User contributions for Jacob
Jump to navigation
Jump to search
9 June 2010
- 11:1411:14, 9 June 2010 diff hist −1 Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games No edit summary
- 11:1311:13, 9 June 2010 diff hist +180 Keyword Index and Glossary of Core Ideas No edit summary
- 11:1211:12, 9 June 2010 diff hist +1,750 N Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games New page: ==Full Title of Reference== Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games? ==Full Citation== Michael Stohl, ''Cyber Terrorism: A Cle...
- 11:0911:09, 9 June 2010 diff hist +30 Table of Contents No edit summary
- 10:5510:55, 9 June 2010 diff hist +127 Suggested References to Add to Wiki No edit summary
- 10:5110:51, 9 June 2010 diff hist −119 Law and War in the Virtual Era →Key Words
- 10:4910:49, 9 June 2010 diff hist +93 Keyword Index and Glossary of Core Ideas →Virtual Military Technologies
- 10:4710:47, 9 June 2010 diff hist +123 Law and War in the Virtual Era →Key Words
- 10:2610:26, 9 June 2010 diff hist +17 Modeling Cyber-Insurance →Full Citation
- 10:2510:25, 9 June 2010 diff hist +679 N Modeling Cyber-Insurance New page: ==Full Title of Reference== Modeling Cyber-Insurance: Towards A Unified Framework ==Full Citation== Rainer Bohme and Galina Schwartz ''Modeling Cyber-Insurance'', Workshop on the Economi...
- 10:0910:09, 9 June 2010 diff hist +105 Insurance No edit summary
8 June 2010
- 15:4515:45, 8 June 2010 diff hist −2 Law and War in the Virtual Era →Additional Notes and Highlights
- 15:4415:44, 8 June 2010 diff hist +106 Law and War in the Virtual Era →Additional Notes and Highlights
- 10:5810:58, 8 June 2010 diff hist +1,390 N An Introduction to Key Themes in the Economics of Cyber Security New page: ==Full Title of Reference== An Introduction to Key Themes in the Economics of Cyber Security ==Full Citation== Neil Gandal, "An Introduction to Key Themes in the Economics of Cybersecuri...
- 10:5210:52, 8 June 2010 diff hist −5 Economics of Cybersecurity No edit summary
- 10:5210:52, 8 June 2010 diff hist +99 Economics of Cybersecurity No edit summary
- 10:4210:42, 8 June 2010 diff hist +1 The Law and Economics of Cybersecurity: An Introduction →Full Citation current
- 10:4210:42, 8 June 2010 diff hist +2 The Law and Economics of Cybersecurity: An Introduction →Full Citation
- 10:4210:42, 8 June 2010 diff hist +1 The Law and Economics of Cybersecurity: An Introduction →Categorization
- 10:4210:42, 8 June 2010 diff hist −1,989 The Law and Economics of Cybersecurity: An Introduction No edit summary
- 10:4110:41, 8 June 2010 diff hist +3,464 N The Law and Economics of Cybersecurity: An Introduction New page: Jennifer Stisa Granick, ''The Price of Restricting Vulnerability Publications'' (2007), International Journal of Communications Law & Policy, Vol. 9, Spring 2005. [http://www.ijclp.net/...
- 10:3110:31, 8 June 2010 diff hist +4 Regulation/Liability No edit summary
- 10:3110:31, 8 June 2010 diff hist +100 N Regulation/Liability New page: Grady, Mark and Parisi, Francesco (''2006'') The Law and Economics of Cybersecurity: An Introduction
- 10:2210:22, 8 June 2010 diff hist 0 Economics of Malware: Security Decisions, Incentives and Externalities →Full Citation current
- 10:2210:22, 8 June 2010 diff hist +143 Economics of Malware: Security Decisions, Incentives and Externalities →Full Citation
- 10:1210:12, 8 June 2010 diff hist +56 Law and War in the Virtual Era →Additional Notes and Highlights
- 10:1010:10, 8 June 2010 diff hist +107 Law and War in the Virtual Era →Additional Notes and Highlights
7 June 2010
- 17:5017:50, 7 June 2010 diff hist +4 Managing Online Security Risks →Full Citation
- 17:5017:50, 7 June 2010 diff hist +663 N Managing Online Security Risks New page: ==Full Title of Reference== Managing Online Security Risks ==Full Citation== Hal Varian, NYT, Managing Online Security Risks (June 1, 2000). [http://people.ischool.berkeley.edu/~hal/peo...
- 17:0717:07, 7 June 2010 diff hist +59 International Law (including Laws of War) No edit summary
- 17:0617:06, 7 June 2010 diff hist +138 Law and War in the Virtual Era →Key Words
- 17:0517:05, 7 June 2010 diff hist −13 Law and War in the Virtual Era →Categorization
- 17:0417:04, 7 June 2010 diff hist +90 Law and War in the Virtual Era →Categorization
- 14:5914:59, 7 June 2010 diff hist −4 Cybersecurity Annotated Bibliography No edit summary
- 14:4514:45, 7 June 2010 diff hist +20 Law and War in the Virtual Era No edit summary
- 14:4414:44, 7 June 2010 diff hist −18 Law and War in the Virtual Era No edit summary
- 14:4214:42, 7 June 2010 diff hist +11,696 Law and War in the Virtual Era No edit summary
4 June 2010
- 14:4814:48, 4 June 2010 diff hist +60 Security Economics and the Internal Market No edit summary
- 14:3414:34, 4 June 2010 diff hist +25 Notification of Data Security Breaches No edit summary
- 14:3314:33, 4 June 2010 diff hist +63 Notification of Data Security Breaches No edit summary
- 14:2814:28, 4 June 2010 diff hist +20 Do Data Breach Disclosure Laws Reduce Identity Theft No edit summary
- 14:2014:20, 4 June 2010 diff hist +2 The Economics of Information Security No edit summary
- 14:0514:05, 4 June 2010 diff hist +2 The Price of Restricting Vulnerability Publications No edit summary
- 14:0114:01, 4 June 2010 diff hist −5 The Price of Restricting Vulnerability Publications No edit summary
- 14:0114:01, 4 June 2010 diff hist +157 The Price of Restricting Vulnerability Publications No edit summary
- 11:1311:13, 4 June 2010 diff hist +110 Impact of Software Vulnerability Announcements on the Market Value of Software Vendors - An Empirical Investigation No edit summary
- 11:0611:06, 4 June 2010 diff hist +2,466 Overcoming Impediments to Information Sharing No edit summary
- 11:0211:02, 4 June 2010 diff hist +1 Do Data Breach Disclosure Laws Reduce Identity Theft No edit summary
- 11:0211:02, 4 June 2010 diff hist −1 Do Data Breach Disclosure Laws Reduce Identity Theft No edit summary
- 11:0211:02, 4 June 2010 diff hist +116 Do Data Breach Disclosure Laws Reduce Identity Theft No edit summary