Public-Private Cooperation: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 2: Line 2:


Aviram, Amitai and Tor, Avishalom (2004) [[Overcoming Impediments to Information Sharing]]
Aviram, Amitai and Tor, Avishalom (2004) [[Overcoming Impediments to Information Sharing]]
Energetics Inc. (2006) [[Roadmap to Secure Control Systems in the Energy Sector]]


Korns, Stephen W.  (2009) [[Cyber Operations]]
Korns, Stephen W.  (2009) [[Cyber Operations]]
Line 36: Line 34:
|-
|-
|Department of Homeland Security||||2003||[[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]||Government Report||None||[http://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf  ''Pdf'']
|Department of Homeland Security||||2003||[[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]||Government Report||None||[http://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf  ''Pdf'']
|-
|Energetics Inc.||||2006||[[Roadmap to Secure Control Systems in the Energy Sector]]||Independent Reports||None||[http://www.cyber.st.dhs.gov/docs/DOE%20Roadmap%202006.pdf ''Pdf'']
|-
|-
|Grady, Mark F.||Parisi, Francesco||2006||[[The Law and Economics of Cybersecurity]]||Book||Low:Economics; Low:Law||N/A
|Grady, Mark F.||Parisi, Francesco||2006||[[The Law and Economics of Cybersecurity]]||Book||Low:Economics; Low:Law||N/A

Revision as of 12:15, 11 August 2010

TOC-> Issues->Public-Private Cooperation

Aviram, Amitai and Tor, Avishalom (2004) Overcoming Impediments to Information Sharing

Korns, Stephen W. (2009) Cyber Operations

Moore, Tyler and Clayton, Richard (2008) The Consequence of Non-Cooperation in the Fight Against Phishing

Moore, Tyler, et. al (2009) The Economics of Online Crime

National Research Council (1999) Trust in Cyberspace

Powell, Benjamin (2005) Is Cybersecurity a Public Good

Author 1 Author 2 Year Title Source Expertise Full Text
Center for Strategic and International Studies 2008 Securing Cyberspace for the 44th Presidency Independent Reports Low:Policy Pdf
Department of Commerce 2010 Defense Industrial Base Assessment Government Report None Pdf
Department of Defense 2007 Mission Impact of Foreign Influence on DoD Software Government Report Low:Defense Policy/Procurement Pdf
Department of Defense 2005 Strategy for Homeland Defense and Civil Support Government Report None Pdf
Department of Homeland Security 2009 A Roadmap for Cybersecurity Research Government Report Low:Technology Pdf
Department of Homeland Security 2003 The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets Government Report None Pdf
Energetics Inc. 2006 Roadmap to Secure Control Systems in the Energy Sector Independent Reports None Pdf
Grady, Mark F. Parisi, Francesco 2006 The Law and Economics of Cybersecurity Book Low:Economics; Low:Law N/A
Kramer, Franklin D., et. al 2009 Cyberpower and National Security Book None N/A
National Cyber Security Summit Task Force 2004 Information Security Governance Government Report Moderate:Executive Administration Pdf
National Infrastructure Advisory Council 2004 Hardening The Internet Government Report High:Technology Pdf
White House 2009 Cyberspace Policy Review Government Report None Pdf
  • Subcategories: None

Jump to Table of Contents