Why do people execute breaching experiments? How do they do it? On this page we discuss, analyze, explore, and study why and how people execute breaching experiments — in particular whether it's possible to conduct one ethically, and if so, how they might be designed and executed to best inform policy and practice on WMF projects. People who have formally executed breaching experiments may be asked to provide some insight as to why and how they did it for the purpose of better understanding what motivates people to do it.
please do sign up below
Privatemusings 00:47, 18 January 2010 (UTC)
Please have a go at your own definition below;
Privatemusings 00:57, 18 January 2010 (UTC)
Wikiversity case study on the Mike Handel situation.
I have two lovely fake biographies on Wikipedia that have been there over 6 months. They've both been edited by other people, and contain fairly outlandish statements that anyone with an internet connection should know to be false. If they ever get removed, I'll write it all up at On Wikipedia, but they may perhaps remain forever and gradually become a part of history.
Plausible-sounding but fictitious references exist in Little Roger and the Goosebumps, but no effort has been made to remove them
This article on the Himalayan Panda was created on April Fools Day and lasted nearly 6 months before it was deleted. The reference and external link seemed to support it if you didn't read them carefully. It still lives on in a similar form on Persianne's user page.
Feel free to make suggestions below - you may even be able to make a point while you're at it! (see no.s 5 and 6 below ;-)
Feel free to answer (please sign with four tildas) below;
(newyorkbrad is a member of the english wikipedia's 'arbcom')
(sirfozzie is a member of the english wikipedia's 'arbcom')
Why do people execute breaching experiments? How do they do it? On this page we discuss, analyze, explore, and study why and how people execute breaching experiments — in particular whether it's possible to conduct one ethically, and if so, how they might be designed and executed to best inform policy and practice on WMF projects. People who have formally executed breaching experiments may be asked to provide some insight as to why and how they did it for the purpose of better understanding what motivates people to do it.
please do sign up below
Privatemusings 00:47, 18 January 2010 (UTC)
Please have a go at your own definition below;
Privatemusings 00:57, 18 January 2010 (UTC)
Wikiversity case study on the Mike Handel situation.
I have two lovely fake biographies on Wikipedia that have been there over 6 months. They've both been edited by other people, and contain fairly outlandish statements that anyone with an internet connection should know to be false. If they ever get removed, I'll write it all up at On Wikipedia, but they may perhaps remain forever and gradually become a part of history.
Plausible-sounding but fictitious references exist in Little Roger and the Goosebumps, but no effort has been made to remove them
This article on the Himalayan Panda was created on April Fools Day and lasted nearly 6 months before it was deleted. The reference and external link seemed to support it if you didn't read them carefully. It still lives on in a similar form on Persianne's user page.
Feel free to make suggestions below - you may even be able to make a point while you're at it! (see no.s 5 and 6 below ;-)
Feel free to answer (please sign with four tildas) below;
(newyorkbrad is a member of the english wikipedia's 'arbcom')
(sirfozzie is a member of the english wikipedia's 'arbcom')