Difference between revisions of "Cyber Operations"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 1: Line 1:
==[URL.of.PDF Title of PDF]==
==[Cyber Operations: The New Balance]==
==Full Citation==
==Full Citation==
''Chicago Style''
Stephen W. Korns, ''Cyber Operations: The New Balance,'' 54 Joint Force Quarterly 97 (2009). [http://www.carlisle.army.mil/DIME/documents/Cyber%20Operations%20-%20The%20New%20Balance%20-%20Korns.pdf ''Web'']
Article in Journal: John Maynard Smith, “The Origin of Altruism,” ''Nature'' 393 (1998): 639.
Article for Conference: Yanpei Chen, et al. "What's New About Cloud Computing Security?" Technical Report for the University of California at Berkeley, Electrical Engineering and Computer Sciences Department, January 20, 2010.
[URL.of.PDF. BibTeX]
[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=StephenW.Korns:2010&f=wikibiblio.bib BibTeX]
Issues: [[Laws of War/Cyberwar]]
Issues: [[Cyberwar]]
==Key Words==  
==Key Words==  
Line 23: Line 18:
''This could be an abstract from the article.''
''This could be an abstract from the article.''
==Policy Relevance==
''Policy and Legal Implications, relevant law.
==Case Examples==
==Additional Notes and Highlights==
==Additional Notes and Highlights==

Revision as of 14:26, 27 May 2010

[Cyber Operations: The New Balance]

Full Citation

Stephen W. Korns, Cyber Operations: The New Balance, 54 Joint Force Quarterly 97 (2009). Web



Issues: Cyberwar

Key Words

See the article itself for any key words as a starting point


This could be an abstract from the article.

Additional Notes and Highlights

* Outline key points of interest

* Include quotes if relevant/useful
* Consider how these themes relate to other cases, broader thematic areas, etc