Public-Private Cooperation: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 25: | Line 25: | ||
! style="background-color: #efefef;" class="unsortable" | Full Text | ! style="background-color: #efefef;" class="unsortable" | Full Text | ||
|- | |- | ||
|Center for Strategic and International Studies||2008||[[Securing Cyberspace for the 44th Presidency]]||Independent Reports||Low:Policy||[http://www.cyber.st.dhs.gov/docs/081208_securingcyberspace_44.pdf ''Pdf''] | |Center for Strategic and International Studies||||2008||[[Securing Cyberspace for the 44th Presidency]]||Independent Reports||Low:Policy||[http://www.cyber.st.dhs.gov/docs/081208_securingcyberspace_44.pdf ''Pdf''] | ||
|- | |- | ||
|Department of Commerce||||2010||[[Defense Industrial Base Assessment]]||Government Report||None||[http://www.bis.doc.gov/defenseindustrialbaseprograms/osies/defmarketresearchrpts/final_counterfeit_electronics_report.pdf ''Pdf''] | |Department of Commerce||||2010||[[Defense Industrial Base Assessment]]||Government Report||None||[http://www.bis.doc.gov/defenseindustrialbaseprograms/osies/defmarketresearchrpts/final_counterfeit_electronics_report.pdf ''Pdf''] |
Revision as of 11:10, 11 August 2010
TOC-> Issues->Public-Private Cooperation
Aviram, Amitai and Tor, Avishalom (2004) Overcoming Impediments to Information Sharing
Energetics Inc. (2006) Roadmap to Secure Control Systems in the Energy Sector
Korns, Stephen W. (2009) Cyber Operations
Moore, Tyler and Clayton, Richard (2008) The Consequence of Non-Cooperation in the Fight Against Phishing
Moore, Tyler, et. al (2009) The Economics of Online Crime
National Research Council (1999) Trust in Cyberspace
Powell, Benjamin (2005) Is Cybersecurity a Public Good
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Center for Strategic and International Studies | 2008 | Securing Cyberspace for the 44th Presidency | Independent Reports | Low:Policy | ||
Department of Commerce | 2010 | Defense Industrial Base Assessment | Government Report | None | ||
Department of Defense | 2007 | Mission Impact of Foreign Influence on DoD Software | Government Report | Low:Defense Policy/Procurement | ||
Department of Defense | 2005 | Strategy for Homeland Defense and Civil Support | Government Report | None | ||
Department of Homeland Security | 2009 | A Roadmap for Cybersecurity Research | Government Report | Low:Technology | ||
Department of Homeland Security | 2003 | The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets | Government Report | None | ||
Grady, Mark F. | Parisi, Francesco | 2006 | The Law and Economics of Cybersecurity | Book | Low:Economics; Low:Law | N/A |
Kramer, Franklin D., et. al | 2009 | Cyberpower and National Security | Book | None | N/A | |
National Cyber Security Summit Task Force | 2004 | Information Security Governance | Government Report | Moderate:Executive Administration | ||
National Infrastructure Advisory Council | 2004 | Hardening The Internet | Government Report | High:Technology | ||
White House | 2009 | Cyberspace Policy Review | Government Report | None |
- Subcategories: None