Deterrence: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 11: Line 11:
! style="background-color: #efefef;" class="unsortable" | Full Text   
! style="background-color: #efefef;" class="unsortable" | Full Text   
|-
|-
| Anderson, Ross, et. al || ||2008||[[Security Economics and the Internal Market]]||Study||None||[http://www.enisa.europa.eu/act/sr/reports/econ-sec/economics-sec/at_download/fullReport  ''Pdf'']   
| Anderson, Ross, et. al || ||2008||[[Security Economics and the Internal Market]]||Study||Low:Economics||[http://www.enisa.europa.eu/act/sr/reports/econ-sec/economics-sec/at_download/fullReport  ''Pdf'']   
|-
|-
| Johnson, Eric M. || ||2008||[[Managing Information Risk and the Economics of Security]]|| ||None||
| Johnson, Eric M. || ||2008||[[Managing Information Risk and the Economics of Security]]|| ||None||

Revision as of 11:36, 10 August 2010

TOC-> Approaches->Deterrence

Author 1 Author 2 Year Title Source Expertise Full Text
Anderson, Ross, et. al 2008 Security Economics and the Internal Market Study Low:Economics Pdf
Johnson, Eric M. 2008 Managing Information Risk and the Economics of Security None
Kobayashi, Bruce H. 2006 An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods None
Korns, Stephen W. 2009 Cyber Operations None
National Cyber Defense Initiative 2009 National Cyber Defense Financial Services Workshop Report None
National Cyber Security Summit Task Force 2004 Information Security Governance None
National Research Council 2007 Toward a Safer and More Secure Cyberspace None
Schneier, Bruce 2003 Beyond Fear None
Sklerov, Matthew J. 2009 Solving the Dilemma of State Responses to Cyberattacks None
Todd, Graham H. 2009 Armed Attack in Cyberspace None
Watts, Sean 2010 Combatant Status and Computer Network Attack None
  • Subcategories: None

Jump to Table of Contents