Public-Private Cooperation: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 4: Line 4:


Korns, Stephen W.  (2009) [[Cyber Operations]]
Korns, Stephen W.  (2009) [[Cyber Operations]]
Moore, Tyler and Clayton, Richard  (2008) [[The Consequence of Non-Cooperation in the Fight Against Phishing]]
Moore, Tyler, et. al (2009) [[The Economics of Online Crime]]


Powell, Benjamin  (2005)  [[Is Cybersecurity a Public Good]]
Powell, Benjamin  (2005)  [[Is Cybersecurity a Public Good]]
Line 38: Line 34:
|-
|-
|Kramer, Franklin D., et. al||||2009||[[Cyberpower and National Security]]||Book||None||N/A
|Kramer, Franklin D., et. al||||2009||[[Cyberpower and National Security]]||Book||None||N/A
|-
|Moore, Tyler||Clayton, Richard||2008||[[The Consequence of Non-Cooperation in the Fight Against Phishing]]||Conference Paper||Low:Technology; Low:Economics||[http://people.seas.harvard.edu/~tmoore/ecrime08.pdf ''Pdf''] [http://www.cl.cam.ac.uk/~rnc1/ecrime08pre.pdf  ''Alt Pdf'']
|-
|Moore, Tyler, et. al||||2009||[[The Economics of Online Crime]]||Journal Article||Low:Technology||[http://people.seas.harvard.edu/~tmoore/jep09.pdf  ''Pdf'']
|-
|-
|National Cyber Security Summit Task Force||||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf'']
|National Cyber Security Summit Task Force||||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf'']

Revision as of 11:43, 11 August 2010

TOC-> Issues->Public-Private Cooperation

Aviram, Amitai and Tor, Avishalom (2004) Overcoming Impediments to Information Sharing

Korns, Stephen W. (2009) Cyber Operations

Powell, Benjamin (2005) Is Cybersecurity a Public Good

Author 1 Author 2 Year Title Source Expertise Full Text
Center for Strategic and International Studies 2008 Securing Cyberspace for the 44th Presidency Independent Reports Low:Policy Pdf
Department of Commerce 2010 Defense Industrial Base Assessment Government Report None Pdf
Department of Defense 2007 Mission Impact of Foreign Influence on DoD Software Government Report Low:Defense Policy/Procurement Pdf
Department of Defense 2005 Strategy for Homeland Defense and Civil Support Government Report None Pdf
Department of Homeland Security 2009 A Roadmap for Cybersecurity Research Government Report Low:Technology Pdf
Department of Homeland Security 2003 The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets Government Report None Pdf
Energetics Inc. 2006 Roadmap to Secure Control Systems in the Energy Sector Independent Reports None Pdf
Grady, Mark F. Parisi, Francesco 2006 The Law and Economics of Cybersecurity Book Low:Economics; Low:Law N/A
Kramer, Franklin D., et. al 2009 Cyberpower and National Security Book None N/A
Moore, Tyler Clayton, Richard 2008 The Consequence of Non-Cooperation in the Fight Against Phishing Conference Paper Low:Technology; Low:Economics Pdf Alt Pdf
Moore, Tyler, et. al 2009 The Economics of Online Crime Journal Article Low:Technology Pdf
National Cyber Security Summit Task Force 2004 Information Security Governance Government Report Moderate:Executive Administration Pdf
National Infrastructure Advisory Council 2004 Hardening The Internet Government Report High:Technology Pdf
National Research Council 1999 Trust in Cyberspace Independent Reports Moderate:Technology Pdf
White House 2009 Cyberspace Policy Review Government Report None Pdf
  • Subcategories: None

Jump to Table of Contents