SlideShare una empresa de Scribd logo
1 de 34
Descargar para leer sin conexión
Module XLVII - Investigating
Defamation over Websites and Blog
Postings
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
News: Model Sues Google Over
‘Skanky’ Blog Post
Liskula Cohen filed a defamation suit to reveal blogger’s identity
AccessAtlanta.com Staff
Tuesday, January 06, 2009
Model Liskula Cohen, a Vogue cover girl, is suing Google over a blogger who named her the “#1 skanky
superstar” on a blog hosted by the search engine’s subsidiary, according to a report in the New York
Daily News.
Cohen, who was in the news last year when she was hit in the face with a vodka bottle by a doorman at a
Manhattan hot spot, filed the defamation suit to determine the identity of the blogger.
“It’s petty, it’s stupid and it’s pathetic,” Cohen told the Daily News of the sniping. “And when I do find
out who did this, at least I’ll know who my enemies are.”
Her lawyer, Steven Wagner, admitted that it’s not easy to identify anonymous bloggers.
“We think we have a case,” he said. “This is libelous, it’s defamatory and you shouldn’t just get away with
this.”
“I’m tall, I’m blond, I’ve been modeling for many years, and people get jealous,” Cohen said in the report.
“If I had to deal with everyone who is jealous, I wouldn’t have time to do anything else.”
Google declined to comment on the specifics in Cohen’s complaint.
Source: http://www.accessatlanta.com/
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
News: Woman Sues Over
Facebook Photos
Todd Cardy, court reporter
January 10, 2009 06:00pm
A WA woman has launched a defamation lawsuit over humiliating photos that
were allegedly posted on Facebook and adult match-making websites.
Court papers lodged with the WA Supreme Court reveal the woman, Nyree Howlett, has
made the claim against a number of WA people linked to the popular websites, where users
create profiles to post photos and information.
She is seeking damages against four defendants for accessing and publishing private
confidential material without her knowledge - believed to be revealing personal
photographs of Ms Howlett.
Written posts and photos were uploaded by the defendants on to social-networking site
Facebook and adult online services adultfriendfinder.com and redhotpie.com.au and
remained online for at least two weeks in January last year, the writ claims.
Ms Howlett alleges the material was defamatory and she wants unspecified damages for
defamation, equitable compensation, legal costs and an apology from the defendants.
Source: http://www.news.com.au/
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Objective
• What is a Blog?
• Types of Blogs
• Blogging
• Who is Blogging?
• Blogosphere Growth
• Defamation Over Websites and Blog Postings
• Steps for Investigating Defamation Over Websites and Blog Postings
This module will familiarize you with:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow
What is a Blog?
Types of Blogs
Blogging
Who is Blogging?
Defamation
Defamation Over
Websites and Blog Postings
Steps for Investigating Defamation
Over Websites and Blog Postings
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
What is a Blog
"Blog" is an abbreviated version of "weblog”
It is a term which is used to describe web sites that maintain
an ongoing chronicle of information
Blog is a frequently updated, personal website which features
diary-type commentary and links to articles on other Web sites
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Types of Blogs
By media types:
• Vlog: Comprising videos
• Linklog: Comprising links
• Sketchlog: Comprising portfolio of sketches
• Photolog: Comprising photos
By device:
• Mobile blogs (moblog): Blogs composed on any mobile phones
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Types of Blogs (cont’d)
Genre
• Blogs focusing on particular point or subject is a genre blog, for
example:
• Corporate blogs
• Political blogs
• Fashion blogs
• News blogs
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Blogging
Blogging is nothing but writing and maintaining a blog
• Information and Knowledge sharing
• Providing knowledge to others about any subject
• Exchanging information between customers and the ones who are blogging
• Relationships making
• Building relationships with readers of your blog
• Making customers evangelists through PR
Blogging is all about:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Who is Blogging?
Blogging can be done by
anybody who can access
the web
One who wants to share
his/her views, and
comment upon the
articles, can use
blogging
Companies promote
their products and
services through
blogging
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Blogosphere Growth
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Defamation over Websites and
Blog Postings
Defamation is a false and unprivileged statement of fact
that is harmful to someone’s reputation
It is published with fault meaning as a result of negligence
or malice
It frames a negative image of an individual, business,
product, group, government or nation
Defamation is also called as calumny, libel, slander, and
vilification
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Steps for Investigating Defamation
Over Websites and Blog Postings
1. • Search the content of blog in search engines
2. • Check the URL of the blog and webpage
4. • Check the copyright policy and disclaimers of blog and webpage
5. • Check the profile of author of the blog or webpage
6. • Check the comment for the blog posting and webpage
7. • Search in archive.org
8. • Check in Whois database for owner of the blog and webpage
9. • Search the email address and telephone numbers
10. • Check the physical location
11. • Determine jurisdictional area
12. • File a formal complaint with law enforcement agencies
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Search the Content of Blog in
Google
Search the content of the blog and webpage in the search engines
such as Google, Yahoo and Ask Jeeves to find out if same the
stuff is present in other blogs and webpages
Select sentences from the content and search it in the search
engines
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Check the URL of the
Blog/Webpage
Check whether it is the renowned website
Check the link popularity using the following websites:
• http://www.alexa.com/
• http://www.marketleap.com/publinkpop/default.htm
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Check the Copyright and Privacy
Policy
Check the copyright policy of the website to know about the copyright owner of
the content
Check the privacy policy which describes the method of content collection
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Check the Profile of Author of
the Blog/Web Post
Check name, address, photo, email address, telephone number if author has provided to
the website
• www.people.yahoo.com
• www.intelius.com
• www.bestpeoplesearch.com
• www.people-search-america.com
Check the name in the online people search tools
such as :
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Intelius Search
www.intelius.com
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Yahoo! People Search
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Satellite Picture of a Residence
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Best PeopleSearch
http://www.bestpeoplesearch.com/
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
People-Search-America.com
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Check the Comments for the
Blog
Read the comments for the blog/web posting by the readers
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Search in www.archive.org
Search the blog/website in the archive.org
Check blog/webpage updates frequency and time
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Search Results
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Check in Whois Database
Check the URL of the website in the Whois database to get personal details and contact
information about the owner of blog/webpage owner
• www.samspade.org
• www.geektools.com
• www.whois.net
• www.demon.net
• www.centralops.net
Online Whois services:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Whois Database Result
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Search the Email Address and
Telephone Number
Email address and telephone number can be found in contact page
of the website
Contact details of the content administrator can be found in the
copyright, privacy policy or contacts page of the website
Search the telephone numbers on the online telephone directories
such as:
• www.411.com
• www.thephonebook.bt.com
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Visit 411 and Search for
Telephone Numbers
http://www.411.com/
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Search for UK Telephone
Numbers at BT
http://www.thephonebook.bt.com/
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Check the Physical Location
Check the physical address of the author of blog posting or contents of web pages
Physical address of the website’s administrators is some times present in the contacts section of site
Physical location of web servers hosting webpages and blogs can also be determined by root trace tools and
utilities such as VisualRoute and tracert
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Summary
Blog is a frequently updated, personal website which features diary-type
commentary and links to articles on other websites
Blogging is nothing but writing and maintaining a blog
Blogging can be done by anybody who can access the web
Defamation is a false and unprivileged statement of fact that is harmful to
someone reputation
Email address and telephone number can be found in contact of the website
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

Más contenido relacionado

La actualidad más candente

Framing Search Engine Responsibilities
Framing Search Engine ResponsibilitiesFraming Search Engine Responsibilities
Framing Search Engine ResponsibilitiesEmily Laidlaw
 
Unraveling intermediary liability
Unraveling intermediary liabilityUnraveling intermediary liability
Unraveling intermediary liabilityEmily Laidlaw
 
What is a joke? The role of social media providers in regulating speech
What is a joke? The role of social media providers in regulating speechWhat is a joke? The role of social media providers in regulating speech
What is a joke? The role of social media providers in regulating speechEmily Laidlaw
 
The Human Rights Responsibilities of Internet Gatekeepers
The Human Rights Responsibilities of Internet GatekeepersThe Human Rights Responsibilities of Internet Gatekeepers
The Human Rights Responsibilities of Internet GatekeepersEmily Laidlaw
 
Pornography on the Internet
Pornography on the Internet Pornography on the Internet
Pornography on the Internet yadith_
 
Sopa (stop online piracy act)
Sopa (stop online piracy act)Sopa (stop online piracy act)
Sopa (stop online piracy act)kmcintire84
 
DPLP - September 2016 - RTBF
DPLP - September 2016 - RTBFDPLP - September 2016 - RTBF
DPLP - September 2016 - RTBFgkovacic
 
Social media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacySocial media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacyYasmin AbdelAziz
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speechUc Man
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for InvestigatorsCase IQ
 
Perspectivesmanage
PerspectivesmanagePerspectivesmanage
PerspectivesmanageArt Bowker
 
Presentation slides
Presentation slidesPresentation slides
Presentation slidesandrewdyoung
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronakRonak Karanpuria
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringementwcudsce
 
Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive? Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive? Lilian Edwards
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the InternetPhil Bradley
 

La actualidad más candente (20)

File000095
File000095File000095
File000095
 
Framing Search Engine Responsibilities
Framing Search Engine ResponsibilitiesFraming Search Engine Responsibilities
Framing Search Engine Responsibilities
 
Unraveling intermediary liability
Unraveling intermediary liabilityUnraveling intermediary liability
Unraveling intermediary liability
 
What is a joke? The role of social media providers in regulating speech
What is a joke? The role of social media providers in regulating speechWhat is a joke? The role of social media providers in regulating speech
What is a joke? The role of social media providers in regulating speech
 
The Human Rights Responsibilities of Internet Gatekeepers
The Human Rights Responsibilities of Internet GatekeepersThe Human Rights Responsibilities of Internet Gatekeepers
The Human Rights Responsibilities of Internet Gatekeepers
 
Pornography on the Internet
Pornography on the Internet Pornography on the Internet
Pornography on the Internet
 
Sopa (stop online piracy act)
Sopa (stop online piracy act)Sopa (stop online piracy act)
Sopa (stop online piracy act)
 
DPLP - September 2016 - RTBF
DPLP - September 2016 - RTBFDPLP - September 2016 - RTBF
DPLP - September 2016 - RTBF
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Social media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacySocial media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacy
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
Copyright & Fair Use for Digital Projects
Copyright & Fair Use for Digital ProjectsCopyright & Fair Use for Digital Projects
Copyright & Fair Use for Digital Projects
 
Illegal downloading
Illegal downloadingIllegal downloading
Illegal downloading
 
Perspectivesmanage
PerspectivesmanagePerspectivesmanage
Perspectivesmanage
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringement
 
Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive? Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive?
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the Internet
 

Similar a File000160

Fake news: Identifying, debunking and discussing false narratives with learners
Fake news: Identifying, debunking and discussing false narratives with learnersFake news: Identifying, debunking and discussing false narratives with learners
Fake news: Identifying, debunking and discussing false narratives with learnersLearningandTeaching
 
Presentation week5
Presentation week5Presentation week5
Presentation week5dede1986
 
Integrated social media marketing campaigns concept
Integrated social media marketing campaigns conceptIntegrated social media marketing campaigns concept
Integrated social media marketing campaigns conceptRalph Paglia
 
Integrated social media marketing campaigns concept
Integrated social media marketing campaigns conceptIntegrated social media marketing campaigns concept
Integrated social media marketing campaigns conceptSocial Media Marketing
 
Integrated social media marketing campaigns concept
Integrated social media marketing campaigns conceptIntegrated social media marketing campaigns concept
Integrated social media marketing campaigns conceptSocial Media Marketing
 
Hyperlinking & Online Journalism
Hyperlinking & Online JournalismHyperlinking & Online Journalism
Hyperlinking & Online Journalismcianginty
 
2011: NJ GMIS: Social Media and Transparency
2011: NJ GMIS: Social Media and Transparency2011: NJ GMIS: Social Media and Transparency
2011: NJ GMIS: Social Media and TransparencyCarol Spencer
 
Web 20 research Kapap
Web 20 research KapapWeb 20 research Kapap
Web 20 research Kapapbobonthedrums
 
Assignment 10 group coursework presentation of research part 2.5
Assignment 10   group coursework presentation of research part 2.5Assignment 10   group coursework presentation of research part 2.5
Assignment 10 group coursework presentation of research part 2.5rfasil22
 
Assignment 10 group coursework presentation of research part 2.5
Assignment 10   group coursework presentation of research part 2.5Assignment 10   group coursework presentation of research part 2.5
Assignment 10 group coursework presentation of research part 2.5ksumbland
 
Open Resources in Journalism
Open Resources in Journalism Open Resources in Journalism
Open Resources in Journalism Anubhuti yadav
 
WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal
WISE KIDS Leaflet: Online Content True, False, Inappropriate and IllegalWISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal
WISE KIDS Leaflet: Online Content True, False, Inappropriate and IllegalWISE KIDS
 
The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesM. Prabu Wibowo
 
Social Media and Intellectual Property
Social Media and Intellectual PropertySocial Media and Intellectual Property
Social Media and Intellectual PropertyPrimumMarketing
 
Going beyond google 2 philadelphia loss conference
Going beyond google 2 philadelphia loss conferenceGoing beyond google 2 philadelphia loss conference
Going beyond google 2 philadelphia loss conferencemikep007
 
Developing you public research profile
Developing you public research profile Developing you public research profile
Developing you public research profile Anna Jenkin
 
Assignment 10 group coursework presentation of research part 2.5
Assignment 10   group coursework presentation of research part 2.5Assignment 10   group coursework presentation of research part 2.5
Assignment 10 group coursework presentation of research part 2.5Abc Abc
 

Similar a File000160 (20)

Fake news: Identifying, debunking and discussing false narratives with learners
Fake news: Identifying, debunking and discussing false narratives with learnersFake news: Identifying, debunking and discussing false narratives with learners
Fake news: Identifying, debunking and discussing false narratives with learners
 
Cmc
CmcCmc
Cmc
 
Presentation week5
Presentation week5Presentation week5
Presentation week5
 
Integrated Social Media Campaigns
Integrated Social Media CampaignsIntegrated Social Media Campaigns
Integrated Social Media Campaigns
 
Integrated social media marketing campaigns concept
Integrated social media marketing campaigns conceptIntegrated social media marketing campaigns concept
Integrated social media marketing campaigns concept
 
Integrated social media marketing campaigns concept
Integrated social media marketing campaigns conceptIntegrated social media marketing campaigns concept
Integrated social media marketing campaigns concept
 
Integrated social media marketing campaigns concept
Integrated social media marketing campaigns conceptIntegrated social media marketing campaigns concept
Integrated social media marketing campaigns concept
 
Hyperlinking & Online Journalism
Hyperlinking & Online JournalismHyperlinking & Online Journalism
Hyperlinking & Online Journalism
 
2011: NJ GMIS: Social Media and Transparency
2011: NJ GMIS: Social Media and Transparency2011: NJ GMIS: Social Media and Transparency
2011: NJ GMIS: Social Media and Transparency
 
Web 20 research Kapap
Web 20 research KapapWeb 20 research Kapap
Web 20 research Kapap
 
Assignment 10 group coursework presentation of research part 2.5
Assignment 10   group coursework presentation of research part 2.5Assignment 10   group coursework presentation of research part 2.5
Assignment 10 group coursework presentation of research part 2.5
 
Assignment 10 group coursework presentation of research part 2.5
Assignment 10   group coursework presentation of research part 2.5Assignment 10   group coursework presentation of research part 2.5
Assignment 10 group coursework presentation of research part 2.5
 
Open Resources in Journalism
Open Resources in Journalism Open Resources in Journalism
Open Resources in Journalism
 
WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal
WISE KIDS Leaflet: Online Content True, False, Inappropriate and IllegalWISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal
WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal
 
The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal Issues
 
Social Media and Intellectual Property
Social Media and Intellectual PropertySocial Media and Intellectual Property
Social Media and Intellectual Property
 
3.4 Type of Website
3.4 Type of Website3.4 Type of Website
3.4 Type of Website
 
Going beyond google 2 philadelphia loss conference
Going beyond google 2 philadelphia loss conferenceGoing beyond google 2 philadelphia loss conference
Going beyond google 2 philadelphia loss conference
 
Developing you public research profile
Developing you public research profile Developing you public research profile
Developing you public research profile
 
Assignment 10 group coursework presentation of research part 2.5
Assignment 10   group coursework presentation of research part 2.5Assignment 10   group coursework presentation of research part 2.5
Assignment 10 group coursework presentation of research part 2.5
 

Más de Desmond Devendran (20)

Siam key-facts
Siam key-factsSiam key-facts
Siam key-facts
 
Siam foundation-process-guides
Siam foundation-process-guidesSiam foundation-process-guides
Siam foundation-process-guides
 
Siam foundation-body-of-knowledge
Siam foundation-body-of-knowledgeSiam foundation-body-of-knowledge
Siam foundation-body-of-knowledge
 
Enterprise service-management-essentials
Enterprise service-management-essentialsEnterprise service-management-essentials
Enterprise service-management-essentials
 
Service Integration and Management
Service Integration and Management Service Integration and Management
Service Integration and Management
 
Diagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_enDiagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_en
 
CHFI 1
CHFI 1CHFI 1
CHFI 1
 
File000176
File000176File000176
File000176
 
File000175
File000175File000175
File000175
 
File000174
File000174File000174
File000174
 
File000173
File000173File000173
File000173
 
File000172
File000172File000172
File000172
 
File000171
File000171File000171
File000171
 
File000170
File000170File000170
File000170
 
File000169
File000169File000169
File000169
 
File000168
File000168File000168
File000168
 
File000167
File000167File000167
File000167
 
File000166
File000166File000166
File000166
 
File000164
File000164File000164
File000164
 
File000163
File000163File000163
File000163
 

Último

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Último (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

File000160

  • 1. Module XLVII - Investigating Defamation over Websites and Blog Postings
  • 2. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited News: Model Sues Google Over ‘Skanky’ Blog Post Liskula Cohen filed a defamation suit to reveal blogger’s identity AccessAtlanta.com Staff Tuesday, January 06, 2009 Model Liskula Cohen, a Vogue cover girl, is suing Google over a blogger who named her the “#1 skanky superstar” on a blog hosted by the search engine’s subsidiary, according to a report in the New York Daily News. Cohen, who was in the news last year when she was hit in the face with a vodka bottle by a doorman at a Manhattan hot spot, filed the defamation suit to determine the identity of the blogger. “It’s petty, it’s stupid and it’s pathetic,” Cohen told the Daily News of the sniping. “And when I do find out who did this, at least I’ll know who my enemies are.” Her lawyer, Steven Wagner, admitted that it’s not easy to identify anonymous bloggers. “We think we have a case,” he said. “This is libelous, it’s defamatory and you shouldn’t just get away with this.” “I’m tall, I’m blond, I’ve been modeling for many years, and people get jealous,” Cohen said in the report. “If I had to deal with everyone who is jealous, I wouldn’t have time to do anything else.” Google declined to comment on the specifics in Cohen’s complaint. Source: http://www.accessatlanta.com/
  • 3. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited News: Woman Sues Over Facebook Photos Todd Cardy, court reporter January 10, 2009 06:00pm A WA woman has launched a defamation lawsuit over humiliating photos that were allegedly posted on Facebook and adult match-making websites. Court papers lodged with the WA Supreme Court reveal the woman, Nyree Howlett, has made the claim against a number of WA people linked to the popular websites, where users create profiles to post photos and information. She is seeking damages against four defendants for accessing and publishing private confidential material without her knowledge - believed to be revealing personal photographs of Ms Howlett. Written posts and photos were uploaded by the defendants on to social-networking site Facebook and adult online services adultfriendfinder.com and redhotpie.com.au and remained online for at least two weeks in January last year, the writ claims. Ms Howlett alleges the material was defamatory and she wants unspecified damages for defamation, equitable compensation, legal costs and an apology from the defendants. Source: http://www.news.com.au/
  • 4. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Objective • What is a Blog? • Types of Blogs • Blogging • Who is Blogging? • Blogosphere Growth • Defamation Over Websites and Blog Postings • Steps for Investigating Defamation Over Websites and Blog Postings This module will familiarize you with:
  • 5. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Flow What is a Blog? Types of Blogs Blogging Who is Blogging? Defamation Defamation Over Websites and Blog Postings Steps for Investigating Defamation Over Websites and Blog Postings
  • 6. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited What is a Blog "Blog" is an abbreviated version of "weblog” It is a term which is used to describe web sites that maintain an ongoing chronicle of information Blog is a frequently updated, personal website which features diary-type commentary and links to articles on other Web sites
  • 7. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Types of Blogs By media types: • Vlog: Comprising videos • Linklog: Comprising links • Sketchlog: Comprising portfolio of sketches • Photolog: Comprising photos By device: • Mobile blogs (moblog): Blogs composed on any mobile phones
  • 8. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Types of Blogs (cont’d) Genre • Blogs focusing on particular point or subject is a genre blog, for example: • Corporate blogs • Political blogs • Fashion blogs • News blogs
  • 9. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Blogging Blogging is nothing but writing and maintaining a blog • Information and Knowledge sharing • Providing knowledge to others about any subject • Exchanging information between customers and the ones who are blogging • Relationships making • Building relationships with readers of your blog • Making customers evangelists through PR Blogging is all about:
  • 10. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Who is Blogging? Blogging can be done by anybody who can access the web One who wants to share his/her views, and comment upon the articles, can use blogging Companies promote their products and services through blogging
  • 11. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Blogosphere Growth
  • 12. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Defamation over Websites and Blog Postings Defamation is a false and unprivileged statement of fact that is harmful to someone’s reputation It is published with fault meaning as a result of negligence or malice It frames a negative image of an individual, business, product, group, government or nation Defamation is also called as calumny, libel, slander, and vilification
  • 13. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Steps for Investigating Defamation Over Websites and Blog Postings 1. • Search the content of blog in search engines 2. • Check the URL of the blog and webpage 4. • Check the copyright policy and disclaimers of blog and webpage 5. • Check the profile of author of the blog or webpage 6. • Check the comment for the blog posting and webpage 7. • Search in archive.org 8. • Check in Whois database for owner of the blog and webpage 9. • Search the email address and telephone numbers 10. • Check the physical location 11. • Determine jurisdictional area 12. • File a formal complaint with law enforcement agencies
  • 14. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Search the Content of Blog in Google Search the content of the blog and webpage in the search engines such as Google, Yahoo and Ask Jeeves to find out if same the stuff is present in other blogs and webpages Select sentences from the content and search it in the search engines
  • 15. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Check the URL of the Blog/Webpage Check whether it is the renowned website Check the link popularity using the following websites: • http://www.alexa.com/ • http://www.marketleap.com/publinkpop/default.htm
  • 16. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Check the Copyright and Privacy Policy Check the copyright policy of the website to know about the copyright owner of the content Check the privacy policy which describes the method of content collection
  • 17. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Check the Profile of Author of the Blog/Web Post Check name, address, photo, email address, telephone number if author has provided to the website • www.people.yahoo.com • www.intelius.com • www.bestpeoplesearch.com • www.people-search-america.com Check the name in the online people search tools such as :
  • 18. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Intelius Search www.intelius.com
  • 19. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Yahoo! People Search
  • 20. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Satellite Picture of a Residence
  • 21. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Best PeopleSearch http://www.bestpeoplesearch.com/
  • 22. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited People-Search-America.com
  • 23. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Check the Comments for the Blog Read the comments for the blog/web posting by the readers
  • 24. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Search in www.archive.org Search the blog/website in the archive.org Check blog/webpage updates frequency and time
  • 25. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Search Results
  • 26. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Check in Whois Database Check the URL of the website in the Whois database to get personal details and contact information about the owner of blog/webpage owner • www.samspade.org • www.geektools.com • www.whois.net • www.demon.net • www.centralops.net Online Whois services:
  • 27. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Whois Database Result
  • 28. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Search the Email Address and Telephone Number Email address and telephone number can be found in contact page of the website Contact details of the content administrator can be found in the copyright, privacy policy or contacts page of the website Search the telephone numbers on the online telephone directories such as: • www.411.com • www.thephonebook.bt.com
  • 29. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Visit 411 and Search for Telephone Numbers http://www.411.com/
  • 30. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Search for UK Telephone Numbers at BT http://www.thephonebook.bt.com/
  • 31. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Check the Physical Location Check the physical address of the author of blog posting or contents of web pages Physical address of the website’s administrators is some times present in the contacts section of site Physical location of web servers hosting webpages and blogs can also be determined by root trace tools and utilities such as VisualRoute and tracert
  • 32. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Summary Blog is a frequently updated, personal website which features diary-type commentary and links to articles on other websites Blogging is nothing but writing and maintaining a blog Blogging can be done by anybody who can access the web Defamation is a false and unprivileged statement of fact that is harmful to someone reputation Email address and telephone number can be found in contact of the website
  • 33. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 34. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited