(*)second edition available by invitation only
|
- Introduction
- I . Issues of Identity: who's who ?
- II . Issues of Ownership: whose's that ?
- II-B . Issues of Location: where is it ?
- II-B-1 Internet Searching (see second edition)
- II-B-2 Internet Matching (see second edition)
| .
- III . Defense: on the side of the law
- IV . Offense: the dark side
- stealing time from receivers
- IV-1 Spamming
- IV-1-b Search Salting (see second edition)
- blocking access to senders
- falsifying the context
- IV-3 Ownership: copying
- IV-3-b Provenance: plagiarism & forgery (see second edition)
- IV-3-c Attention: advertising fraud (see second edition)
.
|
|
|
|
November 2006 |