User contributions for Jacob
Jump to navigation
Jump to search
9 June 2010
- 10:1410:14, 9 June 2010 diff hist −1 Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games No edit summary
- 10:1310:13, 9 June 2010 diff hist +180 Keyword Index and Glossary of Core Ideas No edit summary
- 10:1210:12, 9 June 2010 diff hist +1,750 N Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games New page: ==Full Title of Reference== Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games? ==Full Citation== Michael Stohl, ''Cyber Terrorism: A Cle...
- 10:0910:09, 9 June 2010 diff hist +30 Table of Contents No edit summary
- 09:5509:55, 9 June 2010 diff hist +127 Suggested References to Add to Wiki No edit summary
- 09:5109:51, 9 June 2010 diff hist −119 Law and War in the Virtual Era →Key Words
- 09:4909:49, 9 June 2010 diff hist +93 Keyword Index and Glossary of Core Ideas →Virtual Military Technologies
- 09:4709:47, 9 June 2010 diff hist +123 Law and War in the Virtual Era →Key Words
- 09:2609:26, 9 June 2010 diff hist +17 Modeling Cyber-Insurance →Full Citation
- 09:2509:25, 9 June 2010 diff hist +679 N Modeling Cyber-Insurance New page: ==Full Title of Reference== Modeling Cyber-Insurance: Towards A Unified Framework ==Full Citation== Rainer Bohme and Galina Schwartz ''Modeling Cyber-Insurance'', Workshop on the Economi...
- 09:0909:09, 9 June 2010 diff hist +105 Insurance No edit summary
8 June 2010
- 14:4514:45, 8 June 2010 diff hist −2 Law and War in the Virtual Era →Additional Notes and Highlights
- 14:4414:44, 8 June 2010 diff hist +106 Law and War in the Virtual Era →Additional Notes and Highlights
- 09:5809:58, 8 June 2010 diff hist +1,390 N An Introduction to Key Themes in the Economics of Cyber Security New page: ==Full Title of Reference== An Introduction to Key Themes in the Economics of Cyber Security ==Full Citation== Neil Gandal, "An Introduction to Key Themes in the Economics of Cybersecuri...
- 09:5209:52, 8 June 2010 diff hist −5 Economics of Cybersecurity No edit summary
- 09:5209:52, 8 June 2010 diff hist +99 Economics of Cybersecurity No edit summary
- 09:4209:42, 8 June 2010 diff hist +1 The Law and Economics of Cybersecurity: An Introduction →Full Citation current
- 09:4209:42, 8 June 2010 diff hist +2 The Law and Economics of Cybersecurity: An Introduction →Full Citation
- 09:4209:42, 8 June 2010 diff hist +1 The Law and Economics of Cybersecurity: An Introduction →Categorization
- 09:4209:42, 8 June 2010 diff hist −1,989 The Law and Economics of Cybersecurity: An Introduction No edit summary
- 09:4109:41, 8 June 2010 diff hist +3,464 N The Law and Economics of Cybersecurity: An Introduction New page: Jennifer Stisa Granick, ''The Price of Restricting Vulnerability Publications'' (2007), International Journal of Communications Law & Policy, Vol. 9, Spring 2005. [http://www.ijclp.net/...
- 09:3109:31, 8 June 2010 diff hist +4 Regulation/Liability No edit summary
- 09:3109:31, 8 June 2010 diff hist +100 N Regulation/Liability New page: Grady, Mark and Parisi, Francesco (''2006'') The Law and Economics of Cybersecurity: An Introduction
- 09:2209:22, 8 June 2010 diff hist 0 Economics of Malware: Security Decisions, Incentives and Externalities →Full Citation current
- 09:2209:22, 8 June 2010 diff hist +143 Economics of Malware: Security Decisions, Incentives and Externalities →Full Citation
- 09:1209:12, 8 June 2010 diff hist +56 Law and War in the Virtual Era →Additional Notes and Highlights
- 09:1009:10, 8 June 2010 diff hist +107 Law and War in the Virtual Era →Additional Notes and Highlights
7 June 2010
- 16:5016:50, 7 June 2010 diff hist +4 Managing Online Security Risks →Full Citation
- 16:5016:50, 7 June 2010 diff hist +663 N Managing Online Security Risks New page: ==Full Title of Reference== Managing Online Security Risks ==Full Citation== Hal Varian, NYT, Managing Online Security Risks (June 1, 2000). [http://people.ischool.berkeley.edu/~hal/peo...
- 16:0716:07, 7 June 2010 diff hist +59 International Law (including Laws of War) No edit summary
- 16:0616:06, 7 June 2010 diff hist +138 Law and War in the Virtual Era →Key Words
- 16:0516:05, 7 June 2010 diff hist −13 Law and War in the Virtual Era →Categorization
- 16:0416:04, 7 June 2010 diff hist +90 Law and War in the Virtual Era →Categorization
- 13:5913:59, 7 June 2010 diff hist −4 Cybersecurity Annotated Bibliography No edit summary
- 13:4513:45, 7 June 2010 diff hist +20 Law and War in the Virtual Era No edit summary
- 13:4413:44, 7 June 2010 diff hist −18 Law and War in the Virtual Era No edit summary
- 13:4213:42, 7 June 2010 diff hist +11,696 Law and War in the Virtual Era No edit summary
4 June 2010
- 13:4813:48, 4 June 2010 diff hist +60 Security Economics and the Internal Market No edit summary
- 13:3413:34, 4 June 2010 diff hist +25 Notification of Data Security Breaches No edit summary
- 13:3313:33, 4 June 2010 diff hist +63 Notification of Data Security Breaches No edit summary
- 13:2813:28, 4 June 2010 diff hist +20 Do Data Breach Disclosure Laws Reduce Identity Theft No edit summary
- 13:2013:20, 4 June 2010 diff hist +2 The Economics of Information Security No edit summary
- 13:0513:05, 4 June 2010 diff hist +2 The Price of Restricting Vulnerability Publications No edit summary
- 13:0113:01, 4 June 2010 diff hist −5 The Price of Restricting Vulnerability Publications No edit summary
- 13:0113:01, 4 June 2010 diff hist +157 The Price of Restricting Vulnerability Publications No edit summary
- 10:1310:13, 4 June 2010 diff hist +110 Impact of Software Vulnerability Announcements on the Market Value of Software Vendors - An Empirical Investigation No edit summary
- 10:0610:06, 4 June 2010 diff hist +2,466 Overcoming Impediments to Information Sharing No edit summary
- 10:0210:02, 4 June 2010 diff hist +1 Do Data Breach Disclosure Laws Reduce Identity Theft No edit summary
- 10:0210:02, 4 June 2010 diff hist −1 Do Data Breach Disclosure Laws Reduce Identity Theft No edit summary
- 10:0210:02, 4 June 2010 diff hist +116 Do Data Breach Disclosure Laws Reduce Identity Theft No edit summary