Actors and Incentives: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
(Replaced content with "'' TOC->Threats and Actors'' {{Filtered_Table||3.2,false}} '' Jump to Table of Contents''")
 
(10 intermediate revisions by 2 users not shown)
Line 1: Line 1:
''[[Table of Contents | TOC->]][[Threats and Actors | Threats and Actors->]][[Actors and Incentives]]''
''[[Table of Contents | TOC->]][[Threats and Actors]]''


Anderson, Ross J. (2008) [[Security Engineering]]
{{Filtered_Table||3.2,false}}


Barkham, Jason (2001) [[Information Warfare and International Law on the Use of Force]]
Brown, Davis  (2006) [[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]
Clarke, Richard A. and Knake, Robert  (2010)  [[Cyber War]]
Department of Commerce (2010) [[Defense Industrial Base Assessment]]
Department of Defense (2007) [[Mission Impact of Foreign Influence on DoD Software]]
Department of Defense Office of General Counsel (1999) [[An Assessment of International Legal Issues in Information Operations]]
Department of Homeland Security (2003) [[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]
Dörmann, Knut  (2004) [[Applicability of the Additional Protocols to Computer Network Attacks]]
Epstein, Richard A. and Brown, Thomas P. (2008) [[Cybersecurity in the Payment Card Industry]]
Franklin, Jason, et. al (2007) [[An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants]]
Grady, Mark F. and Parisi, Francesco (2006) [[The Law and Economics of Cybersecurity]]
Hollis, Duncan B. (2007) [[Why States Need an International Law for Information Operations]]
Johnson, Eric M. (2008) [[Managing Information Risk and the Economics of Security]]
Johnson, Vincent R. (2005) [[Cybersecurity, Identity Theft, and the Limits of Tort Liability]]
McAfee, Inc. (2010) [[McAfee Threats Report]]
Moore, Tyler, et. al (2009) [[The Economics of Online Crime]]
National Cyber Defense Initiative (2009) [[National Cyber Defense Financial Services Workshop Report]]
National Cyber Security Summit Task Force (2004) [[Information Security Governance]]
Nye, Joseph (2010) [[Cyber Power]]
Watts, Sean (2010) [[Combatant Status and Computer Network Attack]]
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
|-
! style="background-color: #efefef;" | Author 1
! style="background-color: #efefef;" | Author 2
! style="background-color: #efefef;" | Year
! style="background-color: #efefef;" | Title
! style="background-color: #efefef;" | Source
! style="background-color: #efefef;" | Expertise
! style="background-color: #efefef;" class="unsortable" | Full Text 
|-
|Rotenberg et. al.||||2010||[[The Cyber War Threat Has Been Grossly Exaggerated]]||Debate||None||[http://intelligencesquaredus.org/index.php/past-debates/cyber-war-threat-has-been-grossly-exaggerated/ ''Audio/Transcript'']
|-
|Schneier, Bruce||||2003||[[Beyond Fear]]||Book||None||[http://www.scribd.com/doc/12185921/beyond-fear-thinking-sensibly-about-security-in-an-uncertain-world-bruce-schneier-copernicus-books-2003 ''Scribd'']
|-
|Schneier, Bruce||||2008||[[Schneier on Security]]||Book||None||[http://www.schneier.com/book-sos.html ''Purchase'']
|-
|Stohl, Michael||||2006||[[Cyber Terrorism]]||Journal Article||None||[http://www.ingentaconnect.com/content/klu/cris/2006/00000046/F0020004/00009061 ''Purchase'']
|}
'''''Subcategories:'''''
*''[[Actors and Incentives | Actors and Incentives->]][[States]]''
*''[[Actors and Incentives | Actors and Incentives->]][[Groups]]''
*''[[Actors and Incentives | Actors and Incentives->]][[Hacktivists]]''
*''[[Actors and Incentives | Actors and Incentives->]][[Terrorists]]''


''[[Table of Contents | Jump to Table of Contents]]''
''[[Table of Contents | Jump to Table of Contents]]''

Latest revision as of 16:31, 7 August 2012

TOC->Threats and Actors

Types
U.S. Government Report
U.S. Government Hearing
Non-U.S. Government Report
Independent Report
Industry Report
Book
Journal Article
Article
Categories
Exclude Subcatgeories
Search
Help


Jump to Table of Contents