Deterrence: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 19: | Line 19: | ||
|Korns, Stephen W.|| ||2009||[[Cyber Operations]]||Low:International Warfare||Journal Article||[http://www.carlisle.army.mil/DIME/documents/Cyber%20Operations%20-%20The%20New%20Balance%20-%20Korns.pdf ''Pdf''] | |Korns, Stephen W.|| ||2009||[[Cyber Operations]]||Low:International Warfare||Journal Article||[http://www.carlisle.army.mil/DIME/documents/Cyber%20Operations%20-%20The%20New%20Balance%20-%20Korns.pdf ''Pdf''] | ||
|- | |- | ||
|National Cyber Defense Initiative|| ||2009||[[National Cyber Defense Financial Services Workshop Report]]||Independent Report||Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance||[http://www.cyber.st.dhs.gov/docs/NCDI_FI_Workshop_Report.pdf ''Pdf''] | |National Cyber Defense Initiative|| ||2009||[[National Cyber Defense Financial Services Workshop Report]]||Independent Report||Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance||[http://www.cyber.st.dhs.gov/docs/NCDI_FI_Workshop_Report.pdf ''Pdf''] [http://ncdi.nps.edu/FI_Workshop_Report_100204.pdf ''AltPdf''] | ||
|- | |- | ||
|National Cyber Security Summit Task Force|| ||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf''] [http://www.criminal-justice-careers.com/resources/InfoSecGov4_04.pdf ''AltPdf''] | |National Cyber Security Summit Task Force|| ||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf''] [http://www.criminal-justice-careers.com/resources/InfoSecGov4_04.pdf ''AltPdf''] |
Revision as of 13:37, 10 August 2010
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross, et. al | 2008 | Security Economics and the Internal Market | Study | Low:Economics | ||
Johnson, Eric M. | 2008 | Managing Information Risk and the Economics of Security | Book | High:Economics | N/A | |
Kobayashi, Bruce H. | 2006 | An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods | Journal Article | High:Economics | ||
Korns, Stephen W. | 2009 | Cyber Operations | Low:International Warfare | Journal Article | ||
National Cyber Defense Initiative | 2009 | National Cyber Defense Financial Services Workshop Report | Independent Report | Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance | Pdf AltPdf | |
National Cyber Security Summit Task Force | 2004 | Information Security Governance | Government Report | Moderate:Executive Administration | Pdf AltPdf | |
National Research Council | 2007 | Toward a Safer and More Secure Cyberspace | None | |||
Schneier, Bruce | 2003 | Beyond Fear | None | |||
Sklerov, Matthew J. | 2009 | Solving the Dilemma of State Responses to Cyberattacks | None | |||
Todd, Graham H. | 2009 | Armed Attack in Cyberspace | None | |||
Watts, Sean | 2010 | Combatant Status and Computer Network Attack | None |
- Subcategories: None