social networking sites
and gossip, 119
for hosting attacks, 134
measuring audience reached by, 160
and online reputation audit, 183–185
for spreading attacks, 134–136
see also specific sites, e.g.: Facebook
social norms
and anonymity, 63–65, 76
in pre-Internet era, 61
vigilante enforcement of, 107–111
“social proof ” heuristic, 19, 20
social reputation, 152–153
Social Science Research Network
(SSRN), 203
social Web, 9
sociopathy, 120
Solove, Daniel, on digital revolution, 45
South Ossetia, 113
Soviet Union, 128
spam, 36
“spider,” 84, 93
Spock.com, 11–12, 179
SSRN (Social Science Research
Network), 203
stalking, 79, 116–117
Starbucks, 240
stock prices, 11, 13
strategy, choosing, 223–224
Streisand Effect, 56, 230
students, 107
subpoenas, 73
Sullenberger, Chesley Burnett “Sully,” 18
Sun Tzu, on occupying the battlefield,
196
SWATing, 132–133
tagging (photo tags), 57, 96–97
taking control, 163–165
technology
of Internet, 65–66
as solution to Internet abuses, 41
Technorati.com, 185
teenagers, 106–107
Texas Hold ‘Em poker, 36
Thorndike, Edward, 19–20
thumb drives, 245
Tiananmen Square protests, 127
The Times (London), 23–24
TinEye.com, 242
TOR (The Onion Router), 71–72
total online profile, 27–28
trojans, 247
trolling, 145–146
“trolls,” 237
trust, misplaced, 21–24
“truth,” Google results as, see“Google
Truth”
Tw i t te r
claiming/protecting online identity on,
194
for creating positive/neutral content,
202
and online reputation audit, 184–185
and Russia, 113
Tyler, Steve, 143
typos, 175–176
uncommon names, protecting online
identity of, 205
United Airlines, 12–13
universality, instant, 52–53
urban legends, 240
U.S. Air Force, 237, 238
U.S. Congress, 40, 232
Usenet, 32, 39, 71
user-created content
and claiming/protecting online iden-
tity, 192–195
and online reputation audit, 182–183
and potential for damage, 46–49
see also specific headings, e.g.: blogging
user identification, 65
usernames, 192–195
vandalism, 227, 228
vectors, of Internet attacks, 124
Viacom, 74
videos, manipulated, 129
Vietnam War, 128
Index 26 3