O'Reilly logo

Wild West 2.0: How to Protect and Restore Your Online Reputation on the Untamed Social Frontier by David Thompson, Michael Fertik

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

social networking sites
and gossip, 119
for hosting attacks, 134
measuring audience reached by, 160
and online reputation audit, 183–185
for spreading attacks, 134–136
see also specific sites, e.g.: Facebook
social norms
and anonymity, 63–65, 76
in pre-Internet era, 61
vigilante enforcement of, 107–111
social proof heuristic, 19, 20
social reputation, 152–153
Social Science Research Network
(SSRN), 203
social Web, 9
sociopathy, 120
Solove, Daniel, on digital revolution, 45
South Ossetia, 113
Soviet Union, 128
spam, 36
spider, 84, 93
Spock.com, 11–12, 179
SSRN (Social Science Research
Network), 203
stalking, 79, 116–117
Starbucks, 240
stock prices, 11, 13
strategy, choosing, 223–224
Streisand Effect, 56, 230
students, 107
subpoenas, 73
Sullenberger, Chesley Burnett “Sully, 18
Sun Tzu, on occupying the battlefield,
196
SWATing, 132–133
tagging (photo tags), 57, 96–97
taking control, 163–165
technology
of Internet, 65–66
as solution to Internet abuses, 41
Technorati.com, 185
teenagers, 106–107
Texas Hold Em poker, 36
Thorndike, Edward, 19–20
thumb drives, 245
Tiananmen Square protests, 127
The Times (London), 23–24
TinEye.com, 242
TOR (The Onion Router), 71–72
total online profile, 27–28
trojans, 247
trolling, 145–146
trolls, 237
trust, misplaced, 21–24
truth, Google results as, see“Google
Truth
Tw i t te r
claiming/protecting online identity on,
194
for creating positive/neutral content,
202
and online reputation audit, 184–185
and Russia, 113
Tyler, Steve, 143
typos, 175–176
uncommon names, protecting online
identity of, 205
United Airlines, 12–13
universality, instant, 52–53
urban legends, 240
U.S. Air Force, 237, 238
U.S. Congress, 40, 232
Usenet, 32, 39, 71
user-created content
and claiming/protecting online iden-
tity, 192–195
and online reputation audit, 182–183
and potential for damage, 46–49
see also specific headings, e.g.: blogging
user identification, 65
usernames, 192–195
vandalism, 227, 228
vectors, of Internet attacks, 124
Viacom, 74
videos, manipulated, 129
Vietnam War, 128
Index 26 3

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required