User talk:Buidhe paid
Edit request
I saw your request at Talk:Data breach. I removed your post to WT:GAN because the request was not germane to GAN per NOTAFORUM but I'm looking into this. Chris Troutman (talk) 19:41, 25 March 2024 (UTC)
- ...and this is a lot of content to sort. Some of this preexisting content is going to need to be moved to the list of breaches. I should have this done in the next hour or two. Chris Troutman (talk) 19:54, 25 March 2024 (UTC)
Your GA nomination of Data breach
Hi there, I'm pleased to inform you that I've
Your COI edit requests
Hi there. Continuing the conversation I started on your edit requests in
On a separate but related matter, I see you have declared a personal connection to the authors of Anderson & Dahlin. I do not think you need to submit edit requests for your changes to Talk:Operating system that reference this book. Since you are presumably not receiving a cut of the profits from the book, it is already very debatable whether you have a COI at all. Even if you did, this text book is widely used in university for operating systems. Mokadoshi (talk) 22:44, 9 April 2024 (UTC)
- Yes, I think you are correct that it may be overkill. (t · c) buidhe 22:47, 9 April 2024 (UTC)
- The community is very sensitive to COI and paid editing right now. There's an arbcom case about it, and a big thread at ANI where a WiR may get topic banned. Before deviating from the COI edit request procedures, maybe ask a noticeboard just to be sure. –Novem Linguae (talk) 23:40, 9 April 2024 (UTC)
- What do you mean about
deviating from the COI edit request procedures
? It sounds like you're saying my suggestion runs contrary to current policy but they don't say that a WIR has to submit an edit request for 100% of their article edits. I understand the current discussions in the community about this, and agree that caution should be taken. At the same time, we shouldn't be arguing that WIRs aren't allowed to make any edits to any articles unless it goes through an edit request first. Buidhe has written multiple large edit requests (some rewriting entire sections of articles), and I commend the disclosure, but no one has time to review those, and the article is worse off if these have to sit for months for someone to review it. If I'm wrong, I'd be happy for you to tell me and I'd be interested to read more about this. I also agree about the noticeboard being a middle ground option as I said above. Mokadoshi (talk) 00:03, 10 April 2024 (UTC)- I'm just saying that because the issue is so sensitive, it might be wise to get a noticeboard to sign off on it. A misjudgment here could create major headaches for a COI/PAID editor later, for example at WP:RFA. –Novem Linguae (talk) 00:12, 10 April 2024 (UTC)]
- I'm just saying that because the issue is so sensitive, it might be wise to get a noticeboard to sign off on it. A misjudgment here could create major headaches for a COI/PAID editor later, for example at
- What do you mean about
Possible articles to work on
Buidhe paid (talk) 16:17, 1 April 2024 (UTC)
Zero-day
- Sood, Aditya; Enbody, Richard (2014). Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware. Syngress. ISBN 978-0-12-800619-1.
- O'Harrow, Robert (2013). Zero Day: The Threat In Cyberspace. Diversion Books. ISBN 978-1-938120-76-3.
- Perlroth, Nicole (2021). This Is How They Tell Me the World Ends: Winner of the FT & McKinsey Business Book of the Year Award 2021. Bloomsbury Publishing. ISBN 978-1-5266-2983-8.
- Ablon, Lillian; Bogart, Andy (2017). Zero Days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits. Rand Corporation. ISBN 978-0-8330-9761-3.
Cyberattack
- Vescent, Heather; Selby, Nick (2020). Cyber Attack Survival Manual: From Identity Theft to The Digital Apocalypse: and Everything in Between | 2020 Paperback | Identify Theft | Bitcoin | Deep Web | Hackers | Online Security | Fake News. Simon and Schuster. ISBN 978-1-68188-654-1.
- Johnson, Thomas A. (2015). Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare. CRC Press. ISBN 978-1-4822-3923-2.
- Bhardwaj, Akashdeep; Sapra, Varun (2021). Security Incidents & Response Against Cyber Attacks. Springer Nature. ISBN 978-3-030-69174-5.
Vulnerability
- Karimipour, Hadis; Srikantha, Pirathayini; Farag, Hany; Wei-Kocsis, Jin (2020). Security of Cyber-Physical Systems: Vulnerability and Impact. Springer Nature. ISBN 978-3-030-45541-5.
- Parkinson, Simon; Crampton, Andrew; Hill, Richard (2018). Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach. Springer. ISBN 978-3-319-92625-4.