Help: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
 
(7 intermediate revisions by the same user not shown)
Line 1: Line 1:
==Navigating Through the  [[Table of Contents]]==
==Navigating Through the  [[Table of Contents]]==
Because this bibliography encompasses such a wide range of cybersecurity issues, the most direct way to get started is to look through the detailed '''[[Table of Contents]]''' and select '''Specific Issues or Themes''' of interest.  For example, [[Cybercrime | Cybercrime]] or [[Financial Institutions and Networks |Financial Institutions and Networks]].  At the top of each topic page within the Table of Contents is a "bread crumb" trail showing the path through the Table of Contents to that page. This trail not only shows you how the current page topic fits into the overall structure of the bibliography, each level in this trail is individually selectable allowing you to move up one or more levels to broaden your search.  For example, if you are looking at the ''[[Table of Contents | TOC->]][[Issues | Issues->]][[Economics of Cybersecurity | Economics of Cybersecurity->]][[Incentives]]'' page, you can click on the [[Issues | Issues->]] link to see references addressing all the cybersecurity Issues topics.
Because this bibliography encompasses such a wide range of cybersecurity issues, the most direct way to get started is to look through the detailed '''[[Table of Contents]]''' and select specific issues or themes of interest.  For example, [[Cybercrime]] or [[Financial Institutions and Networks]].  At the top of each topic page within the Table of Contents is a "bread crumb" trail showing the path through the Table of Contents to that page. This trail not only shows you how the current page topic fits into the overall structure of the bibliography, each level in this trail is individually selectable allowing you to move up one or more levels to broaden your search.  For example, if you are looking at the ''[[Table of Contents | TOC->]][[Issues | Issues->]][[Economics of Cybersecurity | Economics of Cybersecurity->]][[Incentives]]'' page, you can click on the [[Issues | Issues->]] link to see references addressing all the cybersecurity Issues topics.


At the bottom of each topic page is a list of subcategories leading deeper into the Table of Contents from the current topic.  This allows you to drill down to pages with greater specificity.  For example, if the current page is ''[[Table of Contents | TOC->]][[Issues | Issues->]][[Economics of Cybersecurity | Economics of Cybersecurity->]]'' (shown in the bread crumb trail at the top of the page), the bottom of the page will offer links to the five subcategories of the '''[[Economics of Cybersecurity]]''' including:
Each topic page also features a [[#How to Use the Filter|filtering tool]] to quickly narrow down searches.
 
*''[[Economics of Cybersecurity | Economics of Cybersecurity->]][[Risk Management and Investment]]''
*''[[Economics of Cybersecurity | Economics of Cybersecurity->]][[Incentives]]''
*''[[Economics of Cybersecurity | Economics of Cybersecurity->]][[Insurance]]''
*''[[Economics of Cybersecurity | Economics of Cybersecurity->]][[Behavioral Economics]]''
*''[[Economics of Cybersecurity | Economics of Cybersecurity->]][[Market Failure]]''
 
==Choose a [[Broad Topics | Broad Topic Area]] to Explore==
If you are interested in beginning with a broad topic area, however, you might choose to start your search from one of the '''[[Broad Topics]]'''.  This allows you to search within the broad categories of '''[[Overview]]''', '''[[Resource by Type]]''', '''[[Threats_and_Actors | Threats and Actors]]''', '''[[Issues | Issues]]''', and '''[[Approaches | Approaches]]'''.


==See the [[Cybersecurity Annotated Bibliography| List of All Articles]]==
==See the [[Cybersecurity Annotated Bibliography| List of All Articles]]==
Line 28: Line 19:


==Choose a Case Study==
==Choose a Case Study==
The [[Case Studies]] page presents a list of selected case studies with short summaries and links to related literature such as news articles and investigative reports.
The [[:Category: Case Studies|Case Studies]] page presents a list of selected case studies with short summaries and links to related literature such as news articles and investigative reports.


==View Suggested Syllabi==
==View Suggested Syllabi (H2O)==
The [http://h2odev.law.harvard.edu/playlists/603 Suggested Syllabi] section uses the [http://h2odev.law.harvard.edu H2O] platform to feature a selection of playlists for instruction.
The [http://h2odev.law.harvard.edu/playlists/603 Suggested Syllabi] section uses the [http://h2odev.law.harvard.edu H2O] platform to feature a selection of playlists for instruction. [http://h2odev.law.harvard.edu H2O] is a Web-based platform for creating, editing, organizing, consuming, and sharing course materials. Using [http://cyber.law.harvard.edu/research/h2o H2O], professors may freely develop and collate course materials by selecting modules from a wide — and growing — repository and edit those modules to the sections that are most relevant to their particular pedagogy and approach.


==Wiki Resources==
==Wiki Resources==
This section contains some tools for wiki editing and management.
This section contains some tools for wiki contribution.


[[Adding a Reference | How to Add a New Reference to this Wiki]]
[[Submitting Feedback | How to Submit Feedback]]


[[TemplateForSources | Template for Sources]]
[[TemplateForSources | Template for Sources]]


Wiki [http://meta.wikimedia.org/wiki/Help:Contents User's Guide]
Wiki [http://meta.wikimedia.org/wiki/Help:Contents User's Guide]

Latest revision as of 21:08, 7 August 2012

Navigating Through the Table of Contents

Because this bibliography encompasses such a wide range of cybersecurity issues, the most direct way to get started is to look through the detailed Table of Contents and select specific issues or themes of interest. For example, Cybercrime or Financial Institutions and Networks. At the top of each topic page within the Table of Contents is a "bread crumb" trail showing the path through the Table of Contents to that page. This trail not only shows you how the current page topic fits into the overall structure of the bibliography, each level in this trail is individually selectable allowing you to move up one or more levels to broaden your search. For example, if you are looking at the TOC-> Issues-> Economics of Cybersecurity->Incentives page, you can click on the Issues-> link to see references addressing all the cybersecurity Issues topics.

Each topic page also features a filtering tool to quickly narrow down searches.

See the List of All Articles

An alphabetized filterable list of all documents in the wiki is available on the Cybersecurity Annotated Bibliography page.

How to Use the Filter

All pages listing articles contain a filtering tool for quick and easy customization of search results by type, category, or a free text search term.

Selecting more than one document type will display as a union of the results, e.g. checking "Book" and "Journal Article" will display both books and journal articles included in the list.

Only one category (or all categories) can be displayed at once, however, the default search will also display all subcategories. Thus, selecting "3.3 Security Targets" will also include documents categorized as "3.3.2 Private Critical Infrastructure" and "3.3.2.3 Transportation." To exclude subcategories, check the box under the categories drop-down menu.

Using the free text search field will return matches in all of the table's fields.

In addition, each column is sortable. This function is especially useful for searching by date, type, or author.

Choose a Case Study

The Case Studies page presents a list of selected case studies with short summaries and links to related literature such as news articles and investigative reports.

View Suggested Syllabi (H2O)

The Suggested Syllabi section uses the H2O platform to feature a selection of playlists for instruction. H2O is a Web-based platform for creating, editing, organizing, consuming, and sharing course materials. Using H2O, professors may freely develop and collate course materials by selecting modules from a wide — and growing — repository and edit those modules to the sections that are most relevant to their particular pedagogy and approach.

Wiki Resources

This section contains some tools for wiki contribution.

How to Submit Feedback

Template for Sources

Wiki User's Guide