Privacy: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 14: | Line 14: | ||
|- | |- | ||
|Anderson, Ross||Moore, Tyler||2006||[[The Economics of Information Security]]||Journal Article||Low:Economics||[http://people.seas.harvard.edu/~tmoore/science-econ.pdf ''Pdf''] | |Anderson, Ross||Moore, Tyler||2006||[[The Economics of Information Security]]||Journal Article||Low:Economics||[http://people.seas.harvard.edu/~tmoore/science-econ.pdf ''Pdf''] | ||
[http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.89.3331&rep=rep1&type=pdf ''AltPdf'' | [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.89.3331&rep=rep1&type=pdf ''AltPdf''] | ||
|- | |- | ||
|Camp, L. Jean||Lewis, Stephen||2004||[[Economics of Information Security]]||Book||High:Economics||N/A | |Camp, L. Jean||Lewis, Stephen||2004||[[Economics of Information Security]]||Book||High:Economics||N/A |
Revision as of 14:58, 19 August 2010
Johnson, Vincent R. (2005) Cybersecurity, Identity Theft, and the Limits of Tort Liability
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross | Moore, Tyler | 2006 | The Economics of Information Security | Journal Article | Low:Economics | |
Camp, L. Jean | Lewis, Stephen | 2004 | Economics of Information Security | Book | High:Economics | N/A |
Department of Homeland Security | 2009 | A Roadmap for Cybersecurity Research | Government Report | Low:Technology | ||
Dunlap, Charles J. Jr. | 2009 | Towards a Cyberspace Legal Regime in the Twenty-First Century | Speech | None | N/A | |
Schneier, Bruce | 2003 | Beyond Fear | Book | None | Scribd | |
Schneier, Bruce | 2008 | Schneier on Security | Book | None | Purchase |
- Subcategories: None