Privacy: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 14: Line 14:
|-
|-
|Anderson, Ross||Moore, Tyler||2006||[[The Economics of Information Security]]||Journal Article||Low:Economics||[http://people.seas.harvard.edu/~tmoore/science-econ.pdf ''Pdf'']  
|Anderson, Ross||Moore, Tyler||2006||[[The Economics of Information Security]]||Journal Article||Low:Economics||[http://people.seas.harvard.edu/~tmoore/science-econ.pdf ''Pdf'']  
[http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.89.3331&rep=rep1&type=pdf ''AltPdf''  
[http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.89.3331&rep=rep1&type=pdf ''AltPdf'']
|-
|-
|Camp, L. Jean||Lewis, Stephen||2004||[[Economics of Information Security]]||Book||High:Economics||N/A
|Camp, L. Jean||Lewis, Stephen||2004||[[Economics of Information Security]]||Book||High:Economics||N/A

Revision as of 14:58, 19 August 2010

TOC-> Issues->Privacy

Johnson, Vincent R. (2005) Cybersecurity, Identity Theft, and the Limits of Tort Liability

Author 1 Author 2 Year Title Source Expertise Full Text
Anderson, Ross Moore, Tyler 2006 The Economics of Information Security Journal Article Low:Economics Pdf

AltPdf

Camp, L. Jean Lewis, Stephen 2004 Economics of Information Security Book High:Economics N/A
Department of Homeland Security 2009 A Roadmap for Cybersecurity Research Government Report Low:Technology Pdf
Dunlap, Charles J. Jr. 2009 Towards a Cyberspace Legal Regime in the Twenty-First Century Speech None N/A
Schneier, Bruce 2003 Beyond Fear Book None Scribd
Schneier, Bruce 2008 Schneier on Security Book None Purchase
  • Subcategories: None

Jump to Table of Contents