This is the talk page for discussing improvements to the Cyberattack article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
Archives: Index, 1Auto-archiving period: 365 days |
This article is rated C-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Individuals with a conflict of interest, particularly those representing the subject of the article, are strongly advised not to directly edit the article. See Wikipedia:Conflict of interest. You may request corrections or suggest content here on the Talk page for independent editors to review, or contact us if the issue is urgent. |
The Wikimedia Foundation's Terms of Use require that editors disclose their "employer, client, and affiliation" with respect to any paid contribution; see WP:PAID. For advice about reviewing paid contributions, see WP:COIRESPONSE.
|
Text has been copied to or from this article; see the list below. The source pages now serve to provide attribution for the content in the destination pages and must not be deleted as long as the copies exist. For attribution and to access older versions of the copied text, please see the history links below.
|
Wiki Education Foundation-supported course assignment
editThis article was the subject of a Wiki Education Foundation-supported course assignment, between 17 May 2021 and 31 July 2021. Further details are available on the course page. Peer reviewers: Jmhogg.
Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 19:42, 17 January 2022 (UTC)
Wiki Education assignment: Social Informatics - ITI 200 Section 90
editThis article was the subject of a Wiki Education Foundation-supported course assignment, between 17 January 2024 and 29 April 2024. Further details are available on the course page. Student editor(s): CL1422, Vin Ezp Esp, Rokald77, Travism121212, Rw696, Tim Li27 (article contribs).
— Assignment last updated by Rutgerskyle12 (talk) 00:11, 26 April 2024 (UTC)
Edit request
editReplace the content of the article with User:Buidhe paid/Cyberattack
Reason : improve sourcing and content, with new sections about legality, responses and attribution, prevention, etc.
"Cyberattacks by and against countries" does get removed in my version ; it could be split into a new cyberattacks by country article. My version also shrinks the infrastructure section per wp:weight, so that content should also be moved to a new article, cyberattacks against infrastructure. Buidhe paid (talk) 19:18, 23 April 2024 (UTC)
- Tjb266, @Dhara447:, if one of you could look at the edit request and decide whether to implement it, that would ensure that you are working with the latest version of the article. Thanks Buidhe paid (talk) 19:33, 23 April 2024 (UTC)
- The general convention in Wikipedia is not to replace an article. Rather, the article is incrementally improved in several steps. That allows other editors to peer-review and focus on the specific changes you intend.
- So I suggest you follow that incremental route. Let's say you think the article has n separate sub-topics that need addressing. Then do that as (at least) n separate edits, each focussed on its sub-topic, as an "atomic transaction". If a sub-topic is big or has sub-sub-topics, use more than one edit. If you have ever used a version control system, such as git, you'll know the idea!
- Feline Hymnic (talk) 09:04, 12 May 2024 (UTC)
- That’s not true. There are no rules about whether articles should be improved in 100 edits or 1 edit. If you have any concrete objections to the content, please feel free to express them. I actually tried to do what you suggest, but since it is an obstacle to actually improving the article (see:talk:operating system), I changed my approach. (t · c) buidhe 09:15, 12 May 2024 (UTC)
- Feline Hymnic (talk) 09:04, 12 May 2024 (UTC)
- This is a difficult request to fulfill because it will take a reviewer a large amount of time to review your new article and review and compare to the existing article. After all that it done, it is unlikely a reviewer will find your new version better in every way and so there will need to be improvements to your new article or some sort of merge process. I took a look at your Talk:Operating system experience and I see that was also difficult. I don't have any specific advice other than it doesn't look like you've yet found an effective way to do this paid editing. ~Kvng (talk) 14:13, 14 May 2024 (UTC)
- I've already been paid for all my work and have no financial stake in whether it gets implemented or not. My plan is to wait until the grant expires so I can have no conceivable COI. Then, I will implement the edits myself (on my regular account) and let normal editing sort itself out. Buidhe paid (talk) 01:17, 15 May 2024 (UTC)
- Yes, if we can get the COI out of play, that would simplify things. Thanks for your contributions. ~Kvng (talk) 02:11, 15 May 2024 (UTC)
- I've already been paid for all my work and have no financial stake in whether it gets implemented or not. My plan is to wait until the grant expires so I can have no conceivable COI. Then, I will implement the edits myself (on my regular account) and let normal editing sort itself out. Buidhe paid (talk) 01:17, 15 May 2024 (UTC)
- why almost all sources are replaced with books that are not accessible for free? Throat0390 (talk) 18:35, 3 June 2024 (UTC)
- Because we should cite reliable sources rather than the websites that are most convenient to access. (t · c) buidhe 19:09, 3 June 2024 (UTC)
- Done myself, note that I split off much of the previous article's content into cyberattacks against infrastructure and cyberattacks by country to avoid wp:weight issues here. Buidhe paid (talk) 01:20, 4 June 2024 (UTC)
Wiki99 summary
editSummary of changes as a result of the Wiki99 project (before, after, diff):
Changes made:
- Rewrite according to reliable sources
- New sections on:
- Prevention
- Responses
- Attribution
- Legal issues (i.e. criminal law, and how international law relates to cyberattacks as a method of war)
- Split off articles cyberattacks by country and cyberattacks against infrastructure to maintain proper weight of topics in this article (for example, infrastructure makes up only a small portion of cyberattack targets).
Suggestions for further improvement
- Continue to expand the article according to scholarly sources
- Bring to GA (good article) status