Jump to content

Wikipedia:WikiProject Spam/LinkReports/bookreviews.infoversant.com

From Wikipedia, the free encyclopedia



[edit]

Users

[edit]

Additions

[edit]
  1. 2014-02-14 15:07:07 (UTC): User 117.195.25.4 t • c • dc • l • ef • b • bl; (3) to Big data (edit | talk | history | links | watch | logs) (diff  top?) - Link: bookreviews.infoversant.com/data-crush-christopher-surdak/‎ (R/Xmeta/L)
    Other links: bookreviews.infoversant.com/data-crush-christopher-surdak/‎ (3, 22, 1, 1- R/X/L)
  2. 2014-02-15 08:55:29 (UTC): User Magioladitis t • c • dc • l • ef • b • bl; (12921) to Big data (edit | talk | history | links | watch | logs) (diff  top?) - Link: bookreviews.infoversant.com/data-crush-christopher-surdak/ (R/Xmeta/L)
    Other links: bookreviews.infoversant.com/data-crush-christopher-surdak/ (12921, 22, X, X- R/X/L)

    User is in a trusted group sysop on some wikis
  3. 2014-09-22 17:06:18 (UTC): User McSly t • c • dc • l • ef • b • bl; (3197) to Big data (edit | talk | history | links | watch | logs) (diff  top?) - Link: bookreviews.infoversant.com/data-crush-christopher-surdak/ (R/Xmeta/L)
    Other links: radar.oreilly.com/r2/release2-0-11.html (3197, 359, 1, 0- R/X/L) queue.acm.org/detail.cfm?id=1563874 (3197, 330, 1, 0- R/X/L) www.fsn.co.uk/channel_bi_bpm_cpm/mastering_big_data_cfo_strategies_to_transform_insight_into_opportunity#.UO2Ac-TTuys (3197, 60, 1, 0- R/X/L) www.ibm.com/big-data/us/en/ (3197, 4383, X, X- R/X/L) books.google.com/books?id=zxNglqU1FKgC (3197, -1, X, X- R/X/L) gigaom.com/2008/11/09/mapreduce-leads-the-way-for-parallel-programming/ (3197, 4446, X, X- R/X/L) bookreviews.infoversant.com/data-crush-christopher-surdak/ (3197, 22, 1, 0- R/X/L) dx.doi.org/10.1126%2Fscience.1197962 (3197, -1, X, X- R/X/L) www.hpcprojects.com/news/news_story.php?news_id=922 (3197, 19, 1, 0- R/X/L) dx.doi.org/10.1038%2F455001a (3197, -1, X, X- R/X/L) www.nature.com/nature/journal/v455/n7209/full/455001a.html (3197, -1, X, X- R/X/L) www.martinhilbert.net/WorldInfoCapacity.html (3197, 179, 2, 0- R/X/L) www.martinhilbert.net/WorldInfoCapacity.html (3197, 179, 2, 0- R/X/L)
  4. 2014-10-14 02:12:08 (UTC): User 117.195.9.130 t • c • dc • l • ef • b • bl; (1) to Coaching (edit | talk | history | links | watch | logs) (diff  top?) - Link: bookreviews.infoversant.com/neuroscience-for-coaches-amy-brann-review/ (R/Xmeta/L)
    Other links: bookreviews.infoversant.com/neuroscience-for-coaches-amy-brann-review/ (1, 22, 1, 1- R/X/L)
  5. 2014-11-03 09:21:22 (UTC): User Materialscientist t • c • dc • l • ef • b • bl; (151329) to Big data (edit | talk | history | links | watch | logs) (diff  top?) - Link: bookreviews.infoversant.com/data-crush-christopher-surdak/ (R/Xmeta/L)
    Other links: www.guardian.co.uk/news/datablog/2012/mar/09/big-data-theory (151329, -1, X, X- R/X/L) www.tcs.com/big-data-study/Pages/default.aspx (151329, , X, X- R/X/L) sites.tcs.com/big-data-study/manufacturing-big-data-benefits-challenges/# (151329, , X, X- R/X/L) www.bbc.co.uk/news/science-environment-22293693 (151329, -1, X, X- R/X/L) www.forbes.com/sites/davidleinweber/2013/04/26/big-data-gets-bigger-now-google-trends-can-predict-the-market/ (151329, -1, X, X- R/X/L) www.ft.com/intl/cms/s/0/e5d959b8-acf2-11e2-b27f-00144feabdc0.html (151329, , X, X- R/X/L) www.independent.co.uk/news/business/comment/hamish-mcrae/hamish-mcrae-need-a-valuable-handle-on-investor-sentiment-google-it-8590991.html (151329, , X, X- R/X/L) www.businessweek.com/articles/2013-04-25/big-data-researchers-turn-to-google-to-beat-the-markets (151329, , X, X- R/X/L) www.nature.com/news/counting-google-searches-predicts-market-movements-1.12879 (151329, -1, X, X- R/X/L) business.time.com/2013/04/26/trouble-with-your-investment-portfolio-google-it/ (151329, , X, X- R/X/L) bits.blogs.nytimes.com/2013/04/26/google-search-terms-can-predict-stock-market-study-finds/ (151329, , X, X- R/X/L) dx.doi.org/10.1038%2Fsrep01684 (151329, -1, X, X- R/X/L) www.nature.com/news/counting-google-searches-predicts-market-movements-1.12879 (151329, -1, X, X- R/X/L) www.tobiaspreis.de/bigdata/future_orientation_index.pdf (151329, , X, X- R/X/L) arstechnica.com/gadgets/news/2012/04/google-trends-reveals-clues-about-the-mentality-of-richer-nations.ars (151329, , X, X- R/X/L) www.newscientist.com/article/dn21678-online-searches-for-future-linked-to-economic-success.html (151329, , X, X- R/X/L) dx.doi.org/10.1038%2Fsrep00350 (151329, -1, X, X- R/X/L) www.ijis.net/ijis9_1/ijis9_1_editorial_pre.html (151329, 25, X, X- R/X/L) dx.doi.org/10.1016%2Fj.mfglet.2013.09.005 (151329, -1, X, X- R/X/L) www.sciencedirect.com/science/article/pii/S2213846313000114 (151329, , X, X- R/X/L) imscenter.net (151329, , X, X- R/X/L) www.betakit.com (151329, , X, X- R/X/L) www.betakit.com (151329, , X, X- R/X/L) www.betakit.com/event/inspiration-day-at-university-of-waterloo-stratford-campus/ (151329, , X, X- R/X/L) www.bbc.co.uk/news/technology-26651179 (151329, -1, X, X- R/X/L) cordis.europa.eu/search/index.cfm?fuseaction=proj.document&PJ_RCN=13267529 (151329, , X, X- R/X/L) bigdata.csail.mit.edu (151329, , X, X- R/X/L) www.mass.gov/governor/pressoffice/pressreleases/2012/2012530-governor-announces-big-data-initiative.html (151329, , X, X- R/X/L) energy.gov/articles/secretary-chu-announces-new-institute-help-scientists-improve-massive-data-set-research-doe (151329, , X, X- R/X/L) www.nytimes.com/2011/12/06/science/david-patterson-enlist-computer-scientists-in-cancer-fight.html?_r=0 (151329, -1, X, X- R/X/L) amplab.cs.berkeley.edu/publication/scaling-the-mobile-millennium-system-in-the-cloud-2/ (151329, , X, X- R/X/L) www.nsf.gov/news/news_summ.jsp?cntn_id=123607&org=NSF&from=news (151329, , X, X- R/X/L) amplab.cs.berkeley.edu (151329, , X, X- R/X/L) www.whitehouse.gov/sites/default/files/microsites/ostp/big_data_press_release_final_2.pdf (151329, , X, X- R/X/L) asee-ne.org/proceedings/2014/Student%20Papers/210.pdf (151329, , X, X- R/X/L) asee-ne.org/proceedings/2014/Student%20Papers/210.pdf (151329, , X, X- R/X/L) www.evaluatorgroup.com/document/big-data-how-new-analytic-systems-will-impact-storage-2/ (151329, , X, X- R/X/L) news.cnet.com/8301-21546_3-20049693-10253464.html (151329, , X, X- R/X/L) www.ayasdi.com/resources/ (151329, , X, X- R/X/L) www.dbms2.com/2010/10/06/ebay-followup-greenplum-out-teradata-10-petabytes-hadoop-has-some-value-and-more/ (151329, , X, X- R/X/L) www.dbms2.com/2009/04/30/ebays-two-enormous-data-warehouses/ (151329, , X, X- R/X/L) dx.doi.org/10.1016%2Fj.patcog.2011.01.004 (151329, -1, X, X- R/X/L) www.dsp.utoronto.ca/~haiping/Publication/SurveyMSL_PR2011.pdf (151329, , X, X- R/X/L) www.cs.cornell.edu/cv/tenwork/finalreport.pdf (151329, , X, X- R/X/L) www.mckinsey.com/Insights/MGI/Research/Technology_and_Innovation/Big_data_The_next_frontier_for_innovation (151329, , X, X- R/X/L) mike2.openmethodology.org/wiki/Big_Data_Definition (151329, , X, X- R/X/L) mike2.openmethodology.org/wiki/Big_Data_Solution_Offering (151329, , X, X- R/X/L) research.google.com/archive/mapreduce-osdi04.pdf (151329, , X, X- R/X/L) www.informationweek.com/big-data/news/software-platforms/hadoop-from-experiment-to-leading-big-d/240157176 (151329, , X, X- R/X/L) www.datanami.com/2012/10/01/quantcast_opens_exabyte_ready_file_system/ (151329, , X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/article/2008/02/21/AR2008022100809.html (151329, , X, X- R/X/L) www.washingtonpost.com/wp-dyn/articles/A50577-2004Jul14.html (151329, , X, X- R/X/L) kdnuggets.com (151329, , X, X- R/X/L) www.kdnuggets.com/2014/07/interview-amy-gershkoff-ebay-in-house-BI-tools.html (151329, , X, X- R/X/L) www.tandfonline.com/doi/abs/10.1080/01972243.2013.873748 (151329, , X, X- R/X/L) blogs.worldbank.org/ic4d/four-ways-to-talk-about-big-data/ (151329, , X, X- R/X/L) papers.ssrn.com/abstract=2205145 (151329, -1, X, X- R/X/L) papers.ssrn.com/abstract=2205145 (151329, -1, X, X- R/X/L) papers.ssrn.com/abstract=2205145 (151329, -1, X, X- R/X/L) www.weforum.org/reports/big-data-big-impact-new-possibilities-international-development (151329, , X, X- R/X/L) www.weforum.org/reports/big-data-big-impact-new-possibilities-international-development (151329, , X, X- R/X/L) www.unglobalpulse.org/projects/BigDataforDevelopment (151329, , X, X- R/X/L) www.unglobalpulse.org/projects/BigDataforDevelopment (151329, , X, X- R/X/L) bits.blogs.nytimes.com/2013/03/12/predicting-commutes-more-accurately-for-would-be-home-buyers/ (151329, , X, X- R/X/L) www.statista.com/statistics/280444/global-leading-priorities-for-big-data-according-to-business-and-it-executives/ (151329, 2470, X, X- R/X/L) knowwpcarey.com/article.cfm?cid=25&aid=1171 (151329, , X, X- R/X/L) www.fico.com/en/Products/DMApps/Pages/FICO-Falcon-Fraud-Manager.aspx (151329, , X, X- R/X/L) www.facebook.com/notes/facebook-engineering/scaling-facebook-to-500-million-users-and-beyond/409881258919 (151329, -1, X, X- R/X/L) money.howstuffworks.com/amazon1.htm (151329, , X, X- R/X/L) www.forbes.com/sites/kashmirhill/2013/07/24/blueprints-of-nsa-data-center-in-utah-suggest-its-storage-capacity-is-less-impressive-than-thought/ (151329, -1, X, X- R/X/L) www.nsa.gov/public_info/press_room/2011/utah_groundbreaking_ceremony.shtml (151329, , X, X- R/X/L) www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1 (151329, -1, X, X- R/X/L) www.informationweek.com/government/enterprise-applications/image-gallery-governments-10-most-powerf/224700271 (151329, , X, X- R/X/L) www.infoworld.com/d/big-data/the-real-story-of-how-big-data-analytics-helped-obama-win-212862 (151329, , X, X- R/X/L) www.whitehouse.gov/sites/default/files/microsites/ostp/big_data_fact_sheet_final_1.pdf (151329, , X, X- R/X/L) www.whitehouse.gov/blog/2012/03/29/big-data-big-deal (151329, , X, X- R/X/L) www.csc.com/cscworld/publications/81769/81773-supercomputing_the_climate_nasa_s_big_data_mission (151329, , X, X- R/X/L) www.oecd.org/sti/ieconomy/Session_3_Delort.pdf#page=6 (151329, -1, X, X- R/X/L) www.oecd.org/sti/ieconomy/Session_3_Delort.pdf#page=6 (151329, -1, X, X- R/X/L) arstechnica.com/science/2012/04/future-telescope-array-drives-development-of-exabyte-processing/ (151329, , X, X- R/X/L) arstechnica.com/science/2012/04/future-telescope-array-drives-development-of-exabyte-processing/ (151329, , X, X- R/X/L) www.zurich.ibm.com/pdf/astron/CeBIT%202013%20Background%20DOME.pdf (151329, , X, X- R/X/L) www.zurich.ibm.com/pdf/astron/CeBIT%202013%20Background%20DOME.pdf (151329, , X, X- R/X/L) dx.doi.org/10.1038%2F469282a (151329, -1, X, X- R/X/L) www.nature.com/news/2011/110119/full/469282a.html (151329, -1, X, X- R/X/L) cds.cern.ch/record/1092437?ln=en (151329, 1373, X, X- R/X/L) cds.cern.ch/record/1278169?ln=en (151329, 1373, X, X- R/X/L) lecercle.lesechos.fr/entrepreneur/tendances-innovation/221169222/big-data-low-density-data-faible-densite-information-com (151329, , X, X- R/X/L) lecercle.lesechos.fr/entrepreneur/tendances-innovation/221169222/big-data-low-density-data-faible-densite-information-com (151329, , X, X- R/X/L) www.andsi.fr/tag/dsi-big-data/ (151329, 27, X, X- R/X/L) www.andsi.fr/tag/dsi-big-data/ (151329, 27, X, X- R/X/L) www.bigdataparis.com/presentation/mercredi/PDelort.pdf?PHPSESSID=tv7k70pcr3egpi2r6fi3qbjtj6#page=4 (151329, , X, X- R/X/L) www.bigdataparis.com/presentation/mercredi/PDelort.pdf?PHPSESSID=tv7k70pcr3egpi2r6fi3qbjtj6#page=4 (151329, , X, X- R/X/L) www.villanovau.com/university-online-programs/what-is-big-data/ (151329, , X, X- R/X/L) www.gartner.com/resId=2057415 (151329, 4243, X, X- R/X/L) web.archive.org/web/20110710043533/http://www.gartner.com/it/page.jsp?id=1731916 (151329, -1, X, X- R/X/L) www.gartner.com/it/page.jsp?id=1731916 (151329, 4243, X, X- R/X/L) blogs.gartner.com/doug-laney/files/2012/01/ad949-3D-Data-Management-Controlling-Data-Volume-Velocity-and-Variety.pdf (151329, , X, X- R/X/L) dx.doi.org/10.1016/j.is.2014.07.006 (151329, -1, X, X- R/X/L) dx.doi.org/10.1016/j.is.2014.07.006 (151329, -1, X, X- R/X/L) www.ijis.net/ijis7_1/ijis7_1_editorial.html (151329, 25, X, X- R/X/L) www.ijis.net/ijis7_1/ijis7_1_editorial.html (151329, 25, X, X- R/X/L) radar.oreilly.com/r2/release2-0-11.html (151329, 359, X, X- R/X/L) queue.acm.org/detail.cfm?id=1563874 (151329, 330, X, X- R/X/L) www.fsn.co.uk/channel_bi_bpm_cpm/mastering_big_data_cfo_strategies_to_transform_insight_into_opportunity#.UO2Ac-TTuys (151329, 60, X, X- R/X/L) www.ibm.com/big-data/us/en/ (151329, 4383, X, X- R/X/L) books.google.com/books?id=zxNglqU1FKgC (151329, -1, X, X- R/X/L) gigaom.com/2008/11/09/mapreduce-leads-the-way-for-parallel-programming/ (151329, 4446, X, X- R/X/L) bookreviews.infoversant.com/data-crush-christopher-surdak/ (151329, 22, X, X- R/X/L) dx.doi.org/10.1126%2Fscience.1197962 (151329, -1, X, X- R/X/L) www.hpcprojects.com/news/news_story.php?news_id=922 (151329, 19, X, X- R/X/L) dx.doi.org/10.1038%2F455001a (151329, -1, X, X- R/X/L) www.nature.com/nature/journal/v455/n7209/full/455001a.html (151329, -1, X, X- R/X/L) www.economist.com/node/15557443 (151329, , X, X- R/X/L) www.imscenter.net (151329, , X, X- R/X/L) ec.europa.eu/research/horizon2020/index_en.cfm?pg=h2020 (151329, -1, X, X- R/X/L) big-project.eu (151329, , X, X- R/X/L) www.itnews.com.au/News/342615,inside-ebay8217s-90pb-data-warehouse.aspx (151329, , X, X- R/X/L) www.nasa.gov/centers/goddard/news/releases/2010/10-051.html (151329, -1, X, X- R/X/L) www.nasa.gov/centers/goddard/news/releases/2010/10-051.html (151329, -1, X, X- R/X/L) www.winshuttle.com/big-data-timeline/ (151329, , X, X- R/X/L) www.ge-ip.com/library/detail/13476/?cid=wiki_Rise_of_Industrial_Big_Data (151329, , X, X- R/X/L) dx.doi.org/10.1126%2Fscience.1200970 (151329, -1, X, X- R/X/L) martinhilbert.net/WorldInfoCapacity.html (151329, 179, X, X- R/X/L) www.odbms.org/download/BigDataforGood.pdf (151329, , X, X- R/X/L) ubconferences.org/wp-content/uploads/2014/04/ASEE-Zone-1-Conference-Outcome-Report.pdf (151329, , X, X- R/X/L) arxiv.org/abs/1312.4722 (151329, -1, X, X- R/X/L) dx.doi.org/10.1371%2Fjournal.pmed.0020124 (151329, -1, X, X- R/X/L) www.ft.com/cms/s/2/21a6e7d8-b479-11e3-a09a-00144feabdc0.html (151329, , X, X- R/X/L) www.kdnuggets.com/2014/08/interview-michael-berthold-knime-research-big-data-privacy-part2.html (151329, , X, X- R/X/L) www.fortewares.com/Administrator/userfiles/Banner/forte-wares--pro-active-reporting_EN.pdf (151329, , X, X- R/X/L) dx.doi.org/10.1080%2F1369118X.2012.678878 (151329, -1, X, X- R/X/L) dx.doi.org/10.1146%2Fannurev.ecolsys.37.091305.110031 (151329, -1, X, X- R/X/L) www.pnamp.org/sites/default/files/Jones2006_AREES.pdf (151329, , X, X- R/X/L) www.danah.org/papers/talks/2010/WWW2010.html (151329, , X, X- R/X/L) www.counterpunch.org/2013/09/11/inside-the-tech-industrys-startup-conference/ (151329, , X, X- R/X/L) www.counterpunch.org/2013/12/03/iron-cagebook/ (151329, , X, X- R/X/L) blogs.hbr.org/cs/2012/08/dont_build_a_database_of_ruin.html (151329, , X, X- R/X/L) www.bigdataparis.com/documents/Pierre-Delort-INSERM.pdf#page=5 (151329, , X, X- R/X/L) www.bigdataparis.com/documents/Pierre-Delort-INSERM.pdf#page=5 (151329, , X, X- R/X/L) www.theatlantic.com/magazine/archive/2002/04/seeing-around-corners/302471/ (151329, , X, X- R/X/L) www.theatlantic.com/magazine/archive/2002/04/seeing-around-corners/302471/ (151329, , X, X- R/X/L) www.wired.com/science/discoveries/magazine/16-07/pb_theory (151329, -1, X, X- R/X/L) www.wired.com/science/discoveries/magazine/16-07/pb_theory (151329, -1, X, X- R/X/L) hbr.org/2012/04/good-data-wont-guarantee-good-decisions/ar/1 (151329, , X, X- R/X/L)

    User is in trusted groups sysop, checkuser on some wikis
  6. 2014-11-03 09:46:00 (UTC): User Elfix t • c • dc • l • ef • b • bl; (552) to Big data (edit | talk | history | links | watch | logs) (diff  top?) - Link: bookreviews.infoversant.com/data-crush-christopher-surdak/ (R/Xmeta/L)
    Other links: www.oecd.org/sti/ieconomy/Session_3_Delort.pdf#page=6 (552, -1, X, X- R/X/L) www.oecd.org/sti/ieconomy/Session_3_Delort.pdf#page=6 (552, -1, X, X- R/X/L) dx.doi.org/10.1038%2F469282a (552, -1, X, X- R/X/L) www.nature.com/news/2011/110119/full/469282a.html (552, -1, X, X- R/X/L) cds.cern.ch/record/1092437?ln=en (552, 1373, X, X- R/X/L) www.andsi.fr/tag/dsi-big-data/ (552, 27, X, X- R/X/L) www.andsi.fr/tag/dsi-big-data/ (552, 27, X, X- R/X/L) web.archive.org/web/20110710043533/http://www.gartner.com/it/page.jsp?id=1731916 (552, -1, X, X- R/X/L) www.gartner.com/it/page.jsp?id=1731916 (552, 4243, X, X- R/X/L) www.ijis.net/ijis7_1/ijis7_1_editorial.html (552, 25, X, X- R/X/L) www.ijis.net/ijis7_1/ijis7_1_editorial.html (552, 25, X, X- R/X/L) www.ibm.com/big-data/us/en/ (552, 4383, X, X- R/X/L) books.google.com/books?id=zxNglqU1FKgC (552, -1, X, X- R/X/L) gigaom.com/2008/11/09/mapreduce-leads-the-way-for-parallel-programming/ (552, 4446, X, X- R/X/L) bookreviews.infoversant.com/data-crush-christopher-surdak/ (552, 22, X, X- R/X/L) dx.doi.org/10.1126%2Fscience.1197962 (552, -1, X, X- R/X/L) www.hpcprojects.com/news/news_story.php?news_id=922 (552, 19, X, X- R/X/L) www.nasa.gov/centers/goddard/news/releases/2010/10-051.html (552, -1, X, X- R/X/L) www.nasa.gov/centers/goddard/news/releases/2010/10-051.html (552, -1, X, X- R/X/L)

    User is in a trusted group checkuser on some wikis
  7. 2014-11-03 09:52:56 (UTC): User Josve05a t • c • dc • l • ef • b • bl; (107292) to Big data (edit | talk | history | links | watch | logs) (diff  top?) - Link: bookreviews.infoversant.com/data-crush-christopher-surdak/ (R/Xmeta/L)
    Other links: bookreviews.infoversant.com/data-crush-christopher-surdak/ (107292, 22, X, X- R/X/L) dx.doi.org/10.1126%2Fscience.1197962 (107292, -1, X, X- R/X/L)

    User is in trusted groups sysop, rollbacker on some wikis
  8. 2015-01-07 03:44:12 (UTC): User 117.220.244.194 t • c • dc • l • ef • b • bl; (1) to Group dynamics (edit | talk | history | links | watch | logs) (diff  top?) - Link: bookreviews.infoversant.com/wiser-getting-beyond-groupthink-make-groups-smarter/ (R/Xmeta/L)
    Other links: bookreviews.infoversant.com/wiser-getting-beyond-groupthink-make-groups-smarter/ (1, 22, 1, 1- R/X/L)
  9. 2015-01-21 03:02:15 (UTC): User 59.88.76.196 t • c • dc • l • ef • b • bl; (1) to Reputation (edit | talk | history | links | watch | logs) (diff  top?) - Link: bookreviews.infoversant.com/reputation-economy-machine-everywhere/ (R/Xmeta/L)
    Other links: bookreviews.infoversant.com/reputation-economy-machine-everywhere/ (1, 22, 1, 1- R/X/L)
  10. 2015-03-08 02:52:14 (UTC): User 117.195.10.255 t • c • dc • l • ef • b • bl; (1) to Cybercrime (edit | talk | history | links | watch | logs) (diff  top?) - Link: bookreviews.infoversant.com/future-crimes-book-review/ (R/Xmeta/L)
    Other links: bookreviews.infoversant.com/future-crimes-book-review/ (1, 22, 1, 1- R/X/L)
  11. 2015-03-11 14:13:22 (UTC): User ClueBot NG t • c • dc • l • ef • b • bl; (-1) to Cybercrime (edit | talk | history | links | watch | logs) (diff  top?) - Link: bookreviews.infoversant.com/future-crimes-book-review/ (R/Xmeta/L)
    Other links: www.carlisle.army.mil/DIME/documents/War%20is%20War%20Issue%20Paper%20Final2.pdf (-1, , X, X- R/X/L) www.ere-security.ca/PDF/Cyberextortion%20by%20DoS,%20Risk%20Magazine%20June%202006.pdf (-1, , X, X- R/X/L) www.ere-security.ca/PDF/Cyberextortion%20by%20DoS,%20Risk%20Magazine%20June%202006.pdf (-1, , X, X- R/X/L) bookreviews.infoversant.com/future-crimes-book-review/ (-1, 22, X, X- R/X/L) northdenvernews.com/cybercrime-costs-victims/ (-1, , X, X- R/X/L) northdenvernews.com/cybercrime-costs-victims/ (-1, , X, X- R/X/L) www.reuters.com/article/2014/06/09/us-cybersecurity-mcafee-csis-idUSKBN0EK0SV20140609 (-1, , X, X- R/X/L) www.law.duke.edu/journals/dltr/articles/2010dltr003.html (-1, , X, X- R/X/L) www.igiglobal.com/bookstore/titledetails.aspx?titleid=50518&detailstype=description (-1, , X, X- R/X/L) bjc.oxfordjournals.org/cgi/content/abstract/38/2/201 (-1, , X, X- R/X/L) www.ahtcc.gov.au (-1, , X, X- R/X/L) www.ustreas.gov/usss/financial_crimes.shtml#Computer (-1, , X, X- R/X/L) www.fbi.gov/cyberinvest/cyberhome.htm (-1, , X, X- R/X/L) www.ojp.usdoj.gov/nij/topics/technology/electronic-crime/welcome.htm (-1, , X, X- R/X/L) www.cybercrime.gov (-1, , X, X- R/X/L) www.beratungsstelle-cybercrime.de (-1, , X, X- R/X/L) www.cybercrime.asia (-1, , X, X- R/X/L) www.crime-research.org (-1, , X, X- R/X/L) www.htcia.org (-1, , X, X- R/X/L) www.cybercrimeforum.org (-1, , X, X- R/X/L) www.cybercrimejournal.com (-1, , X, X- R/X/L) legal.practitioner.com/computer-crime/ (-1, , X, X- R/X/L) www.asdfed.org/cybercrime (-1, , X, X- R/X/L) www.cybervictims.org (-1, , X, X- R/X/L) de.scribd.com/doc/215756732/Dario-N-Rolon-Vigilancia-informatica-y-responsabilidad-penal-de-proveedores-de-internet (-1, , X, X- R/X/L) www.boston.com/business/technology/articles/2010/03/02/authorities_bust_3_in_infection_of_13m_computers/ (-1, , X, X- R/X/L) books.google.co.in/books?id=cWOQWx4QPFYC&printsec=frontcover&source=gbs_ge_summary_r&cad=0#v=onepage&q&f=false (-1, , X, X- R/X/L) www.igi-global.com/book/cyber-crime-victimization-women/50518 (-1, , X, X- R/X/L) books.google.com/books?id=ubS7HvYyHzIC&printsec=frontcover (-1, -1, X, X- R/X/L) www.ccthomas.com/details.cfm?P_ISBN13=9780398087289 (-1, , X, X- R/X/L) appaweb.csg.org/Perspectives/Perspectives_V35_N4_P40.pdf (-1, , X, X- R/X/L) appaweb.csg.org/Perspectives/Perspectives_V35_N4_P40.pdf (-1, , X, X- R/X/L) www.nyccriminallawyer.com/white-collar-crimes/computer-and-internet-fraud/ (-1, , X, X- R/X/L) raiserkenniff.com/nyc-criminal-defense/internet-crimes/ (-1, , X, X- R/X/L) www.bloomberg.com/news/2013-04-23/fake-report-erasing-136-billion-shows-market-s-fragility.html (-1, , X, X- R/X/L) mashable.com/2013/04/23/ap-hacked-white-house/ (-1, -1, X, X- R/X/L) www.nypost.com/p/news/national/zappos_cyber_attack_pWsrU60crm8SGHJWYGuP7K (-1, , X, X- R/X/L) www.reuters.com/article/2012/10/12/net-us-wellsfargo-cyberattacks-idUSBRE89B1C620121012 (-1, , X, X- R/X/L) articles.latimes.com/2012/jun/06/business/la-fi-tn-eharmony-hacked-linkedin-20120606 (-1, , X, X- R/X/L) www.dhs.gov/ynews/releases/20110803-napolitano-holder-announce-largest-prosecution-criminal-network.shtm (-1, , X, X- R/X/L) economist.com/displaystory.cfm?story_id=9723768 (-1, , X, X- R/X/L) bjc.oxfordjournals.org/cgi/content/short/38/2/201 (-1, , X, X- R/X/L) connection.ebscohost.com/c/essays/91978345/gendertrolling-misogyny-adapts-new-media (-1, , X, X- R/X/L) books.google.co.uk/books?id=gsWQ-xgbLbUC&lpg=PA130&ots=RgwCYAMetX&dq=%22threats%20to%20harm%22%20cybercrime&pg=PA91#v=onepage&q=harm&f=false (-1, -1, X, X- R/X/L) www.law.com/jsp/decision_friendly.jsp?id=1202481645474 (-1, , X, X- R/X/L) www.nerac.com/family/NeracReports/Cybercrimes_CT.htm (-1, , X, X- R/X/L) leg1.state.va.us/cgi-bin/legp504.exe?000+cod+18.2-152.7C1 (-1, , X, X- R/X/L) www.ussc.gov/Guidelines/2011_Guidelines/Manual_HTML/2g1_3.htm (-1, , X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/06/safe-browsing-protecting-web-users-for.html (-1, , X, X- R/X/L) www.crime-research.org/articles/joseph06/ (-1, , X, X- R/X/L) www.carlisle.army.mil/DIME/documents/War%20is%20War%20Issue%20Paper%20Final2.pdf (-1, , X, X- R/X/L)

    User is in a trusted group bot on some wikis
  12. 2015-03-11 14:34:59 (UTC): User Pinethicket t • c • dc • l • ef • b • bl; (14472) to Cybercrime (edit | talk | history | links | watch | logs) (diff  top?) - Link: bookreviews.infoversant.com/future-crimes-book-review/ (R/Xmeta/L)
    Other links: www.ahtcc.gov.au (14472, , X, X- R/X/L) www.ustreas.gov/usss/financial_crimes.shtml#Computer (14472, , X, X- R/X/L) www.fbi.gov/cyberinvest/cyberhome.htm (14472, , X, X- R/X/L) www.ojp.usdoj.gov/nij/topics/technology/electronic-crime/welcome.htm (14472, , X, X- R/X/L) www.cybercrime.gov (14472, , X, X- R/X/L) www.beratungsstelle-cybercrime.de (14472, , X, X- R/X/L) www.cybercrime.asia (14472, , X, X- R/X/L) www.crime-research.org (14472, , X, X- R/X/L) www.htcia.org (14472, , X, X- R/X/L) www.cybercrimeforum.org (14472, , X, X- R/X/L) www.cybercrimejournal.com (14472, , X, X- R/X/L) legal.practitioner.com/computer-crime/ (14472, , X, X- R/X/L) www.asdfed.org/cybercrime (14472, , X, X- R/X/L) www.cybervictims.org (14472, , X, X- R/X/L) de.scribd.com/doc/215756732/Dario-N-Rolon-Vigilancia-informatica-y-responsabilidad-penal-de-proveedores-de-internet (14472, , X, X- R/X/L) www.boston.com/business/technology/articles/2010/03/02/authorities_bust_3_in_infection_of_13m_computers/ (14472, , X, X- R/X/L) books.google.co.in/books?id=cWOQWx4QPFYC&printsec=frontcover&source=gbs_ge_summary_r&cad=0#v=onepage&q&f=false (14472, , X, X- R/X/L) www.igi-global.com/book/cyber-crime-victimization-women/50518 (14472, , X, X- R/X/L) books.google.com/books?id=ubS7HvYyHzIC&printsec=frontcover (14472, -1, X, X- R/X/L) www.ccthomas.com/details.cfm?P_ISBN13=9780398087289 (14472, , X, X- R/X/L) appaweb.csg.org/Perspectives/Perspectives_V35_N4_P40.pdf (14472, , X, X- R/X/L) appaweb.csg.org/Perspectives/Perspectives_V35_N4_P40.pdf (14472, , X, X- R/X/L) www.nyccriminallawyer.com/white-collar-crimes/computer-and-internet-fraud/ (14472, , X, X- R/X/L) raiserkenniff.com/nyc-criminal-defense/internet-crimes/ (14472, , X, X- R/X/L) www.bloomberg.com/news/2013-04-23/fake-report-erasing-136-billion-shows-market-s-fragility.html (14472, , X, X- R/X/L) mashable.com/2013/04/23/ap-hacked-white-house/ (14472, -1, X, X- R/X/L) www.nypost.com/p/news/national/zappos_cyber_attack_pWsrU60crm8SGHJWYGuP7K (14472, , X, X- R/X/L) www.reuters.com/article/2012/10/12/net-us-wellsfargo-cyberattacks-idUSBRE89B1C620121012 (14472, , X, X- R/X/L) articles.latimes.com/2012/jun/06/business/la-fi-tn-eharmony-hacked-linkedin-20120606 (14472, , X, X- R/X/L) www.dhs.gov/ynews/releases/20110803-napolitano-holder-announce-largest-prosecution-criminal-network.shtm (14472, , X, X- R/X/L) economist.com/displaystory.cfm?story_id=9723768 (14472, , X, X- R/X/L) bjc.oxfordjournals.org/cgi/content/short/38/2/201 (14472, , X, X- R/X/L) connection.ebscohost.com/c/essays/91978345/gendertrolling-misogyny-adapts-new-media (14472, , X, X- R/X/L) books.google.co.uk/books?id=gsWQ-xgbLbUC&lpg=PA130&ots=RgwCYAMetX&dq=%22threats%20to%20harm%22%20cybercrime&pg=PA91#v=onepage&q=harm&f=false (14472, -1, X, X- R/X/L) www.law.com/jsp/decision_friendly.jsp?id=1202481645474 (14472, , X, X- R/X/L) www.nerac.com/family/NeracReports/Cybercrimes_CT.htm (14472, , X, X- R/X/L) leg1.state.va.us/cgi-bin/legp504.exe?000+cod+18.2-152.7C1 (14472, , X, X- R/X/L) www.ussc.gov/Guidelines/2011_Guidelines/Manual_HTML/2g1_3.htm (14472, , X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/06/safe-browsing-protecting-web-users-for.html (14472, , X, X- R/X/L) www.crime-research.org/articles/joseph06/ (14472, , X, X- R/X/L) www.carlisle.army.mil/DIME/documents/War%20is%20War%20Issue%20Paper%20Final2.pdf (14472, , X, X- R/X/L) www.carlisle.army.mil/DIME/documents/War%20is%20War%20Issue%20Paper%20Final2.pdf (14472, , X, X- R/X/L) www.ere-security.ca/PDF/Cyberextortion%20by%20DoS,%20Risk%20Magazine%20June%202006.pdf (14472, , X, X- R/X/L) www.ere-security.ca/PDF/Cyberextortion%20by%20DoS,%20Risk%20Magazine%20June%202006.pdf (14472, , X, X- R/X/L) bookreviews.infoversant.com/future-crimes-book-review/ (14472, 22, X, X- R/X/L) northdenvernews.com/cybercrime-costs-victims/ (14472, , X, X- R/X/L) northdenvernews.com/cybercrime-costs-victims/ (14472, , X, X- R/X/L) www.reuters.com/article/2014/06/09/us-cybersecurity-mcafee-csis-idUSKBN0EK0SV20140609 (14472, , X, X- R/X/L) www.law.duke.edu/journals/dltr/articles/2010dltr003.html (14472, , X, X- R/X/L) www.igiglobal.com/bookstore/titledetails.aspx?titleid=50518&detailstype=description (14472, , X, X- R/X/L) bjc.oxfordjournals.org/cgi/content/abstract/38/2/201 (14472, , X, X- R/X/L)
  13. 2015-03-16 13:25:50 (UTC): User ClueBot NG t • c • dc • l • ef • b • bl; (-1) to Cybercrime (edit | talk | history | links | watch | logs) (diff  top?) - Link: bookreviews.infoversant.com/future-crimes-book-review/ (R/Xmeta/L)
    Other links: www.ahtcc.gov.au (-1, , X, X- R/X/L) www.ustreas.gov/usss/financial_crimes.shtml#Computer (-1, , X, X- R/X/L) www.fbi.gov/cyberinvest/cyberhome.htm (-1, , X, X- R/X/L) www.ojp.usdoj.gov/nij/topics/technology/electronic-crime/welcome.htm (-1, , X, X- R/X/L) www.cybercrime.gov (-1, , X, X- R/X/L) www.beratungsstelle-cybercrime.de (-1, , X, X- R/X/L) www.cybercrime.asia (-1, , X, X- R/X/L) www.crime-research.org (-1, , X, X- R/X/L) www.htcia.org (-1, , X, X- R/X/L) www.cybercrimeforum.org (-1, , X, X- R/X/L) www.cybercrimejournal.com (-1, , X, X- R/X/L) legal.practitioner.com/computer-crime/ (-1, , X, X- R/X/L) www.asdfed.org/cybercrime (-1, , X, X- R/X/L) www.cybervictims.org (-1, , X, X- R/X/L) de.scribd.com/doc/215756732/Dario-N-Rolon-Vigilancia-informatica-y-responsabilidad-penal-de-proveedores-de-internet (-1, , X, X- R/X/L) www.boston.com/business/technology/articles/2010/03/02/authorities_bust_3_in_infection_of_13m_computers/ (-1, , X, X- R/X/L) books.google.co.in/books?id=cWOQWx4QPFYC&printsec=frontcover&source=gbs_ge_summary_r&cad=0#v=onepage&q&f=false (-1, , X, X- R/X/L) www.igi-global.com/book/cyber-crime-victimization-women/50518 (-1, , X, X- R/X/L) books.google.com/books?id=ubS7HvYyHzIC&printsec=frontcover (-1, -1, X, X- R/X/L) www.ccthomas.com/details.cfm?P_ISBN13=9780398087289 (-1, , X, X- R/X/L) appaweb.csg.org/Perspectives/Perspectives_V35_N4_P40.pdf (-1, , X, X- R/X/L) appaweb.csg.org/Perspectives/Perspectives_V35_N4_P40.pdf (-1, , X, X- R/X/L) www.nyccriminallawyer.com/white-collar-crimes/computer-and-internet-fraud/ (-1, , X, X- R/X/L) raiserkenniff.com/nyc-criminal-defense/internet-crimes/ (-1, , X, X- R/X/L) www.bloomberg.com/news/2013-04-23/fake-report-erasing-136-billion-shows-market-s-fragility.html (-1, , X, X- R/X/L) mashable.com/2013/04/23/ap-hacked-white-house/ (-1, -1, X, X- R/X/L) www.nypost.com/p/news/national/zappos_cyber_attack_pWsrU60crm8SGHJWYGuP7K (-1, , X, X- R/X/L) www.reuters.com/article/2012/10/12/net-us-wellsfargo-cyberattacks-idUSBRE89B1C620121012 (-1, , X, X- R/X/L) articles.latimes.com/2012/jun/06/business/la-fi-tn-eharmony-hacked-linkedin-20120606 (-1, , X, X- R/X/L) www.dhs.gov/ynews/releases/20110803-napolitano-holder-announce-largest-prosecution-criminal-network.shtm (-1, , X, X- R/X/L) economist.com/displaystory.cfm?story_id=9723768 (-1, , X, X- R/X/L) bjc.oxfordjournals.org/cgi/content/short/38/2/201 (-1, , X, X- R/X/L) books.google.co.uk/books?id=gsWQ-xgbLbUC&lpg=PA130&ots=RgwCYAMetX&dq=%22threats%20to%20harm%22%20cybercrime&pg=PA91#v=onepage&q=harm&f=false (-1, -1, X, X- R/X/L) www.law.com/jsp/decision_friendly.jsp?id=1202481645474 (-1, , X, X- R/X/L) www.nerac.com/family/NeracReports/Cybercrimes_CT.htm (-1, , X, X- R/X/L) leg1.state.va.us/cgi-bin/legp504.exe?000+cod+18.2-152.7C1 (-1, , X, X- R/X/L) www.ussc.gov/Guidelines/2011_Guidelines/Manual_HTML/2g1_3.htm (-1, , X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/06/safe-browsing-protecting-web-users-for.html (-1, , X, X- R/X/L) www.crime-research.org/articles/joseph06/ (-1, , X, X- R/X/L) www.carlisle.army.mil/DIME/documents/War%20is%20War%20Issue%20Paper%20Final2.pdf (-1, , X, X- R/X/L) www.carlisle.army.mil/DIME/documents/War%20is%20War%20Issue%20Paper%20Final2.pdf (-1, , X, X- R/X/L) www.ere-security.ca/PDF/Cyberextortion%20by%20DoS,%20Risk%20Magazine%20June%202006.pdf (-1, , X, X- R/X/L) www.ere-security.ca/PDF/Cyberextortion%20by%20DoS,%20Risk%20Magazine%20June%202006.pdf (-1, , X, X- R/X/L) bookreviews.infoversant.com/future-crimes-book-review/ (-1, 22, X, X- R/X/L) northdenvernews.com/cybercrime-costs-victims/ (-1, , X, X- R/X/L) northdenvernews.com/cybercrime-costs-victims/ (-1, , X, X- R/X/L) research.microsoft.com/pubs/149886/SexLiesandCybercrimeSurveys.pdf (-1, , X, X- R/X/L) www.reuters.com/article/2014/06/09/us-cybersecurity-mcafee-csis-idUSKBN0EK0SV20140609 (-1, , X, X- R/X/L) www.law.duke.edu/journals/dltr/articles/2010dltr003.html (-1, , X, X- R/X/L) www.igiglobal.com/bookstore/titledetails.aspx?titleid=50518&detailstype=description (-1, , X, X- R/X/L) bjc.oxfordjournals.org/cgi/content/abstract/38/2/201 (-1, , X, X- R/X/L)

    User is in a trusted group bot on some wikis
  14. 2015-03-16 15:11:52 (UTC): User Padenton t • c • dc • l • ef • b • bl; (1787) to Cybercrime (edit | talk | history | links | watch | logs) (diff  top?) - Link: bookreviews.infoversant.com/future-crimes-book-review/ (R/Xmeta/L)
    Other links: www.beratungsstelle-cybercrime.de (1787, , X, X- R/X/L) www.cybercrime.asia (1787, , X, X- R/X/L) www.crime-research.org (1787, , X, X- R/X/L) www.htcia.org (1787, , X, X- R/X/L) www.cybercrimeforum.org (1787, , X, X- R/X/L) www.cybercrimejournal.com (1787, , X, X- R/X/L) legal.practitioner.com/computer-crime/ (1787, , X, X- R/X/L) www.asdfed.org/cybercrime (1787, , X, X- R/X/L) www.cybervictims.org (1787, , X, X- R/X/L) de.scribd.com/doc/215756732/Dario-N-Rolon-Vigilancia-informatica-y-responsabilidad-penal-de-proveedores-de-internet (1787, , X, X- R/X/L) www.boston.com/business/technology/articles/2010/03/02/authorities_bust_3_in_infection_of_13m_computers/ (1787, , X, X- R/X/L) books.google.co.in/books?id=cWOQWx4QPFYC&printsec=frontcover&source=gbs_ge_summary_r&cad=0#v=onepage&q&f=false (1787, , X, X- R/X/L) www.igi-global.com/book/cyber-crime-victimization-women/50518 (1787, , X, X- R/X/L) books.google.com/books?id=ubS7HvYyHzIC&printsec=frontcover (1787, -1, X, X- R/X/L) www.ccthomas.com/details.cfm?P_ISBN13=9780398087289 (1787, , X, X- R/X/L) appaweb.csg.org/Perspectives/Perspectives_V35_N4_P40.pdf (1787, , X, X- R/X/L) appaweb.csg.org/Perspectives/Perspectives_V35_N4_P40.pdf (1787, , X, X- R/X/L) www.nyccriminallawyer.com/white-collar-crimes/computer-and-internet-fraud/ (1787, , X, X- R/X/L) raiserkenniff.com/nyc-criminal-defense/internet-crimes/ (1787, , X, X- R/X/L) www.bloomberg.com/news/2013-04-23/fake-report-erasing-136-billion-shows-market-s-fragility.html (1787, , X, X- R/X/L) mashable.com/2013/04/23/ap-hacked-white-house/ (1787, -1, X, X- R/X/L) www.nypost.com/p/news/national/zappos_cyber_attack_pWsrU60crm8SGHJWYGuP7K (1787, , X, X- R/X/L) www.reuters.com/article/2012/10/12/net-us-wellsfargo-cyberattacks-idUSBRE89B1C620121012 (1787, , X, X- R/X/L) articles.latimes.com/2012/jun/06/business/la-fi-tn-eharmony-hacked-linkedin-20120606 (1787, , X, X- R/X/L) www.dhs.gov/ynews/releases/20110803-napolitano-holder-announce-largest-prosecution-criminal-network.shtm (1787, , X, X- R/X/L) economist.com/displaystory.cfm?story_id=9723768 (1787, , X, X- R/X/L) bjc.oxfordjournals.org/cgi/content/short/38/2/201 (1787, , X, X- R/X/L) books.google.co.uk/books?id=gsWQ-xgbLbUC&lpg=PA130&ots=RgwCYAMetX&dq=%22threats%20to%20harm%22%20cybercrime&pg=PA91#v=onepage&q=harm&f=false (1787, -1, X, X- R/X/L) www.law.com/jsp/decision_friendly.jsp?id=1202481645474 (1787, , X, X- R/X/L) www.nerac.com/family/NeracReports/Cybercrimes_CT.htm (1787, , X, X- R/X/L) leg1.state.va.us/cgi-bin/legp504.exe?000+cod+18.2-152.7C1 (1787, , X, X- R/X/L) www.ussc.gov/Guidelines/2011_Guidelines/Manual_HTML/2g1_3.htm (1787, , X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/06/safe-browsing-protecting-web-users-for.html (1787, , X, X- R/X/L) www.crime-research.org/articles/joseph06/ (1787, , X, X- R/X/L) www.carlisle.army.mil/DIME/documents/War%20is%20War%20Issue%20Paper%20Final2.pdf (1787, , X, X- R/X/L) www.carlisle.army.mil/DIME/documents/War%20is%20War%20Issue%20Paper%20Final2.pdf (1787, , X, X- R/X/L) www.ere-security.ca/PDF/Cyberextortion%20by%20DoS,%20Risk%20Magazine%20June%202006.pdf (1787, , X, X- R/X/L) www.ere-security.ca/PDF/Cyberextortion%20by%20DoS,%20Risk%20Magazine%20June%202006.pdf (1787, , X, X- R/X/L) bookreviews.infoversant.com/future-crimes-book-review/ (1787, 22, X, X- R/X/L) northdenvernews.com/cybercrime-costs-victims/ (1787, , X, X- R/X/L) northdenvernews.com/cybercrime-costs-victims/ (1787, , X, X- R/X/L) research.microsoft.com/pubs/149886/SexLiesandCybercrimeSurveys.pdf (1787, , X, X- R/X/L) www.reuters.com/article/2014/06/09/us-cybersecurity-mcafee-csis-idUSKBN0EK0SV20140609 (1787, , X, X- R/X/L) www.law.duke.edu/journals/dltr/articles/2010dltr003.html (1787, , X, X- R/X/L) www.igiglobal.com/bookstore/titledetails.aspx?titleid=50518&detailstype=description (1787, , X, X- R/X/L) bjc.oxfordjournals.org/cgi/content/abstract/38/2/201 (1787, , X, X- R/X/L) www.ahtcc.gov.au (1787, , X, X- R/X/L) www.ustreas.gov/usss/financial_crimes.shtml#Computer (1787, , X, X- R/X/L) www.fbi.gov/cyberinvest/cyberhome.htm (1787, , X, X- R/X/L) www.ojp.usdoj.gov/nij/topics/technology/electronic-crime/welcome.htm (1787, , X, X- R/X/L) www.cybercrime.gov (1787, , X, X- R/X/L)
  15. 2015-04-15 06:16:26 (UTC): w:simple:User:117.195.4.166 (t - c; 1) to w:simple:Economics (diff  top?) - Link: bookreviews.infoversant.com/hubris-desai-book-review/ (R/Xmeta/L)
    Other links: bookreviews.infoversant.com/hubris-desai-book-review/ (1, 22, 1, 1- R/X/L)
  16. 2015-05-05 10:23:56 (UTC): User 61.0.209.222 t • c • dc • l • ef • b • bl; (1) to Tata Nano (edit | talk | history | links | watch | logs) (diff  top?) - Link: bookreviews.infoversant.com/tata-genx-nano-easyshift-first-look/ (R/Xmeta/L)
    Other links: bookreviews.infoversant.com/tata-genx-nano-easyshift-first-look/ (1, 22, 1, 1- R/X/L)
  17. 2015-05-27 02:04:37 (UTC): User 59.88.76.9 t • c • dc • l • ef • b • bl; (1) to India in World War II (edit | talk | history | links | watch | logs) (diff  top?) - Link: bookreviews.infoversant.com/india-at-war-yasmin-khan/ (R/Xmeta/L)
    Other links: bookreviews.infoversant.com/india-at-war-yasmin-khan/ (1, 22, 1, 1- R/X/L)
  18. 2015-06-25 11:42:33 (UTC): User Glane23 t • c • dc • l • ef • b • bl; (14569) to Cybercrime (edit | talk | history | links | watch | logs) (diff  !top) - Link: bookreviews.infoversant.com/future-crimes-book-review/ (R/Xmeta/L)
    Other links: id.ndl.go.jp/auth/ndlna/00561444 (14569, -1, X, X- R/X/L) d-nb.info/gnd/4010452-7 (14569, -1, X, X- R/X/L) www.ahtcc.gov.au (14569, , X, X- R/X/L) www.ustreas.gov/usss/financial_crimes.shtml#Computer (14569, , X, X- R/X/L) www.fbi.gov/cyberinvest/cyberhome.htm (14569, , X, X- R/X/L) www.ojp.usdoj.gov/nij/topics/technology/electronic-crime/welcome.htm (14569, , X, X- R/X/L) www.cybercrime.gov (14569, , X, X- R/X/L) www.beratungsstelle-cybercrime.de (14569, , X, X- R/X/L) www.cybercrime.asia (14569, , X, X- R/X/L) www.crime-research.org (14569, , X, X- R/X/L) www.htcia.org (14569, , X, X- R/X/L) www.cybercrimeforum.org (14569, , X, X- R/X/L) www.cybercrimejournal.com (14569, , X, X- R/X/L) legal.practitioner.com/computer-crime/ (14569, , X, X- R/X/L) www.asdfed.org/cybercrime (14569, , X, X- R/X/L) www.cybervictims.org (14569, , X, X- R/X/L) de.scribd.com/doc/215756732/Dario-N-Rolon-Vigilancia-informatica-y-responsabilidad-penal-de-proveedores-de-internet (14569, , X, X- R/X/L) www.boston.com/business/technology/articles/2010/03/02/authorities_bust_3_in_infection_of_13m_computers/ (14569, , X, X- R/X/L) books.google.co.in/books?id=cWOQWx4QPFYC&printsec=frontcover&source=gbs_ge_summary_r&cad=0#v=onepage&q&f=false (14569, , X, X- R/X/L) www.igi-global.com/book/cyber-crime-victimization-women/50518 (14569, , X, X- R/X/L) books.google.com/books?id=ubS7HvYyHzIC&printsec=frontcover (14569, -1, X, X- R/X/L) www.ccthomas.com/details.cfm?P_ISBN13=9780398087289 (14569, , X, X- R/X/L) appaweb.csg.org/Perspectives/Perspectives_V35_N4_P40.pdf (14569, , X, X- R/X/L) appaweb.csg.org/Perspectives/Perspectives_V35_N4_P40.pdf (14569, , X, X- R/X/L) www.nyccriminallawyer.com/white-collar-crimes/computer-and-internet-fraud/ (14569, , X, X- R/X/L) raiserkenniff.com/nyc-criminal-defense/internet-crimes/ (14569, , X, X- R/X/L) www.npr.org/blogs/thetwo-way/2015/04/01/396811276/u-s-creates-first-sanctions-program-against-cybercriminals/ (14569, , X, X- R/X/L) web.a.ebscohost.com/ehost/detail/detail?vid=3&sid=21efdb54-ad43-447f-ab46-ce7fa854a98f%40sessionmgr4003&hid=4109&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=buh&AN=55328703/ (14569, , X, X- R/X/L) www.bloomberg.com/news/2013-04-23/fake-report-erasing-136-billion-shows-market-s-fragility.html (14569, , X, X- R/X/L) mashable.com/2013/04/23/ap-hacked-white-house/ (14569, -1, X, X- R/X/L) www.nypost.com/p/news/national/zappos_cyber_attack_pWsrU60crm8SGHJWYGuP7K (14569, , X, X- R/X/L) www.reuters.com/article/2012/10/12/net-us-wellsfargo-cyberattacks-idUSBRE89B1C620121012 (14569, , X, X- R/X/L) articles.latimes.com/2012/jun/06/business/la-fi-tn-eharmony-hacked-linkedin-20120606 (14569, , X, X- R/X/L) www.dhs.gov/ynews/releases/20110803-napolitano-holder-announce-largest-prosecution-criminal-network.shtm (14569, , X, X- R/X/L) economist.com/displaystory.cfm?story_id=9723768 (14569, , X, X- R/X/L) bjc.oxfordjournals.org/cgi/content/short/38/2/201 (14569, , X, X- R/X/L) books.google.co.uk/books?id=gsWQ-xgbLbUC&lpg=PA130&ots=RgwCYAMetX&dq=%22threats%20to%20harm%22%20cybercrime&pg=PA91#v=onepage&q=harm&f=false (14569, -1, X, X- R/X/L) www.law.com/jsp/decision_friendly.jsp?id=1202481645474 (14569, , X, X- R/X/L) www.nerac.com/family/NeracReports/Cybercrimes_CT.htm (14569, , X, X- R/X/L) www.victimsofcrime.org/our-programs/stalking-resource-center/stalking-laws/criminal-stalking-laws-by-state/south-Carolina (14569, , X, X- R/X/L) leg1.state.va.us/cgi-bin/legp504.exe?000+cod+18.2-152.7C1 (14569, , X, X- R/X/L) www.ussc.gov/Guidelines/2011_Guidelines/Manual_HTML/2g1_3.htm (14569, , X, X- R/X/L) papers.ssrn.com/sol3/papers.cfm?abstract_id=2493178 (14569, -1, X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/06/safe-browsing-protecting-web-users-for.html (14569, , X, X- R/X/L) www.crime-research.org/articles/joseph06/ (14569, , X, X- R/X/L) www.carlisle.army.mil/DIME/documents/War%20is%20War%20Issue%20Paper%20Final2.pdf (14569, , X, X- R/X/L) www.carlisle.army.mil/DIME/documents/War%20is%20War%20Issue%20Paper%20Final2.pdf (14569, , X, X- R/X/L) www.ere-security.ca/PDF/Cyberextortion%20by%20DoS,%20Risk%20Magazine%20June%202006.pdf (14569, , X, X- R/X/L) www.ere-security.ca/PDF/Cyberextortion%20by%20DoS,%20Risk%20Magazine%20June%202006.pdf (14569, , X, X- R/X/L) bookreviews.infoversant.com/future-crimes-book-review/ (14569, 22, X, X- R/X/L) northdenvernews.com/cybercrime-costs-victims/ (14569, , X, X- R/X/L) research.microsoft.com/pubs/149886/SexLiesandCybercrimeSurveys.pdf (14569, , X, X- R/X/L) www.reuters.com/article/2014/06/09/us-cybersecurity-mcafee-csis-idUSKBN0EK0SV20140609 (14569, , X, X- R/X/L) www.law.duke.edu/journals/dltr/articles/2010dltr003.html (14569, , X, X- R/X/L) www.igiglobal.com/bookstore/titledetails.aspx?titleid=50518&detailstype=description (14569, , X, X- R/X/L) bjc.oxfordjournals.org/cgi/content/abstract/38/2/201 (14569, , X, X- R/X/L)
  19. 2015-07-15 10:22:53 (UTC): User 117.248.193.159 t • c • dc • l • ef • b • bl; (1) to Abusive supervision (edit | talk | history | links | watch | logs) (diff  !top) - Link: bookreviews.infoversant.com/when-the-boss-is-wrong-by-sibichen-k-mathew/ (R/Xmeta/L)
    Other links: bookreviews.infoversant.com/when-the-boss-is-wrong-by-sibichen-k-mathew/ (1, 22, 1, 1- R/X/L)
  20. 2015-08-06 03:35:34 (UTC): User MGMT90018 2015S2 abusive supervision t • c • dc • l • ef • b • bl; (1) to User:MGMT90018 2015S2 abusive supervision/sandbox (edit | talk | history | links | watch | logs) (diff  !top) - Link: bookreviews.infoversant.com/when-the-boss-is-wrong-by-sibichen-k-mathew/ (R/Xmeta/L)
    Other links: bookreviews.infoversant.com/when-the-boss-is-wrong-by-sibichen-k-mathew/ (1, 22, 1, 0- R/X/L)
  21. 2015-09-29 06:17:46 (UTC): User ClueBot NG t • c • dc • l • ef • b • bl; (-1) to Cybercrime (edit | talk | history | links | watch | logs) (diff  !top) - Link: bookreviews.infoversant.com/future-crimes-book-review/ (R/Xmeta/L)
    Other links: id.ndl.go.jp/auth/ndlna/00561444 (-1, -1, X, X- R/X/L) d-nb.info/gnd/4010452-7 (-1, -1, X, X- R/X/L) www.ahtcc.gov.au (-1, , X, X- R/X/L) www.ustreas.gov/usss/financial_crimes.shtml#Computer (-1, , X, X- R/X/L) www.fbi.gov/cyberinvest/cyberhome.htm (-1, , X, X- R/X/L) www.ojp.usdoj.gov/nij/topics/technology/electronic-crime/welcome.htm (-1, , X, X- R/X/L) www.cybercrime.gov (-1, , X, X- R/X/L) www.beratungsstelle-cybercrime.de (-1, , X, X- R/X/L) www.cybercrime.asia (-1, , X, X- R/X/L) www.crime-research.org (-1, , X, X- R/X/L) www.htcia.org (-1, , X, X- R/X/L) www.cybercrimeforum.org (-1, , X, X- R/X/L) www.cybercrimejournal.com (-1, , X, X- R/X/L) legal.practitioner.com/computer-crime/ (-1, , X, X- R/X/L) www.asdfed.org/cybercrime (-1, , X, X- R/X/L) www.cybervictims.org (-1, , X, X- R/X/L) de.scribd.com/doc/215756732/Dario-N-Rolon-Vigilancia-informatica-y-responsabilidad-penal-de-proveedores-de-internet (-1, , X, X- R/X/L) www.boston.com/business/technology/articles/2010/03/02/authorities_bust_3_in_infection_of_13m_computers/ (-1, , X, X- R/X/L) books.google.co.in/books?id=cWOQWx4QPFYC&printsec=frontcover&source=gbs_ge_summary_r&cad=0#v=onepage&q&f=false (-1, , X, X- R/X/L) www.igi-global.com/book/cyber-crime-victimization-women/50518 (-1, , X, X- R/X/L) books.google.com/books?id=ubS7HvYyHzIC&printsec=frontcover (-1, -1, X, X- R/X/L) www.ccthomas.com/details.cfm?P_ISBN13=9780398087289 (-1, , X, X- R/X/L) appaweb.csg.org/Perspectives/Perspectives_V35_N4_P40.pdf (-1, , X, X- R/X/L) www.nyccriminallawyer.com/white-collar-crimes/computer-and-internet-fraud/ (-1, , X, X- R/X/L) raiserkenniff.com/nyc-criminal-defense/internet-crimes/ (-1, , X, X- R/X/L) www.npr.org/blogs/thetwo-way/2015/04/01/396811276/u-s-creates-first-sanctions-program-against-cybercriminals/ (-1, , X, X- R/X/L) web.a.ebscohost.com/ehost/detail/detail?vid=3&sid=21efdb54-ad43-447f-ab46-ce7fa854a98f%40sessionmgr4003&hid=4109&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=buh&AN=55328703/ (-1, , X, X- R/X/L) www.bloomberg.com/news/2013-04-23/fake-report-erasing-136-billion-shows-market-s-fragility.html (-1, , X, X- R/X/L) mashable.com/2013/04/23/ap-hacked-white-house/ (-1, -1, X, X- R/X/L) www.nypost.com/p/news/national/zappos_cyber_attack_pWsrU60crm8SGHJWYGuP7K (-1, , X, X- R/X/L) www.reuters.com/article/2012/10/12/net-us-wellsfargo-cyberattacks-idUSBRE89B1C620121012 (-1, , X, X- R/X/L) articles.latimes.com/2012/jun/06/business/la-fi-tn-eharmony-hacked-linkedin-20120606 (-1, , X, X- R/X/L) www.dhs.gov/ynews/releases/20110803-napolitano-holder-announce-largest-prosecution-criminal-network.shtm (-1, , X, X- R/X/L) economist.com/displaystory.cfm?story_id=9723768 (-1, , X, X- R/X/L) bjc.oxfordjournals.org/cgi/content/short/38/2/201 (-1, , X, X- R/X/L) books.google.co.uk/books?id=gsWQ-xgbLbUC&lpg=PA130&ots=RgwCYAMetX&dq=%22threats%20to%20harm%22%20cybercrime&pg=PA91#v=onepage&q=harm&f=false (-1, -1, X, X- R/X/L) www.law.com/jsp/decision_friendly.jsp?id=1202481645474 (-1, , X, X- R/X/L) www.nerac.com/family/NeracReports/Cybercrimes_CT.htm (-1, , X, X- R/X/L) www.victimsofcrime.org/our-programs/stalking-resource-center/stalking-laws/criminal-stalking-laws-by-state/south-Carolina (-1, , X, X- R/X/L) leg1.state.va.us/cgi-bin/legp504.exe?000+cod+18.2-152.7C1 (-1, , X, X- R/X/L) www.ussc.gov/Guidelines/2011_Guidelines/Manual_HTML/2g1_3.htm (-1, , X, X- R/X/L) papers.ssrn.com/sol3/papers.cfm?abstract_id=2493178 (-1, -1, X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/06/safe-browsing-protecting-web-users-for.html (-1, , X, X- R/X/L) www.crime-research.org/articles/joseph06/ (-1, , X, X- R/X/L) web.archive.org/web/20120320012856/http://www.carlisle.army.mil/DIME/documents/War%20is%20War%20Issue%20Paper%20Final2.pdf (-1, -1, X, X- R/X/L) www.cyphort.com/latest-sony-pictures-breach-deadly-cyber-extortion/ (-1, , X, X- R/X/L) www.ere-security.ca/PDF/Cyberextortion%20by%20DoS,%20Risk%20Magazine%20June%202006.pdf (-1, , X, X- R/X/L) www.ere-security.ca/PDF/Cyberextortion%20by%20DoS,%20Risk%20Magazine%20June%202006.pdf (-1, , X, X- R/X/L) bookreviews.infoversant.com/future-crimes-book-review/ (-1, 22, X, X- R/X/L) northdenvernews.com/cybercrime-costs-victims/ (-1, , X, X- R/X/L) research.microsoft.com/pubs/149886/SexLiesandCybercrimeSurveys.pdf (-1, , X, X- R/X/L) www.reuters.com/article/2014/06/09/us-cybersecurity-mcafee-csis-idUSKBN0EK0SV20140609 (-1, , X, X- R/X/L) www.law.duke.edu/journals/dltr/articles/2010dltr003.html (-1, , X, X- R/X/L) www.igiglobal.com/bookstore/titledetails.aspx?titleid=50518&detailstype=description (-1, , X, X- R/X/L)

    User is in a trusted group bot on some wikis
  22. 2016-01-21 03:07:55 (UTC): User 59.88.76.75 t • c • dc • l • ef • b • bl; (1) to Time management (edit | talk | history | links | watch | logs) (diff  !top) - Link: bookreviews.infoversant.com/time-management/ (R/Xmeta/L)
    Other links: bookreviews.infoversant.com/time-management/ (1, 22, 1, 1- R/X/L)
  • Displayed all 22 additions.