Public-Private Cooperation: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 8: | Line 8: | ||
Energetics Inc., ''(2006)'' [[Roadmap to Secure Control Systems in the Energy Sector]] | Energetics Inc., ''(2006)'' [[Roadmap to Secure Control Systems in the Energy Sector]] | ||
Grady, Mark F. and Parisi, Francesco (2006) [[The Law and Economics of Cybersecurity]] | |||
Moore, Tyler and Clayton, Richard (2008) [[The Consequence of Non-Cooperation in the Fight Against Phishing]] | Moore, Tyler and Clayton, Richard (2008) [[The Consequence of Non-Cooperation in the Fight Against Phishing]] |
Revision as of 13:19, 28 June 2010
Aviram, Amitai and Tor, Avishalom (2004) Overcoming Impediments to Information Sharing
Center for Strategic and International Studies (2008) Securing Cyberspace for the 44th Presidency
Department of Defense (2007) Mission Impact of Foreign Influence on DoD Software
Department of Defense (2005) Strategy for Homeland Defense and Civil Support
Energetics Inc., (2006) Roadmap to Secure Control Systems in the Energy Sector
Grady, Mark F. and Parisi, Francesco (2006) The Law and Economics of Cybersecurity
Moore, Tyler and Clayton, Richard (2008) The Consequence of Non-Cooperation in the Fight Against Phishing
Moore, Tyler, et. al (2009) The Economics of Online Crime
Powell, Benjamin (2005) Is Cybersecurity a Public Good