The Ohio State University

  • Help
  • BuckeyeLink
  • Map
  • Find People
  • Webmail
  • Search Ohio State

    • Login
    Browsing I/S: Volume 3, Issue 2 (Fall 2007) by Title 
    •   KB Home
    • Moritz College of Law
    • Ohio State Technology Law Journal (Moritz College of Law)
    • I/S: Volume 3, Issue 2 (Fall 2007)
    • Browsing I/S: Volume 3, Issue 2 (Fall 2007) by Title
    •   KB Home
    • Moritz College of Law
    • Ohio State Technology Law Journal (Moritz College of Law)
    • I/S: Volume 3, Issue 2 (Fall 2007)
    • Browsing I/S: Volume 3, Issue 2 (Fall 2007) by Title
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of Knowledge BankCommunities & CollectionsIssue DateAuthorsTitlesSubjectsThis CollectionIssue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    More Information

    • Knowledge Bank Center
    • KB License Agreement
    • Submission Instructions
    • Policies

    Browsing I/S: Volume 3, Issue 2 (Fall 2007) by Title

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing results 1-10 of 10

    • Title
    • Issue Date
    • Accession Date
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Thumbnail

        Commentaries 

        ( 2007 )
      • Thumbnail

        Defaults vs. Rational Choice: The Case of Home-Based Wireless Security 

        Hottell, Matthew ( 2007 )
      • Thumbnail

        The Economics of Proof-of-Work 

        Liu, Debin ( 2007 )
      • Thumbnail

        Extending Learned Hand's Negligence Formula to Information Security Breaches 

        Rustad, Michael L.; Koenig, Thomas H. ( 2007 )
      • Thumbnail

        Ignoring the Great Firewall of China 

        Clayton, Richard; Murdoch, Steven J.; Watson, Robert N. M. ( 2007 )
      • Thumbnail

        Masthead (Volume 3, Number 2, Fall 2007) 

        ( 2007 )
      • Thumbnail

        Open-Source Policy Modeling 

        Henrion, Max ( 2007 )
      • Thumbnail

        The Problem of Anonymous Vanity Searches 

        Soghoian, Christopher ( 2007 )
      • Thumbnail

        Reliable, Usable Signaling to Defeat Masquerade Attacks 

        Camp, L. Jean ( 2007 )
      • Thumbnail

        Table of Contents (Volume 3, Number 2, Fall 2007) 

        ( 2007 )
      Thumbnail
      (2007) Commentaries
      Thumbnail
      (2007) Defaults vs. Rational Choice: ...
      Thumbnail
      (2007) The Economics of Proof-of-Work
      Thumbnail
      (2007) Extending Learned Hand's ...
      Thumbnail
      (2007) Ignoring the Great Firewall ...
      Thumbnail
      (2007) Masthead (Volume 3, Number 2, ...
      Thumbnail
      (2007) Open-Source Policy Modeling
      Thumbnail
      (2007) The Problem of Anonymous Vanity ...
      Thumbnail
      (2007) Reliable, Usable Signaling to ...
      Thumbnail
      (2007) Table of Contents (Volume 3, ...


        OSU Libraries
        • on Facebook
        • on Twitter
        • on Instagram
        • on LinkedIn
        • on YouTube

        © The Ohio State University - University Libraries

        1858 Neil Avenue Mall, Columbus, Ohio 43210

        Phone: 614-292-OSUL (6785)


        Contact Us | Knowledge Bank Center | DSpace


        Items in the Knowledge Bank are protected by copyright unless otherwise indicated. Libraries Copyright Information.
        Request an alternate format of this page | Accessibility | Privacy Policy
        • on Facebook
        • on Twitter
        • on Instagram
        • on LinkedIn
        • on YouTube