-
2
-
-
2542418472
-
The Unreal Estate Boom
-
January
-
Julian Dibbell, “The Unreal Estate Boom,” Wired, January 2003, 11, 1, pp. 106–13.
-
(2003)
Wired
, vol.11
, Issue.1
, pp. 106-113
-
-
Julian, D.1
-
4
-
-
84976845043
-
End-to-End Arguments in System Design
-
November
-
D. P. Reed, and D. D. Clark, “End-to-End Arguments in System Design” ACM Transactions in Computer Systems, November 1984, 2, 4, pp. 277–88.
-
(1984)
ACM Transactions in Computer Systems
, vol.2
, Issue.4
, pp. 277-288
-
-
Reed, D.P.1
Clark, D.D.2
-
5
-
-
34248384026
-
Private Jihad: The Woman Who Became a Freelance Spy
-
May 29
-
Benjamin Wallace-Wells, “Private Jihad: The Woman Who Became a Freelance Spy,” New Yorker, May 29, 2006, pp. 28–41.
-
(2006)
New Yorker
, pp. 28-41
-
-
Wallace-Wells, B.1
-
8
-
-
0009332653
-
Neocortical Warfare? The Acme of Skill
-
November
-
Richard Szafranski, “Neocortical Warfare? The Acme of Skill,” Military Review, November 1994, pp. 41–55.
-
(1994)
Military Review
, pp. 41-55
-
-
Richard, S.1
-
11
-
-
85066651876
-
-
Fast-Spreading Code Is Weapon of Choice for Net Vandals, March 15
-
Robert Lemos, “Fast-Spreading Code Is Weapon of Choice for Net Vandals,” http://news.com.com/2009-1001-254061.html, March 15, 2001.
-
(2001)
-
-
Robert, L.1
-
12
-
-
85066653983
-
-
(English translation), New York (Holt, Rinehart, and Winston)
-
Thierry Breton, Softwar (English translation), New York (Holt, Rinehart, and Winston), 1986.
-
(1986)
Softwar
-
-
Thierry, B.1
-
13
-
-
34248236985
-
Cyberwar Is Coming!
-
John Arquilla and David Ronfeldt, “Cyberwar Is Coming!” Comparative Strategy, 12, 1993, pp. 141–65.
-
(1993)
Comparative Strategy
, vol.12
, pp. 141-165
-
-
John, A.1
David, R.2
-
14
-
-
0009332653
-
Neocortical Warfare? The Acme of Skill
-
November
-
Richard Szafranski, “Neocortical Warfare? The Acme of Skill,” Military Review, November 1994, pp. 41–55.
-
(1994)
Military Review
, pp. 41-55
-
-
Richard, S.1
-
16
-
-
85066682319
-
-
Fast-Spreading Code Is Weapon of Choice for Net Vandals, March 15
-
Robert Lemos, “Fast-Spreading Code Is Weapon of Choice for Net Vandals,” http://news.com.com/2009-1001-254061.html, March 15, 2001.
-
(2001)
-
-
Robert, L.1
-
17
-
-
85066702920
-
-
F-Secure: Commwarrior Claims First Big Victim, August 31
-
Tom Espiner, “F-Secure: Commwarrior Claims First Big Victim,” http://news.com.com/2102-7349 3-5845021.html, August 31, 2005.
-
(2005)
-
-
Tom, E.1
-
18
-
-
85066657774
-
-
BlackBerry Users Face Security Threat, January 3
-
Joris Evers, “BlackBerry Users Face Security Threat,” http://news.com.com/2102-10023-6016847.html, January 3, 2006.
-
(2006)
-
-
Joris, E.1
-
20
-
-
84937340618
-
Can Information Warfare Be Deterred?
-
Stephen Blank, “Can Information Warfare Be Deterred?” Defense Analysis, 2001, 17, 2, pp. 121–38.
-
(2001)
Defense Analysis
, vol.17
, Issue.2
, pp. 121-138
-
-
Stephen, B.1
-
24
-
-
0003851399
-
-
(John Wiley and Sons), especially
-
Bruce Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C (John Wiley and Sons), 1995, especially pp. 483–502.
-
(1995)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
, pp. 483-502
-
-
Bruce, S.1
-
25
-
-
85066707183
-
-
NSA Funds Work to Thicken Linux Armor, April 9
-
Stephan Shankland, “NSA Funds Work to Thicken Linux Armor,” http://news.com.com/2100-10013-255541.html, April 9, 2001.
-
(2001)
-
-
Stephan, S.1
-
26
-
-
85066667813
-
-
Leading Web Sites under Attack, 0-1007-200-1545348, February 9
-
Greg Sandoval and Troy Wolverton, “Leading Web Sites under Attack,” http//www.news.com/2100-10173-236683.html, 0-1007-200-1545348, February 9, 2000.
-
(2000)
-
-
Greg, S.1
Troy, W.2
-
27
-
-
85066688335
-
-
New York (Random House)
-
James Bamford, Body of Secrets, New York (Random House), 2001, p. 422.
-
(2001)
Body of Secrets
, pp. 422
-
-
James, B.1
-
28
-
-
6244245533
-
Virtual Defense
-
May/June
-
James Adams, “Virtual Defense,” Foreign Affairs, May/June 2001, pp. 98–112.
-
(2001)
Foreign Affairs
, pp. 98-112
-
-
James, A.1
-
29
-
-
84937185992
-
Military Theory and Information Warfare
-
Autumn
-
Ryan Henry and C. Edward Peartree, “Military Theory and Information Warfare,” Parameters, Autumn 1998, pp. 121–35.
-
(1998)
Parameters
, pp. 121-135
-
-
Ryan, H.1
Peartree, C.E.2
-
32
-
-
85066659732
-
-
Attack on Net Servers Fails, October 22
-
Robert Lemos, “Attack on Net Servers Fails,” http://news.com.com/2100-1001-963005.html, October 22, 2002;
-
(2002)
-
-
Robert, L.1
-
33
-
-
84869198386
-
Large-Scale Attack Cripples Internet Backbone
-
October 22
-
David McGuire and Brian Krebs, “Large-Scale Attack Cripples Internet Backbone,” Washington Post, October 22, 2002, p. E05.
-
(2002)
Washington Post
, pp. E05
-
-
David, M.1
Krebs, B.2
-
34
-
-
85066705443
-
-
Safety: Assessing the Infrastructure Risk, August 26
-
Robert Lemos, “Safety: Assessing the Infrastructure Risk,” http://news.com.com/2009-1001-954780.html, August 26, 2002.
-
(2002)
-
-
Robert, L.1
-
35
-
-
0002107952
-
Catastrophic Terrorism: Tackling the New Danger
-
November/December
-
Ashton Carter, John Deutch, and Philip Zelikow, “Catastrophic Terrorism: Tackling the New Danger,” Foreign Affairs, November/December 1998, pp. 80–94.
-
(1998)
Foreign Affairs
, pp. 80-94
-
-
Ashton, C.1
John, D.2
Philip, Z.3
-
36
-
-
27944454740
-
Cyberterrorism: The Sum of All Fears?
-
Gabriel Weimann, “Cyberterrorism: The Sum of All Fears?” Studies in Conflict and Terrorism, 28, 2005, pp. 129–49.
-
(2005)
Studies in Conflict and Terrorism
, pp. 129-149
-
-
Gabriel, W.1
-
37
-
-
85066699325
-
-
Cyber Terror in the Air, Securityfocus.com, June 30, 2001
-
Kevin Poulson, “Cyber Terror in the Air,” Securityfocus.com, June 30, 2001.
-
(2001)
-
-
Kevin, P.1
-
38
-
-
85066682846
-
-
Terrorism Warnings Focussed on Threat Overseas, September 12, 2001, p. A19
-
Karen DeYoung, “Terrorism Warnings Focussed on Threat Overseas,” September 12, 2001, p. A19.
-
(2001)
, pp. A19
-
-
Karen, D.1
-
39
-
-
1542452583
-
Fighting Barbarians
-
Summer
-
David Tucker, “Fighting Barbarians,” Parameters, Summer 1998, pp. 69–79.
-
(1998)
Parameters
, pp. 69-79
-
-
David, T.1
-
40
-
-
27944455431
-
The Myth of Cyberterrorism
-
November
-
Joshua Green, “The Myth of Cyberterrorism” Washington Monthly, November 2002, pp. 8–13.
-
(2002)
Washington Monthly
, pp. 8-13
-
-
Joshua, G.1
-
41
-
-
0011016060
-
Cyber-Attacks by Al Qaeda Feared
-
June 27
-
Barton Gellman, “Cyber-Attacks by Al Qaeda Feared,” Washington Post, June 27, 2002, p. A1.
-
(2002)
Washington Post
, pp. A1
-
-
Barton, G.1
-
42
-
-
84924009025
-
Jihad 2.0
-
July/August
-
Nadya Labi, “Jihad 2.0,” Atlantic, 297, 6, July/August 2006, pp. 102–8j;
-
(2006)
Atlantic
, vol.297
, Issue.6
, pp. 102-108
-
-
Nadya, L.1
-
43
-
-
84924008906
-
Jihadist of Mass Destruction
-
June 11
-
Paul Cruikshank and Mohanad Hage Ali, “Jihadist of Mass Destruction,” Washington Post, June 11, 2006, p. B2;
-
(2006)
Washington Post
, pp. B2
-
-
Paul, C.1
Mohanad Hage, A.2
-
44
-
-
85055358368
-
Cyber-Mobilization: The New Levee en Masse
-
Summer
-
Audrey Kurth Cronin, “Cyber-Mobilization: The New Levee en Masse,” Parameters, Summer 2006, pp. 77–87;
-
(2006)
Parameters
, pp. 77-87
-
-
Audrey, K.C.1
-
45
-
-
85066652451
-
-
Al Qaeda and Cyberterrorism, August 18
-
Eshan Ahrari, “Al Qaeda and Cyberterrorism” www.atimes.com/atimes/printn.hmtl, August 18, 2004;
-
(2004)
-
-
Eshan, A.1
-
46
-
-
33750320271
-
Terrorists Turn to the Web as Base of Operations
-
August 7
-
Steve Coll and Susan B. Glasser, “Terrorists Turn to the Web as Base of Operations,” Washington Post, August 7, 2005, p. A-1;
-
(2005)
Washington Post
, pp. A1
-
-
Steve, C.1
Glasser, S.B.2
-
47
-
-
85048941387
-
Al Qaeda and the Internet: The Danger of ‘Cyberplanning’
-
Spring
-
Timothy Thomas, “Al Qaeda and the Internet: The Danger of ‘Cyberplanning’,” Parameters, Spring 2003, pp. 112–23;
-
(2003)
Parameters
, pp. 112-123
-
-
Timothy, T.1
-
48
-
-
85066639838
-
-
Cyberspace Gives al Qaeda Refuge
-
Douglas Frantz, Josh Meter, and Richard B. Schmidt, “Cyberspace Gives al Qaeda Refuge,” www.latimes.com/news/nationworld/world/la-fg/cyberterror15aug1,1,4439595.story
-
-
-
Douglas, F.1
Josh, M.2
Schmidt, R.B.3
-
49
-
-
85066705075
-
Leak Reveals Official Story of London Bombings
-
April 9
-
Mark Townsend, “Leak Reveals Official Story of London Bombings,” Observer, observer.guardian.co.uk/uk news/story/0,,1750139,00.html, April 9, 2006.
-
(2006)
Observer
-
-
Mark, T.1
-
50
-
-
84940644968
-
A Mathematical Theory of Communication
-
July, October
-
Claude Shannon, “A Mathematical Theory of Communication,” The Bell System Technical Journal, July, October 1948, 27, pp. 379–423, 623–56.
-
(1948)
The Bell System Technical Journal
, vol.27
, pp. 379-656
-
-
Claude, S.1
-
51
-
-
85066656199
-
Securing the Cloud
-
October 24
-
Survey “Securing the Cloud,” Economist, October 24, 2002, p. 17.
-
(2002)
Economist
, pp. 17
-
-
Survey, S.1
-
53
-
-
85066674871
-
-
New York (Simon and Schuster)
-
Oliver Revell, A G-Man’s Journal, New York (Simon and Schuster), 1998.
-
(1998)
A G-Man’s Journal
-
-
Oliver, R.1
-
54
-
-
0036882179
-
Making Invisible Work Visible: Using Social Network Analysis to Support Strategic Collaboration
-
Winter
-
Rob Cross, Stephen Borgatti, and Andrew Parker, “Making Invisible Work Visible: Using Social Network Analysis to Support Strategic Collaboration,” California Management Review, Winter 2002, p. 25.
-
(2002)
California Management Review
, pp. 25
-
-
Rob, C.1
Stephen, B.2
Andrew, P.3
-
55
-
-
85066650477
-
-
December 22
-
Bruce Schneier, www.schneier.com/blog/archives/2005/12, December 22, 2005.
-
(2005)
-
-
Bruce, S.1
-
56
-
-
34748865901
-
Invasion of the Computer Snatchers
-
February 19
-
Brian Krebs, “Invasion of the Computer Snatchers,” Washington Post Sunday Magazine, February 19, 2006, pp. 10–15, 23–9.
-
(2006)
Washington Post Sunday Magazine
, pp. 10-29
-
-
Brian, K.1
-
57
-
-
85066726384
-
-
Hacker Accesses 2.2 Million Credit Cards, February 17
-
Fred Katayama, “Hacker Accesses 2.2 Million Credit Cards,” www.cnn.com/2003/tech/02/17/creditcard.hack/index.html, February 17, 2003.
-
(2003)
-
-
Fred, K.1
-
58
-
-
85066723299
-
Information Warfare Isn’t What You Think
-
February 26
-
David Fulghum and Robert Wall, “Information Warfare Isn’t What You Think,” Aviation Week and Space Technology, 154, 9, February 26, 2001, p. 52–3.
-
(2001)
Aviation Week and Space Technology
, vol.154
, Issue.9
, pp. 52-53
-
-
David, F.1
Wall, R.2
-
59
-
-
4444341888
-
Battling for Minds
-
September 6
-
David Fulghum, “Battling for Minds,” Aviation Week and Space Technology, 161, 9, September 6, 2004, p. 52.
-
(2004)
Aviation Week and Space Technology
, vol.161
, Issue.9
, pp. 52
-
-
David, F.1
-
61
-
-
85066686727
-
-
Exploiting and Protecting 802.11b Wireless Networks, September 4
-
Craig Ellison, “Exploiting and Protecting 802.11b Wireless Networks,” www.extremetech.com/print article/0,3428, a%253D13880,00.asp, September 4, 2001.
-
(2001)
-
-
Craig, E.1
-
62
-
-
85066680611
-
Yugoslavia Successfully Attacked by Computers
-
August 23
-
David Fulghum, “Yugoslavia Successfully Attacked by Computers,” Aviation Week and Space Technology, 151, 8, August 23, 1999, pp. 31, 34.
-
(1999)
Aviation Week and Space Technology
, vol.151
, Issue.8
, pp. 31-34
-
-
David, F.1
-
63
-
-
85066692592
-
-
Resilient Infrastructure for Network Security
-
Matthew Williamson “Resilient Infrastructure for Network Security,” www.hpl.hp.com/techreports/2002/HPL-2002-273.pdf.
-
-
-
Matthew, W.1
-
64
-
-
85066700174
-
-
Fast-Spreading Code Is Weapon of Choice for Net Vandals, March 15
-
Robert Lemos, “Fast-Spreading Code Is Weapon of Choice for Net Vandals,” http://news.com.com/2009-1001-254061.html, March 15, 2001.
-
(2001)
-
-
Robert, L.1
-
65
-
-
84923949449
-
Cyber Security as an Emergent Infrastructure
-
Robert Lathan, ed, New York (Free Press)
-
Dorothy Denning, “Cyber Security as an Emergent Infrastructure,” in Robert Lathan, ed., Bombs and Bandwidth: The Emerging Relationship between Information Technology and Security, New York (Free Press), 2003, pp. 25–48.
-
(2003)
Bombs and Bandwidth: The Emerging Relationship between Information Technology and Security
, pp. 25-48
-
-
Dorothy, D.1
-
66
-
-
85066716524
-
Flash Worms: Thirty Seconds to Infect the Internet
-
August 16
-
Stuart Staniford, Gary Gim, and Roelof Jonkman, “Flash Worms: Thirty Seconds to Infect the Internet,” Silicon Defense, August 16, 2001
-
(2001)
Silicon Defense
-
-
Stuart, S.1
Gary, G.2
Roelof, J.3
-
67
-
-
85066725373
-
-
Slammer’ Attacks May Become Way of Life for Net, February 6
-
Robert Lemos, “’Slammer’ Attacks May Become Way of Life for Net,” http://news.com.com/2009-1001-983540.html, February 6, 2003;
-
(2003)
-
-
Robert, L.1
-
68
-
-
0037335565
-
Internet Slammed Again
-
February
-
Steven M Cherry, “Internet Slammed Again,” IEEE Spectrum, February 2003, www.spectrum.ieee.org/WEBONLY/wonews/feb03.slammer.html.
-
(2003)
IEEE Spectrum
-
-
Cherry, S.M.1
-
72
-
-
85066698204
-
Logic Bomb Arms Race Panics Russians
-
November 29
-
Matthew Campbell, “’Logic Bomb’ Arms Race Panics Russians,” Sunday Times, November 29, 1998
-
(1998)
Sunday Times
-
-
Matthew, C.1
-
73
-
-
84937340618
-
Can Information Warfare Be Deterred?
-
Stephen Blank, “Can Information Warfare Be Deterred?” Defense Analysis, 17, 2, 2001, pp. 121–38.
-
(2001)
Defense Analysis
, vol.17
, Issue.2
, pp. 121-138
-
-
Stephen, B.1
-
74
-
-
85066715453
-
-
Linux Worm Causes Peer Pressure, September 16
-
Robert Lemos, “Linux Worm Causes Peer Pressure” www.news.com2100-1001-958122, September 16, 2002.
-
(2002)
-
-
Robert, L.1
-
75
-
-
85066652006
-
Sneaky Service Pacts
-
26 August
-
Brian Livingstone, “Sneaky Service Pacts” Infoworld, 26 August 2002, p. 20.
-
(2002)
Infoworld
, pp. 20
-
-
Brian, L.1
-
76
-
-
0003965583
-
-
Cambridge (Harvard University Press)
-
Martin Van Creveld, Command in War, Cambridge (Harvard University Press), 1985.
-
(1985)
Command in War
-
-
Van Creveld, M.1
-
78
-
-
85066705494
-
Could Iraq Have Made Better Use of Its Air Force and Missile Technology during the Air War?
-
May/June
-
R. W. Reading, “Could Iraq Have Made Better Use of Its Air Force and Missile Technology during the Air War?” Australian Defence Force Journal, 94, May/June 1992, pp. 39–63.
-
(1992)
Australian Defence Force Journal
, vol.94
, pp. 39-63
-
-
Reading, R.W.1
-
79
-
-
85066719046
-
-
Verizon’s Fiber Race Is On, July 19
-
Ben Charny and Jim Hu, “Verizon’s Fiber Race Is On,” http://news.com.com/2100-10343-5275171.html, July 19, 2004
-
(2004)
-
-
Ben, C.1
Hu, J.2
-
80
-
-
33746290329
-
How Tech Failed in Iraq
-
November
-
David Talbot, “How Tech Failed in Iraq,” Technology Review, November 2004, pp. 36–45;
-
(2004)
Technology Review
, pp. 36-45
-
-
David, T.1
-
83
-
-
85066707353
-
-
The Attention Economy and the Net, November 27
-
Michael H. Goldhaber, “The Attention Economy and the Net,” http://www.heise.de/tp/r4/artikel/6/6097/1.html, November 27, 1997;
-
(1997)
-
-
Michael, H.G.1
-
84
-
-
85066664237
-
-
Limited Attention as the Scarce Resource in an Information-Rich Economy, November 10
-
Josef Falkinger, “Limited Attention as the Scarce Resource in an Information-Rich Economy,” www.iza.org/index html?lang=en&mainframe=http%3A//www.iza.org/en/webcontent/teaching/bonn research seminar/bonnseminar description html%3Fsem id%3D876&topSelect=teaching&subSelect=bonnresearchseminar, November 10, 2004.
-
(2004)
-
-
Josef, F.1
-
85
-
-
39749093168
-
The Magical Number Seven, Plus or Minus Two: Some Limits on Our Capacity for Processing Information
-
George Miller, “The Magical Number Seven, Plus or Minus Two: Some Limits on Our Capacity for Processing Information,” Psychological Review, 63, 1956, pp. 81–97.
-
(1956)
Psychological Review
, vol.63
, pp. 81-97
-
-
Miller, G.1
-
88
-
-
85066709729
-
-
New York (Free Press)
-
Eliot Cohen, Supreme Command, New York (Free Press), 2002.
-
(2002)
Supreme Command
-
-
Eliot, C.1
-
92
-
-
33344456220
-
The Office Chart that Really Counts
-
February 27
-
Jena McGregor, “The Office Chart that Really Counts,” Business Week, February 27, 2006, pp. 48–9.
-
(2006)
Business Week
, pp. 48-49
-
-
Mc Gregor, J.1
-
93
-
-
33644628864
-
The Blogs of War
-
August
-
John Hockenberry, “The Blogs of War,” Wired, August 2005, pp. 118–23
-
(2005)
Wired
, pp. 118-123
-
-
John, H.1
-
94
-
-
0003442789
-
-
New York (Farrar, Straus, Giroux)
-
Thomas Friedman, The Lexus and the Olive Tree, New York (Farrar, Straus, Giroux), 1999, p. 184.
-
(1999)
The Lexus and the Olive Tree
, pp. 184
-
-
Thomas, F.1
-
95
-
-
0039170298
-
American Keiretsu: The Next Corporate Order
-
Ken Auletta, “American Keiretsu: The Next Corporate Order,” New Yorker (1997), pp. 225–7.
-
(1997)
New Yorker
, pp. 225-227
-
-
Ken, A.1
-
96
-
-
85066676229
-
-
New York (Random House)
-
Charles Ferguson and Charles Norris, Computer Wars, New York (Random House), 1993, pp. 174–82.
-
(1993)
Computer Wars
, pp. 174-182
-
-
Charles, F.1
Charles, N.2
-
97
-
-
85066673278
-
Reboot System and Start Again
-
February 27
-
David Manasian, “Reboot System and Start Again, Economist February 27, 1993, pp. 7–11.
-
(1993)
Economist
, pp. 7-11
-
-
David, M.1
-
98
-
-
79953273227
-
The IPOD Ecosystem
-
February 3
-
Damin Darlin, “The IPOD Ecosystem,” New York Times, February 3, 2006
-
(2006)
New York Times
-
-
Damin, D.1
-
99
-
-
85066685564
-
-
Microsoft Program Meets Some Resistance, CNET News.com, May 10
-
Joe Wilcox, “Microsoft Program Meets Some Resistance,” CNET News.com, http://news.com.com/2100-10013-908773.html, May 10, 2002.
-
(2002)
-
-
Joe, W.1
-
100
-
-
0035474501
-
Code Red for the Web
-
Carolyn Meinel, “Code Red for the Web,” Scientific American, October 2001, pp. 42–51.
-
(2001)
Scientific American
, pp. 42-51
-
-
Carolyn, M.1
-
101
-
-
85066670639
-
-
Why Hackers Escape, May 14
-
Greg Sandoval, “Why Hackers Escape,” http://news.com.com/2009-1017-912708.html, May 14, 2002.
-
(2002)
-
-
Greg, S.1
-
102
-
-
85066725661
-
Take Your Medicine
-
August 31
-
Tom Sullivan, “Take Your Medicine,” Infoworld, August 31, 2001, p. 32.
-
(2001)
Infoworld
, pp. 32
-
-
Tom, S.1
-
103
-
-
85066696238
-
Are You Web Smart?
-
January 18
-
Marcia Stepanik, “Are You Web Smart?” Business Week E-Biz, January 18, 2000, p. 38.
-
(2000)
Business Week E
, pp. 38
-
-
Marcia, S.1
-
104
-
-
0035289645
-
Strategy and the Internet
-
March
-
Michael Porter, “Strategy and the Internet,” Harvard Business Review, March 2001, pp. 63–78
-
(2001)
Harvard Business Review
, pp. 63-78
-
-
Michael, P.1
-
105
-
-
0003706471
-
-
Boston (Harvard Business School Press)
-
Carl Shapiro and Hal Varian, Information Rules, Boston (Harvard Business School Press), 1999.
-
(1999)
Information Rules
-
-
Carl, S.1
Hal, V.2
-
106
-
-
0002264274
-
Positive Feedbacks in the Economy
-
February
-
W. Brian Arthur, “Positive Feedbacks in the Economy,” Scientific American, February 1990, pp. 92–9;
-
(1990)
Scientific American
, pp. 92-99
-
-
Arthur, W.B.1
-
107
-
-
0027570688
-
How Architecture Wins Technology Wars
-
March-April
-
Charles Morris and Charles Ferguson, “How Architecture Wins Technology Wars,” Harvard Business Review, March-April 1993, pp. 86–96.
-
(1993)
Harvard Business Review
, pp. 86-96
-
-
Charles, M.1
Charles, F.2
-
108
-
-
0041529038
-
Should Technology Be a Concern of Antitrust Policy
-
Summer
-
Stan Liebowitz, “Should Technology Be a Concern of Antitrust Policy,” Harvard Journal of Law and Technology, Summer 1996, pp. 283–318.
-
(1996)
Harvard Journal of Law and Technology
, pp. 283-318
-
-
Stan, L.1
-
109
-
-
85066639162
-
-
Santa Monica (RAND)
-
Stuart Johnson, Martin Libicki, and Gregrory Treverton, ed., New Challenges, New Techniques, Santa Monica (RAND), 2003, pp. 67–95.
-
(2003)
New Challenges, New Techniques
, pp. 67-95
-
-
Stuart, J.1
Martin, L.2
Gregrory, T.3
-
110
-
-
85066715824
-
Networking Dissent
-
John Arquilla and David Ronfeldt, ed., Santa Monica (RAND)
-
Tiffany Danitz and Walter P. Strobel, “Networking Dissent,” in John Arquilla and David Ronfeldt, ed., Networks and Netwars, Santa Monica (RAND), 2002, pp. 129–69.
-
(2002)
Networks and Netwars
, pp. 29-69
-
-
Tiffany, D.1
Walter, P.S.2
-
112
-
-
85066676831
-
-
It’s Your Number; Take It with You, November 3
-
Ben Charny, “It’s Your Number; Take It with You,” http://news.com.com/2100-1037-5100892.html, November 3, 2003.
-
(2003)
-
-
Ben, C.1
-
113
-
-
85066716588
-
-
Energy Dept., IBM to Unveil Science Grid, March 21
-
Stephen Shankland, “Energy Dept., IBM to Unveil Science Grid,” http://news.com.com/2100-1001-866452.html, March 21, 2001.
-
(2001)
-
-
Stephen, S.1
-
114
-
-
85066723665
-
-
The Grail of Utility Computing, October 15
-
Jeff Clarke, “The Grail of Utility Computing,” http://news.com.com/2102-73393-5091350.html, October 15, 2003.
-
(2003)
-
-
Jeff, C.1
-
115
-
-
85066671330
-
-
Mobile Commerce Rings Up No Sale, September 9
-
Troy Wolverton, “Mobile Commerce Rings Up No Sale,” http://news.com.com/2100-1017-956969.html, September 9, 2002
-
(2002)
-
-
Troy, W.1
-
116
-
-
85066651485
-
-
How Commercial Communities Can Click, May
-
Ellen Neuborne “How Commercial Communities Can Click,” www.businessweek.com/technology/content/may2001/tc2001057248.htm, May 2001.
-
(2001)
-
-
Ellen, N.1
-
117
-
-
85066691554
-
-
Beyond the Personalization Myth by Jupiter Research, October 13
-
Paul Festa, “Beyond the Personalization Myth by Jupiter Research,” http://news.com.com/2100-1038-5090716.html, October 13, 2003.
-
(2003)
-
-
Paul, F.1
-
118
-
-
84888817626
-
Don’t Shoot the Messenger: Limiting the Liability of Anonymous Remailer Operations
-
Rev (the “Frontiers of Law: The Internet and Cyberspace” issue
-
Robyn Wagner, “Don’t Shoot the Messenger: Limiting the Liability of Anonymous Remailer Operations,” 32 New Mexico Law Review, Rev 99 (the “Frontiers of Law: The Internet and Cyberspace” issue), pp. 99–142.
-
New Mexico Law Review
, vol.32
, Issue.99
, pp. 99-142
-
-
Robyn, W.1
-
119
-
-
33645457706
-
Centripetal Force: The Case for Staying in Iraq
-
March 6
-
Lawrence Kaplan, “Centripetal Force: The Case for Staying in Iraq,” New Republic, March 6, 2006, pp. 19–23.
-
(2006)
New Republic
, pp. 19-23
-
-
Lawrence, K.1
-
120
-
-
85066672029
-
-
Government Seeks Accord on XML, June 17
-
Margeret Kane, “Government Seeks Accord on XML,” http://news.com.com/2100-1001-935223.html, June 17, 2002.
-
(2002)
-
-
Margeret, K.1
-
121
-
-
85066660853
-
Reinventing Herman Miller
-
April 3
-
David Rocks, “Reinventing Herman Miller,” Business Week E-Biz, April 3, 2000, p. 90.
-
(2000)
Business Week E-Biz
, pp. 90
-
-
David, R.1
-
122
-
-
85066708531
-
How the Web Is Retooling Detroit
-
November 27
-
Alan Hall, “How the Web Is Retooling Detroit,” Business Week, November 27, 2000, p. 194B
-
(2000)
Business Week
, pp. 194B
-
-
Alan, H.1
-
123
-
-
85066659485
-
Opening the Spigot
-
June
-
Faith Keenan, “Opening the Spigot,” Business Week E-Biz, June 2001, p. 4.
-
(2001)
Business Week E-Biz
, pp. 4
-
-
Faith, K.1
-
125
-
-
85066717899
-
Bridging the Gap: European C4ISR Capabilities and Transatlantic Interoperability
-
October
-
Gordon Adams, Guy Ben-Ari, John Logsdon, and Ray Williamson, “Bridging the Gap: European C4ISR Capabilities and Transatlantic Interoperability,” CTNSP Defense and Technology Paper No. 5, October 2004
-
(2004)
CTNSP Defense and Technology
, Issue.5
-
-
Gordon, A.1
Guy, B.-A.2
John, L.3
Ray, W.4
-
127
-
-
85066680050
-
A Clear and Present Danger
-
October 8
-
Michael Elliott, “A Clear and Present Danger,” Time, October 8, 2001, p. 29.
-
(2001)
Time
, pp. 29
-
-
Michael, E.1
-
128
-
-
85066696533
-
-
Bush Adviser: Terror a Real Threat to Tech, November 8
-
Robert Lemos, “Bush Adviser: Terror a Real Threat to Tech,” http://news.com.com/2100-1001-829485.html, November 8, 2001.
-
(2001)
-
-
Robert, L.1
-
134
-
-
85066696502
-
NRO Wants License to Take Risks
-
September 11
-
Robert Wall, “NRO Wants License to Take Risks,” Aviation Week, September 11, 2000, p. 38.
-
(2000)
Aviation Week
, pp. 38
-
-
Robert, W.1
-
138
-
-
85066724348
-
Feds Rethinking RFID Passport
-
April 26
-
Kim Zetter, “Feds Rethinking RFID Passport,” Wired News, April 26, 2005, available at www.wired.com/news/privacy/0,1848,67333,00.html?tw=wnstoryrelated
-
(2005)
Wired News
-
-
Kim, Z.1
-
139
-
-
85066721188
-
Does Big Brother Want to Watch? Passport Radio Chips Send Too Many Signals
-
October 4
-
Bruce Schneier, “Does Big Brother Want to Watch? Passport Radio Chips Send Too Many Signals,” International Herald Tribune, http://www.iht.com/articles/2004/10/04/edschneiered3php, October 4, 2004.
-
(2004)
International Herald Tribune
-
-
Bruce, S.1
-
141
-
-
0347684347
-
The Death of Privacy
-
May
-
Michael Froomkin, “The Death of Privacy” Stanford Law Review, 52, May 2000, p. 1461–1543;
-
(2000)
Stanford Law Review
, vol.52
, pp. 1461-1543
-
-
Michael, F.1
-
142
-
-
0036655889
-
Digital Dossiers and the Dissipation of Fourth Amendment Privacy
-
Daniel Solove, “Digital Dossiers and the Dissipation of Fourth Amendment Privacy,” Southern California Law Review, 75, 2000, pp. 1083–1167.
-
(2000)
Southern California Law Review
, vol.75
, pp. 1083-1167
-
-
Daniel, S.1
-
145
-
-
3342884620
-
Sensors and Sensibility
-
subsequent articles, July
-
Jean Kumagai and Steven Cherry, “Sensors and Sensibility” and subsequent articles, IEEE Spectrum, July 2004, pp. 22–48.
-
(2004)
IEEE Spectrum
, pp. 22-48
-
-
Jean, K.1
Jean, K.2
Cherry, S.3
-
148
-
-
85066717172
-
-
Rental-Car Firm Exceeding the Privacy Limit?, June 20
-
Robert Lemos, “Rental-Car Firm Exceeding the Privacy Limit?” http://news.com.com/2100-1040-268747.html, June 20, 2001.
-
(2001)
-
-
Robert, L.1
-
149
-
-
85066642546
-
-
TR-197, Santa Monica (RAND)
-
Edward Balkovich, Tora K. Bikson, and Gordon Bitko, 9 to 5: Do You Know If Your Boss Knows Where You Are?: Case Studies of Radio Frequency Identification Usage in the Workplace, TR-197, Santa Monica (RAND), 2005.
-
(2005)
9 to 5: Do You Know If Your Boss Knows Where You Are?: Case Studies of Radio Frequency Identification Usage in the Workplace
-
-
Edward, B.1
Bikson, T.K.2
Gordon, B.3
-
150
-
-
30344439619
-
-
Upper Saddle River (Addison-Wesley)
-
Simon Garfinkel and Beth Rosenberg, ed., RFI: Applications, Security, and Privacy, Upper Saddle River (Addison-Wesley), 2005.
-
(2005)
FI: Applications, Security, and Privacy
-
-
Simon, G.1
Beth, R.2
-
151
-
-
85066647725
-
-
Radio ID Chips May Track Banknotes, May 22
-
Winston Chai, “Radio ID Chips May Track Banknotes,” http://news.com.com/2100-1017-1009155.html, May 22, 2003.
-
(2003)
-
-
Chai, W.1
-
152
-
-
4243822843
-
Intensive Care, from a Distance
-
June 2
-
David Brown, “Intensive Care, from a Distance,” Washington Post, 125, 179, June 2, 2002, p. A1.
-
(2002)
Washington Post
, vol.125
, Issue.179
, pp. A1
-
-
David, B.1
-
153
-
-
85066643293
-
Privacy Fight Centers on AdZapper
-
May 4
-
Christopher Stern, “Privacy Fight Centers on AdZapper,” Washington Post, May 4, 2002, p. A1, A12
-
(2002)
Washington Post
, pp. A1-A12
-
-
Christopher, S.1
-
154
-
-
85066645539
-
Microsoft Scales Back Passport Ambitions
-
October 20
-
Joris Evers, “Microsoft Scales Back Passport Ambitions,” IDG News Service, www.infoworld.com/article/04/10/20/HNmsppscaleback 1.html, October 20, 2004.
-
(2004)
IDG News Service
-
-
Joris, E.1
-
156
-
-
85066664454
-
-
Your Stolen Passport, September 26
-
Wayne Rash, “Your Stolen Passport,” techupdate.zdnet.com/techupdate/stories/main/0,14179,2814881,00.html, September 26, 2001.
-
(2001)
-
-
Wayne, R.1
-
158
-
-
85066647046
-
-
August 5
-
Steve Gilmor, Infoworld, August 5, 2002, p. 50
-
(2002)
Infoworld
, pp. 50
-
-
Steve, G.1
-
159
-
-
85066718979
-
-
Microsoft Rethink, April 9
-
Tom Yager, “Microsoft Rethink,” http://www.infoworld.com/article/02/04/26/020429opestrat1.html, April 9, 2002.
-
(2002)
-
-
Tom, Y.1
-
160
-
-
85066718207
-
Microsoft Plans XML Politics
-
April 15
-
Brian Fonseca and Ed Scannel, “Microsoft Plans XML Politics,” Infoworld, April 15, 2002
-
(2002)
Infoworld
-
-
Brian, F.1
Ed, S.2
-
161
-
-
85066671775
-
-
Network: Reinventing the Wheel in Real Time, October 22
-
Mike Ricciuti and Robert Lemos, “Network: Reinventing the Wheel in Real Time,” http://news.com.com/2009-1001-274440.html, October 22, 2001
-
(2001)
-
-
Mike, R.1
Lemos, R.2
-
162
-
-
85066685144
-
-
New Web Tracking Service Raises Old Privacy Concerns, June 16
-
Brian Livingston, “New Web Tracking Service Raises Old Privacy Concerns,” http://news.com.com/2010-1071-281326.html, June 16, 2000.
-
(2000)
-
-
Brian, L.1
-
163
-
-
0005502376
-
Giving Web a Memory Cost Its Users Privacy
-
September 4
-
John Schwartz, “Giving Web a Memory Cost Its Users Privacy,” New York Times, September 4, 2001, p. A1.
-
(2001)
New York Times
, pp. A1
-
-
John, S.1
-
164
-
-
85066644048
-
IPv6 Enters the Real World
-
February 2
-
Stephen Lawson, “IPv6 Enters the Real World,” Infoworld, February 2, 2002, p. 35.
-
(2002)
Infoworld
, pp. 35
-
-
Stephen, L.1
-
165
-
-
33845274896
-
Where Opportunity Is Knocking for Small Business
-
December 4
-
Dawn Kopecki, “Where Opportunity Is Knocking for Small Business,” Business Week, December 4, 2006, p. 81.
-
(2006)
Business Week
, pp. 81
-
-
Dawn, K.1
-
166
-
-
85066670174
-
-
Feds Slacking in Shift to Next Generation, June 29
-
Anne Brache, “Feds Slacking in Shift to Next Generation” http://news.com.com//2100-10283-5768937.html, June 29, 2005.
-
(2005)
-
-
Anne, B.1
-
167
-
-
33645795931
-
What Spies Beneath
-
October 7
-
Chris Taylor, “What Spies Beneath,” Time, October 7, 2002, p. 106.
-
(2002)
Time
, pp. 106
-
-
Chris, T.1
-
168
-
-
85066648828
-
-
Spike in ‘Spyware’ Accelerates Arms Race, February 24
-
John Borland, “Spike in ‘Spyware’ Accelerates Arms Race,” http://news.com.com/2009-1023-985524.html, February 24, 2003
-
(2003)
-
-
John, B.1
-
169
-
-
85066718695
-
New York (Simon and Schuster
-
Sherry Turkle, Life on the Screen, New York (Simon and Schuster, 1995), pp. 25, 88–96.
-
(1995)
Life on the Screen
, pp. 25-96
-
-
Sherry, T.1
-
170
-
-
32844455309
-
Changing the Social Meaning of Privacy in Cyberspace
-
Steven Hetcher, “Changing the Social Meaning of Privacy in Cyberspace,” 15 Harvard Journal of Law and Technology, 2001, pp. 149.
-
(2001)
Harvard Journal of Law and Technology
, vol.15
, pp. 149
-
-
Steven, H.1
-
171
-
-
84903000667
-
Why Privacy Notices Are a Sham
-
June 18
-
Mike France, “Why Privacy Notices Are a Sham,” Business Week, June 18, 2001, pp. 82–3.
-
(2001)
Business Week
, pp. 82-83
-
-
Mike, F.1
-
172
-
-
85066678694
-
-
Promise of P3P Stalls as Backers Regroup, October 29
-
Paul Festa, “Promise of P3P Stalls as Backers Regroup,” http://news.com.com/2100-1023-963632.html, October 29, 2002.
-
(2002)
-
-
Paul, F.1
-
173
-
-
0002819636
-
Trust Online
-
December
-
Batya Friedman, Peter Kahn, and Daniel Howe, “Trust Online,” CACM, December 2000, pp. 34–40.
-
(2000)
CACM
, pp. 34-40
-
-
Batya, F.1
Peter, K.2
Daniel, H.3
-
174
-
-
85066715125
-
They’re Watching You
-
October 16
-
Andrew Odlyzko, “They’re Watching You,” Economist, October 16, 2003, p. 77.
-
(2003)
Economist
, pp. 77
-
-
Andrew, O.1
-
176
-
-
85066667741
-
Privacy Matters
-
May 23
-
Alice Lipowicz, “Privacy Matters,” Washington Technology, 20, 10, May 23, 2005, pp. 1, 30–2.
-
(2005)
Washington Technology
, vol.20
, Issue.10
, pp. 1-32
-
-
Alice, L.1
-
177
-
-
85066700422
-
WS-Security details the mechanisms by which a SOAP [Simple Object Access Protocol] message can describe not only its contents but also its credentials and the algorithms by which your XML packet’s privacy and nonrepudiability were generated
-
Barry Brigs June 17
-
Barry Brigs, “WS-Security details the mechanisms by which a SOAP [Simple Object Access Protocol] message can describe not only its contents but also its credentials and the algorithms by which your XML packet’s privacy and nonrepudiability were generated.” Barry Brigs, Infoworld, June 17, 2001, p. 58.
-
(2001)
Infoworld
, pp. 58
-
-
Barry, B.1
-
181
-
-
0009169680
-
What, If Anything, Is a Zebra?
-
S. J. Gould, New York (W. W. Norton)
-
S. J. Gould, “What, If Anything, Is a Zebra?” in S. J. Gould, Hen’s Teeth and Horse’s Toes, New York (W. W. Norton), pp. 355–65.
-
Hen’s Teeth and Horse’s Toes
-
-
Gould, S.J.1
-
182
-
-
0003482139
-
-
New York (Harcourt, Brace, and World)
-
Edward Sapir, Language, New York (Harcourt, Brace, and World), 1921;
-
(1921)
Language
-
-
Edward, S.1
-
183
-
-
0003813340
-
-
ed. John B. Carroll, Cambridge (MIT Press)
-
Benjamin L. Whorf, Language, Thought, and Reality: Selected Writings of Benjamin Lee Whorf, ed. John B. Carroll, Cambridge (MIT Press), 1956.
-
(1956)
Language, Thought, and Reality: Selected Writings of Benjamin Lee Whorf
-
-
Benjamin, L.W.1
-
184
-
-
84954605327
-
Language and Social Cognition
-
Scott Tindale and Michael A. Hogg, ed. Oxford (Oxford University Press)
-
Gön R. Semin, “Language and Social Cognition,” in Scott Tindale and Michael A. Hogg, ed., Blackwell Handbook of Social Psychology, Oxford (Oxford University Press), 2000, pp. 159–80.
-
(2000)
Blackwell Handbook of Social Psychology
, pp. 159-180
-
-
Gün, S.1
-
186
-
-
0003511397
-
-
San Francisco (Harper San Francisco)
-
Tim Berners-Lee, Weaving the Web, San Francisco (Harper San Francisco), 1999, pp. 177–96.
-
Weaving the Web
, pp. 177-196
-
-
Tim, B.-L.1
-
187
-
-
79551602978
-
The Semantic Web
-
May
-
Tim Berners-Lee, James Hendler, and Ora Lassila, “The Semantic Web,” Scientific American, May 2001, pp. 34–43.
-
(2001)
Scientific American
, pp. 34-43
-
-
Tim, B.-L.1
James, H.2
Ora, L.3
-
188
-
-
85066726459
-
The Semantic Web
-
March 4
-
Otis Port, “The Semantic Web,” Business Week, March 4, 2002, pp. 97–102
-
(2002)
Business Week
, pp. 97-102
-
-
Otis, P.1
-
189
-
-
85066677160
-
-
The Semantic Web: An Interview with Tim Berners-Lee, June
-
Andrew Updegrove, “The Semantic Web: An Interview with Tim Berners-Lee,” www.consortiuminfo.org/bulletins/semanticweb.php, June 2005.
-
(2005)
-
-
Andrew, U.1
-
190
-
-
85066640656
-
Look Ma, No Hands
-
November 20
-
Robert Hof, “Look Ma, No Hands,” Business Week E-Biz, November 20, 2000, p. 132.
-
(2000)
Business Week E-Biz
, pp. 132
-
-
Robert, H.1
-
191
-
-
85066656398
-
The Ultimate On-the-Fly Network
-
both in, December
-
Martha Baer, “The Ultimate On-the-Fly Network,” both in Wired, December 2003, pp. 236
-
(2003)
Wired
, pp. 236
-
-
Martha, B.1
-
192
-
-
85066675195
-
-
U.S. DoD C4ISR, Washington (Cooperative Research Program), 1999, especially Chapter 2, “Systems of Systems and Federations of Systems
-
Annette Krygiel, Behind the Wizard’s Curtain, U.S. DoD C4ISR, Washington (Cooperative Research Program), 1999, especially Chapter 2, “Systems of Systems and Federations of Systems,” pp. 31–47.
-
(1999)
Behind the Wizard’s Curtain
, pp. 31-47
-
-
Annette, K.1
-
193
-
-
0345851235
-
Wireless Integrated Network Sensors
-
May
-
G. L. Pottie and W. J. Kaiser, “Wireless Integrated Network Sensors,” CACM, 43, 5, May 2000, pp. 51–8;
-
(2000)
CACM
, vol.43
, Issue.5
, pp. 51-58
-
-
Pottie, G.L.1
Kaiser, W.J.2
-
194
-
-
0345851236
-
Amorphous Computing
-
May
-
Harold Abelson et al., “Amorphous Computing,” CACM, 43, 5, May 2000, pp. 74–82
-
(2000)
CACM
, vol.43
, Issue.5
, pp. 74-82
-
-
Harold, A.1
-
195
-
-
0347514877
-
Have Your Objects Call My Objects
-
Harvard Business Review, June
-
Glover T. Ferguson, “Have Your Objects Call My Objects,” Harvard Business Review, June 2002, pp. 138–44;
-
(2002)
Harvard Business Review
, pp. 138-144
-
-
Glover, T.F.1
-
196
-
-
3342884620
-
Sensors and Sensibility
-
subsequent articles, July
-
Jean Kumagai and Steven Cherry, “Sensors and Sensibility,” and subsequent articles, IEEE Spectrum, July 2004, pp. 22–48;
-
(2004)
IEEE Spectrum
, pp. 22-48
-
-
Jean, K.1
Steven, C.2
-
197
-
-
85066726615
-
-
Making Sense of Sensors, August 15
-
Michael Kanellos, “Making Sense of Sensors,” http://news.com.com/2008-10823-5829415.html?tag=nefd.ac, August 15, 2005.
-
(2005)
-
-
Michael, K.1
-
198
-
-
85066703519
-
-
.Net and the Emperor’s New Clothes, August 2
-
Charles Cooper, “.Net and the Emperor’s New Clothes,” http://news.com.com/2010-1071-948117.html August 2, 2002.
-
(2002)
-
-
Charles, C.1
-
199
-
-
85066706005
-
Tentacles of Jihad: Targeting Transnational Support Networks
-
Summer
-
Shawn Birmley, “Tentacles of Jihad: Targeting Transnational Support Networks,” Parameters, Summer 2006, p. 40.
-
(2006)
Parameters
, pp. 40
-
-
Shawn, B.1
-
200
-
-
84896483031
-
In Montana, Casting a Web for Terrorists
-
June 4
-
Blaine Harden, “In Montana, Casting a Web for Terrorists,” Washington Post, June 4, 2006, p. A 3, available at www.washingtonpost.com/wp-dyn/content/article/2006/06/03/AR2006060300530pf.html
-
(2006)
Washington Post
, pp. A3
-
-
Blaine, H.1
-
201
-
-
85066647469
-
17 Held in Plot to Bomb Sites across Ontario
-
June 4
-
Ian Austen and David Johnston, “17 Held in Plot to Bomb Sites across Ontario,” New York Times, June 4, 2006, p. A1.
-
(2006)
New York Times
, pp. A1
-
-
Ian, A.1
David, J.2
-
202
-
-
85066641381
-
Ontario Terrorism Suspects Face List of Charges in Plot
-
June 6
-
Anthony DePalma, “Ontario Terrorism Suspects Face List of Charges in Plot,” New York Times, June 6, 2006, p. A11.
-
(2006)
New York Times
, pp. A11
-
-
Anthony, D.1
-
203
-
-
85066651886
-
-
FBI Busts ‘Real Deal’ Terror Plot Aimed at NYC-NJ Underground Transit Link, July 7
-
Fox News, “FBI Busts ‘Real Deal’ Terror Plot Aimed at NYC-NJ Underground Transit Link,” http://www.foxnews.com/story/0,2933,202518,00.html, July 7, 2006;
-
(2006)
-
-
Fox, N.1
-
204
-
-
85066678503
-
Recent Arrests in Terror Plots Yield Debate on Pre-Emptive Action by Government
-
July 9
-
Eric Lipton, “Recent Arrests in Terror Plots Yield Debate on Pre-Emptive Action by Government,” New York Times, July 9, 2006, p. A13.
-
(2006)
New York Times
, pp. A13
-
-
Eric, L.1
-
205
-
-
84906128567
-
3 Hold Overseas in Plan to Bomb New York Target
-
July 8
-
A. L Baker and William K. Rashbaum, “3 Hold Overseas in Plan to Bomb New York Target,” New York Times, July 8, 2006, p. A1.
-
(2006)
New York Times
, pp. A1
-
-
Baker, A.L.1
Rashbaum, W.K.2
-
207
-
-
70549098211
-
Hackers Attack via Chinese Web Sites
-
August 25
-
Bradley Graham, “Hackers Attack via Chinese Web Sites,” Washington Post, August 25, 2005, p. A1.
-
(2005)
Washington Post
, pp. A1
-
-
Bradley, G.1
-
208
-
-
85066663906
-
-
Is Finding Security Holes a Good Idea?
-
Eric Rescorla, “Is Finding Security Holes a Good Idea?” www.dtc.umn.edu/weis2004/rescorla.pdf, 2004.
-
(2004)
-
-
Eric, R.1
-
209
-
-
85066720355
-
-
Security in Open versus Closed Systems: The Dance of Boltzmann, Coase, and Moore
-
Ross Anderson, “Security in Open versus Closed Systems: The Dance of Boltzmann, Coase, and Moore,” www.ftp.cl.cam.ac.uk/ftp/users/rja14/toulouse.pdf, 2002
-
(2002)
-
-
Ross, A.1
-
210
-
-
0004231543
-
-
Reading (Addison-Wesley)
-
Nancy Leveson, Safeware, Reading (Addison-Wesley), 1995
-
(1995)
Safeware
-
-
Nancy, L.1
-
211
-
-
85066695508
-
-
New Laws Make Hacking a Black-and-White Choice, September 23
-
Robert Lemos, “New Laws Make Hacking a Black-and-White Choice,” http://news.com.com/2009-10013-958129.html, September 23, 2002.
-
(2002)
-
-
Robert, L.1
-
212
-
-
85066703848
-
Insuring against Cybercrime Gets Tougher
-
January 7
-
Sandra Swanson and George Hulme, “Insuring against Cybercrime Gets Tougher,” Information Week, January 7, 2002, available at www.informationweek.com/story/IWK20020104S0022.
-
(2002)
Information Week
-
-
Sandra, S.1
George, H.2
-
213
-
-
84937330251
-
Securing Internet Society: Toward an International Regime for Information Assurance
-
Lorenzo Valeri, “Securing Internet Society: Toward an International Regime for Information Assurance,” Studies in Conflict and Terrorism, 23, 2000, pp. 129–46.
-
(2000)
Studies in Conflict and Terrorism
, vol.23
, pp. 129-146
-
-
Lorenzo, V.1
-
214
-
-
85066689255
-
-
Republicans Defeat Net Neutrality Proposal, June 8
-
Declan McCullagh, “Republicans Defeat Net Neutrality Proposal,” http://news.com.com/2100-10283-6058223.html, June 8, 2006.
-
(2006)
-
-
Declan, M.1
-
215
-
-
85066674548
-
Windows XP and DDOS
-
March 11
-
Brian Livingston, “Windows XP and DDOS,” Infoworld, March 11, 2001, p. 60.
-
(2001)
Infoworld
, pp. 60
-
-
Brian, L.1
-
216
-
-
85066723623
-
-
Experts: Zombies Ousting Viruses, May 25
-
Munir Kotadia, “Experts: Zombies Ousting Viruses,” http://news.com.com/2102-73553-5720428.html, May 25, 2005.
-
(2005)
-
-
Munir, K.1
-
217
-
-
85066683921
-
The Code Red Worm
-
December 200
-
Hal Berghel, “The Code Red Worm,” CACM, December 2001, p. 19.
-
(2001)
CACM
, pp. 19
-
-
Hal, B.1
-
218
-
-
0027570688
-
How Architecture Wins Technology Wars
-
March-April
-
Charles Morris and Charles Ferguson, “How Architecture Wins Technology Wars,” Harvard Business Review, March-April 1993, pp. 86–96.
-
(1993)
Harvard Business Review
, pp. 86-96
-
-
Charles, M.1
Charles, F.2
-
219
-
-
85066655208
-
On the Ecology of Micromotives
-
Fall
-
Tom Schelling, “On the Ecology of Micromotives,” Public Interest, Fall 1971, p. 25.
-
(1971)
Public Interest
-
-
Tom, S.1
-
220
-
-
85066675459
-
-
U.S. to Retain Control of Internet Domain Names, June 30
-
Declan McCullagh, “U.S. to Retain Control of Internet Domain Names,” http://news.com.com/2102-10283-5770937.html, June 30, 2005;
-
(2005)
-
-
Declan, M.1
-
221
-
-
85066718360
-
-
Thinking Outside the Outbox, June 1
-
Andy Oram, “Thinking Outside the Outbox,” http://www.oreillynet.com/pub/a/network/2000/06/01/outbox.html, June 1, 2000.
-
(2000)
-
-
Andy, O.1
-
222
-
-
85066720635
-
-
Microsoft Gets Diplomatic in China, Jue 5
-
Michael Kanellos, “Microsoft Gets Diplomatic in China,” http://news.com.com/2100-1001-932927.html, June 5, 2002
-
(2002)
-
-
Michael, K.1
-
223
-
-
85066721535
-
-
When Good Search Engines Go Bad, March 3
-
Paul Boutin, “When Good Search Engines Go Bad,” http://www.slate.com/id/2114308/, March 3, 2005.
-
(2005)
-
-
Paul, B.1
-
224
-
-
85066683901
-
-
Competition: Ultimate Challenge to AOL, October 19
-
Jim Hu, “Competition: Ultimate Challenge to AOL,” http://news.com.com/2009-1001-273801.html, October 19, 2001.
-
(2001)
-
-
Hu, J.1
-
225
-
-
85066721107
-
Is It Secure? I Mean IIS
-
January 21
-
Brian Livingston, “Is It Secure? I Mean IIS” Infoworld, January 21, 2002, p. 39.
-
(2002)
Infoworld
, pp. 39
-
-
Brian, L.1
-
226
-
-
84924008465
-
Robust Open-Source Software
-
February
-
Peter Neumann, “Robust Open-Source Software,” 104, CACM, 42, 2, February 1999, p. 104.
-
(1999)
CACM
, vol.42
, Issue.2
, pp. 104
-
-
Peter, N.1
-
227
-
-
85066700469
-
-
CyberInsecurity: The Cost of Monopoly, September 24
-
Charles Greer et al., “CyberInsecurity: The Cost of Monopoly,” http://www.totse.com/en/technology/computer technology/cyberinsecurit171812.html, September 24, 2003.
-
(2003)
-
-
Charles, G.1
-
228
-
-
85066673356
-
-
Developers Fast to Fix Open-Source Bugs, April 4
-
Joris Evans, “Developers Fast to Fix Open-Source Bugs,” http://news.com.com/2102-1002 3-6057669.html, April 4, 2006.
-
(2006)
-
-
Joris, E.1
-
229
-
-
85066675736
-
-
The Cathedral and the Bazaar
-
Eric Raymond, “The Cathedral and the Bazaar,” http://www.tuxedo.org/~esr/writings/cathedral-bazaar/cathedral-bazaar/index.html#catbmain.
-
-
-
Eric, R.1
-
232
-
-
85066677227
-
-
Microsoft: Too Much Control of the Web?, November 8
-
David Winer, “Microsoft: Too Much Control of the Web?” news.zdnet.com/2100-959522-531040.html, November 8, 2001.
-
(2001)
-
-
David, W.1
-
233
-
-
85066639143
-
-
South Korea Fines Microsoft $32 Million, December 7
-
Aaron Tan, “South Korea Fines Microsoft $32 Million,” http://news.com.com/2100-10473-5985332.html, December 7, 2005.
-
(2005)
-
-
Aaron, T.1
|