Wegener_Who is doing what in Cybersecurity_2008.doc