User contributions for Felix
Jump to navigation
Jump to search
7 June 2010
- 21:3221:32, 7 June 2010 diff hist −1,247 TemplateForSources Undo revision 623 by Felix (Talk)
- 21:3221:32, 7 June 2010 diff hist +1,247 TemplateForSources →Synopsis
- 21:2921:29, 7 June 2010 diff hist +1,549 The Future of the Internet and How To Stop It →Synopsis
- 21:2921:29, 7 June 2010 diff hist −1,439 TemplateForSources Undo revision 620 by Felix (Talk)
- 21:2821:28, 7 June 2010 diff hist +1,439 TemplateForSources No edit summary
- 21:2521:25, 7 June 2010 diff hist +656 N The Future of the Internet and How To Stop It New page: ==Full Title of Reference== The Future of the Internet and How To Stop It ==Full Citation== Jonathan L. Zittrain, The Future of the Internet and How To Stop It (2008) [http://futureofth...
- 21:2121:21, 7 June 2010 diff hist −1 Beyond Fear →Full Citation
- 21:2021:20, 7 June 2010 diff hist +598 N Beyond Fear New page: ==Full Title of Reference== Beyond Fear: Thinking Sensibly about Security in an Uncertain World ==Full Citation== Bruce Schneier, Beyond Fear: Thinking Sensibly about Security in an Unc...
4 June 2010
- 18:5318:53, 4 June 2010 diff hist −2 Strategy for Homeland Defense and Civil Support →Full Citation
- 18:5218:52, 4 June 2010 diff hist +4 The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets →Full Citation
- 18:4418:44, 4 June 2010 diff hist −29 Combatant Status and Computer Network Attack No edit summary
- 18:4318:43, 4 June 2010 diff hist +68 N Deterrence New page: Watts, Sean (2010) Combatant Status and Computer Network Attack
- 18:4218:42, 4 June 2010 diff hist +21 Combatant Status and Computer Network Attack No edit summary
- 18:4018:40, 4 June 2010 diff hist 0 Combatant Status and Computer Network Attack No edit summary
- 18:3318:33, 4 June 2010 diff hist 0 National Cyber Defense Financial Services Workshop Report No edit summary
- 18:3318:33, 4 June 2010 diff hist 0 National Cyber Defense Financial Services Workshop Report No edit summary
- 18:2918:29, 4 June 2010 diff hist +2 The Economics of Online Crime No edit summary
- 18:2618:26, 4 June 2010 diff hist −1 The Economics of Online Crime No edit summary
- 15:4215:42, 4 June 2010 diff hist +84 Incentives No edit summary
- 15:4215:42, 4 June 2010 diff hist +16 Economics of Malware No edit summary
- 15:3815:38, 4 June 2010 diff hist −3 Cyber-Insurance Metrics and Impact on Cyber-Security →Full Citation
- 15:3715:37, 4 June 2010 diff hist −36 Economics of Malware →Full Citation
- 15:3615:36, 4 June 2010 diff hist +1 Economics of Malware →Full Citation
- 15:3615:36, 4 June 2010 diff hist +767 N Economics of Malware New page: ==Full Title of Reference== Economics of Malware: Security Decisions, Incentives and Externalities ==Full Citation== Michel J. G. van Eeten and Johannes M. Bauer, OECD, Economics of Malw...
- 15:3415:34, 4 June 2010 diff hist −50 Economics of Cybersecurity No edit summary
- 15:2715:27, 4 June 2010 diff hist +225 N Government Networks (.gov) New page: Department of Homeland Security ''(2003)'' The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets Department of Defense ''(2005)'' [[Strategy for...
- 15:2615:26, 4 June 2010 diff hist 0 Strategy for Homeland Defense and Civil Support →Full Citation
- 15:2515:25, 4 June 2010 diff hist +4 Strategy for Homeland Defense and Civil Support →Full Citation
- 15:2415:24, 4 June 2010 diff hist −17 The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets →Full Citation
- 15:2215:22, 4 June 2010 diff hist 0 Cyber-Insurance Metrics and Impact on Cyber-Security →Key Words
- 15:2215:22, 4 June 2010 diff hist +2 Cyber-Insurance Metrics and Impact on Cyber-Security →Full Citation
- 15:1615:16, 4 June 2010 diff hist −1 An Economic Analysis of Notification Requirements for Data Security Breaches →Full Citation
- 15:0915:09, 4 June 2010 diff hist −107 A Theory of Disclosure for Security and Competitive Reasons No edit summary
- 15:0615:06, 4 June 2010 diff hist +1,451 N Much Ado About Notification New page: ==Full Title of Reference== Much Ado About Notification: Does the Rush to Pass State-Level Data Security Regulations Benefit Consumers? ==Full Citation== Thomas M. Lenard and Paul H. Ru...
- 15:0615:06, 4 June 2010 diff hist −79 Information Sharing/Disclosure No edit summary
- 15:0515:05, 4 June 2010 diff hist +7 Much Ado About Notification: Does the Rush to Pass State-Level Data Security Regulations Benefit Consumers →Full Citation current
- 15:0515:05, 4 June 2010 diff hist −32 Much Ado About Notification: Does the Rush to Pass State-Level Data Security Regulations Benefit Consumers No edit summary
- 15:0215:02, 4 June 2010 diff hist +120 A Theory of Disclosure for Security and Competitive Reasons →Full Title of Reference
- 15:0215:02, 4 June 2010 diff hist +5 A Theory of Disclosure for Security and Competitive Reasons →Full Citation
- 15:0115:01, 4 June 2010 diff hist +1,697 N A Theory of Disclosure for Security and Competitive Reasons New page: ==Full Title of Reference== ==Full Citation== Peter P. Swire, ''A Theory of Disclosure for Security and Competitive Reasons: Open Source, Proprietary Software, and Government Systems'' (...
- 15:0115:01, 4 June 2010 diff hist −59 Information Sharing/Disclosure No edit summary
- 15:0115:01, 4 June 2010 diff hist +2,168 N A Model for When Disclosure Helps Security New page: ==Full Title of Reference== A Model for When Disclosure Helps Security: What is Different About Computer and Network Security? ==Full Citation== Peter P. Swire, ''A Model for When D...
- 15:0015:00, 4 June 2010 diff hist −55 Information Sharing/Disclosure No edit summary
- 14:5914:59, 4 June 2010 diff hist −33 A Model for When Disclosure Helps Security: What Is Different About Computer and Network Security →Key Words current
- 14:5914:59, 4 June 2010 diff hist +7 A Model for When Disclosure Helps Security: What Is Different About Computer and Network Security →Full Citation
- 14:5814:58, 4 June 2010 diff hist +7 A Model for When Disclosure Helps Security: What Is Different About Computer and Network Security →Full Citation
- 14:5614:56, 4 June 2010 diff hist −26 A Model for When Disclosure Helps Security: What Is Different About Computer and Network Security →Full Citation
- 14:5114:51, 4 June 2010 diff hist +36 Do Data Breach Disclosure Laws Reduce Identity Theft No edit summary
- 14:4914:49, 4 June 2010 diff hist 0 Cyber-Insurance Metrics and Impact on Cyber-Security →Full Citation
- 14:4914:49, 4 June 2010 diff hist +1 Cyber-Insurance Metrics and Impact on Cyber-Security →Full Citation