Towards a Cyberspace Legal Regime in the Twenty-First Century: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 3: Line 3:
==Full Citation==
==Full Citation==


''Chicago Style''
Dunlap, Charles J., Jr. 2009: Towards a Cyberspace Legal Regime in the Twenty-First Century: Considerations for American Cyber-Warriors. Neb. L. Rev. 87, 712.


Dunlap, Charles J., Jr. 2009: Towards a Cyberspace Legal Regime in the Twenty-First Century. Considerations for American Cyber-Warriors. Neb. L. Rev. 87, 712.
[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=Dunlap_CJ:2010&f=wikibiblio.bib BibTeX]
 
Article for Conference: Yanpei Chen, et al. "What's New About Cloud Computing Security?" Technical Report for the University of California at Berkeley, Electrical Engineering and Computer Sciences Department, January 20, 2010.
 
[URL.of.PDF. Link]


==Key Words and Categorization==
==Key Words and Categorization==

Revision as of 11:39, 18 May 2010

[URL.of.PDF Title of PDF]

Full Citation

Dunlap, Charles J., Jr. 2009: Towards a Cyberspace Legal Regime in the Twenty-First Century: Considerations for American Cyber-Warriors. Neb. L. Rev. 87, 712.

BibTeX

Key Words and Categorization

See the article itself for any key words as a starting point

Synopsis

This could be an abstract from the article.

Policy Relevance

Policy and Legal Implications, relevant law.

Case Examples

Additional Notes and Highlights

* Outline key points of interest

* Include quotes if relevant/useful
* Consider how these themes relate to other cases, broader thematic areas, etc