Harvard Journal of Law & Technology Volume 12, Number 1 Fall 1998 Ira

Total Page:16

File Type:pdf, Size:1020Kb

Harvard Journal of Law & Technology Volume 12, Number 1 Fall 1998 Ira Harvard Journal of Law & Technology Volume 12, Number 1 Fall 1998 PAGE LAYOUT AND NUMBERING DO NOT CORRESPOND TO ORIGINAL INTERNET INFOGLUT AND INVISIBLE INK: SPAMDEXING SEARCH ENGINES WITH META TAGS Ira S. Nathenson* Unseen treasure and hidden wisdom, of what use is either? -- 14th century librarian1 The more we know, the less we know. -- 20th century author2 TABLE OF CONTENTS I. INTRODUCTION .....................................44 II. WHERE DO YOU WANT TO GO TODAY?: INTERNET INFOGLUT AND SEARCH ENGINE ABUSE ...........................51 III. DEFINING THE INTERESTS ..............................72 A. Relevance and Noise .............................72 B. Reasonable Expectations ..........................77 1. The Public ..................................78 2. Webmasters .................................82 3. Proprietary-Rights Holders .....................84 C. Domain Names, Linking, and Framing Compared ......86 D. Externalization Costs .............................89 IV. STRIKING A BALANCE ................................92 A. Deceptiveness: "Protecting" the Public ..............93 1. Section 5 of the Federal Trade Commission Act.....93 * J.D. 1998, University of Pittsburgh School of Law; B.A. 1985, University of Pittsburgh College of Arts and Sciences. I would like to thank Professor Julie E. Cohen for her encouragement and suggestions, and Jeffrey R. Waxman for other helpful comments. None of this would have been possible without the love, support, and patience of my wife, Helen, and my children, Katie and Jenny. I may be reached at <[email protected]>. 1. Roger K. Summit, Knowledge Online: Current Implications and Future Trends, in INFORMATION SCIENCE: STILL AN EMERGING DISCIPLINE 101, 102 (James G. Williams & Toni Carbo eds., 1997) [hereinafter INFORMATION SCIENCE]. 2. David Shenk, Data Smog: Surviving the Info Glut, TECH. REV., May 15, 1997, at 18. Harvard Journal of Law & Technology [Vol. 12 PAGE LAYOUT AND NUMBERING DO NOT CORRESPOND TO ORIGINAL 2. How Much Deception Is Sufficient? ..............98 3. FTC Action Is Needed........................101 B. Unfair Competition: Balancing Competitive Interests . 106 1. Rationale of Unfair Competition Law ............106 2. Trademark Infringement: Conceptually Inapposite . 111 3. Trademark Dilution: Tailor-Made ..............118 4. Protection for Less-Than-Famous Marks? ........122 5. Defenses to Infringement and Dilution ...........124 V. WHERE DO YOU WANT TO GO TOMORROW?: TAMING THE INTERNET INFOGLUT ................................131 VI. CONCLUSION ......................................146 I. INTRODUCTION Imagine a never-ending traffic jam on a ten-lane highway. Road signs can't be trusted: the sign for Exit 7 leads to Exit 12, the sign for Cleveland leads to Erie. If you ask the guy at the Kwik-E-Mart how to get to I-79, he gives you directions to Route 30. To top it off, when you ask for a Coke, he gives you a Pepsi. Enough already. You stop at a pay phone to call directory assistance for the number to the local auto club, and instead get connected to "Dial-a-porn." Road trip from hell? Not exactly. Welcome to the Internet, the "information super-highway" that lacks reliable road signs. Suppose, for example, you use an Internet search engine to look for Web pages on the late Princess Diana. Instead, you may find get-rich schemes and pornography.3 Or you search for an attorney -- by name -- and instead get Internet service providers ("ISPs") and software companies.4 If you search for pages on "Monica Lewinsky," you might be shocked to find that the top listing from one search engine is "CityAuction," an Internet classified advertising site.5 3. See Elizabeth Weise, Some Web Pages Take Search Engines for a Ride, USA TODAY, Sept. 29, 1997, at 4D. 4. See James Evans, Fraud: Hidden Tags Leading to Court Battles, INTERNET WORLD, Dec. 1997, at 17. 5. A search for "Monica Lewinsky" using the HotBot search engine on Feb. 27, 1998 resulted in 1,126 matches (on file with Harvard Journal of Law & Technology). Of these, CityAuction was the very first site listed. See CityAuction, Monica Lewinsky, Please Use CityAuction Classifieds (visited Feb. 27, 1998) <http://www.cityauction. No. 1] Internet Infoglut and Invisible Ink PAGE LAYOUT AND NUMBERING DO NOT CORRESPOND TO ORIGINAL Microsoft's advertising, waxing poetic, asks, "Where do you want to go today?"6 Instead, maybe it should ask, "How in the hell do you get there?"7 After all, even those who know where they want to go may need help finding their way. Such help exists in the form of search engines, but some Internet content providers abuse these tools to the frustration of many. This Article is about those who search, those who want to be found, and those who would stand in between. The primary means of finding information on the Internet is via search engines.8 In compiling their databases, search engines rely on those who publish Web pages -- webmasters -- to supply indexing information.9 Because an increase in visits, or "hits," means more exposure or revenue, webmasters are strongly motivated to do anything to increase their chances of getting hits.10 Many therefore "spam" search engines in hopes of appearing in as many searches, and as highly ranked in those searches, as possible.11 com/lewinsky.asp>. This page is not the main CityAuction page, but rather a "bridge" page: one designed to draw in the public and then direct it to another place. See infra note 111 and accompanying text. In light of the discussion of relevance in Part III, it is ironic to note the attempt made by this page to appear relevant to Ms. Lewinsky by stating an "offer": "Monica Lewinsky, we hereby invite you to use CityAuction." CityAuction, supra. A look at the code for this page indicates that "Monica Lewinsky" is also used as a meta tag and title tag. See id.; see also infra notes 79-83 and accompanying text (discussing various ways Web pages are indexed by search engines). 6. Michael Newman, Sticky Wickets: Yahoo! and Its Rivals Now Want You to Stay Around and Not Go Searching, PITT. POST-GAZETTE, Apr. 19, 1998, at E1. 7. See Connected: Click Here to Go to Hell, LONDON DAILY TELEGRAPH, June 24, 1997, at 2. The background music for Microsoft's current television campaign is the Confutatis from Mozart's Requiem. The words of the final blast of music that accompanies the slogan "Where do you want to go today?" are "confutatis maledictis, flammis acribus addictis" which means "the damned and accused are convicted to flames of hell." All of which is grist to the mill of those who believe that Microsoft boss Bill Gates is the devil in disguise. Id. 8. See infra notes 68-83 and accompanying text. 9. Strictly speaking, a webmaster is one who designs or maintains a Web page. In the spamdexing context, see infra note 16 and accompanying text, the implementation of irrelevant or deceptive indexing terms may be done by an actual webmaster, or by a webmaster acting as an agent on behalf of his principal. For simplicity, "webmaster" will refer to any party who provides content on the World Wide Web, either personally or via a webmaster-agent. 10. "[A] high ranking can make all the difference. Consider that a search for the words 'tennis racket' on AltaVista yields more than 850 pages. The user is much more likely to glance through the first 20 sites listed than the last 20." Net Interest: Web-Search-2: It's Up to You to Stand Out, DOW JONES NEWS SERV., Oct. 9, 1997. 11. See DON SELLERS, GETTING HITS: THE DEFINITIVE GUIDE TO PROMOTING YOUR Harvard Journal of Law & Technology [Vol. 12 PAGE LAYOUT AND NUMBERING DO NOT CORRESPOND TO ORIGINAL Some webmasters use indexing terms that are completely irrelevant to actual Web page content in order to gain hits from searches on those topics.12 Others "stuff" multiple instances of a term, relevant or not, in hopes of appearing more relevant to the search engine, and therefore higher in its output.13 Yet others use the trademarks and trade names of third parties, hoping to take advantage of the goodwill of those asserting proprietary rights14 in an indexing term.15 USA Today calls these practices "spamdexing."16 WEB SITE 21-22 (1997); Weise, supra note 3; see also Internet and Unix Dictionary (last modified Nov. 17, 1998) <http://www.msg.net/kadow/answers/s.html#spam> (defining "spam" as "bulk, mass, or repeated posting or mailing of substantially identical messages. The emphasis is on the multiple sending, either many copies to one destination, or one copy to many destinations. This is a reference to the famous Monty Python Spam sketch."). 12. See infra note 97 (noting site that used buried text referring to "Seinfeld"). 13. See SELLERS, supra note 11, at 32-33; Weise, supra note 3 ("A scuba-diving site might hide the word 'scuba' a hundred times, so search engines would rank it above others."). A view of the source code for an Internet site dedicated to the World Wrestling Federation indicates that the term "WWF" is repeated five times as a meta tag. See WWF No Holds Barred (visited Jan. 31, 1998) <http://www.wwf2000.com> (source code on file with Harvard Journal of Law & Technology). 14. The term "property" is somewhat loaded, so I will avoid its use in this Article. After all, merely calling something property ascribes to it the conclusion to the question presented: should the right of exclusion apply? See Felix S. Cohen, Transcendental Nonsense and the Functional Approach, 35 COLUM. L. REV. 809, 815 (1935) [hereinafter Cohen, Transcendental Nonsense]; see also Zechariah Chaffee, Jr., The Disorderly Conduct of Words, 41 COLUM. L. REV. 381, 390-91 (1941). Therefore, references to "proprietary" or "trademark" rights provide a somewhat less volatile label. The proprietary rights to which I refer are more in the nature of quasi-property rights between competitors than rights between the holder and the public.
Recommended publications
  • The Internet and Drug Markets
    INSIGHTS EN ISSN THE INTERNET AND DRUG MARKETS 2314-9264 The internet and drug markets 21 The internet and drug markets EMCDDA project group Jane Mounteney, Alessandra Bo and Alberto Oteo 21 Legal notice This publication of the European Monitoring Centre for Drugs and Drug Addiction (EMCDDA) is protected by copyright. The EMCDDA accepts no responsibility or liability for any consequences arising from the use of the data contained in this document. The contents of this publication do not necessarily reflect the official opinions of the EMCDDA’s partners, any EU Member State or any agency or institution of the European Union. Europe Direct is a service to help you find answers to your questions about the European Union Freephone number (*): 00 800 6 7 8 9 10 11 (*) The information given is free, as are most calls (though some operators, phone boxes or hotels may charge you). More information on the European Union is available on the internet (http://europa.eu). Luxembourg: Publications Office of the European Union, 2016 ISBN: 978-92-9168-841-8 doi:10.2810/324608 © European Monitoring Centre for Drugs and Drug Addiction, 2016 Reproduction is authorised provided the source is acknowledged. This publication should be referenced as: European Monitoring Centre for Drugs and Drug Addiction (2016), The internet and drug markets, EMCDDA Insights 21, Publications Office of the European Union, Luxembourg. References to chapters in this publication should include, where relevant, references to the authors of each chapter, together with a reference to the wider publication. For example: Mounteney, J., Oteo, A. and Griffiths, P.
    [Show full text]
  • Fully Automatic Link Spam Detection∗ Work in Progress
    SpamRank – Fully Automatic Link Spam Detection∗ Work in progress András A. Benczúr1,2 Károly Csalogány1,2 Tamás Sarlós1,2 Máté Uher1 1 Computer and Automation Research Institute, Hungarian Academy of Sciences (MTA SZTAKI) 11 Lagymanyosi u., H–1111 Budapest, Hungary 2 Eötvös University, Budapest {benczur, cskaresz, stamas, umate}@ilab.sztaki.hu www.ilab.sztaki.hu/websearch Abstract Spammers intend to increase the PageRank of certain spam pages by creating a large number of links pointing to them. We propose a novel method based on the concept of personalized PageRank that detects pages with an undeserved high PageRank value without the need of any kind of white or blacklists or other means of human intervention. We assume that spammed pages have a biased distribution of pages that contribute to the undeserved high PageRank value. We define SpamRank by penalizing pages that originate a suspicious PageRank share and personalizing PageRank on the penalties. Our method is tested on a 31 M page crawl of the .de domain with a manually classified 1000-page stratified random sample with bias towards large PageRank values. 1 Introduction Identifying and preventing spam was cited as one of the top challenges in web search engines in a 2002 paper [24]. Amit Singhal, principal scientist of Google Inc. estimated that the search engine spam industry had a revenue potential of $4.5 billion in year 2004 if they had been able to completely fool all search engines on all commercially viable queries [36]. Due to the large and ever increasing financial gains resulting from high search engine ratings, it is no wonder that a significant amount of human and machine resources are devoted to artificially inflating the rankings of certain web pages.
    [Show full text]
  • Clique-Attacks Detection in Web Search Engine for Spamdexing Using K-Clique Percolation Technique
    International Journal of Machine Learning and Computing, Vol. 2, No. 5, October 2012 Clique-Attacks Detection in Web Search Engine for Spamdexing using K-Clique Percolation Technique S. K. Jayanthi and S. Sasikala, Member, IACSIT Clique cluster groups the set of nodes that are completely Abstract—Search engines make the information retrieval connected to each other. Specifically if connections are added task easier for the users. Highly ranking position in the search between objects in the order of their distance from one engine query results brings great benefits for websites. Some another a cluster if formed when the objects forms a clique. If website owners interpret the link architecture to improve ranks. a web site is considered as a clique, then incoming and To handle the search engine spam problems, especially link farm spam, clique identification in the network structure would outgoing links analysis reveals the cliques existence in web. help a lot. This paper proposes a novel strategy to detect the It means strong interconnection between few websites with spam based on K-Clique Percolation method. Data collected mutual link interchange. It improves all websites rank, which from website and classified with NaiveBayes Classification participates in the clique cluster. In Fig. 2 one particular case algorithm. The suspicious spam sites are analyzed for of link spam, link farm spam is portrayed. That figure points clique-attacks. Observations and findings were given regarding one particular node (website) is pointed by so many nodes the spam. Performance of the system seems to be good in terms of accuracy. (websites), this structure gives higher rank for that website as per the PageRank algorithm.
    [Show full text]
  • Download PDF Document, 456 KB
    ENISA Position Paper No. 2 Reputation-based Systems: a security analysis Editors: Elisabetta Carrara and Giles Hogben, ENISA October 2007 Reputation-based Systems ENISA Position Papers represent expert opinion on topics ENISA considers to be important emerging risks or key security components. They are produced as the result of discussion among a group of experts who were selected for their knowledge in the area. The content was collected via wiki, mailing list and telephone conferences and edited by ENISA. This paper aims to provide a useful introduction to security issues affecting Reputation-based Systems by identifying a number of possible threats and attacks, highlighting the security requirements that should be fulfilled by these systems and providing recommendations for action and best practices to reduce the security risks to users. Examples are given from a number of providers throughout the paper. These should be taken as examples only and there is no intention to single out a specific provider for criticism or praise. The examples provided are not necessarily those most representative or important, nor is the aim of this paper to conduct any kind of market survey, as there might be other providers which are not mentioned here and nonetheless are equally or more representative of the market. Audience This paper is aimed at providers, designers, research and standardisation communities, government policy-makers and businesses. ENISA Position Paper No.2 Reputation-based Systems: a security analysis 1 Reputation-based Systems EXECUTIVE
    [Show full text]
  • Delivering Timely Environmental Information to Your Community
    United States Office of Research and Development EPA/625/R-01/010 Environmental Protection Office of Environmental Information September 2001 Agency Washington, DC 20460 http://www.epa.gov/empact Delivering Timely Environmental Information to Your Community The Boulder Area Sustainability Information Network (BASIN) E M P A C T Environmental Monitoring for Public Access & Community Tracking Disclaimer This document has been reviewed by the U. S. Environmental Protection Agency (EPA) and ap- proved for publication. Mention of trade names or commercial products does not constitute en- dorsement or recommendation of their use. EPA/625/R-01/010 September 2001 Delivering Timely Environmental Information to Your Community The Boulder Area Sustainability Information Network (BASIN) United States Environmental Protection Agency Office of Research and Development National Risk Management Research Laboratory Cincinnati, OH 45268 Recycled/Recyclable Printed with vegetable- based ink on paper that contains a minimum of 50% post-consumer fiber content processed chlorine free CONTRIBUTORS Dr. Dan Petersen of the U.S. Environmental Protection Agency (EPA), National Risk Management Laboratory, served as principal author of this handbook and managed its development with support of Pacific Environmental Services, Inc., an EPA contractor. The following contributing authors represent the BASIN team and provided valuable assistance for the development of the handbook: BASIN Team Larry Barber, United States Geological Survey (USGS), Boulder, Colorado Michael
    [Show full text]
  • Print Journalism: a Critical Introduction
    Print Journalism A critical introduction Print Journalism: A critical introduction provides a unique and thorough insight into the skills required to work within the newspaper, magazine and online journalism industries. Among the many highlighted are: sourcing the news interviewing sub-editing feature writing and editing reviewing designing pages pitching features In addition, separate chapters focus on ethics, reporting courts, covering politics and copyright whilst others look at the history of newspapers and magazines, the structure of the UK print industry (including its financial organisation) and the development of journalism education in the UK, helping to place the coverage of skills within a broader, critical context. All contributors are experienced practising journalists as well as journalism educators from a broad range of UK universities. Contributors: Rod Allen, Peter Cole, Martin Conboy, Chris Frost, Tony Harcup, Tim Holmes, Susan Jones, Richard Keeble, Sarah Niblock, Richard Orange, Iain Stevenson, Neil Thurman, Jane Taylor and Sharon Wheeler. Richard Keeble is Professor of Journalism at Lincoln University and former director of undergraduate studies in the Journalism Department at City University, London. He is the author of Ethics for Journalists (2001) and The Newspapers Handbook, now in its fourth edition (2005). Print Journalism A critical introduction Edited by Richard Keeble First published 2005 by Routledge 2 Park Square, Milton Park, Abingdon, Oxon, OX9 4RN Simultaneously published in the USA and Canada by Routledge 270 Madison Ave, New York, NY 10016 Routledge is an imprint of the Taylor & Francis Group This edition published in the Taylor & Francis e-Library, 2005. “To purchase your own copy of this or any of Taylor & Francis or Routledge’s collection of thousands of eBooks please go to www.eBookstore.tandf.co.uk.” Selection and editorial matter © 2005 Richard Keeble; individual chapters © 2005 the contributors All rights reserved.
    [Show full text]
  • Rethinking the Participatory Web: a History of Hotwired's “New Publishing Paradigm,” 1994–1997
    University of Groningen Rethinking the participatory web Stevenson, Michael Published in: New Media and Society DOI: 10.1177/1461444814555950 IMPORTANT NOTE: You are advised to consult the publisher's version (publisher's PDF) if you wish to cite from it. Please check the document version below. Document Version Publisher's PDF, also known as Version of record Publication date: 2016 Link to publication in University of Groningen/UMCG research database Citation for published version (APA): Stevenson, M. (2016). Rethinking the participatory web: A history of HotWired's 'new publishing paradigm,' 1994-1997. New Media and Society, 18(7), 1331-1346. https://doi.org/10.1177/1461444814555950 Copyright Other than for strictly personal use, it is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license (like Creative Commons). The publication may also be distributed here under the terms of Article 25fa of the Dutch Copyright Act, indicated by the “Taverne” license. More information can be found on the University of Groningen website: https://www.rug.nl/library/open-access/self-archiving-pure/taverne- amendment. Take-down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Downloaded from the University of Groningen/UMCG research database (Pure): http://www.rug.nl/research/portal. For technical reasons the number of authors shown on this cover page is limited to 10 maximum.
    [Show full text]
  • The History of Digital Spam
    The History of Digital Spam Emilio Ferrara University of Southern California Information Sciences Institute Marina Del Rey, CA [email protected] ACM Reference Format: This broad definition will allow me to track, in an inclusive Emilio Ferrara. 2019. The History of Digital Spam. In Communications of manner, the evolution of digital spam across its most popular appli- the ACM, August 2019, Vol. 62 No. 8, Pages 82-91. ACM, New York, NY, USA, cations, starting from spam emails to modern-days spam. For each 9 pages. https://doi.org/10.1145/3299768 highlighted application domain, I will dive deep to understand the nuances of different digital spam strategies, including their intents Spam!: that’s what Lorrie Faith Cranor and Brian LaMacchia ex- and catalysts and, from a technical standpoint, how they are carried claimed in the title of a popular call-to-action article that appeared out and how they can be detected. twenty years ago on Communications of the ACM [10]. And yet, Wikipedia provides an extensive list of domains of application: despite the tremendous efforts of the research community over the last two decades to mitigate this problem, the sense of urgency ``While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant remains unchanged, as emerging technologies have brought new messaging spam, Usenet newsgroup spam, Web search engine spam, dangerous forms of digital spam under the spotlight. Furthermore, spam in blogs, wiki spam, online classified ads spam, mobile when spam is carried out with the intent to deceive or influence phone messaging spam, Internet forum spam, junk fax at scale, it can alter the very fabric of society and our behavior.
    [Show full text]
  • Information Retrieval and Web Search Engines
    Information Retrieval and Web Search Engines Lecture 13: Miscellaneous July 23th, 2020 Wolf-Tilo Balke and Janus Wawrzinek Institut für Informationssysteme Technische Universität Braunschweig Lecture 13: Miscellaneous 1. Spamdexing 2. Hardware for Large Scale Web Search 3. Metasearch 4. Privacy Issues Information Retrieval and Web Search Engines — Wolf-Tilo Balke and José Pinto — Technische Universität Braunschweig 2 Spamdexing • Spamdexing = The practice of modifying the Web to get certain Web resources unjustifiably ranked high on search engine result lists • Often a synonym of SEO (“search engine optimization”) Information Retrieval and Web Search Engines — Wolf-Tilo Balke and José Pinto — Technische Universität Braunschweig 3 Spamdexing (2) • Spamdexing usually means finding weaknesses in ranking algorithms and exploiting them • Usually, it looks like this: Finds a new loophole Spammer Search Engine Fills the loophole • There are two classes of spamdexing techniques: – Content spam: Alter a page’s contents – Link spam: Alter the link structure between pages Information Retrieval and Web Search Engines — Wolf-Tilo Balke and José Pinto — Technische Universität Braunschweig 4 Content Spam Idea: – Exploit TF–IDF Method: – Repeatedly place the keywords to be found in the text, title, or URI of your page – Place the keywords in anchor texts of pages linking to your page – Weave your content into high-quality content taken from (possibly a lot of) other pages Countermeasures: – Train classification algorithms to detect patterns that are “typical”
    [Show full text]
  • Web Spam Taxonomy
    Web Spam Taxonomy Zolt´an Gy¨ongyi Hector Garcia-Molina Computer Science Department Computer Science Department Stanford University Stanford University [email protected] [email protected] Abstract techniques, but as far as we know, they still lack a fully effective set of tools for combating it. We believe Web spamming refers to actions intended to mislead that the first step in combating spam is understanding search engines into ranking some pages higher than it, that is, analyzing the techniques the spammers use they deserve. Recently, the amount of web spam has in- to mislead search engines. A proper understanding of creased dramatically, leading to a degradation of search spamming can then guide the development of appro- results. This paper presents a comprehensive taxon- priate countermeasures. omy of current spamming techniques, which we believe To that end, in this paper we organize web spam- can help in developing appropriate countermeasures. ming techniques into a taxonomy that can provide a framework for combating spam. We also provide an overview of published statistics about web spam to un- 1 Introduction derline the magnitude of the problem. There have been brief discussions of spam in the sci- As more and more people rely on the wealth of informa- entific literature [3, 6, 12]. One can also find details for tion available online, increased exposure on the World several specific techniques on the Web itself (e.g., [11]). Wide Web may yield significant financial gains for in- Nevertheless, we believe that this paper offers the first dividuals or organizations. Most frequently, search en- comprehensive taxonomy of all important spamming gines are the entryways to the Web; that is why some techniques known to date.
    [Show full text]
  • The Domain Abuse Activity Reporting (DAAR) System
    The DAAR System The Domain Abuse Activity Reporting (DAAR) System David Piscitello, ICANN and Greg Aaron, iThreat Cyber Group Abstract Efforts to study domain name abuse are common today, but these often have one or more limitations. They may only use a statistically valid sampling of the domain name space or use limited sets of domain name abuse (reputation) data. They may concentrate only on a particular security threat, e.g., spam. Notably, few studies collect and retain data over a sufficiently long timeframe to provide opportunities for historical analysis. This paper describes our efforts to collect a large body of domain name registration data, and to complement these data with a large set of reputation data feeds that report and classify multiple security threats. We intend that the resulting data repository will serve as a platform for daily or historical analysis or reporting. Ideally, any findings or reporting derived from our system can be independently validated. We thus use publicly or commercially available data so that the reports or findings from any studies that use our system would be reproducible by any party who collects the same data sets and applies the same processing rules. The long- term objective for our project is that this system will serve the community by establishing a persistent, fact-based repository for ongoing collection, analysis, and reporting. Version 0.3, November 2017 1 The DAAR System Table of Contents INTRODUCTION AND BACKGROUND 3 PURPOSES OF THE DAAR PROJECT 4 DAAR OVERVIEW 4 DAAR COLLECTION SYSTEM 5 DAAR DATA COLLECTION 5 TOP-LEVEL DOMAIN ZONE DATA 5 DOMAIN NAME REGISTRATION DATA 7 DOMAIN REPUTATION DATA (ABUSE DATA) 8 DAAR REPORTING SYSTEM 8 SECURITY THREATS OBSERVED BY THE DAAR 9 DAAR THREAT DATA COMPILATION 12 REPUTATION DATA USED BY DAAR 13 SELECTION OF REPUTATION DATA 14 MULTIPLE REPUTATION DATA SOURCES 15 FALSE POSITIVE RATES 16 DOES DAAR CAPTURE ALL OF THE ABUSE? 16 DAAR REPORTING 18 ABUSE SCORING 19 ACCESS TO THE DAAR SYSTEM 20 CONCLUSION 20 ANNEX A.
    [Show full text]
  • Rethinking the Participatory Web Final
    Preprint version of Stevenson, Michael. 2014. “Rethinking the Participatory Web: A History of HotWired’s ‘New Publishing Paradigm,’ 1994–1997.” New Media & Society, October. doi: 10.1177/1461444814555950. Title Rethinking the participatory web: A history of HotWired’s ‘new publishing paradigm,’ 1994-1997. Author Michael Stevenson University of Amsterdam [email protected] Abstract This article critically interrogates key assumptions in popular web discourse by revisiting an early example of web ‘participation.’ Against the claim that Web 2.0 technologies ushered in a new paradigm of participatory media, I turn to the history of HotWired, Wired magazine’s ambitious web-only publication launched in 1994. The case shows how debates about the value of amateur participation vis-à-vis editorial control have long been fundamental to the imagination of the web’s difference from existing media. It also demonstrates how participation may be conceptualized and designed in ways that extend (rather than oppose) 'old media' values like branding and a distinctive editorial voice. In this way, HotWired's history challenges the technology-centric change narrative underlying Web 2.0 in two ways: first, by revealing historical continuity in place of rupture, and, second, showing that 'participation' is not a uniform effect of technology, but rather something constructed within specific social, cultural and economic contexts. Keywords web history, participation, Web 2.0, cyberculture, digital utopianism, Wired !1 Introduction In the mid-2000s, a series of popular accounts celebrating the web’s newfound potential for participatory media appeared, from Kevin Kelly’s (2005) proclamation that active audiences were performing a ‘bottom-up takeover’ of traditional media and Tim O’Reilly’s (2005) definition of ‘Web 2.0’ to Time’s infamous 2006 decision to name ‘You’ as the person of the year (Grossman, 2006).
    [Show full text]