Knowledge (XXG)

CheckUser

Source 📝

66: 89: 652: 120:
falsely claimed to have multiple university degrees. He attained a position of community trust and became a CheckUser. This was a Knowledge (XXG) problem because according to Kozminski University, IP addresses are considered sensitive information. The general concern with this position is that it can
73:
When attempts are made to continue spamming unblocked, an army of accounts is needed. CheckUsers detects if the accounts all have the same IP range. As open proxies are blocked, this forces threat actors to resort to botnets. CheckUsers helped uncover at least 381 editors writing promotional material
57:
CheckUsers target abusive users, which are blocked or banned to protect the wiki from harm. Although they are held to a higher professional standard, CheckUsers do not have greater control of articles. However, the role has been categorized, alongside the "Oversight" role, as the second-highest level
112:
British conservative politicians denied allegations that an account belonged to their chairman. In the end, the disclosure of personal information was found to be unjustified and tenuous for the case. The accuser's CheckUser permissions were removed to prevent biased exertion of "political or social
108:
administrators conspired to coordinate the abuse they were normally elected to defend against. One co-conspirator CheckUser was installed to "eventually fabricate checkuser data to try and secure innocence." By controlling this position, the cabal had free reign to successfully violate Knowledge
48:
of a account to enforce blocks. Together with manual inspection, it assists in uncovering illegitimate behavior such as spam. This protects the wiki from disruption by any particular group or individual. It can also show all edits from an IP including those by registered users.
82: 294:
Check users are higher privileged editors, who have access to private information regarding editors and edits, such as the IP address from which an editor has logged in.
96:
Transparency is promoted by keeping logs of CheckUser usage. Ombudsmen exist to supplement self-regulation with audits and maintain the privacy policy.
589: 307: 259: 240: 480:"Governance Capture in a Self-Governing Community: A Qualitative Comparison of the Croatian, Serbian, Bosnian, and Serbo-Croatian Wikipedias" 445: 408: 350: 220: 528: 462: 656: 85:
scandal. Keeping access to registered accounts' IP addresses limited to CheckUsers helps protect the privacy of users.
140:"From open-source software to Knowledge (XXG): 'Backgrounding' trust by collective monitoring and reputation tracking" 590:"Trust, Control, and Formalization in Open-Collaboration Communities: A Qualitative Study of Knowledge (XXG)" 241:"The [Knowledge (XXG)] world is not flat: 22nd European Conference on Information Systems, ECIS 2014" 677: 308:"Quality assessment process in Knowledge (XXG)'s Vetrina: the role of the community's policies and rules" 31: 464:
The Political Economy of Wikiality: A South African Inquiry into Knowledge and Power on Knowledge (XXG)
105: 367: 81:
Edits attributed to an IP address are not fully anonymous but can be traced back as they were in the
335:
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing
199:
West, Andrew G.; Chang, Jian; Venkatasubramanian, Krishna; Sokolsky, Oleg; Lee, Insup (2011-09-01).
491: 205:
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference
179:"Self-Regulation: How Knowledge (XXG) Leverages User-Generated Quality Control Under Section 230" 117: 645: 624: 536: 509: 441: 404: 375: 346: 216: 159: 139: 616: 609:"Your Day in 'Wiki-Court': ADR, Fairness, and Justice in Knowledge (XXG)'s Global Community" 501: 433: 338: 208: 151: 672: 65: 403:. History and Foundations of Information Science. Cambridge, Mass. London: MIT Press. 264:
Department of Information Systems School of Computing National University of Singapore
666: 425: 330: 200: 45: 59: 563: 75: 337:. CSCW '15. New York, NY, USA: Association for Computing Machinery: 1092–1105. 432:. WikiSym '07. New York, NY, USA: Association for Computing Machinery: 75–86. 329:
Arazy, Ofer; Ortega, Felipe; Nov, Oded; Yeo, Lisa; Balila, Adam (2015-02-28).
155: 628: 540: 513: 379: 207:. CEAS '11. New York, NY, USA: Association for Computing Machinery: 152–161. 163: 437: 342: 212: 88: 651: 247:. ECIS 2014 Proceedings - 22nd European Conference on Information Systems. 620: 479: 121:
be inappropriately used to unmask what should remain anonymous accounts.
17: 278: 608: 245:
ECIS 2014 Proceedings - 22nd European Conference on Information Systems
78:
extortion scam. The cleanup of articles was deferred to other editors.
478:
Kharazian, Zarine; Starbird, Kate; Hill, Benjamin Mako (2024-04-17).
505: 178: 496: 467:(Master of Arts in Media Studies thesis). University of Cape Town. 318:. Università degli Studi di Torino: 148–161 – via CiteSeerX. 87: 64: 527:
Ramesh, Randeep; Perraudin, Frances; Mason, Rowena (2015-04-22).
368:"Knowledge (XXG) bans 381 accounts for secretly promoting brands" 41: 529:"Nick Clegg mocks Grant Shapps over Knowledge (XXG) affair" 426:"Quantitative analysis of thewikipedia community of users" 424:
Ortega, Felipe; Gonzalez Barahona, Jesus M. (2007-10-21).
83:
United States congressional staff edits to Knowledge (XXG)
279:"A Case Study of Sockpuppet Detection in Knowledge (XXG)" 430:
Proceedings of the 2007 international symposium on Wikis
401:
Good faith collaboration: the culture of Knowledge (XXG)
30:
For information about CheckUser on Knowledge (XXG), see
331:"Functional Roles and Career Paths in Knowledge (XXG)" 484:
Proceedings of the ACM on Human-Computer Interaction
177:
Walsh, Kathleen M.; Lam, Sarah (February 23, 2010).
564:"Censure for Grant Shapps' Knowledge (XXG) accuser" 27:Wiki function for investigating user IP addresses 239:Arazy, Ofer; Nov, Oded; Ortega, Felipe (2014). 277:Solorio, T.; Hasan, Ragib; Mizan, M. (2013). 8: 201:"Link spamming Knowledge (XXG) for profit" 495: 284:. The University of Alabama at Birmingham 130: 109:(XXG) policies while editing articles. 558: 556: 588:Jemielniak, Dariusz (5 August 2012). 260:"KNOWLEDGE CONTRIBUTION IN WIKIPEDIA" 7: 234: 232: 194: 192: 62:'s power hierarchy, below founder. 25: 144:Ethics and Information Technology 650: 138:de Laat, Paul B. (2014-06-01). 1: 366:Culpan, Daniel (2015-09-01). 312:Observatorio (OBS*) Journal 694: 646:CheckUser at mediawiki.org 399:Reagle, Joseph M. (2012). 29: 156:10.1007/s10676-014-9342-9 32:Knowledge (XXG):CheckUser 106:Croatian Knowledge (XXG) 613:SSRN Electronic Journal 461:Ovesen, Håvard (2014). 438:10.1145/1296951.1296960 343:10.1145/2675133.2675257 213:10.1145/2030376.2030394 596:– via CiteSeerX. 266:– via CiteSeerX. 258:Ru Hong, Seah (2006). 93: 70: 44:that investigates the 306:Monaci, Sara (2009). 91: 68: 659:at Wikimedia Commons 621:10.2139/ssrn.2495196 594:Kozminski University 657:MediaWiki CheckUser 607:Ross, Sara (2014). 40:is a function of a 94: 71: 655:Media related to 447:978-1-59593-861-9 410:978-0-262-01447-2 352:978-1-4503-2922-4 222:978-1-4503-0788-8 16:(Redirected from 685: 654: 633: 632: 604: 598: 597: 585: 579: 578: 576: 575: 560: 551: 550: 548: 547: 524: 518: 517: 499: 475: 469: 468: 458: 452: 451: 421: 415: 414: 396: 390: 389: 387: 386: 363: 357: 356: 326: 320: 319: 303: 297: 296: 291: 289: 283: 274: 268: 267: 255: 249: 248: 236: 227: 226: 196: 187: 186: 174: 168: 167: 135: 74:and running the 21: 693: 692: 688: 687: 686: 684: 683: 682: 663: 662: 642: 637: 636: 606: 605: 601: 587: 586: 582: 573: 571: 562: 561: 554: 545: 543: 526: 525: 521: 506:10.1145/3637338 490:(CSCW1): 1–26. 477: 476: 472: 460: 459: 455: 448: 423: 422: 418: 411: 398: 397: 393: 384: 382: 365: 364: 360: 353: 328: 327: 323: 305: 304: 300: 287: 285: 281: 276: 275: 271: 257: 256: 252: 238: 237: 230: 223: 198: 197: 190: 176: 175: 171: 137: 136: 132: 127: 102: 60:Knowledge (XXG) 55: 35: 28: 23: 22: 15: 12: 11: 5: 691: 689: 681: 680: 678:Access control 675: 665: 664: 661: 660: 648: 641: 640:External links 638: 635: 634: 599: 580: 552: 519: 470: 453: 446: 416: 409: 391: 358: 351: 321: 298: 269: 250: 228: 221: 188: 169: 150:(2): 157–169. 129: 128: 126: 123: 101: 98: 69:User interface 54: 51: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 690: 679: 676: 674: 671: 670: 668: 658: 653: 649: 647: 644: 643: 639: 630: 626: 622: 618: 614: 610: 603: 600: 595: 591: 584: 581: 569: 565: 559: 557: 553: 542: 538: 534: 530: 523: 520: 515: 511: 507: 503: 498: 493: 489: 485: 481: 474: 471: 466: 465: 457: 454: 449: 443: 439: 435: 431: 427: 420: 417: 412: 406: 402: 395: 392: 381: 377: 373: 369: 362: 359: 354: 348: 344: 340: 336: 332: 325: 322: 317: 313: 309: 302: 299: 295: 280: 273: 270: 265: 261: 254: 251: 246: 242: 235: 233: 229: 224: 218: 214: 210: 206: 202: 195: 193: 189: 184: 180: 173: 170: 165: 161: 157: 153: 149: 145: 141: 134: 131: 124: 122: 119: 116:A user named 114: 110: 107: 99: 97: 90: 86: 84: 79: 77: 67: 63: 61: 52: 50: 47: 43: 39: 33: 19: 612: 602: 593: 583: 572:. Retrieved 570:. 2015-06-08 567: 544:. Retrieved 533:The Guardian 532: 522: 487: 483: 473: 463: 456: 429: 419: 400: 394: 383:. Retrieved 371: 361: 334: 324: 315: 311: 301: 293: 286:. Retrieved 272: 263: 253: 244: 204: 182: 172: 147: 143: 133: 115: 111: 103: 95: 80: 72: 56: 46:IP addresses 37: 36: 104:A cabal of 76:Orangemoody 667:Categories 574:2024-08-20 546:2024-08-20 497:2311.03616 385:2024-08-20 125:References 113:control". 629:1556-5068 541:0261-3077 514:2573-0142 380:1059-1028 288:26 August 164:1572-8439 100:Incidents 92:Audit log 38:CheckUser 18:Checkuser 568:BBC News 53:Purpose 627:  539:  512:  444:  407:  378:  349:  219:  162:  118:Essjay 673:Wikis 492:arXiv 372:Wired 282:(PDF) 625:ISSN 537:ISSN 510:ISSN 442:ISBN 405:ISBN 376:ISSN 347:ISBN 290:2024 217:ISBN 183:SSRN 160:ISSN 42:wiki 617:doi 502:doi 434:doi 339:doi 209:doi 152:doi 58:in 669:: 623:. 615:. 611:. 592:. 566:. 555:^ 535:. 531:. 508:. 500:. 486:. 482:. 440:. 428:. 374:. 370:. 345:. 333:. 314:. 310:. 292:. 262:. 243:. 231:^ 215:. 203:. 191:^ 181:. 158:. 148:16 146:. 142:. 631:. 619:: 577:. 549:. 516:. 504:: 494:: 488:8 450:. 436:: 413:. 388:. 355:. 341:: 316:8 225:. 211:: 185:. 166:. 154:: 34:. 20:)

Index

Checkuser
Knowledge (XXG):CheckUser
wiki
IP addresses
Knowledge (XXG)

Orangemoody
United States congressional staff edits to Knowledge (XXG)

Croatian Knowledge (XXG)
Essjay
"From open-source software to Knowledge (XXG): 'Backgrounding' trust by collective monitoring and reputation tracking"
doi
10.1007/s10676-014-9342-9
ISSN
1572-8439
"Self-Regulation: How Knowledge (XXG) Leverages User-Generated Quality Control Under Section 230"


"Link spamming Knowledge (XXG) for profit"
doi
10.1145/2030376.2030394
ISBN
978-1-4503-0788-8


"The [Knowledge (XXG)] world is not flat: 22nd European Conference on Information Systems, ECIS 2014"
"KNOWLEDGE CONTRIBUTION IN WIKIPEDIA"
"A Case Study of Sockpuppet Detection in Knowledge (XXG)"
"Quality assessment process in Knowledge (XXG)'s Vetrina: the role of the community's policies and rules"

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.