cher's canvas

Exploring the messy confluence of technology and people (law)
  • Domain
    • Organisation
  • Research
    • Literature Review 3 Pass Approach
    • How to write a good (design) paper
  • Resource
    • Journals
    • List of sources
    • Ref-Bib
    • Risk Resources
    • zotero
    • Open Source community
  • Peirce
  • Conference
    • Event
  • Plan
    • High Level Plan
    • Oct 2013 Blue Sky Plan
    • January 2014 research view
    • question
    • 6 month review
  • Notes
    • list-Aug-2015
    • Research Notes
    • Research Notes V2
    • stakeholder
    • Data-stakeholder
    • flow
    • ToDoNotes
    • ToDo V2
    • Question
    • domain of discourse
  • Transfer
    • 7Aug2015
  • About Cher

How to write a good (design) paper

 Add comments
 

how to write a good (design) paper

 Posted by admin on November 8, 2013 at 5:53 pm

 Leave a Reply Cancel reply

You must be logged in to post a comment.

Tags

3 pass approach BitSight bored with read buddhism Case Study cass City Library City Research Guide craft of research cybersecurity Data Privacy Day Difficulties extract four-step hammersley framework internet ISACA methodology moodle music nick hopwood problem formation.problem resolution Problems ranking rating read paper research method research problem research question research space security ratings smartmobile social science supervisor supervisors surveil surveillance systematic literature review Target breach timelessness timetable US law viva word checker write-paper

Recent Posts

  • PhD Thesis
  • List of sources – Cyber Security & Data Science
  • Stuff
  • MyThesisChapter 1
  • Post PhD news! #cyberASAP #staySafe #workFromHome

Categories

  • 2014
  • 2015
  • 2016
  • 2017
  • 2018
  • 2019
  • 2020
  • Conference
  • cyberasap2020
  • cybersecurity
  • dashboard
  • data
  • data breaches
  • Extracts
  • GDPR
  • How To
  • incidents
  • Misc
  • Month-by-month
  • PhD
  • Questions
  • reminiscence
  • research presentation
  • semiotic
  • Thesis
  • Update
  • US
  • US Law
  • Verizon
  • Calendar

Incident Response

  • CESG – cyber incident response
  • ENISA – Triage incident

DataHub

  • Cyberfactors – proprietary
  • Data Driven Security – resources
  • DataLossDb (US)
  • Deep Web vs. Dark Web (snapshot view)
  • Hackmageddon – Paul Sparrows
  • Identity Theft Center (US)
  • IT Governance Glossary – from itgovernance.co.uk
  • Making Security Measurable
  • National Vulnerability Database (NIST)
  • OSINT Framework by Justin Nordine
  • Places and Spaces
  • Privacy Rights Org (US)
  • The A-Z of computer and data security threats (Sophos)
  • The CERT Insider Threat Database (US)
  • The identity theft center (US)
  • The Vocabulary for Event Recording and Incident Sharing (VERIS) – is a taxonomy for describing security incidents
  • Veris community db
  • Veriscommunity.com
  • worlds biggest data breaches

Ethics

  • A VERY SHORT HISTORY OF COMPUTER ETHICS (Norbert Wiener) by TERRELL WARD BYNUM
  • AI & Ethics
  • CANVAS – A special focus of CANVAS is on raising awareness on the ethics of cybersecurity through teaching in academia and industry.
  • Computer and Information Ethics (Stanford Encyclopedia of Philosophy)
  • Explore Your Morals
  • KnightFoundation (Ethics-related research)
  • Stanford Ethics in Society
  • The Future of Artificial Intelligence – the Long View (UK)
  • What is (current understanding of the knowns!)?

Cyber Chain

  • AIR-Worldwide Cyber Exposure Data Schema and Preparer's Guide
  • IS Alliance (US)
  • RMS Cyber Exposure Data Schema
  • University of Cambridge – Centre for Risk Studies
  • University of Maryland US – Cyber
  • World Economic Forum

EU

  • BigBrotherWatch Org (EU-UK)
  • BreachWatch (UK)
  • BRUSSELS PRIVACY HUB INTERNATIONAL ACADEMIC PRIVACY RESEARCH CENTRE IN THE HEART OF EUROPE
  • CANVAS – A special focus of CANVAS is on raising awareness on the ethics of cybersecurity through teaching in academia and industry.
  • CORDIS
  • CPDP Conferences
  • CPNI – Centre for the Protection of National Infrastructure (UK)
  • EU Cybersecurity
  • EU Cybersecurity Laws & Regulations
  • EU Cybersecurity Plan
  • EU HORIZON 2020
  • European Telecommunications Standards Institute (etsi.org)
  • European Union Agency for Network and Information Security (ENISA)
  • HMG (UK) Security Policy Framework
  • HMG INFOSEC STANDARD NO. 2 (UK)
  • UK Government on Cyber Threats

US

  • AI & Ethics
  • Berkman Center for Internet & Society
  • CERT – CMU Software Engineering Institute
  • CMU CyLab
  • CORPORATE INFORMATION SECURITY WORKING GROUP REPORT OF THE BEST PRACTICES AND METRICS TEAMS
  • Cyberspace Sciences and Information Intelligence Research Group (CSIIR)
  • Databreaches.net (US)
  • Explore Your Morals
  • FEMA (US) – Emergency Management Institute
  • Geogia Tech Information Security Center
  • INDIANA UNIVERSITY Center for Applied Cybersecurity Research
  • Industrial Control Systems Cyber Emergency Response Team – US Gov
  • Internet Security Alliance (US)
  • KnightFoundation (Ethics-related research)
  • Lincoln Laboratory MIT
  • MITRE cybersecurity resources
  • Network of Center
  • NIST US Cybersecurity
  • OWASP Top 10 Privacy Risks Project
  • privacy news and issues (pogowasright.org) (US)
  • Stanford Ethics in Society
  • Statista.com (US)
  • The Federal Financial Institutions Examination Council (FFIEC)

Organisations

  • A policy framework for an open and trusted Internet
  • An Incident Object Description Exchange Format (IODEF) Extension for Structured Cybersecurity Information April 2014
  • BRUSSELS PRIVACY HUB INTERNATIONAL ACADEMIC PRIVACY RESEARCH CENTRE IN THE HEART OF EUROPE
  • Business Continuity Plan – ready.gov (US)
  • Cher's List
  • Coelition.org (UK)
  • Council of Europe – Cybercrime (EU)
  • Cyber Observable eXpression : A Structured Language for Cyber Observables (mitre..org)
  • European Network & Information Security Agency (ENISA). Standard II
  • European Telecommunications Standards Institute (etsi.org)
  • European Union Agency for Network and Information Security (ENISA)
  • Financial Services Information Sharing and Analysis Center (FS-ISAC)
  • Gartner's list of top 25 Supply Chain
  • Incident Object Description and Exchange Format Working Group (IODEF – Closed)
  • Information Governance Alliance
  • Infosec organisations (compiled by NoVA infosec)
  • IODEF reference site
  • ITU – X.1205 : Overview of cybersecurity
  • National Cyber-Forensics & Training Alliance (US)
  • Open Standards for the Information Society

Viz

  • Aviz
  • Data Stories
  • excelcharts – a classification of chart types
  • FILWD (fell-in-love-with-data)
  • flowingdata
  • gephi
  • IEEE VIS November 9-14, 2014
  • informationisbeautiful
  • infosthetics
  • Interactive Data Visualization links
  • JavaScript InfoVis Toolkit
  • jeffrey michael heer
  • linkurio
  • Map of Complexity Sciences
  • Oxford Internet Institute – Interactive visualisation
  • Places and Spaces – maps
  • Securitymetrics visualization
  • Stephen Few blog -perceptualedge
  • tapestryconference
  • The Open Web Data Viz Conference
  • VERIS Community database
  • visualisingdata Best of the visualisation web… February 2014
  • Viz Design

BI-tools

  • 1st – simplicity, clearness and mobility (Iver van de Zand)
  • BI platforms 2017 Report by g2crowd.com
  • birst.com
  • Business Process Model and Notation
  • cyfe.com
  • InfoCaptor.com
  • MicroStrategy Desktop
  • What is a dashboard? – dashboardinsight
  • wireframes.org

Data Protection and Privacy

Links maintained on this edisclosure site/page

Archives

  • February 2023
  • August 2020
  • July 2020
  • June 2020
  • March 2020
  • July 2019
  • June 2019
  • April 2019
  • March 2019
  • February 2019
  • October 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • July 2017
  • June 2017
  • May 2017
  • March 2017
  • August 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • September 2014
  • August 2014
  • July 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013

Guest

1 User Online
© 2013 Cher Devey Disclaimer & Privacy Suffusion theme by Sayontan Sinha