https://de.wikipedia.org/w/api.php?action=feedcontributions&feedformat=atom&user=TeleComNasSprVenWikipedia - Benutzerbeiträge [de]2025-11-29T01:08:04ZBenutzerbeiträgeMediaWiki 1.46.0-wmf.4https://de.wikipedia.org/w/index.php?title=Stanley_Orme,_Baron_Orme&diff=128045104Stanley Orme, Baron Orme2014-01-25T08:19:28Z<p>TeleComNasSprVen: Reverted 1 edit by 82.43.202.206 (talk) to last revision by Sam11333. (TW)</p>
<hr />
<div>{{Use dmy dates|date=April 2012}}<br />
{{Infobox Officeholder<br />
|honorific-prefix = [[The Right Honourable]]<br />
|name = The Lord Orme<br />
|honorific-suffix = [[Privy Council of the United Kingdom|PC]]<br />
|office = [[Chair of the Parliamentary Labour Party]]<br />
|term_start = 13 July 1987<br />
|term_end = 18 July 1992<br />
|predecessor = [[Frederick Willey|Fred Willey]]<br />
|successor = [[Doug Hoyle, Baron Hoyle|Doug Hoyle]]<br />
|office1 = [[Shadow Secretary of State for Energy]]<br />
|term_start1 = 2 October 1983<br />
|term_end1 = 13 July 1987<br />
|leader1 = [[Neil Kinnock]]<br />
|preceded1 = [[John Smith (Labour Party leader)|John Smith]]<br />
|succeeded1 = [[John Prescott]]<br />
|office2 = [[Shadow Secretary of State for Industry]]<br />
|term_start2 = 4 November 1980<br />
|term_end2 = 2 October 1983<br />
|leader2 = [[Michael Foot]]<br />
|preceded2 = [[John Silkin]]<br />
|succeeded2 = [[Peter Shore]]<br />
|office3 = [[Shadow Secretary of State for Health and Social Services]]<br />
|term_start3 = 14 June 1979<br />
|term_end3 = 4 November 1980<br />
|leader3 = [[James Callaghan]]<br />
|preceded3 = [[Patrick Jenkin]]<br />
|succeeded3 = [[Gwyneth Dunwoody]]<br />
|office4 = [[Secretary of State for Work and Pensions|Minister of State for Social Security]]<br />
|primeminister4 = [[James Callaghan]]<br />
|term_start4 = 8 April 1976<br />
|term_end4 = 4 May 1979<br />
|predecessor4 = [[Brian Kevin O'Malley|Brian O'Malley]]<br />
|successor4 = [[Reg Prentice, Baron Prentice|Reg Prentice]]<br />
|office5 = [[Member of Parliament (UK)|Member of Parliament]] <br> for [[Salford East (UK Parliament constituency)|Salford East]]<br />
|term_start5 = 9 June 1983<br />
|term_end5 = 1 May 1997<br />
|predecessor5 = [[Frank Allaun]]<br />
|successor5 = Constituency Abolished<br />
|office6 = [[Member of Parliament (UK)|Member of Parliament]] <br> for [[Salford West (UK Parliament constituency)|Salford West]]<br />
|term_start6 = 15 October 1964<br />
|term_end6 = 9 June 1983<br />
|predecessor6 = [[Charles Royle, Baron Royle|Charles Royle]]<br />
|successor6 = Constituency Abolished<br />
|birth_date = {{birth date|1923|4|5|df=y}}<br />
|birth_place = [[Sale, Greater Manchester|Sale]], United Kingdom<br />
|death_date = {{death date and age|2005|4|27|1923|4|5|df=y}}<br />
|death_place = <br />
|party = [[Labour Party (UK)|Labour]]<br />
}}<br />
'''Stanley Orme, Baron Orme''' [[Privy Council of the United Kingdom|PC]] (5 April 1923 &ndash; 27 April 2005) was a British [[Labour Party (UK)|Labour Party]] [[politician]]. He was a [[Member of Parliament]] (MP) from 1964 to 1997, and served as a cabinet minister in the 1970s.<br />
<br />
==Early life==<br />
Stan Orme was born in [[Sale, Greater Manchester|Sale]], [[Cheshire]]. He was educated at a technical school, which he left in 1938 to become an instrument maker's apprentice.<br />
He joined the [[Royal Air Force|RAF]] in 1942, becoming a bomber-navigator, serving in [[Canada]] and [[Egypt]]. He was demobilised in 1947 as a [[warrant officer]].<br />
<br />
==Political career==<br />
Orme joined the Labour Party in 1944 and he became a [[Sale Borough Council]]lor in 1958. A committed [[Bevanite]], he embraced many left-wing causes, including the Movement for Colonial Freedom and the [[Campaign for Nuclear Disarmament]].<br />
<br />
He first stood for [[Parliament of the United Kingdom|Parliament]] in [[Stockport South (UK Parliament constituency)|Stockport South]] at the [[United Kingdom general election, 1959|1959 general election]], when he lost to the [[Conservative Party (UK)|Conservative]] candidate. He was elected as [[Member of Parliament]] (MP) for [[Salford West (UK Parliament constituency)|Salford West]] at the [[United Kingdom general election, 1964|1964 general election]].<br />
<br />
When Labour returned to office at the [[United Kingdom general election, February 1974|February 1974 general election]], Orme was installed at Stormont as [[Minister of State]] for [[Northern Ireland]]. He made an impression in this role, before moving to the [[Department of Health and Social Security]] in March 1976. The Prime Minister [[James Callaghan]] promoted him to the [[Cabinet of the United Kingdom|Cabinet]] in September 1976 to sit alongside his departmental boss [[David Ennals]]. He remained in this role until 1979.<br />
<br />
Orme joined the [[Shadow Cabinet]] in 1979 as chief health and social security spokesman, before later moving on to hold the Industry and Energy portfolios until 1987.<br />
After constituency boundary changes for the [[United Kingdom general election, 1983|1983 general election]], he was elected for the redrawn seat of [[Salford East (UK Parliament constituency)|Salford East]].<br />
He served as the Chairman of the [[Parliamentary Labour Party]] (1987–1992). He retired from the [[British House of Commons|House of Commons]] at the [[United Kingdom general election, 1997|1997 general election]], when he was awarded a [[life peerage]] as Baron Orme of Salford in the County of [[Greater Manchester]].<br />
<br />
Orme made several unsuccessful attempts to be elected to Labour's [[National Executive Committee]], without breaking through.<br />
<br />
Lord Orme died in 2005. His funeral at Dunham Crematorium was attended by many family, friends and political colleagues. A memorial service was held in the [[House of Lords]], with speeches from [[Neil Kinnock]] and [[Michael Foot]]. A very rare exception was made by the Lord Chancellor such that any Divisions were suspended during this evening service.<br />
<br />
==Private life==<br />
He married Irene Mary Harris in 1951. There were no children.<br />
<br />
==References==<br />
*{{cite news | title=Lord Orme of Salford | date=3 May 2005 | publisher=The Guardian | url=http://politics.guardian.co.uk/politicsobituaries/story/0,1441,1475161,00.html | location=London | first=Edward | last=Pearce | accessdate=24 May 2010}}<br />
*''Times Guide to the House of Commons'', Times Newspapers Limited, 1992<br />
*Obituary, [http://www.timesonline.co.uk/tol/comment/obituaries/article387834.ece ''The Times''] obituaries.<br />
* [http://archives.lse.ac.uk/TreeBrowse.aspx?src=CalmView.Catalog&field=RefNo&key=ORME Catalogue of the Orme papers] at the [http://www.lse.ac.uk/library/archive/Default.htm Archives Division] of the [[London School of Economics]].<br />
<br />
== External links ==<br />
* {{Hansard-contribs | mr-stan-orme | Stanley Orme }}<br />
<br />
{{s-start}}<br />
{{s-par|uk}}<br />
{{s-bef|before=[[Charles Royle, Baron Royle|Charles Royle]]}}<br />
{{s-ttl|title=[[Member of Parliament]] for [[Salford West (UK Parliament constituency)|Salford West]]|years=[[United Kingdom general election, 1964|1964]]&ndash;[[United Kingdom general election, 1983|1983]]}}<br />
{{s-non|rows=2|reason=Constituency abolished}}<br />
|-<br />
{{s-bef|before=[[Frank Allaun]]}}<br />
{{s-ttl|title=[[Member of Parliament]] for [[Salford East (UK Parliament constituency)|Salford East]]|years=[[United Kingdom general election, 1983|1983]]–[[United Kingdom general election, 1997|1997]]}}<br />
|-<br />
{{s-off}}<br />
{{s-bef|before=[[Brian Kevin O'Malley]]}}<br />
{{s-ttl|title=[[Secretary of State for Work and Pensions|Minister of State for Social Security]]|years=1976–1979}}<br />
{{s-aft|after=[[Reg Prentice, Baron Prentice|Reg Prentice]]}}<br />
|-<br />
{{s-ppo}}<br />
{{s-bef|before=[[Jack Dormand]]}}<br />
{{s-ttl|title=Chair of the [[Parliamentary Labour Party]]|years=1987–1992}}<br />
{{s-aft|after=[[Doug Hoyle, Baron Hoyle|Doug Hoyle]]}}<br />
{{s-end}}<br />
<br />
{{Callaghan Ministry}}<br />
<br />
{{Persondata <!-- Metadata: see [[Wikipedia:Persondata]]. --><br />
| NAME =Orme, Stan<br />
| ALTERNATIVE NAMES =<br />
| SHORT DESCRIPTION = British politician<br />
| DATE OF BIRTH =5 April 1923<br />
| PLACE OF BIRTH =[[Sale, Greater Manchester|Sale]], United Kingdom<br />
| DATE OF DEATH =27 April 2005<br />
| PLACE OF DEATH =<br />
}}<br />
{{DEFAULTSORT:Orme, Stan}}<br />
[[Category:1923 births]]<br />
[[Category:2005 deaths]]<br />
[[Category:Councillors in Greater Manchester]]<br />
[[Category:Members of the Privy Council of the United Kingdom]]<br />
[[Category:Members of the United Kingdom Parliament for English constituencies]]<br />
[[Category:Labour Party (UK) MPs]]<br />
[[Category:Labour Party (UK) life peers]]<br />
[[Category:People from Sale, Greater Manchester]]<br />
[[Category:UK MPs 1964–66]]<br />
[[Category:UK MPs 1966–70]]<br />
[[Category:UK MPs 1970–74]]<br />
[[Category:UK MPs 1974]]<br />
[[Category:UK MPs 1974–79]]<br />
[[Category:UK MPs 1979–83]]<br />
[[Category:UK MPs 1983–87]]<br />
[[Category:UK MPs 1987–92]]<br />
[[Category:UK MPs 1992–97]]<br />
[[Category:Royal Air Force personnel of World War II]]</div>TeleComNasSprVenhttps://de.wikipedia.org/w/index.php?title=Datenschutz_im_Internet&diff=91399827Datenschutz im Internet2011-03-25T19:45:31Z<p>TeleComNasSprVen: rm spam</p>
<hr />
<div>'''Internet privacy''' involves the desire or mandate of personal [[privacy]] concerning transactions or transmission of data via the [[Internet]]. It also involves the exercise of control over the type and amount of information revealed about a person on the Internet and who may access said information.<br />
<br />
Internet privacy forms a subset of [[data privacy|computer privacy]]. A number of experts within the field of Internet security and privacy believe that privacy doesn't exist; "Privacy is dead – get over it" This should be more encouraged<br />
<ref>{{cite web|url=http://video.google.com/videoplay?docid=-383709537384528624 |title=Toor2122 – Steve Rambam – Privacy Is Dead – Get Over It |publisher=Video.google.com |date=August 1, 2006 |accessdate=September 13, 2010}}</ref> according to Steve Rambam, private investigator specializing in Internet privacy cases. In fact, it has been suggested that the "appeal of online services is to broadcast personal information on purpose."<ref name="Pogue">{{cite journal|last=Pogue|first=David|date=January 2011|title=Don't Worry about Who's watching|journal=[[Scientific American]]|volume=304|issue=1|page=32|url=http://www.scientificamerican.com/article.cfm?id=dont-worry-about-whos-watching}}</ref> On the other hand, in his essay ''The Value of Privacy,'' security expert [[Bruce Schneier]] says, "Privacy protects us from abuses by those in power, even if we're doing nothing wrong at the time of [[surveillance]]."<ref>[http://www.schneier.com/blog/archives/2006/05/the_value_of_pr.html The Value of Privacy by Bruce Schneier]</ref><ref>[http://www.wired.com/politics/security/commentary/securitymatters/2006/05/70886 The Eternal Value of Privacy by Bruce Scneier – Wired.com]</ref><br />
<br />
==Levels of privacy==<br />
{{Inappropriate person|date=March 2011}}<br />
People with only a casual concern for Internet privacy need not achieve total [[anonymity]]. Internet users may achieve an adequate level of privacy through controlled disclosure of personal information. The revelation of IP addresses, non-personally-identifiable profiling, and similar information might become acceptable trade-offs for the convenience that users could otherwise lose using the workarounds needed to suppress such details rigorously. On the other hand, some people desire much stronger privacy. In that case, they may try to achieve ''Internet anonymity'' to ensure privacy — use of the Internet without giving any third parties the ability to link the Internet activities to [[personally-identifiable information]] (P.I.I.) of the Internet user. In order to keep your information private, people need to be careful on what they submit and look at online. When filling out forms and buying merchandise, that becomes tracked and because your information was not private, companies are now sending you spam and advertising on similar products.<br />
<br />
Related State Laws Privacy of Personal Information:<br />
Nevada and Minnesota require Internet Service Providers to keep information private regarding their customers. This is only unless a customer approves their information being given out. According to the National Conference of State Legislator, the following states have certain laws on the personal privacy of its citizens.<br />
<br />
Minnesota Statutes §§ 325M.01 to .09<br />
-Prohibits Internet service providers from disclosing personally identifiable information, including a consumer's physical or electronic address or telephone number; Internet or online sites visited; or any of the contents of a consumer's data storage devices.<br />
Provides for certain circumstances under which information must be disclosed, such as to a grand jury; to a state or federal law enforcement officer acting as authorized by law; pursuant to a court order or court action.<br />
Provides for civil damages of $500 or actual damages and attorney fees for violation of the law.<br />
<br />
<br />
Nevada Revised Statutes § 205.498<br />
-In addition, California and Utah laws, although not specifically targeted to on-line businesses, require all nonfinancial businesses to disclose to customers, in writing or by electronic mail, the types of personal information the business shares with or sells to a third party for direct marketing purposes or for compensation. Under the California law, businesses may post a privacy statement that gives customers the opportunity to choose not to share information at no cost.<br />
<br />
There are also certain laws for employees and businesses and privacy policies for <ref>{{cite web|author=Pam Greenberg |url=http://www.ncsl.org/default.aspx?tabid=13463#isp |title=State Laws Related to Internet Privacy |publisher=Ncsl.org |date=October 19, 2009 |accessdate=September 13, 2010}}</ref> websites.<br />
<br />
California, Connecticut, Nebraska and Pennsylvania all have specific privacy policies regarding websites, these include:<br />
<br />
"California (Calif. Bus. & Prof. Code §§ 22575-22578)<br />
California's Online Privacy Protection Act requires an operator, defined as a person or entity that collects personally identifiable information from California residents through an Internet Web site or online service for commercial purposes, to post conspicuously its privacy policy on its Web site or online service and to comply with that policy. The bill, among other things, would require that the privacy policy identify the categories of personally identifiable information that the operator collects about individual consumers who use or visit its Web site or online service and third parties with whom the operator may share the information.<br />
<br />
Connecticut (Conn. Gen Stat. § 42-471)<br />
Requires any person who collects Social Security numbers in the course of business to create a privacy protection policy. The policy must be "publicly displayed" by posting on a web page and the policy must (1) protect the confidentiality of Social Security numbers, (2) prohibit unlawful disclosure of Social Security numbers, and (3) limit access to Social Security numbers.<br />
<br />
Nebraska (Nebraska Stat. § 87-302(14))<br />
Nebraska prohibits knowingly making a false or misleading statement in a privacy policy, published on the Internet or otherwise distributed or published, regarding the use of personal information submitted by members of the public.<br />
<br />
Pennsylvania (18 Pa. C.S.A. § 4107(a)(10))<br />
Pennsylvania includes false and misleading statements in privacy policies published on Web sites or otherwise distributed in its deceptive or fraudulent business practices statute."<ref>National Conference of State Legislators. (2009, October 19). Privacy policy for websites. Retrieved from http://www.ncsl.org/default.aspx?tabid=13463</ref><br />
<br />
There are also at least 16 states that require government websites to create privacy policies and procedures or to include machine-readable privacy policies into their websites. These states include Arizona, Arkansas, California, Colorado, Delaware, Iowa, Illinois, Maine, Maryland, Michigan, Minnesota, Montana, New York, Sourth Carolina, Texas, Utah, and Virginia.<br />
<br />
==Risks to internet privacy==<br />
In today’s technological world, millions of individuals are subject to privacy threats. Companies are hired not only to watch what you visit online, but to infiltrate the information and send advertising based on your browsing history. People set up accounts for Facebook; enter bank and credit card information to various websites.<br />
<br />
Those concerned about Internet privacy often cite a number of ''privacy risks'' — events that can compromise privacy — which may be encountered through Internet use.<ref>{{cite web<br />
| author = Matt Schafer<br />
| title = Privacy, Privacy, Where for Art Thou Privacy?<br />
| quote = As consumers have became wise to the use of cookies, however, the industry has began using both normal cookies and local shared objects (a.k.a flash cookies) in the event that users would delete the normal cookies.<br />
| publisher = Lippmannwouldroll.com<br />
| date = August 2, 2010<br />
| url = http://lippmannwouldroll.com/2010/08/02/privacy-privacy-where-for-art-thou-privacy/<br />
| accessdate = October 17, 2010<br />
}}</ref> These methods of compromise can range from the gathering of statistics on users, to more malicious acts such as the spreading of spyware and various forms of [[Software bug|bugs]] (software errors) exploitation.<br />
<br />
Privacy measures are provided on several social networking sites to try to provide their users with protection for their personal information. On Facebook for example privacy settings are available for all registered users. The settings available on Facebook include the ability to block certain individuals from seeing your profile, the ability to choose your "friends," and the ability to limit who has access to your pictures and videos. Privacy settings are also available on other social networking sites such as E-harmony and MySpace. It is the user's prerogative to apply such settings when providing personal information on the internet.<br />
<br />
In late 2007 Facebook launched the Beacon program where user rental records were released on the public for friends to see. Many people were enraged by this breach in privacy, and the ''[[Lane v. Facebook, Inc.]]'' case ensued.<br />
<br />
===HTTP cookies===<br />
An [[HTTP cookie]] is data stored on a user's computer that assists in automated access to websites or web features, or other [[State (computer science)|state]] information required in complex web sites. It may also be used for user-tracking by storing special usage history data in a cookie. Cookies are a common concern in the field of privacy. As a result, some types of cookies are classified as a ''tracking cookie''. Although website developers most commonly use cookies for legitimate technical purposes, cases of abuse occur. In 2009, two researchers noted that social networking profiles could be connected to cookies, allowing the social networking profile to be connected to browsing habits.<ref>Krishnamurthy B, Wills CE. (2009). [http://conferences.sigcomm.org/sigcomm/2009/workshops/wosn/papers/p7.pdf On the Leakage of Personally Identifiable Information Via Online Social Networks].</ref><br />
<br />
Systems do not generally make the user explicitly aware of the storing of a cookie. (Although some users object to that, it does not properly relate to Internet privacy. It does however have implications for computer privacy, and specifically for [[computer forensics]].<br />
<br />
The original developers of cookies intended that only the website that originally distributed cookies to users so they could retrieve them, therefore returning only data already possessed by the website. However, in practice programmers can circumvent this restriction. Possible consequences include:<br />
* the placing of a [[personally-identifiable information|personally-identifiable]] tag in a browser to facilitate [[web profiling]] (see below), or,<br />
* use of [[cross-site scripting]] or other techniques to steal information from a user's cookies.<br />
<br />
Some users choose to disable cookies in their web browsers – as of 2000 a Pew survey estimated the proportion of users at 4%.<ref>[http://www.pewinternet.org/report_display.asp?r=19 Trust and Privacy Online: Why Americans Want to Rewrite the Rules. Pew Internet & American Life Project. Released Aug. 20, 2000]</ref> Such an action eliminates the potential privacy risks, but may severely limit or prevent the functionality of many websites. All significant web browsers have this disabling ability built-in, with no external program required. As an alternative, users may frequently delete any stored cookies. Some browsers (such as [[Mozilla Firefox]] and [[Opera (web browser)|Opera]]) offer the option to clear cookies automatically whenever the user closes the browser. A third option involves allowing cookies in general, but preventing their abuse. There are also a host of wrapper applications that will redirect cookies and cache data to some other location.<br />
<br />
The process of ''profiling'' (also known as "tracking") assembles and analyzes several events, each attributable to a single originating entity, in order to gain information (especially patterns of activity) relating to the originating entity. Some organizations engage in the profiling of people's web browsing, collecting the [[Uniform Resource Locator|URL]]s of sites visited. The resulting profiles can potentially link with information that personally identifies the individual who did the browsing.<br />
<br />
Some web-oriented marketing-research organizations may use this practice legitimately, for example: in order to construct profiles of 'typical Internet users'. Such profiles, which describe average trends of large groups of Internet users rather than of actual individuals, can then prove useful for [[market analysis]]. Although the aggregate data does not constitute a privacy violation, some people believe that the initial profiling does.<br />
<br />
Profiling becomes a more contentious privacy issue when data-matching associates the profile of an individual with personally-identifiable information of the individual.<br />
<!-- TODO: Elaborate. Inability of individuals to review or correct false info about themselves. Reselling of the data. Concerns about undesirable uses to which this info is applied (eg, spamming and junk mail). --><br />
<br />
Governments and organizations may set up [[Honeypot (computing)|honeypot]] websites – featuring controversial topics – with the purpose of attracting and tracking unwary people. This constitutes a potential danger for individuals.<br />
<!-- Fix above para --><br />
<br />
===Flash cookies===<br />
Flash cookies, also known as [[Local Shared Object]]s, work the same ways as normal cookies and are used by the [[Adobe Flash Player]] to store information at the user's computer. They exhibit a similar privacy risk as normal [[cookies]], but are not as easily blocked, meaning that the option in most browsers to not accept cookies does not affect flash cookies. One way to view and control them is with browser extensions or add-ons.<br />
<!-- More information should be posted on flash cookies and how they impact users' privacy --><br />
<br />
===Evercookies===<br />
An [[Evercookie]] is a JavaScript-based application which produces cookies in a web browser<br />
that actively "resist" deletion by redundantly copying themselves in different forms on the user's machine (e.g.: Flash [[Local Shared Object]]s, various HTML5 storage mechanisms, window.name caching, etc.), and resurrecting copies are missing or expired.<br />
<br />
===Photographs on the internet===<br />
[[Image:Wikimania impression nophoto.jpg|thumb|'No photos' tag at [[Wikimania]]]]<br />
Today many people have [[digital cameras]] and post their [[photo]]s online. The people depicted in these photos might not want to have them appear on the Internet.<br />
<br />
Some organizations attempt to respond to this privacy-related concern. For example, the 2005 [[Wikimania]] conference required that photographers have the prior permission of the people in their pictures. Some people wore a 'no photos' tag to indicate they would prefer not to have their photo taken.{{Citation needed|date=August 2010}}<br />
<br />
The Harvard Law Review published a short piece called "In The Face of Danger: Facial Recognition and Privacy Law," much of it explaining how "privacy law, in its current form, is of no help to those unwillingly tagged." <ref>In the Face of Danger: Facial Recognition and the Limits of Privacy Law. (2007). Retrieved from Harvard, Harvard Law Review: http://www.harvardlawreview.org/issues/120/may07/note_4397.php.</ref> Any individual can be unwillingly tagged in a photo and displayed in a manner that might violate them personally in some way, and by the time Facebook gets to taking down the photo, many people will have already had the chance to view, share, or distribute it. Furthermore, traditional tort law does not protect people who are captured by a photograph in public because this is not counted as an invasion of privacy. The extensive Facebook privacy policy covers these concerns and much more. For example, the policy states that they reserve the right to disclose member information or share photos with companies, lawyers, courts, government entities, etc. if they feel it absolutely necessary. The policy also informs users that profile pictures are mainly to help friends connect to each other.<ref>Facebook's Privacy Policy. (2010). Retrieved from Facebook: http://www.facebook.com/policy.php.</ref> However, these, as well as other pictures, can allow other people to invade a person’s privacy by finding out information that can be used to track and locate a certain individual. In an article featured in ABC news, it was stated that two teams of scientists found out that Hollywood stars could be giving up information about their private whereabouts very easily through pictures uploaded to the Internet. Moreover, it was found that pictures taken by [[iPhone]]s automatically attach the [[latitude]] and [[longitude]] of the picture taken through [[metadata]] unless this function is manually disabled.<ref>Heussner, M. K. (2010). Celebrities' Photos, Videos May Reveal Location. Retrieved from ABC: http://abcnews.go.com/technology/ celebrity-stalking-online-photos-give-location/ story?id=11162352&page=1.</ref><br />
<br />
===Search engines===<br />
<br />
Search engines have the ability to track a user’s searches. Personal information can be revealed through searches including search items used, the time of the search, and more. Search engines have claimed a necessity to retain such information in order to provide better services, protect against security pressure, and protect against fraud.<br />
<ref name="privacyrights.org">(December 2010) Online Privacy: Using the Internet Safely. Retrieved from http://www.privacyrights.org/fs/fs18-cyb.htm</ref><br />
<br />
===Data logging===<br />
Many programs and operating systems are set up to perform [[data logging]] of usage. This may include recording times when the computer is in use, or which web sites are visited. If a third party has sufficient access to the computer, legitimately or not, the user's privacy may be compromised. This could be avoided by disabling logging, or by clearing logs regularly.<br />
<br />
===Privacy within social networking sites===<br />
Prior to the social networking site explosion over the past decade, there were early forms of social network technologies that included online multiplayer games, blog sites, news groups, mailings lists and dating services. These all created a backbone for the new modern sites, and even from the start of these older versions privacy was an issue. In 1996, a young woman in New York City was on a first date with an online acquaintance and later sued for sexual harassment as they went back to her apartment after when everything became too real. This is just an early example of many more issues to come regarding internet privacy.<ref>Tracy Mitrano. (2006, November, December). A Wider World: Youth, Privacy, and Social Networking Technologies. Retrieved from http://www.educause.edu/EDUCAUSE+Review/EDUCAUSEReviewMagazineVolume41/AWiderWorldYouthPrivacyandSoci/158095</ref><br />
<br />
Social networking sites have become very popular within the last five years. With the creation of [[Facebook]] and the continued popularity of [[MySpace]] many people are giving their personal information out on the internet. These [[social network]]s keep track of all interactions used on their sites and save them for later use.<ref>Dwyer, C., Hiltz, S. & Passerini, K. (2007). Trust and Privacy Concern within Social Networking Sites: A Comparison of Facebook and MySpace. Americas Conference on Information Systems. Retrieved from http://google.com/scholar?q=cache:qLCk18d_wZwJ:scholar.google.com/+facebook+privacy&hl=en&as_sdt=2000</ref> Most users are not aware that they can modify the privacy settings and unless they modify them, their information is open to the public. On Facebook privacy settings can be accessed via the drop down menu under account in the top right corner. There users can change who can view their profile and what information can be displayed on their profile.<ref name="facebook.com">Facebook’s Privacy Policy. (2010). Retrieved from http://www.facebook.com/policy.php</ref> In most cases profiles are open to either "all my network and friends" or "all of my friends." Also, information that shows on a user's profile such as birthday, religious views, and relationship status can be removed via the privacy settings.<ref>Lipford, H. R., Besmer, A. & Watson, J. (2009). Understanding Privacy Settings in Facebook with an Audience View. Department of Software and Information Systems University of North Carolina at Charlotte. Retrieved from http://www.usenix.org/events/upsec08/tech/full_papers/lipford/lipford_html/</ref> If a user is under 13 years old they are not able to make a Facebook or a MySpace account, however, this is not regulated.<ref name="facebook.com"/><br />
<br />
Social networking has redefined the role of Internet privacy. Since users are willingly disclosing personal information online, the role of privacy and security is somewhat blurry. Sites such as Facebook, Myspace, and Twitter have grown popular by broadcasting status updates featuring personal information such as location. Facebook “Places,” in particular, is a Facebook service, which publicizes user location information to the networking community. Users are allowed to “check-in” at various locations including retail stores, convenience stores, and restaurants. Also, users are able to create their own “place,” disclosing personal information onto the Internet. This form of location tracking is automated and must be turned off manually. Various settings must be turned off and manipulated in order for the user to ensure privacy. According to epic.org, Facebook users are recommended to: (1) disable "Friends can check me in to Places," (2) customize "Places I Check In," (3) disable "People Here Now," and (4) uncheck "Places I've Visited.".<ref name="Facebook. PIC">EPIC - In re Facebook. (n.d.). EPIC - Electronic Privacy Information Center. Retrieved January 25, 2011/</ref> Moreover, the Federal Trade Commission has received two complaints in regards to Facebook’s “unfair and deceptive” trade practices, which are used to target advertising sectors of the online community. “Places” tracks user location information and is used primarily for advertising purposes. Each location tracked allows third party advertisers to customize advertisements that suit one’s interests. Currently, the Federal Trade Commissioner along with the Electronic Privacy Information Center are shedding light on the issues of location data tracking on social networking sites.<ref name="Facebook. PIC"/><br />
<br />
Recently, Facebook has been scrutinized for having a variety of applications that are considered to be invasive to user privacy. “The Breakup Notifier” is an example of a Facebook “cyberstalking” app that has recently been taken down. Essentially, the application notifies users when a person breaks up with their partner through Facebook, allowing users to instantly become aware of their friend's romantic activities. The concept became very popular, with the site attracting 700,000 visits in the first 36 hours; people downloaded the app 40,000 times. Just days later, the app had more than 3.6 million downloads and 9,000 Facebook likes. <ref>Retrieved from http://www.foxnews.com/scitech/2011/02/24/facebook-quashes-hot-new-stalker-app/</ref><br />
<br />
There are other applications that border on “cyberstalking.” An application named "Creepy" can track a person's location on a map using photos uploaded to Twitter or Flickr. When a person uploads photos to a social networking site, others are able to track their most recent location. Some smart phones are able to embed the longitude and latitude coordinates into the photo and automatically send this information to the application. Anybody using the application can search for a specific person and then find their immediate location. This poses many potential threats to users who share their information with a large group of followers. <ref> Retrieved from: http://abcnews.go.com/Technology/smartphone-apps-tracking-keeping-tabs-past-lovers-people/story?id=13022144</ref><br />
<br />
Facebook recently updated its profile format allowing for people who are not “friends” of others to view personal information about other users, even when the profile is set to private. However, As of January 18, 2011 Facebook changed its decision to make home addresses and telephone numbers accessible to third party members, but it is still possible for third party members to have access to less exact personal information, like one’s hometown and employment, if the user has entered the information into Facebook . EPIC Executive Director Marc Rotenberg said "Facebook is trying to blur the line between public and private information. And the request for permission does not make clear to the user why the information is needed or how it will be used." <ref>Electronic Privacy Information Center, Initials. (2011, January 18). Facebook drops plan to disclose users' home addresses and personal phone number. Retrieved from http://epic.org/privacy/socialnet/</ref><br />
Similar to Rotenberg’s claim that Facebook users are unclear of how or why their information has gone public, recently the Federal Trade Commission and Commerce Department have become involved. The Federal Trade Commission has recently released a report claiming that Internet companies and other industries will soon need to increase their protection for online users. Because online users often unknowingly opt in on making their information public, the FTC is urging Internet companies to make privacy notes simpler and easier for the public to understand, therefore increasing their option to opt out. Perhaps this new policy should also be implemented in the Facebook world. The Commerce Department claims that Americans, “have been ill-served by a patchwork of privacy laws that contain broad gaps,”.<ref>American Civil Liberties Union. (2010, December 16). Commerce department releases important report urging comprehensive privacy protections. Retrieved from http://www.aclu.org/technology-and-liberty/commerce-department-releases-important-report-urging-comprehensive-privacy-pr</ref> Because of these broad gaps, Americans are more susceptible to identity theft and having their online activity tracked by others.<br />
<br />
'''Spokeo'''<br />
- [[Spokeo]] is a “people-related” search engine with results compiled through data aggregation. The site contains information such as age, relationship status, estimated personal wealth, immediate family members and home address of individual people. This information is compiled through what is already on the internet or in other public records, but the website does not guarantee accuracy. <ref>http://www.spokeo.com/blog/about/ </ref><br />
<br />
[[Spokeo]] has been faced with potential class action law suits from people who claim that the organization breaches the Fair Credit Reporting Act. In September, 2010, Jennifer Purcell claimed that the FCRA was violated by [[Spokeo]] marketing her personal information. Her case is pending in court. Also in 2010, Thomas Robins claimed that his personal information on the website was inaccurate and he was unable to edit it for accuracy. The case was dismissed because Robins did not claim that the site directly caused him actual harm. <ref> Baynes, T. (2011, February 24). Lawsuits challenge U.S. online data brokers. Reuters. Retrieved from http://uk.reuters.com/article/2011/02/24/idUKN2427826420110224?pageNumber=1</ref> On February 15, 2011, Robins filed another suit, this time stating [[Spokeo]] has caused him “imminent and ongoing” harm. <ref> Davis, W. (2011, February 17). Spokeo charged with violating fair credit reporting<br />
act. MediaPost Publications. Retrieved from http://www.mediapost.com/publications/?<br />
fa=Articles.showArticle&art_aid=145270 </ref><br />
<br />
'''Twitter Case'''<br />
- In January 2011, the government recently obtained a court order to force the social networking site, Twitter, to reveal information applicable surrounding certain subscribers involved in the WikiLeaks cases. This outcome of this case is questionable because it deals with the user’s First Amendment rights. Twitter moved to reverse the court order, and supported the idea that internet users should be notified and given an opportunity to defend their constitutional rights in court before their rights are compromised.<ref>(1/8/11) Government Requests For Twitter Users’ Personal Information Raises Serious Constitutional Concerns. Retrieved from http://www.aclu.org/technology-and-liberty/government-requests-twitter-users-personal-information-raise-serious-constitu</ref><br />
<br />
'''Facebook Friends Study'''<br />
- A study was conducted at Northeastern University by Alan Mislove and his colleagues at the Max Planck Institute for Software Systems, where an algorithm was created to try and discover personal attributes of a Facebook user by looking at their friend’s list. They looked for information such as high school and college attended, major, hometown, graduation year and even what dorm a student may have lived in. The study revealed that only 5% of people thought to change their friend’s list to private. For other users, 58% displayed university attended, 42% revealed employers, 35% revealed interests and 19% gave viewers public access to where they were located. Due to the correlation of Facebook friends and universities they attend, it was easy to discover where a Facebook user was based on their list of friends. This fact is one that has become very useful to advertisers targeting their audiences but is also a big risk for the privacy of all those with Facebook accounts.<ref>Erik Hayden. (2010, March 11). On Facebook, You Are Who You Know. Retrieved from http://www.miller-mccune.com/culture-society/on-facebook-you-are-who-you-know-10385/#</ref><br />
<br />
'''Law enforcement prowling the networks'''<br />
- The [[FBI]] has dedicated undercover agents on [[Facebook]], [[Twitter]], [[MySpace]], [[LinkedIn]]. The rules and guidelines to the privacy issue is internal to the Justice Department and details aren't released to the public. Agents can impersonate a friend, a long lost relative, even a spouse and child. This raises real issues regarding privacy. Although people who use [[Facebook]], [[Twitter]], and other social networking sites are aware of some level of privacy will always be compromised, but, no one would ever suspect that the friend invitation might be from a federal agent whose sole purpose of the friend request was to snoop around. Furthermore, [[Facebook]], [[Twitter]], and [[MySpace]] have personal information and past posts logged for up to one year; even deleted profiles, and with a warrant, can hand over very personal information. One example of investigators using Facebook to nab a criminal is the case of Maxi Sopo. Charged with bank fraud, and having escaped to [[Mexico]], he was nowhere to be found until he started posting on [[Facebook]]. Although his profile was private, his list of friends were not, and through this vector, they eventually caught him.<ref>Richard Lardner. (2010, March 16). Your new Facebook ‘friend’ may be the FBI. Retrieved from http://www.msnbc.msn.com/id/35890739/ns/technology_and_science-security/</ref><br />
<br />
In recent years, some state and local law enforcement agencies have also begun to rely on social media websites as resources. Although obtaining records of information not shared publicly by or about site users often requires a subpoena, public pages on sites such as [[Facebook]] and [[MySpace]] offer access to personal information that can be valuable to law enforcement. <ref> Harkins, Gina. (2011, March 02). Cops patrol social networking sites for gang activity. Retrieved from http://news.medill.northwestern.edu/chicago/news.aspx?id=181375 </ref> Police departments have reported using social media websites to assist in investigations, locate and track suspects, and monitor gang activity. <ref> Taghi, Hasti. (2011, February 10). Police Use Facebook To Track Suspect. Retrieved from http://www.click2houston.com/news/26825687/detail.html </ref><br />
<ref> Halverstadt, Lisa. (2009, March 12). Surprise police use MySpace to locate teen graffiti suspect. Retrieved from http://www.azcentral.com/news/articles/2009/03/12/20090312gl-nwvmyspace0313.html </ref><br />
<br />
'''Teachers and MySpace'''<br />
- Teachers’ privacy on [[MySpace]] has created controversy across the world. They are forewarned by The Ohio News Association <ref>[http://blogs.sun.com/learningcurve/tags/myspace Learning Curve<!-- Bot generated title -->]</ref> that if they have a MySpace account, it should be deleted. Eschool News warns, “Teachers, watch what you post online.” <ref>[http://www.eschoolnews.com/news/top-news/related-top-news/?i=50557;_hbguid=49a1babb-b469-4a85-a273-292a0514d91d Related Top News – Teachers warned about MySpace profiles<!-- Bot generated title -->]</ref> The ONA also posted a memo advising teachers not to join these sites. Teachers can face consequences of license revocations, suspensions, and written reprimands.<br />
<br />
The ''Chronicle of Higher Education'' wrote an article on April 27, 2007, entitled "A MySpace Photo Costs a Student a Teaching Certificate" about Stacy Snyder.<ref>[http://chronicle.com/blogPost/A-MySpace-Photo-Costs-a/2994 Wired Campus: A MySpace Photo Costs a Student a Teaching Certificate – Chronicle.com<!-- Bot generated title -->]</ref> She was a student of [[Millersville University of Pennsylvania]] who was denied her teaching degree because of an unprofessional photo posted on MySpace, which involved her drinking with a pirate's hat on and a caption of “Drunken Pirate". As a substitute, she was given an English degree.<br />
<br />
'''Internet privacy and Blizzard Entertainment'''<br />
- On July 6, 2010, Blizzard Entertainment announced that it would display the real names tied to user accounts in its game forums. On July 9, 2010, CEO and cofounder of Blizzard Mike Morhaime announced a reversal of the decision to force posters' real names to appear on Blizzard's forums. The reversal was made in response to subscriber feedback.<ref name = "blizzardNoRealNames">[http://forums.worldofwarcraft.com/thread.html?topicId=25968987278&sid=1 World of Warcraft forum post], Blizzard announces reversal of its decision to force real names to appear on its forums</ref><br />
<br />
'''Internet privacy and Google Maps'''<br />
- In Spring 2007, [[Google]] improved their Google Maps to include what is known as "Street View". This feature gives the user a 3-D, street level view with real photos of streets, buildings, and landmarks. In order to offer such a service, Google had to send trucks with cameras mounted on them and drive through every single street snapping photos. These photos were eventually stitched together to achieve a near seamless photorealistic map. However, the photos that were snapped included people caught in various acts, some of which includes a man urinating on the street, nude people seen through their windows, and apparently, a man trying to break into someone's apartment, etc; although some images are up to interpretation. This prompted a public outburst and sometime after, Google offered a "report inappropriate image" feature to their website.<ref>S. James Snyder. (2007, June 12). Time Magazine online. "Google Maps: An Invasion of Privacy?" Retrieved from http://www.time.com/time/business/article/0,8599,1631957,00.html</ref><br />
<br />
===Internet service providers===<br />
Internet users obtain Internet access through an [[Internet service provider]] (ISP). All data transmitted to and from users must pass through the ISP. Thus, an ISP has the potential to observe users' activities on the Internet.<br />
<br />
However, ISPs are usually prevented from participating in such activities due to legal, ethical, business, or technical reasons.<br />
<br />
<!--illogical construction-->Despite these legal and ethical restrictions, some ISPs, such as [[British Telecom]] (BT), are planning to use [[deep packet inspection]] technology provided by companies such as [[Phorm]] in order to examine the contents of the pages that people visit. By doing so, they can build up a profile of a person's web surfing habits,{{Citation needed|date=August 2010}} which can then be sold on to advertisers in order to provide targeted advertising. BT's attempt at doing this will be marketed under the name 'Webwise'.{{Citation needed|date=August 2010}}<br />
<br />
Normally ISPs do collect at least ''some'' information about the consumers using their services. From a privacy standpoint, ISPs would ideally collect only as much information as they require in order to provide Internet connectivity (IP address, billing information if applicable, etc).<br />
<br />
Which information an ISP collects, what it does with that information, and whether it informs its consumers, pose significant privacy issues. Beyond the usage of collected information typical of third parties, ISPs sometimes state that they will make their information available to government authorities upon request. In the US and other countries, such a request does not necessarily require a warrant.<br />
<br />
An ISP cannot know the contents of properly-encrypted data passing between its consumers and the Internet. For encrypting [[World Wide Web|web]] traffic, [[https]] has become the most popular and best-supported standard. Even if users encrypt the data, the ISP still knows the IP addresses of the sender and of the recipient. (However, see the [[#IP addresses|IP addresses]] section for workarounds.)<br />
<br />
An [[Anonymizer]] such as [[I2P|I2P – The Anonymous Network]] or [[Tor (anonymity network)|Tor]] can be used for accessing web services without them knowing your IP address and without your ISP knowing what the services are that you access.<br />
<br />
General concerns regarding Internet user privacy have become enough of a concern for a UN agency to issue a report on the dangers of identity fraud.<ref>[http://news.bbc.co.uk/1/hi/technology/6199372.stm UN warns on password 'explosion']</ref><br />
<br />
While signing up for internet services, each computer contains a unique IP, Internet Protocol address. This particular address will not give away private or personal information, however, a weak link could potentially reveal information from your ISP.<ref>http://www.privacyrights.org/fs/fs18-cyb.htm</ref><br />
<br />
<br />
Social networking has redefined the role of Internet privacy. Since users are willingly disclosing personal information online, the role of privacy and security is somewhat blurry. Sites such as Facebook, Myspace, and Twitter have grown popular by broadcasting status updates featuring personal information such as location. Facebook “Places,” in particular, is a Facebook service, which publicizes user location information to the networking community. Users are allowed to “check-in” at various locations including retail stores, convenience stores, and restaurants. Also, users are able to create their own “place,” disclosing personal information onto the Internet. This form of location tracking is automated and must be turned off manually. Various settings must be turned off and manipulated in order for the user to ensure privacy. According to epic.org, Facebook users are recommended to: (1) disable "Friends can check me in to Places," (2) customize "Places I Check In," (3) disable "People Here Now," and (4) uncheck "Places I've Visited.".<ref name="Facebook. PIC">EPIC - In re Facebook. (n.d.). EPIC - Electronic Privacy Information Center. Retrieved January 25, 2011/</ref> Moreover, the Federal Trade Commission has received two complaints in regards to Facebook’s “unfair and deceptive” trade practices, which are used to target advertising sectors of the online community. “Places” tracks user location information and is used primarily for advertising purposes. Each location tracked allows third party advertisers to customize advertisements that suit one’s interests. Currently, the Federal Trade Commissioner along with the Electronic Privacy Information Center are shedding light on the issues of location data tracking on social networking sites.<ref name="Facebook. PIC"/><br />
<br />
==Legal threats==<br />
Use by government agencies of an array of technologies designed to track and gather Internet users' information are the topic of much debate between privacy advocates, civil libertarians and those who believe such measures are necessary for law enforcement to keep pace with rapidly changing communications technology.<br />
<br />
Specific examples<br />
<br />
*Following a decision by the European Union’s council of ministers in Brussels, in January, 2009, the UK's [[Home Office]] adopted a plan to allow police to access the contents of individuals' computers without a warrant. The process, called "remote searching", allows one party, at a remote location, to examine another's hard drive and Internet traffic, including email, browsing history and websites visited. Police across the EU are now permitted to request that the British police conduct a remote search on their behalf. The search can be granted, and the material gleaned turned over and used as evidence, on the basis of a senior officer believing it necessary to prevent a serious crime. Opposition MPs and civil libertarians are concerned about this move toward widening surveillance and its possible impact on personal privacy. Says Shami Chakrabarti, director of the human rights group Liberty, “The public will want this to be controlled by new legislation and judicial authorisation. Without those safeguards it’s a devastating blow to any notion of personal privacy.”<ref>[http://www.timesonline.co.uk/tol/news/politics/article5439604.ece Police set to step up hacking of home PCs]</ref><br />
<br />
*The FBI's [[Magic Lantern (software)|Magic Lantern]] software program was the topic of much debate when it was publicized in November, 2001. Magic Lantern is a [[Trojan horse (computing)|Trojan Horse]] program that logs users' keystrokes, rendering encryption useless.<ref>[http://www.rumormillnews.com/cgi-bin/archive.cgi?noframes;read=15391 FBI 'Lantern' Software Does Log Keystrokes]</ref><br />
<br />
==Laws for Internet Privacy Protection==<br />
<br />
'''USA Patriot Act'''<br />
<br />
The purpose of this act, enacted on October 26, 2001 by former President Bush, was to enhance law enforcement investigatory tools, investigate online activity, as well as to discourage terrorist acts both within the United States and around the world. This act reduced restrictions for law enforcement to search various methods and tools of communication such as telephone, e-mail, personal records including medical and financial, as well as reducing restrictions with obtaining of foreign intelligence.<ref>(January 2011) “USA Patriot Act.” Retrieved from http://www.fincen.gov/statutes_regs/patriot/</ref><br />
<br />
'''Electronic Communications Privacy Act (ECPA)'''<br />
<br />
This act makes it unlawful under certain conditions for an individual to reveal the information of electronic communication and contains a few exceptions. One clause allows the ISP to view private e-mail if the sender is suspected of attempting to damage the internet system or attempting to harm another user. Another clause allows the ISP to reveal information from a message if the sender or recipient allows to its disclosure. Finally, information containing personal information may also be revealed for a court order or law enforcement’s subpoena.<ref name="privacyrights.org"/><br />
<br />
'''Employees and Employers Internet Regulations'''<br />
<br />
When considering the rights between employees and employers regarding internet privacy and protection at a company, different states have their own laws. Connecticut and Delaware both have laws that state an employer must create a written notice or electronic message that provides understanding that they will regulate the internet traffic.<ref name="ncsl.org">NCSL (October 9, 2009). “State Laws Related to Internet Privacy.” National Conference of State Legislatures. Retrieved January 23, 2011, from http://www.ncsl.org/default.aspx?tabid=13463</ref> By doing so, this relates to the employees that the employer will be searching and monitoring emails and internet usage. Delaware charges $100 for a violation where Connecticut charges $500 for the first violation and then $1000 for the second.<ref name="ncsl.org"/> When looking at public employees and employers, California and Colorado created laws that would also create legal ways in which employers controlled internet usage.<ref name="ncsl.org"/> The law stated that a public company or agency must create a prior message to the employees stating that accounts will be monitored. Without these laws, employers could access information through employees accounts and use them illegally.<ref>Cranor, Lorrie Faith (June 1998). “Internet Privacy: A Public Concern.” Lorrie Faith Cranor. Retrieved January 24, 2011, from http://lorrie.cranor.org/pubs/networker-privacy.html</ref> In most cases, the employer is allowed to see whatever he or she pleases because of these laws stated both publicly and privately.<ref>Privacy Rights Clearinghouse (January 2011). “Fact Sheet 7: Workplace Privacy and Employee Monitoring.” Privacy Rights Clearinghouse. Retrieved January 23, 2011 from http://www.privacyrights.org/fs/fs7-work.htm</ref><br />
<br />
==Other potential Internet privacy risks==<br />
<!-- These should each get their own sections --><br />
* '''[[Malware]]''' is a term short for "malicious software" and is used to describe software to cause damage to a single computer, server, or computer network whether that is through the use of a virus, trojan horse, spyware, etc.<ref name="http://technet.microsoft.com/en-us/library/dd632948.aspx">Receieved from http://technet.microsoft.com</ref><br />
* '''[[Spyware]]''' is a piece of software that obtains information from a user's computer without that user's consent.<ref name="http://technet.microsoft.com/en-us/library/dd632948.aspx">Receieved from http://technet.microsoft.com</ref><br />
* A '''web bug''' is an object embedded into a web page or email and is usually invisible to the user of the website or reader of the email. It allows checking to see if a person has looked at a particular website or read a specific email message.<br />
* '''[[Phishing]]''' is a criminally fraudulent process of trying to obtain sensitive information such as user names, passwords, credit card or bank information. Phishing is an internet crime in which someone masquerades as a trustworthy entity in some form of electronic communication.<br />
* '''[[Pharming]]''' is hackers attempt to redirect traffic from a legitimate website to a completely different internet address. Pharming can be conducted by changing the hosts file on a victim’s computer or by exploiting a vulnerability on the DNS server.<br />
* [[Social engineering (computer security)|Social engineering]]<br />
* [[Proxy server#Risks of using anonymous proxy servers|Malicious proxy server]] (or other "anonymity" services)<br />
<br />
==Specific cases==<br />
===Jason Fortuny and Craigslist===<br />
In early September 2006, [[Jason Fortuny]], a [[Seattle metropolitan area|Seattle]]-area freelance graphic designer and network administrator, posed as a woman and posted an ad to [[Craigslist]] Seattle seeking a casual sexual encounter with men in that area. On September 4, he posted to the wiki website [[Encyclopædia Dramatica]] all 178 of the responses, complete with photographs and personal contact details, describing this as the Craigslist Experiment and encouraging others to further identify the respondents.<ref>{{cite web<br />
| url = http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2006/09/17/PKG6BKQQA41.DTL<br />
| author = Neva Chonin<br />
| title = Sex and the City<br />
| publisher = San Francisco Chronicle<br />
|date=September 17, 2006<br />
| accessdate = June 17, 2007<br />
}}</ref><br />
<br />
Although some online exposures of personal information have been seen as justified for exposing malfeasance, many commentators on the Fortuny case saw no such justification here. "The men who replied to Fortuny's posting did not appear to be doing anything illegal, so the outing has no social value other than to prove that someone could ruin lives online," said law professor [[Jonathan Zittrain]],<ref name=autogenerated1>{{cite news<br />
| url = http://www.msnbc.msn.com/id/14791788/<br />
| author = Anick Jesdanun<br />
| title = Prankster posts sex ad replies online<br />
| agency = Associated Press<br />
|date=September 12, 2006<br />
| accessdate = June 27, 2007}}</ref> while ''[[Wired magazine|Wired]]'' writer [[Ryan Singel]] described Fortuny as "[[Psychopathy|sociopathic]]".<ref>{{cite web<br />
| url = http://blog.wired.com/27BStroke6/index.blog?entry_id=1553329<br />
| author = [[Ryan Singel]]<br />
| title = Craigslist<br />
| publisher = Wired Blogs<br />
|date=September 8, 2006<br />
| accessdate = September 12, 2006<br />
}}</ref><br />
<br />
The [[Electronic Frontier Foundation]] indicated that it thought Fortuny might be liable under [[Washington (U.S. state)|Washington]] state law, and that this would depend on whether the information he disclosed was of legitimate public concern. [[Kurt Opsahl]], the EFF's staff attorney, said "As far as I know, they (the respondents) are not public figures, so it would be challenging to show that this was something of public concern."<ref name=autogenerated1 /><br />
<br />
According to Fortuny, two people lost their jobs as a result of his Craigslist Experiment and another "has filed an invasion-of-privacy lawsuit against Fortuny in an Illinois court." <ref>{{cite news<br />
|url=http://www.nytimes.com/2008/08/03/magazine/03trolls-t.html?ex=1375329600&en=b5085d50ee5c65e5&ei=5124&partner=permalink&exprod=permalink<br />
|title=Malwebolence|publisher=New York Times<br />
|accessdate=August 1, 2008|<br />
last=Schwartz|first=Mattathias<br />
|quote=After receiving death threats, Fortuny meticulously scrubbed his real address and phone number from the Internet. “Anyone who knows who and where you are is a security hole,” he told me. “I own a gun. I have an escape route. If someone comes, I’m ready.”}}</ref><br />
<br />
Fortuny did not enter an appearance in the Illinois suit, secure counsel, or answer the complaint after an early amendment. Mr. Fortuny had filed a motion to dismiss, but he filed it with the Circuit Court of Cook County, Illinois, and he did not file proof that he had served the plaintiff.<ref>{{cite court|litigants=Doe v. Fortuny|vol=1:08-cv-1050|court=D. Ill.|date=December 15, 2008|url=https://ecf.ilnd.uscourts.gov/doc1/06715867523}}</ref> As a result, the court entered a [[default judgment]] against Mr. Fortuny and ordered a damages hearing for January 7, 2009.<ref>{{cite court|litigants=Doe v. Fortuny|vol=1:08-cv-1050|court=D. Ill.|date=11/12/2008|url=https://ecf.ilnd.uscourts.gov/doc1/06705746202}}</ref> After failing to show up at multiple hearings on damages,<ref>{{cite court|litigants=Doe v. Fortuny|vol=1:08-cv-1050|court=D. Ill.|date=01/07/2009|url=https://ecf.ilnd.uscourts.gov/doc1/06715925042}}</ref><ref>{{cite court|litigants=Doe v. Fortuny|vol:1:08-cv-1050|court=D. Ill.|date=04/09/2009|url=https://ecf.ilnd.uscourts.gov/doc1/06716314400}}</ref> Fortuny was ordered to pay $74,252.56 for violation of the Copyright Act, compensation for Public Disclosure of Private Facts, Intrusion Upon Seclusion, attorneys fees and costs.<ref>{{cite court|litigants=Doe v. Fortuny|vol=1:08-cv-1050|court=D. Ill.|date=04/09/2009|url=https://ecf.ilnd.uscourts.gov/doc1/06716314618}}</ref><br />
<big><br />
<br />
'''USA vs. Warshak'''</big><br />
<br />
The case ''[[United_States_v._Warshak|United States v. Warshak]]'', decided December 14, 2010 by the Sixth Circuit Court of Appeals, maintained the idea that an ISP actually is allowed access to private e-mail. However, the government must get hold of a search warrant before obtaining such e-mail. This case dealt with the question of emails hosted on an isolated server. Due to the fact that e-mail is similar to other forms of communication such as telephone calls, e-mail requires the same amount of protection under the 4th amendment.<ref name="privacyrights.org"/><br />
<br />
===Search engine data and law enforcement===<br />
Data from major Internet companies, including [[Yahoo!]] and [[MSN]] ([[Microsoft]]), have already been subpoenaed by the [[US government|United States]]<ref>[http://blog.searchenginewatch.com/blog/060119-060352 Bush Administration Demands Search Data; Google Says No; AOL, MSN & Yahoo Said Yes]</ref> and China.<ref>[http://blog.wired.com/27bstroke6/2007/07/yahoo-knew-more.html Yahoo Knew More About China Journalist Subpoena Than It Told Congress It Did]</ref> [[AOL]] even provided a chunk of its own search data online,<ref>[http://www.techdirt.com/articles/20060807/0219238.shtml Forget The Government, AOL Exposes Search Queries To Everyone]</ref> allowing reporters to track the online behaviour of private individuals.<ref>[http://technology.guardian.co.uk/online/search/story/0,,1859785,00.html They know all about you]</ref><br />
<br />
In 2006, a wireless hacker pled guilty when his [[Google]] searches were used as evidence against him. The defendant ran a Google search over the network using the following search terms: "how to broadcast interference over wifi 2.4 GHZ," "interference over wifi 2.4 Ghz," "wireless networks 2.4 interference," and "make device interfere wireless network." While court papers did not describe how the FBI obtained his searches (e.g. through a seized hard-drive or directly from the search-engine), Google has indicated that it can provide search terms to law enforcement if given an Internet address or Web cookie.<br />
<ref>{{cite web<br />
| url = http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1444191<br />
| author = Tim Wafa<br />
| title = Global Internet Privacy Rights – A Pragmatic Approach<br />
| publisher = University of San Francisco Intellectual Property Law Bulletin<br />
| month= June | year= 2009<br />
| accessdate = June 1, 2009<br />
}}</ref><br />
<br />
=== ''US v. Zeigler'' ===<br />
In the United States many cases discuss whether a private employee (i.e., not a government employee) who stores incriminating evidence in workplace computers is protected by the [[Fourth Amendment to the United States Constitution|Fourth Amendment's]] reasonable expectation of privacy standard in a criminal proceeding.<br />
<br />
Most case law holds that employees do not have a reasonable expectation of privacy when it comes to their work related electronic communications. See, e.g. ''US v. Simons'', 206 F.3d 392, 398 (4th Cir., Feb. 28, 2000).<br />
<br />
However, one federal court held that employees can assert that the attorney-client privilege with respect to certain communications on company laptops. See ''Curto v. Medical World Comm''., No. 03CV6327, 2006 U.S. Dist. LEXIS 29387 (E.D.N.Y. May 15, 2006).<br />
<br />
Another recent federal case discussed this topic. On January 30, 2007, the [[Ninth Circuit]] court in US v. Ziegler, reversed its earlier August 2006 decision upon a petition for rehearing. In contrast to the earlier decision, the Court acknowledged that an employee has a right to privacy in his workplace computer. However, the Court also found that an employer can consent to any illegal searches and seizures. See ''US v. Ziegler'', ___F.3d 1077 (9th Cir. Jan. 30, 2007, No. 05-30177). [1] Cf. US v. Ziegler, 456 F.3d 1138 (9th Cir. 2006).<br />
<br />
In Ziegler, an employee had accessed child pornography websites from his workplace. His employer noticed his activities, made copies of the hard drive, and gave the FBI the employee's computer. At his criminal trial, Ziegler filed a motion to suppress the evidence because he argued that the government violated his Fourth Amendment rights.<br />
<br />
The Ninth Circuit allowed the lower court to admit the child pornography as evidence. After reviewing relevant Supreme Court opinions on a reasonable expectation of privacy, the Court acknowledged that Ziegler had a reasonable expectation of privacy at his office and on his computer. That Court also found that his employer could consent to a government search of the computer and that, therefore, the search did not violate Ziegler's Fourth Amendment rights.<br />
<br />
===''State v. Reid''===<br />
The New Jersey Supreme Court has also issued an opinion on the privacy rights of computer users, holding in ''[[State v. Reid]]'' that computer users have a reasonable expectation of privacy concerning the personal information they give to their ISPs.<ref>{{cite web|url=http://lawlibrary.rutgers.edu/decisions/supreme/a-105-06.doc.html |title=a-105-06.doc.html |publisher=Lawlibrary.rutgers.edu |date= |accessdate=September 13, 2010}}</ref><ref>[http://lawlibrary.rutgers.edu/decisions/supreme/a-105-06.doc.html State v. Reid'', 194 N.J. 386, 954 A.2d 503 (N.J. 2008)]</ref><br />
<br />
In that case, Shirley Reid was indicted for computer theft for changing her employer's password and shipping address on its online account with a supplier. The police discovered her identity after serving the ISP, Comcast, with a municipal subpoena not tied to any judicial proceeding.<ref>''Id.'' at 393.</ref><br />
<br />
The lower court suppressed the information from Comcast that linked Reid with the crime on grounds that the disclosure violated Reid's constitutional right to be protected from unreasonable search and seizure.<ref>''Id.'' at 393</ref> The appellate court affirmed, as did the New Jersey Supreme Court, which ruled that ISP subscriber records can only be disclosed to law enforcement upon the issuance of a grand jury subpoena.<ref>''Id.'' at 402.</ref> As a result, New Jersey offers greater privacy rights to computer users than most federal courts.<ref>''Id.'' at 3 96–97.</ref> This case also serves as an illustration of how case law on privacy regarding workplace computers is still evolving.<br />
<br />
===''Robbins v. Lower Merion School District''===<br />
In ''[[Robbins v. Lower Merion School District]]'' (U.S. Eastern District of Pennsylvania 2010), the federal trial court issued an [[injunction]] against the school district after plaintiffs charged two suburban Philadelphia high schools violated the privacy of students and others when they secretly spied on students by surreptitiously and remotely activating webcams embedded in school-issued laptops the students were using at home. The schools admitted to secretly snapping over 66,000 webshots and screenshots, including webcam shots of students in their bedrooms.<ref name="USATODAY">{{cite news|url=http://content.usatoday.com/communities/ondeadline/post/2010/02/school-district-accused-of-issuing-webcam-laptops-to-spy-on-students/1|author=Doug Stanglin|title=School district accused of spying on kids via laptop webcams|date=February 18, 2010|work=[[USA Today]]|accessdate=February 19, 2010}}</ref><ref name="autogenerated5">[http://lmsd.org/documents/news/100503_l3_report.pdf "Initial LANrev System Findings"], LMSD Redacted Forensic Analysis, L-3 Services – prepared for [[Ballard Spahr]] (LMSD's counsel), May 2010. Retrieved August 15, 2010.</ref><br />
<br />
==See also==<br />
* [[Anonymous web browsing]]<br />
* ''[[Robbins v. Lower Merion School District]]''<br />
* [[Freenet]]<br />
* [[Friend-to-friend]]<br />
* [[GNUnet]]<br />
* [[I2P| I2P – The Anonymous Network]]<br />
* [[Internet censorship]]<br />
* [[Internet vigilantism]]<br />
* [[Metadata Removal Tool]]<br />
* [[Privacy policy]]<br />
* ''[[State v. Reid]]''<br />
* [[Tor (anonymity network)]]<br />
* [[anonymizer]]<br />
*[[anonymous remailer]]<br />
*[[anonymous post]]<br />
<br />
==References==<br />
{{reflist|colwidth=30em}}<br />
<br />
==Further reading==<br />
* Lohr, Steve, [http://www.nytimes.com/2010/03/17/technology/17privacy.html?scp=1&sq=how%20privacy%20can%20vanish%20steve%20lohr&st=cse "How Privacy Can Vanish Online, a Bit at a Time"], ''The New York Times'', Wednesday, March 17, 2010<br />
* Gazaleh, Mark [http://cid-8b56ed9e88c6c995.office.live.com/view.aspx/Online%20Trust%20%5E0%20Privacy%20Statements/Online%20trust%20and%20perceived%20utility%20for%20consumers%20of%20web%20privacy%20statements.doc Online trust and perceived utility for consumers of web privacy statements – Overview] ''WBS'', June 2008<br />
* Federal Trade Commission, [http://www.ftc.gov/os/2010/12/101201privacyreport.pdf Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers], December 2010<br />
<br />
== External links==<br />
* [http://www.aafter.com AAfter Internet Privacy Search Engine]<br />
* [http://www.yauba.com Yauba Internet Privacy Search Engine]<br />
* [http://lawdex.com/docs/Bourke_v_Nissan.pdf Expectation of privacy for company email not deemed objectively reasonable – Bourke v. Nissan]<br />
* [http://www.nobodywillknow.com Internet Privacy as Pertains to Anonymous Online Purchasing]<br />
* [http://www.wordstream.com/articles/google-privacy-internet-privacy Internet Privacy Infographic: Google Privacy & Your Privacy on Facebook | WordStream]<br />
<br />
{{Privacy}}<br />
<br />
{{DEFAULTSORT:Internet Privacy}}<br />
[[Category:Internet privacy| ]]<br />
<br />
[[ar:خصوصية الإنترنت]]<br />
[[de:Anonymität im Internet]]<br />
[[es:Privacidad en Internet]]<br />
[[fr:Vie privée et informatique]]<br />
[[ko:인터넷 프라이버시]]<br />
[[hy:Համացանցային գաղտնիություն]]<br />
[[my:အင်တာနက် ကိုယ်ပိုင်အခွင့်အရေး]]</div>TeleComNasSprVenhttps://de.wikipedia.org/w/index.php?title=Datenschutz_im_Internet&diff=91399815Datenschutz im Internet2011-03-18T19:54:20Z<p>TeleComNasSprVen: move up to more relevant section</p>
<hr />
<div>'''Internet privacy''' is the desire or mandate of personal [[privacy]] concerning transactions or transmission of data via the [[Internet]]. It involves the exercise of control over the type and amount of information a person reveals about himself on the Internet and who may access such information. The term is often understood to mean universal Internet privacy, i.e. ''every'' user of the Internet possessing Internet privacy.<br />
<br />
Internet privacy forms a subset of [[data privacy|computer privacy]]. A number of experts within the field of Internet security and privacy believe that privacy doesn't exist; "Privacy is dead – get over it" This should be more encouraged<br />
<ref>{{cite web|url=http://video.google.com/videoplay?docid=-383709537384528624 |title=Toor2122 – Steve Rambam – Privacy Is Dead – Get Over It |publisher=Video.google.com |date=August 1, 2006 |accessdate=September 13, 2010}}</ref> according to Steve Rambam, private investigator specializing in Internet privacy cases. In fact, it has been suggested that the "appeal of online services is to broadcast personal information on purpose."<ref name="Pogue">{{cite journal|last=Pogue|first=David|date=January 2011|title=Don't Worry about Who's watching|journal=[[Scientific American]]|volume=304|issue=1|page=32|url=http://www.scientificamerican.com/article.cfm?id=dont-worry-about-whos-watching}}</ref> On the other hand, in his essay ''The Value of Privacy,'' security expert [[Bruce Schneier]] says, "Privacy protects us from abuses by those in power, even if we're doing nothing wrong at the time of [[surveillance]]."<ref>[http://www.schneier.com/blog/archives/2006/05/the_value_of_pr.html The Value of Privacy by Bruce Schneier]</ref><ref>[http://www.wired.com/politics/security/commentary/securitymatters/2006/05/70886 The Eternal Value of Privacy by Bruce Scneier – Wired.com]</ref><br />
<br />
==Levels of privacy==<br />
{{Inappropriate person|date=March 2011}}<br />
People with only a casual concern for Internet privacy need not achieve total [[anonymity]]. Internet users may achieve an adequate level of privacy through controlled disclosure of personal information. The revelation of IP addresses, non-personally-identifiable profiling, and similar information might become acceptable trade-offs for the convenience that users could otherwise lose using the workarounds needed to suppress such details rigorously. On the other hand, some people desire much stronger privacy. In that case, they may try to achieve ''Internet anonymity'' to ensure privacy — use of the Internet without giving any third parties the ability to link the Internet activities to [[personally-identifiable information]] (P.I.I.) of the Internet user. In order to keep your information private, people need to be careful on what they submit and look at online. When filling out forms and buying merchandise, that becomes tracked and because your information was not private, companies are now sending you spam and advertising on similar products.<br />
<br />
Related State Laws Privacy of Personal Information:<br />
Nevada and Minnesota require Internet Service Providers to keep information private regarding their customers. This is only unless a customer approves their information being given out. According to the National Conference of State Legislator, the following states have certain laws on the personal privacy of its citizens.<br />
<br />
Minnesota Statutes §§ 325M.01 to .09<br />
-Prohibits Internet service providers from disclosing personally identifiable information, including a consumer's physical or electronic address or telephone number; Internet or online sites visited; or any of the contents of a consumer's data storage devices.<br />
Provides for certain circumstances under which information must be disclosed, such as to a grand jury; to a state or federal law enforcement officer acting as authorized by law; pursuant to a court order or court action.<br />
Provides for civil damages of $500 or actual damages and attorney fees for violation of the law.<br />
<br />
<br />
Nevada Revised Statutes § 205.498<br />
-In addition, California and Utah laws, although not specifically targeted to on-line businesses, require all nonfinancial businesses to disclose to customers, in writing or by electronic mail, the types of personal information the business shares with or sells to a third party for direct marketing purposes or for compensation. Under the California law, businesses may post a privacy statement that gives customers the opportunity to choose not to share information at no cost.<br />
<br />
There are also certain laws for employees and businesses and privacy policies for <ref>{{cite web|author=Pam Greenberg |url=http://www.ncsl.org/default.aspx?tabid=13463#isp |title=State Laws Related to Internet Privacy |publisher=Ncsl.org |date=October 19, 2009 |accessdate=September 13, 2010}}</ref> websites.<br />
<br />
California, Connecticut, Nebraska and Pennsylvania all have specific privacy policies regarding websites, these include:<br />
<br />
"California (Calif. Bus. & Prof. Code §§ 22575-22578)<br />
California's Online Privacy Protection Act requires an operator, defined as a person or entity that collects personally identifiable information from California residents through an Internet Web site or online service for commercial purposes, to post conspicuously its privacy policy on its Web site or online service and to comply with that policy. The bill, among other things, would require that the privacy policy identify the categories of personally identifiable information that the operator collects about individual consumers who use or visit its Web site or online service and third parties with whom the operator may share the information.<br />
<br />
Connecticut (Conn. Gen Stat. § 42-471)<br />
Requires any person who collects Social Security numbers in the course of business to create a privacy protection policy. The policy must be "publicly displayed" by posting on a web page and the policy must (1) protect the confidentiality of Social Security numbers, (2) prohibit unlawful disclosure of Social Security numbers, and (3) limit access to Social Security numbers.<br />
<br />
Nebraska (Nebraska Stat. § 87-302(14))<br />
Nebraska prohibits knowingly making a false or misleading statement in a privacy policy, published on the Internet or otherwise distributed or published, regarding the use of personal information submitted by members of the public.<br />
<br />
Pennsylvania (18 Pa. C.S.A. § 4107(a)(10))<br />
Pennsylvania includes false and misleading statements in privacy policies published on Web sites or otherwise distributed in its deceptive or fraudulent business practices statute."<ref>National Conference of State Legislators. (2009, October 19). Privacy policy for websites. Retrieved from http://www.ncsl.org/default.aspx?tabid=13463</ref><br />
<br />
There are also at least 16 states that require government websites to create privacy policies and procedures or to include machine-readable privacy policies into their websites. These states include Arizona, Arkansas, California, Colorado, Delaware, Iowa, Illinois, Maine, Maryland, Michigan, Minnesota, Montana, New York, Sourth Carolina, Texas, Utah, and Virginia.<br />
<br />
==Risks to internet privacy==<br />
In today’s technological world, millions of individuals are subject to privacy threats. Companies are hired not only to watch what you visit online, but to infiltrate the information and send advertising based on your browsing history. People set up accounts for Facebook; enter bank and credit card information to various websites.<br />
<br />
Those concerned about Internet privacy often cite a number of ''privacy risks'' — events that can compromise privacy — which may be encountered through Internet use.<ref>{{cite web<br />
| author = Matt Schafer<br />
| title = Privacy, Privacy, Where for Art Thou Privacy?<br />
| quote = As consumers have became wise to the use of cookies, however, the industry has began using both normal cookies and local shared objects (a.k.a flash cookies) in the event that users would delete the normal cookies.<br />
| publisher = Lippmannwouldroll.com<br />
| date = August 2, 2010<br />
| url = http://lippmannwouldroll.com/2010/08/02/privacy-privacy-where-for-art-thou-privacy/<br />
| accessdate = October 17, 2010<br />
}}</ref> These methods of compromise can range from the gathering of statistics on users, to more malicious acts such as the spreading of spyware and various forms of [[Software bug|bugs]] (software errors) exploitation.<br />
<br />
Privacy measures are provided on several social networking sites to try to provide their users with protection for their personal information. On Facebook for example privacy settings are available for all registered users. The settings available on Facebook include the ability to block certain individuals from seeing your profile, the ability to choose your "friends," and the ability to limit who has access to your pictures and videos. Privacy settings are also available on other social networking sites such as E-harmony and MySpace. It is the user's prerogative to apply such settings when providing personal information on the internet.<br />
<br />
In late 2007 Facebook launched the Beacon program where user rental records were released on the public for friends to see. Many people were enraged by this breach in privacy, and the ''[[Lane v. Facebook, Inc.]]'' case ensued.<br />
<br />
===HTTP cookies===<br />
An [[HTTP cookie]] is data stored on a user's computer that assists in automated access to websites or web features, or other [[State (computer science)|state]] information required in complex web sites. It may also be used for user-tracking by storing special usage history data in a cookie. Cookies are a common concern in the field of privacy. As a result, some types of cookies are classified as a ''tracking cookie''. Although website developers most commonly use cookies for legitimate technical purposes, cases of abuse occur. In 2009, two researchers noted that social networking profiles could be connected to cookies, allowing the social networking profile to be connected to browsing habits.<ref>Krishnamurthy B, Wills CE. (2009). [http://conferences.sigcomm.org/sigcomm/2009/workshops/wosn/papers/p7.pdf On the Leakage of Personally Identifiable Information Via Online Social Networks].</ref><br />
<br />
Systems do not generally make the user explicitly aware of the storing of a cookie. (Although some users object to that, it does not properly relate to Internet privacy. It does however have implications for computer privacy, and specifically for [[computer forensics]].<br />
<br />
The original developers of cookies intended that only the website that originally distributed cookies to users so they could retrieve them, therefore returning only data already possessed by the website. However, in practice programmers can circumvent this restriction. Possible consequences include:<br />
* the placing of a [[personally-identifiable information|personally-identifiable]] tag in a browser to facilitate [[web profiling]] (see below), or,<br />
* use of [[cross-site scripting]] or other techniques to steal information from a user's cookies.<br />
<br />
Some users choose to disable cookies in their web browsers – as of 2000 a Pew survey estimated the proportion of users at 4%.<ref>[http://www.pewinternet.org/report_display.asp?r=19 Trust and Privacy Online: Why Americans Want to Rewrite the Rules. Pew Internet & American Life Project. Released Aug. 20, 2000]</ref> Such an action eliminates the potential privacy risks, but may severely limit or prevent the functionality of many websites. All significant web browsers have this disabling ability built-in, with no external program required. As an alternative, users may frequently delete any stored cookies. Some browsers (such as [[Mozilla Firefox]] and [[Opera (web browser)|Opera]]) offer the option to clear cookies automatically whenever the user closes the browser. A third option involves allowing cookies in general, but preventing their abuse. There are also a host of wrapper applications that will redirect cookies and cache data to some other location.<br />
<br />
The process of ''profiling'' (also known as "tracking") assembles and analyzes several events, each attributable to a single originating entity, in order to gain information (especially patterns of activity) relating to the originating entity. Some organizations engage in the profiling of people's web browsing, collecting the [[Uniform Resource Locator|URL]]s of sites visited. The resulting profiles can potentially link with information that personally identifies the individual who did the browsing.<br />
<br />
Some web-oriented marketing-research organizations may use this practice legitimately, for example: in order to construct profiles of 'typical Internet users'. Such profiles, which describe average trends of large groups of Internet users rather than of actual individuals, can then prove useful for [[market analysis]]. Although the aggregate data does not constitute a privacy violation, some people believe that the initial profiling does.<br />
<br />
Profiling becomes a more contentious privacy issue when data-matching associates the profile of an individual with personally-identifiable information of the individual.<br />
<!-- TODO: Elaborate. Inability of individuals to review or correct false info about themselves. Reselling of the data. Concerns about undesirable uses to which this info is applied (eg, spamming and junk mail). --><br />
<br />
Governments and organizations may set up [[Honeypot (computing)|honeypot]] websites – featuring controversial topics – with the purpose of attracting and tracking unwary people. This constitutes a potential danger for individuals.<br />
<!-- Fix above para --><br />
<br />
===Flash cookies===<br />
Flash cookies, also known as [[Local Shared Object]]s, work the same ways as normal cookies and are used by the [[Adobe Flash Player]] to store information at the user's computer. They exhibit a similar privacy risk as normal [[cookies]], but are not as easily blocked, meaning that the option in most browsers to not accept cookies does not affect flash cookies. One way to view and control them is with browser extensions or add-ons.<br />
<!-- More information should be posted on flash cookies and how they impact users' privacy --><br />
<br />
===Evercookies===<br />
An [[Evercookie]] is a JavaScript-based application which produces cookies in a web browser<br />
that actively "resist" deletion by redundantly copying themselves in different forms on the user's machine (e.g.: Flash [[Local Shared Object]]s, various HTML5 storage mechanisms, window.name caching, etc.), and resurrecting copies are missing or expired.<br />
<br />
===Photographs on the internet===<br />
[[Image:Wikimania impression nophoto.jpg|thumb|'No photos' tag at [[Wikimania]]]]<br />
Today many people have [[digital cameras]] and post their [[photo]]s online. The people depicted in these photos might not want to have them appear on the Internet.<br />
<br />
Some organizations attempt to respond to this privacy-related concern. For example, the 2005 [[Wikimania]] conference required that photographers have the prior permission of the people in their pictures. Some people wore a 'no photos' tag to indicate they would prefer not to have their photo taken.{{Citation needed|date=August 2010}}<br />
<br />
The Harvard Law Review published a short piece called "In The Face of Danger: Facial Recognition and Privacy Law," much of it explaining how "privacy law, in its current form, is of no help to those unwillingly tagged." <ref>In the Face of Danger: Facial Recognition and the Limits of Privacy Law. (2007). Retrieved from Harvard, Harvard Law Review: http://www.harvardlawreview.org/issues/120/may07/note_4397.php.</ref> Any individual can be unwillingly tagged in a photo and displayed in a manner that might violate them personally in some way, and by the time Facebook gets to taking down the photo, many people will have already had the chance to view, share, or distribute it. Furthermore, traditional tort law does not protect people who are captured by a photograph in public because this is not counted as an invasion of privacy. The extensive Facebook privacy policy covers these concerns and much more. For example, the policy states that they reserve the right to disclose member information or share photos with companies, lawyers, courts, government entities, etc. if they feel it absolutely necessary. The policy also informs users that profile pictures are mainly to help friends connect to each other.<ref>Facebook's Privacy Policy. (2010). Retrieved from Facebook: http://www.facebook.com/policy.php.</ref> However, these, as well as other pictures, can allow other people to invade a person’s privacy by finding out information that can be used to track and locate a certain individual. In an article featured in ABC news, it was stated that two teams of scientists found out that Hollywood stars could be giving up information about their private whereabouts very easily through pictures uploaded to the Internet. Moreover, it was found that pictures taken by [[iPhone]]s automatically attach the [[latitude]] and [[longitude]] of the picture taken through [[metadata]] unless this function is manually disabled.<ref>Heussner, M. K. (2010). Celebrities' Photos, Videos May Reveal Location. Retrieved from ABC: http://abcnews.go.com/technology/ celebrity-stalking-online-photos-give-location/ story?id=11162352&page=1.</ref><br />
<br />
===Search engines===<br />
<br />
Search engines have the ability to track a user’s searches. Personal information can be revealed through searches including search items used, the time of the search, and more. Search engines have claimed a necessity to retain such information in order to provide better services, protect against security pressure, and protect against fraud.<br />
<ref name="privacyrights.org">(December 2010) Online Privacy: Using the Internet Safely. Retrieved from http://www.privacyrights.org/fs/fs18-cyb.htm</ref><br />
<br />
===Data logging===<br />
Many programs and operating systems are set up to perform [[data logging]] of usage. This may include recording times when the computer is in use, or which web sites are visited. If a third party has sufficient access to the computer, legitimately or not, the user's privacy may be compromised. This could be avoided by disabling logging, or by clearing logs regularly.<br />
<br />
===Privacy within social networking sites===<br />
Prior to the social networking site explosion over the past decade, there were early forms of social network technologies that included online multiplayer games, blog sites, news groups, mailings lists and dating services. These all created a backbone for the new modern sites, and even from the start of these older versions privacy was an issue. In 1996, a young woman in New York City was on a first date with an online acquaintance and later sued for sexual harassment as they went back to her apartment after when everything became too real. This is just an early example of many more issues to come regarding internet privacy.<ref>Tracy Mitrano. (2006, November, December). A Wider World: Youth, Privacy, and Social Networking Technologies. Retrieved from http://www.educause.edu/EDUCAUSE+Review/EDUCAUSEReviewMagazineVolume41/AWiderWorldYouthPrivacyandSoci/158095</ref><br />
<br />
Social networking sites have become very popular within the last five years. With the creation of [[Facebook]] and the continued popularity of [[MySpace]] many people are giving their personal information out on the internet. These [[social network]]s keep track of all interactions used on their sites and save them for later use.<ref>Dwyer, C., Hiltz, S. & Passerini, K. (2007). Trust and Privacy Concern within Social Networking Sites: A Comparison of Facebook and MySpace. Americas Conference on Information Systems. Retrieved from http://74.125.155.132/scholar?q=cache:qLCk18d_wZwJ:scholar.google.com/+facebook+privacy&hl=en&as_sdt=2000</ref> Most users are not aware that they can modify the privacy settings and unless they modify them, their information is open to the public. On Facebook privacy settings can be accessed via the drop down menu under account in the top right corner. There users can change who can view their profile and what information can be displayed on their profile.<ref name="facebook.com">Facebook’s Privacy Policy. (2010). Retrieved from http://www.facebook.com/policy.php</ref> In most cases profiles are open to either "all my network and friends" or "all of my friends." Also, information that shows on a user's profile such as birthday, religious views, and relationship status can be removed via the privacy settings.<ref>Lipford, H. R., Besmer, A. & Watson, J. (2009). Understanding Privacy Settings in Facebook with an Audience View. Department of Software and Information Systems University of North Carolina at Charlotte. Retrieved from http://www.usenix.org/events/upsec08/tech/full_papers/lipford/lipford_html/</ref> If a user is under 13 years old they are not able to make a Facebook or a MySpace account, however, this is not regulated.<ref name="facebook.com"/><br />
<br />
Social networking has redefined the role of Internet privacy. Since users are willingly disclosing personal information online, the role of privacy and security is somewhat blurry. Sites such as Facebook, Myspace, and Twitter have grown popular by broadcasting status updates featuring personal information such as location. Facebook “Places,” in particular, is a Facebook service, which publicizes user location information to the networking community. Users are allowed to “check-in” at various locations including retail stores, convenience stores, and restaurants. Also, users are able to create their own “place,” disclosing personal information onto the Internet. This form of location tracking is automated and must be turned off manually. Various settings must be turned off and manipulated in order for the user to ensure privacy. According to epic.org, Facebook users are recommended to: (1) disable "Friends can check me in to Places," (2) customize "Places I Check In," (3) disable "People Here Now," and (4) uncheck "Places I've Visited.".<ref name="Facebook. PIC">EPIC - In re Facebook. (n.d.). EPIC - Electronic Privacy Information Center. Retrieved January 25, 2011/</ref> Moreover, the Federal Trade Commission has received two complaints in regards to Facebook’s “unfair and deceptive” trade practices, which are used to target advertising sectors of the online community. “Places” tracks user location information and is used primarily for advertising purposes. Each location tracked allows third party advertisers to customize advertisements that suit one’s interests. Currently, the Federal Trade Commissioner along with the Electronic Privacy Information Center are shedding light on the issues of location data tracking on social networking sites.<ref name="Facebook. PIC"/><br />
<br />
Recently, Facebook has been scrutinized for having a variety of applications that are considered to be invasive to user privacy. “The Breakup Notifier” is an example of a Facebook “cyberstalking” app that has recently been taken down. Essentially, the application notifies users when a person breaks up with their partner through Facebook, allowing users to instantly become aware of their friend's romantic activities. The concept became very popular, with the site attracting 700,000 visits in the first 36 hours; people downloaded the app 40,000 times. Just days later, the app had more than 3.6 million downloads and 9,000 Facebook likes. <ref>Retrieved from http://www.foxnews.com/scitech/2011/02/24/facebook-quashes-hot-new-stalker-app/</ref><br />
<br />
There are other applications that border on “cyberstalking.” An application named "Creepy" can track a person's location on a map using photos uploaded to Twitter or Flickr. When a person uploads photos to a social networking site, others are able to track their most recent location. Some smart phones are able to embed the longitude and latitude coordinates into the photo and automatically send this information to the application. Anybody using the application can search for a specific person and then find their immediate location. This poses many potential threats to users who share their information with a large group of followers. <ref> Retrieved from: http://abcnews.go.com/Technology/smartphone-apps-tracking-keeping-tabs-past-lovers-people/story?id=13022144</ref><br />
<br />
Facebook recently updated its profile format allowing for people who are not “friends” of others to view personal information about other users, even when the profile is set to private. However, As of January 18, 2011 Facebook changed its decision to make home addresses and telephone numbers accessible to third party members, but it is still possible for third party members to have access to less exact personal information, like one’s hometown and employment, if the user has entered the information into Facebook . EPIC Executive Director Marc Rotenberg said "Facebook is trying to blur the line between public and private information. And the request for permission does not make clear to the user why the information is needed or how it will be used." <ref>Electronic Privacy Information Center, Initials. (2011, January 18). Facebook drops plan to disclose users' home addresses and personal phone number. Retrieved from http://epic.org/privacy/socialnet/</ref><br />
Similar to Rotenberg’s claim that Facebook users are unclear of how or why their information has gone public, recently the Federal Trade Commission and Commerce Department have become involved. The Federal Trade Commission has recently released a report claiming that Internet companies and other industries will soon need to increase their protection for online users. Because online users often unknowingly opt in on making their information public, the FTC is urging Internet companies to make privacy notes simpler and easier for the public to understand, therefore increasing their option to opt out. Perhaps this new policy should also be implemented in the Facebook world. The Commerce Department claims that Americans, “have been ill-served by a patchwork of privacy laws that contain broad gaps,”.<ref>American Civil Liberties Union. (2010, December 16). Commerce department releases important report urging comprehensive privacy protections. Retrieved from http://www.aclu.org/technology-and-liberty/commerce-department-releases-important-report-urging-comprehensive-privacy-pr</ref> Because of these broad gaps, Americans are more susceptible to identity theft and having their online activity tracked by others.<br />
<br />
'''Spokeo'''<br />
- [[Spokeo]] is a “people-related” search engine with results compiled through data aggregation. The site contains information such as age, relationship status, estimated personal wealth, immediate family members and home address of individual people. This information is compiled through what is already on the internet or in other public records, but the website does not guarantee accuracy. <ref>http://www.spokeo.com/blog/about/ </ref><br />
<br />
[[Spokeo]] has been faced with potential class action law suits from people who claim that the organization breaches the Fair Credit Reporting Act. In September, 2010, Jennifer Purcell claimed that the FCRA was violated by [[Spokeo]] marketing her personal information. Her case is pending in court. Also in 2010, Thomas Robins claimed that his personal information on the website was inaccurate and he was unable to edit it for accuracy. The case was dismissed because Robins did not claim that the site directly caused him actual harm. <ref> Baynes, T. (2011, February 24). Lawsuits challenge U.S. online data brokers. Reuters. Retrieved from http://uk.reuters.com/article/2011/02/24/idUKN2427826420110224?pageNumber=1</ref> On February 15, 2011, Robins filed another suit, this time stating [[Spokeo]] has caused him “imminent and ongoing” harm. <ref> Davis, W. (2011, February 17). Spokeo charged with violating fair credit reporting<br />
act. MediaPost Publications. Retrieved from http://www.mediapost.com/publications/?<br />
fa=Articles.showArticle&art_aid=145270 </ref><br />
<br />
'''Twitter Case'''<br />
- In January 2011, the government recently obtained a court order to force the social networking site, Twitter, to reveal information applicable surrounding certain subscribers involved in the WikiLeaks cases. This outcome of this case is questionable because it deals with the user’s First Amendment rights. Twitter moved to reverse the court order, and supported the idea that internet users should be notified and given an opportunity to defend their constitutional rights in court before their rights are compromised.<ref>(1/8/11) Government Requests For Twitter Users’ Personal Information Raises Serious Constitutional Concerns. Retrieved from http://www.aclu.org/technology-and-liberty/government-requests-twitter-users-personal-information-raise-serious-constitu</ref><br />
<br />
'''Facebook Friends Study'''<br />
- A study was conducted at Northeastern University by Alan Mislove and his colleagues at the Max Planck Institute for Software Systems, where an algorithm was created to try and discover personal attributes of a Facebook user by looking at their friend’s list. They looked for information such as high school and college attended, major, hometown, graduation year and even what dorm a student may have lived in. The study revealed that only 5% of people thought to change their friend’s list to private. For other users, 58% displayed university attended, 42% revealed employers, 35% revealed interests and 19% gave viewers public access to where they were located. Due to the correlation of Facebook friends and universities they attend, it was easy to discover where a Facebook user was based on their list of friends. This fact is one that has become very useful to advertisers targeting their audiences but is also a big risk for the privacy of all those with Facebook accounts.<ref>Erik Hayden. (2010, March 11). On Facebook, You Are Who You Know. Retrieved from http://www.miller-mccune.com/culture-society/on-facebook-you-are-who-you-know-10385/#</ref><br />
<br />
'''Law enforcement prowling the networks'''<br />
- The [[FBI]] has dedicated undercover agents on [[Facebook]], [[Twitter]], [[MySpace]], [[LinkedIn]]. The rules and guidelines to the privacy issue is internal to the Justice Department and details aren't released to the public. Agents can impersonate a friend, a long lost relative, even a spouse and child. This raises real issues regarding privacy. Although people who use [[Facebook]], [[Twitter]], and other social networking sites are aware of some level of privacy will always be compromised, but, no one would ever suspect that the friend invitation might be from a federal agent whose sole purpose of the friend request was to snoop around. Furthermore, [[Facebook]], [[Twitter]], and [[MySpace]] have personal information and past posts logged for up to one year; even deleted profiles, and with a warrant, can hand over very personal information. One example of investigators using Facebook to nab a criminal is the case of Maxi Sopo. Charged with bank fraud, and having escaped to [[Mexico]], he was nowhere to be found until he started posting on [[Facebook]]. Although his profile was private, his list of friends were not, and through this vector, they eventually caught him.<ref>Richard Lardner. (2010, March 16). Your new Facebook ‘friend’ may be the FBI. Retrieved from http://www.msnbc.msn.com/id/35890739/ns/technology_and_science-security/</ref><br />
<br />
In recent years, some state and local law enforcement agencies have also begun to rely on social media websites as resources. Although obtaining records of information not shared publicly by or about site users often requires a subpoena, public pages on sites such as [[Facebook]] and [[MySpace]] offer access to personal information that can be valuable to law enforcement. <ref> Harkins, Gina. (2011, March 02). Cops patrol social networking sites for gang activity. Retrieved from http://news.medill.northwestern.edu/chicago/news.aspx?id=181375 </ref> Police departments have reported using social media websites to assist in investigations, locate and track suspects, and monitor gang activity. <ref> Taghi, Hasti. (2011, February 10). Police Use Facebook To Track Suspect. Retrieved from http://www.click2houston.com/news/26825687/detail.html </ref><br />
<ref> Halverstadt, Lisa. (2009, March 12). Surprise police use MySpace to locate teen graffiti suspect. Retrieved from http://www.azcentral.com/news/articles/2009/03/12/20090312gl-nwvmyspace0313.html </ref><br />
<br />
'''Teachers and MySpace'''<br />
- Teachers’ privacy on [[MySpace]] has created controversy across the world. They are forewarned by The Ohio News Association <ref>[http://blogs.sun.com/learningcurve/tags/myspace Learning Curve<!-- Bot generated title -->]</ref> that if they have a MySpace account, it should be deleted. Eschool News warns, “Teachers, watch what you post online.” <ref>[http://www.eschoolnews.com/news/top-news/related-top-news/?i=50557;_hbguid=49a1babb-b469-4a85-a273-292a0514d91d Related Top News – Teachers warned about MySpace profiles<!-- Bot generated title -->]</ref> The ONA also posted a memo advising teachers not to join these sites. Teachers can face consequences of license revocations, suspensions, and written reprimands.<br />
<br />
The ''Chronicle of Higher Education'' wrote an article on April 27, 2007, entitled "A MySpace Photo Costs a Student a Teaching Certificate" about Stacy Snyder.<ref>[http://chronicle.com/blogPost/A-MySpace-Photo-Costs-a/2994 Wired Campus: A MySpace Photo Costs a Student a Teaching Certificate – Chronicle.com<!-- Bot generated title -->]</ref> She was a student of [[Millersville University of Pennsylvania]] who was denied her teaching degree because of an unprofessional photo posted on MySpace, which involved her drinking with a pirate's hat on and a caption of “Drunken Pirate". As a substitute, she was given an English degree.<br />
<br />
'''Internet privacy and Blizzard Entertainment'''<br />
- On July 6, 2010, Blizzard Entertainment announced that it would display the real names tied to user accounts in its game forums. On July 9, 2010, CEO and cofounder of Blizzard Mike Morhaime announced a reversal of the decision to force posters' real names to appear on Blizzard's forums. The reversal was made in response to subscriber feedback.<ref name = "blizzardNoRealNames">[http://forums.worldofwarcraft.com/thread.html?topicId=25968987278&sid=1 World of Warcraft forum post], Blizzard announces reversal of its decision to force real names to appear on its forums</ref><br />
<br />
'''Internet privacy and Google Maps'''<br />
- In Spring 2007, [[Google]] improved their Google Maps to include what is known as "Street View". This feature gives the user a 3-D, street level view with real photos of streets, buildings, and landmarks. In order to offer such a service, Google had to send trucks with cameras mounted on them and drive through every single street snapping photos. These photos were eventually stitched together to achieve a near seamless photorealistic map. However, the photos that were snapped included people caught in various acts, some of which includes a man urinating on the street, nude people seen through their windows, and apparently, a man trying to break into someone's apartment, etc; although some images are up to interpretation. This prompted a public outburst and sometime after, Google offered a "report inappropriate image" feature to their website.<ref>S. James Snyder. (2007, June 12). Time Magazine online. "Google Maps: An Invasion of Privacy?" Retrieved from http://www.time.com/time/business/article/0,8599,1631957,00.html</ref><br />
<br />
===Internet service providers===<br />
Internet users obtain Internet access through an [[Internet service provider]] (ISP). All data transmitted to and from users must pass through the ISP. Thus, an ISP has the potential to observe users' activities on the Internet.<br />
<br />
However, ISPs are usually prevented from participating in such activities due to legal, ethical, business, or technical reasons.<br />
<br />
<!--illogical construction-->Despite these legal and ethical restrictions, some ISPs, such as [[British Telecom]] (BT), are planning to use [[deep packet inspection]] technology provided by companies such as [[Phorm]] in order to examine the contents of the pages that people visit. By doing so, they can build up a profile of a person's web surfing habits,{{Citation needed|date=August 2010}} which can then be sold on to advertisers in order to provide targeted advertising. BT's attempt at doing this will be marketed under the name 'Webwise'.{{Citation needed|date=August 2010}}<br />
<br />
Normally ISPs do collect at least ''some'' information about the consumers using their services. From a privacy standpoint, ISPs would ideally collect only as much information as they require in order to provide Internet connectivity (IP address, billing information if applicable, etc).<br />
<br />
Which information an ISP collects, what it does with that information, and whether it informs its consumers, pose significant privacy issues. Beyond the usage of collected information typical of third parties, ISPs sometimes state that they will make their information available to government authorities upon request. In the US and other countries, such a request does not necessarily require a warrant.<br />
<br />
An ISP cannot know the contents of properly-encrypted data passing between its consumers and the Internet. For encrypting [[World Wide Web|web]] traffic, [[https]] has become the most popular and best-supported standard. Even if users encrypt the data, the ISP still knows the IP addresses of the sender and of the recipient. (However, see the [[#IP addresses|IP addresses]] section for workarounds.)<br />
<br />
An [[Anonymizer]] such as [[I2P|I2P – The Anonymous Network]] or [[Tor (anonymity network)|Tor]] can be used for accessing web services without them knowing your IP address and without your ISP knowing what the services are that you access.<br />
<br />
General concerns regarding Internet user privacy have become enough of a concern for a UN agency to issue a report on the dangers of identity fraud.<ref>[http://news.bbc.co.uk/1/hi/technology/6199372.stm UN warns on password 'explosion']</ref><br />
<br />
While signing up for internet services, each computer contains a unique IP, Internet Protocol address. This particular address will not give away private or personal information, however, a weak link could potentially reveal information from your ISP.<ref>http://www.privacyrights.org/fs/fs18-cyb.htm</ref><br />
<br />
<br />
Social networking has redefined the role of Internet privacy. Since users are willingly disclosing personal information online, the role of privacy and security is somewhat blurry. Sites such as Facebook, Myspace, and Twitter have grown popular by broadcasting status updates featuring personal information such as location. Facebook “Places,” in particular, is a Facebook service, which publicizes user location information to the networking community. Users are allowed to “check-in” at various locations including retail stores, convenience stores, and restaurants. Also, users are able to create their own “place,” disclosing personal information onto the Internet. This form of location tracking is automated and must be turned off manually. Various settings must be turned off and manipulated in order for the user to ensure privacy. According to epic.org, Facebook users are recommended to: (1) disable "Friends can check me in to Places," (2) customize "Places I Check In," (3) disable "People Here Now," and (4) uncheck "Places I've Visited.".<ref name="Facebook. PIC">EPIC - In re Facebook. (n.d.). EPIC - Electronic Privacy Information Center. Retrieved January 25, 2011/</ref> Moreover, the Federal Trade Commission has received two complaints in regards to Facebook’s “unfair and deceptive” trade practices, which are used to target advertising sectors of the online community. “Places” tracks user location information and is used primarily for advertising purposes. Each location tracked allows third party advertisers to customize advertisements that suit one’s interests. Currently, the Federal Trade Commissioner along with the Electronic Privacy Information Center are shedding light on the issues of location data tracking on social networking sites.<ref name="Facebook. PIC"/><br />
<br />
==Legal threats==<br />
Use by government agencies of an array of technologies designed to track and gather Internet users' information are the topic of much debate between privacy advocates, civil libertarians and those who believe such measures are necessary for law enforcement to keep pace with rapidly changing communications technology.<br />
<br />
Specific examples<br />
<br />
*Following a decision by the European Union’s council of ministers in Brussels, in January, 2009, the UK's [[Home Office]] adopted a plan to allow police to access the contents of individuals' computers without a warrant. The process, called "remote searching", allows one party, at a remote location, to examine another's hard drive and Internet traffic, including email, browsing history and websites visited. Police across the EU are now permitted to request that the British police conduct a remote search on their behalf. The search can be granted, and the material gleaned turned over and used as evidence, on the basis of a senior officer believing it necessary to prevent a serious crime. Opposition MPs and civil libertarians are concerned about this move toward widening surveillance and its possible impact on personal privacy. Says Shami Chakrabarti, director of the human rights group Liberty, “The public will want this to be controlled by new legislation and judicial authorisation. Without those safeguards it’s a devastating blow to any notion of personal privacy.”<ref>[http://www.timesonline.co.uk/tol/news/politics/article5439604.ece Police set to step up hacking of home PCs]</ref><br />
<br />
*The FBI's [[Magic Lantern (software)|Magic Lantern]] software program was the topic of much debate when it was publicized in November, 2001. Magic Lantern is a [[Trojan horse (computing)|Trojan Horse]] program that logs users' keystrokes, rendering encryption useless.<ref>[http://www.rumormillnews.com/cgi-bin/archive.cgi?noframes;read=15391 FBI 'Lantern' Software Does Log Keystrokes]</ref><br />
<br />
==Laws for Internet Privacy Protection==<br />
<br />
'''USA Patriot Act'''<br />
<br />
The purpose of this act, enacted on October 26, 2001 by former President Bush, was to enhance law enforcement investigatory tools, investigate online activity, as well as to discourage terrorist acts both within the United States and around the world. This act reduced restrictions for law enforcement to search various methods and tools of communication such as telephone, e-mail, personal records including medical and financial, as well as reducing restrictions with obtaining of foreign intelligence.<ref>(January 2011) “USA Patriot Act.” Retrieved from http://www.fincen.gov/statutes_regs/patriot/</ref><br />
<br />
'''Electronic Communications Privacy Act (ECPA)'''<br />
<br />
This act makes it unlawful under certain conditions for an individual to reveal the information of electronic communication and contains a few exceptions. One clause allows the ISP to view private e-mail if the sender is suspected of attempting to damage the internet system or attempting to harm another user. Another clause allows the ISP to reveal information from a message if the sender or recipient allows to its disclosure. Finally, information containing personal information may also be revealed for a court order or law enforcement’s subpoena.<ref name="privacyrights.org"/><br />
<br />
'''Employees and Employers Internet Regulations'''<br />
<br />
When considering the rights between employees and employers regarding internet privacy and protection at a company, different states have their own laws. Connecticut and Delaware both have laws that state an employer must create a written notice or electronic message that provides understanding that they will regulate the internet traffic.<ref name="ncsl.org">NCSL (October 9, 2009). “State Laws Related to Internet Privacy.” National Conference of State Legislatures. Retrieved January 23, 2011, from http://www.ncsl.org/default.aspx?tabid=13463</ref> By doing so, this relates to the employees that the employer will be searching and monitoring emails and internet usage. Delaware charges $100 for a violation where Connecticut charges $500 for the first violation and then $1000 for the second.<ref name="ncsl.org"/> When looking at public employees and employers, California and Colorado created laws that would also create legal ways in which employers controlled internet usage.<ref name="ncsl.org"/> The law stated that a public company or agency must create a prior message to the employees stating that accounts will be monitored. Without these laws, employers could access information through employees accounts and use them illegally.<ref>Cranor, Lorrie Faith (June 1998). “Internet Privacy: A Public Concern.” Lorrie Faith Cranor. Retrieved January 24, 2011, from http://lorrie.cranor.org/pubs/networker-privacy.html</ref> In most cases, the employer is allowed to see whatever he or she pleases because of these laws stated both publicly and privately.<ref>Privacy Rights Clearinghouse (January 2011). “Fact Sheet 7: Workplace Privacy and Employee Monitoring.” Privacy Rights Clearinghouse. Retrieved January 23, 2011 from http://www.privacyrights.org/fs/fs7-work.htm</ref><br />
<br />
==Other potential Internet privacy risks==<br />
<!-- These should each get their own sections --><br />
* '''[[Malware]]''' is a term short for "malicious software" and is used to describe software to cause damage to a single computer, server, or computer network whether that is through the use of a virus, trojan horse, spyware, etc.<ref name="http://technet.microsoft.com/en-us/library/dd632948.aspx">Receieved from http://technet.microsoft.com</ref><br />
* '''[[Spyware]]''' is a piece of software that obtains information from a user's computer without that user's consent.<ref name="http://technet.microsoft.com/en-us/library/dd632948.aspx">Receieved from http://technet.microsoft.com</ref><br />
* A '''web bug''' is an object embedded into a web page or email and is usually invisible to the user of the website or reader of the email. It allows checking to see if a person has looked at a particular website or read a specific email message.<br />
* '''[[Phishing]]''' is a criminally fraudulent process of trying to obtain sensitive information such as user names, passwords, credit card or bank information. Phishing is an internet crime in which someone masquerades as a trustworthy entity in some form of electronic communication.<br />
* '''[[Pharming]]''' is hackers attempt to redirect traffic from a legitimate website to a completely different internet address. Pharming can be conducted by changing the hosts file on a victim’s computer or by exploiting a vulnerability on the DNS server.<br />
* [[Social engineering (computer security)|Social engineering]]<br />
* [[Proxy server#Risks of using anonymous proxy servers|Malicious proxy server]] (or other "anonymity" services)<br />
<br />
==Specific cases==<br />
===Jason Fortuny and Craigslist===<br />
In early September 2006, [[Jason Fortuny]], a [[Seattle metropolitan area|Seattle]]-area freelance graphic designer and network administrator, posed as a woman and posted an ad to [[Craigslist]] Seattle seeking a casual sexual encounter with men in that area. On September 4, he posted to the wiki website [[Encyclopædia Dramatica]] all 178 of the responses, complete with photographs and personal contact details, describing this as the Craigslist Experiment and encouraging others to further identify the respondents.<ref>{{cite web<br />
| url = http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2006/09/17/PKG6BKQQA41.DTL<br />
| author = Neva Chonin<br />
| title = Sex and the City<br />
| publisher = San Francisco Chronicle<br />
|date=September 17, 2006<br />
| accessdate = June 17, 2007<br />
}}</ref><br />
<br />
Although some online exposures of personal information have been seen as justified for exposing malfeasance, many commentators on the Fortuny case saw no such justification here. "The men who replied to Fortuny's posting did not appear to be doing anything illegal, so the outing has no social value other than to prove that someone could ruin lives online," said law professor [[Jonathan Zittrain]],<ref name=autogenerated1>{{cite news<br />
| url = http://www.msnbc.msn.com/id/14791788/<br />
| author = Anick Jesdanun<br />
| title = Prankster posts sex ad replies online<br />
| agency = Associated Press<br />
|date=September 12, 2006<br />
| accessdate = June 27, 2007}}</ref> while ''[[Wired magazine|Wired]]'' writer [[Ryan Singel]] described Fortuny as "[[Psychopathy|sociopathic]]".<ref>{{cite web<br />
| url = http://blog.wired.com/27BStroke6/index.blog?entry_id=1553329<br />
| author = [[Ryan Singel]]<br />
| title = Craigslist<br />
| publisher = Wired Blogs<br />
|date=September 8, 2006<br />
| accessdate = September 12, 2006<br />
}}</ref><br />
<br />
The [[Electronic Frontier Foundation]] indicated that it thought Fortuny might be liable under [[Washington (U.S. state)|Washington]] state law, and that this would depend on whether the information he disclosed was of legitimate public concern. [[Kurt Opsahl]], the EFF's staff attorney, said "As far as I know, they (the respondents) are not public figures, so it would be challenging to show that this was something of public concern."<ref name=autogenerated1 /><br />
<br />
According to Fortuny, two people lost their jobs as a result of his Craigslist Experiment and another "has filed an invasion-of-privacy lawsuit against Fortuny in an Illinois court." <ref>{{cite news<br />
|url=http://www.nytimes.com/2008/08/03/magazine/03trolls-t.html?ex=1375329600&en=b5085d50ee5c65e5&ei=5124&partner=permalink&exprod=permalink<br />
|title=Malwebolence|publisher=New York Times<br />
|accessdate=August 1, 2008|<br />
last=Schwartz|first=Mattathias<br />
|quote=After receiving death threats, Fortuny meticulously scrubbed his real address and phone number from the Internet. “Anyone who knows who and where you are is a security hole,” he told me. “I own a gun. I have an escape route. If someone comes, I’m ready.”}}</ref><br />
<br />
Fortuny did not enter an appearance in the Illinois suit, secure counsel, or answer the complaint after an early amendment. Mr. Fortuny had filed a motion to dismiss, but he filed it with the Circuit Court of Cook County, Illinois, and he did not file proof that he had served the plaintiff.<ref>{{cite court|litigants=Doe v. Fortuny|vol=1:08-cv-1050|court=D. Ill.|date=December 15, 2008|url=https://ecf.ilnd.uscourts.gov/doc1/06715867523}}</ref> As a result, the court entered a [[default judgment]] against Mr. Fortuny and ordered a damages hearing for January 7, 2009.<ref>{{cite court|litigants=Doe v. Fortuny|vol=1:08-cv-1050|court=D. Ill.|date=11/12/2008|url=https://ecf.ilnd.uscourts.gov/doc1/06705746202}}</ref> After failing to show up at multiple hearings on damages,<ref>{{cite court|litigants=Doe v. Fortuny|vol=1:08-cv-1050|court=D. Ill.|date=01/07/2009|url=https://ecf.ilnd.uscourts.gov/doc1/06715925042}}</ref><ref>{{cite court|litigants=Doe v. Fortuny|vol:1:08-cv-1050|court=D. Ill.|date=04/09/2009|url=https://ecf.ilnd.uscourts.gov/doc1/06716314400}}</ref> Fortuny was ordered to pay $74,252.56 for violation of the Copyright Act, compensation for Public Disclosure of Private Facts, Intrusion Upon Seclusion, attorneys fees and costs.<ref>{{cite court|litigants=Doe v. Fortuny|vol=1:08-cv-1050|court=D. Ill.|date=04/09/2009|url=https://ecf.ilnd.uscourts.gov/doc1/06716314618}}</ref><br />
<big><br />
<br />
'''USA vs. Warshak'''</big><br />
<br />
The case ''[[United_States_v._Warshak|United States v. Warshak]]'', decided December 14, 2010 by the Sixth Circuit Court of Appeals, maintained the idea that an ISP actually is allowed access to private e-mail. However, the government must get hold of a search warrant before obtaining such e-mail. This case dealt with the question of emails hosted on an isolated server. Due to the fact that e-mail is similar to other forms of communication such as telephone calls, e-mail requires the same amount of protection under the 4th amendment.<ref name="privacyrights.org"/><br />
<br />
===Search engine data and law enforcement===<br />
Data from major Internet companies, including [[Yahoo!]] and [[MSN]] ([[Microsoft]]), have already been subpoenaed by the [[US government|United States]]<ref>[http://blog.searchenginewatch.com/blog/060119-060352 Bush Administration Demands Search Data; Google Says No; AOL, MSN & Yahoo Said Yes]</ref> and China.<ref>[http://blog.wired.com/27bstroke6/2007/07/yahoo-knew-more.html Yahoo Knew More About China Journalist Subpoena Than It Told Congress It Did]</ref> [[AOL]] even provided a chunk of its own search data online,<ref>[http://www.techdirt.com/articles/20060807/0219238.shtml Forget The Government, AOL Exposes Search Queries To Everyone]</ref> allowing reporters to track the online behaviour of private individuals.<ref>[http://technology.guardian.co.uk/online/search/story/0,,1859785,00.html They know all about you]</ref><br />
<br />
In 2006, a wireless hacker pled guilty when his [[Google]] searches were used as evidence against him. The defendant ran a Google search over the network using the following search terms: "how to broadcast interference over wifi 2.4 GHZ," "interference over wifi 2.4 Ghz," "wireless networks 2.4 interference," and "make device interfere wireless network." While court papers did not describe how the FBI obtained his searches (e.g. through a seized hard-drive or directly from the search-engine), Google has indicated that it can provide search terms to law enforcement if given an Internet address or Web cookie.<br />
<ref>{{cite web<br />
| url = http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1444191<br />
| author = Tim Wafa<br />
| title = Global Internet Privacy Rights – A Pragmatic Approach<br />
| publisher = University of San Francisco Intellectual Property Law Bulletin<br />
| month= June | year= 2009<br />
| accessdate = June 1, 2009<br />
}}</ref><br />
<br />
=== ''US v. Zeigler'' ===<br />
In the United States many cases discuss whether a private employee (i.e., not a government employee) who stores incriminating evidence in workplace computers is protected by the [[Fourth Amendment to the United States Constitution|Fourth Amendment's]] reasonable expectation of privacy standard in a criminal proceeding.<br />
<br />
Most case law holds that employees do not have a reasonable expectation of privacy when it comes to their work related electronic communications. See, e.g. ''US v. Simons'', 206 F.3d 392, 398 (4th Cir., Feb. 28, 2000).<br />
<br />
However, one federal court held that employees can assert that the attorney-client privilege with respect to certain communications on company laptops. See ''Curto v. Medical World Comm''., No. 03CV6327, 2006 U.S. Dist. LEXIS 29387 (E.D.N.Y. May 15, 2006).<br />
<br />
Another recent federal case discussed this topic. On January 30, 2007, the [[Ninth Circuit]] court in US v. Ziegler, reversed its earlier August 2006 decision upon a petition for rehearing. In contrast to the earlier decision, the Court acknowledged that an employee has a right to privacy in his workplace computer. However, the Court also found that an employer can consent to any illegal searches and seizures. See ''US v. Ziegler'', ___F.3d 1077 (9th Cir. Jan. 30, 2007, No. 05-30177). [1] Cf. US v. Ziegler, 456 F.3d 1138 (9th Cir. 2006).<br />
<br />
In Ziegler, an employee had accessed child pornography websites from his workplace. His employer noticed his activities, made copies of the hard drive, and gave the FBI the employee's computer. At his criminal trial, Ziegler filed a motion to suppress the evidence because he argued that the government violated his Fourth Amendment rights.<br />
<br />
The Ninth Circuit allowed the lower court to admit the child pornography as evidence. After reviewing relevant Supreme Court opinions on a reasonable expectation of privacy, the Court acknowledged that Ziegler had a reasonable expectation of privacy at his office and on his computer. That Court also found that his employer could consent to a government search of the computer and that, therefore, the search did not violate Ziegler's Fourth Amendment rights.<br />
<br />
===''State v. Reid''===<br />
The New Jersey Supreme Court has also issued an opinion on the privacy rights of computer users, holding in ''[[State v. Reid]]'' that computer users have a reasonable expectation of privacy concerning the personal information they give to their ISPs.<ref>{{cite web|url=http://lawlibrary.rutgers.edu/decisions/supreme/a-105-06.doc.html |title=a-105-06.doc.html |publisher=Lawlibrary.rutgers.edu |date= |accessdate=September 13, 2010}}</ref><ref>[http://lawlibrary.rutgers.edu/decisions/supreme/a-105-06.doc.html State v. Reid'', 194 N.J. 386, 954 A.2d 503 (N.J. 2008)]</ref><br />
<br />
In that case, Shirley Reid was indicted for computer theft for changing her employer's password and shipping address on its online account with a supplier. The police discovered her identity after serving the ISP, Comcast, with a municipal subpoena not tied to any judicial proceeding.<ref>''Id.'' at 393.</ref><br />
<br />
The lower court suppressed the information from Comcast that linked Reid with the crime on grounds that the disclosure violated Reid's constitutional right to be protected from unreasonable search and seizure.<ref>''Id.'' at 393</ref> The appellate court affirmed, as did the New Jersey Supreme Court, which ruled that ISP subscriber records can only be disclosed to law enforcement upon the issuance of a grand jury subpoena.<ref>''Id.'' at 402.</ref> As a result, New Jersey offers greater privacy rights to computer users than most federal courts.<ref>''Id.'' at 3 96–97.</ref> This case also serves as an illustration of how case law on privacy regarding workplace computers is still evolving.<br />
<br />
===''Robbins v. Lower Merion School District''===<br />
In ''[[Robbins v. Lower Merion School District]]'' (U.S. Eastern District of Pennsylvania 2010), the federal trial court issued an [[injunction]] against the school district after plaintiffs charged two suburban Philadelphia high schools violated the privacy of students and others when they secretly spied on students by surreptitiously and remotely activating webcams embedded in school-issued laptops the students were using at home. The schools admitted to secretly snapping over 66,000 webshots and screenshots, including webcam shots of students in their bedrooms.<ref name="USATODAY">{{cite news|url=http://content.usatoday.com/communities/ondeadline/post/2010/02/school-district-accused-of-issuing-webcam-laptops-to-spy-on-students/1|author=Doug Stanglin|title=School district accused of spying on kids via laptop webcams|date=February 18, 2010|work=[[USA Today]]|accessdate=February 19, 2010}}</ref><ref name="autogenerated5">[http://lmsd.org/documents/news/100503_l3_report.pdf "Initial LANrev System Findings"], LMSD Redacted Forensic Analysis, L-3 Services – prepared for [[Ballard Spahr]] (LMSD's counsel), May 2010. Retrieved August 15, 2010.</ref><br />
<br />
==See also==<br />
* [[Anonymous web browsing]]<br />
* ''[[Robbins v. Lower Merion School District]]''<br />
* [[Freenet]]<br />
* [[Friend-to-friend]]<br />
* [[GNUnet]]<br />
* [[I2P| I2P – The Anonymous Network]]<br />
* [[Internet censorship]]<br />
* [[Internet vigilantism]]<br />
* [[Metadata Removal Tool]]<br />
* [[Privacy policy]]<br />
* ''[[State v. Reid]]''<br />
* [[Tor (anonymity network)]]<br />
* [[anonymizer]]<br />
*[[anonymous remailer]]<br />
*[[anonymous post]]<br />
<br />
==References==<br />
{{reflist|colwidth=30em}}<br />
<br />
==Further reading==<br />
* Lohr, Steve, [http://www.nytimes.com/2010/03/17/technology/17privacy.html?scp=1&sq=how%20privacy%20can%20vanish%20steve%20lohr&st=cse "How Privacy Can Vanish Online, a Bit at a Time"], ''The New York Times'', Wednesday, March 17, 2010<br />
* Gazaleh, Mark [http://cid-8b56ed9e88c6c995.office.live.com/view.aspx/Online%20Trust%20%5E0%20Privacy%20Statements/Online%20trust%20and%20perceived%20utility%20for%20consumers%20of%20web%20privacy%20statements.doc Online trust and perceived utility for consumers of web privacy statements – Overview] ''WBS'', June 2008<br />
* Federal Trade Commission, [http://www.ftc.gov/os/2010/12/101201privacyreport.pdf Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers], December 2010<br />
<br />
== External links==<br />
* [http://www.aafter.com AAfter Internet Privacy Search Engine]<br />
* [http://www.yauba.com Yauba Internet Privacy Search Engine]<br />
* [http://lawdex.com/docs/Bourke_v_Nissan.pdf Expectation of privacy for company email not deemed objectively reasonable – Bourke v. Nissan]<br />
* [http://www.nobodywillknow.com Internet Privacy as Pertains to Anonymous Online Purchasing]<br />
* [http://www.wordstream.com/articles/google-privacy-internet-privacy Internet Privacy Infographic: Google Privacy & Your Privacy on Facebook | WordStream]<br />
<br />
{{Privacy}}<br />
<br />
{{DEFAULTSORT:Internet Privacy}}<br />
[[Category:Internet privacy| ]]<br />
<br />
[[ar:خصوصية الإنترنت]]<br />
[[de:Anonymität im Internet]]<br />
[[es:Privacidad en Internet]]<br />
[[fr:Vie privée et informatique]]<br />
[[ko:인터넷 프라이버시]]<br />
[[hy:Համացանցային գաղտնիություն]]<br />
[[my:အင်တာနက် ကိုယ်ပိုင်အခွင့်အရေး]]</div>TeleComNasSprVenhttps://de.wikipedia.org/w/index.php?title=Datenschutz_im_Internet&diff=91399814Datenschutz im Internet2011-03-18T19:51:32Z<p>TeleComNasSprVen: pure OR</p>
<hr />
<div>'''Internet privacy''' is the desire or mandate of personal [[privacy]] concerning transactions or transmission of data via the [[Internet]]. It involves the exercise of control over the type and amount of information a person reveals about himself on the Internet and who may access such information. The term is often understood to mean universal Internet privacy, i.e. ''every'' user of the Internet possessing Internet privacy.<br />
<br />
Internet privacy forms a subset of [[data privacy|computer privacy]]. A number of experts within the field of Internet security and privacy believe that privacy doesn't exist; "Privacy is dead – get over it" This should be more encouraged<br />
<ref>{{cite web|url=http://video.google.com/videoplay?docid=-383709537384528624 |title=Toor2122 – Steve Rambam – Privacy Is Dead – Get Over It |publisher=Video.google.com |date=August 1, 2006 |accessdate=September 13, 2010}}</ref> according to Steve Rambam, private investigator specializing in Internet privacy cases. In fact, it has been suggested that the "appeal of online services is to broadcast personal information on purpose."<ref name="Pogue">{{cite journal|last=Pogue|first=David|date=January 2011|title=Don't Worry about Who's watching|journal=[[Scientific American]]|volume=304|issue=1|page=32|url=http://www.scientificamerican.com/article.cfm?id=dont-worry-about-whos-watching}}</ref> On the other hand, in his essay ''The Value of Privacy,'' security expert [[Bruce Schneier]] says, "Privacy protects us from abuses by those in power, even if we're doing nothing wrong at the time of [[surveillance]]."<ref>[http://www.schneier.com/blog/archives/2006/05/the_value_of_pr.html The Value of Privacy by Bruce Schneier]</ref><ref>[http://www.wired.com/politics/security/commentary/securitymatters/2006/05/70886 The Eternal Value of Privacy by Bruce Scneier – Wired.com]</ref><br />
<br />
==Levels of privacy==<br />
{{Inappropriate person|date=March 2011}}<br />
People with only a casual concern for Internet privacy need not achieve total [[anonymity]]. Internet users may achieve an adequate level of privacy through controlled disclosure of personal information. The revelation of IP addresses, non-personally-identifiable profiling, and similar information might become acceptable trade-offs for the convenience that users could otherwise lose using the workarounds needed to suppress such details rigorously. On the other hand, some people desire much stronger privacy. In that case, they may try to achieve ''Internet anonymity'' to ensure privacy — use of the Internet without giving any third parties the ability to link the Internet activities to [[personally-identifiable information]] (P.I.I.) of the Internet user. In order to keep your information private, people need to be careful on what they submit and look at online. When filling out forms and buying merchandise, that becomes tracked and because your information was not private, companies are now sending you spam and advertising on similar products.<br />
<br />
Related State Laws Privacy of Personal Information:<br />
Nevada and Minnesota require Internet Service Providers to keep information private regarding their customers. This is only unless a customer approves their information being given out. According to the National Conference of State Legislator, the following states have certain laws on the personal privacy of its citizens.<br />
<br />
Minnesota Statutes §§ 325M.01 to .09<br />
-Prohibits Internet service providers from disclosing personally identifiable information, including a consumer's physical or electronic address or telephone number; Internet or online sites visited; or any of the contents of a consumer's data storage devices.<br />
Provides for certain circumstances under which information must be disclosed, such as to a grand jury; to a state or federal law enforcement officer acting as authorized by law; pursuant to a court order or court action.<br />
Provides for civil damages of $500 or actual damages and attorney fees for violation of the law.<br />
<br />
<br />
Nevada Revised Statutes § 205.498<br />
-In addition, California and Utah laws, although not specifically targeted to on-line businesses, require all nonfinancial businesses to disclose to customers, in writing or by electronic mail, the types of personal information the business shares with or sells to a third party for direct marketing purposes or for compensation. Under the California law, businesses may post a privacy statement that gives customers the opportunity to choose not to share information at no cost.<br />
<br />
There are also certain laws for employees and businesses and privacy policies for <ref>{{cite web|author=Pam Greenberg |url=http://www.ncsl.org/default.aspx?tabid=13463#isp |title=State Laws Related to Internet Privacy |publisher=Ncsl.org |date=October 19, 2009 |accessdate=September 13, 2010}}</ref> websites.<br />
<br />
California, Connecticut, Nebraska and Pennsylvania all have specific privacy policies regarding websites, these include:<br />
<br />
"California (Calif. Bus. & Prof. Code §§ 22575-22578)<br />
California's Online Privacy Protection Act requires an operator, defined as a person or entity that collects personally identifiable information from California residents through an Internet Web site or online service for commercial purposes, to post conspicuously its privacy policy on its Web site or online service and to comply with that policy. The bill, among other things, would require that the privacy policy identify the categories of personally identifiable information that the operator collects about individual consumers who use or visit its Web site or online service and third parties with whom the operator may share the information.<br />
<br />
Connecticut (Conn. Gen Stat. § 42-471)<br />
Requires any person who collects Social Security numbers in the course of business to create a privacy protection policy. The policy must be "publicly displayed" by posting on a web page and the policy must (1) protect the confidentiality of Social Security numbers, (2) prohibit unlawful disclosure of Social Security numbers, and (3) limit access to Social Security numbers.<br />
<br />
Nebraska (Nebraska Stat. § 87-302(14))<br />
Nebraska prohibits knowingly making a false or misleading statement in a privacy policy, published on the Internet or otherwise distributed or published, regarding the use of personal information submitted by members of the public.<br />
<br />
Pennsylvania (18 Pa. C.S.A. § 4107(a)(10))<br />
Pennsylvania includes false and misleading statements in privacy policies published on Web sites or otherwise distributed in its deceptive or fraudulent business practices statute."<ref>National Conference of State Legislators. (2009, October 19). Privacy policy for websites. Retrieved from http://www.ncsl.org/default.aspx?tabid=13463</ref><br />
<br />
There are also at least 16 states that require government websites to create privacy policies and procedures or to include machine-readable privacy policies into their websites. These states include Arizona, Arkansas, California, Colorado, Delaware, Iowa, Illinois, Maine, Maryland, Michigan, Minnesota, Montana, New York, Sourth Carolina, Texas, Utah, and Virginia.<br />
<br />
==Risks to internet privacy==<br />
In today’s technological world, millions of individuals are subject to privacy threats. Companies are hired not only to watch what you visit online, but to infiltrate the information and send advertising based on your browsing history. People set up accounts for Facebook; enter bank and credit card information to various websites.<br />
<br />
Those concerned about Internet privacy often cite a number of ''privacy risks'' — events that can compromise privacy — which may be encountered through Internet use.<ref>{{cite web<br />
| author = Matt Schafer<br />
| title = Privacy, Privacy, Where for Art Thou Privacy?<br />
| quote = As consumers have became wise to the use of cookies, however, the industry has began using both normal cookies and local shared objects (a.k.a flash cookies) in the event that users would delete the normal cookies.<br />
| publisher = Lippmannwouldroll.com<br />
| date = August 2, 2010<br />
| url = http://lippmannwouldroll.com/2010/08/02/privacy-privacy-where-for-art-thou-privacy/<br />
| accessdate = October 17, 2010<br />
}}</ref> These methods of compromise can range from the gathering of statistics on users, to more malicious acts such as the spreading of spyware and various forms of [[Software bug|bugs]] (software errors) exploitation.<br />
<br />
Privacy measures are provided on several social networking sites to try to provide their users with protection for their personal information. On Facebook for example privacy settings are available for all registered users. The settings available on Facebook include the ability to block certain individuals from seeing your profile, the ability to choose your "friends," and the ability to limit who has access to your pictures and videos. Privacy settings are also available on other social networking sites such as E-harmony and MySpace. It is the user's prerogative to apply such settings when providing personal information on the internet.<br />
<br />
In late 2007 Facebook launched the Beacon program where user rental records were released on the public for friends to see. Many people were enraged by this breach in privacy, and the ''[[Lane v. Facebook, Inc.]]'' case ensued.<br />
<br />
===HTTP cookies===<br />
An [[HTTP cookie]] is data stored on a user's computer that assists in automated access to websites or web features, or other [[State (computer science)|state]] information required in complex web sites. It may also be used for user-tracking by storing special usage history data in a cookie. Cookies are a common concern in the field of privacy. As a result, some types of cookies are classified as a ''tracking cookie''. Although website developers most commonly use cookies for legitimate technical purposes, cases of abuse occur. In 2009, two researchers noted that social networking profiles could be connected to cookies, allowing the social networking profile to be connected to browsing habits.<ref>Krishnamurthy B, Wills CE. (2009). [http://conferences.sigcomm.org/sigcomm/2009/workshops/wosn/papers/p7.pdf On the Leakage of Personally Identifiable Information Via Online Social Networks].</ref><br />
<br />
Systems do not generally make the user explicitly aware of the storing of a cookie. (Although some users object to that, it does not properly relate to Internet privacy. It does however have implications for computer privacy, and specifically for [[computer forensics]].<br />
<br />
The original developers of cookies intended that only the website that originally distributed cookies to users so they could retrieve them, therefore returning only data already possessed by the website. However, in practice programmers can circumvent this restriction. Possible consequences include:<br />
* the placing of a [[personally-identifiable information|personally-identifiable]] tag in a browser to facilitate [[web profiling]] (see below), or,<br />
* use of [[cross-site scripting]] or other techniques to steal information from a user's cookies.<br />
<br />
Some users choose to disable cookies in their web browsers – as of 2000 a Pew survey estimated the proportion of users at 4%.<ref>[http://www.pewinternet.org/report_display.asp?r=19 Trust and Privacy Online: Why Americans Want to Rewrite the Rules. Pew Internet & American Life Project. Released Aug. 20, 2000]</ref> Such an action eliminates the potential privacy risks, but may severely limit or prevent the functionality of many websites. All significant web browsers have this disabling ability built-in, with no external program required. As an alternative, users may frequently delete any stored cookies. Some browsers (such as [[Mozilla Firefox]] and [[Opera (web browser)|Opera]]) offer the option to clear cookies automatically whenever the user closes the browser. A third option involves allowing cookies in general, but preventing their abuse. There are also a host of wrapper applications that will redirect cookies and cache data to some other location.<br />
<br />
The process of ''profiling'' (also known as "tracking") assembles and analyzes several events, each attributable to a single originating entity, in order to gain information (especially patterns of activity) relating to the originating entity. Some organizations engage in the profiling of people's web browsing, collecting the [[Uniform Resource Locator|URL]]s of sites visited. The resulting profiles can potentially link with information that personally identifies the individual who did the browsing.<br />
<br />
Some web-oriented marketing-research organizations may use this practice legitimately, for example: in order to construct profiles of 'typical Internet users'. Such profiles, which describe average trends of large groups of Internet users rather than of actual individuals, can then prove useful for [[market analysis]]. Although the aggregate data does not constitute a privacy violation, some people believe that the initial profiling does.<br />
<br />
Profiling becomes a more contentious privacy issue when data-matching associates the profile of an individual with personally-identifiable information of the individual.<br />
<!-- TODO: Elaborate. Inability of individuals to review or correct false info about themselves. Reselling of the data. Concerns about undesirable uses to which this info is applied (eg, spamming and junk mail). --><br />
<br />
Governments and organizations may set up [[Honeypot (computing)|honeypot]] websites – featuring controversial topics – with the purpose of attracting and tracking unwary people. This constitutes a potential danger for individuals.<br />
<!-- Fix above para --><br />
<br />
===Flash cookies===<br />
Flash cookies, also known as [[Local Shared Object]]s, work the same ways as normal cookies and are used by the [[Adobe Flash Player]] to store information at the user's computer. They exhibit a similar privacy risk as normal [[cookies]], but are not as easily blocked, meaning that the option in most browsers to not accept cookies does not affect flash cookies. One way to view and control them is with browser extensions or add-ons.<br />
<!-- More information should be posted on flash cookies and how they impact users' privacy --><br />
<br />
===Evercookies===<br />
An [[Evercookie]] is a JavaScript-based application which produces cookies in a web browser<br />
that actively "resist" deletion by redundantly copying themselves in different forms on the user's machine (e.g.: Flash [[Local Shared Object]]s, various HTML5 storage mechanisms, window.name caching, etc.), and resurrecting copies are missing or expired.<br />
<br />
===Photographs on the internet===<br />
[[Image:Wikimania impression nophoto.jpg|thumb|'No photos' tag at [[Wikimania]]]]<br />
Today many people have [[digital cameras]] and post their [[photo]]s online. The people depicted in these photos might not want to have them appear on the Internet.<br />
<br />
Some organizations attempt to respond to this privacy-related concern. For example, the 2005 [[Wikimania]] conference required that photographers have the prior permission of the people in their pictures. Some people wore a 'no photos' tag to indicate they would prefer not to have their photo taken.{{Citation needed|date=August 2010}}<br />
<br />
The Harvard Law Review published a short piece called "In The Face of Danger: Facial Recognition and Privacy Law," much of it explaining how "privacy law, in its current form, is of no help to those unwillingly tagged." <ref>In the Face of Danger: Facial Recognition and the Limits of Privacy Law. (2007). Retrieved from Harvard, Harvard Law Review: http://www.harvardlawreview.org/issues/120/may07/note_4397.php.</ref> Any individual can be unwillingly tagged in a photo and displayed in a manner that might violate them personally in some way, and by the time Facebook gets to taking down the photo, many people will have already had the chance to view, share, or distribute it. Furthermore, traditional tort law does not protect people who are captured by a photograph in public because this is not counted as an invasion of privacy. The extensive Facebook privacy policy covers these concerns and much more. For example, the policy states that they reserve the right to disclose member information or share photos with companies, lawyers, courts, government entities, etc. if they feel it absolutely necessary. The policy also informs users that profile pictures are mainly to help friends connect to each other.<ref>Facebook's Privacy Policy. (2010). Retrieved from Facebook: http://www.facebook.com/policy.php.</ref> However, these, as well as other pictures, can allow other people to invade a person’s privacy by finding out information that can be used to track and locate a certain individual. In an article featured in ABC news, it was stated that two teams of scientists found out that Hollywood stars could be giving up information about their private whereabouts very easily through pictures uploaded to the Internet. Moreover, it was found that pictures taken by [[iPhone]]s automatically attach the [[latitude]] and [[longitude]] of the picture taken through [[metadata]] unless this function is manually disabled.<ref>Heussner, M. K. (2010). Celebrities' Photos, Videos May Reveal Location. Retrieved from ABC: http://abcnews.go.com/technology/ celebrity-stalking-online-photos-give-location/ story?id=11162352&page=1.</ref><br />
<br />
===Search engines===<br />
<br />
Search engines have the ability to track a user’s searches. Personal information can be revealed through searches including search items used, the time of the search, and more. Search engines have claimed a necessity to retain such information in order to provide better services, protect against security pressure, and protect against fraud.<br />
<ref name="privacyrights.org">(December 2010) Online Privacy: Using the Internet Safely. Retrieved from http://www.privacyrights.org/fs/fs18-cyb.htm</ref><br />
<br />
===Data logging===<br />
Many programs and operating systems are set up to perform [[data logging]] of usage. This may include recording times when the computer is in use, or which web sites are visited. If a third party has sufficient access to the computer, legitimately or not, the user's privacy may be compromised. This could be avoided by disabling logging, or by clearing logs regularly.<br />
<br />
===Privacy within social networking sites===<br />
Prior to the social networking site explosion over the past decade, there were early forms of social network technologies that included online multiplayer games, blog sites, news groups, mailings lists and dating services. These all created a backbone for the new modern sites, and even from the start of these older versions privacy was an issue. In 1996, a young woman in New York City was on a first date with an online acquaintance and later sued for sexual harassment as they went back to her apartment after when everything became too real. This is just an early example of many more issues to come regarding internet privacy.<ref>Tracy Mitrano. (2006, November, December). A Wider World: Youth, Privacy, and Social Networking Technologies. Retrieved from http://www.educause.edu/EDUCAUSE+Review/EDUCAUSEReviewMagazineVolume41/AWiderWorldYouthPrivacyandSoci/158095</ref><br />
<br />
Social networking sites have become very popular within the last five years. With the creation of [[Facebook]] and the continued popularity of [[MySpace]] many people are giving their personal information out on the internet. These [[social network]]s keep track of all interactions used on their sites and save them for later use.<ref>Dwyer, C., Hiltz, S. & Passerini, K. (2007). Trust and Privacy Concern within Social Networking Sites: A Comparison of Facebook and MySpace. Americas Conference on Information Systems. Retrieved from http://74.125.155.132/scholar?q=cache:qLCk18d_wZwJ:scholar.google.com/+facebook+privacy&hl=en&as_sdt=2000</ref> Most users are not aware that they can modify the privacy settings and unless they modify them, their information is open to the public. On Facebook privacy settings can be accessed via the drop down menu under account in the top right corner. There users can change who can view their profile and what information can be displayed on their profile.<ref name="facebook.com">Facebook’s Privacy Policy. (2010). Retrieved from http://www.facebook.com/policy.php</ref> In most cases profiles are open to either "all my network and friends" or "all of my friends." Also, information that shows on a user's profile such as birthday, religious views, and relationship status can be removed via the privacy settings.<ref>Lipford, H. R., Besmer, A. & Watson, J. (2009). Understanding Privacy Settings in Facebook with an Audience View. Department of Software and Information Systems University of North Carolina at Charlotte. Retrieved from http://www.usenix.org/events/upsec08/tech/full_papers/lipford/lipford_html/</ref> If a user is under 13 years old they are not able to make a Facebook or a MySpace account, however, this is not regulated.<ref name="facebook.com"/><br />
<br />
Social networking has redefined the role of Internet privacy. Since users are willingly disclosing personal information online, the role of privacy and security is somewhat blurry. Sites such as Facebook, Myspace, and Twitter have grown popular by broadcasting status updates featuring personal information such as location. Facebook “Places,” in particular, is a Facebook service, which publicizes user location information to the networking community. Users are allowed to “check-in” at various locations including retail stores, convenience stores, and restaurants. Also, users are able to create their own “place,” disclosing personal information onto the Internet. This form of location tracking is automated and must be turned off manually. Various settings must be turned off and manipulated in order for the user to ensure privacy. According to epic.org, Facebook users are recommended to: (1) disable "Friends can check me in to Places," (2) customize "Places I Check In," (3) disable "People Here Now," and (4) uncheck "Places I've Visited.".<ref name="Facebook. PIC">EPIC - In re Facebook. (n.d.). EPIC - Electronic Privacy Information Center. Retrieved January 25, 2011/</ref> Moreover, the Federal Trade Commission has received two complaints in regards to Facebook’s “unfair and deceptive” trade practices, which are used to target advertising sectors of the online community. “Places” tracks user location information and is used primarily for advertising purposes. Each location tracked allows third party advertisers to customize advertisements that suit one’s interests. Currently, the Federal Trade Commissioner along with the Electronic Privacy Information Center are shedding light on the issues of location data tracking on social networking sites.<ref name="Facebook. PIC"/><br />
<br />
Recently, Facebook has been scrutinized for having a variety of applications that are considered to be invasive to user privacy. “The Breakup Notifier” is an example of a Facebook “cyberstalking” app that has recently been taken down. Essentially, the application notifies users when a person breaks up with their partner through Facebook, allowing users to instantly become aware of their friend's romantic activities. The concept became very popular, with the site attracting 700,000 visits in the first 36 hours; people downloaded the app 40,000 times. Just days later, the app had more than 3.6 million downloads and 9,000 Facebook likes. <ref>Retrieved from http://www.foxnews.com/scitech/2011/02/24/facebook-quashes-hot-new-stalker-app/</ref><br />
<br />
There are other applications that border on “cyberstalking.” An application named "Creepy" can track a person's location on a map using photos uploaded to Twitter or Flickr. When a person uploads photos to a social networking site, others are able to track their most recent location. Some smart phones are able to embed the longitude and latitude coordinates into the photo and automatically send this information to the application. Anybody using the application can search for a specific person and then find their immediate location. This poses many potential threats to users who share their information with a large group of followers. <ref> Retrieved from: http://abcnews.go.com/Technology/smartphone-apps-tracking-keeping-tabs-past-lovers-people/story?id=13022144</ref><br />
<br />
Facebook recently updated its profile format allowing for people who are not “friends” of others to view personal information about other users, even when the profile is set to private. However, As of January 18, 2011 Facebook changed its decision to make home addresses and telephone numbers accessible to third party members, but it is still possible for third party members to have access to less exact personal information, like one’s hometown and employment, if the user has entered the information into Facebook . EPIC Executive Director Marc Rotenberg said "Facebook is trying to blur the line between public and private information. And the request for permission does not make clear to the user why the information is needed or how it will be used." <ref>Electronic Privacy Information Center, Initials. (2011, January 18). Facebook drops plan to disclose users' home addresses and personal phone number. Retrieved from http://epic.org/privacy/socialnet/</ref><br />
Similar to Rotenberg’s claim that Facebook users are unclear of how or why their information has gone public, recently the Federal Trade Commission and Commerce Department have become involved. The Federal Trade Commission has recently released a report claiming that Internet companies and other industries will soon need to increase their protection for online users. Because online users often unknowingly opt in on making their information public, the FTC is urging Internet companies to make privacy notes simpler and easier for the public to understand, therefore increasing their option to opt out. Perhaps this new policy should also be implemented in the Facebook world. The Commerce Department claims that Americans, “have been ill-served by a patchwork of privacy laws that contain broad gaps,”.<ref>American Civil Liberties Union. (2010, December 16). Commerce department releases important report urging comprehensive privacy protections. Retrieved from http://www.aclu.org/technology-and-liberty/commerce-department-releases-important-report-urging-comprehensive-privacy-pr</ref> Because of these broad gaps, Americans are more susceptible to identity theft and having their online activity tracked by others.<br />
<br />
'''Spokeo'''<br />
- [[Spokeo]] is a “people-related” search engine with results compiled through data aggregation. The site contains information such as age, relationship status, estimated personal wealth, immediate family members and home address of individual people. This information is compiled through what is already on the internet or in other public records, but the website does not guarantee accuracy. <ref>http://www.spokeo.com/blog/about/ </ref><br />
<br />
[[Spokeo]] has been faced with potential class action law suits from people who claim that the organization breaches the Fair Credit Reporting Act. In September, 2010, Jennifer Purcell claimed that the FCRA was violated by [[Spokeo]] marketing her personal information. Her case is pending in court. Also in 2010, Thomas Robins claimed that his personal information on the website was inaccurate and he was unable to edit it for accuracy. The case was dismissed because Robins did not claim that the site directly caused him actual harm. <ref> Baynes, T. (2011, February 24). Lawsuits challenge U.S. online data brokers. Reuters. Retrieved from http://uk.reuters.com/article/2011/02/24/idUKN2427826420110224?pageNumber=1</ref> On February 15, 2011, Robins filed another suit, this time stating [[Spokeo]] has caused him “imminent and ongoing” harm. <ref> Davis, W. (2011, February 17). Spokeo charged with violating fair credit reporting<br />
act. MediaPost Publications. Retrieved from http://www.mediapost.com/publications/?<br />
fa=Articles.showArticle&art_aid=145270 </ref><br />
<br />
'''Twitter Case'''<br />
- In January 2011, the government recently obtained a court order to force the social networking site, Twitter, to reveal information applicable surrounding certain subscribers involved in the WikiLeaks cases. This outcome of this case is questionable because it deals with the user’s First Amendment rights. Twitter moved to reverse the court order, and supported the idea that internet users should be notified and given an opportunity to defend their constitutional rights in court before their rights are compromised.<ref>(1/8/11) Government Requests For Twitter Users’ Personal Information Raises Serious Constitutional Concerns. Retrieved from http://www.aclu.org/technology-and-liberty/government-requests-twitter-users-personal-information-raise-serious-constitu</ref><br />
<br />
'''Facebook Friends Study'''<br />
- A study was conducted at Northeastern University by Alan Mislove and his colleagues at the Max Planck Institute for Software Systems, where an algorithm was created to try and discover personal attributes of a Facebook user by looking at their friend’s list. They looked for information such as high school and college attended, major, hometown, graduation year and even what dorm a student may have lived in. The study revealed that only 5% of people thought to change their friend’s list to private. For other users, 58% displayed university attended, 42% revealed employers, 35% revealed interests and 19% gave viewers public access to where they were located. Due to the correlation of Facebook friends and universities they attend, it was easy to discover where a Facebook user was based on their list of friends. This fact is one that has become very useful to advertisers targeting their audiences but is also a big risk for the privacy of all those with Facebook accounts.<ref>Erik Hayden. (2010, March 11). On Facebook, You Are Who You Know. Retrieved from http://www.miller-mccune.com/culture-society/on-facebook-you-are-who-you-know-10385/#</ref><br />
<br />
'''Law enforcement prowling the networks'''<br />
- The [[FBI]] has dedicated undercover agents on [[Facebook]], [[Twitter]], [[MySpace]], [[LinkedIn]]. The rules and guidelines to the privacy issue is internal to the Justice Department and details aren't released to the public. Agents can impersonate a friend, a long lost relative, even a spouse and child. This raises real issues regarding privacy. Although people who use [[Facebook]], [[Twitter]], and other social networking sites are aware of some level of privacy will always be compromised, but, no one would ever suspect that the friend invitation might be from a federal agent whose sole purpose of the friend request was to snoop around. Furthermore, [[Facebook]], [[Twitter]], and [[MySpace]] have personal information and past posts logged for up to one year; even deleted profiles, and with a warrant, can hand over very personal information. One example of investigators using Facebook to nab a criminal is the case of Maxi Sopo. Charged with bank fraud, and having escaped to [[Mexico]], he was nowhere to be found until he started posting on [[Facebook]]. Although his profile was private, his list of friends were not, and through this vector, they eventually caught him.<ref>Richard Lardner. (2010, March 16). Your new Facebook ‘friend’ may be the FBI. Retrieved from http://www.msnbc.msn.com/id/35890739/ns/technology_and_science-security/</ref><br />
<br />
In recent years, some state and local law enforcement agencies have also begun to rely on social media websites as resources. Although obtaining records of information not shared publicly by or about site users often requires a subpoena, public pages on sites such as [[Facebook]] and [[MySpace]] offer access to personal information that can be valuable to law enforcement. <ref> Harkins, Gina. (2011, March 02). Cops patrol social networking sites for gang activity. Retrieved from http://news.medill.northwestern.edu/chicago/news.aspx?id=181375 </ref> Police departments have reported using social media websites to assist in investigations, locate and track suspects, and monitor gang activity. <ref> Taghi, Hasti. (2011, February 10). Police Use Facebook To Track Suspect. Retrieved from http://www.click2houston.com/news/26825687/detail.html </ref><br />
<ref> Halverstadt, Lisa. (2009, March 12). Surprise police use MySpace to locate teen graffiti suspect. Retrieved from http://www.azcentral.com/news/articles/2009/03/12/20090312gl-nwvmyspace0313.html </ref><br />
<br />
===Internet service providers===<br />
Internet users obtain Internet access through an [[Internet service provider]] (ISP). All data transmitted to and from users must pass through the ISP. Thus, an ISP has the potential to observe users' activities on the Internet.<br />
<br />
However, ISPs are usually prevented from participating in such activities due to legal, ethical, business, or technical reasons.<br />
<br />
<!--illogical construction-->Despite these legal and ethical restrictions, some ISPs, such as [[British Telecom]] (BT), are planning to use [[deep packet inspection]] technology provided by companies such as [[Phorm]] in order to examine the contents of the pages that people visit. By doing so, they can build up a profile of a person's web surfing habits,{{Citation needed|date=August 2010}} which can then be sold on to advertisers in order to provide targeted advertising. BT's attempt at doing this will be marketed under the name 'Webwise'.{{Citation needed|date=August 2010}}<br />
<br />
Normally ISPs do collect at least ''some'' information about the consumers using their services. From a privacy standpoint, ISPs would ideally collect only as much information as they require in order to provide Internet connectivity (IP address, billing information if applicable, etc).<br />
<br />
Which information an ISP collects, what it does with that information, and whether it informs its consumers, pose significant privacy issues. Beyond the usage of collected information typical of third parties, ISPs sometimes state that they will make their information available to government authorities upon request. In the US and other countries, such a request does not necessarily require a warrant.<br />
<br />
An ISP cannot know the contents of properly-encrypted data passing between its consumers and the Internet. For encrypting [[World Wide Web|web]] traffic, [[https]] has become the most popular and best-supported standard. Even if users encrypt the data, the ISP still knows the IP addresses of the sender and of the recipient. (However, see the [[#IP addresses|IP addresses]] section for workarounds.)<br />
<br />
An [[Anonymizer]] such as [[I2P|I2P – The Anonymous Network]] or [[Tor (anonymity network)|Tor]] can be used for accessing web services without them knowing your IP address and without your ISP knowing what the services are that you access.<br />
<br />
General concerns regarding Internet user privacy have become enough of a concern for a UN agency to issue a report on the dangers of identity fraud.<ref>[http://news.bbc.co.uk/1/hi/technology/6199372.stm UN warns on password 'explosion']</ref><br />
<br />
While signing up for internet services, each computer contains a unique IP, Internet Protocol address. This particular address will not give away private or personal information, however, a weak link could potentially reveal information from your ISP.<ref>http://www.privacyrights.org/fs/fs18-cyb.htm</ref><br />
<br />
<br />
Social networking has redefined the role of Internet privacy. Since users are willingly disclosing personal information online, the role of privacy and security is somewhat blurry. Sites such as Facebook, Myspace, and Twitter have grown popular by broadcasting status updates featuring personal information such as location. Facebook “Places,” in particular, is a Facebook service, which publicizes user location information to the networking community. Users are allowed to “check-in” at various locations including retail stores, convenience stores, and restaurants. Also, users are able to create their own “place,” disclosing personal information onto the Internet. This form of location tracking is automated and must be turned off manually. Various settings must be turned off and manipulated in order for the user to ensure privacy. According to epic.org, Facebook users are recommended to: (1) disable "Friends can check me in to Places," (2) customize "Places I Check In," (3) disable "People Here Now," and (4) uncheck "Places I've Visited.".<ref name="Facebook. PIC">EPIC - In re Facebook. (n.d.). EPIC - Electronic Privacy Information Center. Retrieved January 25, 2011/</ref> Moreover, the Federal Trade Commission has received two complaints in regards to Facebook’s “unfair and deceptive” trade practices, which are used to target advertising sectors of the online community. “Places” tracks user location information and is used primarily for advertising purposes. Each location tracked allows third party advertisers to customize advertisements that suit one’s interests. Currently, the Federal Trade Commissioner along with the Electronic Privacy Information Center are shedding light on the issues of location data tracking on social networking sites.<ref name="Facebook. PIC"/><br />
<br />
==Legal threats==<br />
Use by government agencies of an array of technologies designed to track and gather Internet users' information are the topic of much debate between privacy advocates, civil libertarians and those who believe such measures are necessary for law enforcement to keep pace with rapidly changing communications technology.<br />
<br />
Specific examples<br />
<br />
*Following a decision by the European Union’s council of ministers in Brussels, in January, 2009, the UK's [[Home Office]] adopted a plan to allow police to access the contents of individuals' computers without a warrant. The process, called "remote searching", allows one party, at a remote location, to examine another's hard drive and Internet traffic, including email, browsing history and websites visited. Police across the EU are now permitted to request that the British police conduct a remote search on their behalf. The search can be granted, and the material gleaned turned over and used as evidence, on the basis of a senior officer believing it necessary to prevent a serious crime. Opposition MPs and civil libertarians are concerned about this move toward widening surveillance and its possible impact on personal privacy. Says Shami Chakrabarti, director of the human rights group Liberty, “The public will want this to be controlled by new legislation and judicial authorisation. Without those safeguards it’s a devastating blow to any notion of personal privacy.”<ref>[http://www.timesonline.co.uk/tol/news/politics/article5439604.ece Police set to step up hacking of home PCs]</ref><br />
<br />
*The FBI's [[Magic Lantern (software)|Magic Lantern]] software program was the topic of much debate when it was publicized in November, 2001. Magic Lantern is a [[Trojan horse (computing)|Trojan Horse]] program that logs users' keystrokes, rendering encryption useless.<ref>[http://www.rumormillnews.com/cgi-bin/archive.cgi?noframes;read=15391 FBI 'Lantern' Software Does Log Keystrokes]</ref><br />
<br />
==Laws for Internet Privacy Protection==<br />
<br />
'''USA Patriot Act'''<br />
<br />
The purpose of this act, enacted on October 26, 2001 by former President Bush, was to enhance law enforcement investigatory tools, investigate online activity, as well as to discourage terrorist acts both within the United States and around the world. This act reduced restrictions for law enforcement to search various methods and tools of communication such as telephone, e-mail, personal records including medical and financial, as well as reducing restrictions with obtaining of foreign intelligence.<ref>(January 2011) “USA Patriot Act.” Retrieved from http://www.fincen.gov/statutes_regs/patriot/</ref><br />
<br />
'''Electronic Communications Privacy Act (ECPA)'''<br />
<br />
This act makes it unlawful under certain conditions for an individual to reveal the information of electronic communication and contains a few exceptions. One clause allows the ISP to view private e-mail if the sender is suspected of attempting to damage the internet system or attempting to harm another user. Another clause allows the ISP to reveal information from a message if the sender or recipient allows to its disclosure. Finally, information containing personal information may also be revealed for a court order or law enforcement’s subpoena.<ref name="privacyrights.org"/><br />
<br />
'''Employees and Employers Internet Regulations'''<br />
<br />
When considering the rights between employees and employers regarding internet privacy and protection at a company, different states have their own laws. Connecticut and Delaware both have laws that state an employer must create a written notice or electronic message that provides understanding that they will regulate the internet traffic.<ref name="ncsl.org">NCSL (October 9, 2009). “State Laws Related to Internet Privacy.” National Conference of State Legislatures. Retrieved January 23, 2011, from http://www.ncsl.org/default.aspx?tabid=13463</ref> By doing so, this relates to the employees that the employer will be searching and monitoring emails and internet usage. Delaware charges $100 for a violation where Connecticut charges $500 for the first violation and then $1000 for the second.<ref name="ncsl.org"/> When looking at public employees and employers, California and Colorado created laws that would also create legal ways in which employers controlled internet usage.<ref name="ncsl.org"/> The law stated that a public company or agency must create a prior message to the employees stating that accounts will be monitored. Without these laws, employers could access information through employees accounts and use them illegally.<ref>Cranor, Lorrie Faith (June 1998). “Internet Privacy: A Public Concern.” Lorrie Faith Cranor. Retrieved January 24, 2011, from http://lorrie.cranor.org/pubs/networker-privacy.html</ref> In most cases, the employer is allowed to see whatever he or she pleases because of these laws stated both publicly and privately.<ref>Privacy Rights Clearinghouse (January 2011). “Fact Sheet 7: Workplace Privacy and Employee Monitoring.” Privacy Rights Clearinghouse. Retrieved January 23, 2011 from http://www.privacyrights.org/fs/fs7-work.htm</ref><br />
<br />
==Other potential Internet privacy risks==<br />
<!-- These should each get their own sections --><br />
* '''[[Malware]]''' is a term short for "malicious software" and is used to describe software to cause damage to a single computer, server, or computer network whether that is through the use of a virus, trojan horse, spyware, etc.<ref name="http://technet.microsoft.com/en-us/library/dd632948.aspx">Receieved from http://technet.microsoft.com</ref><br />
* '''[[Spyware]]''' is a piece of software that obtains information from a user's computer without that user's consent.<ref name="http://technet.microsoft.com/en-us/library/dd632948.aspx">Receieved from http://technet.microsoft.com</ref><br />
* A '''web bug''' is an object embedded into a web page or email and is usually invisible to the user of the website or reader of the email. It allows checking to see if a person has looked at a particular website or read a specific email message.<br />
* '''[[Phishing]]''' is a criminally fraudulent process of trying to obtain sensitive information such as user names, passwords, credit card or bank information. Phishing is an internet crime in which someone masquerades as a trustworthy entity in some form of electronic communication.<br />
* '''[[Pharming]]''' is hackers attempt to redirect traffic from a legitimate website to a completely different internet address. Pharming can be conducted by changing the hosts file on a victim’s computer or by exploiting a vulnerability on the DNS server.<br />
* [[Social engineering (computer security)|Social engineering]]<br />
* [[Proxy server#Risks of using anonymous proxy servers|Malicious proxy server]] (or other "anonymity" services)<br />
<br />
==Specific cases==<br />
===Jason Fortuny and Craigslist===<br />
In early September 2006, [[Jason Fortuny]], a [[Seattle metropolitan area|Seattle]]-area freelance graphic designer and network administrator, posed as a woman and posted an ad to [[Craigslist]] Seattle seeking a casual sexual encounter with men in that area. On September 4, he posted to the wiki website [[Encyclopædia Dramatica]] all 178 of the responses, complete with photographs and personal contact details, describing this as the Craigslist Experiment and encouraging others to further identify the respondents.<ref>{{cite web<br />
| url = http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2006/09/17/PKG6BKQQA41.DTL<br />
| author = Neva Chonin<br />
| title = Sex and the City<br />
| publisher = San Francisco Chronicle<br />
|date=September 17, 2006<br />
| accessdate = June 17, 2007<br />
}}</ref><br />
<br />
Although some online exposures of personal information have been seen as justified for exposing malfeasance, many commentators on the Fortuny case saw no such justification here. "The men who replied to Fortuny's posting did not appear to be doing anything illegal, so the outing has no social value other than to prove that someone could ruin lives online," said law professor [[Jonathan Zittrain]],<ref name=autogenerated1>{{cite news<br />
| url = http://www.msnbc.msn.com/id/14791788/<br />
| author = Anick Jesdanun<br />
| title = Prankster posts sex ad replies online<br />
| agency = Associated Press<br />
|date=September 12, 2006<br />
| accessdate = June 27, 2007}}</ref> while ''[[Wired magazine|Wired]]'' writer [[Ryan Singel]] described Fortuny as "[[Psychopathy|sociopathic]]".<ref>{{cite web<br />
| url = http://blog.wired.com/27BStroke6/index.blog?entry_id=1553329<br />
| author = [[Ryan Singel]]<br />
| title = Craigslist<br />
| publisher = Wired Blogs<br />
|date=September 8, 2006<br />
| accessdate = September 12, 2006<br />
}}</ref><br />
<br />
The [[Electronic Frontier Foundation]] indicated that it thought Fortuny might be liable under [[Washington (U.S. state)|Washington]] state law, and that this would depend on whether the information he disclosed was of legitimate public concern. [[Kurt Opsahl]], the EFF's staff attorney, said "As far as I know, they (the respondents) are not public figures, so it would be challenging to show that this was something of public concern."<ref name=autogenerated1 /><br />
<br />
According to Fortuny, two people lost their jobs as a result of his Craigslist Experiment and another "has filed an invasion-of-privacy lawsuit against Fortuny in an Illinois court." <ref>{{cite news<br />
|url=http://www.nytimes.com/2008/08/03/magazine/03trolls-t.html?ex=1375329600&en=b5085d50ee5c65e5&ei=5124&partner=permalink&exprod=permalink<br />
|title=Malwebolence|publisher=New York Times<br />
|accessdate=August 1, 2008|<br />
last=Schwartz|first=Mattathias<br />
|quote=After receiving death threats, Fortuny meticulously scrubbed his real address and phone number from the Internet. “Anyone who knows who and where you are is a security hole,” he told me. “I own a gun. I have an escape route. If someone comes, I’m ready.”}}</ref><br />
<br />
Fortuny did not enter an appearance in the Illinois suit, secure counsel, or answer the complaint after an early amendment. Mr. Fortuny had filed a motion to dismiss, but he filed it with the Circuit Court of Cook County, Illinois, and he did not file proof that he had served the plaintiff.<ref>{{cite court|litigants=Doe v. Fortuny|vol=1:08-cv-1050|court=D. Ill.|date=December 15, 2008|url=https://ecf.ilnd.uscourts.gov/doc1/06715867523}}</ref> As a result, the court entered a [[default judgment]] against Mr. Fortuny and ordered a damages hearing for January 7, 2009.<ref>{{cite court|litigants=Doe v. Fortuny|vol=1:08-cv-1050|court=D. Ill.|date=11/12/2008|url=https://ecf.ilnd.uscourts.gov/doc1/06705746202}}</ref> After failing to show up at multiple hearings on damages,<ref>{{cite court|litigants=Doe v. Fortuny|vol=1:08-cv-1050|court=D. Ill.|date=01/07/2009|url=https://ecf.ilnd.uscourts.gov/doc1/06715925042}}</ref><ref>{{cite court|litigants=Doe v. Fortuny|vol:1:08-cv-1050|court=D. Ill.|date=04/09/2009|url=https://ecf.ilnd.uscourts.gov/doc1/06716314400}}</ref> Fortuny was ordered to pay $74,252.56 for violation of the Copyright Act, compensation for Public Disclosure of Private Facts, Intrusion Upon Seclusion, attorneys fees and costs.<ref>{{cite court|litigants=Doe v. Fortuny|vol=1:08-cv-1050|court=D. Ill.|date=04/09/2009|url=https://ecf.ilnd.uscourts.gov/doc1/06716314618}}</ref><br />
<big><br />
<br />
'''USA vs. Warshak'''</big><br />
<br />
The case ''[[United_States_v._Warshak|United States v. Warshak]]'', decided December 14, 2010 by the Sixth Circuit Court of Appeals, maintained the idea that an ISP actually is allowed access to private e-mail. However, the government must get hold of a search warrant before obtaining such e-mail. This case dealt with the question of emails hosted on an isolated server. Due to the fact that e-mail is similar to other forms of communication such as telephone calls, e-mail requires the same amount of protection under the 4th amendment.<ref name="privacyrights.org"/><br />
<br />
===Search engine data and law enforcement===<br />
Data from major Internet companies, including [[Yahoo!]] and [[MSN]] ([[Microsoft]]), have already been subpoenaed by the [[US government|United States]]<ref>[http://blog.searchenginewatch.com/blog/060119-060352 Bush Administration Demands Search Data; Google Says No; AOL, MSN & Yahoo Said Yes]</ref> and China.<ref>[http://blog.wired.com/27bstroke6/2007/07/yahoo-knew-more.html Yahoo Knew More About China Journalist Subpoena Than It Told Congress It Did]</ref> [[AOL]] even provided a chunk of its own search data online,<ref>[http://www.techdirt.com/articles/20060807/0219238.shtml Forget The Government, AOL Exposes Search Queries To Everyone]</ref> allowing reporters to track the online behaviour of private individuals.<ref>[http://technology.guardian.co.uk/online/search/story/0,,1859785,00.html They know all about you]</ref><br />
<br />
In 2006, a wireless hacker pled guilty when his [[Google]] searches were used as evidence against him. The defendant ran a Google search over the network using the following search terms: "how to broadcast interference over wifi 2.4 GHZ," "interference over wifi 2.4 Ghz," "wireless networks 2.4 interference," and "make device interfere wireless network." While court papers did not describe how the FBI obtained his searches (e.g. through a seized hard-drive or directly from the search-engine), Google has indicated that it can provide search terms to law enforcement if given an Internet address or Web cookie.<br />
<ref>{{cite web<br />
| url = http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1444191<br />
| author = Tim Wafa<br />
| title = Global Internet Privacy Rights – A Pragmatic Approach<br />
| publisher = University of San Francisco Intellectual Property Law Bulletin<br />
| month= June | year= 2009<br />
| accessdate = June 1, 2009<br />
}}</ref><br />
<br />
=== ''US v. Zeigler'' ===<br />
In the United States many cases discuss whether a private employee (i.e., not a government employee) who stores incriminating evidence in workplace computers is protected by the [[Fourth Amendment to the United States Constitution|Fourth Amendment's]] reasonable expectation of privacy standard in a criminal proceeding.<br />
<br />
Most case law holds that employees do not have a reasonable expectation of privacy when it comes to their work related electronic communications. See, e.g. ''US v. Simons'', 206 F.3d 392, 398 (4th Cir., Feb. 28, 2000).<br />
<br />
However, one federal court held that employees can assert that the attorney-client privilege with respect to certain communications on company laptops. See ''Curto v. Medical World Comm''., No. 03CV6327, 2006 U.S. Dist. LEXIS 29387 (E.D.N.Y. May 15, 2006).<br />
<br />
Another recent federal case discussed this topic. On January 30, 2007, the [[Ninth Circuit]] court in US v. Ziegler, reversed its earlier August 2006 decision upon a petition for rehearing. In contrast to the earlier decision, the Court acknowledged that an employee has a right to privacy in his workplace computer. However, the Court also found that an employer can consent to any illegal searches and seizures. See ''US v. Ziegler'', ___F.3d 1077 (9th Cir. Jan. 30, 2007, No. 05-30177). [1] Cf. US v. Ziegler, 456 F.3d 1138 (9th Cir. 2006).<br />
<br />
In Ziegler, an employee had accessed child pornography websites from his workplace. His employer noticed his activities, made copies of the hard drive, and gave the FBI the employee's computer. At his criminal trial, Ziegler filed a motion to suppress the evidence because he argued that the government violated his Fourth Amendment rights.<br />
<br />
The Ninth Circuit allowed the lower court to admit the child pornography as evidence. After reviewing relevant Supreme Court opinions on a reasonable expectation of privacy, the Court acknowledged that Ziegler had a reasonable expectation of privacy at his office and on his computer. That Court also found that his employer could consent to a government search of the computer and that, therefore, the search did not violate Ziegler's Fourth Amendment rights.<br />
<br />
===''State v. Reid''===<br />
The New Jersey Supreme Court has also issued an opinion on the privacy rights of computer users, holding in ''[[State v. Reid]]'' that computer users have a reasonable expectation of privacy concerning the personal information they give to their ISPs.<ref>{{cite web|url=http://lawlibrary.rutgers.edu/decisions/supreme/a-105-06.doc.html |title=a-105-06.doc.html |publisher=Lawlibrary.rutgers.edu |date= |accessdate=September 13, 2010}}</ref><ref>[http://lawlibrary.rutgers.edu/decisions/supreme/a-105-06.doc.html State v. Reid'', 194 N.J. 386, 954 A.2d 503 (N.J. 2008)]</ref><br />
<br />
In that case, Shirley Reid was indicted for computer theft for changing her employer's password and shipping address on its online account with a supplier. The police discovered her identity after serving the ISP, Comcast, with a municipal subpoena not tied to any judicial proceeding.<ref>''Id.'' at 393.</ref><br />
<br />
The lower court suppressed the information from Comcast that linked Reid with the crime on grounds that the disclosure violated Reid's constitutional right to be protected from unreasonable search and seizure.<ref>''Id.'' at 393</ref> The appellate court affirmed, as did the New Jersey Supreme Court, which ruled that ISP subscriber records can only be disclosed to law enforcement upon the issuance of a grand jury subpoena.<ref>''Id.'' at 402.</ref> As a result, New Jersey offers greater privacy rights to computer users than most federal courts.<ref>''Id.'' at 3 96–97.</ref> This case also serves as an illustration of how case law on privacy regarding workplace computers is still evolving.<br />
<br />
===''Robbins v. Lower Merion School District''===<br />
In ''[[Robbins v. Lower Merion School District]]'' (U.S. Eastern District of Pennsylvania 2010), the federal trial court issued an [[injunction]] against the school district after plaintiffs charged two suburban Philadelphia high schools violated the privacy of students and others when they secretly spied on students by surreptitiously and remotely activating webcams embedded in school-issued laptops the students were using at home. The schools admitted to secretly snapping over 66,000 webshots and screenshots, including webcam shots of students in their bedrooms.<ref name="USATODAY">{{cite news|url=http://content.usatoday.com/communities/ondeadline/post/2010/02/school-district-accused-of-issuing-webcam-laptops-to-spy-on-students/1|author=Doug Stanglin|title=School district accused of spying on kids via laptop webcams|date=February 18, 2010|work=[[USA Today]]|accessdate=February 19, 2010}}</ref><ref name="autogenerated5">[http://lmsd.org/documents/news/100503_l3_report.pdf "Initial LANrev System Findings"], LMSD Redacted Forensic Analysis, L-3 Services – prepared for [[Ballard Spahr]] (LMSD's counsel), May 2010. Retrieved August 15, 2010.</ref><br />
<br />
==Teachers and MySpace==<br />
Teachers’ privacy on [[MySpace]] has created controversy across the world. They are forewarned by The Ohio News Association <ref>[http://blogs.sun.com/learningcurve/tags/myspace Learning Curve<!-- Bot generated title -->]</ref> that if they have a MySpace account, it should be deleted. Eschool News warns, “Teachers, watch what you post online.” <ref>[http://www.eschoolnews.com/news/top-news/related-top-news/?i=50557;_hbguid=49a1babb-b469-4a85-a273-292a0514d91d Related Top News – Teachers warned about MySpace profiles<!-- Bot generated title -->]</ref> The ONA also posted a memo advising teachers not to join these sites. Teachers can face consequences of license revocations, suspensions, and written reprimands.<br />
<br />
The ''Chronicle of Higher Education'' wrote an article on April 27, 2007, entitled "A MySpace Photo Costs a Student a Teaching Certificate" about Stacy Snyder.<ref>[http://chronicle.com/blogPost/A-MySpace-Photo-Costs-a/2994 Wired Campus: A MySpace Photo Costs a Student a Teaching Certificate – Chronicle.com<!-- Bot generated title -->]</ref> She was a student of [[Millersville University of Pennsylvania]] who was denied her teaching degree because of an unprofessional photo posted on MySpace, which involved her drinking with a pirate's hat on and a caption of “Drunken Pirate". As a substitute, she was given an English degree.<br />
<br />
==Internet privacy and Blizzard Entertainment==<br />
On July 6, 2010, Blizzard Entertainment announced that it would display the real names tied to user accounts in its game forums. On July 9, 2010, CEO and cofounder of Blizzard Mike Morhaime announced a reversal of the decision to force posters' real names to appear on Blizzard's forums. The reversal was made in response to subscriber feedback.<ref name = "blizzardNoRealNames">[http://forums.worldofwarcraft.com/thread.html?topicId=25968987278&sid=1 World of Warcraft forum post], Blizzard announces reversal of its decision to force real names to appear on its forums</ref><br />
<br />
==Internet privacy and Google Maps==<br />
In Spring 2007, [[Google]] improved their Google Maps to include what is known as "Street View". This feature gives the user a 3-D, street level view with real photos of streets, buildings, and landmarks. In order to offer such a service, Google had to send trucks with cameras mounted on them and drive through every single street snapping photos. These photos were eventually stitched together to achieve a near seamless photorealistic map. However, the photos that were snapped included people caught in various acts, some of which includes a man urinating on the street, nude people seen through their windows, and apparently, a man trying to break into someone's apartment, etc; although some images are up to interpretation. This prompted a public outburst and sometime after, Google offered a "report inappropriate image" feature to their website.<ref>S. James Snyder. (2007, June 12). Time Magazine online. "Google Maps: An Invasion of Privacy?" Retrieved from http://www.time.com/time/business/article/0,8599,1631957,00.html</ref><br />
<br />
==See also==<br />
* [[Anonymous web browsing]]<br />
* ''[[Robbins v. Lower Merion School District]]''<br />
* [[Freenet]]<br />
* [[Friend-to-friend]]<br />
* [[GNUnet]]<br />
* [[I2P| I2P – The Anonymous Network]]<br />
* [[Internet censorship]]<br />
* [[Internet vigilantism]]<br />
* [[Metadata Removal Tool]]<br />
* [[Privacy policy]]<br />
* ''[[State v. Reid]]''<br />
* [[Tor (anonymity network)]]<br />
* [[anonymizer]]<br />
*[[anonymous remailer]]<br />
*[[anonymous post]]<br />
<br />
==References==<br />
{{reflist|colwidth=30em}}<br />
<br />
==Further reading==<br />
* Lohr, Steve, [http://www.nytimes.com/2010/03/17/technology/17privacy.html?scp=1&sq=how%20privacy%20can%20vanish%20steve%20lohr&st=cse "How Privacy Can Vanish Online, a Bit at a Time"], ''The New York Times'', Wednesday, March 17, 2010<br />
* Gazaleh, Mark [http://cid-8b56ed9e88c6c995.office.live.com/view.aspx/Online%20Trust%20%5E0%20Privacy%20Statements/Online%20trust%20and%20perceived%20utility%20for%20consumers%20of%20web%20privacy%20statements.doc Online trust and perceived utility for consumers of web privacy statements – Overview] ''WBS'', June 2008<br />
* Federal Trade Commission, [http://www.ftc.gov/os/2010/12/101201privacyreport.pdf Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers], December 2010<br />
<br />
== External links==<br />
* [http://www.aafter.com AAfter Internet Privacy Search Engine]<br />
* [http://www.yauba.com Yauba Internet Privacy Search Engine]<br />
* [http://lawdex.com/docs/Bourke_v_Nissan.pdf Expectation of privacy for company email not deemed objectively reasonable – Bourke v. Nissan]<br />
* [http://www.nobodywillknow.com Internet Privacy as Pertains to Anonymous Online Purchasing]<br />
* [http://www.wordstream.com/articles/google-privacy-internet-privacy Internet Privacy Infographic: Google Privacy & Your Privacy on Facebook | WordStream]<br />
<br />
{{Privacy}}<br />
<br />
{{DEFAULTSORT:Internet Privacy}}<br />
[[Category:Internet privacy| ]]<br />
<br />
[[ar:خصوصية الإنترنت]]<br />
[[de:Anonymität im Internet]]<br />
[[es:Privacidad en Internet]]<br />
[[fr:Vie privée et informatique]]<br />
[[ko:인터넷 프라이버시]]<br />
[[hy:Համացանցային գաղտնիություն]]<br />
[[my:အင်တာနက် ကိုယ်ပိုင်အခွင့်အရေး]]</div>TeleComNasSprVenhttps://de.wikipedia.org/w/index.php?title=Datenschutz_im_Internet&diff=91399813Datenschutz im Internet2011-03-18T19:47:10Z<p>TeleComNasSprVen: WP:NOT#HOWTO</p>
<hr />
<div>'''Internet privacy''' is the desire or mandate of personal [[privacy]] concerning transactions or transmission of data via the [[Internet]]. It involves the exercise of control over the type and amount of information a person reveals about himself on the Internet and who may access such information. The term is often understood to mean universal Internet privacy, i.e. ''every'' user of the Internet possessing Internet privacy.<br />
<br />
Internet privacy forms a subset of [[data privacy|computer privacy]]. A number of experts within the field of Internet security and privacy believe that privacy doesn't exist; "Privacy is dead – get over it" This should be more encouraged<br />
<ref>{{cite web|url=http://video.google.com/videoplay?docid=-383709537384528624 |title=Toor2122 – Steve Rambam – Privacy Is Dead – Get Over It |publisher=Video.google.com |date=August 1, 2006 |accessdate=September 13, 2010}}</ref> according to Steve Rambam, private investigator specializing in Internet privacy cases. In fact, it has been suggested that the "appeal of online services is to broadcast personal information on purpose."<ref name="Pogue">{{cite journal|last=Pogue|first=David|date=January 2011|title=Don't Worry about Who's watching|journal=[[Scientific American]]|volume=304|issue=1|page=32|url=http://www.scientificamerican.com/article.cfm?id=dont-worry-about-whos-watching}}</ref> On the other hand, in his essay ''The Value of Privacy,'' security expert [[Bruce Schneier]] says, "Privacy protects us from abuses by those in power, even if we're doing nothing wrong at the time of [[surveillance]]."<ref>[http://www.schneier.com/blog/archives/2006/05/the_value_of_pr.html The Value of Privacy by Bruce Schneier]</ref><ref>[http://www.wired.com/politics/security/commentary/securitymatters/2006/05/70886 The Eternal Value of Privacy by Bruce Scneier – Wired.com]</ref><br />
<br />
==Levels of privacy==<br />
{{Inappropriate person|date=March 2011}}<br />
People with only a casual concern for Internet privacy need not achieve total [[anonymity]]. Internet users may achieve an adequate level of privacy through controlled disclosure of personal information. The revelation of IP addresses, non-personally-identifiable profiling, and similar information might become acceptable trade-offs for the convenience that users could otherwise lose using the workarounds needed to suppress such details rigorously. On the other hand, some people desire much stronger privacy. In that case, they may try to achieve ''Internet anonymity'' to ensure privacy — use of the Internet without giving any third parties the ability to link the Internet activities to [[personally-identifiable information]] (P.I.I.) of the Internet user. In order to keep your information private, people need to be careful on what they submit and look at online. When filling out forms and buying merchandise, that becomes tracked and because your information was not private, companies are now sending you spam and advertising on similar products.<br />
<br />
Related State Laws Privacy of Personal Information:<br />
Nevada and Minnesota require Internet Service Providers to keep information private regarding their customers. This is only unless a customer approves their information being given out. According to the National Conference of State Legislator, the following states have certain laws on the personal privacy of its citizens.<br />
<br />
Minnesota Statutes §§ 325M.01 to .09<br />
-Prohibits Internet service providers from disclosing personally identifiable information, including a consumer's physical or electronic address or telephone number; Internet or online sites visited; or any of the contents of a consumer's data storage devices.<br />
Provides for certain circumstances under which information must be disclosed, such as to a grand jury; to a state or federal law enforcement officer acting as authorized by law; pursuant to a court order or court action.<br />
Provides for civil damages of $500 or actual damages and attorney fees for violation of the law.<br />
<br />
<br />
Nevada Revised Statutes § 205.498<br />
-In addition, California and Utah laws, although not specifically targeted to on-line businesses, require all nonfinancial businesses to disclose to customers, in writing or by electronic mail, the types of personal information the business shares with or sells to a third party for direct marketing purposes or for compensation. Under the California law, businesses may post a privacy statement that gives customers the opportunity to choose not to share information at no cost.<br />
<br />
There are also certain laws for employees and businesses and privacy policies for <ref>{{cite web|author=Pam Greenberg |url=http://www.ncsl.org/default.aspx?tabid=13463#isp |title=State Laws Related to Internet Privacy |publisher=Ncsl.org |date=October 19, 2009 |accessdate=September 13, 2010}}</ref> websites.<br />
<br />
California, Connecticut, Nebraska and Pennsylvania all have specific privacy policies regarding websites, these include:<br />
<br />
"California (Calif. Bus. & Prof. Code §§ 22575-22578)<br />
California's Online Privacy Protection Act requires an operator, defined as a person or entity that collects personally identifiable information from California residents through an Internet Web site or online service for commercial purposes, to post conspicuously its privacy policy on its Web site or online service and to comply with that policy. The bill, among other things, would require that the privacy policy identify the categories of personally identifiable information that the operator collects about individual consumers who use or visit its Web site or online service and third parties with whom the operator may share the information.<br />
<br />
Connecticut (Conn. Gen Stat. § 42-471)<br />
Requires any person who collects Social Security numbers in the course of business to create a privacy protection policy. The policy must be "publicly displayed" by posting on a web page and the policy must (1) protect the confidentiality of Social Security numbers, (2) prohibit unlawful disclosure of Social Security numbers, and (3) limit access to Social Security numbers.<br />
<br />
Nebraska (Nebraska Stat. § 87-302(14))<br />
Nebraska prohibits knowingly making a false or misleading statement in a privacy policy, published on the Internet or otherwise distributed or published, regarding the use of personal information submitted by members of the public.<br />
<br />
Pennsylvania (18 Pa. C.S.A. § 4107(a)(10))<br />
Pennsylvania includes false and misleading statements in privacy policies published on Web sites or otherwise distributed in its deceptive or fraudulent business practices statute."<ref>National Conference of State Legislators. (2009, October 19). Privacy policy for websites. Retrieved from http://www.ncsl.org/default.aspx?tabid=13463</ref><br />
<br />
There are also at least 16 states that require government websites to create privacy policies and procedures or to include machine-readable privacy policies into their websites. These states include Arizona, Arkansas, California, Colorado, Delaware, Iowa, Illinois, Maine, Maryland, Michigan, Minnesota, Montana, New York, Sourth Carolina, Texas, Utah, and Virginia.<br />
<br />
==Risks to internet privacy==<br />
In today’s technological world, millions of individuals are subject to privacy threats. Companies are hired not only to watch what you visit online, but to infiltrate the information and send advertising based on your browsing history. People set up accounts for Facebook; enter bank and credit card information to various websites.<br />
<br />
Those concerned about Internet privacy often cite a number of ''privacy risks'' — events that can compromise privacy — which may be encountered through Internet use.<ref>{{cite web<br />
| author = Matt Schafer<br />
| title = Privacy, Privacy, Where for Art Thou Privacy?<br />
| quote = As consumers have became wise to the use of cookies, however, the industry has began using both normal cookies and local shared objects (a.k.a flash cookies) in the event that users would delete the normal cookies.<br />
| publisher = Lippmannwouldroll.com<br />
| date = August 2, 2010<br />
| url = http://lippmannwouldroll.com/2010/08/02/privacy-privacy-where-for-art-thou-privacy/<br />
| accessdate = October 17, 2010<br />
}}</ref> These methods of compromise can range from the gathering of statistics on users, to more malicious acts such as the spreading of spyware and various forms of [[Software bug|bugs]] (software errors) exploitation.<br />
<br />
Privacy measures are provided on several social networking sites to try to provide their users with protection for their personal information. On Facebook for example privacy settings are available for all registered users. The settings available on Facebook include the ability to block certain individuals from seeing your profile, the ability to choose your "friends," and the ability to limit who has access to your pictures and videos. Privacy settings are also available on other social networking sites such as E-harmony and MySpace. It is the user's prerogative to apply such settings when providing personal information on the internet.<br />
<br />
In late 2007 Facebook launched the Beacon program where user rental records were released on the public for friends to see. Many people were enraged by this breach in privacy, and the ''[[Lane v. Facebook, Inc.]]'' case ensued.<br />
<br />
===HTTP cookies===<br />
An [[HTTP cookie]] is data stored on a user's computer that assists in automated access to websites or web features, or other [[State (computer science)|state]] information required in complex web sites. It may also be used for user-tracking by storing special usage history data in a cookie. Cookies are a common concern in the field of privacy. As a result, some types of cookies are classified as a ''tracking cookie''. Although website developers most commonly use cookies for legitimate technical purposes, cases of abuse occur. In 2009, two researchers noted that social networking profiles could be connected to cookies, allowing the social networking profile to be connected to browsing habits.<ref>Krishnamurthy B, Wills CE. (2009). [http://conferences.sigcomm.org/sigcomm/2009/workshops/wosn/papers/p7.pdf On the Leakage of Personally Identifiable Information Via Online Social Networks].</ref><br />
<br />
Systems do not generally make the user explicitly aware of the storing of a cookie. (Although some users object to that, it does not properly relate to Internet privacy. It does however have implications for computer privacy, and specifically for [[computer forensics]].<br />
<br />
The original developers of cookies intended that only the website that originally distributed cookies to users so they could retrieve them, therefore returning only data already possessed by the website. However, in practice programmers can circumvent this restriction. Possible consequences include:<br />
* the placing of a [[personally-identifiable information|personally-identifiable]] tag in a browser to facilitate [[web profiling]] (see below), or,<br />
* use of [[cross-site scripting]] or other techniques to steal information from a user's cookies.<br />
<br />
Some users choose to disable cookies in their web browsers – as of 2000 a Pew survey estimated the proportion of users at 4%.<ref>[http://www.pewinternet.org/report_display.asp?r=19 Trust and Privacy Online: Why Americans Want to Rewrite the Rules. Pew Internet & American Life Project. Released Aug. 20, 2000]</ref> Such an action eliminates the potential privacy risks, but may severely limit or prevent the functionality of many websites. All significant web browsers have this disabling ability built-in, with no external program required. As an alternative, users may frequently delete any stored cookies. Some browsers (such as [[Mozilla Firefox]] and [[Opera (web browser)|Opera]]) offer the option to clear cookies automatically whenever the user closes the browser. A third option involves allowing cookies in general, but preventing their abuse. There are also a host of wrapper applications that will redirect cookies and cache data to some other location.<br />
<br />
The process of ''profiling'' (also known as "tracking") assembles and analyzes several events, each attributable to a single originating entity, in order to gain information (especially patterns of activity) relating to the originating entity. Some organizations engage in the profiling of people's web browsing, collecting the [[Uniform Resource Locator|URL]]s of sites visited. The resulting profiles can potentially link with information that personally identifies the individual who did the browsing.<br />
<br />
Some web-oriented marketing-research organizations may use this practice legitimately, for example: in order to construct profiles of 'typical Internet users'. Such profiles, which describe average trends of large groups of Internet users rather than of actual individuals, can then prove useful for [[market analysis]]. Although the aggregate data does not constitute a privacy violation, some people believe that the initial profiling does.<br />
<br />
Profiling becomes a more contentious privacy issue when data-matching associates the profile of an individual with personally-identifiable information of the individual.<br />
<!-- TODO: Elaborate. Inability of individuals to review or correct false info about themselves. Reselling of the data. Concerns about undesirable uses to which this info is applied (eg, spamming and junk mail). --><br />
<br />
Governments and organizations may set up [[Honeypot (computing)|honeypot]] websites – featuring controversial topics – with the purpose of attracting and tracking unwary people. This constitutes a potential danger for individuals.<br />
<!-- Fix above para --><br />
<br />
===Flash cookies===<br />
Flash cookies, also known as [[Local Shared Object]]s, work the same ways as normal cookies and are used by the [[Adobe Flash Player]] to store information at the user's computer. They exhibit a similar privacy risk as normal [[cookies]], but are not as easily blocked, meaning that the option in most browsers to not accept cookies does not affect flash cookies. One way to view and control them is with browser extensions or add-ons.<br />
<!-- More information should be posted on flash cookies and how they impact users' privacy --><br />
<br />
===Evercookies===<br />
An [[Evercookie]] is a JavaScript-based application which produces cookies in a web browser<br />
that actively "resist" deletion by redundantly copying themselves in different forms on the user's machine (e.g.: Flash [[Local Shared Object]]s, various HTML5 storage mechanisms, window.name caching, etc.), and resurrecting copies are missing or expired.<br />
<br />
===Photographs on the internet===<br />
[[Image:Wikimania impression nophoto.jpg|thumb|'No photos' tag at [[Wikimania]]]]<br />
Today many people have [[digital cameras]] and post their [[photo]]s online. The people depicted in these photos might not want to have them appear on the Internet.<br />
<br />
Some organizations attempt to respond to this privacy-related concern. For example, the 2005 [[Wikimania]] conference required that photographers have the prior permission of the people in their pictures. Some people wore a 'no photos' tag to indicate they would prefer not to have their photo taken.{{Citation needed|date=August 2010}}<br />
<br />
The Harvard Law Review published a short piece called "In The Face of Danger: Facial Recognition and Privacy Law," much of it explaining how "privacy law, in its current form, is of no help to those unwillingly tagged." <ref>In the Face of Danger: Facial Recognition and the Limits of Privacy Law. (2007). Retrieved from Harvard, Harvard Law Review: http://www.harvardlawreview.org/issues/120/may07/note_4397.php.</ref> Any individual can be unwillingly tagged in a photo and displayed in a manner that might violate them personally in some way, and by the time Facebook gets to taking down the photo, many people will have already had the chance to view, share, or distribute it. Furthermore, traditional tort law does not protect people who are captured by a photograph in public because this is not counted as an invasion of privacy. The extensive Facebook privacy policy covers these concerns and much more. For example, the policy states that they reserve the right to disclose member information or share photos with companies, lawyers, courts, government entities, etc. if they feel it absolutely necessary. The policy also informs users that profile pictures are mainly to help friends connect to each other.<ref>Facebook's Privacy Policy. (2010). Retrieved from Facebook: http://www.facebook.com/policy.php.</ref> However, these, as well as other pictures, can allow other people to invade a person’s privacy by finding out information that can be used to track and locate a certain individual. In an article featured in ABC news, it was stated that two teams of scientists found out that Hollywood stars could be giving up information about their private whereabouts very easily through pictures uploaded to the Internet. Moreover, it was found that pictures taken by [[iPhone]]s automatically attach the [[latitude]] and [[longitude]] of the picture taken through [[metadata]] unless this function is manually disabled.<ref>Heussner, M. K. (2010). Celebrities' Photos, Videos May Reveal Location. Retrieved from ABC: http://abcnews.go.com/technology/ celebrity-stalking-online-photos-give-location/ story?id=11162352&page=1.</ref><br />
<br />
===Search engines===<br />
<br />
Search engines have the ability to track a user’s searches. Personal information can be revealed through searches including search items used, the time of the search, and more. Search engines have claimed a necessity to retain such information in order to provide better services, protect against security pressure, and protect against fraud.<br />
<ref name="privacyrights.org">(December 2010) Online Privacy: Using the Internet Safely. Retrieved from http://www.privacyrights.org/fs/fs18-cyb.htm</ref><br />
<br />
===Data logging===<br />
Many programs and operating systems are set up to perform [[data logging]] of usage. This may include recording times when the computer is in use, or which web sites are visited. If a third party has sufficient access to the computer, legitimately or not, the user's privacy may be compromised. This could be avoided by disabling logging, or by clearing logs regularly.<br />
<br />
===Privacy within social networking sites===<br />
Prior to the social networking site explosion over the past decade, there were early forms of social network technologies that included online multiplayer games, blog sites, news groups, mailings lists and dating services. These all created a backbone for the new modern sites, and even from the start of these older versions privacy was an issue. In 1996, a young woman in New York City was on a first date with an online acquaintance and later sued for sexual harassment as they went back to her apartment after when everything became too real. This is just an early example of many more issues to come regarding internet privacy.<ref>Tracy Mitrano. (2006, November, December). A Wider World: Youth, Privacy, and Social Networking Technologies. Retrieved from http://www.educause.edu/EDUCAUSE+Review/EDUCAUSEReviewMagazineVolume41/AWiderWorldYouthPrivacyandSoci/158095</ref><br />
<br />
Social networking sites have become very popular within the last five years. With the creation of [[Facebook]] and the continued popularity of [[MySpace]] many people are giving their personal information out on the internet. These [[social network]]s keep track of all interactions used on their sites and save them for later use.<ref>Dwyer, C., Hiltz, S. & Passerini, K. (2007). Trust and Privacy Concern within Social Networking Sites: A Comparison of Facebook and MySpace. Americas Conference on Information Systems. Retrieved from http://74.125.155.132/scholar?q=cache:qLCk18d_wZwJ:scholar.google.com/+facebook+privacy&hl=en&as_sdt=2000</ref> Most users are not aware that they can modify the privacy settings and unless they modify them, their information is open to the public. On Facebook privacy settings can be accessed via the drop down menu under account in the top right corner. There users can change who can view their profile and what information can be displayed on their profile.<ref name="facebook.com">Facebook’s Privacy Policy. (2010). Retrieved from http://www.facebook.com/policy.php</ref> In most cases profiles are open to either "all my network and friends" or "all of my friends." Also, information that shows on a user's profile such as birthday, religious views, and relationship status can be removed via the privacy settings.<ref>Lipford, H. R., Besmer, A. & Watson, J. (2009). Understanding Privacy Settings in Facebook with an Audience View. Department of Software and Information Systems University of North Carolina at Charlotte. Retrieved from http://www.usenix.org/events/upsec08/tech/full_papers/lipford/lipford_html/</ref> If a user is under 13 years old they are not able to make a Facebook or a MySpace account, however, this is not regulated.<ref name="facebook.com"/><br />
<br />
Social networking has redefined the role of Internet privacy. Since users are willingly disclosing personal information online, the role of privacy and security is somewhat blurry. Sites such as Facebook, Myspace, and Twitter have grown popular by broadcasting status updates featuring personal information such as location. Facebook “Places,” in particular, is a Facebook service, which publicizes user location information to the networking community. Users are allowed to “check-in” at various locations including retail stores, convenience stores, and restaurants. Also, users are able to create their own “place,” disclosing personal information onto the Internet. This form of location tracking is automated and must be turned off manually. Various settings must be turned off and manipulated in order for the user to ensure privacy. According to epic.org, Facebook users are recommended to: (1) disable "Friends can check me in to Places," (2) customize "Places I Check In," (3) disable "People Here Now," and (4) uncheck "Places I've Visited.".<ref name="Facebook. PIC">EPIC - In re Facebook. (n.d.). EPIC - Electronic Privacy Information Center. Retrieved January 25, 2011/</ref> Moreover, the Federal Trade Commission has received two complaints in regards to Facebook’s “unfair and deceptive” trade practices, which are used to target advertising sectors of the online community. “Places” tracks user location information and is used primarily for advertising purposes. Each location tracked allows third party advertisers to customize advertisements that suit one’s interests. Currently, the Federal Trade Commissioner along with the Electronic Privacy Information Center are shedding light on the issues of location data tracking on social networking sites.<ref name="Facebook. PIC"/><br />
<br />
Recently, Facebook has been scrutinized for having a variety of applications that are considered to be invasive to user privacy. “The Breakup Notifier” is an example of a Facebook “cyberstalking” app that has recently been taken down. Essentially, the application notifies users when a person breaks up with their partner through Facebook, allowing users to instantly become aware of their friend's romantic activities. The concept became very popular, with the site attracting 700,000 visits in the first 36 hours; people downloaded the app 40,000 times. Just days later, the app had more than 3.6 million downloads and 9,000 Facebook likes. <ref>Retrieved from http://www.foxnews.com/scitech/2011/02/24/facebook-quashes-hot-new-stalker-app/</ref><br />
<br />
There are other applications that border on “cyberstalking.” An application named "Creepy" can track a person's location on a map using photos uploaded to Twitter or Flickr. When a person uploads photos to a social networking site, others are able to track their most recent location. Some smart phones are able to embed the longitude and latitude coordinates into the photo and automatically send this information to the application. Anybody using the application can search for a specific person and then find their immediate location. This poses many potential threats to users who share their information with a large group of followers. <ref> Retrieved from: http://abcnews.go.com/Technology/smartphone-apps-tracking-keeping-tabs-past-lovers-people/story?id=13022144</ref><br />
<br />
Facebook recently updated its profile format allowing for people who are not “friends” of others to view personal information about other users, even when the profile is set to private. However, As of January 18, 2011 Facebook changed its decision to make home addresses and telephone numbers accessible to third party members, but it is still possible for third party members to have access to less exact personal information, like one’s hometown and employment, if the user has entered the information into Facebook . EPIC Executive Director Marc Rotenberg said "Facebook is trying to blur the line between public and private information. And the request for permission does not make clear to the user why the information is needed or how it will be used." <ref>Electronic Privacy Information Center, Initials. (2011, January 18). Facebook drops plan to disclose users' home addresses and personal phone number. Retrieved from http://epic.org/privacy/socialnet/</ref><br />
Similar to Rotenberg’s claim that Facebook users are unclear of how or why their information has gone public, recently the Federal Trade Commission and Commerce Department have become involved. The Federal Trade Commission has recently released a report claiming that Internet companies and other industries will soon need to increase their protection for online users. Because online users often unknowingly opt in on making their information public, the FTC is urging Internet companies to make privacy notes simpler and easier for the public to understand, therefore increasing their option to opt out. Perhaps this new policy should also be implemented in the Facebook world. The Commerce Department claims that Americans, “have been ill-served by a patchwork of privacy laws that contain broad gaps,”.<ref>American Civil Liberties Union. (2010, December 16). Commerce department releases important report urging comprehensive privacy protections. Retrieved from http://www.aclu.org/technology-and-liberty/commerce-department-releases-important-report-urging-comprehensive-privacy-pr</ref> Because of these broad gaps, Americans are more susceptible to identity theft and having their online activity tracked by others.<br />
<br />
'''Spokeo'''<br />
- [[Spokeo]] is a “people-related” search engine with results compiled through data aggregation. The site contains information such as age, relationship status, estimated personal wealth, immediate family members and home address of individual people. This information is compiled through what is already on the internet or in other public records, but the website does not guarantee accuracy. <ref>http://www.spokeo.com/blog/about/ </ref><br />
<br />
[[Spokeo]] has been faced with potential class action law suits from people who claim that the organization breaches the Fair Credit Reporting Act. In September, 2010, Jennifer Purcell claimed that the FCRA was violated by [[Spokeo]] marketing her personal information. Her case is pending in court. Also in 2010, Thomas Robins claimed that his personal information on the website was inaccurate and he was unable to edit it for accuracy. The case was dismissed because Robins did not claim that the site directly caused him actual harm. <ref> Baynes, T. (2011, February 24). Lawsuits challenge U.S. online data brokers. Reuters. Retrieved from http://uk.reuters.com/article/2011/02/24/idUKN2427826420110224?pageNumber=1</ref> On February 15, 2011, Robins filed another suit, this time stating [[Spokeo]] has caused him “imminent and ongoing” harm. <ref> Davis, W. (2011, February 17). Spokeo charged with violating fair credit reporting<br />
act. MediaPost Publications. Retrieved from http://www.mediapost.com/publications/?<br />
fa=Articles.showArticle&art_aid=145270 </ref><br />
<br />
'''Twitter Case'''<br />
- In January 2011, the government recently obtained a court order to force the social networking site, Twitter, to reveal information applicable surrounding certain subscribers involved in the WikiLeaks cases. This outcome of this case is questionable because it deals with the user’s First Amendment rights. Twitter moved to reverse the court order, and supported the idea that internet users should be notified and given an opportunity to defend their constitutional rights in court before their rights are compromised.<ref>(1/8/11) Government Requests For Twitter Users’ Personal Information Raises Serious Constitutional Concerns. Retrieved from http://www.aclu.org/technology-and-liberty/government-requests-twitter-users-personal-information-raise-serious-constitu</ref><br />
<br />
'''Facebook Friends Study'''<br />
- A study was conducted at Northeastern University by Alan Mislove and his colleagues at the Max Planck Institute for Software Systems, where an algorithm was created to try and discover personal attributes of a Facebook user by looking at their friend’s list. They looked for information such as high school and college attended, major, hometown, graduation year and even what dorm a student may have lived in. The study revealed that only 5% of people thought to change their friend’s list to private. For other users, 58% displayed university attended, 42% revealed employers, 35% revealed interests and 19% gave viewers public access to where they were located. Due to the correlation of Facebook friends and universities they attend, it was easy to discover where a Facebook user was based on their list of friends. This fact is one that has become very useful to advertisers targeting their audiences but is also a big risk for the privacy of all those with Facebook accounts.<ref>Erik Hayden. (2010, March 11). On Facebook, You Are Who You Know. Retrieved from http://www.miller-mccune.com/culture-society/on-facebook-you-are-who-you-know-10385/#</ref><br />
<br />
'''Law enforcement prowling the networks'''<br />
- The [[FBI]] has dedicated undercover agents on [[Facebook]], [[Twitter]], [[MySpace]], [[LinkedIn]]. They create fake ID's and sneak their way into a social network in order to find incriminating evidence. They look at everything. Pictures, posts, and video clips can reveal all sorts of useful information. Friends can be a criminal's worst enemy as investigators check an alibi by comparing stories tweeted by friends as to their location during the crime, their purpose of going places, etc. These covert operations are perfectly legal. The rules and guidelines to the privacy issue is internal to the Justice Department and details aren't released to the public. Agents can impersonate a friend, a long lost relative, even a spouse and child. This raises real issues regarding privacy. Although people who use [[Facebook]], [[Twitter]], and other social networking sites are aware of some level of privacy will always be compromised, but, no one would ever suspect that the friend invitation might be from a federal agent whose sole purpose of the friend request was to snoop around. Furthermore, [[Facebook]], [[Twitter]], and [[MySpace]] have personal information and past posts logged for up to one year; even deleted profiles, and with a warrant, can hand over very personal information. One example of investigators using Facebook to nab a criminal is the case of Maxi Sopo. Charged with bank fraud, and having escaped to [[Mexico]], he was nowhere to be found until he started posting on [[Facebook]]. Although his profile was private, his list of friends were not, and through this vector, they eventually caught him.<ref>Richard Lardner. (2010, March 16). Your new Facebook ‘friend’ may be the FBI. Retrieved from http://www.msnbc.msn.com/id/35890739/ns/technology_and_science-security/</ref><br />
<br />
In recent years, some state and local law enforcement agencies have also begun to rely on social media websites as resources. Although obtaining records of information not shared publicly by or about site users often requires a subpoena, public pages on sites such as [[Facebook]] and [[MySpace]] offer access to personal information that can be valuable to law enforcement. <ref> Harkins, Gina. (2011, March 02). Cops patrol social networking sites for gang activity. Retrieved from http://news.medill.northwestern.edu/chicago/news.aspx?id=181375 </ref> Police departments have reported using social media websites to assist in investigations, locate and track suspects, and monitor gang activity. <ref> Taghi, Hasti. (2011, February 10). Police Use Facebook To Track Suspect. Retrieved from http://www.click2houston.com/news/26825687/detail.html </ref><br />
<ref> Halverstadt, Lisa. (2009, March 12). Surprise police use MySpace to locate teen graffiti suspect. Retrieved from http://www.azcentral.com/news/articles/2009/03/12/20090312gl-nwvmyspace0313.html </ref><br />
<br />
===Internet service providers===<br />
Internet users obtain Internet access through an [[Internet service provider]] (ISP). All data transmitted to and from users must pass through the ISP. Thus, an ISP has the potential to observe users' activities on the Internet.<br />
<br />
However, ISPs are usually prevented from participating in such activities due to legal, ethical, business, or technical reasons.<br />
<br />
<!--illogical construction-->Despite these legal and ethical restrictions, some ISPs, such as [[British Telecom]] (BT), are planning to use [[deep packet inspection]] technology provided by companies such as [[Phorm]] in order to examine the contents of the pages that people visit. By doing so, they can build up a profile of a person's web surfing habits,{{Citation needed|date=August 2010}} which can then be sold on to advertisers in order to provide targeted advertising. BT's attempt at doing this will be marketed under the name 'Webwise'.{{Citation needed|date=August 2010}}<br />
<br />
Normally ISPs do collect at least ''some'' information about the consumers using their services. From a privacy standpoint, ISPs would ideally collect only as much information as they require in order to provide Internet connectivity (IP address, billing information if applicable, etc).<br />
<br />
Which information an ISP collects, what it does with that information, and whether it informs its consumers, pose significant privacy issues. Beyond the usage of collected information typical of third parties, ISPs sometimes state that they will make their information available to government authorities upon request. In the US and other countries, such a request does not necessarily require a warrant.<br />
<br />
An ISP cannot know the contents of properly-encrypted data passing between its consumers and the Internet. For encrypting [[World Wide Web|web]] traffic, [[https]] has become the most popular and best-supported standard. Even if users encrypt the data, the ISP still knows the IP addresses of the sender and of the recipient. (However, see the [[#IP addresses|IP addresses]] section for workarounds.)<br />
<br />
An [[Anonymizer]] such as [[I2P|I2P – The Anonymous Network]] or [[Tor (anonymity network)|Tor]] can be used for accessing web services without them knowing your IP address and without your ISP knowing what the services are that you access.<br />
<br />
General concerns regarding Internet user privacy have become enough of a concern for a UN agency to issue a report on the dangers of identity fraud.<ref>[http://news.bbc.co.uk/1/hi/technology/6199372.stm UN warns on password 'explosion']</ref><br />
<br />
While signing up for internet services, each computer contains a unique IP, Internet Protocol address. This particular address will not give away private or personal information, however, a weak link could potentially reveal information from your ISP.<ref>http://www.privacyrights.org/fs/fs18-cyb.htm</ref><br />
<br />
<br />
Social networking has redefined the role of Internet privacy. Since users are willingly disclosing personal information online, the role of privacy and security is somewhat blurry. Sites such as Facebook, Myspace, and Twitter have grown popular by broadcasting status updates featuring personal information such as location. Facebook “Places,” in particular, is a Facebook service, which publicizes user location information to the networking community. Users are allowed to “check-in” at various locations including retail stores, convenience stores, and restaurants. Also, users are able to create their own “place,” disclosing personal information onto the Internet. This form of location tracking is automated and must be turned off manually. Various settings must be turned off and manipulated in order for the user to ensure privacy. According to epic.org, Facebook users are recommended to: (1) disable "Friends can check me in to Places," (2) customize "Places I Check In," (3) disable "People Here Now," and (4) uncheck "Places I've Visited.".<ref name="Facebook. PIC">EPIC - In re Facebook. (n.d.). EPIC - Electronic Privacy Information Center. Retrieved January 25, 2011/</ref> Moreover, the Federal Trade Commission has received two complaints in regards to Facebook’s “unfair and deceptive” trade practices, which are used to target advertising sectors of the online community. “Places” tracks user location information and is used primarily for advertising purposes. Each location tracked allows third party advertisers to customize advertisements that suit one’s interests. Currently, the Federal Trade Commissioner along with the Electronic Privacy Information Center are shedding light on the issues of location data tracking on social networking sites.<ref name="Facebook. PIC"/><br />
<br />
==Legal threats==<br />
Use by government agencies of an array of technologies designed to track and gather Internet users' information are the topic of much debate between privacy advocates, civil libertarians and those who believe such measures are necessary for law enforcement to keep pace with rapidly changing communications technology.<br />
<br />
Specific examples<br />
<br />
*Following a decision by the European Union’s council of ministers in Brussels, in January, 2009, the UK's [[Home Office]] adopted a plan to allow police to access the contents of individuals' computers without a warrant. The process, called "remote searching", allows one party, at a remote location, to examine another's hard drive and Internet traffic, including email, browsing history and websites visited. Police across the EU are now permitted to request that the British police conduct a remote search on their behalf. The search can be granted, and the material gleaned turned over and used as evidence, on the basis of a senior officer believing it necessary to prevent a serious crime. Opposition MPs and civil libertarians are concerned about this move toward widening surveillance and its possible impact on personal privacy. Says Shami Chakrabarti, director of the human rights group Liberty, “The public will want this to be controlled by new legislation and judicial authorisation. Without those safeguards it’s a devastating blow to any notion of personal privacy.”<ref>[http://www.timesonline.co.uk/tol/news/politics/article5439604.ece Police set to step up hacking of home PCs]</ref><br />
<br />
*The FBI's [[Magic Lantern (software)|Magic Lantern]] software program was the topic of much debate when it was publicized in November, 2001. Magic Lantern is a [[Trojan horse (computing)|Trojan Horse]] program that logs users' keystrokes, rendering encryption useless.<ref>[http://www.rumormillnews.com/cgi-bin/archive.cgi?noframes;read=15391 FBI 'Lantern' Software Does Log Keystrokes]</ref><br />
<br />
==Laws for Internet Privacy Protection==<br />
<br />
'''USA Patriot Act'''<br />
<br />
The purpose of this act, enacted on October 26, 2001 by former President Bush, was to enhance law enforcement investigatory tools, investigate online activity, as well as to discourage terrorist acts both within the United States and around the world. This act reduced restrictions for law enforcement to search various methods and tools of communication such as telephone, e-mail, personal records including medical and financial, as well as reducing restrictions with obtaining of foreign intelligence.<ref>(January 2011) “USA Patriot Act.” Retrieved from http://www.fincen.gov/statutes_regs/patriot/</ref><br />
<br />
'''Electronic Communications Privacy Act (ECPA)'''<br />
<br />
This act makes it unlawful under certain conditions for an individual to reveal the information of electronic communication and contains a few exceptions. One clause allows the ISP to view private e-mail if the sender is suspected of attempting to damage the internet system or attempting to harm another user. Another clause allows the ISP to reveal information from a message if the sender or recipient allows to its disclosure. Finally, information containing personal information may also be revealed for a court order or law enforcement’s subpoena.<ref name="privacyrights.org"/><br />
<br />
'''Employees and Employers Internet Regulations'''<br />
<br />
When considering the rights between employees and employers regarding internet privacy and protection at a company, different states have their own laws. Connecticut and Delaware both have laws that state an employer must create a written notice or electronic message that provides understanding that they will regulate the internet traffic.<ref name="ncsl.org">NCSL (October 9, 2009). “State Laws Related to Internet Privacy.” National Conference of State Legislatures. Retrieved January 23, 2011, from http://www.ncsl.org/default.aspx?tabid=13463</ref> By doing so, this relates to the employees that the employer will be searching and monitoring emails and internet usage. Delaware charges $100 for a violation where Connecticut charges $500 for the first violation and then $1000 for the second.<ref name="ncsl.org"/> When looking at public employees and employers, California and Colorado created laws that would also create legal ways in which employers controlled internet usage.<ref name="ncsl.org"/> The law stated that a public company or agency must create a prior message to the employees stating that accounts will be monitored. Without these laws, employers could access information through employees accounts and use them illegally.<ref>Cranor, Lorrie Faith (June 1998). “Internet Privacy: A Public Concern.” Lorrie Faith Cranor. Retrieved January 24, 2011, from http://lorrie.cranor.org/pubs/networker-privacy.html</ref> In most cases, the employer is allowed to see whatever he or she pleases because of these laws stated both publicly and privately.<ref>Privacy Rights Clearinghouse (January 2011). “Fact Sheet 7: Workplace Privacy and Employee Monitoring.” Privacy Rights Clearinghouse. Retrieved January 23, 2011 from http://www.privacyrights.org/fs/fs7-work.htm</ref><br />
<br />
==Other potential Internet privacy risks==<br />
<!-- These should each get their own sections --><br />
* '''[[Malware]]''' is a term short for "malicious software" and is used to describe software to cause damage to a single computer, server, or computer network whether that is through the use of a virus, trojan horse, spyware, etc.<ref name="http://technet.microsoft.com/en-us/library/dd632948.aspx">Receieved from http://technet.microsoft.com</ref><br />
* '''[[Spyware]]''' is a piece of software that obtains information from a user's computer without that user's consent.<ref name="http://technet.microsoft.com/en-us/library/dd632948.aspx">Receieved from http://technet.microsoft.com</ref><br />
* A '''web bug''' is an object embedded into a web page or email and is usually invisible to the user of the website or reader of the email. It allows checking to see if a person has looked at a particular website or read a specific email message.<br />
* '''[[Phishing]]''' is a criminally fraudulent process of trying to obtain sensitive information such as user names, passwords, credit card or bank information. Phishing is an internet crime in which someone masquerades as a trustworthy entity in some form of electronic communication.<br />
* '''[[Pharming]]''' is hackers attempt to redirect traffic from a legitimate website to a completely different internet address. Pharming can be conducted by changing the hosts file on a victim’s computer or by exploiting a vulnerability on the DNS server.<br />
* [[Social engineering (computer security)|Social engineering]]<br />
* [[Proxy server#Risks of using anonymous proxy servers|Malicious proxy server]] (or other "anonymity" services)<br />
<br />
==Specific cases==<br />
===Jason Fortuny and Craigslist===<br />
In early September 2006, [[Jason Fortuny]], a [[Seattle metropolitan area|Seattle]]-area freelance graphic designer and network administrator, posed as a woman and posted an ad to [[Craigslist]] Seattle seeking a casual sexual encounter with men in that area. On September 4, he posted to the wiki website [[Encyclopædia Dramatica]] all 178 of the responses, complete with photographs and personal contact details, describing this as the Craigslist Experiment and encouraging others to further identify the respondents.<ref>{{cite web<br />
| url = http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2006/09/17/PKG6BKQQA41.DTL<br />
| author = Neva Chonin<br />
| title = Sex and the City<br />
| publisher = San Francisco Chronicle<br />
|date=September 17, 2006<br />
| accessdate = June 17, 2007<br />
}}</ref><br />
<br />
Although some online exposures of personal information have been seen as justified for exposing malfeasance, many commentators on the Fortuny case saw no such justification here. "The men who replied to Fortuny's posting did not appear to be doing anything illegal, so the outing has no social value other than to prove that someone could ruin lives online," said law professor [[Jonathan Zittrain]],<ref name=autogenerated1>{{cite news<br />
| url = http://www.msnbc.msn.com/id/14791788/<br />
| author = Anick Jesdanun<br />
| title = Prankster posts sex ad replies online<br />
| agency = Associated Press<br />
|date=September 12, 2006<br />
| accessdate = June 27, 2007}}</ref> while ''[[Wired magazine|Wired]]'' writer [[Ryan Singel]] described Fortuny as "[[Psychopathy|sociopathic]]".<ref>{{cite web<br />
| url = http://blog.wired.com/27BStroke6/index.blog?entry_id=1553329<br />
| author = [[Ryan Singel]]<br />
| title = Craigslist<br />
| publisher = Wired Blogs<br />
|date=September 8, 2006<br />
| accessdate = September 12, 2006<br />
}}</ref><br />
<br />
The [[Electronic Frontier Foundation]] indicated that it thought Fortuny might be liable under [[Washington (U.S. state)|Washington]] state law, and that this would depend on whether the information he disclosed was of legitimate public concern. [[Kurt Opsahl]], the EFF's staff attorney, said "As far as I know, they (the respondents) are not public figures, so it would be challenging to show that this was something of public concern."<ref name=autogenerated1 /><br />
<br />
According to Fortuny, two people lost their jobs as a result of his Craigslist Experiment and another "has filed an invasion-of-privacy lawsuit against Fortuny in an Illinois court." <ref>{{cite news<br />
|url=http://www.nytimes.com/2008/08/03/magazine/03trolls-t.html?ex=1375329600&en=b5085d50ee5c65e5&ei=5124&partner=permalink&exprod=permalink<br />
|title=Malwebolence|publisher=New York Times<br />
|accessdate=August 1, 2008|<br />
last=Schwartz|first=Mattathias<br />
|quote=After receiving death threats, Fortuny meticulously scrubbed his real address and phone number from the Internet. “Anyone who knows who and where you are is a security hole,” he told me. “I own a gun. I have an escape route. If someone comes, I’m ready.”}}</ref><br />
<br />
Fortuny did not enter an appearance in the Illinois suit, secure counsel, or answer the complaint after an early amendment. Mr. Fortuny had filed a motion to dismiss, but he filed it with the Circuit Court of Cook County, Illinois, and he did not file proof that he had served the plaintiff.<ref>{{cite court|litigants=Doe v. Fortuny|vol=1:08-cv-1050|court=D. Ill.|date=December 15, 2008|url=https://ecf.ilnd.uscourts.gov/doc1/06715867523}}</ref> As a result, the court entered a [[default judgment]] against Mr. Fortuny and ordered a damages hearing for January 7, 2009.<ref>{{cite court|litigants=Doe v. Fortuny|vol=1:08-cv-1050|court=D. Ill.|date=11/12/2008|url=https://ecf.ilnd.uscourts.gov/doc1/06705746202}}</ref> After failing to show up at multiple hearings on damages,<ref>{{cite court|litigants=Doe v. Fortuny|vol=1:08-cv-1050|court=D. Ill.|date=01/07/2009|url=https://ecf.ilnd.uscourts.gov/doc1/06715925042}}</ref><ref>{{cite court|litigants=Doe v. Fortuny|vol:1:08-cv-1050|court=D. Ill.|date=04/09/2009|url=https://ecf.ilnd.uscourts.gov/doc1/06716314400}}</ref> Fortuny was ordered to pay $74,252.56 for violation of the Copyright Act, compensation for Public Disclosure of Private Facts, Intrusion Upon Seclusion, attorneys fees and costs.<ref>{{cite court|litigants=Doe v. Fortuny|vol=1:08-cv-1050|court=D. Ill.|date=04/09/2009|url=https://ecf.ilnd.uscourts.gov/doc1/06716314618}}</ref><br />
<big><br />
<br />
'''USA vs. Warshak'''</big><br />
<br />
The case ''[[United_States_v._Warshak|United States v. Warshak]]'', decided December 14, 2010 by the Sixth Circuit Court of Appeals, maintained the idea that an ISP actually is allowed access to private e-mail. However, the government must get hold of a search warrant before obtaining such e-mail. This case dealt with the question of emails hosted on an isolated server. Due to the fact that e-mail is similar to other forms of communication such as telephone calls, e-mail requires the same amount of protection under the 4th amendment.<ref name="privacyrights.org"/><br />
<br />
===Search engine data and law enforcement===<br />
Data from major Internet companies, including [[Yahoo!]] and [[MSN]] ([[Microsoft]]), have already been subpoenaed by the [[US government|United States]]<ref>[http://blog.searchenginewatch.com/blog/060119-060352 Bush Administration Demands Search Data; Google Says No; AOL, MSN & Yahoo Said Yes]</ref> and China.<ref>[http://blog.wired.com/27bstroke6/2007/07/yahoo-knew-more.html Yahoo Knew More About China Journalist Subpoena Than It Told Congress It Did]</ref> [[AOL]] even provided a chunk of its own search data online,<ref>[http://www.techdirt.com/articles/20060807/0219238.shtml Forget The Government, AOL Exposes Search Queries To Everyone]</ref> allowing reporters to track the online behaviour of private individuals.<ref>[http://technology.guardian.co.uk/online/search/story/0,,1859785,00.html They know all about you]</ref><br />
<br />
In 2006, a wireless hacker pled guilty when his [[Google]] searches were used as evidence against him. The defendant ran a Google search over the network using the following search terms: "how to broadcast interference over wifi 2.4 GHZ," "interference over wifi 2.4 Ghz," "wireless networks 2.4 interference," and "make device interfere wireless network." While court papers did not describe how the FBI obtained his searches (e.g. through a seized hard-drive or directly from the search-engine), Google has indicated that it can provide search terms to law enforcement if given an Internet address or Web cookie.<br />
<ref>{{cite web<br />
| url = http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1444191<br />
| author = Tim Wafa<br />
| title = Global Internet Privacy Rights – A Pragmatic Approach<br />
| publisher = University of San Francisco Intellectual Property Law Bulletin<br />
| month= June | year= 2009<br />
| accessdate = June 1, 2009<br />
}}</ref><br />
<br />
=== ''US v. Zeigler'' ===<br />
In the United States many cases discuss whether a private employee (i.e., not a government employee) who stores incriminating evidence in workplace computers is protected by the [[Fourth Amendment to the United States Constitution|Fourth Amendment's]] reasonable expectation of privacy standard in a criminal proceeding.<br />
<br />
Most case law holds that employees do not have a reasonable expectation of privacy when it comes to their work related electronic communications. See, e.g. ''US v. Simons'', 206 F.3d 392, 398 (4th Cir., Feb. 28, 2000).<br />
<br />
However, one federal court held that employees can assert that the attorney-client privilege with respect to certain communications on company laptops. See ''Curto v. Medical World Comm''., No. 03CV6327, 2006 U.S. Dist. LEXIS 29387 (E.D.N.Y. May 15, 2006).<br />
<br />
Another recent federal case discussed this topic. On January 30, 2007, the [[Ninth Circuit]] court in US v. Ziegler, reversed its earlier August 2006 decision upon a petition for rehearing. In contrast to the earlier decision, the Court acknowledged that an employee has a right to privacy in his workplace computer. However, the Court also found that an employer can consent to any illegal searches and seizures. See ''US v. Ziegler'', ___F.3d 1077 (9th Cir. Jan. 30, 2007, No. 05-30177). [1] Cf. US v. Ziegler, 456 F.3d 1138 (9th Cir. 2006).<br />
<br />
In Ziegler, an employee had accessed child pornography websites from his workplace. His employer noticed his activities, made copies of the hard drive, and gave the FBI the employee's computer. At his criminal trial, Ziegler filed a motion to suppress the evidence because he argued that the government violated his Fourth Amendment rights.<br />
<br />
The Ninth Circuit allowed the lower court to admit the child pornography as evidence. After reviewing relevant Supreme Court opinions on a reasonable expectation of privacy, the Court acknowledged that Ziegler had a reasonable expectation of privacy at his office and on his computer. That Court also found that his employer could consent to a government search of the computer and that, therefore, the search did not violate Ziegler's Fourth Amendment rights.<br />
<br />
===''State v. Reid''===<br />
The New Jersey Supreme Court has also issued an opinion on the privacy rights of computer users, holding in ''[[State v. Reid]]'' that computer users have a reasonable expectation of privacy concerning the personal information they give to their ISPs.<ref>{{cite web|url=http://lawlibrary.rutgers.edu/decisions/supreme/a-105-06.doc.html |title=a-105-06.doc.html |publisher=Lawlibrary.rutgers.edu |date= |accessdate=September 13, 2010}}</ref><ref>[http://lawlibrary.rutgers.edu/decisions/supreme/a-105-06.doc.html State v. Reid'', 194 N.J. 386, 954 A.2d 503 (N.J. 2008)]</ref><br />
<br />
In that case, Shirley Reid was indicted for computer theft for changing her employer's password and shipping address on its online account with a supplier. The police discovered her identity after serving the ISP, Comcast, with a municipal subpoena not tied to any judicial proceeding.<ref>''Id.'' at 393.</ref><br />
<br />
The lower court suppressed the information from Comcast that linked Reid with the crime on grounds that the disclosure violated Reid's constitutional right to be protected from unreasonable search and seizure.<ref>''Id.'' at 393</ref> The appellate court affirmed, as did the New Jersey Supreme Court, which ruled that ISP subscriber records can only be disclosed to law enforcement upon the issuance of a grand jury subpoena.<ref>''Id.'' at 402.</ref> As a result, New Jersey offers greater privacy rights to computer users than most federal courts.<ref>''Id.'' at 3 96–97.</ref> This case also serves as an illustration of how case law on privacy regarding workplace computers is still evolving.<br />
<br />
===''Robbins v. Lower Merion School District''===<br />
In ''[[Robbins v. Lower Merion School District]]'' (U.S. Eastern District of Pennsylvania 2010), the federal trial court issued an [[injunction]] against the school district after plaintiffs charged two suburban Philadelphia high schools violated the privacy of students and others when they secretly spied on students by surreptitiously and remotely activating webcams embedded in school-issued laptops the students were using at home. The schools admitted to secretly snapping over 66,000 webshots and screenshots, including webcam shots of students in their bedrooms.<ref name="USATODAY">{{cite news|url=http://content.usatoday.com/communities/ondeadline/post/2010/02/school-district-accused-of-issuing-webcam-laptops-to-spy-on-students/1|author=Doug Stanglin|title=School district accused of spying on kids via laptop webcams|date=February 18, 2010|work=[[USA Today]]|accessdate=February 19, 2010}}</ref><ref name="autogenerated5">[http://lmsd.org/documents/news/100503_l3_report.pdf "Initial LANrev System Findings"], LMSD Redacted Forensic Analysis, L-3 Services – prepared for [[Ballard Spahr]] (LMSD's counsel), May 2010. Retrieved August 15, 2010.</ref><br />
<br />
==Teachers and MySpace==<br />
Teachers’ privacy on [[MySpace]] has created controversy across the world. They are forewarned by The Ohio News Association <ref>[http://blogs.sun.com/learningcurve/tags/myspace Learning Curve<!-- Bot generated title -->]</ref> that if they have a MySpace account, it should be deleted. Eschool News warns, “Teachers, watch what you post online.” <ref>[http://www.eschoolnews.com/news/top-news/related-top-news/?i=50557;_hbguid=49a1babb-b469-4a85-a273-292a0514d91d Related Top News – Teachers warned about MySpace profiles<!-- Bot generated title -->]</ref> The ONA also posted a memo advising teachers not to join these sites. Teachers can face consequences of license revocations, suspensions, and written reprimands.<br />
<br />
The ''Chronicle of Higher Education'' wrote an article on April 27, 2007, entitled "A MySpace Photo Costs a Student a Teaching Certificate" about Stacy Snyder.<ref>[http://chronicle.com/blogPost/A-MySpace-Photo-Costs-a/2994 Wired Campus: A MySpace Photo Costs a Student a Teaching Certificate – Chronicle.com<!-- Bot generated title -->]</ref> She was a student of [[Millersville University of Pennsylvania]] who was denied her teaching degree because of an unprofessional photo posted on MySpace, which involved her drinking with a pirate's hat on and a caption of “Drunken Pirate". As a substitute, she was given an English degree.<br />
<br />
==Internet privacy and Blizzard Entertainment==<br />
On July 6, 2010, Blizzard Entertainment announced that it would display the real names tied to user accounts in its game forums. On July 9, 2010, CEO and cofounder of Blizzard Mike Morhaime announced a reversal of the decision to force posters' real names to appear on Blizzard's forums. The reversal was made in response to subscriber feedback.<ref name = "blizzardNoRealNames">[http://forums.worldofwarcraft.com/thread.html?topicId=25968987278&sid=1 World of Warcraft forum post], Blizzard announces reversal of its decision to force real names to appear on its forums</ref><br />
<br />
==Internet privacy and Google Maps==<br />
In Spring 2007, [[Google]] improved their Google Maps to include what is known as "Street View". This feature gives the user a 3-D, street level view with real photos of streets, buildings, and landmarks. In order to offer such a service, Google had to send trucks with cameras mounted on them and drive through every single street snapping photos. These photos were eventually stitched together to achieve a near seamless photorealistic map. However, the photos that were snapped included people caught in various acts, some of which includes a man urinating on the street, nude people seen through their windows, and apparently, a man trying to break into someone's apartment, etc; although some images are up to interpretation. This prompted a public outburst and sometime after, Google offered a "report inappropriate image" feature to their website.<ref>S. James Snyder. (2007, June 12). Time Magazine online. "Google Maps: An Invasion of Privacy?" Retrieved from http://www.time.com/time/business/article/0,8599,1631957,00.html</ref><br />
<br />
==See also==<br />
* [[Anonymous web browsing]]<br />
* ''[[Robbins v. Lower Merion School District]]''<br />
* [[Freenet]]<br />
* [[Friend-to-friend]]<br />
* [[GNUnet]]<br />
* [[I2P| I2P – The Anonymous Network]]<br />
* [[Internet censorship]]<br />
* [[Internet vigilantism]]<br />
* [[Metadata Removal Tool]]<br />
* [[Privacy policy]]<br />
* ''[[State v. Reid]]''<br />
* [[Tor (anonymity network)]]<br />
* [[anonymizer]]<br />
*[[anonymous remailer]]<br />
*[[anonymous post]]<br />
<br />
==References==<br />
{{reflist|colwidth=30em}}<br />
<br />
==Further reading==<br />
* Lohr, Steve, [http://www.nytimes.com/2010/03/17/technology/17privacy.html?scp=1&sq=how%20privacy%20can%20vanish%20steve%20lohr&st=cse "How Privacy Can Vanish Online, a Bit at a Time"], ''The New York Times'', Wednesday, March 17, 2010<br />
* Gazaleh, Mark [http://cid-8b56ed9e88c6c995.office.live.com/view.aspx/Online%20Trust%20%5E0%20Privacy%20Statements/Online%20trust%20and%20perceived%20utility%20for%20consumers%20of%20web%20privacy%20statements.doc Online trust and perceived utility for consumers of web privacy statements – Overview] ''WBS'', June 2008<br />
* Federal Trade Commission, [http://www.ftc.gov/os/2010/12/101201privacyreport.pdf Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers], December 2010<br />
<br />
== External links==<br />
* [http://www.aafter.com AAfter Internet Privacy Search Engine]<br />
* [http://www.yauba.com Yauba Internet Privacy Search Engine]<br />
* [http://lawdex.com/docs/Bourke_v_Nissan.pdf Expectation of privacy for company email not deemed objectively reasonable – Bourke v. Nissan]<br />
* [http://www.nobodywillknow.com Internet Privacy as Pertains to Anonymous Online Purchasing]<br />
* [http://www.wordstream.com/articles/google-privacy-internet-privacy Internet Privacy Infographic: Google Privacy & Your Privacy on Facebook | WordStream]<br />
<br />
{{Privacy}}<br />
<br />
{{DEFAULTSORT:Internet Privacy}}<br />
[[Category:Internet privacy| ]]<br />
<br />
[[ar:خصوصية الإنترنت]]<br />
[[de:Anonymität im Internet]]<br />
[[es:Privacidad en Internet]]<br />
[[fr:Vie privée et informatique]]<br />
[[ko:인터넷 프라이버시]]<br />
[[hy:Համացանցային գաղտնիություն]]<br />
[[my:အင်တာနက် ကိုယ်ပိုင်အခွင့်အရေး]]</div>TeleComNasSprVenhttps://de.wikipedia.org/w/index.php?title=Hedgefonds&diff=86022907Hedgefonds2011-03-04T07:06:28Z<p>TeleComNasSprVen: Änderung 85877072 von Tobby100 wurde rückgängig gemacht.</p>
<hr />
<div>'''Hedgefonds''' ({{EnS|''hedge funds''}}, von {{EnS|''to hedge'' [{{IPA|hɛdʒ}}]}}, „absichern“; selten '''SAIV''' – ''sophisticated alternative investment vehicle'', engl. etwa für ''ausgefeiltes/anspruchsvolles alternatives Investitionsvehikel'') sind eine spezielle Art von [[Investmentfonds]], die durch eine [[Spekulation (Wirtschaft)|spekulative]] [[Anlagestrategie]] gekennzeichnet sind. Hedgefonds bieten die Chance auf sehr hohe [[Rendite]]n und tragen entsprechend ein hohes Risiko.<br />
<br />
Typisch für Hedgefonds ist der Einsatz von [[Derivat (Wirtschaft)|Derivaten]] und [[Leerverkauf|Leerverkäufen]]. Hierher rührt auch der irreführende Name, da diese Instrumente außer zur Spekulation auch zur Absicherung ([[Hedgegeschäft|Hedging]]) verwendet werden können. Außerdem versuchen Hedgefonds über [[Fremdfinanzierung]] eine höhere [[Eigenkapitalrendite]] zu erwirtschaften (Hebel- oder [[Leverage-Effekt]]).<br />
<br />
Die meisten Hedgefonds haben ihren Sitz an [[Offshore-Finanzplatz|Offshore-Finanzplätzen]]. Zum Jahresende 2006 hatten Hedgefonds weltweit ein Volumen von rund 1,6&nbsp;Billionen [[US-Dollar]]. Bekannte Hedgefonds sind die [[Quantum Funds]] des [[Investmentbanker]]s [[George Soros]] und der Fonds [[Long-Term Capital Management]], der 1998 zusammenbrach.<br />
<br />
== Ursprung ==<br />
{{Widerspruch|Artikel oder Abschnitt | [[Hedgefonds#Hedge-Fonds-Strategien]] | Disk=Diskussion:Hedgefonds#Alfred Winslow Jones - welche Strategie den nun?}}<br />
Der erste Hedge-Fonds wurde von [[Alfred Winslow Jones]] im Jahre 1949 gegründet. Jones verkaufte Aktien [[Leerverkauf|leer]], um sie später auf einem niedrigeren Kursniveau wieder zu erwerben. Mit dem Erlös des Leerverkaufs kaufte er andere Aktien in der Erwartung, dass diese Aktien im Kurs steigen. Damit erfand er gleichzeitig die erste [[Strategie (Wirtschaft)|Strategie]] für Hedge-Fonds ([[Hedge-Fonds-Strategien#Long/ Short Equity|Long-Short]]). Erfüllt sich die Erwartung, dass der Kurs der gekauften Aktien sich im Verhältnis besser (oder weniger negativ) entwickelt als der Kurs der leer verkauften Aktien, ergibt sich ein Gewinn unabhängig davon, ob der Gesamtmarkt, repräsentiert durch einen breiten Aktienmarktindex, steigt oder fällt. Damit wird auch ein wesentliches Motiv von Anlegern in Hedge-Fonds deutlich. Sie möchten einen hohen Ertrag unabhängig von dem immer wieder auftretenden ''Auf und Ab'' der Aktienmärkte erwirtschaften. Für die Long-Short-Strategie ist es notwendig, Aktien zu finden, die innerhalb eines bestimmten Zeithorizontes im Preis fallen und andere Aktien zu identifizieren, die in dieser Zeitspanne steigen werden. Der Hedge-Fonds-Manager muss also sowohl die Preisentwicklung der selektierten Aktien richtig einschätzen als auch einen günstigen Zeitpunkt für diese Transaktionen wählen. Entsprechend verwendet der Hedge-Fonds-Manager unter anderem neben der klassischen Unternehmensbewertung (Einschätzung der Über-/Unterbewertung der Aktien) auch quantitativ-mathematische Methoden und die technische Analyse.<br />
<br />
Klassische Hedge-Fonds waren nie Publikumsfonds, wie der Begriff in Deutschland entsprechend dem [[Investmentgesetz]] verstanden wird; auch heute noch werden sie vorrangig für [[institutionelle Anleger]] aufgelegt.<br />
<br />
== Hedge-Fonds-Markt ==<br />
<br />
=== Entwicklungen ===<br />
Der Sektor der Hedge-Fonds gehörte in den letzten Jahren zu den am stärksten wachsenden [[Geldanlage|Anlageprodukten]]. Die Zahl der weltweit aktiven Hedge-Fonds kann allerdings nur geschätzt werden, ebenso wie das in ihnen veranlagte Vermögen. Ende 2006 waren rund 1,5&nbsp;[[Billion]]en&nbsp;USD in Hedge-Fonds angelegt. Das Anlagevolumen stieg damit um über ein Drittel im Vergleich zum Vorjahr. Die Anzahl der Fonds nahm von Ende 2005 auf Ende 2006 um etwa 5 % auf nunmehr knapp 9.000 zu.<ref>''[http://www.ifsl.org.uk/upload/CBS_Hedge_Funds_2007.pdf International Financial Services London]'' (PDF)</ref><br />
<br />
Im März 2009 teilte der Datendienstleister Hedge Fund Research (HFR) mit, dass durch die [[Finanzkrise ab 2007|Finanzkrise]] im Jahr 2008 insgesamt 1.471 Hedge-Fonds weltweit aufgelöst wurden und rund 15 Prozent des gesamten Hedge-Fonds-Markt sowie auch einige Dachfonds betroffen waren.<ref>Financial Times Deutschland: [http://www.ftd.de/unternehmen/finanzdienstleister/:Tumult-an-den-M%E4rkten-Hedge-Fonds-Sterben-beschleunigt-sich/489071.html Tumult an den Märkten: Hedge-Fonds-Sterben beschleunigt sich], vom 18. März 2009</ref> Namentlich bekannt sind hierbei: ''Drake Management'', eine Vermögensverwaltung ehemaliger Blackrock-Mitarbeiter und ''Peloton Partners'', ein Unternehmen von ehemaligen Goldman-Sachs-Bankern. Das verwaltete Vermögen soll nach Angaben von Morgan Stanley 2008 um 37&nbsp;Prozent auf 1,2&nbsp;[[Billion]]en&nbsp;USD gesunken sein.<br />
<br />
=== Rechtlicher Sitz der Fonds ===<br />
Registriert sind die meisten Fonds überwiegend an einem [[Offshore-Finanzplatz]]. Die Gründe dafür sind zum einen steuerlicher Natur, liegen andererseits aber auch in den geringeren Einschränkungen durch die jeweiligen [[Kapitalmarkt]]-Gesetzgebungen, was die in den Fonds erlaubten Finanzinstrumente betrifft. Im Januar 2006 waren 55 % der Hedgefonds ''offshore'' registriert. Mit deutlichem Abstand führen als Offshoreplatz der Hedge-Fonds-Branche die [[Kaimaninseln]] (63 % der Offshorefondsgelder), gefolgt von den [[Britische Jungferninseln|Britischen Jungferninseln]] (13 %) und den [[Bermuda]]s (11 %). In Europa sind es die britischen [[Kanalinseln]] oder [[Gibraltar]], aber auch in Bezug auf die [[Kapitalmarkt]]-Gesetzgebung freizügigere Staaten wie [[Luxemburg]], [[Irland]], [[Liechtenstein]] oder [[Monaco]], jedoch nehmen sie sich im Vergleich mit den oben genannten amerikanischen Offshoreplätzen mit zusammen etwa 10 % eher bescheiden aus. Der größte ''Onshore''-Platz sind wiederum die USA mit 48 % der Onshore-Fondsvermögen. Oft liegt der Sitz in oder nahe New York, etwa in [[Delaware]]. Für Fonds mit Fokus Europa ist der führende Onshoreplatz Irland mit 7 % der Onshorefonds.<br />
<br />
=== Fonds-Manager ===<br />
Der Erfolg eines Hedge-Fonds ist in hohem Maße abhängig vom Geschick des [[Fonds-Manager]]s und den von diesem verwendeten [[Finanzmathematik|finanzmathematischen]]/[[Ökonometrie|ökonometrischen]] Modellen, wie zum Beispiel dem [[Black-Scholes-Modell]]. Die Vorgehensweise des Fonds-Managers gleicht durch das hohe Maß an Risiko bzw. [[Spekulation (Wirtschaft)|Spekulation]] einer [[Wette]]. Die Aufnahme von Fremdkapital bis zu einem mehrfachen des Eigenkapitals ist üblich, um die Rendite noch mehr zu steigern (Leverage-Effekt). Von Fonds-Managern wird erwartet, dass sie sich an dem Fonds beteiligen und gegebenenfalls persönlich haften. Im Gegenzug werden die Manager sehr gut bezahlt, es wird oft von der 2/20 Regel gesprochen. Hierunter werden 2 % Verwaltungsgebühr (vom Fondsvolumen) und 20 % Gewinnbeteiligung verstanden.<ref name="Wall Street Journal">''Wall Street Journal''. Juli 2005, diverse</ref><br />
<br />
Durch die Vielfalt an [[Hedge-Fonds-Strategie]]n sind deutlich erhöhte Gewinnchancen, aber auch Verlustrisiken gegeben. Diese Strategien bestimmen die Taktik des Fonds-Managers, womit er auf zukünftig steigende oder fallende [[Börsenkurs]]e spekuliert. Dabei hat der Fonds-Manager ein Höchstmaß an Freiheiten bezüglich der Auswahl der [[Investition]]en.<br />
<br />
=== Physischer Sitz der Fondsmanager ===<br />
Die USA sind für Hedgefondsmanager weiterhin der bei weitem führende Anlageplatz: Gemessen an den verwalteten Vermögen verwalten US-Manager 63 % des Marktvolumens. Im Jahr 2002 waren es allerdings noch 83 %. Der größte Umschlagplatz für Hedgefonds ist New York, wo nach Berechnungen von ''International Financial Services'' im Jahr 2006 36 % der weltweiten Anlagen verwaltet wurden. 2002 waren es noch 45 %. Der Rückgang beruht hauptsächlich auf der Verbesserung der Position Londons, das nun klare Nummer&nbsp;2 in der Hedgefondsbranche ist. Der Anteil Londoner Hedgefonds-Manager erhöhte sich nämlich im gleichen Zeitraum von 10 % auf 21 % deutlich. Europa insgesamt kam auf 24 %. Der Anteil Asiens stieg von 5 % auf&nbsp;8 %.<br />
<br />
== Hedge-Fonds-Strategien ==<br />
{{Widerspruch|Artikel oder Abschnitt | [[Hedgefonds#Ursprung]] | Disk=Diskussion:Hedgefonds#Alfred Winslow Jones - welche Strategie den nun?}}<br />
''Hauptartikel: [[Hedge-Fonds-Strategien]]''<br />
<br />
Hedge-Fonds sollten in der Theorie das Vermögen bei [[Risiko|Risiken]] durch ''[[Hedgegeschäft|Hedging]]'' (engl.: to hedge = einhegen, umzäunen) absichern, haben aber in ihrer heutigen Form wenig mit Absicherung zu tun.<br />
<br />
Die erste Hedge-Fonds-Strategie (marktneutrale Strategie) stammt von [[Alfred Winslow Jones]] (1900–1989) und sollte ein Instrument zum Schutz vor Widrigkeiten bei Zins- und Währungsänderungsrisiken sein. Jones Idee war es, nicht nur in Boomphasen auf Zins- und Währungsmärkten zu profitieren, sondern auch bei fallenden Zins- und Wechselkursen Gewinne zu erzielen. Damit begründete Jones eine der ersten Hedge-Fonds-Strategien, nämlich die, Fremdkapital (Leverage-Effekt, [[Margin Trading]]) und Leerverkauf (Short Selling) für den Kauf und Verkauf von Währungen aufzunehmen. Er verkaufte geliehene Aktien und spekulierte, diese vor Ende der Leihfrist billiger zurückkaufen zu können.<br />
<br />
Neue Strategien (Global-Macro-Strategie) wurden von [[George Soros]] und [[Jim Rogers]] mit ihren [[Quantum Funds|Quantum-Funds]]-Hedge-Fonds entwickelt. Durch neue Finanzinstrumente spekulierten sie in neuen Bereichen, wie dem [[Devisenmarkt]], Zinsen, Rohstoff- und Aktienmärkten.<br />
<br />
Seit der ersten Hedge-Fonds-Strategie von Jones sind Hedge-Fonds-Strategien ständig weiterentwickelt worden und haben markant zugenommen. Hedge-Fonds gehören zu den „Alternative Investments“ als alternative Anlageform. Hedge-Fonds nutzen die Vielzahl an Handelsgegenständen und Handelsstrategien. Hedge-Fonds können, anders als [[Investmentfonds]], in hohem Maße in [[Derivat (Wirtschaft)|Derivate]] investieren. Hedge-Fonds bedienen sich unter anderem in hohem Maße Kombinationen aus Kauf- (Long-Position) und Verkaufsabsichten ([[Short Selling]]) sowie Fremdkapitalaufnahme. Durch die Fremdkapitalaufnahme entsteht ein „Hebeleffekt“ ([[Leverage-Effekt]]). Fremdkapital wird aufgenommen, weil erwartet wird, dass die [[Rendite]] einer Investition gesteigert werden kann. Das Funktionieren des Leverage-Effektes basiert auf einem niedrigeren Zinssatz des Fremdkapitals als der Gewinn der zu erwartenden Rendite. Der Leverage-Effekt kann, außer durch Hinterlegen eines Bruchteils des [[Exposure]] bei börsengehandelten Termingeschäften ([[Future]]s), bei anderen Hedge-Fonds-Strategien nur durch die Aufnahme von Fremdkapital aufgebaut werden. Einem geringen Fremdkapitaleinsatz steht ein hohes Volumen des gehandelten [[Basiswert]]es (Underlying) gegenüber. Ein hoher Einsatz von Fremdkapital mit hohem Leverage-Effekt ist bei Market Neutral Arbitrage und [[Hedge-Fonds-Strategien#Global Macro Strategies|Global-Macro-Strategien]] üblich.<br />
<br />
In Deutschland wird im Hinblick auf „Investoren-Aktivismus“ berichtet, dass im Zeitraum von bis zu zwei Jahren nach Anteilserwerb in der Mehrzahl der Fälle teils erhebliche Veränderungen im Hinblick auf [[Corporate Governance]], strategische Ausrichtung, M&A-Aktivitäten und Ausschüttungsverhalten bei den Zielunternehmen eintreten.<ref>Oliver Böhm, Michael Grote: ''Hedgefonds-Aktivismus in Deutschland.'' In: BAI Newsletter 04/09 ([http://www.bvai.de/fileadmin/templates/bai/PDFs/BAI_Newsletter_IV_2009.pdf PDF]) S. 14–17.</ref><br />
<br />
Hedge-Fonds sind heute eigenständige Anlageinstrumente mit sehr unterschiedlichen [[Strategie (Wirtschaft)|Strategien]] und Risikoprofilen. Allen gemeinsam ist der Anspruch, sowohl in steigenden als auch in fallenden Märkten Gewinne zu erzielen. Hedge-Fonds-Manager setzen dabei auf eine Reihe von Anlageformen und Techniken, darunter Finanz-Derivate, Leerverkauf von Wertpapieren oder [[Arbitrage]]-Techniken.<br />
<br />
Als [[Offshore-Finanzplatz|Offshore]]-Projekte sind Hedgefonds weniger reguliert und deren Investitionsentscheidungen minder beobachtbar, was dazu verleiten kann, dass Fonds-Manager die angegebenen [[Rentabilität]]en manipulieren. Bollen und Pool (2009) haben diese Hypothese statistisch untersucht und gezeigt, dass die Fonds-Manager Verluste insbesondere im Rahmen der Bewertung von illiquiden Anlagen reduzieren können, selbst wenn die Gewinne nur sehr schwach sind. Das stimmt mit der von Kahnemann und Tversky behaupteten stärkeren [[Risikoaversion]] von Anlegern überein.<ref>Michel Verlaine: ''Les rentabilités sont-elles manipulés?'' d’Land. Beilage ''Placements''. 20. November 2009. S. 20. / N. Bollen, V. Pool: ''Do Hedge Funds misreport returns? Evidence from the pooled distribution.'' The Journal of Finance, Bd. 64, Nr. 5, 2009. / D. Kahneman, A. Tversky: ''Advances in Prospect Theory. Cumulative Representation of Uncertainty.'' Journal of Risk and Uncertainty, 1992, S. 297-323.</ref><br />
<br />
== Hedge-Fonds in Deutschland ==<br />
[[Datei:HedgefondsInGermany1999-2005.png|350px|rechts|Anzahl der in Deutschland angebotenen Hedge-Fonds-Zertifikate]]<br />
<br />
In Deutschland waren bis zum Jahr 2004 Hedge-Fonds generell nicht zum [[öffentlich]]en Handel zugelassen. Eine Lockerung erfolgte mit dem [[Investment-Modernisierungsgesetz]], das am 1.&nbsp;Januar 2004 in Kraft trat und jetzt den Vertrieb von „[[Investmentgesetz (Deutschland)#Hedgefonds|Sondervermögen mit zusätzlichen Risiken]]“ unter bestimmten Auflagen zulässt. Diese haben nicht viel mit den großen [[international]]en Hedge-Fonds gemeinsam; sie gehören zur Gruppe der [[Investmentfonds]] und sind Anlageinstrumente. Sie dürfen die Instrumente des [[Leerverkauf]]es (short selling) und des Einsatzes von [[Fremdkapital]] ([[Leverage-Effekt]]) nutzen. Anteile an solchen Fonds dürfen in Deutschland nicht öffentlich vertrieben werden, sondern nur im Rahmen von sogenanntem [[Private Placement]], etwa für Einlagen durch [[institutionelle Anleger]].<br />
<br />
Dagegen ist die Einlage in [[Dachhedgefonds]] für Privatanleger seit 2004 erlaubt. Der Anbieter eines Dachhedgefonds muss auf seinen Verkaufsprospekten Warnhinweise ähnlich denen auf Zigarettenschachteln anbringen: „''Der Bundesminister der Finanzen warnt: Bei diesem Investmentfonds müssen Anleger bereit und in der Lage sein, Verluste des eingesetzten Kapitals bis hin zum Totalverlust hinzunehmen!''“ Die Investmentbranche hat bisher nur in sehr geringem Umfang von der Möglichkeit Gebrauch gemacht, in Deutschland Hedge-Fonds aufzulegen. Allerdings ist der Markt für [[Zertifikat (Wirtschaft)|Zertifikate]] auf ausländische Hedge-Fonds stark angewachsen (siehe Grafik).<br />
<br />
Deutsche Hedge-Fonds unterliegen der Aufsicht der [[Bundesanstalt für Finanzdienstleistungsaufsicht]] (BaFin), ihr Fremdkapital-Einsatz ist begrenzt. Es handelt sich somit eher um Investmentfonds mit größeren Freiheiten als um Hedge-Fonds im ursprünglichen Sinne.<br />
<br />
== Hedge-Fonds in anderen Ländern ==<br />
Angelsächsische Hedge-Fonds sind Unternehmen und entsprechen in mancher Hinsicht eher einem [[Geschlossener Fonds|geschlossenem Fonds]]. Investoren erwerben Anteile an diesen Unternehmen. Hier entspricht die Rechtsform meist der einer deutschen [[Kommanditgesellschaft|KG]] (limited partnerships, LP, oder limited liability partnership, LLP) oder einer [[GmbH]] (limited liability company). Es gibt in der LLP einen oder mehrere Hedge-Fonds-Manager, die mit ihrem privaten und geschäftlichen Vermögen haften, und Investoren, die Anteile an diesen Unternehmen kaufen. Oft ist der offizielle Sitz eines solchen Hedge-Fonds eine Steueroase (75 % auf den [[Kaimaninseln]]<ref>Dailyii.com, ''[http://www.dailyii.com/article.asp?ArticleID=1039798&LS=EMS73445 They Cayman, They Saw, They Conquered]'', Mai 2006</ref>), und der Manager sitzt in einem Finanzzentrum (etwa London, New York).<br />
<br />
== Regulierungsvorhaben der EU zu Hedge-Fonds ==<br />
<br />
Im Oktober 2010 einigen sich die [[EU]] Finanzminister auf strengere Regulierungsvorschriften für Hedgefonds und private Beteiligungsgesellschaften. <ref> [http://www.handelsblatt.com/politik/international/eu-einigung-strengere-regulierung-fuer-hedge-fonds;2675916 Handelsblatt:Strengere Regulierung für Hedge-Fonds] </ref><br />
<br />
== Regulierungsvorhaben der G8- und G-20-Staaten zu Hedge-Fonds ==<br />
Auf dem Treffen der [[Gruppe der Acht#Entwicklung von der G6 zur G8|G7-Finanzminister]] in [[Essen]] im Februar 2007 einigte man sich auf eine gemeinsame Erklärung, nach der man Hedge-Fonds in Zukunft genauer kontrollieren will. Ziel der G-7 ist es, mögliche Risiken aus den Hedgefonds-Aktivitäten auszumachen und so weltweite Finanzkrisen und Dominoeffekte bei Fondspleiten zu verhindern. Im Gespräch sind laut Agenturangaben auch ein freiwilliger Verhaltenskodex und eine Art [[Gütesiegel]] für die Fonds durch unabhängige [[Rating-Agentur]]en.<br />
<br />
Auf dem [[G8-Gipfel in Heiligendamm 2007|G8-Gipfel]] (G7-Länder und Russland) im Juni 2007 in [[Heiligendamm]] wurden allerdings keine Vorschläge hinsichtlich einer angestrebten Selbstverpflichtung der Branche gemacht. Der Widerstand hiergegen kam aus den USA und Großbritannien, den Ländern, von denen aus die Mehrzahl der Fonds agiert. Die teilnehmenden Staats- und Regierungschefs ermahnten die Hedge-Fonds-Industrie jedoch, die Verhaltensregeln für Manager selbst zu verbessern und bekräftigten gleichzeitig noch einmal die bereits von den Finanzministern angesprochenen Themenkomplexe.<br />
<br />
Auf dem Treffen der Spitzenvertreter der G-20-Staaten (zuzüglich der Niederlande und Spanien) in Washington am 15. November 2008 wurde eine stärkere Reglementierung von spekulativen Hedgefonds beschlossen.<br />
<br />
Am 14. März 2009 einigten sich die Finanzminister der G-20-Staaten in [[Horsham]] darauf, eine Registrierungspflicht für die Fonds einzuführen und geplant ist, die 100 weltweit größten Hedgefonds zu kontrollieren. Die Investoren sollen hierbei der US-Aufsicht Security and Exchange Commission (SEC) oder der britischen Financial Services Authority (FSA) Einblick in ihre Bilanzen gewähren.<br />
<br />
=== Regulierung in den USA ===<br />
Die US-amerikanische Börsenaufsicht [[United States Securities and Exchange Commission|SEC]] reguliert Hedge-Fonds in den USA. Hierzu hat sie Regeln für die Aufnahme von Fremdkapital und das [[Short Selling]] erlassen. Aufgrund der Regulierungen lassen sich viele Hedge-Fonds nicht registrieren, wodurch sie nicht für den öffentlichen Vertrieb zugelassen sind. Der Zugang ist jedoch für „qualifizierte“ Investoren (mit mehr als 200.000&nbsp;USD Jahreseinkommen oder mehr als 5&nbsp;Millionen&nbsp;USD Vermögen) möglich. Jeder Hedge-Fonds, der als „Limited Partnership LP“ firmiert, ist auf 499 „Partner“ beschränkt. Die SEC hat im Laufe des Jahres 2004 Regeln für Hedge-Fonds<ref>[http://sec.gov/rules/final/ia-2333.htm Registrierungsregeln der SEC für Hedge-Fonds in den USA]</ref> erlassen, die mehr als 25&nbsp;Millionen&nbsp;USD verwalten und offen für neue Investoren sind. Anwendung finden die Regeln seit 1. Februar 2006 (die Regeln sind unter Weblinks/Behörden verlinkt).<br />
<br />
Nachdem bislang [[Publikationspflicht]]en fehlen, suchen unter dem Druck der Konkurrenz amerikanische Hedge-Fonds auf andere Weise Vertrauen zu bilden, bspw. mit einer Zertifizierung nach [[ISO 9000]], wie es der GAM Multi-Manager Hedge-Fonds getan hat.<br />
<br />
Am 13. November 2008 wurden Manager der fünf größten Hedgefonds vor einen Kongressausschuss zitiert; dieser soll herausfinden, ob Hedgefonds eine Gefahr für das Finanzsystem darstellen.<ref> [http://www.nytimes.com/reuters/business/business-us-hedgefunds-congress.html?_r=1&oref=slogin ''Top Hedge Fund Managers Face Lawmakers'' (by Reuters)]. In: [[New York Times]], 13. November 2008</ref> [[George Soros]], [[Philip Falcone]], [[John Paulson]], [[James Simons]] und [[Kenneth Griffin]] wurden als Zeugen für die Hedgefonds-Industrie gehört. Sie haben einer stärkeren Kontrolle zugestimmt sowie der Schließung unverhältnismäßiger Steuerschlupflöcher.<ref>Lindsay Renick Mayer:[http://www.opensecrets.org/news/2008/11/hedge-fund-managers-plead-thei.html ''Hedge Fund Managers Plead Their Case on Capitol Hill''] auf opensecrets.org, 14. November 2008</ref><br />
<br />
=== Regulierung im Vereinigten Königreich ===<br />
In Großbritannien unterliegen die Manager der Hedge-Fonds der Autorität der [[Financial Services Authority]], dem britischen Gegenstück zur [[Bundesanstalt für Finanzdienstleistungsaufsicht|BaFin]].<br />
<br />
=== Regulierung in Liechtenstein ===<br />
Im [[Liechtenstein]] erfolgt die Regulierung von Hedge-Fonds durch die [[FMA Finanzmarktaufsicht Liechtenstein]].<br />
<br />
== Die größten Hedge- und Dach-Fonds ==<br />
=== Hedgefonds Juni 2008<ref>[http://www.handelsblatt.com/finanzen/boerse-inside/die-zehn-groessten-hedgefonds;2075150 handelsblatt.com]</ref> ===<br />
# [[JPMorgan Asset Management]] mit 48,1 Mrd. USD<br />
# [[Bridgewater Associates]] mit 43,5 Mrd. USD<br />
# [[D.E. Shaw Group]] mit 37,1 Mrd. USD<br />
# [[Paulson & Co.]] mit 34,9 Mrd. USD<br />
# [[Och-Ziff Capital Management]] mit 33,3 Mrd. USD<br />
# [[Farallon Capital Management]] mit 33,0 Mrd. USD<br />
# [[Renaissance Technologies]] mit 29,0 Mrd. USD<br />
# [[Goldman Sachs Asset Management]] mit 26,9 Mrd. USD<br />
# [[Harbinger Capital Partners]] mit 24,0 Mrd. USD<br />
# [[Barclays Global Investors]] mit 19,0 Mrd. USD<br />
<br />
=== Dachfonds 2005 ===<br />
Die größten Dachfonds (engl. ''global fund of hedge funds'' oder kurz ''fund of funds'') waren 2005:<br />
# [[UBS Global Asset Management]], 45 Mrd. USD<br />
# [[Man Group|Man Investments]], 35,6 Mrd. USD<br />
# [[Oaktree Capital Management]], 35,6 Mrd. USD<br />
# [[Union Bancaire Privée]], 20,8 Mrd. USD<br />
# [[HSBC Private Bank]], 20,2 Mrd. USD<br />
<br />
== Siehe auch ==<br />
* [[Hedgefonds-Zertifikat]]<br />
* [[Capital Asset Pricing Model]]<br />
* [[Diversifikation (Wirtschaft)|Diversifikation]]<br />
* [[Portfoliotheorie]]: untersucht das Investitionsverhalten an Kapitalmärkten<br />
* Verkauf [[notleidender Kredit]]e<br />
* [[Quantitatives Management]]<br />
* [[Bernard L. Madoff]]<br />
<br />
== Einzelnachweise ==<br />
<references /><br />
<br />
== Literatur ==<br />
<br />
* Bernd Berg: ''Finanzkrisen und Hedgefonds - Finanzmagier oder Krisenauslöser?'' , Gabler, Wiesbaden 2009, ISBN 3-8349-1551-3<br />
* Bernd Berg: ''Die Welt der Hedgefonds – Chancen und Risiken der umstrittenen Anlageklasse.'' VDM, Saarbrücken 2006, ISBN 3-86550-696-8<br />
* Michael Busack, Dieter G. Kaiser: ''Handbuch Alternative Investments Band 1.'' Gabler, Wiesbaden 2006, ISBN 3-8349-0151-2<br />
* Michael Busack, Dieter G. Kaiser: ''Handbuch Alternative Investments Band 2.'' Gabler, Wiesbaden 2006, ISBN 3-8349-0298-5<br />
* Ursula Fano-Leszczynski: ''Hedgefonds für Einsteiger.'' Springer, Berlin u.&nbsp;a. 2005, ISBN 3-540-22695-8<br />
* Claus Hilpold, Dieter Kaiser: ''Alternative Investment-Strategien. Einblick in die Anlagetechniken der Hedgefonds-Manager.'' Wiley-VCH, Weinheim 2005, ISBN 3-527-50105-3<br />
* Alexander M. Ineichen: ''Absolute Returns.'' Wiley, New Jersey 2003, ISBN 0-471-25120-8<br />
* Dieter Kaiser: ''Hedgefonds.'' Gabler, Wiesbaden 2004, ISBN 3-409-15013-7<br />
* Werner G. Seifert, Hans Joachim Voth: ''Invasion der Heuschrecken. Intrigen – Machtkämpfe – Marktmanipulation.'' Econ, Berlin 2006, ISBN 978-3-430-18323-9<br />
* Markus Sievers: ''Besser investieren mit Hedgefonds. Basiswissen für Privatanleger.'' Finanzbuch, München 2004, ISBN 3-89879-093-2<br />
* Markus Sievers: ''Anlegen in Hedge-Fonds. Basiswissen für Privatanleger.'' Finanzbuch, München 2007, ISBN 978-3-89879-353-7<br />
* Thomas Weber: ''Das Einmaleins der Hedge Funds.'' Campus, Frankfurt am Main 2004, ISBN 3-593-37443-9<br />
<br />
== Weblinks ==<br />
<br />
=== Artikel ===<br />
* Stefan Ruenzi: [http://www.wiso.uni-koeln.de/ASPsamp/finanzierung/forschung/veroeffentlichungen/ruenzi_Hedgefonds.pdf Stichwort ''Hedgefonds''] (PDF, 121kB).<br />
* Investment intern: [http://www.varengold.de/presse_vg/investment_intern_20070711.pdf ''Hedge-Fonds – Performance versus Regulierung''] (PDF)<br />
* Grafik und Tabellen: [http://www.bpb.de/wissen/JD2EAK Hedge-Fonds: Anzahl, regionale Verteilung und nach Investorentyp], aus: [http://www.bpb.de/wissen/Y6I2DP Zahlen und Fakten: Globalisierung], Bundeszentrale für politische Bildung/bpb<br />
* [http://www.absolut-report.de/AR_FreeDownload/Absolut_Report_Nr_15_InvModGesetz_HedgeFonds-Puetz-Fock-Sonntag.pdf ''Hedge Fonds in Deutschland nach dem Investmentmodernisierungsgesetz.''] (PDF)<br />
* [http://www.absolut-report.de/AR_FreeDownload/Absolut_Report_Nr_15_InvStGes_HedgeFonds-Schultz.pdf ''Hedge Fonds in Deutschland nach dem Investmentsteuergesetz.''] (pdf).<br />
* [http://www.fpmi.de/de/themen/hedge_fonds.php5 ''Finanzplatz München Initiative fordert internationales Regelwerk für Hedge-Fonds.'']<br />
* Christopher Bahn: [http://skylla.wzb.eu/pdf/2006/iii06-202.pdf ''Fluch oder Segen? Hedge-Fonds in Deutschland. Ein Beitrag zur Versachlichung der Debatte''] (PDF, 179kB). Diskussionspapier, SP III 2006-202, Berlin: [[Wissenschaftszentrum Berlin für Sozialforschung]].<br />
* Alexander H. Engelhardt: [http://cira.thinkabit.net/downloads/File/MAR_200804_Engelhardt_Cira_sicher.pdf ''Activist Investing aus Unternehmenssicht.''] MAR 2008, S. 194ff. (PDF, 441kB).<br />
* Stefan Frank: [http://www.heise.de/tp/r4/artikel/29/29028/1.html ''Hedgefonds haben ausgehebelt'']. Auf: [[telepolis]], 30. Oktober 2008.<br />
<br />
=== Lobbyorganisationen ===<br />
* [http://www.bvai.de/ BAI – Bundesverband Alternative Investments e.&nbsp;V.]<br />
* [http://www.mfainfo.org/ Managed Funds Association]<br />
* [http://www.vereinigungai.at/ Vereinigung Alternativer Investments Austria]<br />
<br />
{{Rechtshinweis}}<br />
<br />
[[Kategorie:Investmentfonds]]<br />
<br />
[[ar:محفظة وقائية]]<br />
[[bg:Хедж фонд]]<br />
[[cs:Hedge fond]]<br />
[[da:Hedgefond]]<br />
[[en:Hedge fund]]<br />
[[eo:Hedgefonds]]<br />
[[es:Fondo de inversión libre]]<br />
[[et:Hedge-fond]]<br />
[[fi:Hedgerahasto]]<br />
[[fr:Gestion alternative]]<br />
[[he:קרן גידור]]<br />
[[hu:Hedge fund]]<br />
[[is:Vogunarsjóður]]<br />
[[it:Fondi speculativi]]<br />
[[ja:ヘッジファンド]]<br />
[[ko:헤지 펀드]]<br />
[[lt:Rizikos draudimo fondas]]<br />
[[nds:Hedgefonds]]<br />
[[nl:Hedgefonds]]<br />
[[no:Hedgefond]]<br />
[[pl:Fundusz hedgingowy]]<br />
[[pt:Fundo de cobertura]]<br />
[[ro:Fond hedge]]<br />
[[ru:Хедж-фонд]]<br />
[[sr:Хеџ фонд]]<br />
[[sv:Hedgefond]]<br />
[[ta:ஹெட்ஜ் நிதி]]<br />
[[uk:Фонд хеджування]]<br />
[[vi:Quỹ tự bảo hiểm rủi ro]]<br />
[[zh:对冲基金]]</div>TeleComNasSprVenhttps://de.wikipedia.org/w/index.php?title=Glock_(Waffenhersteller)&diff=83583389Glock (Waffenhersteller)2011-01-07T15:25:38Z<p>TeleComNasSprVen: Änderung 82559009 von 77.83.30.58 wurde rückgängig gemacht.</p>
<hr />
<div>{{Infobox_Unternehmen<br />
| Name = Glock GmbH<br />
| Logo = [[Datei:Glock Logo.svg|150px]]<br />
| Unternehmensform = GmbH<br />
| Gründungsdatum = 1963<br />
| Sitz = Deutsch-Wagram<br />
| Leitung = Gaston Glock <br />
| Mitarbeiterzahl = <br />
| Umsatz = <br />
| Branche = Waffen<br />
| Produkte = Schusswaffen<br />
| Homepage = [http://www.glock.com/ www.glock.com]<br />
}}<br />
[[Datei:Glock_logo.jpg|miniatur|Das Firmenlogo findet sich auf jeder Schusswaffe]]<br />
'''Glock Ges.m.b.H.''' (eigene Schreibweise '''''GLOCK''''') ist eine in [[Österreich]] beheimatete Waffenproduktionsfirma, bekannt für ihre [[Feldmesser (Messer)|Feldmesser]] und [[Pistole]]n. Die Firma wurde [[1963]] in [[Deutsch-Wagram]] von [[Gaston Glock]] gegründet und hat dort noch heute ihren Sitz.<br />
<br />
== Produkte ==<br />
:''Hauptartikel: [[Glock-Pistole]]''<br />
<br />
Die erste [[Schusswaffe]] von Glock ist die [[Glock 17]], welche Anfang der 1980er-Jahre unter der Bezeichnung P80 für das [[Bundesheer|österreichische Bundesheer]] entwickelt wurde. Heute gibt es gut 21 verschiedene [[Glock-Pistole]]n, deren Bauart stets gleich ist, sich aber im Kaliber ([[9 x 19 mm|9&nbsp;mm]] bis [[.45&nbsp;ACP]]) sowie anderen Details (Länge 160–225&nbsp;mm, [[Magazin (Waffentechnik)#Stangenmagazin|Magazin]] für 6–33 Schuss) unterscheiden.<br />
<br />
Die Waffen gehörten zu den Ersten, die mit einem Kunststoffgriffstück entwickelt worden sind, das nur wenige Stahleinlagen besitzt. Diese Tatsache brachte den Waffen anfangs den Namen „Plastikpistole“ ein. Es handelt sich um [[Selbstladepistole]]n mit einem „Safe Action“-Abzugssystem, welches das Fehlen einer außenliegenden Sicherung durch drei integrierte Sicherungen kompensiert. Sie gelten als besonders zuverlässig und einfach zu handhaben.<br />
<br />
== Verbreitung ==<br />
Die Glock-Pistolen sind die Standardfaustfeuerwaffen bei der [[Norwegische Streitkräfte|norwegischen Armee]] und beim [[Bundesheer|österreichischen Bundesheer]], der London Police, der [[Bundespolizei (Österreich)|österreichischen Polizei]], verschiedenen Spezialeinheiten der [[Bundespolizei (Deutschland)|deutschen Bundespolizei]] wie der [[Grenzschutzgruppe 9|GSG 9]], und rund 2/3 der US-amerikanischen Polizeikräfte. Außerdem werden zur Ausstattung der neuen irakischen Sicherheitsbehörden Glock-Pistolen verwendet.<br />
<br />
Glock konnte laut NY-Times den Umsatz in den USA im Jahr 2009 um 71 Prozent steigern und somit seine Rolle als Marktführer bei Pistolen im Sicherheitsbereich ausbauen.<ref>NY Times Artikel 19. November 2009</ref><br />
<br />
== Weblinks ==<br />
{{Commons|Glock}}<br />
* [http://www.glock.com/deutsch/ Glock Webseite (DE)]<br />
<br />
== Einzelnachweise ==<br />
<references /><br />
<br />
<br />
[[Kategorie:Glock| ]]<br />
[[Kategorie:Unternehmen (Niederösterreich)]]<br />
[[Kategorie:Rüstungshersteller (Österreich)]]<br />
[[Kategorie:Waffenhersteller]]<br />
<br />
[[cs:GLOCK]]<br />
[[es:Glock]]<br />
[[fr:Glock]]<br />
[[he:גלוק (חברה)]]<br />
[[is:Glock]]<br />
[[it:Glock]]<br />
[[ja:グロック]]<br />
[[ko:글록]]<br />
[[lb:GLOCK]]<br />
[[lt:Glock]]<br />
[[ms:Glock]]<br />
[[nl:Glock]]<br />
[[no:Glock]]<br />
[[pt:Glock]]<br />
[[ru:Glock]]<br />
[[sk:Glock]]<br />
[[th:กล็อค]]<br />
[[tr:Glock]]<br />
[[vi:Glock]]<br />
[[zh:格洛克]]</div>TeleComNasSprVenhttps://de.wikipedia.org/w/index.php?title=Gorran&diff=99829124Gorran2010-10-25T10:33:25Z<p>TeleComNasSprVen: Removing backlinks to Chia N Mustafa because "Wikipedia:Articles for deletion/Chia N Mustafa"; using TW</p>
<hr />
<div>{{Infobox_Political_Party<br />
|country = Iraq <br />
|party_name = Movement for Change <br> Bizutnaway Gorran <br> ڕهوتی گۆڕان<br />
|colorcode =<br />
|party_logo = [[Image:Goran11.JPG|150px]]<br />
|leader = [[Nawshirwan Mustafa]]<br />
|foundation = 2006<br />
|ideology = [[Kurdish Nationalism]], [[Federalism]]<br />
|international =<br />
|colours = Blue<br />
|headquarters =<br />
|website = <br />
}}<br />
The '''Movement for Change''' ({{lang-ku|Rewtî Gorran}}, {{lang-ku-2|رهوتی گۆڕان}}) also known as '''Change List''' ({{lang-ku|Lîstî Gorran}}) or '''Gorran''' is an [[Iraqi Kurdish]] political movement under the leadership of [[Nawshirwan Mustafa]], founded in 2006 as the ''de facto'' opposition to [[Jalal Talabani]] and [[Masoud Barzani]] of the [[Patriotic Union of Kurdistan|PUK]] and [[Kurdistan Democratic Party of Iraq|KDP]] respectively, in the [[Iraqi Kurdistan legislative election, 2009|Iraqi Kurdistan election of 2009]]. Notwithstanding, many Gorran members still retain their PUK membership.<ref name=NYT>[http://www.nytimes.com/2009/07/27/world/middleeast/27kurds.html Gains Seen for Kurdish Challengers] [[New York Times]] Retrieved 27 July 2009.</ref> Gorran is not officially a political party, however, analysts expect it to threaten the domination of the two existing major Kurdish political parties in Iraq.<ref>{{cite news|url=http:Clashes in Iraq's north underscore fierce political rivalry among Kurds//www.nytimes.com/2010/03/07/world/middleeast/07kurds.html?ref=global-home|title=Bloc Takes On Entrenched Kurdish Parties in Iraq|author=Sam Dagher|date=March 6, 2010|publisher==[[New York Times]]}}</ref><br />
<br />
The Movement for Change broadly speaking consists of disenchanted (former) PUK members, [[Peshmerga]] and leftists/academics<ref name=NYT/>, including:<br />
* [[Nawshirwan Mustafa]], Chairman and head of the leadership council<ref>[http://www.washingtonpost.com/wp-dyn/content/article/2010/03/04/AR2010030405153.html], "Clashes in Iraq's north underscore fierce political rivalry among Kurds", 5 March 2010 </ref>.<br />
* [[Mohammad Tawfiq Rahim]], Leadership council. Spokesmen<ref>[http://edition.cnn.com/2010/WORLD/meast/03/05/iraq.elections.kurds/index.html], "CNN, Iraq's Kurds go the polls amid carnival atmosphere ", 5 March 2010 </ref>..<br />
* [[Dana Ahmed Majid]], Leadership council. Head of Internal and External Affairs<ref>[http://www.thenational.ae/apps/pbcs.dll/article?AID=/20100305/FOREIGN/703049830/1011], "Kurds may be the kingmakers again", 4 March 2010 </ref>.<br />
* [[Qadir Hagi Ali]], Leadership council.<br />
* Chia N Mustafa, Leadership Council and special envoy to the Chairman, Nawshirwan Mustafa<ref>[http://www.nytimes.com/2009/07/26/world/middleeast/26kurds.html?_r=1], "NY Times", 25 July 2009</ref> <br />
* [[Mam Rostem]] a former Peshmerga and MP.<br />
* [[Jalal Jawher]], Leadership council.<br />
* [[Mustafa Said Qadir]], Leadership council.<br />
* [[Osman Hagi Mahmud]], Leadership Council.<br />
* [[Jwamer B Mustafa]], Leadership Council (deputy) and former spokesmen<ref>[http://www.newsweek.com/id/203485], "Newsweek, Reform is topic A in Kurdistan elections, ", 24 June 2009 </ref>. <br />
* Dr. Shaho Sa'ed a linguist, journalist and writer.<br />
* [[Kwestan Abdullah]], the former chair of the 40-strong "Green Bloc" within the Assembly and the first woman to head parliamentary bloc.<br />
* Dr. Zana Raouf a lawyer and essayist.<br />
* Kurdistan Parliament Green Bloc head resigned to join Nawshirwan's Change Bloc.<ref>''eKurd'', 12 May 2009 </ref> The Green Bloc includes former members of the PUK.<ref>[http://www.ekurd.net/mismas/articles/misc2007/9/independentstate1606.htm Woman leads bloc for first time in Kurdistan parliament's history], ''eKurd'', 17 September 2007, accessed on 28 June 2009</ref><br />
<br />
The movement's platform for the 2009 election was to de-politicise the regional government, strengthen the judiciary, limit political interference in the economy and make the budget more transparent. Supporting [[Federalism in Iraq|federalism]] for Iraqi Kurdistan, it said disputes with the central government could be solved through dialogue based on the [[Iraqi Constitution]].<ref>[http://niqash.org/content.php?contentTypeID=75&id=2475&lang=0 Kurdish election lists], ''[[Niqash]]'', 30 June 2009</ref><br />
<br />
The Change List won a total of 25 seats in the [[Iraqi Kurdistan legislative election, 2009|July 2009 elections]],<ref>{{cite news| url=http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2009/07/25/MNFM18V5US.DTL | work=The San Francisco Chronicle | title=Iraqi Kurds come out to vote in high numbers | first=Sam | last=Dagher | date=26 July 2009}}</ref> making it the second-most successful slate in the election after the PUK-PDK coalition.<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
==External links==<br />
*[http://english.aljazeera.net/news/middleeast/2009/05/2009522232888728.html Al Jazeera English - Iraqi Kurds form new party]<br />
*[http://www.washingtonpost.com/wp-dyn/content/article/2009/05/02/AR2009050200340.html Washington Post - New candidate emerges among Iraq's Kurds]<br />
*[http://www.npr.org/templates/story/story.php?storyId=103805844 NPR - Iraqi Kurds Try To Reform Two-Party System]<br />
<br />
{{DEFAULTSORT:Movement For Change}}<br />
[[Category:Iraqi Kurdistan]]<br />
[[Category:Political parties in Iraqi Kurdistan]]<br />
[[Category:Kurdish organisations]]<br />
[[Category:Political parties in Iraq]]<br />
[[Category:Regionalist parties]]<br />
<br />
{{Iraqi political parties}}<br />
{{Kurdistan National Assembly}}<br />
<br />
[[fa:حزب گوران]]<br />
[[ckb:بزووتنەوەی گۆڕان]]<br />
[[sv:Förändring]]</div>TeleComNasSprVenhttps://de.wikipedia.org/w/index.php?title=Maspalomas&diff=80450152Maspalomas2010-10-19T08:54:24Z<p>TeleComNasSprVen: f</p>
<hr />
<div>[[Bild:Image-Maspalomas dunes DAH2002-002.jpg|thumb|In den Dünen von Maspalomas]]<br />
[[Bild:Maspalomas Gran Canaria.jpg|thumb|Dünen von Maspalomas]]<br />
[[Bild:Maspalomas dunes DAH2002-003.jpg|thumb|Morgen in den Dünen]]<br />
<br />
'''Maspalomas''' ist ein internationaler Ferienort im Süden [[Gran Canaria]]s. Der Ort gehört zur Gemeinde [[San Bartolomé de Tirajana]].<br />
<br />
== Geografie ==<br />
Maspalomas liegt an der Südspitze der [[Kanarische Inseln|kanarischen]] Insel [[Gran Canaria]]. Der Ort liegt an der Küste des [[Atlantischer Ozean|Atlantiks]]. Im südöstlichen Teil wird er durch die ''Dünen von Maspalomas'' vom [[Meer]] getrennt. Maspalomas besteht zum Großteil aus Ferienanlagen und der dazugehörigen Infrastruktur. Der Ort gliedert sich in folgende Teile:<br />
* ''El Oasis:'' südlichster Teil, bestehend aus dem ''Faro'' (Leuchtturm) sowie den ältesten Ferienanlagen (1960er-Jahre)<br />
* ''Meloneras:'' südwestlicher Teil, bestehend aus größeren Hotelanlagen, Einkaufszentrum und Kongresshalle, erbaut seit 1997<br />
* ''Campo International:'' Mitte und östlicher Teil, bestehend meist aus Bungalowanlagen und einem Golfplatzrevier, erbaut zwischen 1980 und 1995<br />
* ''Sonnenland:'' nordwestlicher Teil von Maspalomas, erbaut in den 1980er-Jahren mit kleineren Hotels und privaten Wohnanlagen, seit 1997 sind größere Hotels hinzugekommen<br />
* ''El Hornillo:'' im Westen des Ortes gelegen, Wohnort von wohlhabenderen Einwohnern, z.&nbsp;B. Hotelmanagern<br />
* ''El Tablero:'' Nördlicher Teil, bereits auf der Nordseite der Autobahn, kaum Hotels und Wohnort vieler Hotelangestellter.<br />
<br />
Östlich geht Maspalomas nahtlos in [[Playa del Inglés]] über. Beide Orte gehören zur Gemeinde [[San Bartolomé de Tirajana]].<br />
<br />
=== Dünen von Maspalomas ===<br />
Die [[Düne]]n im Südosten von Maspalomas erstrecken sich über eine Länge von sechs und eine Breite von ein bis zwei Kilometern. Der Sand besteht hier nicht aus Gesteinstrümmern, sondern überwiegend aus von der Brandung angeschwemmtem und zerriebenem Korallen- und Muschelkalk – durch die [[Calima]] verwehter Sand aus der [[Sahara]] ist nicht der eigentliche Ursprung. Schwere Stürme im Frühjahr 2006 sowie im Februar 2010 richteten einigen Schaden an und spülten viel Sand ins Meer.<br />
<br />
In den Dünen liegt das einzige offizielle [[FKK]]-Gebiet Gran Canarias. Am [[Leuchtturm]] findet sich eine [[Oase]] („La Charca“), in der zahlreiche [[Wasservögel]] brüten. Sie steht ebenso wie die Dünen seit [[1987]] unter [[Naturschutz]].<br />
<br />
== Geschichte ==<br />
Maspalomas ist der älteste Ferienort an der Südküste [[Gran Canaria]]s. Der 68&nbsp;Meter hohe [[Leuchtturm]] ''El Faro'' wurde bereits im Jahre 1889 errichtet.<br />
<br />
== Wirtschaft und Verkehr ==<br />
Maspalomas ist vom [[Tourismus]] geprägt. Der Ort besitzt keine anderen Wirtschaftszweige. In der Nähe von Montaña Blanca (27°45'51.26"N, 15°37'56.08"W) befindet sich eine [[Bodenstation]] (engl. [[Mission Control Center]]) der spanischen Raumfahrtbehörde [[Instituto Nacional de Técnica Aeroespacial]] (INTA). Es gibt viele Einkaufszentren und Vergnügungsparks. Eine besondere Attraktion ist der rund zehn Kilometer nördlich gelegene [[Palmitos Park]], der während der verheerenden Waldbrände in den letzten Julitagen 2007 erheblichen Schaden nahm und am 4. August 2008 wiedereröffnet wurde. <br />
<br />
Maspalomas ist durch die Inselautobahn (GC-1) und durch Buslinien mit dem [[Flughafen Gran Canaria]] und der Inselhauptstadt [[Las Palmas de Gran Canaria]] sowie der Westküste verbunden.<br />
<br />
Das Nahverkehrsnetz ist preiswert und gut ausgebaut. Tagsüber und innerhalb von Maspalomas/Playa del Inglés fahren die in der Regionalsprache „Guaguas“ genannten modern ausgestatteten Busse der ''Global'' in der Regel im Takt von 20&nbsp;Minuten.<br />
<br />
== Bilder ==<br />
<gallery><br />
Bild:PICT0505.jpg|Dünen von Maspalomas in der Morgensonne<br />
Bild:Maspalomas_Duenen_1.jpg|Dünen von Maspalomas im diffusen Sonnenaufgangslicht<br />
Bild:Maspalomas_dunas5.jpg|Dünen von Maspalomas, Blick landeinwärts bei Sonnenaufgang<br />
Bild:InDenDuenenVonMaspalomas.jpg|Dünen von Maspalomas tagsüber<br />
Bild:Maspalomas_sand.jpg|Dünen von Maspalomas <br />
Bild:Casino Maspalomas by night.jpg|Casino Maspalomas bei Nacht<br />
Bild:Lagoon_of_Maspalomas.jpg|Lagune<br />
Bild:La Charca Maspalomas Gran Canaria.jpg|''La Charca''<br />
Bild:Lighthouse_Maspalomas.jpg|Leuchtturm ''El Faro''<br />
</gallery><br />
<br />
== Weblinks ==<br />
{{Commons|Maspalomas}}<br />
{{Commons|Playas_de_Canarias|Strände der kanarischen Inseln}}<br />
<br />
{{Coordinate |NS=27/44/13/N |EW=15/35/58/W |type=city |region=ES}}<br />
<br />
[[Kategorie:Gran Canaria]]<br />
[[Kategorie:Ort auf den Kanarischen Inseln]]<br />
<br />
[[cy:Maspalomas]]<br />
[[en:Maspalomas]]<br />
[[es:Maspalomas]]<br />
[[fi:Maspalomas]]<br />
[[it:Maspalomas]]<br />
[[nl:Maspalomas]]<br />
[[no:Maspalomas]]<br />
[[pl:Maspalomas]]</div>TeleComNasSprVenhttps://de.wikipedia.org/w/index.php?title=Maskulinismus&diff=80031343Maskulinismus2010-10-08T09:08:31Z<p>TeleComNasSprVen: d</p>
<hr />
<div>{{delete|[[Maskulismus]] already exists.}}<br />
'''Maskulinismus''' bezeichnet die Überzeugung, Männer oder bestimmte als [[Männlichkeit|männlich]] erachtete Eigenschaften seien naturbedingt überlegen, sowie die Legitimation männlicher Dominanz.<ref>Begriff bei {{cite web|url=http://www.merriam-webster.com/dictionary/masculinist|title= Merriam-Webster}}</ref> Der Ausdruck „Maskulinismus“ (bzw. dessen englische Entsprechung „masculinism“) wurde Anfang des 20. Jahrhunderts geprägt. So formulierte Arthur Brittan 1989 sein Konzept des Maskulinismus als die „Ideologie des [[Patriarchat_(Soziologie)|Patriarchates]]“, die männliche Dominanz [[naturalisierung|naturalisiere]] und legitimiere.<ref>Brittan, Arthur: Masculinity and Power, Wiley-Blackwell 1991</ref><br />
<br />
Anders als „Maskulinismus“ bezeichnet [[Maskulismus]], analog zum Begriff [[Feminismus]] nach allgemeinem Verständnis, eine politische Anschauung, die davon ausgeht, dass (auch) Männer [[Diskriminierung|diskriminiert]] werden und dass diese Diskriminierung beseitigt werden müsse.<ref>Begriff bei Ted Honderich (Hg), The Oxford Companion to Philosophy, Oxford University Press, 1995, ISBN 978-0198661320</ref> Der Begriff „Maskulismus“ (bzw. „masculism“) existiert seit den Achtzigerjahren des vorigen Jahrhunderts und wurde aus dem älteren Begriff Feminismus abgeleitet.<ref>Begriff bei {{cite web|url=http://www.allwords.com/word-masculism.html|title=allwords.com}}</ref> Diese politische Strömung wird oft auch als Männerrechtsbewegung („men's rights movement“) bezeichnet. Einige Autoren sehen jedoch darin grundsätzlich oder teilweise ein [[Androzentrismus|androzentrisches]] bzw. patriarchalisches Bestreben im Sinne der obengenannten Definition von Maskulinismus.<br />
<br />
Gelegentlich wird auch der Begriff Maskulismus synonym für die obengenannte Definition von Maskulinismus verwendet, und umgekehrt. Eine klare Begriffsverwendung hat sich bisher nicht vollständig etabliert.<br />
<br />
[[Joachim H. Bürger]] hat 1990 bis 1992 drei sehr kontroverse Bücher zu diesem Thema verfasst und große Medienaufmerksamkeit damit erreicht.<br />
<br />
== Literatur ==<br />
<br />
* Syzane Berisha: ''Feminismus vs. Maskulismus – der aus dem Blick geratene Mann.'' GRIN Verlag, 2005, ISBN 978-3638423496.<br />
* [[Ernest Belfort Bax]]: ''The Legal Subjection of Men.'' 1908 [http://en.wikisource.org/wiki/The_Legal_Subjection_of_Men].<br />
* Harvey Mansfield: ''Manliness.'' Yale Press 2006 [http://yalepress.yale.edu/yupbooks/book.asp?isbn=0300106645], ISBN 0-300-10664-5.<br />
<br />
== Einzelnachweise ==<br />
<references /><br />
<br />
[[Kategorie:Männerrechtsbewegung]]<br />
[[Kategorie:Sexismus]]<br />
<br />
[[cs:Maskulinismus]]<br />
[[es:Masculinismo]]<br />
[[fr:Masculinisme]]<br />
[[it:Mascolinismo]]<br />
[[ja:マスキュリズム]]<br />
[[ko:남성주의]]<br />
[[pt:Masculinismo]]<br />
[[zh:男性主義]]<br />
<br />
<!--[[en:Masculism]]<br />
[[fi:Maskulismi]]<br />
[[ru:Маскулизм]]<br />
[[tr:Maskülizm]]--></div>TeleComNasSprVenhttps://de.wikipedia.org/w/index.php?title=Benutzer:TaxonBot/ImpTest&diff=144945201Benutzer:TaxonBot/ImpTest2010-08-25T18:11:57Z<p>TeleComNasSprVen: Undid revision 380956034 by 96.21.233.140 (talk)</p>
<hr />
<div>{{expert-subject|Energy|date=October 2009}}<br />
<br />
This is a '''list of [[oil refinery|oil refineries]]'''. The Oil and Gas Journal<ref>{{cite web | url=http://ogj.com/ |title=Oil and Gas Journal | publisher=Pennwell Publishing}}</ref> also publishes a worldwide list of refineries annually in a country-by-country tabulation that includes for each refinery: location, crude oil daily processing capacity, and the size of each process unit in the refinery. For the U.S., the refinery list is further categorized state-by-state. The list usually appears in one of their December issues. It is about 45 pages in length and is updated each year with additions, deletions, name changes, capacity changes, etc.<br />
<br />
{| class=wikitable<br />
! '''Name of Refinery'''<br />
! '''Location'''<br />
! '''Barrels per Day'''<br />
|-<br />
|| Reliance Jamnagar Complex (RIL) || Jamnagar, India || 1,240,000<br />
|-<br />
|| Paraguana Refining Complex (CRP) || Amuay and Cardón, Venezuela || 940,000<br />
|-<br />
||SK Energy Ulsan Refinery ([[SK Energy]]) || [[South Korea]] || 840,000<br />
|-<br />
|| Yeosu Refinery ([[GS Caltex]]) || [[South Korea]] || 700,000<br />
|-<br />
|| Jurong Island Refinery ([[ExxonMobil]])|| [[Singapore]] || 605,000<br />
|-<br />
|| [[Baytown Refinery]] ([[ExxonMobil]]) || Baytown, TX, USA || 572,500<br />
|-<br />
|| Ras Tanura Refinery ([[Saudi Aramco]]) || Eastern Province, Saudi Arabia || 525,000 <br />
|-<br />
|| S-Oil Ulsan Refinery ([[S-Oil]])|| South Korea || 520,000<br />
|-<br />
|| [[Baton Rouge Refinery]] ([[ExxonMobil]]) || Baton Rouge, LA, USA || 503,000<br />
|-<br />
|| [[Hovensa|Hovensa LLC]]|| Virgin Islands || 495,000<br />
|-<br />
|| BP Texas City || Texas City TX, USA || 475,000<br />
|-<br />
|| [[Mina Al-Ahmadi Refinery, KNPC]] || [[Kuwait]] || 470,000<br />
|-<br />
|| Pulau Bukom Refinery (Shell)|| [[Singapore]] || 458,000<br />
|-<br />
|| [[Abadan Refinery]] || Iran || 450,000<sup>2</sup><br />
|-<br />
|| [[Mailiao Refinery]] || Taiwan || 450,000<br />
|-<br />
|| [[Marathon Petroleum Company]] || Garyville LA, USA || 436,000<br />
|-<br />
|| [[Citgo]] Lake Charles || Lake Charles LA, USA || 429,500<br />
|-<br />
|| Shell Pernis Refinery || [[Netherlands]] ||416,000 <br />
|-<br />
|| BP Whiting Refinery || Whiting IN, USA || 410,000<br />
|-<br />
|| BP Rotterdam Refinery || Rotterdam, Netherlands || 400,000<br />
|-<br />
|| Saudi [[Aramco]] [[Yanbu]] Refinery ||Yanbu, KSA ||400,000<br />
|-<br />
|| Rabigh Refinery ([[Saudi Aramco]]) || Saudi Arabia ||400,000<br />
|-<br />
|| Angarsk Petrochemical Refinery ([[Rosneft]]) || [[Angarsk]], Russia || 384,000<br />
|-<br />
|| Omsk Refinery ([[Gazprom Neft]]) || [[Omsk]], Russia || 380,000<br />
|-<br />
|| Novo-Ufa Refinery ([[Bashneft]]) || Russia || 380,000<br />
|-<br />
|| REPLAN ([[Petrobras]]) || Paulínia, SP Brazil || 365,000 <br />
|-<br />
|| Total Refinery Antwerp ||Belgium ||360,000<br />
|-<br />
|| Beaumont Refinery (ExxonMobil)|| Beaumont TX, USA || 348,500 <br />
|-<br />
|| Cilacap Refinery ([[Pertamina]]) || Indonesia || 348,000<br />
|-<br />
|| [[Fawley, Hampshire#Fawley oil refinery and chemical works|Fawley Southampton Refinery]] ([[ExxonMobil]])|| Southampton, [[United Kingdom]] || 347,000<br />
|-<br />
|| Negishi Yokahama Refinery ([[Nippon Oil Corporation]]) || Japan || 340,000<br />
|-<br />
|| [[Kirishi Refinery]] ([[Surgutneftegas]]) || [[Kirishi]], Russia || 337,000<br />
|-<br />
|| Sunoco ([[1975 Philadelphia Refinery Fire]]) || South Philadelphia PA, USA || 335,000<br />
|-<br />
|| Kawasaki Refinery ([[TonenGeneral Sekiyu]]/ExxonMobil) || Japan || 335,000 <br />
|-<br />
|| Chevron '''(Reliance Industries India undertaken)''' || Pascagoula MS, USA || 330,000 <br />
|-<br />
|| Deer Park Shell-[[PEMEX]] Partnership || Deer Park TX, USA || 329,800<br />
|-<br />
|| Valero || Port Arthur TX, USA || 325,000 <br />
|-<br />
|| LINOS Refinery ([[TNK-BP]]) || Ukraine || 320,000<br />
|-<br />
|| ConocoPhillips || Wood River IL, USA || 306,000<br />
|-<br />
|| Sarroch ([[Saras]]) || Sardinia, Italy || 300,000<br />
|-<br />
|| Saint John Refinery ([[Irving Oil]]) || Saint John NB, Canada || 300,000<br />
|-<br />
|| Refinería PEMEX Ing. Antonio Dovalí Jaime || Salina Cruz OA, México || 290,000<sup>3</sup><br />
|-<br />
|| [[Flint Hills Resources]] || Corpus Christi TX, USA || 288,000<br />
|-<br />
|| [[Motiva]] Port Arthur Refinery || Port Arthur TX, USA || 285,000<sup>4</sup><br />
|-<br />
|| RLAM ([[Petrobras]]) || Mataripe BA, Brazil || 279,000 <br />
|-<br />
|| Refinería PEMEX Manuel Hidalgo || Tula HI, México || 273,000<br />
|-<br />
|| BP-Carson Refinery || Carson CA, USA || 265-275,000<br />
|-<br />
|| ConocoPhillips Lake Charles Refinery || Westlake LA, USA || 248,000<br />
|-<br />
|| Refinería PEMEX Ing. Antonio M. Amor || Salamanca GJ, México || 246,000<br />
|-<br />
|| [[Chevron Richmond Refinery]] || Richmond CA, USA || 240,000<br />
|-<br />
|| Motiva Convent Refinery (built by Texaco) || Convent LA, USA || 235,000<br />
|-<br />
|| BP Cherry Point Refinery || Cherry Point WA, USA || 225,000<br />
|-<br />
|| Motiva New Orleans Refining Co || NORCO LA, USA || 220,000<br />
|-<br />
||Isphahan Oil Refinery Co.||Isphahan, Iran||280,000<ref>http://www.eia.doe.gov/emeu/cabs/Iran/Oil.html</ref><br />
|-<br />
|| Refinería PEMEX Héctor R Lara Sosa || Cadereyta NL, México || 275,000<br />
|-<br />
|| ConocoPhillips Ponca City Refinery || Ponca City OK, USA || 187,000<br />
|-<br />
|| Sunoco Marcus Hook Plant || Marcus Hook PA, USA || 178,000<br />
|-<br />
|| Refinería PEMEX Gral. Lázaro Cárdenas || Minatitlán VE, México || 170,000<br />
|-<br />
|| BP Toledo || Oregon OH, USA || 155,000<br />
|-<br />
|| Refinería PEMEX Francisco I. Madero || Ciudad Madero TM, México || 149,000<br />
|-<br />
|| Sunoco Toledo || Toledo OH, USA || 140,000<br />
|-<br />
|| Holly Refinery<sup>5</sup> || West Tulsa OK, USA || 125,000<br />
|-<br />
|| Murphy Oil Company || Meraux, La., USA || 125,000<br />
|-<br />
|| Sunoco Sarnia Refinery || Sarnia ON, Canada || 80,000<br />
|-<br />
|}<br />
--Excerpts from http://www.eia.doe.gov/neic/rankings/refineries.htm and http://www.pemex.com/index.cfm?action=mapa<br />
<br />
1. The Reliance I & Reliance II are adjacent to each other and is the world's largest refinery at a single site. Consisting of 1.2&nbsp;m capacity.<br />
<br />
2. Prior to the damage sustained in the Iran-Iraq War (1980–88) the refinery has a capacity of {{convert|628000|oilbbl/d|m3/d|abbr=on}}.<br />
<br />
3. Some of Petróleos Mexicanos' six facilities have begun to operate at unpredictable fractions of a larger rated capacity. This is the public information current to pemex.com (Spanish version) in summer 2010. <br />
<br />
4. Motiva has completed three out of a five year development cycle that will expand the refinery by 325,000 bpd to a net capacity of at least 600,000 bpd. Motiva is a JV of Saudi and Royal Dutch Shell divisions.<br />
<br />
5. This combined the Sunoco nee Sunray DX operation with the Sinclair refineries separate up to 2009.<br />
<br />
{{Expand list|date=August 2008}}<br />
<br />
==Oceania==<br />
<br />
'''<br />
===[[Australia]]===<br />
====[[New South Wales]]====<br />
* [[Kurnell Refinery]], ([[Caltex]]), {{convert|124500|oilbbl/d|m3/d|abbr=on}}<ref>http://www.caltex.com.au/community_ref_kur.asp</ref>, [[Botany Bay]] <br />
* [[Clyde Refinery]], ([[Royal Dutch Shell]]), {{convert|100000|oilbbl/d|m3/d|abbr=on}}, [[Clyde, New South Wales|Clyde]]<br />
<br />
====[[Victoria (Australia)|Victoria]]====<br />
* [[Geelong Refinery]], ([[Royal Dutch Shell]]), {{convert|130000|oilbbl/d|m3/d|abbr=on}}, [[Geelong, Victoria|Geelong]]<br />
* [[Altona Refinery]], ([[ExxonMobil]]), ~75,000 bpd, [[Altona North, Victoria|Altona North]] (refinery reduced from 2 trains to 1 train between 2000–2004)<br />
<br />
====[[Queensland]]====<br />
* [[Bulwer Island Refinery]], ([[BP]]), {{convert|90000|oilbbl/d|m3/d|abbr=on}}, [[Bulwer Island, Queensland|Bulwer Island]]<br />
* [[Lytton Refinery]], ([[Caltex]]), {{convert|104000|oilbbl/d|m3/d|abbr=on}}, [[Lytton, Queensland|Lytton]]<br />
<br />
====[[South Australia]]====<br />
* [[Port Stanvac Refinery]], ([[ExxonMobil]]), {{convert|100000|oilbbl/d|m3/d|abbr=on}}, [[Lonsdale, South Australia|Lonsdale]] (currently mothballed)<br />
<br />
====[[Western Australia]]====<br />
* [[Kwinana Refinery]], ([[BP]]), {{convert|138000|oilbbl/d|m3/d|abbr=on}}, [[Kwinana, Western Australia|Kwinana]]<br />
<br />
===[[New Zealand]]===<br />
* [[Marsden Point Oil Refinery]] ([[NZRC]]), 96,000 b<br />
<br />
===[[Papua New Guinea]]===<br />
* [[InterOil Refinery]] ([[InterOil]]), 32,500 hi<br />
<br />
==Asia==<br />
===[[Bangladesh]]===<br />
* [[Eastern Refinery Limited]] ([[Bangladesh Petroleum Corporation]]), {{convert|33000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Brunei]]===<br />
*[[Seria Refinery]] ([[Brunei Shell Petroleum]]), {{convert|13000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[China]]===<br />
<br />
These numbers fall short of the true refining capacity in China, which is more 10,000 bbl/day. <br />
<br />
* [[Zhenhai Refinery]] ([[Sinopec]]), {{convert|462000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Shanghai Gaoqiao Company Refinery]] ([[Sinopec]]), {{convert|220000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Beijing Yanshan Company Refinery]] ([[Sinopec]]), {{convert|165000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Qilu Company Refinery]] ([[Sinopec]]), {{convert|195000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Jinling Company Refinery]] ([[Sinopec]]), {{convert|270000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Maoming Company Refinery]] ([[Sinopec]]), {{convert|274000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Tianjin Company Refinery]] ([[Sinopec]]), {{convert|200000|oilbbl/d|m3/d|abbr=on}}<br />
* [[CPCC Changling Company Refinery]] ([[Sinopec]]), {{convert|100000|oilbbl/d|m3/d|abbr=on}}<br />
* [[CPCC Guangzhou Branch Refinery]] ([[Sinopec]]), {{convert|210000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Anqing Company Refinery]] ([[Sinopec]]), {{convert|200000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Jingmen Company Refinery]] ([[Sinopec]]), {{convert|100000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Luoyang Company Refinery]] ([[Sinopec]]), {{convert|150000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Jiujiang Company Refinery]] ([[Sinopec]]), {{convert|90000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Jinan Company Refinery]] ([[Sinopec]]), {{convert|21000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Wuhan Company Refinery]] ([[Sinopec]]), {{convert|80000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Cangzhou Company Refinery]] ([[Sinopec]]), {{convert|70000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Beihai Company Refinery]] ([[Sinopec]]), {{convert|12000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Fushun Petrochemical Company|Fushun Petrochemical Refinery]] ([[CNPC]]), {{convert|160000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Dalian Petrochemical Refinery]] ([[CNPC]]), {{convert|175000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Daqing Petrochemical Refinery]] ([[CNPC]]), {{convert|122000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Jilin Chemical Refinery]] ([[CNPC]]), {{convert|115000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Jinxi Refinery]] ([[CNPC]]), {{convert|170000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Lanzhou Refinery]] ([[CNPC]]), {{convert|140000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Dushanzi Refinery]] ([[CNPC]]), {{convert|170000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Jinzhou Petrochemical Refinery]] ([[CNPC]]), {{convert|112000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Urumqi Petrochemical Refinery]] ([[CNPC]]), {{convert|101000|oilbbl/d|m3/d|abbr=on}}<br />
* [[West Pacific Petrochemical, Dalian]] ([[WEPEC]]), {{convert|340000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[India]]===<br />
* [[Jamnagar Refinery]] ([[Reliance Industries]]), {{convert|650000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Reliance Petroleum]] ([[Reliance Industries]]), {{convert|580000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Mangalore Refinery]] ([[MRPL]]), {{convert|199000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Digboi Refinery]], [[Assam]] ([[Indian Oil Corporation|IOC]]), {{convert|13000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Guwahati Refinery]] [[Assam]] ([[Indian Oil Corporation|IOC]]), {{convert|20000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Bongaigaon Refinery]] [[Assam]] ([[Indian Oil Corporation|IOC]]), {{convert|48000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Numaligarh Refinery Limited]] [[Assam]] ([[Numaligarh Refinery Limited|NRL]]), {{convert|58000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Haldia Refinery]] ([[Indian Oil Corporation|IOC]]), {{convert|116000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Panipat Refinery]] ([[Indian Oil Corporation|IOC]]), {{convert|240000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Gujarat Refinery]] ([[Indian Oil Corporation|IOC]]), {{convert|170000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Barauni Refinery]] ([[Indian Oil Corporation|IOC]]), {{convert|116000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Mathura Refinery]] ([[Indian Oil Corporation|IOC]]), {{convert|156000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Chennai Refinery]] ([[Indian Oil Corporation|IOC]]), {{convert|185000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Mumbai Refinery]] ([[HPCL]]), {{convert|107000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Visakhapatnam Refinery]] ([[HPCL]]), {{convert|150000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Mumbai Refinery Mahaul]] ([[BPCL]]), {{convert|135000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Nagapattnam Refinery]] ([[CPCL]]), {{convert|20000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Kochi Refinery]] ([[BPCL]]), {{convert|172000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Tatipaka Refinery]] ([[ONGC]]), {{convert|1600|oilbbl/d|m3/d|abbr=on}}<br />
* [[Essar Refinery]] ([[Essar]]), 289,256 barrels per day<br />
<br />
===[[Indonesia]]===<br />
* [[Musi Refinery]] ([[Pertamina]]), {{convert|135200|oilbbl/d|m3/d|abbr=on}}<br />
* [[Balongan Refinery]] ([[Pertamina]]), {{convert|125000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Dumai Refinery]] ([[Pertamina]]), {{convert|120000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Cilacap Refinery]] ([[Pertamina]]), {{convert|348000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Balikpapan Refinery]] ([[Pertamina]]), {{convert|260000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Sungai Pakning Refinery]] ([[Pertamina]]), {{convert|50000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Pangkalan Brandan Refinery]] ([[Pertamina]]), {{convert|5000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Cepu Refinery]] ([[Pertamina]]), {{convert|3800|oilbbl/d|m3/d|abbr=on}}<br />
* [[Kasim Refinery]] ([[Pertamina]]), {{convert|10000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Tuban Refinery]] ([[PT TPPI]]), {{convert|100000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Japan]]===<br />
* [[Chiba Refinery (Cosmo Oil)]] ([[Cosmo Oil Company|Cosmo Oil]]), {{convert|240000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Yokkaichi Refinery]] (Cosmo Oil), {{convert|175000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Sakai Refinery (Cosmo Oil)]] (Cosmo Oil), {{convert|80000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Sakaide Refinery]] (Cosmo Oil), {{convert|140000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Muroran Refinery]] ([[Nippon Oil|Nippon Oil Corporation (NOC)]]), {{convert|180000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Sendai Refinery]] (Nippon Oil Corporation (NOC)), {{convert|145000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Negishi Yokahama Refinery]] (Nippon Oil Corporation (NOC)), {{convert|340000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Osaka Refinery]] (Nippon Oil Corporation (NOC)) 115,000 bpd<br />
* [[Mizushima Refinery]] (Nippon Oil Corporation (NOC)), {{convert|250000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Marifu Refinery]] (Nippon Oil Corporation (NOC)) 127,000 bpd<br />
* [[Toyama Refinery]] (Nihonkai Oil/Nippon Oil Corporation (NOC)), {{convert|60000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Kubiki Refinery]] ([[Teikoku Oil]]), {{convert|4410|oilbbl/d|m3/d|abbr=on}}<br />
* [[Chiba Refinery (Kyokuto)]] ([[Kyokuto Petroleum]]/[[ExxonMobil]]), {{convert|175000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Kawasaki Refinery]] ([[TonenGeneral Sekiyu]]/ExxonMobil), {{convert|335000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Wakayama Refinery]] (TonenGeneral Sekiyu/ExxonMobil), {{convert|170000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Sakai Refinery (TonenGeneral)]] (TonenGeneral Sekiyu/ExxonMobil), {{convert|156000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Nishihara Refinery]] ([[Nansei sekiyu]]/Petrobras), {{convert|100000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Keihin Refinery]] ([[Toa Oil]]/[[Royal Dutch Shell|Shell]]), {{convert|185000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Showa Yokkaichi Refinery]] ([[Showa Yokkaichi]]/Shell), {{convert|210000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Yamaguchi Refinery]] ([[Seibu Oil]]/Shell), {{convert|120000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Sodegaura Refinery]] ([[Fuji Oil Campany]]), {{convert|192000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Kashima Refinery]] ([[Kashima Oil Campany]]/[[Japan Energy]]), {{convert|210000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Mizushima Refinery (Japan Energy)]] (Japan Energy), {{convert|205200|oilbbl/d|m3/d|abbr=on}}<br />
* [[Shikoku Refinery]] ([[Taiyo Oil]]), {{convert|120000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Ohita Refinery]] ([[Kyusyu Oil]]), {{convert|160000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Hokkaido Refinery]] ([[Idemitsu Kosan]]), {{convert|140000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Chiba Refinery (Idemitsu)]] (Idemitsu Kosan), {{convert|220000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Aichi Refinery]] (Idemitsu Kosan), {{convert|160000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Tokuyama Refinery]] (Idemitsu Kosan), {{convert|120000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Kazakhstan]]===<br />
* [[Shymkent Refinery]] ([[PetroKazakhstan]]), {{convert|160000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Pavlodar Refinery]] ([[KazMunayGas]]), {{convert|162600|oilbbl/d|m3/d|abbr=on}}<br />
* [[Atyrau Refinery]] ([[KazMunayGas]]), {{convert|104400|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Malaysia]]===<br />
* [[Melaka I Refinery]] ([[Petronas]]), {{convert|126000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Melaka II Refinery]] ([[Petronas]]/[[ConocoPhillips]]), {{convert|170000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Kertih Refinery]] ([[Petronas]]), {{convert|40000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Port Dickson Refinery]] ([[Royal Dutch Shell]]), {{convert|155000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Lutong Refinery]] ([[Royal Dutch Shell]]), {{convert|45000|oilbbl/d|m3/d|abbr=on}}. Has been closed.<br />
* [[Esso Port Dickson Refinery]] ([[ExxonMobil]]), {{convert|86000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Myanmar]]===<br />
* [[Thanlyin Refinery]] (Myanma Petro-chemical Enterprise), {{convert|25000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Thanbayakan Refinery]] (Myanma Petro-chemical Enterprise), {{convert|25000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Chauk Refinery]] (Myanma Petro-chemical Enterprise), {{convert|6000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Pakistan]]===<br />
* [[Pak-Arab Refinery]] ([[PARCO]]), {{convert|100000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Byco Oil Pakistan Limited]] ([[BOPL]]), {{convert|120000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Byco Petroleum Pakistan Limited]] ([[BPL]]), {{convert|30000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Pakistan Refinery Limited]] (PRL), {{convert|50000|oilbbl/d|m3/d|abbr=on}}<br />
* [[National Refinery Limited]] (NRL),64,000 bpd<br />
* [[Attock Refinery]] Limited (ARL), {{convert|46000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
* [[Enar Petroleum Refining Facility]] (EPRF), {{convert|3000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Papua New Guinea]]===<br />
* [[InterOil Refinery, Port Moresby]] (InterOil), {{convert|32500|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Philippines]]===<br />
* [[Limay Refinery]] ([[Philippine National Oil Company|Petron]]), {{convert|180000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Tabangao Refinery]] ([[Royal Dutch Shell]]), {{convert|120000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Batangas Refinery]] ([[Caltex]]([[Chevron Corporation|Chevron]])), {{convert|86000|oilbbl/d|m3/d|abbr=on}}. Has been closed<br />
BNCVNMC<br />
<br />
===[[Singapore]]===<br />
* [[ExxonMobil Jurong Island Refinery]] ([[ExxonMobil]]), {{convert|605000|oilbbl/d|m3/d|abbr=on}}<br />
* [[SRC Jurong Island Refinery]] ([[Singapore Petroleum Company|Singapore Refining Corporation]]), {{convert|285000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Shell Pulau Bukom Refinery]] ([[Royal Dutch Shell]]), {{convert|458000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[South Korea]]===<br />
* [[SK Energy Co., Ltd. Ulsan Refinery]] ([[SK Energy]]), {{convert|850000|oilbbl/d|m3/d|abbr=on}}<br />
* [[S-Oil Ulsan Refinery]] ([[S-Oil]]), {{convert|560000|oilbbl/d|m3/d|abbr=on}}<br />
* [[GS-Caltex Yeosu Refinery]] ([[GS-Caltex]]), {{convert|730000|oilbbl/d|m3/d|abbr=on}}<br />
* [[SK Energy Co., Ltd. Inchon Refinery]] ([[SK Energy]]), {{convert|275000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Hyundai Daesan Refinery]] ([[Hyundai]]), {{convert|275000|oilbbl/d|m3/d|abbr=on}}<br />
2.06 million barals of oil a day<br />
<br />
===[[Taiwan]]===<br />
* [[Talin Refinery]] ([[Chinese Petroleum Corporation|CPC]]), {{convert|100000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Kaohsiung Refinery]] ([[Chinese Petroleum Corporation|CPC]]), {{convert|270000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Taoyuan Refinery]] ([[Chinese Petroleum Corporation|CPC]]), {{convert|200000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Mailiao Refinery]] (''Formosa''), {{convert|450000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Thailand]]===<br />
* [[Thai Oil Refinery]] (Thai Oil Company of [[PTT]]), {{convert|220000|oilbbl/d|m3/d|abbr=on}}<br />
* [[IRPC Refinery]] (IRPC PLC of PTT), {{convert|215000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Rayong]] Refinery (Rayong Refinery PLC of PTT), {{convert|145000|oilbbl/d|m3/d|abbr=on}}<br />
* [[SPRC Refinery]] (Star Petroleum Refining Company of PTT), {{convert|150000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Bangchak]] Refinery (Bangchak Petroleum of PTT), {{convert|120000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Sri Racha]] Refinery ([[ExxonMobil]]), {{convert|170000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Rayong]] Purifier Refinery ([[Rayong Purifier Company]]), {{convert|17000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Turkmenistan]]===<br />
* [[Seidi]], {{convert|120000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Turkmenbashi]], {{convert|116000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Vietnam]]===<br />
* [[Dung Quat Refinery]] (Petrovietnam), {{convert|148000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
==Africa==<br />
===[[Algeria]]===<br />
* [[Arzew Refinery]] ([[Sonatrach]]), {{convert|54000|oilbbl/d|m3/d|abbr=on}}<br />
* [[El Harrach Refinery]] ([[Sonatrach]]), {{convert|59000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Skikda Refinery]] ([[Sonatrach]]), {{convert|323000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Hassi Messaoud Refinery]] ([[Sonatrach]]), {{convert|27000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Angola]]===<br />
* [[Luanda Refinery]] ([[Petrofina]]), {{convert|39000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Cameroon]]===<br />
* [[Limbe Refinery]] ([[SONARA]]), {{convert|42000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Republic of the Congo|Congo]]===<br />
* [[Pointe Noire Refinery]] ([[CORAF]]), {{convert|21000|oilbbl/d|m3/d|abbr=on}}<br />
lots of oil<br />
<br />
===[[Côte d'Ivoire]]===<br />
* [[Abidjan Refinery]] ([[SIR]])([http://www.sir.ci website]), {{convert|65000|oilbbl/d|m3/d|abbr=on}}<br />
* [[BPC]]<br />
<br />
===[[Egypt]]===<br />
* [[Alexandria MIDOR Refinery]] ([[MIDOR]]), {{convert|100000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Wadi Feiran Refinery]], {{convert|10000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Suez Refinery]], {{convert|86000|oilbbl/d|m3/d|abbr=on}}<br />
* [[El-Nasr]], {{convert|146000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Amerya Refinery]], {{convert|78000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Assiut Refinery]], {{convert|47000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Cairo Refinery]], {{convert|145000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Tanta Refinery]], {{convert|35000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Alexandria Refinery]], {{convert|100000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Eritrea]]===<br />
* [[Assab Refinery]] ([[Petroleum Corporation of Eritrea]]), {{convert|14500|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Gabon]]===<br />
* [[Sogara Refinery]] ([[Total S.A.|Total]]/[[Royal Dutch Shell|Shell]]/[[Agip]]), {{convert|21000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Ghana]]===<br />
* [[Tema Refinery]] ([[TORC]]), {{convert|45000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Kenya]]===<br />
* [[Mombasa Refinery]] ([[Kenya Petroleum]]), {{convert|90000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Libya]]===<br />
* [[Zawia Refinery]] ([[Libya National Oil Company|NOC]]), {{convert|120000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Ras Lanuf Refinery]] ([[Libya National Oil Company|NOC]]), {{convert|220000|oilbbl/d|m3/d|abbr=on}}<br />
* [[El-Brega Refinery]] ([[Libya National Oil Company|NOC]]), {{convert|10000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Tobruk Refinery]] ([[Libya National Oil Company|NOC]]), {{convert|20000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Sarir Refinery]] ([[Libya National Oil Company|NOC]]), {{convert|10000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Madagascar]]===<br />
* [[Tomasina Refinery]] ([[Galana Raffinerie]]), {{convert|12000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Mauritania]]===<br />
* [[Nouadhibou Refinery]] ([[Somir]]), {{convert|10000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Morocco]]===<br />
* [[Samir Mohammedia Refinery]] ([[Corral Holdings]]), {{convert|105000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Samir Sidi Kacem Refinery]] ([[Corral Holdings]]), {{convert|50000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Nigeria]]===<br />
* [[Port Harcourt Refinery]] [[PHRC]] {{convert|210000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Warri Refinery]] [[WRPGC]] {{convert|125000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Kaduna Refinery]] [[KRPC]] {{convert|110000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[South Africa]]===<br />
* [[Sapref Durban Refinery]] ([[Royal Dutch Shell|Shell]]/[[BP]]), {{convert|180000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Petronas Durban Refinery (Enref)]] ([[Petronas]]), {{convert|125000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Caltex Capetown Refinery (Chevref)]] ([[Caltex]]([[Chevron Corporation|Chevron]])), {{convert|100000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Natref Sasolburg Refinery]] ([[Sasol]]/[[Total S.A.|Total]]), {{convert|92000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Sasol I, II & III]] ([[Sasol]]), {{convert|150000|oilbbl/d|m3/d|abbr=on}}<br />
* [[PetroSA]] ([[Petroleum, Oil & Gas Corporation of South Africa]]), {{convert|45000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
Source: SAPI 2008 Annual Report http://www.sapia.co.za/pdf/2008-Sapia-AR.pdf<br />
<br />
===[[Sudan]]===<br />
* [[Khartoum Refinery]] ([[CNPC,Sudapet]]), {{convert|100000|oilbbl/d|m3/d|abbr=on}}<br />
* [[El Gily Refinery]] ([[CNPC]]), {{convert|50000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Port Sudan Refinery]] ([[CNPC]]), {{convert|21700|oilbbl/d|m3/d|abbr=on}}<br />
* [[El Obeid Refinery]] ([[CNPC]]), {{convert|10000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Tunisia]]===<br />
* [[Bizerte Refinery]] ([[STIR]]), {{convert|34000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Zambia]]===<br />
* Indeni Refinery (100% Government of Zambia), {{convert|23750|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Djibouti]]===<br />
* [[Doraleh oil refinery]] ([[efad, kuwait]]), {{convert|250000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
==Middle East==<br />
===[[Saudi Arabia]]===<br />
* Riyadh Refinery ([[Saudi Aramco]]), 120,000 bbl/d (19,000 m³/d)<br />
* Rabigh Refinery ([[Saudi Aramco]]), 400,000 bbl/d (64,000 m³/d)<br />
* Yanbu' Refinery ([[Saudi Aramco]]), 230,000 bbl/d (37,000 m³/d)<br />
* Jeddah Refinery ([[Saudi Aramco]]), 100,000 bbl/d (16,000 m³/d)<br />
* Ras Tanura Refinery ([[Saudi Aramco]]), 525,000 bbl/d (83,500 m³/d)<br />
* Aramco/Exxon Yanbu' Refinery (Saudi Aramco/ExxonMobil), 400,000 bbl/d (64,000 m³/d)<br />
* Aramco/Shell Jubail Refinery (Saudi Aramco/Shell)<br />
* Aramco/Total Jubail Refinery,400,000 bbl/d (64,000 m³/d)<br />
* Chevron<br />
* Aramco/ ConocoPhillips Refinery (still under construction)<br />
* khilji oil refinery<br />
<br />
===[[Iran]]===<br />
* [[Abadan Refinery]] ([[NIOC]]), {{convert|450000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Arak Refinery]] ([[NIOC]]), {{convert|150000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Tehran Refinery]] ([[NIOC]]), {{convert|225000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Isfahan Refinery]] ([[NIOC]]), {{convert|265000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Tabriz Refinery]] ([[NIOC]]), {{convert|112000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Shiraz Refinery]] ([[NIOC]]), {{convert|40000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Lavan Refinery]] ([[NIOC]]), {{convert|20000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Bandar Abbas Refinery]] ([[NIOC]]), {{convert|232000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Kermanshah refinery]] ([[NIOC]]),21,000 bpd<br />
<br />
===[[Iraq]]===<br />
* [[Basrah Refinery]] ([[INOC]]), {{convert|126000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Daurah Refinery]] ([[INOC]]), {{convert|100000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Kirkuk Refinery]] ([[INOC]]), {{convert|27000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Baiji Salahedden Refinery]] ([[INOC]]), {{convert|140000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Baiji North Refinery]] ([[INOC]]), {{convert|150000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Khanaqin/Alwand Refinery]] ([[INOC]]), {{convert|10500|oilbbl/d|m3/d|abbr=on}}<br />
* [[Samawah Refinery]] ([[INOC]]), {{convert|27000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Haditha Refinery]] ([[INOC]]), {{convert|14000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Muftiah Refinery]] ([[INOC]]), {{convert|4500|oilbbl/d|m3/d|abbr=on}}<br />
* [[Gaiyarah Refinery]] ([[INOC]]), {{convert|4000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Irbel Refinery]] ([[INOC]])<br />
<br />
===[[Israel]]===<br />
* [[Haifa Refinery]] ([[ORL]]), {{convert|180000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Ashdod Refinery]] ([[Paz Oil Company Ltd.|Paz]]), {{convert|95000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Kuwait]]===<br />
* [[Mina Al-Ahmadi Refinery]] ([[KNPC]]), {{convert|470000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Shuaiba Refinery]] ([[KNPC]]), {{convert|200000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Mina Abdullah Refinery]] ([[KNPC]]), {{convert|270000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Oman]]===<br />
* [[Mina Al Fahal]] [[Oman Refinery Company]] (ORC) {{convert|85000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Sohar Refinery Company]] (SRC) {{convert|116000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Dukum Refinery Company]] (DRC) 200,000 bpd (Proposed)<br />
<br />
===[[United Arab Emirates]]===<br />
* [[Al-Ruwais Refinery]] ([[Abu Dhabi Oil Refining Company]]), {{convert|280000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Umm Al-Narr Refinery]] ([[Abu Dhabi Oil Refining Company]]), {{convert|90000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Jebel Ali Refinery]] ([[ENOC]]), {{convert|120000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Hamriyah Sharjah Refinery]] ([[Sharjah Oil]]), {{convert|71300|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Qatar]]===<br />
* [[Um Said Refinery]] ([[QP Refinery]] 100%), {{convert|147000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Lafan Refinery]] ([[Qatar Petroleum]] 51%, [[ExxonMobil]] 10%, [[Total S.A.|Total]] 10%, [[Idemitsu]] 10%, [[Cosmo]] 10%, [[Mitsui]] 4.5%, [[Marubeni]] 4.5%), {{convert|146000|oilbbl/d|m3/d|abbr=on}}<br />
* [[AL-Shahene Refinery]] (2012), {{convert|250000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Bahrain]]===<br />
* [[Bapco Sitrah Refinery]] ([[Bapco]]), {{convert|267000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Yemen]]===<br />
* [[Aden Refinery]], ([[Aden Refinery Company]]), {{convert|120000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Marib Refinery]], ([[Yemen Hunt Oil Company]]), {{convert|10000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Jordan]]===<br />
* [[Jordan Refinery]] ,Zarqa, Az Zarqa, ([[Jordan Petrolum Refinery Company]]), {{convert|65000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
==Latin America==<br />
===[[Argentina]]===<br />
* [[La Plata Refinery]] ([[Repsol YPF]]) 189,000 bpd<br />
* [[Buenos Aires Refinery]] ([[Royal Dutch Shell]]) 110,000 bpd<br />
* [[Lujan de Cuyo Refinery]] ([[Repsol YPF]]) 105,500 bpd<br />
* [[Esso Campana Refinery]] ([[ExxonMobil]]) 84,500 bpd<br />
* [[San Lorenzo Refinery]] ([[Refisan S.A.]]) 38,000 bpd (start-up 1938)<br />
* [[Plaza Huincul Refinery]] ([[Repsol YPF]]) 37,190 bpd (start-up 1919)<br />
* [[Campo Duran Refinery]] ([[Refinor]]) 32,000 bpd<br />
* [[Bahia Blanca Refinery]] ([[Petrobras]]) 28,975 bpd<br />
<br />
===[[Bolivia]]===<br />
* [[Gualberto Villarael Cochabamba Refinery]] ([[YPFB]]) 40,000 bpd<br />
* [[Guillermo Elder Bell Santa Cruz Refinery]] ([[YPFB]]) 20,000 bpd<br />
* [[Carlos Montenegro Sucre Refinery]] ([[Refisur SA]]) 3,000 bpd<br />
<br />
* Reficruz {{convert|2000|oilbbl/d|m3/d|abbr=on}}<br />
* Refinería Oro Negro SA {{convert|2000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Brazil]]===<br />
* [[REFAP]] ([[Petrobras]] and [[Repsol YPF]]), [[Canoas]] {{convert|189000|oilbbl/d|m3/d|abbr=on}}<br />
* [[RECAP]] ([[Petrobras]]), [[Mauá]] {{convert|53000|oilbbl/d|m3/d|abbr=on}}<br />
* [[REPLAN]] ([[Petrobras]]), [[Paulínia]] {{convert|365000|oilbbl/d|m3/d|abbr=on}}<br />
* [[REVAP]] ([[Petrobras]]), [[São José dos Campos]] {{convert|251000|oilbbl/d|m3/d|abbr=on}}<br />
* [[RPBC]] ([[Petrobras]]), [[Cubatão]] {{convert|170000|oilbbl/d|m3/d|abbr=on}}<br />
* [[REDUC]] ([[Petrobras]]), [[Duque de Caxias]] {{convert|242000|oilbbl/d|m3/d|abbr=on}}<br />
* [[REMAN]] ([[Petrobras]]), [[Manaus]] {{convert|46000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Lubnor]] ([[Petrobras]]), [[Fortaleza]] {{convert|6000|oilbbl/d|m3/d|abbr=on}}<br />
* [[REGAP]] ([[Petrobras]]), [[Betim]] {{convert|151000|oilbbl/d|m3/d|abbr=on}}<br />
* [[REPAR]] ([[Petrobras]]), [[Araucária]] {{convert|189000|oilbbl/d|m3/d|abbr=on}}<br />
* [[RLAM]] ([[Petrobras]]), [[São Francisco do Conde]] {{convert|323000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Refinaria Ipiranga]] ([[Refinaria Riograndense]]), [[Pelotas]] {{convert|12500|oilbbl/d|m3/d|abbr=on}}<br />
* [[Refinaria Manguinhos]] ([[Grupo Peixoto de Castro]] and [[Repsol YPF]]), [[Rio de Janeiro]] {{convert|14000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Chile]]===<br />
* [[BioBio Refinery]] ([[Empresa Nacional de Petroleo]]), 113,000 bpd (start-up 1966)<br />
* [[Aconcagua Concon Refinery]] ([[Empresa Nacional de Petroleo]]), {{convert|97650|oilbbl/d|m3/d|abbr=on}}<br />
* [[Gregorio Refinery]] ([[Empresa Nacional de Petroleo]]), {{convert|14750|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Colombia]]===<br />
* [[Barrancabermeja-Santander Refinery]] ([[Ecopetrol]]), 252,000 bpd (start-up 1922), in process to expansion to 300,000 bpd and increase the conversion.<br />
* [[Cartagena Refinery]] ([[Reficar S.A.]]), 80,000 bpd (start-up 1957), in process expansion to 140,000 bpd<br />
* [[Apiay Refinery]] ([[Ecopetrol]]), {{convert|2250|oilbbl/d|m3/d|abbr=on}}<br />
* [[Orito Refinery]] ([[Ecopetrol]]), {{convert|1800|oilbbl/d|m3/d|abbr=on}}<br />
* [[Tibu Refinery]] ([[Ecopetrol]]), {{convert|1800|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Costa Rica]]===<br />
* [[Puerto Limón Refinery]] ([[Recope]]), 8,000 bpd (start-up 1967) 2006, {{convert|25000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Ecuador]]===<br />
* [[Esmeraldas Refinery]] ([[Petroecuador]]), 110,000 bpd (start-up 1978)<br />
* [[La Libertad Refinery]] ([[Petroecuador]]), {{convert|45000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Shushufindi Refinery]] ([[Petroecuador]]), {{convert|20000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[El Salvador]]===<br />
* [[Refineria Petrolera de Acajutla SA de CV]] ([[RASA]]) ([[ExxonMobil]]) 22,000 bpd (start-up 1962)<br />
<br />
===[[Nicaragua]]===<br />
* [[Cuesta del Plomo-Managua]] ([[ExxonMobil]]) 20,900 bpd (start-up 1962)<br />
<br />
===[[Paraguay]]===<br />
* [[Villa Elisa Refinery]] ([[Petropar]]) 7,500 bpd<br />
<br />
===[[Perú]]===<br />
* [[Refinería La Pampilla Lima]] ([[Repsol YPF]]) 102,000 bpd<br />
* [[Refinería de Talara]] ([[Petroperú]]) 65,000 bpd (start-up 1917) with FCC unit<br />
* [[Refinería Iquitos Loreto]] ([[Petroperú]]) 12,000 bpd (start-up 1982)<br />
* [[Refinería Conchan]] ([[Petroperú]]) 15,000 bpd (start-up 1961)<br />
* [[Refinería Purcallpa]] ([[Maple Gas]]) 3,250 bpd<br />
* [[Refinería El Milagro]] ([[Petroperú]]) 1,500 bpd (start-up 1994)<br />
* [[Refinería Shiviyacu]] ([[Pluspetrol]]) 2,000 bpd (start-up 1950)<br />
<br />
===[[Surinam]]===<br />
* [[Paramaribo]] ([[Staatsolie]]) 7,000 bpd<br />
<br />
===[[Uruguay]]===<br />
* [[La Teja Montevideo Refinery]] ([[ANCAP]]) 40,000 bpd (start-up 1937)<br />
<br />
===[[Venezuela]]===<br />
* [[Paraguana Refinery Complex (CRP)]] ([[PDVSA]]) 956,000 bdp (Amuay-Cardón-Bajo Grande) (start-up 1997)<br />
** [[Amuay Refinery (CRP)]] ([[PDVSA]]) 635,000 bpd (start-up 1950)<br />
** [[Cardón Refinery (CRP)]] ([[PDVSA]]) 305,000 bpd (start-up 1949)<br />
** [[Bajo Grande Refinery (CRP)]] ([[PDVSA]]) 16,000 bpd (start-up 1956)<br />
* [[Puerto La Cruz Refinery]] ([[PDVSA]]) 200,000 bpd (start-up 1948)<br />
* [[El Palito Refinery]] ([[PDVSA]]) 140,000 bpd (start-up 1954)<br />
* [[San Roque Refinery]] ([[PDVSA]]) 5,200 bpd<br />
<br />
* [[Upgraders]] (Extra Heavy Oil Joint Ventures with [[PDVSA]] at Jose)<br />
** [[Petrozuata]] ([[PDVSA]]) 140,000 bpd (start-up 2000)<br />
** [[Operadora Cerro Negro]] ([[ExxonMobil]], [[Aral AG]], and [[PDVSA]]) 120,000 bpd (start-up 2001)<br />
** [[Sincor]] ([[Total S.A.]], [[Statoil]], and [[PDVSA]]) 180,000 bpd (start-up 2001)<br />
** [[Ameriven]] ([[ConocoPhillips]], [[ChevronTexaco]], and [[PDVSA]]) 190,000 bpd (start-up 2004)<br />
<br />
==[[Caribbean]]==<br />
===[[Aruba]]===<br />
* [[Aruba Refinery]] ([[Valero Energy Corporation|Valero]]) 275,000 bpd<br />
<br />
===[[Cuba]]===<br />
* [[Nico Lopez Refinery]] ([[Cupet]]) 122,000 bpd<br />
* [[Hermanos Diaz Refinery]] ([[Cupet]]) 102,500 bpd<br />
* [[Cienfuegos Refinery]] ([[Cupet]]) 76,000 bpd<br />
<br />
===[[Netherlands Antilles]]===<br />
* [[Isla Refinery]] ([[PDVSA]]) 320,000 bpd<br />
<br />
===[[Dominican Republic]]===<br />
* [[Haina Refinery]] ([[REFIDOMSA]]) 33,000 bpd (start-up 1973)<br />
<br />
===[[Trinidad and Tobago]]===<br />
* [[Pointe-à-Pierre Refinery]] ([[Petrotrin]]) 165,000 bpd<br />
<br />
===[[US Virgin Islands]]===<br />
* [[St Croix Refinery]] ([[HOVENSA]]) 494,000 bpd<br />
<br />
===[[Jamaica]]===<br />
* [[Kingston Refinery]] ([[PCJ & PDVSA]]) 50,000 bpd<br />
<br />
==North America==<br />
===[[Canada]]===<br />
====[[Newfoundland and Labrador]]====<br />
* [[North Atlantic Refinery]], located in [[Come By Chance, Newfoundland and Labrador|Come by Chance]], ([[North Atlantic Refining]]), {{convert|115000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[Nova Scotia]]====<br />
* [[Imperial Oil Refinery]] - [[Dartmouth, Nova Scotia|Dartmouth]], ([[Imperial Oil]]), {{convert|89000|oilbbl/d|m3/d|abbr=on}}<br />
====[[New Brunswick]]====<br />
* [[Saint John Refinery, New Brunswick|Saint John]], ([[Irving Oil]]), {{convert|300000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[Quebec]]====<br />
* [[Montreal-East]], ([[Shell Canada]]), {{convert|161000|oilbbl/d|m3/d|abbr=on}}. [[Montreal East Refinery (Shell Canada)]]. On On June 4, 2010, Shell Canada officially announced the commencement to downgrade the refinery into a terminal, following the unsuccessful attempt to find a buyer to take over the plant.<ref>http://www.shell.ca/home/content/can-en/aboutshell/media_centre/news_and_media_releases/2010/june06_montreal_east_refinery.html</ref><br />
* [[Montreal]], ([[Suncor Energy]]), {{convert|160000|oilbbl/d|m3/d|abbr=on}}. Formerly [[Petro-Canada]] (before Aug 2009) and historically a [[Petrofina]] refinery. [[Montreal Refinery]]<br />
* [[Montreal]], Gulf Canada Oil, {{convert|70000|oilbbl/d|m3/d|abbr=on}} Closed in 1985 ans restarted in 2003. [[Montreal East Refinery (Gulf Oil Canada)]]<br />
* [[Lévis, Quebec|Lévis]], ([[Ultramar]]([[Valero Energy Corporation|Valero]])), {{convert|215000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[Ontario]]====<br />
* [[Nanticoke, Ontario|Nanticoke]], ([[Imperial Oil]]), {{convert|112000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Sarnia, Ontario|Sarnia]], ([[Imperial Oil]]), {{convert|115000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Sarnia, Ontario|Sarnia]], ([[Suncor Energy]]), {{convert|85000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Corunna]], ([[Shell Canada]]), {{convert|72000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
Lubricant Refinery<br />
* [[Mississauga, Ontario|Mississauga]], ([[Suncor Energy]]), {{convert|15600|oilbbl/d|m3/d|abbr=on}} - aka Clarkson Refinery - base oil production is 13,600 bpd of API Group II capacity and 2,000 bpd of API Group III capacity. Formerly [[Petro-Canada]] (before Aug 2009) and historically a Gulf refinery.<br />
<br />
====[[Saskatchewan]]====<br />
* [[CCRL Refinery Complex]], [[Regina, Saskatchewan|Regina]] ([[Consumers' Co-operative Refineries Limited]] (CCRL)), {{convert|100000|oilbbl/d|m3/d|abbr=on}}<br />
Upgraders (improve the quality of crude for sale at a higher price)<br />
* [[Husky Lloydminster Refinery]], [[Lloydminster]], ([[Husky Energy]]), {{convert|25000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Husky Lloydminster Upgrader]] [[Lloydminster]], ([[Husky Energy]]), {{convert|75000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[Alberta]]====<br />
* [[Imperial Oil Refinery (Edmonton)|Imperial Oil Refinery]], [[Edmonton]], ([[Imperial Oil]]), {{convert|187000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Scotford Refinery]], [[Scotford, Alberta|Scotford]], ([[Shell Canada]]), {{convert|100000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Edmonton, Alberta|Edmonton]], ([[Suncor Energy]]), {{convert|135000|oilbbl/d|m3/d|abbr=on}}. Formerly [[Petro-Canada]] (before Aug 2009).<br />
<br />
[[Bitumen Upgraders]] (turn [[bitumen]] into synthetic crude, which then must be further refined)<br />
* [[Scotford Upgrader]], [[Scotford, Alberta|Scotford]], (AOSP - [[Shell Canada]] 60%, [[Chevron Corporation]] 20%, [[Marathon Oil]] 20%), 250,000 bpd (located next to Shell Refinery) raw bitumen<br />
* [[Horizon Oil Sands]], [[Fort McMurray, Alberta|Fort McMurray]], ([[Canadian Natural Resources Limited]]), {{convert|110000|oilbbl/d|m3/d|abbr=on}} raw bitumen<br />
* [[Long Lake]], [[Fort McMurray, Alberta|Fort McMurray]], ([[OPTI Canada Inc.]] 35% and [[Nexen Inc.]] 65%), {{convert|70000|oilbbl/d|m3/d|abbr=on}} raw bitumen<br />
* [[Syncrude]], [[Fort McMurray, Alberta|Fort McMurray]], ([[Canadian Oil Sands Trust]], [[Imperial Oil]], [[Suncor]], [[Nexen]], [[Conoco Phillips]], [[Mocal Energy]] and [[Murphy Oil]]), {{convert|350000|oilbbl/d|m3/d|abbr=on}} raw bitumen<br />
* [[Suncor]], [[Fort McMurray, Alberta|Fort McMurray]], ([[Suncor]]), {{convert|350000|oilbbl/d|m3/d|abbr=on}} raw bitumen<br />
<br />
====[[British Columbia]]====<br />
* [[Burnaby]], ([[Chevron Corporation]]), {{convert|52000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Prince George, British Columbia|Prince George]], ([[Husky Energy]]), {{convert|12000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[United States]]===<br />
====[[Alabama]]====<br />
* [[Tuscaloosa Refinery]] ([[Hunt Refining Company]]), [[Tuscaloosa, Alabama|Tuscaloosa]] {{convert|52000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Saraland Refinery]] ([[Shell Oil Company]]), [[Saraland, Alabama|Saraland]] {{convert|80000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Mobile Refinery]] ([[Gulf Atlantic Refining & Marketing]]), [[Mobile, Alabama|Mobile]] {{convert|16700|oilbbl/d|m3/d|abbr=on}}<ref>http://www.eia.doe.gov/pub/oil_gas/petroleum/data_publications/refinery_capacity_data/historical/2006/table14.pdf</ref><br />
<br />
====[[Alaska]]====<br />
* [[Kenai Refinery]] ([[Tesoro]]), [[Kenai, Alaska|Kenai]] {{convert|72000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Valdez Refinery]] ([[Petro Star]]), [[Valdez, Alaska|Valdez]] {{convert|50000|oilbbl/d|m3/d|abbr=on}}<br />
* [[North Pole Refinery]] ([[Petro Star]]), [[North Pole, Alaska|North Pole]] {{convert|17000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Kuparuk Refinery]] ([[ConocoPhillips]]), [[Kuparuk, Alaska|Kuparuk]] {{convert|14400|oilbbl/d|m3/d|abbr=on}}<br />
* [[North Pole Refinery]] ([[Flint Hills Resources]]), [[North Pole, Alaska|North Pole]] {{convert|210000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Prudhoe Bay Refinery]] ([[BP]]), [[Prudhoe Bay oil field|Prudhoe Bay]] {{convert|12500|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[Arkansas]]====<br />
* [[El Dorado Refinery (Arkansas)|El Dorado Refinery]] ([[Lion Oil]]), [[El Dorado, Arkansas|El Dorado]] {{convert|70000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Smackover Refinery]] ([[Cross Oil]]), [[Smackover, Arkansas|Smackover]] {{convert|6800|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[California]]====<br />
* [[Bakersfield Refinery (Big West)|Bakersfield Refinery]] (Big West), [[Bakersfield, California|Bakersfield]], {{convert|66000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Bakersfield Refinery (Kern Oil)|Bakersfield Refinery]] ([[Kern Oil]]), [[Bakersfield, California|Bakersfield]], {{convert|25000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Bakersfield Refinery (San Joaquin)|Bakersfield Refinery]] ([[San Joaquin Refining Company]]), [[Bakersfield, California|Bakersfield]], {{convert|24300|oilbbl/d|m3/d|abbr=on}}<br />
* [[Benicia Refinery]] ([[Valero Energy Corporation|Valero]]), [[Benicia, California|Benicia]], {{convert|144000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Carson Refinery]] ([[BP]]), [[Carson, California|Carson]], {{convert|260000|oilbbl/d|m3/d|abbr=on}}<br />
* [[El Segundo Refinery]] ([[Chevron Corporation|Chevron]]), [[El Segundo, California|El Segundo]], {{convert|260000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Golden Eagle Refinery]] ([[Tesoro]]), near [[Martinez, California|Martinez]], {{convert|166000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Long Beach Refinery]] ([[Edgington Oil Company]]), [[Long Beach, California|Long Beach]], {{convert|26000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Martinez Refinery]] ([[Shell Oil Company]]), [[Martinez, California|Martinez]], {{convert|154900|oilbbl/d|m3/d|abbr=on}}<br />
* [[Oxnard Refinery]] ([[Tenby Inc]]), [[Oxnard, California|Oxnard]], {{convert|2800|oilbbl/d|m3/d|abbr=on}}<br />
* [[Paramount Refinery]] ([[Paramount Petroleum]]), [[Paramount, California|Paramount]], {{convert|50000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Richmond Refinery]] ([[Chevron Corporation|Chevron]]), [[Richmond, California|Richmond]], {{convert|242901|oilbbl/d|m3/d|abbr=on}}<br />
* [[Rodeo San Francisco Refinery]] ([[ConocoPhillips]]), [[Rodeo, California|Rodeo]], {{convert|100000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Santa Maria Refinery (ConocoPhillips)|Santa Maria Refinery]] ([[ConocoPhillips]]), [[Santa Maria, California|Santa Maria]], {{convert|41800|oilbbl/d|m3/d|abbr=on}}<br />
* [[Greka Energy#Asphalt refinery|Santa Maria Refinery]] ([[Greka Energy]]), [[Santa Maria, California|Santa Maria]], {{convert|9500|oilbbl/d|m3/d|abbr=on}}<br />
* [[South Gate Refinery]] ([[Lunday Thagard]]), [[South Gate, California|South Gate]], {{convert|8500|oilbbl/d|m3/d|abbr=on}}<br />
* [[Torrance Refinery]] ([[ExxonMobil]]), [[Torrance, California|Torrance]], {{convert|149000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Wilmington Asphalt Refinery]] ([[Valero Energy Corporation|Valero]]), [[Wilmington, Los Angeles, California|Wilmington]], {{convert|5900|oilbbl/d|m3/d|abbr=on}}<br />
* [[Wilmington Refinery (Tesoro)|Wilmington Refinery]] ([[Tesoro]]), [[Wilmington, Los Angeles, California|Wilmington]], {{convert|133100|oilbbl/d|m3/d|abbr=on}}<br />
* [[Wilmington Refinery (Shell)|Wilmington Refinery]] ([[Shell Oil Company]]), [[Wilmington, Los Angeles, California|Wilmington]], {{convert|98500|oilbbl/d|m3/d|abbr=on}}<br />
* [[Wilmington Refinery (Valero)|Wilmington Refinery]] ([[Valero Energy Corporation|Valero]]), [[Wilmington, Los Angeles, California|Wilmington]], {{convert|149000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[Georgia (U.S. state)|Georgia]]====<br />
* [[Savannah Refinery]] ([[NuStar]]), [[Savannah, Georgia|Savannah]] (Asphalt Refinery) 28,000 bpd<br />
* [[Douglasville Refinery]] ([[Young Refining]]), [[Douglasville, Georgia|Douglasville]] -- [http://www.eia.doe.gov/pub/oil_gas/petroleum/data_publications/petroleum_supply_annual/psa_volume1/current/pdf/table_48.pdf shutdown 07/04]<br />
<br />
====[[Hawaii]]====<br />
* [[Kapolei Refinery]] ([[Tesoro]]), [[Kapolei, Hawaii|Kapolei]] {{convert|93500|oilbbl/d|m3/d|abbr=on}}<br />
* [[Hawaii Refinery]] ([[Chevron Corporation|Chevron]]), [[Kapolei, Hawaii|Kapolei]] {{convert|54000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[Illinois]]====<br />
* [[Lemont Refinery]] ([[Citgo]]), [[Romeoville, Illinois|Romeoville]] {{convert|160000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Joliet Refinery]] ([[ExxonMobil]]), [[Joliet, Illinois|Joliet]] {{convert|238000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Robinson Refinery]] ([[Marathon Petroleum Company]]), [[Robinson, Illinois|Robinson]] {{convert|215000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Wood River Refinery]] ([[ConocoPhillips]]), [[Wood River, Illinois|Wood River]] {{convert|306000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[Indiana]]====<br />
* [[Whiting Refinery]] ([[BP]]), [[Whiting, Indiana|Whiting]] {{convert|405000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Mount Vernon Refinery]] ([[Countrymark Co-op]]), [[Mount Vernon, Indiana|Mount Vernon]] {{convert|23000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[Kansas]]====<br />
* [[Coffeyville Refinery]] ([[Coffeyville Resources LLC]]), [[Coffeyville, Kansas|Coffeyville]] {{convert|112000|oilbbl/d|m3/d|abbr=on}}<br />
* [[El Dorado Refinery (Kansas)|El Dorado Refinery]] ([[Frontier Oil]]), [[El Dorado, Kansas|El Dorado]] {{convert|120000|oilbbl/d|m3/d|abbr=on}}<br />
* [[McPherson Refinery]] ([[National Cooperative Refinery Association|NCRA]]), [[McPherson, Kansas|McPherson]] {{convert|81200|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[Kentucky]]====<br />
* [[Catlettsburg Refinery]] ([[Marathon Petroleum Company]]), [[Catlettsburg, Kentucky|Catlettsburg]] {{convert|222000|oilbbl/d|m3/d|abbr=on}}<br />
* [[HDG International Group|HDG International Group Refinery]], [[Perry, Kentucky|Perry]] {{convert|195500|oilbbl/d|m3/d|abbr=on}}<br />
* [[Somerset Refinery]], [[Somerset, Kentucky|Somerset]] {{convert|5500|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[Louisiana]]====<br />
* [[Alliance Refinery]] ([[ConocoPhillips]]), [[Belle Chasse, Louisiana|Belle Chasse]] 250,000<br />
* [[Baton Rouge Refinery]] ([[ExxonMobil]]), [[Baton Rouge, Louisiana|Baton Rouge]] {{convert|503000|oilbbl/d|m3/d|abbr=on}} <br />
* [[Chalmette Refinery]] ([[Chalmette Refining LLC, joint venture of ExxonMobil and PDVSA]]), [[Chalmette, Louisiana|Chalmette]] {{convert|193000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Convent Refinery]] ([[Motiva Enterprises]]), [[Convent, Louisiana|Convent]] {{convert|255000|oilbbl/d|m3/d|abbr=on}} <br />
* [[Cotton Valley Refinery]] ([[Calumet Lubricants]]), [[Cotton Valley, Louisiana|Cotton Valley]] {{convert|13000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Garyville Refinery]] ([[Marathon Petroleum Company]]), near [[Garyville, Louisiana|Garyville]] {{convert|436000|oilbbl/d|m3/d|abbr=on}} <br />
* [[Krotz Springs Refinery]] ([[Alon USA Energy|Alon]]), [[Krotz Springs, Louisiana|Krotz Springs]] {{convert|85000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Lake Charles Refinery (Calcasieu Refining)|Lake Charles Refinery]] ([[Calcasieu Refining]]), [[Lake Charles, Louisiana|Lake Charles]] {{convert|30000|oilbbl/d|m3/d|abbr=on}} <br />
* [[Lake Charles Refinery (Citgo)|Lake Charles Refinery]] ([[Citgo]]), [[Lake Charles, Louisiana|Lake Charles]] 425,000 <br />
* [[Lake Charles Refinery]] ([[ConocoPhillips]]), [[Westlake, Louisiana|Westlake]] 247,000<br />
* [[Meraux Refinery]] ([[Murphy Oil]]), [[Meraux, Louisiana|Meraux]] {{convert|125000|oilbbl/d|m3/d|abbr=on}} <br />
* [[Norco Refinery]] ([[Motiva Enterprises]]), [[Norco, Louisiana|Norco]] {{convert|242000|oilbbl/d|m3/d|abbr=on}} <br />
* [[Port Allen Refinery]] ([[Placid Refining]]), [[Port Allen, Louisiana|Port Allen]] {{convert|48500|oilbbl/d|m3/d|abbr=on}}<br />
* [[Princeton Refinery]] ([[Calumet Lubricants]]), [[Princeton, Louisiana|Princeton]] {{convert|8300|oilbbl/d|m3/d|abbr=on}}<br />
* [[Shreveport Refinery]] ([[Calumet Lubricants]]), [[Shreveport, Louisiana|Shreveport]] {{convert|35000|oilbbl/d|m3/d|abbr=on}}<br />
* [[St. Charles Refinery]] ([[Valero Energy Corporation|Valero]]), [[Norco, Louisiana|Norco]] {{convert|260000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[Michigan]]====<br />
* [[Detroit Refinery]] ([[Marathon Petroleum Company]]), [[Detroit, Michigan|Detroit]] {{convert|100000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[Minnesota]]====<br />
* [[Pine Bend Refinery]] ([[Flint Hills Resources]]), [[Rosemount, Minnesota|Rosemount]] {{convert|265000|oilbbl/d|m3/d|abbr=on}}<br />
* [[St. Paul Park Refinery]] ([[Marathon Petroleum Company]]), [[St. Paul Park, Minnesota|St. Paul Park]] {{convert|70000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[Mississippi]]====<br />
* [[Lumberton Refinery]] ([[Hunt Southland Refining]]), [[Lumberton, Mississippi|Lumberton]] {{convert|5800|oilbbl/d|m3/d|abbr=on}}<br />
* [[Pascagoula Refinery]] ([[Chevron Corporation|Chevron]]), [[Pascagoula, Mississippi|Pascagoula]] {{convert|325000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Vicksburg Refinery]] ([[Ergon (US)|Ergon]]), [[Vicksburg, Mississippi|Vicksburg]] {{convert|23000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Rogerslacy Refinery]] ([[Hunt Southland Refining]]), [[Sandersville, Mississippi|Sandersville]] {{convert|11000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[Montana]]====<br />
* [[Billings Refinery (ConocoPhillips)|Billings Refinery]] ([[ConocoPhillips]]), [[Billings, Montana|Billings]] {{convert|58000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Billings Refinery (ExxonMobil)|Billings Refinery]] ([[ExxonMobil]]), [[Billings, Montana|Billings]] {{convert|60000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Montana Refining Company]] (Connacher Oil & Gas Limited), [[Great Falls, Montana|Great Falls]] {{convert|9500|oilbbl/d|m3/d|abbr=on}}<br />
* [[Laurel Refinery]] ([[Cenex]]), [[Laurel, Montana|Laurel]] {{convert|55000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[Nevada]]====<br />
* [[Eagle Springs Refinery]] ([[Foreland Refining]]), [[Currant, Nevada|Currant]] {{convert|1700|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[New Jersey]]====<br />
* [[Bayway Refinery]] ([[ConocoPhillips]]), [[Linden, New Jersey|Linden]] {{convert|230000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Eagle Point Refinery]] ([[Sunoco]]), [[Westville, New Jersey|Westville]] {{convert|145000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Paulsboro Asphalt Refinery]] ([[NuStar]]), [[Paulsboro, New Jersey|Paulsboro]] {{convert|51000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Paulsboro Refinery]] ([[Valero Energy Corporation|Valero]]), [[Paulsboro, New Jersey|Paulsboro]] {{convert|160000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Perth Amboy Refinery]] ([[Chevron Corporation|Chevron]]), [[Perth Amboy, New Jersey|Perth Amboy]] {{convert|80000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Port Reading Refinery]] ([[Hess Corporation|Hess]]), [[Port Reading, New Jersey|Port Reading]] {{convert|62000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[New Mexico]]====<br />
* [[Artesia Refinery]] ([[Holly Corporation]] via Navajo Refining), [[Artesia, New Mexico|Artesia]] {{convert|100000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Bloomfield Refinery]] ([[Western Refining]]), [[Bloomfield, New Mexico|Bloomfield]] {{convert|16800|oilbbl/d|m3/d|abbr=on}}<br />
* [[Gallup Refinery]] ([[Western Refining]]), [[Gallup, New Mexico|Gallup]] {{convert|26000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Lovington Refinery]] ([[Holly Corporation]]), [[Lovington, New Mexico|Lovington]]<br />
<br />
====[[North Dakota]]====<br />
* [[Mandan Refinery]] ([[Tesoro]]), [[Mandan, North Dakota|Mandan]] {{convert|60000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[Ohio]]====<br />
* [[Canton Refinery]] ([[Marathon Petroleum Company]]), [[Canton, Ohio|Canton]] {{convert|73000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Lima Refinery]] ([[Husky Energy]]), [[Lima, Ohio|Lima]] {{convert|158400|oilbbl/d|m3/d|abbr=on}}<br />
* [[Toledo Refinery (BP)|Toledo Refinery]] ([[BP/Husky Oil]]), [[Toledo, Ohio|Toledo]] {{convert|160000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Toledo Refinery (Sunoco)|Toledo Refinery]] ([[Sunoco]]), [[Toledo, Ohio|Toledo]] {{convert|160000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[Oklahoma]]====<br />
* [[Ardmore Refinery]] ([[Valero Energy Corporation|Valero]]), [[Ardmore, Oklahoma|Ardmore]] {{convert|74700|oilbbl/d|m3/d|abbr=on}}<br />
* [[Ponca City Refinery]] ([[ConocoPhillips]]), [[Ponca City, Oklahoma|Ponca City]] {{convert|194000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Tulsa Refinery (Sinclair)|Tulsa Refinery]] ([[Sinclair Oil]]), [[Tulsa, Oklahoma|Tulsa]] {{convert|70300|oilbbl/d|m3/d|abbr=on}}<br />
* [[Tulsa Refinery (Holly Corporation)|Tulsa Refinery]] ([[Holly Corporation]]), [[Tulsa, Oklahoma|Tulsa]] {{convert|83200|oilbbl/d|m3/d|abbr=on}}<br />
* [[Wynnewood Refinery]], [[Wynnewood, Oklahoma|Wynnewood]] {{convert|71700|oilbbl/d|m3/d|abbr=on}}<br />
* [[Ventura Refining and Transmission]], [[Thomas, Oklahoma|Thomas]] {{convert|14000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[Pennsylvania]]====<br />
* [[Bradford Refinery]] ([[American Refining Group]]), [[Bradford, Pennsylvania|Bradford]] {{convert|10000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Marcus Hook Refinery]] ([[Sunoco]]), [[Marcus Hook, Pennsylvania|Marcus Hook]] {{convert|175000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Philadelphia Refinery]] ([[Sunoco]]), [[Philadelphia]] {{convert|335000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Penreco]] ([[Calumet]]), [[Karns City, Pennsylvania|Karns City]]<br />
* [[Trainer Refinery]] ([[ConocoPhillips]]), [[Trainer, Pennsylvania|Trainer]] {{convert|185000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Warren Refinery]], [[United Refining Company]], [[Warren, Pennsylvania|Warren]] {{convert|70000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Wamsutta Oil Refinery]] (historical), [[McClintocksville, Pennsylvania|McClintocksville]]<br />
* [[Hess oil Refinery]]<br />
<br />
====[[Tennessee]]====<br />
* [[Memphis Refinery]] ([[Valero Energy Corporation|Valero]]), [[Memphis, Tennessee|Memphis]] {{convert|180000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[Texas]]====<br />
* [[Baytown Refinery]] ([[ExxonMobil]]), [[Baytown, Texas|Baytown]] {{convert|557000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Big Spring Refinery]] ([[Alon USA]]), [[Big Spring, Texas|Big Spring]] {{convert|61000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Beaumont Refinery]] ([[ExxonMobil]]), [[Beaumont, Texas|Beaumont]] {{convert|348500|oilbbl/d|m3/d|abbr=on}}<br />
* [[Borger Refinery]] ([[ConocoPhillips]]/[[EnCana]]), [[Borger, Texas|Borger]] {{convert|146000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Corpus Christi Complex]] ([[Flint Hills Resources]]), [[Corpus Christi, Texas|Corpus Christi]] {{convert|288000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Corpus Christi Refinery (Citgo)|Corpus Christi Refinery]] ([[Citgo]]), [[Corpus Christi, Texas|Corpus Christi]] {{convert|156000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Corpus Christi West Refinery (Valero)|Corpus Christi West Refinery]] ([[Valero Energy Corporation|Valero]]), [[Corpus Christi, Texas|Corpus Christi]] {{convert|142000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Corpus Christi East Refinery (Valero)|Corpus Christi East Refinery]] ([[Valero Energy Corporation|Valero]]), [[Corpus Christi, Texas|Corpus Christi]] {{convert|115000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Deer Park Refinery]] ([[Shell Oil Company]]), [[Deer Park, Texas|Deer Park]] {{convert|333700|oilbbl/d|m3/d|abbr=on}}<br />
* [[El Paso Refinery]] ([[Western Refining]]), [[El Paso, Texas|El Paso]] {{convert|120000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Houston Refinery (Lyondell)|Houston Refinery]] ([[Lyondell Chemical Company|Lyondell]]), [[Houston, Texas|Houston]] {{convert|270200|oilbbl/d|m3/d|abbr=on}}<br />
<!-- * (( Houston Refinery ( US Energy Markets )) ( Buy Instantly ) Houston, Texas Newport Beach California )) --><br />
* [[Houston Refinery (Valero)|Houston Refinery]] ([[Valero Energy Corporation|Valero]]), [[Houston, Texas|Houston]] {{convert|83000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Independent Refinery]] ([[Strategic Northern|Stratnor]]), [[Houston, Texas|Houston]] {{convert|100000|oilbbl/d|m3/d|abbr=on}}<br />
* [[McKee Refinery]] ([[Valero Energy Corporation|Valero]]), [[Sunray, Texas|Sunray]] {{convert|158300|oilbbl/d|m3/d|abbr=on}}<br />
* [[Pasadena Refinery]] ([[Petrobras]]), [[Pasadena, Texas|Pasadena]] {{convert|100000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Port Arthur Refinery (Total)|Port Arthur Refinery]] ([[Total S.A.|Total]]), [[Port Arthur, Texas|Port Arthur]] {{convert|174000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Port Arthur Refinery (Motiva)|Port Arthur Refinery]] ([[Motiva Enterprises]]), [[Port Arthur, Texas|Port Arthur]] {{convert|285000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Port Arthur Refinery (Valero)|Port Arthur Refinery]] ([[Valero Energy Corporation|Valero]]), [[Port Arthur, Texas|Port Arthur]] {{convert|325000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Penreco (Calumet)|Penreco]] ([[Calumet]]), [[Houston, Texas|Houston]]<br />
* [[San Antonio Refinery]] ([[Age Refining]]), [[San Antonio, Texas|San Antonio]] {{convert|10300|oilbbl/d|m3/d|abbr=on}}<br />
* [[Sweeny Refinery]] ([[ConocoPhillips]]), [[Sweeny, Texas|Sweeny]] {{convert|229000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Texas City Refinery (BP)|Texas City Refinery]] ([[BP]]), [[Texas City, Texas|Texas City]] {{convert|460000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Texas City Refinery (Marathon)|Texas City Refinery]] ([[Marathon Petroleum Company]]), [[Texas City, Texas|Texas City]] {{convert|72000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Texas City Refinery (Valero)|Texas City Refinery]] ([[Valero Energy Corporation|Valero]]), [[Texas City, Texas|Texas City]] {{convert|210000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Three Rivers Refinery]] ([[Valero Energy Corporation|Valero]]), [[Three Rivers, Texas|Three Rivers]] {{convert|90000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Tyler Refinery]] ([[Delek Refining Ltd.]]), [[Tyler, Texas|Tyler]] {{convert|55000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[Utah]]====<br />
* [[North Salt Lake Refinery]] ([[Flying J|Big West Oil]]), [[North Salt Lake, Utah|North Salt Lake]] {{convert|35000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Salt Lake City Refinery]] ([[Chevron Corporation|Chevron]]), [[Salt Lake City, Utah|Salt Lake City]] {{convert|45000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Salt Lake City Refinery (Tesoro)|Salt Lake City Refinery]] ([[Tesoro]]), [[Salt Lake City, Utah|Salt Lake City]] {{convert|58000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Woods Cross Refinery (Holly)|Woods Cross Refinery]] ([[Holly Corporation]]), [[Woods Cross, Utah|Woods Cross]] {{convert|26000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Woods Cross Refinery (Silver Eagle)|Woods Cross Refinery]] ([[Silver Eagle Refining]]), [[Woods Cross, Utah|Woods Cross]] {{convert|10200|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[Virginia]]====<br />
* [[Yorktown Refinery]] ([[Western Refining]]), [[Yorktown, Virginia|Yorktown]] {{convert|58600|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[Washington (U.S. state)|Washington]]====<br />
* [[Tesoro Anacortes Refinery]] ([[Tesoro]]), [[Anacortes, Washington|Anacortes]] {{convert|108000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Shell Anacortes Refinery]] ([[Shell Oil Company]]), [[Anacortes, Washington|Anacortes]] {{convert|145000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Cherry Point Refinery]] ([[BP]]), [[Blaine, Washington|Blaine]] {{convert|225000|oilbbl/d|m3/d|abbr=on}}<br />
* [[ConocoPhillips Ferndale Refinery]] ([[ConocoPhillips]]), [[Ferndale, Washington|Ferndale]] {{convert|105000|oilbbl/d|m3/d|abbr=on}}<br />
* [[U.S. Oil and Refining|Tacoma Refinery]] ([[U.S. Oil and Refining]]), [[Tacoma, Washington|Tacoma]] {{convert|35000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[West Virginia]]====<br />
* [[Newell Refinery]] ([[Ergon (US)|Ergon]]), [[Newell, West Virginia|Newell]] {{convert|19400|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[Wisconsin]]====<br />
* [[Superior Refinery]] ([[Murphy Oil]]), [[Superior, Wisconsin|Superior]] {{convert|33000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
====[[Wyoming]]====<br />
* [[Cheyenne Refinery]] ([[Frontier Oil]]), [[Cheyenne, Wyoming|Cheyenne]] {{convert|52000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Evanston Refinery]] ([[Silver Eagle Refining]]), [[Evanston, Wyoming|Evanston]] {{convert|3000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Evansville Refinery]] ([[Sinclair Oil|Little America Refining]]), [[Evansville, Wyoming|Evansville]] {{convert|24500|oilbbl/d|m3/d|abbr=on}}<br />
* [[Newcastle Refinery]] ([[Wyoming Refining]]), [[Newcastle, Wyoming|Newcastle]] {{convert|12500|oilbbl/d|m3/d|abbr=on}}<br />
* [[Sinclair Refinery]] ([[Sinclair Oil]]), [[Sinclair, Wyoming|Sinclair]] {{convert|66000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Mexico]]===<br />
* [[Minatitlan Refinery]] ([[Pemex]]) 167,000 bpd<br />
* [[Cadereyta Refinery]] ([[Pemex]]) 217,000 bpd<br />
* [[Tula Refinery]] ([[Pemex]]) 290,000 bpd<br />
* [[Salamanca Refinery]] ([[Pemex]]) 192,000 bpd<br />
* [[Ciudad Madero Refinery]] ([[Pemex]]) 152,000 bpd<br />
* [[Salina Cruz Refinery]] ([[Pemex]]) 227,000 bpd<br />
<br />
==Europe==<br />
===[[Austria]]===<br />
* [[Schwechat Refinery]], ([[OMV]]), {{convert|175000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Azerbaijan]]===<br />
* [[Haydar Aliev Refinery]] ([[SOCAR]]), {{convert|200000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Azerineftyag Refinery]] ([[SOCAR]]), {{convert|239000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Bosnia and Herzegovina]]===<br />
* [[Bosanski Brod Refinery]]<br />
<br />
===[[Belarus]]===<br />
* [[Mozyr Refinery]], ([[Slavneft]]),[http://www.mnpz.by/en/] {{convert|95000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Novopolotsk Refinery]], ([[Naftan]]), [http://www.naftan.by/oldsite/desktopdefault.aspx?lang=en] {{convert|88000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Belgium]]===<br />
* [[Total Antwerp Refinery]], ([[Total S.A.|Total]]), {{convert|360000|oilbbl/d|m3/d|abbr=on}}<br />
* [[ExxonMobil Antwerp Refinery]], ([[ExxonMobil]]), {{convert|333000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Antwerp N.V. Refinery]], ([[Petroplus]]), {{convert|35000|oilbbl/d|m3/d|abbr=on}}<br />
* [[BRC Antwerp]] ([[Petroplus]]), {{convert|115000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Bulgaria]]===<br />
* [[LUKOIL Neftochim Burgas]], ([[LUKOIL]]), {{convert|208000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Czech Republic]]===<br />
* [[Kralupy Refinery]], ([[Ceská Rafinérská]]), {{convert|55000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Litvinov Refinery]], ([[Ceská Rafinérská]]), {{convert|120000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Pardubice Refinery]], ([[PARAMO - www.paramo.cz]]), {{convert|15000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Denmark]]===<br />
* [[Kalundborg Refinery]], ([[Statoil]]), {{convert|110000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Fredericia Refinery]], ([[Royal Dutch Shell]]), {{convert|68000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Finland]]===<br />
* [[Porvoo Refinery]], ([[Neste Oil|Neste Oil Oyj]]), {{convert|206000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Naantali Refinery]], ([[Neste Oil|Neste Oil Oyj]]), {{convert|58000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[France]]===<br />
* [[Gonfreville l'Orcher Refinery]], ([[Total S.A.|Total]]), {{convert|343000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Provence Refinery]], ([[Total S.A.|Total]]), {{convert|155000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Normandy Refinery]], ([[Total S.A.|Total]]), {{convert|350000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Flandres Refinery]], ([[Total S.A.|Total]]), {{convert|160000|oilbbl/d|m3/d|abbr=on}} going to be closed<br />
* [[Donges Refinery]], ([[Total S.A.|Total]]), {{convert|231000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Feyzin Refinery]], ([[Total S.A.|Total]]), {{convert|119000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Grandpuits Refinery]], ([[Total S.A.|Total]]), {{convert|99000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Port Jérôme-Gravenchon Refinery]], ([[ExxonMobil]]), {{convert|270000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Fos-sur-Mer Refinery]], ([[ExxonMobil]]), {{convert|140000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Reichstett Refinery]], ([[Petroplus]]), {{convert|77000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Petit Couronne Refinery]], ([[Petroplus]]), {{convert|142000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Berre L'Etang Refinery]], ([[Royal Dutch Shell]]), {{convert|80000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Lavera Marseilles Refinery]], ([[Ineos]]), {{convert|220000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Fort de France Refinery]], ([[Total S.A.|Total]]), {{convert|0|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Germany]]===<br />
* [[Schwedt Refinery]] ([[PCK Raffinerie]]([[Royal Dutch Shell|Shell]]/[[PDVSA]]/[[BP]]/[[AET (company)|AET]]), {{convert|210000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Ingolstadt Refinery]] ([[Bayernoil]]([[OMV]]/[[Agip]]/[[PDVSA]]/[[BP]])), {{convert|262000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Ingolstadt Refinery]] ([[Petroplus]]), {{convert|110000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Ruhr Öl Refinery]] ([[PDVSA]]/[[BP]]), {{convert|246000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Buna SOW Leuna Refinery]] ([[Total S.A.|Total]]), {{convert|222000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Wilhelmshaven Refinery]] ([[ConocoPhillips]]), {{convert|300000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Rheinland Werk Godorf Cologne Refinery]] ([[Royal Dutch Shell]]), {{convert|190000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Rheinland Werk Wesseling Cologne Refinery]] ([[Royal Dutch Shell]]), {{convert|160000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Mineralölraffinerie Karlsruhe Refinery]] ([[MiRo]]([[Royal Dutch Shell|Shell]]/[[ExxonMobil]]/[[PDVSA]]/[[BP]]/[[Conoco]])) 285,000 bpd<br />
* [[Burghausen Refinery]] ([[OMV]]) 70,000 bpd<br />
* [[Mitteldeutschland Spergau Refinery]] ([[Total S.A.|Total]]) 227,000 bpd<br />
* [[Emsland Lingen Refinery]] ([[BP]]) 80,000 bpd<br />
* [[Elbe Mineralölwerke Hamburg-Harburg Refinery]] ([[Royal Dutch Shell]])<br />
* [[Erdölwerk Holstein Heide Refinery]] ([[Royal Dutch Shell]])<br />
<br />
http://www.mwv.de/cms/front_content.php?idcat=24&idart=123 External list<br />
<br />
===[[Greece]]===<br />
* [[Aspropyrgos Refinery]], ([[Hellenic Petroleum]]), {{convert|135000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Elefsina Refinery]], ([[Hellenic Petroleum]]), {{convert|100000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Thessaloniki Refinery]], ([[Hellenic Petroleum]]), {{convert|66500|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Hungary]]===<br />
* [[Szazhalombatta Refinery]], ([[MOL Group|MOL]]), {{convert|161000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Ireland]]===<br />
* [[Whitegate Refinery]], ([[ConocoPhillips]]), {{convert|71000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Italy]]===<br />
* [[Esso Trecate, Novara Refinery]], ([[ExxonMobil]] 74.1%/[[ERG]] 25.9%), {{convert|200000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Esso Augusta Refinery]], ([[ExxonMobil]]), {{convert|190000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Sarroch Refinery]], ([[Saras SPA]]), {{convert|300000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Rome Refinery]], ([[Total S.A.|Total]] 77.5%/[[ERG]] 22.5%), {{convert|90000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Falconara Marittima Ancona Refinery]], ([[APIOIL]]), {{convert|85000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Mantova Refinery]], ([[IESItaliana]]), {{convert|55000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Impianti Sud Refinery]], ([[ISAB ERG]]), {{convert|214000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Impianti Nord Refinery]], ([[ISAB ERG]]), {{convert|160000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Milazzo Refinery]], ([[ENI]]/[[KNPC]]) 80,000 bpd<br />
* [[Sannazzaro de' Burgondi Refinery]], ([[ENI]]) 160,000 bpd<br />
* [[Gela Refinery]], ([[ENI]]) 100,000 bpd<br />
* [[Taranto Refinery]], ([[ENI]]) 90,000 bpd<br />
* [[Livorno Refinery]], ([[ENI]]) 84,000 bpd<br />
* [[Porto Marghera Venice Refinery]], ([[ENI]]) 70,000 bpd<br />
* [[Cremona Refiney]], ([[Tamoil]]) 80,000 bpd<br />
* Iplom [http://www.iplom.it] Busalla, Genoa<br />
<br />
===[[Lithuania]]===<br />
* [[Mazeikiu Refinery]], ([[Mazeikiu Nafta]] - [[PKN Orlen]]), {{convert|263000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Republic of Macedonia|Macedonia]]===<br />
* [[OKTA Skopje Refinery]], ([[Hellenic Petroleum]]), {{convert|50000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Norway]]===<br />
* [[Slagen Refinery]], ([[ExxonMobil]]), {{convert|110000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Mongstad Refinery]], ([[StatoilHydro]]), {{convert|200000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Poland]]===<br />
* [[Plock Refinery]], ([[PKN Orlen]]), {{convert|276000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Gdansk Refinery]], ([[Grupa LOTOS]]), {{convert|210000|oilbbl/d|m3/d|abbr=on}}, (processing capacity after second distillation startup in 1Q2010).<br />
* [[Czechowice Refinery]], ([[Grupa LOTOS]]), {{convert|12000|oilbbl/d|m3/d|abbr=on}}, crude oil processing terminated 1Q2006.<br />
* [[Trzebinia]] Refinery, ([[PKN Orlen]]), {{convert|4000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Jaslo Oil Refinery]] , ([[Grupa LOTOS]]), {{convert|3000|oilbbl/d|m3/d|abbr=on}}, crude oil processing terminated 4Q2008.<br />
* [[Jedlicze Refinery]], ([[PKN Orlen]]), {{convert|2800|oilbbl/d|m3/d|abbr=on}}<br />
* [[Glimar Refinery]], ([[bankrupt]]), {{convert|3400|oilbbl/d|m3/d|abbr=on}}, all operations (incl. crude oil processing) terminated 2005.<br />
<br />
===[[Portugal]]===<br />
* [[Porto Refinery]], ([[Galp Energia]]), {{convert|100000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Sines Refinery]], ([[Galp Energia]]), {{convert|200000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Romania]]===<br />
* [[Arpechim Refinery]] Piteşti, ([[Petrom]]/[[OMV]]), {{convert|70000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Astra Refinery]], ([[Interagro]]), closed for preservation , {{convert|20000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Petrobrazi Refinery]] Ploieşti, ([[Petrom]]/[[OMV]]), {{convert|90000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Petromidia Constanţa Refinery]], ([[Rompetrol]]), {{convert|100000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Petrotel Lukoil Refinery]] Ploieşti, ([[LUKOIL]]), {{convert|68000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Petrolsub Suplacu de Barcău Refinery]], ([[Petrom]]/[[OMV]]), {{convert|15000|oilbbl/d|m3/d|abbr=on}}<br />
* [[RAFO Oneşti]], ([[Calder A]]), {{convert|70000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Steaua Romană Câmpina Refinery]], ([[Omnimpex Chemicals]]), {{convert|15000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Vega Ploieşti Refinery]], ([[Rompetrol]]), {{convert|20000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Russia]]===<br />
Refineries with capacity more than {{convert|20000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
'''Europe'''<br />
<br />
* [[Syzran Refinery]], ([[Rosneft]]), {{convert|213400|oilbbl/d|m3/d|abbr=on}}<br />
* [[Novokuibyshevsk Refinery]], ([[Rosneft]]), {{convert|191500|oilbbl/d|m3/d|abbr=on}}<br />
* [[Kuibyshev Oil Refinery]], ([[Rosneft]]), {{convert|139800|oilbbl/d|m3/d|abbr=on}}<br />
* [[Salavatnefteorgsintez Refinery]], ([[Gazprom]], [[Salavat]]), {{convert|250000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Volgograd Refinery]], ([[LUKOIL]]), {{convert|193000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Ukhta Refinery]], ([[LUKOIL]]), {{convert|72000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Perm Refinery]], ([[LUKOIL]]), {{convert|235000|oilbbl/d|m3/d|abbr=on}}<br />
* [[NORSI-oil]], ([[LUKOIL]], [[Kstovo]]), {{convert|292000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Ryazan Refinery]], ([[TNK-BP]]), {{convert|253000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Orsk Refinery]], ([[Russneft]]), {{convert|159000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Saratov Refinery]], ([[TNK-BP]]), {{convert|108000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Moscow Refinery]], ([[Gazprom Neft]]/[[Central Fuel Company]]/[[Tatneft]]), {{convert|213000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Kirishi Refinery]], ([[Surgutneftegas]]), {{convert|337000|oilbbl/d|m3/d|abbr=on}}<br />
* [[YaNOS Yaroslavl Refinery]], ([[Slavneft]]), {{convert|132000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Krasnodar Refinery]], ([[Russneft]]), {{convert|58000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Tuapse Refinery]], ([[Rosneft]]), {{convert|85000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Nizhnekamsk Refinery]], ([[TAIF]]), {{convert|14000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Ufa Refinery]], ([[Bashneft]]), {{convert|190000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Novo-Ufa Refinery]], ([[Bashneft]]), {{convert|380000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Ufaneftekhim Refinery]], ([[Bashneft]]), {{convert|250000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
'''Asia'''<br />
* [[Achinsk Refinery]], ([[Rosneft]]), {{convert|131000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Angarsk Petrochemical Refinery]], ([[Rosneft]]), {{convert|384000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Khabarovsk Refinery]], ([[Alliance]]), {{convert|85000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Komsomolsk Refinery]], ([[Rosneft]]), {{convert|120000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Nizhnevartovsk Refinery]], ([[TNK-BP]]), {{convert|25100|oilbbl/d|m3/d|abbr=on}}<br />
* [[Omsk Refinery]], ([[Gazprom Neft]]), {{convert|380000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Serbia]]===<br />
* [[Pančevo Refinery]] ([[Naftna Industrija Srbije]]), <br />
* [[Novi Sad Refinery]] ([[Naftna Industrija Srbije]]),<br />
<br />
===[[Slovakia]]===<br />
* [[Slovnaft Bratislava Refinery]], ([[MOL Group|MOL]]), {{convert|110000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Petrochema Dubová Refinery]], ([[russian investors]]), http://www.petrochema.sk/english/index_en.htm<br />
<br />
===[[Spain]]===<br />
* [[Bilbao Refinery]], ([[Repsol YPF]]), {{convert|220000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Puertollano Refinery]], ([[Repsol YPF]]), {{convert|140000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Tarragona Refinery]], ([[Repsol YPF]]), {{convert|160000|oilbbl/d|m3/d|abbr=on}}<br />
* [[a Coruna Refinery]], ([[Repsol YPF]]), {{convert|120000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Cartagena Refinery]], ([[Repsol YPF]]), {{convert|100000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Tenerife Refinery]], ([[CEPSA]]), {{convert|90000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Palos de la Frontera Refinery]], ([[CEPSA]]), {{convert|100000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Gibraltar-San Roque Refinery]], ([[CEPSA]]), {{convert|240000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Castellon Refinery]], ([[BP]]), {{convert|100000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Sri lanka]]===<br />
* [[sapugaskanda oil Refinery]] ([[ceylon Petroleum corporation]]), {{convert|51000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Switzerland]]===<br />
* [[Cressier Refinery]], ([[Petroplus]]), {{convert|68000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Collombey-Muraz Refinery]], ([[Tamoil]]), {{convert|45000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[The Netherlands]]===<br />
* [[Shell Pernis Refinery]], ([[Royal Dutch Shell]]), {{convert|416000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Botlek]] ([[ExxonMobil]]) [[Rotterdam]], {{convert|195000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Total Refinery Netherlands]] - [[Vlissingen]], ([[Total S.A.|Total]]/[[LUKoil]]), {{convert|158000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Europoort]], ([[BP]]), {{convert|400000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Q8-KPE Refinery Europoort]], ([[Q8]]-[[Kuwait Petroleum Company]]), {{convert|80000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
===[[Turkey]]===<br />
* [[Central Anatolian Refinery]], ([[Tüpraş]]), {{convert|100000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Izmit Refinery]], ([[Tüpraş]]), {{convert|226000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Aliaga Refinery]], ([[Tüpraş]]), {{convert|200000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Batman Refinery]], ([[Tüpraş]]), {{convert|22000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Aliaga Refinery]], ([[Petkim]]), {{Project}}<br />
* [[Dapraş Doğu Akdeniz Petrol Rafinerisi (Adana)]], ([[Çalık Enerji]]), {{Project}}<br />
<br />
===[[Ukraine]]===<br />
* [[Odessa Refinery]], ([[LUKOIL]]), {{convert|70000|oilbbl/d|m3/d|abbr=on}}<br />
* [[LINOS Refinery]], ([[TNK-BP]]), {{convert|320000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Kherson Refinery]], ([[Alliance]]), {{convert|36000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Kremenchug Refinery]], ([[Ukrtatnafta]]) 368,500 bpd<br />
* [[Drogobych Refinery]], ([[Pryvat]]) 40,000 bpd<br />
* [[Neftekhimik Prikarpatya Nadvirna Refinery]], ([[Pryvat]]) 39,000 bpd<br />
<br />
===[[United Kingdom]]===<br />
* [[Lindsey Oil Refinery]], ([[Total S.A.|Total]]), {{convert|223000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Milford Haven Refinery]], ([[Murphy Oil|Murco]]), {{convert|100000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Pembroke Refinery]], ([[Chevron Corporation|Chevron]]), {{convert|220000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Stanlow Refinery]], ([[Royal Dutch Shell]]), {{convert|246000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Teesside Refinery]], ([[Petroplus]]), {{convert|117000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Fawley, Hampshire#Fawley oil refinery and chemical works|Fawley Southampton Refinery]], ([[ExxonMobil]]), {{convert|347000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Humber Refinery]], ([[ConocoPhillips]]), {{convert|221000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Coryton Refinery]], ([[Petroplus]]), {{convert|208000|oilbbl/d|m3/d|abbr=on}}<br />
* [[Grangemouth Refinery]], ([[Innovene]] - part of [[Ineos]] and formerly [[BP]]), {{convert|205000|oilbbl/d|m3/d|abbr=on}}<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
==External links==<br />
* [http://tonto.eia.doe.gov/dnav/pet/pet_pnp_top.asp Energy Information Administration: Petroleum Refining and Processing Data]<br />
* [http://www.eia.doe.gov/pub/oil_gas/petroleum/data_publications/refinery_capacity_data/pdf/table_38.pdf EIA: U.S. Directory of Operable Petroleum Refineries]<br />
* [http://bbs.keyhole.com/ubb/showthreaded.php/Cat/0/Number/1197575/page/ Google Earth Community Placemark]<br />
* [http://www.ril.com/ Reliance, Official Website]<br />
* [http://www.reliancepetroleum.com/ Petroleum Reliance, Official Website]<br />
<br />
{{DEFAULTSORT:List Of Oil Refineries}}<br />
[[Category:Oil refineries| ]]<br />
[[Category:Lists by country|Oil refineries]]<br />
<br />
[[ar:قائمة بمصافي النفط]]</div>TeleComNasSprVenhttps://de.wikipedia.org/w/index.php?title=Der_Hobbit_(Filmtrilogie)&diff=91167254Der Hobbit (Filmtrilogie)2010-08-16T06:11:52Z<p>TeleComNasSprVen: merge"from"</p>
<hr />
<div>{{mergefrom|Adaptations of The Hobbit|discuss=Talk:Adaptations of The Hobbit#Merger proposal|date=May 2010}}<br />
'''''The Hobbit''''' is the working title planned for a two-part film yet to be produced. The film is intended to be based on [[The Hobbit|the novel of the same name]] by [[J. R. R. Tolkien]]. The film is in development and [[Peter Jackson]], director of [[The Lord of the Rings film trilogy|''The Lord of the Rings'' film trilogy]] will serve as [[executive producer]] and co-writer. [[Guillermo del Toro]] worked with Jackson for over two years and would have been director, but left the project in May 2010. Originally, both parts would have served as separate films. The first would have adapted ''The Hobbit'' and the second would have bridged the gap between this and ''The Lord of the Rings''. It was del Toro's intention to split and expand the narrative of ''The Hobbit'' over two parts of a single film.<ref>J.W. Braun, ''The Lord of the Films'' (ECW Press, 2009).</ref> Jackson was reportedly in talks to direct the films in June 2010.<ref>{{cite news|title=Peter Jackson in talks to direct 'The Hobbit'|url=http://www.variety.com/article/VR1118021068.html|accessdate=June 25, 2010|date=June 25, 2010|author=Dave McNary|work=Variety}}</ref> Actors from the film trilogy, [[Ian McKellen]], [[Andy Serkis]] (as [[Gollum]]), and [[Hugo Weaving]] are attached to reprise their roles.<ref name=slashfilm/> In a June 2010 interview on The Graham Norton Show, English actor and comedian Bill Bailey confirmed that he had auditioned for the part of Gloin.<br />
<br />
==Development==<br />
{{See also|The Lord of the Rings film trilogy#Development|l1=Development of The Lord of the Rings film trilogy}}<br />
[[Peter Jackson]] and [[Fran Walsh]] expressed interest in 1995 in filming ''[[The Hobbit]]'', which would be part one of a trilogy (the other two would have been based on ''[[The Lord of the Rings]]'').<ref>{{cite book | author = [[Brian Sibley]] | title = Peter Jackson: A Film-maker's Journey | publisher = [[HarperCollins]] | date = 2006 | location = London | pages = 313–16 | id = ISBN 0-00-717558-2}}</ref> Frustration arose when Jackson's producer, [[Harvey Weinstein]], discovered [[Saul Zaentz]] had production rights to ''The Hobbit'', but [[film distribution|distribution]] rights still belonged to [[United Artists]] (which had kept those rights, believing that filmmakers would probably adapt ''The Hobbit'' rather than ''The Lord of the Rings'', and therefore wanted a profit).<ref>{{cite news|author=Tom Ambrose|title=The Return of the Ring|work=[[Empire (magazine)|Empire]]|date=March 2009|page=67}}</ref> The studio was on the market, so Weinstein's attempts to buy those rights were unsuccessful. Weinstein asked Jackson to press on with adapting ''The Lord of the Rings''.<ref>{{cite book | author = [[Brian Sibley]] | title = Peter Jackson: A Film-maker's Journey | publisher = [[HarperCollins]] | date = 2006 | location = London | pages = 323–25 | id = ISBN 0-00-717558-2}}</ref> [[New Line Cinema]] eventually produced ''The Lord of the Rings'', and their rights to film ''The Hobbit'' were set to expire in 2010.<ref name=peace>{{cite news | author = Benjamin Svetkey | title = ''The Hobbit'': Peace in Middle-Earth? | work = [[Entertainment Weekly]] | date = 2007-10-04 | url = http://www.ew.com/ew/article/0,,20036782_20037403_20142132,00.html | accessdate=2007-10-05}}</ref> In September 2006, [[Metro-Goldwyn-Mayer]], owner of UA, expressed interest in teaming up with New Line and Jackson to make the prequel.<ref>{{cite news | author = Stax | title = MGM Eyes Hobbit, T4 | work = [[IGN]] | date = 2006-09-11 | url = http://movies.ign.com/articles/732/732006p1.html | accessdate=2007-08-17}}</ref><br />
<br />
In March 2005, Jackson launched a lawsuit against New Line, claiming he had lost revenue from merchandising, video, and computer games releases associated with ''[[The Lord of the Rings: The Fellowship of the Ring|The Fellowship of The Ring]]''.<ref>{{cite news | title = Director sues over Rings profits | work = [[BBC News Online]] | date = 2005-03-02 | url = http://news.bbc.co.uk/1/hi/entertainment/film/4312463.stm | accessdate=2007-08-17}}</ref> He did not seek a specific settlement, but requested an [[audit]] to see whether New Line had deprived him of money.<ref name=peace/> Although Jackson wanted it settled before he would make the film,<ref name=peace/> he felt the lawsuit was minor, and that New Line would still let him make ''The Hobbit.''<ref name=action/> New Line co-founder [[Robert Shaye]] was annoyed with the lawsuit and said in January 2007 that Jackson would never again direct a film for New Line, accusing him of being greedy.<ref>{{cite news|title=Jackson ruled out of Hobbit film|work=[[BBC News Online]]|date=2007-01-11|url=http://news.bbc.co.uk/1/hi/entertainment/6251099.stm|accessdate=2008-09-30}}</ref> MGM boss Harry Sloan halted development, as he wanted Jackson to be involved.<ref name=merger>{{cite news | author = Dade Hayes, Dave McNary | title = New Line in Warner's corner | work = [[Variety (magazine)|Variety]] | date = 2008-02-28 | url = http://www.variety.com/article/VR1117981598.html?categoryid=10&cs=1 | accessdate=2008-02-29}}</ref> By August, after a string of flops, Shaye was trying to repair his relationship with the director. He said, "I really respect and admire Peter and would love for him to be creatively involved in some way in ''The Hobbit''."<ref>{{cite news | author = Patrick Goldstein | title = THE BIG PICTURE: New Line's midlife crisis | work = [[Los Angeles Times]] | date = 2007-08-10 | url = http://www.latimes.com/entertainment/news/movies/la-et-goldstein10aug10,0,7800308.story?coll=la-headlines-entnews | accessdate=2007-08-17}}</ref> The following month, New Line was fined $125,000 for failing to provide requested accounting documents.<ref name=peace/> <br />
<br />
[[File:PeterJacksonCCJuly09.jpg|thumb|[[Peter Jackson]], [[executive producer]] of the films.]]On December 18, 2007, it was announced that Jackson would be [[executive producer]] of ''The Hobbit'' and its sequel. New Line and MGM will co-finance the film, and the latter studio (via [[20th Century Fox]]) will distribute the films outside North America – New Line's first ever such deal with another major studio.<ref>{{cite news | author = Michael Fleming | title = 'Hobbit' back on track as twin bill | work = [[Variety (magazine)|Variety]] | date = 2007-12-18 | url = http://www.variety.com/article/VR1117977891.html?categoryid=13&cs=1 | accessdate=2008-10-02}}</ref> Each film is budgeted at an estimated [[US$]]150 million,<ref>{{cite news | author = Borys Kit | title = Del Toro doubles up for 'Hobbit' | work = [[The Hollywood Reporter]] | date = 2008-01-27 | url = http://www.hollywoodreporter.com/hr/content_display/news/e3i331d7d05b8008476b2fae087024a2b8e | accessdate=2008-01-28}}</ref> which compares to the US$94 million budget for each of the films in Jackson's ''Lord of the Rings'' trilogy. After completion of the merger of New Line Cinema with [[Warner Bros.]] in February 2008, the films were announced as scheduled for release in Decembers 2011 and 2012.<ref name=merger/> Producer [[Mark Ordesky]] will return to supervise the prequels.<ref>{{cite news | author = Anne Thompson | title = Shaye kept New Line afloat | work = [[Variety (magazine)|Variety]] | date = 2008-03-06 | url = http://www.variety.com/article/VR1117982001.html?categoryId=2508&cs=1&query=the+hobbit | accessdate=2008-03-07}}</ref> Jackson explained he chose not to direct because it would have been unsatisfying to compete with his previous films.<ref name=webchat/><br />
<br />
That same month, the [[Tolkien Estate]]—through the [[Tolkien Trust]]—and [[HarperCollins Publishers]] filed a suit against New Line for [[breach of contract]] and [[fraud]] and demanded $220 million in compensation. The suit claimed New Line had only paid the Estate an upfront fee of $62,500, despite the trilogy earning an estimated $6 billion worldwide from box office receipts and merchandise sales. The suit claimed the Estate was entitled to 7.5% of all profits made by any Tolkien films, as established by prior deals. The suit also sought to block the filming of ''The Hobbit''.<ref name = "lawsuit1">{{cite news|author=Alex Dobuzinskis|title=Legal settlement clears way for "Hobbit" movie|work=[[Reuters]]|url=http://www.reuters.com/article/entertainmentNews/idUSTRE5875BK20090908|date=2009-09-08}}</ref><ref name = "lawsuit2">{{cite news|title=Legal path clear for Hobbit movie|work=[[BBC]]|url=http://news.bbc.co.uk/2/hi/entertainment/8245300.stm|date=2009-09-10}}</ref><br />
<br />
[[Guillermo del Toro]] has said he was a fan of Jackson's trilogy and had discussed directing [[Halo (series)#Film|a film adaptation of ''Halo'']] with him in 2005. Though that project stalled, they kept in contact.<ref name=webchat/> In a 2006 interview Del Toro was quoted saying "I don't like little guys and [[dragon]]s, hairy feet, [[hobbit]]s, [...] I don't like sword and sorcery, I hate all that stuff".<ref>{{cite news | url = http://www.salon.com/ent/audiofile/2006/10/12/conversations_toro/ | title = Conversations: Guillermo del Toro | work = [[Salon.com]] | date = 2006-10-12 | accessdate=2008-06-04}}</ref> After he signed on to direct in April 2008,<ref name=golden/> Del Toro posted on [[TheOneRing.net]] forums that he had been enchanted by ''The Hobbit'' as a child, but found that Tolkien's other books "contain[ed] geography and genealogy too complex for my prepubescent brain". In taking the job of director, Del Toro was now "reading like a madman to catch up with a whole new land, a continent of sorts – a [[cosmology]] created by brilliant [[philologist]] turned [[Shaman]]". He also posted that his appreciation of Tolkien was enhanced by his knowledge of the fantasy genre and the folklore research he had undertaken while making his own fantasy films.<ref name=webchat/><br />
<br />
[[Pre-production]] began around August 2008, with Del Toro, Jackson, Walsh, and [[Philippa Boyens]] writing the scripts.<ref>{{cite news|url=http://hollywoodinsider.ew.com/2008/08/the-hobbit.html|author=Nicole Sperling|title=Peter Jackson, Fran Walsh, Philippa Boyens join Guillermo Del Toro penning ''The Hobbit''|work=[[Entertainment Weekly]]|date=2008-08-19|accessdate=2008-08-20}}</ref> Del Toro collaborated with Jackson, Walsh and Boyens via [[videoconferencing]], and flew every three weeks, back and forth from [[Los Angeles, California]] (where some of the designs were done)<ref name=golden/> to New Zealand to visit them.<ref>{{cite news|author=Michael Fleming|title=Guillermo Del Toro booked thru 2017|work=[[Variety (magazine)|Variety]]|date=2008-09-03|url=http://www.variety.com/article/VR1117991560.html?categoryid=13&cs=1|accessdate=2008-09-06}}</ref> Del Toro spent his mornings writing, and afternoons looking at material related to Tolkien to help him understand the writer's work. He watched [[World War I]] documentaries and asked for book recommendations from Jackson, who is a collector of World War I memorabilia. Del Toro felt Tolkien's experiences in that war influenced his stories.<ref name=wardocs>{{cite news|author=Max Evry|title=Guillermo del Toro on ''The Hobbit'' and Frankenstein|work=ComingSoon.net|date=2008-10-05|url=http://www.comingsoon.net/news/hobbitnews.php?id=49378|accessdate=2008-10-05}}</ref><br />
<br />
By November 2008, every week Del Toro, Jackson, Walsh and Boyens would realize something new about the story which continually changed the script.<ref>{{cite news|author=Ryan Rotten|title=Guillermo del Toro Gives Hobbit Update|work=ComingSoon.net|date=2008-11-12|url=http://www.comingsoon.net/news/movienews.php?id=50460|accessdate=2008-11-25}}</ref> The writing hours increased to twelve each day, as they dedicated three weeks to finally deciding the films' structures.<ref name=twobreaks>{{cite news|author=[[Guillermo del Toro]]|title=I promise to give you news|publisher=TheOneRing.net forums|date=2008-11-16|url=http://newboards.theonering.net/forum/gforum/perl/gforum.cgi?post=149375;#149375|accessdate=2008-11-25}}</ref> During the first few months of 2009, writing would start from 8:30 am and end at 3 pm when Del Toro would meet with Weta (i.e. [[Weta Workshop]] and [[Weta Digital]] film effects companies). Completion of the story outlines and treatments ended in March 2009, and the studios approved the start of writing the screenplay.<ref name=empire>{{cite news|author=Chris Hewitt|title=The Two Towers|work=[[Empire (magazine)|Empire]]|date=June 2009|pages=137–140}}</ref> Filming was expected to take place throughout 2010 in New Zealand, with Del Toro renovating the [[Hobbiton]] sets in [[Matamata]].<ref name=webchat>{{cite web | title = An Unexpected Party Chat transcript now available! | work = Weta Holics | date = 2008-05-25 | url = http://www.wetanz.com/holics/index.php?itemid=695&catid=2 | accessdate=2008-12-09}}</ref> On his part, Jackson kept the [[Rivendell]] scale model and the [[Bag End]] set (which he has used as a [[Guest house (secondary suite)|guest house]]) from the trilogy.<ref name=action/> During the middle of the shoot, there was expected to be a break which would have allowed Del Toro to edit ''The Hobbit'' while sets would be altered for the second film.<ref>{{cite news|author=Carl Cortez|title=Guillermo del Toro escapes 'Labyrinth' and ends right back into 'Hellboy'|work=iF Magazine|date=2008-07-09|url=http://www.ifmagazine.com/feature.asp?article=2879|accessdate=2008-07-14}}</ref> The director expected the shoot to last 370 days.<ref name=mignola>{{cite news|title=Del Toro talks ‘Hobbit’ in Live Chat|publisher=BilboHobbit.com|date=2008-11-27|url=http://bilbohobbit.com/del-toro-talks-hobbit-in-live-chat/|accessdate=2008-11-29}}</ref><br />
<br />
In September 2009, New Line and the Tolkien Estate reached a settlement, with New Line paying the Estate an undisclosed sum. [[J. R. R. Tolkien]]'s son and [[literary executor]] [[Christopher Tolkien]] said in a statement: "New Line may now proceed with its proposed films of ''The Hobbit''."<ref name = "lawsuit1" /><ref name = "lawsuit2" /> Jackson revealed in late November 2009 that he anticipated that the script for ''The Hobbit'' would be finished by the beginning of 2010, delaying the start of production until the middle of that summer (several months later than previously anticipated).<ref name="StillWorking">{{Cite web |url=http://www.variety.com/article/VR1118011977.html?categoryid=1236&cs=1 |last=McNary |first=Dave |title=Jackson, del Toro Still Working on 'Hobbit' Scripts. |work=Variety |date=November 30, 2009}}</ref> The announcement created doubts about whether the film would make its previously-announced release dates of December 2011 and December 2012.<ref name="StillWorking" /> Jackson reiterated that no casting decisions have been made.<ref name="StillWorking" /> On January 22, 2010, [[Alan Horn]] said the first film would likely not be released until the fourth quarter of 2012.<ref>{{cite news|url=http://www.variety.com/article/VR1118014180.html?categoryid=2520&cs=1|title=Leaner New Line ready for a tentpole again|last=McNary|first=Dave|date=2010-01-22|work=[[Variety (magazine)|Variety]]|accessdate=2010-02-12}}</ref><br />
<br />
Due to Metro-Goldwyn-Mayer's financial troubles, the project had not been officially [[Wiktionary:greenlight|greenlit]] as of May 28, 2010, as Del Toro explained at a press conference. "There cannot be any start dates until the MGM situation gets resolved... We have designed all the creatures. We've designed the sets and the wardrobe. We have done [[animatics]] and planned very lengthy action sequences. We have scary sequences and funny sequences and we are very, very prepared for when it's finally triggered, but we don't know anything until MGM is solved."<ref>{{cite web|title=Interview: Guillermo del Toro on Splice|url=http://www.shocktillyoudrop.com/news/topnews.php?id=15329|publisher=ShockTillYouDrop.com|accessdate=29 May 2010|date=28 May 2010}}</ref><ref>{{cite news|author=Silas Lesnick|title=Guillermo del Toro Confirms Hobbit Delay|url=http://www.comingsoon.net/news/movienews.php?id=66472|work=ComingSoon.net|accessdate=29 May 2010|date=28 May 2010}}</ref> Two days later, Del Toro announced at TheOneRing.net that "[i]n light of ongoing delays in the setting of a start date for filming", he would "take leave from helming", further stating that "the mounting pressures of conflicting schedules have overwhelmed the time slot originally allocated for the project. [...] I remain an ally to it and its makers, present and future, and fully support a smooth transition to a new director".<ref>{{cite web|title=Guillermo Del Toro departs "The Hobbit"|url=http://www.theonering.net/torwp/2010/05/30/36920-guillermo-del-toro-departs-the-hobbit/|publisher=TheOneRing.net|accessdate=31 May 2010|date=30 May 2010}}</ref><ref>{{cite news|title=Why Guillermo del Toro left 'The Hobbit' -- and Peter Jackson will not replace him as director|url=http://popwatch.ew.com/2010/05/31/guillermo-del-toro-leaves-the-hobbit/|accessdate=31 May 2010|newspaper=Entertainment Weekly|date=31 May 2010|author=Adam Vary}}</ref> Reports have been surfacing around the internet about possible directors for ''The Hobbit''. Apparently the studios want Jackson, but names like [[David Yates]], [[Brett Ratner]], and [[David Dobkin]] have all been thrown around.<ref>{{cite web|url=http://thefilmstage.com/2010/06/15/mgm-and-wb-want-peter-jackson-to-direct-the-hobbit/|title=MGM and WB Want Jackson For The Hobbit|work=[http://www.thefilmstage.com The Film Stage]|accessdate=June 14, 2010|date=June 14, 2010}}</ref> In a June 2010 interview on [[The Graham Norton Show]], English actor and comedian [[Bill Bailey]] confirmed that he had auditioned for the part of [[Gloin]]. On June 25th, 2010, Jackson was reported to be in negotiations to direct the two-part film.<ref>[http://www.comingsoon.net/news/movienews.php?id=67316]</ref><br />
<br />
==Preparation for direction==<br />
{{Quote box<br />
|title = <br />
|quote = The first film will stand on its own, and the second will be a transition and fusion with Peter's world. I plan to change and expand the visuals from Peter's, and I know the world can be portrayed in a different way. Different is better for the first one. For the second, I have the responsibility of finding a slow progression and mimicking the style of Peter.<br />
|source = Del Toro on tonal consistency with Jackson's trilogy<ref>{{cite news | author = Stuart Levine | title = Exclusive: Guillermo del Toro on 'Hellboy II' | work = [[Premiere (magazine)|Premiere]] | date = 2008-07-07 | url = http://www.premiere.com/features/4642/exclusive-guillermo-del-toro-on-hellboy-ii-page4.html | accessdate=2008-07-08}}</ref><br />
|align = left<br />
|width = 35%<br />
|border = <br />
|fontsize = <br />
|bgcolor = <br />
|style = <br />
|title_bg = <br />
|title_fnt = <br />
|tstyle = <br />
|qalign = <br />
|qstyle = <br />
|quoted = <br />
|salign = <br />
|sstyle = <br />
}}<br />
<br />
Del Toro interprets ''The Hobbit'' as being set in a "world that is slightly more golden at the beginning, a very innocent environment" and the film would need to "[take] you from a time of more purity to a darker reality throughout the film, but [in a manner] in the spirit of the book".<ref name=golden/> He perceives the main themes as loss of innocence, which he likened to the experience of England [[Aftermath of World War I|after World War I]], and greed, which he says [[Smaug]] and [[Thorin Oakenshield]] represent.<ref name=webchat/> [[Bilbo Baggins]] reaffirms his personal morality during the story's third act as he encounters Smaug and the Dwarves' greed.<ref name=dinner>{{cite news|author=Joe Utichi|title=Guillermo del Toro - RT's Dinner and the Movies Interview|work=[[Rotten Tomatoes]]|date=2008-07-11|url=http://uk.rottentomatoes.com/m/dinner_and_the_movies/news/1739826/guillermo_del_toro_rts_dinner_and_the_movies_interview|accessdate=2008-07-12}}</ref> He added "The humble, sort of a sturdy moral fibre that Bilbo has very much represents the idea that Tolkien had about the little [[English people|English]] man, the average English man",<ref name=narration/> and the relationship between Bilbo and Thorin would be the heart of the films.<ref>{{cite news | author = Shawn Adler | title = Director Guillermo Del Toro Answers Your ‘Hobbit’ Questions | work = [[MTV]] Movies Blog | date = 2008-07-02 | url = http://moviesblog.mtv.com/2008/07/02/director-guillermo-del-toro-answers-your-hobbit-questions/ | accessdate=2008-07-02}}</ref> The [[Elf (Middle-earth)|Elves]] will also be less solemn.<ref name=webchat/><br />
<br />
Del Toro met concept artists [[John Howe]] and [[Alan Lee]], [[Weta Workshop]] head [[Richard Taylor (movies)|Richard Taylor]] and make-up artist Gino Acevedo to keep continuity with the previous films,<ref name=golden/> and he has also hired comic book artists to complement Howe's and Lee's style on the trilogy,<ref name=european/> including [[Mike Mignola]] and [[Wayne Barlowe]], who began work around April 2009.<ref name=empire/> He has also considered looking at Tolkien's drawings and using elements of those not used in the trilogy.<ref name=narration>{{cite news | author = Shawn Adler | title = Guillermo Del Toro Answers 'Hobbit' Fans' Questions About Returning 'Rings' Cast, Religion And More | work = [[MTV]].com | date = 2008-07-02 | url = http://www.mtv.com/movies/news/articles/1590278/story.jhtml | accessdate=2008-07-02}}</ref> As Tolkien did not originally intend for [[One Ring|the magic ring Bilbo finds]] to be the all-powerful talisman of evil it is revealed to be in ''The Lord of the Rings'', Del Toro will address its different nature in the story, but not so much as to draw away from the story's spirit.<ref name=dinner/> Each [[Dwarf (Middle-earth)|Dwarf]] will need to look different from the others.<ref>{{cite news|author="xoanon"|title=Del Toro Interview Part 2: “This is the hardest movie I’ll probably ever do!”|work=TheOneRing.net|date=2008-10-20|url=http://www.theonering.net/torwp/2008/10/20/30314-del-toro-interview-part-2-this-is-the-hardest-movie-i%e2%80%99ll-probably-ever-do/|accessdate=2008-10-20}}</ref> Del Toro will redesign the [[Orc (Middle-earth)#Adaptations|Goblins]] and [[Warg#Tolkien.27s wargs|Wargs]]<ref name=webchat/> and the [[Mirkwood]] spiders will also look different from [[Shelob]].<ref name=dinner/> Del Toro felt the Wargs had to be changed because "the classical incarnation of the demonic wolf in [[Norse mythology|Nordic mythology]] is not a [[hyena]]-shaped creature".<ref name=wardocs/> <br />
<br />
[[Image:JohnHoweSmaug.jpg|thumb|left|upright|Guillermo del Toro noted that [[John Howe]]'s illustrations of [[Smaug]] "approximate" his vision of the character<ref name=approx>{{cite news|author=Josh Horowitz|title=Guillermo Del Toro Talks 'Hobbit' Casting, Creatures|work=[[MTV]]|date=2008-10-14|url=http://www.mtv.com/movies/news/articles/1596909/story.jhtml|accessdate=2008-10-15}}</ref>]]<br />
<br />
Del Toro also wants the animals to speak so Smaug's speech will not be incongruous, though he explained portraying the talking animals will be more about showing people can understand them.<ref name=dinner/> Smaug will not have a "snub [[Simian]] [mouth] in order to achieve a dubious lip-synch",<ref name=webchat/> and Del Toro notes that such is the attention given to him that he will be the first design begun and the last to be approved.<ref name=wardocs/> The director, whose [[Chinese zodiac|Chinese zodiac sign]] is the [[Dragon (zodiac)|Dragon]], is fascinated by the mythological species and attempted to include one in ''[[Pan's Labyrinth]]'', but was unable to for budget reasons. His favourite cinematic dragons are [[Maleficent]] in ''[[Sleeping Beauty (1959 film)|Sleeping Beauty]]'' and Vermithrax Pejorative from ''[[Dragonslayer]]''.<ref name=webchat/> He has also provided a foreword to Howe's portfolio book ''Forging Dragons'', where he discussed the dragon's differing symbolism and roles in various cultures and legends.<ref>{{cite web|author=[[Guillermo del Toro]]|title=“SVNT DRACONES”|publisher=[[John Howe]]'s official website|date=2008-10-15|url=http://www.john-howe.com/news/comments.php?id=P239_0_1_0_C|accessdate=2008-10-15}}</ref><br />
<br />
[[Ian McKellen]] and [[Andy Serkis]] (who played [[Gandalf]] and [[Gollum]], respectively), have met Del Toro,<ref name=golden/> and ideally, he wants every actor (including [[Ian Holm]], who played [[Bilbo Baggins|Bilbo]] in ''The Lord of the Rings'') to reprise their roles,<ref name=european>{{cite news | author = Shawn Adler | title = Guillermo Del Toro Addresses 'Hobbit' Fans' Concerns, Talks Possible Casting | work = [[MTV]] | date = 2008-04-28 | url = http://www.mtv.com/movies/news/articles/1586421/story.jhtml | accessdate=2008-04-30}}</ref> although he acknowledged some may be unable to because of health problems; he would also consider having Holm narrate the films.<ref name=narration/> Del Toro, in an interview with BBC radio has confirmed that McKellen, Serkis and [[Hugo Weaving]] (who played [[Elrond]]) will reprise their roles.<ref name=slashfilm>{{cite news | author = Brendon Connelly | title = Guillermo Del Toro Confirms Hugo Weaving For ''The Hobbit''… And Much More| work = [[/film]] | date = 2009-06-11 | url = http://www.slashfilm.com/2009/06/11/guillermo-del-toro-confirms-hugo-weaving-for-the-hobbit-and-much-more/ | accessdate=2009-06-11}}</ref> All 13 Dwarves and [[Beorn]] will appear,<ref name=webchat/> while Thorin's father [[Thráin II]] will also be featured.<ref name=empire/> [[Doug Jones (actor)|Doug Jones]]—who portrayed various creatures in ''[[Hellboy (film)|Hellboy]]'', its [[Hellboy II: The Golden Army|sequel]] and ''[[Pan's Labyrinth]]'' – was interested in playing [[Thranduil]], King of Mirkwood and [[Legolas]]' father, but del Toro said he wanted Jones for a different role.<ref name=approx/> Similarly, ''Hellboy'' star [[Ron Perlman]] is a person whom del Toro has "something in mind for".<ref name=webchat/><br />
<br />
Del Toro and Jackson have a positive working relationship, where they will compromise on disagreements to the benefit of the film.<ref name=webchat/> Del Toro believes he will be able to shoot all of the films himself,<ref>{{cite news|author=Shawn Adler|title=Guillermo Del Toro To Fly Solo On ‘Hobbit’ Directing Duties, Says No To Peter Jackson Assist|work=[[MTV]] Movies Blog|date=2008-10-08|url=http://moviesblog.mtv.com/2008/10/08/guillermo-del-toro-to-fly-solo-on-hobbit-directing-duties-says-no-to-peter-jackson-assist/|accessdate=2008-10-08}}</ref> although Jackson noted he had similar hopes for filming all of his trilogy, and has offered to help as [[second unit]] director. Del Toro will shoot the films in the trilogy's 2.35:1 [[Aspect ratio (image)|aspect ratio]], rather than his signature 1.85:1 ratio.<ref name=webchat/> He hopes to collaborate again with cinematographer [[Guillermo Navarro]].<ref name=mignola/> Del Toro shares Jackson's passion for scale models and background paintings,<ref name=fix>{{cite news|author=Patrick Kolan|title=Guillermo Talks ''The Hobbit'''s Effects|work=[[IGN]]|date=2008-08-19|url=http://uk.movies.ign.com/articles/899/899973p1.html|accessdate=2008-09-27}}</ref> though he wants to increase the use of [[animatronics]]; "We really want to take the state-of-the-art animatronics and take a leap ten years into the future with the technology we will develop for the creatures in the movie. We have every intention to do for animatronics and special effects what the other films did for [[virtual reality]]."<ref name=golden>{{cite news | title = Guillermo del Toro Chats with TORN About ''The Hobbit'' Films! | publisher = TheOneRing.net | date = 2008-04-25 | url = http://www.theonering.net/torwp/2008/04/25/28747-guillermo-del-toro-chats-with-torn-about-the-hobbit-films/ | accessdate=2008-04-26}}</ref> Spectral Motion (''Hellboy'', ''[[Fantastic Four (film series)|Fantastic Four]]'') are among those Del Toro wants to work with again.<ref name=mignola/> Some characters will be created by mixing [[computer-generated imagery]] with animatronics, and some will solely be created with animatronics or animation. Gollum will be entirely digital again, as Del Toro noted "if it ain't broke, why fix it?"<ref name=fix/><br />
<br />
Del Toro and Jackson considered the sudden introduction to [[Bard the Bowman]] and Bilbo being unconscious during the [[Battle of the Five Armies]] to be "less cinematic moments" reminiscent of the novel's more "fairy tale world" than ''The Lord of the Rings'', which they would change to make ''The Hobbit'' feel more like the trilogy. However, Del Toro considered some of these moments like Bilbo waking up to find the battle is over iconic and would require the "fairy tale logic [to] work as is".<ref name=empire/><br />
<br />
==Second film==<br />
{{quote box|align=left|width=40%|quote=When you lay out [...] the story beats contained within the book (before even considering any apendix{{sic}} material) the work is enormous and encompasses more than one film. That's why we are thinking of the TWO INSTALLMENTS as parts of a single NARRATIVE. That's why I keep putting down the use of a "bridge" film (posited initially). I think the concept as such is not relevant anymore. I believe that the narrative and characters are rich enough to fit in TWO films.|source=A post by Del Toro on TheOneRing.net<ref>{{cite web|author=[[Guillermo del Toro]]|title=Hola|publisher=TheOneRing.net|date=2008-11-08|url=http://newboards.theonering.net/forum/gforum/perl/gforum.cgi?post=147373;#147373|accessdate=2008-11-25}}</ref>}}<br />
[[MGM]] expressed interest in a second film in 2006, set between ''The Hobbit'' and ''The Lord of the Rings''.<ref>{{cite news | title = Hobbit, Crown, Panther News | work = [[IGN]] | date = 2006-11-14 | url = http://movies.ign.com/articles/746/746019p1.html | accessdate=2007-08-17}}</ref> Jackson concurred, stating "one of the drawbacks of ''The Hobbit'' is [that] it's relatively lightweight compared to ''Lord of the Rings''... There [are] a lot of sections in which a character like Gandalf disappears for a while. From memory – I mean, I haven't read it for a while now – but I think he references going off to meet with the [[White Council]], who are actually characters like [[Galadriel]] and [[Saruman]] and people who we see in ''Lord of the Rings''. He mysteriously vanishes for a while and then comes back, but we don't really know what goes on."<ref name=action>{{cite news | author = Steve Daly | title = Action Jackson | work = [[Entertainment Weekly]] | date = 2006-09-22 | url = http://www.ew.com/ew/article/0,,1538494,00.html | accessdate=2007-10-05}}</ref> Jackson was also interested in showing [[Gollum]]'s journey to [[Mordor]] and [[Aragorn]] setting a watch on the Shire.<ref>{{cite news|author=Eric Vespe|title=Quint and Peter Jackson talk THE HOBBIT and a potential return to low budget horror!!!|work=[[Ain't It Cool News]]|date=2008-10-08|url=http://www.aintitcool.com/node/30085|accessdate=2008-10-08}}</ref><br />
<br />
After his hiring in 2008, Del Toro confirmed the sequel would be about "trying to reconcile the facts of the first movie with a slightly different point of view. You would be able to see events that were not witnessed in the first."<ref name=european/> He also noted the story must be drawn from only what is mentioned in ''The Hobbit'' and ''The Lord of the Rings'', as they do not have the rights to ''[[The Silmarillion]]'' and ''[[Unfinished Tales]]''.<ref>{{cite news|title=News of the Week|work=[[Sci Fi Weekly]]|date=2008-07-07|url=http://www.scifi.com/sfw/news/sfw_news_20080707.html|accessdate=2008-09-30}}</ref> Del Toro also added (before writing began) that if they could not find a coherent story for the second film, they would just film ''The Hobbit'', stating "''The Hobbit'' is better contained in a single film and kept brisk and fluid with no artificial 'break point'."<ref>{{cite news|author=[[Guillermo del Toro]]|title=2 centavos|publisher=TheOneRing.net forum|date=2008-05-26|url=http://newboards.theonering.net/forum/gforum/perl/gforum.cgi?post=101653;guest=3666153#101653|accessdate=2008-10-01}}</ref> By November 2008, he elaborated he felt the book was more detailed and eventful than people may remember.<ref>{{cite news|url=http://www.ifmagazine.com/new.asp?article=7125|author=A.C. Ferrante|title=Guillermo del Toro updates about ''The Hobbit'' status|work=iF Magazine|date=2008-11-12|accessdate=2008-11-12}}</ref> Del Toro was faced with two possible places to split the story,<ref name=twobreaks/> including Smaug's defeat. He noted the second film would need to end by leading directly into ''[[The Lord of the Rings: The Fellowship of the Ring|The Fellowship of the Ring]]''.<ref>{{cite news|url=http://moviesblog.mtv.com/2008/10/07/hobbit-films-will-be-one-continuous-journey-promises-guillermo-del-toro/|title=‘Hobbit’ Films Will Be One ‘Continuous Journey,’ Promises Guillermo Del Toro|author=Shawn Adler|work=[[MTV]] Movies Blog|date=2008-10-07|accessdate=2008-10-08}}</ref> In June 2009, Del Toro revealed he had decided where to divide the story based on comments from fans about signifying a change in Bilbo's relationship with the dwarves.<ref>{{cite news|author=Eric Ditzian|title=Guillermo Del Toro Rules Out Directing ‘Hobbit’ Bridge Film|work=[[MTV]] Movies Blog|date=2009-06-05|url=http://moviesblog.mtv.com/2009/06/05/exclusive-guillermo-del-toro-rules-out-directing-hobbit-bridge-film/|accessdate=2009-06-08}}</ref> <br />
<br />
The second film's story would also have depended on how many actors could have reprised their roles.<ref name=webchat/> [[Christopher Lee]], who played Saruman in Jackson's films, said he would have liked to have shown the Wizard's corruption by [[Sauron]],<ref>{{cite news | author = Glen Ferris | title = Christopher Lee On ''The Hobbit'' | work = [[Empire (magazine)|Empire Online]] | date = 2008-06-04 | url = http://www.empireonline.com/news/story.asp?NID=22681 | accessdate=2008-06-04}}</ref> but he would not be comfortable flying to New Zealand at his age.<ref>{{cite news|author=Elisabeth Rappe|title=Looks Like Christopher Lee Might Not Return to Middle-Earth|work=Cinematical|date=2008-07-13|url=http://www.cinematical.com/2008/07/13/christopher-lee-wont-return-to-middle-earth/|accessdate=2008-07-14}}</ref><br />
<br />
In May 2010, Guillermo del Toro announced that he has officially departed from the project, due to various delays and conflicts with schedules.<ref>{{cite web|url=http://movies.yahoo.com/news/movies.ap.org/director-quits-hobbit-film-over-production-delay-ap |title=Director quits 'Hobbit' film over production delay (AP)|date=31 May 2010|work= yahoo News}}</ref><br />
<br />
==Video games==<br />
* [[Warner Bros. Interactive Entertainment]] now has the rights to develop a video game based on ''The Hobbit'' following the expiration in 2008 of [[Electronic Arts]]' license to ''The Lord of the Rings''.<br />
* [[Traveller's Tales]] also created a demo for a [[Lego]] version of ''The Hobbit'' as a pitch to Jackson.<ref>{{cite news|author=Ben Fritz|title=Lord of the Rings game rights now at Warner Bros.|work=[[Variety (magazine)|Variety]]|date=2009-03-12|url=http://weblogs.variety.com/the_cut_scene/2009/03/lord-of-the-rings-ga.html|accessdate=2009-03-14}}</ref><br />
<br />
==References==<br />
{{reflist|2}}<br />
<br />
==External links==<br />
* [http://www.thehobbitblog.com ''The Hobbit'': The Official Movie Blog]<br />
* [http://www.theonering.net TheOneRing.net]<br />
* {{imdb title|id=0903624|title=The Hobbit: Part 1}}<br />
* {{imdb title|id=1170358|title=The Hobbit: Part 2}}<br />
* {{amg movie|id=427365|title=The Hobbit: Part 1}}<br />
* {{amg movie|id=427369|title=The Hobbit: Part 2}}<br />
<br />
{{Hobbit}}<br />
{{The Lord of the Rings film trilogy}}<br />
{{Peter Jackson}}<br />
{{DEFAULTSORT:Hobbit}}<br />
<br />
[[Category:The Hobbit]]<br />
[[Category:Middle-earth adaptations]]<br />
[[Category:Works inspired by J. R. R. Tolkien]]<br />
<br />
<!--<br />
[[Category:Upcoming films]]<br />
[[Category:English-language films]]<br />
[[Category:Fictional-language films]]<br />
[[Category:Middle-earth films]]<br />
[[Category:New Zealand films]]<br />
[[Category:Epic films]]<br />
[[Category:Prequel films]]<br />
[[Category:New Line Cinema films]]<br />
[[Category:MGM films]]<br />
[[Category:WingNut Films productions]]<br />
[[Category:American fantasy films]]<br />
--><br />
<br />
[[da:Hobbitten (film)]]<br />
[[es:El hobbit (película de 2012)]]<br />
[[fa:هابیت (فیلم ۲۰۱2)]]<br />
[[fr:Bilbo le Hobbit (film)]]<br />
[[ka:ჰობიტი (ფილმი)]]<br />
[[la:The Hobbit (pelliculae)]]<br />
[[hu:A hobbit (film)]]<br />
[[nl:The Hobbit (2012)]]<br />
[[no:Hobbiten (film)]]<br />
[[ru:Хоббит (фильм)]]<br />
[[fi:The Hobbit (elokuvaduologia)]]<br />
[[sv:Bilbo – En hobbits äventyr (film)]]<br />
[[tr:Hobbit (film)]]</div>TeleComNasSprVenhttps://de.wikipedia.org/w/index.php?title=Der_Hobbit_(Filmtrilogie)&diff=91167253Der Hobbit (Filmtrilogie)2010-08-16T05:39:15Z<p>TeleComNasSprVen: merge</p>
<hr />
<div>{{mergeto|Adaptations of The Hobbit|discuss=Talk:Adaptations of The Hobbit#Merger proposal|date=May 2010}}<br />
'''''The Hobbit''''' is the working title planned for a two-part film yet to be produced. The film is intended to be based on [[The Hobbit|the novel of the same name]] by [[J. R. R. Tolkien]]. The film is in development and [[Peter Jackson]], director of [[The Lord of the Rings film trilogy|''The Lord of the Rings'' film trilogy]] will serve as [[executive producer]] and co-writer. [[Guillermo del Toro]] worked with Jackson for over two years and would have been director, but left the project in May 2010. Originally, both parts would have served as separate films. The first would have adapted ''The Hobbit'' and the second would have bridged the gap between this and ''The Lord of the Rings''. It was del Toro's intention to split and expand the narrative of ''The Hobbit'' over two parts of a single film.<ref>J.W. Braun, ''The Lord of the Films'' (ECW Press, 2009).</ref> Jackson was reportedly in talks to direct the films in June 2010.<ref>{{cite news|title=Peter Jackson in talks to direct 'The Hobbit'|url=http://www.variety.com/article/VR1118021068.html|accessdate=June 25, 2010|date=June 25, 2010|author=Dave McNary|work=Variety}}</ref> Actors from the film trilogy, [[Ian McKellen]], [[Andy Serkis]] (as [[Gollum]]), and [[Hugo Weaving]] are attached to reprise their roles.<ref name=slashfilm/> In a June 2010 interview on The Graham Norton Show, English actor and comedian Bill Bailey confirmed that he had auditioned for the part of Gloin.<br />
<br />
==Development==<br />
{{See also|The Lord of the Rings film trilogy#Development|l1=Development of The Lord of the Rings film trilogy}}<br />
[[Peter Jackson]] and [[Fran Walsh]] expressed interest in 1995 in filming ''[[The Hobbit]]'', which would be part one of a trilogy (the other two would have been based on ''[[The Lord of the Rings]]'').<ref>{{cite book | author = [[Brian Sibley]] | title = Peter Jackson: A Film-maker's Journey | publisher = [[HarperCollins]] | date = 2006 | location = London | pages = 313–16 | id = ISBN 0-00-717558-2}}</ref> Frustration arose when Jackson's producer, [[Harvey Weinstein]], discovered [[Saul Zaentz]] had production rights to ''The Hobbit'', but [[film distribution|distribution]] rights still belonged to [[United Artists]] (which had kept those rights, believing that filmmakers would probably adapt ''The Hobbit'' rather than ''The Lord of the Rings'', and therefore wanted a profit).<ref>{{cite news|author=Tom Ambrose|title=The Return of the Ring|work=[[Empire (magazine)|Empire]]|date=March 2009|page=67}}</ref> The studio was on the market, so Weinstein's attempts to buy those rights were unsuccessful. Weinstein asked Jackson to press on with adapting ''The Lord of the Rings''.<ref>{{cite book | author = [[Brian Sibley]] | title = Peter Jackson: A Film-maker's Journey | publisher = [[HarperCollins]] | date = 2006 | location = London | pages = 323–25 | id = ISBN 0-00-717558-2}}</ref> [[New Line Cinema]] eventually produced ''The Lord of the Rings'', and their rights to film ''The Hobbit'' were set to expire in 2010.<ref name=peace>{{cite news | author = Benjamin Svetkey | title = ''The Hobbit'': Peace in Middle-Earth? | work = [[Entertainment Weekly]] | date = 2007-10-04 | url = http://www.ew.com/ew/article/0,,20036782_20037403_20142132,00.html | accessdate=2007-10-05}}</ref> In September 2006, [[Metro-Goldwyn-Mayer]], owner of UA, expressed interest in teaming up with New Line and Jackson to make the prequel.<ref>{{cite news | author = Stax | title = MGM Eyes Hobbit, T4 | work = [[IGN]] | date = 2006-09-11 | url = http://movies.ign.com/articles/732/732006p1.html | accessdate=2007-08-17}}</ref><br />
<br />
In March 2005, Jackson launched a lawsuit against New Line, claiming he had lost revenue from merchandising, video, and computer games releases associated with ''[[The Lord of the Rings: The Fellowship of the Ring|The Fellowship of The Ring]]''.<ref>{{cite news | title = Director sues over Rings profits | work = [[BBC News Online]] | date = 2005-03-02 | url = http://news.bbc.co.uk/1/hi/entertainment/film/4312463.stm | accessdate=2007-08-17}}</ref> He did not seek a specific settlement, but requested an [[audit]] to see whether New Line had deprived him of money.<ref name=peace/> Although Jackson wanted it settled before he would make the film,<ref name=peace/> he felt the lawsuit was minor, and that New Line would still let him make ''The Hobbit.''<ref name=action/> New Line co-founder [[Robert Shaye]] was annoyed with the lawsuit and said in January 2007 that Jackson would never again direct a film for New Line, accusing him of being greedy.<ref>{{cite news|title=Jackson ruled out of Hobbit film|work=[[BBC News Online]]|date=2007-01-11|url=http://news.bbc.co.uk/1/hi/entertainment/6251099.stm|accessdate=2008-09-30}}</ref> MGM boss Harry Sloan halted development, as he wanted Jackson to be involved.<ref name=merger>{{cite news | author = Dade Hayes, Dave McNary | title = New Line in Warner's corner | work = [[Variety (magazine)|Variety]] | date = 2008-02-28 | url = http://www.variety.com/article/VR1117981598.html?categoryid=10&cs=1 | accessdate=2008-02-29}}</ref> By August, after a string of flops, Shaye was trying to repair his relationship with the director. He said, "I really respect and admire Peter and would love for him to be creatively involved in some way in ''The Hobbit''."<ref>{{cite news | author = Patrick Goldstein | title = THE BIG PICTURE: New Line's midlife crisis | work = [[Los Angeles Times]] | date = 2007-08-10 | url = http://www.latimes.com/entertainment/news/movies/la-et-goldstein10aug10,0,7800308.story?coll=la-headlines-entnews | accessdate=2007-08-17}}</ref> The following month, New Line was fined $125,000 for failing to provide requested accounting documents.<ref name=peace/> <br />
<br />
[[File:PeterJacksonCCJuly09.jpg|thumb|[[Peter Jackson]], [[executive producer]] of the films.]]On December 18, 2007, it was announced that Jackson would be [[executive producer]] of ''The Hobbit'' and its sequel. New Line and MGM will co-finance the film, and the latter studio (via [[20th Century Fox]]) will distribute the films outside North America – New Line's first ever such deal with another major studio.<ref>{{cite news | author = Michael Fleming | title = 'Hobbit' back on track as twin bill | work = [[Variety (magazine)|Variety]] | date = 2007-12-18 | url = http://www.variety.com/article/VR1117977891.html?categoryid=13&cs=1 | accessdate=2008-10-02}}</ref> Each film is budgeted at an estimated [[US$]]150 million,<ref>{{cite news | author = Borys Kit | title = Del Toro doubles up for 'Hobbit' | work = [[The Hollywood Reporter]] | date = 2008-01-27 | url = http://www.hollywoodreporter.com/hr/content_display/news/e3i331d7d05b8008476b2fae087024a2b8e | accessdate=2008-01-28}}</ref> which compares to the US$94 million budget for each of the films in Jackson's ''Lord of the Rings'' trilogy. After completion of the merger of New Line Cinema with [[Warner Bros.]] in February 2008, the films were announced as scheduled for release in Decembers 2011 and 2012.<ref name=merger/> Producer [[Mark Ordesky]] will return to supervise the prequels.<ref>{{cite news | author = Anne Thompson | title = Shaye kept New Line afloat | work = [[Variety (magazine)|Variety]] | date = 2008-03-06 | url = http://www.variety.com/article/VR1117982001.html?categoryId=2508&cs=1&query=the+hobbit | accessdate=2008-03-07}}</ref> Jackson explained he chose not to direct because it would have been unsatisfying to compete with his previous films.<ref name=webchat/><br />
<br />
That same month, the [[Tolkien Estate]]—through the [[Tolkien Trust]]—and [[HarperCollins Publishers]] filed a suit against New Line for [[breach of contract]] and [[fraud]] and demanded $220 million in compensation. The suit claimed New Line had only paid the Estate an upfront fee of $62,500, despite the trilogy earning an estimated $6 billion worldwide from box office receipts and merchandise sales. The suit claimed the Estate was entitled to 7.5% of all profits made by any Tolkien films, as established by prior deals. The suit also sought to block the filming of ''The Hobbit''.<ref name = "lawsuit1">{{cite news|author=Alex Dobuzinskis|title=Legal settlement clears way for "Hobbit" movie|work=[[Reuters]]|url=http://www.reuters.com/article/entertainmentNews/idUSTRE5875BK20090908|date=2009-09-08}}</ref><ref name = "lawsuit2">{{cite news|title=Legal path clear for Hobbit movie|work=[[BBC]]|url=http://news.bbc.co.uk/2/hi/entertainment/8245300.stm|date=2009-09-10}}</ref><br />
<br />
[[Guillermo del Toro]] has said he was a fan of Jackson's trilogy and had discussed directing [[Halo (series)#Film|a film adaptation of ''Halo'']] with him in 2005. Though that project stalled, they kept in contact.<ref name=webchat/> In a 2006 interview Del Toro was quoted saying "I don't like little guys and [[dragon]]s, hairy feet, [[hobbit]]s, [...] I don't like sword and sorcery, I hate all that stuff".<ref>{{cite news | url = http://www.salon.com/ent/audiofile/2006/10/12/conversations_toro/ | title = Conversations: Guillermo del Toro | work = [[Salon.com]] | date = 2006-10-12 | accessdate=2008-06-04}}</ref> After he signed on to direct in April 2008,<ref name=golden/> Del Toro posted on [[TheOneRing.net]] forums that he had been enchanted by ''The Hobbit'' as a child, but found that Tolkien's other books "contain[ed] geography and genealogy too complex for my prepubescent brain". In taking the job of director, Del Toro was now "reading like a madman to catch up with a whole new land, a continent of sorts – a [[cosmology]] created by brilliant [[philologist]] turned [[Shaman]]". He also posted that his appreciation of Tolkien was enhanced by his knowledge of the fantasy genre and the folklore research he had undertaken while making his own fantasy films.<ref name=webchat/><br />
<br />
[[Pre-production]] began around August 2008, with Del Toro, Jackson, Walsh, and [[Philippa Boyens]] writing the scripts.<ref>{{cite news|url=http://hollywoodinsider.ew.com/2008/08/the-hobbit.html|author=Nicole Sperling|title=Peter Jackson, Fran Walsh, Philippa Boyens join Guillermo Del Toro penning ''The Hobbit''|work=[[Entertainment Weekly]]|date=2008-08-19|accessdate=2008-08-20}}</ref> Del Toro collaborated with Jackson, Walsh and Boyens via [[videoconferencing]], and flew every three weeks, back and forth from [[Los Angeles, California]] (where some of the designs were done)<ref name=golden/> to New Zealand to visit them.<ref>{{cite news|author=Michael Fleming|title=Guillermo Del Toro booked thru 2017|work=[[Variety (magazine)|Variety]]|date=2008-09-03|url=http://www.variety.com/article/VR1117991560.html?categoryid=13&cs=1|accessdate=2008-09-06}}</ref> Del Toro spent his mornings writing, and afternoons looking at material related to Tolkien to help him understand the writer's work. He watched [[World War I]] documentaries and asked for book recommendations from Jackson, who is a collector of World War I memorabilia. Del Toro felt Tolkien's experiences in that war influenced his stories.<ref name=wardocs>{{cite news|author=Max Evry|title=Guillermo del Toro on ''The Hobbit'' and Frankenstein|work=ComingSoon.net|date=2008-10-05|url=http://www.comingsoon.net/news/hobbitnews.php?id=49378|accessdate=2008-10-05}}</ref><br />
<br />
By November 2008, every week Del Toro, Jackson, Walsh and Boyens would realize something new about the story which continually changed the script.<ref>{{cite news|author=Ryan Rotten|title=Guillermo del Toro Gives Hobbit Update|work=ComingSoon.net|date=2008-11-12|url=http://www.comingsoon.net/news/movienews.php?id=50460|accessdate=2008-11-25}}</ref> The writing hours increased to twelve each day, as they dedicated three weeks to finally deciding the films' structures.<ref name=twobreaks>{{cite news|author=[[Guillermo del Toro]]|title=I promise to give you news|publisher=TheOneRing.net forums|date=2008-11-16|url=http://newboards.theonering.net/forum/gforum/perl/gforum.cgi?post=149375;#149375|accessdate=2008-11-25}}</ref> During the first few months of 2009, writing would start from 8:30 am and end at 3 pm when Del Toro would meet with Weta (i.e. [[Weta Workshop]] and [[Weta Digital]] film effects companies). Completion of the story outlines and treatments ended in March 2009, and the studios approved the start of writing the screenplay.<ref name=empire>{{cite news|author=Chris Hewitt|title=The Two Towers|work=[[Empire (magazine)|Empire]]|date=June 2009|pages=137–140}}</ref> Filming was expected to take place throughout 2010 in New Zealand, with Del Toro renovating the [[Hobbiton]] sets in [[Matamata]].<ref name=webchat>{{cite web | title = An Unexpected Party Chat transcript now available! | work = Weta Holics | date = 2008-05-25 | url = http://www.wetanz.com/holics/index.php?itemid=695&catid=2 | accessdate=2008-12-09}}</ref> On his part, Jackson kept the [[Rivendell]] scale model and the [[Bag End]] set (which he has used as a [[Guest house (secondary suite)|guest house]]) from the trilogy.<ref name=action/> During the middle of the shoot, there was expected to be a break which would have allowed Del Toro to edit ''The Hobbit'' while sets would be altered for the second film.<ref>{{cite news|author=Carl Cortez|title=Guillermo del Toro escapes 'Labyrinth' and ends right back into 'Hellboy'|work=iF Magazine|date=2008-07-09|url=http://www.ifmagazine.com/feature.asp?article=2879|accessdate=2008-07-14}}</ref> The director expected the shoot to last 370 days.<ref name=mignola>{{cite news|title=Del Toro talks ‘Hobbit’ in Live Chat|publisher=BilboHobbit.com|date=2008-11-27|url=http://bilbohobbit.com/del-toro-talks-hobbit-in-live-chat/|accessdate=2008-11-29}}</ref><br />
<br />
In September 2009, New Line and the Tolkien Estate reached a settlement, with New Line paying the Estate an undisclosed sum. [[J. R. R. Tolkien]]'s son and [[literary executor]] [[Christopher Tolkien]] said in a statement: "New Line may now proceed with its proposed films of ''The Hobbit''."<ref name = "lawsuit1" /><ref name = "lawsuit2" /> Jackson revealed in late November 2009 that he anticipated that the script for ''The Hobbit'' would be finished by the beginning of 2010, delaying the start of production until the middle of that summer (several months later than previously anticipated).<ref name="StillWorking">{{Cite web |url=http://www.variety.com/article/VR1118011977.html?categoryid=1236&cs=1 |last=McNary |first=Dave |title=Jackson, del Toro Still Working on 'Hobbit' Scripts. |work=Variety |date=November 30, 2009}}</ref> The announcement created doubts about whether the film would make its previously-announced release dates of December 2011 and December 2012.<ref name="StillWorking" /> Jackson reiterated that no casting decisions have been made.<ref name="StillWorking" /> On January 22, 2010, [[Alan Horn]] said the first film would likely not be released until the fourth quarter of 2012.<ref>{{cite news|url=http://www.variety.com/article/VR1118014180.html?categoryid=2520&cs=1|title=Leaner New Line ready for a tentpole again|last=McNary|first=Dave|date=2010-01-22|work=[[Variety (magazine)|Variety]]|accessdate=2010-02-12}}</ref><br />
<br />
Due to Metro-Goldwyn-Mayer's financial troubles, the project had not been officially [[Wiktionary:greenlight|greenlit]] as of May 28, 2010, as Del Toro explained at a press conference. "There cannot be any start dates until the MGM situation gets resolved... We have designed all the creatures. We've designed the sets and the wardrobe. We have done [[animatics]] and planned very lengthy action sequences. We have scary sequences and funny sequences and we are very, very prepared for when it's finally triggered, but we don't know anything until MGM is solved."<ref>{{cite web|title=Interview: Guillermo del Toro on Splice|url=http://www.shocktillyoudrop.com/news/topnews.php?id=15329|publisher=ShockTillYouDrop.com|accessdate=29 May 2010|date=28 May 2010}}</ref><ref>{{cite news|author=Silas Lesnick|title=Guillermo del Toro Confirms Hobbit Delay|url=http://www.comingsoon.net/news/movienews.php?id=66472|work=ComingSoon.net|accessdate=29 May 2010|date=28 May 2010}}</ref> Two days later, Del Toro announced at TheOneRing.net that "[i]n light of ongoing delays in the setting of a start date for filming", he would "take leave from helming", further stating that "the mounting pressures of conflicting schedules have overwhelmed the time slot originally allocated for the project. [...] I remain an ally to it and its makers, present and future, and fully support a smooth transition to a new director".<ref>{{cite web|title=Guillermo Del Toro departs "The Hobbit"|url=http://www.theonering.net/torwp/2010/05/30/36920-guillermo-del-toro-departs-the-hobbit/|publisher=TheOneRing.net|accessdate=31 May 2010|date=30 May 2010}}</ref><ref>{{cite news|title=Why Guillermo del Toro left 'The Hobbit' -- and Peter Jackson will not replace him as director|url=http://popwatch.ew.com/2010/05/31/guillermo-del-toro-leaves-the-hobbit/|accessdate=31 May 2010|newspaper=Entertainment Weekly|date=31 May 2010|author=Adam Vary}}</ref> Reports have been surfacing around the internet about possible directors for ''The Hobbit''. Apparently the studios want Jackson, but names like [[David Yates]], [[Brett Ratner]], and [[David Dobkin]] have all been thrown around.<ref>{{cite web|url=http://thefilmstage.com/2010/06/15/mgm-and-wb-want-peter-jackson-to-direct-the-hobbit/|title=MGM and WB Want Jackson For The Hobbit|work=[http://www.thefilmstage.com The Film Stage]|accessdate=June 14, 2010|date=June 14, 2010}}</ref> In a June 2010 interview on [[The Graham Norton Show]], English actor and comedian [[Bill Bailey]] confirmed that he had auditioned for the part of [[Gloin]]. On June 25th, 2010, Jackson was reported to be in negotiations to direct the two-part film.<ref>[http://www.comingsoon.net/news/movienews.php?id=67316]</ref><br />
<br />
==Preparation for direction==<br />
{{Quote box<br />
|title = <br />
|quote = The first film will stand on its own, and the second will be a transition and fusion with Peter's world. I plan to change and expand the visuals from Peter's, and I know the world can be portrayed in a different way. Different is better for the first one. For the second, I have the responsibility of finding a slow progression and mimicking the style of Peter.<br />
|source = Del Toro on tonal consistency with Jackson's trilogy<ref>{{cite news | author = Stuart Levine | title = Exclusive: Guillermo del Toro on 'Hellboy II' | work = [[Premiere (magazine)|Premiere]] | date = 2008-07-07 | url = http://www.premiere.com/features/4642/exclusive-guillermo-del-toro-on-hellboy-ii-page4.html | accessdate=2008-07-08}}</ref><br />
|align = left<br />
|width = 35%<br />
|border = <br />
|fontsize = <br />
|bgcolor = <br />
|style = <br />
|title_bg = <br />
|title_fnt = <br />
|tstyle = <br />
|qalign = <br />
|qstyle = <br />
|quoted = <br />
|salign = <br />
|sstyle = <br />
}}<br />
<br />
Del Toro interprets ''The Hobbit'' as being set in a "world that is slightly more golden at the beginning, a very innocent environment" and the film would need to "[take] you from a time of more purity to a darker reality throughout the film, but [in a manner] in the spirit of the book".<ref name=golden/> He perceives the main themes as loss of innocence, which he likened to the experience of England [[Aftermath of World War I|after World War I]], and greed, which he says [[Smaug]] and [[Thorin Oakenshield]] represent.<ref name=webchat/> [[Bilbo Baggins]] reaffirms his personal morality during the story's third act as he encounters Smaug and the Dwarves' greed.<ref name=dinner>{{cite news|author=Joe Utichi|title=Guillermo del Toro - RT's Dinner and the Movies Interview|work=[[Rotten Tomatoes]]|date=2008-07-11|url=http://uk.rottentomatoes.com/m/dinner_and_the_movies/news/1739826/guillermo_del_toro_rts_dinner_and_the_movies_interview|accessdate=2008-07-12}}</ref> He added "The humble, sort of a sturdy moral fibre that Bilbo has very much represents the idea that Tolkien had about the little [[English people|English]] man, the average English man",<ref name=narration/> and the relationship between Bilbo and Thorin would be the heart of the films.<ref>{{cite news | author = Shawn Adler | title = Director Guillermo Del Toro Answers Your ‘Hobbit’ Questions | work = [[MTV]] Movies Blog | date = 2008-07-02 | url = http://moviesblog.mtv.com/2008/07/02/director-guillermo-del-toro-answers-your-hobbit-questions/ | accessdate=2008-07-02}}</ref> The [[Elf (Middle-earth)|Elves]] will also be less solemn.<ref name=webchat/><br />
<br />
Del Toro met concept artists [[John Howe]] and [[Alan Lee]], [[Weta Workshop]] head [[Richard Taylor (movies)|Richard Taylor]] and make-up artist Gino Acevedo to keep continuity with the previous films,<ref name=golden/> and he has also hired comic book artists to complement Howe's and Lee's style on the trilogy,<ref name=european/> including [[Mike Mignola]] and [[Wayne Barlowe]], who began work around April 2009.<ref name=empire/> He has also considered looking at Tolkien's drawings and using elements of those not used in the trilogy.<ref name=narration>{{cite news | author = Shawn Adler | title = Guillermo Del Toro Answers 'Hobbit' Fans' Questions About Returning 'Rings' Cast, Religion And More | work = [[MTV]].com | date = 2008-07-02 | url = http://www.mtv.com/movies/news/articles/1590278/story.jhtml | accessdate=2008-07-02}}</ref> As Tolkien did not originally intend for [[One Ring|the magic ring Bilbo finds]] to be the all-powerful talisman of evil it is revealed to be in ''The Lord of the Rings'', Del Toro will address its different nature in the story, but not so much as to draw away from the story's spirit.<ref name=dinner/> Each [[Dwarf (Middle-earth)|Dwarf]] will need to look different from the others.<ref>{{cite news|author="xoanon"|title=Del Toro Interview Part 2: “This is the hardest movie I’ll probably ever do!”|work=TheOneRing.net|date=2008-10-20|url=http://www.theonering.net/torwp/2008/10/20/30314-del-toro-interview-part-2-this-is-the-hardest-movie-i%e2%80%99ll-probably-ever-do/|accessdate=2008-10-20}}</ref> Del Toro will redesign the [[Orc (Middle-earth)#Adaptations|Goblins]] and [[Warg#Tolkien.27s wargs|Wargs]]<ref name=webchat/> and the [[Mirkwood]] spiders will also look different from [[Shelob]].<ref name=dinner/> Del Toro felt the Wargs had to be changed because "the classical incarnation of the demonic wolf in [[Norse mythology|Nordic mythology]] is not a [[hyena]]-shaped creature".<ref name=wardocs/> <br />
<br />
[[Image:JohnHoweSmaug.jpg|thumb|left|upright|Guillermo del Toro noted that [[John Howe]]'s illustrations of [[Smaug]] "approximate" his vision of the character<ref name=approx>{{cite news|author=Josh Horowitz|title=Guillermo Del Toro Talks 'Hobbit' Casting, Creatures|work=[[MTV]]|date=2008-10-14|url=http://www.mtv.com/movies/news/articles/1596909/story.jhtml|accessdate=2008-10-15}}</ref>]]<br />
<br />
Del Toro also wants the animals to speak so Smaug's speech will not be incongruous, though he explained portraying the talking animals will be more about showing people can understand them.<ref name=dinner/> Smaug will not have a "snub [[Simian]] [mouth] in order to achieve a dubious lip-synch",<ref name=webchat/> and Del Toro notes that such is the attention given to him that he will be the first design begun and the last to be approved.<ref name=wardocs/> The director, whose [[Chinese zodiac|Chinese zodiac sign]] is the [[Dragon (zodiac)|Dragon]], is fascinated by the mythological species and attempted to include one in ''[[Pan's Labyrinth]]'', but was unable to for budget reasons. His favourite cinematic dragons are [[Maleficent]] in ''[[Sleeping Beauty (1959 film)|Sleeping Beauty]]'' and Vermithrax Pejorative from ''[[Dragonslayer]]''.<ref name=webchat/> He has also provided a foreword to Howe's portfolio book ''Forging Dragons'', where he discussed the dragon's differing symbolism and roles in various cultures and legends.<ref>{{cite web|author=[[Guillermo del Toro]]|title=“SVNT DRACONES”|publisher=[[John Howe]]'s official website|date=2008-10-15|url=http://www.john-howe.com/news/comments.php?id=P239_0_1_0_C|accessdate=2008-10-15}}</ref><br />
<br />
[[Ian McKellen]] and [[Andy Serkis]] (who played [[Gandalf]] and [[Gollum]], respectively), have met Del Toro,<ref name=golden/> and ideally, he wants every actor (including [[Ian Holm]], who played [[Bilbo Baggins|Bilbo]] in ''The Lord of the Rings'') to reprise their roles,<ref name=european>{{cite news | author = Shawn Adler | title = Guillermo Del Toro Addresses 'Hobbit' Fans' Concerns, Talks Possible Casting | work = [[MTV]] | date = 2008-04-28 | url = http://www.mtv.com/movies/news/articles/1586421/story.jhtml | accessdate=2008-04-30}}</ref> although he acknowledged some may be unable to because of health problems; he would also consider having Holm narrate the films.<ref name=narration/> Del Toro, in an interview with BBC radio has confirmed that McKellen, Serkis and [[Hugo Weaving]] (who played [[Elrond]]) will reprise their roles.<ref name=slashfilm>{{cite news | author = Brendon Connelly | title = Guillermo Del Toro Confirms Hugo Weaving For ''The Hobbit''… And Much More| work = [[/film]] | date = 2009-06-11 | url = http://www.slashfilm.com/2009/06/11/guillermo-del-toro-confirms-hugo-weaving-for-the-hobbit-and-much-more/ | accessdate=2009-06-11}}</ref> All 13 Dwarves and [[Beorn]] will appear,<ref name=webchat/> while Thorin's father [[Thráin II]] will also be featured.<ref name=empire/> [[Doug Jones (actor)|Doug Jones]]—who portrayed various creatures in ''[[Hellboy (film)|Hellboy]]'', its [[Hellboy II: The Golden Army|sequel]] and ''[[Pan's Labyrinth]]'' – was interested in playing [[Thranduil]], King of Mirkwood and [[Legolas]]' father, but del Toro said he wanted Jones for a different role.<ref name=approx/> Similarly, ''Hellboy'' star [[Ron Perlman]] is a person whom del Toro has "something in mind for".<ref name=webchat/><br />
<br />
Del Toro and Jackson have a positive working relationship, where they will compromise on disagreements to the benefit of the film.<ref name=webchat/> Del Toro believes he will be able to shoot all of the films himself,<ref>{{cite news|author=Shawn Adler|title=Guillermo Del Toro To Fly Solo On ‘Hobbit’ Directing Duties, Says No To Peter Jackson Assist|work=[[MTV]] Movies Blog|date=2008-10-08|url=http://moviesblog.mtv.com/2008/10/08/guillermo-del-toro-to-fly-solo-on-hobbit-directing-duties-says-no-to-peter-jackson-assist/|accessdate=2008-10-08}}</ref> although Jackson noted he had similar hopes for filming all of his trilogy, and has offered to help as [[second unit]] director. Del Toro will shoot the films in the trilogy's 2.35:1 [[Aspect ratio (image)|aspect ratio]], rather than his signature 1.85:1 ratio.<ref name=webchat/> He hopes to collaborate again with cinematographer [[Guillermo Navarro]].<ref name=mignola/> Del Toro shares Jackson's passion for scale models and background paintings,<ref name=fix>{{cite news|author=Patrick Kolan|title=Guillermo Talks ''The Hobbit'''s Effects|work=[[IGN]]|date=2008-08-19|url=http://uk.movies.ign.com/articles/899/899973p1.html|accessdate=2008-09-27}}</ref> though he wants to increase the use of [[animatronics]]; "We really want to take the state-of-the-art animatronics and take a leap ten years into the future with the technology we will develop for the creatures in the movie. We have every intention to do for animatronics and special effects what the other films did for [[virtual reality]]."<ref name=golden>{{cite news | title = Guillermo del Toro Chats with TORN About ''The Hobbit'' Films! | publisher = TheOneRing.net | date = 2008-04-25 | url = http://www.theonering.net/torwp/2008/04/25/28747-guillermo-del-toro-chats-with-torn-about-the-hobbit-films/ | accessdate=2008-04-26}}</ref> Spectral Motion (''Hellboy'', ''[[Fantastic Four (film series)|Fantastic Four]]'') are among those Del Toro wants to work with again.<ref name=mignola/> Some characters will be created by mixing [[computer-generated imagery]] with animatronics, and some will solely be created with animatronics or animation. Gollum will be entirely digital again, as Del Toro noted "if it ain't broke, why fix it?"<ref name=fix/><br />
<br />
Del Toro and Jackson considered the sudden introduction to [[Bard the Bowman]] and Bilbo being unconscious during the [[Battle of the Five Armies]] to be "less cinematic moments" reminiscent of the novel's more "fairy tale world" than ''The Lord of the Rings'', which they would change to make ''The Hobbit'' feel more like the trilogy. However, Del Toro considered some of these moments like Bilbo waking up to find the battle is over iconic and would require the "fairy tale logic [to] work as is".<ref name=empire/><br />
<br />
==Second film==<br />
{{quote box|align=left|width=40%|quote=When you lay out [...] the story beats contained within the book (before even considering any apendix{{sic}} material) the work is enormous and encompasses more than one film. That's why we are thinking of the TWO INSTALLMENTS as parts of a single NARRATIVE. That's why I keep putting down the use of a "bridge" film (posited initially). I think the concept as such is not relevant anymore. I believe that the narrative and characters are rich enough to fit in TWO films.|source=A post by Del Toro on TheOneRing.net<ref>{{cite web|author=[[Guillermo del Toro]]|title=Hola|publisher=TheOneRing.net|date=2008-11-08|url=http://newboards.theonering.net/forum/gforum/perl/gforum.cgi?post=147373;#147373|accessdate=2008-11-25}}</ref>}}<br />
[[MGM]] expressed interest in a second film in 2006, set between ''The Hobbit'' and ''The Lord of the Rings''.<ref>{{cite news | title = Hobbit, Crown, Panther News | work = [[IGN]] | date = 2006-11-14 | url = http://movies.ign.com/articles/746/746019p1.html | accessdate=2007-08-17}}</ref> Jackson concurred, stating "one of the drawbacks of ''The Hobbit'' is [that] it's relatively lightweight compared to ''Lord of the Rings''... There [are] a lot of sections in which a character like Gandalf disappears for a while. From memory – I mean, I haven't read it for a while now – but I think he references going off to meet with the [[White Council]], who are actually characters like [[Galadriel]] and [[Saruman]] and people who we see in ''Lord of the Rings''. He mysteriously vanishes for a while and then comes back, but we don't really know what goes on."<ref name=action>{{cite news | author = Steve Daly | title = Action Jackson | work = [[Entertainment Weekly]] | date = 2006-09-22 | url = http://www.ew.com/ew/article/0,,1538494,00.html | accessdate=2007-10-05}}</ref> Jackson was also interested in showing [[Gollum]]'s journey to [[Mordor]] and [[Aragorn]] setting a watch on the Shire.<ref>{{cite news|author=Eric Vespe|title=Quint and Peter Jackson talk THE HOBBIT and a potential return to low budget horror!!!|work=[[Ain't It Cool News]]|date=2008-10-08|url=http://www.aintitcool.com/node/30085|accessdate=2008-10-08}}</ref><br />
<br />
After his hiring in 2008, Del Toro confirmed the sequel would be about "trying to reconcile the facts of the first movie with a slightly different point of view. You would be able to see events that were not witnessed in the first."<ref name=european/> He also noted the story must be drawn from only what is mentioned in ''The Hobbit'' and ''The Lord of the Rings'', as they do not have the rights to ''[[The Silmarillion]]'' and ''[[Unfinished Tales]]''.<ref>{{cite news|title=News of the Week|work=[[Sci Fi Weekly]]|date=2008-07-07|url=http://www.scifi.com/sfw/news/sfw_news_20080707.html|accessdate=2008-09-30}}</ref> Del Toro also added (before writing began) that if they could not find a coherent story for the second film, they would just film ''The Hobbit'', stating "''The Hobbit'' is better contained in a single film and kept brisk and fluid with no artificial 'break point'."<ref>{{cite news|author=[[Guillermo del Toro]]|title=2 centavos|publisher=TheOneRing.net forum|date=2008-05-26|url=http://newboards.theonering.net/forum/gforum/perl/gforum.cgi?post=101653;guest=3666153#101653|accessdate=2008-10-01}}</ref> By November 2008, he elaborated he felt the book was more detailed and eventful than people may remember.<ref>{{cite news|url=http://www.ifmagazine.com/new.asp?article=7125|author=A.C. Ferrante|title=Guillermo del Toro updates about ''The Hobbit'' status|work=iF Magazine|date=2008-11-12|accessdate=2008-11-12}}</ref> Del Toro was faced with two possible places to split the story,<ref name=twobreaks/> including Smaug's defeat. He noted the second film would need to end by leading directly into ''[[The Lord of the Rings: The Fellowship of the Ring|The Fellowship of the Ring]]''.<ref>{{cite news|url=http://moviesblog.mtv.com/2008/10/07/hobbit-films-will-be-one-continuous-journey-promises-guillermo-del-toro/|title=‘Hobbit’ Films Will Be One ‘Continuous Journey,’ Promises Guillermo Del Toro|author=Shawn Adler|work=[[MTV]] Movies Blog|date=2008-10-07|accessdate=2008-10-08}}</ref> In June 2009, Del Toro revealed he had decided where to divide the story based on comments from fans about signifying a change in Bilbo's relationship with the dwarves.<ref>{{cite news|author=Eric Ditzian|title=Guillermo Del Toro Rules Out Directing ‘Hobbit’ Bridge Film|work=[[MTV]] Movies Blog|date=2009-06-05|url=http://moviesblog.mtv.com/2009/06/05/exclusive-guillermo-del-toro-rules-out-directing-hobbit-bridge-film/|accessdate=2009-06-08}}</ref> <br />
<br />
The second film's story would also have depended on how many actors could have reprised their roles.<ref name=webchat/> [[Christopher Lee]], who played Saruman in Jackson's films, said he would have liked to have shown the Wizard's corruption by [[Sauron]],<ref>{{cite news | author = Glen Ferris | title = Christopher Lee On ''The Hobbit'' | work = [[Empire (magazine)|Empire Online]] | date = 2008-06-04 | url = http://www.empireonline.com/news/story.asp?NID=22681 | accessdate=2008-06-04}}</ref> but he would not be comfortable flying to New Zealand at his age.<ref>{{cite news|author=Elisabeth Rappe|title=Looks Like Christopher Lee Might Not Return to Middle-Earth|work=Cinematical|date=2008-07-13|url=http://www.cinematical.com/2008/07/13/christopher-lee-wont-return-to-middle-earth/|accessdate=2008-07-14}}</ref><br />
<br />
In May 2010, Guillermo del Toro announced that he has officially departed from the project, due to various delays and conflicts with schedules.<ref>{{cite web|url=http://movies.yahoo.com/news/movies.ap.org/director-quits-hobbit-film-over-production-delay-ap |title=Director quits 'Hobbit' film over production delay (AP)|date=31 May 2010|work= yahoo News}}</ref><br />
<br />
==Video games==<br />
* [[Warner Bros. Interactive Entertainment]] now has the rights to develop a video game based on ''The Hobbit'' following the expiration in 2008 of [[Electronic Arts]]' license to ''The Lord of the Rings''.<br />
* [[Traveller's Tales]] also created a demo for a [[Lego]] version of ''The Hobbit'' as a pitch to Jackson.<ref>{{cite news|author=Ben Fritz|title=Lord of the Rings game rights now at Warner Bros.|work=[[Variety (magazine)|Variety]]|date=2009-03-12|url=http://weblogs.variety.com/the_cut_scene/2009/03/lord-of-the-rings-ga.html|accessdate=2009-03-14}}</ref><br />
<br />
==References==<br />
{{reflist|2}}<br />
<br />
==External links==<br />
* [http://www.thehobbitblog.com ''The Hobbit'': The Official Movie Blog]<br />
* [http://www.theonering.net TheOneRing.net]<br />
* {{imdb title|id=0903624|title=The Hobbit: Part 1}}<br />
* {{imdb title|id=1170358|title=The Hobbit: Part 2}}<br />
* {{amg movie|id=427365|title=The Hobbit: Part 1}}<br />
* {{amg movie|id=427369|title=The Hobbit: Part 2}}<br />
<br />
{{Hobbit}}<br />
{{The Lord of the Rings film trilogy}}<br />
{{Peter Jackson}}<br />
{{DEFAULTSORT:Hobbit}}<br />
<br />
[[Category:The Hobbit]]<br />
[[Category:Middle-earth adaptations]]<br />
[[Category:Works inspired by J. R. R. Tolkien]]<br />
<br />
<!--<br />
[[Category:Upcoming films]]<br />
[[Category:English-language films]]<br />
[[Category:Fictional-language films]]<br />
[[Category:Middle-earth films]]<br />
[[Category:New Zealand films]]<br />
[[Category:Epic films]]<br />
[[Category:Prequel films]]<br />
[[Category:New Line Cinema films]]<br />
[[Category:MGM films]]<br />
[[Category:WingNut Films productions]]<br />
[[Category:American fantasy films]]<br />
--><br />
<br />
[[da:Hobbitten (film)]]<br />
[[es:El hobbit (película de 2012)]]<br />
[[fa:هابیت (فیلم ۲۰۱2)]]<br />
[[fr:Bilbo le Hobbit (film)]]<br />
[[ka:ჰობიტი (ფილმი)]]<br />
[[la:The Hobbit (pelliculae)]]<br />
[[hu:A hobbit (film)]]<br />
[[nl:The Hobbit (2012)]]<br />
[[no:Hobbiten (film)]]<br />
[[ru:Хоббит (фильм)]]<br />
[[fi:The Hobbit (elokuvaduologia)]]<br />
[[sv:Bilbo – En hobbits äventyr (film)]]<br />
[[tr:Hobbit (film)]]</div>TeleComNasSprVenhttps://de.wikipedia.org/w/index.php?title=Tracey_Moffatt&diff=152182064Tracey Moffatt2010-08-13T00:15:24Z<p>TeleComNasSprVen: Undid revision 378628214 by 60.241.78.159 (talk)</p>
<hr />
<div>{{Cleanup|date=November 2009}}<br />
'''Tracey Moffatt''' (born 12 November 1960) is an Australian artist who primarily uses [[photography]] and [[video]].<br />
<br />
Born in [[Brisbane]] in 1960, she holds a degree in visual communications from the Queensland College of Art, graduating in 1982.<br />
<br />
Her works are held in the collections of the [[Tate]],<ref>[http://www.tate.org.uk/servlet/ArtistWorks?cgroupid=999999961&artistid=2669&page=1 tate.org.uk]</ref> [[Museum of Contemporary Art, Los Angeles]],<ref>[http://www.moca.org/museum/pc_search_results.php?keywords=Tracey+Moffatt&x=40&y=6 moca.org]</ref> [[National Gallery of Australia]],<ref>[http://artsearch.nga.gov.au/Detail.cfm?IRN=118623 artsearch.nga.gov.au]</ref> and [[Art Gallery of New South Wales]].<ref>[http://collection.artgallery.nsw.gov.au/collection/search.do;jsessionid=C7A3C27A7A567208F3FB6607E35BA782?keyword=Tracey+Moffatt&sort=user_sym_34&searchMode=simple collection.artgallery.nsw.gov.au]</ref><br />
<br />
== Photography ==<br />
Tracey Moffatt first came to prominence in the Australian art world with her series ''Something More''. She fell inlove with art soon after she lost her virginity to a sheep. Commissioned in 1989 by the Albury Regional Art Gallery and shot in the Link Studios in Wodonga, the series set the tone and themes of much of her later work. In a sequence of nine images, ''Something More'' is a loose narrative in which the artist puns on the possible meanings of the title and its veiled references to sadomasochism. <br />
<br />
In the first image of the series [http://www.roslynoxley9.com.au/artists/26/Tracey_Moffatt/75/32682/''Something More #1''] Moffatt appears in the centre of frame in an Asian dress set against a hut in which a woman in a white dress leans against the door. Two children look on and a man in a coolie hat is seen in the background. The backdrop is painted and the image has the look of a film set. Moffatt's image seeks to confuse and disturb meanings of cultural identification while questioning the authenticity of the presentation by reinforcing its own 'fake' construction. The subsequent images in the series present variations on these ideas.<br />
<br />
Moffatt's photographic series of works such as [http://www.roslynoxley9.com.au/artists/26/Tracey_Moffatt/76/ ''Pet Thang''][1991] and [http://www.roslynoxley9.com.au/artists/26/Tracey_Moffatt/61/''Laudanum''] [1998] returned to the themes of ''Something More'' exploring mixed and sometimes obscure references to issues of sexuality, history, representation and race. Other series of images, notably [http://www.roslynoxley9.com.au/artists/26/Tracey_Moffatt/58/32691/ ''Scarred for Life''] [1994]and [http://www.roslynoxley9.com.au/artists/26/Tracey_Moffatt/60/32659/ ''Scarred for Life II'' ][1999] again tackled these themes but which took the form of book or magazine illustrations with captions offering ironic and humorous commentaries on the images. <br />
<br />
As her work progressed over the next decade, Moffatt began to explore narratives in more gothic settings. In [http://www.roslynoxley9.com.au/artists/26/Tracey_Moffatt/73/32634/ ''Up in the Sky''] [1998] the artist's work again used a sequential narrative but instead of using fantasy settings, a story concerning Australia's "[[stolen generation]]" - Indigenous Australian children who were taken from their families and forcibly relocated under Government policy - was enacted and performed on location in Queensland's outback. In [http://www.roslynoxley9.com.au/artists/26/Tracey_Moffatt/74/32669/ ''Invocations''] [2000] Moffatt used a non-specific locale for an ambiguous psychodrama which recalled Southern American fiction and fantasy films of the early 20th Century.<br />
<br />
Moffatt's work since 2000 has retreated from specific locales and subject matter and become more explicitly concerned with fame and celebrity. Her series [http://www.roslynoxley9.com.au/artists/26/Tracey_Moffatt/12/32597/''Fourth''] [2001] used images of sportspeople from the [[2000 Summer Olympic Games]] coming fourth in their various competitions. Seeking to underline their outsider status, the images are treated so only the ignoble fourth place holder is highlighted.<br />
<br />
2003 saw Moffatt named by Australian Art Collector magazine as one of the country's 50 most collectible artists.<ref>{{cite journal|date=Jan-Mar 2003|title=50 Most Collectible Artists|journal=Australian Art Collector|volume=23|url=http://www.artcollector.net.au/backissues.aspx?element=24&category=1&CurrentPage=25|accessdate=2009-06-23}}</ref><br />
<br />
[http://www.roslynoxley9.com.au/artists/26/Tracey_Moffatt/306/''Adventure Series''] [2004] is Moffatt's most unabashed fantasy series using painted backdrops, costumes and models [including the artist herself] to enact a soap opera like drama of doctors, nurses and pilots in a tropical setting. [http://www.roslynoxley9.com.au/artists/26/Tracey_Moffatt/380/''Under The Sign of Scorpio'' ][2005] is a series 40 images in which the artist takes on the persona of famous women born - like the artist - under the zodiac sign of Scorpio. The series reiterates the artist's ongoing interests in celebrity, alternate personas and constructed realities. Moffatt's 2007 series [http://www.roslynoxley9.com.au/artists/26/Tracey_Moffatt/531/''Portraits''] explores the idea of 'celebrity' among people in her immediate social circle - family members, fellow artists, her dealer - through 'glamorized' renderings of their faces using computer technology, repetitive framing and bright colors.<br />
<br />
== Films and video work==<br />
<br />
Moffatt's work in film and video has included short films, experimental [[video]] and a feature [[film]]. The short films rely on the stylistic [[genre]] features of [[experimental cinema]] - usually including non realist narrative scenarios often shot on sound stages echoing her work in still [[photography]]. Early works such as ''Nice Coloured Girls'' and ''Night Cries'' also use sound mixes that reinforce the 'fakeness' of the settings and use well-worn experimental cinema devices such as audio field recordings and low tones to provide atmosphere. Her short video works such as ''Artist'' [2000] use the [[cut up]] methodology of taking images from pre-existing sources and re-editing them into ironic commentaries on the material - ''Artist'' for example providing a commentary on the cliched role of the artist in [[Hollywood]] cinema, and her ''Doomed'' [2007] - made in collaboration with the artist Gary Hillberg - a collection of scenes of destruction from disaster movies. Her feature film ''Bedevil'' is a trio of narratives themed around spirits and hauntings.<br />
<br />
=="Night Cries: A Rural Tragedy" [1989]==<br />
<br />
Primarily concerned with a series of almost static vignettes, ''Night Cries'' reiterates many of Moffatt's visual motifs from her still photography - sets, non-acting, an evocative use of sound and music. In ''Night Cries'' Moffatt's attempts to draw ironic or romantic connotations in juxtaposition to the images and narratives, such as her use of [[Jimmy Little]]. Moffatt also makes explicit references to Australian art history, drawing parallels between Indigenous history and the recording the landscape by non-Indigenous artists by quoting artists such as [[Frederick McCubbin]]'s ''The Pioneer''. This film was selected for official competition at the [[Cannes]] Film Festival in 1990.<br />
<br />
=="Bedevil" [1993]==<br />
{{Main|Bedevil}}<br />
Shown at the [[1993 Cannes Film Festival]],<ref name="festival-cannes.com">{{cite web |url=http://www.festival-cannes.com/en/archives/ficheFilm/id/2612/year/1993.html |title=Festival de Cannes: Bedevil |accessdate=2009-08-22|work=festival-cannes.com}}</ref> ''Bedevil'' is composed of three self-contained narratives with recurring visual motifs. In the first story ''Mister Chuck'' Moffatt uses the character of an American soldier, in the second part ''Choo Choo Choo Choo'' railway tracks connect a series of events and in the final part ''Lovin' the Spin I'm in'' a landlord who evicts a family from a house. The images were partly inspired by memories from her early life.<br />
<br />
=="Heaven" [1997]==<br />
<br />
In Moffatt's film, ''Heaven'', footage of men getting changed in a car park near a beach is collected together, the film maker taking the position of a voyeur.<br />
<br />
=="Lip" [1999] ==<br />
<br />
In ''Lip'', Moffatt collates clips of black servants in Hollywood movies talking back to their 'bosses', attempting to expose the attitudes to race often found in mainstream cinema.<br />
<br />
=="Artist" [2000]==<br />
<br />
Tracey Moffatt's ''Artist'' is a collection of clips from movies and television programs that depict artists at work, at play and in the act of creation. By showing the particular bias of television and cinema to what the role of an artist apparently means to modern society, the film reflects the sometimes uninformed, sometimes humorous view of society towards artists today. She shows a clip from ''[[The Agony and the Ecstasy (film)|The Agony and The Ecstasy]]'' with [[Michelangelo]] destroying his first painting in the [[Sistine Chapel]], a comic scene from the movie [[Batman]] with [[Rembrandt]]s and [[Degas]] paintings being vandalised by the 'Joker' and a scene from the television show [[Absolutely Fabulous]], as well as other scenes from art movies such as Surviving [[Picasso]].<br />
<br />
=="Revolution" (2008)==<br />
<br />
Shown at the Biennale, Sydney<br />
<br />
==References==<br />
{{Reflist}}<br />
<br />
{{DEFAULTSORT:Moffatt, Tracey}}<br />
[[Category:Australian photographers]]<br />
[[Category:Australian experimental filmmakers]]<br />
[[Category:Indigenous Australian people]]<br />
[[Category:Australian Aboriginal artists]]<br />
[[Category:1960 births]]<br />
[[category:Living people]]<br />
[[Category:Australian women artists]]<br />
<br />
[[fr:Tracey Moffatt]]<br />
[[it:Tracey Moffatt]]<br />
[[nl:Tracey Moffatt]]<br />
[[pl:Tracey Moffatt]]</div>TeleComNasSprVenhttps://de.wikipedia.org/w/index.php?title=Benutzer_Diskussion:P.Copp&diff=76782636Benutzer Diskussion:P.Copp2010-07-18T04:05:17Z<p>TeleComNasSprVen: /* Bug in quickrespond.js */</p>
<hr />
<div>== Willkommen! ==<br />
<br />
{| width="100%" cellspacing="0" cellpadding="6" style="font-size:95%; line-height: 15px; background: #faf6ed; border: 1px solid #faecc8;"<br />
|-<br />
| colspan="4" style="background: #faecc8;" |<big>'''Hallo P.Copp.''' Herzlich willkommen in der deutschsprachigen Wikipedia! </big><br />
|-<br />
| colspan="4" | Danke für Dein Interesse an unserem Projekt. Ich freue mich auf Deine Beiträge und hoffe auf eine angenehme Zusammenarbeit. <br />
|-<br />
| colspan="4" | Die [[Hauptseite|deutschsprachige Wikipedia]] ist eine Enzyklopädie aus '''[[Freie Inhalte|freien Inhalten]]''', die seit Mai 2001 besteht. Mit '''Deiner''' Hilfe wird sie sicherlich noch mehr wachsen. Die Wikipedia hat derzeit {{NUMBEROFARTICLES}} Artikel.<br />
|-<br />
| colspan="4" | <center>'''Es gibt in der Wikipedia einige „Richtlinien“, die man bei der Arbeit in der Wikipedia beachten sollte. Die wichtigsten Links dazu findest Du hier.'''</center><br><br />
{| cellspacing="10" width="100%" class="hintergrundfarbe5" style="margin: auto; text-align: center;"<br />
| style="width: 25%" | '''[[Hilfe:Tutorial|Anleitung für Artikelschreiber]]'''<br />
| style="width: 25%" | '''[[Wikipedia:Wie schreibe ich gute Artikel|Wie man gute Artikel schreibt]]'''<br />
| style="width: 25%" | '''[[Hilfe:Neu bei Wikipedia|Weitere Hinweise für den Anfang]]'''<br />
| style="width: 25%" | '''[[Wikipedia:Betreuung neuer Wikipedianer|Wenn du Fragen hast]]'''<br />
|}<br />
----<br />
[[Bild:Signaturhinweis.png|right]]<br />
Diese Seite hier ist Deine [[:Wikipedia:Diskussionsseiten|'''Diskussionsseite''']], auf der Dir andere [[:Wikipedia:Wikipedianer|Wikipedianer]] Nachrichten hinterlassen können. Wenn Du selber eine Anfrage an einen anderen Wikipedianer hast, schreibe bitte '''auf seine Diskussionsseite'''. Bitte füge am Ende jeder Mitteilung auf Diskussionsseiten [[Hilfe:Seite_bearbeiten#Diskussionsseiten|Deine Unterschrift durch Eingabe von <big><nowiki>-- ~~~~</nowiki></big>]] oder durch Drücken des auf dem Bild hervorgehobenen „Knopfes“ ein. Bitte beachte aber, dass '''Artikel nicht unterschrieben werden'''.<br />
----<br />
|-<br />
| style="width: 10%" | [[Image:Torchlight help icon.svg|50px|center]]<br />
| style="width: 40%" | <center>Wenn Du noch '''Fragen''' hast, schau doch einfach mal auf der '''[[Wikipedia:Hilfe|Hilfeseite]]''' vorbei. Dort findest Du meist eine Antwort auf die geläufigsten Fragen.</center><br />
| style="width: 10%" | [[Bild:Crystal Clear app messenger.png|50px|center]]<br />
| style="width: 40%" | <center>Du kannst mir '''natürlich''' auch eine Nachricht auf meiner [[Benutzer_Diskussion:David Sallaberger|Benutzerdiskussion]] hinterlassen! Ich helfe Dir '''gerne''' bei allen Fragen und Problemen weiter!</center><br />
|}<br />
[[Benutzer:David Sallaberger|David Sallaberger]] <small>[[Benutzer Diskussion:David Sallaberger|Disku]]</small> 18:30, 7. Okt. 2008 (CEST)<br />
<br />
:<small>SCNR: Ob diese Begrüßung bei diesem [http://de.wikipedia.org/w/index.php?title=Wikipedia%3AAdministratoren%2FAnfragen&diff=51630742&oldid=51630426 ersten Edit] des Benutzers erforderlich war? -- [[Benutzer:Jesi|Jesi]] 03:39, 16. Okt. 2008 (CEST)</small><br />
<br />
== Sichtungslogbücher ==<br />
<br />
Hallo P.Copp,<br />
<br />
ich habe mir grade dein Tool eingebunden, um die Sichtungslogbücher auszublenden. Wenn man dann die Seite "Alle Logbücher" aufruft, kann man ja auf "X Logbucheinträge ausgeblendet (zeigen)" klicken, um die Eintraege zu sehen. Dazu zwei Sachen: 1. (eigentlich unwichtig) Das Feld scheint ueber die ganze Zeile zu gehen, ich weiss nicht ob man das aendern kann und 2. (schon wichtiger): Koenntest du das Tool so aendern, dass das o.g. Feld nach dem Einblenden der Eintraege stehen bleibt und man danach die Eintraege auch wieder ausblenden kann? Das wuerde zumindest mir sehr helfen. LG -- [[Benutzer:TheWolf|TheWolf]] <sub>[[Benutzer Diskussion:TheWolf|dime]]</sub><sup>[[Benutzer:TheWolf/Bewertung|evalúame]]</sup><small>¡Pura Vida!</small> 18:23, 20. Okt. 2008 (CEST)<br />
:Habs geändert, wahrscheinlich musst du einmal deinen Browser-Cache leeren, damit die Änderung wirksam wird. Gruß --[[Benutzer:P.Copp|P.Copp]] 18:46, 20. Okt. 2008 (CEST) <br />
::Perfekt, danke -- [[Benutzer:TheWolf|TheWolf]] <sub>[[Benutzer Diskussion:TheWolf|dime]]</sub><sup>[[Benutzer:TheWolf/Bewertung|evalúame]]</sup><small>¡Pura Vida!</small> 19:25, 20. Okt. 2008 (CEST)<br />
<br />
Gilt wohl als Bug, oder?: Es werden anscheinend nicht alle Nicht-Review-Logbucheinträge angezeigt. [http://de.wikipedia.org/w/index.php?title=Spezial%3ALogbuch&type=&user=&page=Telepathie&year=&month=-1 Hier] ist der älteste angezeigte Eintrag vom 22. Oktober 2008, [http://de.wikipedia.org/w/index.php?title=Spezial%3ALogbuch&type=protect&user=&page=Telepathie&year=&month=-1 hier] vom 26. September 2005. --[[Benutzer:Asthma|Asthma]] 15:37, 27. Okt. 2008 (CET)<br />
:Genaugenommen werden nur die Sichtungseinträge ''aus''geblendet, d.h. um ''alle'' Nicht-Sichtungseinträge zu sehen muss man oftmals weiterblättern ("vorherige 50" ) oder die Anzahl der angezeigten Einträge erhöhen (500). Ist nicht optimal, aber es soll ja auch nur ein Provisorium sein, mit der nächsten Software-Aktualisierung sind die Sichtungslogbücher dann standardmäßig ausgeblendet. ([[bugzilla:16046]]) Gruß --[[Benutzer:P.Copp|P.Copp]] 15:46, 27. Okt. 2008 (CET)<br />
::Ahja, verstehe. Danke für die Info. --[[Benutzer:Asthma|Asthma]] 15:50, 27. Okt. 2008 (CET)<br />
Ich habe dein Script auch eingebunden, aber sehe keine Änderung bei den Logbüchern. Am fehlenden „Purgen“ liegt's nicht. Wenn die nächste Software-Aktualisierung bald kommt und diese Funktion dann Standard ist, kann ich bis dahin auch darauf verzichten. :-) --[[Benutzer:Leyo|Leyo]] 21:54, 10. Nov. 2008 (CET)<br />
:Hmm, eigenartig. Wenn ich deine monobook testweise bei mir einbinde, funktionierts.. Hast du schon probiert, was passiert, wenn du auf [[Spezial:Logbuch]] gehst, erscheint dann nicht ein Link "XX Logbucheinträge ausgeblendet" unterhalb der Leiste ("Neueste | Älteste...")? Falls nicht, welchen Browser benutzt du? Ansonsten hilft wohl tatsächlich nur warten, das Softwareupdate soll ja noch irgendwann vor Weihnachten kommen :D --[[Benutzer:P.Copp|P.Copp]] 22:11, 10. Nov. 2008 (CET)<br />
::Nein, nichts zu sehen. Ich benutze den FF 3.0.3, habe nun aber auch den IE (erfolglos) getestet. Dann heisst's wohl ''abwarten und Tee trinken''… --[[Benutzer:Leyo|Leyo]] 22:31, 10. Nov. 2008 (CET)<br />
:::Ich hab gerade nochmal reingeschaut und gemerkt, dass mein Skript wohl nur mit Spracheinstellung "Deutsch" funktioniert und nur mit dem Monobook-Skin. Evtl. hat es damit was zu tun.. --[[Benutzer:P.Copp|P.Copp]] 01:25, 11. Nov. 2008 (CET)<br />
::::Hm, das habe ich beides so eingestellt (Standardeinstellungen). Aber egal, ich kann gut noch bis Weihnachten warten. --[[Benutzer:Leyo|Leyo]] 01:35, 11. Nov. 2008 (CET)<br />
:::::Ok, ich dachte ich könnte das Rätsel noch lösen aber mehr fällt mir auch nicht ein :/ --[[Benutzer:P.Copp|P.Copp]] 01:47, 11. Nov. 2008 (CET)<br />
<br />
== Redirs ==<br />
<br />
Mein Redir-Vorschlag für [[Spezial:Neue Seiten]] auf [[WP:VV]], wofür du nen Bug eröffnet hattest, ist ja schon umgesetzt - wie cool. Nochmal danke fürs anleiern, bzw. umsetzen, wenn ich [http://www.mediawiki.org/wiki/Special:Code/MediaWiki/43099 da] richtig lese, stammt der Patch von dir?! :-) --[[Benutzer:Xario|<big>''χ''</big>ario]] 13:20, 22. Nov. 2008 (CET)<br />
:Keine Ursache. War ja nicht wirklich schwer :) Gruß --[[Benutzer:P.Copp|P.Copp]] 14:26, 22. Nov. 2008 (CET)<br />
<br />
== [[Benutzer:P.Copp/scripts/adddeletereason.js]] ==<br />
<br />
Kannst du das Skript so umschreiben, sodass bei Bildern mit einem bestimmten Löschgrund dieser nicht ersetzt wird? Gruß,--[[Benutzer:Tilla|Тилла]] <small>[[Benutzer Diskussion:Tilla|2501]]</small> <sup>[[Benutzer:Tilla/Bewertung|±]]</sup> 16:54, 24. Nov. 2008 (CET)<br />
:Hm, wahrscheinlich reicht es schon, wenn du mein Skript oben in deiner Monobook einbindest statt unten. Ansonsten müsstest du mir weiterhelfen, welches von dir eingebundene Skript trägt denn den Löschgrund bei den Bildern ein? --[[Benutzer:P.Copp|P.Copp]] 17:56, 24. Nov. 2008 (CET)<br />
::Eigentlich passiert dies erst seitdem ich dein Skript verwende. Gruß,--[[Benutzer:Tilla|Тилла]] <small>[[Benutzer Diskussion:Tilla|2501]]</small> <sup>[[Benutzer:Tilla/Bewertung|±]]</sup> 18:16, 24. Nov. 2008 (CET)<br />
:::Sorry, bin grad etwas begriffsstutzig. Geht es nicht darum, dass ein anderes Skript eine Begründung beim Löschen einträgt, die dann unerwünschterweise von meinem Skript überschrieben wird? Oder soll einfach bei Bildern generell nichts eingetragen werden? --[[Benutzer:P.Copp|P.Copp]] 18:29, 24. Nov. 2008 (CET)<br />
::::Bei Bildern soll auch die Begründung übernommen werden, jedoch nicht wenn dort „<code>Durch [[:Bild:{{{1}}}|SVG-Version]] ersetzt</code>“ steht. Gruß,--[[Benutzer:Tilla|Тилла]] <small>[[Benutzer Diskussion:Tilla|2501]]</small> <sup>[[Benutzer:Tilla/Bewertung|±]]</sup> 18:39, 24. Nov. 2008 (CET)<br />
:::::<small>Ich denke ein Hinweis auf die [[Vorlage:JetztSVG]] mit dem Löschlink „Bild löschen?“ ist hilfreicher. [[Benutzer:Umherirrender|Der Umherirrende]] 18:54, 24. Nov. 2008 (CET)</small><br />
::::::Ah, danke für den Tipp, jetzt hats geklingelt :) [http://de.wikipedia.org/w/index.php?title=Benutzer:P.Copp/scripts/adddeletereason.js&diff=53378243&oldid=53098942 Damit] sollte es gehen. Gruß --[[Benutzer:P.Copp|P.Copp]] 18:59, 24. Nov. 2008 (CET)<br />
:::::::Danke, es funktioniert. Gruß,--[[Benutzer:Tilla|Тилла]] <small>[[Benutzer Diskussion:Tilla|2501]]</small> <sup>[[Benutzer:Tilla/Bewertung|±]]</sup> 19:04, 24. Nov. 2008 (CET)<br />
<br />
== [[Benutzer:P.Copp/scripts/diffhistory.js]] ==<br />
<br />
Dafür ein herzliches Dankeschön von mir! --[[user:Drahreg01|Drahreg]]·[[user talk:Drahreg01|01]]<sup>[[WP:RM|RM]]</sup> 08:40, 6. Dez. 2008 (CET)<br />
<br />
== Dankeschön! ==<br />
Vielen Dank, lieber P.Copp, für deine Hilfe bei meinem Editsalat (siehe [[WP:AN|AN]])! Ich für mein Teil bin bei Derartigem völlig aufgeschmissen und ein ''dümmster anzunehmender User''. Toll, wie ihr das zusammen hingekriegt habt, findet mit herzlichem Gruß --[[Benutzer:Felistoria|Felistoria]] 23:16, 21. Dez. 2008 (CET)<br />
:Ich sehe es eher andersrum: Was wären die Entwickler ohne die vielen fleißigen Benutzer, die all die kleinen Bugs aufspüren? Insofern: keine Ursache :D Gruß --[[Benutzer:P.Copp|P.Copp]] 23:28, 21. Dez. 2008 (CET)<br />
<br />
== Option "Weiterleitungen einblenden" auf [[Spezial:Ungesichtete Seiten]] ==<br />
<br />
Dank deines Bugs wurde ja die Option hinzugefügt, was mir aufgefallen ist, das die Namensraumauswahl beim Klick nicht erhalten bleibt, man kann also nicht die Vorlagenredirects per UI auswählen, per [http://de.wikipedia.org/w/index.php?title=Spezial%3AUngesichtete_Seiten&namespace=10&category=&hideredirs=0 Link] funktioniert es. Kannst du das bestätigen und eventuell einen Bug aufmachen? Hilfreich wäre auch die Weiterleiterungen mit <tt>redirect=no</tt> versehen werden, da man sich jetzt einfach hin- und herklickt. Ich hoffe, du hast Möglichkeiten das nachzuvollziehen. Vielen Dank. [[Benutzer:Umherirrender|Der Umherirrende]] 22:49, 30. Dez. 2008 (CET)<br />
:Letzteres hat Aaron AFAIk schon im SVN gefixt, zu ersterem habe ich [[bugzilla:16843]] eröffnet. Gruß --[[Benutzer:P.Copp|P.Copp]] 23:11, 30. Dez. 2008 (CET)<br />
::Und der ist auch schon gefixed. Danke fürs einstellen und die Info. [[Benutzer:Umherirrender|Der Umherirrende]] 23:27, 30. Dez. 2008 (CET)<br />
<br />
== Entsichtung ==<br />
<br />
Ich wollte dich mal auf eine nicht gesichtete Vorlage aufmerksam machen, die seit meiner Änderung an [[Vorlage:Veraltete Vorlage]] entsichtet ist, obwohl diese seit 5 Tagen gesichtet ist (ich hoffe niemand sichtet die Vorlage jetzt, damit du das auch siehst): [[Vorlage:Vorlagendokumentation]]. -- [[Benutzer:Merlissimo/Sig|Merl]][[Benutzer Diskussion:Merlissimo/Sig|issimo]] 16:33, 12. Jan. 2009 (CET)<br />
:Hm, also in diesem Fall hat tatsächlich ein Purge geholfen.. Allerdings scheint es grad eh Probleme mit der Jobqueue zu geben, evtl. hat es auch damit was zu tun gehabt. Gruß --[[Benutzer:P.Copp|P.Copp]] 16:38, 12. Jan. 2009 (CET)<br />
<br />
== Danke ==<br />
<br />
Auch wenn ichs immer noch merkwürdig finde, dass jemand anscheinend wildfremdes hier plötzlich auftaucht und alles übers System weiß: Danke für deinen Einsatz um MediaWiki, Erweiterungen und die Technik im Allgemeinen. Wollt ich nur mal gesagt haben ;) --[[Benutzer:APPER|APPER]]\[[Benutzer Diskussion:APPER|<sup><big>☺☹</big></sup>]] 04:28, 28. Jan. 2009 (CET)<br />
: ;) --[[Benutzer:P.Copp|P.Copp]] 06:05, 28. Jan. 2009 (CET)<br />
<br />
:+1. Wikipedia braucht schlaue Leute, die sich um die Software kümmern :-) --[[Benutzer:Church of emacs|Church of emacs]] <small>[[Benutzer_Diskussion:Church_of_emacs|D]] [[Benutzer:Church of emacs/Bewertung|B]]</small> 15:19, 28. Jan. 2009 (CET)<br />
<br />
== Sichtungslinks in Vorlagen- oder Datei-Kategorien ==<br />
Hallo P.Copp. Wenn man bei einer Vorlagen- oder Datei-Kategorie wie [[:Kategorie:Vorlage:Baustein]] bzw. [[:Kategorie:GFDL-Bild]] auf einen der beiden Sichtungslinks oben klickt, erhält man leere Listen, da der Namespace standardmässig auf „0“ gesetzt ist. Weisst du vielleicht, ob da vielleicht die Intention oder vielleicht schon ein Bugreport besteht, damit man den Namespace des Kategorieinhalts definieren kann? --[[Benutzer:Leyo|Leyo]] 20:05, 28. Jan. 2009 (CET)<br />
<br /><small>Ich sehe gerade, dass du gar nicht Sichter bist und die beiden Links oben auf den Kategorieseiten nicht sehen kannst. Soll ich dir die Rechte geben? --[[Benutzer:Leyo|Leyo]] 20:09, 28. Jan. 2009 (CET)</small><br />
:Die Vorlagen-/Dateikategorien sind eigentlich eine Erfindung der de.wikipedia, d.h. die Software „weiß“ gar nicht, dass in manchen Kategorien nur Vorlagen/Dateien/WP-Seiten.. einsortiert sind und kann daher auch den Namensraum nicht im Voraus auswählen. Wüsste spontan nicht, wie man das ändern könnte :/ --[[Benutzer:P.Copp|P.Copp]] 20:13, 28. Jan. 2009 (CET)<br />
::Dass die Software den Zweck einer Kategorie (im Gegensatz zum Inhalt) nicht automatisch erkennen kann, ist mir klar. :-) Naja, wenn Kategorienamen „Kategorie:Vorlage:…“ lauten theoretisch schon. Ich dachte eher daran, dass man einer Kategorie irgendwie „mitteilen“ (z.&nbsp;B. mittels eingebundener Vorlage) könnte, was sie ist. Alternativ könnte auch ein Hinweis wie „keine ungesichteten Artikel, aber x ungesichtete Vorlagen und y ungesichtete Dateien“ sinnvoll sein. --[[Benutzer:Leyo|Leyo]] 20:20, 28. Jan. 2009 (CET)<br />
:::Unter [[bugzilla:17206]] habe ich vorgeschlagen eine Option „Zeige alle Namensräume“ für die beiden Spezialseiten einzuführen, die könnte dann von den Links auf den Kategorieseiten benutzt werden. Gruß --[[Benutzer:P.Copp|P.Copp]] 20:29, 28. Jan. 2009 (CET)<br />
::::Vielen Dank für den Bugreport! Mal schauen, ob sich da etwas tut wird… --[[Benutzer:Leyo|Leyo]] 20:42, 28. Jan. 2009 (CET)<br />
<br />
:Womit die Frage offen bleibt, ob dir Sichter-Rechte die Arbeit erleichtern würden ;). --[[Benutzer:APPER|APPER]]\[[Benutzer Diskussion:APPER|<sup><big>☺☹</big></sup>]] 17:06, 29. Jan. 2009 (CET)<br />
::[http://de.wikipedia.org/wiki/Spezial:Beiträge/P.Copp?namespace=0 Welche Arbeit?] :D Naja, schaden kanns nicht, auch wenn ich die Rechte vermutlich in nächster Zeit nicht allzu oft einsetzen werde ;) Gruß --[[Benutzer:P.Copp|P.Copp]] 19:23, 29. Jan. 2009 (CET)<br />
:::Done. Brauchst du auch nicht. Aber so verfügst du über die „Sichter-Ansicht“, beispielsweise für o.g. Problem. --[[Benutzer:Leyo|Leyo]] 20:15, 29. Jan. 2009 (CET)<br />
::::Ok, vielen Dank! Gruß --[[Benutzer:P.Copp|P.Copp]] 21:19, 29. Jan. 2009 (CET)<br />
<br />
== Kannst du helfen? ==<br />
<br />
Kannst du mal bei [[Wikipedia:Fragen zur Wikipedia#de-at und de-ch]] schauen, ob du daraus einen Feature-Request in bugzilla erstellen kannst. Ich kenne mich mit den unterschiedlichen Arten der Systemnachrichten nicht so aus, da ich meine, dass auch in diesem Fall die Fallback-Angabe funktionieren sollte. Thx. -- [[Benutzer:Merlissimo/Sig|Merl]][[Benutzer Diskussion:Merlissimo/Sig|issimo]] 00:02, 6. Feb. 2009 (CET)<br />
:Hm, wenn ich das richtig versteh, soll die Lookup-Reihenfolge also sein:<br />
#Datenbank Erstsprache<br />
#Sprachdatei Erstsprache<br />
#Datenbank Fallback-Sprachen<br />
#Sprachdatei Fallback-Sprachen<br />
:Das geht zumindest mit der bisherigen Implementierung nicht, da die Fallback-Sprachen schon bei der Initialisierung in das Sprach-Array reingepackt werden.. Naja, ein Bug-Report kann nicht schaden. Ich stells morgen dann ein, würde mir aber keine allzu große Hoffnungen machen, dass das schnell erledigt wird ;) Gruß --[[Benutzer:P.Copp|P.Copp]] 00:15, 6. Feb. 2009 (CET)<br />
:Nachtrag: Man müsste auch noch überlegen, wie genau die Reihenfolge sein soll, falls mehr als eine Fallback-Sprache definiert ist. Vermutlich sollte auch dann die Reihenfolge (DB Fallback1,File Fallback2,DB Fallback2,File Fallback2,...) lauten.. --[[Benutzer:P.Copp|P.Copp]] 00:27, 6. Feb. 2009 (CET)<br />
::Die Reihenfolge löst ja genau das Problem nicht. Derzeit ist es ja so, wenn ''MediaWiki:Nachricht/de-at'' nicht existiert, wird die Nachricht aus Sprachdatei ''MessagesDe-at'' und dann ''MessagesDe'' ausgelesen. Das Problem hier ist ja, dass ''MediaWiki:Nachricht'' existiert (wobei DB-Sprache=Fallback-Sprache) und auch passend für ''de-at'' wäre. Würde jemand in transladewiki ''Nachricht'' nach de-at übersetzen, würde bei deiner Reihenfolge ja wieder die projektbezogene Anpassung nicht angezeigt.<br />
::Problematisch wäre die (meine) Reihenfolge, wenn z.B. en fallback bei it wäre und ein Italiener enwiki besucht, weil das projektbezogene Englisch der it-Sprachdatei bevorzugt würde. Nach einer groben Durchsicht in http://svn.wikimedia.org/viewvc/mediawiki/trunk/phase3/languages/messages/ könnte ich solche fremdsprachigen Kreuzungen aber nicht entdecken. Aber ich habe natürlich auch nicht alle durchgesehen. -- [[Benutzer:Merlissimo/Sig|Merl]][[Benutzer Diskussion:Merlissimo/Sig|issimo]] 01:23, 6. Feb. 2009 (CET)<br />
:::Ich kann dir nicht ganz folgen. Wie sähe denn deine Reihenfolge dann genau aus? Fallback-Sprache vor der eigentlich gewählten Sprache? (Übrigens ist en tatsächlich der letzte Fallback für alle anderen Sprachen ;) --[[Benutzer:P.Copp|P.Copp]] 13:54, 6. Feb. 2009 (CET)<br />
::::Also Beispiel de-at mit Fallback de:<br />
::::#Mediawiki:Nachricht/de-at<br />
::::#Mediawiki:Nachricht/de<br />
::::#Mediawiki:Nachricht (falls db-Sprache = Fallback-Sprache, also auf dewiki nicht aber enwiki)<br />
::::#MessagesDe-at.php<br />
::::#MessagesDe.php<br />
::::#Notlösung (also wahrscheinlich englische Sprachdatei)<br />
::::Ist en wirklich explizit als Fallback defininert oder ergibt das nur daraus, dass eine Standard-Messages.php (die ich nicht finden konnte) Englische Texte enthält? In MessagesDe.php ist keine fallback-Variable definiert. -- [[Benutzer:Merlissimo/Sig|Merl]][[Benutzer Diskussion:Merlissimo/Sig|issimo]] 15:53, 6. Feb. 2009 (CET)<br />
:::::Also das hieße, der Benutzer kriegt eher die Fallback-Sprache zu sehen (die er evtl. gar nicht versteht) als seine gewählte Sprache. Das macht mMn nicht wirklich Sinn (siehe dein Beispiel Italiener auf enwiki). en ist implizite Fallback-Sprache für alle Sprachen, die kein fallback definiert haben, siehe [http://svn.wikimedia.org/viewvc/mediawiki/trunk/phase3/languages/Language.php?view=markup Language.php] Gruß --[[Benutzer:P.Copp|P.Copp]] 16:20, 6. Feb. 2009 (CET)<br />
::::::Nur wenn in der Sprachdatei ''fallback = ..'' steht. bei It steht in der Sprachdatei kein ''fallback = 'en'''. Das Problem in dewiki ist, dass derzeit de-at-Nutzer die Projektdefinierten Systemnachrichten in dewiki nicht sehen. -- [[Benutzer:Merlissimo/Sig|Merl]][[Benutzer Diskussion:Merlissimo/Sig|issimo]] 16:30, 6. Feb. 2009 (CET)<br />
:::::::Das Problem wäre ja auch mit der von mir oben beschriebenen Reihenfolge gelöst ;) Gruß --[[Benutzer:P.Copp|P.Copp]] 16:35, 6. Feb. 2009 (CET)<br />
<br />
::::::Das obrige Beispiel von Merlissimo verwirrt etwas, da MediaWiki:nachricht = Mediawiki:nachricht/de ist, sofern aber "de" nicht standard ist, sollte nicht auf die standardsprache des wikis zurückgegriffen werden (so verstehe ich das)<br />
::::::Ich denke so sollt es sein (für de-at)<br />
nachricht de-at lokal<br />
nachricht de-at system<br />
nachricht de lokal<br />
nachricht de system<br />
nachricht en system<br />
::::::aber so ist es derzeit (glaube ich):<br />
nachricht de-at lokal<br />
nachricht de-at system<br />
nachricht de system<br />
nachricht en system<br />
::::::Vielleicht nicht vollkommen ausgereift, aber auf anhieb fällt mir das ein. Warum "de-at system" vor "de lokal": Wenn es eine de-at-Systemnachricht gibt, waren bereits Anpassungen nötig, daher sollte man nicht das "de lokal" neben. Da ist es besser, wenn man gezwungen ist "de-at lokal" anzulegen, denke ich. --[[Benutzer:Umherirrender|Der Umherirrende]] 16:36, 6. Feb. 2009 (CET)<br />
:::::::Das ist auch genau die Reihenfolge, die ich oben gemeint hatte ;) Falls wir uns darauf einigen können, stell ich das dann in Bugzilla, ok? --[[Benutzer:P.Copp|P.Copp]] 16:40, 6. Feb. 2009 (CET)<br />
::::::::Stimmt, deine erste Antwort enthält das, habe ich irgendwie nicht sofort so erkannt. Ich habe nichts gegen die Reihenfolge einzuwenden ;) [[Benutzer:Umherirrender|Der Umherirrende]] 16:49, 6. Feb. 2009 (CET)<br />
:Also ich hab mal unter [[bugzilla:17384]] reingestellt. Falls ich was falsch gemacht hab, könnt ihr ja dort entsprechend kommentieren :) Gruß --[[Benutzer:P.Copp|P.Copp]] 17:05, 6. Feb. 2009 (CET)<br />
::Stand anscheinend schon seit Anfang 2005 unter [[bugzilla:1495]] :D --[[Benutzer:P.Copp|P.Copp]] 13:18, 8. Feb. 2009 (CET)<br />
:::Habe die Mail auch heute morgen gelesen, aber der alte Bug ist genereller wird wird deswegen wahrscheinlich gar nicht realisiert. Der neue Bug war übersichtlicher im Programmieraufwand. Blöd, dass der nun geschlossen wurde. -- [[Benutzer:Merlissimo/Sig|Merl]][[Benutzer Diskussion:Merlissimo/Sig|issimo]] 14:01, 8. Feb. 2009 (CET)<br />
<br />
== [[Wikipedia:Fragen zur Wikipedia/Archiv/2008/Woche 53#Script der MediaWiki:Edittools]] ==<br />
<br />
Du hattest dort geschrieben, das man das softwareseitig lösen sollte. Da du anscheind weist wo etwas (oder zumindestens was) zu machen ist, wollte ich dich fragen, ob du entsprechend etwas veranlassen könntest? Ich wüsste dazu garnichts zu, um beispielsweise Hilfestellung für die Devs geben zu können. Aber du scheinst dich dort besser auszukennen und auch zielsicherer zu bewegen, daher meine Bitte an dich. Vielen Dank schonmal im Vorraus. Falls du es nicht machen möchtest, wäre es auch kein Problem, das werde ich mit der jetzigen Situtation leben oder mir das mal anschauen, wenn ich etwas mehr Zeit und Wissen habe. [[Benutzer:Umherirrender|Der Umherirrende]] 17:23, 7. Feb. 2009 (CET)<br />
:''Was'' zu machen ist, hattest du ja eigentlich schon selbst herausgefunden: Das Skript von [[commons:MediaWiki:Edittools.js]] in die globale [/media/skins/common/wikibits.js wikibits.js] integrieren. Die Stelle um das vorzuschlagen wäre IMHO [[bugzilla:9593]]. Nur da der Bug schon zuvor einmal geschlossen wurde, sollte das besser jemand machen, der auch eine ausreichende Begründung für die Änderung vorbringen kann, ich kenn mich da eher nicht so aus. Gruß --[[Benutzer:P.Copp|P.Copp]] 13:16, 8. Feb. 2009 (CET)<br />
::Schade. Eine ausreichende Begründung um den Bug wieder zu öffnen kann ich auch nicht wirklich liefern, vorallem nicht in englisch. Es müsste auch erst so geschrieben/zusammenkopiert werden, das es alleinstehend laufen kann. Dann belasse ich das dabei, der Aufwand ist zu groß für einen geringen Nutzen. Trotzdem danke. [[Benutzer:Umherirrender|Der Umherirrende]] 15:28, 8. Feb. 2009 (CET)<br />
<br />
== [[Benutzer:P.Copp/scripts/hideduplicatecontribs.js]] ==<br />
<br />
Find ich super :-) und gleich noch 2 Ideen dazu: Zum einen wär es schön, wenn man die User-Abfrage parameterisieren könnte (ich kann mir nämlich gut vorstellen, dass man das auch für Contribs anderer verwenden möchte und nicht nur für die eigenen). Zum anderen wurde ich kürzlich auf ein (IMHO weniger elegantes) Skript [[:wikt:en:User:Hippietrail/filtercontribs.js|hier]] hingewiesen, das analog alle Contribs ausblenden soll, die noch '''(Aktuell)''' sind, und so eine Funktion böte sich ja zur Integration in dein Skript auch noch an; man bräuchte dann halt nur zusätzliche Schalter zum Wiedereinblenden (z. B. M''ehrfachedits einblenden / Aktuelle Edits einblenden / Alles einblenden'', o. s. ä.). Erscheint dir das sinnvoll, oder eher als Overkill? Gruß, [[Benutzer:PDD|&mdash; <sup>PDD</sup> &mdash;]] 15:48, 9. Feb. 2009 (CET)<br />
:Huh, wie bist du denn darüber gestolpert? :) Das war eigentlich nur eine hastig zusammengeschriebene Notlösung auf speziellen Wunsch eines Benutzers(siehe [[Wikipedia:Fragen_zur_Wikipedia/Archiv/2009/Woche_03#Anzeige_der_Systemseite_Eigene_Beitr.C3.A4ge_modifizieren.3F|hier]], in dem Abschnitt stehen übrigens noch Links auf 2 ähnlliche Skripte, die vielleicht interessant sind..) Aber wenn du es für nützlich hältst, kann ich gern nochmal drüberschauen.. --[[Benutzer:P.Copp|P.Copp]] 16:45, 9. Feb. 2009 (CET)<br />
::[http://de.wikipedia.org/w/index.php?title=Benutzer:P.Copp/scripts/hideduplicatecontribs.js&diff=prev&oldid=56451237]: Ich habs jetzt mal über zwei Checkboxen gelöst, ich denke das ist am flexibelsten. Kannst aber gerne noch was dran ändern, wenns nicht gefällt :) Gruß --[[Benutzer:P.Copp|P.Copp]] 17:04, 9. Feb. 2009 (CET)<br />
::: Es gefällt :-) Vielen Dank! (Und danke für die Links; das deutet ja darauf hin, dass so eine Funktion durchaus von Interesse ist.) [[Benutzer:PDD|&mdash; <sup>PDD</sup> &mdash;]] 17:18, 9. Feb. 2009 (CET)<br />
<br />
== Nochmal autoreview ==<br />
Da auf der Diskseite der GsV wenig Resonanz zu erwarten war, speziell die Frage an jemanden, der sich damit auskennt: autoreview wurde vergeben, obwohl keine e-mail-Adresse angegeben war, die aber als eine der dreieinhalb Hauptvoraussetzungen beschrieben wurde ([http://www.mediawiki.org/wiki/Special:Code/MediaWiki/45636]). Ich kann daran nichts ändern, mich interessiert trotzdem, ob ich etwas übersehen habe. Vielleicht gab es auch eine softwareseitige Änderung, die #45636 präzisierte / neu formulierte? Der account ''Zeuke'' ist übrigens keine klassische Sockenpuppe von [[Benutzer:Rauenstein|Rauenstein]], wie manche annehmen, da er schon ein Jahr früher angemeldet war. gruss [[Benutzer:Zeuke|Zeuke]] 20:52, 19. Feb. 2009 (CET)<br />
:Ja, tatsächlich sollte von Anfang an die Email-Adresse nur Vorrausetzung für autoreview sein, wenn dies auch für die automatische Erteilung des Sichterrechts so konfiguriert ist (was bei de.wikipedia nicht der Fall ist). Durch einen kleinen Fehler in der Software wurde bis gestern trotzdem darauf geprüft. Da der Fehler nun behoben ist, sollte das autoreview-Recht nun für alle verfügbar sein, auch wenn sie keine E-Mail-Adresse angegeben haben. Gruß --[[Benutzer:P.Copp|P.Copp]] 20:57, 19. Feb. 2009 (CET)<br />
::Vielen Dank für die Auskunft, so in etwa hatte ich mir das auch vorgestellt. gruss [[Benutzer:Zeuke|Zeuke]] 21:07, 19. Feb. 2009 (CET)<br />
<br />
== [[Hilfe:Gesichtete und geprüfte Versionen]] ==<br />
<br />
Hallo P.Copp, Sarkana hat meine Änderung [http://de.wikipedia.org/w/index.php?title=Hilfe:Gesichtete_und_gepr%C3%BCfte_Versionen&curid=3478279&diff=57470876&oldid=57461439 hier] revertiert. Mal davon abgesehen, dass die zurückgesetzte Version nach dem Kommentar im [http://svn.wikimedia.org/viewvc/mediawiki/trunk/extensions/FlaggedRevs/FlaggedRevs.php?view=markup Konfigurationsfile] auf jeden Fall falsch ist, weil eben nur Rollbacks gelten, habe ich auch Zweifel, ob die von Sarkana erwähnte Lightversion tatsächlich als Rollback gezählt wird, d.h. in der Funktion incrementRollbacks in [http://svn.wikimedia.org/viewvc/mediawiki/trunk/extensions/FlaggedRevs/FlaggedRevs.hooks.php?revision=47966&view=markup] tatsächlich ein Inkrementieren bewirkt. Da die Lightversion godmode-light.js ja nur Javascript benutzt, also auf dem Client läuft, kann sie sich doch eigentlich nicht über die auf dem Server überprüften Rechte der einzelnen Benutzergruppen hinwegsetzen und Benutzergruppen ohne rollback-Rechte diese über die Hintertür verleihen. D.h. das Javascript simuliert nur einen "Zurücksetzen"-Button für den Revertierer, sendet aber tatsächlich ein "Entfernen" an den Server. So jedenfalls mein Verdacht.<br />
<br />
Weißt Du in diesem Punkt Bescheid? Wenn ja, dann klär mich bitte über die Sachlage auf.--[[Benutzer:Grip99|Grip99]] 16:29, 5. Mär. 2009 (CET)<br />
:Es werden Reverts gezählt, die über „Zurücksetzen“ oder „Entfernen“ gemacht werden, aber nur dann, wenn der revertierende Benutzer das „autoreview“-Recht besitzt (also Sichter, Bots etc.); das steht übrigens direkt unter der von dir verlinkten Funktion unter <tt>incrementReverts</tt>. Über die <tt>godmode-light.js</tt> gemachte Reverts werden, denke ich, nicht gezählt, da dort einfach nur die alte Version zum Bearbeiten geöffnet und dann abgespeichert wird. HTH Gruß --[[Benutzer:P.Copp|P.Copp]] 16:40, 5. Mär. 2009 (CET)<br />
::Stimmt, da hätte ich etwas weiter lesen sollen. Der Kommentar in besagtem Konfigurationsfile ist dann allerdings irreführend. Ich werde die Hilfeseite mit Verweis auf Deine Auskunft korrigieren. Danke für die Hilfe und Gruß -- [[Benutzer:Grip99|Grip99]] 18:51, 5. Mär. 2009 (CET)<br />
<br />
== [[Benutzer:P.Copp/scripts/templatepreview.js]] ==<br />
<br />
Die Skriptseite bindet eine nicht vorhandene Vorlage [[Vorlage:'+this.expandParts(parts,'|'+this.expandParts(parts,']] und den nicht vorhandenen Artikel [[' + wgPageName + (text && ']] ein. Es wäre schön, wenn du die Seite so anpassen könntest das dies nicht passiert, damit die Seite nicht auf [[Spezial:Fehlende Vorlagen]] auftaucht. Das ganze ist unter [[bugzilla:17525]] gemeldet, vielleicht fällt dir etwas ein, da du dich ja etwas mit MediaWiki und php auskennst. Vielen Dank. [[Benutzer:Umherirrender|Der Umherirrende]] 15:11, 7. Mär. 2009 (CET)<br />
:[http://de.wikipedia.org/w/index.php?title=Benutzer:P.Copp/scripts/templatepreview.js&diff=prev&oldid=57561353 Gefixt], danke für den Hinweis. Zum Bug: Ich bin mir nicht so sicher, ob es Sinn macht, Links und Vorlagen auf JS-Seiten unterschiedlich zu behandeln.. Wäre auf jeden Fall IMHO nicht allzu leicht umsetzbar. Gruß --[[Benutzer:P.Copp|P.Copp]] 15:21, 7. Mär. 2009 (CET)<br />
::Um die Umsetzung habe ich mir keine Gedanken gemacht und kann ich auch garnicht einschätzen. Die Links sind ja gerade praktisch, zur Rückverfolgung. Auch wenn alles nicht expandiert wird (Kategorieeinträge gehören natürlich auch noch dazu), sind die Links immer noch am leichtesten zu erkennen und auch die Möglichkeit ihn mit C&P zu verfolgen ist leicht gegeben, bei einer Vorlage sieht dies ja schon anders aus, da das aussehen von parametern abhängen kann, daher hatte ich das so im Bug formuliert. [[bugzilla:10410|Bug 10410]] wäre ja auch nicht schlecht, hätte aber das gleiche Problem, wie von dir genannt, das Vorlagen/Kategorien und Links unterschiedlich gehandhabt werden. Danke für deine Einschätzung. Mal schauen, was sich dort ergibt. [[Benutzer:Umherirrender|Der Umherirrende]] 15:39, 7. Mär. 2009 (CET)<br />
<br />
==[[Marguerite de Valois-Angoulême, duchesse de Berry]]==<br />
Guten Tag,</br><br />
erst jetzt erst bemerkte ich, Ihre Bemerkung zu meiner Anfrage zum Lemma ''Marguerite de Valois-Angoulême''. Dazu weiß ich nur Folgendes: Datum und Uhrzeit ist in der Versionsgeschichte dokumentiert und ohne Weiteres einzusehen. Und die Ziffernfolge "132.180.76.37" habe ich exakt so übernommen, wie sie mir vom Rechner zugeteilt worden war. Deshalb irritiert mich Ihr Vorwurf der Unviollständigkeit (der Ziffernfolge?) etwas und bitte darum um Aufklärung. Mit Dank und Gruß, 132.180.76.37<br />
:Um Diskussionen übersichtlich zu halten, ist es in der Wikipedia üblich, Beiträge nicht nur mit dem Namen, sondern auch mit Datum und Uhrzeit zu unterschreiben. Insofern war die von Ihnen angeführte Bemerkung nicht als Vorwurf gemeint, sondern als Hinweis und Ergänzung, damit auch zu einem späteren Zeitpunkt die Diskussion noch leicht chronologisch nachvollzogen werden kann. Auf [[Hilfe:Signatur]] steht übrigens beschrieben, wie sich einfach eine vollständige Unterschrift erzeugen lässt, am leichtesten geht es mit der Zeichenfolge <code><nowiki>--~~~~</nowiki></code>. Viele Grüße --[[Benutzer:P.Copp|P.Copp]] 17:05, 10. Mär. 2009 (CET)<br />
<br />
:Guten Morgen,</br><br />
:besten Dank für Ihre Erklärung. Seit doch schon einigen Jahren bin ich hier unterwegs und Sie waren der Erste, der hier „Unvollständigkeit“ anmahnte. Ich versuche mich zu bessern, auch wenn zugegebener Weise diese Ziffernfolge mir sehr leicht von der Hand geht. Mit Dank und Gruß, --~~ 132.180.76.37<br />
::Noch ein Tipp: Es gibt auch einen Knopf oberhalb des Bearbeitungsfensters ([[Bild:Button sig.png]]), mit dem sich die Signatur leichter einfügen lässt. Gruß --[[Benutzer:P.Copp|P.Copp]] 11:57, 11. Mär. 2009 (CET)<br />
<br />
== nachtraegliche signatur ==<br />
<br />
gudn tach!<br /><br />
evtl. koennte man deinen nachsignierungs-bot mit den logs des AF kombinieren.<br />
* [[WP:Missbrauchsfilter/Anträge#Signatur_auf_Diskussionsseiten]]<br />
* [[WP:FZW#Speichern_unterbinden_falls_Signatur_fehlt]]<br />
alternativ: vielleicht waere das AF gar nicht noetig, wenn dein bot selbst die RCs durchstoebert. hab keine ahnung, was die effizientere methode ist.<br /><br />
am besten waers vermutlich, wenn die software von sich aus automatisch signieren wuerde, aber das ist wohl derzeit noch zu utopisch. -- [[Benutzer:Lustiger seth|seth]] 12:59, 16. Mär. 2009 (CET)<br />
:Hmm, die Idee mit dem Filter ist an sich nicht schlecht, ich fürchte aber es wird nicht ganz einfach sein, einen Filter zu schreiben, der nicht auch etliche „Falsche Positive“ erzeugt. [http://de.wikipedia.org/w/index.php?title=Diskussion:Paul_Dickopf&action=history Beispiel]: Der derzeitige Filter hätte den Benutzer praktisch bei jedem Edit aufgefordert, seine Signatur einzufügen, was ich mir etwas frustrierend vorstelle :). Vielleicht kann man den Filter noch irgendwie optimieren? Zumindest denke ich, dass der Bot eine gute Ergänzung dazu sein kann, da der Filter wahrscheinlich niemals alle unsignierten Beiträge verhindern können wird. Gruß --[[Benutzer:P.Copp|P.Copp]] 13:21, 16. Mär. 2009 (CET)<br />
::ah, guter hinweis! die AF-regel wird wohl nie alle unsignierten beitraege erfassen koennen, richtig. aber zumindest sollten false positives (nahezu) nicht auftreten.<br />
::momentan hat das AF noch einen kleinen bug, der es dazu veranlasst, einige alte zeilen als "removed" anzusehen, die gar nicht entfernt wurden, sondern die nur im kontext von entfernten zeilen stehen. deshalb waere vielleicht<br />
article_namespace % 2 == 1 <br />
& action == "edit" <br />
& edit_delta > 50 <br />
& !("autoconfirmed" in user_groups <br />
| "~~<nowiki></nowiki>~~" in added_lines <br />
| user_name in added_lines) <br />
& removed_lines in added_lines<br />
ein work-around dafuer. sobald aber der bug gefixt wurde, koennte<br />
article_namespace % 2 == 1 <br />
& action == "edit" <br />
& edit_delta > 50 <br />
& !("autoconfirmed" in user_groups <br />
| "~~<nowiki></nowiki>~~" in added_lines <br />
| user_name in added_lines) <br />
& removed_lines rlike "/^\s*\z/" <br />
solche false positives verhindern. was meinst du? -- [[Benutzer:Lustiger seth|seth]] 19:12, 16. Mär. 2009 (CET)<br />
:Jepp, ich denke das dürfte die meisten Fälle schon abfangen. Bei reinen Ergänzungen wie z.B. [http://de.wikipedia.org/w/index.php?title=Diskussion:Ubuntu&diff=57863182&oldid=57862889 sowas] klappt das zwar nicht, aber das kommt wahrscheinlich nicht so häufig vor. Kann man den Filter vielleicht so einstellen, dass ein User bei mehreren Edits höchstens einmal gewarnt wird? Könnte sonst evtl. ein bisschen nervig werden.. Gruß --[[Benutzer:P.Copp|P.Copp]] 19:33, 16. Mär. 2009 (CET)<br />
:Noch einen [http://de.wikipedia.org/w/index.php?title=Diskussion:Matthes_%26_Seitz_Berlin&oldid=57862750 Exoten] gefunden.. Vielleicht kann man noch einen Regex für Zeitstempel („(CET)“ oder „(CEST)“) dazunehmen? Gruß --[[Benutzer:P.Copp|P.Copp]] 19:38, 16. Mär. 2009 (CET)<br />
::[separate zeilen als ergaenzung]: ja, da wuesste ich auch gar nicht so recht, wie man die ohne grossen aufwand ueberhaupt mit dem AF tracken koennte. meine erste idee dazu waere, zu schauen, ob die erste unterschrift nach dem eingefuegten abschnitt dem hinzufuegenden user zuordenbar ist. aber das ist aufgrund der umstrittenen sig-regeln derzeit gar nicht so einfach zu eruieren.<br />
::[mehrere edits, nur eine warnung]: jein. man kann leute z.b. beim 10. mal warnen, aber leute beim ersten, elften, 21. usw. warnen, geht afaik nicht.<br />
::[exot]: hmm, der hat ja einfach falsch unterschrieben. ist ja nicht von einer gefaelschten unterschrift zu unterscheiden. so was koennte man mithilfe des AF unterbinden, allerdings wuerde man damit wohl auch meta-diskussionen von ip-adressen ueber signaturen verbieten. ;-)<br />
::[timestamp]: meinst du als ergaenzung zu "user_name in added_lines"?<br />
::-- [[Benutzer:Lustiger seth|seth]] 20:45, 16. Mär. 2009 (CET)<br />
:::''„meine erste idee dazu waere, zu schauen, ob die erste unterschrift nach dem eingefuegten abschnitt dem hinzufuegenden user zuordenbar ist.“'' - genau auf die Weise versuche ich bei meinem Bot, diese Fälle auszuschließen. :)<br />
:::''„jein. man kann leute z.b. beim 10. mal warnen, aber leute beim ersten, elften, 21. usw. warnen, geht afaik nicht.“'' - Schade, das wäre IMHO eine sehr sinnvolle Sache, um den potentiellen „Schaden“ durch falsche Positive klein zu halten.<br />
:::''„meinst du als ergaenzung zu "user_name in added_lines"“'' - Genau. Die exakte Syntax habe ich mir noch nicht angeschaut, aber es müsste machbar sein, zu überprüfen, ob die Einfügung einen Zeitstempel enthält, oder? (Einfach um noch ein paar weitere Fälle abzufangen). Gruß --[[Benutzer:P.Copp|P.Copp]] 21:28, 16. Mär. 2009 (CET)<br />
::::zum letzten punkt: klar, <code>added_lines rlike "/\(CES?T\)/"</code> koennte man noch mit dazu nehmen.<br />
::::irgendwie bin ich ja immer noch der meinung, dass sowas, was dein bot macht, automatisch und ohne speicher-verbot erfolgen und in mediawiki integriert werden sollte. naja, wird vermutlich eine bugzilla nummer <1000 haben. ;-) -- [[Benutzer:Lustiger seth|seth]] 02:44, 17. Mär. 2009 (CET)<br />
:::::Naja, das ist halt nicht so einfach, dazu müsste die Struktur von Diskussionsseiten erstmal grundlegend umgestellt werden. Es ist aber AFAIK geplant, dass irgendwann die Erweiterung [[mw:Extension:LiquidThreads|LiquidThreads]] aktiviert werden soll. Bis dahin muss man halt mit Notlösungen arbeiten :/ Gruß --[[Benutzer:P.Copp|P.Copp]] 10:38, 17. Mär. 2009 (CET)<br />
<br />
== [[Benutzer:P.Copp/Spezialseiten]] ==<br />
<br />
Gute Sache! Was mir nur fehlt wäre ein Namensraumfilter auf den Artikelnamensraum, da gerade bei [[Benutzer:P.Copp/Spezialseiten/Gewünschte Seiten]] die Wartungslinks, die durch Vorlagen entstehen nicht sehr hilfreich sind und die Gefahr besteht, das jemand Unwissendes sie entfernt, da er den Hintergrund nicht kennt. Was meinst du? [[Benutzer:Umherirrender|Der Umherirrende]] 20:04, 19. Mär. 2009 (CET)<br />
:[[Benutzer:P.Copp/Spezialseiten/Gewünschte Artikel|Jup]], guter Hinweis, danke. Gruß --[[Benutzer:P.Copp|P.Copp]] 20:15, 19. Mär. 2009 (CET)<br />
::Danke auch, so ist die Auflistung schon viel brauchbarer. Das letzte I-Tüpfelchen wäre noch, wenn nur links aus dem Artikelnamensraum auftauchen, dann bekommt die Liste noch eine andere Aussagekraft. Ist das möglich?<br />
::Hast du dafür ein Dump in die Datenbank geladen? Trotzdem sind 10 Minuten ein kurzer Zeitraum mit einer neuen Liste um die Ecke zu kommen, da könnte man sich glatt fragen, warum die WMF-Server das nicht wollen … Aber die haben ja noch andere Aufgaben außer eine Liste zu erstellen. [[Benutzer:Umherirrender|Der Umherirrende]] 20:38, 19. Mär. 2009 (CET)<br />
:::Habs geändert.. Die eigentliche Abfrage dauert ca. 20 Minuten, die vorherige Liste war noch im Cache, daher ging es eben etwas schneller :) Gruß --[[Benutzer:P.Copp|P.Copp]] 21:11, 19. Mär. 2009 (CET)<br />
::::Danke, jetzt ist der [[Troll (Internet)]] auch weg ;) 20 Minuten ist aber auch nicht die Welt, für ein Wiki, aber es sind schon so viele Wikis bei WMF, das es für alle machbar wäre …<!--den rest wirst du kennen--> [[Benutzer:Umherirrender|Der Umherirrende]] 21:18, 19. Mär. 2009 (CET)<br />
<br />
== Copperbot ==<br />
<br />
Hallo P.Copp,<br />
<br />
ich habe [http://de.wikipedia.org/w/index.php?title=Diskussion%3AWipeOut_%E2%80%93_Heul_nicht%2C_lauf%21&diff=58151319&oldid=58150289 hier] gesehen, dass du einen Bot erstellt hast, der automatisch Signaturen nachträgt. Erstmal danke dafür. So ein Bot ist sehr sinnvoll und erspart eine menge Arbeit. Allerdings habe ich doch noch einen Verbesserungsvorschlag: Den Text den dein Bot zusammen mit der Signatur einfügt „''Benutzername ¿? ¡ ! (ohne Datum und/oder Uhrzeit signierter Beitrag, erstellt um 13:08, 21. Mär. 2009 (CET))''“ Finde ich etwas missverständlich. Ich bspw. dachte beim lesen, dass „''ohne Datum und/oder Uhrzeit signierter Beitrag''“ bezöge sich auf den ursprünglichen (unsignierten Beitrag), d. h. ich dachte es wäre „nur“ der Benutzername ''nach'' getragen worden (Manche Benutzer verwenden die Vorlage:Unsigned auch [http://de.wikipedia.org/w/index.php?title=Diskussion%3ABen_10&diff=47651164&oldid=47635920 entsprechend] und tragen damit nur den Benutzernamen, nicht jedoch den Zeitstempel nach). Entsprechend dachte ich der angegebene Zeitstempel bezöge sich auf den ''Nachtrag'' der Signatur. Vielleicht kannst du ja den von deinem Bot eingefügten Text etwas präzisieren. Dahingehend wäre es meiner Ansicht nach sinnvoll Benutzernamen und Zeitstempel nicht zu trennen, damit das Erscheindungsbild einer normalen Signatur erhalten bleibt. ''Dahinter'' könntest du dann ja einen Text deiner Wahl einfügen z. B. „Vorstehende [[Hilfe:Signatur|Signatur samt Datum und/oder Uhrzeit]] wurde automatisch per [[Benutzer:CopperBot|Bot]] nachgetragen <nowiki>--~~~~</nowiki>“<br />
<br />
Freundliche Grüße [[Benutzer:Beck's|<span style="color:#008B00">'''BECK's'''</span>]] 16:47, 21. Mär. 2009 (CET)<br />
:Ah, danke erstmal für das Feedback :). Du meinst also lieber das Datum nach vorne, vielleicht in etwa so:<br />
<small>(13:08, 21. Mär. 2009 (CET), ''Datum/Uhrzeit nachträglich eingefügt, siehe [[Hilfe:Signatur]]'')</small><br />
:? Den Benutzernamen des Bots wollte ich eigentlich weglassen, da das IMHO recht schnell unübersichtlich wird, was meinst du? Gruß --[[Benutzer:P.Copp|P.Copp]] 17:38, 21. Mär. 2009 (CET)<br />
<br />
::bzgl. der vorlage unsigned wurde das thema schon haeufig besprochen. alle daten, welche die nachsignatur an sich betreffen sind fuer den diskussionsverlauf i.a.r. unerheblich, deshalb sollten weder nachsignierer noch datum der nachsignierung auftauchen, um die nachtraegliche signatur nicht zu verwirrend zu gestalten.<br />
::ausserdem sollten nachsignaturen wie <nowiki>{{unsigned|name}}</nowiki>, also ohne zweiten parameter, vermieden werden; ok sie sind besser als gar nix, aber ohne datum halt trotzdem kaum was wert. jenes datum sollte uebrigens auch aus rein technischer sicht nicht das nachsignierer-datum sein, da sich die archivbots daran orientieren.<br />
::iow: der bot sollte sein verhalten imho nicht aendern. -- [[Benutzer:Lustiger seth|seth]] 00:31, 22. Mär. 2009 (CET)<br />
<br />
::: Ich muss sagen, dein obiger Vorschlag gefällt mir. – Darüber, dass die Signatur des Bots selber Probleme hinsichtlich der Übersichtlichkeit macht ''und'' noch dazu den Archivbot Probleme macht, hatte ich mir ehrlich gesagt keine Gedanken gemacht, aber ich muss sagen, dass ich diese Punkte vollkommen einsehe. Dennoch denke ich, dass es sinnvoll ist den Zeitstempel nach vorne, also direkt hinter den nachgetragenen Benutzernamen zu setzen, um die oben angesprochene Missverständnisproblematik zu beseitigen. Freundliche Grüße --[[Benutzer:Beck's|<span style="color:#008B00">'''BECK's'''</span>]] 11:54, 22. Mär. 2009 (CET)<br />
:::: Ok, ich hab den Text entsprechend [http://de.wikipedia.org/w/index.php?title=Benutzer:CopperBot/config.css&diff=58221018&oldid=58050191 angepasst]. Gruß --[[Benutzer:P.Copp|P.Copp]] 12:26, 23. Mär. 2009 (CET)<br />
<br />
::::: Freut mich. Vielen Dank und beste Grüße--[[Benutzer:Beck's|<span style="color:#008B00">'''BECK's'''</span>]] 12:39, 23. Mär. 2009 (CET)<br />
<br />
Bei dieser Gelegenheit auch von mir einmal 'herzlichen Dank' für die Idee, das Signaturen-Nachtragen zu automatisieren. Da ich durchaus schon die eine oder andere Disk aufgeräumt habe, habe ich mich über eine neue Innovation bei Wikipedias Bots selten so gefreut wie über diese hier. <tt style="background:#FE3">:)</tt> – Viele Grüße, <br />
<sub><span style="border:1px solid silver;padding:1px;">[[Benutzer:Le petit prince|<span style="color:black;background:white">&nbsp;Le petit prince&nbsp;</span>]]|[[Benutzer Diskussion:Le petit prince|<span title="Diskussion" style="color:silver;background:blue">&nbsp;☎&nbsp;me</span><span style="color:silver;background:white">ssag</span><span style="color:silver;background:red">erie&nbsp;</span></span>]]</span>&nbsp;6.&nbsp;April&nbsp;2009,&nbsp;18:34&nbsp;Uhr&nbsp;([[Koordinierte Weltzeit|UTC]])</sub><br />
:Naja, die ''Idee'' stammt nicht wirklich von mir ;), aber freut mich zu hören, dass der Bot nützlich ist :). Grüße --[[Benutzer:P.Copp|P.Copp]] 14:47, 10. Apr. 2009 (CEST)<br />
<br />
== [[Wikipedia:Helferlein/Begriffsklärungs-Check]] ==<br />
<br />
habe diesen Helfer in meinen Einstellungen aktiviert. Da Du als einer der Autoren des Programms angegeben bist, erlaube ich mir die Frage: woran liegt es, dass die Anzeige in ''rot'' derzeit nicht oder nur ganz sporadisch funktioniert. Sind die WP:Server zu langsam oder habe ich evtl. in meinen IE-Einstellungen etwas falsch aktiviert/deaktiviert. Besten Gruß--[[Benutzer:BKSlink|BKSlink]] 16:59, 24. Mär. 2009 (CET)<br />
:Vermutlich letzteres, zumindest kann ich bei mir keine Verlangsamung feststellen. Vielleicht hast du Javascript in deinem Browser deaktiviert? Welchen Browser verwendet du denn? --[[Benutzer:P.Copp|P.Copp]] 17:06, 24. Mär. 2009 (CET)<br />
::Ich nutze Internet Explorer 6.0. Hast Du eine Idee?--[[Benutzer:BKSlink|BKSlink]] 17:12, 24. Mär. 2009 (CET)<br />
:::Ja, updaten, wenn möglich :). Allerdings sollte das Gadget eigentlich auch mit dem IE6 laufen. Was meinst du denn genau mit sporadisch? Funktioniert es auf manchen Seiten überhaupt nicht, oder evtl. auf der gleichen Seite mal nicht und mal doch? Falls letzteres der Fall ist, kommen eigentlich nur Netzwerkprobleme in Betracht. Gruß --[[Benutzer:P.Copp|P.Copp]] 17:17, 24. Mär. 2009 (CET)<br />
<br />
::::(1) Den Browser updaten? (2) sporadisch: ich mache einen Artikel auf, sehe kurz die rot unterlegten Begriffe, gehe auf die BKS für weitere Info@linkfix, gehe wieder zurück auf zu bearbeitende Seite + Rotunterlegung ist nicht mehr da. Dann gibt es wieder Seiten, da sieht man die BKverlinkung nicht obwohl eine da ist, wenn man über die Kategorie:Begriffsklärung einsteigt. Bis zu dem kürzlich von Sun ''aufgedrängten'' Update von Java funktionierte es immer einwandfrei. *Rätselnd* grüßt --[[Benutzer:BKSlink|BKSlink]] 17:29, 24. Mär. 2009 (CET)<br />
:::::Ah, das hört sich eher so an, als ob dieses „Java-Update“ ein paar Einstellungen in deinem Browser geändert hat. Vermutlich könnte man das Ganze wieder irgendwie in den Ursprungszustand zurücksetzen, aber vernünftiger wäre es IMHO, wie schon gesagt, deinen Browser zu aktualisieren. (Falls du Win XP benutzt, geht das unter Start->Programme->Windows Update). Gruß --[[Benutzer:P.Copp|P.Copp]] 17:39, 24. Mär. 2009 (CET)<br />
::::::Version IE 7 habe ich bisher ignoriert, jetzt soll es ja IE 8 geben. Ich danke vorerst für Deine Mühe + werde versuchen, Licht in ''mein Dunkel'' zu bringen. Gruß--[[Benutzer:BKSlink|BKSlink]] 17:44, 24. Mär. 2009 (CET)<br />
<br />
== Copper ==<br />
Hallo P.Copp, interessanter Bot! Ist es Absicht, dass der ohne Botflag läuft? Grüße, [[Benutzer:ISBN|ISBN]] 09:04, 26. Mär. 2009 (CET)<br />
:[[Wikipedia:Bots/Anträge auf Botflag#2009-03-09 – CopperBot]] --[[Benutzer:Leyo|Leyo]] 09:12, 26. Mär. 2009 (CET)<br />
::Der BotFlag ist bereits vorhanden, die Markierung wird explizit [[Benutzer:CopperBot/config.css|nicht gesetzt]]. VG [[Benutzer:ISBN|ISBN]] 10:58, 26. Mär. 2009 (CET)<br />
:::Ja, das ist Absicht :). Der Grund ist, dass die nachsignierten Beiträge z.B. auf Beobachtungslisten durch den Botedit nicht „verdeckt“ werden sollen. Zudem fallen bei dem Bot, im Gegensatz zu den meisten anderen, nicht viele Edits am Stück an, sondern nur ein paar über den Tag verteilt, so dass die Gefahr des Flutens der Letzten Änderungen nicht so groß sein sollte. Gruß --[[Benutzer:P.Copp|P.Copp]] 11:49, 26. Mär. 2009 (CET)<br />
::::Hatte mir schon gedacht, dass das Absicht sein wird. Ich war vor allem neugierig warum. Danke für die Auflösung! :-) VG [[Benutzer:ISBN|ISBN]] 12:17, 26. Mär. 2009 (CET)<br />
<br />
== [[Benutzer:P.Copp/scripts/adddeletereason.js]] ==<br />
<br />
Hallo P.Copp, in dem Skript werden Redirects ja automatisch in das Begründungsfeld mithineingenommen, damit der Zielartikel über das Löschlogbuch gefunden werden kann. Dies funktioniert aber nur wenn der Redirect als <nowiki>#REDIRECT</nowiki> gesetzt ist. Das ganze wurde aber mit <nowiki>#WEITERLEITUNG</nowiki> eingedeutscht. Deshalb wäre es super wenn dies dein Skipt auch erkennen würde. Danke und Gruß --[[Benutzer:Engie|Engie]] 23:42, 27. Mär. 2009 (CET)<br />
:Richtig, daran hatte ich nicht mehr gedacht.. Sollte [http://de.wikipedia.org/w/index.php?title=Benutzer:P.Copp/scripts/adddeletereason.js&diff=prev&oldid=58404911 damit] jetzt klappen. Gruß --[[Benutzer:P.Copp|P.Copp]] 11:24, 28. Mär. 2009 (CET)<br />
<br />
== Löschfeld ==<br />
Hallo P.Copp. Hättest du vielleicht gelegentlich mal Zeit und Lust, mir beim [[Wikipedia:Administratoren/Notizen/Archiv/2009/03#Löschfeld|Verbreitern des Löschfelds]] via Monobook zu helfen? Ich habe vor, dies dann auch auf Commons zu nutzen. --[[Benutzer:Leyo|Leyo]] 11:34, 4. Apr. 2009 (CEST)<br />
:Das sollte eigentlich nicht schwer sein. Einfachste Möglichkeit via CSS: <source lang="css">#wpReason {width: 80em;}</source> (Die <tt>80em</tt> kannst du dir natürlich so anpassen wie du es haben möchtest.) Wenn es mehrzeilig werden soll, müsste man auf JavaScript zurückgreifen. Gruß --[[Benutzer:P.Copp|P.Copp]] 11:45, 4. Apr. 2009 (CEST)<br />
::[http://de.wikipedia.org/w/index.php?title=Benutzer:Leyo/monobook.css&diff=prev&oldid=58663910 Done], aber irgendwie klappt das trotz Purgen noch nicht. Im HTML-Quelltext steht noch <code><input name="wpReason" size="60" …</code>. --[[Benutzer:Leyo|Leyo]] 12:06, 4. Apr. 2009 (CEST)<br />
:::Hmmm, du hast etwas weiter oben die Zeile <tt>input#wpReason { width: 90%; }</tt> stehen, evtl. kollidieren die zwei miteinander. (War die Zeile vielleicht sogar der eigentliche Grund, dass dir das Löschfeld so schmal vorkam?) Gruß --[[Benutzer:P.Copp|P.Copp]] 12:12, 4. Apr. 2009 (CEST)<br />
::::Ja, genau das war der Grund. Ich hoffe, ich habe nicht noch weitere Altlasten in meinem Monobook. ;-) Um unnötige Edits zu vermeiden, habe ich mit dem Web Developer (FF-Addon) herumgespielt und gesehen, dass die 80em gerade passen. Vielen Dank für deine Hilfe. --[[Benutzer:Leyo|Leyo]] 12:32, 4. Apr. 2009 (CEST)<br />
:::::Gern geschehen. Grüße --[[Benutzer:P.Copp|P.Copp]] 14:32, 5. Apr. 2009 (CEST)<br />
<br />
== CopperBot auf [[Wikipedia:Redundanz]] ==<br />
<br />
Hi P.Copp,<br />
<br />
du wolltest deinen Bot ja eventuell auch in anderen Namensräumen einsetzen. Ich habe [[Wikipedia_Diskussion:Redundanz#Benutzer:CopperBot|hier]] mal angefragt und es gab keinen Widerspruch. Wenn du also magst kannst du deinen Bot gerne auf den Monatsseiten einsetzen. -- [[Benutzer:Merlissimo/Sig|Merl]][[Benutzer Diskussion:Merlissimo/Sig|issimo]] 13:56, 9. Apr. 2009 (CEST)<br />
:Ok, ich hab die Seiten mit [http://de.wikipedia.org/w/index.php?diff=58882478&oldid=58094523 aufgenommen]. Danke für den Hinweis! Gruß --[[Benutzer:P.Copp|P.Copp]] 14:44, 10. Apr. 2009 (CEST)<br />
<br />
== Aktivität ==<br />
<br />
Warum signiert der Bot nicht auf allen Wikipedia-Seiten nach? --[[Benutzer:Молох|Молох]] 14:51, 24. Apr. 2009 (CEST)<br />
:Bei der [[Wikipedia:Bots/Anträge auf Botflag/Archiv/2009#2009-03-09 – CopperBot|Diskussion zum Botflag]] gab es Bedenken, dass der Bot nicht auf allen Projekt-/Diskussionsseiten erwünscht sei. Um welche Seite(n) geht es dir denn genau? Einzelne Ausnahmen können unter [[Benutzer:CopperBot/Überwachte Seiten]] aufgelistet werden. Gruß --[[Benutzer:P.Copp|P.Copp]] 09:55, 25. Apr. 2009 (CEST)<br />
<br />
== Automatisch section=new bei leerer Diskussionsseite ==<br />
<br />
Hallo P.Copp! Ich wollte gerade einen Vorschlag auf [[WP:VV]] machen, da ist mir aufgefallen, dass BECKs den schon letzten Monat gemacht hat, nämlich [[Wikipedia:Verbesserungsvorschl%C3%A4ge/Archiv/2009/M%C3%A4rz#.C3.84nderung_des_Bearbeitungsfensters_f.C3.BCr_.28noch.29_leere_Diskussionsseite_von_Benutzer:Beck.27s_von_WP:FZW_hierher_kopiert|hier]]. Leider ist er da ohne Bearbeitung archiviert worden, obwohl Du einen Vorschlag hattest. Ist die Realisierung nur vergessen worden, oder wurde er aus anderen Gründen nicht umgesetzt? Gruß --[[Benutzer:Grip99|Grip99]] 07:32, 25. Apr. 2009 (CEST)<br />
:Schwer zu sagen.. Wahrscheinlich hatte einfach kein Admin dort vorbeigeschaut, den das Thema interessiert hat. Du könntest es mit einer Anfrage auf [[WP:AAF]] probieren, die Seite steht AFAIK stärker unter Beobachtung. Gruß --[[Benutzer:P.Copp|P.Copp]] 09:53, 25. Apr. 2009 (CEST)<br />
::Ach, ich vergaß, dass Du gar kein Admin bist. Es wäre zwar an der Zeit, das zu ändern, weil offensichtlich nicht nur in diesem Fall Bedarf für die "Knöpfe" da wäre. Aber angesichts der verbreiteten Wahlkriterien sind 770 Edits und "6 Monate richtig dabei" wohl keine idealen Voraussetzungen für eine Kandidatur.-- [[Benutzer:Grip99|Grip99]] 15:34, 25. Apr. 2009 (CEST)<br />
:::Das ist wohl leider so (siehe auch [[Wikipedia:Adminkandidaturen/Umherirrender|diese „Technokraten“-Kandidatur]]), auch wenn du meine Stimme natürlich hättest. --[[Benutzer:Leyo|Leyo]] 15:40, 25. Apr. 2009 (CEST)<br />
:::: Ein solches Vorhaben würde bei mir wohl zurecht scheitern, da ich von den ganzen WP-Regularien nicht wirklich eine Ahnung habe :). Ich sehe da aber auch keinen großen Bedarf, bis jetzt habe ich immer die helfende Hand eines Admins gefunden. Grüße --[[Benutzer:P.Copp|P.Copp]] 16:04, 25. Apr. 2009 (CEST)<br />
:::::Wer irgendwo was Positives beitragen kann und sich dort raushält, wo er keine ausreichende Ahnung hat, ist allemal eine Bereicherung. Leider auch das nur meine persönliche Meinung und keine allgemein anerkannte, wie man an manchen Contra-Begründungen bei Umherirrender sieht.<br />
:::::Den Ruf der ''Admin''pedia begründen ja gerade die Leute, die aufgrund mangelnder Selbstkritik mit großer Entschlossenheit auf Gebieten Entscheidungen treffen, für die sie nicht oder nicht ausreichend qualifiziert sind.-- [[Benutzer:Grip99|Grip99]] 17:03, 25. Apr. 2009 (CEST)<br />
<br />
== Danke! ==<br />
<br />
Der Signatur-Nachtrage-Bot ist echt praktisch. Könnte man die Wartezeit nicht noch verkürzen, damit man sich das manuelle Nachsignieren der Beiträge auf der Beobachtungsliste spart... --[[Benutzer:Badenserbub|Badenserbub]] [[Benutzer Diskussion:Badenserbub|<sub>Briefkasten</sub>]] [[Benutzer:Badenserbub/Bewertung|<sup>Bewerte mich!</sup>]] 19:15, 28. Apr. 2009 (CEST)<br />
:Ich hatte die Wartezeit anfangs auf 15 Minuten, mit dem Ergebnis, dass noch einige Vandalismusbeiträge nachsigniert wurden, weil sie noch nicht von der Eingangskontrolle angeschaut wurden. Daher hatte ich den Abstand auf 30 Minuten erhöht. Ich denke, das ist ein akzeptabler Kompromiss um einerseits die RC-Kontrolle nicht zu sehr zu behindern und trotzdem einigermaßen zeitnah zu signieren. Übrigens signiert der Bot auch Beiträge nach, auf die bereits geantwortet wurde, solange der ursprüngliche Beitrag nicht verändert wurde. Du brauchst in diesen Fällen also nicht unbedingt von Hand nachzusignieren :). Grüße --[[Benutzer:P.Copp|P.Copp]] 15:26, 29. Apr. 2009 (CEST)<br />
::Danke für den Hinweis. Funktioniert das auch bei den uralt-Diskussionseiten mit einem halben Duzend unsignierter Beiträge? --[[Benutzer:Badenserbub|Badenserbub]] [[Benutzer Diskussion:Badenserbub|<sub>Briefkasten</sub>]] [[Benutzer:Badenserbub/Bewertung|<sup>Bewerte mich!</sup>]] 21:19, 29. Apr. 2009 (CEST)<br />
:::Leider nein, bis jetzt werden nur neue Beiträge nachsigniert. Ich habe aber vor, demnächst auch die Altlasten mit dem Bot aufzuräumen (so gut es eben geht). Gruß --[[Benutzer:P.Copp|P.Copp]] 14:10, 30. Apr. 2009 (CEST)<br />
:::: Ja, echt ein hochnützlicher Bot, vielen Dank auch von meiner Seite fürs Schreiben desselbigen! -- [[Benutzer:Hg6996|hg6996]] 21:01, 6. Mai 2009 (CEST)<br />
<br />
== Funktioniert nicht immer ==<br />
Funktioniert nicht immer:<br />
*http://de.wikipedia.org/w/index.php?title=Diskussion:Unicode&diff=next&oldid=59352881 (bereits signiert)<br />
*http://de.wikipedia.org/w/index.php?title=Diskussion:Unicode&diff=next&oldid=59514898 (pseudo-Nachtrag)<br />
--[[Spezial:Beiträge/91.62.89.206|91.62.89.206]] 08:02, 29. Apr. 2009 (CEST)<br />
:Das ist eigentlich das beabsichtigte Verhalten: Die IP hatte den Zeitstempel vergessen und der wurde dann vom Bot nachgetragen. Oder übersehe ich etwas? --[[Benutzer:P.Copp|P.Copp]] 15:26, 29. Apr. 2009 (CEST)<br />
::Hallo P.Copp! Wann genau wird eine Signatur als vollständig angesehen? Ich habe keine Beschreibung gefunden, z.B. einen regulären Ausdruck, um [http://de.wikipedia.org/w/index.php?title=Diskussion:Daodejing&diff=59572879&oldid=59572094 meine Signatur] daran anzupassen. Ich würde gerne weiter auf Uhrzeit und Zeitzone verzichten, solang die jeweilige Diskussion nicht allzu rege ist. Andererseits will ich auch nicht unbedingt der Einzige sein auf der Opt-out-Liste. (Oder hat es damit zu tun, dass ich das Datum nachgebessert habe?) --[[Benutzer Diskussion:Ai|Ai]] 30. Apr. 2009 <small>(22:51, 30. Apr. 2009 (CEST), ''Datum/Uhrzeit nachträglich eingefügt, siehe [[Hilfe:Signatur]]'')</small><br />
:::Das Problem deiner halben Zeitangabe ist, dass die beiden Archivierungsbots das gar nicht mögen. So kann es dir passieren, dass - obwohl du frisch signiert hast - der Abschnitt sofort danach archiviert werden wird. Wieviel P.Copp's Bot braucht um inaktiv zu bleiben kann ich dir nicht beantworten. Aber sein Zweck dient u.a. zum Lösen genau dieser Problematik. -- [[Benutzer:Merlissimo/Sig|Merl]][[Benutzer Diskussion:Merlissimo/Sig|issimo]] 22:57, 30. Apr. 2009 (CEST)<br />
:::Auch kurze Diskussionen tendieren oft dazu, sich zu verzweigen. Wenn dann keine Uhrzeiten bei den Beiträgen dabeistehen ist es teilweise schwierig, die Übersicht über den Diskussionsverlauf zu behalten. Aus diesem und auch den von [[Benutzer:Merlissimo|Merlissimo]] genannten Gründen prüft der Bot, ob sowohl Datum als auch Uhrzeit angegeben wurde. Das Format ist dabei relativ egal, am bequemsten geht es aber mit dem Standard-Zeitstempel, den du mit der Zeichenfolge <code><nowiki>~~~~~</nowiki></code> (5 Tilden) erzeugst. (Näheres dazu unter [[Hilfe:Signatur]].) Grüße --[[Benutzer:P.Copp|P.Copp]] 15:31, 1. Mai 2009 (CEST)<br />
<br />
== CopperBot: Alle Benutzerdiskussionsseiten ==<br />
<br />
Hallo, was genau spricht denn dagegen, per default alle Benutzerdiskussionsseiten in die Nachsignierung einzubinden? Gruß and happy bbq-ing (auch, wenn nicht oder nur gegrillt wird) :), -- [[Benutzer:Emdee|Emdee]] 15:13, 1. Mai 2009 (CEST)<br />
:Ich schätze, viele Benutzer sehen den eigenen Benutzernamensraum als „tabu“ für Bots an. Wenn sich herausstellt, dass die Mehrheit der Benutzer den Bot auf ihren Disks nutzen möchten, kann man das Opt-in natürlich auch in ein Opt-out umwandeln :). Siehe auch [[#Aktivität]]. Grüße --[[Benutzer:P.Copp|P.Copp]] 15:32, 1. Mai 2009 (CEST)<br />
<br />
== CopperBot: Unterstützung von Interwiki-Signaturen ==<br />
<br />
Hi,<br />
akzeptiert dein Bot auch Interwiki-Signaturen (beim Geschwisterchen gesehen)? Sonst kann überlegen, ob man noch ein paar international frequentierte Seiten aufnehmen sollte. -- [[Benutzer:Merlissimo/Sig|Merl]][[Benutzer Diskussion:Merlissimo/Sig|issimo]] 21:26, 3. Mai 2009 (CEST)<br />
:Interwikilinks sollten eigentlich keine Probleme machen, ausgetestet habe ich es allerdings noch nicht. Was meinst du denn mit Geschwisterchen? --[[Benutzer:P.Copp|P.Copp]] 20:41, 6. Mai 2009 (CEST)<br />
::Ich meinte damit, wenn ich hier mit [[s:de:Merlissimo]] anstatt mit einem Link auf meiner dewiki-Benutzerseite unterschreiben würde. SineBot kann es [[en:User:SineBot/ChangeLog#1.5.7|seit Version 1.5.7]]. -- [[Benutzer:Merlissimo/Sig|Merl]][[Benutzer Diskussion:Merlissimo/Sig|issimo]] 23:38, 6. Mai 2009 (CEST)<br />
:::Sollte wie gesagt kein Probleme machen, solche Links werden recht großzügig gehandhabt. Gruß --[[Benutzer:P.Copp|P.Copp]] 12:39, 10. Mai 2009 (CEST)<br />
<br />
== Signaturnachtag ==<br />
<br />
Ich fände es hilfreich, wenn dein Bot bei einem Signaturnachtrag den betreffenden Abschnitt im Zusammenfassungsfeld verlinken würde, ähnlich wie es ein normaler Benutzer tun würde, der den Abschnitt bearbeiten würde. Wäre das möglich und was sagst du dazu? -- [[Benutzer:Jonathan Haas|Jonathan Haas]] 22:42, 4. Mai 2009 (CEST)<br />
:Der Bot wiederholt ja die Zusammenfassung des nicht-signierenden Benutzers. Wenn der also einen Abschnitt bearbeitet hat, dann erscheint der Link zum Abschnitt auch in der Zusammenfassung des Bots. (siehe z.B. [http://de.wikipedia.org/w/index.php?title=Diskussion:Globale_Erwärmung&diff=prev&oldid=59781578 hier]). Gruß --[[Benutzer:P.Copp|P.Copp]] 20:43, 6. Mai 2009 (CEST)<br />
<br />
== Ausnahmen ==<br />
<br />
Hallo P.Copp, mich würde interessieren, warum Sichter/admins etc. ausgenommen sind, da diese doch auch mal eine sig vergessen können? Gruß-- [[Benutzer:Ticketautomat|Ticketautomat]] 09:30, 6. Mai 2009 (CEST)<br />
:Bei erfahrenen Benutzern passiert das meistens nur sehr selten bzw. falls doch tragen sie die Signatur meistens selbst innerhalb von ein paar Minuten nach. Auf der anderen Seite kann es bei den Benutzern eher zu „falschen Positiven“ kommen, also Bearbeitungen, die eigentlich keine Diskussionsbeiträge sind, aber dennoch vom Bot als solche erkannt werden. Falls es gewünscht ist, könnte ich natürlich eine Opt-in-Seite einrichten, für Benutzer, die trotzdem „kontrolliert“ werden möchten :) Gruß --[[Benutzer:P.Copp|P.Copp]] 20:48, 6. Mai 2009 (CEST)<br />
::Der Aufwand wird vermutlich nicht nötig sein. Ist mir nur aufgefallen, als jemand neulich auf einer Diskussionsseite vergaß, zu unterschreiben und ich anstelle wie sonst die Vorlage reinzusetzen, (vergeblich) darauf gewartet hatte, dass der Bot kommt. Da ich selber das monobook von PDD verwende und - falls ich es mal vergessen sollte - diese automatisch eingefügt wird, brauch ich kein opt-in. Gruß-- [[Benutzer:Ticketautomat|Ticketautomat]] 08:16, 7. Mai 2009 (CEST)<br />
<br />
== CopperBot ==<br />
<br />
Kann man den Bot für einzelne Seiten aussperren? Er behindert ein wenig des ständig nötige Rücksetzen des ART-Trolls und ähnlicher Fälle. --[[Benutzer:Pjacobi|Pjacobi]] 20:11, 6. Mai 2009 (CEST)<br />
:Das ist möglich z.B. per [[Vorlage:Bots]], auf der betreffenden Seite müsste dann <nowiki>{{bots|deny=CopperBot}}</nowiki> eingetragen werden. Gruß --[[Benutzer:P.Copp|P.Copp]] 20:51, 6. Mai 2009 (CEST)<br />
<br />
== Machbarkeitsfrage: diff=review per API ==<br />
<br />
Hallo,<br />
ich habe eine Machbarkeitsfrage: Da du ([[bugzilla:16278|Bug 16278]]) als "Hauptautor" der FlaggedRevs-API geführt wirst, wollte ich dich direkt fragen. Es geht mir um die Funktion "diff=review" ([[bugzilla:16923|Bug 16923]]). Diese ist derzeit nicht per API verfügbar. Da mit [[bugzilla:13209|Bug 13209]] der Parameter <tt>rcdiffto=</tt> eingefügt wurde, würe es auch nicht schlecht, wenn die API "review" akzeptiert. Ich weiß nicht, ob es bereits vorgesehen ist, dass ein Module (review) ein anderes Module (revisions) erweitern kann, damit diese Funktion nicht hardcodiert im Core steht, sondern nur mit der Extension verfügbar ist.<br />
Falls dies nicht möglich sein sollte, gibt es/siehst du eine andere Möglichkeit? [[Benutzer:Umherirrender|Der Umherirrende]] 21:29, 12. Mai 2009 (CEST)<br />
:Möglich ist es schon, z.B. so ähnlich wie für die Erweiterung um <tt>rvprop=flagged</tt> ([[rev:41809]]) damals. Allerdings ist es ein ziemliches Gefriemel das einigermaßen sauber hinzubekommen, daher weiß ich nicht, ob sich der Aufwand lohnen würde. Was ist denn der Anwendungsfall?<br />
:Für die Zwischenzeit kannst du dir auf jeden Fall behelfen, indem du zuerst die stable_revid abfragst mit <tt>prop=flagged</tt> ([http://de.wikipedia.org/w/api.php?action=query&titles=API&prop=flagged Bsp.]), und das dann als Parameter für <tt>rvdiffto=</tt> verwendest. Gruß --[[Benutzer:P.Copp|P.Copp]] 07:05, 13. Mai 2009 (CEST)<br />
::Die Verbindung zu rvprop=flagged habe ich garnicht hinbekommen, stimmt, dort wird auch ein Modul erweitert.<br />
::Ein konkreten Nutzen für mich habe ich nicht, aber ich denke immer, das es sicher leute gibt, die anwendungen schreiben möchten, die dann solche Informationen darstellen. Und dann zwei Querys zu machen ist ja auch nicht immer schön, wenn es auch zusammen gehen würde. Aber wenn das frickelig ist, möchte ich da keinen draufhetzen. Danke für deine Einschätzung. [[Benutzer:Umherirrender|Der Umherirrende]] 18:28, 13. Mai 2009 (CEST)<br />
:::Bei näherer Überlegung denke ich, dass es Sinn machen würde, so etwas wie <tt>rvstartid=stable</tt> zu haben, so dass man direkt die gesichtete Version einer Seite abfragen kann. Das würde dann auch das obige Problem lösen, da man dann mittels <tt>rvdiffto=cur</tt> den richtigen Diff bekommt. Ich werd später mal schauen, dass ich einen Bug dazu eröffne. Gruß --[[Benutzer:P.Copp|P.Copp]] 12:46, 16. Mai 2009 (CEST)<br />
<br />
==Technische Frage ...==<br />
... zu MediaWiki, und ob es möglich/sinnvoll ist, von de.Bilddiskussionsseiten(-Reitern) unmittelbar zu commons.Bilddiskussionsseiten zu leiten: [[Wikipedia:Administratoren/Notizen#angebotene_Bild-Diskussionsseite_auf_de.2C_obwohl_die_Bild-Datei_von_Commons_eingebunden_ist]] ... Gruß ... [[Benutzer:Hafenbar|Hafenbar]] 15:41, 14. Mai 2009 (CEST)<br />
:Habe [http://de.wikipedia.org/w/index.php?title=Wikipedia:Administratoren/Notizen&diff=60116330&oldid=60076283 dort geantwortet]. Gruß --[[Benutzer:P.Copp|P.Copp]] 12:59, 16. Mai 2009 (CEST)<br />
::Dein Vorschlag ist nun übrigens „live gegangen“: [[MediaWiki:Common.js]] --[[Benutzer:Leyo|Leyo]] 18:30, 8. Jun. 2009 (CEST)<br />
<br />
Auf obiger Seite gibt es nochmals eine Bitte an dich. --[[Benutzer:Leyo|Leyo]] 15:56, 16. Jun. 2009 (CEST)<br />
<br />
== Welches Maß nimmt der CopperBot für die Signatur? ==<br />
<br />
Hallo, laut [[Hilfe:Signatur]] besteht eine richtige Signatur aus dem Namensteil und dem Zeitstempel. Prüft und korriegiert der CopperBot auch unvollständige Signaturen, beispielsweise wenn der Zeitstempel fehlt? --[[Benutzer:Cepheiden|Cepheiden]] 21:00, 18. Mai 2009 (CEST)<br />
<br />
:related: [[Wikipedia:AAF#Zeitstempel_in_Signaturen]] -- [[Benutzer:Lustiger seth|seth]] 23:23, 18. Mai 2009 (CEST)<br />
<br />
:Ja, tut er. [http://de.wikipedia.org/w/index.php?title=Diskussion:Warze&diff=prev&oldid=60655991 Bsp. fehlender/falscher Benutzername], [http://de.wikipedia.org/w/index.php?title=Diskussion:Moskwitsch&diff=prev&oldid=60653942 Bsp. fehlendes Datum]. Gruß --[[Benutzer:P.Copp|P.Copp]] 12:20, 1. Jun. 2009 (CEST)<br />
<br />
== [[Benutzer:P.Copp/scripts/wlchanges.js]] ==<br />
<br />
Könnte man nicht, wo jetzt "Alle anzeigen" steht, sowas wie "Alle gelesen" hinzufügen, um alle wegzuklappen? Gruß --<span class='Person'>[[Benutzer:Euku|Euku]]:[[Benutzer_Diskussion:Euku|<sup>⇄</sup>]]</span> 00:41, 20. Mai 2009 (CEST)<br />
:Könnte man und werde ich nach deiner Anregung auch einbauen, sobald ich Zeit hab :). Den gleichen Effekt hast du übrigens auch, wenn du beim ersten Eintrag auf das „(g)“ klickst. Gruß --[[Benutzer:P.Copp|P.Copp]] 12:21, 1. Jun. 2009 (CEST)<br />
::Ich weiß, aber das erste (g) ist ziemlich klein, dafür dass man es so oft braucht. Danke, dass du dir Zeit dafür nehmen willst. --<span class='Person'>[[Benutzer:Euku|Euku]]:[[Benutzer_Diskussion:Euku|<sup>⇄</sup>]]</span> 12:32, 1. Jun. 2009 (CEST)<br />
<br />
== [[Benutzer:CopperBot]] ==<br />
<br />
Für den solltest du das Bot-Flag beantragen, damit er nicht die Listen überflutet und die Sichtungen nicht beeinflusst. <span class="signaturcaesium137">[[Benutzer:Cäsium137|Cäsium137]]&nbsp;[[Benutzer_Diskussion:Cäsium137|(D.)]]</span> 23:09, 31. Mai 2009 (CEST)<br />
<br />
:Hm? Der Bot hat Botstatus, siehe [http://de.wikipedia.org/w/index.php?title=Spezial:Logbuch&type=rights&page=Benutzer:CopperBot] und [http://de.wikipedia.org/w/index.php?title=Spezial%3ABenutzer&username=Copper&group=bot&limit=50]. --[[Benutzer:APPER|APPER]]\[[Benutzer Diskussion:APPER|<sup><big>☺☹</big></sup>]] 23:36, 31. Mai 2009 (CEST)<br />
<br />
Merkwürdig. Warum wird er dann, im Gegensatz zu anderen Bots, nicht ausgeblendet, wenn ich das auf den Spezialseiten anklicke ? Muss das manuell in irgendeine Liste geschrieben werden ? Bei den Recent Changes ist z.B. der Edit um 2:16 auf [[Diskussion:Gedenkstätte Bautzner Straße Dresden]] zu sehen, obwohl ich hidebots=1 angegeben habe. <span class="signaturcaesium137">[[Benutzer:Cäsium137|Cäsium137]]&nbsp;[[Benutzer_Diskussion:Cäsium137|(D.)]]</span> 02:26, 1. Jun. 2009 (CEST)<br />
:Das liegt daran, dass der Bot die Bearbeitungen nicht als Botbearbeitungen markiert. Die Begründung dafür steht etwas weiter oben im Abschnitt [[#Copper]]. Gruß --[[Benutzer:P.Copp|P.Copp]] 12:22, 1. Jun. 2009 (CEST)<br />
<br />
<br />
Das solltest du groß und breit auf die Benutzerseite des Bot schreiben. Mein Vorschlag:<br />
<br />
{| <!-- {{Bausteindesign4}}--> cellpadding="10px" width="80%"<br />
! Hinweis:<br />
| Die von diesem Bot durchgeführten Änderungen können aus Sachgründen nicht als Botedits markiert werden. Es ist daher normal, dass sie auch bei im übrigen ausgeblendeten Botedits in der Beobachtungsliste und bei den "letzten Änderungen" aufgezeigt werden. <br />
|}<br />
<br />
Das macht es leichter. <span class="signaturcaesium137">[[Benutzer:Cäsium137|Cäsium137]]&nbsp;[[Benutzer_Diskussion:Cäsium137|(D.)]]</span> 20:04, 1. Jun. 2009 (CEST)<br />
:Ich hab mir mal erlaubt, obiges etwas zu entschärfen. Ich werde wahrscheinlich später eine FAQ auf die Benutzerseite des Bots setzen, da kann dann diese Information auch mit rein. Grüße --[[Benutzer:P.Copp|P.Copp]] 15:53, 16. Jun. 2009 (CEST)<br />
<br />
== Nanu? ==<br />
<br />
Habe ich Tomaten auf den Augen? Warum hat der Bot [http://de.wikipedia.org/w/index.php?title=Diskussion:Wat&curid=524734&diff=60728742&oldid=60727658 diese] Ergänzung durchgeführt? <br />
<br />
In diesem Zusammenhang: wird bei der Umsetzung der Signatur (<nowiki>--~~~~</nowiki>) eigentlich die Zeit des lokalen Rechners benutzt, oder die des Servers? --[[Benutzer:Hdamm|Hdamm]] 12:23, 3. Jun. 2009 (CEST)<br />
:Wenn ich mal antworten darf: Der Server setzt normalerweise den Zeitstempel. Hier ist aber einerseits eine 0 in "'''''0'''3. Jun.''" zu viel und die Uhrzeit stimmt nicht, [http://de.wikipedia.org/w/index.php?title=Diskussion:Wat&diff=prev&oldid=60727658 vgl.]. D.h. die Signatur wurde nicht mit (<nowiki>--~~~~</nowiki>) erzeugt. Gruß --<span class='Person'>[[Benutzer:Euku|Euku]]:[[Benutzer_Diskussion:Euku|<sup>⇄</sup>]]</span> 14:54, 3. Jun. 2009 (CEST)<br />
::Danke für die Aufklärung. Jetzt wo Du es sagst, sehe ich es auch: scheinbar hat dieser Benutzer die Daten seines vorherigen Beitrags kopiert und manuell angepasst. --[[Benutzer:Hdamm|Hdamm]] 15:40, 3. Jun. 2009 (CEST)<br />
::Genau, der Bot hat eine eingebaute Toleranz von ±20 Minuten. Wenn die angegebene Uhrzeit stärker abweicht, trägt er dann die richtige Uhrzeit nach. Gruß --[[Benutzer:P.Copp|P.Copp]] 15:51, 16. Jun. 2009 (CEST)<br />
<br />
== [[Orlistat]] ==<br />
SIEHE http://de.wikipedia.org/wiki/Diskussion:Orlistat / MfG --[[Benutzer:Jü|Jü]] 21:35, 8. Jun. 2009 (CEST)<br />
:Bist du sicher, dass du mich anschreiben wolltest? Wenn ja bräuchte ich ein paar konkretere Anhaltspunkte für dein Anliegen :) Gruß --[[Benutzer:P.Copp|P.Copp]] 15:49, 16. Jun. 2009 (CEST)<br />
<br />
== [[Benutzer:P.Copp/scripts/addreviewlinks.js]] ==<br />
<br />
Hi. Der ''sichten''-Link scheint nun bei vielen Einträgen auf der BL zu fehlen. [http://de.wikipedia.org/w/index.php?title=Heute_(Fernsehsendung)&curid=894948&action=history Bsp.] Mir ist auch aufgefallen, dass bei auto-gesichteten Änderungen auch ein Ausrufezeichen angezeigt wird, [http://de.wikipedia.org/w/index.php?title=Smith_(Familienname)&curid=97584&action=history Bsp.]. Hoffe das ganze ist noch im selben Zustand, wenn du das hier liest. --<span class='Person'>[[Benutzer:Euku|Euku]]:[[Benutzer_Diskussion:Euku|<sup>⇄</sup>]]</span> 15:40, 15. Jun. 2009 (CEST)<br />
:Hm, mein Skript ist eig. nur für die „sichten“-Links auf den Benutzerbeiträgen verantwortlich. Die anderen kommen von MediaWiki und da scheint es gerade einige Fehler nach dem Softwareupdate zu geben. Siehe [[bugzilla:19214]]. Gruß --[[Benutzer:P.Copp|P.Copp]] 15:47, 16. Jun. 2009 (CEST)<br />
<br />
== signatur ==<br />
hi, eine Frage, was meinst du bitte [http://de.wikipedia.org/w/index.php?title=Diskussion%3AListe_der_gr%C3%B6%C3%9Ften_St%C3%A4dte_Europas&diff=61213928&oldid=61212975 hier], was stimmte mit meiner Signatur nicht? [[Benutzer:88.77.x.x|88.77.x.x]] 15:19, 16. Jun. 2009 (CEST)<br />
:Du hast die Uhrzeit von Hand eingefügt, statt diese automatisch generieren zu lassen. --[[Benutzer:Leyo|Leyo]] 15:32, 16. Jun. 2009 (CEST)<br />
::nein, das habe ich nicht, s. Versionengeschichte. --[[Benutzer:88.77.x.x|88.77.x.x]] 15:37, 16. Jun. 2009 (CEST)<br />
:::Tut mir leid, da hat mein Bot wohl einen Fehler gemacht. Ich habe den Edit [http://de.wikipedia.org/w/index.php?title=Diskussion:Liste_der_größten_Städte_Europas&diff=61215458&oldid=61213928 revertiert]. Gruß --[[Benutzer:P.Copp|P.Copp]] 15:43, 16. Jun. 2009 (CEST)<br />
:::Die Zeit stimmte jedenfalls [http://de.wikipedia.org/w/index.php?title=Diskussion:Liste_der_gr%C3%B6%C3%9Ften_St%C3%A4dte_Europas&diff=prev&oldid=61212138 nicht ganz überein]. --[[Benutzer:Leyo|Leyo]] 15:51, 16. Jun. 2009 (CEST)<br />
::::@Benutzer:P.Copp: kein Problem :-), kann dein Bot auch die laufende Nr. in einer Tabelle automatisch ändern? [[Liste der größten Städte Europas|hier wurde die 21 gelöscht]] - die unteren Nr. müssten "i++" werden. LG [[Benutzer:88.77.x.x|88.77.x.x]] 15:57, 16. Jun. 2009 (CEST)<br />
:::::Leider nicht. Für so einen Spezialfall hilft idR nur Handarbeit bzw. ein Texteditor mit guter Search/Replace-Funktion. Gruß --[[Benutzer:P.Copp|P.Copp]] 16:08, 16. Jun. 2009 (CEST)<br />
<br />
Ähnliches Problem [http://de.wikipedia.org/w/index.php?title=Diskussion:Theorema_egregium&curid=2101400&diff=61218182&oldid=61217073 hier] – da hat der Bot anscheinend irgendetwas verwechselt. Um 16:29 Uhr habe ich in einem anderen Abschnitt etwas ergänzt (und das auch korrekt signiert). --[[Spezial:Beiträge/80.129.113.30|80.129.113.30]] 17:10, 16. Jun. 2009 (CEST)<br />
:Hm, ich schätze der Bot hatte wohl Schluckauf wegen dem Softwareupdate an dem Tag. Nach einem Neustart scheint sowas nicht mehr vorzukommen. Gruß --[[Benutzer:P.Copp|P.Copp]] 12:21, 21. Jun. 2009 (CEST)<br />
<br />
== Kleines Dankeschön ==<br />
{{Gummibärchen|P.Copp|den automatischen Signaturnachtrag per Bot|[[Benutzer:Ben-Oni|Ben-Oni]] 21:38, 18. Jun. 2009 (CEST)}}<br />
Ich freue mich fast täglich darüber, dass diese lästige Kramarbeit nun ein Ende hat und dein Bot das regelt. Für mich macht das die Diskussionen ein gutes Stück entspannter und dient damit ganz erheblich der Verbesserung der Enzyklopädie durch Verbesserung des Arbeitsklimas. -- [[Benutzer:Ben-Oni|Ben-Oni]] 21:38, 18. Jun. 2009 (CEST)<br />
:Hui, da freut sich mein Bot aber :-) --[[Benutzer:P.Copp|P.Copp]] 12:22, 21. Jun. 2009 (CEST)<br />
:Fast hätte ich so etwas Ähnliches geschrieben, da habe ich gerade noch das entsprechende Thema auf dieser Disk gefunden. Also, P.Copp, spendier deinem Bot mal ein Stück Kuchen von mir. Wenn wir uns jemals treffen sollten, erinner mich dran, dass ich dir das wiedergebe ;-) --<small>(der Vorstehende, nicht signierte Beitrag stammt von </small>[[Benutzer:Mitja|Mitja]] [[Benutzer_Diskussion:Mitja|<small>42?</small>]] 01:40, 31. Aug. 2009 (CEST) <small>:-)</small><br />
<br />
== Ersetzen von Vorlagen ==<br />
<br />
Hallo p.Copp, wäre es möglich, dass dein Bot wenn er eine Diskseite bearbeitet gleichzeitig die Vorlagen <br />
* <code><nowiki>{{Löschantrag zurückgezogen}}</nowiki></code> bzw. <code><nowiki>{{Vorlage:Löschantrag zurückgezogen}}</nowiki></code> durch <code><nowiki>{{Löschantrag entfernt}}</nowiki></code><br />
* <code><nowiki>{{LAE}}</nowiki></code> bzw. <code><nowiki>{{Vorlage:LAE}}</nowiki></code> durch <code><nowiki>{{Löschantrag entfernt}}</nowiki></code> <br />
* <code><nowiki>{{Keine Auskunft}}</nowiki></code> bzw. <code><nowiki>{{Vorlage:Keine Auskunft}}</nowiki></code> durch <code><nowiki>{{Diskussionsseite}}</nowiki></code> <br />
<br />
ersetzt? Freundliche Grüße -- chemiewikibm <small>cwbm</small> 14:56, 20. Jun. 2009 (CEST)<br />
:Klar, kann ich gerne einbauen. Nur aus Neugierde, warum werden nicht einfach Weiterleitungen darause gemacht? Gruß --[[Benutzer:P.Copp|P.Copp]] 12:23, 21. Jun. 2009 (CEST)<br />
::Ich weiß nicht ob du das schon eingebaut hast, aber es scheint nicht richtig zu funktionieren [http://de.wikipedia.org/w/index.php?title=Diskussion:Judenfeindlichkeit&curid=198840&diff=62036786&oldid=62035818], [http://de.wikipedia.org/w/index.php?title=Diskussion:Thomas_Godoj&curid=3563074&diff=62035063&oldid=62034089]. Es ging eigentlich nur darum, einen Boteinsatz zu vermeiden um diese Vorlagen zu löschen und daher diese langsam mit anderen Edits mit zu entfernen. Wenn es aber aufwändig wird, dann mach dir nicht die Mühe. Grüße -- chemiewikibm <small>cwbm</small> 22:03, 9. Jul. 2009 (CEST)<br />
:::Tut mir leid, ich bin ehrlich gesagt noch nicht dazu gekommen, das einzubauen. :( Steht aber auf meiner Liste.. Gruß --[[Benutzer:P.Copp|P.Copp]] 19:12, 26. Aug. 2009 (CEST)<br />
<br />
== Hilfe beim "Bild wird nicht gezeigt" ==<br />
<br />
Hallo, kannst Du mir helfen. Habe das "SiegelBienen.JPG hochgeladen hat alles geklappt. Jedoch geht das Bild nicht auf der Seite Bienen (Rees) auf. Gruß Heimatfreunde Bienen alias Thomas Winkler 11:15, 01. Juli 2009 (CEST))<br />
:Hallo, du hattest einen Tippfehler in der Dateinamensendung, ich habe es [http://de.wikipedia.org/w/index.php?title=Bienen_(Rees)&diff=61886831&oldid=61788280 korrigiert]. Da ich nicht sehr häufig online bin, kannst du solche Fragen übrigens auch auf [[WP:Fragen von Neulingen]] stellen, dort bekommst du in der Regel sehr schnell eine Antwort. Grüße --[[Benutzer:P.Copp|P.Copp]] 15:57, 5. Jul. 2009 (CEST)<br />
Danke für Deine Unterstützung. Gruß Heimatfreunde Bienen alias Thomas Winkler 10:29, 08. Juli 2009 (CEST))<br />
<br />
== Bot Unterstützung gesucht ==<br />
<br />
Hallo P.Copp!<br />
<br />
Kannst Du uns bitte unter [[Benutzer:Suhadi Sadono/Aufschub#DÜP/F Antwort]] weiterhelfen? Eine Bemerkung von Dir dazu wäre sehr hilfreich, vielen Dank und Grüsse -- [[Benutzer:DrTrigon|Dr]][[Benutzer_Diskussion:DrTrigon|Trigon]] 18:08, 4. Jul. 2009 (CEST)<br />
<br />
== Evereve ==<br />
Hi, ich glaube, da ist gründlich was danebengegangen [http://de.wikipedia.org/w/index.php?title=Diskussion:Chiemsee_Reggae_Summer&diff=prev&oldid=62195892] Die Signatur verweist nun auf ein Lemma anstelle eines Benutzers. Liegt das daran, dass der Benutzer noch rot ist? [http://de.wikipedia.org/wiki/Benutzer_Diskussion:Evereve] . Schau doch mal bitte. [[Benutzer:Ravenscroft|Ravenscroft]] 15:41, 14. Jul. 2009 (CEST)<br />
:Der Bot hat nur den Zeitstempel ergänzt. Die falsche Signatur war schon vorher dort. --[[Benutzer:Leyo|Leyo]] 15:47, 14. Jul. 2009 (CEST)<br />
::Wie peinlich, hätte ich sehen sollen. Danke [[Benutzer:Ravenscroft|Ravenscroft]] 15:52, 14. Jul. 2009 (CEST)<br />
<br />
== Gimme mo' ==<br />
<br />
Sorry, ich war 'mal [[Benutzer:P.Copp/Spezialseiten/Sackgassenseiten|so frei]]. :) -- [[Benutzer:Emdee|Emdee]] 23:51, 20. Jul. 2009 (CEST)<br />
:Ok, ich hoffe, dass ich in Kürze Zeit für eine Aktualisierung finde :) Gruß --[[Benutzer:P.Copp|P.Copp]] 19:18, 26. Aug. 2009 (CEST)<br />
<br />
== Korrektur trotz Signatur ==<br />
Das passiert bei mir jetzt mindestens [http://de.wikipedia.org/w/index.php?title=Wikipedia:L%C3%B6schkandidaten/5._August_2009&diff=63230926&oldid=63229798 zum zweiten Mal]. --Edoardo 15:10, 11. Aug. 2009 (CEST)<br />
:Was du machst, ist Signaturfälschung! --[[Benutzer:Leyo|Leyo]] 15:25, 11. Aug. 2009 (CEST)<br />
::Wie Bitte?! Das versteh ich jetzt nicht. Was meinst du damit? --Edoardo 20:22, 22. Aug. 2009 (CEST)<br />
:::Anhand deiner Signatur ist nicht erkennbar, welcher Benutzername die Bearbeitung durchgeführt hat. Da es keinen Link auf deine Benutzerseite gibt und dein Benutzername nicht in der Signatur auftaucht, ist dein Beitrag nicht zuordenbar bzw. würde dem Benutzer:Edoardo zugeordnet, deshalb Signaturfälschung. --[[Benutzer:APPER|APPER]]\[[Benutzer Diskussion:APPER|<sup><big>☺☹</big></sup>]] 21:33, 22. Aug. 2009 (CEST)<br />
::::Aha. Das war mir so nicht bewußt. Beides sind Einstellungen, die die Wikipedia-Software anbietet: 1. Unterschrift (mit angegebenem Namen) und 2. keine automatische Verlinkung. Ich signiere immer mit -- und vier Tilden, die Korrektur durch den Bot findet nicht immer statt. Ich betrachte das jetzt eher als Bug. Entweder liegt der Fehler beim Bot, oder bei der Wikipedia. PS: Ich werde dann wohl einfach den Spitznamen wieder weglassen --Edoardo 19:37, 24. Aug. 2009 (CEST)<br />
:::::Bitte beachte [[WP:SIG]]. Es ist nötig, das deine Signatur auf deine Benutzerseite, Benutzerdiskussion oder Benutzerbeiträge verlinkt. Dis ist bei dir nicht der Fall. Die technischen Möglichkeiten spielen dabei keine Rolle. Der Bot kontrolliert nur ausgewählte Seiten, daher findet nicht immer eine Korrektur statt. [[Benutzer:Umherirrender|Der Umherirrende]] 20:24, 24. Aug. 2009 (CEST)<br />
:Hallo Edoardo, meine Vorredner haben deine Frage ja eigentlich schon beantwortet. Der Bot ergänzt deinen Benutzernamen deshalb, damit sich ein Leser bei Bedarf schnell auf deine Benutzer(diskussions-)seite durchklicken kann. Den Verfasser eines Beitrags über die Versionsgeschichte zu suchen ist bei älteren Beiträgen recht mühsam, erst recht, wenn die Beiträge schon archiviert wurden. Grüße --[[Benutzer:P.Copp|P.Copp]] 19:17, 26. Aug. 2009 (CEST)<br />
::Leuchtet ein, nur daß es bei mir halt keine Benutzer(diskussions)seite gibt. Aber prinzipiell schon klar. --[[Benutzer:E.Hager|E.Hager]] 18:10, 28. Aug. 2009 (CEST)<br />
<br />
== Uhrzeitfehler ==<br />
<br />
Hallo P.Copp, [http://de.wikipedia.org/w/index.php?title=Diskussion:Figuren_der_Harry-Potter-Romane&diff=prev&oldid=63815699 hier] hat der CopperBot [http://de.wikipedia.org/w/index.php?title=Diskussion:Figuren_der_Harry-Potter-Romane&diff=prev&oldid=63815223 diesen Beitrag] mit einer geringfügig falschen Uhrzeit versehen, d. h. er hat fälschlich beiden Beiträgen dieselbe Uhrzeit verpasst. Gruß, --[[Benutzer:Katimpe|Katimpe]] 12:12, 27. Aug. 2009 (CEST)<br />
:Hallo, danke für den Hinweis. Das liegt daran, dass der Bot aufeinanderfolgende Edits eines Benutzers so behandelt, als wäre es ein einziger. Ich hoffe, später dafür eine Lösung zu finden. Gruße --[[Benutzer:P.Copp|P.Copp]] 12:52, 27. Aug. 2009 (CEST)<br />
<br />
== [[MediaWiki:Gadget-bkl-check.js]] - https ==<br />
<br />
Als Entwickler der aktuellen Version des Gadgets wollte ich dich auf einen Abschnitt hinweisen: [[MediaWiki Diskussion:Gadget-bkl-check.js#https]]. Vielen Dank fürs vorbeischauen. --[[Benutzer:Umherirrender|Der Umherirrende]] 20:58, 1. Sep. 2009 (CEST)<br />
<br />
== Mehrfaches Nachsignieren eines Abschnitts ==<br />
<br />
Ich denke es wäre hilfreich, wenn mehrere nachzusignierende Beiträge innerhalb eines Abschnitts oder einer Seite zusammen gefasst werden, um die Belastungen der Versionsgeschichte gering zu halten. Man könnte ja sagen, wenn in der einen Wartezeit ein weiterer Beitrag auftaucht, man nach Ablauf dieser Zeit dann nachsigniert, aber maximal nach 15 Minuten (oder so) sonst kommt er garnicht zum Zuge. [http://de.wikipedia.org/w/index.php?title=Wikipedia:Administratoren/Anfragen&curid=4645648&diff=65157200&oldid=65156987 Beispiel] --[[Benutzer:Umherirrender|Der Umherirrende]] 21:43, 2. Okt. 2009 (CEST)<br />
:Ja, in der Regel versucht der Bot, Beiträge eines Benutzers zusammenzufassen. Wenn aber noch Beiträge anderer Benutzer zeitlich dazwischen erfolgten, hat er manchmal Probleme, die Edits zu mergen. Da dieser Fall aber sowieso fast nur auf stark frequentierten Seiten auftritt, ist das mit der Versionsgeschichte vielleicht nicht so schlimm. Gruß --[[Benutzer:P.Copp|P.Copp]] 13:11, 5. Okt. 2009 (CEST)<br />
<br />
== Signaturbot ==<br />
<br />
Bin gerade über [[Wikipedia:Suchhilfe]] gestolpert. Ist dir aufgefallen, dass viele Fragen dort nicht nachsigniert werden? Ist aber für den ArchivBot nicht so schlimm, da dort immer jemand mit Zeitstempel antwortet. [[Benutzer:Merlissimo/Sig|Merl]][[Benutzer Diskussion:Merlissimo/Sig|issimo]] 01:53, 3. Okt. 2009 (CEST)<br />
:Hm, das passiert vor allem dann, wenn der Originalbeitrag später von einem anderen Benutzer verändert wird. Das scheint auf der Seite häufig zu passieren, meistens wird die Überschrift angepasst. Evtl. löst sich das Problem von alleine, wennich die Verzögerungszeit für diese Seite runtersetze auf vielleicht 3 Minuten oder so.. --[[Benutzer:P.Copp|P.Copp]] 13:17, 5. Okt. 2009 (CEST)<br />
<br />
== Kennzeichnung ==<br />
Hallo, gibt es besondere Gründe warum deine Bearbeitungen nicht als Bot markiert werden?<br />
<br />
Vgl.:<br />
* (Unterschied) (Versionen) . . K Wikipedia:Löschkandidaten/10. Oktober 2009; 17:05 . . (+240) . . CopperBot (Diskussion <br />
* (Unterschied) (Versionen) . . KB Badminton-Weltmeisterschaft; 16:17 . . (+40) . . Luckas-bot (Diskussion<br />
–– [[Benutzer:Bwag|Bwag]] [[Benutzer Diskussion:Bwag|@]] 17:10, 10. Okt. 2009 (CEST) PS: Ist unangenehm, weil man deinen Bot-Bearbeitungen bei der Beobachtungsliste nicht ausblenden kann.<br />
:Siehe oben unter [[#Copper]]. Das sollte auf der Botseite aber besser herauskommen, würde ich sagen. [[Benutzer:Umherirrender|Der Umherirrende]] 17:24, 10. Okt. 2009 (CEST)<br />
::Danke und Verzeihung, dass ich vorher nicht die ganze Disk durchgelesen habe. ;-) –– [[Benutzer:Bwag|Bwag]] [[Benutzer Diskussion:Bwag|@]] 18:40, 10. Okt. 2009 (CEST) PS: was meinst du mit dem zweiten Satz?<br />
:::Das habe ich auch nicht erwartet. Der zweite Satz sollte an P.Copp gerichtet sein, das er eventuell einen Hinweis auf der Botseite anbringt, warum das Botflag nicht gesetzt wird, da sich wahrscheinlich noch mehr Leute darüber wundern, ich wollte es aber ihm überlassen und habe daher keine Ergänzung vorgenommen. [[Benutzer:Umherirrender|Der Umherirrende]] 19:14, 10. Okt. 2009 (CEST)<br />
::::Ich habe es auf der Botseite [http://de.wikipedia.org/w/index.php?title=Benutzer:CopperBot&diff=65462211&oldid=62856783 ergänzt]. Grüße --[[Benutzer:P.Copp|P.Copp]] 13:16, 11. Okt. 2009 (CEST)<br />
::: Wieso sollte ein Nachsignieren vorherige Edits verstecken können? Bei mir Erscheinen Bot-Edits einfach nicht, die vorherigen Edits werden aber ganz normal auf der WL angezeigt (auch wenn ein Bot danach was geändert hat). imHo sollte der Bot unbedingt auch weiterhin das Botflag setzen, dafür gibt es dieses ja auch. --[[Benutzer:Nyks|Nyks]] <small>[[Benutzer Diskussion:Nyks|(Kontakt)]]</small> 13:22, 11. Okt. 2009 (CEST)<br />
::::Vermutlich nutzt du die Einstellung "Erweiterte Beobachtungsliste zur Anzeige aller Änderungen"? In dem Fall kann natürlich durch den Bot nichts versteckt werden. In der Standardeinstellung, dass nur die letzte Bearbeitung angzeigt wird ist die Situation jedoch anders. Dann erscheint nämlich, wenn ein Bot der letzte Bearbeiter ist, die Seite gar nicht mehr auf der Liste, wodurch dann leicht neue Beiträge übersehen werden könnten. --[[Benutzer:P.Copp|P.Copp]] 13:30, 11. Okt. 2009 (CEST)<br />
::::: Ja, nutze ich natürlich. Aber dann dürfte das ja mit allen Bots das selbe sein. Wenn es Leute stört, dass Bot-Edits diesen Effekt erzeugen, können die dann ja auch die erweiterte Beobachtungsliste nutzen. Einen automatischen Bot ohne Botflag laufen zu lassen, sollte meiner Meinung nach wirklich nicht sein. --[[Benutzer:Nyks|Nyks]] <small>[[Benutzer Diskussion:Nyks|(Kontakt)]]</small> 13:38, 11. Okt. 2009 (CEST)<br />
::::::Im Prinzip hast du schon recht, allerdings ist das Problem bei diesem Bot etwas größer, weil er nicht einfach zufällig bei irgendeinem Artikel vorbeikommt, sondern eben genau dann eine Diskussionsseite bearbeitet, wenn kurz vorher schon jemand dort geschrieben hat. Zudem kommt noch der Unterschied, dass der Bot nicht tausende Seiten am Stück bearbeitet, sondern (verhältnismäßig) wenige über den Tag verteilt, dadurch sollten die Letzten Änderungen weniger belastet sein als durch bspw. Interwikibots.<br />
::::::Aber das ist natürlich nur meine Meinung und wenn ein Großteil der Benutzer sich durch das fehlende Botflag gestört fühlt, kann ich es natürlich gerne umändern. --[[Benutzer:P.Copp|P.Copp]] 13:56, 11. Okt. 2009 (CEST)<br />
:::::::Ich habe das Problem mal auf [[WD:Bots#Botflag bei CopperBot]] thematisiert. Vielleicht weiß ja jemand noch eine bessere Lösung. Gruß --[[Benutzer:P.Copp|P.Copp]] 14:28, 11. Okt. 2009 (CEST)<br />
<br />
==Nachsignieren==<br />
<br />
Moin, das mit dem Nachsignieren ist grundsätzlich ok. Auf der Seite "Diskussion: Gerhard Schröder" ist die Nach-Signatur zu meinem nachträglichen eingeschobenen Absatz an einer Stelle gelandet, wo der darauffolgende letzte Absatz des Beitrages mit Signatur darunter steht. Deshalb hatte ich, weil der Beitrag nur um den eingeschobenen Absatz, wenn auch etwas zeitversetzt, ergänzt wurde und der Beitrag bereits am Ende signiert ist, auf eine nochmalige Signatur zwischen den Absätzen verzichtet, nur deshalb. Bitte um Verständnis. --[[Spezial:Beiträge/80.131.227.111|80.131.227.111]] 18:40, 2. Nov. 2009 (CET)<br />
:Hallo, das liegt daran, dass deine IP sich seit deinem letzten Beitrag geändert hatte, dadurch konnte der Bot nicht erkennen, dass es sich um den gleichen Autor handelte. Gruß --[[Benutzer:P.Copp|P.Copp]] 18:50, 5. Nov. 2009 (CET)<br />
<br />
== Nochmal: Nachsignieren ==<br />
<br />
Im Prinzip ja wirklich ne tolle Erfindung. Kann aber der Bot nicht bitte ein paaar Minuten länger warten, bevor er in Aktion tritt, um Bearbeitungskonflikte zu vermeiden? Danke. --[[Benutzer:Hdamm|Hdamm]] 15:52, 4. Nov. 2009 (CET)<br />
:Die 30 Minuten, die der Bot wartet, haben sich eigentlich bisher als guter Kompromiss herausgestellt. Ist dir das mit dem BK schon häufiger passiert? --[[Benutzer:P.Copp|P.Copp]] 18:52, 5. Nov. 2009 (CET)<br />
<br />
== [[P.S.]] ==<br />
<br />
Ist es eigentlich ohne allzuviel möglich [[Benutzer:CopperBot|CopperBot]]s Programmierung so zu verändern das er Signaturen auch erkennt wenn sie vor einem P.S. stehen([http://de.wikipedia.org/w/index.php?title=Diskussion:Welt-AIDS-Tag&oldid=66329799 siehe hier] und [http://de.wikipedia.org/w/index.php?title=Diskussion:Welt-AIDS-Tag&direction=next&oldid=66329799 hier])? Das ist jetzt keine Forderung an [[Benutzer:P.Copp|P.Copp]] sofort hier ans Werk zu gehen sondern mehr die Frage ob das überhaupt geht (wenn ja kann man dies als Verbesserungsvorschlag für den [[Benutzer:CopperBot|CopperBot]] werten), da ich von Software nicht genug verstehe. --[[Benutzer:MartinIGB|martIGB]] <small>[[Benutzer Diskussion:MartinIGB|disk]]</small> 17:46, 4. Nov. 2009 (CET)<br />
P.S.: Respekt. Es ist sicher ein bischen arbeit so einen Bot zu verwalten.<br />
:Der Bot erkennt einen Nachtrag, wenn er entweder in der gleichen Zeile steht wie der Beitrag oder innerhalb von ca. 1 Stunde nachgetragen wurde. In den anderen Fällen ist es oft auch für einen Menschen nicht mehr so einfach zu erkennen, von wem der Beitrag stammt :) Gruß --[[Benutzer:P.Copp|P.Copp]] 18:57, 5. Nov. 2009 (CET)<br />
::Danke für die Info. Klar, dann werd ich kein P.S. mehr verwenden wenn ich später etwas von mir nachbearbeite. Danke p.copp, und wie gesagt. respekt, ich könnte mir es nicht vorstellen einen bot zu verwalten.--[[Benutzer:MartinIGB|martIGB]] <small>[[Benutzer Diskussion:MartinIGB|disk]]</small> 09:22, 6. Nov. 2009 (CET)<br />
<br />
== Nachtrag trotz [[Vorlage:unsigned]] ==<br />
<br />
[http://de.wikipedia.org/w/index.php?title=Wikipedia:Administratoren/Anfragen&diff=next&oldid=66412259 Hier] wurde nachsigniert, obwohl der Benutzer vorher das schon gemacht hat. Bei ungesubster [[Vorlage:unsigned]] vielleicht möglich, bei gesubster [[Vorlage:unsigned]] aber schon sehr schwierig zu erkennen. Vielleicht fällt dir ja was ein. [[Benutzer:Umherirrender|Der Umherirrende]] 18:14, 4. Nov. 2009 (CET)<br />
:Hm, ich hatte eigentlich gedacht, dass ich diesen Fall abgefangen hätte. Muss ich mir nochmal genau anschauen.. --[[Benutzer:P.Copp|P.Copp]] 18:58, 5. Nov. 2009 (CET)<br />
:Liegt in dem Fall wohl daran, dass in der unsigned-Vorlage kein Datum angegeben wurde. Gruß --[[Benutzer:P.Copp|P.Copp]] 19:22, 5. Nov. 2009 (CET)<br />
::Stimmt, dann hat der Bot richtig gearbeitet, darauf habe ich aber garnicht geachtet, muss ich sagen. Wenn du die Vorlage schon erkennst, könnte sie ja auch eigentlich entfernt werden, damit die Information nicht doppelt vorhanden ist, oder man trägt das Datum in die Vorlage ein und subst sie, damit man die gleiche Stelle erwischt. [[Benutzer:Umherirrender|Der Umherirrende]] 20:56, 5. Nov. 2009 (CET)<br />
:::Hm, mit dem Ändern fremder Beiträge bin ich eher vorsichtig. Ich setze es mal auf die Liste der Spezialfälle, die ich noch fixen muss. Gruß --[[Benutzer:P.Copp|P.Copp]] 17:32, 15. Nov. 2009 (CET)<br />
<br />
== Congratulation ==<br />
<br />
[[Datei:Bundesarchiv_Bild_102-07740,_Berlin,_"Schnaps-Ede"_der_Likör-Verkäufer.jpg|miniatur|Prosit]]<br />
Zur [http://de.wikipedia.org/w/index.php?oldid=66666666 Schnapszahl ''66666666''] am [[Karneval, Fastnacht und Fasching|''kleinen'' Schnapszahltag]]! -- [[Benutzer:Emdee|E]] 12:11, 11. Nov. 2009 (CET)<br />
: :D Da hab ich doch glatt diesen denkwürdigen Moment verpasst.. Na, macht nix, gefeiert werden darf ja noch bis Februar ;) --[[Benutzer:P.Copp|P.Copp]] 17:34, 15. Nov. 2009 (CET)<br />
<br />
== SingBot for az.wiki ==<br />
<br />
Hello P.Copp! I am "part-time" working in az.wiki and realized that people sign unsigned comments manually. So I have been appealing people across wikis for a sign bot. I [http://az.wikipedia.org/w/index.php?title=%C4%B0stifad%C9%99%C3%A7i_m%C3%BCzakir%C9%99si:Euku&action=historysubmit&diff=583229&oldid=583228 was told] that you might be able to help us with your CopperBot. Please let me know if this would be possible. If such deal is be possible, the signature template can be found [http://az.wikipedia.org/wiki/%C5%9Eablon:%C4%B0mzas%C4%B1z here]. Thanks, [[Benutzer:Gulmammad|Gulmammad]] 21:51, 29. Nov. 2009 (CET)<br />
:It could be done in principle, but honestly, looking at [http://az.wikipedia.org/w/index.php?namespace=1&title=X%C3%BCsusi:SonD%C9%99yi%C5%9Fiklikl%C9%99r Special:RecentChanges], I don't really see a need for a signature bot there. During the last 30 days, there were 6 talkpage edits by anons, one or two of them had to be signed. :) --[[Benutzer:P.Copp|P.Copp]] 15:51, 2. Dez. 2009 (CET)<br />
<br />
== LiquidThreads ==<br />
<br />
Hallo!<br />
<br />
Schaust du bei [[Hilfe_Diskussion:Archivieren#Vorschlag_Archivbotvorg.C3.A4nge_zu_reduzieren|dieser Diskussion]] vorbei? Es geht nicht um den Vorschlag von Kolossos, sondern um die Vorbereitung zur Umstellung auf LiquidThreads. ''Bitte nicht hier antworten.'' Weihnachtsgruß --<span class='Person'>[[Benutzer:Euku|Euku]]:[[Benutzer_Diskussion:Euku|<sup>⇄</sup>]]</span> <small>([http://liquidthreads.labs.wikimedia.org LiquidThreads])</small> 21:01, 25. Dez. 2009 (CET)<br />
<br />
== Danke ==<br />
<br />
Danke für die Tipps ;) --[[Benutzer:PauKr|PauKr]] 19:12, 26. Dez. 2009 (CET)<br />
<br />
== Botfehler ==<br />
<br />
[http://de.wikipedia.org/w/index.php?title=Diskussion%3AComputerspieler-Jargon&action=historysubmit&diff=68657651&oldid=68656622 Hier] hat dein Bot einen Fehler gemacht, die Signatur gehört da nicht hin ;) --[[Benutzer:Z1|Z1]] 18:10, 1. Jan. 2010 (CET)<br />
:Dafür möchte ich mich im Namen meines Bots bei dir entschuldigen. Seine künstliche Intelligenz reichte leider nicht aus, um deinen Beitrag korrekt zu bewerten :) Viele Grüße --[[Benutzer:P.Copp|P.Copp]] 20:07, 4. Jan. 2010 (CET)<br />
::[http://de.wikipedia.org/w/index.php?title=Diskussion:Liste_der_deutschen_Kfz-Kennzeichen_(historisch)&diff=69560909&oldid=69560597 Hier] hat dein Bot einen anderen (uralten) Beitrag anstelle des eine halbe Stunde zuvor eingestellten Beitrags signiert. Ich hab's korrigiert. Ich informiere dich nur, damit dein Bot solche Fehler jetzt nicht häufiger begeht. [[Benutzer:Harry8|Harry8]] 11:57, 20. Jan. 2010 (CET)<br />
:::Danke für den Hinweis! Ich glaube aber, in dem Fall hatte der Bot recht, vgl. [http://de.wikipedia.org/w/index.php?diff=6849137&oldid=858655] und [http://de.wikipedia.org/w/index.php?diff=69559745&oldid=69559572] mit [http://de.wikipedia.org/w/index.php?diff=69562044&oldid=69560909] ;) Grüße --[[Benutzer:P.Copp|P.Copp]] 22:37, 26. Jan. 2010 (CET)<br />
<br />
== Vorlage:Dmoz ==<br />
<br />
Danke sehr :-) -- [[Benutzer:Windharp|Windharp]] 08:10, 5. Jan. 2010 (CET)<br />
<br />
== Todesdatum Willy Reitgaßl ==<br />
<br />
Hallo P. Copp,<br />
<br />
du hast heute meine Korrektur des Todesdatums von Willy Reitgaßl, welches ich vom 23. August 1988 auf den 18. August 1988 verbesserte, zurückgenommen.<br />
Da ich der Enkel von W. Reitgaßl bin und diesen Wikipedia-Artikel meiner Mutter, also seiner Tochter, gezeigt habe, die diesen Fehler natürlich sofort bemerkt hat, möchte ich dich darum bitten, meine Version anzuerkennen.<br />
Vorab schon mal Vielen Dank!!<br />
<br />
M.f.G<br />
Florian Schwarz<br />
:Das dürfte eine Verwechslung sein. Die Liste der Autoren des besagten Artikels findest du [http://de.wikipedia.org/w/index.php?title=Willy_Reitgaßl&action=history hier]. Gruß --[[Benutzer:P.Copp|P.Copp]] 15:29, 10. Jan. 2010 (CET)<br />
<br />
Oh entschuldige... Da hab ich mich verklickt<br />
Trotzdem danke<br />
Grüße<br />
Florian Schwarz<br />
<br />
== Kleines Dankesehr ==<br />
<br />
Danke für die Ergänzung der Signatur; in manchem übe ich noch. [[Benutzer:Tococa |Tococa]]<br />
<br />
== Fehler in CopperBot ==<br />
<br />
Auf der [[Diskussion:Weight Watchers]] wurden sechs Signaturen nachgetragen die definitiv nicht von mir stammen ([http://de.wikipedia.org/w/index.php?title=Diskussion:Weight_Watchers&diff=69856600&oldid=69856011 diff]). Ich habe die Löschung der Seite durch [[Benutzer:Deirdre]] rückgängig gemacht, die Diskussionsbeiträge sind schon älter und wurden von einer IP verfasst. --[[Benutzer:Chuck die Bohne|Chuck die Bohne]] 04:07, 28. Jan. 2010 (CET)<br />
:In so einem Fall kannst du dem Bot (und auch anderen Nutzern) mitteilen, dass das eine Zurücksetzung eines anderen Beitrags war, indem du in die [[WP:ZQ|Zusammenfassungszeile]] „Revert“, „rev“ o.ä. schreibst. Grüße --[[Benutzer:P.Copp|P.Copp]] 13:33, 4. Feb. 2010 (CET)<br />
<br />
== hideduplicatecontribs ==<br />
<br />
Ist nur eine marginale Knobelaufgabe, aber vielleicht kriegst du ja raus, warum das Tool bei gesperrten Benutzern ([http://de.wikipedia.org/w/index.php?limit=250&tagfilter=&title=Spezial%3ABeitr%C3%A4ge&contribs=user&target=Boris+Fernbacher&namespace=&tagfilter=&year=&month=-1 Bsp.]) partout nix tut. Gruß, [[Benutzer:PDD|&mdash; <sup>PDD</sup> &mdash;]] 15:26, 1. Feb. 2010 (CET)<br />
:Ja, das liegt daran, dass man die Beitragsliste nicht sauber mittels einer Klasse oder Id selektieren kann. Ich hab es jetzt mal [http://de.wikipedia.org/w/index.php?title=Benutzer:P.Copp/scripts/hideduplicatecontribs.js&diff=70224867&oldid=61174234 so] gelöst, das sollte bis zur nächsten Softwareänderung halten :) Gruß --[[Benutzer:P.Copp|P.Copp]] 13:38, 4. Feb. 2010 (CET)<br />
<br />
== quickrespond ==<br />
<br />
Hallo P.Copp, danke für dein tolles Tool. Merkwürdigerweise scheint es auf [[Benutzer:Bhuck/Ersatz für Benutzer Diskussion:GLGermann]] nicht zu funktionieren. Liegt das am NR? --[[Benutzer:Atlan da Gonozal|Atlan]]&nbsp;<sup>[[Benutzer Diskussion:Atlan da Gonozal|Disk.]]</sup> 18:33, 3. Feb. 2010 (CET)<br />
:Hmm, noch was: Manchmal passiert es, dass der Edit nicht unten angefügt wird [http://de.wikipedia.org/w/index.php?title=Wikipedia%3AAdministratoren%2FNotizen&action=historysubmit&diff=70195179&oldid=70190396] ist das Absicht? --[[Benutzer:Atlan da Gonozal|Atlan]]&nbsp;<sup>[[Benutzer Diskussion:Atlan da Gonozal|Disk.]]</sup> 20:24, 3. Feb. 2010 (CET)<br />
::Ja, momentan ist das Skript nur im Wikipedia- und den Diskussionsnamensräumen aktiv. Wenn du willst kann ich das auf den Benutzernamensraum erweitern.<br />
::Zur zweiten Frage, das hängt davon ab auf welchen Beitrag du geantwortet hast. Wenn es „Guandalug 17:52, 3. Feb. 2010“ war, stimmt die Reihenfolge ja. Wenn du den Beitrag in so einem Fall direkt unter den anderen setzen willst, kannst du ihn mit : eine Stufe weiter einrücken. Grüße --[[Benutzer:P.Copp|P.Copp]] 13:42, 4. Feb. 2010 (CET)<br />
::Nachtrag: Das Skript ist jetzt bei allen Namensräumen aktiv außer Artikel- und Spezial-, [http://de.wikipedia.org/w/index.php?title=Benutzer:P.Copp/scripts/quickrespond.js&action=historysubmit&diff=70225200&oldid=56232287]. Gruß --[[Benutzer:P.Copp|P.Copp]] 13:47, 4. Feb. 2010 (CET)<br />
:::danke! --[[Benutzer:Atlan da Gonozal|Atlan]]&nbsp;<sup>[[Benutzer Diskussion:Atlan da Gonozal|Disk.]]</sup> 21:22, 21. Feb. 2010 (CET)<br />
<br />
== Common-Schriftarten ==<br />
<br />
Seit in paar Tagen steht gibt es eine Anfrage zur Änderung der Common-Skins: [[MediaWiki Diskussion:Common.css#font-family_.2F.2A.2A.2F:_inherit.3B]]. Ich finde die Lösung klingt plausibel. Da ich mich aber seit IE8 nicht mehr dessen Kompatibilität verfolgt habe, würde ich gerne noch andere Meinungen hören. Kannst du dazu etwas sagen? [[Benutzer:Merlissimo/Sig|Merl]][[Benutzer Diskussion:Merlissimo/Sig|issimo]] 17:02, 8. Feb. 2010 (CET)<br />
:Naja, ich kann nicht behaupten, dass ich mich besonders gut mit diesen CSS-Feinheiten auskenne, aber die beschriebene Lösung kommt mir etwas umständlich vor. Wenn es nur um den IE geht, kann man vielleicht einen von den [http://www.webdevout.net/css-hacks#in_css bekannten CSS-Hacks] verwenden? --[[Benutzer:P.Copp|P.Copp]] 01:25, 9. Feb. 2010 (CET)<br />
<br />
== Fehler ==<br />
<br />
[http://de.wikipedia.org/w/index.php?title=Diskussion:Fluor&diff=70908282&oldid=70907933 Hier] Ich habe den Beitrag nicht verfasst! -- [[Benutzer:Abfall-Reiniger|Abfall-Reiniger]] 16:38, 20. Feb. 2010 (CET)<br />
:Ähnliche Problematik wie bei [[#Fehler_in_CopperBot|diesem Fall]]. Wenn du einen nicht-unterschriebenen Beitrag eines anderen Benutzers wiederherstellst, und das nicht entweder im Text oder in der Zusammenfassungszeile kenntlich machst, ist es sowohl für Mensch als auch Maschine schwer zu erkennen von wem der Text stammt. Grüße --[[Benutzer:P.Copp|P.Copp]] 00:06, 14. Apr. 2010 (CEST)<br />
<br />
== [[Wikipedia:Verbesserungsvorschläge#Filter für gesichtete Beiträge]] ==<br />
<br />
Bei diesem Abschnitt ist mir dein [[Benutzer:P.Copp/scripts/hideduplicatecontribs.js|Skript]] eingefallen. Was hälst du von einer Erweiterung? Vielen Dank fürs vorbeischauen. [[Benutzer:Umherirrender|Der Umherirrende]] 20:24, 6. Mär. 2010 (CET)<br />
:Wäre sicher machbar. Vielleicht komme ich bei Gelegenheit dazu.. Gruß --[[Benutzer:P.Copp|P.Copp]] 00:08, 14. Apr. 2010 (CEST)<br />
<br />
== Nagel ==<br />
Sry dafür. Ich mach grade den artikel Nagel für Stupidedia hab ir dafür informationen gesucht und beim schreiben das fenster verwechselt. mfg KAYLEN<br />
<br />
== Nichtreproduzierter Botfehler ==<br />
<br />
[http://de.wikipedia.org/w/index.php?title=Wikipedia:Suchhilfe&diff=72318359&oldid=72318287 Hier] hat dein Bot was kaputt gemacht, danach hat er es allerdings hinbekommen. Gruß, [[Benutzer:Seewolf|Seewolf]] 22:02, 24. Mär. 2010 (CET)<br />
:Sieht nach einem Übertragungsfehler aus. Ich habe jetzt die Reihenfolge der gesendeten Daten geändert, so dass das Token zum Schluss kommt, damit sollte das hoffentlich nicht nochmal passieren. Danke für den Hinweis! Gruß --[[Benutzer:P.Copp|P.Copp]] 00:04, 14. Apr. 2010 (CEST)<br />
<br />
== Dein Bot ==<br />
<br />
Hallo P.Copp,<br />
<br />
könntest du mir mal verraten wer deinen [[Benutzer:CopperBot|Bot]] auf die Seite [[Wikipedia:Hamburg]] und Diskussion angesetzt hat? Beste Grüße [[Benutzer:s2cchst|s2cchst]]<sup>[[Benutzer Diskussion:s2cchst|Disk]]</sup><sub>[[Benutzer:s2cchst/Vertrauen|Vertraue mir]]</sub><sup>[[Wikipedia:PB|Bestätigen?]]</sup> 17:44, 1. Mai 2010 (CEST)<br />
:Laut Versionsgeschichte von [[Benutzer:CopperBot/Überwachte Seiten]] war es [http://de.wikipedia.org/w/index.php?title=Benutzer:CopperBot/%C3%9Cberwachte_Seiten&action=historysubmit&diff=73761890&oldid=73627185 Benutzer:78.54.87.149]. Grüße --[[Benutzer:P.Copp|P.Copp]] 19:29, 1. Mai 2010 (CEST)<br />
<br />
<br />
== Bitte um Hilfe ==<br />
Lieber P.Copp, könntest Du bitte einmal [[Wikipedia Diskussion:Namenskonventionen/Tibetisch|hier]] die fehlenden Signaturen für die IP nachtragen, die da so fleißig mitdiskutiert, es aber nicht für nötig hält, ihre Beiträge zu unterzeichnen!? Ich würde es ja selbst machen, aber ich weiß nicht, wie es geht. Vielen Dank im Voraus! Herzlicher Gruß, -- [[Benutzer:Ingochina|Ingochina]] 16:28, 2. Mai 2010 (CEST)<br />
:Jetzt hat schon jemand drei von vier nachgetragen, wird es vermutlich auch für den vierten tun. --[[Benutzer:Ingochina|Ingochina]] 16:36, 2. Mai 2010 (CEST)<br />
<br />
== Ist Videospielmusik Urheberrechtlich geschützt? ==<br />
Ich möchte gerne wissen ob man ohne Probleme Videospielmusik covern kann, wenn möglich sogar mit eigenen Gesang bestücken, ohne Probleme zu bekommen. Bitte antwortet. <small>(''nicht [[Hilfe:Signatur|signierter]] Beitrag von'' [[Benutzer:84.61.209.181|84.61.209.181]] ([[Benutzer Diskussion:84.61.209.181|Diskussion]]&nbsp;|&nbsp;[[Spezial:Beiträge/84.61.209.181|Beiträge]]) 21:33, 2. Mai 2010 (CEST)) </small><br />
:Wenn überhaupt, dann passt diese Frage unter [[WP:URF]]. --[[Benutzer:Leyo|Leyo]] 13:42, 3. Mai 2010 (CEST)<br />
<br />
== Signaturvervollständigung ==<br />
Hallo, mir ist aufgefallen, dass der CopperBot nur vollständig fehlende Signaturen ersetzt. Warum werden "Signaturen", die beispielsweise nur den Namen enthalten (vgl. [http://de.wikipedia.org/w/index.php?title=Diskussion:Physikalische_Gr%C3%B6%C3%9Fe&diff=74066752&oldid=74066696]) nicht ergänzt? Immerhin besteht laut [[Hilfe:Signatur]] eine Signatur aus Benutzernamen UND Zeitstempel. Es wäre schön, wenn der Bot dahingegen geändert wird. Grüße --[[Benutzer:Cepheiden|Cepheiden]] 07:56, 9. Mai 2010 (CEST)<br />
:Meinst du [http://de.wikipedia.org/w/index.php?title=Datei_Diskussion:Seele_Aristoteles_NE.png&diff=prev&oldid=74122883 sowas]? --[[Benutzer:Leyo|Leyo]] 21:44, 9. Mai 2010 (CEST)<br />
::Siehe [[Benutzer:CopperBot/config.css]]. Der Benutzer in deinem Diff hat Editor-Status und ist somit ausgenommen. [[Benutzer:Merlissimo/Sig|Merl]][[Benutzer Diskussion:Merlissimo/Sig|issimo]] 22:33, 9. Mai 2010 (CEST)<br />
<br />
::: Aha, danke, für richtig halte ich es aber nicht, denn sowas stört den Ablauf auf Diskussionsseiten und auf [[Hilfe:Signatur]] steht ja, dass eine Signatur iene Zeitstempel enthalten soll/muss. --[[Benutzer:Cepheiden|Cepheiden]] 13:40, 10. Mai 2010 (CEST)<br />
<br />
== hideduplicatecontribs.js ==<br />
<br />
Hiyo P.Copp, die Admins dürfen jetzt zwar revdeleten (schön!), aber dadurch nicht mehr hideduplicatecontribsen (unschön!). Ein eleganter Fix, der für alle funktioniert, ist mir auf die Schnelle nicht eingefallen; vielleicht könnte man hiernach<br />
var link = li[i].getElementsByTagName( 'a' )[0];<br />
checken, ob dieser A im SPAN CLASS="mw-revdelundel-link" hängt und, wenn ja, halt einfach den nächsten nehmen? Geht aber sicher auch hübscher. Grüße, [[Benutzer:PDD|&mdash; <sup>PDD</sup> &mdash;]] 18:59, 18. Mai 2010 (CEST)<br />
<br />
== Klammer-ZU fehlt? ==<br />
<br />
Hi! Fehlt da ne Klammer-Zu: [http://de.wikipedia.org/w/index.php?title=Wikipedia:Auskunft&diff=75626449&oldid=75626395]? Thx. Bye. --[[user:Homer Landskirty|Heimschützenzentrum]] ([[user talk:Homer Landskirty|?]]) 11:10, 16. Jun. 2010 (CEST)<br />
<br />
== Wieso sehe ich deine Bot-Änderungen in der BEO ==<br />
<br />
Hi, ich sehe die Änderungen von CopperBot in meiner BEO, selbst wenn ich Bots ausgeblendet habe. Eigentlich würde ich lieber die Änderung davor sehen, bevor dein Bot die Signatur ergänzt. Geht das? lg --[[Benutzer:Herzi Pinki|Herzi Pinki]] 21:25, 12. Jul. 2010 (CEST)<br />
<br />
== Bug in quickrespond.js ==<br />
<br />
Hallo P.Copp. Kannst du bitte mal unter [[BD:Spuk968#↑ in Zusammenfassungszeile]] vorbeischauen? Danke. --[[Benutzer:Leyo|Leyo]] 11:29, 14. Jul. 2010 (CEST)<br />
<br />
== Andere Wikipedia ==<br />
[[en:WP:BOTR#SineBot on other Wikipedias/Wikiprojects]]</div>TeleComNasSprVen