Premium Essay

The Integrity Of Wikipedia

Submitted By
Words 1046
Pages 5
y edit that changes content in a way that deliberately compromises the integrity of Wikipedia is considered vandalism. The most common and obvious types of vandalism include insertion of obscenities and crude humor. Vandalism can also include advertising language and other types of spam.[68] Sometimes editors commit vandalism by removing information or entirely blanking a given page. Less common types of vandalism, such as the deliberate addition of plausible but false information to an article, can be more difficult to detect. Vandals can introduce irrelevant formatting, modify page semantics such as the page's title or categorization, manipulate the underlying code of an article, or use images disruptively.[69]

White-haired elderly gentleman …show more content…
Further, Wikipedia intends to convey only knowledge that is already established and recognized.[79] It must not present original research. A claim that is likely to be challenged requires a reference to a reliable source. Among Wikipedia editors, this is often phrased as "verifiability, not truth" to express the idea that the readers, not the encyclopedia, are ultimately responsible for checking the truthfulness of the articles and making their own interpretations.[80] This can at times lead to the removal of information that is valid.[81] Finally, Wikipedia must not take sides.[82] All opinions and viewpoints, if attributable to external sources, must enjoy an appropriate share of coverage within an article.[83] This is known as neutral point of view (NPOV).

Governance
Wikipedia's initial anarchy integrated democratic and hierarchical elements over time.[84][85] An article is not considered to be owned by its creator or any other editor and is not vetted by any recognized authority.[86] Wikipedia's contributors avoid a tragedy of the commons by internalizing benefits. They do this by …show more content…
Although disputes usually arise from a disagreement between two opposing views on how an article should read, the Arbitration Committee explicitly refuses to directly rule on the specific view that should be adopted. Statistical analyses suggest that the committee ignores the content of disputes and rather focuses on the way disputes are conducted,[96] functioning not so much to resolve disputes and make peace between conflicting editors, but to weed out problematic editors while allowing potentially productive editors back in to participate. Therefore, the committee does not dictate the content of articles, although it sometimes condemns content changes when it deems the new content violates Wikipedia policies (for example, if the new content is considered biased). Its remedies include cautions and probations (used in 63% of cases) and banning editors from articles (43%), subject matters (23%) or Wikipedia (16%). Complete bans from Wikipedia are generally limited to instances of impersonation and anti-social behavior. When conduct is not impersonation or anti-social, but rather anti-consensus or in violation of editing policies, remedies tend to be limited to

Similar Documents

Premium Essay

Academic Integrity

...Academic Integrity 1 Academic Integrity David Gillens Touro University Academic Integrity 2 Why Cheat & How do we Prevent it Studies consistently reveal that at least half of college students admit to cheating at some time in their academic careers (angell, 2006, Roig & Caso, 2005: Whitley,1998).Some researchers have found even higher rates , including self-report evidence that 80% or more students cheat in college.( Cochran, Chamlin, Wood, & Sellers The Most common form of cheating is plagiarism .Here we find two types of cheats those who do it intentionally and those who do it unintentionally. Academic Integrity 3 Plagiarism Studies have demonstrated that a large proportion of college students are not informed about the principles of properly quoting and citing others work (Roig, 1997, 1999). I know for myself that I did learn and was not taught how to do so in high school nor in my first year of college being that I was a physical education major writing papers were not a major requirement in my freshman year. So I never learned about quoting, citing or even how to do research for a paper. Which can be another source of plagiarism or just producing poor quality papers? Some students can do research using non-credible sources...

Words: 526 - Pages: 3

Premium Essay

Cia Extended Triad

...CSS150-1302B-01: Introduction to Computer Security Week 1 Individual Project Brian Frank Colorado Technical University Online 5/27/2013 Name and describe the seven different categories of the Expanded CIA triangle. The seven expanded categories to the Expanded CIA Triad include Confidentiality, Integrity, Availability, Accuracy, Authenticity, Utility, and Possession (Northeastern University, n.d.). * Confidentiality is only allowing access of data to authorized personnel (Kim and Solomon, 2012). * Integrity is the accuracy and validity of data, only authorized persons can edit information (Kim and Solomon, 2012). * Availability is the amount of time authorized users can use an application, data, and/or a system (Kim and Solomon, 2012). * Accuracy is data free from errors or mistakes and has the value that the end user expects (Northeastern University, n.d.) * Authenticity is the original state of data and not a reproduction (Northeastern University, n.d.). * Utility is the state of having value or quality for some purpose (Northeastern University, n.d.). * Possession is the control state of ownership of an item (Northeastern University, n.d.). Provide a summary of the security goal of each category of the Expanded CIA triangle. * Confidentiality keeps unauthorized persons from data sensitive to the nature of its business, clients, or users (Kim and Solomon, 2012). This keeps unauthorized persons from data...

Words: 1086 - Pages: 5

Premium Essay

Breach of Professional Accounting Ethics

... the employees, its co-workers, and between the business and its customers. When ethical lapses of trust becomes rampant, employee productivity declines, loyalty follows, and soon major breaches such as employee theft begin to appear (Calle, 2009). It is said that “Ethical integrity involves reporting others acting in dangerous or illegal way. The term whistleblowers are people who choose to expose wrongdoings, usually at the expense of their careers (Capozzi, 2008).” Ronald Jeurissen, author of “Ethics and Business,” says that whistle-blowing has moral considerations. For instance, the person should be sure the negative consequences to the company of such exposure do not outweigh the benefit to the public. When professional accounting ethics are breached accountants may expect to lose their job, or may even end up spending time in jail depending on the crime. As part of the largest financial fraud in U.S. history, in March 2009 David Friehling an American accountant was arrested and charged for his role in the Madoff investment scandal. For many years, Bernard L. Madoff Investment Securities LLC books were audited by Friehling & Horowitz, a little-known accounting firm in New City, New York (Wikipedia, 2009). The firm consisted of two principles-Friehling and...

Words: 1440 - Pages: 6

Premium Essay

Erik Erikson

...death.” Erikson said each stage requires resolution before the next stage could be settled properly. In the first stage, which is called Trust versus Mistrust a child develops trust towards an individual or group of people due to their continuous generosity of providing food and warmth to them. If the child’s needs are met properly the child will develop a stronger relationship with the caregiver and develop a greater sense of optimism and kindness towards themselves as well as others. Erikson also says that if the child’s needs are not met then the child will face problems like being mistrustful and insecure. In the final stage, which is Integrity versus Despair Erikson explains that when we grow older and contemplate about our entire life we either develop a strong integrity or woeful despair towards the life we have lived. The integrity we believe is shown through a successful and virtuous life while the despair we develop is influenced by regrets and of past memories we are not fond of....

Words: 361 - Pages: 2

Premium Essay

Information Security Technologies

...Research Paper: Information Security Technologies by Benjamin Tomhave November 10, 2004 Prepared for: Professor Dave Carothers EMSE 218 The George Washington University This paper or presentation is my own work. Any assistance I received in its preparation is acknowledged within the paper or presentation, in accordance with academic practice. If I used data, ideas, words, diagrams, pictures, or other information from any source, I have cited the sources fully and completely in footnotes and bibliography entries. This includes sources which I have quoted or paraphrased. Furthermore, I certify that this paper or presentation was prepared by me specifically for this class and has not been submitted, in whole or in part, to any other class in this University or elsewhere, or used for any purpose other than satisfying the requirements of this class, except that I am allowed to submit the paper or presentation to a professional publication, peer reviewed journal, or professional conference. In adding my name following the word 'Signature', I intend that this certification will have the same authority and authenticity as a document executed with my hand-written signature. Signature _____Benjamin L. Tomhave________________________ Benjamin L. Tomhave 12/7/2004 1 Research Paper: Information Security Technologies by Benjamin L. Tomhave Abstract The following research paper provides analysis of thirteen (13) information security technology topics, arranged in ten (10)...

Words: 12903 - Pages: 52

Free Essay

Wikipedia

...Any edit that changes content in a way that deliberately compromises the integrity of Wikipedia is considered vandalism. The most common and obvious types of vandalism include insertion of obscenities and crude humor. Vandalism can also include advertising language, and other types of spam.[48] Sometimes editors commit vandalism by removing information or entirely blanking a given page. Less common types of vandalism, such as the deliberate addition of plausible but false information to an article, can be more difficult to detect. Vandals can introduce irrelevant formatting, modify page semantics such as the page's title or categorization, manipulate the underlying code of an article, or utilize images disruptively.[49] White-haired elderly gentleman in suit and tie speaks at a podium. John Seigenthaler has described Wikipedia as "a flawed and irresponsible research tool".[50] Obvious vandalism is generally easy to remove from wiki articles; in practice, the median time to detect and fix vandalism is a few minutes.[19][20] However, in one high-profile incident in 2005, false information was introduced into the biography of American political figure John Seigenthaler and remained undetected for four months.[50] He was falsely accused of being a suspect in the assassination of John F. Kennedy by an anonymous user, but was actually an administrative assistant to President Kennedy.[50] Seigenthaler, the founding editorial director of USA Today and founder of the Freedom...

Words: 424 - Pages: 2

Premium Essay

Leg 500 Assignment 1

...where an employee can reasonably expect to have privacy. Employees who are concerned about their privacy rights and questioning whether their privacy rights have been violated should refer to case law related to “Intrusion upon seclusion occurs when a perpetrator intentionally intrudes, physically, electronically, or otherwise, upon the private space, solitude, or seclusion of a person, or the private affairs or concerns of a person, by use of the perpetrator's physical senses or by electronic device or devices to oversee or overhear the person's private affairs, or by some other form of investigation, examination, or observation intrude upon a person's private matters if the intrusion would be highly offensive to a reasonable person.” [ (Wikipedia, 2011) ]. In the office workplace there are typically two types of workspaces, an open area, in which there are several desks and where conversations can be overhead, or an enclosed office, in which when the door is closed—conversations cannot be heard and where one would expect virtually total privacy. Explain whether it makes a difference if an employee is in an open area or in an enclosed office. Being in an enclosed office provides no more reasonable expectation to privacy than being in an open sales floor environment so long...

Words: 862 - Pages: 4

Premium Essay

Ethical and Legal Issues in Nursing

...Ethical and Legal Issues in Nursing Nursing as a profession, holds itself to a standard of practice and a code of ethics that governs this discipline. It was well put by Nicholson (2012), “Nonprofessionals cannot be held to the standards of the medical professions, but persons who have been specially trained, educated and licensed are accountable for performance that deviates from the customs of their field.” To function effectively, nurses need to be aware of their contents and incorporate them as a guide for their professional decisions. “A wise nurse who is aware of deep personal values and moral standards will make decisions regarding practice setting so that the nurse’s own personal integrity remains intact, while putting patients and their needs first” (Chitty & Black, 2010, p. 101). A person’s value system is initiated by the beliefs held by his or her family, and as growing occurs the person is exposed to other cultures, belief systems, peers, and societal norms, that may be incorporated into his or her value system. A nurse is expected to make ethical decisions. Having the ability to make ethical and responsible reasoning, involves rational thinking. It is also systematic and based on ethical principles and civil law. Ethical decision making can’t be based on emotions, intuition, fixed policy, or an earlier occurrence. (Blias & Harris, 2011, p. 61). A nurse is not exempt from developing values, and belief systems that shape how they may view their patient...

Words: 1203 - Pages: 5

Premium Essay

Importance Of Information Security

...The Three Main Areas of Accountability Regarding Information Security A company cannot be an open book in its inner workings and finer details if it means to protect itself from negative consequences such as theft or being overtaken by the competition. Companies have a duty to prevent unauthorized access, copying, or destruction of their digital and non-digital data. This endeavor is collectively referred to as information security. The management of information security depends on three areas of accountability: I.T Security, Information security, enterprise (physical) security (Gelbstein, 2013). Each of these 3 will be discussed with specific examples below. IT Security As per Wikipedia, IT security (computer security) is “ the protection...

Words: 948 - Pages: 4

Premium Essay

Computer Security

...sensitive information or data from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption. Wikipedia says, "Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them. These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms." Computer Security is concerned with the risks related to computer use, and ensures the availability, integrity and confidentiality of information managed by the computer system, permitting authorized users to carry out legitimate and useful tasks within a secure computing environment. ---Information security and computer systems are closely tied entities, these fields are interrelated and share the common goals of protecting the confidentiality, integrity and availability of information; however, there a very fine line that distinguishes them.These differences lie primarily...

Words: 314 - Pages: 2

Free Essay

Why Wikipedia Is Not a Source of Scholalry Research

...Wikipedia is the largest and most heavily used online encyclopedia in the 21st century. In this essay I will discuss the impact of Wikipedia as a primary source of information, and the effects this has on a fragmented audience. When used as a research tool, user generated content within Wikipedia can have a negative impact on the academic community. The nature of Wikipedia represents a fundamental shift in the relationship between the reader and the publisher. Through illustrating the ease to which Wikipedia offers this information transfer and how this constantly changing state impacts on culture and creative identity and place, I will expose the fraudulent nature of this over exhausted resource. The Hawaiian word for quick, Wiki Wiki is the basis for the name Wikipedia. Every article has an edit capacity, which allows any user, to add or delete content on any page. This Shortens the time frame needed to create, edit and publish content, making it the preferred tool for many people worldwide seeking answers and a path for basic research. Unfortunately it is also interpreted by some, as an authoritive source of information. However there is no gate keeping function in the program to ensure the authenticity of the information which is contributed. In defence, the functionality of the program which allows it to be constantly updated allows quicker access to many audiences and could be argued that it is a good way to stay informed and in touch with current issues. Although Wikipedia...

Words: 1445 - Pages: 6

Premium Essay

Start a New Career

...management expertise together in a more lucrative upper management role. Start a New Career For most starting a new career can be a bit scary. Fortunately for those of us with a great deal of longevity in the military the ability to step ahead in the interview line is greater than those who have not served in the US Armed Forces. Many employers realize veterans bring a lot of value to their table, such as; accelerated learning curve, leadership, teamwork, diversity and inclusion in action, efficient performance under pressure, respect for procedures, international and technical trends, integrity, conscious of health and safety standards, and triumph over adversity (Veterans Today, 2010). Veterans also bring life experiences which only the military can bestow, soft-skills that unite individuals of all incomes, race, and nationalities, changing their fellow coworkers into a model of integrity, discipline and creativity. However, these fine qualities and characteristics woven into every veteran is fine for entry level positions or perhaps middle management, but achieving a foot in the door for upper management will require an MBA. Besides my extensive background with the military, there were several other driving factors to seek employment...

Words: 1080 - Pages: 5

Premium Essay

Tyco's Management Planning Mgt.230

...operational headquarters in Princeton, New Jersey. Tyco International Ltd. was founded in 1962 and became incorporated in 1962. (Wikipedia, the free encyclopedia, 2014) It has been around for quite a few years and seen the ups and downs of business and has learned from it and bounced back. A major thing that the company has learned is that it has to have a management plan to stay in business and to be successful. This plan has to also encompass the company’s mission statement and ethics. Tyco’s mission statement is “We will increase the value of our company and our global portfolio of diversified brands by exceeding customers' expectations and achieving market leadership and operating excellence in every segment of our company.” (AllFinancialMatters.com, 2005) Management Planning Planning is looking ahead and calculating the future course. It is a preparatory step that determines what the company wants to attain, and also incorporating the company’s goals in the plan. Tyco has a few different goals depending on what factors you are discussing. In the planning process there are three goals that factor into management planning. The governance goal deals with practices and policies. It states that the organization must “Adhere to the highest standards of corporate governance by establishing processes and practices that promote and ensure integrity, compliance, and accountability.” (AllFinancialMatters.com, 2005) The second goal that was considered when the management created...

Words: 1477 - Pages: 6

Free Essay

Dan Simons

...Benjamin Franklin Tilley (March 29, 1848 – March 18, 1907) was an officer in the United States Navy and the first acting governor of what is now American Samoa. He entered the Naval Academy at age 15 during the Civil War and graduated in 1866. In the wake of the Great Railroad Strike of 1877, he participated as a lieutenant in the military's crackdown against workers. During the 1891 Chilean Civil War, Tilley and a small contingent of sailors and marines defended the American consulate in Santiago, Chile. Commanding the gunship USS Newport in the Spanish–American War, he captured two Spanish Navy ships. After the war Tilley was promoted to captain and became the acting governor of Tutuila and Manua, present-day American Samoa, where he set legal and administrative precedents for the new territory. Tilley's successor, Captain Uriel Sebree, praised his "great ability, kindness, tact and sound common sense". He was promoted to rear admiral after almost 41 years of naval service, but died within a month from pneumonia. (Full article...) Recently featured: The Boat Race 1993 Christ lag in Todes Banden, BWV 4 Winnipeg Archive By email More featured articles... Did you know... A sketch of Santi Sergio e Bacco in the Roman Forum A sketch of Santi Sergio e Bacco in the Roman Forum ... that contrary to popular belief, Ss. Sergio e Bacco al Foro Romano (pictured) may not have been destroyed so that Charles V could pass through the Arch of Septimius Severus? ... that "Long Way to Go"...

Words: 1036 - Pages: 5

Free Essay

Wikipedia Swot

...Wikipedia SWOT Analysis and Competitors Wikipedia has a lot of strengths and a great field of opportunities; can be qualified as a Encyclopedia and as a Wiki, in both categories has competition and could be surpassed by a Chinese version of a free encyclo-pedia; Wikipedia as we will see encounters opportunities that are great but that could be a weakness too, the global nature of Wikipedia can make the community unmanageable and prone to corruption; Wikimedia counts with more than 30 chapters in more that 280 languages ; Wikimedia is part of a global network of individuals, organizations, chapters, clubs and communities and all work together to maintain Wikipedia . Wikipedia has many competitors, many are “dead” but many others are making it’s own way in the knowledge field. Sites like Veropedia and Citizendium were created with the same objectives of globalize and share the knowledge, but with few differences like the information should be enhanced by experts, these models have been less successful. Veropedia was created in October 2007 and shut down in January 2009, their principals were very much like the Nupedia project, the idea was to enhance articles coming from Wik-ipedia and to fill the Veropedia servers with more accurate information, its revenue would come from user donations but at the end the project was supported exclusively by its creators ; as of today the Veropedia project has disappeared and its web page is hosting spam. Citizendium is an online wiki...

Words: 2036 - Pages: 9