Submitting Feedback: Difference between revisions
Line 25: | Line 25: | ||
** If available, pull a list of keywords from your a publication (e.g. "cybersecurity, public goods, and security goods" are potential keywords from [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=708562 this article]). | ** If available, pull a list of keywords from your a publication (e.g. "cybersecurity, public goods, and security goods" are potential keywords from [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=708562 this article]). | ||
* Synopsis | * Synopsis | ||
** | ** The purpose of the synopsis is to provide a concise overview of the main arguments presented in the article, and highlight its relevance to the understanding of cybersecurity issues. | ||
** If available, please attach an abstract. | ** If available, please attach an abstract. | ||
==Additional Notes== | ==Additional Notes== | ||
This section refers to any further context that you could provide for the submission such as book reviews, conference reports, key articles referenced in footnotes, or a table of contents. | This section refers to any further context that you could provide for the submission such as book reviews, conference reports, key articles referenced in footnotes, or a table of contents. |
Latest revision as of 16:33, 7 August 2012
The wiki is currently closed to external editors as we finalize the content and underlying structure of the Literature Review. However, the materials featured in this wiki are just a starting point for our inquiry and we look forward to building upon them with more recent publications. The wiki's approach to defining Cybersecurity remains open and inclusive, therefore we would welcome suggestions from various related fields.
If you have suggestions for inclusion in the wiki we request that you send them to cybersecurity-feedback@cyber.law.harvard.edu, following the format outline below.
Information to Include
Each suggestion must include the following information:
- Full citation, including at a minimum:
- Full title
- Author (or publishing Agency)
- Year
- Link to document (or to where a document can be purchased in case access is restricted)
Formatting
All entries on the wiki follow a certain format. It would be helpful if your submission will include the following sections:
- Full title of reference
- Full citation
- Categorization
- Please consult the Table of Contents for a list of existing categories.
- Please limit yourself to three categories per entry.
- Type
- Please consult the Table of Contents for a list of existing document types.
- Keywords
- If available, pull a list of keywords from your a publication (e.g. "cybersecurity, public goods, and security goods" are potential keywords from this article).
- Synopsis
- The purpose of the synopsis is to provide a concise overview of the main arguments presented in the article, and highlight its relevance to the understanding of cybersecurity issues.
- If available, please attach an abstract.
Additional Notes
This section refers to any further context that you could provide for the submission such as book reviews, conference reports, key articles referenced in footnotes, or a table of contents.