SYS-CON MEDIA Authors: Zakia Bouachraoui, Liz McMillan, Yeshim Deniz, Janakiram MSV, Carmen Gonzalez

Blog Feed Post

Does Wikipedia Protect its Children?

It’s been said that a community is measured by how it treats its most vulnerable members. When it comes to online activities, none are more vulnerable than our children. The thought that there are thousands- if not millions- of predators lurking in the dark corners of the internet makes a parent lose sleep at night. Many parents even separate their children from the greatest educational resource known to man at all costs.

But it’s a futile effort. The internet pervades modern society. Kids are increasingly encouraged to use it at school, for example. And no site is used as an educational aid more often than Wikipedia. For summarized knowledge, sources, supplementary materials, and, all too often, plagiarism, Wikipedia is the go-to resource our children are using to do better in school.

It begs the question: how well does Wikipedia protect its Children? Let’s start with what they are reading on Wikipedia. We all know that every bit of information on Wikipedia is accessible without an account. But it will be a surprise to many of us that Wikipedia can be edited without an account. And those edits are not vetted by editors- adult or otherwise- so vandalism is a fact of life on Wikipedia. Often foul language and fouler ideas are inserted along with false “facts” on the pages of Wikipedia. Most of this vandalism is caught within a few hours, but some isn’t detected for months- or even years.

Most acts of vandalism are perpetrated anonymously with so called IP edits. So can parents at least trust logged in users to take act responsibly towards their children? We should start with how much Wikipedia knows about their editors. The answer might surprise you: practically nothing. In fact, it is one of the few major internet sites that doesn’t require email verification to establish an account. That’s right parents, your children can create an account using their own name or an alias, and they are off to the races. You’d be hard pressed to find a more permissive site in the top 100- or even top 1000- most frequented online destinations. According to itself, Wikipedia running a very competitive #6 in the global race for the most online traffic.

Surely we can rely on Wikipedia to have established solid child protection policies against potential predators on their site, you must be thinking. Guess again. The official child protection policy arguably says more about protecting editors accused of impropriety with minors than children themselves. A committee of volunteers called ArbCom, whose members often don’t consider themselves qualified for such a task, take on triage for all reports of questionable conduct towards children. There word “parent” doesn’t even occur in this document, much less any commitment to notify authorities or parents if ArbCom finds that there is a reasonable accusation of impropriety. The worst consequences for a predator is an indefinite block from Wikipedia, which means that now the editor must go through the hassle of establishing another completely unverified account to continue preying on children at Wikipedia. It is interesting to note that this is the same consequence that any editor who brings up such accusations publicly will face. And, as a side note, this wouldn’t even be policy, had founder Jimmy Wales not unilaterally marked it so. This controversial action rocked the Wikipedia community.

Don’t get me wrong; accusations of child predation carry a heavy stigma, and editors’ reputations must be protected, but I believe this should be left to the authorities who are qualified to handle such claims discreetly. Even this wouldn’t suffice to make educational outreach to minors ethically or morally, and possibly legally acceptable. I believe that it will require nothing less than a new project aimed towards minors that uses Wikipedia as a source for vetted information. Such a project should require much more information from editors who have any interactions with potential minors. Anything less would amount to putting the most vulnerable- and beloved- members of our society in jeopardy.

As Wikipedians, we can, should, and must do better. Join me and other concerned Wikipedians at:

Offwiki

,Wil


Filed under: Child Protection , Offwiki, Wikimedia, Wikipedia

Read the original blog entry...

More Stories By Wil Sinclair

Wil Sinclair works on technologies that facilitate and encourage cloud adoption in the PHP community. His Simple Cloud API enables “cloud native” applications that can be deployed on all major clouds. He brings 10 years of experience in the software industry at companies from the smallest of startups to large multinationals such as Oracle and Amazon. Most recently he served as project lead on the leading PHP framework: Zend Framework.

Latest Stories
In an age of borderless networks, security for the cloud and security for the corporate network can no longer be separated. Security teams are now presented with the challenge of monitoring and controlling access to these cloud environments, at the same time that developers quickly spin up new cloud instances and executives push forwards new initiatives. The vulnerabilities created by migration to the cloud, such as misconfigurations and compromised credentials, require that security teams t...
Cloud is the motor for innovation and digital transformation. CIOs will run 25% of total application workloads in the cloud by the end of 2018, based on recent Morgan Stanley report. Having the right enterprise cloud strategy in place, often in a multi cloud environment, also helps companies become a more intelligent business. Companies that master this path have something in common: they create a culture of continuous innovation. In his presentation, Dilipkumar Khandelwal outlined the latest...
The graph represents a network of 1,329 Twitter users whose recent tweets contained "#DevOps", or who were replied to or mentioned in those tweets, taken from a data set limited to a maximum of 18,000 tweets. The network was obtained from Twitter on Thursday, 10 January 2019 at 23:50 UTC. The tweets in the network were tweeted over the 7-hour, 6-minute period from Thursday, 10 January 2019 at 16:29 UTC to Thursday, 10 January 2019 at 23:36 UTC. Additional tweets that were mentioned in this...
The use of containers by developers -- and now increasingly IT operators -- has grown from infatuation to deep and abiding love. But as with any long-term affair, the honeymoon soon leads to needing to live well together ... and maybe even getting some relationship help along the way. And so it goes with container orchestration and automation solutions, which are rapidly emerging as the means to maintain the bliss between rapid container adoption and broad container use among multiple cloud host...
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like "How is my application doing" but no id...
The term "digital transformation" (DX) is being used by everyone for just about any company initiative that involves technology, the web, ecommerce, software, or even customer experience. While the term has certainly turned into a buzzword with a lot of hype, the transition to a more connected, digital world is real and comes with real challenges. In his opening keynote, Four Essentials To Become DX Hero Status Now, Jonathan Hoppe, Co-Founder and CTO of Total Uptime Technologies, shared that ...
Is advanced scheduling in Kubernetes achievable?Yes, however, how do you properly accommodate every real-life scenario that a Kubernetes user might encounter? How do you leverage advanced scheduling techniques to shape and describe each scenario in easy-to-use rules and configurations? In his session at @DevOpsSummit at 21st Cloud Expo, Oleg Chunikhin, CTO at Kublr, answered these questions and demonstrated techniques for implementing advanced scheduling. For example, using spot instances and co...
Platform-as-a-Service (PaaS) is a technology designed to make DevOps easier and allow developers to focus on application development. The PaaS takes care of provisioning, scaling, HA, and other cloud management aspects. Apache Stratos is a PaaS codebase developed in Apache and designed to create a highly productive developer environment while also supporting powerful deployment options. Integration with the Docker platform, CoreOS Linux distribution, and Kubernetes container management system ...
Because Linkerd is a transparent proxy that runs alongside your application, there are no code changes required. It even comes with Prometheus to store the metrics for you and pre-built Grafana dashboards to show exactly what is important for your services - success rate, latency, and throughput. In this session, we'll explain what Linkerd provides for you, demo the installation of Linkerd on Kubernetes and debug a real world problem. We will also dig into what functionality you can build on ...
DevOps is a world surrounded by information, starting from a single commit and ending in roll out to production. In this talk, I'll introduce you to the world of Taboola DevOps data collection, to better understand what goes on under the hood. The system we've developed in-house helps us collect and analyse the entire DevOps process from the very first commit all the way to production. It provides us a full clear view with a drill-down toolset that helps keep us away from the dark side. ...
In his session at 20th Cloud Expo, Mike Johnston, an infrastructure engineer at Supergiant.io, will discuss how to use Kubernetes to setup a SaaS infrastructure for your business. Mike Johnston is an infrastructure engineer at Supergiant.io with over 12 years of experience designing, deploying, and maintaining server and workstation infrastructure at all scales. He has experience with brick and mortar data centers as well as cloud providers like Digital Ocean, Amazon Web Services, and Rackspace....
After years of investments and acquisitions, CloudBlue was created with the goal of building the world's only hyperscale digital platform with an increasingly infinite ecosystem and proven go-to-market services. The result? An unmatched platform that helps customers streamline cloud operations, save time and money, and revolutionize their businesses overnight. Today, the platform operates in more than 45 countries and powers more than 200 of the world's largest cloud marketplaces, managing mo...
Containerized software is riding a wave of growth, according to latest RightScale survey. At Sematext we see this growth trend via our Docker monitoring adoption and via Sematext Docker Agent popularity on Docker Hub, where it crossed 1M+ pulls line. This rapid rise of containers now makes Docker the top DevOps tool among those included in RightScale survey. Overall Docker adoption surged to 35 percent, while Kubernetes adoption doubled, going from 7% in 2016 to 14% percent.
The Crypto community has run out of anarchists, libertarians and almost absorbed all the speculators it can handle, the next 100m users to join Crypto need a world class application to use. What will it be? Alex Mashinsky, a 7X founder & CEO of Celsius Network will discuss his view of the future of Crypto.
In an age of borderless networks, security for the cloud and security for the corporate network can no longer be separated. Security teams are now presented with the challenge of monitoring and controlling access to these cloud environments, as they represent yet another frontier for cyber-attacks. Complete visibility has never been more important-or more difficult. Powered by AI, Darktrace's Enterprise Immune System technology is the only solution to offer real-time visibility and insight into ...