| 8 | | * Volunteers are typically members of the general public who own Internet-connected PCs. Organizations such as schools and businesses may also volunteer the use of their computers. |
| 9 | | * Projects are typically academic (university-based) and do scientific research. But there are exceptions; for example, [http://www.mersenne.org/ GIMPS] and [http://www.distributed.net/ distributed.net] (two major projects) are not academic. |
| | 9 | * Volunteers are typically members of the general public who own Internet-connected PCs. |
| | 10 | Organizations such as schools and businesses may also volunteer the use of their computers. |
| | 11 | * Projects are typically academic (university-based) and do scientific research. |
| | 12 | But there are exceptions; for example, [http://www.mersenne.org/ GIMPS] |
| | 13 | and [http://www.distributed.net/ distributed.net] (two major projects) are not academic. |
| 13 | | * Volunteers are effectively anonymous; although they may be required to register and supply email address or other information, they are not linked to a real-world identity. |
| 14 | | * Because of their anonymity, volunteers are not '''accountable''' to projects. If a volunteer misbehaves in some way (for example, by intentionally returning incorrect computational results) the project cannot prosecute or discipline the volunteer. |
| | 17 | * Volunteers are effectively anonymous; although they may be required to register |
| | 18 | and supply email address or other information, they are not linked to a real-world identity. |
| | 19 | * Because of their anonymity, volunteers are not '''accountable''' to projects. |
| | 20 | If a volunteer misbehaves in some way (for example, by intentionally returning |
| | 21 | incorrect computational results) the project cannot prosecute or discipline the volunteer. |
| 16 | | * The volunteer trusts the project to provide applications that don't damage their computer or invade their privacy. |
| 17 | | * The volunteer trusts that the project is truthful about what work is being done by its applications, and how the resulting intellectual property will be used. |
| 18 | | * The volunteer trusts the project to follow proper security practices, so that hackers cannot use the project as a vehicle for malicious activities. |
| | 23 | * The volunteer trusts the project to provide applications |
| | 24 | that don't damage their computer or invade their privacy. |
| | 25 | * The volunteer trusts that the project is truthful about what work is being done by its applications, |
| | 26 | and how the resulting intellectual property will be used. |
| | 27 | * The volunteer trusts the project to follow proper security practices, |
| | 28 | so that hackers cannot use the project as a vehicle for malicious activities. |