TemplateForSources: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
 
(20 intermediate revisions by 2 users not shown)
Line 1: Line 1:
==Full Title of Reference==
==Full Title of Reference==
The Origin of Altruism


==Full Citation==
==Full Citation==


''Citation should be in Bluebook Style.  Foe example for an article in a journal:''
''Citation should be in Bluebook Style.  For example, for an article in a journal:''


John Maynard Smith, ''The Origin of Altruism,'' 639 Nature 393 (1998).  [URL_of_Article_if_Available_Online  ''Web'']  [Alternate_URL_of_Article  ''AltWeb'']
John Maynard Smith, ''The Origin of Altruism,'' 639 Nature 393 (1998).  [URL_of_Article_if_Available_Online  ''Web'']  [Alternate_URL_of_Article  ''AltWeb'']


[URL.to.Bibliography_Detailed_Entry ''BibTeX'']
[URL.to.Google_Books_Entry ''Google Books''] <- these are all optional but include if available.
 
[URL.to.World_Cat_Entry ''World Cat'']
 
[URL.to.Amazon_or_Amazon_Scholars_Entry ''Amazon'']


==Categorization==
==Categorization==
* Resource by Type: [[Journal Article]]
* Threats and Actors: [[States]]
* Issues: [[Cyberwar]]
* Approaches: [[International Law (including Laws of War)]]


* Issues: [[Cyberwar]]; [[Incentives]]  <- put categories in alphabetical order separated by semicolons
''If there is more than one category for heading, separate by comma.''
 
* Approaches: [[Deterrence]]


==Key Words==    <- put keywords in alphabetical order separated by colons and makes sure the glossary has a link back to this wiki
==Key Words==     


[[Keyword_Index_and_Glossary_of_Core_Ideas#Computer_Network_Attack | Computer Network Attack]],
''If available, copy keywords from journal listing of related terms, separated by comma.''
[[Keyword_Index_and_Glossary_of_Core_Ideas#COTS_Software | COTS Software]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Warfare | Cyber Warfare]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Department_of_Homeland_Security | Department of Homeland Security]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#DDoS_Attack | Denial of Service Attacks]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Hacker | Hackers]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Intelligence_Infrastructure.2FInformation_Infrastructure | Intelligence Community]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Malware | Malicious Code (Malware)]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#National_Security | National Security]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Risk_Modeling | Risk Modeling]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Sponsored_Attacks | Sponsored Attacks]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#State_Affiliation | State Affiliation]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Worm | Worm]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Zero-Day_Exploit | Zero-Day Exploit]]


<- put keywords in alphabetical order separated by colons and makes sure the glossary entry has a link back to this wiki
Computer Crimes -- Military Aspects, Regulations And Rules, War (International law) -- Laws


==Synopsis==
==Synopsis==


''This could be an abstract from the article.''
''The purpose of the synopsis is to give the reader not only the subject matter of the reference but also the authors' conclusions.  The goal should be to include what would be included  in an Executive Summary.  You can copy relevant paragraphs (enclose into format), or summarize or reprint an provided executive summary.''


==Additional Notes and Highlights==
==Additional Notes and Highlights==


'' * Outline key points of interest
''Outline key points of interest or other information that does not fit in one of the topics above including links to reviews, citations of the reference, online discussions, Table of Contents, sample chapters if the full reference is not available online.''

Latest revision as of 14:47, 6 August 2012

Full Title of Reference

The Origin of Altruism

Full Citation

Citation should be in Bluebook Style. For example, for an article in a journal:

John Maynard Smith, The Origin of Altruism, 639 Nature 393 (1998). [URL_of_Article_if_Available_Online Web] [Alternate_URL_of_Article AltWeb]

[URL.to.Google_Books_Entry Google Books] <- these are all optional but include if available.

[URL.to.World_Cat_Entry World Cat]

[URL.to.Amazon_or_Amazon_Scholars_Entry Amazon]

Categorization

If there is more than one category for heading, separate by comma.

Key Words

If available, copy keywords from journal listing of related terms, separated by comma.

Computer Crimes -- Military Aspects, Regulations And Rules, War (International law) -- Laws

Synopsis

The purpose of the synopsis is to give the reader not only the subject matter of the reference but also the authors' conclusions. The goal should be to include what would be included in an Executive Summary. You can copy relevant paragraphs (enclose into format), or summarize or reprint an provided executive summary.

Additional Notes and Highlights

Outline key points of interest or other information that does not fit in one of the topics above including links to reviews, citations of the reference, online discussions, Table of Contents, sample chapters if the full reference is not available online.