Public-Private Cooperation: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 4: | Line 4: | ||
Korns, Stephen W. (2009) [[Cyber Operations]] | Korns, Stephen W. (2009) [[Cyber Operations]] | ||
Powell, Benjamin (2005) [[Is Cybersecurity a Public Good]] | Powell, Benjamin (2005) [[Is Cybersecurity a Public Good]] | ||
Line 38: | Line 34: | ||
|- | |- | ||
|Kramer, Franklin D., et. al||||2009||[[Cyberpower and National Security]]||Book||None||N/A | |Kramer, Franklin D., et. al||||2009||[[Cyberpower and National Security]]||Book||None||N/A | ||
|- | |||
|Moore, Tyler||Clayton, Richard||2008||[[The Consequence of Non-Cooperation in the Fight Against Phishing]]||Conference Paper||Low:Technology; Low:Economics||[http://people.seas.harvard.edu/~tmoore/ecrime08.pdf ''Pdf''] [http://www.cl.cam.ac.uk/~rnc1/ecrime08pre.pdf ''Alt Pdf''] | |||
|- | |||
|Moore, Tyler, et. al||||2009||[[The Economics of Online Crime]]||Journal Article||Low:Technology||[http://people.seas.harvard.edu/~tmoore/jep09.pdf ''Pdf''] | |||
|- | |- | ||
|National Cyber Security Summit Task Force||||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf''] | |National Cyber Security Summit Task Force||||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf''] |
Revision as of 11:43, 11 August 2010
TOC-> Issues->Public-Private Cooperation
Aviram, Amitai and Tor, Avishalom (2004) Overcoming Impediments to Information Sharing
Korns, Stephen W. (2009) Cyber Operations
Powell, Benjamin (2005) Is Cybersecurity a Public Good
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Center for Strategic and International Studies | 2008 | Securing Cyberspace for the 44th Presidency | Independent Reports | Low:Policy | ||
Department of Commerce | 2010 | Defense Industrial Base Assessment | Government Report | None | ||
Department of Defense | 2007 | Mission Impact of Foreign Influence on DoD Software | Government Report | Low:Defense Policy/Procurement | ||
Department of Defense | 2005 | Strategy for Homeland Defense and Civil Support | Government Report | None | ||
Department of Homeland Security | 2009 | A Roadmap for Cybersecurity Research | Government Report | Low:Technology | ||
Department of Homeland Security | 2003 | The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets | Government Report | None | ||
Energetics Inc. | 2006 | Roadmap to Secure Control Systems in the Energy Sector | Independent Reports | None | ||
Grady, Mark F. | Parisi, Francesco | 2006 | The Law and Economics of Cybersecurity | Book | Low:Economics; Low:Law | N/A |
Kramer, Franklin D., et. al | 2009 | Cyberpower and National Security | Book | None | N/A | |
Moore, Tyler | Clayton, Richard | 2008 | The Consequence of Non-Cooperation in the Fight Against Phishing | Conference Paper | Low:Technology; Low:Economics | Pdf Alt Pdf |
Moore, Tyler, et. al | 2009 | The Economics of Online Crime | Journal Article | Low:Technology | ||
National Cyber Security Summit Task Force | 2004 | Information Security Governance | Government Report | Moderate:Executive Administration | ||
National Infrastructure Advisory Council | 2004 | Hardening The Internet | Government Report | High:Technology | ||
National Research Council | 1999 | Trust in Cyberspace | Independent Reports | Moderate:Technology | ||
White House | 2009 | Cyberspace Policy Review | Government Report | None |
- Subcategories: None