Category Archives: VECC Digest

Thread hijacking

Thread hijacking. Thread hijacking (or “threadjacking”) in online communication is the act of composing a new mail to a email mailing list, internet forum or newsgroup by replying to an existing message with un- or barely-related content, rather than composing a new message from scratch. In the worst case, the threadjacker fails to even change the Subject line.

Harms from thread-jacking result from

  • Disruption to email clients that display discussions in a hierarchical, or threaded, fashion. An email client usually cannot do content analysis of messages to make this determination; rather, it relies upon an In-Reply-To: header field that records the Message-ID of the respondee. Thus a threadjacked message is mixed into the tree of an unrelated thread, rather than in a new one.
  • Degradation to search. Email clients often default to searching the Subject: line, rather than the more voluminous bodies of messages. An attempt to search for a message with contents very different from its Subject: will then be thwarted.

Threadjacking is generally considered a breach of netiquette and can cause ill feelings among other participants in the discussion.

Internet Forums

Thread hijacking in internet forum communication is the act of steering a discussion off-topic by discussing a subject entirely unrelated to the subject at hand.

While this can be an intentional act of trolling, it is often accidental – caused by participants in the discussion responding to a throwaway remark, thus taking the thread off at a tangent to the original subject matter. The results often provoke a feeling of resentment from the author of the original post.

Employers Using Social Networks for Screening Applicants

The Issue

“What’s on your mind?” This question is asked by thousands, and answered almost twenty times a day by each Facebook user. Many of which do not realize that one simple phrase can be the determinant of “hire” or “fire” in the job market. Several employers are now using social-networking sites, such as Facebook, MySpace, and Twitter to not only fire employees for content, but also for screening potential candidates for a position. This topic is steadily approaching to become a major concern in the business world, and is seen as being an unethical action among employers.

What Employers Found

One in five hiring managers in the human resources departments are conducting profile screenings using social networking sites (Social Networks Yielding Good & Bad Input for Hiring). Facebook has become the most popular medium for employers to use. Alone it has 66 million users, and more employers are steadily and increasingly using popular sites such as Facebook to check job candidates (Greenwald, Judy). In these sites they search for information on the candidate to determine the person’s character, criminal reports, personality, and other information.

An additional nine percent of employers do not currently use these methods, but plan to in the future (Social Networks Yielding Good & Bad Input for Hiring). According to an article in Teller Vision, “Social Networking Sites Become Hiring Managers’ Tool” about thirty-five percent of employers reported they uncovered information about an applicant that prevented them from consideration (Social Networking Sites Become Hiring Managers’ Tool).

Listed below are the top concerns that employers found:

  • 41% of users posted content about their drinking or drug usage
  • 40% of users posted inappropriate pictures and information
  • 29% of users was considered having bad communication skills
  • 27% of users lied about skills and abilities
  • 22% of users had an unprofessional screen name
  • 21% of users has information linked to criminal actions (Social Networking Sites Become Hiring Managers’ Tool)
    CareerBuilder.com reported that 64% of employers found information online that actually benefited potential candidates (Is Web-Screening AP Job Candidates a Good idea?).
  • 34% found people with great communication skills
  • 31% found a link between the applicant and the organization culture
  • 23% saw good professional resources from the candidate
  • 23% thought the candidate was creative

Legality

Most business employers believe that they are out of harm’s way with looking at Internet profiles strictly because there are not any laws stopping them from searching those sites (The Internet Brings Risks and Challenges to Hiring).

Paul Marks, vice president of Gilbert Tweed Associates (executive search firm), states in the 2006 HRFocus that human resource professionals also believe that they are entitled to obtain as much information as possible about a potential employee, and that social profiles are a good way to get results (The Internet Brings Risks and Challenges to Hiring). They argue that even though the social websites were created for fun and are for casual use, this medium is “fair game for their organization” (The Internet Brings Risks and Challenges to Hiring).

Is it Legal?

A few years ago, majority of businesses no longer required applicants to include a picture of themselves with their application to avoid discriminatory acts (Elefant). However, now employers are using networking mediums on the internet to screen. This now becomes a concern of discrimination towards the protected class (Elefant).

Facebook, for example, includes people’s religious views, marital status, political views, and demographics; many factors that employers consider when hiring but do not publicize due to lawsuits. If employers are looking at these networks to screen applicants for hire, or to check on current employees for a possible fire, then who’s to say that they are not taking in these other personal factors such as race, religion, and sex.

A recent survey of 350 employers concluded:

  • 44% of employers use social profiles
  • 39% of employers searched their current employee’s profile (Elefant).

This causes many problems for individual wanting to get hired, and for those who are already in the company. Employers really have to use caution when using these applications because it could result into a lawsuit for those who are scrutinized.

Employer Consequences

Due to the current economic status of the United States economy, there is a huge flow of job applicants searching for employment. For employers it is difficult to hire candidates from such a big band of people with the same qualifications (Jeffrey). In result to this, employers seek other methods which may or may not be the best alternative. Many companies use Internet searches to find more about a job candidate or a current employee (Jeffrey). There are some people who argue that this action has to be illegal. There is no law that prohibits the use of social profiles as background checks. However, the employer actions can lead to “discrimination claims and invasion of privacy claims (Jeffrey).

Discriminatory Actions

Screening applicants using social networking sites could lead to employment charges on discrimination and litigation, and employers are setting themselves up for legal charges when they use social sites to rule out certain people (Greenwald). “Failure to hire” lawsuits are a small part of employment litigation, but observers do expect that this issue will arise and expand the use of employers utilizing social networks (Greenwald). In addition, the use of social websites to screen could be evidence in a lawsuit case (Greenwald).

Employers should refrain from checking social profiles during their screening processes because it implies the use of discriminatory factors such as demographics (Greenwald). George Lenard stated in his article that “unlawful discrimination” could occur from the employer for checking social sites on the Internet because it affects the employer’s biases on the applicant (Lenard). He also suggest that employers may take into consideration a person’s skin color and sexual orientation which leads to adverse decision making for the employer (Lenard).

Invasion of privacy

Individuals who try to claim that employers are invading their privacy have a slight chance of it ever being an actual privacy claim against an employer. Because the Internet has a lower “expectation of privacy”, you are liable for the content you post, websites you visit, and etc (CCH® HR MANAGEMENT).

Although you have the privacy setting on the social website, employers can still get into you information especially if you have used a company computer (CCH® HR MANAGEMENT). URL history can always be used to track recent online activity, so viewing profiles at work would not be a grand idea (CCH® HR MANAGEMENT).

Invasion of privacy claim is rather difficult for a person to use against an employer because it is our decision to post certain information on our social profiles. Also, companies can hire certain a third party to use Facebook, Twitter, and other mediums to see what you are posting. This causes a lot of issues because you never know who is viewing your profile or for what reasons.

Which Industries Search?

One of the main stakeholders in this issue are the employers. They are the group who have the ability to screen, hire, and fire applicants based on decisions that they feel are necessary. According to the National Association of Colleges and Employers (NACE) survey, about 30% of organizations reported that they have reviewed applicants’ profiles on social web sites (Society for Human Resource Management ).

Among the organizations that responded to the poll, here are the percentages of those who actually view job candidates on the internet:

  • Services sector: 30.9%
  • Manufacturing sector: 21.9%
  • Government/Non-profit sector: 20% (Society for Human Resource Management )
    From those participants:
  • 7.4% stated that they use this method in their standard screening process
  • 41.2% occasionally check social sites
  • 35.3% rarely performed profile checks via internet (Society for Human Resource Management )

Employers argue that the information they find on certain candidates, and on current employees are devastating to the company. The company has to maintain a certain image, and believes that the smallest things can lead back to the company. Businesses know that people are using Facebook, MySpace, Twitter, and other social sites to “express themselves regularly” (Hernández, Gina M.). Companies also believe that users are likely to combine their personal and professional attitudes on their social profiles (Hernández). This makes Facebook an easy medium for screening potential applicants in the job market.

Who’s in Danger?

There are many groups of people that are affected by this issue. However, I believe the main targets are college students, or post-graduates. This group are frequent users of social media, and are very fresh in the job market. A study shows that people between the ages of 25 and 34 are the most common everyday users for online job searching; behind that age group was 18 to 24 years of age (Hernández). Many young adults are the ones who are getting ridiculed for having obscene pictures, comments, or blogs on their profiles; which then leads to them not being considered for a job or even fired from within the company.

Tips to a Professional Profile

A very high number of industries are reviewing applicants’ Facebook sites to make decisions on hiring, and is seen as a “vetting tool” (Greenwood, Bill). As stated before, employers are highly turned off by people who post information about drug use or alcohol use, those who post provocative pictures, and those who showed low communication skills (Social Networking Sites Become Hiring Managers’ Tool).

CareerBuilder.com surveyed about 3,200 human resource managers and configured a list of tips that could help job seekers who currently have a social profile (Grove).

  1. Clean up social profile before you begin looking for work. This includes removing photos, links to inappropriate activity, and any content that may be unprofessional in the work force (Grove) (Jeffrey).
  2. Create a professional profile on the social sites. Employers will be able to see more of the knowledge, skills, and abilities that you can offer to the job position (Grove).
  3. Highlight positives about yourself. Try to leave out the negatives aspects of your life, and try to relate personal information to professionalism (Grove).
  4. Be cautious of who you select as friends. This also includes monitoring what statements you post on other people’s profiles as well (Grove).
  5. For those currently employed, try not to mention information about the company; or information about leaving the current field (Grove).

Dave Hawkins, the director of public policy and research at the National Association for College Admission Counseling says that students and current employees should limit the amount of information they share on these social sites, and avoid posting improper behavior (Greenwood).

Gandiseeg Troll Theory

Gandiseeg Troll Theory. Gandiseeg Troll Theory is a variant of wider Internet Troll Theory. It is relatively unique in its emphasis on troll sympathy and an apportioning of blame to troll-baiters.

The basic theory can been summed up in the Gandiseeg First Law of Troll-Baiting, which states: “In any given situation, the true likelihood is that the aggressor(s) are those making accusations of trolling“.

The Theory

The theory essentially suggests that, most of the time, ‘troll-baiters’ are at fault for making false or exaggerated accusations of trollery. Gandiseeg Troll Theory contends that no-one is born an internet troll but that, much of the time, trolls are created in the collective minds of aggressors. Often, the supposed troll will suggest a viewpoint which, while controversial and/or unusual, is perfectly legitimate and non-aggressive.

The aggressors, who might disagree with the viewpoint and/or feel challenged by it, tend to make the accusation of trollery as an instantaneous and powerful put-down. It immediately belittles the person’s viewpoint and standing, as the word ‘troll’ automatically inspires a feeling of hatred and disdain in many internet users.

Most of the time, troll-baiters have security in greater number than the ‘troll’, allowing opportunity for multiple supportive accusations. Sometimes this results in inflaming the ‘troll’ to such an extent that he/she does then actually begin to act like a troll.

Origin and Research

Gandiseeg Troll Theory was so named because it was first formulated on http://www.gandiseeg.com. A great deal of research has been undertaken to back up the theory. Much of it was conducted in internet chat rooms and forums, with agents suggesting subject-appropriate viewpoints which were unusual and/or controversial but perfectly valid.

Examples of such statements include:

  • “Mozilla Firefox is nowhere near as good as Internet Explorer”.
  • “Toothpaste is mostly a money-making scam and has little useful effect on teeth”.
  • “I find atheists to be often contradictory in their beliefs”.
  • “I believe 9/11 was an inside job”.
  • “Hitler may not have ordered the Holocaust”.

It was found that 72% of the time, the person suggesting the viewpoint was at some point accused of being a ‘troll’, even though they clearly explained their viewpoint when asked. This figure was even higher than initially expected and clearly supports the Gandiseeg First Law of Troll-Baiting.

Conclusion

Ultimately, Gandiseeg Troll Theory suggests quite clearly that the reason for many disputes is that a lot of people on the Internet hold very narrow and concentric mainstream views. When the viewpoint of such a person is challenged, they find their whole personality challenged and seek an ‘easy way out’ of any debate.

The accusation of trollery both gives them a thrill of satisfaction and instantly dismisses the opponent’s entire stance and person, often irreparably harming their reputation. Internet trolls do exist, but, according to Gandiseeg Troll Theory, most of the time the person making the accusation is the real ‘troll’.

Source

This article is based on a Wikipedia article of the same title.

E-Visibility

E-Visibility. E-Visibility refers to the ways by which the customer can enter a website. This makes the presence of the website in the minds of the customer.

Introduction

Different ways of advertising a web presence and getting customers in through the door includes:

  • Site Name
  • Conventional Advertising
  • Portals
  • Malls
  • Search Engines
  • Links
  • Personal Recommendations

Site Name

The surest way of finding an e-commerce site is the URI. If the URI is simple and the punters can remember it, then the site is made.

A sensible simple site name can be guessed by users and might be easily remembered. One such example is britishairways.com. Here the name of website can be guessed easily so that it makes the visitors of website to access the site easily.

Conventional Advertising

An irony of e-Commerce is the apparent urge to advertise them through conventional media: in the newspaper, on the television and even on the carrier bags used in real shops.
Conventional advertising of internet addresses has a threshold effect:

  • It boosts the image of the organisation and any conventional facilities it might have- it gives an air on modernity and high-tech.
  • It lets the customer know that the organisation has internet facilities
  • It can give users access via the URI. A little difficult if it is a complex URI that is flashed on a TV screen or is printed on a bag that has been thrown away.

Portals

On loading the browser and connecting to the web the user is presented with a first page. This page is the portal, the place from which to access the facilities of the internet.

The portal is a valuable piece of property. It is the one place through which all users are likely to pass. An advert on a popular portal is the web equivalent of a TV advert at half time in the cup final – it is seen by millions. An advert on a popular web search engine is a similar piece of property.

Adverts on the portal can be banners, little boxes or background. Portals provide a menu of services and inclusion in that list is another way of picking up business.

Malls
An internet shopping mall models itself on the conventional shopping mall, a lot of shops, under one roof with a pleasant shopping atmosphere.

To own a shop in a conventional mall is usually a good way of getting noticed by customers.

The intention of an internet mall is the same, hopefully the customers who have been there before come back again, look around, see new shops and the interest in the location increases to the benefit of all the shops in the mall.

An Internet mall can, like its conventional counterpart, provide common services.

Possibilities includes the following:

  • Shared advertising – Publicising the mall and hence attracting customers to all the shops.
  • Common facilities – the mall will very probably provide the software to link the shop to the back office and facilities like security and credit card processing can be common.
  • e-cash – the mall can provide or join an e-cash service that is usable in all the stores.
  • Common customer files so that publicity can be sent out to a wide range of users.

Search Engines

A search engine is a standard way to find any internet site and that includes e-shops. A successful e-shop could do with appearing in that top ten list of hits whichever search engine the user uses and whatever relevant term the user might choose to search on.

A site owner, who knows the trick of business, can submit information to a search engine that ensures they get listed – some sites submit multitude of entries to ensure their prominence and to ensure that they would be found using a variety of keys.

The search engines list only a small number of the sites that are out there on the internet. About 15% of the web sites is all that the best of the search engines manage and as the internet expands, the task does not get any easier.

Links

Online adverts on the web are also links to the site – hypertext links. Links are included on a variety of other sites with a variety of deals being done. Some links are paid for, some are mutual arrangements and there are those odd individuals who just have to share their shopping experience with all.
Links can be a good way of getting customers better than rare hit and miss nature of searching.

Personal Recommendations

The final way of getting customers onto the site is the personal recommendation. The satisfied customer will bookmark the site, come back to the site again and recommend it to their friends.

Internet Thug

Internet Thug. An Internet Thug, cyber gangsta, cyberthug or simply E-Thug in Internet slang, is someone who intentionally posts controversial or makes controversial statements in an on-line community such as an on-line discussion forum or group with the intention of bashing others or inciting violence.

Internet thugs are “One who uses the internet as a front for acting like a tough guy gang member, usually because they are hoping to gain the respect that they lack in their real life.”

Nigerian Internet Gangsters

There does exist many examples of men who utilize the Nigerian Check Scam, which is run by organized crime. They are also known as internet gangsters.

Similar but different from Cyber bullying

It can constitute a computer crime. For example, in the United States it is a federal crime to anonymously “annoy, abuse, threaten, or harass any person” via the internet or telecommunication system, punishable by a fine and/or up to two years imprisonment.

Fraud

An Internet Thug is known as a person who acts hardcore while in an online community but is not the same way in person.

Internet Marketing – The Foundation For An Effective Business

The Internet has bestowed numerous unique benefits to all kind of people. The Marketing industry derives more by disseminating information and media to the global audience at lower costs. Internet marketing is turning more competitive and counted to have a broader scope as it involves digital media such as the Internet, e-mail and wireless media. For successful internet marketing, technical and creative facets of the Cyberspace, including design, development, advertising, and sales are linked up together. Successful Internet marketing requires a product/service looked up by a large number of people, a place to push the product/service and a source of directed traffic.

Introduction

To develop and circularize a business on a worldwide platform, successful internet marketing strategies are essential. Here are many ways to Internet Marketing which includes Banners, Freebies, Affiliate programs, Google AdSense, etc. Search engine optimization (SEO) is one of the free internet marketing and publicizing schemes to increase website traffic. Article Marketing, Paper Click Advertising (PPC), Email Campaign, Forums, Marketing messages, Blogging, Video marketing, Teleseminars and Webinars are some of the successful Internet Marketing strategies. All these methods attract people to the website, hiking your earnings by boosting business opportunities.

Unique Niceties Of Internet Marketing

Internet marketing is the easiest, cheapest and the most effective modes for elevating your website and business. It is light on the pockets as it keeps away physical goods. With 24 hrs a day, 7 days a week works done, successful internet marketing strategies take you home with more profit, . Flexibility is the greatest profit accrued from Internet marketing for entrepreneurs. It offers a higher standard of customer support to people at a lower budget. Measuring data and Statistics holds beneficial with marketers. Products can get through a large mass of people in a more stinting path, maximizing the exposure of the product/company worldwide with successful internet marketing strategies.
For Successful Internet marketing, design of the website, an attractive sales page and an Ad Sense account are indispensable. A long term and short term plan with a well known product that has high value for development takes website owners to the peaks. To strengthen your expert status employ content based marketing solutions like Article Marketing, Blogging, and ozone publishing on your internet marketing campaign. By doing these, potential clients can be furnished with valuable information and the company’s knowledge on the niche can be proved. An online reputation, in addition, creates a trustworthy and credible image.

Further information

Are you looking for a company that would leverage your marketing strategy? You are at the right place to get a powerful platform. Expert Advertising Solutions has integrated their professional Internet Marketing and Sales Support module to offer their clients efficient and effective online marketing strategies. With Internet Marketing as the basis for the success of any website, Expert Advertising Solutions offers a powerful tool that would perk up a business with keen foresight.

Wiki Hounding

Wiki Hounding. Wiki Hounding is a behaviour where contributions to a wiki service by at least one person are reverted by at least one other person for reasons unconnected with the topic. It can also involve repeated criticisms of someone who contributes to a wiki platform, which can be seen as a form of cyber-bullying and in some cases cyber-stalking.

Wiki Hounding occurs a lot on Wikipedia.

Meet the cyberbullies of Kiwi Farms

Kiwi Farms is a cyberbullying website that targets disabled people, transsexuals, highly accomplished people, and countless others. Julie Terryberry committed suicide on 29 June 2016 after the malicious cyberbullies of Kiwi Farms created a 193 page thread to mock her. This suicide was seen as an achievement by some of the bullies on Kiwi Farms. Kiwi Farms is hosted by Frantech Solutions, which has refused requests to discontinue hosting the site.

Joshua Conner Moon

Null is a pseudonym used by Joshua Conner Moon (also known as Joshua Moon and Josh Moon).  Joshua Moon, a resident of Pensacola, Florida, U.S.A., is a professional cyberbully.  He runs Kiwifarms while living with and being financially supported by Candice Lynn Potter (also known as Candice Potter and Candy Potter), a real estate agent for Keller Williams Realty.

Robert Gerald Hawke

Badgeless is a pseudonym used by R. Gerry Hawke (also known as Gerry Hawke, Robert Gerald Hawke, Robert Hawke, Gerald Hawke, and R. G. Hawke).  Robert Gerald Hawke, a resident of Saskatoon, Saskatchewan, Canada, says he is a truck driver and cooking utensils expert.  Gerry Hawke likes to defame people who are much more accomplished than him because he resents their accomplishments and feels deficient and jealous.  R. G. Hawke tries to feel better about himself by lying about others.

Conner Evans

Lulzkiller is a pseudonym used by Connor Evans.  Connor Evans, a resident of Wales, U.K., runs the Encyclopedia Dramatica website.  He likes to mock people on Kiwifarms and Encyclopedia Drammatica.  He likes to use disgusting bigoted terms like “faggot” and “nigga.”

Wikipedia – The free encyclopedia that anyone can edit

Wikipedia is the frequently used website from all over the world and it is easy to access but the same time it is not easy as it sounds. In the Wikipedia backlinks are mainly used for the purpose of the SEO (search engine optimisation) service in the online.

Think that if you get the links from different article is not the easy but using the Wikipedia you  may get the effective link building technique it is possible only at the time of your process it makes the link building process perfectly otherwise not. Offering the information for the people what text they exactly want is the main principle of the Wikipedia.

In this function is perform not for profit making process in the Wikipedia service it is one of the non profit organisation in the internet because it provides every information in the website is totally free of cost to the web users. The main goal of the wiki links is to provide the accurate as well as the bigotry information to the people for this reason in the wiki links offer the unbiased information of your search.

In the Wikipedia links is the important source for many of the search engines so that it may easily win the millions mind in the world. If you need any of the information in the wiki links that may provide the instant result of your search as well as and your function in the Wikipedia is entirely safe and the secure program in the internet.

Wikipedia offer many of the service to the people in the internet and some of the features offered in the internet is considered as the unique function f the Wikipedia. Some of the features offered in the wiki uniquely is it provides the information or text is completely reliable details. Through that you may increase your secure function in the internet not only that it never provides the broken links in the site. It sometimes provides the broken links by cause of you which means if you put any citations in your edit text then only the Wikipedia links offer the broken links of the site.

If you need not the broken links mean you just edit or change and the replacing function in the Wikipedia backlinks is entirely free of cost in the website. It provides the information in the website instantly it never makes you to wait for getting the text or information in the search engine. In your search you have the option to add the text or content not the links by cause of the Wikipedia is always treated the links as the secondary one in their search. related search in the internet.

Further information

Using the benefits of the Wikipedia in the website to get the valuable things for you research studies and this wikipedia backlinks is treated as the visual tool for the studies in the online. By cause of it always provides the information something new to the people for their entire study