to detect.&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
* [http://cpsr.org/prevsite/conferences/cfp93/shamos.html/ Electronic Voting - Evaluating the Threat] Michael Ian Shamos, Ph.D., J.D.  March 1993.&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
* [http://www.technewsworld.com/story/56938.html?welcome=1218234164 Open Source, Transparency and Electronic Voting] John P. Mello, Jr., ''LinuxInsider''.  Apr 18, 2007.&lt;br /&gt;
* [http://www.wired.com/politics/onlinerights/news/2003/10/61014 E-Vote Software Leaked Online] Kim Zetter, ''Wired''. Oct 29, 2003.&lt;br /&gt;
* [http://rawstory.com/news/2005/Diebold_insider__alleges_company_plagued_1206.html Diebold insider alleges company plagued by technical woes, Diebold defends 'sterling' record] Miriam Raftery, ''Raw Story''. Dec 6, 2005.&lt;br /&gt;
* [http://avirubin.com/vote.pdf Analysis of an Electronic Voting System (pdf)] Tadayoshi Kohno, et al. Johns Hopkins University Information Security Institute. July 23, 2003.&lt;br /&gt;
* [http://timjimnetworktech.wikidot.com/advantages-disadvantages-of-open-source Advantages Disadvantages Of Open Source]&lt;br /&gt;
* [http://itmanagement.earthweb.com/osrc/article.php/3758486 Datamation - Closed Source vs. Open Source in Desktop Linux] Matt Hartley, July 12, 2008.&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=17001</id>
		<title>CSC 379 SUM2008:Week 5, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=17001"/>
		<updated>2008-08-10T03:04:38Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Open Non-Proprietary Technology vs. Closed Proprietary Technology =&lt;br /&gt;
&lt;br /&gt;
The issues surrounding electronic voting have highlighted the concerns of use of open non-proprietary technology vs. closed proprietary technology.  On the one side, closed proprietary technology allegedly safeguards voting security by making it impossible for outsiders to discover vulnerabilities by analyzing the code.  On the other side, open technology encourages more eyes to look over the code, and may find vulnerabilities in advance, in time to correct them.  What bearing does this discussion have on other types of software systems?  Should other systems with high social value also have open non-proprietary licenses to increase accountability, or do the risks of open licensing outweigh the benefits?  &lt;br /&gt;
&lt;br /&gt;
Examine how the experience with electronic voting applies to other critical software systems (e.g., software used for port security, handling medical records, or managing a payroll).  What are the costs and benefits of open non-proprietary technology vs. closed proprietary technology for such applications?  Are there applications where one or the other should clearly be used?  Are there applications for which neither is appropriate?  Please explain your answers.&lt;br /&gt;
&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
&lt;br /&gt;
==Voting Systems==&lt;br /&gt;
&lt;br /&gt;
The voting apparatuses that have been employed in any democratic election process, including ballots, lever systems, and DRE (direct-recording electronic) voting machines, have a history of intrinsic vulnerabilities and illusory public trust. To fully understand why all voting apparatuses are flawed, one must know the design specifications, the basics of which are summarized neatly in Michael Shamos, Ph.D.'s six commandments for voting system design (listed in order of consensual public importance):&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
#''Thou shalt keep each voter's choices an inviolable secret.''&lt;br /&gt;
#''Thou shalt allow each eligible voter to vote only once, and only for those offices for which she is authorized to cast a vote.''&lt;br /&gt;
#''Thou shalt not permit tampering with thy voting system, nor the exchange of gold for votes.''&lt;br /&gt;
#''Thou shalt report all votes accurately.''&lt;br /&gt;
#''Thy voting system shall remain operable throughout each election.''&lt;br /&gt;
#''Thou shalt keep an audit trail to detect sins against Commandments II-IV, but thy audit trail shall not violate Commandment I.''[http://cpsr.org/prevsite/conferences/cfp93/shamos.html/#2b]&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
Successful implementation of such a system is a practical impossibility.  The chief contradiction lies between commandments '''I''' and '''VI''':  one cannot successfully audit a set of votes in which each voter's selections are guaranteed to be secret.  That is, the disconnect between vote capture and vote reporting, as required by the primary commandment precludes a reliable audit.  And so the historical solution to this dilemma has been to always maintain the secrecy of each vote, while relaxing the audit requirement to allow the use of merely &amp;quot;good-enough&amp;quot; solutions.&lt;br /&gt;
&lt;br /&gt;
==Proprietary Systems==&lt;br /&gt;
===Advantages===&lt;br /&gt;
A leading proponent of proprietary software is Microsoft. They argue that requiring users to pay for software as a product increases funding for the research and development of software. They claim that per-copy fees maximize the profitability of software development.&lt;br /&gt;
&lt;br /&gt;
When it comes to market revenue, closed source software especially creates greater commercial activity over free software.&lt;br /&gt;
&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
&lt;br /&gt;
*Closed systems require the public to trust a private entity to have done due diligence in manufacturing a robust technical solution, and to trust that the system is impervious to tampering by maligned parties. &lt;br /&gt;
*Keeping system design closed to the public does not necessarily prevent interested parties from viewing that design; lax security policies, outright bribery, or simple carelessness may lead to [http://www.wired.com/politics/onlinerights/news/2003/10/61014 public exposure of that design].&lt;br /&gt;
&lt;br /&gt;
==Open Source System==&lt;br /&gt;
===Advantages===&lt;br /&gt;
An obvious benefit is that open source code, available to all, is usually free.&lt;br /&gt;
&lt;br /&gt;
Another convenience of open source code is that bugs are usually found faster and can be fixed by the user(s) who comes across it. Instead of waiting for a new release of the software with the bug corrected, open source code can also be redistributed to bring a corrected version to everyone immediately.&lt;br /&gt;
&lt;br /&gt;
Support for open source software, just as the software itself, is easily accessible. With so many people able to view the code, theoretically any number of them could offer support.&lt;br /&gt;
&lt;br /&gt;
Possibly the biggest advantage of open source software is the fact that everybody has the right and ability to modify and tweak the source code. This allows for implementation in other software and adaptability to a changing environment.&lt;br /&gt;
&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
*If a system design is open to public inspection, then anyone is free to locate vulnerabilities within that system without reporting them to codebase maintainers; those vulnerabilities could be used for private gain.&lt;br /&gt;
*Even if a published system design is purported to be used; that does not guarantee that it is so.  It is feasible that an organization could claim to use published source code, but then use a different system altogether in the actual implementation.&lt;br /&gt;
*One of the strengths of open source projects is that ''more eyes'' seems to imply better code, but in highly specialized systems, the general public may lack the technical expertise to properly evaluate or improve them.  Certainly basic bugs and glaring security flaws may be addressed by the public, but more nuanced vulnerabilities require highly skilled minds to detect.&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
* [http://cpsr.org/prevsite/conferences/cfp93/shamos.html/ Electronic Voting - Evaluating the Threat] Michael Ian Shamos, Ph.D., J.D.  March 1993.&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
* [http://www.technewsworld.com/story/56938.html?welcome=1218234164 Open Source, Transparency and Electronic Voting] John P. Mello, Jr., ''LinuxInsider''.  Apr 18, 2007.&lt;br /&gt;
* [http://www.wired.com/politics/onlinerights/news/2003/10/61014 E-Vote Software Leaked Online] Kim Zetter, ''Wired''. Oct 29, 2003.&lt;br /&gt;
* [http://rawstory.com/news/2005/Diebold_insider__alleges_company_plagued_1206.html Diebold insider alleges company plagued by technical woes, Diebold defends 'sterling' record] Miriam Raftery, ''Raw Story''. Dec 6, 2005.&lt;br /&gt;
* [http://avirubin.com/vote.pdf Analysis of an Electronic Voting System (pdf)] Tadayoshi Kohno, et al. Johns Hopkins University Information Security Institute. July 23, 2003.&lt;br /&gt;
* [http://timjimnetworktech.wikidot.com/advantages-disadvantages-of-open-source Advantages Disadvantages Of Open Source]&lt;br /&gt;
* [http://itmanagement.earthweb.com/osrc/article.php/3758486 Datamation - Closed Source vs. Open Source in Desktop Linux] Matt Hartley, July 12, 2008.&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16993</id>
		<title>CSC 379 SUM2008:Week 5, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16993"/>
		<updated>2008-08-09T19:58:36Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Disadvantages */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Open Non-Proprietary Technology vs. Closed Proprietary Technology =&lt;br /&gt;
&lt;br /&gt;
The issues surrounding electronic voting have highlighted the concerns of use of open non-proprietary technology vs. closed proprietary technology.  On the one side, closed proprietary technology allegedly safeguards voting security by making it impossible for outsiders to discover vulnerabilities by analyzing the code.  On the other side, open technology encourages more eyes to look over the code, and may find vulnerabilities in advance, in time to correct them.  What bearing does this discussion have on other types of software systems?  Should other systems with high social value also have open non-proprietary licenses to increase accountability, or do the risks of open licensing outweigh the benefits?  &lt;br /&gt;
&lt;br /&gt;
Examine how the experience with electronic voting applies to other critical software systems (e.g., software used for port security, handling medical records, or managing a payroll).  What are the costs and benefits of open non-proprietary technology vs. closed proprietary technology for such applications?  Are there applications where one or the other should clearly be used?  Are there applications for which neither is appropriate?  Please explain your answers.&lt;br /&gt;
&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The voting apparatuses that have been employed in any democratic election process, including ballots, lever systems, and DRE (direct-recording electronic) voting machines, have a history of intrinsic vulnerabilities and illusory public trust. To fully understand why all voting apparatuses are flawed, one must know the design specifications, the basics of which are summarized neatly in Michael Shamos, Ph.D.'s six commandments for voting system design (listed in order of consensual public importance):&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
#''Thou shalt keep each voter's choices an inviolable secret.''&lt;br /&gt;
#''Thou shalt allow each eligible voter to vote only once, and only for those offices for which she is authorized to cast a vote.''&lt;br /&gt;
#''Thou shalt not permit tampering with thy voting system, nor the exchange of gold for votes.''&lt;br /&gt;
#''Thou shalt report all votes accurately.''&lt;br /&gt;
#''Thy voting system shall remain operable throughout each election.''&lt;br /&gt;
#''Thou shalt keep an audit trail to detect sins against Commandments II-IV, but thy audit trail shall not violate Commandment I.''[http://cpsr.org/prevsite/conferences/cfp93/shamos.html/#2b]&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
Successful implementation of such a system is a practical impossibility.  The chief contradiction lies between commandments '''I''' and '''VI''':  one cannot successfully audit a set of votes in which each voter's selections are guaranteed to be secret.  That is, the disconnect between vote capture and vote reporting, as required by the primary commandment precludes a reliable audit.  And so the historical solution to this dilemma has been to always maintain the secrecy of each vote, while relaxing the audit requirement to allow the use of merely &amp;quot;good-enough&amp;quot; solutions.&lt;br /&gt;
&lt;br /&gt;
==Proprietary Systems==&lt;br /&gt;
===Advantages===&lt;br /&gt;
A leading proponent of proprietary software is Microsoft. They argue that requiring users to pay for software as a product increases funding for the research and development of software. They claim that per-copy fees maximize the profitability of software development.&lt;br /&gt;
&lt;br /&gt;
When it comes to market revenue, closed source software especially creates greater commercial activity over free software.&lt;br /&gt;
&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
&lt;br /&gt;
*Closed systems require the public to trust a private entity to have done due diligence in manufacturing a robust technical solution, and to trust that the system is impervious to tampering by maligned parties. &lt;br /&gt;
*Keeping system design closed to the public does not necessarily prevent interested parties from viewing that design; lax security policies, outright bribery, or simple carelessness may lead to [http://www.wired.com/politics/onlinerights/news/2003/10/61014 public exposure of that design].&lt;br /&gt;
&lt;br /&gt;
==Open Source System==&lt;br /&gt;
===Advantages===&lt;br /&gt;
An obvious benefit is that open source code, available to all, is usually free.&lt;br /&gt;
&lt;br /&gt;
Another convenience of open source code is that bugs are usually found faster and can be fixed by the user(s) who comes across it. Instead of waiting for a new release of the software with the bug corrected, open source code can also be redistributed to bring a corrected version to everyone immediately.&lt;br /&gt;
&lt;br /&gt;
Support for open source software, just as the software itself, is easily accessible. With so many people able to view the code, theoretically any number of them could offer support.&lt;br /&gt;
&lt;br /&gt;
Possibly the biggest advantage of open source software is the fact that everybody has the right and ability to modify and tweak the source code. This allows for implementation in other software and adaptability to a changing environment.&lt;br /&gt;
&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
*If a system design is open to public inspection, then anyone is free to locate vulnerabilities within that system without reporting them to codebase maintainers; those vulnerabilities could be used for private gain.&lt;br /&gt;
*Even if a published system design is purported to be used; that does not guarantee that it is so.  It is feasible that an organization could claim to use published source code, but then use a different system altogether in the actual implementation.&lt;br /&gt;
*One of the strengths of open source projects is that ''more eyes'' seems to imply better code, but in highly specialized systems, the general public may lack the technical expertise to properly evaluate or improve them.  Certainly basic bugs and glaring security flaws may be addressed by the public, but more nuanced vulnerabilities require highly skilled minds to detect.&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
* [http://cpsr.org/prevsite/conferences/cfp93/shamos.html/ Electronic Voting - Evaluating the Threat] Michael Ian Shamos, Ph.D., J.D.  March 1993.&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
* [http://www.technewsworld.com/story/56938.html?welcome=1218234164 Open Source, Transparency and Electronic Voting] John P. Mello, Jr., ''LinuxInsider''.  Apr 18, 2007.&lt;br /&gt;
* [http://www.wired.com/politics/onlinerights/news/2003/10/61014 E-Vote Software Leaked Online] Kim Zetter, ''Wired''. Oct 29, 2003.&lt;br /&gt;
* [http://rawstory.com/news/2005/Diebold_insider__alleges_company_plagued_1206.html Diebold insider alleges company plagued by technical woes, Diebold defends 'sterling' record] Miriam Raftery, ''Raw Story''. Dec 6, 2005.&lt;br /&gt;
* [http://avirubin.com/vote.pdf Analysis of an Electronic Voting System (pdf)] Tadayoshi Kohno, et al. Johns Hopkins University Information Security Institute. July 23, 2003.&lt;br /&gt;
* [http://timjimnetworktech.wikidot.com/advantages-disadvantages-of-open-source Advantages Disadvantages Of Open Source]&lt;br /&gt;
* [http://itmanagement.earthweb.com/osrc/article.php/3758486 Datamation - Closed Source vs. Open Source in Desktop Linux] Matt Hartley, July 12, 2008.&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16992</id>
		<title>CSC 379 SUM2008:Week 5, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16992"/>
		<updated>2008-08-09T16:09:43Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Disadvantages */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Open Non-Proprietary Technology vs. Closed Proprietary Technology =&lt;br /&gt;
&lt;br /&gt;
The issues surrounding electronic voting have highlighted the concerns of use of open non-proprietary technology vs. closed proprietary technology.  On the one side, closed proprietary technology allegedly safeguards voting security by making it impossible for outsiders to discover vulnerabilities by analyzing the code.  On the other side, open technology encourages more eyes to look over the code, and may find vulnerabilities in advance, in time to correct them.  What bearing does this discussion have on other types of software systems?  Should other systems with high social value also have open non-proprietary licenses to increase accountability, or do the risks of open licensing outweigh the benefits?  &lt;br /&gt;
&lt;br /&gt;
Examine how the experience with electronic voting applies to other critical software systems (e.g., software used for port security, handling medical records, or managing a payroll).  What are the costs and benefits of open non-proprietary technology vs. closed proprietary technology for such applications?  Are there applications where one or the other should clearly be used?  Are there applications for which neither is appropriate?  Please explain your answers.&lt;br /&gt;
&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The voting apparatuses that have been employed in any democratic election process, including ballots, lever systems, and DRE (direct-recording electronic) voting machines, have a history of intrinsic vulnerabilities and illusory public trust. To fully understand why all voting apparatuses are flawed, one must know the design specifications, the basics of which are summarized neatly in Michael Shamos, Ph.D.'s six commandments for voting system design (listed in order of consensual public importance):&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
#''Thou shalt keep each voter's choices an inviolable secret.''&lt;br /&gt;
#''Thou shalt allow each eligible voter to vote only once, and only for those offices for which she is authorized to cast a vote.''&lt;br /&gt;
#''Thou shalt not permit tampering with thy voting system, nor the exchange of gold for votes.''&lt;br /&gt;
#''Thou shalt report all votes accurately.''&lt;br /&gt;
#''Thy voting system shall remain operable throughout each election.''&lt;br /&gt;
#''Thou shalt keep an audit trail to detect sins against Commandments II-IV, but thy audit trail shall not violate Commandment I.''[http://cpsr.org/prevsite/conferences/cfp93/shamos.html/#2b]&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
Successful implementation of such a system is a practical impossibility.  The chief contradiction lies between commandments '''I''' and '''VI''':  one cannot successfully audit a set of votes in which each voter's selections are guaranteed to be secret.  That is, the disconnect between vote capture and vote reporting, as required by the primary commandment precludes a reliable audit.  And so the historical solution to this dilemma has been to always maintain the secrecy of each vote, while relaxing the audit requirement to allow the use of merely &amp;quot;good-enough&amp;quot; solutions.&lt;br /&gt;
&lt;br /&gt;
==Proprietary Systems==&lt;br /&gt;
===Advantages===&lt;br /&gt;
A leading proponent of proprietary software is Microsoft. They argue that requiring users to pay for software as a product increases funding for the research and development of software. They claim that per-copy fees maximize the profitability of software development.&lt;br /&gt;
&lt;br /&gt;
When it comes to market revenue, closed source software especially creates greater commercial activity over free software.&lt;br /&gt;
&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
&lt;br /&gt;
*Closed systems require the public to trust a private entity to have done due diligence in manufacturing a robust technical solution, and to trust that the system is impervious to tampering by maligned parties. &lt;br /&gt;
*Keeping system design closed to the public does not necessarily prevent interested parties from viewing that design; lax security policies, outright bribery, or simple carelessness may lead to [http://www.wired.com/politics/onlinerights/news/2003/10/61014 public exposure of that design].&lt;br /&gt;
&lt;br /&gt;
==Open Source System==&lt;br /&gt;
===Advantages===&lt;br /&gt;
An obvious benefit is that open source code, available to all, is usually free.&lt;br /&gt;
&lt;br /&gt;
Another convenience of open source code is that bugs are usually found faster and can be fixed by the user(s) who comes across it. Instead of waiting for a new release of the software with the bug corrected, open source code can also be redistributed to bring a corrected version to everyone immediately.&lt;br /&gt;
&lt;br /&gt;
Support for open source software, just as the software itself, is easily accessible. With so many people able to view the code, theoretically any number of them could offer support.&lt;br /&gt;
&lt;br /&gt;
Possibly the biggest advantage of open source software is the fact that everybody has the right and ability to modify and tweak the source code. This allows for implementation in other software and adaptability to a changing environment.&lt;br /&gt;
&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Resources==&lt;br /&gt;
* [http://cpsr.org/prevsite/conferences/cfp93/shamos.html/ Electronic Voting - Evaluating the Threat] Michael Ian Shamos, Ph.D., J.D.  March 1993.&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
* [http://www.technewsworld.com/story/56938.html?welcome=1218234164 Open Source, Transparency and Electronic Voting] John P. Mello, Jr., ''LinuxInsider''.  Apr 18, 2007.&lt;br /&gt;
* [http://www.wired.com/politics/onlinerights/news/2003/10/61014 E-Vote Software Leaked Online] Kim Zetter, ''Wired''. Oct 29, 2003.&lt;br /&gt;
* [http://rawstory.com/news/2005/Diebold_insider__alleges_company_plagued_1206.html Diebold insider alleges company plagued by technical woes, Diebold defends 'sterling' record] Miriam Raftery, ''Raw Story''. Dec 6, 2005.&lt;br /&gt;
* [http://avirubin.com/vote.pdf Analysis of an Electronic Voting System (pdf)] Tadayoshi Kohno, et al. Johns Hopkins University Information Security Institute. July 23, 2003.&lt;br /&gt;
* [http://timjimnetworktech.wikidot.com/advantages-disadvantages-of-open-source Advantages Disadvantages Of Open Source]&lt;br /&gt;
* [http://itmanagement.earthweb.com/osrc/article.php/3758486 Datamation - Closed Source vs. Open Source in Desktop Linux] Matt Hartley, July 12, 2008.&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16991</id>
		<title>CSC 379 SUM2008:Week 5, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16991"/>
		<updated>2008-08-09T16:05:38Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Disadvantages */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Open Non-Proprietary Technology vs. Closed Proprietary Technology =&lt;br /&gt;
&lt;br /&gt;
The issues surrounding electronic voting have highlighted the concerns of use of open non-proprietary technology vs. closed proprietary technology.  On the one side, closed proprietary technology allegedly safeguards voting security by making it impossible for outsiders to discover vulnerabilities by analyzing the code.  On the other side, open technology encourages more eyes to look over the code, and may find vulnerabilities in advance, in time to correct them.  What bearing does this discussion have on other types of software systems?  Should other systems with high social value also have open non-proprietary licenses to increase accountability, or do the risks of open licensing outweigh the benefits?  &lt;br /&gt;
&lt;br /&gt;
Examine how the experience with electronic voting applies to other critical software systems (e.g., software used for port security, handling medical records, or managing a payroll).  What are the costs and benefits of open non-proprietary technology vs. closed proprietary technology for such applications?  Are there applications where one or the other should clearly be used?  Are there applications for which neither is appropriate?  Please explain your answers.&lt;br /&gt;
&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The voting apparatuses that have been employed in any democratic election process, including ballots, lever systems, and DRE (direct-recording electronic) voting machines, have a history of intrinsic vulnerabilities and illusory public trust. To fully understand why all voting apparatuses are flawed, one must know the design specifications, the basics of which are summarized neatly in Michael Shamos, Ph.D.'s six commandments for voting system design (listed in order of consensual public importance):&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
#''Thou shalt keep each voter's choices an inviolable secret.''&lt;br /&gt;
#''Thou shalt allow each eligible voter to vote only once, and only for those offices for which she is authorized to cast a vote.''&lt;br /&gt;
#''Thou shalt not permit tampering with thy voting system, nor the exchange of gold for votes.''&lt;br /&gt;
#''Thou shalt report all votes accurately.''&lt;br /&gt;
#''Thy voting system shall remain operable throughout each election.''&lt;br /&gt;
#''Thou shalt keep an audit trail to detect sins against Commandments II-IV, but thy audit trail shall not violate Commandment I.''[http://cpsr.org/prevsite/conferences/cfp93/shamos.html/#2b]&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
Successful implementation of such a system is a practical impossibility.  The chief contradiction lies between commandments '''I''' and '''VI''':  one cannot successfully audit a set of votes in which each voter's selections are guaranteed to be secret.  That is, the disconnect between vote capture and vote reporting, as required by the primary commandment precludes a reliable audit.  And so the historical solution to this dilemma has been to always maintain the secrecy of each vote, while relaxing the audit requirement to allow the use of merely &amp;quot;good-enough&amp;quot; solutions.&lt;br /&gt;
&lt;br /&gt;
==Proprietary Systems==&lt;br /&gt;
===Advantages===&lt;br /&gt;
A leading proponent of proprietary software is Microsoft. They argue that requiring users to pay for software as a product increases funding for the research and development of software. They claim that per-copy fees maximize the profitability of software development.&lt;br /&gt;
&lt;br /&gt;
When it comes to market revenue, closed source software especially creates greater commercial activity over free software.&lt;br /&gt;
&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
&lt;br /&gt;
*Keeping system design closed to the public does not necessarily prevent interested parties from viewing that design; lax security policies, outright bribery, or simple carelessness may lead to [http://www.wired.com/politics/onlinerights/news/2003/10/61014 public exposure of that design].&lt;br /&gt;
&lt;br /&gt;
==Open Source System==&lt;br /&gt;
===Advantages===&lt;br /&gt;
An obvious benefit is that open source code, available to all, is usually free.&lt;br /&gt;
&lt;br /&gt;
Another convenience of open source code is that bugs are usually found faster and can be fixed by the user(s) who comes across it. Instead of waiting for a new release of the software with the bug corrected, open source code can also be redistributed to bring a corrected version to everyone immediately.&lt;br /&gt;
&lt;br /&gt;
Support for open source software, just as the software itself, is easily accessible. With so many people able to view the code, theoretically any number of them could offer support.&lt;br /&gt;
&lt;br /&gt;
Possibly the biggest advantage of open source software is the fact that everybody has the right and ability to modify and tweak the source code. This allows for implementation in other software and adaptability to a changing environment.&lt;br /&gt;
&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Resources==&lt;br /&gt;
* [http://cpsr.org/prevsite/conferences/cfp93/shamos.html/ Electronic Voting - Evaluating the Threat] Michael Ian Shamos, Ph.D., J.D.  March 1993.&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
* [http://www.technewsworld.com/story/56938.html?welcome=1218234164 Open Source, Transparency and Electronic Voting] John P. Mello, Jr., ''LinuxInsider''.  Apr 18, 2007.&lt;br /&gt;
* [http://www.wired.com/politics/onlinerights/news/2003/10/61014 E-Vote Software Leaked Online] Kim Zetter, ''Wired''. Oct 29, 2003.&lt;br /&gt;
* [http://rawstory.com/news/2005/Diebold_insider__alleges_company_plagued_1206.html Diebold insider alleges company plagued by technical woes, Diebold defends 'sterling' record] Miriam Raftery, ''Raw Story''. Dec 6, 2005.&lt;br /&gt;
* [http://avirubin.com/vote.pdf Analysis of an Electronic Voting System (pdf)] Tadayoshi Kohno, et al. Johns Hopkins University Information Security Institute. July 23, 2003.&lt;br /&gt;
* [http://timjimnetworktech.wikidot.com/advantages-disadvantages-of-open-source Advantages Disadvantages Of Open Source]&lt;br /&gt;
* [http://itmanagement.earthweb.com/osrc/article.php/3758486 Datamation - Closed Source vs. Open Source in Desktop Linux] Matt Hartley, July 12, 2008.&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16990</id>
		<title>CSC 379 SUM2008:Week 5, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16990"/>
		<updated>2008-08-09T15:54:05Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Open Non-Proprietary Technology vs. Closed Proprietary Technology =&lt;br /&gt;
&lt;br /&gt;
The issues surrounding electronic voting have highlighted the concerns of use of open non-proprietary technology vs. closed proprietary technology.  On the one side, closed proprietary technology allegedly safeguards voting security by making it impossible for outsiders to discover vulnerabilities by analyzing the code.  On the other side, open technology encourages more eyes to look over the code, and may find vulnerabilities in advance, in time to correct them.  What bearing does this discussion have on other types of software systems?  Should other systems with high social value also have open non-proprietary licenses to increase accountability, or do the risks of open licensing outweigh the benefits?  &lt;br /&gt;
&lt;br /&gt;
Examine how the experience with electronic voting applies to other critical software systems (e.g., software used for port security, handling medical records, or managing a payroll).  What are the costs and benefits of open non-proprietary technology vs. closed proprietary technology for such applications?  Are there applications where one or the other should clearly be used?  Are there applications for which neither is appropriate?  Please explain your answers.&lt;br /&gt;
&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The voting apparatuses that have been employed in any democratic election process, including ballots, lever systems, and DRE (direct-recording electronic) voting machines, have a history of intrinsic vulnerabilities and illusory public trust. To fully understand why all voting apparatuses are flawed, one must know the design specifications, the basics of which are summarized neatly in Michael Shamos, Ph.D.'s six commandments for voting system design (listed in order of consensual public importance):&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
#''Thou shalt keep each voter's choices an inviolable secret.''&lt;br /&gt;
#''Thou shalt allow each eligible voter to vote only once, and only for those offices for which she is authorized to cast a vote.''&lt;br /&gt;
#''Thou shalt not permit tampering with thy voting system, nor the exchange of gold for votes.''&lt;br /&gt;
#''Thou shalt report all votes accurately.''&lt;br /&gt;
#''Thy voting system shall remain operable throughout each election.''&lt;br /&gt;
#''Thou shalt keep an audit trail to detect sins against Commandments II-IV, but thy audit trail shall not violate Commandment I.''[http://cpsr.org/prevsite/conferences/cfp93/shamos.html/#2b]&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
Successful implementation of such a system is a practical impossibility.  The chief contradiction lies between commandments '''I''' and '''VI''':  one cannot successfully audit a set of votes in which each voter's selections are guaranteed to be secret.  That is, the disconnect between vote capture and vote reporting, as required by the primary commandment precludes a reliable audit.  And so the historical solution to this dilemma has been to always maintain the secrecy of each vote, while relaxing the audit requirement to allow the use of merely &amp;quot;good-enough&amp;quot; solutions.&lt;br /&gt;
&lt;br /&gt;
==Proprietary Systems==&lt;br /&gt;
===Advantages===&lt;br /&gt;
A leading proponent of proprietary software is Microsoft. They argue that requiring users to pay for software as a product increases funding for the research and development of software. They claim that per-copy fees maximize the profitability of software development.&lt;br /&gt;
&lt;br /&gt;
When it comes to market revenue, closed source software especially creates greater commercial activity over free software.&lt;br /&gt;
&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Open Source System==&lt;br /&gt;
===Advantages===&lt;br /&gt;
An obvious benefit is that open source code, available to all, is usually free.&lt;br /&gt;
&lt;br /&gt;
Another convenience of open source code is that bugs are usually found faster and can be fixed by the user(s) who comes across it. Instead of waiting for a new release of the software with the bug corrected, open source code can also be redistributed to bring a corrected version to everyone immediately.&lt;br /&gt;
&lt;br /&gt;
Support for open source software, just as the software itself, is easily accessible. With so many people able to view the code, theoretically any number of them could offer support.&lt;br /&gt;
&lt;br /&gt;
Possibly the biggest advantage of open source software is the fact that everybody has the right and ability to modify and tweak the source code. This allows for implementation in other software and adaptability to a changing environment.&lt;br /&gt;
&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Resources==&lt;br /&gt;
* [http://cpsr.org/prevsite/conferences/cfp93/shamos.html/ Electronic Voting - Evaluating the Threat] Michael Ian Shamos, Ph.D., J.D.  March 1993.&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
* [http://www.technewsworld.com/story/56938.html?welcome=1218234164 Open Source, Transparency and Electronic Voting] John P. Mello, Jr., ''LinuxInsider''.  Apr 18, 2007.&lt;br /&gt;
* [http://www.wired.com/politics/onlinerights/news/2003/10/61014 E-Vote Software Leaked Online] Kim Zetter, ''Wired''. Oct 29, 2003.&lt;br /&gt;
* [http://rawstory.com/news/2005/Diebold_insider__alleges_company_plagued_1206.html Diebold insider alleges company plagued by technical woes, Diebold defends 'sterling' record] Miriam Raftery, ''Raw Story''. Dec 6, 2005.&lt;br /&gt;
* [http://avirubin.com/vote.pdf Analysis of an Electronic Voting System (pdf)] Tadayoshi Kohno, et al. Johns Hopkins University Information Security Institute. July 23, 2003.&lt;br /&gt;
* [http://timjimnetworktech.wikidot.com/advantages-disadvantages-of-open-source Advantages Disadvantages Of Open Source]&lt;br /&gt;
* [http://itmanagement.earthweb.com/osrc/article.php/3758486 Datamation - Closed Source vs. Open Source in Desktop Linux] Matt Hartley, July 12, 2008.&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16989</id>
		<title>CSC 379 SUM2008:Week 5, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16989"/>
		<updated>2008-08-09T15:53:07Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Open Non-Proprietary Technology vs. Closed Proprietary Technology =&lt;br /&gt;
&lt;br /&gt;
The issues surrounding electronic voting have highlighted the concerns of use of open non-proprietary technology vs. closed proprietary technology.  On the one side, closed proprietary technology allegedly safeguards voting security by making it impossible for outsiders to discover vulnerabilities by analyzing the code.  On the other side, open technology encourages more eyes to look over the code, and may find vulnerabilities in advance, in time to correct them.  What bearing does this discussion have on other types of software systems?  Should other systems with high social value also have open non-proprietary licenses to increase accountability, or do the risks of open licensing outweigh the benefits?  &lt;br /&gt;
&lt;br /&gt;
Examine how the experience with electronic voting applies to other critical software systems (e.g., software used for port security, handling medical records, or managing a payroll).  What are the costs and benefits of open non-proprietary technology vs. closed proprietary technology for such applications?  Are there applications where one or the other should clearly be used?  Are there applications for which neither is appropriate?  Please explain your answers.&lt;br /&gt;
&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The voting apparatuses that have been employed in any democratic election process, including ballots, lever systems, and DRE (direct-recording electronic) voting machines, have a history of intrinsic vulnerabilities and illusory public trust. To fully understand why all voting apparatuses are flawed, one must know the design specifications, the basics of which are summarized neatly in Michael Shamos, Ph.D.'s six commandments for voting system design (listed in order of consensual public importance):&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
#''Thou shalt keep each voter's choices an inviolable secret.''&lt;br /&gt;
#''Thou shalt allow each eligible voter to vote only once, and only for those offices for which she is authorized to cast a vote.''&lt;br /&gt;
#''Thou shalt not permit tampering with thy voting system, nor the exchange of gold for votes.''&lt;br /&gt;
#''Thou shalt report all votes accurately.''&lt;br /&gt;
#''Thy voting system shall remain operable throughout each election.''&lt;br /&gt;
#''Thou shalt keep an audit trail to detect sins against Commandments II-IV, but thy audit trail shall not violate Commandment I.''[http://cpsr.org/prevsite/conferences/cfp93/shamos.html/#2b]&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
Successful implementation of such a system is a practical impossibility.  The chief contradiction lies between commandments '''I''' and '''VI''':  one cannot successfully audit a set of votes in which each voter's selections are guaranteed to be secret.  That is, the disconnect between vote capture and vote reporting, as required by the primary commandment precludes a reliable audit.  And so the historical solution to this dilemma has been to always maintain the secrecy of each vote, while relaxing the audit requirement to merely &amp;quot;good-enough&amp;quot; solutions.&lt;br /&gt;
&lt;br /&gt;
==Proprietary Systems==&lt;br /&gt;
===Advantages===&lt;br /&gt;
A leading proponent of proprietary software is Microsoft. They argue that requiring users to pay for software as a product increases funding for the research and development of software. They claim that per-copy fees maximize the profitability of software development.&lt;br /&gt;
&lt;br /&gt;
When it comes to market revenue, closed source software especially creates greater commercial activity over free software.&lt;br /&gt;
&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Open Source System==&lt;br /&gt;
===Advantages===&lt;br /&gt;
An obvious benefit is that open source code, available to all, is usually free.&lt;br /&gt;
&lt;br /&gt;
Another convenience of open source code is that bugs are usually found faster and can be fixed by the user(s) who comes across it. Instead of waiting for a new release of the software with the bug corrected, open source code can also be redistributed to bring a corrected version to everyone immediately.&lt;br /&gt;
&lt;br /&gt;
Support for open source software, just as the software itself, is easily accessible. With so many people able to view the code, theoretically any number of them could offer support.&lt;br /&gt;
&lt;br /&gt;
Possibly the biggest advantage of open source software is the fact that everybody has the right and ability to modify and tweak the source code. This allows for implementation in other software and adaptability to a changing environment.&lt;br /&gt;
&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Resources==&lt;br /&gt;
* [http://cpsr.org/prevsite/conferences/cfp93/shamos.html/ Electronic Voting - Evaluating the Threat] Michael Ian Shamos, Ph.D., J.D.  March 1993.&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
* [http://www.technewsworld.com/story/56938.html?welcome=1218234164 Open Source, Transparency and Electronic Voting] John P. Mello, Jr., ''LinuxInsider''.  Apr 18, 2007.&lt;br /&gt;
* [http://www.wired.com/politics/onlinerights/news/2003/10/61014 E-Vote Software Leaked Online] Kim Zetter, ''Wired''. Oct 29, 2003.&lt;br /&gt;
* [http://rawstory.com/news/2005/Diebold_insider__alleges_company_plagued_1206.html Diebold insider alleges company plagued by technical woes, Diebold defends 'sterling' record] Miriam Raftery, ''Raw Story''. Dec 6, 2005.&lt;br /&gt;
* [http://avirubin.com/vote.pdf Analysis of an Electronic Voting System (pdf)] Tadayoshi Kohno, et al. Johns Hopkins University Information Security Institute. July 23, 2003.&lt;br /&gt;
* [http://timjimnetworktech.wikidot.com/advantages-disadvantages-of-open-source Advantages Disadvantages Of Open Source]&lt;br /&gt;
* [http://itmanagement.earthweb.com/osrc/article.php/3758486 Datamation - Closed Source vs. Open Source in Desktop Linux] Matt Hartley, July 12, 2008.&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16988</id>
		<title>CSC 379 SUM2008:Week 5, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16988"/>
		<updated>2008-08-09T15:48:32Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Open Non-Proprietary Technology vs. Closed Proprietary Technology =&lt;br /&gt;
&lt;br /&gt;
The issues surrounding electronic voting have highlighted the concerns of use of open non-proprietary technology vs. closed proprietary technology.  On the one side, closed proprietary technology allegedly safeguards voting security by making it impossible for outsiders to discover vulnerabilities by analyzing the code.  On the other side, open technology encourages more eyes to look over the code, and may find vulnerabilities in advance, in time to correct them.  What bearing does this discussion have on other types of software systems?  Should other systems with high social value also have open non-proprietary licenses to increase accountability, or do the risks of open licensing outweigh the benefits?  &lt;br /&gt;
&lt;br /&gt;
Examine how the experience with electronic voting applies to other critical software systems (e.g., software used for port security, handling medical records, or managing a payroll).  What are the costs and benefits of open non-proprietary technology vs. closed proprietary technology for such applications?  Are there applications where one or the other should clearly be used?  Are there applications for which neither is appropriate?  Please explain your answers.&lt;br /&gt;
&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The voting apparatuses that have been employed in any democratic election process, including ballots, lever systems, and DRE (direct-recording electronic) voting machines, have a history of intrinsic vulnerabilities and illusory public trust. To fully understand why all voting apparatuses are flawed, one must know the design specifications, the basics of which are summarized neatly in Michael Shamos, Ph.D.'s six commandments for voting system design (listed in order of consensual public importance):&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
#''Thou shalt keep each voter's choices an inviolable secret.''&lt;br /&gt;
#''Thou shalt allow each eligible voter to vote only once, and only for those offices for which she is authorized to cast a vote.''&lt;br /&gt;
#''Thou shalt not permit tampering with thy voting system, nor the exchange of gold for votes.''&lt;br /&gt;
#''Thou shalt report all votes accurately.''&lt;br /&gt;
#''Thy voting system shall remain operable throughout each election.''&lt;br /&gt;
#''Thou shalt keep an audit trail to detect sins against Commandments II-IV, but thy audit trail shall not violate Commandment I.''[http://cpsr.org/prevsite/conferences/cfp93/shamos.html/#2b]&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
Successful implementation of such a system is a practical impossibility.  The chief contradiction lies between commandments '''I''' and '''VI''':  one cannot successfully audit a set of votes in which each voter's selections are guaranteed to be secret.  That is, the disconnect between vote capture and vote reporting, as required by the primary commandment precludes a reliable audit.&lt;br /&gt;
&lt;br /&gt;
==Proprietary Systems==&lt;br /&gt;
===Advantages===&lt;br /&gt;
A leading proponent of proprietary software is Microsoft. They argue that requiring users to pay for software as a product increases funding for the research and development of software. They claim that per-copy fees maximize the profitability of software development.&lt;br /&gt;
&lt;br /&gt;
When it comes to market revenue, closed source software especially creates greater commercial activity over free software.&lt;br /&gt;
&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Open Source System==&lt;br /&gt;
===Advantages===&lt;br /&gt;
An obvious benefit is that open source code, available to all, is usually free.&lt;br /&gt;
&lt;br /&gt;
Another convenience of open source code is that bugs are usually found faster and can be fixed by the user(s) who comes across it. Instead of waiting for a new release of the software with the bug corrected, open source code can also be redistributed to bring a corrected version to everyone immediately.&lt;br /&gt;
&lt;br /&gt;
Support for open source software, just as the software itself, is easily accessible. With so many people able to view the code, theoretically any number of them could offer support.&lt;br /&gt;
&lt;br /&gt;
Possibly the biggest advantage of open source software is the fact that everybody has the right and ability to modify and tweak the source code. This allows for implementation in other software and adaptability to a changing environment.&lt;br /&gt;
&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Resources==&lt;br /&gt;
* [http://cpsr.org/prevsite/conferences/cfp93/shamos.html/ Electronic Voting - Evaluating the Threat] Michael Ian Shamos, Ph.D., J.D.  March 1993.&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
* [http://www.technewsworld.com/story/56938.html?welcome=1218234164 Open Source, Transparency and Electronic Voting] John P. Mello, Jr., ''LinuxInsider''.  Apr 18, 2007.&lt;br /&gt;
* [http://www.wired.com/politics/onlinerights/news/2003/10/61014 E-Vote Software Leaked Online] Kim Zetter, ''Wired''. Oct 29, 2003.&lt;br /&gt;
* [http://rawstory.com/news/2005/Diebold_insider__alleges_company_plagued_1206.html Diebold insider alleges company plagued by technical woes, Diebold defends 'sterling' record] Miriam Raftery, ''Raw Story''. Dec 6, 2005.&lt;br /&gt;
* [http://avirubin.com/vote.pdf Analysis of an Electronic Voting System (pdf)] Tadayoshi Kohno, et al. Johns Hopkins University Information Security Institute. July 23, 2003.&lt;br /&gt;
* [http://timjimnetworktech.wikidot.com/advantages-disadvantages-of-open-source Advantages Disadvantages Of Open Source]&lt;br /&gt;
* [http://itmanagement.earthweb.com/osrc/article.php/3758486 Datamation - Closed Source vs. Open Source in Desktop Linux] Matt Hartley, July 12, 2008.&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16987</id>
		<title>CSC 379 SUM2008:Week 5, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16987"/>
		<updated>2008-08-09T15:46:56Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Open Non-Proprietary Technology vs. Closed Proprietary Technology =&lt;br /&gt;
&lt;br /&gt;
The issues surrounding electronic voting have highlighted the concerns of use of open non-proprietary technology vs. closed proprietary technology.  On the one side, closed proprietary technology allegedly safeguards voting security by making it impossible for outsiders to discover vulnerabilities by analyzing the code.  On the other side, open technology encourages more eyes to look over the code, and may find vulnerabilities in advance, in time to correct them.  What bearing does this discussion have on other types of software systems?  Should other systems with high social value also have open non-proprietary licenses to increase accountability, or do the risks of open licensing outweigh the benefits?  &lt;br /&gt;
&lt;br /&gt;
Examine how the experience with electronic voting applies to other critical software systems (e.g., software used for port security, handling medical records, or managing a payroll).  What are the costs and benefits of open non-proprietary technology vs. closed proprietary technology for such applications?  Are there applications where one or the other should clearly be used?  Are there applications for which neither is appropriate?  Please explain your answers.&lt;br /&gt;
&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The voting apparatuses that have been employed in any democratic election process, including ballots, lever systems, and DRE (direct-recording electronic) voting machines, have a history of intrinsic vulnerabilities and illusory public trust. To fully understand why all voting apparatuses are flawed, one must know the design specifications, the basics of which are summarized neatly in Michael Shamos, Ph.D.'s six commandments for voting system design (listed in order of consensual public importance):&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
#''Thou shalt keep each voter's choices an inviolable secret.''&lt;br /&gt;
#''Thou shalt allow each eligible voter to vote only once, and only for those offices for which she is authorized to cast a vote.''&lt;br /&gt;
#''Thou shalt not permit tampering with thy voting system, nor the exchange of gold for votes.''&lt;br /&gt;
#''Thou shalt report all votes accurately.''&lt;br /&gt;
#''Thy voting system shall remain operable throughout each election.''&lt;br /&gt;
#''Thou shalt keep an audit trail to detect sins against Commandments II-IV, but thy audit trail shall not violate Commandment I.''&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
Successful implementation of such a system is a practical impossibility.  The chief contradiction lies between commandments '''I''' and '''VI''':  one cannot successfully audit a set of votes in which each voter's selections are guaranteed to be secret.  That is, the disconnect between vote capture and vote reporting, as required by the primary commandment precludes a reliable audit.&lt;br /&gt;
&lt;br /&gt;
==Proprietary Systems==&lt;br /&gt;
===Advantages===&lt;br /&gt;
A leading proponent of proprietary software is Microsoft. They argue that requiring users to pay for software as a product increases funding for the research and development of software. They claim that per-copy fees maximize the profitability of software development.&lt;br /&gt;
&lt;br /&gt;
When it comes to market revenue, closed source software especially creates greater commercial activity over free software.&lt;br /&gt;
&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Open Source System==&lt;br /&gt;
===Advantages===&lt;br /&gt;
An obvious benefit is that open source code, available to all, is usually free.&lt;br /&gt;
&lt;br /&gt;
Another convenience of open source code is that bugs are usually found faster and can be fixed by the user(s) who comes across it. Instead of waiting for a new release of the software with the bug corrected, open source code can also be redistributed to bring a corrected version to everyone immediately.&lt;br /&gt;
&lt;br /&gt;
Support for open source software, just as the software itself, is easily accessible. With so many people able to view the code, theoretically any number of them could offer support.&lt;br /&gt;
&lt;br /&gt;
Possibly the biggest advantage of open source software is the fact that everybody has the right and ability to modify and tweak the source code. This allows for implementation in other software and adaptability to a changing environment.&lt;br /&gt;
&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Resources==&lt;br /&gt;
* [http://cpsr.org/prevsite/conferences/cfp93/shamos.html/ Electronic Voting - Evaluating the Threat] Michael Ian Shamos, Ph.D., J.D.  March 1993.&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
* [http://www.technewsworld.com/story/56938.html?welcome=1218234164 Open Source, Transparency and Electronic Voting] John P. Mello, Jr., ''LinuxInsider''.  Apr 18, 2007.&lt;br /&gt;
* [http://www.wired.com/politics/onlinerights/news/2003/10/61014 E-Vote Software Leaked Online] Kim Zetter, ''Wired''. Oct 29, 2003.&lt;br /&gt;
* [http://rawstory.com/news/2005/Diebold_insider__alleges_company_plagued_1206.html Diebold insider alleges company plagued by technical woes, Diebold defends 'sterling' record] Miriam Raftery, ''Raw Story''. Dec 6, 2005.&lt;br /&gt;
* [http://avirubin.com/vote.pdf Analysis of an Electronic Voting System (pdf)] Tadayoshi Kohno, et al. Johns Hopkins University Information Security Institute. July 23, 2003.&lt;br /&gt;
* [http://timjimnetworktech.wikidot.com/advantages-disadvantages-of-open-source Advantages Disadvantages Of Open Source]&lt;br /&gt;
* [http://itmanagement.earthweb.com/osrc/article.php/3758486 Datamation - Closed Source vs. Open Source in Desktop Linux] Matt Hartley, July 12, 2008.&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16986</id>
		<title>CSC 379 SUM2008:Week 5, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16986"/>
		<updated>2008-08-09T15:45:00Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Open Non-Proprietary Technology vs. Closed Proprietary Technology =&lt;br /&gt;
&lt;br /&gt;
The issues surrounding electronic voting have highlighted the concerns of use of open non-proprietary technology vs. closed proprietary technology.  On the one side, closed proprietary technology allegedly safeguards voting security by making it impossible for outsiders to discover vulnerabilities by analyzing the code.  On the other side, open technology encourages more eyes to look over the code, and may find vulnerabilities in advance, in time to correct them.  What bearing does this discussion have on other types of software systems?  Should other systems with high social value also have open non-proprietary licenses to increase accountability, or do the risks of open licensing outweigh the benefits?  &lt;br /&gt;
&lt;br /&gt;
Examine how the experience with electronic voting applies to other critical software systems (e.g., software used for port security, handling medical records, or managing a payroll).  What are the costs and benefits of open non-proprietary technology vs. closed proprietary technology for such applications?  Are there applications where one or the other should clearly be used?  Are there applications for which neither is appropriate?  Please explain your answers.&lt;br /&gt;
&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The voting apparatuses that have been employed in any democratic election process, including ballots, lever systems, and DRE (direct-recording electronic) voting machines, have a history of intrinsic vulnerabilities and illusory public trust. To fully understand why all voting apparatuses are flawed, one must know the design specifications, the basics of which are summarized neatly in Michael Shamos, Ph.D.'s six commandments for voting system design (listed in order of consensual public importance):&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
#''Thou shalt keep each voter's choices an inviolable secret.''&lt;br /&gt;
#''Thou shalt allow each eligible voter to vote only once, and only for those offices for which she is authorized to cast a vote.''&lt;br /&gt;
#''Thou shalt not permit tampering with thy voting system, nor the exchange of gold for votes.''&lt;br /&gt;
#''Thou shalt report all votes accurately.''&lt;br /&gt;
#''Thy voting system shall remain operable throughout each election.''&lt;br /&gt;
#''Thou shalt keep an audit trail to detect sins against Commandments II-IV, but thy audit trail shall not violate Commandment I.''&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
Successful implementation of such a system is a practical impossibility.  The chief contradiction lies between commandments '''I''' and '''VI''':  one cannot successfully audit a set of votes in which each voter's selections are guaranteed to be secret.  The disconnect between vote capture and vote reporting precludes a reliable audit.&lt;br /&gt;
&lt;br /&gt;
==Proprietary Systems==&lt;br /&gt;
===Advantages===&lt;br /&gt;
A leading proponent of proprietary software is Microsoft. They argue that requiring users to pay for software as a product increases funding for the research and development of software. They claim that per-copy fees maximize the profitability of software development.&lt;br /&gt;
&lt;br /&gt;
When it comes to market revenue, closed source software especially creates greater commercial activity over free software.&lt;br /&gt;
&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Open Source System==&lt;br /&gt;
===Advantages===&lt;br /&gt;
An obvious benefit is that open source code, available to all, is usually free.&lt;br /&gt;
&lt;br /&gt;
Another convenience of open source code is that bugs are usually found faster and can be fixed by the user(s) who comes across it. Instead of waiting for a new release of the software with the bug corrected, open source code can also be redistributed to bring a corrected version to everyone immediately.&lt;br /&gt;
&lt;br /&gt;
Support for open source software, just as the software itself, is easily accessible. With so many people able to view the code, theoretically any number of them could offer support.&lt;br /&gt;
&lt;br /&gt;
Possibly the biggest advantage of open source software is the fact that everybody has the right and ability to modify and tweak the source code. This allows for implementation in other software and adaptability to a changing environment.&lt;br /&gt;
&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Resources==&lt;br /&gt;
* [http://cpsr.org/prevsite/conferences/cfp93/shamos.html/ Electronic Voting - Evaluating the Threat] Michael Ian Shamos, Ph.D., J.D.  March 1993.&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
* [http://www.technewsworld.com/story/56938.html?welcome=1218234164 Open Source, Transparency and Electronic Voting] John P. Mello, Jr., ''LinuxInsider''.  Apr 18, 2007.&lt;br /&gt;
* [http://www.wired.com/politics/onlinerights/news/2003/10/61014 E-Vote Software Leaked Online] Kim Zetter, ''Wired''. Oct 29, 2003.&lt;br /&gt;
* [http://rawstory.com/news/2005/Diebold_insider__alleges_company_plagued_1206.html Diebold insider alleges company plagued by technical woes, Diebold defends 'sterling' record] Miriam Raftery, ''Raw Story''. Dec 6, 2005.&lt;br /&gt;
* [http://avirubin.com/vote.pdf Analysis of an Electronic Voting System (pdf)] Tadayoshi Kohno, et al. Johns Hopkins University Information Security Institute. July 23, 2003.&lt;br /&gt;
* [http://timjimnetworktech.wikidot.com/advantages-disadvantages-of-open-source Advantages Disadvantages Of Open Source]&lt;br /&gt;
* [http://itmanagement.earthweb.com/osrc/article.php/3758486 Datamation - Closed Source vs. Open Source in Desktop Linux] Matt Hartley, July 12, 2008.&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16985</id>
		<title>CSC 379 SUM2008:Week 5, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16985"/>
		<updated>2008-08-09T15:33:04Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Open Non-Proprietary Technology vs. Closed Proprietary Technology =&lt;br /&gt;
&lt;br /&gt;
The issues surrounding electronic voting have highlighted the concerns of use of open non-proprietary technology vs. closed proprietary technology.  On the one side, closed proprietary technology allegedly safeguards voting security by making it impossible for outsiders to discover vulnerabilities by analyzing the code.  On the other side, open technology encourages more eyes to look over the code, and may find vulnerabilities in advance, in time to correct them.  What bearing does this discussion have on other types of software systems?  Should other systems with high social value also have open non-proprietary licenses to increase accountability, or do the risks of open licensing outweigh the benefits?  &lt;br /&gt;
&lt;br /&gt;
Examine how the experience with electronic voting applies to other critical software systems (e.g., software used for port security, handling medical records, or managing a payroll).  What are the costs and benefits of open non-proprietary technology vs. closed proprietary technology for such applications?  Are there applications where one or the other should clearly be used?  Are there applications for which neither is appropriate?  Please explain your answers.&lt;br /&gt;
&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The voting apparatuses that have been employed in any democratic election process, including ballots, lever systems, and DRE (direct-recording electronic) voting machines, have a history of intrinsic vulnerabilities and illusory public trust. To fully understand why all voting apparatuses are flawed, one must know the design specifications, which are summarized neatly in Michael Shamos, Ph.D.'s six commandments:&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
# Thou shalt keep each voter's choices an inviolable secret.&lt;br /&gt;
#Thou shalt allow each eligible voter to vote only once, and only for those offices for which she is authorized to cast a vote.&lt;br /&gt;
#Thou shalt not permit tampering with thy voting system, nor the exchange of gold for votes.&lt;br /&gt;
#Thou shalt report all votes accurately.&lt;br /&gt;
#Thy voting system shall remain operable throughout each election.&lt;br /&gt;
#Thou shalt keep an audit trail to detect sins against Commandments II-IV, but thy audit trail shall not violate Commandment I.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Proprietary Systems==&lt;br /&gt;
===Advantages===&lt;br /&gt;
A leading proponent of proprietary software is Microsoft. They argue that requiring users to pay for software as a product increases funding for the research and development of software. They claim that per-copy fees maximize the profitability of software development.&lt;br /&gt;
&lt;br /&gt;
When it comes to market revenue, closed source software especially creates greater commercial activity over free software.&lt;br /&gt;
&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Open Source System==&lt;br /&gt;
===Advantages===&lt;br /&gt;
An obvious benefit is that open source code, available to all, is usually free.&lt;br /&gt;
&lt;br /&gt;
Another convenience of open source code is that bugs are usually found faster and can be fixed by the user(s) who comes across it. Instead of waiting for a new release of the software with the bug corrected, open source code can also be redistributed to bring a corrected version to everyone immediately.&lt;br /&gt;
&lt;br /&gt;
Support for open source software, just as the software itself, is easily accessible. With so many people able to view the code, theoretically any number of them could offer support.&lt;br /&gt;
&lt;br /&gt;
Possibly the biggest advantage of open source software is the fact that everybody has the right and ability to modify and tweak the source code. This allows for implementation in other software and adaptability to a changing environment.&lt;br /&gt;
&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Resources==&lt;br /&gt;
* [http://cpsr.org/prevsite/conferences/cfp93/shamos.html/ Electronic Voting - Evaluating the Threat] Michael Ian Shamos, Ph.D., J.D.  March 1993.&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
* [http://www.technewsworld.com/story/56938.html?welcome=1218234164 Open Source, Transparency and Electronic Voting] John P. Mello, Jr., ''LinuxInsider''.  Apr 18, 2007.&lt;br /&gt;
* [http://www.wired.com/politics/onlinerights/news/2003/10/61014 E-Vote Software Leaked Online] Kim Zetter, ''Wired''. Oct 29, 2003.&lt;br /&gt;
* [http://rawstory.com/news/2005/Diebold_insider__alleges_company_plagued_1206.html Diebold insider alleges company plagued by technical woes, Diebold defends 'sterling' record] Miriam Raftery, ''Raw Story''. Dec 6, 2005.&lt;br /&gt;
* [http://avirubin.com/vote.pdf Analysis of an Electronic Voting System (pdf)] Tadayoshi Kohno, et al. Johns Hopkins University Information Security Institute. July 23, 2003.&lt;br /&gt;
* [http://timjimnetworktech.wikidot.com/advantages-disadvantages-of-open-source Advantages Disadvantages Of Open Source]&lt;br /&gt;
* [http://itmanagement.earthweb.com/osrc/article.php/3758486 Datamation - Closed Source vs. Open Source in Desktop Linux] Matt Hartley, July 12, 2008.&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16948</id>
		<title>CSC 379 SUM2008:Week 5, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16948"/>
		<updated>2008-08-08T23:08:58Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Open Non-Proprietary Technology vs. Closed Proprietary Technology =&lt;br /&gt;
&lt;br /&gt;
The issues surrounding electronic voting have highlighted the concerns of use of open non-proprietary technology vs. closed proprietary technology.  On the one side, closed proprietary technology allegedly safeguards voting security by making it impossible for outsiders to discover vulnerabilities by analyzing the code.  On the other side, open technology encourages more eyes to look over the code, and may find vulnerabilities in advance, in time to correct them.  What bearing does this discussion have on other types of software systems?  Should other systems with high social value also have open non-proprietary licenses to increase accountability, or do the risks of open licensing outweigh the benefits?  &lt;br /&gt;
&lt;br /&gt;
Examine how the experience with electronic voting applies to other critical software systems (e.g., software used for port security, handling medical records, or managing a payroll).  What are the costs and benefits of open non-proprietary technology vs. closed proprietary technology for such applications?  Are there applications where one or the other should clearly be used?  Are there applications for which neither is appropriate?  Please explain your answers.&lt;br /&gt;
&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
# Thou shalt keep each voter's choices an inviolable secret.&lt;br /&gt;
#Thou shalt allow each eligible voter to vote only once, and only for those offices for which she is authorized to cast a vote.&lt;br /&gt;
#Thou shalt not permit tampering with thy voting system, nor the exchange of gold for votes.&lt;br /&gt;
#Thou shalt report all votes accurately.&lt;br /&gt;
#Thy voting system shall remain operable throughout each election.&lt;br /&gt;
#Thou shalt keep an audit trail to detect sins against Commandments II-IV, but thy audit trail shall not violate Commandment I.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Proprietary Systems==&lt;br /&gt;
===Advantages===&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Open Source System==&lt;br /&gt;
===Advantages===&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Resources==&lt;br /&gt;
* [http://cpsr.org/prevsite/conferences/cfp93/shamos.html/ Electronic Voting - Evaluating the Threat] Michael Ian Shamos, Ph.D., J.D.  March 1993.&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
* [http://www.technewsworld.com/story/56938.html?welcome=1218234164 Open Source, Transparency and Electronic Voting] John P. Mello, Jr., ''LinuxInsider''.  Apr 18, 2007.&lt;br /&gt;
* [http://www.wired.com/politics/onlinerights/news/2003/10/61014 E-Vote Software Leaked Online] Kim Zetter, ''Wired''. Oct 29, 2003.&lt;br /&gt;
* [http://rawstory.com/news/2005/Diebold_insider__alleges_company_plagued_1206.html Diebold insider alleges company plagued by technical woes, Diebold defends 'sterling' record] Miriam Raftery, ''Raw Story''. Dec 6, 2005.&lt;br /&gt;
* [http://avirubin.com/vote.pdf Analysis of an Electronic Voting System (pdf)] Tadayoshi Kohno, et al. Johns Hopkins University Information Security Institute. July 23, 2003.&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16947</id>
		<title>CSC 379 SUM2008:Week 5, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16947"/>
		<updated>2008-08-08T23:06:23Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Open Non-Proprietary Technology vs. Closed Proprietary Technology =&lt;br /&gt;
&lt;br /&gt;
The issues surrounding electronic voting have highlighted the concerns of use of open non-proprietary technology vs. closed proprietary technology.  On the one side, closed proprietary technology allegedly safeguards voting security by making it impossible for outsiders to discover vulnerabilities by analyzing the code.  On the other side, open technology encourages more eyes to look over the code, and may find vulnerabilities in advance, in time to correct them.  What bearing does this discussion have on other types of software systems?  Should other systems with high social value also have open non-proprietary licenses to increase accountability, or do the risks of open licensing outweigh the benefits?  &lt;br /&gt;
&lt;br /&gt;
Examine how the experience with electronic voting applies to other critical software systems (e.g., software used for port security, handling medical records, or managing a payroll).  What are the costs and benefits of open non-proprietary technology vs. closed proprietary technology for such applications?  Are there applications where one or the other should clearly be used?  Are there applications for which neither is appropriate?  Please explain your answers.&lt;br /&gt;
&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
{{quote|&lt;br /&gt;
# Thou shalt keep each voter's choices an inviolable secret.&lt;br /&gt;
#Thou shalt allow each eligible voter to vote only once, and only for those offices for which she is authorized to cast a vote.&lt;br /&gt;
#Thou shalt not permit tampering with thy voting system, nor the exchange of gold for votes.&lt;br /&gt;
#Thou shalt report all votes accurately.&lt;br /&gt;
#Thy voting system shall remain operable throughout each election.&lt;br /&gt;
#Thou shalt keep an audit trail to detect sins against Commandments II-IV, but thy audit trail shall not violate Commandment I.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Proprietary Systems==&lt;br /&gt;
===Advantages===&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Open Source System==&lt;br /&gt;
===Advantages===&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Resources==&lt;br /&gt;
* [http://cpsr.org/prevsite/conferences/cfp93/shamos.html/ Electronic Voting - Evaluating the Threat] Michael Ian Shamos, Ph.D., J.D.  March 1993.&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
* [http://www.technewsworld.com/story/56938.html?welcome=1218234164 Open Source, Transparency and Electronic Voting] John P. Mello, Jr., ''LinuxInsider''.  Apr 18, 2007.&lt;br /&gt;
* [http://www.wired.com/politics/onlinerights/news/2003/10/61014 E-Vote Software Leaked Online] Kim Zetter, ''Wired''. Oct 29, 2003.&lt;br /&gt;
* [http://rawstory.com/news/2005/Diebold_insider__alleges_company_plagued_1206.html Diebold insider alleges company plagued by technical woes, Diebold defends 'sterling' record] Miriam Raftery, ''Raw Story''. Dec 6, 2005.&lt;br /&gt;
* [http://avirubin.com/vote.pdf Analysis of an Electronic Voting System (pdf)] Tadayoshi Kohno, et al. Johns Hopkins University Information Security Institute. July 23, 2003.&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16946</id>
		<title>CSC 379 SUM2008:Week 5, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16946"/>
		<updated>2008-08-08T23:00:41Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Open Non-Proprietary Technology vs. Closed Proprietary Technology =&lt;br /&gt;
&lt;br /&gt;
The issues surrounding electronic voting have highlighted the concerns of use of open non-proprietary technology vs. closed proprietary technology.  On the one side, closed proprietary technology allegedly safeguards voting security by making it impossible for outsiders to discover vulnerabilities by analyzing the code.  On the other side, open technology encourages more eyes to look over the code, and may find vulnerabilities in advance, in time to correct them.  What bearing does this discussion have on other types of software systems?  Should other systems with high social value also have open non-proprietary licenses to increase accountability, or do the risks of open licensing outweigh the benefits?  &lt;br /&gt;
&lt;br /&gt;
Examine how the experience with electronic voting applies to other critical software systems (e.g., software used for port security, handling medical records, or managing a payroll).  What are the costs and benefits of open non-proprietary technology vs. closed proprietary technology for such applications?  Are there applications where one or the other should clearly be used?  Are there applications for which neither is appropriate?  Please explain your answers.&lt;br /&gt;
&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
:# Thou shalt keep each voter's choices an inviolable secret.&lt;br /&gt;
:#Thou shalt allow each eligible voter to vote only once, and only for those offices for which she is authorized to cast a vote [2].&lt;br /&gt;
:#Thou shalt not permit tampering with thy voting system, nor the exchange of gold for votes.&lt;br /&gt;
:#Thou shalt report all votes accurately.&lt;br /&gt;
:#Thy voting system shall remain operable throughout each election.&lt;br /&gt;
:#Thou shalt keep an audit trail to detect sins against Commandments II-IV, but thy audit trail shall not violate Commandment I.&lt;br /&gt;
&lt;br /&gt;
==Proprietary Systems==&lt;br /&gt;
===Advantages===&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Open Source System==&lt;br /&gt;
===Advantages===&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Resources==&lt;br /&gt;
* [http://cpsr.org/prevsite/conferences/cfp93/shamos.html/ Electronic Voting - Evaluating the Threat] Michael Ian Shamos, Ph.D., J.D.  March 1993.&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
* [http://www.technewsworld.com/story/56938.html?welcome=1218234164 Open Source, Transparency and Electronic Voting] John P. Mello, Jr., ''LinuxInsider''.  Apr 18, 2007.&lt;br /&gt;
* [http://www.wired.com/politics/onlinerights/news/2003/10/61014 E-Vote Software Leaked Online] Kim Zetter, ''Wired''. Oct 29, 2003.&lt;br /&gt;
* [http://rawstory.com/news/2005/Diebold_insider__alleges_company_plagued_1206.html Diebold insider alleges company plagued by technical woes, Diebold defends 'sterling' record] Miriam Raftery, ''Raw Story''. Dec 6, 2005.&lt;br /&gt;
* [http://avirubin.com/vote.pdf Analysis of an Electronic Voting System (pdf)] Tadayoshi Kohno, et al. Johns Hopkins University Information Security Institute. July 23, 2003.&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16945</id>
		<title>CSC 379 SUM2008:Week 5, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16945"/>
		<updated>2008-08-08T22:57:20Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Open Non-Proprietary Technology vs. Closed Proprietary Technology =&lt;br /&gt;
&lt;br /&gt;
The issues surrounding electronic voting have highlighted the concerns of use of open non-proprietary technology vs. closed proprietary technology.  On the one side, closed proprietary technology allegedly safeguards voting security by making it impossible for outsiders to discover vulnerabilities by analyzing the code.  On the other side, open technology encourages more eyes to look over the code, and may find vulnerabilities in advance, in time to correct them.  What bearing does this discussion have on other types of software systems?  Should other systems with high social value also have open non-proprietary licenses to increase accountability, or do the risks of open licensing outweigh the benefits?  &lt;br /&gt;
&lt;br /&gt;
Examine how the experience with electronic voting applies to other critical software systems (e.g., software used for port security, handling medical records, or managing a payroll).  What are the costs and benefits of open non-proprietary technology vs. closed proprietary technology for such applications?  Are there applications where one or the other should clearly be used?  Are there applications for which neither is appropriate?  Please explain your answers.&lt;br /&gt;
&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
==Proprietary Systems==&lt;br /&gt;
===Advantages===&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Open Source System==&lt;br /&gt;
===Advantages===&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Resources==&lt;br /&gt;
* [http://cpsr.org/prevsite/conferences/cfp93/shamos.html/ Electronic Voting - Evaluating the Threat] Michael Ian Shamos, Ph.D., J.D.  March 1993.&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
* [http://www.technewsworld.com/story/56938.html?welcome=1218234164 Open Source, Transparency and Electronic Voting] John P. Mello, Jr., ''LinuxInsider''.  Apr 18, 2007.&lt;br /&gt;
* [http://www.wired.com/politics/onlinerights/news/2003/10/61014 E-Vote Software Leaked Online] Kim Zetter, ''Wired''. Oct 29, 2003.&lt;br /&gt;
* [http://rawstory.com/news/2005/Diebold_insider__alleges_company_plagued_1206.html Diebold insider alleges company plagued by technical woes, Diebold defends 'sterling' record] Miriam Raftery, ''Raw Story''. Dec 6, 2005.&lt;br /&gt;
* [http://avirubin.com/vote.pdf Analysis of an Electronic Voting System (pdf)] Tadayoshi Kohno, et al. Johns Hopkins University Information Security Institute. July 23, 2003.&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16944</id>
		<title>CSC 379 SUM2008:Week 5, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16944"/>
		<updated>2008-08-08T22:40:45Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Open Non-Proprietary Technology vs. Closed Proprietary Technology =&lt;br /&gt;
&lt;br /&gt;
The issues surrounding electronic voting have highlighted the concerns of use of open non-proprietary technology vs. closed proprietary technology.  On the one side, closed proprietary technology allegedly safeguards voting security by making it impossible for outsiders to discover vulnerabilities by analyzing the code.  On the other side, open technology encourages more eyes to look over the code, and may find vulnerabilities in advance, in time to correct them.  What bearing does this discussion have on other types of software systems?  Should other systems with high social value also have open non-proprietary licenses to increase accountability, or do the risks of open licensing outweigh the benefits?  &lt;br /&gt;
&lt;br /&gt;
Examine how the experience with electronic voting applies to other critical software systems (e.g., software used for port security, handling medical records, or managing a payroll).  What are the costs and benefits of open non-proprietary technology vs. closed proprietary technology for such applications?  Are there applications where one or the other should clearly be used?  Are there applications for which neither is appropriate?  Please explain your answers.&lt;br /&gt;
&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
==Proprietary Systems==&lt;br /&gt;
===Advantages===&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Open Source System==&lt;br /&gt;
===Advantages===&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Resources==&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
* [http://www.technewsworld.com/story/56938.html?welcome=1218234164 Open Source, Transparency and Electronic Voting] John P. Mello, Jr., ''LinuxInsider''.  Apr 18, 2007.&lt;br /&gt;
* [http://www.wired.com/politics/onlinerights/news/2003/10/61014 E-Vote Software Leaked Online] Kim Zetter, ''Wired''. Oct 29, 2003.&lt;br /&gt;
* [http://rawstory.com/news/2005/Diebold_insider__alleges_company_plagued_1206.html Diebold insider alleges company plagued by technical woes, Diebold defends 'sterling' record] Miriam Raftery, ''Raw Story''. Dec 6, 2005.&lt;br /&gt;
* [http://avirubin.com/vote.pdf Analysis of an Electronic Voting System (pdf)] Tadayoshi Kohno, et al. Johns Hopkins University Information Security Institute. July 23, 2003.&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16943</id>
		<title>CSC 379 SUM2008:Week 5, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16943"/>
		<updated>2008-08-08T22:37:19Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Open Non-Proprietary Technology vs. Closed Proprietary Technology =&lt;br /&gt;
&lt;br /&gt;
The issues surrounding electronic voting have highlighted the concerns of use of open non-proprietary technology vs. closed proprietary technology.  On the one side, closed proprietary technology allegedly safeguards voting security by making it impossible for outsiders to discover vulnerabilities by analyzing the code.  On the other side, open technology encourages more eyes to look over the code, and may find vulnerabilities in advance, in time to correct them.  What bearing does this discussion have on other types of software systems?  Should other systems with high social value also have open non-proprietary licenses to increase accountability, or do the risks of open licensing outweigh the benefits?  &lt;br /&gt;
&lt;br /&gt;
Examine how the experience with electronic voting applies to other critical software systems (e.g., software used for port security, handling medical records, or managing a payroll).  What are the costs and benefits of open non-proprietary technology vs. closed proprietary technology for such applications?  Are there applications where one or the other should clearly be used?  Are there applications for which neither is appropriate?  Please explain your answers.&lt;br /&gt;
&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
==Proprietary Systems==&lt;br /&gt;
===Advantages===&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Open Source System==&lt;br /&gt;
===Advantages===&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Resources==&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
* [http://www.technewsworld.com/story/56938.html?welcome=1218234164 Open Source, Transparency and Electronic Voting] John P. Mello, Jr., ''LinuxInsider''.  Apr 18, 2007.&lt;br /&gt;
* [http://www.wired.com/politics/onlinerights/news/2003/10/61014 E-Vote Software Leaked Online] Kim Zetter, ''Wired''. Oct 29, 2003.&lt;br /&gt;
* [http://rawstory.com/news/2005/Diebold_insider__alleges_company_plagued_1206.html Diebold insider alleges company plagued by technical woes, Diebold defends 'sterling' record] Miriam Raftery, ''Raw Story''. Dec 6, 2005.&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16942</id>
		<title>CSC 379 SUM2008:Week 5, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_2&amp;diff=16942"/>
		<updated>2008-08-08T22:32:15Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Open Non-Proprietary Technology vs. Closed Proprietary Technology =&lt;br /&gt;
&lt;br /&gt;
The issues surrounding electronic voting have highlighted the concerns of use of open non-proprietary technology vs. closed proprietary technology.  On the one side, closed proprietary technology allegedly safeguards voting security by making it impossible for outsiders to discover vulnerabilities by analyzing the code.  On the other side, open technology encourages more eyes to look over the code, and may find vulnerabilities in advance, in time to correct them.  What bearing does this discussion have on other types of software systems?  Should other systems with high social value also have open non-proprietary licenses to increase accountability, or do the risks of open licensing outweigh the benefits?  &lt;br /&gt;
&lt;br /&gt;
Examine how the experience with electronic voting applies to other critical software systems (e.g., software used for port security, handling medical records, or managing a payroll).  What are the costs and benefits of open non-proprietary technology vs. closed proprietary technology for such applications?  Are there applications where one or the other should clearly be used?  Are there applications for which neither is appropriate?  Please explain your answers.&lt;br /&gt;
&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
==Proprietary Systems==&lt;br /&gt;
===Advantages===&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Open Source System==&lt;br /&gt;
===Advantages===&lt;br /&gt;
===Disadvantages===&lt;br /&gt;
==Resources==&lt;br /&gt;
* http://courses.ncsu.edu/csc379/lec/001/lectures/wk14/lecture.html&lt;br /&gt;
* [http://www.technewsworld.com/story/56938.html?welcome=1218234164 Open Source, Transparency and Electronic Voting] John P. Mello, Jr., ''LinuxInsider''.  Apr 18, 2007.&lt;br /&gt;
* [http://www.wired.com/politics/onlinerights/news/2003/10/61014 E-Vote Software Leaked Online] Kim Zetter, ''Wired''. Oct 29, 2003.&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16884</id>
		<title>Social dossiers</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16884"/>
		<updated>2008-08-06T15:31:13Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Study Guide=&lt;br /&gt;
&lt;br /&gt;
Social dossiers: [http://pg-server.csc.ncsu.edu/mediawiki/index.php/CSC_379_SUM2008:Topics#Social_Dossiers Topic Description]&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The rise in popularity of social networking sites has had an extroversive effect on large volumes personal data.  Sharing photos, personal commentary, status updates, and other personally interesting information through social mediums like Myspace and Facebook has become a common activity for many internet users.  Some users that are not fully aware of the implications may decide to publish personal photos or writings after considering only their intended audience, failing to consider that other parties may view them.  To illustrate (hypothetical scenario):&lt;br /&gt;
: ''John Q. User is rather fond of his victory in last weekend's beer pong tournament, and so he decides to share photos commemorating the event with his friends using his public Myspace profile.  Later, when John is applying for a job, his interviewer asks if he still likes to play beer pong.  John is blind-sided by the question, thus losing his nerve and failing the interview.''&lt;br /&gt;
Is it fair for the interviewer to ask this question?  Or to examine his profile photos?  Should John have ''known better'' than to leave potentially compromising photos of himself in a publicly viewable space?&lt;br /&gt;
&lt;br /&gt;
==Data availability==&lt;br /&gt;
Many websites (especially social media sites) allow users to create personal profiles; a substantial portion of those sites allow their content to be indexed by search-agents, and so any content created while using a site may potentially be located easily through basic search queries.  The information that is connected to a particular user varies widely and can include very basic information (name, age, gender, locale, etc.) and/or disturbingly detailed information (e.g. mySpaceUserXX aka &amp;quot;Jane Q. User&amp;quot; is single, bisexual, Hispanic, a Unitarian Universalist, an Aquarius, a self-professed alcoholic, works in Accounting/Finance, graduated from Anytown Community College in 2004, etc.).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Social Media Sites&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
!&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
! Types of Information&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*[http://www.facebook.com Facebook]&lt;br /&gt;
*[http://www.myspace.com Myspace]&lt;br /&gt;
*[http://www.linkedin.com LinkedIn]&lt;br /&gt;
*[http://www.friendster.com Friendster]&lt;br /&gt;
*[http://www.youtube.com YouTube]&lt;br /&gt;
*[http://www.digg.com Digg]&lt;br /&gt;
*[http://www.flickr.com Flickr]&lt;br /&gt;
|&lt;br /&gt;
*[http://www.photobucket.com Photobucket]&lt;br /&gt;
*[http://www.picasa.com Picasa]&lt;br /&gt;
*[http://www.twitter.com Twitter]&lt;br /&gt;
*[http://www.xanga.com Xanga]&lt;br /&gt;
*[http://www.livejournal.com Livejournal]&lt;br /&gt;
*[http://www.blogger.com Blogger]&lt;br /&gt;
*[http://www.deviantart.com Deviant Art]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
*Demographics&lt;br /&gt;
*Photographs&lt;br /&gt;
*Videos&lt;br /&gt;
*User Comments&lt;br /&gt;
*Cultural Interests&lt;br /&gt;
*Religion/Creed&lt;br /&gt;
*Political Views&lt;br /&gt;
|&lt;br /&gt;
*Sexual Orientiation&lt;br /&gt;
*Forum Discussions&lt;br /&gt;
*Work History&lt;br /&gt;
*Education History&lt;br /&gt;
*Favorite Videos&lt;br /&gt;
*Friends' Identities&lt;br /&gt;
*Offline Media Tastes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Some search providers have even begun to specialize their services to scour popular social networking sites.  A user may simply enter part of your identity, such as your name or email address, into a query box, and the search engine returns a listing of potential matches.  This makes compilation of your publicly available data frighteningly easy.&lt;br /&gt;
&lt;br /&gt;
Public profiles from multiple networks may be linked without using a specialized search engine; a series of generic search queries, network-specific searches (e.g. using Facebook's internal search) and basic deductive reasoning may allow you to easily compile a fairly complete dossier of a person's life.  For instance, confirming someone's profile on myspace may reveal their AIM network name, which by coincidence is the same username that they specified for their YouTube account.  Their YouTube profile features a video in which they mention that they have a personal blog on Livejournal, etc. This method of aggregating information is fairly straight-forward and easy to accomplish with minimal sleuthing skills.&lt;br /&gt;
&lt;br /&gt;
==Aggregation motives==&lt;br /&gt;
&lt;br /&gt;
While new reasons to aggregate a persons data continue to emerge, there are several traditional motivations that seem to be popular.  Perhaps the primary of these is the use of social networking data by those people in charge of human resources decisions.  HR Managers are interested in hiring the best candidate for a job, and given that a simple web search may reveal substantial amounts of information on a job candidate's background, it's not surprising that focused search services like [http://www.spokeo.com/hr Spokeo] have been developed.  But ''should'' interviewers use these services?  Is it really fair to bring a job candidate's peripheral social data into an HR decision?  In some cases where the job in question involves high public exposure, such as a corporate spokesperson, detailed background checks are an expected part of the confirmation process; therefore most people would consider it a justified examination.  Conversely, if a person's lifestyle outside of work has no effect on their ability to perform their job, then many would consider the use of their personal information in a hiring decision to be unjustified.  &lt;br /&gt;
&lt;br /&gt;
'''Traditional applications:'''&lt;br /&gt;
* '''''Hiring:'''''  Human resources staff and job interviewers' hiring decisions may be influenced by what search-queries reveal. [http://accounting.smartpros.com/x54248.xml]  The legality and ethical issues of unofficial google-stalking of potential job candidates is currently under debate. [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php]&lt;br /&gt;
* '''''Criminal Prosecution:'''''  Prosecutors may use the content you post online to build their case against you; your own social media profile may serve as a character witness against you. [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html]&lt;br /&gt;
* '''''Business Contacts:''''' Sales professionals constantly distribute their business cards to prospective clients/customers, so it is foreseeable that a lack of understanding of web privacy by a sales representative (that uses social media sites) could lead to disastrous results for themselves or the company they represent.&lt;br /&gt;
* '''''Insurance Eligibility:''''' &amp;quot;I'm sorry, Mr. Jones, but according to your blog, the following conditions are pre-existing and will require a rider/exclusion for us to even consider giving you a quote...&amp;quot;&lt;br /&gt;
* '''''Stalkers:'''''  If you have a lot of information publicly available through social networking profiles, then you have no real defensive strategy against potential stalkers accessing that information.  Granted, dedicated stalkers would find a way to obtain sensitive information (e.g. course schedules, work schedule, friends' identities) without using the internet, but social media only increases opportunity and ease, therefore the likelihood of attracting stalkers.&lt;br /&gt;
&lt;br /&gt;
=Links &amp;amp; Resources=&lt;br /&gt;
&lt;br /&gt;
===Job Hunting===&lt;br /&gt;
* [http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html Facebook can ruin your life, and so can Myspace, Bebo...] Ida Bergstrom, ''The Independent''.  Feb 10, 2008.&lt;br /&gt;
* [http://www.time.com/time/business/article/0,8599,1649121,00.html Online snooping gets creepy]. Anita Hamilton, ''Time''. Aug 2, 2007.&lt;br /&gt;
* [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php Employers Using Facebook for Background Checking: Is It Legal?] George Lenard, George's Employment Blawg.&lt;br /&gt;
* [http://time-blog.com/work_in_progress/2008/05/googlestalking_your_interviewe.html Google-stalking your interviewer is smart]. Lisa Takeuchi Cullen, ''Time''. May 29, 2008.&lt;br /&gt;
* [http://accounting.smartpros.com/x54248.xml Employers Google Job Candidates, Check Social Networking Web Sites]. SmartPros. Aug 8, 2006.&lt;br /&gt;
&lt;br /&gt;
===In the courts===&lt;br /&gt;
* [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html Alleged DUI killer's MySpace profile depicts youth consumed with money, drugs and graffiti]. Stephanie Farr and Dafney Tales, ''Philadelphia Daily News''.  Jul 17, 2008.&lt;br /&gt;
*[http://ap.google.com/article/ALeqM5jC-5mkxddsdwxCN5_DwfLq3RqPmwD920TQK00 Web networking photos come back to bite defendants]. Eric Tucker, AP. Jul 19, 2008.&lt;br /&gt;
*[http://www.dailynexus.com/article.php?a=13440 Court case decision reveals dangers of networking sites]. Evan Wagstaff, ''Daily Nexus''. Feb 28, 2007.&lt;br /&gt;
&lt;br /&gt;
===Stalking===&lt;br /&gt;
*[http://www.ncvc.org/src/AGP.Net/Components/DocumentViewer/Download.aspxnz?DocumentID=41389 Stalking by a &amp;quot;high-tech&amp;quot; guy]. John Loveall. Stalking Resource Center. 2005.&lt;br /&gt;
*[http://seattletimes.nwsource.com/html/living/2003845520_websnooping21.html Facebook makes it easy to &amp;quot;profile stalk&amp;quot;]. David Sarno, ''Los Angeles Times''.  Aug 21, 2007.&lt;br /&gt;
*[http://www.ncvc.org/src/main.aspx?dbID=DB_StalkingTechnology139 The Use of Technology to Stalk] from the Stalking Resource Center.&lt;br /&gt;
&lt;br /&gt;
===Privacy Resources===&lt;br /&gt;
* [http://www.slais.ubc.ca/COURSES/libr500/06-07-wt2/www2/S_Hintersteininger/home.htm Beyond the Job Interview: Unofficial Online Background Checks]. Stefan Hintersteininger. University of British Columbia. March 2007.&lt;br /&gt;
* [http://epic.org/privacy/tools.html EPIC online guide to practical privacy tools]. Electronic Privacy Information Center.&lt;br /&gt;
* [http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy EFF's top 12 ways to protect your online privacy]. Stanton McCandlish, Electronic Frontier Foundation. Apr 10, 2002.&lt;br /&gt;
&lt;br /&gt;
===Social Search Services===&lt;br /&gt;
* [http://www.spock.com Spock People Search]. Spock.com.&lt;br /&gt;
* [http://www.mybackgroundcheck.com/AboutUs.aspx MyBackGroundCheck.com].&lt;br /&gt;
* [http://www.spokeo.com/hr Spokeo.com/hr]. &amp;quot;Want to see your candidates' profiles on MySpace and LinkedIn?&amp;quot;&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Talk:CSC_379_SUM2008:Week_4,_Group_4&amp;diff=16883</id>
		<title>Talk:CSC 379 SUM2008:Week 4, Group 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Talk:CSC_379_SUM2008:Week_4,_Group_4&amp;diff=16883"/>
		<updated>2008-08-06T15:23:51Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;Jason&amp;gt;CJ &amp;amp; Reid, I have an Assembly exam @ 3:30 today which means that I will be online around 7pm to work on this.  --[[User:Jcsmith2|Jcsmith2]] 13:27, 1 August 2008 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;Reid&amp;gt; I'll be working on it at approximately 7PM also.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;Reid&amp;gt; I'll work on the &amp;quot;Why it's useful&amp;quot; section if that's OK with you guys&lt;br /&gt;
&lt;br /&gt;
&amp;lt;Reid&amp;gt; I added information to the &amp;quot;is it bad&amp;quot; section.  Feel free to modify it.  Also, feel free to modify what I wrote for the &amp;quot;Why is it useful&amp;quot; section.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;Jason&amp;gt;I think we should add one statement regarding the non-disclosure of the printer manufacturers.  That's a key component of the ethical discussion.  -&amp;gt; Is it a bad idea? &lt;br /&gt;
Also, one of the reviewers suggested that &amp;quot;Is it a bad idea?&amp;quot; is bad grammar.  Perhaps we should re-title this section?  --[[User:Jcsmith2|Jcsmith2]] 21:05, 4 August 2008 (EDT)&lt;br /&gt;
&lt;br /&gt;
ORIGINAL ASSIGNMENT: &lt;br /&gt;
What if every page you print from a color printer were labeled with a hidden code, detailing the printer the page was printed from, the date of printing and the time of printing, down to the minute?  What if this feature was intentionally hidden from the user and could not be disabled?  What if the code could be viewed and decoded by anyone, not just law enforcement?  These hidden tracking codes exist – examine the ethical considerations they pose.  Should users be informed of the feature?  Should users be able to disable the feature?  Develop ethical arguments for both positions.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;Reid&amp;gt; I fixed the grammar error in the section title.  The section was titled &amp;quot;Is it bad idea?&amp;quot; instead of &amp;quot;Is it a bad idea?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;Jason&amp;gt;Ha!... I didn't even notice...&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16867</id>
		<title>Social dossiers</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16867"/>
		<updated>2008-08-05T16:35:54Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Data availability */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Study Guide=&lt;br /&gt;
&lt;br /&gt;
Social dossiers: [http://pg-server.csc.ncsu.edu/mediawiki/index.php/CSC_379_SUM2008:Topics#Social_Dossiers Topic Description]&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The rise in popularity of social networking sites has had an extroversive effect on large volumes personal data.  Sharing photos, personal commentary, status updates, and other personally interesting information through social mediums like Myspace and Facebook has become a common activity for many internet users.  Some users that are not fully aware of the implications, may decide to publish personal photos or writings after considering only their intended audience, failing to consider that other parties may view them.  To illustrate (hypothetical scenario):&lt;br /&gt;
: ''John Q. User is rather fond of his victory in last weekend's beer pong tournament, and so he decides to share photos commemorating the event with his friends using his public Myspace profile.  Later, when John is applying for a job, his interviewer asks if he still likes to play beer pong.  John is blind-sided by the question, thus losing his nerve and failing the interview.''&lt;br /&gt;
Is it fair for the interviewer to ask this question?  Or to examine his profile photos?  Should John have ''known better'' than to leave potentially compromising photos of himself in a publicly viewable space?&lt;br /&gt;
&lt;br /&gt;
==Data availability==&lt;br /&gt;
Many websites (especially social media sites) allow users to create personal profiles; a substantial portion of those sites allow their content to be indexed by search-agents, and so any content created while using a site may potentially be located easily through basic search queries.  The information that is connected to a particular user varies widely and can include very basic information (name, age, gender, locale, etc.) and/or disturbingly detailed information (e.g. mySpaceUserXX aka &amp;quot;Jane Q. User&amp;quot; is single, bisexual, Hispanic, a Unitarian Universalist, an Aquarius, a self-professed alcoholic, works in Accounting/Finance, graduated from Anytown Community College in 2004, etc.).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Social Media Sites&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
!&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
! Types of Information&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*[http://www.facebook.com Facebook]&lt;br /&gt;
*[http://www.myspace.com Myspace]&lt;br /&gt;
*[http://www.linkedin.com LinkedIn]&lt;br /&gt;
*[http://www.friendster.com Friendster]&lt;br /&gt;
*[http://www.youtube.com YouTube]&lt;br /&gt;
*[http://www.digg.com Digg]&lt;br /&gt;
*[http://www.flickr.com Flickr]&lt;br /&gt;
|&lt;br /&gt;
*[http://www.photobucket.com Photobucket]&lt;br /&gt;
*[http://www.picasa.com Picasa]&lt;br /&gt;
*[http://www.twitter.com Twitter]&lt;br /&gt;
*[http://www.xanga.com Xanga]&lt;br /&gt;
*[http://www.livejournal.com Livejournal]&lt;br /&gt;
*[http://www.blogger.com Blogger]&lt;br /&gt;
*[http://www.deviantart.com Deviant Art]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
*Demographics&lt;br /&gt;
*Photographs&lt;br /&gt;
*Videos&lt;br /&gt;
*User Comments&lt;br /&gt;
*Cultural Interests&lt;br /&gt;
*Religion/Creed&lt;br /&gt;
*Political Views&lt;br /&gt;
|&lt;br /&gt;
*Sexual Orientiation&lt;br /&gt;
*Forum Discussions&lt;br /&gt;
*Work History&lt;br /&gt;
*Education History&lt;br /&gt;
*Favorite Videos&lt;br /&gt;
*Friends' Identities&lt;br /&gt;
*Offline Media Tastes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Some search providers have even begun to specialize their services to scour popular social networking sites.  A user may simply enter part of your identity, such as your name or email address, into a query box, and the search engine returns a listing of potential matches.  This makes compilation of your publicly available data frighteningly easy.&lt;br /&gt;
&lt;br /&gt;
Public profiles from multiple networks may be linked without using a specialized search engine; a series of generic search queries, network-specific searches (e.g. using Facebook's internal search) and basic deductive reasoning may allow you to easily compile a fairly complete dossier of a person's life.  For instance, confirming someone's profile on myspace may reveal their AIM network name, which by coincidence is the same username that they specified for their YouTube account.  Their YouTube profile features a video in which they mention that they have a personal blog on Livejournal, etc. This method of aggregating information is fairly straight-forward and easy to accomplish with minimal sleuthing skills.&lt;br /&gt;
&lt;br /&gt;
==Aggregation motives==&lt;br /&gt;
&lt;br /&gt;
While new reasons to aggregate a persons data continue to emerge, there are several traditional motivations that seem to be popular.  Perhaps the primary of these is the use of social networking data by those people in charge of human resources decisions.  HR Managers are interested in hiring the best candidate for a job, and given that a simple web search may reveal substantial amounts of information on a job candidate's background, it's not surprising that focused search services like [http://www.spokeo.com/hr Spokeo] have been developed.  But ''should'' interviewers use these services?  Is it really fair to bring a job candidate's peripheral social data into an HR decision?  In some cases where the job in question involves high public exposure, such as a corporate spokesperson, detailed background checks are an expected part of the confirmation process; therefore most people would consider it a justified examination.  Conversely, if a person's lifestyle outside of work has no effect on their ability to perform their job, then many would consider the use of their personal information in a hiring decision to be unjustified.  &lt;br /&gt;
&lt;br /&gt;
'''Traditional applications:'''&lt;br /&gt;
* '''''Hiring:'''''  Human resources staff and job interviewers' hiring decisions may be influenced by what search-queries reveal. [http://accounting.smartpros.com/x54248.xml]  The legality and ethical issues of unofficial google-stalking of potential job candidates is currently under debate. [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php]&lt;br /&gt;
* '''''Criminal Prosecution:'''''  Prosecutors may use the content you post online to build their case against you; your own social media profile may serve as a character witness against you. [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html]&lt;br /&gt;
* '''''Business Contacts:''''' Sales professionals constantly distribute their business cards to prospective clients/customers, so it is foreseeable that a lack of understanding of web privacy by a sales representative (that uses social media sites) could lead to disastrous results for themselves or the company they represent.&lt;br /&gt;
* '''''Insurance Eligibility:''''' &amp;quot;I'm sorry, Mr. Jones, but according to your blog, the following conditions are pre-existing and will require a rider/exclusion for us to even consider giving you a quote...&amp;quot;&lt;br /&gt;
* '''''Stalkers:'''''  If you have a lot of information publicly available through social networking profiles, then you have no real defensive strategy against potential stalkers accessing that information.  Granted, dedicated stalkers would find a way to obtain sensitive information (e.g. course schedules, work schedule, friends' identities) without using the internet, but social media only increases opportunity and ease, therefore the likelihood of attracting stalkers.&lt;br /&gt;
&lt;br /&gt;
=Links &amp;amp; Resources=&lt;br /&gt;
&lt;br /&gt;
===Job Hunting===&lt;br /&gt;
* [http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html Facebook can ruin your life, and so can Myspace, Bebo...] Ida Bergstrom, ''The Independent''.  Feb 10, 2008.&lt;br /&gt;
* [http://www.time.com/time/business/article/0,8599,1649121,00.html Online snooping gets creepy]. Anita Hamilton, ''Time''. Aug 2, 2007.&lt;br /&gt;
* [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php Employers Using Facebook for Background Checking: Is It Legal?] George Lenard, George's Employment Blawg.&lt;br /&gt;
* [http://time-blog.com/work_in_progress/2008/05/googlestalking_your_interviewe.html Google-stalking your interviewer is smart]. Lisa Takeuchi Cullen, ''Time''. May 29, 2008.&lt;br /&gt;
* [http://accounting.smartpros.com/x54248.xml Employers Google Job Candidates, Check Social Networking Web Sites]. SmartPros. Aug 8, 2006.&lt;br /&gt;
&lt;br /&gt;
===In the courts===&lt;br /&gt;
* [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html Alleged DUI killer's MySpace profile depicts youth consumed with money, drugs and graffiti]. Stephanie Farr and Dafney Tales, ''Philadelphia Daily News''.  Jul 17, 2008.&lt;br /&gt;
*[http://ap.google.com/article/ALeqM5jC-5mkxddsdwxCN5_DwfLq3RqPmwD920TQK00 Web networking photos come back to bite defendants]. Eric Tucker, AP. Jul 19, 2008.&lt;br /&gt;
*[http://www.dailynexus.com/article.php?a=13440 Court case decision reveals dangers of networking sites]. Evan Wagstaff, ''Daily Nexus''. Feb 28, 2007.&lt;br /&gt;
&lt;br /&gt;
===Stalking===&lt;br /&gt;
*[http://www.ncvc.org/src/AGP.Net/Components/DocumentViewer/Download.aspxnz?DocumentID=41389 Stalking by a &amp;quot;high-tech&amp;quot; guy]. John Loveall. Stalking Resource Center. 2005.&lt;br /&gt;
*[http://seattletimes.nwsource.com/html/living/2003845520_websnooping21.html Facebook makes it easy to &amp;quot;profile stalk&amp;quot;]. David Sarno, ''Los Angeles Times''.  Aug 21, 2007.&lt;br /&gt;
*[http://www.ncvc.org/src/main.aspx?dbID=DB_StalkingTechnology139 The Use of Technology to Stalk] from the Stalking Resource Center.&lt;br /&gt;
&lt;br /&gt;
===Privacy Resources===&lt;br /&gt;
* [http://www.slais.ubc.ca/COURSES/libr500/06-07-wt2/www2/S_Hintersteininger/home.htm Beyond the Job Interview: Unofficial Online Background Checks]. Stefan Hintersteininger. University of British Columbia. March 2007.&lt;br /&gt;
* [http://epic.org/privacy/tools.html EPIC online guide to practical privacy tools]. Electronic Privacy Information Center.&lt;br /&gt;
* [http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy EFF's top 12 ways to protect your online privacy]. Stanton McCandlish, Electronic Frontier Foundation. Apr 10, 2002.&lt;br /&gt;
&lt;br /&gt;
===Social Search Services===&lt;br /&gt;
* [http://www.spock.com Spock People Search]. Spock.com.&lt;br /&gt;
* [http://www.mybackgroundcheck.com/AboutUs.aspx MyBackGroundCheck.com].&lt;br /&gt;
* [http://www.spokeo.com/hr Spokeo.com/hr]. &amp;quot;Want to see your candidates' profiles on MySpace and LinkedIn?&amp;quot;&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16864</id>
		<title>Social dossiers</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16864"/>
		<updated>2008-08-05T03:51:24Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Aggregation motives */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Study Guide=&lt;br /&gt;
&lt;br /&gt;
Social dossiers: [http://pg-server.csc.ncsu.edu/mediawiki/index.php/CSC_379_SUM2008:Topics#Social_Dossiers Topic Description]&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The rise in popularity of social networking sites has had an extroversive effect on large volumes personal data.  Sharing photos, personal commentary, status updates, and other personally interesting information through social mediums like Myspace and Facebook has become a common activity for many internet users.  Some users that are not fully aware of the implications, may decide to publish personal photos or writings after considering only their intended audience, failing to consider that other parties may view them.  To illustrate (hypothetical scenario):&lt;br /&gt;
: ''John Q. User is rather fond of his victory in last weekend's beer pong tournament, and so he decides to share photos commemorating the event with his friends using his public Myspace profile.  Later, when John is applying for a job, his interviewer asks if he still likes to play beer pong.  John is blind-sided by the question, thus losing his nerve and failing the interview.''&lt;br /&gt;
Is it fair for the interviewer to ask this question?  Or to examine his profile photos?  Should John have ''known better'' than to leave potentially compromising photos of himself in a publicly viewable space?&lt;br /&gt;
&lt;br /&gt;
==Data availability==&lt;br /&gt;
Many websites (especially social media sites) allow users to create personal profiles; a substantial portion of those sites allow their content to be indexed by search-agents, and so any content created while using a site may potentially be located easily through basic search queries.  The information that is connected to a particular user varies widely and can include very basic information (name, age, gender, locale, etc.) and/or disturbingly detailed information (e.g. mySpaceUserXX aka &amp;quot;Jane Q. User&amp;quot; is single, bisexual, Hispanic, a Unitarian Universalist, an Aquarius, a self-professed alcoholic, works in Accounting/Finance, graduated from Anytown Community College in 2004, etc.).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Social Media Sites&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
!&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
! Types of Information&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*[http://www.facebook.com Facebook]&lt;br /&gt;
*[http://www.myspace.com Myspace]&lt;br /&gt;
*[http://www.linkedin.com LinkedIn]&lt;br /&gt;
*[http://www.friendster.com Friendster]&lt;br /&gt;
*[http://www.youtube.com YouTube]&lt;br /&gt;
*[http://www.digg.com Digg]&lt;br /&gt;
*[http://www.flickr.com Flickr]&lt;br /&gt;
|&lt;br /&gt;
*[http://www.photobucket.com Photobucket]&lt;br /&gt;
*[http://www.picasa.com Picasa]&lt;br /&gt;
*[http://www.twitter.com Twitter]&lt;br /&gt;
*[http://www.xanga.com Xanga]&lt;br /&gt;
*[http://www.livejournal.com Livejournal]&lt;br /&gt;
*[http://www.blogger.com Blogger]&lt;br /&gt;
*[http://www.deviantart.com Deviant Art]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
*Demographics&lt;br /&gt;
*Photographs&lt;br /&gt;
*Videos&lt;br /&gt;
*User Comments&lt;br /&gt;
*Cultural Interests&lt;br /&gt;
*Religion/Creed&lt;br /&gt;
*Political Views&lt;br /&gt;
|&lt;br /&gt;
*Sexual Orientiation&lt;br /&gt;
*Forum Discussions&lt;br /&gt;
*Work History&lt;br /&gt;
*Education History&lt;br /&gt;
*Favorite Videos&lt;br /&gt;
*Friends' Identities&lt;br /&gt;
*Offline Media Tastes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Some search providers have even begun to specialize their services to scour popular social networking sites.  A user may simply enter part of your identity, such as your name or email address, into a query box, and the search engine returns a listing of potential matches.  This makes compilation of your publicly available data frighteningly easy.&lt;br /&gt;
&lt;br /&gt;
Public profiles from multiple networks may be linked without using a specialized search engine; a series of generic search queries, network-specific searches (e.g. using Facebook's internal search) and basic deductive reasoning may allow you to easily compile a fairly complete dossier of a person's life.  For instance, confirming someone's profile on myspace may reveal their AIM network name, which by coincidence is the same username that they specified for their YouTube account.  Their YouTube profile features in which they mention that they have a personal blog on Livejournal, etc.  This method of aggregating information is fairly straight-forward easy to accomplish with minimal sleuthing skills.&lt;br /&gt;
&lt;br /&gt;
==Aggregation motives==&lt;br /&gt;
&lt;br /&gt;
While new reasons to aggregate a persons data continue to emerge, there are several traditional motivations that seem to be popular.  Perhaps the primary of these is the use of social networking data by those people in charge of human resources decisions.  HR Managers are interested in hiring the best candidate for a job, and given that a simple web search may reveal substantial amounts of information on a job candidate's background, it's not surprising that focused search services like [http://www.spokeo.com/hr Spokeo] have been developed.  But ''should'' interviewers use these services?  Is it really fair to bring a job candidate's peripheral social data into an HR decision?  In some cases where the job in question involves high public exposure, such as a corporate spokesperson, detailed background checks are an expected part of the confirmation process; therefore most people would consider it a justified examination.  Conversely, if a person's lifestyle outside of work has no effect on their ability to perform their job, then many would consider the use of their personal information in a hiring decision to be unjustified.  &lt;br /&gt;
&lt;br /&gt;
'''Traditional applications:'''&lt;br /&gt;
* '''''Hiring:'''''  Human resources staff and job interviewers' hiring decisions may be influenced by what search-queries reveal. [http://accounting.smartpros.com/x54248.xml]  The legality and ethical issues of unofficial google-stalking of potential job candidates is currently under debate. [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php]&lt;br /&gt;
* '''''Criminal Prosecution:'''''  Prosecutors may use the content you post online to build their case against you; your own social media profile may serve as a character witness against you. [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html]&lt;br /&gt;
* '''''Business Contacts:''''' Sales professionals constantly distribute their business cards to prospective clients/customers, so it is foreseeable that a lack of understanding of web privacy by a sales representative (that uses social media sites) could lead to disastrous results for themselves or the company they represent.&lt;br /&gt;
* '''''Insurance Eligibility:''''' &amp;quot;I'm sorry, Mr. Jones, but according to your blog, the following conditions are pre-existing and will require a rider/exclusion for us to even consider giving you a quote...&amp;quot;&lt;br /&gt;
* '''''Stalkers:'''''  If you have a lot of information publicly available through social networking profiles, then you have no real defensive strategy against potential stalkers accessing that information.  Granted, dedicated stalkers would find a way to obtain sensitive information (e.g. course schedules, work schedule, friends' identities) without using the internet, but social media only increases opportunity and ease, therefore the likelihood of attracting stalkers.&lt;br /&gt;
&lt;br /&gt;
=Links &amp;amp; Resources=&lt;br /&gt;
&lt;br /&gt;
===Job Hunting===&lt;br /&gt;
* [http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html Facebook can ruin your life, and so can Myspace, Bebo...] Ida Bergstrom, ''The Independent''.  Feb 10, 2008.&lt;br /&gt;
* [http://www.time.com/time/business/article/0,8599,1649121,00.html Online snooping gets creepy]. Anita Hamilton, ''Time''. Aug 2, 2007.&lt;br /&gt;
* [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php Employers Using Facebook for Background Checking: Is It Legal?] George Lenard, George's Employment Blawg.&lt;br /&gt;
* [http://time-blog.com/work_in_progress/2008/05/googlestalking_your_interviewe.html Google-stalking your interviewer is smart]. Lisa Takeuchi Cullen, ''Time''. May 29, 2008.&lt;br /&gt;
* [http://accounting.smartpros.com/x54248.xml Employers Google Job Candidates, Check Social Networking Web Sites]. SmartPros. Aug 8, 2006.&lt;br /&gt;
&lt;br /&gt;
===In the courts===&lt;br /&gt;
* [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html Alleged DUI killer's MySpace profile depicts youth consumed with money, drugs and graffiti]. Stephanie Farr and Dafney Tales, ''Philadelphia Daily News''.  Jul 17, 2008.&lt;br /&gt;
*[http://ap.google.com/article/ALeqM5jC-5mkxddsdwxCN5_DwfLq3RqPmwD920TQK00 Web networking photos come back to bite defendants]. Eric Tucker, AP. Jul 19, 2008.&lt;br /&gt;
*[http://www.dailynexus.com/article.php?a=13440 Court case decision reveals dangers of networking sites]. Evan Wagstaff, ''Daily Nexus''. Feb 28, 2007.&lt;br /&gt;
&lt;br /&gt;
===Stalking===&lt;br /&gt;
*[http://www.ncvc.org/src/AGP.Net/Components/DocumentViewer/Download.aspxnz?DocumentID=41389 Stalking by a &amp;quot;high-tech&amp;quot; guy]. John Loveall. Stalking Resource Center. 2005.&lt;br /&gt;
*[http://seattletimes.nwsource.com/html/living/2003845520_websnooping21.html Facebook makes it easy to &amp;quot;profile stalk&amp;quot;]. David Sarno, ''Los Angeles Times''.  Aug 21, 2007.&lt;br /&gt;
*[http://www.ncvc.org/src/main.aspx?dbID=DB_StalkingTechnology139 The Use of Technology to Stalk] from the Stalking Resource Center.&lt;br /&gt;
&lt;br /&gt;
===Privacy Resources===&lt;br /&gt;
* [http://www.slais.ubc.ca/COURSES/libr500/06-07-wt2/www2/S_Hintersteininger/home.htm Beyond the Job Interview: Unofficial Online Background Checks]. Stefan Hintersteininger. University of British Columbia. March 2007.&lt;br /&gt;
* [http://epic.org/privacy/tools.html EPIC online guide to practical privacy tools]. Electronic Privacy Information Center.&lt;br /&gt;
* [http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy EFF's top 12 ways to protect your online privacy]. Stanton McCandlish, Electronic Frontier Foundation. Apr 10, 2002.&lt;br /&gt;
&lt;br /&gt;
===Social Search Services===&lt;br /&gt;
* [http://www.spock.com Spock People Search]. Spock.com.&lt;br /&gt;
* [http://www.mybackgroundcheck.com/AboutUs.aspx MyBackGroundCheck.com].&lt;br /&gt;
* [http://www.spokeo.com/hr Spokeo.com/hr]. &amp;quot;Want to see your candidates' profiles on MySpace and LinkedIn?&amp;quot;&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16861</id>
		<title>Social dossiers</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16861"/>
		<updated>2008-08-05T03:50:21Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Data availability */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Study Guide=&lt;br /&gt;
&lt;br /&gt;
Social dossiers: [http://pg-server.csc.ncsu.edu/mediawiki/index.php/CSC_379_SUM2008:Topics#Social_Dossiers Topic Description]&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The rise in popularity of social networking sites has had an extroversive effect on large volumes personal data.  Sharing photos, personal commentary, status updates, and other personally interesting information through social mediums like Myspace and Facebook has become a common activity for many internet users.  Some users that are not fully aware of the implications, may decide to publish personal photos or writings after considering only their intended audience, failing to consider that other parties may view them.  To illustrate (hypothetical scenario):&lt;br /&gt;
: ''John Q. User is rather fond of his victory in last weekend's beer pong tournament, and so he decides to share photos commemorating the event with his friends using his public Myspace profile.  Later, when John is applying for a job, his interviewer asks if he still likes to play beer pong.  John is blind-sided by the question, thus losing his nerve and failing the interview.''&lt;br /&gt;
Is it fair for the interviewer to ask this question?  Or to examine his profile photos?  Should John have ''known better'' than to leave potentially compromising photos of himself in a publicly viewable space?&lt;br /&gt;
&lt;br /&gt;
==Data availability==&lt;br /&gt;
Many websites (especially social media sites) allow users to create personal profiles; a substantial portion of those sites allow their content to be indexed by search-agents, and so any content created while using a site may potentially be located easily through basic search queries.  The information that is connected to a particular user varies widely and can include very basic information (name, age, gender, locale, etc.) and/or disturbingly detailed information (e.g. mySpaceUserXX aka &amp;quot;Jane Q. User&amp;quot; is single, bisexual, Hispanic, a Unitarian Universalist, an Aquarius, a self-professed alcoholic, works in Accounting/Finance, graduated from Anytown Community College in 2004, etc.).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Social Media Sites&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
!&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
! Types of Information&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*[http://www.facebook.com Facebook]&lt;br /&gt;
*[http://www.myspace.com Myspace]&lt;br /&gt;
*[http://www.linkedin.com LinkedIn]&lt;br /&gt;
*[http://www.friendster.com Friendster]&lt;br /&gt;
*[http://www.youtube.com YouTube]&lt;br /&gt;
*[http://www.digg.com Digg]&lt;br /&gt;
*[http://www.flickr.com Flickr]&lt;br /&gt;
|&lt;br /&gt;
*[http://www.photobucket.com Photobucket]&lt;br /&gt;
*[http://www.picasa.com Picasa]&lt;br /&gt;
*[http://www.twitter.com Twitter]&lt;br /&gt;
*[http://www.xanga.com Xanga]&lt;br /&gt;
*[http://www.livejournal.com Livejournal]&lt;br /&gt;
*[http://www.blogger.com Blogger]&lt;br /&gt;
*[http://www.deviantart.com Deviant Art]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
*Demographics&lt;br /&gt;
*Photographs&lt;br /&gt;
*Videos&lt;br /&gt;
*User Comments&lt;br /&gt;
*Cultural Interests&lt;br /&gt;
*Religion/Creed&lt;br /&gt;
*Political Views&lt;br /&gt;
|&lt;br /&gt;
*Sexual Orientiation&lt;br /&gt;
*Forum Discussions&lt;br /&gt;
*Work History&lt;br /&gt;
*Education History&lt;br /&gt;
*Favorite Videos&lt;br /&gt;
*Friends' Identities&lt;br /&gt;
*Offline Media Tastes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Some search providers have even begun to specialize their services to scour popular social networking sites.  A user may simply enter part of your identity, such as your name or email address, into a query box, and the search engine returns a listing of potential matches.  This makes compilation of your publicly available data frighteningly easy.&lt;br /&gt;
&lt;br /&gt;
Public profiles from multiple networks may be linked without using a specialized search engine; a series of generic search queries, network-specific searches (e.g. using Facebook's internal search) and basic deductive reasoning may allow you to easily compile a fairly complete dossier of a person's life.  For instance, confirming someone's profile on myspace may reveal their AIM network name, which by coincidence is the same username that they specified for their YouTube account.  Their YouTube profile features in which they mention that they have a personal blog on Livejournal, etc.  This method of aggregating information is fairly straight-forward easy to accomplish with minimal sleuthing skills.&lt;br /&gt;
&lt;br /&gt;
==Aggregation motives==&lt;br /&gt;
&lt;br /&gt;
While new reasons to aggregate a persons data continue to emerge, there are several traditional motivations that seem to be popular.  Perhaps the primary of these is the use of social networking data by those people in charge of human resources decisions.  HR Managers are interested in hiring the best candidate for a job, and given that a simple web search may reveal substantial amounts of information on a job candidate's background, it's not surprising that focused search services like [http://www.spokeo.com/hr Spokeo] have been developed.  But ''should'' interviewers use these services?  Is it really fair to bring a job candidate's peripheral social data into an HR decision?  In some cases where the job in question involves high public exposure, such as a corporate spokesperson, detailed background checks are an expected part of the confirmation process; therefore most people would consider it a justified examination.  Conversely, if a person's lifestyle outside of work has no effect on their ability to perform their job, then many would consider the use of their personal information in a hiring decision to be unjustified.  &lt;br /&gt;
&lt;br /&gt;
'''Potential Interested Parties:'''&lt;br /&gt;
* '''''Hiring:'''''  Human resources staff and job interviewers' hiring decisions may be influenced by what search-queries reveal. [http://accounting.smartpros.com/x54248.xml]  The legality and ethical issues of unofficial google-stalking of potential job candidates is currently under debate. [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php]&lt;br /&gt;
* '''''Criminal Prosecution:'''''  Prosecutors may use the content you post online to build their case against you; your own social media profile may serve as a character witness against you. [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html]&lt;br /&gt;
* '''''Business Contacts:''''' Sales professionals constantly distribute their business cards to prospective clients/customers, so it is foreseeable that a lack of understanding of web privacy by a sales representative (that uses social media sites) could lead to disastrous results for themselves or the company they represent.&lt;br /&gt;
* '''''Insurance Eligibility:''''' &amp;quot;I'm sorry, Mr. Jones, but according to your blog, the following conditions are pre-existing and will require a rider/exclusion for us to even consider giving you a quote...&amp;quot;&lt;br /&gt;
* '''''Stalkers:'''''  If you have a lot of information publicly available through social networking profiles, then you have no real defensive strategy against potential stalkers accessing that information.  Granted, dedicated stalkers would find a way to obtain sensitive information (e.g. course schedules, work schedule, friends' identities) without using the internet, but social media only increases opportunity and ease, therefore the likelihood of attracting stalkers.&lt;br /&gt;
&lt;br /&gt;
=Links &amp;amp; Resources=&lt;br /&gt;
&lt;br /&gt;
===Job Hunting===&lt;br /&gt;
* [http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html Facebook can ruin your life, and so can Myspace, Bebo...] Ida Bergstrom, ''The Independent''.  Feb 10, 2008.&lt;br /&gt;
* [http://www.time.com/time/business/article/0,8599,1649121,00.html Online snooping gets creepy]. Anita Hamilton, ''Time''. Aug 2, 2007.&lt;br /&gt;
* [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php Employers Using Facebook for Background Checking: Is It Legal?] George Lenard, George's Employment Blawg.&lt;br /&gt;
* [http://time-blog.com/work_in_progress/2008/05/googlestalking_your_interviewe.html Google-stalking your interviewer is smart]. Lisa Takeuchi Cullen, ''Time''. May 29, 2008.&lt;br /&gt;
* [http://accounting.smartpros.com/x54248.xml Employers Google Job Candidates, Check Social Networking Web Sites]. SmartPros. Aug 8, 2006.&lt;br /&gt;
&lt;br /&gt;
===In the courts===&lt;br /&gt;
* [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html Alleged DUI killer's MySpace profile depicts youth consumed with money, drugs and graffiti]. Stephanie Farr and Dafney Tales, ''Philadelphia Daily News''.  Jul 17, 2008.&lt;br /&gt;
*[http://ap.google.com/article/ALeqM5jC-5mkxddsdwxCN5_DwfLq3RqPmwD920TQK00 Web networking photos come back to bite defendants]. Eric Tucker, AP. Jul 19, 2008.&lt;br /&gt;
*[http://www.dailynexus.com/article.php?a=13440 Court case decision reveals dangers of networking sites]. Evan Wagstaff, ''Daily Nexus''. Feb 28, 2007.&lt;br /&gt;
&lt;br /&gt;
===Stalking===&lt;br /&gt;
*[http://www.ncvc.org/src/AGP.Net/Components/DocumentViewer/Download.aspxnz?DocumentID=41389 Stalking by a &amp;quot;high-tech&amp;quot; guy]. John Loveall. Stalking Resource Center. 2005.&lt;br /&gt;
*[http://seattletimes.nwsource.com/html/living/2003845520_websnooping21.html Facebook makes it easy to &amp;quot;profile stalk&amp;quot;]. David Sarno, ''Los Angeles Times''.  Aug 21, 2007.&lt;br /&gt;
*[http://www.ncvc.org/src/main.aspx?dbID=DB_StalkingTechnology139 The Use of Technology to Stalk] from the Stalking Resource Center.&lt;br /&gt;
&lt;br /&gt;
===Privacy Resources===&lt;br /&gt;
* [http://www.slais.ubc.ca/COURSES/libr500/06-07-wt2/www2/S_Hintersteininger/home.htm Beyond the Job Interview: Unofficial Online Background Checks]. Stefan Hintersteininger. University of British Columbia. March 2007.&lt;br /&gt;
* [http://epic.org/privacy/tools.html EPIC online guide to practical privacy tools]. Electronic Privacy Information Center.&lt;br /&gt;
* [http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy EFF's top 12 ways to protect your online privacy]. Stanton McCandlish, Electronic Frontier Foundation. Apr 10, 2002.&lt;br /&gt;
&lt;br /&gt;
===Social Search Services===&lt;br /&gt;
* [http://www.spock.com Spock People Search]. Spock.com.&lt;br /&gt;
* [http://www.mybackgroundcheck.com/AboutUs.aspx MyBackGroundCheck.com].&lt;br /&gt;
* [http://www.spokeo.com/hr Spokeo.com/hr]. &amp;quot;Want to see your candidates' profiles on MySpace and LinkedIn?&amp;quot;&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16860</id>
		<title>Social dossiers</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16860"/>
		<updated>2008-08-05T03:49:28Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Data availability */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Study Guide=&lt;br /&gt;
&lt;br /&gt;
Social dossiers: [http://pg-server.csc.ncsu.edu/mediawiki/index.php/CSC_379_SUM2008:Topics#Social_Dossiers Topic Description]&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The rise in popularity of social networking sites has had an extroversive effect on large volumes personal data.  Sharing photos, personal commentary, status updates, and other personally interesting information through social mediums like Myspace and Facebook has become a common activity for many internet users.  Some users that are not fully aware of the implications, may decide to publish personal photos or writings after considering only their intended audience, failing to consider that other parties may view them.  To illustrate (hypothetical scenario):&lt;br /&gt;
: ''John Q. User is rather fond of his victory in last weekend's beer pong tournament, and so he decides to share photos commemorating the event with his friends using his public Myspace profile.  Later, when John is applying for a job, his interviewer asks if he still likes to play beer pong.  John is blind-sided by the question, thus losing his nerve and failing the interview.''&lt;br /&gt;
Is it fair for the interviewer to ask this question?  Or to examine his profile photos?  Should John have ''known better'' than to leave potentially compromising photos of himself in a publicly viewable space?&lt;br /&gt;
&lt;br /&gt;
==Data availability==&lt;br /&gt;
Many websites (especially social media sites) allow users to create personal profiles; a substantial portion of those sites allow their content to be indexed by search-agents, and so any content created while using a site may potentially be located easily through basic search queries.  The information that is connected to a particular user varies widely and can include very basic information (name, age, gender, locale, etc.) and/or disturbingly detailed information (e.g. mySpaceUserXX aka &amp;quot;Jane Q. User&amp;quot; is single, bisexual, Hispanic, a Unitarian Universalist, an Aquarius, a self-professed alcoholic, works in Accounting/Finance, graduated from Anytown Community College in 2004, etc.).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Social Media Sites&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
!&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
! Types of Information&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*[http://www.facebook.com Facebook]&lt;br /&gt;
*[http://www.myspace.com Myspace]&lt;br /&gt;
*[http://www.linkedin.com LinkedIn]&lt;br /&gt;
*[http://www.friendster.com Friendster]&lt;br /&gt;
*[http://www.youtube.com YouTube]&lt;br /&gt;
*[http://www.digg.com Digg]&lt;br /&gt;
*[http://www.flickr.com Flickr]&lt;br /&gt;
|&lt;br /&gt;
*[http://www.photobucket.com Photobucket]&lt;br /&gt;
*[http://www.picasa.com Picasa]&lt;br /&gt;
*[http://www.twitter.com Twitter]&lt;br /&gt;
*[http://www.xanga.com Xanga]&lt;br /&gt;
*[http://www.livejournal.com Livejournal]&lt;br /&gt;
*[http://www.blogger.com Blogger]&lt;br /&gt;
*[http://www.deviantart.com Deviant Art]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
*Demographics&lt;br /&gt;
*Photographs&lt;br /&gt;
*Videos&lt;br /&gt;
*User Comments&lt;br /&gt;
*Cultural Interests&lt;br /&gt;
*Religion/Creed&lt;br /&gt;
*Political Views&lt;br /&gt;
|&lt;br /&gt;
*Sexual Orientiation&lt;br /&gt;
*Forum Discussions&lt;br /&gt;
*Work History&lt;br /&gt;
*Education History&lt;br /&gt;
*Favorite Videos&lt;br /&gt;
*Friends' Identities&lt;br /&gt;
*Offline Media Tastes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Some search providers have even begun to specialize their services to scour popular social networking sites.  A user may simply enter part of your identity, such as your name or email address, into a query box, and the search engine returns a listing of potential matches.  This makes compilation of your publicly available data frighteningly easy.&lt;br /&gt;
&lt;br /&gt;
Someone's public profiles from multiple networks may be linked without using a specialized search engine; a series of generic search queries, network-specific searches (e.g. using Facebook's internal search) and basic deductive reasoning may allow you to easily compile a fairly complete dossier of a person's life.  For instance, confirming someone's profile on myspace may reveal their AIM network name, which by coincidence is the same username that they specified for their YouTube account.  Their YouTube profile features in which they mention that they have a personal blog on Livejournal, etc.  This method of aggregating information is fairly straight-forward, and frightening easy to accomplish with minimal sleuthing skills.&lt;br /&gt;
&lt;br /&gt;
==Aggregation motives==&lt;br /&gt;
&lt;br /&gt;
While new reasons to aggregate a persons data continue to emerge, there are several traditional motivations that seem to be popular.  Perhaps the primary of these is the use of social networking data by those people in charge of human resources decisions.  HR Managers are interested in hiring the best candidate for a job, and given that a simple web search may reveal substantial amounts of information on a job candidate's background, it's not surprising that focused search services like [http://www.spokeo.com/hr Spokeo] have been developed.  But ''should'' interviewers use these services?  Is it really fair to bring a job candidate's peripheral social data into an HR decision?  In some cases where the job in question involves high public exposure, such as a corporate spokesperson, detailed background checks are an expected part of the confirmation process; therefore most people would consider it a justified examination.  Conversely, if a person's lifestyle outside of work has no effect on their ability to perform their job, then many would consider the use of their personal information in a hiring decision to be unjustified.  &lt;br /&gt;
&lt;br /&gt;
'''Potential Interested Parties:'''&lt;br /&gt;
* '''''Hiring:'''''  Human resources staff and job interviewers' hiring decisions may be influenced by what search-queries reveal. [http://accounting.smartpros.com/x54248.xml]  The legality and ethical issues of unofficial google-stalking of potential job candidates is currently under debate. [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php]&lt;br /&gt;
* '''''Criminal Prosecution:'''''  Prosecutors may use the content you post online to build their case against you; your own social media profile may serve as a character witness against you. [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html]&lt;br /&gt;
* '''''Business Contacts:''''' Sales professionals constantly distribute their business cards to prospective clients/customers, so it is foreseeable that a lack of understanding of web privacy by a sales representative (that uses social media sites) could lead to disastrous results for themselves or the company they represent.&lt;br /&gt;
* '''''Insurance Eligibility:''''' &amp;quot;I'm sorry, Mr. Jones, but according to your blog, the following conditions are pre-existing and will require a rider/exclusion for us to even consider giving you a quote...&amp;quot;&lt;br /&gt;
* '''''Stalkers:'''''  If you have a lot of information publicly available through social networking profiles, then you have no real defensive strategy against potential stalkers accessing that information.  Granted, dedicated stalkers would find a way to obtain sensitive information (e.g. course schedules, work schedule, friends' identities) without using the internet, but social media only increases opportunity and ease, therefore the likelihood of attracting stalkers.&lt;br /&gt;
&lt;br /&gt;
=Links &amp;amp; Resources=&lt;br /&gt;
&lt;br /&gt;
===Job Hunting===&lt;br /&gt;
* [http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html Facebook can ruin your life, and so can Myspace, Bebo...] Ida Bergstrom, ''The Independent''.  Feb 10, 2008.&lt;br /&gt;
* [http://www.time.com/time/business/article/0,8599,1649121,00.html Online snooping gets creepy]. Anita Hamilton, ''Time''. Aug 2, 2007.&lt;br /&gt;
* [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php Employers Using Facebook for Background Checking: Is It Legal?] George Lenard, George's Employment Blawg.&lt;br /&gt;
* [http://time-blog.com/work_in_progress/2008/05/googlestalking_your_interviewe.html Google-stalking your interviewer is smart]. Lisa Takeuchi Cullen, ''Time''. May 29, 2008.&lt;br /&gt;
* [http://accounting.smartpros.com/x54248.xml Employers Google Job Candidates, Check Social Networking Web Sites]. SmartPros. Aug 8, 2006.&lt;br /&gt;
&lt;br /&gt;
===In the courts===&lt;br /&gt;
* [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html Alleged DUI killer's MySpace profile depicts youth consumed with money, drugs and graffiti]. Stephanie Farr and Dafney Tales, ''Philadelphia Daily News''.  Jul 17, 2008.&lt;br /&gt;
*[http://ap.google.com/article/ALeqM5jC-5mkxddsdwxCN5_DwfLq3RqPmwD920TQK00 Web networking photos come back to bite defendants]. Eric Tucker, AP. Jul 19, 2008.&lt;br /&gt;
*[http://www.dailynexus.com/article.php?a=13440 Court case decision reveals dangers of networking sites]. Evan Wagstaff, ''Daily Nexus''. Feb 28, 2007.&lt;br /&gt;
&lt;br /&gt;
===Stalking===&lt;br /&gt;
*[http://www.ncvc.org/src/AGP.Net/Components/DocumentViewer/Download.aspxnz?DocumentID=41389 Stalking by a &amp;quot;high-tech&amp;quot; guy]. John Loveall. Stalking Resource Center. 2005.&lt;br /&gt;
*[http://seattletimes.nwsource.com/html/living/2003845520_websnooping21.html Facebook makes it easy to &amp;quot;profile stalk&amp;quot;]. David Sarno, ''Los Angeles Times''.  Aug 21, 2007.&lt;br /&gt;
*[http://www.ncvc.org/src/main.aspx?dbID=DB_StalkingTechnology139 The Use of Technology to Stalk] from the Stalking Resource Center.&lt;br /&gt;
&lt;br /&gt;
===Privacy Resources===&lt;br /&gt;
* [http://www.slais.ubc.ca/COURSES/libr500/06-07-wt2/www2/S_Hintersteininger/home.htm Beyond the Job Interview: Unofficial Online Background Checks]. Stefan Hintersteininger. University of British Columbia. March 2007.&lt;br /&gt;
* [http://epic.org/privacy/tools.html EPIC online guide to practical privacy tools]. Electronic Privacy Information Center.&lt;br /&gt;
* [http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy EFF's top 12 ways to protect your online privacy]. Stanton McCandlish, Electronic Frontier Foundation. Apr 10, 2002.&lt;br /&gt;
&lt;br /&gt;
===Social Search Services===&lt;br /&gt;
* [http://www.spock.com Spock People Search]. Spock.com.&lt;br /&gt;
* [http://www.mybackgroundcheck.com/AboutUs.aspx MyBackGroundCheck.com].&lt;br /&gt;
* [http://www.spokeo.com/hr Spokeo.com/hr]. &amp;quot;Want to see your candidates' profiles on MySpace and LinkedIn?&amp;quot;&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Topics&amp;diff=16857</id>
		<title>CSC 379 SUM2008:Topics</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Topics&amp;diff=16857"/>
		<updated>2008-08-05T03:34:42Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Social Dossiers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= New Topics =&lt;br /&gt;
&lt;br /&gt;
'''For these topics, you will be creating the study guide and bibliography sections, instead of providing an update an existing page.  Examine the [http://ethics.csc.ncsu.edu/ ethics.csc.ncsu.edu website] for examples.  Since your pages will be created and maintained in wiki-form, please design your pages with wiki markup (not HTML).  Formatting resources are provided on the [[CSC 379]] wiki homepage.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Smart Mobs==&lt;br /&gt;
'''social/smartmobs'''&lt;br /&gt;
&lt;br /&gt;
As cell phones, text messaging, GPS, and other technologies make mobilization of groups easier, people are continually finding new uses.  Both physical and virtual actions now frequently take place; protests, flooding email accounts and online polls, to impromptu gatherings.  Explore smart/flash mobs, and the ethical considerations they raise.  Include information on important instances of smart mobs and the future of smart mobs.&lt;br /&gt;
&lt;br /&gt;
==Social Dossiers==&lt;br /&gt;
'''social/dossiers'''&lt;br /&gt;
&lt;br /&gt;
In the old days, if someone wanted to assemble a dossier on you, they would hire a private investigator.  Now, depending on your Web presence, they may only need to Google you.  Bits and pieces of information about ourselves can be found everywhere online, and most are unaware of just how much information about them is available.  Anyone with sufficient time and/or software can assemble social dossiers from this information.  What you write on Facebook may affect your ability to get a job!  Examine the array of personal information available online, efforts to assemble and utilize this information, and ethical considerations raised by posting or using this information.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://ethics.csc.ncsu.edu/social/lifebits/new.html Helpful Links] --&amp;gt;&lt;br /&gt;
[http://pg-server.csc.ncsu.edu/mediawiki/index.php/Social_dossiers New Study Guide]&lt;br /&gt;
&lt;br /&gt;
==Phishing==&lt;br /&gt;
'''abuse/spam/phishing'''&lt;br /&gt;
&lt;br /&gt;
Phishing efforts are growing in variety and sophistication.  They pose many privacy and security risks.  Examine the practice of phishing, its forms, and the ethical considerations raised.&lt;br /&gt;
&lt;br /&gt;
[http://ethics.csc.ncsu.edu/abuse/spam/phishing/new.html Helpful Links]&lt;br /&gt;
&lt;br /&gt;
==Encryption==&lt;br /&gt;
'''privacy/encryption'''&lt;br /&gt;
&lt;br /&gt;
Provide a general overview of the ethical considerations of using encryption.  Within your coverage, explore specifically if governments should be allowed to impose restrictions on the types of encryption that can be used as well as where and how encryption may be used.&lt;br /&gt;
&lt;br /&gt;
[http://pg-server.csc.ncsu.edu/mediawiki/index.php/Encryption Wiki Article]&lt;br /&gt;
&lt;br /&gt;
[http://ethics.csc.ncsu.edu/privacy/encryption/new.html Helpful Links]&lt;br /&gt;
&lt;br /&gt;
==Voting Receipts==&lt;br /&gt;
'''risks/reliability/voting/receipts'''&lt;br /&gt;
&lt;br /&gt;
Touchscreen voting was widely touted as a solution to vote-counting fiascoes like the famous Florida election debacle of 2000.  But it wasn't long before computer experts started to raise the alarm: With electronic touchscreen voting, there is absolutely no record of how a voter voted, except for the tallies spit out by the machine at the end of the day.  If a software bug or hardware malfunction resulted in a miscount, no one would ever know.  Many computer scientists demanded that paper receipts be printed and shown to the voter for verification, then retained by the machine in case a recount was needed.  So the vendors of touchscreen voting systems reluctantly added printers.  But the printers have not been reliable, and now scientists are searching for another way of creating unforgeable receipts.  Explore the competing ethical requireents that must be met by these receipts: voter privacy, accurate tallies, and resistance to hacking.  &lt;br /&gt;
***Do not cover aspects of electronic voting other than receipts; the issue of hacking vote-counting software and Internet voting have their own pages, for example.  Cover only articles that are in some way related to the need for receipts, or the type of backup used.&lt;br /&gt;
&lt;br /&gt;
[http://ethics.csc.ncsu.edu/risks/reliability/voting/receipts/new.html Helpful Links]&lt;br /&gt;
&lt;br /&gt;
= Existing Topics =&lt;br /&gt;
&lt;br /&gt;
'''For these topics you will be performing an update on an existing topic.  Pages for the study guide and bibliography sections are included on the [http://ethics.csc.ncsu.edu ethics.csc.ncsu.edu website], which you will be transitioning to their new wiki-form.  Since your pages will be created and maintained in wiki-form, please design your pages with wiki markup (not HTML). Formatting resources are provided on the [[CSC 379]] wiki homepage.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Cyberwarfare==&lt;br /&gt;
'''risks/security/cyberwar'''&lt;br /&gt;
&lt;br /&gt;
Cyberwarfare has long been a topic of theoretical interest and growing practical importance, as nations' infrastructures grow increasingly computerized.  Now, with the recent attack on Estonia, the cyberwar era may have begun in earnest.  Provide a general overview of the ethical considerations related to cyberwarfare.  Examine new methods of cyberwarfare, and include recent examples.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/cyberwar Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/cyberwar/study.php Current Study Guide]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/cyberwar/new.html Helpful Links]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Wiki Page]]&lt;br /&gt;
&lt;br /&gt;
==Intellectual Property Law==&lt;br /&gt;
'''intellectual/law'''&lt;br /&gt;
&lt;br /&gt;
Intellectual-property law is a topic that is basic to this course.  Although not much is new, it is still worthwhile to update the sources.  Ensure that trade secrets are included in your coverage.  ''Alternative intellectual property models (GPL, Creative Commons, etc.) are '''not''' part of this topic.  Nor are implications of IP law related to electronic communication (e.g., whether it is legal to copy a Web page and send it to a mailing list).''  The only material that should be covered here is material on what the law states, and relevant court decisions. &lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/law Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/law/study.php Current Study Guide]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/law/new.html Helpful Links]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Cyberlicenses / Shrinkwrap Licenses==&lt;br /&gt;
'''intellectual/licensing/cyberlicenses''' and '''intellectual/licensing/shrinkwrap'''&lt;br /&gt;
&lt;br /&gt;
In the past, we have had pages on the Ethics Web site related to shrinkwrap licenses (that are contained within the cardboard box that software comes in) and cyberlicenses (licenses you agree to over the Web before being allowed to download or install software).  The issues never were that different, and as digital downloads come to dominate the market, it makes less sense than ever to maintain two separate pages.  Provide a general overview of the ethical considerations related to shrinkwrap and cyberlicenses, such as whether a buyer can realistically give informed consent to a document that is long, hard to read, and may contain provision whose meaning is not clear at first glance.  Expand on licensing related to ownership of content created through web services, such as Facebook and MySpace.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/licensing/cyberlicenses Current Main Page (1)]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/licensing/cyberlicenses/study.php Current Study Guide (1)]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/licensing/cyberlicenses/new.html Helpful Links (1)]&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/licensing/cyberlicenses Current Main Page (2)]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/licensing/shrinkwrap/study.php Current Study Guide (2)]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/licensing/shrinkwrap/new.html Helpful Links (2)]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Computer Modeling==&lt;br /&gt;
'''risks/models'''&lt;br /&gt;
&lt;br /&gt;
The implications of computer models are often controversial, but the GIGO adage always applies: a model can be no better than its inputs.  An inaccurate model has a high potential for conveying a misleading and dishonest view of reality.  However, people who are less computer literate may not understand this, and may accord credence to anything that comes out of a computer.  Thus, modelers must take pains not to make expansive claims about their results.  Provide a general overview of the ethical considerations, both from a science/engineering, and social/economic perspective.  Cover both sides of the current controversy over models of global warming.  On a social/economic plane, include ethical considerations related to developments in computer modeling in virtual communities, such as Second Life.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/models Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/models/study.php Current Study Guide]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/models/new.html Helpful Links]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Depersonalization==&lt;br /&gt;
'''social/technoharm'''&lt;br /&gt;
&lt;br /&gt;
While Generation Y tends to be most comfortable when always connected, a lot of other people believe that computers are drawing us away from meaningful personal contact.  In the past decade, this view was much more widespread in Europe than in America.  Provide an overview of controversy over depersonalization, and the ethical considerations related to becoming more conversant with technology than with other people.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/social/technoharm Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/social/technoharm/study.php Current Study Guide]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/social/technoharm/new.html Helpful Links]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Privacy of Medical Information==&lt;br /&gt;
'''privacy/medical'''&lt;br /&gt;
&lt;br /&gt;
Privacy of medical records has long been a high-profile issue.  Inevitably, medical records are becoming more computerized. Emerging patient-centric services such as [https://www.google.com/health Google Health] are accelerating this trend.  Provide a general overview of the ethical considerations related to privacy of digital medical information.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/medical Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/medical/study.php Current Study Guide]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/medical/new.html Helpful Links]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Electronic Voting==&lt;br /&gt;
'''risks/reliability/voting/electronic'''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Electronic voting&amp;quot; means the use of machines that register votes and record them in electronic memory.  While once touted as the solution to fiascoes like the one in Florida in the 2000 presidential election, they quickly became controversial because of the large number of &amp;quot;undervotes&amp;quot; they recorded--where voters voted for no candidate in a particular race.  Concerns were raised that some voters were simply not familiar enough with technology to use e-voting machines correctly. A number of election anomalies tended to lend credence to this claim.  Then, there is also the problem that there is no way to effectively test the software.  Unlike financial transactions, there is no record kept of how a particular vote counted.  So if the vote is not counted, who will know?&lt;br /&gt;
&lt;br /&gt;
This page is due an update, but please be sure to steer clear of such related topics as (1) the [http://ethics.csc.ncsu.edu/risks/reliability/voting reliability of vote-counting software], (2) [http://ethics.csc.ncsu.edu/risks/reliability/voting/internet Internet voting], and (3) what kind of receipts, if any, should be produced by machines so that voters can verify that their vote was recorded.  These topics all have their own pages on the [http://ethics.csc.ncsu.edu Ethics Web site].  You do not have to find articles that avoid all mention of these topics, but do not pick any articles that are ''mainly'' about any of these three.  Rather, focus on articles that talk about electronic or touch-screen machines, as compared to other methods of voting.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic/study.php Current Study Guide]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic/new.html Helpful Links]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Instant Messaging==&lt;br /&gt;
'''commerce/anticompetitive/instant'''&lt;br /&gt;
&lt;br /&gt;
Most of the references on this page are three or four years old. The issue is whether a small number of companies should unfairly dominate the market for instant messaging. Update the existing page with new references, and the study guide with new issues.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Security Precautions==&lt;br /&gt;
'''risks/security/precautions'''&lt;br /&gt;
&lt;br /&gt;
If you are in charge of network security, you have a duty to keep your network secure.  What security precautions do Web and network administrators need to take to guard against hacker attacks, such as distributed denial-of-service attacks? What precautions are needed against other forms of hacking? Against cyberwarfare and terrorist threats? Update topic page and study guide to cover current/future precautions related to recent occurrences.  ''Be sure to focus on articles that talk about precautions that administrators need to take,'' not article that focus on threats to networks, only mentioning precautions as an afterthought.&lt;br /&gt;
&lt;br /&gt;
'''Social Engineering''' should be included as a major section within this topic.  If you would like to make a new page focused on social engineering, you may if you choose this topic.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/precautions Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/precautions/study.php Current Study Guide]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16856</id>
		<title>Social dossiers</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16856"/>
		<updated>2008-08-05T03:33:23Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Study Guide=&lt;br /&gt;
&lt;br /&gt;
Social dossiers: [http://pg-server.csc.ncsu.edu/mediawiki/index.php/CSC_379_SUM2008:Topics#Social_Dossiers Topic Description]&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The rise in popularity of social networking sites has had an extroversive effect on large volumes personal data.  Sharing photos, personal commentary, status updates, and other personally interesting information through social mediums like Myspace and Facebook has become a common activity for many internet users.  Some users that are not fully aware of the implications, may decide to publish personal photos or writings after considering only their intended audience, failing to consider that other parties may view them.  To illustrate (hypothetical scenario):&lt;br /&gt;
: ''John Q. User is rather fond of his victory in last weekend's beer pong tournament, and so he decides to share photos commemorating the event with his friends using his public Myspace profile.  Later, when John is applying for a job, his interviewer asks if he still likes to play beer pong.  John is blind-sided by the question, thus losing his nerve and failing the interview.''&lt;br /&gt;
Is it fair for the interviewer to ask this question?  Or to examine his profile photos?  Should John have ''known better'' than to leave potentially compromising photos of himself in a publicly viewable space?&lt;br /&gt;
&lt;br /&gt;
==Data availability==&lt;br /&gt;
Many websites (especially social media sites) allow users to create personal profiles; a substantial portion of those sites allow their content to be indexed by search-agents, and so any content created while using a site may potentially be located easily through basic search queries.  The information that is connected to a particular user varies widely and can include very basic information (name, age, gender, locale, etc.) and/or disturbingly detailed information (e.g. mySpaceUserXX aka &amp;quot;Jane Q. User&amp;quot; is single, bisexual, Hispanic, a Unitarian Universalist, an Aquarius, a self-professed alcoholic, works in Accounting/Finance, graduated from Anytown Community College in 2004, etc.).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Social Media Sites&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
!&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
! Types of Information&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*[http://www.facebook.com Facebook]&lt;br /&gt;
*[http://www.myspace.com Myspace]&lt;br /&gt;
*[http://www.linkedin.com LinkedIn]&lt;br /&gt;
*[http://www.friendster.com Friendster]&lt;br /&gt;
*[http://www.youtube.com YouTube]&lt;br /&gt;
*[http://www.digg.com Digg]&lt;br /&gt;
*[http://www.flickr.com Flickr]&lt;br /&gt;
|&lt;br /&gt;
*[http://www.photobucket.com Photobucket]&lt;br /&gt;
*[http://www.picasa.com Picasa]&lt;br /&gt;
*[http://www.twitter.com Twitter]&lt;br /&gt;
*[http://www.xanga.com Xanga]&lt;br /&gt;
*[http://www.livejournal.com Livejournal]&lt;br /&gt;
*[http://www.blogger.com Blogger]&lt;br /&gt;
*[http://www.deviantart.com Deviant Art]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
*Demographics&lt;br /&gt;
*Photographs&lt;br /&gt;
*Videos&lt;br /&gt;
*User Comments&lt;br /&gt;
*Cultural Interests&lt;br /&gt;
*Religion/Creed&lt;br /&gt;
*Political Views&lt;br /&gt;
|&lt;br /&gt;
*Sexual Orientiation&lt;br /&gt;
*Forum Discussions&lt;br /&gt;
*Work History&lt;br /&gt;
*Education History&lt;br /&gt;
*Favorite Videos&lt;br /&gt;
*Friends' Identities&lt;br /&gt;
*Offline Media Tastes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Some search providers have even begun to specialize their services to scour popular social networking sites.  A user may simply enter part of your identity, such as your name or email address, into a query box, and the search engine returns a listing of potential matches.  This makes compilation of your publicly available data frighteningly easy.&lt;br /&gt;
&lt;br /&gt;
==Aggregation motives==&lt;br /&gt;
&lt;br /&gt;
While new reasons to aggregate a persons data continue to emerge, there are several traditional motivations that seem to be popular.  Perhaps the primary of these is the use of social networking data by those people in charge of human resources decisions.  HR Managers are interested in hiring the best candidate for a job, and given that a simple web search may reveal substantial amounts of information on a job candidate's background, it's not surprising that focused search services like [http://www.spokeo.com/hr Spokeo] have been developed.  But ''should'' interviewers use these services?  Is it really fair to bring a job candidate's peripheral social data into an HR decision?  In some cases where the job in question involves high public exposure, such as a corporate spokesperson, detailed background checks are an expected part of the confirmation process; therefore most people would consider it a justified examination.  Conversely, if a person's lifestyle outside of work has no effect on their ability to perform their job, then many would consider the use of their personal information in a hiring decision to be unjustified.  &lt;br /&gt;
&lt;br /&gt;
'''Potential Interested Parties:'''&lt;br /&gt;
* '''''Hiring:'''''  Human resources staff and job interviewers' hiring decisions may be influenced by what search-queries reveal. [http://accounting.smartpros.com/x54248.xml]  The legality and ethical issues of unofficial google-stalking of potential job candidates is currently under debate. [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php]&lt;br /&gt;
* '''''Criminal Prosecution:'''''  Prosecutors may use the content you post online to build their case against you; your own social media profile may serve as a character witness against you. [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html]&lt;br /&gt;
* '''''Business Contacts:''''' Sales professionals constantly distribute their business cards to prospective clients/customers, so it is foreseeable that a lack of understanding of web privacy by a sales representative (that uses social media sites) could lead to disastrous results for themselves or the company they represent.&lt;br /&gt;
* '''''Insurance Eligibility:''''' &amp;quot;I'm sorry, Mr. Jones, but according to your blog, the following conditions are pre-existing and will require a rider/exclusion for us to even consider giving you a quote...&amp;quot;&lt;br /&gt;
* '''''Stalkers:'''''  If you have a lot of information publicly available through social networking profiles, then you have no real defensive strategy against potential stalkers accessing that information.  Granted, dedicated stalkers would find a way to obtain sensitive information (e.g. course schedules, work schedule, friends' identities) without using the internet, but social media only increases opportunity and ease, therefore the likelihood of attracting stalkers.&lt;br /&gt;
&lt;br /&gt;
=Links &amp;amp; Resources=&lt;br /&gt;
&lt;br /&gt;
===Job Hunting===&lt;br /&gt;
* [http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html Facebook can ruin your life, and so can Myspace, Bebo...] Ida Bergstrom, ''The Independent''.  Feb 10, 2008.&lt;br /&gt;
* [http://www.time.com/time/business/article/0,8599,1649121,00.html Online snooping gets creepy]. Anita Hamilton, ''Time''. Aug 2, 2007.&lt;br /&gt;
* [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php Employers Using Facebook for Background Checking: Is It Legal?] George Lenard, George's Employment Blawg.&lt;br /&gt;
* [http://time-blog.com/work_in_progress/2008/05/googlestalking_your_interviewe.html Google-stalking your interviewer is smart]. Lisa Takeuchi Cullen, ''Time''. May 29, 2008.&lt;br /&gt;
* [http://accounting.smartpros.com/x54248.xml Employers Google Job Candidates, Check Social Networking Web Sites]. SmartPros. Aug 8, 2006.&lt;br /&gt;
&lt;br /&gt;
===In the courts===&lt;br /&gt;
* [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html Alleged DUI killer's MySpace profile depicts youth consumed with money, drugs and graffiti]. Stephanie Farr and Dafney Tales, ''Philadelphia Daily News''.  Jul 17, 2008.&lt;br /&gt;
*[http://ap.google.com/article/ALeqM5jC-5mkxddsdwxCN5_DwfLq3RqPmwD920TQK00 Web networking photos come back to bite defendants]. Eric Tucker, AP. Jul 19, 2008.&lt;br /&gt;
*[http://www.dailynexus.com/article.php?a=13440 Court case decision reveals dangers of networking sites]. Evan Wagstaff, ''Daily Nexus''. Feb 28, 2007.&lt;br /&gt;
&lt;br /&gt;
===Stalking===&lt;br /&gt;
*[http://www.ncvc.org/src/AGP.Net/Components/DocumentViewer/Download.aspxnz?DocumentID=41389 Stalking by a &amp;quot;high-tech&amp;quot; guy]. John Loveall. Stalking Resource Center. 2005.&lt;br /&gt;
*[http://seattletimes.nwsource.com/html/living/2003845520_websnooping21.html Facebook makes it easy to &amp;quot;profile stalk&amp;quot;]. David Sarno, ''Los Angeles Times''.  Aug 21, 2007.&lt;br /&gt;
*[http://www.ncvc.org/src/main.aspx?dbID=DB_StalkingTechnology139 The Use of Technology to Stalk] from the Stalking Resource Center.&lt;br /&gt;
&lt;br /&gt;
===Privacy Resources===&lt;br /&gt;
* [http://www.slais.ubc.ca/COURSES/libr500/06-07-wt2/www2/S_Hintersteininger/home.htm Beyond the Job Interview: Unofficial Online Background Checks]. Stefan Hintersteininger. University of British Columbia. March 2007.&lt;br /&gt;
* [http://epic.org/privacy/tools.html EPIC online guide to practical privacy tools]. Electronic Privacy Information Center.&lt;br /&gt;
* [http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy EFF's top 12 ways to protect your online privacy]. Stanton McCandlish, Electronic Frontier Foundation. Apr 10, 2002.&lt;br /&gt;
&lt;br /&gt;
===Social Search Services===&lt;br /&gt;
* [http://www.spock.com Spock People Search]. Spock.com.&lt;br /&gt;
* [http://www.mybackgroundcheck.com/AboutUs.aspx MyBackGroundCheck.com].&lt;br /&gt;
* [http://www.spokeo.com/hr Spokeo.com/hr]. &amp;quot;Want to see your candidates' profiles on MySpace and LinkedIn?&amp;quot;&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16854</id>
		<title>Social dossiers</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16854"/>
		<updated>2008-08-05T03:32:43Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Study Guide */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Study Guide=&lt;br /&gt;
&lt;br /&gt;
Social dossiers: [http://pg-server.csc.ncsu.edu/mediawiki/index.php/CSC_379_SUM2008:Topics#Social_Dossiers Topic Description]&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The rise in popularity of social networking sites has had an extroversive effect on large volumes personal data.  Sharing photos, personal commentary, status updates, and other personally interesting information through social mediums like Myspace and Facebook has become a common activity for many internet users.  Some users that are not fully aware of the implications, may decide to publish personal photos or writings after considering only their intended audience, failing to consider that other parties may view them.  To illustrate (hypothetical scenario):&lt;br /&gt;
: ''John Q. User is rather fond of his victory in last weekend's beer pong tournament, and so he decides to share photos commemorating the event with his friends using his public Myspace profile.  Later, when John is applying for a job, his interviewer asks if he still likes to play beer pong.  John is blind-sided by the question, thus losing his nerve and failing the interview.''&lt;br /&gt;
Is it fair for the interviewer to ask this question?  Or to examine his profile photos?  Should John have ''known better'' than to leave potentially compromising photos of himself in a publicly viewable space?&lt;br /&gt;
&lt;br /&gt;
==Data availability==&lt;br /&gt;
Many websites (especially social media sites) allow users to create personal profiles; a substantial portion of those sites allow their content to be indexed by search-agents, and so any content created while using a site may potentially be located easily through basic search queries.  The information that is connected to a particular user varies widely and can include very basic information (name, age, gender, locale, etc.) and/or disturbingly detailed information (e.g. mySpaceUserXX aka &amp;quot;Jane Q. User&amp;quot; is single, bisexual, Hispanic, a Unitarian Universalist, an Aquarius, a self-professed alcoholic, works in Accounting/Finance, graduated from Anytown Community College in 2004, etc.).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Social Media Sites&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
!&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
! Types of Information&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*[http://www.facebook.com Facebook]&lt;br /&gt;
*[http://www.myspace.com Myspace]&lt;br /&gt;
*[http://www.linkedin.com LinkedIn]&lt;br /&gt;
*[http://www.friendster.com Friendster]&lt;br /&gt;
*[http://www.youtube.com YouTube]&lt;br /&gt;
*[http://www.digg.com Digg]&lt;br /&gt;
*[http://www.flickr.com Flickr]&lt;br /&gt;
|&lt;br /&gt;
*[http://www.photobucket.com Photobucket]&lt;br /&gt;
*[http://www.picasa.com Picasa]&lt;br /&gt;
*[http://www.twitter.com Twitter]&lt;br /&gt;
*[http://www.xanga.com Xanga]&lt;br /&gt;
*[http://www.livejournal.com Livejournal]&lt;br /&gt;
*[http://www.blogger.com Blogger]&lt;br /&gt;
*[http://www.deviantart.com Deviant Art]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
*Demographics&lt;br /&gt;
*Photographs&lt;br /&gt;
*Videos&lt;br /&gt;
*User Comments&lt;br /&gt;
*Cultural Interests&lt;br /&gt;
*Religion/Creed&lt;br /&gt;
*Political Views&lt;br /&gt;
|&lt;br /&gt;
*Sexual Orientiation&lt;br /&gt;
*Forum Discussions&lt;br /&gt;
*Work History&lt;br /&gt;
*Education History&lt;br /&gt;
*Favorite Videos&lt;br /&gt;
*Friends' Identities&lt;br /&gt;
*Offline Media Tastes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Some search providers have even begun to specialize their services to scour popular social networking sites.  A user may simply enter part of your identity, such as your name or email address, into a query box, and the search engine returns a listing of potential matches.  This makes compilation of your publicly available data frighteningly easy.&lt;br /&gt;
&lt;br /&gt;
==Aggregation motives==&lt;br /&gt;
&lt;br /&gt;
While new reasons to aggregate a persons data continue to emerge, there are several traditional motivations that seem to be popular.  Perhaps the primary of these is the use of social networking data by those people in charge of human resources decisions.  HR Managers are interested in hiring the best candidate for a job, and given that a simple web search may reveal substantial amounts of information on a job candidate's background, it's not surprising that focused search services like [http://www.spokeo.com/hr Spokeo] have been developed.  But ''should'' interviewers use these services?  Is it really fair to bring a job candidate's peripheral social data into an HR decision?  In some cases where the job in question involves high public exposure, such as a corporate spokesperson, detailed background checks are an expected part of the confirmation process; therefore most people would consider it a justified examination.  Conversely, if a person's lifestyle outside of work has no effect on their ability to perform their job, then many would consider the use of their personal information in a hiring decision to be unjustified.  &lt;br /&gt;
&lt;br /&gt;
'''Potential Interested Parties:'''&lt;br /&gt;
* '''''Hiring:'''''  Human resources staff and job interviewers' hiring decisions may be influenced by what search-queries reveal. [http://accounting.smartpros.com/x54248.xml]  The legality and ethical issues of unofficial google-stalking of potential job candidates is currently under debate. [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php]&lt;br /&gt;
* '''''Criminal Prosecution:'''''  Prosecutors may use the content you post online to build their case against you; your own social media profile may serve as a character witness against you. [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html]&lt;br /&gt;
* '''''Business Contacts:''''' Sales professionals constantly distribute their business cards to prospective clients/customers, so it is foreseeable that a lack of understanding of web privacy by a sales representative (that uses social media sites) could lead to disastrous results for themselves or the company they represent.&lt;br /&gt;
* '''''Insurance Eligibility:''''' &amp;quot;I'm sorry, Mr. Jones, but according to your blog, the following conditions are pre-existing and will require a rider/exclusion for us to even consider giving you a quote...&amp;quot;&lt;br /&gt;
* '''''Stalkers:'''''  If you have a lot of information publicly available through social networking profiles, then you have no real defensive strategy against potential stalkers accessing that information.  Granted, dedicated stalkers would find a way to obtain sensitive information (e.g. course schedules, work schedule, friends' identities) without using the internet, but social media only increases opportunity and ease, therefore the likelihood of attracting stalkers.&lt;br /&gt;
&lt;br /&gt;
==Links &amp;amp; Resources==&lt;br /&gt;
&lt;br /&gt;
===Job Hunting===&lt;br /&gt;
* [http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html Facebook can ruin your life, and so can Myspace, Bebo...] Ida Bergstrom, ''The Independent''.  Feb 10, 2008.&lt;br /&gt;
* [http://www.time.com/time/business/article/0,8599,1649121,00.html Online snooping gets creepy]. Anita Hamilton, ''Time''. Aug 2, 2007.&lt;br /&gt;
* [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php Employers Using Facebook for Background Checking: Is It Legal?] George Lenard, George's Employment Blawg.&lt;br /&gt;
* [http://time-blog.com/work_in_progress/2008/05/googlestalking_your_interviewe.html Google-stalking your interviewer is smart]. Lisa Takeuchi Cullen, ''Time''. May 29, 2008.&lt;br /&gt;
* [http://accounting.smartpros.com/x54248.xml Employers Google Job Candidates, Check Social Networking Web Sites]. SmartPros. Aug 8, 2006.&lt;br /&gt;
&lt;br /&gt;
===In the courts===&lt;br /&gt;
* [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html Alleged DUI killer's MySpace profile depicts youth consumed with money, drugs and graffiti]. Stephanie Farr and Dafney Tales, ''Philadelphia Daily News''.  Jul 17, 2008.&lt;br /&gt;
*[http://ap.google.com/article/ALeqM5jC-5mkxddsdwxCN5_DwfLq3RqPmwD920TQK00 Web networking photos come back to bite defendants]. Eric Tucker, AP. Jul 19, 2008.&lt;br /&gt;
*[http://www.dailynexus.com/article.php?a=13440 Court case decision reveals dangers of networking sites]. Evan Wagstaff, ''Daily Nexus''. Feb 28, 2007.&lt;br /&gt;
&lt;br /&gt;
===Stalking===&lt;br /&gt;
*[http://www.ncvc.org/src/AGP.Net/Components/DocumentViewer/Download.aspxnz?DocumentID=41389 Stalking by a &amp;quot;high-tech&amp;quot; guy]. John Loveall. Stalking Resource Center. 2005.&lt;br /&gt;
*[http://seattletimes.nwsource.com/html/living/2003845520_websnooping21.html Facebook makes it easy to &amp;quot;profile stalk&amp;quot;]. David Sarno, ''Los Angeles Times''.  Aug 21, 2007.&lt;br /&gt;
*[http://www.ncvc.org/src/main.aspx?dbID=DB_StalkingTechnology139 The Use of Technology to Stalk] from the Stalking Resource Center.&lt;br /&gt;
&lt;br /&gt;
===Privacy Resources===&lt;br /&gt;
* [http://www.slais.ubc.ca/COURSES/libr500/06-07-wt2/www2/S_Hintersteininger/home.htm Beyond the Job Interview: Unofficial Online Background Checks]. Stefan Hintersteininger. University of British Columbia. March 2007.&lt;br /&gt;
* [http://epic.org/privacy/tools.html EPIC online guide to practical privacy tools]. Electronic Privacy Information Center.&lt;br /&gt;
* [http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy EFF's top 12 ways to protect your online privacy]. Stanton McCandlish, Electronic Frontier Foundation. Apr 10, 2002.&lt;br /&gt;
&lt;br /&gt;
===Social Search Services===&lt;br /&gt;
* [http://www.spock.com Spock People Search]. Spock.com.&lt;br /&gt;
* [http://www.mybackgroundcheck.com/AboutUs.aspx MyBackGroundCheck.com].&lt;br /&gt;
* [http://www.spokeo.com/hr Spokeo.com/hr]. &amp;quot;Want to see your candidates' profiles on MySpace and LinkedIn?&amp;quot;&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Talk:Social_dossiers&amp;diff=16852</id>
		<title>Talk:Social dossiers</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Talk:Social_dossiers&amp;diff=16852"/>
		<updated>2008-08-05T03:30:44Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*&amp;lt;Not sure where to link...&amp;gt;There should be a link to the topic description.&lt;br /&gt;
*&amp;lt;Corrected: 16+&amp;gt;There need to be more links, perhaps two dozen instead of one dozen. (was having difficulty finding quality articles that were not duplicates of existing stories...)&lt;br /&gt;
*&amp;lt;Corrected: added more discussion&amp;gt;{identification of issues} Some, e.g., use in hiring. But the study guide says very little about it; you have to follow the links. &lt;br /&gt;
*&amp;lt;Corrected: incorporated into discussion&amp;gt;Differing viewpoints are not really identified, unless you read the articles linked to.&lt;br /&gt;
*&amp;lt;Corrected: revised link categories&amp;gt;&amp;quot;Articles of interest&amp;quot; is too vague; one of the headings should certainly be &amp;quot;Job Hunting&amp;quot;&lt;br /&gt;
*&amp;lt;Corrected&amp;gt;{identification of issues} It probably mentions them somewhere, but does not really identify them as ethical issues.&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;Corrected&amp;gt;The study guide does not read as a narrative, but rather as a set of related paragraphs. There should be topic sentences, explaining why lists of issues have been aggregated together.&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Talk:Social_dossiers&amp;diff=16850</id>
		<title>Talk:Social dossiers</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Talk:Social_dossiers&amp;diff=16850"/>
		<updated>2008-08-05T03:29:06Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*&amp;lt;I'm not sure what is meant by this???&amp;gt;There should be a link to the topic description.&lt;br /&gt;
*&amp;lt;Corrected: 16+&amp;gt;There need to be more links, perhaps two dozen instead of one dozen. (was having difficulty finding quality articles that were not duplicates of existing stories...)&lt;br /&gt;
*&amp;lt;Corrected: added more discussion&amp;gt;{identification of issues} Some, e.g., use in hiring. But the study guide says very little about it; you have to follow the links. &lt;br /&gt;
*&amp;lt;Corrected: incorporated into discussion&amp;gt;Differing viewpoints are not really identified, unless you read the articles linked to.&lt;br /&gt;
*&amp;lt;Corrected: revised link categories&amp;gt;&amp;quot;Articles of interest&amp;quot; is too vague; one of the headings should certainly be &amp;quot;Job Hunting&amp;quot;&lt;br /&gt;
*{identification of issues} It probably mentions them somewhere, but does not really identify them as ethical issues.&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;Corrected&amp;gt;The study guide does not read as a narrative, but rather as a set of related paragraphs. There should be topic sentences, explaining why lists of issues have been aggregated together.&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16848</id>
		<title>Social dossiers</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16848"/>
		<updated>2008-08-05T03:25:42Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Study Guide=&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The rise in popularity of social networking sites has had an extroversive effect on large volumes personal data.  Sharing photos, personal commentary, status updates, and other personally interesting information through social mediums like Myspace and Facebook has become a common activity for many internet users.  Some users that are not fully aware of the implications, may decide to publish personal photos or writings after considering only their intended audience, failing to consider that other parties may view them.  To illustrate (hypothetical scenario):&lt;br /&gt;
: ''John Q. User is rather fond of his victory in last weekend's beer pong tournament, and so he decides to share photos commemorating the event with his friends using his public Myspace profile.  Later, when John is applying for a job, his interviewer asks if he still likes to play beer pong.  John is blind-sided by the question, thus losing his nerve and failing the interview.''&lt;br /&gt;
Is it fair for the interviewer to ask this question?  Or to examine his profile photos?  Should John have ''known better'' than to leave potentially compromising photos of himself in a publicly viewable space?&lt;br /&gt;
&lt;br /&gt;
==Data availability==&lt;br /&gt;
Many websites (especially social media sites) allow users to create personal profiles; a substantial portion of those sites allow their content to be indexed by search-agents, and so any content created while using a site may potentially be located easily through basic search queries.  The information that is connected to a particular user varies widely and can include very basic information (name, age, gender, locale, etc.) and/or disturbingly detailed information (e.g. mySpaceUserXX aka &amp;quot;Jane Q. User&amp;quot; is single, bisexual, Hispanic, a Unitarian Universalist, an Aquarius, a self-professed alcoholic, works in Accounting/Finance, graduated from Anytown Community College in 2004, etc.).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Social Media Sites&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
!&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
! Types of Information&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*[http://www.facebook.com Facebook]&lt;br /&gt;
*[http://www.myspace.com Myspace]&lt;br /&gt;
*[http://www.linkedin.com LinkedIn]&lt;br /&gt;
*[http://www.friendster.com Friendster]&lt;br /&gt;
*[http://www.youtube.com YouTube]&lt;br /&gt;
*[http://www.digg.com Digg]&lt;br /&gt;
*[http://www.flickr.com Flickr]&lt;br /&gt;
|&lt;br /&gt;
*[http://www.photobucket.com Photobucket]&lt;br /&gt;
*[http://www.picasa.com Picasa]&lt;br /&gt;
*[http://www.twitter.com Twitter]&lt;br /&gt;
*[http://www.xanga.com Xanga]&lt;br /&gt;
*[http://www.livejournal.com Livejournal]&lt;br /&gt;
*[http://www.blogger.com Blogger]&lt;br /&gt;
*[http://www.deviantart.com Deviant Art]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
*Demographics&lt;br /&gt;
*Photographs&lt;br /&gt;
*Videos&lt;br /&gt;
*User Comments&lt;br /&gt;
*Cultural Interests&lt;br /&gt;
*Religion/Creed&lt;br /&gt;
*Political Views&lt;br /&gt;
|&lt;br /&gt;
*Sexual Orientiation&lt;br /&gt;
*Forum Discussions&lt;br /&gt;
*Work History&lt;br /&gt;
*Education History&lt;br /&gt;
*Favorite Videos&lt;br /&gt;
*Friends' Identities&lt;br /&gt;
*Offline Media Tastes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Some search providers have even begun to specialize their services to scour popular social networking sites.  A user may simply enter part of your identity, such as your name or email address, into a query box, and the search engine returns a listing of potential matches.  This makes compilation of your publicly available data frighteningly easy.&lt;br /&gt;
&lt;br /&gt;
==Aggregation motives==&lt;br /&gt;
&lt;br /&gt;
While new reasons to aggregate a persons data continue to emerge, there are several traditional motivations that seem to be popular.  Perhaps the primary of these is the use of social networking data by those people in charge of human resources decisions.  HR Managers are interested in hiring the best candidate for a job, and given that a simple web search may reveal substantial amounts of information on a job candidate's background, it's not surprising that focused search services like [http://www.spokeo.com/hr Spokeo] have been developed.  But ''should'' interviewers use these services?  Is it really fair to bring a job candidate's peripheral social data into an HR decision?  In some cases where the job in question involves high public exposure, such as a corporate spokesperson, detailed background checks are an expected part of the confirmation process; therefore most people would consider it a justified examination.  Conversely, if a person's lifestyle outside of work has no effect on their ability to perform their job, then many would consider the use of their personal information in a hiring decision to be unjustified.  &lt;br /&gt;
&lt;br /&gt;
'''Potential Interested Parties:'''&lt;br /&gt;
* '''''Hiring:'''''  Human resources staff and job interviewers' hiring decisions may be influenced by what search-queries reveal. [http://accounting.smartpros.com/x54248.xml]  The legality and ethical issues of unofficial google-stalking of potential job candidates is currently under debate. [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php]&lt;br /&gt;
* '''''Criminal Prosecution:'''''  Prosecutors may use the content you post online to build their case against you; your own social media profile may serve as a character witness against you. [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html]&lt;br /&gt;
* '''''Business Contacts:''''' Sales professionals constantly distribute their business cards to prospective clients/customers, so it is foreseeable that a lack of understanding of web privacy by a sales representative (that uses social media sites) could lead to disastrous results for themselves or the company they represent.&lt;br /&gt;
* '''''Insurance Eligibility:''''' &amp;quot;I'm sorry, Mr. Jones, but according to your blog, the following conditions are pre-existing and will require a rider/exclusion for us to even consider giving you a quote...&amp;quot;&lt;br /&gt;
* '''''Stalkers:'''''  If you have a lot of information publicly available through social networking profiles, then you have no real defensive strategy against potential stalkers accessing that information.  Granted, dedicated stalkers would find a way to obtain sensitive information (e.g. course schedules, work schedule, friends' identities) without using the internet, but social media only increases opportunity and ease, therefore the likelihood of attracting stalkers.&lt;br /&gt;
&lt;br /&gt;
==Links &amp;amp; Resources==&lt;br /&gt;
&lt;br /&gt;
===Job Hunting===&lt;br /&gt;
* [http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html Facebook can ruin your life, and so can Myspace, Bebo...] Ida Bergstrom, ''The Independent''.  Feb 10, 2008.&lt;br /&gt;
* [http://www.time.com/time/business/article/0,8599,1649121,00.html Online snooping gets creepy]. Anita Hamilton, ''Time''. Aug 2, 2007.&lt;br /&gt;
* [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php Employers Using Facebook for Background Checking: Is It Legal?] George Lenard, George's Employment Blawg.&lt;br /&gt;
* [http://time-blog.com/work_in_progress/2008/05/googlestalking_your_interviewe.html Google-stalking your interviewer is smart]. Lisa Takeuchi Cullen, ''Time''. May 29, 2008.&lt;br /&gt;
* [http://accounting.smartpros.com/x54248.xml Employers Google Job Candidates, Check Social Networking Web Sites]. SmartPros. Aug 8, 2006.&lt;br /&gt;
&lt;br /&gt;
===In the courts===&lt;br /&gt;
* [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html Alleged DUI killer's MySpace profile depicts youth consumed with money, drugs and graffiti]. Stephanie Farr and Dafney Tales, ''Philadelphia Daily News''.  Jul 17, 2008.&lt;br /&gt;
*[http://ap.google.com/article/ALeqM5jC-5mkxddsdwxCN5_DwfLq3RqPmwD920TQK00 Web networking photos come back to bite defendants]. Eric Tucker, AP. Jul 19, 2008.&lt;br /&gt;
*[http://www.dailynexus.com/article.php?a=13440 Court case decision reveals dangers of networking sites]. Evan Wagstaff, ''Daily Nexus''. Feb 28, 2007.&lt;br /&gt;
&lt;br /&gt;
===Stalking===&lt;br /&gt;
*[http://www.ncvc.org/src/AGP.Net/Components/DocumentViewer/Download.aspxnz?DocumentID=41389 Stalking by a &amp;quot;high-tech&amp;quot; guy]. John Loveall. Stalking Resource Center. 2005.&lt;br /&gt;
*[http://seattletimes.nwsource.com/html/living/2003845520_websnooping21.html Facebook makes it easy to &amp;quot;profile stalk&amp;quot;]. David Sarno, ''Los Angeles Times''.  Aug 21, 2007.&lt;br /&gt;
*[http://www.ncvc.org/src/main.aspx?dbID=DB_StalkingTechnology139 The Use of Technology to Stalk] from the Stalking Resource Center.&lt;br /&gt;
&lt;br /&gt;
===Privacy Resources===&lt;br /&gt;
* [http://www.slais.ubc.ca/COURSES/libr500/06-07-wt2/www2/S_Hintersteininger/home.htm Beyond the Job Interview: Unofficial Online Background Checks]. Stefan Hintersteininger. University of British Columbia. March 2007.&lt;br /&gt;
* [http://epic.org/privacy/tools.html EPIC online guide to practical privacy tools]. Electronic Privacy Information Center.&lt;br /&gt;
* [http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy EFF's top 12 ways to protect your online privacy]. Stanton McCandlish, Electronic Frontier Foundation. Apr 10, 2002.&lt;br /&gt;
&lt;br /&gt;
===Social Search Services===&lt;br /&gt;
* [http://www.spock.com Spock People Search]. Spock.com.&lt;br /&gt;
* [http://www.mybackgroundcheck.com/AboutUs.aspx MyBackGroundCheck.com].&lt;br /&gt;
* [http://www.spokeo.com/hr Spokeo.com/hr]. &amp;quot;Want to see your candidates' profiles on MySpace and LinkedIn?&amp;quot;&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16847</id>
		<title>Social dossiers</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16847"/>
		<updated>2008-08-05T03:21:28Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Study Guide=&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The rise in popularity of social networking sites has had an extroversive effect on large volumes personal data.  Sharing photos, personal commentary, status updates, and other personally interesting information through social mediums like Myspace and Facebook has become a common activity for many internet users.  Some users that are not fully aware of the implications, may decide to publish personal photos or writings after considering only their intended audience, failing to consider that other parties may view them.  To illustrate (hypothetical scenario):&lt;br /&gt;
: ''John Q. User is rather fond of his victory in last weekend's beer pong tournament, and so he decides to share photos commemorating the event with his friends using his public Myspace profile.  Later, when John is applying for a job, his interviewer asks if he still likes to play beer pong.  John is blind-sided by the question, thus losing his nerve and failing the interview.''&lt;br /&gt;
&lt;br /&gt;
==Data availability==&lt;br /&gt;
Many websites (especially social media sites) allow users to create personal profiles; a substantial portion of those sites allow their content to be indexed by search-agents, and so any content created while using a site may potentially be located easily through basic search queries.  The information that is connected to a particular user varies widely and can include very basic information (name, age, gender, locale, etc.) and/or disturbingly detailed information (e.g. mySpaceUserXX aka &amp;quot;Jane Q. User&amp;quot; is single, bisexual, Hispanic, a Unitarian Universalist, an Aquarius, a self-professed alcoholic, works in Accounting/Finance, graduated from Anytown Community College in 2004, etc.).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Social Media Sites&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
!&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
! Types of Information&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*[http://www.facebook.com Facebook]&lt;br /&gt;
*[http://www.myspace.com Myspace]&lt;br /&gt;
*[http://www.linkedin.com LinkedIn]&lt;br /&gt;
*[http://www.friendster.com Friendster]&lt;br /&gt;
*[http://www.youtube.com YouTube]&lt;br /&gt;
*[http://www.digg.com Digg]&lt;br /&gt;
*[http://www.flickr.com Flickr]&lt;br /&gt;
|&lt;br /&gt;
*[http://www.photobucket.com Photobucket]&lt;br /&gt;
*[http://www.picasa.com Picasa]&lt;br /&gt;
*[http://www.twitter.com Twitter]&lt;br /&gt;
*[http://www.xanga.com Xanga]&lt;br /&gt;
*[http://www.livejournal.com Livejournal]&lt;br /&gt;
*[http://www.blogger.com Blogger]&lt;br /&gt;
*[http://www.deviantart.com Deviant Art]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
*Demographics&lt;br /&gt;
*Photographs&lt;br /&gt;
*Videos&lt;br /&gt;
*User Comments&lt;br /&gt;
*Cultural Interests&lt;br /&gt;
*Religion/Creed&lt;br /&gt;
*Political Views&lt;br /&gt;
|&lt;br /&gt;
*Sexual Orientiation&lt;br /&gt;
*Forum Discussions&lt;br /&gt;
*Work History&lt;br /&gt;
*Education History&lt;br /&gt;
*Favorite Videos&lt;br /&gt;
*Friends' Identities&lt;br /&gt;
*Offline Media Tastes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Some search providers have even begun to specialize their services to scour popular social networking sites.  A user may simply enter part of your identity, such as your name or email address, into a query box, and the search engine returns a listing of potential matches.  This makes compilation of your publicly available data frighteningly easy.&lt;br /&gt;
&lt;br /&gt;
==Aggregation motives==&lt;br /&gt;
&lt;br /&gt;
While new reasons to aggregate a persons data continue to emerge, there are several traditional motivations that seem to be popular.  Perhaps the primary of these is the use of social networking data by those people in charge of human resources decisions.  HR Managers are interested in hiring the best candidate for a job, and given that a simple web search may reveal substantial amounts of information on a job candidate's background, it's not surprising that focused search services like [http://www.spokeo.com/hr Spokeo] have been developed.  But ''should'' interviewers use these services?  Is it really fair to bring a job candidate's peripheral social data into an HR decision?  In some cases where the job in question involves high public exposure, such as a corporate spokesperson, detailed background checks are an expected part of the confirmation process; therefore most people would consider it a justified examination.  Conversely, if a person's lifestyle outside of work has no effect on their ability to perform their job, then many would consider the use of their personal information in a hiring decision to be unjustified.  &lt;br /&gt;
&lt;br /&gt;
'''Potential Interested Parties:'''&lt;br /&gt;
* '''''Hiring:'''''  Human resources staff and job interviewers' hiring decisions may be influenced by what search-queries reveal. [http://accounting.smartpros.com/x54248.xml]  The legality and ethical issues of unofficial google-stalking of potential job candidates is currently under debate. [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php]&lt;br /&gt;
* '''''Criminal Prosecution:'''''  Prosecutors may use the content you post online to build their case against you; your own social media profile may serve as a character witness against you. [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html]&lt;br /&gt;
* '''''Business Contacts:''''' Sales professionals constantly distribute their business cards to prospective clients/customers, so it is foreseeable that a lack of understanding of web privacy by a sales representative (that uses social media sites) could lead to disastrous results for themselves or the company they represent.&lt;br /&gt;
* '''''Insurance Eligibility:''''' &amp;quot;I'm sorry, Mr. Jones, but according to your blog, the following conditions are pre-existing and will require a rider/exclusion for us to even consider giving you a quote...&amp;quot;&lt;br /&gt;
* '''''Stalkers:'''''  If you have a lot of information publicly available through social networking profiles, then you have no real defensive strategy against potential stalkers accessing that information.  Granted, dedicated stalkers would find a way to obtain sensitive information (e.g. course schedules, work schedule, friends' identities) without using the internet, but social media only increases opportunity and ease, therefore the likelihood of attracting stalkers.&lt;br /&gt;
&lt;br /&gt;
==Links &amp;amp; Resources==&lt;br /&gt;
&lt;br /&gt;
===Job Hunting===&lt;br /&gt;
* [http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html Facebook can ruin your life, and so can Myspace, Bebo...] Ida Bergstrom, ''The Independent''.  Feb 10, 2008.&lt;br /&gt;
* [http://www.time.com/time/business/article/0,8599,1649121,00.html Online snooping gets creepy]. Anita Hamilton, ''Time''. Aug 2, 2007.&lt;br /&gt;
* [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php Employers Using Facebook for Background Checking: Is It Legal?] George Lenard, George's Employment Blawg.&lt;br /&gt;
* [http://time-blog.com/work_in_progress/2008/05/googlestalking_your_interviewe.html Google-stalking your interviewer is smart]. Lisa Takeuchi Cullen, ''Time''. May 29, 2008.&lt;br /&gt;
* [http://accounting.smartpros.com/x54248.xml Employers Google Job Candidates, Check Social Networking Web Sites]. SmartPros. Aug 8, 2006.&lt;br /&gt;
&lt;br /&gt;
===In the courts===&lt;br /&gt;
* [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html Alleged DUI killer's MySpace profile depicts youth consumed with money, drugs and graffiti]. Stephanie Farr and Dafney Tales, ''Philadelphia Daily News''.  Jul 17, 2008.&lt;br /&gt;
*[http://ap.google.com/article/ALeqM5jC-5mkxddsdwxCN5_DwfLq3RqPmwD920TQK00 Web networking photos come back to bite defendants]. Eric Tucker, AP. Jul 19, 2008.&lt;br /&gt;
*[http://www.dailynexus.com/article.php?a=13440 Court case decision reveals dangers of networking sites]. Evan Wagstaff, ''Daily Nexus''. Feb 28, 2007.&lt;br /&gt;
&lt;br /&gt;
===Stalking===&lt;br /&gt;
*[http://www.ncvc.org/src/AGP.Net/Components/DocumentViewer/Download.aspxnz?DocumentID=41389 Stalking by a &amp;quot;high-tech&amp;quot; guy]. John Loveall. Stalking Resource Center. 2005.&lt;br /&gt;
*[http://seattletimes.nwsource.com/html/living/2003845520_websnooping21.html Facebook makes it easy to &amp;quot;profile stalk&amp;quot;]. David Sarno, ''Los Angeles Times''.  Aug 21, 2007.&lt;br /&gt;
*[http://www.ncvc.org/src/main.aspx?dbID=DB_StalkingTechnology139 The Use of Technology to Stalk] from the Stalking Resource Center.&lt;br /&gt;
&lt;br /&gt;
===Privacy Resources===&lt;br /&gt;
* [http://www.slais.ubc.ca/COURSES/libr500/06-07-wt2/www2/S_Hintersteininger/home.htm Beyond the Job Interview: Unofficial Online Background Checks]. Stefan Hintersteininger. University of British Columbia. March 2007.&lt;br /&gt;
* [http://epic.org/privacy/tools.html EPIC online guide to practical privacy tools]. Electronic Privacy Information Center.&lt;br /&gt;
* [http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy EFF's top 12 ways to protect your online privacy]. Stanton McCandlish, Electronic Frontier Foundation. Apr 10, 2002.&lt;br /&gt;
&lt;br /&gt;
===Social Search Services===&lt;br /&gt;
* [http://www.spock.com Spock People Search]. Spock.com.&lt;br /&gt;
* [http://www.mybackgroundcheck.com/AboutUs.aspx MyBackGroundCheck.com].&lt;br /&gt;
* [http://www.spokeo.com/hr Spokeo.com/hr]. &amp;quot;Want to see your candidates' profiles on MySpace and LinkedIn?&amp;quot;&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16845</id>
		<title>Social dossiers</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16845"/>
		<updated>2008-08-05T03:19:06Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Study Guide=&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The rise in popularity of social networking sites has had an extroversive effect on large volumes personal data.  Sharing photos, personal commentary, status updates, and other personally interesting information through social mediums like Myspace and Facebook has become a common activity for many internet users.  Some users that are not fully aware of the implications, may decide to publish personal photos or writings after considering only their intended audience, failing to consider that other parties may view them.  To illustrate&lt;br /&gt;
: ''John Q. User is rather fond of his victory in last weekend's beer pong tournament, and so he decides to share photos commemorating the event with his friends using his public Myspace profile.  Later, when John is applying for a job, his interviewer asks if he still likes beer pong.''&lt;br /&gt;
&lt;br /&gt;
Ignorance regarding privacy practices and re&lt;br /&gt;
&lt;br /&gt;
==Data availability==&lt;br /&gt;
Many websites (especially social media sites) allow users to create personal profiles; a substantial portion of those sites allow their content to be indexed by search-agents, and so any content created while using a site may potentially be located easily through basic search queries.  The information that is connected to a particular user varies widely and can include very basic information (name, age, gender, locale, etc.) and/or disturbingly detailed information (e.g. mySpaceUserXX aka &amp;quot;Jane Q. User&amp;quot; is single, bisexual, Hispanic, a Unitarian Universalist, an Aquarius, a self-professed alcoholic, works in Accounting/Finance, graduated from Anytown Community College in 2004, etc.).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Social Media Sites&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
!&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
! Types of Information&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*[http://www.facebook.com Facebook]&lt;br /&gt;
*[http://www.myspace.com Myspace]&lt;br /&gt;
*[http://www.linkedin.com LinkedIn]&lt;br /&gt;
*[http://www.friendster.com Friendster]&lt;br /&gt;
*[http://www.youtube.com YouTube]&lt;br /&gt;
*[http://www.digg.com Digg]&lt;br /&gt;
*[http://www.flickr.com Flickr]&lt;br /&gt;
|&lt;br /&gt;
*[http://www.photobucket.com Photobucket]&lt;br /&gt;
*[http://www.picasa.com Picasa]&lt;br /&gt;
*[http://www.twitter.com Twitter]&lt;br /&gt;
*[http://www.xanga.com Xanga]&lt;br /&gt;
*[http://www.livejournal.com Livejournal]&lt;br /&gt;
*[http://www.blogger.com Blogger]&lt;br /&gt;
*[http://www.deviantart.com Deviant Art]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
*Demographics&lt;br /&gt;
*Photographs&lt;br /&gt;
*Videos&lt;br /&gt;
*User Comments&lt;br /&gt;
*Cultural Interests&lt;br /&gt;
*Religion/Creed&lt;br /&gt;
*Political Views&lt;br /&gt;
|&lt;br /&gt;
*Sexual Orientiation&lt;br /&gt;
*Forum Discussions&lt;br /&gt;
*Work History&lt;br /&gt;
*Education History&lt;br /&gt;
*Favorite Videos&lt;br /&gt;
*Friends' Identities&lt;br /&gt;
*Offline Media Tastes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Some search providers have even begun to specialize their services to scour popular social networking sites.  A user may simply enter part of your identity, such as your name or email address, into a query box, and the search engine returns a listing of potential matches.  This makes compilation of your publicly available data frighteningly easy.&lt;br /&gt;
&lt;br /&gt;
==Aggregation motives==&lt;br /&gt;
&lt;br /&gt;
While new reasons to aggregate a persons data continue to emerge, there are several traditional motivations that seem to be popular.  Perhaps the primary of these is the use of social networking data by those people in charge of human resources decisions.  HR Managers are interested in hiring the best candidate for a job, and given that a simple web search may reveal substantial amounts of information on a job candidate's background, it's not surprising that focused search services like [http://www.spokeo.com/hr Spokeo] have been developed.  But ''should'' interviewers use these services?  Is it really fair to bring a job candidate's peripheral social data into an HR decision?  In some cases where the job in question involves high public exposure, such as a corporate spokesperson, detailed background checks are an expected part of the confirmation process; therefore most people would consider it a justified examination.  Conversely, if a person's lifestyle outside of work has no effect on their ability to perform their job, then many would consider the use of their personal information in a hiring decision to be unjustified.  &lt;br /&gt;
&lt;br /&gt;
'''Potential Interested Parties:'''&lt;br /&gt;
* '''''Hiring:'''''  Human resources staff and job interviewers' hiring decisions may be influenced by what search-queries reveal. [http://accounting.smartpros.com/x54248.xml]  The legality and ethical issues of unofficial google-stalking of potential job candidates is currently under debate. [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php]&lt;br /&gt;
* '''''Criminal Prosecution:'''''  Prosecutors may use the content you post online to build their case against you; your own social media profile may serve as a character witness against you. [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html]&lt;br /&gt;
* '''''Business Contacts:''''' Sales professionals constantly distribute their business cards to prospective clients/customers, so it is foreseeable that a lack of understanding of web privacy by a sales representative (that uses social media sites) could lead to disastrous results for themselves or the company they represent.&lt;br /&gt;
* '''''Insurance Eligibility:''''' &amp;quot;I'm sorry, Mr. Jones, but according to your blog, the following conditions are pre-existing and will require a rider/exclusion for us to even consider giving you a quote...&amp;quot;&lt;br /&gt;
* '''''Stalkers:'''''  If you have a lot of information publicly available through social networking profiles, then you have no real defensive strategy against potential stalkers accessing that information.  Granted, dedicated stalkers would find a way to obtain sensitive information (e.g. course schedules, work schedule, friends' identities) without using the internet, but social media only increases opportunity and ease, therefore the likelihood of attracting stalkers.&lt;br /&gt;
&lt;br /&gt;
==Links &amp;amp; Resources==&lt;br /&gt;
&lt;br /&gt;
===Job Hunting===&lt;br /&gt;
* [http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html Facebook can ruin your life, and so can Myspace, Bebo...] Ida Bergstrom, ''The Independent''.  Feb 10, 2008.&lt;br /&gt;
* [http://www.time.com/time/business/article/0,8599,1649121,00.html Online snooping gets creepy]. Anita Hamilton, ''Time''. Aug 2, 2007.&lt;br /&gt;
* [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php Employers Using Facebook for Background Checking: Is It Legal?] George Lenard, George's Employment Blawg.&lt;br /&gt;
* [http://time-blog.com/work_in_progress/2008/05/googlestalking_your_interviewe.html Google-stalking your interviewer is smart]. Lisa Takeuchi Cullen, ''Time''. May 29, 2008.&lt;br /&gt;
* [http://accounting.smartpros.com/x54248.xml Employers Google Job Candidates, Check Social Networking Web Sites]. SmartPros. Aug 8, 2006.&lt;br /&gt;
&lt;br /&gt;
===In the courts===&lt;br /&gt;
* [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html Alleged DUI killer's MySpace profile depicts youth consumed with money, drugs and graffiti]. Stephanie Farr and Dafney Tales, ''Philadelphia Daily News''.  Jul 17, 2008.&lt;br /&gt;
*[http://ap.google.com/article/ALeqM5jC-5mkxddsdwxCN5_DwfLq3RqPmwD920TQK00 Web networking photos come back to bite defendants]. Eric Tucker, AP. Jul 19, 2008.&lt;br /&gt;
*[http://www.dailynexus.com/article.php?a=13440 Court case decision reveals dangers of networking sites]. Evan Wagstaff, ''Daily Nexus''. Feb 28, 2007.&lt;br /&gt;
&lt;br /&gt;
===Stalking===&lt;br /&gt;
*[http://www.ncvc.org/src/AGP.Net/Components/DocumentViewer/Download.aspxnz?DocumentID=41389 Stalking by a &amp;quot;high-tech&amp;quot; guy]. John Loveall. Stalking Resource Center. 2005.&lt;br /&gt;
*[http://seattletimes.nwsource.com/html/living/2003845520_websnooping21.html Facebook makes it easy to &amp;quot;profile stalk&amp;quot;]. David Sarno, ''Los Angeles Times''.  Aug 21, 2007.&lt;br /&gt;
*[http://www.ncvc.org/src/main.aspx?dbID=DB_StalkingTechnology139 The Use of Technology to Stalk] from the Stalking Resource Center.&lt;br /&gt;
&lt;br /&gt;
===Privacy Resources===&lt;br /&gt;
* [http://www.slais.ubc.ca/COURSES/libr500/06-07-wt2/www2/S_Hintersteininger/home.htm Beyond the Job Interview: Unofficial Online Background Checks]. Stefan Hintersteininger. University of British Columbia. March 2007.&lt;br /&gt;
* [http://epic.org/privacy/tools.html EPIC online guide to practical privacy tools]. Electronic Privacy Information Center.&lt;br /&gt;
* [http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy EFF's top 12 ways to protect your online privacy]. Stanton McCandlish, Electronic Frontier Foundation. Apr 10, 2002.&lt;br /&gt;
&lt;br /&gt;
===Social Search Services===&lt;br /&gt;
* [http://www.spock.com Spock People Search]. Spock.com.&lt;br /&gt;
* [http://www.mybackgroundcheck.com/AboutUs.aspx MyBackGroundCheck.com].&lt;br /&gt;
* [http://www.spokeo.com/hr Spokeo.com/hr]. &amp;quot;Want to see your candidates' profiles on MySpace and LinkedIn?&amp;quot;&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16819</id>
		<title>Social dossiers</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16819"/>
		<updated>2008-08-05T02:40:13Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Aggregation motives */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Study Guide=&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
==Data availability==&lt;br /&gt;
Many websites (especially social media sites) allow users to create personal profiles; a substantial portion of those sites allow their content to be indexed by search-agents, and so any content created while using a site may potentially be located easily through basic search queries.  The information that is connected to a particular user varies widely and can include very basic information (name, age, gender, locale, etc.) and/or disturbingly detailed information (e.g. mySpaceUserXX aka &amp;quot;Jane Q. User&amp;quot; is single, bisexual, Hispanic, a Unitarian Universalist, an Aquarius, a self-professed alcoholic, works in Accounting/Finance, graduated from Anytown Community College in 2004, etc.).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Social Media Sites&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
!&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
! Types of Information&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*[http://www.facebook.com Facebook]&lt;br /&gt;
*[http://www.myspace.com Myspace]&lt;br /&gt;
*[http://www.linkedin.com LinkedIn]&lt;br /&gt;
*[http://www.friendster.com Friendster]&lt;br /&gt;
*[http://www.youtube.com YouTube]&lt;br /&gt;
*[http://www.digg.com Digg]&lt;br /&gt;
*[http://www.flickr.com Flickr]&lt;br /&gt;
|&lt;br /&gt;
*[http://www.photobucket.com Photobucket]&lt;br /&gt;
*[http://www.picasa.com Picasa]&lt;br /&gt;
*[http://www.twitter.com Twitter]&lt;br /&gt;
*[http://www.xanga.com Xanga]&lt;br /&gt;
*[http://www.livejournal.com Livejournal]&lt;br /&gt;
*[http://www.blogger.com Blogger]&lt;br /&gt;
*[http://www.deviantart.com Deviant Art]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
*Demographics&lt;br /&gt;
*Photographs&lt;br /&gt;
*Videos&lt;br /&gt;
*User Comments&lt;br /&gt;
*Cultural Interests&lt;br /&gt;
*Religion/Creed&lt;br /&gt;
*Political Views&lt;br /&gt;
|&lt;br /&gt;
*Sexual Orientiation&lt;br /&gt;
*Forum Discussions&lt;br /&gt;
*Work History&lt;br /&gt;
*Education History&lt;br /&gt;
*Favorite Videos&lt;br /&gt;
*Friends' Identities&lt;br /&gt;
*Offline Media Tastes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Some search providers have even begun to specialize their services to scour popular social networking sites.  A user may simply enter part of your identity, such as your name or email address, into a query box, and the search engine returns a listing of potential matches.  This makes compilation of your publicly available data frighteningly easy.&lt;br /&gt;
&lt;br /&gt;
==Aggregation motives==&lt;br /&gt;
&lt;br /&gt;
While new reasons to aggregate a persons data continue to emerge, there are several traditional motivations that seem to be popular.  Perhaps the primary of these is the use of social networking data by those people in charge of human resources decisions.  HR Managers are interested in hiring the best candidate for a job, and given that a simple web search may reveal substantial amounts of information on a job candidate's background, it's not surprising that focused search services like [http://www.spokeo.com/hr Spokeo] have been developed.  But ''should'' interviewers use these services?  Is it really fair to bring a job candidate's peripheral social data into an HR decision?  In some cases where the job in question involves high public exposure, such as a corporate spokesperson, detailed background checks are an expected part of the confirmation process; therefore most people would consider it a justified examination.  Conversely, if a person's lifestyle outside of work has no effect on their ability to perform their job, then many would consider the use of their personal information in a hiring decision to be unjustified.  &lt;br /&gt;
&lt;br /&gt;
'''Potential Interested Parties:'''&lt;br /&gt;
* '''''Hiring:'''''  Human resources staff and job interviewers' hiring decisions may be influenced by what search-queries reveal. [http://accounting.smartpros.com/x54248.xml]  The legality and ethical issues of unofficial google-stalking of potential job candidates is currently under debate. [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php]&lt;br /&gt;
* '''''Criminal Prosecution:'''''  Prosecutors may use the content you post online to build their case against you; your own social media profile may serve as a character witness against you. [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html]&lt;br /&gt;
* '''''Business Contacts:''''' Sales professionals constantly distribute their business cards to prospective clients/customers, so it is foreseeable that a lack of understanding of web privacy by a sales representative (that uses social media sites) could lead to disastrous results for themselves or the company they represent.&lt;br /&gt;
* '''''Insurance Eligibility:''''' &amp;quot;I'm sorry, Mr. Jones, but according to your blog, the following conditions are pre-existing and will require a rider/exclusion for us to even consider giving you a quote...&amp;quot;&lt;br /&gt;
* '''''Stalkers:'''''  If you have a lot of information publicly available through social networking profiles, then you have no real defensive strategy against potential stalkers accessing that information.  Granted, dedicated stalkers would find a way to obtain sensitive information (e.g. course schedules, work schedule, friends' identities) without using the internet, but social media only increases opportunity and ease, therefore the likelihood of attracting stalkers.&lt;br /&gt;
&lt;br /&gt;
==Links &amp;amp; Resources==&lt;br /&gt;
&lt;br /&gt;
===Job Hunting===&lt;br /&gt;
* [http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html Facebook can ruin your life, and so can Myspace, Bebo...] Ida Bergstrom, ''The Independent''.  Feb 10, 2008.&lt;br /&gt;
* [http://www.time.com/time/business/article/0,8599,1649121,00.html Online snooping gets creepy]. Anita Hamilton, ''Time''. Aug 2, 2007.&lt;br /&gt;
* [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php Employers Using Facebook for Background Checking: Is It Legal?] George Lenard, George's Employment Blawg.&lt;br /&gt;
* [http://time-blog.com/work_in_progress/2008/05/googlestalking_your_interviewe.html Google-stalking your interviewer is smart]. Lisa Takeuchi Cullen, ''Time''. May 29, 2008.&lt;br /&gt;
* [http://accounting.smartpros.com/x54248.xml Employers Google Job Candidates, Check Social Networking Web Sites]. SmartPros. Aug 8, 2006.&lt;br /&gt;
&lt;br /&gt;
===In the courts===&lt;br /&gt;
* [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html Alleged DUI killer's MySpace profile depicts youth consumed with money, drugs and graffiti]. Stephanie Farr and Dafney Tales, ''Philadelphia Daily News''.  Jul 17, 2008.&lt;br /&gt;
*[http://ap.google.com/article/ALeqM5jC-5mkxddsdwxCN5_DwfLq3RqPmwD920TQK00 Web networking photos come back to bite defendants]. Eric Tucker, AP. Jul 19, 2008.&lt;br /&gt;
*[http://www.dailynexus.com/article.php?a=13440 Court case decision reveals dangers of networking sites]. Evan Wagstaff, ''Daily Nexus''. Feb 28, 2007.&lt;br /&gt;
&lt;br /&gt;
===Stalking===&lt;br /&gt;
*[http://www.ncvc.org/src/AGP.Net/Components/DocumentViewer/Download.aspxnz?DocumentID=41389 Stalking by a &amp;quot;high-tech&amp;quot; guy]. John Loveall. Stalking Resource Center. 2005.&lt;br /&gt;
*[http://seattletimes.nwsource.com/html/living/2003845520_websnooping21.html Facebook makes it easy to &amp;quot;profile stalk&amp;quot;]. David Sarno, ''Los Angeles Times''.  Aug 21, 2007.&lt;br /&gt;
*[http://www.ncvc.org/src/main.aspx?dbID=DB_StalkingTechnology139 The Use of Technology to Stalk] from the Stalking Resource Center.&lt;br /&gt;
&lt;br /&gt;
===Privacy Resources===&lt;br /&gt;
* [http://www.slais.ubc.ca/COURSES/libr500/06-07-wt2/www2/S_Hintersteininger/home.htm Beyond the Job Interview: Unofficial Online Background Checks]. Stefan Hintersteininger. University of British Columbia. March 2007.&lt;br /&gt;
* [http://epic.org/privacy/tools.html EPIC online guide to practical privacy tools]. Electronic Privacy Information Center.&lt;br /&gt;
* [http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy EFF's top 12 ways to protect your online privacy]. Stanton McCandlish, Electronic Frontier Foundation. Apr 10, 2002.&lt;br /&gt;
&lt;br /&gt;
===Social Search Services===&lt;br /&gt;
* [http://www.spock.com Spock People Search]. Spock.com.&lt;br /&gt;
* [http://www.mybackgroundcheck.com/AboutUs.aspx MyBackGroundCheck.com].&lt;br /&gt;
* [http://www.spokeo.com/hr Spokeo.com/hr]. &amp;quot;Want to see your candidates' profiles on MySpace and LinkedIn?&amp;quot;&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16818</id>
		<title>Social dossiers</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16818"/>
		<updated>2008-08-05T02:39:27Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Aggregation motives */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Study Guide=&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
==Data availability==&lt;br /&gt;
Many websites (especially social media sites) allow users to create personal profiles; a substantial portion of those sites allow their content to be indexed by search-agents, and so any content created while using a site may potentially be located easily through basic search queries.  The information that is connected to a particular user varies widely and can include very basic information (name, age, gender, locale, etc.) and/or disturbingly detailed information (e.g. mySpaceUserXX aka &amp;quot;Jane Q. User&amp;quot; is single, bisexual, Hispanic, a Unitarian Universalist, an Aquarius, a self-professed alcoholic, works in Accounting/Finance, graduated from Anytown Community College in 2004, etc.).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Social Media Sites&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
!&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
! Types of Information&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*[http://www.facebook.com Facebook]&lt;br /&gt;
*[http://www.myspace.com Myspace]&lt;br /&gt;
*[http://www.linkedin.com LinkedIn]&lt;br /&gt;
*[http://www.friendster.com Friendster]&lt;br /&gt;
*[http://www.youtube.com YouTube]&lt;br /&gt;
*[http://www.digg.com Digg]&lt;br /&gt;
*[http://www.flickr.com Flickr]&lt;br /&gt;
|&lt;br /&gt;
*[http://www.photobucket.com Photobucket]&lt;br /&gt;
*[http://www.picasa.com Picasa]&lt;br /&gt;
*[http://www.twitter.com Twitter]&lt;br /&gt;
*[http://www.xanga.com Xanga]&lt;br /&gt;
*[http://www.livejournal.com Livejournal]&lt;br /&gt;
*[http://www.blogger.com Blogger]&lt;br /&gt;
*[http://www.deviantart.com Deviant Art]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
*Demographics&lt;br /&gt;
*Photographs&lt;br /&gt;
*Videos&lt;br /&gt;
*User Comments&lt;br /&gt;
*Cultural Interests&lt;br /&gt;
*Religion/Creed&lt;br /&gt;
*Political Views&lt;br /&gt;
|&lt;br /&gt;
*Sexual Orientiation&lt;br /&gt;
*Forum Discussions&lt;br /&gt;
*Work History&lt;br /&gt;
*Education History&lt;br /&gt;
*Favorite Videos&lt;br /&gt;
*Friends' Identities&lt;br /&gt;
*Offline Media Tastes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Some search providers have even begun to specialize their services to scour popular social networking sites.  A user may simply enter part of your identity, such as your name or email address, into a query box, and the search engine returns a listing of potential matches.  This makes compilation of your publicly available data frighteningly easy.&lt;br /&gt;
&lt;br /&gt;
==Aggregation motives==&lt;br /&gt;
&lt;br /&gt;
While new reasons to aggregate a persons data continue to emerge, there are several traditional motivations that seem to be popular.  Perhaps the primary of these is the use of social networking data by those people in charge of human resources decisions.  HR Managers are interested in hiring the best candidate for a job, and given that a simple web search may reveal substantial amounts of information on a job candidate's background, it's not surprising that focused search services like [http://www.spokeo.com/hr Spokeo] have been developed.  But ''should'' interviewer's use these services?  Is it really fair to bring a job candidate's peripheral social data into an HR decision?  In some cases where the job in question involves high public exposure, such as a corporate spokesperson, detailed background checks are an expected part of the confirmation process; therefore most people would consider it a justified examination.  Conversely, if a person's lifestyle outside of work has no effect on their ability to perform their job, then many would consider the use of their personal information in a hiring decision to be unjustified.  &lt;br /&gt;
&lt;br /&gt;
'''Potential Interested Parties:'''&lt;br /&gt;
* '''''Hiring:'''''  Human resources staff and job interviewers' hiring decisions may be influenced by what search-queries reveal. [http://accounting.smartpros.com/x54248.xml]  The legality and ethical issues of unofficial google-stalking of potential job candidates is currently under debate. [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php]&lt;br /&gt;
* '''''Criminal Prosecution:'''''  Prosecutors may use the content you post online to build their case against you; your own social media profile may serve as a character witness against you. [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html]&lt;br /&gt;
* '''''Business Contacts:''''' Sales professionals constantly distribute their business cards to prospective clients/customers, so it is foreseeable that a lack of understanding of web privacy by a sales representative (that uses social media sites) could lead to disastrous results for themselves or the company they represent.&lt;br /&gt;
* '''''Insurance Eligibility:''''' &amp;quot;I'm sorry, Mr. Jones, but according to your blog, the following conditions are pre-existing and will require a rider/exclusion for us to even consider giving you a quote...&amp;quot;&lt;br /&gt;
* '''''Stalkers:'''''  If you have a lot of information publicly available through social networking profiles, then you have no real defensive strategy against potential stalkers accessing that information.  Granted, dedicated stalkers would find a way to obtain sensitive information (e.g. course schedules, work schedule, friends' identities) without using the internet, but social media only increases opportunity and ease, therefore the likelihood of attracting stalkers.&lt;br /&gt;
&lt;br /&gt;
==Links &amp;amp; Resources==&lt;br /&gt;
&lt;br /&gt;
===Job Hunting===&lt;br /&gt;
* [http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html Facebook can ruin your life, and so can Myspace, Bebo...] Ida Bergstrom, ''The Independent''.  Feb 10, 2008.&lt;br /&gt;
* [http://www.time.com/time/business/article/0,8599,1649121,00.html Online snooping gets creepy]. Anita Hamilton, ''Time''. Aug 2, 2007.&lt;br /&gt;
* [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php Employers Using Facebook for Background Checking: Is It Legal?] George Lenard, George's Employment Blawg.&lt;br /&gt;
* [http://time-blog.com/work_in_progress/2008/05/googlestalking_your_interviewe.html Google-stalking your interviewer is smart]. Lisa Takeuchi Cullen, ''Time''. May 29, 2008.&lt;br /&gt;
* [http://accounting.smartpros.com/x54248.xml Employers Google Job Candidates, Check Social Networking Web Sites]. SmartPros. Aug 8, 2006.&lt;br /&gt;
&lt;br /&gt;
===In the courts===&lt;br /&gt;
* [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html Alleged DUI killer's MySpace profile depicts youth consumed with money, drugs and graffiti]. Stephanie Farr and Dafney Tales, ''Philadelphia Daily News''.  Jul 17, 2008.&lt;br /&gt;
*[http://ap.google.com/article/ALeqM5jC-5mkxddsdwxCN5_DwfLq3RqPmwD920TQK00 Web networking photos come back to bite defendants]. Eric Tucker, AP. Jul 19, 2008.&lt;br /&gt;
*[http://www.dailynexus.com/article.php?a=13440 Court case decision reveals dangers of networking sites]. Evan Wagstaff, ''Daily Nexus''. Feb 28, 2007.&lt;br /&gt;
&lt;br /&gt;
===Stalking===&lt;br /&gt;
*[http://www.ncvc.org/src/AGP.Net/Components/DocumentViewer/Download.aspxnz?DocumentID=41389 Stalking by a &amp;quot;high-tech&amp;quot; guy]. John Loveall. Stalking Resource Center. 2005.&lt;br /&gt;
*[http://seattletimes.nwsource.com/html/living/2003845520_websnooping21.html Facebook makes it easy to &amp;quot;profile stalk&amp;quot;]. David Sarno, ''Los Angeles Times''.  Aug 21, 2007.&lt;br /&gt;
*[http://www.ncvc.org/src/main.aspx?dbID=DB_StalkingTechnology139 The Use of Technology to Stalk] from the Stalking Resource Center.&lt;br /&gt;
&lt;br /&gt;
===Privacy Resources===&lt;br /&gt;
* [http://www.slais.ubc.ca/COURSES/libr500/06-07-wt2/www2/S_Hintersteininger/home.htm Beyond the Job Interview: Unofficial Online Background Checks]. Stefan Hintersteininger. University of British Columbia. March 2007.&lt;br /&gt;
* [http://epic.org/privacy/tools.html EPIC online guide to practical privacy tools]. Electronic Privacy Information Center.&lt;br /&gt;
* [http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy EFF's top 12 ways to protect your online privacy]. Stanton McCandlish, Electronic Frontier Foundation. Apr 10, 2002.&lt;br /&gt;
&lt;br /&gt;
===Social Search Services===&lt;br /&gt;
* [http://www.spock.com Spock People Search]. Spock.com.&lt;br /&gt;
* [http://www.mybackgroundcheck.com/AboutUs.aspx MyBackGroundCheck.com].&lt;br /&gt;
* [http://www.spokeo.com/hr Spokeo.com/hr]. &amp;quot;Want to see your candidates' profiles on MySpace and LinkedIn?&amp;quot;&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16813</id>
		<title>Social dossiers</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16813"/>
		<updated>2008-08-05T02:18:07Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Study Guide=&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
==Data availability==&lt;br /&gt;
Many websites (especially social media sites) allow users to create personal profiles; a substantial portion of those sites allow their content to be indexed by search-agents, and so any content created while using a site may potentially be located easily through basic search queries.  The information that is connected to a particular user varies widely and can include very basic information (name, age, gender, locale, etc.) and/or disturbingly detailed information (e.g. mySpaceUserXX aka &amp;quot;Jane Q. User&amp;quot; is single, bisexual, Hispanic, a Unitarian Universalist, an Aquarius, a self-professed alcoholic, works in Accounting/Finance, graduated from Anytown Community College in 2004, etc.).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Social Media Sites&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
!&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
! Types of Information&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*[http://www.facebook.com Facebook]&lt;br /&gt;
*[http://www.myspace.com Myspace]&lt;br /&gt;
*[http://www.linkedin.com LinkedIn]&lt;br /&gt;
*[http://www.friendster.com Friendster]&lt;br /&gt;
*[http://www.youtube.com YouTube]&lt;br /&gt;
*[http://www.digg.com Digg]&lt;br /&gt;
*[http://www.flickr.com Flickr]&lt;br /&gt;
|&lt;br /&gt;
*[http://www.photobucket.com Photobucket]&lt;br /&gt;
*[http://www.picasa.com Picasa]&lt;br /&gt;
*[http://www.twitter.com Twitter]&lt;br /&gt;
*[http://www.xanga.com Xanga]&lt;br /&gt;
*[http://www.livejournal.com Livejournal]&lt;br /&gt;
*[http://www.blogger.com Blogger]&lt;br /&gt;
*[http://www.deviantart.com Deviant Art]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
*Demographics&lt;br /&gt;
*Photographs&lt;br /&gt;
*Videos&lt;br /&gt;
*User Comments&lt;br /&gt;
*Cultural Interests&lt;br /&gt;
*Religion/Creed&lt;br /&gt;
*Political Views&lt;br /&gt;
|&lt;br /&gt;
*Sexual Orientiation&lt;br /&gt;
*Forum Discussions&lt;br /&gt;
*Work History&lt;br /&gt;
*Education History&lt;br /&gt;
*Favorite Videos&lt;br /&gt;
*Friends' Identities&lt;br /&gt;
*Offline Media Tastes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Some search providers have even begun to specialize their services to scour popular social networking sites.  A user may simply enter part of your identity, such as your name or email address, into a query box, and the search engine returns a listing of potential matches.  This makes compilation of your publicly available data frighteningly easy.&lt;br /&gt;
&lt;br /&gt;
==Aggregation motives==&lt;br /&gt;
&lt;br /&gt;
While new reasons to aggregate a persons data continue to emerge, there are several traditional motivations that seem to be popular.  Perhaps the primary of these is the use of social networking data by those people in charge of human resources decisions.  HR Managers are interested in hiring the best candidate for a job, and given that a simple web search may reveal substantial amounts of information on a job candidate's background, it's not surprising that focused search services like [http://www.spokeo.com/hr Spokeo] have been developed.  But ''should'' interviewer's use these services?  Is it really fair to bring a job candidate's peripheral social data into an HR decision?  In some cases&lt;br /&gt;
&lt;br /&gt;
'''Potential Interested Parties:'''&lt;br /&gt;
* '''''Hiring:'''''  Human resources staff and job interviewers' hiring decisions may be influenced by what search-queries reveal. [http://accounting.smartpros.com/x54248.xml]  The legality and ethical issues of unofficial google-stalking of potential job candidates is currently under debate. [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php]&lt;br /&gt;
* '''''Criminal Prosecution:'''''  Prosecutors may use the content you post online to build their case against you; your own social media profile may serve as a character witness against you. [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html]&lt;br /&gt;
* '''''Business Contacts:''''' Sales professionals constantly distribute their business cards to prospective clients/customers, so it is foreseeable that a lack of understanding of web privacy by a sales representative (that uses social media sites) could lead to disastrous results for themselves or the company they represent.&lt;br /&gt;
* '''''Insurance Eligibility:''''' &amp;quot;I'm sorry, Mr. Jones, but according to your blog, the following conditions are pre-existing and will require a rider/exclusion for us to even consider giving you a quote...&amp;quot;&lt;br /&gt;
* '''''Stalkers:'''''  If you have a lot of information publicly available through social networking profiles, then you have no real defensive strategy against potential stalkers accessing that information.  Granted, dedicated stalkers would find a way to obtain sensitive information (e.g. course schedules, work schedule, friends' identities) without using the internet, but social media only increases opportunity and ease, therefore the likelihood of attracting stalkers.&lt;br /&gt;
&lt;br /&gt;
==Links &amp;amp; Resources==&lt;br /&gt;
&lt;br /&gt;
===Job Hunting===&lt;br /&gt;
* [http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html Facebook can ruin your life, and so can Myspace, Bebo...] Ida Bergstrom, ''The Independent''.  Feb 10, 2008.&lt;br /&gt;
* [http://www.time.com/time/business/article/0,8599,1649121,00.html Online snooping gets creepy]. Anita Hamilton, ''Time''. Aug 2, 2007.&lt;br /&gt;
* [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php Employers Using Facebook for Background Checking: Is It Legal?] George Lenard, George's Employment Blawg.&lt;br /&gt;
* [http://time-blog.com/work_in_progress/2008/05/googlestalking_your_interviewe.html Google-stalking your interviewer is smart]. Lisa Takeuchi Cullen, ''Time''. May 29, 2008.&lt;br /&gt;
* [http://accounting.smartpros.com/x54248.xml Employers Google Job Candidates, Check Social Networking Web Sites]. SmartPros. Aug 8, 2006.&lt;br /&gt;
&lt;br /&gt;
===In the courts===&lt;br /&gt;
* [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html Alleged DUI killer's MySpace profile depicts youth consumed with money, drugs and graffiti]. Stephanie Farr and Dafney Tales, ''Philadelphia Daily News''.  Jul 17, 2008.&lt;br /&gt;
*[http://ap.google.com/article/ALeqM5jC-5mkxddsdwxCN5_DwfLq3RqPmwD920TQK00 Web networking photos come back to bite defendants]. Eric Tucker, AP. Jul 19, 2008.&lt;br /&gt;
*[http://www.dailynexus.com/article.php?a=13440 Court case decision reveals dangers of networking sites]. Evan Wagstaff, ''Daily Nexus''. Feb 28, 2007.&lt;br /&gt;
&lt;br /&gt;
===Stalking===&lt;br /&gt;
*[http://www.ncvc.org/src/AGP.Net/Components/DocumentViewer/Download.aspxnz?DocumentID=41389 Stalking by a &amp;quot;high-tech&amp;quot; guy]. John Loveall. Stalking Resource Center. 2005.&lt;br /&gt;
*[http://seattletimes.nwsource.com/html/living/2003845520_websnooping21.html Facebook makes it easy to &amp;quot;profile stalk&amp;quot;]. David Sarno, ''Los Angeles Times''.  Aug 21, 2007.&lt;br /&gt;
*[http://www.ncvc.org/src/main.aspx?dbID=DB_StalkingTechnology139 The Use of Technology to Stalk] from the Stalking Resource Center.&lt;br /&gt;
&lt;br /&gt;
===Privacy Resources===&lt;br /&gt;
* [http://www.slais.ubc.ca/COURSES/libr500/06-07-wt2/www2/S_Hintersteininger/home.htm Beyond the Job Interview: Unofficial Online Background Checks]. Stefan Hintersteininger. University of British Columbia. March 2007.&lt;br /&gt;
* [http://epic.org/privacy/tools.html EPIC online guide to practical privacy tools]. Electronic Privacy Information Center.&lt;br /&gt;
* [http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy EFF's top 12 ways to protect your online privacy]. Stanton McCandlish, Electronic Frontier Foundation. Apr 10, 2002.&lt;br /&gt;
&lt;br /&gt;
===Social Search Services===&lt;br /&gt;
* [http://www.spock.com Spock People Search]. Spock.com.&lt;br /&gt;
* [http://www.mybackgroundcheck.com/AboutUs.aspx MyBackGroundCheck.com].&lt;br /&gt;
* [http://www.spokeo.com/hr Spokeo.com/hr]. &amp;quot;Want to see your candidates' profiles on MySpace and LinkedIn?&amp;quot;&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16812</id>
		<title>Social dossiers</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16812"/>
		<updated>2008-08-05T02:16:46Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* In the courts */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Study Guide=&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
'''Ideas to consider:'''&lt;br /&gt;
# Availability of Data. (Secure? Private? Is it accessible to anyone? How do you limit information exclusively to its intended audience.)&lt;br /&gt;
# Accuracy. (Is there inaccurate data attached to your online identity?  Libel/Slander.  What if the facts are just wrong?)&lt;br /&gt;
# Anonymity.&lt;br /&gt;
# &amp;quot;They should have known better than to...&amp;quot;&lt;br /&gt;
# Search. Find. Link. -&amp;gt; Repeat. -&amp;gt; Compile: Summary judgment.&lt;br /&gt;
# Purpose.  Why do people investigate other people?  (Ex: Human Resources; Customer/Client/Vendor Relations; Obsession/Stalking; Criminal Prosecution; Civil Litigation;&lt;br /&gt;
&lt;br /&gt;
==Data availability==&lt;br /&gt;
Many websites (especially social media sites) allow users to create personal profiles; a substantial portion of those sites allow their content to be indexed by search-agents, and so any content created while using a site may potentially be located easily through basic search queries.  The information that is connected to a particular user varies widely and can include very basic information (name, age, gender, locale, etc.) and/or disturbingly detailed information (e.g. mySpaceUserXX aka &amp;quot;Jane Q. User&amp;quot; is single, bisexual, Hispanic, a Unitarian Universalist, an Aquarius, a self-professed alcoholic, works in Accounting/Finance, graduated from Anytown Community College in 2004, etc.).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Social Media Sites&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
!&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
! Types of Information&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*[http://www.facebook.com Facebook]&lt;br /&gt;
*[http://www.myspace.com Myspace]&lt;br /&gt;
*[http://www.linkedin.com LinkedIn]&lt;br /&gt;
*[http://www.friendster.com Friendster]&lt;br /&gt;
*[http://www.youtube.com YouTube]&lt;br /&gt;
*[http://www.digg.com Digg]&lt;br /&gt;
*[http://www.flickr.com Flickr]&lt;br /&gt;
|&lt;br /&gt;
*[http://www.photobucket.com Photobucket]&lt;br /&gt;
*[http://www.picasa.com Picasa]&lt;br /&gt;
*[http://www.twitter.com Twitter]&lt;br /&gt;
*[http://www.xanga.com Xanga]&lt;br /&gt;
*[http://www.livejournal.com Livejournal]&lt;br /&gt;
*[http://www.blogger.com Blogger]&lt;br /&gt;
*[http://www.deviantart.com Deviant Art]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
*Demographics&lt;br /&gt;
*Photographs&lt;br /&gt;
*Videos&lt;br /&gt;
*User Comments&lt;br /&gt;
*Cultural Interests&lt;br /&gt;
*Religion/Creed&lt;br /&gt;
*Political Views&lt;br /&gt;
|&lt;br /&gt;
*Sexual Orientiation&lt;br /&gt;
*Forum Discussions&lt;br /&gt;
*Work History&lt;br /&gt;
*Education History&lt;br /&gt;
*Favorite Videos&lt;br /&gt;
*Friends' Identities&lt;br /&gt;
*Offline Media Tastes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Some search providers have even begun to specialize their services to scour popular social networking sites.  A user may simply enter part of your identity, such as your name or email address, into a query box, and the search engine returns a listing of potential matches.  This makes compilation of your publicly available data frighteningly easy.&lt;br /&gt;
&lt;br /&gt;
==Aggregation motives==&lt;br /&gt;
&lt;br /&gt;
While new reasons to aggregate a persons data continue to emerge, there are several traditional motivations that seem to be popular.  Perhaps the primary of these is the use of social networking data by those people in charge of human resources decisions.  HR Managers are interested in hiring the best candidate for a job, and given that a simple web search may reveal substantial amounts of information on a job candidate's background, it's not surprising that focused search services like [http://www.spokeo.com/hr Spokeo] have been developed.  But ''should'' interviewer's use these services?  Is it really fair to bring a job candidate's peripheral social data into an HR decision?  In some cases&lt;br /&gt;
&lt;br /&gt;
'''Potential Interested Parties:'''&lt;br /&gt;
* '''''Hiring:'''''  Human resources staff and job interviewers' hiring decisions may be influenced by what search-queries reveal. [http://accounting.smartpros.com/x54248.xml]  The legality and ethical issues of unofficial google-stalking of potential job candidates is currently under debate. [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php]&lt;br /&gt;
* '''''Criminal Prosecution:'''''  Prosecutors may use the content you post online to build their case against you; your own social media profile may serve as a character witness against you. [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html]&lt;br /&gt;
* '''''Business Contacts:''''' Sales professionals constantly distribute their business cards to prospective clients/customers, so it is foreseeable that a lack of understanding of web privacy by a sales representative (that uses social media sites) could lead to disastrous results for themselves or the company they represent.&lt;br /&gt;
* '''''Insurance Eligibility:''''' &amp;quot;I'm sorry, Mr. Jones, but according to your blog, the following conditions are pre-existing and will require a rider/exclusion for us to even consider giving you a quote...&amp;quot;&lt;br /&gt;
* '''''Stalkers:'''''  If you have a lot of information publicly available through social networking profiles, then you have no real defensive strategy against potential stalkers accessing that information.  Granted, dedicated stalkers would find a way to obtain sensitive information (e.g. course schedules, work schedule, friends' identities) without using the internet, but social media only increases opportunity and ease, therefore the likelihood of attracting stalkers.&lt;br /&gt;
&lt;br /&gt;
==Links &amp;amp; Resources==&lt;br /&gt;
&lt;br /&gt;
===Job Hunting===&lt;br /&gt;
* [http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html Facebook can ruin your life, and so can Myspace, Bebo...] Ida Bergstrom, ''The Independent''.  Feb 10, 2008.&lt;br /&gt;
* [http://www.time.com/time/business/article/0,8599,1649121,00.html Online snooping gets creepy]. Anita Hamilton, ''Time''. Aug 2, 2007.&lt;br /&gt;
* [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php Employers Using Facebook for Background Checking: Is It Legal?] George Lenard, George's Employment Blawg.&lt;br /&gt;
* [http://time-blog.com/work_in_progress/2008/05/googlestalking_your_interviewe.html Google-stalking your interviewer is smart]. Lisa Takeuchi Cullen, ''Time''. May 29, 2008.&lt;br /&gt;
* [http://accounting.smartpros.com/x54248.xml Employers Google Job Candidates, Check Social Networking Web Sites]. SmartPros. Aug 8, 2006.&lt;br /&gt;
&lt;br /&gt;
===In the courts===&lt;br /&gt;
* [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html Alleged DUI killer's MySpace profile depicts youth consumed with money, drugs and graffiti]. Stephanie Farr and Dafney Tales, ''Philadelphia Daily News''.  Jul 17, 2008.&lt;br /&gt;
*[http://ap.google.com/article/ALeqM5jC-5mkxddsdwxCN5_DwfLq3RqPmwD920TQK00 Web networking photos come back to bite defendants]. Eric Tucker, AP. Jul 19, 2008.&lt;br /&gt;
*[http://www.dailynexus.com/article.php?a=13440 Court case decision reveals dangers of networking sites]. Evan Wagstaff, ''Daily Nexus''. Feb 28, 2007.&lt;br /&gt;
&lt;br /&gt;
===Stalking===&lt;br /&gt;
*[http://www.ncvc.org/src/AGP.Net/Components/DocumentViewer/Download.aspxnz?DocumentID=41389 Stalking by a &amp;quot;high-tech&amp;quot; guy]. John Loveall. Stalking Resource Center. 2005.&lt;br /&gt;
*[http://seattletimes.nwsource.com/html/living/2003845520_websnooping21.html Facebook makes it easy to &amp;quot;profile stalk&amp;quot;]. David Sarno, ''Los Angeles Times''.  Aug 21, 2007.&lt;br /&gt;
*[http://www.ncvc.org/src/main.aspx?dbID=DB_StalkingTechnology139 The Use of Technology to Stalk] from the Stalking Resource Center.&lt;br /&gt;
&lt;br /&gt;
===Privacy Resources===&lt;br /&gt;
* [http://www.slais.ubc.ca/COURSES/libr500/06-07-wt2/www2/S_Hintersteininger/home.htm Beyond the Job Interview: Unofficial Online Background Checks]. Stefan Hintersteininger. University of British Columbia. March 2007.&lt;br /&gt;
* [http://epic.org/privacy/tools.html EPIC online guide to practical privacy tools]. Electronic Privacy Information Center.&lt;br /&gt;
* [http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy EFF's top 12 ways to protect your online privacy]. Stanton McCandlish, Electronic Frontier Foundation. Apr 10, 2002.&lt;br /&gt;
&lt;br /&gt;
===Social Search Services===&lt;br /&gt;
* [http://www.spock.com Spock People Search]. Spock.com.&lt;br /&gt;
* [http://www.mybackgroundcheck.com/AboutUs.aspx MyBackGroundCheck.com].&lt;br /&gt;
* [http://www.spokeo.com/hr Spokeo.com/hr]. &amp;quot;Want to see your candidates' profiles on MySpace and LinkedIn?&amp;quot;&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Talk:CSC_379_SUM2008:Week_4,_Group_4&amp;diff=16811</id>
		<title>Talk:CSC 379 SUM2008:Week 4, Group 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Talk:CSC_379_SUM2008:Week_4,_Group_4&amp;diff=16811"/>
		<updated>2008-08-05T02:07:06Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;Jason&amp;gt;CJ &amp;amp; Reid, I have an Assembly exam @ 3:30 today which means that I will be online around 7pm to work on this.  --[[User:Jcsmith2|Jcsmith2]] 13:27, 1 August 2008 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;Reid&amp;gt; I'll be working on it at approximately 7PM also.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;Reid&amp;gt; I'll work on the &amp;quot;Why it's useful&amp;quot; section if that's OK with you guys&lt;br /&gt;
&lt;br /&gt;
&amp;lt;Reid&amp;gt; I added information to the &amp;quot;is it bad&amp;quot; section.  Feel free to modify it.  Also, feel free to modify what I wrote for the &amp;quot;Why is it useful&amp;quot; section.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;Jason&amp;gt;I think we should add one statement regarding the non-disclosure of the printer manufacturers.  That's a key component of the ethical discussion.  -&amp;gt; Is it a bad idea? &lt;br /&gt;
Also, one of the reviewers suggested that &amp;quot;Is it a bad idea?&amp;quot; is bad grammar.  Perhaps we should re-title this section?  --[[User:Jcsmith2|Jcsmith2]] 21:05, 4 August 2008 (EDT)&lt;br /&gt;
&lt;br /&gt;
ORIGINAL ASSIGNMENT: &lt;br /&gt;
What if every page you print from a color printer were labeled with a hidden code, detailing the printer the page was printed from, the date of printing and the time of printing, down to the minute?  What if this feature was intentionally hidden from the user and could not be disabled?  What if the code could be viewed and decoded by anyone, not just law enforcement?  These hidden tracking codes exist – examine the ethical considerations they pose.  Should users be informed of the feature?  Should users be able to disable the feature?  Develop ethical arguments for both positions.&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_4,_Group_4&amp;diff=16810</id>
		<title>CSC 379 SUM2008:Week 4, Group 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_4,_Group_4&amp;diff=16810"/>
		<updated>2008-08-05T02:06:22Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Printer Tracking Technology==&lt;br /&gt;
&lt;br /&gt;
===How does it work?===&lt;br /&gt;
&lt;br /&gt;
Encoding data in the form a machine-readable printed graph is not a new idea&amp;amp;mdash;adhering printed barcodes to physical objects for tracking purposes has been a commercial practice since 1966, becoming truly ubiquitous in the 1980s. [http://en.wikipedia.org/wiki/Barcode#History]  Printer tracking codes are a lot like commercial UPC codes, except that they are virtually undetectable by unaided human eyes and data is encoded into a 2-Dimensional array of micro-dots.  As an example, the [http://w2.eff.org/Privacy/printers/docucolor/ Xerox DocuColor] series printer encodes printer data into a 15x8 grid of nearly invisible yellowish dots.  The grid is repeated across the entire page, so even fragmented documents may later be forensically identified.  The data encoded by the printer is simple: the printer's serial number, the date and time at which a document was printed.  &lt;br /&gt;
&lt;br /&gt;
Currently, hidden printer tracking technology has been found only in ''some'' laser printers, of which [http://www.eff.org EFF] has compiled a non-comprehensive [http://w2.eff.org/Privacy/printers/list.php list].&lt;br /&gt;
&lt;br /&gt;
===Why Is It Useful?===&lt;br /&gt;
&lt;br /&gt;
Currently, the only official use of the hidden tracking dots by our government is their role in tracking down [http://www.kahl.net/news/2005/10/government-tracks-printer-usage-with.html counterfeiters].  These criminals often employ the technique of scanning legal currency, then by using a color laser printer or color laser copier, they are able to mass-produce the counterfeit money that is of a high enough quality that it will fool most people.  By using the [http://www.jconline.com/apps/pbcs.dll/article?AID=/20080713/NEWS09/80713019 hidden tracking codes], law-enforcement officials, specifically the Secret Service, are able to determine the brand and model number of the printer that produced the counterfeit bills as well as finding the specific serial number of the offending machine.  They are then able to [http://www.pcworld.com/article/118664/government_uses_color_laser_printer_technology_to_track_documents.html use that information] to contact the manufacturer of the printer to gain purchase information that will allow them to determine who owns that specific device.  &lt;br /&gt;
&lt;br /&gt;
Currency counterfeiters are not the only ones affected by this technology.  By employing similar criminal techniques, document forgers are using color printers to forge driver's licenses, passports, identification badges, and [http://query.nytimes.com/gst/fullpage.html?res=9C0CE4DC1231F93BA35753C1A966958260&amp;amp;sec=&amp;amp;spon=&amp;amp;pagewanted=all checks].  By analyzing the tracking dots on the paper that the forged documents were printed on, authorities are able to create a paper trail leading to the forgers and expedite their capture.  &lt;br /&gt;
&lt;br /&gt;
This practice is not limited the the United States government as the governments of [http://www.pcworld.idg.com.au/index.php/id;1002274598 other countries] concerned with the circulation of counterfeit currency also employ the same techniques used by the Secret Service.&lt;br /&gt;
&lt;br /&gt;
===Is it bad idea?===&lt;br /&gt;
&lt;br /&gt;
By producing what amounts to a documented signature of the originating machine, the anonymity that comes from a printed document over a digital document is no longer possible due to this technology.  There is nothing about this technology that limits its use to only tracking counterfeiters and forgers so the end result is that it is a blatant [http://www.usatoday.com/tech/news/surveillance/2008-07-13-printer_N.htm?loc=interstitialskip violation of the privacy] of the affected person, even when they are not guilty of any crimes.  Otherwise innocent people such as [http://www.jconline.com/apps/pbcs.dll/article?AID=/20080713/NEWS09/80713019 political dissidents, whistleblowers, religious activists, or protesters] that certain groups might find threatening can be tracked due to their privacy being compromised by their printers.  This seemingly blatant privacy violation is not going unchallenged as groups in the [http://www.eff.org/issues/printers United States] and [http://arstechnica.com/news.ars/post/20080214-eu-commissioner-printer-tracking-may-be-human-rights-violation.html?rel Europe] are pressing their governments to act and defend their rights to privacy.  While it's original design was a noble one, the end result is that these document tracking dots remove any sense of privacy for the author of a document and might as well be the signature of that author.&lt;br /&gt;
&lt;br /&gt;
===Links===&lt;br /&gt;
*[http://www.pcworld.com/article/118664/government_uses_color_laser_printer_technology_to_track_documents.html Government Uses Color Laser Printer Technology to Track Documents]. Jason Tuohey, Medill News Service. Nov 22, 2004.&lt;br /&gt;
* [http://www.usatoday.com/tech/news/surveillance/2008-07-13-printer_N.htm Printer dots raise privacy concerns]. Thomas Frank, ''USA Today''.  Jul 13, 2008.&lt;br /&gt;
* [http://w2.eff.org/Privacy/printers/docucolor/ EFF's analysis of Xerox DocuColor Printers' hidden printer tracking dots].&lt;br /&gt;
* [http://www.eff.org/pages/list-printers-which-do-or-do-not-display-tracking-dots EFF's list of laser printers that do or do not display tracking dots].&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16797</id>
		<title>Social dossiers</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16797"/>
		<updated>2008-08-05T01:47:24Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Aggregation motives */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Study Guide=&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
'''Ideas to consider:'''&lt;br /&gt;
# Availability of Data. (Secure? Private? Is it accessible to anyone? How do you limit information exclusively to its intended audience.)&lt;br /&gt;
# Accuracy. (Is there inaccurate data attached to your online identity?  Libel/Slander.  What if the facts are just wrong?)&lt;br /&gt;
# Anonymity.&lt;br /&gt;
# &amp;quot;They should have known better than to...&amp;quot;&lt;br /&gt;
# Search. Find. Link. -&amp;gt; Repeat. -&amp;gt; Compile: Summary judgment.&lt;br /&gt;
# Purpose.  Why do people investigate other people?  (Ex: Human Resources; Customer/Client/Vendor Relations; Obsession/Stalking; Criminal Prosecution; Civil Litigation;&lt;br /&gt;
&lt;br /&gt;
==Data availability==&lt;br /&gt;
Many websites (especially social media sites) allow users to create personal profiles; a substantial portion of those sites allow their content to be indexed by search-agents, and so any content created while using a site may potentially be located easily through basic search queries.  The information that is connected to a particular user varies widely and can include very basic information (name, age, gender, locale, etc.) and/or disturbingly detailed information (e.g. mySpaceUserXX aka &amp;quot;Jane Q. User&amp;quot; is single, bisexual, Hispanic, a Unitarian Universalist, an Aquarius, a self-professed alcoholic, works in Accounting/Finance, graduated from Anytown Community College in 2004, etc.).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Social Media Sites&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
!&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
! Types of Information&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*[http://www.facebook.com Facebook]&lt;br /&gt;
*[http://www.myspace.com Myspace]&lt;br /&gt;
*[http://www.linkedin.com LinkedIn]&lt;br /&gt;
*[http://www.friendster.com Friendster]&lt;br /&gt;
*[http://www.youtube.com YouTube]&lt;br /&gt;
*[http://www.digg.com Digg]&lt;br /&gt;
*[http://www.flickr.com Flickr]&lt;br /&gt;
|&lt;br /&gt;
*[http://www.photobucket.com Photobucket]&lt;br /&gt;
*[http://www.picasa.com Picasa]&lt;br /&gt;
*[http://www.twitter.com Twitter]&lt;br /&gt;
*[http://www.xanga.com Xanga]&lt;br /&gt;
*[http://www.livejournal.com Livejournal]&lt;br /&gt;
*[http://www.blogger.com Blogger]&lt;br /&gt;
*[http://www.deviantart.com Deviant Art]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
*Demographics&lt;br /&gt;
*Photographs&lt;br /&gt;
*Videos&lt;br /&gt;
*User Comments&lt;br /&gt;
*Cultural Interests&lt;br /&gt;
*Religion/Creed&lt;br /&gt;
*Political Views&lt;br /&gt;
|&lt;br /&gt;
*Sexual Orientiation&lt;br /&gt;
*Forum Discussions&lt;br /&gt;
*Work History&lt;br /&gt;
*Education History&lt;br /&gt;
*Favorite Videos&lt;br /&gt;
*Friends' Identities&lt;br /&gt;
*Offline Media Tastes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Some search providers have even begun to specialize their services to scour popular social networking sites.  A user may simply enter part of your identity, such as your name or email address, into a query box, and the search engine returns a listing of potential matches.  This makes compilation of your publicly available data frighteningly easy.&lt;br /&gt;
&lt;br /&gt;
==Aggregation motives==&lt;br /&gt;
&lt;br /&gt;
While new reasons to aggregate a persons data continue to emerge, there are several traditional motivations that seem to be popular.  Perhaps the primary of these is the use of social networking data by those people in charge of human resources decisions.  HR Managers are interested in hiring the best candidate for a job, and given that a simple web search may reveal substantial amounts of information on a job candidate's background, it's not surprising that focused search services like [http://www.spokeo.com/hr Spokeo] have been developed.  But ''should'' interviewer's use these services?  Is it really fair to bring a job candidate's peripheral social data into an HR decision?  In some cases&lt;br /&gt;
&lt;br /&gt;
'''Potential Interested Parties:'''&lt;br /&gt;
* '''''Hiring:'''''  Human resources staff and job interviewers' hiring decisions may be influenced by what search-queries reveal. [http://accounting.smartpros.com/x54248.xml]  The legality and ethical issues of unofficial google-stalking of potential job candidates is currently under debate. [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php]&lt;br /&gt;
* '''''Criminal Prosecution:'''''  Prosecutors may use the content you post online to build their case against you; your own social media profile may serve as a character witness against you. [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html]&lt;br /&gt;
* '''''Business Contacts:''''' Sales professionals constantly distribute their business cards to prospective clients/customers, so it is foreseeable that a lack of understanding of web privacy by a sales representative (that uses social media sites) could lead to disastrous results for themselves or the company they represent.&lt;br /&gt;
* '''''Insurance Eligibility:''''' &amp;quot;I'm sorry, Mr. Jones, but according to your blog, the following conditions are pre-existing and will require a rider/exclusion for us to even consider giving you a quote...&amp;quot;&lt;br /&gt;
* '''''Stalkers:'''''  If you have a lot of information publicly available through social networking profiles, then you have no real defensive strategy against potential stalkers accessing that information.  Granted, dedicated stalkers would find a way to obtain sensitive information (e.g. course schedules, work schedule, friends' identities) without using the internet, but social media only increases opportunity and ease, therefore the likelihood of attracting stalkers.&lt;br /&gt;
&lt;br /&gt;
==Links &amp;amp; Resources==&lt;br /&gt;
&lt;br /&gt;
===Job Hunting===&lt;br /&gt;
* [http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html Facebook can ruin your life, and so can Myspace, Bebo...] Ida Bergstrom, ''The Independent''.  Feb 10, 2008.&lt;br /&gt;
* [http://www.time.com/time/business/article/0,8599,1649121,00.html Online snooping gets creepy]. Anita Hamilton, ''Time''. Aug 2, 2007.&lt;br /&gt;
* [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php Employers Using Facebook for Background Checking: Is It Legal?] George Lenard, George's Employment Blawg.&lt;br /&gt;
* [http://time-blog.com/work_in_progress/2008/05/googlestalking_your_interviewe.html Google-stalking your interviewer is smart]. Lisa Takeuchi Cullen, ''Time''. May 29, 2008.&lt;br /&gt;
* [http://accounting.smartpros.com/x54248.xml Employers Google Job Candidates, Check Social Networking Web Sites]. SmartPros. Aug 8, 2006.&lt;br /&gt;
&lt;br /&gt;
===In the courts===&lt;br /&gt;
* [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html Alleged DUI killer's MySpace profile depicts youth consumed with money, drugs and graffiti]. Stephanie Farr and Dafney Tales, ''Philadelphia Daily News''.  Jul 17, 2008.&lt;br /&gt;
*[http://ap.google.com/article/ALeqM5jC-5mkxddsdwxCN5_DwfLq3RqPmwD920TQK00 Web networking photos come back to bite defendants]. Eric Tucker, AP. Jul 19, 2008.&lt;br /&gt;
*[http://www.dailynexus.com/article.php?a=13440 Court case decision reveals dangers of networking sites]. Evan Wagstaff, Daily Nexus. Feb 28, 2007.&lt;br /&gt;
&lt;br /&gt;
===Stalking===&lt;br /&gt;
*[http://www.ncvc.org/src/AGP.Net/Components/DocumentViewer/Download.aspxnz?DocumentID=41389 Stalking by a &amp;quot;high-tech&amp;quot; guy]. John Loveall. Stalking Resource Center. 2005.&lt;br /&gt;
*[http://seattletimes.nwsource.com/html/living/2003845520_websnooping21.html Facebook makes it easy to &amp;quot;profile stalk&amp;quot;]. David Sarno, ''Los Angeles Times''.  Aug 21, 2007.&lt;br /&gt;
*[http://www.ncvc.org/src/main.aspx?dbID=DB_StalkingTechnology139 The Use of Technology to Stalk] from the Stalking Resource Center.&lt;br /&gt;
&lt;br /&gt;
===Privacy Resources===&lt;br /&gt;
* [http://www.slais.ubc.ca/COURSES/libr500/06-07-wt2/www2/S_Hintersteininger/home.htm Beyond the Job Interview: Unofficial Online Background Checks]. Stefan Hintersteininger. University of British Columbia. March 2007.&lt;br /&gt;
* [http://epic.org/privacy/tools.html EPIC online guide to practical privacy tools]. Electronic Privacy Information Center.&lt;br /&gt;
* [http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy EFF's top 12 ways to protect your online privacy]. Stanton McCandlish, Electronic Frontier Foundation. Apr 10, 2002.&lt;br /&gt;
&lt;br /&gt;
===Social Search Services===&lt;br /&gt;
* [http://www.spock.com Spock People Search]. Spock.com.&lt;br /&gt;
* [http://www.mybackgroundcheck.com/AboutUs.aspx MyBackGroundCheck.com].&lt;br /&gt;
* [http://www.spokeo.com/hr Spokeo.com/hr]. &amp;quot;Want to see your candidates' profiles on MySpace and LinkedIn?&amp;quot;&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Talk:Social_dossiers&amp;diff=16787</id>
		<title>Talk:Social dossiers</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Talk:Social_dossiers&amp;diff=16787"/>
		<updated>2008-08-05T01:22:42Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*There should be a link to the topic description.&lt;br /&gt;
*&amp;lt;Corrected: 16+&amp;gt;There need to be more links, perhaps two dozen instead of one dozen. (was having difficulty finding quality articles that were not duplicates of existing stories...)&lt;br /&gt;
*{identification of issues} Some, e.g., use in hiring. But the study guide says very little about it; you have to follow the links. &lt;br /&gt;
*Differing viewpoints are not really identified, unless you read the articles linked to.&lt;br /&gt;
*&amp;lt;Corrected: revised link categories&amp;gt;&amp;quot;Articles of interest&amp;quot; is too vague; one of the headings should certainly be &amp;quot;Job Hunting&amp;quot;&lt;br /&gt;
*{identification of issues} It probably mentions them somewhere, but does not really identify them as ethical issues.&lt;br /&gt;
&lt;br /&gt;
*The study guide does not read as a narrative, but rather as a set of related paragraphs. There should be topic sentences, explaining why lists of issues have been aggregated together.&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16786</id>
		<title>Social dossiers</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16786"/>
		<updated>2008-08-05T01:19:00Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Data availability */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Study Guide=&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
'''Ideas to consider:'''&lt;br /&gt;
# Availability of Data. (Secure? Private? Is it accessible to anyone? How do you limit information exclusively to its intended audience.)&lt;br /&gt;
# Accuracy. (Is there inaccurate data attached to your online identity?  Libel/Slander.  What if the facts are just wrong?)&lt;br /&gt;
# Anonymity.&lt;br /&gt;
# &amp;quot;They should have known better than to...&amp;quot;&lt;br /&gt;
# Search. Find. Link. -&amp;gt; Repeat. -&amp;gt; Compile: Summary judgment.&lt;br /&gt;
# Purpose.  Why do people investigate other people?  (Ex: Human Resources; Customer/Client/Vendor Relations; Obsession/Stalking; Criminal Prosecution; Civil Litigation;&lt;br /&gt;
&lt;br /&gt;
==Data availability==&lt;br /&gt;
Many websites (especially social media sites) allow users to create personal profiles; a substantial portion of those sites allow their content to be indexed by search-agents, and so any content created while using a site may potentially be located easily through basic search queries.  The information that is connected to a particular user varies widely and can include very basic information (name, age, gender, locale, etc.) and/or disturbingly detailed information (e.g. mySpaceUserXX aka &amp;quot;Jane Q. User&amp;quot; is single, bisexual, Hispanic, a Unitarian Universalist, an Aquarius, a self-professed alcoholic, works in Accounting/Finance, graduated from Anytown Community College in 2004, etc.).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Social Media Sites&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
!&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
! Types of Information&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*[http://www.facebook.com Facebook]&lt;br /&gt;
*[http://www.myspace.com Myspace]&lt;br /&gt;
*[http://www.linkedin.com LinkedIn]&lt;br /&gt;
*[http://www.friendster.com Friendster]&lt;br /&gt;
*[http://www.youtube.com YouTube]&lt;br /&gt;
*[http://www.digg.com Digg]&lt;br /&gt;
*[http://www.flickr.com Flickr]&lt;br /&gt;
|&lt;br /&gt;
*[http://www.photobucket.com Photobucket]&lt;br /&gt;
*[http://www.picasa.com Picasa]&lt;br /&gt;
*[http://www.twitter.com Twitter]&lt;br /&gt;
*[http://www.xanga.com Xanga]&lt;br /&gt;
*[http://www.livejournal.com Livejournal]&lt;br /&gt;
*[http://www.blogger.com Blogger]&lt;br /&gt;
*[http://www.deviantart.com Deviant Art]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
*Demographics&lt;br /&gt;
*Photographs&lt;br /&gt;
*Videos&lt;br /&gt;
*User Comments&lt;br /&gt;
*Cultural Interests&lt;br /&gt;
*Religion/Creed&lt;br /&gt;
*Political Views&lt;br /&gt;
|&lt;br /&gt;
*Sexual Orientiation&lt;br /&gt;
*Forum Discussions&lt;br /&gt;
*Work History&lt;br /&gt;
*Education History&lt;br /&gt;
*Favorite Videos&lt;br /&gt;
*Friends' Identities&lt;br /&gt;
*Offline Media Tastes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Some search providers have even begun to specialize their services to scour popular social networking sites.  A user may simply enter part of your identity, such as your name or email address, into a query box, and the search engine returns a listing of potential matches.  This makes compilation of your publicly available data frighteningly easy.&lt;br /&gt;
&lt;br /&gt;
==Aggregation motives==&lt;br /&gt;
&lt;br /&gt;
'''Potential Interested Parties:'''&lt;br /&gt;
* '''''Hiring:'''''  Human resources staff and job interviewers' hiring decisions may be influenced by what search-queries reveal. [http://accounting.smartpros.com/x54248.xml]  The legality and ethical issues of unofficial google-stalking of potential job candidates is currently under debate. [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php]&lt;br /&gt;
* '''''Criminal Prosecution:'''''  Prosecutors may use the content you post online to build their case against you; your own social media profile may serve as a character witness against you. [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html]&lt;br /&gt;
* '''''Business Contacts:''''' Sales professionals constantly distribute their business cards to prospective clients/customers, so it is foreseeable that a lack of understanding of web privacy by a sales representative (that uses social media sites) could lead to disastrous results for themselves or the company they represent.&lt;br /&gt;
* '''''Insurance Eligibility:''''' &amp;quot;I'm sorry, Mr. Jones, but according to your blog, the following conditions are pre-existing and will require a rider/exclusion for us to even consider giving you a quote...&amp;quot;&lt;br /&gt;
* '''''Stalkers:'''''  If you have a lot of information publicly available through social networking profiles, then you have no real defensive strategy against potential stalkers accessing that information.  Granted, dedicated stalkers would find a way to obtain sensitive information (e.g. course schedules, work schedule, friends' identities) without using the internet, but social media only increases opportunity and ease, therefore the likelihood of attracting stalkers.&lt;br /&gt;
&lt;br /&gt;
==Links &amp;amp; Resources==&lt;br /&gt;
&lt;br /&gt;
===Job Hunting===&lt;br /&gt;
* [http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html Facebook can ruin your life, and so can Myspace, Bebo...] Ida Bergstrom, ''The Independent''.  Feb 10, 2008.&lt;br /&gt;
* [http://www.time.com/time/business/article/0,8599,1649121,00.html Online snooping gets creepy]. Anita Hamilton, ''Time''. Aug 2, 2007.&lt;br /&gt;
* [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php Employers Using Facebook for Background Checking: Is It Legal?] George Lenard, George's Employment Blawg.&lt;br /&gt;
* [http://time-blog.com/work_in_progress/2008/05/googlestalking_your_interviewe.html Google-stalking your interviewer is smart]. Lisa Takeuchi Cullen, ''Time''. May 29, 2008.&lt;br /&gt;
* [http://accounting.smartpros.com/x54248.xml Employers Google Job Candidates, Check Social Networking Web Sites]. SmartPros. Aug 8, 2006.&lt;br /&gt;
&lt;br /&gt;
===In the courts===&lt;br /&gt;
* [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html Alleged DUI killer's MySpace profile depicts youth consumed with money, drugs and graffiti]. Stephanie Farr and Dafney Tales, ''Philadelphia Daily News''.  Jul 17, 2008.&lt;br /&gt;
*[http://ap.google.com/article/ALeqM5jC-5mkxddsdwxCN5_DwfLq3RqPmwD920TQK00 Web networking photos come back to bite defendants]. Eric Tucker, AP. Jul 19, 2008.&lt;br /&gt;
*[http://www.dailynexus.com/article.php?a=13440 Court case decision reveals dangers of networking sites]. Evan Wagstaff, Daily Nexus. Feb 28, 2007.&lt;br /&gt;
&lt;br /&gt;
===Stalking===&lt;br /&gt;
*[http://www.ncvc.org/src/AGP.Net/Components/DocumentViewer/Download.aspxnz?DocumentID=41389 Stalking by a &amp;quot;high-tech&amp;quot; guy]. John Loveall. Stalking Resource Center. 2005.&lt;br /&gt;
*[http://seattletimes.nwsource.com/html/living/2003845520_websnooping21.html Facebook makes it easy to &amp;quot;profile stalk&amp;quot;]. David Sarno, ''Los Angeles Times''.  Aug 21, 2007.&lt;br /&gt;
*[http://www.ncvc.org/src/main.aspx?dbID=DB_StalkingTechnology139 The Use of Technology to Stalk] from the Stalking Resource Center.&lt;br /&gt;
&lt;br /&gt;
===Privacy Resources===&lt;br /&gt;
* [http://www.slais.ubc.ca/COURSES/libr500/06-07-wt2/www2/S_Hintersteininger/home.htm Beyond the Job Interview: Unofficial Online Background Checks]. Stefan Hintersteininger. University of British Columbia. March 2007.&lt;br /&gt;
* [http://epic.org/privacy/tools.html EPIC online guide to practical privacy tools]. Electronic Privacy Information Center.&lt;br /&gt;
* [http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy EFF's top 12 ways to protect your online privacy]. Stanton McCandlish, Electronic Frontier Foundation. Apr 10, 2002.&lt;br /&gt;
&lt;br /&gt;
===Social Search Services===&lt;br /&gt;
* [http://www.spock.com Spock People Search]. Spock.com.&lt;br /&gt;
* [http://www.mybackgroundcheck.com/AboutUs.aspx MyBackGroundCheck.com].&lt;br /&gt;
* [http://www.spokeo.com/hr Spokeo.com/hr]. &amp;quot;Want to see your candidates' profiles on MySpace and LinkedIn?&amp;quot;&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Talk:CSC_379_SUM2008:Week_4,_Group_4&amp;diff=16780</id>
		<title>Talk:CSC 379 SUM2008:Week 4, Group 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Talk:CSC_379_SUM2008:Week_4,_Group_4&amp;diff=16780"/>
		<updated>2008-08-05T01:05:33Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;Jason&amp;gt;CJ &amp;amp; Reid, I have an Assembly exam @ 3:30 today which means that I will be online around 7pm to work on this.  --[[User:Jcsmith2|Jcsmith2]] 13:27, 1 August 2008 (EDT)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;Reid&amp;gt; I'll be working on it at approximately 7PM also.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;Reid&amp;gt; I'll work on the &amp;quot;Why it's useful&amp;quot; section if that's OK with you guys&lt;br /&gt;
&lt;br /&gt;
&amp;lt;Reid&amp;gt; I added information to the &amp;quot;is it bad&amp;quot; section.  Feel free to modify it.  Also, feel free to modify what I wrote for the &amp;quot;Why is it useful&amp;quot; section.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;Jason&amp;gt;I think we should add one statement regarding the non-disclosure of the printer manufacturers.  That's a key component of the ethical discussion.  -&amp;gt; Is it a bad idea? &lt;br /&gt;
Also, one of the reviewers suggested that &amp;quot;Is it a bad idea?&amp;quot; is bad grammar.  Perhaps we should re-title this section?  --[[User:Jcsmith2|Jcsmith2]] 21:05, 4 August 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16750</id>
		<title>Social dossiers</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16750"/>
		<updated>2008-08-03T01:11:38Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Stalking */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Study Guide=&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
'''Ideas to consider:'''&lt;br /&gt;
# Availability of Data. (Secure? Private? Is it accessible to anyone? How do you limit information exclusively to its intended audience.)&lt;br /&gt;
# Accuracy. (Is there inaccurate data attached to your online identity?  Libel/Slander.  What if the facts are just wrong?)&lt;br /&gt;
# Anonymity.&lt;br /&gt;
# &amp;quot;They should have known better than to...&amp;quot;&lt;br /&gt;
# Search. Find. Link. -&amp;gt; Repeat. -&amp;gt; Compile: Summary judgment.&lt;br /&gt;
# Purpose.  Why do people investigate other people?  (Ex: Human Resources; Customer/Client/Vendor Relations; Obsession/Stalking; Criminal Prosecution; Civil Litigation;&lt;br /&gt;
&lt;br /&gt;
==Data availability==&lt;br /&gt;
Many websites (especially social media sites) allow users to create personal profiles; a substantial portion of those sites allow their content to be indexed by search-agents, and so any content created while using a site may potentially be located easily through basic search queries.  The information that is connected to a particular user varies widely and can include very basic information (name, age, gender, locale, etc.) and/or disturbingly detailed information (e.g. mySpaceUserXX aka &amp;quot;Jane Q. User&amp;quot; is single, bisexual, Hispanic, a Unitarian Universalist, an Aquarius, a self-professed alcoholic, works in Accounting/Finance, graduated from Anytown Community College in 2004, etc.).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Social Media Sites&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
!&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
! Types of Information&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*[http://www.facebook.com Facebook]&lt;br /&gt;
*[http://www.myspace.com Myspace]&lt;br /&gt;
*[http://www.linkedin.com LinkedIn]&lt;br /&gt;
*[http://www.friendster.com Friendster]&lt;br /&gt;
*[http://www.youtube.com YouTube]&lt;br /&gt;
*[http://www.digg.com Digg]&lt;br /&gt;
*[http://www.flickr.com Flickr]&lt;br /&gt;
|&lt;br /&gt;
*[http://www.photobucket.com Photobucket]&lt;br /&gt;
*[http://www.picasa.com Picasa]&lt;br /&gt;
*[http://www.twitter.com Twitter]&lt;br /&gt;
*[http://www.xanga.com Xanga]&lt;br /&gt;
*[http://www.livejournal.com Livejournal]&lt;br /&gt;
*[http://www.blogger.com Blogger]&lt;br /&gt;
*[http://www.deviantart.com Deviant Art]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
*Demographics&lt;br /&gt;
*Photographs&lt;br /&gt;
*Videos&lt;br /&gt;
*User Comments&lt;br /&gt;
*Cultural Interests&lt;br /&gt;
*Religion/Creed&lt;br /&gt;
*Political Views&lt;br /&gt;
|&lt;br /&gt;
*Sexual Orientiation&lt;br /&gt;
*Forum Discussions&lt;br /&gt;
*Work History&lt;br /&gt;
*Education History&lt;br /&gt;
*Favorite Videos&lt;br /&gt;
*Friends' Identities&lt;br /&gt;
*Offline Media Tastes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Aggregation motives==&lt;br /&gt;
&lt;br /&gt;
'''Potential Interested Parties:'''&lt;br /&gt;
* '''''Hiring:'''''  Human resources staff and job interviewers' hiring decisions may be influenced by what search-queries reveal. [http://accounting.smartpros.com/x54248.xml]  The legality and ethical issues of unofficial google-stalking of potential job candidates is currently under debate. [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php]&lt;br /&gt;
* '''''Criminal Prosecution:'''''  Prosecutors may use the content you post online to build their case against you; your own social media profile may serve as a character witness against you. [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html]&lt;br /&gt;
* '''''Business Contacts:''''' Sales professionals constantly distribute their business cards to prospective clients/customers, so it is foreseeable that a lack of understanding of web privacy by a sales representative (that uses social media sites) could lead to disastrous results for themselves or the company they represent.&lt;br /&gt;
* '''''Insurance Eligibility:''''' &amp;quot;I'm sorry, Mr. Jones, but according to your blog, the following conditions are pre-existing and will require a rider/exclusion for us to even consider giving you a quote...&amp;quot;&lt;br /&gt;
* '''''Stalkers:'''''  If you have a lot of information publicly available through social networking profiles, then you have no real defensive strategy against potential stalkers accessing that information.  Granted, dedicated stalkers would find a way to obtain sensitive information (e.g. course schedules, work schedule, friends' identities) without using the internet, but social media only increases opportunity and ease, therefore the likelihood of attracting stalkers.&lt;br /&gt;
&lt;br /&gt;
==Links &amp;amp; Resources==&lt;br /&gt;
&lt;br /&gt;
===Job Hunting===&lt;br /&gt;
* [http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html Facebook can ruin your life, and so can Myspace, Bebo...] Ida Bergstrom, ''The Independent''.  Feb 10, 2008.&lt;br /&gt;
* [http://www.time.com/time/business/article/0,8599,1649121,00.html Online snooping gets creepy]. Anita Hamilton, ''Time''. Aug 2, 2007.&lt;br /&gt;
* [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php Employers Using Facebook for Background Checking: Is It Legal?] George Lenard, George's Employment Blawg.&lt;br /&gt;
* [http://time-blog.com/work_in_progress/2008/05/googlestalking_your_interviewe.html Google-stalking your interviewer is smart]. Lisa Takeuchi Cullen, ''Time''. May 29, 2008.&lt;br /&gt;
* [http://accounting.smartpros.com/x54248.xml Employers Google Job Candidates, Check Social Networking Web Sites]. SmartPros. Aug 8, 2006.&lt;br /&gt;
&lt;br /&gt;
===In the courts===&lt;br /&gt;
* [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html Alleged DUI killer's MySpace profile depicts youth consumed with money, drugs and graffiti]. Stephanie Farr and Dafney Tales, ''Philadelphia Daily News''.  Jul 17, 2008.&lt;br /&gt;
*[http://ap.google.com/article/ALeqM5jC-5mkxddsdwxCN5_DwfLq3RqPmwD920TQK00 Web networking photos come back to bite defendants]. Eric Tucker, AP. Jul 19, 2008.&lt;br /&gt;
*[http://www.dailynexus.com/article.php?a=13440 Court case decision reveals dangers of networking sites]. Evan Wagstaff, Daily Nexus. Feb 28, 2007.&lt;br /&gt;
&lt;br /&gt;
===Stalking===&lt;br /&gt;
*[http://www.ncvc.org/src/AGP.Net/Components/DocumentViewer/Download.aspxnz?DocumentID=41389 Stalking by a &amp;quot;high-tech&amp;quot; guy]. John Loveall. Stalking Resource Center. 2005.&lt;br /&gt;
*[http://seattletimes.nwsource.com/html/living/2003845520_websnooping21.html Facebook makes it easy to &amp;quot;profile stalk&amp;quot;]. David Sarno, ''Los Angeles Times''.  Aug 21, 2007.&lt;br /&gt;
*[http://www.ncvc.org/src/main.aspx?dbID=DB_StalkingTechnology139 The Use of Technology to Stalk] from the Stalking Resource Center.&lt;br /&gt;
&lt;br /&gt;
===Privacy Resources===&lt;br /&gt;
* [http://www.slais.ubc.ca/COURSES/libr500/06-07-wt2/www2/S_Hintersteininger/home.htm Beyond the Job Interview: Unofficial Online Background Checks]. Stefan Hintersteininger. University of British Columbia. March 2007.&lt;br /&gt;
* [http://epic.org/privacy/tools.html EPIC online guide to practical privacy tools]. Electronic Privacy Information Center.&lt;br /&gt;
* [http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy EFF's top 12 ways to protect your online privacy]. Stanton McCandlish, Electronic Frontier Foundation. Apr 10, 2002.&lt;br /&gt;
&lt;br /&gt;
===Social Search Services===&lt;br /&gt;
* [http://www.spock.com Spock People Search]. Spock.com.&lt;br /&gt;
* [http://www.mybackgroundcheck.com/AboutUs.aspx MyBackGroundCheck.com].&lt;br /&gt;
* [http://www.spokeo.com/hr Spokeo.com/hr]. &amp;quot;Want to see your candidates' profiles on MySpace and LinkedIn?&amp;quot;&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16749</id>
		<title>Social dossiers</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16749"/>
		<updated>2008-08-03T00:43:19Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Stalking */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Study Guide=&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
'''Ideas to consider:'''&lt;br /&gt;
# Availability of Data. (Secure? Private? Is it accessible to anyone? How do you limit information exclusively to its intended audience.)&lt;br /&gt;
# Accuracy. (Is there inaccurate data attached to your online identity?  Libel/Slander.  What if the facts are just wrong?)&lt;br /&gt;
# Anonymity.&lt;br /&gt;
# &amp;quot;They should have known better than to...&amp;quot;&lt;br /&gt;
# Search. Find. Link. -&amp;gt; Repeat. -&amp;gt; Compile: Summary judgment.&lt;br /&gt;
# Purpose.  Why do people investigate other people?  (Ex: Human Resources; Customer/Client/Vendor Relations; Obsession/Stalking; Criminal Prosecution; Civil Litigation;&lt;br /&gt;
&lt;br /&gt;
==Data availability==&lt;br /&gt;
Many websites (especially social media sites) allow users to create personal profiles; a substantial portion of those sites allow their content to be indexed by search-agents, and so any content created while using a site may potentially be located easily through basic search queries.  The information that is connected to a particular user varies widely and can include very basic information (name, age, gender, locale, etc.) and/or disturbingly detailed information (e.g. mySpaceUserXX aka &amp;quot;Jane Q. User&amp;quot; is single, bisexual, Hispanic, a Unitarian Universalist, an Aquarius, a self-professed alcoholic, works in Accounting/Finance, graduated from Anytown Community College in 2004, etc.).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Social Media Sites&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
!&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
! Types of Information&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*[http://www.facebook.com Facebook]&lt;br /&gt;
*[http://www.myspace.com Myspace]&lt;br /&gt;
*[http://www.linkedin.com LinkedIn]&lt;br /&gt;
*[http://www.friendster.com Friendster]&lt;br /&gt;
*[http://www.youtube.com YouTube]&lt;br /&gt;
*[http://www.digg.com Digg]&lt;br /&gt;
*[http://www.flickr.com Flickr]&lt;br /&gt;
|&lt;br /&gt;
*[http://www.photobucket.com Photobucket]&lt;br /&gt;
*[http://www.picasa.com Picasa]&lt;br /&gt;
*[http://www.twitter.com Twitter]&lt;br /&gt;
*[http://www.xanga.com Xanga]&lt;br /&gt;
*[http://www.livejournal.com Livejournal]&lt;br /&gt;
*[http://www.blogger.com Blogger]&lt;br /&gt;
*[http://www.deviantart.com Deviant Art]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
*Demographics&lt;br /&gt;
*Photographs&lt;br /&gt;
*Videos&lt;br /&gt;
*User Comments&lt;br /&gt;
*Cultural Interests&lt;br /&gt;
*Religion/Creed&lt;br /&gt;
*Political Views&lt;br /&gt;
|&lt;br /&gt;
*Sexual Orientiation&lt;br /&gt;
*Forum Discussions&lt;br /&gt;
*Work History&lt;br /&gt;
*Education History&lt;br /&gt;
*Favorite Videos&lt;br /&gt;
*Friends' Identities&lt;br /&gt;
*Offline Media Tastes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Aggregation motives==&lt;br /&gt;
&lt;br /&gt;
'''Potential Interested Parties:'''&lt;br /&gt;
* '''''Hiring:'''''  Human resources staff and job interviewers' hiring decisions may be influenced by what search-queries reveal. [http://accounting.smartpros.com/x54248.xml]  The legality and ethical issues of unofficial google-stalking of potential job candidates is currently under debate. [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php]&lt;br /&gt;
* '''''Criminal Prosecution:'''''  Prosecutors may use the content you post online to build their case against you; your own social media profile may serve as a character witness against you. [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html]&lt;br /&gt;
* '''''Business Contacts:''''' Sales professionals constantly distribute their business cards to prospective clients/customers, so it is foreseeable that a lack of understanding of web privacy by a sales representative (that uses social media sites) could lead to disastrous results for themselves or the company they represent.&lt;br /&gt;
* '''''Insurance Eligibility:''''' &amp;quot;I'm sorry, Mr. Jones, but according to your blog, the following conditions are pre-existing and will require a rider/exclusion for us to even consider giving you a quote...&amp;quot;&lt;br /&gt;
* '''''Stalkers:'''''  If you have a lot of information publicly available through social networking profiles, then you have no real defensive strategy against potential stalkers accessing that information.  Granted, dedicated stalkers would find a way to obtain sensitive information (e.g. course schedules, work schedule, friends' identities) without using the internet, but social media only increases opportunity and ease, therefore the likelihood of attracting stalkers.&lt;br /&gt;
&lt;br /&gt;
==Links &amp;amp; Resources==&lt;br /&gt;
&lt;br /&gt;
===Job Hunting===&lt;br /&gt;
* [http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html Facebook can ruin your life, and so can Myspace, Bebo...] Ida Bergstrom, ''The Independent''.  Feb 10, 2008.&lt;br /&gt;
* [http://www.time.com/time/business/article/0,8599,1649121,00.html Online snooping gets creepy]. Anita Hamilton, ''Time''. Aug 2, 2007.&lt;br /&gt;
* [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php Employers Using Facebook for Background Checking: Is It Legal?] George Lenard, George's Employment Blawg.&lt;br /&gt;
* [http://time-blog.com/work_in_progress/2008/05/googlestalking_your_interviewe.html Google-stalking your interviewer is smart]. Lisa Takeuchi Cullen, ''Time''. May 29, 2008.&lt;br /&gt;
* [http://accounting.smartpros.com/x54248.xml Employers Google Job Candidates, Check Social Networking Web Sites]. SmartPros. Aug 8, 2006.&lt;br /&gt;
&lt;br /&gt;
===In the courts===&lt;br /&gt;
* [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html Alleged DUI killer's MySpace profile depicts youth consumed with money, drugs and graffiti]. Stephanie Farr and Dafney Tales, ''Philadelphia Daily News''.  Jul 17, 2008.&lt;br /&gt;
*[http://ap.google.com/article/ALeqM5jC-5mkxddsdwxCN5_DwfLq3RqPmwD920TQK00 Web networking photos come back to bite defendants]. Eric Tucker, AP. Jul 19, 2008.&lt;br /&gt;
*[http://www.dailynexus.com/article.php?a=13440 Court case decision reveals dangers of networking sites]. Evan Wagstaff, Daily Nexus. Feb 28, 2007.&lt;br /&gt;
&lt;br /&gt;
===Stalking===&lt;br /&gt;
*[http://seattletimes.nwsource.com/html/living/2003845520_websnooping21.html Facebook makes it easy to &amp;quot;profile stalk&amp;quot;]. David Sarno, ''Los Angeles Times''.  Aug 21, 2007.&lt;br /&gt;
*[http://www.ncvc.org/src/main.aspx?dbID=DB_StalkingTechnology139 The Use of Technology to Stalk] from the Stalking Resource Center.&lt;br /&gt;
&lt;br /&gt;
===Privacy Resources===&lt;br /&gt;
* [http://www.slais.ubc.ca/COURSES/libr500/06-07-wt2/www2/S_Hintersteininger/home.htm Beyond the Job Interview: Unofficial Online Background Checks]. Stefan Hintersteininger. University of British Columbia. March 2007.&lt;br /&gt;
* [http://epic.org/privacy/tools.html EPIC online guide to practical privacy tools]. Electronic Privacy Information Center.&lt;br /&gt;
* [http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy EFF's top 12 ways to protect your online privacy]. Stanton McCandlish, Electronic Frontier Foundation. Apr 10, 2002.&lt;br /&gt;
&lt;br /&gt;
===Social Search Services===&lt;br /&gt;
* [http://www.spock.com Spock People Search]. Spock.com.&lt;br /&gt;
* [http://www.mybackgroundcheck.com/AboutUs.aspx MyBackGroundCheck.com].&lt;br /&gt;
* [http://www.spokeo.com/hr Spokeo.com/hr]. &amp;quot;Want to see your candidates' profiles on MySpace and LinkedIn?&amp;quot;&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16748</id>
		<title>Social dossiers</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16748"/>
		<updated>2008-08-03T00:38:09Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Links &amp;amp; Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Study Guide=&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
'''Ideas to consider:'''&lt;br /&gt;
# Availability of Data. (Secure? Private? Is it accessible to anyone? How do you limit information exclusively to its intended audience.)&lt;br /&gt;
# Accuracy. (Is there inaccurate data attached to your online identity?  Libel/Slander.  What if the facts are just wrong?)&lt;br /&gt;
# Anonymity.&lt;br /&gt;
# &amp;quot;They should have known better than to...&amp;quot;&lt;br /&gt;
# Search. Find. Link. -&amp;gt; Repeat. -&amp;gt; Compile: Summary judgment.&lt;br /&gt;
# Purpose.  Why do people investigate other people?  (Ex: Human Resources; Customer/Client/Vendor Relations; Obsession/Stalking; Criminal Prosecution; Civil Litigation;&lt;br /&gt;
&lt;br /&gt;
==Data availability==&lt;br /&gt;
Many websites (especially social media sites) allow users to create personal profiles; a substantial portion of those sites allow their content to be indexed by search-agents, and so any content created while using a site may potentially be located easily through basic search queries.  The information that is connected to a particular user varies widely and can include very basic information (name, age, gender, locale, etc.) and/or disturbingly detailed information (e.g. mySpaceUserXX aka &amp;quot;Jane Q. User&amp;quot; is single, bisexual, Hispanic, a Unitarian Universalist, an Aquarius, a self-professed alcoholic, works in Accounting/Finance, graduated from Anytown Community College in 2004, etc.).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Social Media Sites&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
!&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
! Types of Information&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*[http://www.facebook.com Facebook]&lt;br /&gt;
*[http://www.myspace.com Myspace]&lt;br /&gt;
*[http://www.linkedin.com LinkedIn]&lt;br /&gt;
*[http://www.friendster.com Friendster]&lt;br /&gt;
*[http://www.youtube.com YouTube]&lt;br /&gt;
*[http://www.digg.com Digg]&lt;br /&gt;
*[http://www.flickr.com Flickr]&lt;br /&gt;
|&lt;br /&gt;
*[http://www.photobucket.com Photobucket]&lt;br /&gt;
*[http://www.picasa.com Picasa]&lt;br /&gt;
*[http://www.twitter.com Twitter]&lt;br /&gt;
*[http://www.xanga.com Xanga]&lt;br /&gt;
*[http://www.livejournal.com Livejournal]&lt;br /&gt;
*[http://www.blogger.com Blogger]&lt;br /&gt;
*[http://www.deviantart.com Deviant Art]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
*Demographics&lt;br /&gt;
*Photographs&lt;br /&gt;
*Videos&lt;br /&gt;
*User Comments&lt;br /&gt;
*Cultural Interests&lt;br /&gt;
*Religion/Creed&lt;br /&gt;
*Political Views&lt;br /&gt;
|&lt;br /&gt;
*Sexual Orientiation&lt;br /&gt;
*Forum Discussions&lt;br /&gt;
*Work History&lt;br /&gt;
*Education History&lt;br /&gt;
*Favorite Videos&lt;br /&gt;
*Friends' Identities&lt;br /&gt;
*Offline Media Tastes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Aggregation motives==&lt;br /&gt;
&lt;br /&gt;
'''Potential Interested Parties:'''&lt;br /&gt;
* '''''Hiring:'''''  Human resources staff and job interviewers' hiring decisions may be influenced by what search-queries reveal. [http://accounting.smartpros.com/x54248.xml]  The legality and ethical issues of unofficial google-stalking of potential job candidates is currently under debate. [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php]&lt;br /&gt;
* '''''Criminal Prosecution:'''''  Prosecutors may use the content you post online to build their case against you; your own social media profile may serve as a character witness against you. [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html]&lt;br /&gt;
* '''''Business Contacts:''''' Sales professionals constantly distribute their business cards to prospective clients/customers, so it is foreseeable that a lack of understanding of web privacy by a sales representative (that uses social media sites) could lead to disastrous results for themselves or the company they represent.&lt;br /&gt;
* '''''Insurance Eligibility:''''' &amp;quot;I'm sorry, Mr. Jones, but according to your blog, the following conditions are pre-existing and will require a rider/exclusion for us to even consider giving you a quote...&amp;quot;&lt;br /&gt;
* '''''Stalkers:'''''  If you have a lot of information publicly available through social networking profiles, then you have no real defensive strategy against potential stalkers accessing that information.  Granted, dedicated stalkers would find a way to obtain sensitive information (e.g. course schedules, work schedule, friends' identities) without using the internet, but social media only increases opportunity and ease, therefore the likelihood of attracting stalkers.&lt;br /&gt;
&lt;br /&gt;
==Links &amp;amp; Resources==&lt;br /&gt;
&lt;br /&gt;
===Job Hunting===&lt;br /&gt;
* [http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html Facebook can ruin your life, and so can Myspace, Bebo...] Ida Bergstrom, ''The Independent''.  Feb 10, 2008.&lt;br /&gt;
* [http://www.time.com/time/business/article/0,8599,1649121,00.html Online snooping gets creepy]. Anita Hamilton, ''Time''. Aug 2, 2007.&lt;br /&gt;
* [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php Employers Using Facebook for Background Checking: Is It Legal?] George Lenard, George's Employment Blawg.&lt;br /&gt;
* [http://time-blog.com/work_in_progress/2008/05/googlestalking_your_interviewe.html Google-stalking your interviewer is smart]. Lisa Takeuchi Cullen, ''Time''. May 29, 2008.&lt;br /&gt;
* [http://accounting.smartpros.com/x54248.xml Employers Google Job Candidates, Check Social Networking Web Sites]. SmartPros. Aug 8, 2006.&lt;br /&gt;
&lt;br /&gt;
===In the courts===&lt;br /&gt;
* [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html Alleged DUI killer's MySpace profile depicts youth consumed with money, drugs and graffiti]. Stephanie Farr and Dafney Tales, ''Philadelphia Daily News''.  Jul 17, 2008.&lt;br /&gt;
*[http://ap.google.com/article/ALeqM5jC-5mkxddsdwxCN5_DwfLq3RqPmwD920TQK00 Web networking photos come back to bite defendants]. Eric Tucker, AP. Jul 19, 2008.&lt;br /&gt;
*[http://www.dailynexus.com/article.php?a=13440 Court case decision reveals dangers of networking sites]. Evan Wagstaff, Daily Nexus. Feb 28, 2007.&lt;br /&gt;
&lt;br /&gt;
===Stalking===&lt;br /&gt;
*[http://seattletimes.nwsource.com/html/living/2003845520_websnooping21.html Facebook makes it easy to &amp;quot;profile stalk&amp;quot;]. David Sarno, ''Los Angeles Times''.  Aug 21, 2007.&lt;br /&gt;
&lt;br /&gt;
===Privacy Resources===&lt;br /&gt;
* [http://www.slais.ubc.ca/COURSES/libr500/06-07-wt2/www2/S_Hintersteininger/home.htm Beyond the Job Interview: Unofficial Online Background Checks]. Stefan Hintersteininger. University of British Columbia. March 2007.&lt;br /&gt;
* [http://epic.org/privacy/tools.html EPIC online guide to practical privacy tools]. Electronic Privacy Information Center.&lt;br /&gt;
* [http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy EFF's top 12 ways to protect your online privacy]. Stanton McCandlish, Electronic Frontier Foundation. Apr 10, 2002.&lt;br /&gt;
&lt;br /&gt;
===Social Search Services===&lt;br /&gt;
* [http://www.spock.com Spock People Search]. Spock.com.&lt;br /&gt;
* [http://www.mybackgroundcheck.com/AboutUs.aspx MyBackGroundCheck.com].&lt;br /&gt;
* [http://www.spokeo.com/hr Spokeo.com/hr]. &amp;quot;Want to see your candidates' profiles on MySpace and LinkedIn?&amp;quot;&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16747</id>
		<title>Social dossiers</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16747"/>
		<updated>2008-08-03T00:32:50Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* In the courts */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Study Guide=&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
'''Ideas to consider:'''&lt;br /&gt;
# Availability of Data. (Secure? Private? Is it accessible to anyone? How do you limit information exclusively to its intended audience.)&lt;br /&gt;
# Accuracy. (Is there inaccurate data attached to your online identity?  Libel/Slander.  What if the facts are just wrong?)&lt;br /&gt;
# Anonymity.&lt;br /&gt;
# &amp;quot;They should have known better than to...&amp;quot;&lt;br /&gt;
# Search. Find. Link. -&amp;gt; Repeat. -&amp;gt; Compile: Summary judgment.&lt;br /&gt;
# Purpose.  Why do people investigate other people?  (Ex: Human Resources; Customer/Client/Vendor Relations; Obsession/Stalking; Criminal Prosecution; Civil Litigation;&lt;br /&gt;
&lt;br /&gt;
==Data availability==&lt;br /&gt;
Many websites (especially social media sites) allow users to create personal profiles; a substantial portion of those sites allow their content to be indexed by search-agents, and so any content created while using a site may potentially be located easily through basic search queries.  The information that is connected to a particular user varies widely and can include very basic information (name, age, gender, locale, etc.) and/or disturbingly detailed information (e.g. mySpaceUserXX aka &amp;quot;Jane Q. User&amp;quot; is single, bisexual, Hispanic, a Unitarian Universalist, an Aquarius, a self-professed alcoholic, works in Accounting/Finance, graduated from Anytown Community College in 2004, etc.).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Social Media Sites&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
!&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
! Types of Information&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*[http://www.facebook.com Facebook]&lt;br /&gt;
*[http://www.myspace.com Myspace]&lt;br /&gt;
*[http://www.linkedin.com LinkedIn]&lt;br /&gt;
*[http://www.friendster.com Friendster]&lt;br /&gt;
*[http://www.youtube.com YouTube]&lt;br /&gt;
*[http://www.digg.com Digg]&lt;br /&gt;
*[http://www.flickr.com Flickr]&lt;br /&gt;
|&lt;br /&gt;
*[http://www.photobucket.com Photobucket]&lt;br /&gt;
*[http://www.picasa.com Picasa]&lt;br /&gt;
*[http://www.twitter.com Twitter]&lt;br /&gt;
*[http://www.xanga.com Xanga]&lt;br /&gt;
*[http://www.livejournal.com Livejournal]&lt;br /&gt;
*[http://www.blogger.com Blogger]&lt;br /&gt;
*[http://www.deviantart.com Deviant Art]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
*Demographics&lt;br /&gt;
*Photographs&lt;br /&gt;
*Videos&lt;br /&gt;
*User Comments&lt;br /&gt;
*Cultural Interests&lt;br /&gt;
*Religion/Creed&lt;br /&gt;
*Political Views&lt;br /&gt;
|&lt;br /&gt;
*Sexual Orientiation&lt;br /&gt;
*Forum Discussions&lt;br /&gt;
*Work History&lt;br /&gt;
*Education History&lt;br /&gt;
*Favorite Videos&lt;br /&gt;
*Friends' Identities&lt;br /&gt;
*Offline Media Tastes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Aggregation motives==&lt;br /&gt;
&lt;br /&gt;
'''Potential Interested Parties:'''&lt;br /&gt;
* '''''Hiring:'''''  Human resources staff and job interviewers' hiring decisions may be influenced by what search-queries reveal. [http://accounting.smartpros.com/x54248.xml]  The legality and ethical issues of unofficial google-stalking of potential job candidates is currently under debate. [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php]&lt;br /&gt;
* '''''Criminal Prosecution:'''''  Prosecutors may use the content you post online to build their case against you; your own social media profile may serve as a character witness against you. [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html]&lt;br /&gt;
* '''''Business Contacts:''''' Sales professionals constantly distribute their business cards to prospective clients/customers, so it is foreseeable that a lack of understanding of web privacy by a sales representative (that uses social media sites) could lead to disastrous results for themselves or the company they represent.&lt;br /&gt;
* '''''Insurance Eligibility:''''' &amp;quot;I'm sorry, Mr. Jones, but according to your blog, the following conditions are pre-existing and will require a rider/exclusion for us to even consider giving you a quote...&amp;quot;&lt;br /&gt;
* '''''Stalkers:'''''  If you have a lot of information publicly available through social networking profiles, then you have no real defensive strategy against potential stalkers accessing that information.  Granted, dedicated stalkers would find a way to obtain sensitive information (e.g. course schedules, work schedule, friends' identities) without using the internet, but social media only increases opportunity and ease, therefore the likelihood of attracting stalkers.&lt;br /&gt;
&lt;br /&gt;
==Links &amp;amp; Resources==&lt;br /&gt;
&lt;br /&gt;
===Job Hunting===&lt;br /&gt;
* [http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html Facebook can ruin your life, and so can Myspace, Bebo...] Ida Bergstrom, ''The Independent''.  Feb 10, 2008.&lt;br /&gt;
* [http://www.time.com/time/business/article/0,8599,1649121,00.html Online snooping gets creepy]. Anita Hamilton, ''Time''. Aug 2, 2007.&lt;br /&gt;
* [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php Employers Using Facebook for Background Checking: Is It Legal?] George Lenard, George's Employment Blawg.&lt;br /&gt;
* [http://time-blog.com/work_in_progress/2008/05/googlestalking_your_interviewe.html Google-stalking your interviewer is smart]. Lisa Takeuchi Cullen, ''Time''. May 29, 2008.&lt;br /&gt;
* [http://accounting.smartpros.com/x54248.xml Employers Google Job Candidates, Check Social Networking Web Sites]. SmartPros. Aug 8, 2006.&lt;br /&gt;
&lt;br /&gt;
===In the courts===&lt;br /&gt;
* [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html Alleged DUI killer's MySpace profile depicts youth consumed with money, drugs and graffiti]. Stephanie Farr and Dafney Tales, ''Philadelphia Daily News''.  Jul 17, 2008.&lt;br /&gt;
*[http://ap.google.com/article/ALeqM5jC-5mkxddsdwxCN5_DwfLq3RqPmwD920TQK00 Web networking photos come back to bite defendants]. Eric Tucker, AP. Jul 19, 2008.&lt;br /&gt;
*[http://www.dailynexus.com/article.php?a=13440 Court case decision reveals dangers of networking sites]. Evan Wagstaff, Daily Nexus. Feb 28, 2007.&lt;br /&gt;
&lt;br /&gt;
===Privacy Resources===&lt;br /&gt;
* [http://www.slais.ubc.ca/COURSES/libr500/06-07-wt2/www2/S_Hintersteininger/home.htm Beyond the Job Interview: Unofficial Online Background Checks]. Stefan Hintersteininger. University of British Columbia. March 2007.&lt;br /&gt;
* [http://epic.org/privacy/tools.html EPIC online guide to practical privacy tools]. Electronic Privacy Information Center.&lt;br /&gt;
* [http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy EFF's top 12 ways to protect your online privacy]. Stanton McCandlish, Electronic Frontier Foundation. Apr 10, 2002.&lt;br /&gt;
&lt;br /&gt;
===Social Search Services===&lt;br /&gt;
* [http://www.spock.com Spock People Search]. Spock.com.&lt;br /&gt;
* [http://www.mybackgroundcheck.com/AboutUs.aspx MyBackGroundCheck.com].&lt;br /&gt;
* [http://www.spokeo.com/hr Spokeo.com/hr]. &amp;quot;Want to see your candidates' profiles on MySpace and LinkedIn?&amp;quot;&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16746</id>
		<title>Social dossiers</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16746"/>
		<updated>2008-08-03T00:23:17Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Other Links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Study Guide=&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
'''Ideas to consider:'''&lt;br /&gt;
# Availability of Data. (Secure? Private? Is it accessible to anyone? How do you limit information exclusively to its intended audience.)&lt;br /&gt;
# Accuracy. (Is there inaccurate data attached to your online identity?  Libel/Slander.  What if the facts are just wrong?)&lt;br /&gt;
# Anonymity.&lt;br /&gt;
# &amp;quot;They should have known better than to...&amp;quot;&lt;br /&gt;
# Search. Find. Link. -&amp;gt; Repeat. -&amp;gt; Compile: Summary judgment.&lt;br /&gt;
# Purpose.  Why do people investigate other people?  (Ex: Human Resources; Customer/Client/Vendor Relations; Obsession/Stalking; Criminal Prosecution; Civil Litigation;&lt;br /&gt;
&lt;br /&gt;
==Data availability==&lt;br /&gt;
Many websites (especially social media sites) allow users to create personal profiles; a substantial portion of those sites allow their content to be indexed by search-agents, and so any content created while using a site may potentially be located easily through basic search queries.  The information that is connected to a particular user varies widely and can include very basic information (name, age, gender, locale, etc.) and/or disturbingly detailed information (e.g. mySpaceUserXX aka &amp;quot;Jane Q. User&amp;quot; is single, bisexual, Hispanic, a Unitarian Universalist, an Aquarius, a self-professed alcoholic, works in Accounting/Finance, graduated from Anytown Community College in 2004, etc.).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Social Media Sites&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
!&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
! Types of Information&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*[http://www.facebook.com Facebook]&lt;br /&gt;
*[http://www.myspace.com Myspace]&lt;br /&gt;
*[http://www.linkedin.com LinkedIn]&lt;br /&gt;
*[http://www.friendster.com Friendster]&lt;br /&gt;
*[http://www.youtube.com YouTube]&lt;br /&gt;
*[http://www.digg.com Digg]&lt;br /&gt;
*[http://www.flickr.com Flickr]&lt;br /&gt;
|&lt;br /&gt;
*[http://www.photobucket.com Photobucket]&lt;br /&gt;
*[http://www.picasa.com Picasa]&lt;br /&gt;
*[http://www.twitter.com Twitter]&lt;br /&gt;
*[http://www.xanga.com Xanga]&lt;br /&gt;
*[http://www.livejournal.com Livejournal]&lt;br /&gt;
*[http://www.blogger.com Blogger]&lt;br /&gt;
*[http://www.deviantart.com Deviant Art]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
*Demographics&lt;br /&gt;
*Photographs&lt;br /&gt;
*Videos&lt;br /&gt;
*User Comments&lt;br /&gt;
*Cultural Interests&lt;br /&gt;
*Religion/Creed&lt;br /&gt;
*Political Views&lt;br /&gt;
|&lt;br /&gt;
*Sexual Orientiation&lt;br /&gt;
*Forum Discussions&lt;br /&gt;
*Work History&lt;br /&gt;
*Education History&lt;br /&gt;
*Favorite Videos&lt;br /&gt;
*Friends' Identities&lt;br /&gt;
*Offline Media Tastes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Aggregation motives==&lt;br /&gt;
&lt;br /&gt;
'''Potential Interested Parties:'''&lt;br /&gt;
* '''''Hiring:'''''  Human resources staff and job interviewers' hiring decisions may be influenced by what search-queries reveal. [http://accounting.smartpros.com/x54248.xml]  The legality and ethical issues of unofficial google-stalking of potential job candidates is currently under debate. [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php]&lt;br /&gt;
* '''''Criminal Prosecution:'''''  Prosecutors may use the content you post online to build their case against you; your own social media profile may serve as a character witness against you. [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html]&lt;br /&gt;
* '''''Business Contacts:''''' Sales professionals constantly distribute their business cards to prospective clients/customers, so it is foreseeable that a lack of understanding of web privacy by a sales representative (that uses social media sites) could lead to disastrous results for themselves or the company they represent.&lt;br /&gt;
* '''''Insurance Eligibility:''''' &amp;quot;I'm sorry, Mr. Jones, but according to your blog, the following conditions are pre-existing and will require a rider/exclusion for us to even consider giving you a quote...&amp;quot;&lt;br /&gt;
* '''''Stalkers:'''''  If you have a lot of information publicly available through social networking profiles, then you have no real defensive strategy against potential stalkers accessing that information.  Granted, dedicated stalkers would find a way to obtain sensitive information (e.g. course schedules, work schedule, friends' identities) without using the internet, but social media only increases opportunity and ease, therefore the likelihood of attracting stalkers.&lt;br /&gt;
&lt;br /&gt;
==Links &amp;amp; Resources==&lt;br /&gt;
&lt;br /&gt;
===Job Hunting===&lt;br /&gt;
* [http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html Facebook can ruin your life, and so can Myspace, Bebo...] Ida Bergstrom, ''The Independent''.  Feb 10, 2008.&lt;br /&gt;
* [http://www.time.com/time/business/article/0,8599,1649121,00.html Online snooping gets creepy]. Anita Hamilton, ''Time''. Aug 2, 2007.&lt;br /&gt;
* [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php Employers Using Facebook for Background Checking: Is It Legal?] George Lenard, George's Employment Blawg.&lt;br /&gt;
* [http://time-blog.com/work_in_progress/2008/05/googlestalking_your_interviewe.html Google-stalking your interviewer is smart]. Lisa Takeuchi Cullen, ''Time''. May 29, 2008.&lt;br /&gt;
* [http://accounting.smartpros.com/x54248.xml Employers Google Job Candidates, Check Social Networking Web Sites]. SmartPros. Aug 8, 2006.&lt;br /&gt;
&lt;br /&gt;
===In the courts===&lt;br /&gt;
* [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html Alleged DUI killer's MySpace profile depicts youth consumed with money, drugs and graffiti]. Stephanie Farr and Dafney Tales, ''Philadelphia Daily News''.  Jul 17, 2008.&lt;br /&gt;
&lt;br /&gt;
===Privacy Resources===&lt;br /&gt;
* [http://www.slais.ubc.ca/COURSES/libr500/06-07-wt2/www2/S_Hintersteininger/home.htm Beyond the Job Interview: Unofficial Online Background Checks]. Stefan Hintersteininger. University of British Columbia. March 2007.&lt;br /&gt;
* [http://epic.org/privacy/tools.html EPIC online guide to practical privacy tools]. Electronic Privacy Information Center.&lt;br /&gt;
* [http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy EFF's top 12 ways to protect your online privacy]. Stanton McCandlish, Electronic Frontier Foundation. Apr 10, 2002.&lt;br /&gt;
&lt;br /&gt;
===Social Search Services===&lt;br /&gt;
* [http://www.spock.com Spock People Search]. Spock.com.&lt;br /&gt;
* [http://www.mybackgroundcheck.com/AboutUs.aspx MyBackGroundCheck.com].&lt;br /&gt;
* [http://www.spokeo.com/hr Spokeo.com/hr]. &amp;quot;Want to see your candidates' profiles on MySpace and LinkedIn?&amp;quot;&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16745</id>
		<title>Social dossiers</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_dossiers&amp;diff=16745"/>
		<updated>2008-08-03T00:22:05Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: /* Articles of Interest */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Study Guide=&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
'''Ideas to consider:'''&lt;br /&gt;
# Availability of Data. (Secure? Private? Is it accessible to anyone? How do you limit information exclusively to its intended audience.)&lt;br /&gt;
# Accuracy. (Is there inaccurate data attached to your online identity?  Libel/Slander.  What if the facts are just wrong?)&lt;br /&gt;
# Anonymity.&lt;br /&gt;
# &amp;quot;They should have known better than to...&amp;quot;&lt;br /&gt;
# Search. Find. Link. -&amp;gt; Repeat. -&amp;gt; Compile: Summary judgment.&lt;br /&gt;
# Purpose.  Why do people investigate other people?  (Ex: Human Resources; Customer/Client/Vendor Relations; Obsession/Stalking; Criminal Prosecution; Civil Litigation;&lt;br /&gt;
&lt;br /&gt;
==Data availability==&lt;br /&gt;
Many websites (especially social media sites) allow users to create personal profiles; a substantial portion of those sites allow their content to be indexed by search-agents, and so any content created while using a site may potentially be located easily through basic search queries.  The information that is connected to a particular user varies widely and can include very basic information (name, age, gender, locale, etc.) and/or disturbingly detailed information (e.g. mySpaceUserXX aka &amp;quot;Jane Q. User&amp;quot; is single, bisexual, Hispanic, a Unitarian Universalist, an Aquarius, a self-professed alcoholic, works in Accounting/Finance, graduated from Anytown Community College in 2004, etc.).&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Social Media Sites&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
!&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
! Types of Information&lt;br /&gt;
!&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
*[http://www.facebook.com Facebook]&lt;br /&gt;
*[http://www.myspace.com Myspace]&lt;br /&gt;
*[http://www.linkedin.com LinkedIn]&lt;br /&gt;
*[http://www.friendster.com Friendster]&lt;br /&gt;
*[http://www.youtube.com YouTube]&lt;br /&gt;
*[http://www.digg.com Digg]&lt;br /&gt;
*[http://www.flickr.com Flickr]&lt;br /&gt;
|&lt;br /&gt;
*[http://www.photobucket.com Photobucket]&lt;br /&gt;
*[http://www.picasa.com Picasa]&lt;br /&gt;
*[http://www.twitter.com Twitter]&lt;br /&gt;
*[http://www.xanga.com Xanga]&lt;br /&gt;
*[http://www.livejournal.com Livejournal]&lt;br /&gt;
*[http://www.blogger.com Blogger]&lt;br /&gt;
*[http://www.deviantart.com Deviant Art]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
*Demographics&lt;br /&gt;
*Photographs&lt;br /&gt;
*Videos&lt;br /&gt;
*User Comments&lt;br /&gt;
*Cultural Interests&lt;br /&gt;
*Religion/Creed&lt;br /&gt;
*Political Views&lt;br /&gt;
|&lt;br /&gt;
*Sexual Orientiation&lt;br /&gt;
*Forum Discussions&lt;br /&gt;
*Work History&lt;br /&gt;
*Education History&lt;br /&gt;
*Favorite Videos&lt;br /&gt;
*Friends' Identities&lt;br /&gt;
*Offline Media Tastes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Aggregation motives==&lt;br /&gt;
&lt;br /&gt;
'''Potential Interested Parties:'''&lt;br /&gt;
* '''''Hiring:'''''  Human resources staff and job interviewers' hiring decisions may be influenced by what search-queries reveal. [http://accounting.smartpros.com/x54248.xml]  The legality and ethical issues of unofficial google-stalking of potential job candidates is currently under debate. [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php]&lt;br /&gt;
* '''''Criminal Prosecution:'''''  Prosecutors may use the content you post online to build their case against you; your own social media profile may serve as a character witness against you. [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html]&lt;br /&gt;
* '''''Business Contacts:''''' Sales professionals constantly distribute their business cards to prospective clients/customers, so it is foreseeable that a lack of understanding of web privacy by a sales representative (that uses social media sites) could lead to disastrous results for themselves or the company they represent.&lt;br /&gt;
* '''''Insurance Eligibility:''''' &amp;quot;I'm sorry, Mr. Jones, but according to your blog, the following conditions are pre-existing and will require a rider/exclusion for us to even consider giving you a quote...&amp;quot;&lt;br /&gt;
* '''''Stalkers:'''''  If you have a lot of information publicly available through social networking profiles, then you have no real defensive strategy against potential stalkers accessing that information.  Granted, dedicated stalkers would find a way to obtain sensitive information (e.g. course schedules, work schedule, friends' identities) without using the internet, but social media only increases opportunity and ease, therefore the likelihood of attracting stalkers.&lt;br /&gt;
&lt;br /&gt;
==Links &amp;amp; Resources==&lt;br /&gt;
&lt;br /&gt;
===Job Hunting===&lt;br /&gt;
* [http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html Facebook can ruin your life, and so can Myspace, Bebo...] Ida Bergstrom, ''The Independent''.  Feb 10, 2008.&lt;br /&gt;
* [http://www.time.com/time/business/article/0,8599,1649121,00.html Online snooping gets creepy]. Anita Hamilton, ''Time''. Aug 2, 2007.&lt;br /&gt;
* [http://www.collegerecruiter.com/weblog/2006/09/employers_using.php Employers Using Facebook for Background Checking: Is It Legal?] George Lenard, George's Employment Blawg.&lt;br /&gt;
* [http://time-blog.com/work_in_progress/2008/05/googlestalking_your_interviewe.html Google-stalking your interviewer is smart]. Lisa Takeuchi Cullen, ''Time''. May 29, 2008.&lt;br /&gt;
* [http://accounting.smartpros.com/x54248.xml Employers Google Job Candidates, Check Social Networking Web Sites]. SmartPros. Aug 8, 2006.&lt;br /&gt;
&lt;br /&gt;
===In the courts===&lt;br /&gt;
* [http://www.philly.com/philly/hp/news_update/20080717_Alleged_DUI_killer_s_MySpace_profile_depicts_youth_consumed_with_money__drugs_and_graffiti.html Alleged DUI killer's MySpace profile depicts youth consumed with money, drugs and graffiti]. Stephanie Farr and Dafney Tales, ''Philadelphia Daily News''.  Jul 17, 2008.&lt;br /&gt;
&lt;br /&gt;
===Privacy Resources===&lt;br /&gt;
* [http://www.slais.ubc.ca/COURSES/libr500/06-07-wt2/www2/S_Hintersteininger/home.htm Beyond the Job Interview: Unofficial Online Background Checks]. Stefan Hintersteininger. University of British Columbia. March 2007.&lt;br /&gt;
* [http://epic.org/privacy/tools.html EPIC online guide to practical privacy tools]. Electronic Privacy Information Center.&lt;br /&gt;
* [http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy EFF's top 12 ways to protect your online privacy]. Stanton McCandlish, Electronic Frontier Foundation. Apr 10, 2002.&lt;br /&gt;
&lt;br /&gt;
===Other Links===&lt;br /&gt;
* [http://www.spock.com Spock People Search]. Spock.com.&lt;br /&gt;
* [http://www.mybackgroundcheck.com/AboutUs.aspx MyBackGroundCheck.com].&lt;br /&gt;
* [http://www.spokeo.com/hr Spokeo.com/hr]. &amp;quot;Want to see your candidates' profiles on MySpace and LinkedIn?&amp;quot;&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Talk:Social_dossiers&amp;diff=16744</id>
		<title>Talk:Social dossiers</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Talk:Social_dossiers&amp;diff=16744"/>
		<updated>2008-08-03T00:10:59Z</updated>

		<summary type="html">&lt;p&gt;Jcsmith2: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*There should be a link to the topic description.&lt;br /&gt;
*There need to be more links, perhaps two dozen instead of one dozen.&lt;br /&gt;
*{identification of issues} Some, e.g., use in hiring. But the study guide says very little about it; you have to follow the links. &lt;br /&gt;
*Differing viewpoints are not really identified, unless you read the articles linked to.&lt;br /&gt;
*&amp;quot;Articles of interest&amp;quot; is too vague; one of the headings should certainly be &amp;quot;Job Hunting&amp;quot;&lt;br /&gt;
*{identification of issues} It probably mentions them somewhere, but does not really identify them as ethical issues.&lt;br /&gt;
&lt;br /&gt;
*The study guide does not read as a narrative, but rather as a set of related paragraphs. There should be topic sentences, explaining why lists of issues have been aggregated together.&lt;/div&gt;</summary>
		<author><name>Jcsmith2</name></author>
	</entry>
</feed>