Difference between revisions of "Towards a Cyberspace Legal Regime in the Twenty-First Century"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 3: Line 3:
 
==Full Citation==
 
==Full Citation==
  
''Chicago Style''
+
Dunlap, Charles J., Jr. 2009: Towards a Cyberspace Legal Regime in the Twenty-First Century: Considerations for American Cyber-Warriors. Neb. L. Rev. 87, 712.
  
Dunlap, Charles J., Jr. 2009: Towards a Cyberspace Legal Regime in the Twenty-First Century. Considerations for American Cyber-Warriors. Neb. L. Rev. 87, 712.
+
[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=Dunlap_CJ:2010&f=wikibiblio.bib BibTeX]
 
 
Article for Conference: Yanpei Chen, et al. "What's New About Cloud Computing Security?" Technical Report for the University of California at Berkeley, Electrical Engineering and Computer Sciences Department, January 20, 2010.
 
 
 
[URL.of.PDF. Link]
 
  
 
==Key Words and Categorization==
 
==Key Words and Categorization==

Revision as of 15:39, 18 May 2010

[URL.of.PDF Title of PDF]

Full Citation

Dunlap, Charles J., Jr. 2009: Towards a Cyberspace Legal Regime in the Twenty-First Century: Considerations for American Cyber-Warriors. Neb. L. Rev. 87, 712.

BibTeX

Key Words and Categorization

See the article itself for any key words as a starting point

Synopsis

This could be an abstract from the article.

Policy Relevance

Policy and Legal Implications, relevant law.

Case Examples

Additional Notes and Highlights

* Outline key points of interest

* Include quotes if relevant/useful
* Consider how these themes relate to other cases, broader thematic areas, etc