TemplateForSources: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
 
(28 intermediate revisions by 3 users not shown)
Line 1: Line 1:
==Full Title of Reference==
==Full Title of Reference==
The Origin of Altruism


==Full Citation==
==Full Citation==


Bruce [URL_of_Article_if_Available_Online  ''Web'']
''Citation should be in Bluebook Style.  For example, for an article in a journal:''
 
John Maynard Smith, ''The Origin of Altruism,'' 639 Nature 393 (1998). [URL_of_Article_if_Available_Online  ''Web''] [Alternate_URL_of_Article  ''AltWeb'']
 
[URL.to.Google_Books_Entry ''Google Books''] <- these are all optional but include if available.


[URL.of.Bibliography_Detailed_Entry ''BibTeX'']
[URL.to.World_Cat_Entry ''World Cat'']


[URL.to.Amazon_or_Amazon_Scholars_Entry ''Amazon'']


==Categorization==
==Categorization==
* Resource by Type: [[Journal Article]]
* Threats and Actors: [[States]]
* Issues: [[Cyberwar]]
* Approaches: [[International Law (including Laws of War)]]
''If there is more than one category for heading, separate by comma.''


Issues: [[Cyberwar]]
==Key Words==   


==Key Words==
''If available, copy keywords from journal listing of related terms, separated by comma.''


''See the article itself for any key words as a starting point''
Computer Crimes -- Military Aspects, Regulations And Rules, War (International law) -- Laws


==Synopsis==
==Synopsis==


book explains the engine that has catapulted the Internet from backwater to ubiquity—and reveals that it is sputtering precisely because of its runaway success. With the unwitting help of its users, the generative Internet is on a path to a lockdown, ending its cycle of innovation—and facilitating unsettling new kinds of control.
''The purpose of the synopsis is to give the reader not only the subject matter of the reference but also the authors' conclusions. The goal should be to include what would be included  in an Executive Summary. You can copy relevant paragraphs (enclose into format), or summarize or reprint an provided executive summary.''
 
IPods, iPhones, Xboxes, and TiVos represent the first wave of Internet-centered products that can’t be easily modified by anyone except their vendors or selected partners. These “tethered appliances” have already been used in remarkable but little-known ways: car GPS systems have been reconfigured at the demand of law enforcement to eavesdrop on the occupants at all times, and digital video recorders have been ordered to self-destruct thanks to a lawsuit against the manufacturer thousands of miles away. New Web 2.0 platforms like Google mash-ups and Facebook are rightly touted—but their applications can be similarly monitored and eliminated from a central source. As tethered appliances and applications eclipse the PC, the very nature of the Internet—its “generativity,” or innovative character—is at risk.
 
The Internet’s current trajectory is one of lost opportunity. Its salvation, Zittrain argues, lies in the hands of its millions of users. Drawing on generative technologies like Wikipedia that have so far survived their own successes, this book shows how to develop new technologies and social structures that allow users to work creatively and collaboratively, participate in solutions, and become true “netizens.


==Additional Notes and Highlights==
==Additional Notes and Highlights==


'' * Outline key points of interest
''Outline key points of interest or other information that does not fit in one of the topics above including links to reviews, citations of the reference, online discussions, Table of Contents, sample chapters if the full reference is not available online.''

Latest revision as of 14:47, 6 August 2012

Full Title of Reference

The Origin of Altruism

Full Citation

Citation should be in Bluebook Style. For example, for an article in a journal:

John Maynard Smith, The Origin of Altruism, 639 Nature 393 (1998). [URL_of_Article_if_Available_Online Web] [Alternate_URL_of_Article AltWeb]

[URL.to.Google_Books_Entry Google Books] <- these are all optional but include if available.

[URL.to.World_Cat_Entry World Cat]

[URL.to.Amazon_or_Amazon_Scholars_Entry Amazon]

Categorization

If there is more than one category for heading, separate by comma.

Key Words

If available, copy keywords from journal listing of related terms, separated by comma.

Computer Crimes -- Military Aspects, Regulations And Rules, War (International law) -- Laws

Synopsis

The purpose of the synopsis is to give the reader not only the subject matter of the reference but also the authors' conclusions. The goal should be to include what would be included in an Executive Summary. You can copy relevant paragraphs (enclose into format), or summarize or reprint an provided executive summary.

Additional Notes and Highlights

Outline key points of interest or other information that does not fit in one of the topics above including links to reviews, citations of the reference, online discussions, Table of Contents, sample chapters if the full reference is not available online.