<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.expertiza.ncsu.edu/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Naprinci</id>
	<title>Expertiza_Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.expertiza.ncsu.edu/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Naprinci"/>
	<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Special:Contributions/Naprinci"/>
	<updated>2026-05-17T12:32:27Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.41.0</generator>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_1&amp;diff=2146</id>
		<title>CSC 379:Week 5, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_1&amp;diff=2146"/>
		<updated>2007-08-05T02:06:59Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Airbus 380 Software Flaw=&lt;br /&gt;
'''Provide an overview of this ethical controversy and links to information relevant for each set of ethical concerns cited.'''&lt;br /&gt;
&lt;br /&gt;
'''Cover information contained in both articles:'''&lt;br /&gt;
* [http://seattletimes.nwsource.com/html/boeingaerospace/2002534201_airbuswhistleblower02.html Seattle Times]&lt;br /&gt;
* [http://www.telegraph.co.uk/money/main.jhtml?xml=/money/2005/10/15/ccairb15.xml Telegraph.co.uk]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Included below are two excerpts that give an overview of the content of this topic:'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Mr Mangan claims a defect in the outflow valve control system could lead to an abrupt loss of cabin pressure, leaving passengers unconscious in as little as 20 seconds. &amp;quot;Normal oxygen masks don't work properly above 33,000 feet. Anybody over forty or over-weight is at a high risk of embolisms,&amp;quot; he said.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Airbus dismissed fears about the A380 as baseless. &amp;quot;We have examined this internally and found absolutely no reason to be concerned. The scenario made up by Mr Mangan does not exist,&amp;quot; said spokesman David Voskuhl.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;TTTech falsely classified its micro-chip as a simple &amp;quot;off-the-shelf&amp;quot; product already used in car valves in order to except it from elaborate testing rules, he claimed. This would breach both EU and US law on aircraft regulation. &amp;quot;I refused to sign off on the test results, but TTTech went ahead anyway,&amp;quot; he claimed.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;TTTech denies the allegations, calling him a disgruntled ex-employee who never fitted into the team, and is now bent on revenge.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source: [http://www.telegraph.co.uk/money/main.jhtml?xml=/money/2005/10/15/ccairb15.xml Telegraph.co.uk]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Most passenger jets have two cabin-pressure valves, with separate motors operating each. But because aircraft makers want redundancy on safety systems the planes have three motors for each valve, with different chips controlling each motor. [...] Most jetliners also have a manual override so that the pilot can take control in an emergency. [...] The company elected to go with four outflow valves on the A380, with only one motor on each valve, which are slightly larger than a cabin window. Each motor uses a TTTech controller chip, and there is no backup manual-override system.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Mangan says the European aerospace establishment is whitewashing his claims because of enormous cost savings that will be realized if TTTech's chips are approved for the A380. &lt;br /&gt;
TTTech's chip originally was designed for use in autos and the company is trying to get it certified as an existing, &amp;quot;commercial off-the-shelf&amp;quot; product that is acceptable for the A380, according to court records.&lt;br /&gt;
Mangan, however, alleges that the chip is being customized for aviation purposes, and thus must undergo stringent testing before being approved by regulators.&lt;br /&gt;
If regulators decide that TTTech's chip is a simple commercial device and can be used in the A380, it would then be available for other new aircraft without having to pass costly safety reviews.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source: [http://seattletimes.nwsource.com/html/boeingaerospace/2002534201_airbuswhistleblower02.html Seattle Times]&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
====History====&lt;br /&gt;
Joseph Mangan, a former employee of TTTech Computertechnik, blew the whistle on Airbus and TTTech regarding the safety of the cabin pressure system on the Airbus A380 aircraft in September 2004 by contacting the European Aviation Safety Agency (EASA). TTTech supplies some components to Airbus for the A380, and has been accused by Mangan of &amp;quot;intentional non-compliance&amp;quot; with aviation safety rules, at least partially because they were under great pressure from Airbus to meet deadlines.&lt;br /&gt;
&lt;br /&gt;
Mangan claimed that a flaw existed in the outflow valve control system, which uses TTTech controllers, that could result in a sudden loss of air pressure in the cabin. Such a loss of air pressure would result in passengers quickly losing consciousness, with other possible health consequences. One of the primary concerns generated by this claim was the lack of different backup systems to prevent the same problem from affecting all the valves at the same time.&lt;br /&gt;
&lt;br /&gt;
====Results of the Whistleblowing====&lt;br /&gt;
Airbus and TTTech both denied there was a problem - TTTech went further by accusing Mangan of being a disgruntled ex-employee trying to get revenge. The EASA found that TTTech was not in compliance with safety rules and was not conducting appropriate tests, and the microchip at the heart of the controversy was deemed unacceptable: in the end EASA told Airbus to resolve the problem before the A380's final certification.&lt;br /&gt;
&lt;br /&gt;
Within a few days of reporting the suspected violations at TTTech, Mangan was fired and sued for defamation. TTTech also obtained a gag order, which Mangan then violated. Many of Mangan's difficulties stem from the lack of Austrian laws protecting whistle-blowers from retribution by their employers. Mangan has tried to get a new job, but has not been able to get a response from companies in the aerospace industry.&lt;br /&gt;
&lt;br /&gt;
==Table of Contents==&lt;br /&gt;
&amp;lt;h3&amp;gt;General&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.csl.sri.com/users/neumann/air.html Computer Security in Aviation: Vulnerabilities, Threats, and Risks]&lt;br /&gt;
    Peter G. Neumann &amp;lt;em&amp;gt;SRI Computer Science Laboratory&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://sunnyday.mit.edu/papers/smcit.doc Fault Protection in a Component-Based Spacecraft Architecture]&lt;br /&gt;
&lt;br /&gt;
    Elwin C. Ong and Nancy G. Leveson &amp;lt;em&amp;gt;MIT&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;!--&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.ece.cmu.edu/%7Ekoopman/des_s99/sw_reliability/#concepts&amp;quot;&amp;gt;&lt;br /&gt;
    Software Reliability&amp;lt;/a&amp;gt;&lt;br /&gt;
    Jiantao Pan &amp;lt;em&amp;gt;Carnegie Mellon University&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;--&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Conflicting Views&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.newyorker.com/archive/2006/07/31/060731ta_talk_surowiecki The Fatal-Flaw Myth]&lt;br /&gt;
    The Financial Page by James Surowiecki, The New Yorker&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.nytimes.com/2006/10/13/business/worldbusiness/13airbus.html?ei=5088&amp;amp;en=9c624e9920538fcd&amp;amp;ex=1318392000&amp;amp;partner=rssnyt&amp;amp;pagewanted=print Airbus Moves to Rewire Its Management First]&lt;br /&gt;
    By MARK LANDLER, The New York Times&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;New uses of software&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.csmonitor.com/2006/0711/p03s04-usgn.html On space station, droids get a workout]&lt;br /&gt;
    Peter N. Spotts &amp;lt;em&amp;gt;Christian Science Monitor&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.mobilemag.com/content/100/103/C8827/ Anti-hijack software controls planes from the ground]&lt;br /&gt;
    T.O. Whenham &amp;lt;em&amp;gt;Mobile Magazine&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Software Malfunctions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.avweb.com/eletter/archives/avflash/465-full.html#190603 Pilots Battle Computer For Control Of 777]&lt;br /&gt;
&lt;br /&gt;
    The AVweb Editorial Staff &amp;lt;em&amp;gt;AVweb&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://catless.ncl.ac.uk/Risks/23.12.html#subj2.1 B747-400 Electronic flight displays rendered inoperative]&lt;br /&gt;
    Peter B. Ladkin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://catless.ncl.ac.uk/Risks/24.03.html#subj3.1 Flight Control System Software Anomalies]&lt;br /&gt;
&lt;br /&gt;
    Peter B. Ladkin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Effects of portable electronic devices&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.cmu.edu/PR/releases06/060228_cellphone.html Carnegie Mellon Researchers Find Cell Phones Pose Greater Risk to Airplane Navigation Than Previously Believed]&lt;br /&gt;
     &amp;lt;em&amp;gt;Carnegie Mellon University&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.spectrum.ieee.org/print/3069 Unsafe At Any Airspeed?]&lt;br /&gt;
     &amp;lt;em&amp;gt;IEEE&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://catless.ncl.ac.uk/Risks/23.54.html#subj2.1 Tests show cell phones don't disrupt navigation systems]&lt;br /&gt;
    NewsScan &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Aviation standards&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.airweb.faa.gov/Regulatory_and_Guidance_Library/rgAD.nsf/0/94171A756992D0408625708300551865?OpenDocument&amp;amp;amp;Highlight=software  Airworthiness Directive]&lt;br /&gt;
&lt;br /&gt;
     &amp;lt;em&amp;gt;FAA&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation_safety_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://catless.ncl.ac.uk/Risks/9.01.html#subj2.1 UK Defense software standard]&lt;br /&gt;
    Sean Matthews &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://catless.ncl.ac.uk/Risks/16.16.html#subj3 Summary of safety-critical computers in transport aircraft]&lt;br /&gt;
&lt;br /&gt;
    Peter B. Lankin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://satc.gsfc.nasa.gov/assure/nss8719_13.html SOFTWARE SAFETY NASA TECHNICAL STANDARD]&lt;br /&gt;
     &amp;lt;em&amp;gt;NASA&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_1&amp;diff=2145</id>
		<title>CSC 379:Week 5, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_1&amp;diff=2145"/>
		<updated>2007-08-05T02:05:45Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Airbus 380 Software Flaw=&lt;br /&gt;
'''Provide an overview of this ethical controversy and links to information relevant for each set of ethical concerns cited.'''&lt;br /&gt;
&lt;br /&gt;
'''Cover information contained in both articles:'''&lt;br /&gt;
* [http://seattletimes.nwsource.com/html/boeingaerospace/2002534201_airbuswhistleblower02.html Seattle Times]&lt;br /&gt;
* [http://www.telegraph.co.uk/money/main.jhtml?xml=/money/2005/10/15/ccairb15.xml Telegraph.co.uk]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Included below are two excerpts that give an overview of the content of this topic:'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Mr Mangan claims a defect in the outflow valve control system could lead to an abrupt loss of cabin pressure, leaving passengers unconscious in as little as 20 seconds. &amp;quot;Normal oxygen masks don't work properly above 33,000 feet. Anybody over forty or over-weight is at a high risk of embolisms,&amp;quot; he said.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Airbus dismissed fears about the A380 as baseless. &amp;quot;We have examined this internally and found absolutely no reason to be concerned. The scenario made up by Mr Mangan does not exist,&amp;quot; said spokesman David Voskuhl.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;TTTech falsely classified its micro-chip as a simple &amp;quot;off-the-shelf&amp;quot; product already used in car valves in order to except it from elaborate testing rules, he claimed. This would breach both EU and US law on aircraft regulation. &amp;quot;I refused to sign off on the test results, but TTTech went ahead anyway,&amp;quot; he claimed.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;TTTech denies the allegations, calling him a disgruntled ex-employee who never fitted into the team, and is now bent on revenge.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source: [http://www.telegraph.co.uk/money/main.jhtml?xml=/money/2005/10/15/ccairb15.xml Telegraph.co.uk]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Most passenger jets have two cabin-pressure valves, with separate motors operating each. But because aircraft makers want redundancy on safety systems the planes have three motors for each valve, with different chips controlling each motor. [...] Most jetliners also have a manual override so that the pilot can take control in an emergency. [...] The company elected to go with four outflow valves on the A380, with only one motor on each valve, which are slightly larger than a cabin window. Each motor uses a TTTech controller chip, and there is no backup manual-override system.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Mangan says the European aerospace establishment is whitewashing his claims because of enormous cost savings that will be realized if TTTech's chips are approved for the A380. &lt;br /&gt;
TTTech's chip originally was designed for use in autos and the company is trying to get it certified as an existing, &amp;quot;commercial off-the-shelf&amp;quot; product that is acceptable for the A380, according to court records.&lt;br /&gt;
Mangan, however, alleges that the chip is being customized for aviation purposes, and thus must undergo stringent testing before being approved by regulators.&lt;br /&gt;
If regulators decide that TTTech's chip is a simple commercial device and can be used in the A380, it would then be available for other new aircraft without having to pass costly safety reviews.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source: [http://seattletimes.nwsource.com/html/boeingaerospace/2002534201_airbuswhistleblower02.html Seattle Times]&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
====History====&lt;br /&gt;
Joseph Mangan, a former employee of TTTech Computertechnik, blew the whistle on Airbus and TTTech regarding the safety of the cabin pressure system on the Airbus A380 aircraft in September 2004 by contacting the European Aviation Safety Agency (EASA). TTTech supplies some components to Airbus for the A380, and has been accused by Mangan of &amp;quot;intentional non-compliance&amp;quot; with aviation safety rules, at least partially because they were under great pressure from Airbus to meet deadlines.&lt;br /&gt;
&lt;br /&gt;
Mangan claimed that a flaw existed in the outflow valve control system, which uses TTTech controllers, that could result in a sudden loss of air pressure in the cabin. Such a loss of air pressure would result in passengers quickly losing consciousness, with other possible health consequences. One of the primary concerns generated by this claim was the lack of different backup systems to prevent the same problem from affecting all the valves at the same time.&lt;br /&gt;
&lt;br /&gt;
====Results of the Whistleblowing====&lt;br /&gt;
Airbus and TTTech both denied there was a problem - TTTech went further by accusing Mangan of being a disgruntled ex-employee trying to get revenge. The EASA found that TTTech was not in compliance with safety rules and was not conducting appropriate tests, and the microchip at the heart of the controversy was deemed unacceptable: in the end EASA told Airbus to resolve the problem before the A380's final certification.&lt;br /&gt;
&lt;br /&gt;
Within a few days of reporting the suspected violations at TTTech, Mangan was fired and sued for defamation. TTTech also obtained a gag order, which Mangan then violated. Many of Mangan's difficulties stem from the lack of Austrian laws protecting whistle-blowers from retribution by their employers. Mangan has tried to get a new job, but has not been able to get a response from companies in the aerospace industry.&lt;br /&gt;
&lt;br /&gt;
==Table of Contents==&lt;br /&gt;
&amp;lt;h3&amp;gt;General&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.csl.sri.com/users/neumann/air.html Computer Security in Aviation: Vulnerabilities, Threats, and Risks]&lt;br /&gt;
    Peter G. Neumann &amp;lt;em&amp;gt;SRI Computer Science Laboratory&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://sunnyday.mit.edu/papers/smcit.doc Fault Protection in a Component-Based Spacecraft Architecture]&lt;br /&gt;
&lt;br /&gt;
    Elwin C. Ong and Nancy G. Leveson &amp;lt;em&amp;gt;MIT&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;!--&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.ece.cmu.edu/%7Ekoopman/des_s99/sw_reliability/#concepts&amp;quot;&amp;gt;&lt;br /&gt;
    Software Reliability&amp;lt;/a&amp;gt;&lt;br /&gt;
    Jiantao Pan &amp;lt;em&amp;gt;Carnegie Mellon University&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;--&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Conflicting Views&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.newyorker.com/archive/2006/07/31/060731ta_talk_surowiecki The Fatal-Flaw Myth]&lt;br /&gt;
    The Financial Page by James Surowiecki, The New Yorker&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.nytimes.com/2006/10/13/business/worldbusiness/13airbus.html?ei=5088&amp;amp;en=9c624e9920538fcd&amp;amp;ex=1318392000&amp;amp;partner=rssnyt&amp;amp;pagewanted=print Airbus Moves to Rewire Its Management First]&lt;br /&gt;
    By MARK LANDLER, The New York Times&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;New uses of software&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.csmonitor.com/2006/0711/p03s04-usgn.html On space station, droids get a workout]&lt;br /&gt;
    Peter N. Spotts &amp;lt;em&amp;gt;Christian Science Monitor&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.mobilemag.com/content/100/103/C8827/ Anti-hijack software controls planes from the ground]&lt;br /&gt;
    T.O. Whenham &amp;lt;em&amp;gt;Mobile Magazine&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Software Malfunctions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.avweb.com/eletter/archives/avflash/465-full.html#190603 Pilots Battle Computer For Control Of 777]&lt;br /&gt;
&lt;br /&gt;
    The AVweb Editorial Staff &amp;lt;em&amp;gt;AVweb&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://catless.ncl.ac.uk/Risks/23.12.html#subj2.1 B747-400 Electronic flight displays rendered inoperative]&lt;br /&gt;
    Peter B. Ladkin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://catless.ncl.ac.uk/Risks/24.03.html#subj3.1 Flight Control System Software Anomalies]&lt;br /&gt;
&lt;br /&gt;
    Peter B. Ladkin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Effects of portable electronic devices&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.cmu.edu/PR/releases06/060228_cellphone.html Carnegie Mellon Researchers Find Cell Phones Pose Greater Risk to Airplane Navigation Than Previously Believed]&lt;br /&gt;
     &amp;lt;em&amp;gt;Carnegie Mellon University&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.spectrum.ieee.org/print/3069 Unsafe At Any Airspeed?]&lt;br /&gt;
     &amp;lt;em&amp;gt;IEEE&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://catless.ncl.ac.uk/Risks/23.54.html#subj2.1 Tests show cell phones don't disrupt navigation systems]&lt;br /&gt;
    NewsScan &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Aviation standards&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.airweb.faa.gov/Regulatory_and_Guidance_Library/rgAD.nsf/0/94171A756992D0408625708300551865?OpenDocument&amp;amp;amp;Highlight=software  Airworthiness Directive]&lt;br /&gt;
&lt;br /&gt;
     &amp;lt;em&amp;gt;FAA&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation_safety_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/9.01.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    UK Defense software standard&amp;lt;/a&amp;gt;&lt;br /&gt;
    Sean Matthews &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/16.16.html#subj3&amp;quot;&amp;gt;&lt;br /&gt;
    Summary of safety-critical computers in transport aircraft&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Peter B. Lankin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://satc.gsfc.nasa.gov/assure/nss8719_13.html&amp;quot;&amp;gt;&lt;br /&gt;
    SOFTWARE SAFETY NASA TECHNICAL STANDARD&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;NASA&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_1&amp;diff=2144</id>
		<title>CSC 379:Week 5, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_1&amp;diff=2144"/>
		<updated>2007-08-05T02:02:16Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Airbus 380 Software Flaw=&lt;br /&gt;
'''Provide an overview of this ethical controversy and links to information relevant for each set of ethical concerns cited.'''&lt;br /&gt;
&lt;br /&gt;
'''Cover information contained in both articles:'''&lt;br /&gt;
* [http://seattletimes.nwsource.com/html/boeingaerospace/2002534201_airbuswhistleblower02.html Seattle Times]&lt;br /&gt;
* [http://www.telegraph.co.uk/money/main.jhtml?xml=/money/2005/10/15/ccairb15.xml Telegraph.co.uk]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Included below are two excerpts that give an overview of the content of this topic:'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Mr Mangan claims a defect in the outflow valve control system could lead to an abrupt loss of cabin pressure, leaving passengers unconscious in as little as 20 seconds. &amp;quot;Normal oxygen masks don't work properly above 33,000 feet. Anybody over forty or over-weight is at a high risk of embolisms,&amp;quot; he said.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Airbus dismissed fears about the A380 as baseless. &amp;quot;We have examined this internally and found absolutely no reason to be concerned. The scenario made up by Mr Mangan does not exist,&amp;quot; said spokesman David Voskuhl.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;TTTech falsely classified its micro-chip as a simple &amp;quot;off-the-shelf&amp;quot; product already used in car valves in order to except it from elaborate testing rules, he claimed. This would breach both EU and US law on aircraft regulation. &amp;quot;I refused to sign off on the test results, but TTTech went ahead anyway,&amp;quot; he claimed.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;TTTech denies the allegations, calling him a disgruntled ex-employee who never fitted into the team, and is now bent on revenge.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source: [http://www.telegraph.co.uk/money/main.jhtml?xml=/money/2005/10/15/ccairb15.xml Telegraph.co.uk]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Most passenger jets have two cabin-pressure valves, with separate motors operating each. But because aircraft makers want redundancy on safety systems the planes have three motors for each valve, with different chips controlling each motor. [...] Most jetliners also have a manual override so that the pilot can take control in an emergency. [...] The company elected to go with four outflow valves on the A380, with only one motor on each valve, which are slightly larger than a cabin window. Each motor uses a TTTech controller chip, and there is no backup manual-override system.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Mangan says the European aerospace establishment is whitewashing his claims because of enormous cost savings that will be realized if TTTech's chips are approved for the A380. &lt;br /&gt;
TTTech's chip originally was designed for use in autos and the company is trying to get it certified as an existing, &amp;quot;commercial off-the-shelf&amp;quot; product that is acceptable for the A380, according to court records.&lt;br /&gt;
Mangan, however, alleges that the chip is being customized for aviation purposes, and thus must undergo stringent testing before being approved by regulators.&lt;br /&gt;
If regulators decide that TTTech's chip is a simple commercial device and can be used in the A380, it would then be available for other new aircraft without having to pass costly safety reviews.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source: [http://seattletimes.nwsource.com/html/boeingaerospace/2002534201_airbuswhistleblower02.html Seattle Times]&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
====History====&lt;br /&gt;
Joseph Mangan, a former employee of TTTech Computertechnik, blew the whistle on Airbus and TTTech regarding the safety of the cabin pressure system on the Airbus A380 aircraft in September 2004 by contacting the European Aviation Safety Agency (EASA). TTTech supplies some components to Airbus for the A380, and has been accused by Mangan of &amp;quot;intentional non-compliance&amp;quot; with aviation safety rules, at least partially because they were under great pressure from Airbus to meet deadlines.&lt;br /&gt;
&lt;br /&gt;
Mangan claimed that a flaw existed in the outflow valve control system, which uses TTTech controllers, that could result in a sudden loss of air pressure in the cabin. Such a loss of air pressure would result in passengers quickly losing consciousness, with other possible health consequences. One of the primary concerns generated by this claim was the lack of different backup systems to prevent the same problem from affecting all the valves at the same time.&lt;br /&gt;
&lt;br /&gt;
====Results of the Whistleblowing====&lt;br /&gt;
Airbus and TTTech both denied there was a problem - TTTech went further by accusing Mangan of being a disgruntled ex-employee trying to get revenge. The EASA found that TTTech was not in compliance with safety rules and was not conducting appropriate tests, and the microchip at the heart of the controversy was deemed unacceptable: in the end EASA told Airbus to resolve the problem before the A380's final certification.&lt;br /&gt;
&lt;br /&gt;
Within a few days of reporting the suspected violations at TTTech, Mangan was fired and sued for defamation. TTTech also obtained a gag order, which Mangan then violated. Many of Mangan's difficulties stem from the lack of Austrian laws protecting whistle-blowers from retribution by their employers. Mangan has tried to get a new job, but has not been able to get a response from companies in the aerospace industry.&lt;br /&gt;
&lt;br /&gt;
==Table of Contents==&lt;br /&gt;
&amp;lt;h3&amp;gt;General&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.csl.sri.com/users/neumann/air.html Computer Security in Aviation: Vulnerabilities, Threats, and Risks]&lt;br /&gt;
    Peter G. Neumann &amp;lt;em&amp;gt;SRI Computer Science Laboratory&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://sunnyday.mit.edu/papers/smcit.doc Fault Protection in a Component-Based Spacecraft Architecture]&lt;br /&gt;
&lt;br /&gt;
    Elwin C. Ong and Nancy G. Leveson &amp;lt;em&amp;gt;MIT&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;!--&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.ece.cmu.edu/%7Ekoopman/des_s99/sw_reliability/#concepts&amp;quot;&amp;gt;&lt;br /&gt;
    Software Reliability&amp;lt;/a&amp;gt;&lt;br /&gt;
    Jiantao Pan &amp;lt;em&amp;gt;Carnegie Mellon University&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;--&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Conflicting Views&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.newyorker.com/archive/2006/07/31/060731ta_talk_surowiecki The Fatal-Flaw Myth]&lt;br /&gt;
    The Financial Page by James Surowiecki, The New Yorker&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.nytimes.com/2006/10/13/business/worldbusiness/13airbus.html?ei=5088&amp;amp;en=9c624e9920538fcd&amp;amp;ex=1318392000&amp;amp;partner=rssnyt&amp;amp;pagewanted=print Airbus Moves to Rewire Its Management First]&lt;br /&gt;
    By MARK LANDLER, The New York Times&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;New uses of software&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.csmonitor.com/2006/0711/p03s04-usgn.html&amp;quot;&amp;gt;&lt;br /&gt;
    On space station, droids get a workout&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter N. Spotts &amp;lt;em&amp;gt;Christian Science Monitor&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.mobilemag.com/content/100/103/C8827/&amp;quot;&amp;gt;&lt;br /&gt;
    Anti-hijack software controls planes from the ground&amp;lt;/a&amp;gt;&lt;br /&gt;
    T.O. Whenham &amp;lt;em&amp;gt;Mobile Magazine&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Software Malfunctions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.avweb.com/eletter/archives/avflash/465-full.html#190603&amp;quot;&amp;gt;&lt;br /&gt;
    Pilots Battle Computer For Control Of 777&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    The AVweb Editorial Staff &amp;lt;em&amp;gt;AVweb&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/23.12.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    B747-400 Electronic flight displays rendered inoperative&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter B. Ladkin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/24.03.html#subj3.1&amp;quot;&amp;gt;&lt;br /&gt;
    Flight Control System Software Anomalies&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Peter B. Ladkin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Effects of portable electronic devices&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.cmu.edu/PR/releases06/060228_cellphone.html&amp;quot;&amp;gt;&lt;br /&gt;
    Carnegie Mellon Researchers Find Cell Phones Pose Greater Risk to Airplane Navigation Than Previously Believed&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;Carnegie Mellon University&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.spectrum.ieee.org/print/3069&amp;quot;&amp;gt;&lt;br /&gt;
    Unsafe At Any Airspeed?&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;IEEE&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/23.54.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    Tests show cell phones don't disrupt navigation systems&amp;lt;/a&amp;gt;&lt;br /&gt;
    NewsScan &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Aviation standards&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.airweb.faa.gov/Regulatory_and_Guidance_Library/rgAD.nsf/0/94171A756992D0408625708300551865?OpenDocument&amp;amp;amp;Highlight=software&amp;quot;&amp;gt;&lt;br /&gt;
    Airworthiness Directive&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
     &amp;lt;em&amp;gt;FAA&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation_safety_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/9.01.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    UK Defense software standard&amp;lt;/a&amp;gt;&lt;br /&gt;
    Sean Matthews &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/16.16.html#subj3&amp;quot;&amp;gt;&lt;br /&gt;
    Summary of safety-critical computers in transport aircraft&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Peter B. Lankin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://satc.gsfc.nasa.gov/assure/nss8719_13.html&amp;quot;&amp;gt;&lt;br /&gt;
    SOFTWARE SAFETY NASA TECHNICAL STANDARD&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;NASA&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_1&amp;diff=2143</id>
		<title>CSC 379:Week 5, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_1&amp;diff=2143"/>
		<updated>2007-08-05T02:01:04Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Airbus 380 Software Flaw=&lt;br /&gt;
'''Provide an overview of this ethical controversy and links to information relevant for each set of ethical concerns cited.'''&lt;br /&gt;
&lt;br /&gt;
'''Cover information contained in both articles:'''&lt;br /&gt;
* [http://seattletimes.nwsource.com/html/boeingaerospace/2002534201_airbuswhistleblower02.html Seattle Times]&lt;br /&gt;
* [http://www.telegraph.co.uk/money/main.jhtml?xml=/money/2005/10/15/ccairb15.xml Telegraph.co.uk]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Included below are two excerpts that give an overview of the content of this topic:'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Mr Mangan claims a defect in the outflow valve control system could lead to an abrupt loss of cabin pressure, leaving passengers unconscious in as little as 20 seconds. &amp;quot;Normal oxygen masks don't work properly above 33,000 feet. Anybody over forty or over-weight is at a high risk of embolisms,&amp;quot; he said.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Airbus dismissed fears about the A380 as baseless. &amp;quot;We have examined this internally and found absolutely no reason to be concerned. The scenario made up by Mr Mangan does not exist,&amp;quot; said spokesman David Voskuhl.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;TTTech falsely classified its micro-chip as a simple &amp;quot;off-the-shelf&amp;quot; product already used in car valves in order to except it from elaborate testing rules, he claimed. This would breach both EU and US law on aircraft regulation. &amp;quot;I refused to sign off on the test results, but TTTech went ahead anyway,&amp;quot; he claimed.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;TTTech denies the allegations, calling him a disgruntled ex-employee who never fitted into the team, and is now bent on revenge.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source: [http://www.telegraph.co.uk/money/main.jhtml?xml=/money/2005/10/15/ccairb15.xml Telegraph.co.uk]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Most passenger jets have two cabin-pressure valves, with separate motors operating each. But because aircraft makers want redundancy on safety systems the planes have three motors for each valve, with different chips controlling each motor. [...] Most jetliners also have a manual override so that the pilot can take control in an emergency. [...] The company elected to go with four outflow valves on the A380, with only one motor on each valve, which are slightly larger than a cabin window. Each motor uses a TTTech controller chip, and there is no backup manual-override system.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Mangan says the European aerospace establishment is whitewashing his claims because of enormous cost savings that will be realized if TTTech's chips are approved for the A380. &lt;br /&gt;
TTTech's chip originally was designed for use in autos and the company is trying to get it certified as an existing, &amp;quot;commercial off-the-shelf&amp;quot; product that is acceptable for the A380, according to court records.&lt;br /&gt;
Mangan, however, alleges that the chip is being customized for aviation purposes, and thus must undergo stringent testing before being approved by regulators.&lt;br /&gt;
If regulators decide that TTTech's chip is a simple commercial device and can be used in the A380, it would then be available for other new aircraft without having to pass costly safety reviews.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source: [http://seattletimes.nwsource.com/html/boeingaerospace/2002534201_airbuswhistleblower02.html Seattle Times]&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
====History====&lt;br /&gt;
Joseph Mangan, a former employee of TTTech Computertechnik, blew the whistle on Airbus and TTTech regarding the safety of the cabin pressure system on the Airbus A380 aircraft in September 2004 by contacting the European Aviation Safety Agency (EASA). TTTech supplies some components to Airbus for the A380, and has been accused by Mangan of &amp;quot;intentional non-compliance&amp;quot; with aviation safety rules, at least partially because they were under great pressure from Airbus to meet deadlines.&lt;br /&gt;
&lt;br /&gt;
Mangan claimed that a flaw existed in the outflow valve control system, which uses TTTech controllers, that could result in a sudden loss of air pressure in the cabin. Such a loss of air pressure would result in passengers quickly losing consciousness, with other possible health consequences. One of the primary concerns generated by this claim was the lack of different backup systems to prevent the same problem from affecting all the valves at the same time.&lt;br /&gt;
&lt;br /&gt;
====Results of the Whistleblowing====&lt;br /&gt;
Airbus and TTTech both denied there was a problem - TTTech went further by accusing Mangan of being a disgruntled ex-employee trying to get revenge. The EASA found that TTTech was not in compliance with safety rules and was not conducting appropriate tests, and the microchip at the heart of the controversy was deemed unacceptable: in the end EASA told Airbus to resolve the problem before the A380's final certification.&lt;br /&gt;
&lt;br /&gt;
Within a few days of reporting the suspected violations at TTTech, Mangan was fired and sued for defamation. TTTech also obtained a gag order, which Mangan then violated. Many of Mangan's difficulties stem from the lack of Austrian laws protecting whistle-blowers from retribution by their employers. Mangan has tried to get a new job, but has not been able to get a response from companies in the aerospace industry.&lt;br /&gt;
&lt;br /&gt;
==Table of Contents==&lt;br /&gt;
&amp;lt;h3&amp;gt;General&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.csl.sri.com/users/neumann/air.html Computer Security in Aviation: Vulnerabilities, Threats, and Risks]&lt;br /&gt;
    Peter G. Neumann &amp;lt;em&amp;gt;SRI Computer Science Laboratory&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://sunnyday.mit.edu/papers/smcit.doc Fault Protection in a Component-Based Spacecraft Architecture]&lt;br /&gt;
&lt;br /&gt;
    Elwin C. Ong and Nancy G. Leveson &amp;lt;em&amp;gt;MIT&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;!--&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.ece.cmu.edu/%7Ekoopman/des_s99/sw_reliability/#concepts&amp;quot;&amp;gt;&lt;br /&gt;
    Software Reliability&amp;lt;/a&amp;gt;&lt;br /&gt;
    Jiantao Pan &amp;lt;em&amp;gt;Carnegie Mellon University&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;--&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Conflicting Views&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.newyorker.com/archive/2006/07/31/060731ta_talk_surowiecki&amp;quot;&amp;gt;&lt;br /&gt;
    The Fatal-Flaw Myth&amp;lt;/a&amp;gt;&lt;br /&gt;
    The Financial Page by James Surowiecki, The New Yorker&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.nytimes.com/2006/10/13/business/worldbusiness/13airbus.html?ei=5088&amp;amp;en=9c624e9920538fcd&amp;amp;ex=1318392000&amp;amp;partner=rssnyt&amp;amp;pagewanted=print&amp;quot;&amp;gt;&lt;br /&gt;
    Airbus Moves to Rewire Its Management First&amp;lt;/a&amp;gt;&lt;br /&gt;
    By MARK LANDLER, The New York Times&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;New uses of software&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.csmonitor.com/2006/0711/p03s04-usgn.html&amp;quot;&amp;gt;&lt;br /&gt;
    On space station, droids get a workout&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter N. Spotts &amp;lt;em&amp;gt;Christian Science Monitor&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.mobilemag.com/content/100/103/C8827/&amp;quot;&amp;gt;&lt;br /&gt;
    Anti-hijack software controls planes from the ground&amp;lt;/a&amp;gt;&lt;br /&gt;
    T.O. Whenham &amp;lt;em&amp;gt;Mobile Magazine&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Software Malfunctions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.avweb.com/eletter/archives/avflash/465-full.html#190603&amp;quot;&amp;gt;&lt;br /&gt;
    Pilots Battle Computer For Control Of 777&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    The AVweb Editorial Staff &amp;lt;em&amp;gt;AVweb&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/23.12.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    B747-400 Electronic flight displays rendered inoperative&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter B. Ladkin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/24.03.html#subj3.1&amp;quot;&amp;gt;&lt;br /&gt;
    Flight Control System Software Anomalies&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Peter B. Ladkin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Effects of portable electronic devices&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.cmu.edu/PR/releases06/060228_cellphone.html&amp;quot;&amp;gt;&lt;br /&gt;
    Carnegie Mellon Researchers Find Cell Phones Pose Greater Risk to Airplane Navigation Than Previously Believed&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;Carnegie Mellon University&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.spectrum.ieee.org/print/3069&amp;quot;&amp;gt;&lt;br /&gt;
    Unsafe At Any Airspeed?&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;IEEE&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/23.54.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    Tests show cell phones don't disrupt navigation systems&amp;lt;/a&amp;gt;&lt;br /&gt;
    NewsScan &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Aviation standards&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.airweb.faa.gov/Regulatory_and_Guidance_Library/rgAD.nsf/0/94171A756992D0408625708300551865?OpenDocument&amp;amp;amp;Highlight=software&amp;quot;&amp;gt;&lt;br /&gt;
    Airworthiness Directive&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
     &amp;lt;em&amp;gt;FAA&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation_safety_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/9.01.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    UK Defense software standard&amp;lt;/a&amp;gt;&lt;br /&gt;
    Sean Matthews &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/16.16.html#subj3&amp;quot;&amp;gt;&lt;br /&gt;
    Summary of safety-critical computers in transport aircraft&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Peter B. Lankin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://satc.gsfc.nasa.gov/assure/nss8719_13.html&amp;quot;&amp;gt;&lt;br /&gt;
    SOFTWARE SAFETY NASA TECHNICAL STANDARD&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;NASA&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_1&amp;diff=2142</id>
		<title>CSC 379:Week 5, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_1&amp;diff=2142"/>
		<updated>2007-08-05T01:25:13Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Airbus 380 Software Flaw=&lt;br /&gt;
'''Provide an overview of this ethical controversy and links to information relevant for each set of ethical concerns cited.'''&lt;br /&gt;
&lt;br /&gt;
'''Cover information contained in both articles:'''&lt;br /&gt;
* [http://seattletimes.nwsource.com/html/boeingaerospace/2002534201_airbuswhistleblower02.html Seattle Times]&lt;br /&gt;
* [http://www.telegraph.co.uk/money/main.jhtml?xml=/money/2005/10/15/ccairb15.xml Telegraph.co.uk]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Included below are two excerpts that give an overview of the content of this topic:'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Mr Mangan claims a defect in the outflow valve control system could lead to an abrupt loss of cabin pressure, leaving passengers unconscious in as little as 20 seconds. &amp;quot;Normal oxygen masks don't work properly above 33,000 feet. Anybody over forty or over-weight is at a high risk of embolisms,&amp;quot; he said.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Airbus dismissed fears about the A380 as baseless. &amp;quot;We have examined this internally and found absolutely no reason to be concerned. The scenario made up by Mr Mangan does not exist,&amp;quot; said spokesman David Voskuhl.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;TTTech falsely classified its micro-chip as a simple &amp;quot;off-the-shelf&amp;quot; product already used in car valves in order to except it from elaborate testing rules, he claimed. This would breach both EU and US law on aircraft regulation. &amp;quot;I refused to sign off on the test results, but TTTech went ahead anyway,&amp;quot; he claimed.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;TTTech denies the allegations, calling him a disgruntled ex-employee who never fitted into the team, and is now bent on revenge.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source: [http://www.telegraph.co.uk/money/main.jhtml?xml=/money/2005/10/15/ccairb15.xml Telegraph.co.uk]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Most passenger jets have two cabin-pressure valves, with separate motors operating each. But because aircraft makers want redundancy on safety systems the planes have three motors for each valve, with different chips controlling each motor. [...] Most jetliners also have a manual override so that the pilot can take control in an emergency. [...] The company elected to go with four outflow valves on the A380, with only one motor on each valve, which are slightly larger than a cabin window. Each motor uses a TTTech controller chip, and there is no backup manual-override system.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Mangan says the European aerospace establishment is whitewashing his claims because of enormous cost savings that will be realized if TTTech's chips are approved for the A380. &lt;br /&gt;
TTTech's chip originally was designed for use in autos and the company is trying to get it certified as an existing, &amp;quot;commercial off-the-shelf&amp;quot; product that is acceptable for the A380, according to court records.&lt;br /&gt;
Mangan, however, alleges that the chip is being customized for aviation purposes, and thus must undergo stringent testing before being approved by regulators.&lt;br /&gt;
If regulators decide that TTTech's chip is a simple commercial device and can be used in the A380, it would then be available for other new aircraft without having to pass costly safety reviews.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source: [http://seattletimes.nwsource.com/html/boeingaerospace/2002534201_airbuswhistleblower02.html Seattle Times]&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
====History====&lt;br /&gt;
Joseph Mangan, a former employee of TTTech Computertechnik, blew the whistle on Airbus and TTTech regarding the safety of the cabin pressure system on the Airbus A380 aircraft in September 2004 by contacting the European Aviation Safety Agency (EASA). TTTech supplies some components to Airbus for the A380, and has been accused by Mangan of &amp;quot;intentional non-compliance&amp;quot; with aviation safety rules, at least partially because they were under great pressure from Airbus to meet deadlines.&lt;br /&gt;
&lt;br /&gt;
Mangan claimed that a flaw existed in the outflow valve control system, which uses TTTech controllers, that could result in a sudden loss of air pressure in the cabin. Such a loss of air pressure would result in passengers quickly losing consciousness, with other possible health consequences. One of the primary concerns generated by this claim was the lack of different backup systems to prevent the same problem from affecting all the valves at the same time.&lt;br /&gt;
&lt;br /&gt;
====Results of the Whistleblowing====&lt;br /&gt;
Airbus and TTTech both denied there was a problem - TTTech went further by accusing Mangan of being a disgruntled ex-employee trying to get revenge. The EASA found that TTTech was not in compliance with safety rules and was not conducting appropriate tests, and the microchip at the heart of the controversy was deemed unacceptable: in the end EASA told Airbus to resolve the problem before the A380's final certification.&lt;br /&gt;
&lt;br /&gt;
Within a few days of reporting the suspected violations at TTTech, Mangan was fired and sued for defamation. TTTech also obtained a gag order, which Mangan then violated. Many of Mangan's difficulties stem from the lack of Austrian laws protecting whistle-blowers from retribution by their employers. Mangan has tried to get a new job, but has not been able to get a response from companies in the aerospace industry.&lt;br /&gt;
&lt;br /&gt;
==Table of Contents==&lt;br /&gt;
&amp;lt;h3&amp;gt;General&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.csl.sri.com/users/neumann/air.html&amp;quot;&amp;gt;&lt;br /&gt;
    Computer Security in Aviation: Vulnerabilities, Threats, and Risks&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter G. Neumann &amp;lt;em&amp;gt;SRI Computer Science Laboratory&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://sunnyday.mit.edu/papers/smcit.doc&amp;quot;&amp;gt;&lt;br /&gt;
     Fault Protection in a Component-Based Spacecraft Architecture&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Elwin C. Ong and Nancy G. Leveson &amp;lt;em&amp;gt;MIT&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;!--&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.ece.cmu.edu/%7Ekoopman/des_s99/sw_reliability/#concepts&amp;quot;&amp;gt;&lt;br /&gt;
    Software Reliability&amp;lt;/a&amp;gt;&lt;br /&gt;
    Jiantao Pan &amp;lt;em&amp;gt;Carnegie Mellon University&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;--&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Conflicting Views&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.newyorker.com/archive/2006/07/31/060731ta_talk_surowiecki&amp;quot;&amp;gt;&lt;br /&gt;
    The Fatal-Flaw Myth&amp;lt;/a&amp;gt;&lt;br /&gt;
    The Financial Page by James Surowiecki, The New Yorker&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.nytimes.com/2006/10/13/business/worldbusiness/13airbus.html?ei=5088&amp;amp;en=9c624e9920538fcd&amp;amp;ex=1318392000&amp;amp;partner=rssnyt&amp;amp;pagewanted=print&amp;quot;&amp;gt;&lt;br /&gt;
    Airbus Moves to Rewire Its Management First&amp;lt;/a&amp;gt;&lt;br /&gt;
    By MARK LANDLER, The New York Times&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;New uses of software&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.csmonitor.com/2006/0711/p03s04-usgn.html&amp;quot;&amp;gt;&lt;br /&gt;
    On space station, droids get a workout&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter N. Spotts &amp;lt;em&amp;gt;Christian Science Monitor&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.mobilemag.com/content/100/103/C8827/&amp;quot;&amp;gt;&lt;br /&gt;
    Anti-hijack software controls planes from the ground&amp;lt;/a&amp;gt;&lt;br /&gt;
    T.O. Whenham &amp;lt;em&amp;gt;Mobile Magazine&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Software Malfunctions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.avweb.com/eletter/archives/avflash/465-full.html#190603&amp;quot;&amp;gt;&lt;br /&gt;
    Pilots Battle Computer For Control Of 777&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    The AVweb Editorial Staff &amp;lt;em&amp;gt;AVweb&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/23.12.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    B747-400 Electronic flight displays rendered inoperative&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter B. Ladkin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/24.03.html#subj3.1&amp;quot;&amp;gt;&lt;br /&gt;
    Flight Control System Software Anomalies&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Peter B. Ladkin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Effects of portable electronic devices&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.cmu.edu/PR/releases06/060228_cellphone.html&amp;quot;&amp;gt;&lt;br /&gt;
    Carnegie Mellon Researchers Find Cell Phones Pose Greater Risk to Airplane Navigation Than Previously Believed&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;Carnegie Mellon University&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.spectrum.ieee.org/print/3069&amp;quot;&amp;gt;&lt;br /&gt;
    Unsafe At Any Airspeed?&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;IEEE&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/23.54.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    Tests show cell phones don't disrupt navigation systems&amp;lt;/a&amp;gt;&lt;br /&gt;
    NewsScan &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Aviation standards&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.airweb.faa.gov/Regulatory_and_Guidance_Library/rgAD.nsf/0/94171A756992D0408625708300551865?OpenDocument&amp;amp;amp;Highlight=software&amp;quot;&amp;gt;&lt;br /&gt;
    Airworthiness Directive&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
     &amp;lt;em&amp;gt;FAA&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation_safety_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/9.01.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    UK Defense software standard&amp;lt;/a&amp;gt;&lt;br /&gt;
    Sean Matthews &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/16.16.html#subj3&amp;quot;&amp;gt;&lt;br /&gt;
    Summary of safety-critical computers in transport aircraft&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Peter B. Lankin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://satc.gsfc.nasa.gov/assure/nss8719_13.html&amp;quot;&amp;gt;&lt;br /&gt;
    SOFTWARE SAFETY NASA TECHNICAL STANDARD&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;NASA&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_1&amp;diff=2140</id>
		<title>CSC 379:Week 5, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_1&amp;diff=2140"/>
		<updated>2007-08-05T00:28:33Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Airbus 380 Software Flaw=&lt;br /&gt;
'''Provide an overview of this ethical controversy and links to information relevant for each set of ethical concerns cited.'''&lt;br /&gt;
&lt;br /&gt;
'''Cover information contained in both articles:'''&lt;br /&gt;
* [http://seattletimes.nwsource.com/html/boeingaerospace/2002534201_airbuswhistleblower02.html Seattle Times]&lt;br /&gt;
* [http://www.telegraph.co.uk/money/main.jhtml?xml=/money/2005/10/15/ccairb15.xml Telegraph.co.uk]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Included below are two excerpts that give an overview of the content of this topic:'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Mr Mangan claims a defect in the outflow valve control system could lead to an abrupt loss of cabin pressure, leaving passengers unconscious in as little as 20 seconds. &amp;quot;Normal oxygen masks don't work properly above 33,000 feet. Anybody over forty or over-weight is at a high risk of embolisms,&amp;quot; he said.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Airbus dismissed fears about the A380 as baseless. &amp;quot;We have examined this internally and found absolutely no reason to be concerned. The scenario made up by Mr Mangan does not exist,&amp;quot; said spokesman David Voskuhl.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;TTTech falsely classified its micro-chip as a simple &amp;quot;off-the-shelf&amp;quot; product already used in car valves in order to except it from elaborate testing rules, he claimed. This would breach both EU and US law on aircraft regulation. &amp;quot;I refused to sign off on the test results, but TTTech went ahead anyway,&amp;quot; he claimed.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;TTTech denies the allegations, calling him a disgruntled ex-employee who never fitted into the team, and is now bent on revenge.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source: [http://www.telegraph.co.uk/money/main.jhtml?xml=/money/2005/10/15/ccairb15.xml Telegraph.co.uk]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Most passenger jets have two cabin-pressure valves, with separate motors operating each. But because aircraft makers want redundancy on safety systems the planes have three motors for each valve, with different chips controlling each motor. [...] Most jetliners also have a manual override so that the pilot can take control in an emergency. [...] The company elected to go with four outflow valves on the A380, with only one motor on each valve, which are slightly larger than a cabin window. Each motor uses a TTTech controller chip, and there is no backup manual-override system.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Mangan says the European aerospace establishment is whitewashing his claims because of enormous cost savings that will be realized if TTTech's chips are approved for the A380. &lt;br /&gt;
TTTech's chip originally was designed for use in autos and the company is trying to get it certified as an existing, &amp;quot;commercial off-the-shelf&amp;quot; product that is acceptable for the A380, according to court records.&lt;br /&gt;
Mangan, however, alleges that the chip is being customized for aviation purposes, and thus must undergo stringent testing before being approved by regulators.&lt;br /&gt;
If regulators decide that TTTech's chip is a simple commercial device and can be used in the A380, it would then be available for other new aircraft without having to pass costly safety reviews.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source: [http://seattletimes.nwsource.com/html/boeingaerospace/2002534201_airbuswhistleblower02.html Seattle Times]&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
====History====&lt;br /&gt;
Joseph Mangan, a former employee of TTTech Computertechnik, blew the whistle on Airbus and TTTech regarding the safety of the cabin pressure system on the Airbus A380 aircraft in September 2004 by contacting the European Aviation Safety Agency (EASA). TTTech supplies some components to Airbus for the A380, and has been accused by Mangan of &amp;quot;intentional non-compliance&amp;quot; with aviation safety rules, at least partially because they were under great pressure from Airbus to meet deadlines.&lt;br /&gt;
&lt;br /&gt;
Mangan claimed that a flaw existed in the outflow valve control system, which uses TTTech controllers, that could result in a sudden loss of air pressure in the cabin. Such a loss of air pressure would result in passengers quickly losing consciousness, with other possible health consequences. One of the primary concerns generated by this claim was the lack of different backup systems to prevent the same problem from affecting all the valves at the same time.&lt;br /&gt;
&lt;br /&gt;
====Results of the Whistleblowing====&lt;br /&gt;
Airbus and TTTech both denied there was a problem - TTTech went further by accusing Mangan of being a disgruntled ex-employee trying to get revenge. The EASA found that TTTech was not in compliance with safety rules and was not conducting appropriate tests, and the microchip at the heart of the controversy was deemed unacceptable: in the end EASA told Airbus to resolve the problem before the A380's final certification.&lt;br /&gt;
&lt;br /&gt;
Within a few days of reporting the suspected violations at TTTech, Mangan was fired and sued for defamation. TTTech also obtained a gag order, which Mangan then violated.&lt;br /&gt;
&lt;br /&gt;
==Table of Contents==&lt;br /&gt;
&amp;lt;h3&amp;gt;General&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.csl.sri.com/users/neumann/air.html&amp;quot;&amp;gt;&lt;br /&gt;
    Computer Security in Aviation: Vulnerabilities, Threats, and Risks&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter G. Neumann &amp;lt;em&amp;gt;SRI Computer Science Laboratory&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://sunnyday.mit.edu/papers/smcit.doc&amp;quot;&amp;gt;&lt;br /&gt;
     Fault Protection in a Component-Based Spacecraft Architecture&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Elwin C. Ong and Nancy G. Leveson &amp;lt;em&amp;gt;MIT&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;!--&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.ece.cmu.edu/%7Ekoopman/des_s99/sw_reliability/#concepts&amp;quot;&amp;gt;&lt;br /&gt;
    Software Reliability&amp;lt;/a&amp;gt;&lt;br /&gt;
    Jiantao Pan &amp;lt;em&amp;gt;Carnegie Mellon University&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;--&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Conflicting Views&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.newyorker.com/archive/2006/07/31/060731ta_talk_surowiecki&amp;quot;&amp;gt;&lt;br /&gt;
    The Fatal-Flaw Myth&amp;lt;/a&amp;gt;&lt;br /&gt;
    The Financial Page by James Surowiecki, The New Yorker&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.nytimes.com/2006/10/13/business/worldbusiness/13airbus.html?ei=5088&amp;amp;en=9c624e9920538fcd&amp;amp;ex=1318392000&amp;amp;partner=rssnyt&amp;amp;pagewanted=print&amp;quot;&amp;gt;&lt;br /&gt;
    Airbus Moves to Rewire Its Management First&amp;lt;/a&amp;gt;&lt;br /&gt;
    By MARK LANDLER, The New York Times&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;New uses of software&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.csmonitor.com/2006/0711/p03s04-usgn.html&amp;quot;&amp;gt;&lt;br /&gt;
    On space station, droids get a workout&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter N. Spotts &amp;lt;em&amp;gt;Christian Science Monitor&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.mobilemag.com/content/100/103/C8827/&amp;quot;&amp;gt;&lt;br /&gt;
    Anti-hijack software controls planes from the ground&amp;lt;/a&amp;gt;&lt;br /&gt;
    T.O. Whenham &amp;lt;em&amp;gt;Mobile Magazine&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Software Malfunctions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.avweb.com/eletter/archives/avflash/465-full.html#190603&amp;quot;&amp;gt;&lt;br /&gt;
    Pilots Battle Computer For Control Of 777&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    The AVweb Editorial Staff &amp;lt;em&amp;gt;AVweb&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/23.12.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    B747-400 Electronic flight displays rendered inoperative&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter B. Ladkin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/24.03.html#subj3.1&amp;quot;&amp;gt;&lt;br /&gt;
    Flight Control System Software Anomalies&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Peter B. Ladkin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Effects of portable electronic devices&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.cmu.edu/PR/releases06/060228_cellphone.html&amp;quot;&amp;gt;&lt;br /&gt;
    Carnegie Mellon Researchers Find Cell Phones Pose Greater Risk to Airplane Navigation Than Previously Believed&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;Carnegie Mellon University&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.spectrum.ieee.org/print/3069&amp;quot;&amp;gt;&lt;br /&gt;
    Unsafe At Any Airspeed?&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;IEEE&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/23.54.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    Tests show cell phones don't disrupt navigation systems&amp;lt;/a&amp;gt;&lt;br /&gt;
    NewsScan &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Aviation standards&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.airweb.faa.gov/Regulatory_and_Guidance_Library/rgAD.nsf/0/94171A756992D0408625708300551865?OpenDocument&amp;amp;amp;Highlight=software&amp;quot;&amp;gt;&lt;br /&gt;
    Airworthiness Directive&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
     &amp;lt;em&amp;gt;FAA&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation_safety_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/9.01.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    UK Defense software standard&amp;lt;/a&amp;gt;&lt;br /&gt;
    Sean Matthews &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/16.16.html#subj3&amp;quot;&amp;gt;&lt;br /&gt;
    Summary of safety-critical computers in transport aircraft&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Peter B. Lankin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://satc.gsfc.nasa.gov/assure/nss8719_13.html&amp;quot;&amp;gt;&lt;br /&gt;
    SOFTWARE SAFETY NASA TECHNICAL STANDARD&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;NASA&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_1&amp;diff=2138</id>
		<title>CSC 379:Week 5, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_1&amp;diff=2138"/>
		<updated>2007-08-05T00:14:25Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Airbus 380 Software Flaw=&lt;br /&gt;
'''Provide an overview of this ethical controversy and links to information relevant for each set of ethical concerns cited.'''&lt;br /&gt;
&lt;br /&gt;
'''Cover information contained in both articles:'''&lt;br /&gt;
* [http://seattletimes.nwsource.com/html/boeingaerospace/2002534201_airbuswhistleblower02.html Seattle Times]&lt;br /&gt;
* [http://www.telegraph.co.uk/money/main.jhtml?xml=/money/2005/10/15/ccairb15.xml Telegraph.co.uk]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Included below are two excerpts that give an overview of the content of this topic:'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Mr Mangan claims a defect in the outflow valve control system could lead to an abrupt loss of cabin pressure, leaving passengers unconscious in as little as 20 seconds. &amp;quot;Normal oxygen masks don't work properly above 33,000 feet. Anybody over forty or over-weight is at a high risk of embolisms,&amp;quot; he said.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Airbus dismissed fears about the A380 as baseless. &amp;quot;We have examined this internally and found absolutely no reason to be concerned. The scenario made up by Mr Mangan does not exist,&amp;quot; said spokesman David Voskuhl.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;TTTech falsely classified its micro-chip as a simple &amp;quot;off-the-shelf&amp;quot; product already used in car valves in order to except it from elaborate testing rules, he claimed. This would breach both EU and US law on aircraft regulation. &amp;quot;I refused to sign off on the test results, but TTTech went ahead anyway,&amp;quot; he claimed.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;TTTech denies the allegations, calling him a disgruntled ex-employee who never fitted into the team, and is now bent on revenge.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source: [http://www.telegraph.co.uk/money/main.jhtml?xml=/money/2005/10/15/ccairb15.xml Telegraph.co.uk]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Most passenger jets have two cabin-pressure valves, with separate motors operating each. But because aircraft makers want redundancy on safety systems the planes have three motors for each valve, with different chips controlling each motor. [...] Most jetliners also have a manual override so that the pilot can take control in an emergency. [...] The company elected to go with four outflow valves on the A380, with only one motor on each valve, which are slightly larger than a cabin window. Each motor uses a TTTech controller chip, and there is no backup manual-override system.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Mangan says the European aerospace establishment is whitewashing his claims because of enormous cost savings that will be realized if TTTech's chips are approved for the A380. &lt;br /&gt;
TTTech's chip originally was designed for use in autos and the company is trying to get it certified as an existing, &amp;quot;commercial off-the-shelf&amp;quot; product that is acceptable for the A380, according to court records.&lt;br /&gt;
Mangan, however, alleges that the chip is being customized for aviation purposes, and thus must undergo stringent testing before being approved by regulators.&lt;br /&gt;
If regulators decide that TTTech's chip is a simple commercial device and can be used in the A380, it would then be available for other new aircraft without having to pass costly safety reviews.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source: [http://seattletimes.nwsource.com/html/boeingaerospace/2002534201_airbuswhistleblower02.html Seattle Times]&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
====History====&lt;br /&gt;
Joseph Mangan, a former employee of TTTech Computertechnik, blew the whistle on Airbus and TTTech regarding the safety of the cabin pressure system on the Airbus A380 aircraft in September 2004 by contacting the European Aviation Safety Agency (EASA). TTTech supplies some components to Airbus for the A380, and has been accused by Mangan of &amp;quot;intentional non-compliance&amp;quot; with aviation safety rules.&lt;br /&gt;
&lt;br /&gt;
Mangan claimed that a flaw existed in the outflow valve control system, which uses TTTech controllers, that could result in a sudden loss of air pressure in the cabin. Such a loss of air pressure would result in passengers quickly losing consciousness, with other possible health consequences. One of the primary concerns generated by this claim was the lack of different backup systems to prevent the same problem from affecting all the valves at the same time.&lt;br /&gt;
&lt;br /&gt;
==Table of Contents==&lt;br /&gt;
&amp;lt;h3&amp;gt;General&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.csl.sri.com/users/neumann/air.html&amp;quot;&amp;gt;&lt;br /&gt;
    Computer Security in Aviation: Vulnerabilities, Threats, and Risks&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter G. Neumann &amp;lt;em&amp;gt;SRI Computer Science Laboratory&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://sunnyday.mit.edu/papers/smcit.doc&amp;quot;&amp;gt;&lt;br /&gt;
     Fault Protection in a Component-Based Spacecraft Architecture&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Elwin C. Ong and Nancy G. Leveson &amp;lt;em&amp;gt;MIT&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;!--&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.ece.cmu.edu/%7Ekoopman/des_s99/sw_reliability/#concepts&amp;quot;&amp;gt;&lt;br /&gt;
    Software Reliability&amp;lt;/a&amp;gt;&lt;br /&gt;
    Jiantao Pan &amp;lt;em&amp;gt;Carnegie Mellon University&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;--&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Conflicting Views&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.newyorker.com/archive/2006/07/31/060731ta_talk_surowiecki&amp;quot;&amp;gt;&lt;br /&gt;
    The Fatal-Flaw Myth&amp;lt;/a&amp;gt;&lt;br /&gt;
    The Financial Page by James Surowiecki, The New Yorker&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.nytimes.com/2006/10/13/business/worldbusiness/13airbus.html?ei=5088&amp;amp;en=9c624e9920538fcd&amp;amp;ex=1318392000&amp;amp;partner=rssnyt&amp;amp;pagewanted=print&amp;quot;&amp;gt;&lt;br /&gt;
    Airbus Moves to Rewire Its Management First&amp;lt;/a&amp;gt;&lt;br /&gt;
    By MARK LANDLER, The New York Times&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;New uses of software&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.csmonitor.com/2006/0711/p03s04-usgn.html&amp;quot;&amp;gt;&lt;br /&gt;
    On space station, droids get a workout&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter N. Spotts &amp;lt;em&amp;gt;Christian Science Monitor&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.mobilemag.com/content/100/103/C8827/&amp;quot;&amp;gt;&lt;br /&gt;
    Anti-hijack software controls planes from the ground&amp;lt;/a&amp;gt;&lt;br /&gt;
    T.O. Whenham &amp;lt;em&amp;gt;Mobile Magazine&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Software Malfunctions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.avweb.com/eletter/archives/avflash/465-full.html#190603&amp;quot;&amp;gt;&lt;br /&gt;
    Pilots Battle Computer For Control Of 777&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    The AVweb Editorial Staff &amp;lt;em&amp;gt;AVweb&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/23.12.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    B747-400 Electronic flight displays rendered inoperative&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter B. Ladkin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/24.03.html#subj3.1&amp;quot;&amp;gt;&lt;br /&gt;
    Flight Control System Software Anomalies&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Peter B. Ladkin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Effects of portable electronic devices&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.cmu.edu/PR/releases06/060228_cellphone.html&amp;quot;&amp;gt;&lt;br /&gt;
    Carnegie Mellon Researchers Find Cell Phones Pose Greater Risk to Airplane Navigation Than Previously Believed&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;Carnegie Mellon University&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.spectrum.ieee.org/print/3069&amp;quot;&amp;gt;&lt;br /&gt;
    Unsafe At Any Airspeed?&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;IEEE&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/23.54.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    Tests show cell phones don't disrupt navigation systems&amp;lt;/a&amp;gt;&lt;br /&gt;
    NewsScan &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Aviation standards&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.airweb.faa.gov/Regulatory_and_Guidance_Library/rgAD.nsf/0/94171A756992D0408625708300551865?OpenDocument&amp;amp;amp;Highlight=software&amp;quot;&amp;gt;&lt;br /&gt;
    Airworthiness Directive&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
     &amp;lt;em&amp;gt;FAA&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation_safety_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/9.01.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    UK Defense software standard&amp;lt;/a&amp;gt;&lt;br /&gt;
    Sean Matthews &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/16.16.html#subj3&amp;quot;&amp;gt;&lt;br /&gt;
    Summary of safety-critical computers in transport aircraft&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Peter B. Lankin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://satc.gsfc.nasa.gov/assure/nss8719_13.html&amp;quot;&amp;gt;&lt;br /&gt;
    SOFTWARE SAFETY NASA TECHNICAL STANDARD&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;NASA&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_1&amp;diff=2137</id>
		<title>CSC 379:Week 5, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_1&amp;diff=2137"/>
		<updated>2007-08-05T00:09:40Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Airbus 380 Software Flaw=&lt;br /&gt;
'''Provide an overview of this ethical controversy and links to information relevant for each set of ethical concerns cited.'''&lt;br /&gt;
&lt;br /&gt;
'''Cover information contained in both articles:'''&lt;br /&gt;
* [http://seattletimes.nwsource.com/html/boeingaerospace/2002534201_airbuswhistleblower02.html Seattle Times]&lt;br /&gt;
* [http://www.telegraph.co.uk/money/main.jhtml?xml=/money/2005/10/15/ccairb15.xml Telegraph.co.uk]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Included below are two excerpts that give an overview of the content of this topic:'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Mr Mangan claims a defect in the outflow valve control system could lead to an abrupt loss of cabin pressure, leaving passengers unconscious in as little as 20 seconds. &amp;quot;Normal oxygen masks don't work properly above 33,000 feet. Anybody over forty or over-weight is at a high risk of embolisms,&amp;quot; he said.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Airbus dismissed fears about the A380 as baseless. &amp;quot;We have examined this internally and found absolutely no reason to be concerned. The scenario made up by Mr Mangan does not exist,&amp;quot; said spokesman David Voskuhl.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;TTTech falsely classified its micro-chip as a simple &amp;quot;off-the-shelf&amp;quot; product already used in car valves in order to except it from elaborate testing rules, he claimed. This would breach both EU and US law on aircraft regulation. &amp;quot;I refused to sign off on the test results, but TTTech went ahead anyway,&amp;quot; he claimed.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;TTTech denies the allegations, calling him a disgruntled ex-employee who never fitted into the team, and is now bent on revenge.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source: [http://www.telegraph.co.uk/money/main.jhtml?xml=/money/2005/10/15/ccairb15.xml Telegraph.co.uk]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Most passenger jets have two cabin-pressure valves, with separate motors operating each. But because aircraft makers want redundancy on safety systems the planes have three motors for each valve, with different chips controlling each motor. [...] Most jetliners also have a manual override so that the pilot can take control in an emergency. [...] The company elected to go with four outflow valves on the A380, with only one motor on each valve, which are slightly larger than a cabin window. Each motor uses a TTTech controller chip, and there is no backup manual-override system.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Mangan says the European aerospace establishment is whitewashing his claims because of enormous cost savings that will be realized if TTTech's chips are approved for the A380. &lt;br /&gt;
TTTech's chip originally was designed for use in autos and the company is trying to get it certified as an existing, &amp;quot;commercial off-the-shelf&amp;quot; product that is acceptable for the A380, according to court records.&lt;br /&gt;
Mangan, however, alleges that the chip is being customized for aviation purposes, and thus must undergo stringent testing before being approved by regulators.&lt;br /&gt;
If regulators decide that TTTech's chip is a simple commercial device and can be used in the A380, it would then be available for other new aircraft without having to pass costly safety reviews.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source: [http://seattletimes.nwsource.com/html/boeingaerospace/2002534201_airbuswhistleblower02.html Seattle Times]&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
Joseph Mangan, a former employee of TTTech Computertechnik, blew the whistle on Airbus and TTTech regarding the safety of the cabin pressure system on the Airbus A380 aircraft in September 2004 by contacting the European Aviation Safety Agency (EASA). TTTech supplies some components to Airbus for the A380, and has been accused by Mangan of &amp;quot;intentional non-compliance&amp;quot; with aviation safety rules.&lt;br /&gt;
&lt;br /&gt;
Mangan claimed that a flaw existed in the outflow valve control system, which uses TTTech controllers, that could result in a sudden loss of air pressure in the cabin. Such a loss of air pressure would result in passengers quickly losing consciousness, with other possible health consequences. One of the primary concerns generated by this claim was the lack of different backup systems to prevent the same problem from affecting all the valves at the same time.&lt;br /&gt;
&lt;br /&gt;
==Table of Contents==&lt;br /&gt;
&amp;lt;h3&amp;gt;General&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.csl.sri.com/users/neumann/air.html&amp;quot;&amp;gt;&lt;br /&gt;
    Computer Security in Aviation: Vulnerabilities, Threats, and Risks&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter G. Neumann &amp;lt;em&amp;gt;SRI Computer Science Laboratory&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://sunnyday.mit.edu/papers/smcit.doc&amp;quot;&amp;gt;&lt;br /&gt;
     Fault Protection in a Component-Based Spacecraft Architecture&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Elwin C. Ong and Nancy G. Leveson &amp;lt;em&amp;gt;MIT&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;!--&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.ece.cmu.edu/%7Ekoopman/des_s99/sw_reliability/#concepts&amp;quot;&amp;gt;&lt;br /&gt;
    Software Reliability&amp;lt;/a&amp;gt;&lt;br /&gt;
    Jiantao Pan &amp;lt;em&amp;gt;Carnegie Mellon University&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;--&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Conflicting Views&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.newyorker.com/archive/2006/07/31/060731ta_talk_surowiecki&amp;quot;&amp;gt;&lt;br /&gt;
    The Fatal-Flaw Myth&amp;lt;/a&amp;gt;&lt;br /&gt;
    The Financial Page by James Surowiecki, The New Yorker&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.nytimes.com/2006/10/13/business/worldbusiness/13airbus.html?ei=5088&amp;amp;en=9c624e9920538fcd&amp;amp;ex=1318392000&amp;amp;partner=rssnyt&amp;amp;pagewanted=print&amp;quot;&amp;gt;&lt;br /&gt;
    Airbus Moves to Rewire Its Management First&amp;lt;/a&amp;gt;&lt;br /&gt;
    By MARK LANDLER, The New York Times&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;New uses of software&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.csmonitor.com/2006/0711/p03s04-usgn.html&amp;quot;&amp;gt;&lt;br /&gt;
    On space station, droids get a workout&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter N. Spotts &amp;lt;em&amp;gt;Christian Science Monitor&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.mobilemag.com/content/100/103/C8827/&amp;quot;&amp;gt;&lt;br /&gt;
    Anti-hijack software controls planes from the ground&amp;lt;/a&amp;gt;&lt;br /&gt;
    T.O. Whenham &amp;lt;em&amp;gt;Mobile Magazine&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Software Malfunctions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.avweb.com/eletter/archives/avflash/465-full.html#190603&amp;quot;&amp;gt;&lt;br /&gt;
    Pilots Battle Computer For Control Of 777&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    The AVweb Editorial Staff &amp;lt;em&amp;gt;AVweb&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/23.12.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    B747-400 Electronic flight displays rendered inoperative&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter B. Ladkin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/24.03.html#subj3.1&amp;quot;&amp;gt;&lt;br /&gt;
    Flight Control System Software Anomalies&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Peter B. Ladkin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Effects of portable electronic devices&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.cmu.edu/PR/releases06/060228_cellphone.html&amp;quot;&amp;gt;&lt;br /&gt;
    Carnegie Mellon Researchers Find Cell Phones Pose Greater Risk to Airplane Navigation Than Previously Believed&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;Carnegie Mellon University&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.spectrum.ieee.org/print/3069&amp;quot;&amp;gt;&lt;br /&gt;
    Unsafe At Any Airspeed?&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;IEEE&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/23.54.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    Tests show cell phones don't disrupt navigation systems&amp;lt;/a&amp;gt;&lt;br /&gt;
    NewsScan &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Aviation standards&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.airweb.faa.gov/Regulatory_and_Guidance_Library/rgAD.nsf/0/94171A756992D0408625708300551865?OpenDocument&amp;amp;amp;Highlight=software&amp;quot;&amp;gt;&lt;br /&gt;
    Airworthiness Directive&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
     &amp;lt;em&amp;gt;FAA&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation_safety_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/9.01.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    UK Defense software standard&amp;lt;/a&amp;gt;&lt;br /&gt;
    Sean Matthews &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/16.16.html#subj3&amp;quot;&amp;gt;&lt;br /&gt;
    Summary of safety-critical computers in transport aircraft&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Peter B. Lankin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://satc.gsfc.nasa.gov/assure/nss8719_13.html&amp;quot;&amp;gt;&lt;br /&gt;
    SOFTWARE SAFETY NASA TECHNICAL STANDARD&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;NASA&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_1&amp;diff=2136</id>
		<title>CSC 379:Week 5, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_1&amp;diff=2136"/>
		<updated>2007-08-04T23:29:09Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: added beginnings of an overview section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Airbus 380 Software Flaw=&lt;br /&gt;
'''Provide an overview of this ethical controversy and links to information relevant for each set of ethical concerns cited.'''&lt;br /&gt;
&lt;br /&gt;
'''Cover information contained in both articles:'''&lt;br /&gt;
* [http://seattletimes.nwsource.com/html/boeingaerospace/2002534201_airbuswhistleblower02.html Seattle Times]&lt;br /&gt;
* [http://www.telegraph.co.uk/money/main.jhtml?xml=/money/2005/10/15/ccairb15.xml Telegraph.co.uk]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Included below are two excerpts that give an overview of the content of this topic:'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Mr Mangan claims a defect in the outflow valve control system could lead to an abrupt loss of cabin pressure, leaving passengers unconscious in as little as 20 seconds. &amp;quot;Normal oxygen masks don't work properly above 33,000 feet. Anybody over forty or over-weight is at a high risk of embolisms,&amp;quot; he said.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Airbus dismissed fears about the A380 as baseless. &amp;quot;We have examined this internally and found absolutely no reason to be concerned. The scenario made up by Mr Mangan does not exist,&amp;quot; said spokesman David Voskuhl.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;TTTech falsely classified its micro-chip as a simple &amp;quot;off-the-shelf&amp;quot; product already used in car valves in order to except it from elaborate testing rules, he claimed. This would breach both EU and US law on aircraft regulation. &amp;quot;I refused to sign off on the test results, but TTTech went ahead anyway,&amp;quot; he claimed.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;TTTech denies the allegations, calling him a disgruntled ex-employee who never fitted into the team, and is now bent on revenge.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source: [http://www.telegraph.co.uk/money/main.jhtml?xml=/money/2005/10/15/ccairb15.xml Telegraph.co.uk]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Most passenger jets have two cabin-pressure valves, with separate motors operating each. But because aircraft makers want redundancy on safety systems the planes have three motors for each valve, with different chips controlling each motor. [...] Most jetliners also have a manual override so that the pilot can take control in an emergency. [...] The company elected to go with four outflow valves on the A380, with only one motor on each valve, which are slightly larger than a cabin window. Each motor uses a TTTech controller chip, and there is no backup manual-override system.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Mangan says the European aerospace establishment is whitewashing his claims because of enormous cost savings that will be realized if TTTech's chips are approved for the A380. &lt;br /&gt;
TTTech's chip originally was designed for use in autos and the company is trying to get it certified as an existing, &amp;quot;commercial off-the-shelf&amp;quot; product that is acceptable for the A380, according to court records.&lt;br /&gt;
Mangan, however, alleges that the chip is being customized for aviation purposes, and thus must undergo stringent testing before being approved by regulators.&lt;br /&gt;
If regulators decide that TTTech's chip is a simple commercial device and can be used in the A380, it would then be available for other new aircraft without having to pass costly safety reviews.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source: [http://seattletimes.nwsource.com/html/boeingaerospace/2002534201_airbuswhistleblower02.html Seattle Times]&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
Joseph Mangan, a former employee of TTTech Computertechnik, blew the whistle on Airbus and TTTech regarding the safety of the cabin pressure system on the Airbus A380 aircraft in September 2004 by contacting the European Aviation Safety Agency (EASA). TTTech supplies some components to Airbus for the A380, and has been accused by Mangan of &amp;quot;intentional non-compliance&amp;quot; with aviation safety rules.&lt;br /&gt;
&lt;br /&gt;
==Table of Contents==&lt;br /&gt;
&amp;lt;h3&amp;gt;General&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.csl.sri.com/users/neumann/air.html&amp;quot;&amp;gt;&lt;br /&gt;
    Computer Security in Aviation: Vulnerabilities, Threats, and Risks&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter G. Neumann &amp;lt;em&amp;gt;SRI Computer Science Laboratory&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://sunnyday.mit.edu/papers/smcit.doc&amp;quot;&amp;gt;&lt;br /&gt;
     Fault Protection in a Component-Based Spacecraft Architecture&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Elwin C. Ong and Nancy G. Leveson &amp;lt;em&amp;gt;MIT&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;!--&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.ece.cmu.edu/%7Ekoopman/des_s99/sw_reliability/#concepts&amp;quot;&amp;gt;&lt;br /&gt;
    Software Reliability&amp;lt;/a&amp;gt;&lt;br /&gt;
    Jiantao Pan &amp;lt;em&amp;gt;Carnegie Mellon University&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;--&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Conflicting Views&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.newyorker.com/archive/2006/07/31/060731ta_talk_surowiecki&amp;quot;&amp;gt;&lt;br /&gt;
    The Fatal-Flaw Myth&amp;lt;/a&amp;gt;&lt;br /&gt;
    The Financial Page by James Surowiecki, The New Yorker&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.nytimes.com/2006/10/13/business/worldbusiness/13airbus.html?ei=5088&amp;amp;en=9c624e9920538fcd&amp;amp;ex=1318392000&amp;amp;partner=rssnyt&amp;amp;pagewanted=print&amp;quot;&amp;gt;&lt;br /&gt;
    Airbus Moves to Rewire Its Management First&amp;lt;/a&amp;gt;&lt;br /&gt;
    By MARK LANDLER, The New York Times&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;New uses of software&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.csmonitor.com/2006/0711/p03s04-usgn.html&amp;quot;&amp;gt;&lt;br /&gt;
    On space station, droids get a workout&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter N. Spotts &amp;lt;em&amp;gt;Christian Science Monitor&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.mobilemag.com/content/100/103/C8827/&amp;quot;&amp;gt;&lt;br /&gt;
    Anti-hijack software controls planes from the ground&amp;lt;/a&amp;gt;&lt;br /&gt;
    T.O. Whenham &amp;lt;em&amp;gt;Mobile Magazine&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Software Malfunctions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.avweb.com/eletter/archives/avflash/465-full.html#190603&amp;quot;&amp;gt;&lt;br /&gt;
    Pilots Battle Computer For Control Of 777&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    The AVweb Editorial Staff &amp;lt;em&amp;gt;AVweb&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/23.12.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    B747-400 Electronic flight displays rendered inoperative&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter B. Ladkin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/24.03.html#subj3.1&amp;quot;&amp;gt;&lt;br /&gt;
    Flight Control System Software Anomalies&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Peter B. Ladkin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Effects of portable electronic devices&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.cmu.edu/PR/releases06/060228_cellphone.html&amp;quot;&amp;gt;&lt;br /&gt;
    Carnegie Mellon Researchers Find Cell Phones Pose Greater Risk to Airplane Navigation Than Previously Believed&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;Carnegie Mellon University&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.spectrum.ieee.org/print/3069&amp;quot;&amp;gt;&lt;br /&gt;
    Unsafe At Any Airspeed?&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;IEEE&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/23.54.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    Tests show cell phones don't disrupt navigation systems&amp;lt;/a&amp;gt;&lt;br /&gt;
    NewsScan &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Aviation standards&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.airweb.faa.gov/Regulatory_and_Guidance_Library/rgAD.nsf/0/94171A756992D0408625708300551865?OpenDocument&amp;amp;amp;Highlight=software&amp;quot;&amp;gt;&lt;br /&gt;
    Airworthiness Directive&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
     &amp;lt;em&amp;gt;FAA&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation_safety_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/9.01.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    UK Defense software standard&amp;lt;/a&amp;gt;&lt;br /&gt;
    Sean Matthews &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/16.16.html#subj3&amp;quot;&amp;gt;&lt;br /&gt;
    Summary of safety-critical computers in transport aircraft&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Peter B. Lankin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://satc.gsfc.nasa.gov/assure/nss8719_13.html&amp;quot;&amp;gt;&lt;br /&gt;
    SOFTWARE SAFETY NASA TECHNICAL STANDARD&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;NASA&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_1&amp;diff=2081</id>
		<title>CSC 379:Week 5, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_1&amp;diff=2081"/>
		<updated>2007-08-02T23:46:56Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Airbus 380 Software Flaw=&lt;br /&gt;
'''Provide an overview of this ethical controversy and links to information relevant for each set of ethical concerns cited.'''&lt;br /&gt;
&lt;br /&gt;
'''Cover information contained in both articles:'''&lt;br /&gt;
* [http://seattletimes.nwsource.com/html/boeingaerospace/2002534201_airbuswhistleblower02.html Seattle Times]&lt;br /&gt;
* [http://www.telegraph.co.uk/money/main.jhtml?xml=/money/2005/10/15/ccairb15.xml Telegraph.co.uk]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Included below are two excerpts that give an overview of the content of this topic:'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Mr Mangan claims a defect in the outflow valve control system could lead to an abrupt loss of cabin pressure, leaving passengers unconscious in as little as 20 seconds. &amp;quot;Normal oxygen masks don't work properly above 33,000 feet. Anybody over forty or over-weight is at a high risk of embolisms,&amp;quot; he said.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Airbus dismissed fears about the A380 as baseless. &amp;quot;We have examined this internally and found absolutely no reason to be concerned. The scenario made up by Mr Mangan does not exist,&amp;quot; said spokesman David Voskuhl.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;TTTech falsely classified its micro-chip as a simple &amp;quot;off-the-shelf&amp;quot; product already used in car valves in order to except it from elaborate testing rules, he claimed. This would breach both EU and US law on aircraft regulation. &amp;quot;I refused to sign off on the test results, but TTTech went ahead anyway,&amp;quot; he claimed.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;TTTech denies the allegations, calling him a disgruntled ex-employee who never fitted into the team, and is now bent on revenge.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source: [http://www.telegraph.co.uk/money/main.jhtml?xml=/money/2005/10/15/ccairb15.xml Telegraph.co.uk]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Most passenger jets have two cabin-pressure valves, with separate motors operating each. But because aircraft makers want redundancy on safety systems the planes have three motors for each valve, with different chips controlling each motor. [...] Most jetliners also have a manual override so that the pilot can take control in an emergency. [...] The company elected to go with four outflow valves on the A380, with only one motor on each valve, which are slightly larger than a cabin window. Each motor uses a TTTech controller chip, and there is no backup manual-override system.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Mangan says the European aerospace establishment is whitewashing his claims because of enormous cost savings that will be realized if TTTech's chips are approved for the A380. &lt;br /&gt;
TTTech's chip originally was designed for use in autos and the company is trying to get it certified as an existing, &amp;quot;commercial off-the-shelf&amp;quot; product that is acceptable for the A380, according to court records.&lt;br /&gt;
Mangan, however, alleges that the chip is being customized for aviation purposes, and thus must undergo stringent testing before being approved by regulators.&lt;br /&gt;
If regulators decide that TTTech's chip is a simple commercial device and can be used in the A380, it would then be available for other new aircraft without having to pass costly safety reviews.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source: [http://seattletimes.nwsource.com/html/boeingaerospace/2002534201_airbuswhistleblower02.html Seattle Times]&lt;br /&gt;
&lt;br /&gt;
==Table of Contents==&lt;br /&gt;
&amp;lt;h3&amp;gt;General&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.csl.sri.com/users/neumann/air.html&amp;quot;&amp;gt;&lt;br /&gt;
    Computer Security in Aviation: Vulnerabilities, Threats, and Risks&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter G. Neumann &amp;lt;em&amp;gt;SRI Computer Science Laboratory&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://sunnyday.mit.edu/papers/smcit.doc&amp;quot;&amp;gt;&lt;br /&gt;
     Fault Protection in a Component-Based Spacecraft Architecture&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Elwin C. Ong and Nancy G. Leveson &amp;lt;em&amp;gt;MIT&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;!--&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.ece.cmu.edu/%7Ekoopman/des_s99/sw_reliability/#concepts&amp;quot;&amp;gt;&lt;br /&gt;
    Software Reliability&amp;lt;/a&amp;gt;&lt;br /&gt;
    Jiantao Pan &amp;lt;em&amp;gt;Carnegie Mellon University&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;--&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;New uses of software&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.csmonitor.com/2006/0711/p03s04-usgn.html&amp;quot;&amp;gt;&lt;br /&gt;
    On space station, droids get a workout&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter N. Spotts &amp;lt;em&amp;gt;Christian Science Monitor&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.mobilemag.com/content/100/103/C8827/&amp;quot;&amp;gt;&lt;br /&gt;
    Anti-hijack software controls planes from the ground&amp;lt;/a&amp;gt;&lt;br /&gt;
    T.O. Whenham &amp;lt;em&amp;gt;Mobile Magazine&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Software Malfunctions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.avweb.com/eletter/archives/avflash/465-full.html#190603&amp;quot;&amp;gt;&lt;br /&gt;
    Pilots Battle Computer For Control Of 777&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    The AVweb Editorial Staff &amp;lt;em&amp;gt;AVweb&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/23.12.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    B747-400 Electronic flight displays rendered inoperative&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter B. Ladkin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/24.03.html#subj3.1&amp;quot;&amp;gt;&lt;br /&gt;
    Flight Control System Software Anomalies&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Peter B. Ladkin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Effects of portable electronic devices&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.cmu.edu/PR/releases06/060228_cellphone.html&amp;quot;&amp;gt;&lt;br /&gt;
    Carnegie Mellon Researchers Find Cell Phones Pose Greater Risk to Airplane Navigation Than Previously Believed&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;Carnegie Mellon University&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.spectrum.ieee.org/print/3069&amp;quot;&amp;gt;&lt;br /&gt;
    Unsafe At Any Airspeed?&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;IEEE&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.house.gov/transportation/aviation/hearing/07-20-00/07-20-00memo.html&amp;quot;&amp;gt;&lt;br /&gt;
    Portable Electronic Devices: Do they really pose a safey hazard on aircraft&amp;lt;/a&amp;gt;&lt;br /&gt;
    The Subcommittee on Aviation &amp;lt;em&amp;gt;U.S. House of Representatives&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/23.54.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    Tests show cell phones don't disrupt navigation systems&amp;lt;/a&amp;gt;&lt;br /&gt;
    NewsScan &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Aviation standards&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.airweb.faa.gov/Regulatory_and_Guidance_Library/rgAD.nsf/0/94171A756992D0408625708300551865?OpenDocument&amp;amp;amp;Highlight=software&amp;quot;&amp;gt;&lt;br /&gt;
    Airworthiness Directive&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
     &amp;lt;em&amp;gt;FAA&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation_safety_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/9.01.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    UK Defense software standard&amp;lt;/a&amp;gt;&lt;br /&gt;
    Sean Matthews &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/16.16.html#subj3&amp;quot;&amp;gt;&lt;br /&gt;
    Summary of safety-critical computers in transport aircraft&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Peter B. Lankin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://satc.gsfc.nasa.gov/assure/nss8719_13.html&amp;quot;&amp;gt;&lt;br /&gt;
    SOFTWARE SAFETY NASA TECHNICAL STANDARD&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;NASA&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_2&amp;diff=1956</id>
		<title>CSC 379:Week 4, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_2&amp;diff=1956"/>
		<updated>2007-07-28T19:16:38Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Relevant Outside Website Links: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Workplace Monitoring=&lt;br /&gt;
The increasing prevalence of monitoring technologies in the workplace poses many ethical concerns.  Existing technologies, like sniffers, can provide monitoring of employee actions on workstations and traffic on workplace networks such as email and instant messaging.  Employers may also legally monitor phone conversions to a limited extent.  While businesses are attempting to make sure their employees do a good job, excessive monitoring may cause harm to employees.  Monitoring could be abused if personal information discovered while monitoring employees is used to discriminate against them.  &lt;br /&gt;
&lt;br /&gt;
'''Analyze the ethical implications of employers' use of workplace monitoring.  Examine a couple new or emerging methods of workplace monitoring technology in detail.'''&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/social/workplace/monitoring/ http://ethics.csc.ncsu.edu/social/workplace/monitoring/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/e-mail/ http://ethics.csc.ncsu.edu/privacy/e-mail/]&lt;br /&gt;
&lt;br /&gt;
==Relevant Outside Website Links:==&lt;br /&gt;
*[http://computer.howstuffworks.com/workplace-surveillance.htm How Stuff Works Article on Workplace Surveillance]&lt;br /&gt;
*[http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;articleId=9027281&amp;amp;pageNumber=1 ComputerWorld article on workplace surveillance]&lt;br /&gt;
*[http://www.privacyrights.org/fs/fs7-work.htm Privacy Rights Clearinghouse workplace surveillance article]&lt;br /&gt;
*[http://www.bankrate.com/brm/news/advice/20050718a1.asp Bankrate.com article on privacy in the workplace]&lt;br /&gt;
&lt;br /&gt;
==Ethical implications==&lt;br /&gt;
More people are using computers , email, and the internet as part of there daily work activity.  These tools can be used to increase the amount of work getting done, but they also make it very easy for an employer to track and record every thing you do online or read all the emails you send.&lt;br /&gt;
&lt;br /&gt;
This raises an ethical question of rather this is a invasion of privacy and wrong?&lt;br /&gt;
&lt;br /&gt;
===Arguments for work place monitoring===&lt;br /&gt;
&lt;br /&gt;
*Activity's being done one company equipment.&lt;br /&gt;
*Ensure that sensitive information is not posted online.&lt;br /&gt;
*Employers have the right to track how employees are using company time and monitoring can increase productivity&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Arguments against work place monitoring===&lt;br /&gt;
&lt;br /&gt;
*Many feel that emails and web surfing are private activities&lt;br /&gt;
*Monitoring will create more stress and friction between employees and employers&lt;br /&gt;
*That during lunch and other breaks they should be able to use internet and email for private use&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A employee should be aware that technology makes it easy to track what web sites they visits, emails are saved and easy to read, and that the companys policy about work place monitoring should be known.&lt;br /&gt;
&lt;br /&gt;
==Methods of workplace monitoring==&lt;br /&gt;
&lt;br /&gt;
The methods used by employers to monitor employees basically fall into two categories, computer surveillance and physical surveillance.&lt;br /&gt;
&lt;br /&gt;
===Computer Surveillance===&lt;br /&gt;
Computer surveillance is one of the most popular forms of workplace surveillance due to the prevalence of computers and internet use in business. It utilizes monitoring software to keep track of employees' computer activities. Computer surveillance methods can be divided into two groups: internet surveillance and desktop surveillance.&lt;br /&gt;
&lt;br /&gt;
'''Internet Surveillance'''&lt;br /&gt;
&lt;br /&gt;
Internet surveillance involves monitoring employees' internet activities by watching, and possibly filtering, traffic that is transmitted over the company network. This can be achieved by custom hardware appliances, such as firewalls, monitoring software, or packet sniffing.&lt;br /&gt;
&lt;br /&gt;
Some examples of internet surveillance:&lt;br /&gt;
*Email and instant messaging logging&lt;br /&gt;
*Logging of websites visited by users&lt;br /&gt;
*Blocking of certain websites&lt;br /&gt;
*Packet sniffing&lt;br /&gt;
&lt;br /&gt;
'''Desktop Surveillance'''&lt;br /&gt;
&lt;br /&gt;
Desktop surveillance consists of directly monitoring activities on an individual's computer by way of monitoring software that is installed on it. This surveillance potentially allows direct monitoring of the screen, logging of keystrokes, logging of idle time, and logging of browsing habits.&lt;br /&gt;
&lt;br /&gt;
===Physical Surveillance===&lt;br /&gt;
Physical surveillance in the workplace is generally carried out through closed-circuit camera monitoring and recording, as well as phone monitoring and recording. In workplaces with access control cards, the time and location of each use of an employee's access card can be logged.&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_2&amp;diff=1955</id>
		<title>CSC 379:Week 4, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_2&amp;diff=1955"/>
		<updated>2007-07-28T19:13:28Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Relevant Outside Website Links: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Workplace Monitoring=&lt;br /&gt;
The increasing prevalence of monitoring technologies in the workplace poses many ethical concerns.  Existing technologies, like sniffers, can provide monitoring of employee actions on workstations and traffic on workplace networks such as email and instant messaging.  Employers may also legally monitor phone conversions to a limited extent.  While businesses are attempting to make sure their employees do a good job, excessive monitoring may cause harm to employees.  Monitoring could be abused if personal information discovered while monitoring employees is used to discriminate against them.  &lt;br /&gt;
&lt;br /&gt;
'''Analyze the ethical implications of employers' use of workplace monitoring.  Examine a couple new or emerging methods of workplace monitoring technology in detail.'''&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/social/workplace/monitoring/ http://ethics.csc.ncsu.edu/social/workplace/monitoring/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/e-mail/ http://ethics.csc.ncsu.edu/privacy/e-mail/]&lt;br /&gt;
&lt;br /&gt;
==Relevant Outside Website Links:==&lt;br /&gt;
*[http://computer.howstuffworks.com/workplace-surveillance.htm How Stuff Works Article on Workplace Surveillance]&lt;br /&gt;
*[http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;articleId=9027281&amp;amp;pageNumber=1 ComputerWorld article on workplace surveillance]&lt;br /&gt;
&lt;br /&gt;
==Ethical implications==&lt;br /&gt;
More people are using computers , email, and the internet as part of there daily work activity.  These tools can be used to increase the amount of work getting done, but they also make it very easy for an employer to track and record every thing you do online or read all the emails you send.&lt;br /&gt;
&lt;br /&gt;
This raises an ethical question of rather this is a invasion of privacy and wrong?&lt;br /&gt;
&lt;br /&gt;
===Arguments for work place monitoring===&lt;br /&gt;
&lt;br /&gt;
*Activity's being done one company equipment.&lt;br /&gt;
*Ensure that sensitive information is not posted online.&lt;br /&gt;
*Employers have the right to track how employees are using company time and monitoring can increase productivity&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Arguments against work place monitoring===&lt;br /&gt;
&lt;br /&gt;
*Many feel that emails and web surfing are private activities&lt;br /&gt;
*Monitoring will create more stress and friction between employees and employers&lt;br /&gt;
*That during lunch and other breaks they should be able to use internet and email for private use&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A employee should be aware that technology makes it easy to track what web sites they visits, emails are saved and easy to read, and that the companys policy about work place monitoring should be known.&lt;br /&gt;
&lt;br /&gt;
==Methods of workplace monitoring==&lt;br /&gt;
&lt;br /&gt;
The methods used by employers to monitor employees basically fall into two categories, computer surveillance and physical surveillance.&lt;br /&gt;
&lt;br /&gt;
===Computer Surveillance===&lt;br /&gt;
Computer surveillance is one of the most popular forms of workplace surveillance due to the prevalence of computers and internet use in business. It utilizes monitoring software to keep track of employees' computer activities. Computer surveillance methods can be divided into two groups: internet surveillance and desktop surveillance.&lt;br /&gt;
&lt;br /&gt;
'''Internet Surveillance'''&lt;br /&gt;
&lt;br /&gt;
Internet surveillance involves monitoring employees' internet activities by watching, and possibly filtering, traffic that is transmitted over the company network. This can be achieved by custom hardware appliances, such as firewalls, monitoring software, or packet sniffing.&lt;br /&gt;
&lt;br /&gt;
Some examples of internet surveillance:&lt;br /&gt;
*Email and instant messaging logging&lt;br /&gt;
*Logging of websites visited by users&lt;br /&gt;
*Blocking of certain websites&lt;br /&gt;
*Packet sniffing&lt;br /&gt;
&lt;br /&gt;
'''Desktop Surveillance'''&lt;br /&gt;
&lt;br /&gt;
Desktop surveillance consists of directly monitoring activities on an individual's computer by way of monitoring software that is installed on it. This surveillance potentially allows direct monitoring of the screen, logging of keystrokes, logging of idle time, and logging of browsing habits.&lt;br /&gt;
&lt;br /&gt;
===Physical Surveillance===&lt;br /&gt;
Physical surveillance in the workplace is generally carried out through closed-circuit camera monitoring and recording, as well as phone monitoring and recording. In workplaces with access control cards, the time and location of each use of an employee's access card can be logged.&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_2&amp;diff=1954</id>
		<title>CSC 379:Week 4, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_2&amp;diff=1954"/>
		<updated>2007-07-28T19:12:28Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Relevant Outside Website Links: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Workplace Monitoring=&lt;br /&gt;
The increasing prevalence of monitoring technologies in the workplace poses many ethical concerns.  Existing technologies, like sniffers, can provide monitoring of employee actions on workstations and traffic on workplace networks such as email and instant messaging.  Employers may also legally monitor phone conversions to a limited extent.  While businesses are attempting to make sure their employees do a good job, excessive monitoring may cause harm to employees.  Monitoring could be abused if personal information discovered while monitoring employees is used to discriminate against them.  &lt;br /&gt;
&lt;br /&gt;
'''Analyze the ethical implications of employers' use of workplace monitoring.  Examine a couple new or emerging methods of workplace monitoring technology in detail.'''&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/social/workplace/monitoring/ http://ethics.csc.ncsu.edu/social/workplace/monitoring/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/e-mail/ http://ethics.csc.ncsu.edu/privacy/e-mail/]&lt;br /&gt;
&lt;br /&gt;
==Relevant Outside Website Links:==&lt;br /&gt;
*[http://computer.howstuffworks.com/workplace-surveillance.htm How Stuff Works Article on Workplace Surveillance]&lt;br /&gt;
&lt;br /&gt;
==Ethical implications==&lt;br /&gt;
More people are using computers , email, and the internet as part of there daily work activity.  These tools can be used to increase the amount of work getting done, but they also make it very easy for an employer to track and record every thing you do online or read all the emails you send.&lt;br /&gt;
&lt;br /&gt;
This raises an ethical question of rather this is a invasion of privacy and wrong?&lt;br /&gt;
&lt;br /&gt;
===Arguments for work place monitoring===&lt;br /&gt;
&lt;br /&gt;
*Activity's being done one company equipment.&lt;br /&gt;
*Ensure that sensitive information is not posted online.&lt;br /&gt;
*Employers have the right to track how employees are using company time and monitoring can increase productivity&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Arguments against work place monitoring===&lt;br /&gt;
&lt;br /&gt;
*Many feel that emails and web surfing are private activities&lt;br /&gt;
*Monitoring will create more stress and friction between employees and employers&lt;br /&gt;
*That during lunch and other breaks they should be able to use internet and email for private use&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A employee should be aware that technology makes it easy to track what web sites they visits, emails are saved and easy to read, and that the companys policy about work place monitoring should be known.&lt;br /&gt;
&lt;br /&gt;
==Methods of workplace monitoring==&lt;br /&gt;
&lt;br /&gt;
The methods used by employers to monitor employees basically fall into two categories, computer surveillance and physical surveillance.&lt;br /&gt;
&lt;br /&gt;
===Computer Surveillance===&lt;br /&gt;
Computer surveillance is one of the most popular forms of workplace surveillance due to the prevalence of computers and internet use in business. It utilizes monitoring software to keep track of employees' computer activities. Computer surveillance methods can be divided into two groups: internet surveillance and desktop surveillance.&lt;br /&gt;
&lt;br /&gt;
'''Internet Surveillance'''&lt;br /&gt;
&lt;br /&gt;
Internet surveillance involves monitoring employees' internet activities by watching, and possibly filtering, traffic that is transmitted over the company network. This can be achieved by custom hardware appliances, such as firewalls, monitoring software, or packet sniffing.&lt;br /&gt;
&lt;br /&gt;
Some examples of internet surveillance:&lt;br /&gt;
*Email and instant messaging logging&lt;br /&gt;
*Logging of websites visited by users&lt;br /&gt;
*Blocking of certain websites&lt;br /&gt;
*Packet sniffing&lt;br /&gt;
&lt;br /&gt;
'''Desktop Surveillance'''&lt;br /&gt;
&lt;br /&gt;
Desktop surveillance consists of directly monitoring activities on an individual's computer by way of monitoring software that is installed on it. This surveillance potentially allows direct monitoring of the screen, logging of keystrokes, logging of idle time, and logging of browsing habits.&lt;br /&gt;
&lt;br /&gt;
===Physical Surveillance===&lt;br /&gt;
Physical surveillance in the workplace is generally carried out through closed-circuit camera monitoring and recording, as well as phone monitoring and recording. In workplaces with access control cards, the time and location of each use of an employee's access card can be logged.&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_2&amp;diff=1953</id>
		<title>CSC 379:Week 4, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_2&amp;diff=1953"/>
		<updated>2007-07-28T19:10:51Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Physical Surveillance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Workplace Monitoring=&lt;br /&gt;
The increasing prevalence of monitoring technologies in the workplace poses many ethical concerns.  Existing technologies, like sniffers, can provide monitoring of employee actions on workstations and traffic on workplace networks such as email and instant messaging.  Employers may also legally monitor phone conversions to a limited extent.  While businesses are attempting to make sure their employees do a good job, excessive monitoring may cause harm to employees.  Monitoring could be abused if personal information discovered while monitoring employees is used to discriminate against them.  &lt;br /&gt;
&lt;br /&gt;
'''Analyze the ethical implications of employers' use of workplace monitoring.  Examine a couple new or emerging methods of workplace monitoring technology in detail.'''&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/social/workplace/monitoring/ http://ethics.csc.ncsu.edu/social/workplace/monitoring/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/e-mail/ http://ethics.csc.ncsu.edu/privacy/e-mail/]&lt;br /&gt;
&lt;br /&gt;
==Relevant Outside Website Links:==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Ethical implications==&lt;br /&gt;
More people are using computers , email, and the internet as part of there daily work activity.  These tools can be used to increase the amount of work getting done, but they also make it very easy for an employer to track and record every thing you do online or read all the emails you send.&lt;br /&gt;
&lt;br /&gt;
This raises an ethical question of rather this is a invasion of privacy and wrong?&lt;br /&gt;
&lt;br /&gt;
===Arguments for work place monitoring===&lt;br /&gt;
&lt;br /&gt;
*Activity's being done one company equipment.&lt;br /&gt;
*Ensure that sensitive information is not posted online.&lt;br /&gt;
*Employers have the right to track how employees are using company time and monitoring can increase productivity&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Arguments against work place monitoring===&lt;br /&gt;
&lt;br /&gt;
*Many feel that emails and web surfing are private activities&lt;br /&gt;
*Monitoring will create more stress and friction between employees and employers&lt;br /&gt;
*That during lunch and other breaks they should be able to use internet and email for private use&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A employee should be aware that technology makes it easy to track what web sites they visits, emails are saved and easy to read, and that the companys policy about work place monitoring should be known.&lt;br /&gt;
&lt;br /&gt;
==Methods of workplace monitoring==&lt;br /&gt;
&lt;br /&gt;
The methods used by employers to monitor employees basically fall into two categories, computer surveillance and physical surveillance.&lt;br /&gt;
&lt;br /&gt;
===Computer Surveillance===&lt;br /&gt;
Computer surveillance is one of the most popular forms of workplace surveillance due to the prevalence of computers and internet use in business. It utilizes monitoring software to keep track of employees' computer activities. Computer surveillance methods can be divided into two groups: internet surveillance and desktop surveillance.&lt;br /&gt;
&lt;br /&gt;
'''Internet Surveillance'''&lt;br /&gt;
&lt;br /&gt;
Internet surveillance involves monitoring employees' internet activities by watching, and possibly filtering, traffic that is transmitted over the company network. This can be achieved by custom hardware appliances, such as firewalls, monitoring software, or packet sniffing.&lt;br /&gt;
&lt;br /&gt;
Some examples of internet surveillance:&lt;br /&gt;
*Email and instant messaging logging&lt;br /&gt;
*Logging of websites visited by users&lt;br /&gt;
*Blocking of certain websites&lt;br /&gt;
*Packet sniffing&lt;br /&gt;
&lt;br /&gt;
'''Desktop Surveillance'''&lt;br /&gt;
&lt;br /&gt;
Desktop surveillance consists of directly monitoring activities on an individual's computer by way of monitoring software that is installed on it. This surveillance potentially allows direct monitoring of the screen, logging of keystrokes, logging of idle time, and logging of browsing habits.&lt;br /&gt;
&lt;br /&gt;
===Physical Surveillance===&lt;br /&gt;
Physical surveillance in the workplace is generally carried out through closed-circuit camera monitoring and recording, as well as phone monitoring and recording. In workplaces with access control cards, the time and location of each use of an employee's access card can be logged.&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_2&amp;diff=1952</id>
		<title>CSC 379:Week 4, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_2&amp;diff=1952"/>
		<updated>2007-07-28T19:10:07Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Physical Surveillance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Workplace Monitoring=&lt;br /&gt;
The increasing prevalence of monitoring technologies in the workplace poses many ethical concerns.  Existing technologies, like sniffers, can provide monitoring of employee actions on workstations and traffic on workplace networks such as email and instant messaging.  Employers may also legally monitor phone conversions to a limited extent.  While businesses are attempting to make sure their employees do a good job, excessive monitoring may cause harm to employees.  Monitoring could be abused if personal information discovered while monitoring employees is used to discriminate against them.  &lt;br /&gt;
&lt;br /&gt;
'''Analyze the ethical implications of employers' use of workplace monitoring.  Examine a couple new or emerging methods of workplace monitoring technology in detail.'''&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/social/workplace/monitoring/ http://ethics.csc.ncsu.edu/social/workplace/monitoring/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/e-mail/ http://ethics.csc.ncsu.edu/privacy/e-mail/]&lt;br /&gt;
&lt;br /&gt;
==Relevant Outside Website Links:==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Ethical implications==&lt;br /&gt;
More people are using computers , email, and the internet as part of there daily work activity.  These tools can be used to increase the amount of work getting done, but they also make it very easy for an employer to track and record every thing you do online or read all the emails you send.&lt;br /&gt;
&lt;br /&gt;
This raises an ethical question of rather this is a invasion of privacy and wrong?&lt;br /&gt;
&lt;br /&gt;
===Arguments for work place monitoring===&lt;br /&gt;
&lt;br /&gt;
*Activity's being done one company equipment.&lt;br /&gt;
*Ensure that sensitive information is not posted online.&lt;br /&gt;
*Employers have the right to track how employees are using company time and monitoring can increase productivity&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Arguments against work place monitoring===&lt;br /&gt;
&lt;br /&gt;
*Many feel that emails and web surfing are private activities&lt;br /&gt;
*Monitoring will create more stress and friction between employees and employers&lt;br /&gt;
*That during lunch and other breaks they should be able to use internet and email for private use&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A employee should be aware that technology makes it easy to track what web sites they visits, emails are saved and easy to read, and that the companys policy about work place monitoring should be known.&lt;br /&gt;
&lt;br /&gt;
==Methods of workplace monitoring==&lt;br /&gt;
&lt;br /&gt;
The methods used by employers to monitor employees basically fall into two categories, computer surveillance and physical surveillance.&lt;br /&gt;
&lt;br /&gt;
===Computer Surveillance===&lt;br /&gt;
Computer surveillance is one of the most popular forms of workplace surveillance due to the prevalence of computers and internet use in business. It utilizes monitoring software to keep track of employees' computer activities. Computer surveillance methods can be divided into two groups: internet surveillance and desktop surveillance.&lt;br /&gt;
&lt;br /&gt;
'''Internet Surveillance'''&lt;br /&gt;
&lt;br /&gt;
Internet surveillance involves monitoring employees' internet activities by watching, and possibly filtering, traffic that is transmitted over the company network. This can be achieved by custom hardware appliances, such as firewalls, monitoring software, or packet sniffing.&lt;br /&gt;
&lt;br /&gt;
Some examples of internet surveillance:&lt;br /&gt;
*Email and instant messaging logging&lt;br /&gt;
*Logging of websites visited by users&lt;br /&gt;
*Blocking of certain websites&lt;br /&gt;
*Packet sniffing&lt;br /&gt;
&lt;br /&gt;
'''Desktop Surveillance'''&lt;br /&gt;
&lt;br /&gt;
Desktop surveillance consists of directly monitoring activities on an individual's computer by way of monitoring software that is installed on it. This surveillance potentially allows direct monitoring of the screen, logging of keystrokes, logging of idle time, and logging of browsing habits.&lt;br /&gt;
&lt;br /&gt;
===Physical Surveillance===&lt;br /&gt;
Physical surveillance in the workplace is generally carried out through closed-circuit camera monitoring and recording, as well as phone monitoring and recording. In workplaces with access control cards, the time and location of each use of an employee's access card can be logged.&lt;br /&gt;
&lt;br /&gt;
http://computer.howstuffworks.com/workplace-surveillance2.htm&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_2&amp;diff=1951</id>
		<title>CSC 379:Week 4, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_2&amp;diff=1951"/>
		<updated>2007-07-28T19:00:49Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Computer Surveillance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Workplace Monitoring=&lt;br /&gt;
The increasing prevalence of monitoring technologies in the workplace poses many ethical concerns.  Existing technologies, like sniffers, can provide monitoring of employee actions on workstations and traffic on workplace networks such as email and instant messaging.  Employers may also legally monitor phone conversions to a limited extent.  While businesses are attempting to make sure their employees do a good job, excessive monitoring may cause harm to employees.  Monitoring could be abused if personal information discovered while monitoring employees is used to discriminate against them.  &lt;br /&gt;
&lt;br /&gt;
'''Analyze the ethical implications of employers' use of workplace monitoring.  Examine a couple new or emerging methods of workplace monitoring technology in detail.'''&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/social/workplace/monitoring/ http://ethics.csc.ncsu.edu/social/workplace/monitoring/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/e-mail/ http://ethics.csc.ncsu.edu/privacy/e-mail/]&lt;br /&gt;
&lt;br /&gt;
==Relevant Outside Website Links:==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Ethical implications==&lt;br /&gt;
More people are using computers , email, and the internet as part of there daily work activity.  These tools can be used to increase the amount of work getting done, but they also make it very easy for an employer to track and record every thing you do online or read all the emails you send.&lt;br /&gt;
&lt;br /&gt;
This raises an ethical question of rather this is a invasion of privacy and wrong?&lt;br /&gt;
&lt;br /&gt;
===Arguments for work place monitoring===&lt;br /&gt;
&lt;br /&gt;
*Activity's being done one company equipment.&lt;br /&gt;
*Ensure that sensitive information is not posted online.&lt;br /&gt;
*Employers have the right to track how employees are using company time and monitoring can increase productivity&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Arguments against work place monitoring===&lt;br /&gt;
&lt;br /&gt;
*Many feel that emails and web surfing are private activities&lt;br /&gt;
*Monitoring will create more stress and friction between employees and employers&lt;br /&gt;
*That during lunch and other breaks they should be able to use internet and email for private use&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A employee should be aware that technology makes it easy to track what web sites they visits, emails are saved and easy to read, and that the companys policy about work place monitoring should be known.&lt;br /&gt;
&lt;br /&gt;
==Methods of workplace monitoring==&lt;br /&gt;
&lt;br /&gt;
The methods used by employers to monitor employees basically fall into two categories, computer surveillance and physical surveillance.&lt;br /&gt;
&lt;br /&gt;
===Computer Surveillance===&lt;br /&gt;
Computer surveillance is one of the most popular forms of workplace surveillance due to the prevalence of computers and internet use in business. It utilizes monitoring software to keep track of employees' computer activities. Computer surveillance methods can be divided into two groups: internet surveillance and desktop surveillance.&lt;br /&gt;
&lt;br /&gt;
'''Internet Surveillance'''&lt;br /&gt;
&lt;br /&gt;
Internet surveillance involves monitoring employees' internet activities by watching, and possibly filtering, traffic that is transmitted over the company network. This can be achieved by custom hardware appliances, such as firewalls, monitoring software, or packet sniffing.&lt;br /&gt;
&lt;br /&gt;
Some examples of internet surveillance:&lt;br /&gt;
*Email and instant messaging logging&lt;br /&gt;
*Logging of websites visited by users&lt;br /&gt;
*Blocking of certain websites&lt;br /&gt;
*Packet sniffing&lt;br /&gt;
&lt;br /&gt;
'''Desktop Surveillance'''&lt;br /&gt;
&lt;br /&gt;
Desktop surveillance consists of directly monitoring activities on an individual's computer by way of monitoring software that is installed on it. This surveillance potentially allows direct monitoring of the screen, logging of keystrokes, logging of idle time, and logging of browsing habits.&lt;br /&gt;
&lt;br /&gt;
===Physical Surveillance===&lt;br /&gt;
&lt;br /&gt;
http://computer.howstuffworks.com/workplace-surveillance2.htm&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_2&amp;diff=1950</id>
		<title>CSC 379:Week 4, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_2&amp;diff=1950"/>
		<updated>2007-07-28T18:28:33Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Computer Surveillance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Workplace Monitoring=&lt;br /&gt;
The increasing prevalence of monitoring technologies in the workplace poses many ethical concerns.  Existing technologies, like sniffers, can provide monitoring of employee actions on workstations and traffic on workplace networks such as email and instant messaging.  Employers may also legally monitor phone conversions to a limited extent.  While businesses are attempting to make sure their employees do a good job, excessive monitoring may cause harm to employees.  Monitoring could be abused if personal information discovered while monitoring employees is used to discriminate against them.  &lt;br /&gt;
&lt;br /&gt;
'''Analyze the ethical implications of employers' use of workplace monitoring.  Examine a couple new or emerging methods of workplace monitoring technology in detail.'''&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/social/workplace/monitoring/ http://ethics.csc.ncsu.edu/social/workplace/monitoring/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/e-mail/ http://ethics.csc.ncsu.edu/privacy/e-mail/]&lt;br /&gt;
&lt;br /&gt;
==Relevant Outside Website Links:==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Ethical implications==&lt;br /&gt;
More people are using computers , email, and the internet as part of there daily work activity.  These tools can be used to increase the amount of work getting done, but they also make it very easy for an employer to track and record every thing you do online or read all the emails you send.&lt;br /&gt;
&lt;br /&gt;
This raises an ethical question of rather this is a invasion of privacy and wrong?&lt;br /&gt;
&lt;br /&gt;
===Arguments for work place monitoring===&lt;br /&gt;
&lt;br /&gt;
*Activity's being done one company equipment.&lt;br /&gt;
*Ensure that sensitive information is not posted online.&lt;br /&gt;
*Employers have the right to track how employees are using company time and monitoring can increase productivity&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Arguments against work place monitoring===&lt;br /&gt;
&lt;br /&gt;
*Many feel that emails and web surfing are private activities&lt;br /&gt;
*Monitoring will create more stress and friction between employees and employers&lt;br /&gt;
*That during lunch and other breaks they should be able to use internet and email for private use&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A employee should be aware that technology makes it easy to track what web sites they visits, emails are saved and easy to read, and that the companys policy about work place monitoring should be known.&lt;br /&gt;
&lt;br /&gt;
==Methods of workplace monitoring==&lt;br /&gt;
&lt;br /&gt;
The methods used by employers to monitor employees basically fall into two categories, computer surveillance and physical surveillance.&lt;br /&gt;
&lt;br /&gt;
===Computer Surveillance===&lt;br /&gt;
Computer surveillance is one of the most popular forms of workplace surveillance due to the prevalence of computers and internet use in business. It utilizes monitoring software to keep track of employees' computer activities. Computer surveillance methods can be divided into two groups: internet surveillance and desktop surveillance.&lt;br /&gt;
&lt;br /&gt;
'''Internet Surveillance'''&lt;br /&gt;
&lt;br /&gt;
Internet surveillance involves monitoring employees' internet activities by watching, and possibly filtering, traffic that is transmitted over the company network. This can be achieved by custom hardware appliances, such as firewalls, monitoring software, or packet sniffing.&lt;br /&gt;
&lt;br /&gt;
'''Desktop Surveillance'''&lt;br /&gt;
&lt;br /&gt;
Desktop surveillance consists of directly monitoring activities on an individual's computer by way of monitoring software that is installed on it. This surveillance potentially allows direct monitoring of the screen, logging of keystrokes, logging of idle time, and logging of browsing habits.&lt;br /&gt;
&lt;br /&gt;
===Physical Surveillance===&lt;br /&gt;
&lt;br /&gt;
http://computer.howstuffworks.com/workplace-surveillance2.htm&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_2&amp;diff=1949</id>
		<title>CSC 379:Week 4, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_2&amp;diff=1949"/>
		<updated>2007-07-28T18:28:08Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Computer Surveillance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Workplace Monitoring=&lt;br /&gt;
The increasing prevalence of monitoring technologies in the workplace poses many ethical concerns.  Existing technologies, like sniffers, can provide monitoring of employee actions on workstations and traffic on workplace networks such as email and instant messaging.  Employers may also legally monitor phone conversions to a limited extent.  While businesses are attempting to make sure their employees do a good job, excessive monitoring may cause harm to employees.  Monitoring could be abused if personal information discovered while monitoring employees is used to discriminate against them.  &lt;br /&gt;
&lt;br /&gt;
'''Analyze the ethical implications of employers' use of workplace monitoring.  Examine a couple new or emerging methods of workplace monitoring technology in detail.'''&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/social/workplace/monitoring/ http://ethics.csc.ncsu.edu/social/workplace/monitoring/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/e-mail/ http://ethics.csc.ncsu.edu/privacy/e-mail/]&lt;br /&gt;
&lt;br /&gt;
==Relevant Outside Website Links:==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Ethical implications==&lt;br /&gt;
More people are using computers , email, and the internet as part of there daily work activity.  These tools can be used to increase the amount of work getting done, but they also make it very easy for an employer to track and record every thing you do online or read all the emails you send.&lt;br /&gt;
&lt;br /&gt;
This raises an ethical question of rather this is a invasion of privacy and wrong?&lt;br /&gt;
&lt;br /&gt;
===Arguments for work place monitoring===&lt;br /&gt;
&lt;br /&gt;
*Activity's being done one company equipment.&lt;br /&gt;
*Ensure that sensitive information is not posted online.&lt;br /&gt;
*Employers have the right to track how employees are using company time and monitoring can increase productivity&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Arguments against work place monitoring===&lt;br /&gt;
&lt;br /&gt;
*Many feel that emails and web surfing are private activities&lt;br /&gt;
*Monitoring will create more stress and friction between employees and employers&lt;br /&gt;
*That during lunch and other breaks they should be able to use internet and email for private use&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A employee should be aware that technology makes it easy to track what web sites they visits, emails are saved and easy to read, and that the companys policy about work place monitoring should be known.&lt;br /&gt;
&lt;br /&gt;
==Methods of workplace monitoring==&lt;br /&gt;
&lt;br /&gt;
The methods used by employers to monitor employees basically fall into two categories, computer surveillance and physical surveillance.&lt;br /&gt;
&lt;br /&gt;
===Computer Surveillance===&lt;br /&gt;
Computer surveillance is one of the most popular forms of workplace surveillance due to the prevalence of computers and internet use in business. It utilizes monitoring software to keep track of employees' computer activities. Computer surveillance methods can be divided into two groups: internet surveillance and desktop surveillance.&lt;br /&gt;
&lt;br /&gt;
'''Internet Surveillance'''&lt;br /&gt;
Internet surveillance involves monitoring employees' internet activities by watching, and possibly filtering, traffic that is transmitted over the company network. This can be achieved by custom hardware appliances, such as firewalls, monitoring software, or packet sniffing.&lt;br /&gt;
&lt;br /&gt;
'''Desktop Surveillance'''&lt;br /&gt;
Desktop surveillance consists of directly monitoring activities on an individual's computer by way of monitoring software that is installed on it. This surveillance potentially allows direct monitoring of the screen, logging of keystrokes, logging of idle time, and logging of browsing habits.&lt;br /&gt;
&lt;br /&gt;
===Physical Surveillance===&lt;br /&gt;
&lt;br /&gt;
http://computer.howstuffworks.com/workplace-surveillance2.htm&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_2&amp;diff=1947</id>
		<title>CSC 379:Week 4, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_2&amp;diff=1947"/>
		<updated>2007-07-28T17:11:22Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Computer Surveillance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Workplace Monitoring=&lt;br /&gt;
The increasing prevalence of monitoring technologies in the workplace poses many ethical concerns.  Existing technologies, like sniffers, can provide monitoring of employee actions on workstations and traffic on workplace networks such as email and instant messaging.  Employers may also legally monitor phone conversions to a limited extent.  While businesses are attempting to make sure their employees do a good job, excessive monitoring may cause harm to employees.  Monitoring could be abused if personal information discovered while monitoring employees is used to discriminate against them.  &lt;br /&gt;
&lt;br /&gt;
'''Analyze the ethical implications of employers' use of workplace monitoring.  Examine a couple new or emerging methods of workplace monitoring technology in detail.'''&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/social/workplace/monitoring/ http://ethics.csc.ncsu.edu/social/workplace/monitoring/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/e-mail/ http://ethics.csc.ncsu.edu/privacy/e-mail/]&lt;br /&gt;
&lt;br /&gt;
==Relevant Outside Website Links:==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Ethical implications==&lt;br /&gt;
More people are using computers , email, and the internet as part of there daily work activity.  These tools can be used to increase the amount of work getting done, but they also make it very easy for an employer to track and record every thing you do online or read all the emails you send.&lt;br /&gt;
&lt;br /&gt;
This raises an ethical question of rather this is a invasion of privacy and wrong?&lt;br /&gt;
&lt;br /&gt;
===Arguments for work place monitoring===&lt;br /&gt;
&lt;br /&gt;
*Activity's being done one company equipment.&lt;br /&gt;
*Ensure that sensitive information is not posted online.&lt;br /&gt;
*Employers have the right to track how employees are using company time and monitoring can increase productivity&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Arguments against work place monitoring===&lt;br /&gt;
&lt;br /&gt;
*Many feel that emails and web surfing are private activities&lt;br /&gt;
*Monitoring will create more stress and friction between employees and employers&lt;br /&gt;
*That during lunch and other breaks they should be able to use internet and email for private use&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A employee should be aware that technology makes it easy to track what web sites they visits, emails are saved and easy to read, and that the companys policy about work place monitoring should be known.&lt;br /&gt;
&lt;br /&gt;
==Methods of workplace monitoring==&lt;br /&gt;
&lt;br /&gt;
The methods used by employers to monitor employees basically fall into two categories, computer surveillance and physical surveillance.&lt;br /&gt;
&lt;br /&gt;
===Computer Surveillance===&lt;br /&gt;
Computer surveillance is one of the most popular forms of workplace surveillance due to the prevalence of computers and internet use in business. It utilizes monitoring software to keep track of employees' computer activities. Computer surveillance methods can be divided into two groups: internet surveillance and desktop surveillance.&lt;br /&gt;
&lt;br /&gt;
===Physical Surveillance===&lt;br /&gt;
&lt;br /&gt;
http://computer.howstuffworks.com/workplace-surveillance2.htm&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_2&amp;diff=1946</id>
		<title>CSC 379:Week 4, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_2&amp;diff=1946"/>
		<updated>2007-07-28T15:48:28Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Methods of workplace monitoring */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Workplace Monitoring=&lt;br /&gt;
The increasing prevalence of monitoring technologies in the workplace poses many ethical concerns.  Existing technologies, like sniffers, can provide monitoring of employee actions on workstations and traffic on workplace networks such as email and instant messaging.  Employers may also legally monitor phone conversions to a limited extent.  While businesses are attempting to make sure their employees do a good job, excessive monitoring may cause harm to employees.  Monitoring could be abused if personal information discovered while monitoring employees is used to discriminate against them.  &lt;br /&gt;
&lt;br /&gt;
'''Analyze the ethical implications of employers' use of workplace monitoring.  Examine a couple new or emerging methods of workplace monitoring technology in detail.'''&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant Class Website Links:===&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/social/workplace/monitoring/ http://ethics.csc.ncsu.edu/social/workplace/monitoring/]&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/privacy/e-mail/ http://ethics.csc.ncsu.edu/privacy/e-mail/]&lt;br /&gt;
&lt;br /&gt;
==Relevant Outside Website Links:==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Ethical implications==&lt;br /&gt;
More people are using computers , email, and the internet as part of there daily work activity.  These tools can be used to increase the amount of work getting done, but they also make it very easy for an employer to track and record every thing you do online or read all the emails you send.&lt;br /&gt;
&lt;br /&gt;
This raises an ethical question of rather this is a invasion of privacy and wrong?&lt;br /&gt;
&lt;br /&gt;
===Arguments for work place monitoring===&lt;br /&gt;
&lt;br /&gt;
*Activity's being done one company equipment.&lt;br /&gt;
*Ensure that sensitive information is not posted online.&lt;br /&gt;
*Employers have the right to track how employees are using company time and monitoring can increase productivity&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Arguments against work place monitoring===&lt;br /&gt;
&lt;br /&gt;
*Many feel that emails and web surfing are private activities&lt;br /&gt;
*Monitoring will create more stress and friction between employees and employers&lt;br /&gt;
*That during lunch and other breaks they should be able to use internet and email for private use&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A employee should be aware that technology makes it easy to track what web sites they visits, emails are saved and easy to read, and that the companys policy about work place monitoring should be known.&lt;br /&gt;
&lt;br /&gt;
==Methods of workplace monitoring==&lt;br /&gt;
&lt;br /&gt;
The methods used by employers to monitor employees basically fall into two categories, computer surveillance and physical surveillance.&lt;br /&gt;
&lt;br /&gt;
===Computer Surveillance===&lt;br /&gt;
&lt;br /&gt;
===Physical Surveillance===&lt;br /&gt;
&lt;br /&gt;
http://computer.howstuffworks.com/workplace-surveillance2.htm&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1663</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1663"/>
		<updated>2007-07-14T21:30:20Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Ethical considerations of international usage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
&lt;br /&gt;
There are 4 conditions that make up the different Creative Commons licenses:&lt;br /&gt;
;Attribution: All Creative Commons licenses require attribution as specified by the original work's creator when the work is used, distributed, or modified whether in its original form or as a derivative work.&lt;br /&gt;
;Noncommercial: The original work may only be used, distributed, or modified only for noncommercial purposes whether the work is in its original form or as a derivative work.&lt;br /&gt;
;No derivative works: The original work may be used or distributed, but may not be used in any form of derivative work.&lt;br /&gt;
;Share alike: Derivative works based upon the original work may only be distributed under an identical license to the original work.&lt;br /&gt;
&lt;br /&gt;
These conditions are combined in various forms to make the six main Creative Commons licenses:&lt;br /&gt;
# Attribution (by)&lt;br /&gt;
# Attribution Non-commerical (by-nc)&lt;br /&gt;
# Attribution Non-commercial Share Alike (by-nc-sa)&lt;br /&gt;
# Attribution Non-commercial No Derivatives (by-nc-nd)&lt;br /&gt;
# Attribution No Derivatives (by-nd)&lt;br /&gt;
# Attribution Share Alike (by-sa)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|&lt;br /&gt;
*Creator of work can grant specific permissions for re-use of work&lt;br /&gt;
*Rights and conditions of others to use work are more clearly laid out&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Must be careful to choose appropriate license to retain the desired amount of control over the work&lt;br /&gt;
*Must specifically designate work as licensed under Creative Commons&lt;br /&gt;
*Users of Creative Commons-licensed works must be careful when combining works with different licenses&lt;br /&gt;
|&lt;br /&gt;
*There is a disclaimer of warranty that the individual granting the license has the right to do so&lt;br /&gt;
*Certain provisions of the license change between countries&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Copyright&lt;br /&gt;
|&lt;br /&gt;
*Automatically granted to created works, even without notice&lt;br /&gt;
*Reserves all rights for the creator&lt;br /&gt;
|&lt;br /&gt;
*Can cause confusion, since it applies without notice of copyright&lt;br /&gt;
*Those wishing to reuse copyrighted works must seek explicit permission&lt;br /&gt;
|&lt;br /&gt;
*Easy to violate copyright unintentionally, since notification of copyright is not required&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|&lt;br /&gt;
*Requires any modified and released versions to have source code available, and to stay under the GPL&lt;br /&gt;
*Maintains free software environment&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Incompatible with closed-source (commercial) development&lt;br /&gt;
*Once something is under the GPL, it essentially must stay under GPL&lt;br /&gt;
|&lt;br /&gt;
*&amp;quot;Locked-in&amp;quot; to GPL&lt;br /&gt;
*Forces ideology behind GPL on users of GPL'd content&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Lesser GPL (LGPL)&lt;br /&gt;
|&lt;br /&gt;
*Allows non-GPL software to link with LGPL'd libraries&lt;br /&gt;
*Less restrictive than GPL&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Largely discouraged by GPL proponents&lt;br /&gt;
|&lt;br /&gt;
*Allows free software to be used in proprietary projects&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|BSD-style Licenses&lt;br /&gt;
|&lt;br /&gt;
*Non-copyleft - modified versions aren't required to be free, more flexible&lt;br /&gt;
*Allows modified versions to be released under alternate licenses&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Modified versions can become incorporated into proprietary projects&lt;br /&gt;
*Original BSD license had an annoying &amp;quot;advertisement&amp;quot; clause&lt;br /&gt;
|&lt;br /&gt;
*Free code can be made proprietary&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Public Domain&lt;br /&gt;
|&lt;br /&gt;
*Work is released from copyright&lt;br /&gt;
*Work can be used by anyone else without restriction&lt;br /&gt;
|&lt;br /&gt;
*Any rights by the creator are forfeited&lt;br /&gt;
|&lt;br /&gt;
*Creator retains no rights to work&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
'''nap''': I think there should be an emphasis on how CC licenses clarify what people can do with pages, and that CC licensing must be indicated, whereas copyright requires no notification&lt;br /&gt;
&lt;br /&gt;
Yes the groups should adopt it blah blah blah.&lt;br /&gt;
&lt;br /&gt;
Some more stuff.&lt;br /&gt;
&lt;br /&gt;
Blah blah blah.&lt;br /&gt;
&lt;br /&gt;
'''Links''' (if applicable)&lt;br /&gt;
* [http://google.com google]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
'''nap''': All CC licenses will still allow at the most restrictive verbatim copying with attribution and non-commercial purposes, which is more than just copyright, so there might be resistance to this.&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;br /&gt;
&lt;br /&gt;
'''nap''': I think that CC is adapted for international use, but there are specific notes about this in the FAQ, I think. Maybe international agreements provide a basis for CC, since it is based in copyright? I'm not sure about this one...&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1661</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1661"/>
		<updated>2007-07-14T21:29:27Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Ethical considerations / Obstacles to adoption */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
&lt;br /&gt;
There are 4 conditions that make up the different Creative Commons licenses:&lt;br /&gt;
;Attribution: All Creative Commons licenses require attribution as specified by the original work's creator when the work is used, distributed, or modified whether in its original form or as a derivative work.&lt;br /&gt;
;Noncommercial: The original work may only be used, distributed, or modified only for noncommercial purposes whether the work is in its original form or as a derivative work.&lt;br /&gt;
;No derivative works: The original work may be used or distributed, but may not be used in any form of derivative work.&lt;br /&gt;
;Share alike: Derivative works based upon the original work may only be distributed under an identical license to the original work.&lt;br /&gt;
&lt;br /&gt;
These conditions are combined in various forms to make the six main Creative Commons licenses:&lt;br /&gt;
# Attribution (by)&lt;br /&gt;
# Attribution Non-commerical (by-nc)&lt;br /&gt;
# Attribution Non-commercial Share Alike (by-nc-sa)&lt;br /&gt;
# Attribution Non-commercial No Derivatives (by-nc-nd)&lt;br /&gt;
# Attribution No Derivatives (by-nd)&lt;br /&gt;
# Attribution Share Alike (by-sa)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|&lt;br /&gt;
*Creator of work can grant specific permissions for re-use of work&lt;br /&gt;
*Rights and conditions of others to use work are more clearly laid out&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Must be careful to choose appropriate license to retain the desired amount of control over the work&lt;br /&gt;
*Must specifically designate work as licensed under Creative Commons&lt;br /&gt;
*Users of Creative Commons-licensed works must be careful when combining works with different licenses&lt;br /&gt;
|&lt;br /&gt;
*There is a disclaimer of warranty that the individual granting the license has the right to do so&lt;br /&gt;
*Certain provisions of the license change between countries&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Copyright&lt;br /&gt;
|&lt;br /&gt;
*Automatically granted to created works, even without notice&lt;br /&gt;
*Reserves all rights for the creator&lt;br /&gt;
|&lt;br /&gt;
*Can cause confusion, since it applies without notice of copyright&lt;br /&gt;
*Those wishing to reuse copyrighted works must seek explicit permission&lt;br /&gt;
|&lt;br /&gt;
*Easy to violate copyright unintentionally, since notification of copyright is not required&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|&lt;br /&gt;
*Requires any modified and released versions to have source code available, and to stay under the GPL&lt;br /&gt;
*Maintains free software environment&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Incompatible with closed-source (commercial) development&lt;br /&gt;
*Once something is under the GPL, it essentially must stay under GPL&lt;br /&gt;
|&lt;br /&gt;
*&amp;quot;Locked-in&amp;quot; to GPL&lt;br /&gt;
*Forces ideology behind GPL on users of GPL'd content&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Lesser GPL (LGPL)&lt;br /&gt;
|&lt;br /&gt;
*Allows non-GPL software to link with LGPL'd libraries&lt;br /&gt;
*Less restrictive than GPL&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Largely discouraged by GPL proponents&lt;br /&gt;
|&lt;br /&gt;
*Allows free software to be used in proprietary projects&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|BSD-style Licenses&lt;br /&gt;
|&lt;br /&gt;
*Non-copyleft - modified versions aren't required to be free, more flexible&lt;br /&gt;
*Allows modified versions to be released under alternate licenses&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Modified versions can become incorporated into proprietary projects&lt;br /&gt;
*Original BSD license had an annoying &amp;quot;advertisement&amp;quot; clause&lt;br /&gt;
|&lt;br /&gt;
*Free code can be made proprietary&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Public Domain&lt;br /&gt;
|&lt;br /&gt;
*Work is released from copyright&lt;br /&gt;
*Work can be used by anyone else without restriction&lt;br /&gt;
|&lt;br /&gt;
*Any rights by the creator are forfeited&lt;br /&gt;
|&lt;br /&gt;
*Creator retains no rights to work&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
'''nap''': I think there should be an emphasis on how CC licenses clarify what people can do with pages, and that CC licensing must be indicated, whereas copyright requires no notification&lt;br /&gt;
&lt;br /&gt;
Yes the groups should adopt it blah blah blah.&lt;br /&gt;
&lt;br /&gt;
Some more stuff.&lt;br /&gt;
&lt;br /&gt;
Blah blah blah.&lt;br /&gt;
&lt;br /&gt;
'''Links''' (if applicable)&lt;br /&gt;
* [http://google.com google]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
'''nap''': All CC licenses will still allow at the most restrictive verbatim copying with attribution and non-commercial purposes, which is more than just copyright, so there might be resistance to this.&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1660</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1660"/>
		<updated>2007-07-14T21:27:33Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Adoption of license */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
&lt;br /&gt;
There are 4 conditions that make up the different Creative Commons licenses:&lt;br /&gt;
;Attribution: All Creative Commons licenses require attribution as specified by the original work's creator when the work is used, distributed, or modified whether in its original form or as a derivative work.&lt;br /&gt;
;Noncommercial: The original work may only be used, distributed, or modified only for noncommercial purposes whether the work is in its original form or as a derivative work.&lt;br /&gt;
;No derivative works: The original work may be used or distributed, but may not be used in any form of derivative work.&lt;br /&gt;
;Share alike: Derivative works based upon the original work may only be distributed under an identical license to the original work.&lt;br /&gt;
&lt;br /&gt;
These conditions are combined in various forms to make the six main Creative Commons licenses:&lt;br /&gt;
# Attribution (by)&lt;br /&gt;
# Attribution Non-commerical (by-nc)&lt;br /&gt;
# Attribution Non-commercial Share Alike (by-nc-sa)&lt;br /&gt;
# Attribution Non-commercial No Derivatives (by-nc-nd)&lt;br /&gt;
# Attribution No Derivatives (by-nd)&lt;br /&gt;
# Attribution Share Alike (by-sa)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|&lt;br /&gt;
*Creator of work can grant specific permissions for re-use of work&lt;br /&gt;
*Rights and conditions of others to use work are more clearly laid out&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Must be careful to choose appropriate license to retain the desired amount of control over the work&lt;br /&gt;
*Must specifically designate work as licensed under Creative Commons&lt;br /&gt;
*Users of Creative Commons-licensed works must be careful when combining works with different licenses&lt;br /&gt;
|&lt;br /&gt;
*There is a disclaimer of warranty that the individual granting the license has the right to do so&lt;br /&gt;
*Certain provisions of the license change between countries&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Copyright&lt;br /&gt;
|&lt;br /&gt;
*Automatically granted to created works, even without notice&lt;br /&gt;
*Reserves all rights for the creator&lt;br /&gt;
|&lt;br /&gt;
*Can cause confusion, since it applies without notice of copyright&lt;br /&gt;
*Those wishing to reuse copyrighted works must seek explicit permission&lt;br /&gt;
|&lt;br /&gt;
*Easy to violate copyright unintentionally, since notification of copyright is not required&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|&lt;br /&gt;
*Requires any modified and released versions to have source code available, and to stay under the GPL&lt;br /&gt;
*Maintains free software environment&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Incompatible with closed-source (commercial) development&lt;br /&gt;
*Once something is under the GPL, it essentially must stay under GPL&lt;br /&gt;
|&lt;br /&gt;
*&amp;quot;Locked-in&amp;quot; to GPL&lt;br /&gt;
*Forces ideology behind GPL on users of GPL'd content&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Lesser GPL (LGPL)&lt;br /&gt;
|&lt;br /&gt;
*Allows non-GPL software to link with LGPL'd libraries&lt;br /&gt;
*Less restrictive than GPL&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Largely discouraged by GPL proponents&lt;br /&gt;
|&lt;br /&gt;
*Allows free software to be used in proprietary projects&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|BSD-style Licenses&lt;br /&gt;
|&lt;br /&gt;
*Non-copyleft - modified versions aren't required to be free, more flexible&lt;br /&gt;
*Allows modified versions to be released under alternate licenses&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Modified versions can become incorporated into proprietary projects&lt;br /&gt;
*Original BSD license had an annoying &amp;quot;advertisement&amp;quot; clause&lt;br /&gt;
|&lt;br /&gt;
*Free code can be made proprietary&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Public Domain&lt;br /&gt;
|&lt;br /&gt;
*Work is released from copyright&lt;br /&gt;
*Work can be used by anyone else without restriction&lt;br /&gt;
|&lt;br /&gt;
*Any rights by the creator are forfeited&lt;br /&gt;
|&lt;br /&gt;
*Creator retains no rights to work&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
'''nap''': I think there should be an emphasis on how CC licenses clarify what people can do with pages, and that CC licensing must be indicated, whereas copyright requires no notification&lt;br /&gt;
&lt;br /&gt;
Yes the groups should adopt it blah blah blah.&lt;br /&gt;
&lt;br /&gt;
Some more stuff.&lt;br /&gt;
&lt;br /&gt;
Blah blah blah.&lt;br /&gt;
&lt;br /&gt;
'''Links''' (if applicable)&lt;br /&gt;
* [http://google.com google]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1659</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1659"/>
		<updated>2007-07-14T21:25:43Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Provisions of Creative Commons License */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
&lt;br /&gt;
There are 4 conditions that make up the different Creative Commons licenses:&lt;br /&gt;
;Attribution: All Creative Commons licenses require attribution as specified by the original work's creator when the work is used, distributed, or modified whether in its original form or as a derivative work.&lt;br /&gt;
;Noncommercial: The original work may only be used, distributed, or modified only for noncommercial purposes whether the work is in its original form or as a derivative work.&lt;br /&gt;
;No derivative works: The original work may be used or distributed, but may not be used in any form of derivative work.&lt;br /&gt;
;Share alike: Derivative works based upon the original work may only be distributed under an identical license to the original work.&lt;br /&gt;
&lt;br /&gt;
These conditions are combined in various forms to make the six main Creative Commons licenses:&lt;br /&gt;
# Attribution (by)&lt;br /&gt;
# Attribution Non-commerical (by-nc)&lt;br /&gt;
# Attribution Non-commercial Share Alike (by-nc-sa)&lt;br /&gt;
# Attribution Non-commercial No Derivatives (by-nc-nd)&lt;br /&gt;
# Attribution No Derivatives (by-nd)&lt;br /&gt;
# Attribution Share Alike (by-sa)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Links'''&lt;br /&gt;
*[http://creativecommons.org/ Creative Commons]&lt;br /&gt;
*[http://creativecommons.org/about/licenses/meet-the-licenses Creative Commons Licenses]&lt;br /&gt;
*[http://wiki.creativecommons.org/FAQ Creative Commons FAQ]&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|&lt;br /&gt;
*Creator of work can grant specific permissions for re-use of work&lt;br /&gt;
*Rights and conditions of others to use work are more clearly laid out&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Must be careful to choose appropriate license to retain the desired amount of control over the work&lt;br /&gt;
*Must specifically designate work as licensed under Creative Commons&lt;br /&gt;
*Users of Creative Commons-licensed works must be careful when combining works with different licenses&lt;br /&gt;
|&lt;br /&gt;
*There is a disclaimer of warranty that the individual granting the license has the right to do so&lt;br /&gt;
*Certain provisions of the license change between countries&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Copyright&lt;br /&gt;
|&lt;br /&gt;
*Automatically granted to created works, even without notice&lt;br /&gt;
*Reserves all rights for the creator&lt;br /&gt;
|&lt;br /&gt;
*Can cause confusion, since it applies without notice of copyright&lt;br /&gt;
*Those wishing to reuse copyrighted works must seek explicit permission&lt;br /&gt;
|&lt;br /&gt;
*Easy to violate copyright unintentionally, since notification of copyright is not required&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|&lt;br /&gt;
*Requires any modified and released versions to have source code available, and to stay under the GPL&lt;br /&gt;
*Maintains free software environment&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Incompatible with closed-source (commercial) development&lt;br /&gt;
*Once something is under the GPL, it essentially must stay under GPL&lt;br /&gt;
|&lt;br /&gt;
*&amp;quot;Locked-in&amp;quot; to GPL&lt;br /&gt;
*Forces ideology behind GPL on users of GPL'd content&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Lesser GPL (LGPL)&lt;br /&gt;
|&lt;br /&gt;
*Allows non-GPL software to link with LGPL'd libraries&lt;br /&gt;
*Less restrictive than GPL&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Largely discouraged by GPL proponents&lt;br /&gt;
|&lt;br /&gt;
*Allows free software to be used in proprietary projects&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|BSD-style Licenses&lt;br /&gt;
|&lt;br /&gt;
*Non-copyleft - modified versions aren't required to be free, more flexible&lt;br /&gt;
*Allows modified versions to be released under alternate licenses&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Modified versions can become incorporated into proprietary projects&lt;br /&gt;
*Original BSD license had an annoying &amp;quot;advertisement&amp;quot; clause&lt;br /&gt;
|&lt;br /&gt;
*Free code can be made proprietary&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Public Domain&lt;br /&gt;
|&lt;br /&gt;
*Work is released from copyright&lt;br /&gt;
*Work can be used by anyone else without restriction&lt;br /&gt;
|&lt;br /&gt;
*Any rights by the creator are forfeited&lt;br /&gt;
|&lt;br /&gt;
*Creator retains no rights to work&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Yes the groups should adopt it blah blah blah.&lt;br /&gt;
&lt;br /&gt;
Some more stuff.&lt;br /&gt;
&lt;br /&gt;
Blah blah blah.&lt;br /&gt;
&lt;br /&gt;
'''Links''' (if applicable)&lt;br /&gt;
* [http://google.com google]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1658</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1658"/>
		<updated>2007-07-14T21:24:10Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Provisions of Creative Commons License */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
&lt;br /&gt;
There are 4 conditions that make up the different Creative Commons licenses:&lt;br /&gt;
;Attribution: All Creative Commons licenses require attribution as specified by the original work's creator when the work is used, distributed, or modified whether in its original form or as a derivative work.&lt;br /&gt;
;Noncommercial: The original work may only be used, distributed, or modified only for noncommercial purposes whether the work is in its original form or as a derivative work.&lt;br /&gt;
;No derivative works: The original work may be used or distributed, but may not be used in any form of derivative work.&lt;br /&gt;
;Share alike: Derivative works based upon the original work may only be distributed under an identical license to the original work.&lt;br /&gt;
&lt;br /&gt;
These conditions are combined in various forms to make the six main Creative Commons licenses:&lt;br /&gt;
# Attribution (by)&lt;br /&gt;
# Attribution Non-commerical (by-nc)&lt;br /&gt;
# Attribution Non-commercial Share Alike (by-nc-sa)&lt;br /&gt;
# Attribution Non-commercial No Derivatives (by-nc-nd)&lt;br /&gt;
# Attribution No Derivatives (by-nd)&lt;br /&gt;
# Attribution Share Alike (by-sa)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
((after text, link to creative commons website or some sub-site?))&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|&lt;br /&gt;
*Creator of work can grant specific permissions for re-use of work&lt;br /&gt;
*Rights and conditions of others to use work are more clearly laid out&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Must be careful to choose appropriate license to retain the desired amount of control over the work&lt;br /&gt;
*Must specifically designate work as licensed under Creative Commons&lt;br /&gt;
*Users of Creative Commons-licensed works must be careful when combining works with different licenses&lt;br /&gt;
|&lt;br /&gt;
*There is a disclaimer of warranty that the individual granting the license has the right to do so&lt;br /&gt;
*Certain provisions of the license change between countries&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Copyright&lt;br /&gt;
|&lt;br /&gt;
*Automatically granted to created works, even without notice&lt;br /&gt;
*Reserves all rights for the creator&lt;br /&gt;
|&lt;br /&gt;
*Can cause confusion, since it applies without notice of copyright&lt;br /&gt;
*Those wishing to reuse copyrighted works must seek explicit permission&lt;br /&gt;
|&lt;br /&gt;
*Easy to violate copyright unintentionally, since notification of copyright is not required&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|&lt;br /&gt;
*Requires any modified and released versions to have source code available, and to stay under the GPL&lt;br /&gt;
*Maintains free software environment&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Incompatible with closed-source (commercial) development&lt;br /&gt;
*Once something is under the GPL, it essentially must stay under GPL&lt;br /&gt;
|&lt;br /&gt;
*&amp;quot;Locked-in&amp;quot; to GPL&lt;br /&gt;
*Forces ideology behind GPL on users of GPL'd content&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Lesser GPL (LGPL)&lt;br /&gt;
|&lt;br /&gt;
*Allows non-GPL software to link with LGPL'd libraries&lt;br /&gt;
*Less restrictive than GPL&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Largely discouraged by GPL proponents&lt;br /&gt;
|&lt;br /&gt;
*Allows free software to be used in proprietary projects&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|BSD-style Licenses&lt;br /&gt;
|&lt;br /&gt;
*Non-copyleft - modified versions aren't required to be free, more flexible&lt;br /&gt;
*Allows modified versions to be released under alternate licenses&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Modified versions can become incorporated into proprietary projects&lt;br /&gt;
*Original BSD license had an annoying &amp;quot;advertisement&amp;quot; clause&lt;br /&gt;
|&lt;br /&gt;
*Free code can be made proprietary&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Public Domain&lt;br /&gt;
|&lt;br /&gt;
*Work is released from copyright&lt;br /&gt;
*Work can be used by anyone else without restriction&lt;br /&gt;
|&lt;br /&gt;
*Any rights by the creator are forfeited&lt;br /&gt;
|&lt;br /&gt;
*Creator retains no rights to work&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Yes the groups should adopt it blah blah blah.&lt;br /&gt;
&lt;br /&gt;
Some more stuff.&lt;br /&gt;
&lt;br /&gt;
Blah blah blah.&lt;br /&gt;
&lt;br /&gt;
'''Links''' (if applicable)&lt;br /&gt;
* [http://google.com google]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1657</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1657"/>
		<updated>2007-07-14T21:23:27Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Provisions of Creative Commons License */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
&lt;br /&gt;
There are 4 conditions that make up the different Creative Commons licenses:&lt;br /&gt;
;Attribution: All Creative Commons licenses require attribution as specified by the original work's creator when the work is used, distributed, or modified whether in its original form or as a derivative work.&lt;br /&gt;
;Noncommercial: The original work may only be used, distributed, or modified only for noncommercial purposes whether the work is in its original form or as a derivative work.&lt;br /&gt;
;No derivative works: The original work may be used or distributed, but may not be used in any form of derivative work.&lt;br /&gt;
;Share alike: Derivative works based upon the original work may only be distributed under an identical license to the original work.&lt;br /&gt;
&lt;br /&gt;
These conditions are combined in various forms to make the six main Creative Commons licenses:&lt;br /&gt;
# '''Attribution''' (by)&lt;br /&gt;
# '''Attribution Non-commerical''' (by-nc)&lt;br /&gt;
# '''Attribution Non-commercial Share Alike''' (by-nc-sa)&lt;br /&gt;
# '''Attribution Non-commercial No Derivatives''' (by-nc-nd)&lt;br /&gt;
# '''Attribution No Derivatives''' (by-nd)&lt;br /&gt;
# '''Attribution Share Alike''' (by-sa)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
((after text, link to creative commons website or some sub-site?))&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|&lt;br /&gt;
*Creator of work can grant specific permissions for re-use of work&lt;br /&gt;
*Rights and conditions of others to use work are more clearly laid out&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Must be careful to choose appropriate license to retain the desired amount of control over the work&lt;br /&gt;
*Must specifically designate work as licensed under Creative Commons&lt;br /&gt;
*Users of Creative Commons-licensed works must be careful when combining works with different licenses&lt;br /&gt;
|&lt;br /&gt;
*There is a disclaimer of warranty that the individual granting the license has the right to do so&lt;br /&gt;
*Certain provisions of the license change between countries&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Copyright&lt;br /&gt;
|&lt;br /&gt;
*Automatically granted to created works, even without notice&lt;br /&gt;
*Reserves all rights for the creator&lt;br /&gt;
|&lt;br /&gt;
*Can cause confusion, since it applies without notice of copyright&lt;br /&gt;
*Those wishing to reuse copyrighted works must seek explicit permission&lt;br /&gt;
|&lt;br /&gt;
*Easy to violate copyright unintentionally, since notification of copyright is not required&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|&lt;br /&gt;
*Requires any modified and released versions to have source code available, and to stay under the GPL&lt;br /&gt;
*Maintains free software environment&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Incompatible with closed-source (commercial) development&lt;br /&gt;
*Once something is under the GPL, it essentially must stay under GPL&lt;br /&gt;
|&lt;br /&gt;
*&amp;quot;Locked-in&amp;quot; to GPL&lt;br /&gt;
*Forces ideology behind GPL on users of GPL'd content&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Lesser GPL (LGPL)&lt;br /&gt;
|&lt;br /&gt;
*Allows non-GPL software to link with LGPL'd libraries&lt;br /&gt;
*Less restrictive than GPL&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Largely discouraged by GPL proponents&lt;br /&gt;
|&lt;br /&gt;
*Allows free software to be used in proprietary projects&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|BSD-style Licenses&lt;br /&gt;
|&lt;br /&gt;
*Non-copyleft - modified versions aren't required to be free, more flexible&lt;br /&gt;
*Allows modified versions to be released under alternate licenses&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Modified versions can become incorporated into proprietary projects&lt;br /&gt;
*Original BSD license had an annoying &amp;quot;advertisement&amp;quot; clause&lt;br /&gt;
|&lt;br /&gt;
*Free code can be made proprietary&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Public Domain&lt;br /&gt;
|&lt;br /&gt;
*Work is released from copyright&lt;br /&gt;
*Work can be used by anyone else without restriction&lt;br /&gt;
|&lt;br /&gt;
*Any rights by the creator are forfeited&lt;br /&gt;
|&lt;br /&gt;
*Creator retains no rights to work&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Yes the groups should adopt it blah blah blah.&lt;br /&gt;
&lt;br /&gt;
Some more stuff.&lt;br /&gt;
&lt;br /&gt;
Blah blah blah.&lt;br /&gt;
&lt;br /&gt;
'''Links''' (if applicable)&lt;br /&gt;
* [http://google.com google]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1654</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1654"/>
		<updated>2007-07-14T21:03:39Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Comparison to other common licenses */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
((after text, link to creative commons website or some sub-site?))&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|&lt;br /&gt;
*Creator of work can grant specific permissions for re-use of work&lt;br /&gt;
*Rights and conditions of others to use work are more clearly laid out&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Must be careful to choose appropriate license to retain the desired amount of control over the work&lt;br /&gt;
*Must specifically designate work as licensed under Creative Commons&lt;br /&gt;
*Users of Creative Commons-licensed works must be careful when combining works with different licenses&lt;br /&gt;
|&lt;br /&gt;
*There is a disclaimer of warranty that the individual granting the license has the right to do so&lt;br /&gt;
*Certain provisions of the license change between countries&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Copyright&lt;br /&gt;
|&lt;br /&gt;
*Automatically granted to created works, even without notice&lt;br /&gt;
*Reserves all rights for the creator&lt;br /&gt;
|&lt;br /&gt;
*Can cause confusion, since it applies without notice of copyright&lt;br /&gt;
*Those wishing to reuse copyrighted works must seek explicit permission&lt;br /&gt;
|&lt;br /&gt;
*Easy to violate copyright unintentionally, since notification of copyright is not required&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|&lt;br /&gt;
*Requires any modified and released versions to have source code available, and to stay under the GPL&lt;br /&gt;
*Maintains free software environment&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Incompatible with closed-source (commercial) development&lt;br /&gt;
*Once something is under the GPL, it essentially must stay under GPL&lt;br /&gt;
|&lt;br /&gt;
*&amp;quot;Locked-in&amp;quot; to GPL&lt;br /&gt;
*Forces ideology behind GPL on users of GPL'd content&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Lesser GPL (LGPL)&lt;br /&gt;
|&lt;br /&gt;
*Allows non-GPL software to link with LGPL'd libraries&lt;br /&gt;
*Less restrictive than GPL&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Largely discouraged by GPL proponents&lt;br /&gt;
|&lt;br /&gt;
*Allows free software to be used in proprietary projects&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|BSD-style Licenses&lt;br /&gt;
|&lt;br /&gt;
*Non-copyleft - modified versions aren't required to be free, more flexible&lt;br /&gt;
*Allows modified versions to be released under alternate licenses&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Modified versions can become incorporated into proprietary projects&lt;br /&gt;
*Original BSD license had an annoying &amp;quot;advertisement&amp;quot; clause&lt;br /&gt;
|&lt;br /&gt;
*Free code can be made proprietary&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Public Domain&lt;br /&gt;
|&lt;br /&gt;
*Work is released from copyright&lt;br /&gt;
*Work can be used by anyone else without restriction&lt;br /&gt;
|&lt;br /&gt;
*Any rights by the creator are forfeited&lt;br /&gt;
|&lt;br /&gt;
*Creator retains no rights to work&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Yes the groups should adopt it blah blah blah.&lt;br /&gt;
&lt;br /&gt;
Some more stuff.&lt;br /&gt;
&lt;br /&gt;
Blah blah blah.&lt;br /&gt;
&lt;br /&gt;
'''Links''' (if applicable)&lt;br /&gt;
* [http://google.com google]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1653</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1653"/>
		<updated>2007-07-14T21:03:24Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Comparison to other common licenses */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
((after text, link to creative commons website or some sub-site?))&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
((table: benefits (to 'user' / to 'creator'), disadvantages (to 'user' / to 'creator'), why to use it?, ethical considerations))&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|&lt;br /&gt;
*Creator of work can grant specific permissions for re-use of work&lt;br /&gt;
*Rights and conditions of others to use work are more clearly laid out&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Must be careful to choose appropriate license to retain the desired amount of control over the work&lt;br /&gt;
*Must specifically designate work as licensed under Creative Commons&lt;br /&gt;
*Users of Creative Commons-licensed works must be careful when combining works with different licenses&lt;br /&gt;
|&lt;br /&gt;
*There is a disclaimer of warranty that the individual granting the license has the right to do so&lt;br /&gt;
*Certain provisions of the license change between countries&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Copyright&lt;br /&gt;
|&lt;br /&gt;
*Automatically granted to created works, even without notice&lt;br /&gt;
*Reserves all rights for the creator&lt;br /&gt;
|&lt;br /&gt;
*Can cause confusion, since it applies without notice of copyright&lt;br /&gt;
*Those wishing to reuse copyrighted works must seek explicit permission&lt;br /&gt;
|&lt;br /&gt;
*Easy to violate copyright unintentionally, since notification of copyright is not required&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|&lt;br /&gt;
*Requires any modified and released versions to have source code available, and to stay under the GPL&lt;br /&gt;
*Maintains free software environment&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Incompatible with closed-source (commercial) development&lt;br /&gt;
*Once something is under the GPL, it essentially must stay under GPL&lt;br /&gt;
|&lt;br /&gt;
*&amp;quot;Locked-in&amp;quot; to GPL&lt;br /&gt;
*Forces ideology behind GPL on users of GPL'd content&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Lesser GPL (LGPL)&lt;br /&gt;
|&lt;br /&gt;
*Allows non-GPL software to link with LGPL'd libraries&lt;br /&gt;
*Less restrictive than GPL&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Largely discouraged by GPL proponents&lt;br /&gt;
|&lt;br /&gt;
*Allows free software to be used in proprietary projects&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|BSD-style Licenses&lt;br /&gt;
|&lt;br /&gt;
*Non-copyleft - modified versions aren't required to be free, more flexible&lt;br /&gt;
*Allows modified versions to be released under alternate licenses&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Modified versions can become incorporated into proprietary projects&lt;br /&gt;
*Original BSD license had an annoying &amp;quot;advertisement&amp;quot; clause&lt;br /&gt;
|&lt;br /&gt;
*Free code can be made proprietary&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Public Domain&lt;br /&gt;
|&lt;br /&gt;
*Work is released from copyright&lt;br /&gt;
*Work can be used by anyone else without restriction&lt;br /&gt;
|&lt;br /&gt;
*Any rights by the creator are forfeited&lt;br /&gt;
|&lt;br /&gt;
*Creator retains no rights to work&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Yes the groups should adopt it blah blah blah.&lt;br /&gt;
&lt;br /&gt;
Some more stuff.&lt;br /&gt;
&lt;br /&gt;
Blah blah blah.&lt;br /&gt;
&lt;br /&gt;
'''Links''' (if applicable)&lt;br /&gt;
* [http://google.com google]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1652</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1652"/>
		<updated>2007-07-14T20:58:35Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Comparison to other common licenses */  added bsd license row&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
((after text, link to creative commons website or some sub-site?))&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
((table: benefits (to 'user' / to 'creator'), disadvantages (to 'user' / to 'creator'), why to use it?, ethical considerations))&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|&lt;br /&gt;
*Creator of work can grant specific permissions for re-use of work&lt;br /&gt;
*Rights and conditions of others to use work are more clearly laid out&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Must be careful to choose appropriate license to retain the desired amount of control over the work&lt;br /&gt;
*Must specifically designate work as licensed under Creative Commons&lt;br /&gt;
*Users of Creative Commons-licensed works must be careful when combining works with different licenses&lt;br /&gt;
|&lt;br /&gt;
*There is a disclaimer of warranty that the individual granting the license has the right to do so&lt;br /&gt;
*Certain provisions of the license change between countries&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Copyright&lt;br /&gt;
|&lt;br /&gt;
*Automatically granted to created works, even without notice&lt;br /&gt;
*Reserves all rights for the creator&lt;br /&gt;
|&lt;br /&gt;
*Can cause confusion, since it applies without notice of copyright&lt;br /&gt;
*Those wishing to reuse copyrighted works must seek explicit permission&lt;br /&gt;
|&lt;br /&gt;
*Easy to violate copyright unintentionally, since notification of copyright is not required&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|&lt;br /&gt;
*Requires any modified and released versions to have source code available, and to stay under the GPL&lt;br /&gt;
*Maintains free software environment&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Incompatible with closed-source (commercial) development&lt;br /&gt;
*Once something is under the GPL, it essentially must stay under GPL&lt;br /&gt;
|&lt;br /&gt;
*&amp;quot;Locked-in&amp;quot; to GPL&lt;br /&gt;
*Forces ideology behind GPL on users of GPL'd content&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Lesser GPL (LGPL)&lt;br /&gt;
|&lt;br /&gt;
*Allows non-GPL software to link with LGPL'd libraries&lt;br /&gt;
*Less restrictive than GPL&lt;br /&gt;
|&lt;br /&gt;
*Largely discouraged by GPL proponents&lt;br /&gt;
|&lt;br /&gt;
*Allows free software to be used in proprietary projects&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|BSD-style Licenses&lt;br /&gt;
|&lt;br /&gt;
*Non-copyleft - modified versions aren't required to be free, more flexible&lt;br /&gt;
*Allows modified versions to be released under alternate licenses&lt;br /&gt;
|&lt;br /&gt;
*Modified versions can become incorporated into proprietary projects&lt;br /&gt;
*Original BSD license had an annoying &amp;quot;advertisement&amp;quot; clause&lt;br /&gt;
|&lt;br /&gt;
*Free code can be made proprietary&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Yes the groups should adopt it blah blah blah.&lt;br /&gt;
&lt;br /&gt;
Some more stuff.&lt;br /&gt;
&lt;br /&gt;
Blah blah blah.&lt;br /&gt;
&lt;br /&gt;
'''Links''' (if applicable)&lt;br /&gt;
* [http://google.com google]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1651</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1651"/>
		<updated>2007-07-14T20:39:27Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Comparison to other common licenses */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
((after text, link to creative commons website or some sub-site?))&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
((table: benefits (to 'user' / to 'creator'), disadvantages (to 'user' / to 'creator'), why to use it?, ethical considerations))&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|&lt;br /&gt;
*Creator of work can grant specific permissions for re-use of work&lt;br /&gt;
*Rights and conditions of others to use work are more clearly laid out&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Must be careful to choose appropriate license to retain the desired amount of control over the work&lt;br /&gt;
*Must specifically designate work as licensed under Creative Commons&lt;br /&gt;
*Users of Creative Commons-licensed works must be careful when combining works with different licenses&lt;br /&gt;
|&lt;br /&gt;
*There is a disclaimer of warranty that the individual granting the license has the right to do so&lt;br /&gt;
*Certain provisions of the license change between countries&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Copyright&lt;br /&gt;
|&lt;br /&gt;
*Automatically granted to created works, even without notice&lt;br /&gt;
*Reserves all rights for the creator&lt;br /&gt;
|&lt;br /&gt;
*Can cause confusion, since it applies without notice of copyright&lt;br /&gt;
*Those wishing to reuse copyrighted works must seek explicit permission&lt;br /&gt;
|&lt;br /&gt;
*Easy to violate copyright unintentionally, since notification of copyright is not required&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|&lt;br /&gt;
*Requires any modified and released versions to have source code available, and to stay under the GPL&lt;br /&gt;
*Maintains free software environment&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Incompatible with closed-source (commercial) development&lt;br /&gt;
*Once something is under the GPL, it essentially must stay under GPL&lt;br /&gt;
|&lt;br /&gt;
*&amp;quot;Locked-in&amp;quot; to GPL&lt;br /&gt;
*Forces ideology behind GPL on users of GPL'd content&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Yes the groups should adopt it blah blah blah.&lt;br /&gt;
&lt;br /&gt;
Some more stuff.&lt;br /&gt;
&lt;br /&gt;
Blah blah blah.&lt;br /&gt;
&lt;br /&gt;
'''Links''' (if applicable)&lt;br /&gt;
* [http://google.com google]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1650</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1650"/>
		<updated>2007-07-14T20:17:31Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Comparison to other common licenses */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
((after text, link to creative commons website or some sub-site?))&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
((table: benefits (to 'user' / to 'creator'), disadvantages (to 'user' / to 'creator'), why to use it?, ethical considerations))&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|&lt;br /&gt;
*Creator of work can grant specific permissions for re-use of work&lt;br /&gt;
*Rights and conditions of others to use work are more clearly laid out&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Must be careful to choose appropriate license to retain the desired amount of control over the work&lt;br /&gt;
*Must specifically designate work as licensed under Creative Commons&lt;br /&gt;
*Users of Creative Commons-licensed works must be careful when combining works with different licenses&lt;br /&gt;
|&lt;br /&gt;
*There is a disclaimer of warranty that the individual granting the license has the right to do so&lt;br /&gt;
*Certain provisions of the license change between countries&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Copyright&lt;br /&gt;
|&lt;br /&gt;
*Automatically granted to created works, even without notice&lt;br /&gt;
*Reserves all rights for the creator&lt;br /&gt;
|&lt;br /&gt;
*Can cause confusion, since it applies without notice of copyright&lt;br /&gt;
*Those wishing to reuse copyrighted works must seek explicit permission&lt;br /&gt;
|&lt;br /&gt;
*Easy to violate copyright unintentionally, since notification of copyright is not required&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Something&lt;br /&gt;
'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Something&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Something else&lt;br /&gt;
'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Something else again&lt;br /&gt;
|Dude. That's ethical.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Yes the groups should adopt it blah blah blah.&lt;br /&gt;
&lt;br /&gt;
Some more stuff.&lt;br /&gt;
&lt;br /&gt;
Blah blah blah.&lt;br /&gt;
&lt;br /&gt;
'''Links''' (if applicable)&lt;br /&gt;
* [http://google.com google]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1649</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1649"/>
		<updated>2007-07-14T20:13:08Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Comparison to other common licenses */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
((after text, link to creative commons website or some sub-site?))&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
((table: benefits (to 'user' / to 'creator'), disadvantages (to 'user' / to 'creator'), why to use it?, ethical considerations))&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|&lt;br /&gt;
*Creator of work can grant specific permissions for re-use of work&lt;br /&gt;
*Rights and conditions of others to use work are more clearly laid out&lt;br /&gt;
*Based on copyright&lt;br /&gt;
|&lt;br /&gt;
*Must be careful to choose appropriate license to retain the desired amount of control over the work&lt;br /&gt;
*Must specifically designate work as licensed under Creative Commons&lt;br /&gt;
*Users of Creative Commons-licensed works must be careful when combining works with different licenses&lt;br /&gt;
|Dude. That's unethical.&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Copyright&lt;br /&gt;
|&lt;br /&gt;
*Automatically granted to created works, even without notice&lt;br /&gt;
*Reserves all rights for the creator&lt;br /&gt;
|&lt;br /&gt;
*Can cause confusion, since it applies without notice of copyright&lt;br /&gt;
*Those wishing to reuse copyrighted works must seek explicit permission&lt;br /&gt;
|&lt;br /&gt;
*Ethics is crying&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Something&lt;br /&gt;
'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Something&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Something else&lt;br /&gt;
'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Something else again&lt;br /&gt;
|Dude. That's ethical.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Yes the groups should adopt it blah blah blah.&lt;br /&gt;
&lt;br /&gt;
Some more stuff.&lt;br /&gt;
&lt;br /&gt;
Blah blah blah.&lt;br /&gt;
&lt;br /&gt;
'''Links''' (if applicable)&lt;br /&gt;
* [http://google.com google]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1648</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1648"/>
		<updated>2007-07-14T20:10:26Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Comparison to other common licenses */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
((after text, link to creative commons website or some sub-site?))&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
((table: benefits (to 'user' / to 'creator'), disadvantages (to 'user' / to 'creator'), why to use it?, ethical considerations))&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|&lt;br /&gt;
*Creator of work can grant specific permissions for re-use of work&lt;br /&gt;
*Rights and conditions of others to use work are more clearly laid out&lt;br /&gt;
|&lt;br /&gt;
*Must be careful to choose appropriate license to retain the desired amount of control over the work&lt;br /&gt;
*Users of Creative Commons-licensed works must be careful when combining works with different licenses&lt;br /&gt;
|Dude. That's unethical.&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Basic Copyright&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Something&lt;br /&gt;
'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Something else&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Something&lt;br /&gt;
'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Something else&lt;br /&gt;
|&lt;br /&gt;
*Ethics is crying&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Something&lt;br /&gt;
'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Something&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Something else&lt;br /&gt;
'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Something else again&lt;br /&gt;
|Dude. That's ethical.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Yes the groups should adopt it blah blah blah.&lt;br /&gt;
&lt;br /&gt;
Some more stuff.&lt;br /&gt;
&lt;br /&gt;
Blah blah blah.&lt;br /&gt;
&lt;br /&gt;
'''Links''' (if applicable)&lt;br /&gt;
* [http://google.com google]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1625</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1625"/>
		<updated>2007-07-14T14:38:14Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Provisions of Creative Commons License */  Added a little summary of how creative commons works&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
Based upon copyright protections, the various forms of the creative commons licenses allow the creator of a work to declare &amp;quot;some rights reserved&amp;quot; instead of the usual &amp;quot;all rights reserved&amp;quot; associated with plain copyright. This allows the creator of the original work to grant certain permissions to those who wish to use the original work without the prospective user having to explicitly ask for permission.&lt;br /&gt;
((after text, link to creative commons website or some sub-site?))&lt;br /&gt;
&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
((table: benefits (to 'user' / to 'creator'), disadvantages (to 'user' / to 'creator'), why to use it?, ethical considerations))&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Can block a large amount of spam&lt;br /&gt;
*Low chance of blocking legitimate email&lt;br /&gt;
**Notification sent to blocked senders in some implementations&lt;br /&gt;
'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Action to take on spam is user-definable&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Some spam still can still get through&lt;br /&gt;
*Might block individuals running their own mail server&lt;br /&gt;
'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Requires processing at client/receiver-side for effective blocking&lt;br /&gt;
|Dude. That's unethical.&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Basic Copyright&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Something&lt;br /&gt;
'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Something else&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Something&lt;br /&gt;
'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Something else&lt;br /&gt;
|&lt;br /&gt;
*Ethics is crying&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Something&lt;br /&gt;
'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Something&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Something else&lt;br /&gt;
'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Something else again&lt;br /&gt;
|Dude. That's ethical.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Yes the groups should adopt it blah blah blah.&lt;br /&gt;
&lt;br /&gt;
Some more stuff.&lt;br /&gt;
&lt;br /&gt;
Blah blah blah.&lt;br /&gt;
&lt;br /&gt;
'''Links''' (if applicable)&lt;br /&gt;
* [http://google.com google]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1618</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1618"/>
		<updated>2007-07-14T01:51:59Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Comparison to other common licenses */  took out rowspans since they cluttered the look&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
((after text, link to creative commons website or some sub-site?))&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
((table: benefits (to 'user' / to 'creator'), disadvantages (to 'user' / to 'creator'), why to use it?, ethical considerations))&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Creative Commons&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Can block a large amount of spam&lt;br /&gt;
*Low chance of blocking legitimate email&lt;br /&gt;
**Notification sent to blocked senders in some implementations&lt;br /&gt;
'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Action to take on spam is user-definable&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Some spam still can still get through&lt;br /&gt;
*Might block individuals running their own mail server&lt;br /&gt;
'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Requires processing at client/receiver-side for effective blocking&lt;br /&gt;
|Dude. That's unethical.&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Basic Copyright&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Something&lt;br /&gt;
'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Something else&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Something&lt;br /&gt;
'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Something else&lt;br /&gt;
|&lt;br /&gt;
*Ethics is crying&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|GPL&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Something&lt;br /&gt;
'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Something&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Something else&lt;br /&gt;
'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Something else again&lt;br /&gt;
|Dude. That's ethical.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Yes the groups should adopt it blah blah blah.&lt;br /&gt;
&lt;br /&gt;
Some more stuff.&lt;br /&gt;
&lt;br /&gt;
Blah blah blah.&lt;br /&gt;
&lt;br /&gt;
'''Links''' (if applicable)&lt;br /&gt;
* [http://google.com google]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1598</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1598"/>
		<updated>2007-07-12T23:22:55Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Comparison to other common licenses */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
((after text, link to creative commons website or some sub-site?))&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
((table: benefits (to 'user' / to 'creator'), disadvantages (to 'user' / to 'creator'), why to use it?, ethical considerations))&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| rowspan=2 | Creative Commons&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Can block a large amount of spam&lt;br /&gt;
*Low chance of blocking legitimate email&lt;br /&gt;
**Notification sent to blocked senders in some implementations&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Some spam still can still get through&lt;br /&gt;
*Might block individuals running their own mail server&lt;br /&gt;
| rowspan=2 | Dude. That's unethical.&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Action to take on spam is user-definable&lt;br /&gt;
|'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Requires processing at client/receiver-side for effective blocking&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| rowspan=2 | GPL&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Something&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Something else&lt;br /&gt;
| rowspan=2 | Dude. That's ethical.&lt;br /&gt;
|-&lt;br /&gt;
|'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Something&lt;br /&gt;
|'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Something else again&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Yes the groups should adopt it blah blah blah.&lt;br /&gt;
&lt;br /&gt;
Some more stuff.&lt;br /&gt;
&lt;br /&gt;
Blah blah blah.&lt;br /&gt;
&lt;br /&gt;
'''Links''' (if applicable)&lt;br /&gt;
* [http://google.com google]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1595</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1595"/>
		<updated>2007-07-12T23:20:14Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Comparison to other common licenses */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
((after text, link to creative commons website or some sub-site?))&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
((table: benefits (to 'user' / to 'creator'), disadvantages (to 'user' / to 'creator'), why to use it?, ethical considerations))&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| rowspan=2 | Creative Commons&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Can block a large amount of spam&lt;br /&gt;
*Low chance of blocking legitimate email&lt;br /&gt;
**Notification sent to blocked senders in some implementations&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Some spam still can still get through&lt;br /&gt;
*Might block individuals running their own mail server&lt;br /&gt;
| rowspan=2 | Dude. That's unethical.&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Action to take on spam is user-definable&lt;br /&gt;
|'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Requires processing at client/receiver-side for effective blocking&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Yes the groups should adopt it blah blah blah.&lt;br /&gt;
&lt;br /&gt;
Some more stuff.&lt;br /&gt;
&lt;br /&gt;
Blah blah blah.&lt;br /&gt;
&lt;br /&gt;
'''Links''' (if applicable)&lt;br /&gt;
* [http://google.com google]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1594</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1594"/>
		<updated>2007-07-12T23:19:55Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Comparison to other common licenses */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
((after text, link to creative commons website or some sub-site?))&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
((table: benefits (to 'user' / to 'creator'), disadvantages (to 'user' / to 'creator'), why to use it?, ethical considerations))&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| rowspan=2 | Creative Commons&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Can block a large amount of spam&lt;br /&gt;
*Low chance of blocking legitimate email&lt;br /&gt;
**Notification sent to blocked senders in some implementations&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Some spam still can still get through&lt;br /&gt;
*Might block individuals running their own mail server&lt;br /&gt;
| rowspan=2 | Dude. That's unethical.&lt;br /&gt;
|-&lt;br /&gt;
|'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Action to take on spam is user-definable&lt;br /&gt;
|'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Requires processing at client/receiver-side for effective blocking&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Yes the groups should adopt it blah blah blah.&lt;br /&gt;
&lt;br /&gt;
Some more stuff.&lt;br /&gt;
&lt;br /&gt;
Blah blah blah.&lt;br /&gt;
&lt;br /&gt;
'''Links''' (if applicable)&lt;br /&gt;
* [http://google.com google]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1592</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1592"/>
		<updated>2007-07-12T23:19:28Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Comparison to other common licenses */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
((after text, link to creative commons website or some sub-site?))&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
((table: benefits (to 'user' / to 'creator'), disadvantages (to 'user' / to 'creator'), why to use it?, ethical considerations))&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! License&lt;br /&gt;
! Advantages&lt;br /&gt;
! Disadvantages&lt;br /&gt;
! Ethical Considerations&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
| rowspan=2 | Creative Commons&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Can block a large amount of spam&lt;br /&gt;
*Low chance of blocking legitimate email&lt;br /&gt;
**Notification sent to blocked senders in some implementations&lt;br /&gt;
|'''To the &amp;quot;user&amp;quot;'''&lt;br /&gt;
*Some spam still can still get through&lt;br /&gt;
*Might block individuals running their own mail server&lt;br /&gt;
| rowspan=2 | Dude. That's unethical.&lt;br /&gt;
|-&lt;br /&gt;
|'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Action to take on spam is user-definable&lt;br /&gt;
|'''To the &amp;quot;creator&amp;quot;'''&lt;br /&gt;
*Requires processing at client/receiver-side for effective blocking&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Yes the groups should adopt it blah blah blah.&lt;br /&gt;
&lt;br /&gt;
Some more stuff.&lt;br /&gt;
&lt;br /&gt;
Blah blah blah.&lt;br /&gt;
&lt;br /&gt;
'''Links''' (if applicable)&lt;br /&gt;
* [http://google.com google]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1588</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1588"/>
		<updated>2007-07-12T23:03:49Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Discussion Questions */  fixed typo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
((after text, link to creative commons website or some sub-site?))&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
((table: benefits (to 'user' / to 'creator'), disadvantages (to 'user' / to 'creator'), why to use it?, ethical considerations))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and guarantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Yes the groups should adopt it blah blah blah.&lt;br /&gt;
&lt;br /&gt;
Some more stuff.&lt;br /&gt;
&lt;br /&gt;
Blah blah blah.&lt;br /&gt;
&lt;br /&gt;
'''Links''' (if applicable)&lt;br /&gt;
* [http://google.com google]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1586</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1586"/>
		<updated>2007-07-12T23:02:59Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Adoption of license */  added skeleton formatting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
((after text, link to creative commons website or some sub-site?))&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
((table: benefits (to 'user' / to 'creator'), disadvantages (to 'user' / to 'creator'), why to use it?, ethical considerations))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and garantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
Yes the groups should adopt it blah blah blah.&lt;br /&gt;
&lt;br /&gt;
Some more stuff.&lt;br /&gt;
&lt;br /&gt;
Blah blah blah.&lt;br /&gt;
&lt;br /&gt;
'''Links''' (if applicable)&lt;br /&gt;
* [http://google.com google]&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1583</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1583"/>
		<updated>2007-07-12T22:58:46Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
((after text, link to creative commons website or some sub-site?))&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
((table: benefits (to 'user' / to 'creator'), disadvantages (to 'user' / to 'creator'), why to use it?, ethical considerations))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : ''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and garantee the protections they want to extend to the public?''&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
; The Question : ''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?''&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
; The Question : ''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?''&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1581</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1581"/>
		<updated>2007-07-12T22:54:33Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
((after text, link to creative commons website or some sub-site?))&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
((table: benefits (to 'user' / to 'creator'), disadvantages (to 'user' / to 'creator'), why to use it?, ethical considerations))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : '''''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and garantee the protections they want to extend to the public?'''''&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
* '''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?'''&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
* '''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?'''&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1580</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1580"/>
		<updated>2007-07-12T22:54:12Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
((after text, link to creative commons website or some sub-site?))&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
((table: benefits (to 'user' / to 'creator'), disadvantages (to 'user' / to 'creator'), why to use it?, ethical considerations))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
; The Question : '''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and garantee the protections they want to extend to the public?'''&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
* '''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?'''&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
* '''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?'''&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1579</id>
		<title>CSC 379:Week 2, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_1&amp;diff=1579"/>
		<updated>2007-07-12T22:51:52Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: brainstorming&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creative Commons=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
===Provisions of Creative Commons License===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
((after text, link to creative commons website or some sub-site?))&lt;br /&gt;
===Comparison to other common licenses===&lt;br /&gt;
&lt;br /&gt;
((table: benefits (to 'user' / to 'creator'), disadvantages (to 'user' / to 'creator'), why to use it?, ethical considerations))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
===Adoption of license===&lt;br /&gt;
* '''Should groups like media outlets who desire their content to be shared adopt licenses like creative commons to clarify and garantee the protections they want to extend to the public?'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations / Obstacles to adoption===&lt;br /&gt;
* '''What ethical advantages and disadvantages are there for adopting Creative Commons licenses?  What obstacles exist towards the adoption of Creative Commons licenses within the business community?'''&lt;br /&gt;
&lt;br /&gt;
===Ethical considerations of international usage===&lt;br /&gt;
* '''Copyright law differs between countries.  Creative Commons has licenses that can be adapted to be compatible with the laws of many nations.  What ethical considerations are there to a system of international copyright laws and/or agreements?  Are licenses like Creative Commons viable alternatives to international agreements?'''&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_4&amp;diff=1513</id>
		<title>CSC 379:Week 1, Group 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_4&amp;diff=1513"/>
		<updated>2007-07-07T15:07:41Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: Removed internal use only section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Spam Prevention Techniques ==&lt;br /&gt;
&lt;br /&gt;
=== Comparison of Techniques ===&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! Technique&lt;br /&gt;
! Pros&lt;br /&gt;
! Cons&lt;br /&gt;
! Authors' Rating&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Block_domains_of_.22known.22_spammers|Block domains of &amp;quot;known&amp;quot; spammers]]&lt;br /&gt;
|&lt;br /&gt;
*Can block a large amount of spam&lt;br /&gt;
*Low chance of blocking legitimate email&lt;br /&gt;
**Notification sent to blocked senders in some implementations&lt;br /&gt;
*Action to take on spam is user-definable&lt;br /&gt;
|&lt;br /&gt;
*Some spam still can still get through&lt;br /&gt;
*Might block individuals running their own mail server&lt;br /&gt;
*Requires processing at client/receiver-side for effective blocking&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Require_users_to_request_permission_to_send_mail|Require users to request permission to send you e-mail]]&lt;br /&gt;
|&lt;br /&gt;
*Blocks all spam&lt;br /&gt;
*Robots cannot easily send spam&lt;br /&gt;
*Hard to falsify identity&lt;br /&gt;
|&lt;br /&gt;
*Can introduce large delays in user &amp;quot;seeing&amp;quot; an email&lt;br /&gt;
*Impossible to implement correctly and universally at the client side&lt;br /&gt;
*Requires significant action on the part of the user to make exceptions&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Charge_for_email_sent|Charge for email sent]]&lt;br /&gt;
|&lt;br /&gt;
*Forces targeted selection of spam&lt;br /&gt;
|&lt;br /&gt;
*Changes the operational paradigm of email&lt;br /&gt;
*Lots of supporting infrastructure development necessary&lt;br /&gt;
*Might impact users more than spammers&lt;br /&gt;
*Where does the money go?&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Opt-in_for_commercial_email | Opt-in for commercial email]]&lt;br /&gt;
|&lt;br /&gt;
*Companies can send advertisements without sending spam&lt;br /&gt;
*Users can freely restrict the influx of mail from their many online affiliations&lt;br /&gt;
|&lt;br /&gt;
*Fraudulent emails have an opt-out link that sends you to an unwanted web page.&lt;br /&gt;
*Only stops unwanted spam from companies that abide by this rule.&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Domain_authentication | Domain authentication]]&lt;br /&gt;
|&lt;br /&gt;
*Very little spam gets through&lt;br /&gt;
*Makes phishing and other identity deceptions very hard&lt;br /&gt;
*Easier to track down spammers&lt;br /&gt;
|&lt;br /&gt;
*Current approaches can break under certain common circumstances&lt;br /&gt;
*Requires infrastructure changes&lt;br /&gt;
*Multiple standards competing&lt;br /&gt;
*Could make it more difficult for individuals with their own mail server&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Bounties | Bounties]]&lt;br /&gt;
|&lt;br /&gt;
*Gets rid of big spammers with incentive&lt;br /&gt;
*Possible deterrent&lt;br /&gt;
|&lt;br /&gt;
*Very difficult for average citizens to find more information than FBI&lt;br /&gt;
*Bounty only paid if spammer is penalized&lt;br /&gt;
*Most known spammers are not brought to trial due to lack of evidence&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#The_.22Goodmail.22_approach | The &amp;quot;Goodmail&amp;quot; approach]]&lt;br /&gt;
|&lt;br /&gt;
*Accreditation of senders ensures legitimate senders&lt;br /&gt;
*Certification of mail ensures individual mail is legitimate&lt;br /&gt;
*Legitimate mail won't get caught up in spam/junk mail folders&lt;br /&gt;
*Accredited senders must maintain high standards&lt;br /&gt;
|&lt;br /&gt;
*ISP / email provider must support certified mail&lt;br /&gt;
*Depends on reliability and impartiality of one company&lt;br /&gt;
*Creates two classes of email&lt;br /&gt;
**Not in the spirit of the internet or email&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Bonds_with_escrow_agencies | Bonds with escrow agencies]]&lt;br /&gt;
|&lt;br /&gt;
* Whitelisted email accounts don't take out a bond&lt;br /&gt;
* Only spammers have to pay.&lt;br /&gt;
|&lt;br /&gt;
* Lots of infrastructure and processing behind 'micro-payments'&lt;br /&gt;
* Somebody has to pay for the escrow agency.&lt;br /&gt;
* Users can subvert the system by collecting even when not spam.&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Client-side_filtering | Client-side filtering]]&lt;br /&gt;
|pro&lt;br /&gt;
|&lt;br /&gt;
*Only as good as user or algorithms/heuristics at identifying spam&lt;br /&gt;
*Spam emails are stopped, they are simply not read.&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Technique Details ===&lt;br /&gt;
&lt;br /&gt;
====Block domains of &amp;quot;known&amp;quot; spammers====&lt;br /&gt;
This technique is often implemented by means of a DNS Blacklist (DNSBL) which is a frequently updated list containing IP addresses and ranges of known spammers, though similar systems exist to block domain names or URIs (uniform resource identifiers) associated with spam.&lt;br /&gt;
&lt;br /&gt;
This approach has an advantage over most client-side filtering schemes, since it is better able to block spam that the particular client has never seen before since it is a shared and universal list. Depending on implementation, the DNSBL system could be implemented as a form of client-side filtering. However, it is most efficient if the DNSBL filtering system is implemented at a higher level, such as at the ISP or business. Another advantage of this system is that the action taken when a message is identified as spam is defined by the individual users of the DNSBL system – they can still deliver the message, flag it as spam, or bounce it entirely.&lt;br /&gt;
&lt;br /&gt;
There is the possibility that a DNSBL system could block legitimate email – the likelihood and method of handling this possibility are dependent on the specific implementation. The Spamhaus system sends a message back to each sender of a blocked message indicating why it was bounced to prevent legitimate email from “disappearing” without a trace – however, this approach increases mail and network traffic. A DNSBL system can also make it hard for individuals to set up their own mail servers at home, since residential IPs are blocked in some systems. Also, with minimal processing of incoming messages the percentage of spam blocked is relatively low – for the Spamhaus system, only 15-25%. To get over 90% spam blockage, the headers and body of each message must be analyzed.&lt;br /&gt;
&lt;br /&gt;
=====Links=====&lt;br /&gt;
*[http://en.wikipedia.org/wiki/DNSBL Wikipedia DNSBL entry]&lt;br /&gt;
*[http://www.spamhaus.org/faq/answers.lasso?section=Spamhaus%20SBL Spamhaus SBL FAQ]&lt;br /&gt;
*[http://www.spamhaus.org/faq/answers.lasso?section=DNSBL%20Technical Spamhaus DNSBL Technical FAQ]&lt;br /&gt;
&lt;br /&gt;
====Require users to request permission to send you mail====&lt;br /&gt;
This draconian spam prevention technique, most commonly seen through the use of the Earthlink spamBlocker, delivers only messages from the user’s address book to their inbox – all other mail is put in a separate folder and the sender is sent a reply with information on requesting the user allow them to send the user email.&lt;br /&gt;
&lt;br /&gt;
This technique doesn’t let spam through to the user’s inbox, which is a major advantage. Also, this approach makes it hard or impossible for the sender’s identity to be falsified. When allowing the sender to request the intended recipient to allow their mail through, anti-robot measures prevent the automation and abuse of this system.&lt;br /&gt;
&lt;br /&gt;
There are major disadvantages to this approach. Whenever receiving email from a new person or website, the user must manually add permission to receive from the new sender. Desired or important emails could sit idle for long periods of time in the “Suspect Email” folder before the user reads them. Also, sending a reply to the sender with instructions to request permission from the user to send them mail can cause frustration: first, it is an additional step for the sender, and second, the sender might not check their email again after sending the original message, which introduces further delays.&lt;br /&gt;
&lt;br /&gt;
=====Links=====&lt;br /&gt;
*[http://www.earthlink.net/software/free/spamblocker/ Earthlink spamBlocker]&lt;br /&gt;
&lt;br /&gt;
==== Charge for email sent ====&lt;br /&gt;
This technique strives to make email more like postal mail, shifting the burden of cost from the recipients to the senders. The goal being reduced spam due to the new costs associated with sending email – requiring more targeted marketing/spamming to be cost-effective. The costs involved could either be monetary – e-postage  – or temporal – “hashcash”: requiring a complex computation for each sent email, making sending email very slow if there are many recipients.&lt;br /&gt;
&lt;br /&gt;
The advantage to this technique, if it worked properly, would be reduced spam because spammers would be forced to have a more targeted selection of recipients.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, there are many problems in implementing a system to handle this. Vast amounts of banking infrastructure would need to be established to support an e-postage system, since many checks would have to be done to ensure against fraud. The decentralized mail infrastructure of the internet would have to become more centralized to force the usage and verification of e-postage as well. Using hashcash instead of e-postage would still require mechanisms and infrastructure to enforce the running of the hashcash algorithms. Also, most spammers have vast networks of computers, both legitimately and illegitimately, under their control, so they would have more capacity to solve hashcash problems than individual users.&lt;br /&gt;
&lt;br /&gt;
=====Links=====&lt;br /&gt;
*[http://www.taugh.com/epostage.pdf An Overview of E-Postage (currently down)]&lt;br /&gt;
*[http://216.239.51.104/search?q=cache:X1_Q1Qii3AkJ:www.taugh.com/epostage.pdf+epostage&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;cd=2&amp;amp;gl=us Google cache of above article]&lt;br /&gt;
*[http://fare.tunes.org/articles/stamps_vs_spam.html Stamps vs. Spam]&lt;br /&gt;
&lt;br /&gt;
==== Opt-in for commercial email ====&lt;br /&gt;
Commercial advertisements are often considered spam even when the user has had a previous relationship with the company sending the email.&lt;br /&gt;
In order for companies to send such advertisements without causing a lot of unwanted email, a simple opt-in or opt-out system should be&lt;br /&gt;
implemented by the company. If an opt-out link or instructions appear in an email, the result of a user following them is that that user&lt;br /&gt;
will no longer be sent similar advertisements. This much is required to be CAN-SPAM compliant. The preferred method, however, is an opt-in.&lt;br /&gt;
In this way, when a company and a user first achieve contact (usually by the user making a user account with the company), there is a method&lt;br /&gt;
for the user to configure which types of email advertisements he or she desires from the company.&lt;br /&gt;
&lt;br /&gt;
Such a system allows a user to decide and configure which companies and which types of advertisements they would like to receive email about&lt;br /&gt;
from each company for which they have an online affiliation. However, this requires the company to implement and abide by such a rule. Also,&lt;br /&gt;
since this system is so common, many fraudulent spam emails have opt-out options which are fake. By responding to such an opt-out option,&lt;br /&gt;
you actually submitting yourself to more spam because the sender knows that your e-mail account is active.&lt;br /&gt;
&lt;br /&gt;
===== Links =====&lt;br /&gt;
* [http://www.ftc.gov/bcp/conline/pubs/buspubs/canspam.shtm The CAN-SPAM Act]&lt;br /&gt;
&lt;br /&gt;
==== Domain authentication ====&lt;br /&gt;
Domain authentication ensures that the domain in a sender’s email is authentic and hasn’t been forged, making phishing and other fraudulent email harder to send. There are two major techniques for accomplishing domain authentication: Sender Policy Framework (SPF) and Domain Keys (DK). Both of these approaches use DNS to authenticate sender domains.&lt;br /&gt;
&lt;br /&gt;
Both approaches add support for domain authentication to the current mail framework in existence, enabling one to be sure that the email originated from the domain specified in the sender’s address. This would effectively filter out a lot of spam.&lt;br /&gt;
&lt;br /&gt;
One problem with both techniques is that they fail under certain conditions: SPF fails under some store-and-forward situations, and DK fails when the message is modified after signing. Also, these techniques do not eliminate the ability of spammers to use temporary domains to send spam – though mail will have to be addressed from that domain, possibly facilitating the tracking of spammers.&lt;br /&gt;
&lt;br /&gt;
=====Links=====&lt;br /&gt;
*[http://lwn.net/Articles/188685/ Domain Keys for email sender authentication]&lt;br /&gt;
*[http://lwn.net/Articles/187736/ SPF on vger]&lt;br /&gt;
*[http://e-com.ic.gc.ca/epic/site/ecic-ceac.nsf/en/gv00298e.html Anti-Spam Technology Overview: Emerging Technologies]&lt;br /&gt;
&lt;br /&gt;
==== Bounties ====&lt;br /&gt;
Large sums of money can be offered for the capture of big-time spammers. This money can either be a flat amount or a percentage&lt;br /&gt;
of the civil penalty paid by the spammer. The FTC's plan was to give 20% of the collected penalty to the person who identified&lt;br /&gt;
the spammer.&lt;br /&gt;
&lt;br /&gt;
Since the civic penalties for spammers are large amounts of money, this incentive could cause many people to strive for&lt;br /&gt;
incriminating evidence against spammers. With such incentive, spammers would not want to send so much email as to be at the top&lt;br /&gt;
of the bounty list, thereby deterring spammers from increasing their spam.&lt;br /&gt;
&lt;br /&gt;
However, critics say that this ignores the main problem with capturing spammers. The agencies that would offer such bounties&lt;br /&gt;
already know who the spammers are, but don't have enough proof to bring said spammers to trial. Therefore, the bounty, though&lt;br /&gt;
offered for everyone, would only be truly available to people inside the spam rings.&lt;br /&gt;
&lt;br /&gt;
===== Links =====&lt;br /&gt;
*[http://www.msnbc.msn.com/id/5326107/%20 FTC's plans to institute bounties]&lt;br /&gt;
*[http://www.silicon.com/research/specialreports/thespamreport/0,39025001,39124098,00.htm Will bounties stop spammers?]&lt;br /&gt;
&lt;br /&gt;
==== The &amp;quot;Goodmail&amp;quot; approach ====&lt;br /&gt;
This technique provides for accreditation for legitimate senders, allowing their emails to bypass spam and volume mailing filters and folders and get delivered directly to the inbox of users on participating mail systems. The accreditation process costs money and sending the certified messages also costs money. The accreditation process is strict, and the policies for using the service exclude any unsolicited email.&lt;br /&gt;
&lt;br /&gt;
This approach does benefit users in that certified mail is known to be from a trustworthy source and emails from companies using the Goodmail service will not be put in a junk mail folder. This benefits the companies to the same degree, though, ensuring that their messages are delivered straight to the users’ inboxes. &lt;br /&gt;
&lt;br /&gt;
Much maligned when AOL first announced it would use the Goodmail service, it seems most of the criticism was reactionary – the qualifications required by and standards instituted by Goodmail, if they are actually as strict as they appear, mean that users either want the emails sent through this service or can opt-out of them – and they aren’t unsolicited. This service is provided by a for-profit entity, so it is similar to a pay-for-email scheme – it also seems to divide email into two classes which is arguably not in the spirit of the email system. Also, it does require the support of mail hosts and/or ISPs.&lt;br /&gt;
&lt;br /&gt;
===== Links =====&lt;br /&gt;
*[http://www.goodmailsystems.com/ Goodmail Systems Homepage]&lt;br /&gt;
*[http://www.usatoday.com/tech/news/computersecurity/2006-03-05-goodmail_x.htm USA Today Article on Goodmail]&lt;br /&gt;
&lt;br /&gt;
==== Bonds with escrow agencies ====&lt;br /&gt;
This spam fighting technique works based on whitelists, blacklists, graylists, and a third party (escrow agency) separate from the email sender or receiver.&lt;br /&gt;
A whitelisted sender simply sends email and it goes through without the escrow agency intercepting. A blacklisted sender cannot send email to the would-be receiver. The contents of the graylist is essentially everyone on neither of the other lists.&lt;br /&gt;
&lt;br /&gt;
A graylisted sender opens a bond for a small amount of money (one cent) with the escrow agency in order to send email. If the receiver blacklists the sender as a result of the email, the bond is collected and the sender is charged. Thus, only spammers have to pay for their email unlike the [[#Charge_for_email_sent | charge-for-email]] approach.&lt;br /&gt;
&lt;br /&gt;
The escrow agency, however, must be paid. One way of doing this is having the collected spammer money go to the escrow agency. There is a lot of processing for any type of internet payment, so the penny (or so) that is charged to the spammer may not be enough to cover the escrow agency's cost regarding. Also, non-profit groups would possibly often be blacklisted and therefore be forced to pay more than they can afford similar to the Goodmail approach. Since the email cost is mean to deter spammers, Users can subvert the system by blacklisting emails that aren't spam. For example, I could charge my professors for sending me email that they must send for class or users could charge ebay for requested notifications.&lt;br /&gt;
&lt;br /&gt;
===== Links =====&lt;br /&gt;
* [http://8stars.org/a/2003/03/13/more-on-fighting-spam/ Summary of escrow spam fighting]&lt;br /&gt;
&lt;br /&gt;
==== Client-side filtering ====&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_4&amp;diff=1508</id>
		<title>CSC 379:Week 1, Group 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_4&amp;diff=1508"/>
		<updated>2007-07-07T14:58:58Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Internal Use Only */  removed stuff that has moved to real section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Internal Use Only ==&lt;br /&gt;
&lt;br /&gt;
Group members:&lt;br /&gt;
Nick Principe / naprinci@gmail.com / AIM: mahoubaka &amp;lt;br /&amp;gt;&lt;br /&gt;
Ken Ganong / kjganong@ncsu.edu / AIM: C4P0droid&lt;br /&gt;
&lt;br /&gt;
[http://www.spamlaws.com/articles/usf.pdf huge paper on this subject]&lt;br /&gt;
&lt;br /&gt;
== Spam Prevention Techniques ==&lt;br /&gt;
&lt;br /&gt;
=== Comparison of Techniques ===&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! Technique&lt;br /&gt;
! Pros&lt;br /&gt;
! Cons&lt;br /&gt;
! Authors' Rating&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Block_domains_of_.22known.22_spammers|Block domains of &amp;quot;known&amp;quot; spammers]]&lt;br /&gt;
|&lt;br /&gt;
*Can block a large amount of spam&lt;br /&gt;
*Low chance of blocking legitimate email&lt;br /&gt;
**Notification sent to blocked senders in some implementations&lt;br /&gt;
*Action to take on spam is user-definable&lt;br /&gt;
|&lt;br /&gt;
*Some spam still can still get through&lt;br /&gt;
*Might block individuals running their own mail server&lt;br /&gt;
*Requires processing at client/receiver-side for effective blocking&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Require_users_to_request_permission_to_send_mail|Require users to request permission to send you e-mail]]&lt;br /&gt;
|&lt;br /&gt;
*Blocks all spam&lt;br /&gt;
*Robots cannot easily send spam&lt;br /&gt;
*Hard to falsify identity&lt;br /&gt;
|&lt;br /&gt;
*Can introduce large delays in user &amp;quot;seeing&amp;quot; an email&lt;br /&gt;
*Impossible to implement correctly and universally at the client side&lt;br /&gt;
*Requires significant action on the part of the user to make exceptions&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Charge_for_email_sent|Charge for email sent]]&lt;br /&gt;
|&lt;br /&gt;
*Forces targeted selection of spam&lt;br /&gt;
|&lt;br /&gt;
*Changes the operational paradigm of email&lt;br /&gt;
*Lots of supporting infrastructure development necessary&lt;br /&gt;
*Might impact users more than spammers&lt;br /&gt;
*Where does the money go?&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Opt-in_for_commercial_email | Opt-in for commercial email]]&lt;br /&gt;
|&lt;br /&gt;
*Companies can send advertisements without sending spam&lt;br /&gt;
*Users can freely restrict the influx of mail from their many online affiliations&lt;br /&gt;
|&lt;br /&gt;
*Fraudulent emails have an opt-out link that sends you to an unwanted web page.&lt;br /&gt;
*Only stops unwanted spam from companies that abide by this rule.&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Domain_authentication | Domain authentication]]&lt;br /&gt;
|&lt;br /&gt;
*Very little spam gets through&lt;br /&gt;
*Makes phishing and other identity deceptions very hard&lt;br /&gt;
*Easier to track down spammers&lt;br /&gt;
|&lt;br /&gt;
*Current approaches can break under certain common circumstances&lt;br /&gt;
*Requires infrastructure changes&lt;br /&gt;
*Multiple standards competing&lt;br /&gt;
*Could make it more difficult for individuals with their own mail server&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Bounties | Bounties]]&lt;br /&gt;
|&lt;br /&gt;
*Gets rid of big spammers with incentive&lt;br /&gt;
*Possible deterrent&lt;br /&gt;
|&lt;br /&gt;
*Costs government (tax-payers) money&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#The_.22Goodmail.22_approach | The &amp;quot;Goodmail&amp;quot; approach]]&lt;br /&gt;
|&lt;br /&gt;
*Accreditation of senders ensures legitimate senders&lt;br /&gt;
*Certification of mail ensures individual mail is legitimate&lt;br /&gt;
*Legitimate mail won't get caught up in spam/junk mail folders&lt;br /&gt;
*Accredited senders must maintain high standards&lt;br /&gt;
|&lt;br /&gt;
*ISP / email provider must support certified mail&lt;br /&gt;
*Depends on reliability and impartiality of one company&lt;br /&gt;
*Creates two classes of email&lt;br /&gt;
**Not in the spirit of the internet or email&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Bonds_with_escrow_agencies | Bonds with escrow agencies]]&lt;br /&gt;
|&lt;br /&gt;
* Whitelisted email accounts don't take out a bond&lt;br /&gt;
* Only spammers have to pay.&lt;br /&gt;
|&lt;br /&gt;
* Lots of infrastructure and processing behind 'micro-payments'&lt;br /&gt;
* Somebody has to pay for the escrow agency.&lt;br /&gt;
* Users can subvert the system by collecting even when not spam.&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Client-side_filtering | Client-side filtering]]&lt;br /&gt;
|pro&lt;br /&gt;
|&lt;br /&gt;
*Only as good as user or algorithms/heuristics at identifying spam&lt;br /&gt;
*Spam emails are stopped, they are simply not read.&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Technique Details ===&lt;br /&gt;
&lt;br /&gt;
====Block domains of &amp;quot;known&amp;quot; spammers====&lt;br /&gt;
This technique is often implemented by means of a DNS Blacklist (DNSBL) which is a frequently updated list containing IP addresses and ranges of known spammers, though similar systems exist to block domain names or URIs (uniform resource identifiers) associated with spam.&lt;br /&gt;
&lt;br /&gt;
This approach has an advantage over most client-side filtering schemes, since it is better able to block spam that the particular client has never seen before since it is a shared and universal list. Depending on implementation, the DNSBL system could be implemented as a form of client-side filtering. However, it is most efficient if the DNSBL filtering system is implemented at a higher level, such as at the ISP or business. Another advantage of this system is that the action taken when a message is identified as spam is defined by the individual users of the DNSBL system – they can still deliver the message, flag it as spam, or bounce it entirely.&lt;br /&gt;
&lt;br /&gt;
There is the possibility that a DNSBL system could block legitimate email – the likelihood and method of handling this possibility are dependent on the specific implementation. The Spamhaus system sends a message back to each sender of a blocked message indicating why it was bounced to prevent legitimate email from “disappearing” without a trace – however, this approach increases mail and network traffic. A DNSBL system can also make it hard for individuals to set up their own mail servers at home, since residential IPs are blocked in some systems. Also, with minimal processing of incoming messages the percentage of spam blocked is relatively low – for the Spamhaus system, only 15-25%. To get over 90% spam blockage, the headers and body of each message must be analyzed.&lt;br /&gt;
&lt;br /&gt;
=====Links=====&lt;br /&gt;
*[http://en.wikipedia.org/wiki/DNSBL Wikipedia DNSBL entry]&lt;br /&gt;
*[http://www.spamhaus.org/faq/answers.lasso?section=Spamhaus%20SBL Spamhaus SBL FAQ]&lt;br /&gt;
*[http://www.spamhaus.org/faq/answers.lasso?section=DNSBL%20Technical Spamhaus DNSBL Technical FAQ]&lt;br /&gt;
&lt;br /&gt;
====Require users to request permission to send you mail====&lt;br /&gt;
This draconian spam prevention technique, most commonly seen through the use of the Earthlink spamBlocker, delivers only messages from the user’s address book to their inbox – all other mail is put in a separate folder and the sender is sent a reply with information on requesting the user allow them to send the user email.&lt;br /&gt;
&lt;br /&gt;
This technique doesn’t let spam through to the user’s inbox, which is a major advantage. Also, this approach makes it hard or impossible for the sender’s identity to be falsified. When allowing the sender to request the intended recipient to allow their mail through, anti-robot measures prevent the automation and abuse of this system.&lt;br /&gt;
&lt;br /&gt;
There are major disadvantages to this approach. Whenever receiving email from a new person or website, the user must manually add permission to receive from the new sender. Desired or important emails could sit idle for long periods of time in the “Suspect Email” folder before the user reads them. Also, sending a reply to the sender with instructions to request permission from the user to send them mail can cause frustration: first, it is an additional step for the sender, and second, the sender might not check their email again after sending the original message, which introduces further delays.&lt;br /&gt;
&lt;br /&gt;
=====Links=====&lt;br /&gt;
*[http://www.earthlink.net/software/free/spamblocker/ Earthlink spamBlocker]&lt;br /&gt;
&lt;br /&gt;
==== Charge for email sent ====&lt;br /&gt;
This technique strives to make email more like postal mail, shifting the burden of cost from the recipients to the senders. The goal being reduced spam due to the new costs associated with sending email – requiring more targeted marketing/spamming to be cost-effective. The costs involved could either be monetary – e-postage  – or temporal – “hashcash”: requiring a complex computation for each sent email, making sending email very slow if there are many recipients.&lt;br /&gt;
&lt;br /&gt;
The advantage to this technique, if it worked properly, would be reduced spam because spammers would be forced to have a more targeted selection of recipients.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, there are many problems in implementing a system to handle this. Vast amounts of banking infrastructure would need to be established to support an e-postage system, since many checks would have to be done to ensure against fraud. The decentralized mail infrastructure of the internet would have to become more centralized to force the usage and verification of e-postage as well. Using hashcash instead of e-postage would still require mechanisms and infrastructure to enforce the running of the hashcash algorithms. Also, most spammers have vast networks of computers, both legitimately and illegitimately, under their control, so they would have more capacity to solve hashcash problems than individual users.&lt;br /&gt;
&lt;br /&gt;
=====Links=====&lt;br /&gt;
*[http://www.taugh.com/epostage.pdf An Overview of E-Postage (currently down)]&lt;br /&gt;
*[http://216.239.51.104/search?q=cache:X1_Q1Qii3AkJ:www.taugh.com/epostage.pdf+epostage&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;cd=2&amp;amp;gl=us Google cache of above article]&lt;br /&gt;
*[http://fare.tunes.org/articles/stamps_vs_spam.html Stamps vs. Spam]&lt;br /&gt;
&lt;br /&gt;
==== Opt-in for commercial email ====&lt;br /&gt;
Commercial advertisements are often considered spam even when the user has had a previous relationship with the company sending the email.&lt;br /&gt;
In order for companies to send such advertisements without causing a lot of unwanted email, a simple opt-in or opt-out system should be&lt;br /&gt;
implemented by the company. If an opt-out link or instructions appear in an email, the result of a user following them is that that user&lt;br /&gt;
will no longer be sent similar advertisements. This much is required to be CAN-SPAM compliant. The preferred method, however, is an opt-in.&lt;br /&gt;
In this way, when a company and a user first achieve contact (usually by the user making a user account with the company), there is a method&lt;br /&gt;
for the user to configure which types of email advertisements he or she desires from the company.&lt;br /&gt;
&lt;br /&gt;
Such a system allows a user to decide and configure which companies and which types of advertisements they would like to receive email about&lt;br /&gt;
from each company for which they have an online affiliation. However, this requires the company to implement and abide by such a rule. Also,&lt;br /&gt;
since this system is so common, many fraudulent spam emails have opt-out options which are fake. By responding to such an opt-out option,&lt;br /&gt;
you actually submitting yourself to more spam because the sender knows that your e-mail account is active.&lt;br /&gt;
&lt;br /&gt;
===== Links =====&lt;br /&gt;
* [http://www.ftc.gov/bcp/conline/pubs/buspubs/canspam.shtm The CAN-SPAM Act]&lt;br /&gt;
&lt;br /&gt;
==== Domain authentication ====&lt;br /&gt;
Domain authentication ensures that the domain in a sender’s email is authentic and hasn’t been forged, making phishing and other fraudulent email harder to send. There are two major techniques for accomplishing domain authentication: Sender Policy Framework (SPF) and Domain Keys (DK). Both of these approaches use DNS to authenticate sender domains.&lt;br /&gt;
&lt;br /&gt;
Both approaches add support for domain authentication to the current mail framework in existence, enabling one to be sure that the email originated from the domain specified in the sender’s address. This would effectively filter out a lot of spam.&lt;br /&gt;
&lt;br /&gt;
One problem with both techniques is that they fail under certain conditions: SPF fails under some store-and-forward situations, and DK fails when the message is modified after signing. Also, these techniques do not eliminate the ability of spammers to use temporary domains to send spam – though mail will have to be addressed from that domain, possibly facilitating the tracking of spammers.&lt;br /&gt;
&lt;br /&gt;
=====Links=====&lt;br /&gt;
*[http://lwn.net/Articles/188685/ Domain Keys for email sender authentication]&lt;br /&gt;
*[http://lwn.net/Articles/187736/ SPF on vger]&lt;br /&gt;
*[http://e-com.ic.gc.ca/epic/site/ecic-ceac.nsf/en/gv00298e.html Anti-Spam Technology Overview: Emerging Technologies]&lt;br /&gt;
&lt;br /&gt;
==== Bounties ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== Links =====&lt;br /&gt;
*[http://www.msnbc.msn.com/id/5326107/%20 FTC's plans to institute bounties]&lt;br /&gt;
*[http://www.silicon.com/research/specialreports/thespamreport/0,39025001,39124098,00.htm Will bounties stop spammers?]&lt;br /&gt;
&lt;br /&gt;
==== The &amp;quot;Goodmail&amp;quot; approach ====&lt;br /&gt;
This technique provides for accreditation for legitimate senders, allowing their emails to bypass spam and volume mailing filters and folders and get delivered directly to the inbox of users on participating mail systems. The accreditation process costs money and sending the certified messages also costs money. The accreditation process is strict, and the policies for using the service exclude any unsolicited email.&lt;br /&gt;
&lt;br /&gt;
This approach does benefit users in that certified mail is known to be from a trustworthy source and emails from companies using the Goodmail service will not be put in a junk mail folder. This benefits the companies to the same degree, though, ensuring that their messages are delivered straight to the users’ inboxes. &lt;br /&gt;
&lt;br /&gt;
Much maligned when AOL first announced it would use the Goodmail service, it seems most of the criticism was reactionary – the qualifications required by and standards instituted by Goodmail, if they are actually as strict as they appear, mean that users either want the emails sent through this service or can opt-out of them – and they aren’t unsolicited. This service is provided by a for-profit entity, so it is similar to a pay-for-email scheme – it also seems to divide email into two classes which is arguably not in the spirit of the email system. Also, it does require the support of mail hosts and/or ISPs.&lt;br /&gt;
&lt;br /&gt;
===== Links =====&lt;br /&gt;
*[http://www.goodmailsystems.com/ Goodmail Systems Homepage]&lt;br /&gt;
*[http://www.usatoday.com/tech/news/computersecurity/2006-03-05-goodmail_x.htm USA Today Article on Goodmail]&lt;br /&gt;
&lt;br /&gt;
==== Bonds with escrow agencies ====&lt;br /&gt;
This spam fighting technique works based on whitelists, blacklists, graylists, and a third party (escrow agency) separate from the email sender or receiver.&lt;br /&gt;
A whitelisted sender simply sends email and it goes through without the escrow agency intercepting. A blacklisted sender cannot send email to the would-be receiver. The contents of the graylist is essentially everyone on neither of the other lists.&lt;br /&gt;
&lt;br /&gt;
A graylisted sender opens a bond for a small amount of money (one cent) with the escrow agency in order to send email. If the receiver blacklists the sender as a result of the email, the bond is collected and the sender is charged. Thus, only spammers have to pay for their email unlike the [[#Charge_for_email_sent | charge-for-email]] approach.&lt;br /&gt;
&lt;br /&gt;
The escrow agency, however, must be paid. One way of doing this is having the collected spammer money go to the escrow agency. There is a lot of processing for any type of internet payment, so the penny (or so) that is charged to the spammer may not be enough to cover the escrow agency's cost regarding. Also, non-profit groups would possibly often be blacklisted and therefore be forced to pay more than they can afford similar to the Goodmail approach. Since the email cost is mean to deter spammers, Users can subvert the system by blacklisting emails that aren't spam. For example, I could charge my professors for sending me email that they must send for class or users could charge ebay for requested notifications.&lt;br /&gt;
&lt;br /&gt;
===== Links =====&lt;br /&gt;
* [http://8stars.org/a/2003/03/13/more-on-fighting-spam/ Summary of escrow spam fighting]&lt;br /&gt;
&lt;br /&gt;
==== Client-side filtering ====&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_4&amp;diff=1507</id>
		<title>CSC 379:Week 1, Group 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_4&amp;diff=1507"/>
		<updated>2007-07-07T14:57:11Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* Comparison of Techniques */  Updated table for goodmail&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Internal Use Only ==&lt;br /&gt;
&lt;br /&gt;
Group members:&lt;br /&gt;
Nick Principe / naprinci@gmail.com / AIM: mahoubaka &amp;lt;br /&amp;gt;&lt;br /&gt;
Ken Ganong / kjganong@ncsu.edu / AIM: C4P0droid&lt;br /&gt;
&lt;br /&gt;
*domain authentication&lt;br /&gt;
**[http://e-com.ic.gc.ca/epic/site/ecic-ceac.nsf/en/gv00298e.html what canada has to say about it]&lt;br /&gt;
**[http://lwn.net/Articles/188685/ seemingly useful article with links to domain authentication related concepts]&lt;br /&gt;
*the &amp;quot;goodmail&amp;quot; approach&lt;br /&gt;
**[http://www.usatoday.com/tech/news/computersecurity/2006-03-05-goodmail_x.htm goodmail article]&lt;br /&gt;
**[http://www.goodmailsystems.com/ goodmail web page]&lt;br /&gt;
&lt;br /&gt;
*client-side filtering&lt;br /&gt;
&lt;br /&gt;
[http://www.spamlaws.com/articles/usf.pdf huge paper on this subject]&lt;br /&gt;
&lt;br /&gt;
== Spam Prevention Techniques ==&lt;br /&gt;
&lt;br /&gt;
=== Comparison of Techniques ===&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! Technique&lt;br /&gt;
! Pros&lt;br /&gt;
! Cons&lt;br /&gt;
! Authors' Rating&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Block_domains_of_.22known.22_spammers|Block domains of &amp;quot;known&amp;quot; spammers]]&lt;br /&gt;
|&lt;br /&gt;
*Can block a large amount of spam&lt;br /&gt;
*Low chance of blocking legitimate email&lt;br /&gt;
**Notification sent to blocked senders in some implementations&lt;br /&gt;
*Action to take on spam is user-definable&lt;br /&gt;
|&lt;br /&gt;
*Some spam still can still get through&lt;br /&gt;
*Might block individuals running their own mail server&lt;br /&gt;
*Requires processing at client/receiver-side for effective blocking&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Require_users_to_request_permission_to_send_mail|Require users to request permission to send you e-mail]]&lt;br /&gt;
|&lt;br /&gt;
*Blocks all spam&lt;br /&gt;
*Robots cannot easily send spam&lt;br /&gt;
*Hard to falsify identity&lt;br /&gt;
|&lt;br /&gt;
*Can introduce large delays in user &amp;quot;seeing&amp;quot; an email&lt;br /&gt;
*Impossible to implement correctly and universally at the client side&lt;br /&gt;
*Requires significant action on the part of the user to make exceptions&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Charge_for_email_sent|Charge for email sent]]&lt;br /&gt;
|&lt;br /&gt;
*Forces targeted selection of spam&lt;br /&gt;
|&lt;br /&gt;
*Changes the operational paradigm of email&lt;br /&gt;
*Lots of supporting infrastructure development necessary&lt;br /&gt;
*Might impact users more than spammers&lt;br /&gt;
*Where does the money go?&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Opt-in_for_commercial_email | Opt-in for commercial email]]&lt;br /&gt;
|&lt;br /&gt;
*Companies can send advertisements without sending spam&lt;br /&gt;
*Users can freely restrict the influx of mail from their many online affiliations&lt;br /&gt;
|&lt;br /&gt;
*Fraudulent emails have an opt-out link that sends you to an unwanted web page.&lt;br /&gt;
*Only stops unwanted spam from companies that abide by this rule.&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Domain_authentication | Domain authentication]]&lt;br /&gt;
|&lt;br /&gt;
*Very little spam gets through&lt;br /&gt;
*Makes phishing and other identity deceptions very hard&lt;br /&gt;
*Easier to track down spammers&lt;br /&gt;
|&lt;br /&gt;
*Current approaches can break under certain common circumstances&lt;br /&gt;
*Requires infrastructure changes&lt;br /&gt;
*Multiple standards competing&lt;br /&gt;
*Could make it more difficult for individuals with their own mail server&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Bounties | Bounties]]&lt;br /&gt;
|&lt;br /&gt;
*Gets rid of big spammers with incentive&lt;br /&gt;
*Possible deterrent&lt;br /&gt;
|&lt;br /&gt;
*Costs government (tax-payers) money&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#The_.22Goodmail.22_approach | The &amp;quot;Goodmail&amp;quot; approach]]&lt;br /&gt;
|&lt;br /&gt;
*Accreditation of senders ensures legitimate senders&lt;br /&gt;
*Certification of mail ensures individual mail is legitimate&lt;br /&gt;
*Legitimate mail won't get caught up in spam/junk mail folders&lt;br /&gt;
*Accredited senders must maintain high standards&lt;br /&gt;
|&lt;br /&gt;
*ISP / email provider must support certified mail&lt;br /&gt;
*Depends on reliability and impartiality of one company&lt;br /&gt;
*Creates two classes of email&lt;br /&gt;
**Not in the spirit of the internet or email&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Bonds_with_escrow_agencies | Bonds with escrow agencies]]&lt;br /&gt;
|&lt;br /&gt;
* Whitelisted email accounts don't take out a bond&lt;br /&gt;
* Only spammers have to pay.&lt;br /&gt;
|&lt;br /&gt;
* Lots of infrastructure and processing behind 'micro-payments'&lt;br /&gt;
* Somebody has to pay for the escrow agency.&lt;br /&gt;
* Users can subvert the system by collecting even when not spam.&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Client-side_filtering | Client-side filtering]]&lt;br /&gt;
|pro&lt;br /&gt;
|&lt;br /&gt;
*Only as good as user or algorithms/heuristics at identifying spam&lt;br /&gt;
*Spam emails are stopped, they are simply not read.&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Technique Details ===&lt;br /&gt;
&lt;br /&gt;
====Block domains of &amp;quot;known&amp;quot; spammers====&lt;br /&gt;
This technique is often implemented by means of a DNS Blacklist (DNSBL) which is a frequently updated list containing IP addresses and ranges of known spammers, though similar systems exist to block domain names or URIs (uniform resource identifiers) associated with spam.&lt;br /&gt;
&lt;br /&gt;
This approach has an advantage over most client-side filtering schemes, since it is better able to block spam that the particular client has never seen before since it is a shared and universal list. Depending on implementation, the DNSBL system could be implemented as a form of client-side filtering. However, it is most efficient if the DNSBL filtering system is implemented at a higher level, such as at the ISP or business. Another advantage of this system is that the action taken when a message is identified as spam is defined by the individual users of the DNSBL system – they can still deliver the message, flag it as spam, or bounce it entirely.&lt;br /&gt;
&lt;br /&gt;
There is the possibility that a DNSBL system could block legitimate email – the likelihood and method of handling this possibility are dependent on the specific implementation. The Spamhaus system sends a message back to each sender of a blocked message indicating why it was bounced to prevent legitimate email from “disappearing” without a trace – however, this approach increases mail and network traffic. A DNSBL system can also make it hard for individuals to set up their own mail servers at home, since residential IPs are blocked in some systems. Also, with minimal processing of incoming messages the percentage of spam blocked is relatively low – for the Spamhaus system, only 15-25%. To get over 90% spam blockage, the headers and body of each message must be analyzed.&lt;br /&gt;
&lt;br /&gt;
=====Links=====&lt;br /&gt;
*[http://en.wikipedia.org/wiki/DNSBL Wikipedia DNSBL entry]&lt;br /&gt;
*[http://www.spamhaus.org/faq/answers.lasso?section=Spamhaus%20SBL Spamhaus SBL FAQ]&lt;br /&gt;
*[http://www.spamhaus.org/faq/answers.lasso?section=DNSBL%20Technical Spamhaus DNSBL Technical FAQ]&lt;br /&gt;
&lt;br /&gt;
====Require users to request permission to send you mail====&lt;br /&gt;
This draconian spam prevention technique, most commonly seen through the use of the Earthlink spamBlocker, delivers only messages from the user’s address book to their inbox – all other mail is put in a separate folder and the sender is sent a reply with information on requesting the user allow them to send the user email.&lt;br /&gt;
&lt;br /&gt;
This technique doesn’t let spam through to the user’s inbox, which is a major advantage. Also, this approach makes it hard or impossible for the sender’s identity to be falsified. When allowing the sender to request the intended recipient to allow their mail through, anti-robot measures prevent the automation and abuse of this system.&lt;br /&gt;
&lt;br /&gt;
There are major disadvantages to this approach. Whenever receiving email from a new person or website, the user must manually add permission to receive from the new sender. Desired or important emails could sit idle for long periods of time in the “Suspect Email” folder before the user reads them. Also, sending a reply to the sender with instructions to request permission from the user to send them mail can cause frustration: first, it is an additional step for the sender, and second, the sender might not check their email again after sending the original message, which introduces further delays.&lt;br /&gt;
&lt;br /&gt;
=====Links=====&lt;br /&gt;
*[http://www.earthlink.net/software/free/spamblocker/ Earthlink spamBlocker]&lt;br /&gt;
&lt;br /&gt;
==== Charge for email sent ====&lt;br /&gt;
This technique strives to make email more like postal mail, shifting the burden of cost from the recipients to the senders. The goal being reduced spam due to the new costs associated with sending email – requiring more targeted marketing/spamming to be cost-effective. The costs involved could either be monetary – e-postage  – or temporal – “hashcash”: requiring a complex computation for each sent email, making sending email very slow if there are many recipients.&lt;br /&gt;
&lt;br /&gt;
The advantage to this technique, if it worked properly, would be reduced spam because spammers would be forced to have a more targeted selection of recipients.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, there are many problems in implementing a system to handle this. Vast amounts of banking infrastructure would need to be established to support an e-postage system, since many checks would have to be done to ensure against fraud. The decentralized mail infrastructure of the internet would have to become more centralized to force the usage and verification of e-postage as well. Using hashcash instead of e-postage would still require mechanisms and infrastructure to enforce the running of the hashcash algorithms. Also, most spammers have vast networks of computers, both legitimately and illegitimately, under their control, so they would have more capacity to solve hashcash problems than individual users.&lt;br /&gt;
&lt;br /&gt;
=====Links=====&lt;br /&gt;
*[http://www.taugh.com/epostage.pdf An Overview of E-Postage (currently down)]&lt;br /&gt;
*[http://216.239.51.104/search?q=cache:X1_Q1Qii3AkJ:www.taugh.com/epostage.pdf+epostage&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;cd=2&amp;amp;gl=us Google cache of above article]&lt;br /&gt;
*[http://fare.tunes.org/articles/stamps_vs_spam.html Stamps vs. Spam]&lt;br /&gt;
&lt;br /&gt;
==== Opt-in for commercial email ====&lt;br /&gt;
Commercial advertisements are often considered spam even when the user has had a previous relationship with the company sending the email.&lt;br /&gt;
In order for companies to send such advertisements without causing a lot of unwanted email, a simple opt-in or opt-out system should be&lt;br /&gt;
implemented by the company. If an opt-out link or instructions appear in an email, the result of a user following them is that that user&lt;br /&gt;
will no longer be sent similar advertisements. This much is required to be CAN-SPAM compliant. The preferred method, however, is an opt-in.&lt;br /&gt;
In this way, when a company and a user first achieve contact (usually by the user making a user account with the company), there is a method&lt;br /&gt;
for the user to configure which types of email advertisements he or she desires from the company.&lt;br /&gt;
&lt;br /&gt;
Such a system allows a user to decide and configure which companies and which types of advertisements they would like to receive email about&lt;br /&gt;
from each company for which they have an online affiliation. However, this requires the company to implement and abide by such a rule. Also,&lt;br /&gt;
since this system is so common, many fraudulent spam emails have opt-out options which are fake. By responding to such an opt-out option,&lt;br /&gt;
you actually submitting yourself to more spam because the sender knows that your e-mail account is active.&lt;br /&gt;
&lt;br /&gt;
===== Links =====&lt;br /&gt;
* [http://www.ftc.gov/bcp/conline/pubs/buspubs/canspam.shtm The CAN-SPAM Act]&lt;br /&gt;
&lt;br /&gt;
==== Domain authentication ====&lt;br /&gt;
Domain authentication ensures that the domain in a sender’s email is authentic and hasn’t been forged, making phishing and other fraudulent email harder to send. There are two major techniques for accomplishing domain authentication: Sender Policy Framework (SPF) and Domain Keys (DK). Both of these approaches use DNS to authenticate sender domains.&lt;br /&gt;
&lt;br /&gt;
Both approaches add support for domain authentication to the current mail framework in existence, enabling one to be sure that the email originated from the domain specified in the sender’s address. This would effectively filter out a lot of spam.&lt;br /&gt;
&lt;br /&gt;
One problem with both techniques is that they fail under certain conditions: SPF fails under some store-and-forward situations, and DK fails when the message is modified after signing. Also, these techniques do not eliminate the ability of spammers to use temporary domains to send spam – though mail will have to be addressed from that domain, possibly facilitating the tracking of spammers.&lt;br /&gt;
&lt;br /&gt;
=====Links=====&lt;br /&gt;
*[http://lwn.net/Articles/188685/ Domain Keys for email sender authentication]&lt;br /&gt;
*[http://lwn.net/Articles/187736/ SPF on vger]&lt;br /&gt;
*[http://e-com.ic.gc.ca/epic/site/ecic-ceac.nsf/en/gv00298e.html Anti-Spam Technology Overview: Emerging Technologies]&lt;br /&gt;
&lt;br /&gt;
==== Bounties ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== Links =====&lt;br /&gt;
*[http://www.msnbc.msn.com/id/5326107/%20 FTC's plans to institute bounties]&lt;br /&gt;
*[http://www.silicon.com/research/specialreports/thespamreport/0,39025001,39124098,00.htm Will bounties stop spammers?]&lt;br /&gt;
&lt;br /&gt;
==== The &amp;quot;Goodmail&amp;quot; approach ====&lt;br /&gt;
This technique provides for accreditation for legitimate senders, allowing their emails to bypass spam and volume mailing filters and folders and get delivered directly to the inbox of users on participating mail systems. The accreditation process costs money and sending the certified messages also costs money. The accreditation process is strict, and the policies for using the service exclude any unsolicited email.&lt;br /&gt;
&lt;br /&gt;
This approach does benefit users in that certified mail is known to be from a trustworthy source and emails from companies using the Goodmail service will not be put in a junk mail folder. This benefits the companies to the same degree, though, ensuring that their messages are delivered straight to the users’ inboxes. &lt;br /&gt;
&lt;br /&gt;
Much maligned when AOL first announced it would use the Goodmail service, it seems most of the criticism was reactionary – the qualifications required by and standards instituted by Goodmail, if they are actually as strict as they appear, mean that users either want the emails sent through this service or can opt-out of them – and they aren’t unsolicited. This service is provided by a for-profit entity, so it is similar to a pay-for-email scheme – it also seems to divide email into two classes which is arguably not in the spirit of the email system. Also, it does require the support of mail hosts and/or ISPs.&lt;br /&gt;
&lt;br /&gt;
===== Links =====&lt;br /&gt;
*[http://www.goodmailsystems.com/ Goodmail Systems Homepage]&lt;br /&gt;
*[http://www.usatoday.com/tech/news/computersecurity/2006-03-05-goodmail_x.htm USA Today Article on Goodmail]&lt;br /&gt;
&lt;br /&gt;
==== Bonds with escrow agencies ====&lt;br /&gt;
This spam fighting technique works based on whitelists, blacklists, graylists, and a third party (escrow agency) separate from the email sender or receiver.&lt;br /&gt;
A whitelisted sender simply sends email and it goes through without the escrow agency intercepting. A blacklisted sender cannot send email to the would-be receiver. The contents of the graylist is essentially everyone on neither of the other lists.&lt;br /&gt;
&lt;br /&gt;
A graylisted sender opens a bond for a small amount of money (one cent) with the escrow agency in order to send email. If the receiver blacklists the sender as a result of the email, the bond is collected and the sender is charged. Thus, only spammers have to pay for their email unlike the [[#Charge_for_email_sent | charge-for-email]] approach.&lt;br /&gt;
&lt;br /&gt;
The escrow agency, however, must be paid. One way of doing this is having the collected spammer money go to the escrow agency. There is a lot of processing for any type of internet payment, so the penny (or so) that is charged to the spammer may not be enough to cover the escrow agency's cost regarding. Also, non-profit groups would possibly often be blacklisted and therefore be forced to pay more than they can afford similar to the Goodmail approach. Since the email cost is mean to deter spammers, Users can subvert the system by blacklisting emails that aren't spam. For example, I could charge my professors for sending me email that they must send for class or users could charge ebay for requested notifications.&lt;br /&gt;
&lt;br /&gt;
===== Links =====&lt;br /&gt;
* [http://8stars.org/a/2003/03/13/more-on-fighting-spam/ Summary of escrow spam fighting]&lt;br /&gt;
&lt;br /&gt;
==== Client-side filtering ====&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_4&amp;diff=1506</id>
		<title>CSC 379:Week 1, Group 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_4&amp;diff=1506"/>
		<updated>2007-07-07T14:52:16Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* The &amp;quot;Goodmail&amp;quot; approach */  Added links section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Internal Use Only ==&lt;br /&gt;
&lt;br /&gt;
Group members:&lt;br /&gt;
Nick Principe / naprinci@gmail.com / AIM: mahoubaka &amp;lt;br /&amp;gt;&lt;br /&gt;
Ken Ganong / kjganong@ncsu.edu / AIM: C4P0droid&lt;br /&gt;
&lt;br /&gt;
*domain authentication&lt;br /&gt;
**[http://e-com.ic.gc.ca/epic/site/ecic-ceac.nsf/en/gv00298e.html what canada has to say about it]&lt;br /&gt;
**[http://lwn.net/Articles/188685/ seemingly useful article with links to domain authentication related concepts]&lt;br /&gt;
*the &amp;quot;goodmail&amp;quot; approach&lt;br /&gt;
**[http://www.usatoday.com/tech/news/computersecurity/2006-03-05-goodmail_x.htm goodmail article]&lt;br /&gt;
**[http://www.goodmailsystems.com/ goodmail web page]&lt;br /&gt;
&lt;br /&gt;
*client-side filtering&lt;br /&gt;
&lt;br /&gt;
[http://www.spamlaws.com/articles/usf.pdf huge paper on this subject]&lt;br /&gt;
&lt;br /&gt;
== Spam Prevention Techniques ==&lt;br /&gt;
&lt;br /&gt;
=== Comparison of Techniques ===&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! Technique&lt;br /&gt;
! Pros&lt;br /&gt;
! Cons&lt;br /&gt;
! Authors' Rating&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Block_domains_of_.22known.22_spammers|Block domains of &amp;quot;known&amp;quot; spammers]]&lt;br /&gt;
|&lt;br /&gt;
*Can block a large amount of spam&lt;br /&gt;
*Low chance of blocking legitimate email&lt;br /&gt;
**Notification sent to blocked senders in some implementations&lt;br /&gt;
*Action to take on spam is user-definable&lt;br /&gt;
|&lt;br /&gt;
*Some spam still can still get through&lt;br /&gt;
*Might block individuals running their own mail server&lt;br /&gt;
*Requires processing at client/receiver-side for effective blocking&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Require_users_to_request_permission_to_send_mail|Require users to request permission to send you e-mail]]&lt;br /&gt;
|&lt;br /&gt;
*Blocks all spam&lt;br /&gt;
*Robots cannot easily send spam&lt;br /&gt;
*Hard to falsify identity&lt;br /&gt;
|&lt;br /&gt;
*Can introduce large delays in user &amp;quot;seeing&amp;quot; an email&lt;br /&gt;
*Impossible to implement correctly and universally at the client side&lt;br /&gt;
*Requires significant action on the part of the user to make exceptions&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Charge_for_email_sent|Charge for email sent]]&lt;br /&gt;
|&lt;br /&gt;
*Forces targeted selection of spam&lt;br /&gt;
|&lt;br /&gt;
*Changes the operational paradigm of email&lt;br /&gt;
*Lots of supporting infrastructure development necessary&lt;br /&gt;
*Might impact users more than spammers&lt;br /&gt;
*Where does the money go?&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Opt-in_for_commercial_email | Opt-in for commercial email]]&lt;br /&gt;
|&lt;br /&gt;
*Companies can send advertisements without sending spam&lt;br /&gt;
*Users can freely restrict the influx of mail from their many online affiliations&lt;br /&gt;
|&lt;br /&gt;
*Fraudulent emails have an opt-out link that sends you to an unwanted web page.&lt;br /&gt;
*Only stops unwanted spam from companies that abide by this rule.&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Domain_authentication | Domain authentication]]&lt;br /&gt;
|&lt;br /&gt;
*Very little spam gets through&lt;br /&gt;
*Makes phishing and other identity deceptions very hard&lt;br /&gt;
*Easier to track down spammers&lt;br /&gt;
|&lt;br /&gt;
*Current approaches can break under certain common circumstances&lt;br /&gt;
*Requires infrastructure changes&lt;br /&gt;
*Multiple standards competing&lt;br /&gt;
*Could make it more difficult for individuals with their own mail server&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Bounties | Bounties]]&lt;br /&gt;
|&lt;br /&gt;
*Gets rid of big spammers with incentive&lt;br /&gt;
*Possible deterrent&lt;br /&gt;
|&lt;br /&gt;
*Costs government (tax-payers) money&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#The_.22Goodmail.22_approach | The &amp;quot;Goodmail&amp;quot; approach]]&lt;br /&gt;
|&lt;br /&gt;
*Mass emails cost money so mass spammers don't work&lt;br /&gt;
|&lt;br /&gt;
*Companies can bypass the spam filter by paying money&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Bonds_with_escrow_agencies | Bonds with escrow agencies]]&lt;br /&gt;
|&lt;br /&gt;
* Whitelisted email accounts don't take out a bond&lt;br /&gt;
* Only spammers have to pay.&lt;br /&gt;
|&lt;br /&gt;
* Lots of infrastructure and processing behind 'micro-payments'&lt;br /&gt;
* Somebody has to pay for the escrow agency.&lt;br /&gt;
* Users can subvert the system by collecting even when not spam.&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Client-side_filtering | Client-side filtering]]&lt;br /&gt;
|pro&lt;br /&gt;
|&lt;br /&gt;
*Only as good as user or algorithms/heuristics at identifying spam&lt;br /&gt;
*Spam emails are stopped, they are simply not read.&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Technique Details ===&lt;br /&gt;
&lt;br /&gt;
====Block domains of &amp;quot;known&amp;quot; spammers====&lt;br /&gt;
This technique is often implemented by means of a DNS Blacklist (DNSBL) which is a frequently updated list containing IP addresses and ranges of known spammers, though similar systems exist to block domain names or URIs (uniform resource identifiers) associated with spam.&lt;br /&gt;
&lt;br /&gt;
This approach has an advantage over most client-side filtering schemes, since it is better able to block spam that the particular client has never seen before since it is a shared and universal list. Depending on implementation, the DNSBL system could be implemented as a form of client-side filtering. However, it is most efficient if the DNSBL filtering system is implemented at a higher level, such as at the ISP or business. Another advantage of this system is that the action taken when a message is identified as spam is defined by the individual users of the DNSBL system – they can still deliver the message, flag it as spam, or bounce it entirely.&lt;br /&gt;
&lt;br /&gt;
There is the possibility that a DNSBL system could block legitimate email – the likelihood and method of handling this possibility are dependent on the specific implementation. The Spamhaus system sends a message back to each sender of a blocked message indicating why it was bounced to prevent legitimate email from “disappearing” without a trace – however, this approach increases mail and network traffic. A DNSBL system can also make it hard for individuals to set up their own mail servers at home, since residential IPs are blocked in some systems. Also, with minimal processing of incoming messages the percentage of spam blocked is relatively low – for the Spamhaus system, only 15-25%. To get over 90% spam blockage, the headers and body of each message must be analyzed.&lt;br /&gt;
&lt;br /&gt;
=====Links=====&lt;br /&gt;
*[http://en.wikipedia.org/wiki/DNSBL Wikipedia DNSBL entry]&lt;br /&gt;
*[http://www.spamhaus.org/faq/answers.lasso?section=Spamhaus%20SBL Spamhaus SBL FAQ]&lt;br /&gt;
*[http://www.spamhaus.org/faq/answers.lasso?section=DNSBL%20Technical Spamhaus DNSBL Technical FAQ]&lt;br /&gt;
&lt;br /&gt;
====Require users to request permission to send you mail====&lt;br /&gt;
This draconian spam prevention technique, most commonly seen through the use of the Earthlink spamBlocker, delivers only messages from the user’s address book to their inbox – all other mail is put in a separate folder and the sender is sent a reply with information on requesting the user allow them to send the user email.&lt;br /&gt;
&lt;br /&gt;
This technique doesn’t let spam through to the user’s inbox, which is a major advantage. Also, this approach makes it hard or impossible for the sender’s identity to be falsified. When allowing the sender to request the intended recipient to allow their mail through, anti-robot measures prevent the automation and abuse of this system.&lt;br /&gt;
&lt;br /&gt;
There are major disadvantages to this approach. Whenever receiving email from a new person or website, the user must manually add permission to receive from the new sender. Desired or important emails could sit idle for long periods of time in the “Suspect Email” folder before the user reads them. Also, sending a reply to the sender with instructions to request permission from the user to send them mail can cause frustration: first, it is an additional step for the sender, and second, the sender might not check their email again after sending the original message, which introduces further delays.&lt;br /&gt;
&lt;br /&gt;
=====Links=====&lt;br /&gt;
*[http://www.earthlink.net/software/free/spamblocker/ Earthlink spamBlocker]&lt;br /&gt;
&lt;br /&gt;
==== Charge for email sent ====&lt;br /&gt;
This technique strives to make email more like postal mail, shifting the burden of cost from the recipients to the senders. The goal being reduced spam due to the new costs associated with sending email – requiring more targeted marketing/spamming to be cost-effective. The costs involved could either be monetary – e-postage  – or temporal – “hashcash”: requiring a complex computation for each sent email, making sending email very slow if there are many recipients.&lt;br /&gt;
&lt;br /&gt;
The advantage to this technique, if it worked properly, would be reduced spam because spammers would be forced to have a more targeted selection of recipients.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, there are many problems in implementing a system to handle this. Vast amounts of banking infrastructure would need to be established to support an e-postage system, since many checks would have to be done to ensure against fraud. The decentralized mail infrastructure of the internet would have to become more centralized to force the usage and verification of e-postage as well. Using hashcash instead of e-postage would still require mechanisms and infrastructure to enforce the running of the hashcash algorithms. Also, most spammers have vast networks of computers, both legitimately and illegitimately, under their control, so they would have more capacity to solve hashcash problems than individual users.&lt;br /&gt;
&lt;br /&gt;
=====Links=====&lt;br /&gt;
*[http://www.taugh.com/epostage.pdf An Overview of E-Postage (currently down)]&lt;br /&gt;
*[http://216.239.51.104/search?q=cache:X1_Q1Qii3AkJ:www.taugh.com/epostage.pdf+epostage&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;cd=2&amp;amp;gl=us Google cache of above article]&lt;br /&gt;
*[http://fare.tunes.org/articles/stamps_vs_spam.html Stamps vs. Spam]&lt;br /&gt;
&lt;br /&gt;
==== Opt-in for commercial email ====&lt;br /&gt;
Commercial advertisements are often considered spam even when the user has had a previous relationship with the company sending the email.&lt;br /&gt;
In order for companies to send such advertisements without causing a lot of unwanted email, a simple opt-in or opt-out system should be&lt;br /&gt;
implemented by the company. If an opt-out link or instructions appear in an email, the result of a user following them is that that user&lt;br /&gt;
will no longer be sent similar advertisements. This much is required to be CAN-SPAM compliant. The preferred method, however, is an opt-in.&lt;br /&gt;
In this way, when a company and a user first achieve contact (usually by the user making a user account with the company), there is a method&lt;br /&gt;
for the user to configure which types of email advertisements he or she desires from the company.&lt;br /&gt;
&lt;br /&gt;
Such a system allows a user to decide and configure which companies and which types of advertisements they would like to receive email about&lt;br /&gt;
from each company for which they have an online affiliation. However, this requires the company to implement and abide by such a rule. Also,&lt;br /&gt;
since this system is so common, many fraudulent spam emails have opt-out options which are fake. By responding to such an opt-out option,&lt;br /&gt;
you actually submitting yourself to more spam because the sender knows that your e-mail account is active.&lt;br /&gt;
&lt;br /&gt;
===== Links =====&lt;br /&gt;
* [http://www.ftc.gov/bcp/conline/pubs/buspubs/canspam.shtm The CAN-SPAM Act]&lt;br /&gt;
&lt;br /&gt;
==== Domain authentication ====&lt;br /&gt;
Domain authentication ensures that the domain in a sender’s email is authentic and hasn’t been forged, making phishing and other fraudulent email harder to send. There are two major techniques for accomplishing domain authentication: Sender Policy Framework (SPF) and Domain Keys (DK). Both of these approaches use DNS to authenticate sender domains.&lt;br /&gt;
&lt;br /&gt;
Both approaches add support for domain authentication to the current mail framework in existence, enabling one to be sure that the email originated from the domain specified in the sender’s address. This would effectively filter out a lot of spam.&lt;br /&gt;
&lt;br /&gt;
One problem with both techniques is that they fail under certain conditions: SPF fails under some store-and-forward situations, and DK fails when the message is modified after signing. Also, these techniques do not eliminate the ability of spammers to use temporary domains to send spam – though mail will have to be addressed from that domain, possibly facilitating the tracking of spammers.&lt;br /&gt;
&lt;br /&gt;
=====Links=====&lt;br /&gt;
*[http://lwn.net/Articles/188685/ Domain Keys for email sender authentication]&lt;br /&gt;
*[http://lwn.net/Articles/187736/ SPF on vger]&lt;br /&gt;
*[http://e-com.ic.gc.ca/epic/site/ecic-ceac.nsf/en/gv00298e.html Anti-Spam Technology Overview: Emerging Technologies]&lt;br /&gt;
&lt;br /&gt;
==== Bounties ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== Links =====&lt;br /&gt;
*[http://www.msnbc.msn.com/id/5326107/%20 FTC's plans to institute bounties]&lt;br /&gt;
*[http://www.silicon.com/research/specialreports/thespamreport/0,39025001,39124098,00.htm Will bounties stop spammers?]&lt;br /&gt;
&lt;br /&gt;
==== The &amp;quot;Goodmail&amp;quot; approach ====&lt;br /&gt;
This technique provides for accreditation for legitimate senders, allowing their emails to bypass spam and volume mailing filters and folders and get delivered directly to the inbox of users on participating mail systems. The accreditation process costs money and sending the certified messages also costs money. The accreditation process is strict, and the policies for using the service exclude any unsolicited email.&lt;br /&gt;
&lt;br /&gt;
This approach does benefit users in that certified mail is known to be from a trustworthy source and emails from companies using the Goodmail service will not be put in a junk mail folder. This benefits the companies to the same degree, though, ensuring that their messages are delivered straight to the users’ inboxes. &lt;br /&gt;
&lt;br /&gt;
Much maligned when AOL first announced it would use the Goodmail service, it seems most of the criticism was reactionary – the qualifications required by and standards instituted by Goodmail, if they are actually as strict as they appear, mean that users either want the emails sent through this service or can opt-out of them – and they aren’t unsolicited. This service is provided by a for-profit entity, so it is similar to a pay-for-email scheme – it also seems to divide email into two classes which is arguably not in the spirit of the email system. Also, it does require the support of mail hosts and/or ISPs.&lt;br /&gt;
&lt;br /&gt;
===== Links =====&lt;br /&gt;
*[http://www.goodmailsystems.com/ Goodmail Systems Homepage]&lt;br /&gt;
*[http://www.usatoday.com/tech/news/computersecurity/2006-03-05-goodmail_x.htm USA Today Article on Goodmail]&lt;br /&gt;
&lt;br /&gt;
==== Bonds with escrow agencies ====&lt;br /&gt;
This spam fighting technique works based on whitelists, blacklists, graylists, and a third party (escrow agency) separate from the email sender or receiver.&lt;br /&gt;
A whitelisted sender simply sends email and it goes through without the escrow agency intercepting. A blacklisted sender cannot send email to the would-be receiver. The contents of the graylist is essentially everyone on neither of the other lists.&lt;br /&gt;
&lt;br /&gt;
A graylisted sender opens a bond for a small amount of money (one cent) with the escrow agency in order to send email. If the receiver blacklists the sender as a result of the email, the bond is collected and the sender is charged. Thus, only spammers have to pay for their email unlike the [[#Charge_for_email_sent | charge-for-email]] approach.&lt;br /&gt;
&lt;br /&gt;
The escrow agency, however, must be paid. One way of doing this is having the collected spammer money go to the escrow agency. There is a lot of processing for any type of internet payment, so the penny (or so) that is charged to the spammer may not be enough to cover the escrow agency's cost regarding. Also, non-profit groups would possibly often be blacklisted and therefore be forced to pay more than they can afford similar to the Goodmail approach. Since the email cost is mean to deter spammers, Users can subvert the system by blacklisting emails that aren't spam. For example, I could charge my professors for sending me email that they must send for class or users could charge ebay for requested notifications.&lt;br /&gt;
&lt;br /&gt;
===== Links =====&lt;br /&gt;
* [http://8stars.org/a/2003/03/13/more-on-fighting-spam/ Summary of escrow spam fighting]&lt;br /&gt;
&lt;br /&gt;
==== Client-side filtering ====&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_4&amp;diff=1505</id>
		<title>CSC 379:Week 1, Group 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_1,_Group_4&amp;diff=1505"/>
		<updated>2007-07-07T14:51:14Z</updated>

		<summary type="html">&lt;p&gt;Naprinci: /* The &amp;quot;Goodmail&amp;quot; approach */  Added text for goodmail section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Internal Use Only ==&lt;br /&gt;
&lt;br /&gt;
Group members:&lt;br /&gt;
Nick Principe / naprinci@gmail.com / AIM: mahoubaka &amp;lt;br /&amp;gt;&lt;br /&gt;
Ken Ganong / kjganong@ncsu.edu / AIM: C4P0droid&lt;br /&gt;
&lt;br /&gt;
*domain authentication&lt;br /&gt;
**[http://e-com.ic.gc.ca/epic/site/ecic-ceac.nsf/en/gv00298e.html what canada has to say about it]&lt;br /&gt;
**[http://lwn.net/Articles/188685/ seemingly useful article with links to domain authentication related concepts]&lt;br /&gt;
*the &amp;quot;goodmail&amp;quot; approach&lt;br /&gt;
**[http://www.usatoday.com/tech/news/computersecurity/2006-03-05-goodmail_x.htm goodmail article]&lt;br /&gt;
**[http://www.goodmailsystems.com/ goodmail web page]&lt;br /&gt;
&lt;br /&gt;
*client-side filtering&lt;br /&gt;
&lt;br /&gt;
[http://www.spamlaws.com/articles/usf.pdf huge paper on this subject]&lt;br /&gt;
&lt;br /&gt;
== Spam Prevention Techniques ==&lt;br /&gt;
&lt;br /&gt;
=== Comparison of Techniques ===&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! Technique&lt;br /&gt;
! Pros&lt;br /&gt;
! Cons&lt;br /&gt;
! Authors' Rating&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Block_domains_of_.22known.22_spammers|Block domains of &amp;quot;known&amp;quot; spammers]]&lt;br /&gt;
|&lt;br /&gt;
*Can block a large amount of spam&lt;br /&gt;
*Low chance of blocking legitimate email&lt;br /&gt;
**Notification sent to blocked senders in some implementations&lt;br /&gt;
*Action to take on spam is user-definable&lt;br /&gt;
|&lt;br /&gt;
*Some spam still can still get through&lt;br /&gt;
*Might block individuals running their own mail server&lt;br /&gt;
*Requires processing at client/receiver-side for effective blocking&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Require_users_to_request_permission_to_send_mail|Require users to request permission to send you e-mail]]&lt;br /&gt;
|&lt;br /&gt;
*Blocks all spam&lt;br /&gt;
*Robots cannot easily send spam&lt;br /&gt;
*Hard to falsify identity&lt;br /&gt;
|&lt;br /&gt;
*Can introduce large delays in user &amp;quot;seeing&amp;quot; an email&lt;br /&gt;
*Impossible to implement correctly and universally at the client side&lt;br /&gt;
*Requires significant action on the part of the user to make exceptions&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Charge_for_email_sent|Charge for email sent]]&lt;br /&gt;
|&lt;br /&gt;
*Forces targeted selection of spam&lt;br /&gt;
|&lt;br /&gt;
*Changes the operational paradigm of email&lt;br /&gt;
*Lots of supporting infrastructure development necessary&lt;br /&gt;
*Might impact users more than spammers&lt;br /&gt;
*Where does the money go?&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Opt-in_for_commercial_email | Opt-in for commercial email]]&lt;br /&gt;
|&lt;br /&gt;
*Companies can send advertisements without sending spam&lt;br /&gt;
*Users can freely restrict the influx of mail from their many online affiliations&lt;br /&gt;
|&lt;br /&gt;
*Fraudulent emails have an opt-out link that sends you to an unwanted web page.&lt;br /&gt;
*Only stops unwanted spam from companies that abide by this rule.&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Domain_authentication | Domain authentication]]&lt;br /&gt;
|&lt;br /&gt;
*Very little spam gets through&lt;br /&gt;
*Makes phishing and other identity deceptions very hard&lt;br /&gt;
*Easier to track down spammers&lt;br /&gt;
|&lt;br /&gt;
*Current approaches can break under certain common circumstances&lt;br /&gt;
*Requires infrastructure changes&lt;br /&gt;
*Multiple standards competing&lt;br /&gt;
*Could make it more difficult for individuals with their own mail server&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Bounties | Bounties]]&lt;br /&gt;
|&lt;br /&gt;
*Gets rid of big spammers with incentive&lt;br /&gt;
*Possible deterrent&lt;br /&gt;
|&lt;br /&gt;
*Costs government (tax-payers) money&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#The_.22Goodmail.22_approach | The &amp;quot;Goodmail&amp;quot; approach]]&lt;br /&gt;
|&lt;br /&gt;
*Mass emails cost money so mass spammers don't work&lt;br /&gt;
|&lt;br /&gt;
*Companies can bypass the spam filter by paying money&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Bonds_with_escrow_agencies | Bonds with escrow agencies]]&lt;br /&gt;
|&lt;br /&gt;
* Whitelisted email accounts don't take out a bond&lt;br /&gt;
* Only spammers have to pay.&lt;br /&gt;
|&lt;br /&gt;
* Lots of infrastructure and processing behind 'micro-payments'&lt;br /&gt;
* Somebody has to pay for the escrow agency.&lt;br /&gt;
* Users can subvert the system by collecting even when not spam.&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
|[[#Client-side_filtering | Client-side filtering]]&lt;br /&gt;
|pro&lt;br /&gt;
|&lt;br /&gt;
*Only as good as user or algorithms/heuristics at identifying spam&lt;br /&gt;
*Spam emails are stopped, they are simply not read.&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;border:1px solid white&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px |&amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#00ff00;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
| style=&amp;quot;background:#cccccc;border:1px solid white&amp;quot; width=2px | &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Technique Details ===&lt;br /&gt;
&lt;br /&gt;
====Block domains of &amp;quot;known&amp;quot; spammers====&lt;br /&gt;
This technique is often implemented by means of a DNS Blacklist (DNSBL) which is a frequently updated list containing IP addresses and ranges of known spammers, though similar systems exist to block domain names or URIs (uniform resource identifiers) associated with spam.&lt;br /&gt;
&lt;br /&gt;
This approach has an advantage over most client-side filtering schemes, since it is better able to block spam that the particular client has never seen before since it is a shared and universal list. Depending on implementation, the DNSBL system could be implemented as a form of client-side filtering. However, it is most efficient if the DNSBL filtering system is implemented at a higher level, such as at the ISP or business. Another advantage of this system is that the action taken when a message is identified as spam is defined by the individual users of the DNSBL system – they can still deliver the message, flag it as spam, or bounce it entirely.&lt;br /&gt;
&lt;br /&gt;
There is the possibility that a DNSBL system could block legitimate email – the likelihood and method of handling this possibility are dependent on the specific implementation. The Spamhaus system sends a message back to each sender of a blocked message indicating why it was bounced to prevent legitimate email from “disappearing” without a trace – however, this approach increases mail and network traffic. A DNSBL system can also make it hard for individuals to set up their own mail servers at home, since residential IPs are blocked in some systems. Also, with minimal processing of incoming messages the percentage of spam blocked is relatively low – for the Spamhaus system, only 15-25%. To get over 90% spam blockage, the headers and body of each message must be analyzed.&lt;br /&gt;
&lt;br /&gt;
=====Links=====&lt;br /&gt;
*[http://en.wikipedia.org/wiki/DNSBL Wikipedia DNSBL entry]&lt;br /&gt;
*[http://www.spamhaus.org/faq/answers.lasso?section=Spamhaus%20SBL Spamhaus SBL FAQ]&lt;br /&gt;
*[http://www.spamhaus.org/faq/answers.lasso?section=DNSBL%20Technical Spamhaus DNSBL Technical FAQ]&lt;br /&gt;
&lt;br /&gt;
====Require users to request permission to send you mail====&lt;br /&gt;
This draconian spam prevention technique, most commonly seen through the use of the Earthlink spamBlocker, delivers only messages from the user’s address book to their inbox – all other mail is put in a separate folder and the sender is sent a reply with information on requesting the user allow them to send the user email.&lt;br /&gt;
&lt;br /&gt;
This technique doesn’t let spam through to the user’s inbox, which is a major advantage. Also, this approach makes it hard or impossible for the sender’s identity to be falsified. When allowing the sender to request the intended recipient to allow their mail through, anti-robot measures prevent the automation and abuse of this system.&lt;br /&gt;
&lt;br /&gt;
There are major disadvantages to this approach. Whenever receiving email from a new person or website, the user must manually add permission to receive from the new sender. Desired or important emails could sit idle for long periods of time in the “Suspect Email” folder before the user reads them. Also, sending a reply to the sender with instructions to request permission from the user to send them mail can cause frustration: first, it is an additional step for the sender, and second, the sender might not check their email again after sending the original message, which introduces further delays.&lt;br /&gt;
&lt;br /&gt;
=====Links=====&lt;br /&gt;
*[http://www.earthlink.net/software/free/spamblocker/ Earthlink spamBlocker]&lt;br /&gt;
&lt;br /&gt;
==== Charge for email sent ====&lt;br /&gt;
This technique strives to make email more like postal mail, shifting the burden of cost from the recipients to the senders. The goal being reduced spam due to the new costs associated with sending email – requiring more targeted marketing/spamming to be cost-effective. The costs involved could either be monetary – e-postage  – or temporal – “hashcash”: requiring a complex computation for each sent email, making sending email very slow if there are many recipients.&lt;br /&gt;
&lt;br /&gt;
The advantage to this technique, if it worked properly, would be reduced spam because spammers would be forced to have a more targeted selection of recipients.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, there are many problems in implementing a system to handle this. Vast amounts of banking infrastructure would need to be established to support an e-postage system, since many checks would have to be done to ensure against fraud. The decentralized mail infrastructure of the internet would have to become more centralized to force the usage and verification of e-postage as well. Using hashcash instead of e-postage would still require mechanisms and infrastructure to enforce the running of the hashcash algorithms. Also, most spammers have vast networks of computers, both legitimately and illegitimately, under their control, so they would have more capacity to solve hashcash problems than individual users.&lt;br /&gt;
&lt;br /&gt;
=====Links=====&lt;br /&gt;
*[http://www.taugh.com/epostage.pdf An Overview of E-Postage (currently down)]&lt;br /&gt;
*[http://216.239.51.104/search?q=cache:X1_Q1Qii3AkJ:www.taugh.com/epostage.pdf+epostage&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;cd=2&amp;amp;gl=us Google cache of above article]&lt;br /&gt;
*[http://fare.tunes.org/articles/stamps_vs_spam.html Stamps vs. Spam]&lt;br /&gt;
&lt;br /&gt;
==== Opt-in for commercial email ====&lt;br /&gt;
Commercial advertisements are often considered spam even when the user has had a previous relationship with the company sending the email.&lt;br /&gt;
In order for companies to send such advertisements without causing a lot of unwanted email, a simple opt-in or opt-out system should be&lt;br /&gt;
implemented by the company. If an opt-out link or instructions appear in an email, the result of a user following them is that that user&lt;br /&gt;
will no longer be sent similar advertisements. This much is required to be CAN-SPAM compliant. The preferred method, however, is an opt-in.&lt;br /&gt;
In this way, when a company and a user first achieve contact (usually by the user making a user account with the company), there is a method&lt;br /&gt;
for the user to configure which types of email advertisements he or she desires from the company.&lt;br /&gt;
&lt;br /&gt;
Such a system allows a user to decide and configure which companies and which types of advertisements they would like to receive email about&lt;br /&gt;
from each company for which they have an online affiliation. However, this requires the company to implement and abide by such a rule. Also,&lt;br /&gt;
since this system is so common, many fraudulent spam emails have opt-out options which are fake. By responding to such an opt-out option,&lt;br /&gt;
you actually submitting yourself to more spam because the sender knows that your e-mail account is active.&lt;br /&gt;
&lt;br /&gt;
===== Links =====&lt;br /&gt;
* [http://www.ftc.gov/bcp/conline/pubs/buspubs/canspam.shtm The CAN-SPAM Act]&lt;br /&gt;
&lt;br /&gt;
==== Domain authentication ====&lt;br /&gt;
Domain authentication ensures that the domain in a sender’s email is authentic and hasn’t been forged, making phishing and other fraudulent email harder to send. There are two major techniques for accomplishing domain authentication: Sender Policy Framework (SPF) and Domain Keys (DK). Both of these approaches use DNS to authenticate sender domains.&lt;br /&gt;
&lt;br /&gt;
Both approaches add support for domain authentication to the current mail framework in existence, enabling one to be sure that the email originated from the domain specified in the sender’s address. This would effectively filter out a lot of spam.&lt;br /&gt;
&lt;br /&gt;
One problem with both techniques is that they fail under certain conditions: SPF fails under some store-and-forward situations, and DK fails when the message is modified after signing. Also, these techniques do not eliminate the ability of spammers to use temporary domains to send spam – though mail will have to be addressed from that domain, possibly facilitating the tracking of spammers.&lt;br /&gt;
&lt;br /&gt;
=====Links=====&lt;br /&gt;
*[http://lwn.net/Articles/188685/ Domain Keys for email sender authentication]&lt;br /&gt;
*[http://lwn.net/Articles/187736/ SPF on vger]&lt;br /&gt;
*[http://e-com.ic.gc.ca/epic/site/ecic-ceac.nsf/en/gv00298e.html Anti-Spam Technology Overview: Emerging Technologies]&lt;br /&gt;
&lt;br /&gt;
==== Bounties ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== Links =====&lt;br /&gt;
*[http://www.msnbc.msn.com/id/5326107/%20 FTC's plans to institute bounties]&lt;br /&gt;
*[http://www.silicon.com/research/specialreports/thespamreport/0,39025001,39124098,00.htm Will bounties stop spammers?]&lt;br /&gt;
&lt;br /&gt;
==== The &amp;quot;Goodmail&amp;quot; approach ====&lt;br /&gt;
This technique provides for accreditation for legitimate senders, allowing their emails to bypass spam and volume mailing filters and folders and get delivered directly to the inbox of users on participating mail systems. The accreditation process costs money and sending the certified messages also costs money. The accreditation process is strict, and the policies for using the service exclude any unsolicited email.&lt;br /&gt;
&lt;br /&gt;
This approach does benefit users in that certified mail is known to be from a trustworthy source and emails from companies using the Goodmail service will not be put in a junk mail folder. This benefits the companies to the same degree, though, ensuring that their messages are delivered straight to the users’ inboxes. &lt;br /&gt;
&lt;br /&gt;
Much maligned when AOL first announced it would use the Goodmail service, it seems most of the criticism was reactionary – the qualifications required by and standards instituted by Goodmail, if they are actually as strict as they appear, mean that users either want the emails sent through this service or can opt-out of them – and they aren’t unsolicited. This service is provided by a for-profit entity, so it is similar to a pay-for-email scheme – it also seems to divide email into two classes which is arguably not in the spirit of the email system. Also, it does require the support of mail hosts and/or ISPs.&lt;br /&gt;
&lt;br /&gt;
==== Bonds with escrow agencies ====&lt;br /&gt;
This spam fighting technique works based on whitelists, blacklists, graylists, and a third party (escrow agency) separate from the email sender or receiver.&lt;br /&gt;
A whitelisted sender simply sends email and it goes through without the escrow agency intercepting. A blacklisted sender cannot send email to the would-be receiver. The contents of the graylist is essentially everyone on neither of the other lists.&lt;br /&gt;
&lt;br /&gt;
A graylisted sender opens a bond for a small amount of money (one cent) with the escrow agency in order to send email. If the receiver blacklists the sender as a result of the email, the bond is collected and the sender is charged. Thus, only spammers have to pay for their email unlike the [[#Charge_for_email_sent | charge-for-email]] approach.&lt;br /&gt;
&lt;br /&gt;
The escrow agency, however, must be paid. One way of doing this is having the collected spammer money go to the escrow agency. There is a lot of processing for any type of internet payment, so the penny (or so) that is charged to the spammer may not be enough to cover the escrow agency's cost regarding. Also, non-profit groups would possibly often be blacklisted and therefore be forced to pay more than they can afford similar to the Goodmail approach. Since the email cost is mean to deter spammers, Users can subvert the system by blacklisting emails that aren't spam. For example, I could charge my professors for sending me email that they must send for class or users could charge ebay for requested notifications.&lt;br /&gt;
&lt;br /&gt;
===== Links =====&lt;br /&gt;
* [http://8stars.org/a/2003/03/13/more-on-fighting-spam/ Summary of escrow spam fighting]&lt;br /&gt;
&lt;br /&gt;
==== Client-side filtering ====&lt;/div&gt;</summary>
		<author><name>Naprinci</name></author>
	</entry>
</feed>