Submitting Feedback: Difference between revisions
No edit summary |
|||
(2 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
The wiki is currently closed to external editors as we finalize the content and underlying structure of the Literature Review. However, the materials featured in this wiki are just a starting point for our inquiry and we look forward to building upon them with more recent publications. The wiki's approach to [[Cybersecurity Overview|defining Cybersecurity]] remains open and inclusive, therefore we would welcome suggestions from various related fields. | The wiki is currently closed to external editors as we finalize the content and underlying structure of the Literature Review. However, the materials featured in this wiki are just a starting point for our inquiry and we look forward to building upon them with more recent publications. The wiki's approach to [[Cybersecurity Overview|defining Cybersecurity]] remains open and inclusive, therefore we would welcome suggestions from various related fields. | ||
Line 25: | Line 23: | ||
** Please consult the [[Table of Contents]] for a list of existing document types. | ** Please consult the [[Table of Contents]] for a list of existing document types. | ||
* Keywords | * Keywords | ||
** If available, pull a list of keywords from a publication (e.g. cybersecurity, public goods, and security goods | ** If available, pull a list of keywords from your a publication (e.g. "cybersecurity, public goods, and security goods" are potential keywords from [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=708562 this article]). | ||
* Synopsis | * Synopsis | ||
** | ** The purpose of the synopsis is to provide a concise overview of the main arguments presented in the article, and highlight its relevance to the understanding of cybersecurity issues. | ||
** If available, please attach an abstract. | ** If available, please attach an abstract. | ||
==Additional Notes== | ==Additional Notes== | ||
This section refers to any further context that you could provide for the submission such as book reviews, conference reports, key articles referenced in footnotes, or a table of contents. | This section refers to any further context that you could provide for the submission such as book reviews, conference reports, key articles referenced in footnotes, or a table of contents. |
Latest revision as of 16:33, 7 August 2012
The wiki is currently closed to external editors as we finalize the content and underlying structure of the Literature Review. However, the materials featured in this wiki are just a starting point for our inquiry and we look forward to building upon them with more recent publications. The wiki's approach to defining Cybersecurity remains open and inclusive, therefore we would welcome suggestions from various related fields.
If you have suggestions for inclusion in the wiki we request that you send them to cybersecurity-feedback@cyber.law.harvard.edu, following the format outline below.
Information to Include
Each suggestion must include the following information:
- Full citation, including at a minimum:
- Full title
- Author (or publishing Agency)
- Year
- Link to document (or to where a document can be purchased in case access is restricted)
Formatting
All entries on the wiki follow a certain format. It would be helpful if your submission will include the following sections:
- Full title of reference
- Full citation
- Categorization
- Please consult the Table of Contents for a list of existing categories.
- Please limit yourself to three categories per entry.
- Type
- Please consult the Table of Contents for a list of existing document types.
- Keywords
- If available, pull a list of keywords from your a publication (e.g. "cybersecurity, public goods, and security goods" are potential keywords from this article).
- Synopsis
- The purpose of the synopsis is to provide a concise overview of the main arguments presented in the article, and highlight its relevance to the understanding of cybersecurity issues.
- If available, please attach an abstract.
Additional Notes
This section refers to any further context that you could provide for the submission such as book reviews, conference reports, key articles referenced in footnotes, or a table of contents.