Risk Management and Investment: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
''[[Table of Contents | TOC->]][[Issues | Issues->]][[Economics of Cybersecurity | Economics of Cybersecurity->]][[Risk Management and Investment]]'' | ''[[Table of Contents | TOC->]][[Issues | Issues->]][[Economics of Cybersecurity | Economics of Cybersecurity->]][[Risk Management and Investment]]'' | ||
Camp, L. Jean and Wolfram, Catherine (2004) [[Pricing Security]] | Camp, L. Jean and Wolfram, Catherine (2004) [[Pricing Security]] | ||
Line 25: | Line 23: | ||
|Anderson, Ross||Moore, Tyler||2006||[[The Economics of Information Security]]||Journal Article||Low:Economics||[http://people.seas.harvard.edu/~tmoore/science-econ.pdf ''Pdf''] | |Anderson, Ross||Moore, Tyler||2006||[[The Economics of Information Security]]||Journal Article||Low:Economics||[http://people.seas.harvard.edu/~tmoore/science-econ.pdf ''Pdf''] | ||
[http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.89.3331&rep=rep1&type=pdf ''AltPdf''] | [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.89.3331&rep=rep1&type=pdf ''AltPdf''] | ||
|- | |||
|Arora et al.||||2006||[[Does Information Security Attack Frequency Increase With Vulnerability Disclosure]]||Journal Article||Moderate:Economics||[http://www.heinz.cmu.edu/~rtelang/vuln_freq_ISF.pdf ''Pdf''] | |||
|- | |- | ||
|Aviram, Amitai||Tor, Avishalom||2004||[[Overcoming Impediments to Information Sharing]]||Law Review||Low:Economics||[http://law.haifa.ac.il/faculty/lec_papers/tor/55Ala1.L.Rev.231.pdf ''Pdf''] [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=435600 ''SSRN''] | |Aviram, Amitai||Tor, Avishalom||2004||[[Overcoming Impediments to Information Sharing]]||Law Review||Low:Economics||[http://law.haifa.ac.il/faculty/lec_papers/tor/55Ala1.L.Rev.231.pdf ''Pdf''] [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=435600 ''SSRN''] |
Revision as of 15:10, 19 August 2010
TOC-> Issues-> Economics of Cybersecurity->Risk Management and Investment
Camp, L. Jean and Wolfram, Catherine (2004) Pricing Security
van Eeten, Michel J. G. and Bauer, Johannes M. (2008) Economics of Malware
Varian, Hal (2000) Managing Online Security Risks
Varian, Hal (2004) System Reliability and Free Riding
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross | 2001 | Why Information Security is Hard | Conf. Paper | None | Pdf AltPdf | |
Anderson, Ross | Moore, Tyler | 2006 | The Economics of Information Security | Journal Article | Low:Economics | |
Arora et al. | 2006 | Does Information Security Attack Frequency Increase With Vulnerability Disclosure | Journal Article | Moderate:Economics | ||
Aviram, Amitai | Tor, Avishalom | 2004 | Overcoming Impediments to Information Sharing | Law Review | Low:Economics | Pdf SSRN |
Camp, L. Jean | Lewis, Stephen | 2004 | Economics of Information Security | Book | High:Economics | N/A |
Computing Research Association | 2003 | Four Grand Challenges in Trustworthy Computing | Independent Reports | None | ||
Department of Defense | 2007 | Mission Impact of Foreign Influence on DoD Software | Government Report | Low:Defense Policy/Procurement | ||
Financial Services Sector Coordinating Council for Critical Infrastructure Protection | 2008 | Research Agenda for the Banking and Finance Sector | Independent Reports | None | ||
Franklin, Jason, et. al | 2007 | An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants | Conference Paper | Low:Statistics; Low:Economics | Pdf Alt Pdf | |
Grady, Mark F. | Parisi, Francesco | 2006 | The Law and Economics of Cybersecurity | Book | Low:Economics; Low:Law | N/A |
Institute for Information Infrastructure Protection | 2003 | Cyber Security Research and Development Agenda | Independent Reports | Low/None:Technology | ||
Johnson, Eric M. | 2008 | Managing Information Risk and the Economics of Security | Book | High:Economics | N/A | |
National Cyber Defense Initiative | 2009 | National Cyber Defense Financial Services Workshop Report | Independent Report | Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance | ||
National Institute of Standards and Technology | 2006 | SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security | Government Report | Moderate:Technology | ||
National Research Council | 2007 | Toward a Safer and More Secure Cyberspace | Independent Reports | Low:Research Processes; Low:Technology | ||
National Research Council | 1999 | Trust in Cyberspace | Independent Reports | Moderate:Technology | ||
Schneier, Bruce | 2008 | Schneier on Security | Book | None | Purchase |
- Subcategories: None