O'Reilly logo

Wild West 2.0: How to Protect and Restore Your Online Reputation on the Untamed Social Frontier by David Thompson, Michael Fertik

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

professionals
data security for, 244–247
hiring, for online content creation,
205–206
hiring, for online reputation audit,
185–186
special tips for protecting reputation
of, 243–244
profile sites, 202
profit, fairness vs., 90
prostitution, 36, 40
protection, proactive, 188–189
proxy servers, 71–72
quiet enjoyment, 155
rants, 237
Really Simple Syndication (RSS), 52
real-name sites, 192–193
reCAPTCHA, 96
recovery, see restoring your reputation
remailers, 71
reputation, see specific heading, e.g.: online
reputation
ReputationDefender.com, 186, 206
reputation road map, 162–173
research, in pre-Internet age, 23
restoring your reputation, 207–233
and assessing the damage, 210–213
and identifying source of attacks,
213–216
and identifying your attacker, 221–222
and intentional vs. accidental content,
214–215
and removing content from archives,
232–233
and responding to attacker, 221–224
résumé, online, 25–27
revenge, 104–105
revenge porn,” 129–130
RipoffReport.com, 239–240
romance, 166–167
RSS (Really Simple Syndication), 52
rumors, 6–7, 101, 126
Russia, 113, 128
sarcasm, 161
satanic ritual abuse, 125
satiric websites, 144
scams, 36–37
Scheff, Sue, 230–231
search algorithms, 48–49, 84, 86, 208
search engines
introduction of, 93
for measuring audience reached by
malicious content, 157–160
for online reputation audit,
176–179
specialized, 95
for spreading attacks, 136–138
see also specific search engines, e.g.:
Google
search history, 154
search results, location of attacks among,
157–160
search terms
importance of, 158
and online reputation audit, 173,
175–176
and reputation road map, 170, 172,
173
Section 230 (CDA), see Communications
Decency Act
security breaches, 244–247
security patches, 247
self-reinforcing cycles, 86–88, 214–215,
218, 225
sex, and breach of privacy, 129–130
sexual identity, 155–156
Shakespeare, William
on jealousy, 102, 103
on the world as a stage, 165
shortcuts in assessing reputations,
18–20
Silicon Valley, 33
small business(es), see business(es)
smears, see attacks on reputation
Snopes.com, 240
Snow White, 103
social distance, 76, 77
social exploration, 155–156
Index262

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required