Actors and Incentives: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 1: Line 1:
Anderson, Ross J. (2008) [[Security Engineering]]
Barkham, Jason (2001) [[Information Warfare and International Law on the Use of Force]]
Clarke, Richard A. and Knake, Robert  (2010)  [[Cyber War]]
Department of Defense (2007) [[Mission Impact of Foreign Influence on DoD Software]]
Department of Homeland Security (2003) [[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]
Epstein, Richard A. and Brown, Thomas P. (2008) [[Cybersecurity in the Payment Card Industry]]
Epstein, Richard A. and Brown, Thomas P. (2008) [[Cybersecurity in the Payment Card Industry]]


Franklin, Jason, et. al (2007) [[An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants]]
Franklin, Jason, et. al (2007) [[An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants]]
Grady, Mark F. and Parisi, Francesco (2006) [[The Law and Economics of Cybersecurity]]
Johnson, Eric M. (2008) [[Managing Information Risk and the Economics of Security]]


Johnson, Vincent R. (2005) [[Cybersecurity, Identity Theft, and the Limits of Tort Liability]]
Johnson, Vincent R. (2005) [[Cybersecurity, Identity Theft, and the Limits of Tort Liability]]


Moore, Tyler, et. al (2009) [[The Economics of Online Crime]]
Moore, Tyler, et. al (2009) [[The Economics of Online Crime]]
Nye, Joseph (2010) [[Cyber Power]]
Schneier, Bruce (2003) [[Beyond Fear]]
Stohl, Michael ''(2006)'' [[Cyber Terrorism]]
Watts, Sean (2010) [[Combatant Status and Computer Network Attack]]

Revision as of 14:22, 30 June 2010

Anderson, Ross J. (2008) Security Engineering

Barkham, Jason (2001) Information Warfare and International Law on the Use of Force

Clarke, Richard A. and Knake, Robert (2010) Cyber War

Department of Defense (2007) Mission Impact of Foreign Influence on DoD Software

Department of Homeland Security (2003) The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets

Epstein, Richard A. and Brown, Thomas P. (2008) Cybersecurity in the Payment Card Industry

Franklin, Jason, et. al (2007) An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants

Grady, Mark F. and Parisi, Francesco (2006) The Law and Economics of Cybersecurity

Johnson, Eric M. (2008) Managing Information Risk and the Economics of Security

Johnson, Vincent R. (2005) Cybersecurity, Identity Theft, and the Limits of Tort Liability

Moore, Tyler, et. al (2009) The Economics of Online Crime

Nye, Joseph (2010) Cyber Power

Schneier, Bruce (2003) Beyond Fear

Stohl, Michael (2006) Cyber Terrorism

Watts, Sean (2010) Combatant Status and Computer Network Attack