Issues: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
(Replaced content with "'' TOC->Issues'' {{Filtered_Table||4,false}} '' Jump to Table of Contents''")
 
(9 intermediate revisions by 2 users not shown)
Line 1: Line 1:
''[[Table of Contents | TOC->]][[Issues]]''
''[[Table of Contents | TOC->]][[Issues]]''


{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
{{Filtered_Table||4,false}}
|-
! style="background-color: #efefef;" | Author 1
! style="background-color: #efefef;" | Author 2
! style="background-color: #efefef;" | Year
! style="background-color: #efefef;" | Title
! style="background-color: #efefef;" | Source
! style="background-color: #efefef;" | Expertise
! style="background-color: #efefef;" class="unsortable" | Full Text
|-
|Anderson, Ross J.||||2008||[[Security Engineering]]||Book||Moderate:Technology; Moderate:Cryptography||N/A
|-
|Anderson, Ross, et. al|| ||2008||[[Security Economics and the Internal Market]]||Study||Low:Economics||[http://www.enisa.europa.eu/act/sr/reports/econ-sec/economics-sec/at_download/fullReport  ''Pdf'']
|-
|Anderson, Ross||||2001||[[Why Information Security is Hard]]||Conf. Paper||None||[http://www.acsac.org/2001/papers/110.pdf ''Pdf''] [http://www.cl.cam.ac.uk/~rja14/Papers/econ.pdf ''AltPdf'']
|-
|Anderson, Ross||Moore, Tyler||2006||[[The Economics of Information Security]]||Journal Article||Low:Economics||[http://people.seas.harvard.edu/~tmoore/science-econ.pdf ''Pdf''] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.89.3331&rep=rep1&type=pdf ''AltPdf'']
|-
|Arora et al.||||2006||[[Does Information Security Attack Frequency Increase With Vulnerability Disclosure]]||Journal Article||Moderate:Economics||[http://www.heinz.cmu.edu/~rtelang/vuln_freq_ISF.pdf ''Pdf'']
|-
|Aviram, Amitai||Tor, Avishalom||2004||[[Overcoming Impediments to Information Sharing]]||Law Review||Low:Economics||[http://law.haifa.ac.il/faculty/lec_papers/tor/55Ala1.L.Rev.231.pdf ''Pdf''] [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=435600 ''SSRN'']
|-
|Barkham, Jason||||2001||[[Information Warfare and International Law on the Use of Force]]||Law Review||Moderate:Law||[http://www1.law.nyu.edu/journals/jilp/issues/34/pdf/34_1_b.pdf ''Pdf''] [http://activeresponse.org/files/34_1_b.pdf ''Alt Pdf'']
|-
|Beard, Jack M.||||2009||[[Law and War in the Virtual Era]]||Law Review||Low:Law||[http://www.asil.org/ajil/July2009_1selectedpiece.pdf ''Pdf'']
|-
|Bohme, Rainer||||2005||[[Cyber-Insurance Revisited]]||Conf. Paper||High:Economics||[http://infosecon.net/workshop/pdf/15.pdf ''Pdf'']
|-
|Bohme, Rainer||Kataria, Gaurav||2006||[[Models and Measures for Correlation in Cyber-Insurance]]||Conf. Paper||High:Economics||[http://weis2006.econinfosec.org/docs/16.pdf ''Pdf'']
|-
|Bohme, Rainer||Schwartz, Galina||2010||[[Modeling Cyber-Insurance]]||Conf. Paper||High:Economics||[http://www1.inf.tu-dresden.de/~rb21/publications/BS2010_Modeling_Cyber-Insurance_WEIS.pdf ''Pdf'']
|-
|Brown, Davis||||2006||[[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]||Law Review||Moderate:Law||[http://www.harvardilj.org/attach.php?id=59 ''Pdf'']
|-
|Camp, L. Jean||Lewis, Stephen||2004||[[Economics of Information Security]]||Book||High:Economics||N/A
|-
|Camp, L. Jean||Wolfram, Catherine||2004||[[Pricing Security]]||Book Chapter||Low:Economics||[http://books.google.com/books?id=PbzP9tgeDcAC&lpg=PA17&ots=8AOrvEojH5&dq=Economics%20of%20Information%20Security&lr&pg=PA17#v=onepage&q&f=false ''Web''] [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=894966 ''SSRN'']
|-
|Center for Strategic and International Studies||||2008||[[Securing Cyberspace for the 44th Presidency]]||Independent Report||Low:Policy||[http://www.cyber.st.dhs.gov/docs/081208_securingcyberspace_44.pdf ''Pdf'']
|-
|Clarke, Richard A.||Knake, Robert||2010||[[Cyber War]]||Book||None||N/A
|-
|Clinton, Larry||||Undated||[[Cyber-Insurance Metrics and Impact on Cyber-Security]]||Online Paper||Low:Technology; Low:Law||[http://www.whitehouse.gov/files/documents/cyber/ISA%20-%20Cyber-Insurance%20Metrics%20and%20Impact%20on%20Cyber-Security.pdf  ''Pdf'']
|-
|Computer Economics, Inc.||||2007||[[2007 Malware Report]]||Industry Report||None||[http://www.computereconomics.com/article.cfm?id=1224 ''Purchase'']
|-
|Computing Research Association||||2003||[[Four Grand Challenges in Trustworthy Computing]]||Independent Report||None||[http://www.cyber.st.dhs.gov/docs/CRA%20Grand%20Challenges%202003.pdf ''Pdf'']
|-
|Department of Commerce||||2010||[[Defense Industrial Base Assessment]]||Government Report||None||[http://www.bis.doc.gov/defenseindustrialbaseprograms/osies/defmarketresearchrpts/final_counterfeit_electronics_report.pdf  ''Pdf'']
|-
|Department of Defense||||1999||[[An Assessment of International Legal Issues in Information Operations]]||Government Report||Moderate:Law||[http://www.au.af.mil/au/awc/awcgate/dod-io-legal/dod-io-legal.pdf '' Pdf'']
|-
|Department of Defense||||2005||[[Strategy for Homeland Defense and Civil Support]]||Government Report||None||[http://www.defense.gov/news/Jun2005/d20050630homeland.pdf  ''Pdf'']
|-
|Department of Defense||||2007||[[Mission Impact of Foreign Influence on DoD Software]]||Government Report||Low:Defense Policy/Procurement||[http://www.cyber.st.dhs.gov/docs/Defense%20Science%20Board%20Task%20Force%20-%20Report%20on%20Mission%20Impact%20of%20Foreign%20Influence%20on%20DoD%20Software%20(2007).pdf  ''Pdf'']
|-
|Department of Homeland Security||||2003||[[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]||Government Report||None||[http://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf  ''Pdf'']
|-
|Department of Homeland Security||||2009||[[A Roadmap for Cybersecurity Research]]||Government Report||Low:Technology||[http://www.cyber.st.dhs.gov/docs/DHS-Cybersecurity-Roadmap.pdf ''Pdf'']
|-
|Deputy Chief of Staff for Intelligence||||2006||[[Critical Infrastructure Threats and Terrorism]]||Government Report||Low:Organizational Analysis; Low:Risk Management||[http://www.fas.org/irp/threat/terrorism/sup2.pdf  ''Pdf'']
|-
|Dörmann, Knut||||2004||[[Applicability of the Additional Protocols to Computer Network Attacks]]||Independent Report||Low:Law||[http://www.icrc.org/Web/eng/siteeng0.nsf/htmlall/68LG92/$File/ApplicabilityofIHLtoCNA.pdf ''Pdf'']
|-
|Dunlap, Charles J. Jr.||||2009||[[Towards a Cyberspace Legal Regime in the Twenty-First Century]]||Speech||None||N/A
|-
|Energetics Inc.||||2006||[[Roadmap to Secure Control Systems in the Energy Sector]]||Independent Report||None||[http://www.cyber.st.dhs.gov/docs/DOE%20Roadmap%202006.pdf ''Pdf'']
|-
|Epstein, Richard A.||Brown, Thomas P.||2008||[[Cybersecurity in the Payment Card Industry]]||Law Review||Low:Law; Low:Economics||[http://lawreview.uchicago.edu/issues/archive/v75/75_1/EpsteinArticle.pdf ''Pdf'']
|-
|Financial Services Sector Coordinating Council for Critical Infrastructure Protection||||2008||[[Research Agenda for the Banking and Finance Sector]]||Independent Report||None||[http://www.cyber.st.dhs.gov/docs/RD_Agenda-FINAL.pdf ''Pdf'']
|-
|Franklin, Jason, et. al||||2007||[[An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants]]||Conf. Paper||Low:Statistics; Low:Economics||[http://sparrow.ece.cmu.edu/group/pub/franklin_paxson_perrig_savage_miscreants.pdf ''Pdf''] [http://www.cs.cmu.edu/~jfrankli/acmccs07/ccs07_franklin_eCrime.pdf  ''Alt Pdf'']
|-
|Gandal, Neil||||2008||[[An Introduction to Key Themes in the Economics of Cyber Security]]||Book Chapter||Low:Economics||[http://www.tau.ac.il/~gandal/security%20encyclopedia%20entry.pdf ''Pdf'']
|-
|Grady, Mark F.||Parisi, Francesco||2006||[[The Law and Economics of Cybersecurity]]||Book||Low:Economics; Low:Law||N/A
|-
|Granick, Jennifer Stisa||||2005||[[The Price of Restricting Vulnerability Publications]]||Law Review||Low/Moderate:Law||[http://www.ijclp.net/files/ijclp_web-doc_10-cy-2004.pdf  ''Pdf'']
|-
|Hollis, Duncan B.||||2007||[[Why States Need an International Law for Information Operations]]||Law Review||Moderate:Law||[http://legacy.lclark.edu/org/lclr/objects/LCB_11_4_Art7_Hollis.pdf  ''Pdf'']
|-
|Institute for Information Infrastructure Protection||||2003||[[Cyber Security Research and Development Agenda]]||Independent Report||Low/None:Technology||[http://www.cyber.st.dhs.gov/docs/I3P%20Research%20Agenda%202003.pdf ''Pdf'']
|-
|Johnson, Eric M.||||2008||[[Managing Information Risk and the Economics of Security]]||Book||High:Economics||N/A
|-
|Johnson, Vincent R.||||2005||[[Cybersecurity, Identity Theft, and the Limits of Tort Liability]]||Law Review||Moderate:Law||[http://www.stmarytx.edu/law/pdf/Johnsoncyber.pdf ''Pdf''] [http://law.bepress.com/cgi/viewcontent.cgi?article=3530&context=expresso ''AltPdf'']
|-
|Kobayashi, Bruce H.|| ||2006||[[An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods]]||Journal Article ||High:Economics||[http://www.law.gmu.edu/assets/files/publications/working_papers/05-11.pdf ''Pdf'']
|-
|Korns, Stephen W.|| ||2009||[[Cyber Operations]]||Journal Article||Low:International Warfare||[http://www.carlisle.army.mil/DIME/documents/Cyber%20Operations%20-%20The%20New%20Balance%20-%20Korns.pdf ''Pdf'']
|-
|Kramer, Franklin D., et. al||||2009||[[Cyberpower and National Security]]||Book||None||N/A
|-
|Lernard, Thomas M.||Rubin, Paul H.||2005||[[An Economic Analysis of Notification Requirements for Data Security Breaches]]||Online Paper||Low:Economics||[http://www.pff.org/issues-pubs/pops/pop12.12datasecurity.pdf ''Pdf'']
|-
|Lernard, Thomas M.||Rubin, Paul H.||2006||[[Much Ado About Notification]]||Journal Article||Low:Economics||[http://www.cato.org/pubs/regulation/regv29n1/v29n1-5.pdf  ''Pdf'']  [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=898208# ''SSRN'']
|-
|McAfee, Inc.||||2010||[[McAfee Threats Report]]||Industry Report||None||[http://www.mcafee.com/us/local_content/reports/2010q1_threats_report.pdf ''Pdf'']
|-
|Moore, Tyler, et. al||||2009||[[The Economics of Online Crime]]||Journal Article||Low:Technology||[http://people.seas.harvard.edu/~tmoore/jep09.pdf  ''Pdf'']
|-
|Moore, Tyler||Clayton, Richard||2007||[[Examining the Impact of Website Take-down on Phishing]]||Conf. Paper||Low:Technology||[http://www.ecrimeresearch.org/2007/proceedings/p1_moore.pdf ''Pdf''] [http://www.cl.cam.ac.uk/~rnc1/ecrime07.pdf  ''Alt Pdf'']
|-
|Moore, Tyler||Clayton, Richard||2008||[[The Consequence of Non-Cooperation in the Fight Against Phishing]]||Conf. Paper||Low:Technology; Low:Economics||[http://people.seas.harvard.edu/~tmoore/ecrime08.pdf ''Pdf''] [http://www.cl.cam.ac.uk/~rnc1/ecrime08pre.pdf  ''Alt Pdf'']
|-
|Moore, Tyler||Clayton, Richard||2009||[[The Impact of Incentives on Notice and Take-down]]||Book Chapter||Moderate:Technology; Low:Law||[http://weis2008.econinfosec.org/papers/MooreImpact.pdf  ''Pdf'']
|-
|National Cyber Defense Initiative||||2009||[[National Cyber Defense Financial Services Workshop Report]]||Independent Report||Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance||[http://www.cyber.st.dhs.gov/docs/NCDI_FI_Workshop_Report.pdf ''Pdf'']
|-
|National Cyber Security Summit Task Force||||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf'']
|-
|National Infrastructure Advisory Council||||2004||[[Hardening The Internet]]||Government Report||High:Technology||[http://www.cyber.st.dhs.gov/docs/NIAC%20Internet%20Hardening.pdf  ''Pdf'']
|-
|National Institute of Standards and Technology||||2006||[[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]||Government Report||Moderate:Technology||[http://www.cyber.st.dhs.gov/docs/NIST%20Guide%20to%20Supervisory%20and%20Data%20Acquisition-SCADA%20and%20Industrial%20Control%20Systems%20Security%20(2007).pdf ''Pdf'']
|-
|National Research Council||||1999||[[Trust in Cyberspace]]||Independent Report||Moderate:Technology||[http://www.cyber.st.dhs.gov/docs/Trust%20in%20Cyberspace%20Report%201999.pdf ''Pdf'']
|-
|National Research Council||||2007||[[Toward a Safer and More Secure Cyberspace]]||Independent Report||Low:Research Processes; Low:Technology||[http://www.cyber.st.dhs.gov/docs/Toward_a_Safer_and_More_Secure_Cyberspace-Full_report.pdf ''Pdf'']
|-
|Nye, Joseph||||2010||[[Cyber Power]]||Book Chapter||Low:Technology; Low:Policy||[http://belfercenter.ksg.harvard.edu/files/cyber-power.pdf ''Pdf'']
|-
|Powell, Benjamin||||2005||[[Is Cybersecurity a Public Good]]||Law Review||Low/Moderate:Economics||[http://www.independent.org/pdf/working_papers/57_cyber.pdf  ''Pdf''] [http://www.ciaonet.org/wps/pob03/pob03.pdf ''AltPdf'']
|-
|Romanosky et al.||||2008||[[Do Data Breach Disclosure Laws Reduce Identity Theft]]||Conf. Paper||Moderate:Economics||[http://weis2008.econinfosec.org/papers/Romanosky.pdf ''Pdf'']
|-
|Rotenberg et. al.||||2010||[[The Cyber War Threat Has Been Grossly Exaggerated]]||Debate||None||[http://intelligencesquaredus.org/index.php/past-debates/cyber-war-threat-has-been-grossly-exaggerated/ ''Audio/Transcript'']
|-
|Schmitt, Michael N., et. al||||2004||[[Computers and War]]||Conf. Paper||Moderate:Law||[http://www.ihlresearch.org/ihl/pdfs/schmittetal.pdf ''Pdf'']
|-
|Schmitt, Michael N.||||1999||[[Computer Network Attack and the Use of Force in International Law]]||Law Review||High:Law||[http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA471993&Location=U2&doc=GetTRDoc.pdf ''Pdf'']
|-
|Schmitt, Michael N.||||2002||[[Wired Warfare]]||Journal Article||Moderate:Law||[http://www.icrc.org/Web/eng/siteeng0.nsf/htmlall/5C5D5C/$File/365_400_Schmitt.pdf ''Pdf'']
|-
|Schneier, Bruce||||2003||[[Beyond Fear]]||Book||None||[http://www.scribd.com/doc/12185921/beyond-fear-thinking-sensibly-about-security-in-an-uncertain-world-bruce-schneier-copernicus-books-2003 ''Scribd'']
|-
|Schneier, Bruce||||2008||[[Schneier on Security]]||Book||None||[http://www.schneier.com/book-sos.html ''Purchase'']
|-
|Schwartz, Paul||Janger, Edward||2007||[[Notification of Data Security Breaches]]||Law Review||Low:Law; Low:Economics||[http://www.michiganlawreview.org/assets/pdfs/105/5/schwartz.pdf ''Pdf'']
|-
|Sklerov, Matthew J.|| ||2009||[[Solving the Dilemma of State Responses to Cyberattacks]]||Law Review||Moderate:Law; Low:Technology||[http://www.loc.gov/rr/frd/Military_Law/Military_Law_Review/pdf-files/201-fall-2009.pdf ''Pdf'']
|-
|Stohl, Michael||||2006||[[Cyber Terrorism]]||Journal Article||None||[http://www.ingentaconnect.com/content/klu/cris/2006/00000046/F0020004/00009061 ''Purchase'']
|-
|Swire, Peter P.||||2004||[[A Model for When Disclosure Helps Security]]||Law Review||Low/Moderate:Logic||[http://www.rootsecure.net/content/downloads/pdf/disclosure_helps_security.pdf ''Pdf''][http://papers.ssrn.com/sol3/papers.cfm?abstract_id=531782 ''SSRN'']
|-
|Swire, Peter P.||||2006||[[A Theory of Disclosure for Security and Competitive Reasons]]||Law Review||Low/Moderate:Logic||[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=842228 ''SSRN'']
|-
|Symantec Corporation||||2010||[[Symantec Global Internet Security Threat Report]]||Industry Report||Low/Moderate:Technology||[http://www4.symantec.com/Vrt/wl?tu_id=SUKX1271711282503126202 ''Pdf'']
|-
|Telang, Rahul||Wattal, Sunil||2007||[[Impact of Software Vulnerability Announcements on the Market Value of Software Vendors]]||Journal Article||Moderate:Economics||[http://infosecon.net/workshop/pdf/telang_wattal.pdf  ''Pdf'']
|-
|Thomas, Rob||Martin, Jerry||2006||[[The Underground Economy]]||Journal Article||Low:Technology||[http://www.usenix.org/publications/login/2006-12/openpdfs/cymru.pdf ''Pdf'']
|-
|Todd, Graham H.|| ||2009||[[Armed Attack in Cyberspace]]||Law Review||Moderate:Law||[http://www.afjag.af.mil/shared/media/document/AFD-091026-024.pdf ''Pdf'']
|-
|Trend Micro Incorporated||||2010||[[Trend Micro Annual Report]]||Industry Report||Moderate:Technology||[http://us.trendmicro.com/imperia/md/content/us/trendwatch/researchandanalysis/2009s_most_persistent_malware_threats__march_2010_.pdf ''Pdf'']
|-
|United States Secret Service||||2004||[[Insider Threat Study]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/its_report_040820.pdf ''Pdf'']
|-
|van Eeten, Michel J. G.||Bauer, Johannes M.||2008||[[Economics of Malware]]||Non-US Govt. Report||Moderate:Economics||[http://www.oecd.org/dataoecd/53/17/40722462.pdf ''Pdf'']
|-
|Varian, Hal||||2000||[[Managing Online Security Risks]]||Newspaper Article||None||[http://people.ischool.berkeley.edu/~hal/people/hal/NYTimes/2000-06-01.html ''Web'']
|-
|Varian, Hal||||2004||[[System Reliability and Free Riding]]||Book Chapter||High:Economics||[http://www.sims.berkeley.edu/resources/affiliates/workshops/econsecurity/econws/48-old.pdf ''Pdf'']  [http://people.ischool.berkeley.edu/~hal/Papers/2004/reliability  ''AltPdf'']
|-
|Verizon||||2010||[[2010 Data Breach Investigations Report]]||Industry Report||Low:Technology||[http://www.verizonbusiness.com/resources/reports/rp_2010-data-breach-report_en_xg.pdf ''Pdf'']
|-
|Watts, Sean|| ||2010||[[Combatant Status and Computer Network Attack]]||Law Review||Moderate:Law||[http://www.vjil.org/wp-content/uploads/2010/01/VJIL-50.2-Watts.pdf ''Pdf'']
|-
|White House||||2009||[[Cyberspace Policy Review]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/Cyberspace_Policy_Review_final.pdf ''Pdf'']
|-
|White House||||2003||[[The National Strategy to Secure Cyberspace]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/National%20Strategy%20to%20Secure%20Cyberspace%202003.pdf ''Pdf'']
|-
|Zittrain, Jonathan L.||||2008||[[The Future of the Internet and How To Stop It]]||Book||None||[http://futureoftheinternet.org/static/ZittrainTheFutureoftheInternet.pdf ''Pdf'']
|}


'''''Subcategories:'''''
*''[[Issues | Issues->]][[Metrics]]''
*''[[Issues | Issues->]][[Economics of Cybersecurity | Economics of Cybersecurity->]][[Risk Management and Investment]]''
*''[[Issues | Issues->]][[Economics of Cybersecurity | Economics of Cybersecurity->]][[Incentives]]''
*''[[Issues | Issues->]][[Economics of Cybersecurity | Economics of Cybersecurity->]][[Insurance]]''
*''[[Issues | Issues->]][[Economics of Cybersecurity | Economics of Cybersecurity->]][[Behavioral Economics]]''
*''[[Issues | Issues->]][[Economics of Cybersecurity | Economics of Cybersecurity->]][[Market Failure]]''
*''[[Issues | Issues->]][[Supply Chain Issues]]''
*''[[Issues | Issues->]][[Usability/Human Factors]]''
*''[[Issues | Issues->]][[Psychology and Politics]]''
*''[[Issues | Issues->]][[Information Sharing/Disclosure]]''
*''[[Issues | Issues->]][[Public-Private Cooperation]]''
*''[[Issues | Issues->]][[Attribution]]''
*''[[Issues | Issues->]][[Identity Management]]''
*''[[Issues | Issues->]][[Privacy]]''
*''[[Issues | Issues->]][[Cybercrime]]''
*''[[Issues | Issues->]][[Cyberwar]]''
*''[[Issues | Issues->]][[Espionage | Espionage->]][[Government to Government]]''
*''[[Issues | Issues->]][[Espionage | Espionage->]][[Industrial]]''
*''[[Issues | Issues->]][[Espionage | Espionage->]][[Media Perceptions]]''


''[[Table of Contents| Jump to Table of Contents]]''
''[[Table of Contents| Jump to Table of Contents]]''

Latest revision as of 16:41, 7 August 2012

TOC->Issues

Types
U.S. Government Report
U.S. Government Hearing
Non-U.S. Government Report
Independent Report
Industry Report
Book
Journal Article
Article
Categories
Exclude Subcatgeories
Search
Help


Jump to Table of Contents