Chapter 4 Bibliography Guidelines ----------------- ------------------- 4.1 Explore rights. The Bill of Rights: A Transcription. (2015). National Archives. https://www.archives.gov/founding-docs/bill-of-rights-transcript Know Your Rights. (2018). Electronic Frontier Foundation. https://www.eff.org/issues/know-your-rights Patents. 2018. USPTO. https://www.uspto.gov/patent. Trademarks. 2018. USPTO. https://www.uspto.gov/trademark. Copyright Policy. 2018. USPTO. https://www.uspto.gov/learning-and-resources/ip-policy/copyright/copyright-policy. Stim, Rich. 2013. "Measuring Fair Use: The Four Factors". Stanford Copyright And Fair Use Center. https://fairuse.stanford.edu/overview/fair-use/four-factors/. Coders' Rights Project. 2018. Electronic Frontier Foundation. https://www.eff.org/issues/coders. -------------------- 4.2 Explore electronic privacy. International Privacy Standards. 2018. Electronic Frontier Foundation. https://www.eff.org/issues/international-privacy-standards. Family Educational Rights and Privacy Act (FERPA). Department of Education, USA. ND. https://www.fbi.gov/file-repository/ferpa-guide.pdf "Your Rights Under HIPAA". 2008. HHS.Gov. https://www.hhs.gov/hipaa/for-individuals/guidance-materials-for-consumers/index.html. "Electronic Communications Privacy Act Of 1986 (P.L. 99-508)". 2014. Justice.Gov. https://www.justice.gov/jmd/electronic-communications-privacy-act-1986-pl-99-508. "FDIC: Privacy Act Issues Under Gramm-Leach-Bliley". 2009. Fdic.Gov. https://www.fdic.gov/consumers/consumer/alerts/glba.html. "Privacy Act Of 1974". 2014. Justice.Gov. https://www.justice.gov/opcl/privacy-act-1974. 2018. Hatch.Senate.Gov. https://www.hatch.senate.gov/public/_cache/files/6ba62ebd-52ca-4cf8-9bd0-818a953448f7/ALB18102%20(1).pdf. "Mandatory Data Retention". 2018. Electronic Frontier Foundation. https://www.eff.org/issues/mandatory-data-retention. "What Is The USA Patriot Web". 2018. Justice.Gov. https://www.justice.gov/archive/ll/highlights.htm. --------------- 4.3 Explore cybersecurity. "Norse Map of Live Attacks". 2018. Norse Corporation. http://www.norsecorp.com/. "Cybersecurity: Crash Course Computer Science #31". 2018. Crash Course. https://www.youtube.com/embed/bPVaOlJ6ln0. "Hackers & Cyber Attacks: Crash Course Computer Science #32". 2018. Crash Course. https://www.youtube.com/embed/_GzE99AmAQU. One source for one of these terms: Adware, Click Bait, Engagement Bait, Backdoor, Browser/cookie hijacking and SSL/TLS, Cross-site Scripting Drive-by downloads, Grayware, Keylogging, Man-in-the-Middle attacks, Pharming, Phishing and Spear Phishing Ransomware, Rootkit, Spyware, Stalkerware, and Snooping (sound, video, webcam), Spoofing, watering hole, Zombie ----------------- 4.4 Explore cybersecurity laws. "Computer Fraud And Abuse Act Reform". 2018. Electronic Frontier Foundation.https://www.eff.org/issues/cfaa. "Cyber Security Legislation". 2018. Electronic Frontier Foundation. https://www.eff.org/issues/cyber-security-legislation. "Cybersecurity Framework". 2018. NIST. https://www.nist.gov/cyberframework. "SANS Institute". 2018. Sans.Org. https://www.sans.org/programs/. "Cybersecurity And IT Security Professional Organization | (ISC)² ". 2018. Isc2.Org. https://www.isc2.org/about. ---------------- 4.5 Guest Speaker: Jim Kelly, Samaritan Health Services. "Facts At A Glance". 2018. Samaritan Health Services. https://www.samhealth.org/about-samaritan/our-organization/facts-at-a-glance.