Submitting Feedback: Difference between revisions
(Created page with "{{Header_Message}}") |
No edit summary |
||
Line 1: | Line 1: | ||
{{Header_Message}} | {{Header_Message}} | ||
The wiki is currently closed to external editors as we finalize the content and underlying structure of the Literature Review. However, the materials featured in this wiki are just a starting point for our inquiry and we look forward to building upon them with more recent publications. The wiki's approach to [[Cybersecurity Overview|defining Cybersecurity]] remains open and inclusive, therefore we would welcome suggestions from various related fields. | |||
If you have suggestions for inclusion in the wiki we request that you send them to [mailto:cybersecurity-feedback@cyber.law.harvard.edu cybersecurity-feedback@cyber.law.harvard.edu], following the format outline below. | |||
==Information to Include== | |||
Each suggestion must include the following information: | |||
* Full citation, including at a minimum: | |||
** Full title | |||
** Author (or publishing Agency) | |||
** Year | |||
* Link to document (or to where a document can be purchased in case access is restricted) | |||
==Formatting== | |||
All entries on the wiki follow a certain format. It would be helpful if your submission will include the following sections: | |||
* Full title of reference | |||
* Full citation | |||
* Categorization | |||
** Please consult the [[Table of Contents]] for a list of existing categories. | |||
** Please limit yourself to three categories per entry. | |||
* Type | |||
** Please consult the [[Table of Contents]] for a list of existing document types. | |||
* Keywords | |||
** If available, pull a list of keywords from a publication (e.g. cybersecurity, public goods, and security goods in [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=708562 this article]). | |||
* Synopsis | |||
** the purpose of the synopsis is to provide a concise overview of the main arguments presented in the article, and highlight its relevance to the understanding of cybersecurity issues. | |||
** If available, please attach an abstract. | |||
==Additional Notes== | |||
This section refers to any further context that you could provide for the submission such as book reviews, conference reports, key articles referenced in footnotes, or a table of contents. |
Revision as of 14:36, 7 August 2012
This page is currently under construction. Check back for updates soon. |
The wiki is currently closed to external editors as we finalize the content and underlying structure of the Literature Review. However, the materials featured in this wiki are just a starting point for our inquiry and we look forward to building upon them with more recent publications. The wiki's approach to defining Cybersecurity remains open and inclusive, therefore we would welcome suggestions from various related fields.
If you have suggestions for inclusion in the wiki we request that you send them to cybersecurity-feedback@cyber.law.harvard.edu, following the format outline below.
Information to Include
Each suggestion must include the following information:
- Full citation, including at a minimum:
- Full title
- Author (or publishing Agency)
- Year
- Link to document (or to where a document can be purchased in case access is restricted)
Formatting
All entries on the wiki follow a certain format. It would be helpful if your submission will include the following sections:
- Full title of reference
- Full citation
- Categorization
- Please consult the Table of Contents for a list of existing categories.
- Please limit yourself to three categories per entry.
- Type
- Please consult the Table of Contents for a list of existing document types.
- Keywords
- If available, pull a list of keywords from a publication (e.g. cybersecurity, public goods, and security goods in this article).
- Synopsis
- the purpose of the synopsis is to provide a concise overview of the main arguments presented in the article, and highlight its relevance to the understanding of cybersecurity issues.
- If available, please attach an abstract.
Additional Notes
This section refers to any further context that you could provide for the submission such as book reviews, conference reports, key articles referenced in footnotes, or a table of contents.