User contributions
Jump to navigation
Jump to search
- 19:11, 21 June 2010 diff hist -30 Security Economics and the Internal Market
- 19:09, 21 June 2010 diff hist +2,530 Security Economics and the Internal Market
- 19:08, 21 June 2010 diff hist +107 Keyword Index and Glossary of Core Ideas →Cyber Crime
- 19:07, 21 June 2010 diff hist +107 Keyword Index and Glossary of Core Ideas →E.U. Cybersecurity
- 19:06, 21 June 2010 diff hist +77 Deterrence
- 19:06, 21 June 2010 diff hist +78 Regulation/Liability
- 19:05, 21 June 2010 diff hist +78 Cybercrime
- 19:05, 21 June 2010 diff hist +76 N Public/Private Cooperation New page: Anderson, Ross, et. al (2008) Security Economics and the Internal Market
- 19:05, 21 June 2010 diff hist +78 Information Sharing/Disclosure
- 19:04, 21 June 2010 diff hist -4 Economics of Cybersecurity
- 19:04, 21 June 2010 diff hist +137 Security Economics and the Internal Market →Categorization
- 19:03, 21 June 2010 diff hist +628 Security Economics and the Internal Market →Key Words
- 18:33, 21 June 2010 diff hist +83 Regulation/Liability
- 18:33, 21 June 2010 diff hist +83 Information Sharing/Disclosure
- 18:32, 21 June 2010 diff hist +81 N Security Components of Classic Cyberissues (e.g. IP) New page: Anderson, Ross and Moore, Tyler (2006) The Economics of Information Security
- 18:32, 21 June 2010 diff hist +83 Risk Management and Investment
- 18:31, 21 June 2010 diff hist +83 Incentives
- 18:29, 21 June 2010 diff hist -4 Economics of Cybersecurity
- 18:28, 21 June 2010 diff hist +101 Keyword Index and Glossary of Core Ideas →Information Asymetries
- 18:27, 21 June 2010 diff hist +67 The Economics of Information Security →Key Words
- 18:26, 21 June 2010 diff hist +627 Keyword Index and Glossary of Core Ideas
- 18:21, 21 June 2010 diff hist +36 The Economics of Information Security →Categorization
- 18:20, 21 June 2010 diff hist +58 The Economics of Information Security →Categorization
- 18:15, 21 June 2010 diff hist -7 The Economics of Information Security →Synopsis
- 18:14, 21 June 2010 diff hist +2,436 The Economics of Information Security →Synopsis
- 15:54, 21 June 2010 diff hist +90 The Economics of Information Security →Categorization
- 15:40, 21 June 2010 diff hist 0 Regulation/Liability
- 15:40, 21 June 2010 diff hist +60 Regulation/Liability
- 15:39, 21 June 2010 diff hist +60 Incentives
- 15:39, 21 June 2010 diff hist 0 Risk Management and Investment
- 15:38, 21 June 2010 diff hist +60 Risk Management and Investment
- 15:37, 21 June 2010 diff hist -4 Economics of Cybersecurity
- 15:26, 21 June 2010 diff hist -5 Why Information Security is Hard →Offensive Operations Are Easier Than Defensive Ones
- 15:26, 21 June 2010 diff hist +92 Why Information Security is Hard →Synopsis
- 15:23, 21 June 2010 diff hist +4,627 Why Information Security is Hard →Synopsis
- 15:16, 21 June 2010 diff hist 0 Why Information Security is Hard →Synopsis
- 15:15, 21 June 2010 diff hist +674 Why Information Security is Hard →Synopsis
- 14:59, 21 June 2010 diff hist +89 Keyword Index and Glossary of Core Ideas →DDoS Attack
- 14:57, 21 June 2010 diff hist +99 Keyword Index and Glossary of Core Ideas →Botnet
- 14:57, 21 June 2010 diff hist +95 Keyword Index and Glossary of Core Ideas →Tragedy of Commons
- 14:57, 21 June 2010 diff hist 0 Why Information Security is Hard →Key Words
- 14:56, 21 June 2010 diff hist +272 Why Information Security is Hard →Key Words
- 14:56, 21 June 2010 diff hist +558 Keyword Index and Glossary of Core Ideas
- 14:49, 21 June 2010 diff hist +90 Why Information Security is Hard →Categorization
- 16:04, 17 June 2010 diff hist +97 Keyword Index and Glossary of Core Ideas →Risk Modeling
- 16:03, 17 June 2010 diff hist +97 Keyword Index and Glossary of Core Ideas →Research & Development
- 16:03, 17 June 2010 diff hist +39 Nothing Ventured, Nothing Gained current
- 16:02, 17 June 2010 diff hist +1,153 N Nothing Ventured, Nothing Gained New page: ==Full Title of Reference== Nothing Ventured, Nothing Gained ==Full Citation== Daniel E. Geer Jr. and Daniel G. Conway ''Nothing Ventured, Nothing Gained.'' IEEE Security & Privacy (201...
- 15:54, 17 June 2010 diff hist +83 Suggested References to Add to Wiki
- 15:38, 17 June 2010 diff hist +69 Keyword Index and Glossary of Core Ideas →National Security
- 15:37, 17 June 2010 diff hist +70 Keyword Index and Glossary of Core Ideas →Intelligence Infrastructure/Information Infrastructure
- 15:37, 17 June 2010 diff hist +4,546 N Nuclear Security New page: ==Full Title of Reference== Nuclear Security - Los Alamos National Laboratory Faces Challenges In Sustaining Physical and Cyber Security Improvements ==Full Citation== Gene Aloise, Na...
- 15:28, 17 June 2010 diff hist +91 Suggested References to Add to Wiki
- 15:20, 17 June 2010 diff hist +72 Keyword Index and Glossary of Core Ideas →Computer Network Attack
- 15:19, 17 June 2010 diff hist +72 Keyword Index and Glossary of Core Ideas →Department of Homeland Security
- 15:19, 17 June 2010 diff hist +71 Keyword Index and Glossary of Core Ideas →Einstein
- 15:18, 17 June 2010 diff hist +4,203 N Information Security New page: ==Full Title of Reference== Information Security - Concerted Effort Needed to Consolidate and Secure Internet Connections at Federal Agencies ==Full Citation== GAO, ''Information Secur... current
- 15:07, 17 June 2010 diff hist +644 Keyword Index and Glossary of Core Ideas
- 15:03, 17 June 2010 diff hist +37 Suggested References to Add to Wiki
- 19:47, 16 June 2010 diff hist +108 Keyword Index and Glossary of Core Ideas →Interdependencies
- 19:46, 16 June 2010 diff hist +108 Keyword Index and Glossary of Core Ideas →Intelligence Infrastructure/Information Infrastructure
- 19:46, 16 June 2010 diff hist +1,803 N Evolving Cybersecurity Issues in the Utility Industry New page: ==Full Title of Reference== Evolving Cybersecurity Issues in the Utility Industry ==Full Citation== Earl Perkins, ''Evolving Cybersecurity Issues in the Utility Industry'', published by...
- 19:33, 16 June 2010 diff hist +80 Suggested References to Add to Wiki
- 19:21, 16 June 2010 diff hist +27 Critical Infrastructure Protection →Full Citation
- 19:21, 16 June 2010 diff hist -47 Critical Infrastructure Protection
- 19:20, 16 June 2010 diff hist +4,379 N Critical Infrastructure Protection New page: ==Full Title of Reference== Critical Infrastructure Protection - Current Cyber Sector-Specific Planning Approach Needs Reassessment ==Full Citation== GAO, ''Critical Infrastrcture Prote...
- 19:09, 16 June 2010 diff hist +58 Cyber-Apocalypse Now →Categorization
- 19:02, 16 June 2010 diff hist +37 Suggested References to Add to Wiki
- 19:01, 16 June 2010 diff hist +1,762 N Current Cyber Sector-Specific Planning Approach Needs Reassessment New page: ==Full Title of Reference== Critical Infrastructure Protection - Current Cyber Sector-Specific Planning Approach Needs Reassessment ==Full Citation== GAO, ''Current Cyber Sector-Specifi... current
- 18:59, 16 June 2010 diff hist +83 Suggested References to Add to Wiki
- 18:53, 16 June 2010 diff hist +7 Continued Efforts are Needed to Protect Information Systems from Evolving Threats →Full Citation
- 18:52, 16 June 2010 diff hist +1,653 N Continued Efforts are Needed to Protect Information Systems from Evolving Threats New page: ==Full Title of Reference== Continued Efforts Are Needed to Protect Information Systems from Evolving Threats ==Full Citation== Gregort C. Wilshusen and David A. Powner, ''Continued Eff...
- 18:49, 16 June 2010 diff hist +39 Keyword Index and Glossary of Core Ideas
- 18:39, 16 June 2010 diff hist +137 Suggested References to Add to Wiki
- 18:14, 16 June 2010 diff hist +168 Keyword Index and Glossary of Core Ideas →State Affiliation
- 18:13, 16 June 2010 diff hist +168 Keyword Index and Glossary of Core Ideas →Laws of War
- 18:13, 16 June 2010 diff hist +168 Keyword Index and Glossary of Core Ideas →Cyber Terrorism
- 18:13, 16 June 2010 diff hist -2,091 Cyber-Apocalypse Now
- 18:00, 16 June 2010 diff hist +4,597 N Cyber-Apocalypse Now New page: ==Full Title of Reference== Estonia Three Years Later: A Progress Report on Combating Cyber Attacks ==Full Citation== Scott J. Shackelford, ''Estonia Three Years Later: A Progress Repor...
- 17:59, 16 June 2010 diff hist +144 Suggested References to Add to Wiki
- 21:11, 15 June 2010 diff hist +117 Keyword Index and Glossary of Core Ideas →Credit Card Fraud
- 21:10, 15 June 2010 diff hist +117 Keyword Index and Glossary of Core Ideas →Malware
- 21:10, 15 June 2010 diff hist +116 Keyword Index and Glossary of Core Ideas →Organized Crime
- 21:09, 15 June 2010 diff hist +117 Keyword Index and Glossary of Core Ideas →Hacker
- 21:09, 15 June 2010 diff hist +1 Keyword Index and Glossary of Core Ideas →Crimeware
- 21:08, 15 June 2010 diff hist +116 Keyword Index and Glossary of Core Ideas →Crimeware
- 21:08, 15 June 2010 diff hist -1 Cybersecurity in the Payment Card Industry →Key Words
- 21:07, 15 June 2010 diff hist -1 Cybersecurity in the Payment Card Industry →Categorization
- 21:07, 15 June 2010 diff hist +2,417 N Cybersecurity in the Payment Card Industry New page: =Cybersecurity in the Payment Card Industry= ==Full Citation== Richard A. Epstein and Thomas P. Brown, ''Cybersecurity in the Payment Card Industry'', 75 (1) U. Chi. L. Rev. 203-223 (200...
- 21:06, 15 June 2010 diff hist +25 Keyword Index and Glossary of Core Ideas
- 20:57, 15 June 2010 diff hist +96 Suggested References to Add to Wiki
- 17:16, 14 June 2010 diff hist +94 Keyword Index and Glossary of Core Ideas →E.U. Cybersecurity
- 17:16, 14 June 2010 diff hist +94 Keyword Index and Glossary of Core Ideas →Outreach and Collaboration
- 17:15, 14 June 2010 diff hist -1 Introduction to Country Reports →Key Words
- 17:15, 14 June 2010 diff hist +1,637 N Introduction to Country Reports New page: ==Full Title of Reference== Introduction to Country Reports ==Full Citation== ENISA, ''Introduction to Country Reports'' (2010). Report funded and prepared by ENISA. [http://www.enisa...
- 17:12, 14 June 2010 diff hist +26 Keyword Index and Glossary of Core Ideas
- 17:06, 14 June 2010 diff hist +50 Suggested References to Add to Wiki
- 16:48, 14 June 2010 diff hist -1 Keyword Index and Glossary of Core Ideas →Organized Crime
- 16:48, 14 June 2010 diff hist +162 Keyword Index and Glossary of Core Ideas →Outreach and Collaboration
- 16:47, 14 June 2010 diff hist +162 Keyword Index and Glossary of Core Ideas →National Cybersecurity Strategy (U.S.)
- 16:47, 14 June 2010 diff hist +1 Keyword Index and Glossary of Core Ideas →National Security
- 16:47, 14 June 2010 diff hist +161 Keyword Index and Glossary of Core Ideas →National Security
- 16:46, 14 June 2010 diff hist +2 Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress →Full Citation
- 16:45, 14 June 2010 diff hist +167 Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress →Keywords
- 16:44, 14 June 2010 diff hist +80 Keyword Index and Glossary of Core Ideas
- 16:43, 14 June 2010 diff hist +27 Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress →Categorization
- 16:41, 14 June 2010 diff hist +17 Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress →Recurring Issues and Efforts
- 16:40, 14 June 2010 diff hist +258 Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress →Some Selected Points and Themes from the Article
- 16:36, 14 June 2010 diff hist -66 Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress →Some Selected Points and Themes from the Article
- 16:34, 14 June 2010 diff hist +7 Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress →Full Citation
- 16:34, 14 June 2010 diff hist +10,150 N Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress New page: ==Full Title of Reference== Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress ==Full Citation== Catherine A. Theohary and Clay Wilson (2010), '...
- 16:04, 14 June 2010 diff hist +145 Suggested References to Add to Wiki
- 21:04, 11 June 2010 diff hist +132 Keyword Index and Glossary of Core Ideas →Cyber Terrorism
- 21:03, 11 June 2010 diff hist +132 Keyword Index and Glossary of Core Ideas →National Security
- 21:03, 11 June 2010 diff hist 0 Terrorist Capabilities for Cyberattack →Categorization
- 21:03, 11 June 2010 diff hist +3,306 N Terrorist Capabilities for Cyberattack New page: ==Full Title of Reference== Terrorist Capabilities for Cyberattack: Overview and Policy Issues ==Full Citation== John Rollins and Clay Wilson (2007), ''Terrorist Capabilities for Cyber...
- 20:55, 11 June 2010 diff hist -1 Suggested References to Add to Wiki
- 20:55, 11 June 2010 diff hist +111 Suggested References to Add to Wiki
- 19:44, 11 June 2010 diff hist +121 Keyword Index and Glossary of Core Ideas →National Security
- 19:44, 11 June 2010 diff hist +121 Keyword Index and Glossary of Core Ideas →Organized Crime
- 19:43, 11 June 2010 diff hist +121 Keyword Index and Glossary of Core Ideas →Computer Network Attack
- 19:43, 11 June 2010 diff hist +121 Keyword Index and Glossary of Core Ideas →Civilian Participation
- 19:43, 11 June 2010 diff hist +121 Keyword Index and Glossary of Core Ideas →State Affiliation
- 19:42, 11 June 2010 diff hist +4,620 Cyberspace and the National Security of the United Kingdom
- 19:41, 11 June 2010 diff hist +25 Keyword Index and Glossary of Core Ideas
- 19:40, 11 June 2010 diff hist +23 Keyword Index and Glossary of Core Ideas
- 19:13, 11 June 2010 diff hist +101 N Cyberspace and the National Security of the United Kingdom New page: http://www.chathamhouse.org.uk/publications/papers/download/-/id/726/file/13679_r0309cyberspace.pdf
- 19:12, 11 June 2010 diff hist +122 Suggested References to Add to Wiki
- 16:46, 11 June 2010 diff hist +151 Keyword Index and Glossary of Core Ideas →State Affiliation
- 16:45, 11 June 2010 diff hist +151 Keyword Index and Glossary of Core Ideas →Cyber Warfare
- 16:45, 11 June 2010 diff hist +151 Keyword Index and Glossary of Core Ideas →Casus Belli
- 16:44, 11 June 2010 diff hist +14 Cyber Security and Politically, Socially and Religiously Motivated Cyber Attacks →Full Citation
- 16:44, 11 June 2010 diff hist +4,932 N Cyber Security and Politically, Socially and Religiously Motivated Cyber Attacks New page: ==Full Title of Reference== Cyber Security and Politically, Socially and Religiously Motivated Cyber Attacks ==Full Citation== ''Cyber Security and Politically, Socially and Religiously...
- 16:34, 11 June 2010 diff hist +107 Suggested References to Add to Wiki
- 16:16, 11 June 2010 diff hist +117 Keyword Index and Glossary of Core Ideas →Hacktivism
- 16:16, 11 June 2010 diff hist +117 Keyword Index and Glossary of Core Ideas →Digital Pearl Harbor
- 16:16, 11 June 2010 diff hist +119 Keyword Index and Glossary of Core Ideas →Botnet
- 16:15, 11 June 2010 diff hist +1 Keyword Index and Glossary of Core Ideas →Cyber Terrorism
- 16:15, 11 June 2010 diff hist +116 Keyword Index and Glossary of Core Ideas →Cyber Terrorism
- 16:15, 11 June 2010 diff hist +1,359 N World War 3.0: Ten Critical Trends for Cybersecurity New page: ==Full Title of Reference== World War 3.0: Ten Critical Trends for Cybersecurity ==Full Citation== Marvin J. Cetron and Owen Davies, ''World War 3.0: Ten Critical Trends for Cybersecuri...
- 16:07, 11 June 2010 diff hist +100 Suggested References to Add to Wiki
- 15:31, 11 June 2010 diff hist +110 Keyword Index and Glossary of Core Ideas →Privacy Law
- 15:31, 11 June 2010 diff hist +111 Keyword Index and Glossary of Core Ideas →Data Mining
- 15:29, 11 June 2010 diff hist -2 Best Practices for Data Protection and Privacy →Synopsis
- 15:29, 11 June 2010 diff hist -5 Best Practices for Data Protection and Privacy →Full Citation
- 15:29, 11 June 2010 diff hist +2,165 N Best Practices for Data Protection and Privacy New page: ==Full Title of Reference== Best Practices for Data Protection and Privacy ==Full Citation== Alison A. Besunder, "Assisting Business Clients with Key Data Protection and Privacy Conside...
- 15:28, 11 June 2010 diff hist +38 Keyword Index and Glossary of Core Ideas
- 15:19, 11 June 2010 diff hist +80 Suggested References to Add to Wiki
- 15:09, 11 June 2010 diff hist +87 Keyword Index and Glossary of Core Ideas →Sponsored Attacks
- 15:09, 11 June 2010 diff hist +88 Keyword Index and Glossary of Core Ideas →Casus Belli
- 15:08, 11 June 2010 diff hist +1,002 N The Government and Cybersecurity New page: ==Full Title of Reference== The Government and Cybersecurity ==Full Citation== Steven M. Bellovin, ''The Government and Cybersecurity'' (2009), IEEE Security & Privacy, Vol. 7, No. 2. ...
- 15:06, 11 June 2010 diff hist +44 Keyword Index and Glossary of Core Ideas
- 14:57, 11 June 2010 diff hist +65 Suggested References to Add to Wiki
- 18:57, 9 June 2010 diff hist +160 Keyword Index and Glossary of Core Ideas →Crimeware
- 18:56, 9 June 2010 diff hist +160 Keyword Index and Glossary of Core Ideas →Malware
- 18:56, 9 June 2010 diff hist +160 Keyword Index and Glossary of Core Ideas →Botnet
- 18:55, 9 June 2010 diff hist -1 Emerging Threats to Internet Security
- 18:54, 9 June 2010 diff hist +1,866 N Emerging Threats to Internet Security New page: ==Full Title of Reference== Emerging Threats to Internet Security: Incentives, Externalities and Policy Implications ==Full Citation== Michel van Eeten and Johannes M. Bauer, ''Emergi...
- 18:42, 9 June 2010 diff hist 0 Suggested References to Add to Wiki
- 18:41, 9 June 2010 diff hist +144 Suggested References to Add to Wiki
- 18:24, 9 June 2010 diff hist +143 Keyword Index and Glossary of Core Ideas →Crimeware
- 18:23, 9 June 2010 diff hist +133 Incentives
- 18:23, 9 June 2010 diff hist +133 Economics of Cybersecurity
- 18:18, 9 June 2010 diff hist +75 N Transportation New page: Shah, Shashi K. (2004) The Evolving Landscape of Maritime Cybersecurity
- 18:17, 9 June 2010 diff hist +20 The Evolving Landscape of Maritime Cybersecurity →Categorization
- 18:10, 9 June 2010 diff hist +134 Suggested References to Add to Wiki
- 16:49, 9 June 2010 diff hist +119 Keyword Index and Glossary of Core Ideas →Communications Privacy Law
- 16:48, 9 June 2010 diff hist +119 Keyword Index and Glossary of Core Ideas →Civilian Participation
- 16:48, 9 June 2010 diff hist +93 N Public-Private Cooperation New page: Burstein, Aaron J. (2008) Amending The ECPA To Enable a Culture of Cybersecurity Research
- 16:47, 9 June 2010 diff hist +95 Information Sharing/Disclosure
- 16:47, 9 June 2010 diff hist +2,119 N Amending The ECPA To Enable a Culture of Cybersecurity Research New page: ==Full Title of Reference== Amending the ECPA to Enable a Culture of Cybersecurity Research ==Full Citation== Aaron J. Burstein, ''Amending the ECPA to Enable a Culture of Cybersecurity...
- 16:45, 9 June 2010 diff hist +34 Keyword Index and Glossary of Core Ideas
- 16:33, 9 June 2010 diff hist -36 Suggested References to Add to Wiki
- 16:31, 9 June 2010 diff hist +131 Suggested References to Add to Wiki
- 16:16, 9 June 2010 diff hist +83 Keyword Index and Glossary of Core Ideas →Botnet
- 16:15, 9 June 2010 diff hist +84 Keyword Index and Glossary of Core Ideas →Cyber Warfare
- 16:15, 9 June 2010 diff hist +58 N States New page: Shackelford, Scott J. (2010) Estonia Three Years Later
- 16:14, 9 June 2010 diff hist +64 Cyberwar
- 16:14, 9 June 2010 diff hist +4,635 N Estonia Three Years Later New page: ==Full Title of Reference== Estonia Three Years Later: A Progress Report on Combating Cyber Attacks ==Full Citation== Scott J. Shackelford, ''Estonia Three Years Later: A Progress Repor...
- 16:03, 9 June 2010 diff hist +60 Suggested References to Add to Wiki
- 15:57, 9 June 2010 diff hist +23 Keyword Index and Glossary of Core Ideas →Cyber Terrorism
- 15:56, 9 June 2010 diff hist +77 Keyword Index and Glossary of Core Ideas →Cyber Terrorism
- 15:55, 9 June 2010 diff hist -1 The Evolving Landscape of Maritime Cybersecurity →Categorization
- 15:55, 9 June 2010 diff hist +77 Public Critical Infrastructure
- 15:54, 9 June 2010 diff hist +1,084 The Evolving Landscape of Maritime Cybersecurity
- 15:50, 9 June 2010 diff hist +10 Suggested References to Add to Wiki
- 15:46, 9 June 2010 diff hist +98 Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games →Full Citation current
- 15:37, 9 June 2010 diff hist +102 N The Evolving Landscape of Maritime Cybersecurity New page: REVIEW OF BUSINESS- SAINT JOHNS UNIVERSITY Bibliographic details 2004, VOL 25; NUMB 3, pages 30-36
- 15:37, 9 June 2010 diff hist +77 Suggested References to Add to Wiki
- 15:31, 9 June 2010 diff hist +83 Keyword Index and Glossary of Core Ideas →Virtual Warfare
- 15:30, 9 June 2010 diff hist +83 Keyword Index and Glossary of Core Ideas →Intelligence Infrastructure/Information Infrastructure
- 15:30, 9 June 2010 diff hist +83 Keyword Index and Glossary of Core Ideas →Lawfare
- 15:29, 9 June 2010 diff hist +83 Keyword Index and Glossary of Core Ideas →Laws of War
- 15:28, 9 June 2010 diff hist +87 Law and War in the Virtual Era →Key Words
- 15:27, 9 June 2010 diff hist +85 Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games →Key Words
- 15:26, 9 June 2010 diff hist +397 Law and War in the Virtual Era →Key Words
- 15:15, 9 June 2010 diff hist +124 N Media Perceptions New page: Stohl, Michael (2006) Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games
- 15:15, 9 June 2010 diff hist +2 Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games
- 15:15, 9 June 2010 diff hist -1 Suggested References to Add to Wiki
- 15:14, 9 June 2010 diff hist -1 Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games
- 15:14, 9 June 2010 diff hist -1 Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games
- 15:13, 9 June 2010 diff hist +180 Keyword Index and Glossary of Core Ideas
- 15:12, 9 June 2010 diff hist +1,750 N Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games New page: ==Full Title of Reference== Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games? ==Full Citation== Michael Stohl, ''Cyber Terrorism: A Cle...
- 15:09, 9 June 2010 diff hist +30 Table of Contents
- 14:55, 9 June 2010 diff hist +127 Suggested References to Add to Wiki
- 14:51, 9 June 2010 diff hist -119 Law and War in the Virtual Era →Key Words
- 14:49, 9 June 2010 diff hist +93 Keyword Index and Glossary of Core Ideas →Virtual Military Technologies
- 14:47, 9 June 2010 diff hist +123 Law and War in the Virtual Era →Key Words
- 14:26, 9 June 2010 diff hist +17 Modeling Cyber-Insurance →Full Citation
- 14:25, 9 June 2010 diff hist +679 N Modeling Cyber-Insurance New page: ==Full Title of Reference== Modeling Cyber-Insurance: Towards A Unified Framework ==Full Citation== Rainer Bohme and Galina Schwartz ''Modeling Cyber-Insurance'', Workshop on the Economi...
- 14:09, 9 June 2010 diff hist +105 Insurance
- 19:45, 8 June 2010 diff hist -2 Law and War in the Virtual Era →Additional Notes and Highlights
- 19:44, 8 June 2010 diff hist +106 Law and War in the Virtual Era →Additional Notes and Highlights
- 14:58, 8 June 2010 diff hist +1,390 N An Introduction to Key Themes in the Economics of Cyber Security New page: ==Full Title of Reference== An Introduction to Key Themes in the Economics of Cyber Security ==Full Citation== Neil Gandal, "An Introduction to Key Themes in the Economics of Cybersecuri...
- 14:52, 8 June 2010 diff hist -5 Economics of Cybersecurity
- 14:52, 8 June 2010 diff hist +99 Economics of Cybersecurity
- 14:42, 8 June 2010 diff hist +1 The Law and Economics of Cybersecurity: An Introduction →Full Citation current
- 14:42, 8 June 2010 diff hist +2 The Law and Economics of Cybersecurity: An Introduction →Full Citation
- 14:42, 8 June 2010 diff hist +1 The Law and Economics of Cybersecurity: An Introduction →Categorization
- 14:42, 8 June 2010 diff hist -1,989 The Law and Economics of Cybersecurity: An Introduction
- 14:41, 8 June 2010 diff hist +3,464 N The Law and Economics of Cybersecurity: An Introduction New page: Jennifer Stisa Granick, ''The Price of Restricting Vulnerability Publications'' (2007), International Journal of Communications Law & Policy, Vol. 9, Spring 2005. [http://www.ijclp.net/...
- 14:31, 8 June 2010 diff hist +4 Regulation/Liability
- 14:31, 8 June 2010 diff hist +100 N Regulation/Liability New page: Grady, Mark and Parisi, Francesco (''2006'') The Law and Economics of Cybersecurity: An Introduction
- 14:22, 8 June 2010 diff hist 0 Economics of Malware: Security Decisions, Incentives and Externalities →Full Citation current
- 14:22, 8 June 2010 diff hist +143 Economics of Malware: Security Decisions, Incentives and Externalities →Full Citation
- 14:12, 8 June 2010 diff hist +56 Law and War in the Virtual Era →Additional Notes and Highlights
- 14:10, 8 June 2010 diff hist +107 Law and War in the Virtual Era →Additional Notes and Highlights
- 21:50, 7 June 2010 diff hist +4 Managing Online Security Risks →Full Citation
- 21:50, 7 June 2010 diff hist +663 N Managing Online Security Risks New page: ==Full Title of Reference== Managing Online Security Risks ==Full Citation== Hal Varian, NYT, Managing Online Security Risks (June 1, 2000). [http://people.ischool.berkeley.edu/~hal/peo...
- 21:07, 7 June 2010 diff hist +59 International Law (including Laws of War)
- 21:06, 7 June 2010 diff hist +138 Law and War in the Virtual Era →Key Words
- 21:05, 7 June 2010 diff hist -13 Law and War in the Virtual Era →Categorization
- 21:04, 7 June 2010 diff hist +90 Law and War in the Virtual Era →Categorization
- 18:59, 7 June 2010 diff hist -4 Cybersecurity Annotated Bibliography
- 18:45, 7 June 2010 diff hist +20 Law and War in the Virtual Era
- 18:44, 7 June 2010 diff hist -18 Law and War in the Virtual Era
- 18:42, 7 June 2010 diff hist +11,696 Law and War in the Virtual Era
- 18:48, 4 June 2010 diff hist +60 Security Economics and the Internal Market
- 18:34, 4 June 2010 diff hist +25 Notification of Data Security Breaches
- 18:33, 4 June 2010 diff hist +63 Notification of Data Security Breaches
- 18:28, 4 June 2010 diff hist +20 Do Data Breach Disclosure Laws Reduce Identity Theft
- 18:20, 4 June 2010 diff hist +2 The Economics of Information Security
- 18:05, 4 June 2010 diff hist +2 The Price of Restricting Vulnerability Publications
- 18:01, 4 June 2010 diff hist -5 The Price of Restricting Vulnerability Publications
- 18:01, 4 June 2010 diff hist +157 The Price of Restricting Vulnerability Publications
- 15:13, 4 June 2010 diff hist +110 Impact of Software Vulnerability Announcements on the Market Value of Software Vendors - An Empirical Investigation
- 15:06, 4 June 2010 diff hist +2,466 Overcoming Impediments to Information Sharing
- 15:02, 4 June 2010 diff hist +1 Do Data Breach Disclosure Laws Reduce Identity Theft
- 15:02, 4 June 2010 diff hist -1 Do Data Breach Disclosure Laws Reduce Identity Theft
- 15:02, 4 June 2010 diff hist +116 Do Data Breach Disclosure Laws Reduce Identity Theft