This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. You can access the new platform at https://opencasebook.org. Thank you.
Edit playlist item notes below to have a mix of public & private notes, or:MAKE ALL NOTES PUBLIC (7/7 playlist item notes are public) MAKE ALL NOTES PRIVATE (0/7 playlist item notes are private)
|1||Show/Hide More||Richard Clarke and Robert Knake, Cyber War: The next Threat to National Security and What to Do About It, 2010|
|2||Show/Hide More||Jack Goldsmith, The New Vulnerability, The New Republic, Jun 7, 2010|
|3||Show/Hide More||Joel Brenner, America the Vulnerable: Inside the New Matrix of Digital Espionage, Crime, and Warfare, 2011|
|6||Show/Hide More||Peter Maass and Megha Rajagopalan, Does Cybercrime Really Cost $1Trillion?, Mother Jones, Aug 2, 2012|
|7||Show/Hide More||Julie J.C.H. Ryan and Theresa I. Jefferson, The Use, Misuse, and Abuse of Statistics in Information Security Research, Management National Conference, ASEM 2003.|
May 21, 2013
Jack Goldsmith and a Berkman Center Cybersecurity Team
This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. If you would like access to the new version of the H2O platform and have not already been contacted by a member of our team, please contact us at email@example.com. Thank you.