387:: "Unlike most books and journal articles, which undergo strict editorial review before publication, much of the information on the Web is self-published. To be sure, there are many websites in which you can have confidence: mainstream newspapers, refereed electronic journals, and university, library, and government collections of data. But for vast amounts of Web-based information, no impartial reviewers have evaluated the accuracy or fairness of such material before it's made instantly available across the globe."
305:"In December 1999, for example, a U.S. District Court in Salt Lake City, Utah, granted a preliminary injunction against a religious organization that maintained a website that established links to other sites containing material that infringed on the plaintiff's copyright. The court ruled that the links constituted "contributory infringement" and ordered them removed. However, this remains a developing area of case law.
363:(those without a conflict of interest) validating the reliability of the content. Further examples of self-published sources include press releases, the material contained within company websites, advertising campaigns, material published in media by the owner(s)/publisher(s) of the media group, self-released music albums, and electoral
65:
43:
143:
heavily on rumors and personal opinions are questionable sources. Questionable sources are generally unsuitable for citing contentious claims about third parties, which includes claims against institutions, persons living or dead, as well as more ill-defined entities. The proper uses of a questionable source are very limited.
374:
states: "Most pages found in general search engines for the web are self-published or published by businesses small and large with motives to get you to buy something or believe a point of view. Even within university and library web sites, there can be many pages that the institution does not try to
142:
are any accidental or unauthorized disclosure of, or access to sensitive, protected or confidential data. Normally, when leaks are published, they usually are done so by an "anonymous insider", a whistleblower or a hacker. Leaks that are published to promote or advocate for something or that rely
264:
about other living people, even if the publisher is an expert, well-known professional researcher, or writer. Exercise caution when using such sources: if the information in question is suitable for inclusion, someone else will probably have published it in independent, reliable sources.
166:
A leak is not notable unless it results in some other action that is notable, such as being directly responded to or the leak itself receiving broad media coverage. Do not add leaks to articles unless a notable
131:
Leaks are hard to verify and can violate copyright. Some editors allege that it is illegal to link to leaked data or that it is immoral to link to leaks, because it can place people in harm's way or violate
249:
for the fact that the alleged leak contains or says certain things, but not necessarily for any claims that the contents are true, correct, unfabricated, actually happened, etc.
191:) that is unsourced or poorly sourced—whether the material is negative, positive, neutral, or just questionable—must be removed immediately and without waiting for discussion.
462:
442:
17:
430:
425:
420:
415:
410:
437:
203:
should not be linked, whether in an external-links section or in a citation. Knowingly directing others to material that violates copyright might be considered
188:
32:
338:
371:
171:
of the leak can be properly sourced to the same regular, reliable media sources that would be expected for any other content in the article.
92:
It contains the advice or opinions of one or more
Knowledge (XXG) contributors. This page is not an encyclopedia article, nor is it one of
93:
204:
396:
states, "Any site that does not have a specific publisher or sponsoring body should be treated as unpublished or self-published work."
380:
393:
155:
77:
24:
342:
457:
210:
Linking to a page that illegally distributes someone else's work casts a bad light on
Knowledge (XXG) and its editors.
207:. If there is reason to believe that a website has a copy of a work in violation of its copyright, do not link to it.
184:
85:
200:
28:
346:
97:
107:
81:
272:, such as through press releases or personal websites. Such material may be used as a source only if:
51:
unless reported by a reliable source, leaks should not normally be used or cited directly in articles
133:
73:
187:
to a reliable, published source. Leaks and other contentious material about living persons (or,
246:
147:
242:
261:
232:, where due care should be taken to avoid linking to material that violates copyright.
451:
100:. Some essays represent widespread norms; others only represent minority viewpoints.
139:
364:
282:
it does not involve claims about events not directly related to the subject;
256:
be considered reliable when reported by reliable, independent publications.
225:
217:
213:
229:
221:
315:
154:, leaks should not normally be used or cited directly in articles.
431:
Knowledge (XXG):Reliable sources/Perennial sources § WikiLeaks
59:
37:
438:
Knowledge (XXG):External links/Perennial websites § WikiLeaks
416:
Knowledge (XXG):Reliable sources/Perennial sources § LiveLeak
268:
There are living persons and organisations who leak material
426:
Knowledge (XXG):Reliable sources/Perennial sources § YouTube
212:
This is particularly relevant when linking to sites such as
421:
Knowledge (XXG):Reliable sources/Perennial sources § Scribd
150:. Information and interpretation is subject to change, and
29:
Knowledge (XXG):Copyrights § Linking to copyrighted works
443:
Knowledge (XXG):WikiLeaks is not part of
Knowledge (XXG)
314:
Please do note that any exceptional claim would require
285:
there is no reasonable doubt as to its authenticity; and
18:
Knowledge (XXG):WikiLeaks is not part of
Knowledge (XXG)
115:
245:
a leak by putting it online. Self-published leaks are
199:
Material that violates the copyrights of others per
288:
the article is not based primarily on such sources.
16:"WP:LEAKS" redirects here. Not to be confused with
411:Knowledge (XXG):Reliable sources/Perennial sources
359:Self-published material is characterized by the
279:it does not involve claims about third parties;
383:offers this understanding in its publication,
463:Knowledge (XXG) essays about reliable sources
33:Knowledge (XXG):Biographies of living persons
8:
158:that report on leaks can be cited normally.
372:University of California, Berkeley, library
339:"Hypertext Linking and Copyright Issues"
94:Knowledge (XXG)'s policies or guidelines
330:
298:
385:Academic Integrity at Princeton (2011)
394:Chicago Manual of Style, 16th Edition
181:challenged or likely to be challenged
7:
201:contributors' rights and obligations
152:unless reported by a reliable source
23:For Knowledge (XXG)'s policies, see
205:contributory copyright infringement
98:thoroughly vetted by the community
14:
189:in some cases, recently deceased
179:All quotations and any material
63:
57:Essay on editing Knowledge (XXG)
41:
25:Knowledge (XXG):Reliable sources
276:it is not unduly self-serving;
82:linking to copyright materials
1:
361:lack of independent reviewers
175:Biographies of living persons
343:American Library Association
260:use self-published leaks as
146:Even if verified, leaks are
479:
105:
22:
15:
183:must be supported by an
49:This page in a nutshell:
458:Knowledge (XXG) essays
345:(ALA). Archived from
252:Self-published leaks
96:, as it has not been
381:Princeton University
237:Self-published leaks
140:Leaks of information
316:exceptional sources
262:independent sources
126:
125:
55:
54:
470:
399:
357:
351:
350:
349:on May 26, 2015.
335:
319:
312:
306:
303:
270:about themselves
195:Copyright issues
156:Reliable sources
118:
78:reliable sources
67:
66:
60:
45:
44:
38:
478:
477:
473:
472:
471:
469:
468:
467:
448:
447:
407:
402:
358:
354:
337:
336:
332:
328:
323:
322:
313:
309:
304:
300:
295:
247:primary sources
239:
197:
185:inline citation
177:
164:
148:primary sources
122:
121:
114:
110:
102:
101:
64:
58:
42:
36:
21:
12:
11:
5:
476:
474:
466:
465:
460:
450:
449:
446:
445:
440:
435:
434:
433:
428:
423:
418:
406:
403:
401:
400:
398:
397:
389:
388:
377:
376:
352:
329:
327:
324:
321:
320:
307:
297:
296:
294:
291:
290:
289:
286:
283:
280:
277:
238:
235:
196:
193:
176:
173:
163:
160:
129:Common issues:
124:
123:
120:
119:
111:
106:
103:
91:
90:
86:external links
70:
68:
56:
53:
52:
46:
13:
10:
9:
6:
4:
3:
2:
475:
464:
461:
459:
456:
455:
453:
444:
441:
439:
436:
432:
429:
427:
424:
422:
419:
417:
414:
413:
412:
409:
408:
404:
395:
391:
390:
386:
382:
379:
378:
373:
369:
368:
366:
362:
356:
353:
348:
344:
340:
334:
331:
325:
317:
311:
308:
302:
299:
292:
287:
284:
281:
278:
275:
274:
273:
271:
266:
263:
259:
255:
250:
248:
244:
236:
234:
233:
231:
227:
223:
219:
215:
208:
206:
202:
194:
192:
190:
186:
182:
174:
172:
170:
161:
159:
157:
153:
149:
144:
141:
137:
135:
130:
117:
113:
112:
109:
104:
99:
95:
89:
87:
83:
79:
75:
69:
62:
61:
50:
47:
40:
39:
34:
30:
26:
19:
384:
360:
355:
347:the original
333:
310:
301:
269:
267:
257:
253:
251:
243:self-publish
240:
211:
209:
198:
180:
178:
168:
165:
151:
145:
138:
128:
127:
71:
48:
241:Anyone can
169:consequence
72:This is an
452:Categories
365:manifestos
326:References
162:Notability
375:oversee."
226:WikiLeaks
88:policies.
405:See also
218:LiveLeak
214:Cryptome
116:WP:LEAKS
108:Shortcut
230:YouTube
134:privacy
222:Scribd
31:, and
293:Notes
258:Never
228:, or
74:essay
392:The
370:The
84:and
254:may
136:.
76:on
454::
367::
341:.
224:,
220:,
216:,
80:,
27:,
318:.
35:.
20:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.