Misplaced Pages

Sysop

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

This is an old revision of this page, as edited by 189.236.178.176 (talk) at 06:38, 24 July 2016. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Revision as of 06:38, 24 July 2016 by 189.236.178.176 (talk)(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff) For sysops ("admins") on Misplaced Pages, see Misplaced Pages:Administrators. For Systems Operator (aircraft crew member), see Flight engineer.

A sysop (/ˈsɪsɒp/; an abbrevirefer to administrators of other Internet-based network services.

Co-sysops are users who may be granted certain admin privileges on a BBS. Generally, they help validate users and monitor discussion forums. Some serve as file clerks, reviewing, describing, and publishing newly uploaded files into appropriate download directories.

Historically, the term system operator applied to operators of any computer system, especially a mainframe computer. In general, a sysop is a person who oversees the operation of a server, typically in a large computer system. Usage of the term became popular in the late 1980s and 1990s, originally in reference to BBS operators. A person with equivalent functions on a network host or server is typically called a sysadmin, short for system administrator.

Because such duties were often shared with that of the sysadmin prior to the advent of the World Wide Web, the term sysop is often used more generally to refer to an administrator or moderator, such as a forum administrator. Hence, the term sysadmin is technically used to distinguish the professional position of a network operator.

Sysop prerogative

Sysop prerogative is a legalterm in the website's rules says that the copyright in the posted content belongs to the poster, then the systems operator cannot then make it their copyright without the user agreeing first, under contract law.

See also

References

  1. ^ Rhodes, D. & Butler, D. (2002). Solaris Operating Environment Boot Camp. Prentice Hall Professional.
  2. Gupta, A. (2004). Hacking In The Computer World. Mittal Publications.
  3. Jansen, E. & James,V. (2002). NetLingo: the Internet dictionary. Netlingo Inc., Oxnard, CA
  4. Cavazos, E.A. Cyberspace and the Law: Your Rights and Duties in the On-line World. MIT Press, Cambridge, MA
  5. Bishop, J. (2011). "All’s WELL that ends WELL: A comparative analysis of the Constitutional and Administrative Frameworks of Cyberspace and the United Kingdom". In: A. Dudley-Sponaugle & J. Braman (Eds). Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices. IGI Global: New York, NY.
  6. Bishop, J. (2013). The Art of Trolling Law Enforcement: A Review and Model for implementing ‘flame trolling’ legislation enacted in Great Britain (1981-2012), International Review of Law, Computers and Technology 27(3), 301-318.
  7. Bishop, J. (2011). Mum’s the WordPress: A Comparative Analysis of Political and Mommy Bloggers. In Hamid R. Arabnia; Victor A. Clincy & Ashu M. G. Solo (Eds.) Proceedings of The 2011 Internet Conference on Internet Computing (ICOMP’2011). July 18–21, 2011. Las Vegas Nevada, USA.


Bulletin board systems
Culture
Technologies
Networks
Media coverage
People
Categories: