User contributions for Jacob
Jump to navigation
Jump to search
9 June 2010
- 15:1415:14, 9 June 2010 diff hist −1 Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games No edit summary
- 15:1315:13, 9 June 2010 diff hist +180 Keyword Index and Glossary of Core Ideas No edit summary
- 15:1215:12, 9 June 2010 diff hist +1,750 N Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games New page: ==Full Title of Reference== Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games? ==Full Citation== Michael Stohl, ''Cyber Terrorism: A Cle...
- 15:0915:09, 9 June 2010 diff hist +30 Table of Contents No edit summary
- 14:5514:55, 9 June 2010 diff hist +127 Suggested References to Add to Wiki No edit summary
- 14:5114:51, 9 June 2010 diff hist −119 Law and War in the Virtual Era →Key Words
- 14:4914:49, 9 June 2010 diff hist +93 Keyword Index and Glossary of Core Ideas →Virtual Military Technologies
- 14:4714:47, 9 June 2010 diff hist +123 Law and War in the Virtual Era →Key Words
- 14:2614:26, 9 June 2010 diff hist +17 Modeling Cyber-Insurance →Full Citation
- 14:2514:25, 9 June 2010 diff hist +679 N Modeling Cyber-Insurance New page: ==Full Title of Reference== Modeling Cyber-Insurance: Towards A Unified Framework ==Full Citation== Rainer Bohme and Galina Schwartz ''Modeling Cyber-Insurance'', Workshop on the Economi...
- 14:0914:09, 9 June 2010 diff hist +105 Insurance No edit summary
8 June 2010
- 19:4519:45, 8 June 2010 diff hist −2 Law and War in the Virtual Era →Additional Notes and Highlights
- 19:4419:44, 8 June 2010 diff hist +106 Law and War in the Virtual Era →Additional Notes and Highlights
- 14:5814:58, 8 June 2010 diff hist +1,390 N An Introduction to Key Themes in the Economics of Cyber Security New page: ==Full Title of Reference== An Introduction to Key Themes in the Economics of Cyber Security ==Full Citation== Neil Gandal, "An Introduction to Key Themes in the Economics of Cybersecuri...
- 14:5214:52, 8 June 2010 diff hist −5 Economics of Cybersecurity No edit summary
- 14:5214:52, 8 June 2010 diff hist +99 Economics of Cybersecurity No edit summary
- 14:4214:42, 8 June 2010 diff hist +1 The Law and Economics of Cybersecurity: An Introduction →Full Citation current
- 14:4214:42, 8 June 2010 diff hist +2 The Law and Economics of Cybersecurity: An Introduction →Full Citation
- 14:4214:42, 8 June 2010 diff hist +1 The Law and Economics of Cybersecurity: An Introduction →Categorization
- 14:4214:42, 8 June 2010 diff hist −1,989 The Law and Economics of Cybersecurity: An Introduction No edit summary
- 14:4114:41, 8 June 2010 diff hist +3,464 N The Law and Economics of Cybersecurity: An Introduction New page: Jennifer Stisa Granick, ''The Price of Restricting Vulnerability Publications'' (2007), International Journal of Communications Law & Policy, Vol. 9, Spring 2005. [http://www.ijclp.net/...
- 14:3114:31, 8 June 2010 diff hist +4 Regulation/Liability No edit summary
- 14:3114:31, 8 June 2010 diff hist +100 N Regulation/Liability New page: Grady, Mark and Parisi, Francesco (''2006'') The Law and Economics of Cybersecurity: An Introduction
- 14:2214:22, 8 June 2010 diff hist 0 Economics of Malware: Security Decisions, Incentives and Externalities →Full Citation current
- 14:2214:22, 8 June 2010 diff hist +143 Economics of Malware: Security Decisions, Incentives and Externalities →Full Citation
- 14:1214:12, 8 June 2010 diff hist +56 Law and War in the Virtual Era →Additional Notes and Highlights
- 14:1014:10, 8 June 2010 diff hist +107 Law and War in the Virtual Era →Additional Notes and Highlights
7 June 2010
- 21:5021:50, 7 June 2010 diff hist +4 Managing Online Security Risks →Full Citation
- 21:5021:50, 7 June 2010 diff hist +663 N Managing Online Security Risks New page: ==Full Title of Reference== Managing Online Security Risks ==Full Citation== Hal Varian, NYT, Managing Online Security Risks (June 1, 2000). [http://people.ischool.berkeley.edu/~hal/peo...
- 21:0721:07, 7 June 2010 diff hist +59 International Law (including Laws of War) No edit summary
- 21:0621:06, 7 June 2010 diff hist +138 Law and War in the Virtual Era →Key Words
- 21:0521:05, 7 June 2010 diff hist −13 Law and War in the Virtual Era →Categorization
- 21:0421:04, 7 June 2010 diff hist +90 Law and War in the Virtual Era →Categorization
- 18:5918:59, 7 June 2010 diff hist −4 Cybersecurity Annotated Bibliography No edit summary
- 18:4518:45, 7 June 2010 diff hist +20 Law and War in the Virtual Era No edit summary
- 18:4418:44, 7 June 2010 diff hist −18 Law and War in the Virtual Era No edit summary
- 18:4218:42, 7 June 2010 diff hist +11,696 Law and War in the Virtual Era No edit summary
4 June 2010
- 18:4818:48, 4 June 2010 diff hist +60 Security Economics and the Internal Market No edit summary
- 18:3418:34, 4 June 2010 diff hist +25 Notification of Data Security Breaches No edit summary
- 18:3318:33, 4 June 2010 diff hist +63 Notification of Data Security Breaches No edit summary
- 18:2818:28, 4 June 2010 diff hist +20 Do Data Breach Disclosure Laws Reduce Identity Theft No edit summary
- 18:2018:20, 4 June 2010 diff hist +2 The Economics of Information Security No edit summary
- 18:0518:05, 4 June 2010 diff hist +2 The Price of Restricting Vulnerability Publications No edit summary
- 18:0118:01, 4 June 2010 diff hist −5 The Price of Restricting Vulnerability Publications No edit summary
- 18:0118:01, 4 June 2010 diff hist +157 The Price of Restricting Vulnerability Publications No edit summary
- 15:1315:13, 4 June 2010 diff hist +110 Impact of Software Vulnerability Announcements on the Market Value of Software Vendors - An Empirical Investigation No edit summary
- 15:0615:06, 4 June 2010 diff hist +2,466 Overcoming Impediments to Information Sharing No edit summary
- 15:0215:02, 4 June 2010 diff hist +1 Do Data Breach Disclosure Laws Reduce Identity Theft No edit summary
- 15:0215:02, 4 June 2010 diff hist −1 Do Data Breach Disclosure Laws Reduce Identity Theft No edit summary
- 15:0215:02, 4 June 2010 diff hist +116 Do Data Breach Disclosure Laws Reduce Identity Theft No edit summary