Suggested References to Add to Wiki: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
 
(5 intermediate revisions by 3 users not shown)
Line 1: Line 1:
''Please add links to reference pages for Redmine articles you believe should be added to the cybersecurity wiki here.''
''Please add links to reference pages for Redmine articles you believe should be added to the cybersecurity wiki here or email them to: cybersecurity-feedback@cyber.law.harvard.edu''


''Entries should look just like any other entry on a topic page, i.e., "<lastname>, <firstname> ''(<year>)'' [<Title as a link to the reference page>]"''
''Entries should look just like any other entry on a topic page, i.e., "<lastname>, <firstname> ''(<year>)'' [<Title as a link to the reference page>]"''


Johnson, Vincent R. (2005) [[Cybersecurity, Identity Theft, and the Limits of Tort Liability]]
Aloise, Gene, Barkakati, Nabajyoti, and Wilshusen, Gregory C. (2008) [[Nuclear Security]]


Aloise, Gene, Barkakati, Nabajyoti, and Wilshusen, Gregory C. (2008) [[Nuclear Security]]
Bauer, Johannes M. and van Eeten, Michel J. G. (2009) [[Cybersecurity]]  


Kobayashi, Bruce H. (2005) [[An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and other Public Security Goods]]
Bellovin, Steven M. (2009) [[The Government and Cybersecurity]]


Lewis, James Andrews (2005) [[Cyber Security and Regulation in the United States]]
Besunder, Allison A. (2009) [[Best Practices for Data Protection and Privacy]]


Madnick, Stuart (2009) [[Experiences and Challenges with Using CERT Data to Analyze International Cyber Security]]
Burstein, Aaron J. (2008) [[Amending The ECPA To Enable a Culture of Cybersecurity Research]]


Maughan, Douglas (2010) [[The Need for a National Cybersecurity Research and Development Agenda]]
Cetron, Marvin J. and Davies, Owen (2009) [[World War 3.0: Ten Critical Trends for Cybersecurity]]


Lan, Tang et al. (2010) [[Global Cyber Deterrence]]
Cornish, Paul (2009) [[Cyber Security and Politically, Socially and Religiously Motivated Cyber Attacks]]


Nojeim, Gregory T. (2009) [[Cybersecurity: Preventing Terrorist Attacks and Protecting Privacy in Cyberspace]]
Cornish, Paul, Hughes, Rex, and Livingstone, David (2009) [[Cyberspace and the National Security of the United Kingdom]]


Nye, Joseph S. (2010) [[Cyber Power]]
ENISA (2010) [[Introduction to Country Reports]]


OECD (2009) [[Cybersecurity and Economic Incentives]]
Gable, Kelly A. (2010) [[Cyber-Apocalypse Now]]


OECD (2009) [[The Market Consequences of Cybersecurity]]
GAO (2009) [[Critical Infrastructure Protection]]


Perkins, Earl (2009) [[Evolving Cybersecurity Issues in the Utility Industry]]
GAO (2010) [[Information Security]]


Bauer, Johannes M. and van Eeten, Michel J. G. (2009) [[Cybersecurity]]  
Geer, Daniel E. and Conway, Daniel G. (2010) [[Nothing Ventured, Nothing Gained]]


Bellovin, Steven M. (2009) [[The Government and Cybersecurity]]
Intelligence Squared US (IQ2US) Video Debate ''(2010)'' [[The Cyber War Threat Has Been Grossly Exaggerated]]


Besunder, Allison A. (2009) [[Best Practices for Data Protection and Privacy]]
Kobayashi, Bruce H. (2005) [[An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and other Public Security Goods]]


Burstein, Aaron J. (2008) [[Amending The ECPA To Enable a Culture of Cybersecurity Research]]
Lan, Tang et al. (2010) [[Global Cyber Deterrence]]


Cetron, Marvin J. and Davies, Owen (2009) [[World War 3.0: Ten Critical Trends for Cybersecurity]]
Lewis, James Andrews (2005) [[Cyber Security and Regulation in the United States]]


Cornish, Paul (2009) [[Cyber Security and Politically, Socially and Religiously Motivated Cyber Attacks]]
Madnick, Stuart (2009) [[Experiences and Challenges with Using CERT Data to Analyze International Cyber Security]]


Cornish, Paul, Hughes, Rex, and Livingstone, David (2009) [[Cyberspace and the National Security of the United Kingdom]]
Maughan, Douglas (2010) [[The Need for a National Cybersecurity Research and Development Agenda]]


Epstein, Richard A. and Brown, Thomas P. (2008) [[Cybersecurity in the Payment Card Industry]]
Nojeim, Gregory T. (2009) [[Cybersecurity: Preventing Terrorist Attacks and Protecting Privacy in Cyberspace]]


GAO (2009) [[Critical Infrastructure Protection]]
Nye, Joseph S. (2010) [[Cyber Power]]


GAO (2010) [[Information Security]]
OECD (2009) [[Cybersecurity and Economic Incentives]]


Gable, Kelly A. (2010) [[Cyber-Apocalypse Now]]
OECD (2009) [[The Market Consequences of Cybersecurity]]


Geer, Daniel E. and Conway, Daniel G. (2010) [[Nothing Ventured, Nothing Gained]]
Perkins, Earl (2009) [[Evolving Cybersecurity Issues in the Utility Industry]]


Rollins, John and Wilson, Clay (2007) [[Terrorist Capabilities for Cyberattack]]
Rollins, John and Wilson, Clay (2007) [[Terrorist Capabilities for Cyberattack]]
ENISA (2010) [[Introduction to Country Reports]]


Rue, Rachel and Pfleeger, Shari Lawrence (2009) [[Making the Best Use of Cybersecurity Economic Models]]
Rue, Rachel and Pfleeger, Shari Lawrence (2009) [[Making the Best Use of Cybersecurity Economic Models]]

Latest revision as of 08:01, 4 April 2012

Please add links to reference pages for Redmine articles you believe should be added to the cybersecurity wiki here or email them to: cybersecurity-feedback@cyber.law.harvard.edu

Entries should look just like any other entry on a topic page, i.e., "<lastname>, <firstname> (<year>) [<Title as a link to the reference page>]"

Aloise, Gene, Barkakati, Nabajyoti, and Wilshusen, Gregory C. (2008) Nuclear Security

Bauer, Johannes M. and van Eeten, Michel J. G. (2009) Cybersecurity

Bellovin, Steven M. (2009) The Government and Cybersecurity

Besunder, Allison A. (2009) Best Practices for Data Protection and Privacy

Burstein, Aaron J. (2008) Amending The ECPA To Enable a Culture of Cybersecurity Research

Cetron, Marvin J. and Davies, Owen (2009) World War 3.0: Ten Critical Trends for Cybersecurity

Cornish, Paul (2009) Cyber Security and Politically, Socially and Religiously Motivated Cyber Attacks

Cornish, Paul, Hughes, Rex, and Livingstone, David (2009) Cyberspace and the National Security of the United Kingdom

ENISA (2010) Introduction to Country Reports

Gable, Kelly A. (2010) Cyber-Apocalypse Now

GAO (2009) Critical Infrastructure Protection

GAO (2010) Information Security

Geer, Daniel E. and Conway, Daniel G. (2010) Nothing Ventured, Nothing Gained

Intelligence Squared US (IQ2US) Video Debate (2010) The Cyber War Threat Has Been Grossly Exaggerated

Kobayashi, Bruce H. (2005) An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and other Public Security Goods

Lan, Tang et al. (2010) Global Cyber Deterrence

Lewis, James Andrews (2005) Cyber Security and Regulation in the United States

Madnick, Stuart (2009) Experiences and Challenges with Using CERT Data to Analyze International Cyber Security

Maughan, Douglas (2010) The Need for a National Cybersecurity Research and Development Agenda

Nojeim, Gregory T. (2009) Cybersecurity: Preventing Terrorist Attacks and Protecting Privacy in Cyberspace

Nye, Joseph S. (2010) Cyber Power

OECD (2009) Cybersecurity and Economic Incentives

OECD (2009) The Market Consequences of Cybersecurity

Perkins, Earl (2009) Evolving Cybersecurity Issues in the Utility Industry

Rollins, John and Wilson, Clay (2007) Terrorist Capabilities for Cyberattack

Rue, Rachel and Pfleeger, Shari Lawrence (2009) Making the Best Use of Cybersecurity Economic Models

Santos, Joost R., et. al (2007) A Framework for Linking Cybersecurity Metrics to the Modeling of Macroeconomic Interdependencies

Schneidewind, Norman (2010) Metrics for Mitigating Cybersecurity Threats to Networks

Shackelford, Scott J. (2010) Estonia Three Years Later

Shah, Shashi K. (2004) The Evolving Landscape of Maritime Cybersecurity

Stohl, Michael (2006) Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games

Theohary, Catherine A. and Rollins, John (2010) Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress

van Eeten, Michael and Bauer, Johannes M. (2009) Emerging Threats to Internet Security

Wilshusen, Gregory C. and Powner, David A. (2009) Continued Efforts are Needed to Protect Information Systems from Evolving Threats