Economics of Cybersecurity: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
 
(30 intermediate revisions by 2 users not shown)
Line 1: Line 1:
''[[Table of Contents | TOC->]][[Issues | Issues->]][[Economics of Cybersecurity]]''
''[[Table of Contents | TOC->]][[Issues | Issues->]][[Economics of Cybersecurity]]''


Anderson, Ross and Moore, Tyler (2006)  [[The Economics of Information Security]]
{{Filtered_Table||4.2,false}}


Arora et al. (2006) [[Does Information Security Attack Frequency Increase With Vulnerability Disclosure]]
Aviram, Amitai and Tor, Avishalom (2004) [[Overcoming Impediments to Information Sharing]]
Bohme, Rainer (2005) [[Cyber-Insurance Revisited]]
Bohme, Rainer and Kataria, Gaurav (2006) [[Models and Measures for Correlation in Cyber-Insurance]]
Bohme, Rainer and Schwartz, Galina (2010) [[Modeling Cyber-Insurance]]
Camp, L. Jean and Wolfram, Catherine  (2004) [[Pricing Security]]
Clinton, Larry (Undated) [[Cyber-Insurance Metrics and Impact on Cyber-Security]]
Computing Research Association (2003) [[Four Grand Challenges in Trustworthy Computing]]
Department of Defense (2007) [[Mission Impact of Foreign Influence on DoD Software]]
Financial Services Sector Coordinating Council for Critical Infrastructure Protection (2008) [[Research Agenda for the Banking and Finance Sector]]
Institute for Information Infrastructure Protection (2003) [[Cyber Security Research and Development Agenda]]
Johnson, Vincent R. (2005) [[Cybersecurity, Identity Theft, and the Limits of Tort Liability]]
Kobayashi, Bruce H. (2006) [[An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods]]
Lernard, Thomas M. and Rubin, Paul H. (2005) [[An Economic Analysis of Notification Requirements for Data Security Breaches]]
National Cyber Defense Initiative (2009) [[National Cyber Defense Financial Services Workshop Report]]
National Institute of Standards and Technology (2006) [[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]
National Research Council (2007) [[Toward a Safer and More Secure Cyberspace]]
National Research Council (1999) [[Trust in Cyberspace]]
Powell, Benjamin  (2005)  [[Is Cybersecurity a Public Good]]
Romanosky et al. (2008) [[Do Data Breach Disclosure Laws Reduce Identity Theft]]
Schwartz, Paul and Janger, Edward (2007) [[Notification of Data Security Breaches]]
Swire, Peter P (2004) [[A Model for When Disclosure Helps Security]]
Swire, Peter P (2006) [[A Theory of Disclosure for Security and Competitive Reasons]]
Telang, Rahul and Wattal, Sunil (2007) [[Impact of Software Vulnerability Announcements on the Market Value of Software Vendors]]
van Eeten, Michel J. G.  and  Bauer, Johannes M. (2008) [[Economics of Malware]]
Varian, Hal (2000) [[Managing Online Security Risks]]
Varian, Hal (2004) [[System Reliability and Free Riding]]
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
|-
! style="background-color: #efefef;" | Author 1
! style="background-color: #efefef;" | Author 2
! style="background-color: #efefef;" | Year
! style="background-color: #efefef;" | Title
! style="background-color: #efefef;" | Source
! style="background-color: #efefef;" | Expertise
! style="background-color: #efefef;" class="unsortable" | Full Text 
|-
|Anderson, Ross J.||||2008||[[Security Engineering]]||Book||Moderate:Technology; Moderate:Cryptography||N/A
|-
|Camp, L. Jean||Lewis, Stephen||2004||[[Economics of Information Security]]||Book||High:Economics||N/A
|-
|Computer Economics, Inc.||||2007||[[2007 Malware Report]]||Industry Report||None||[http://www.computereconomics.com/article.cfm?id=1224 ''Purchase'']
|-
|Franklin, Jason, et. al||||2007||[[An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants]]||Conference Paper||Low:Statistics; Low:Economics||[http://sparrow.ece.cmu.edu/group/pub/franklin_paxson_perrig_savage_miscreants.pdf ''Pdf''] [http://www.cs.cmu.edu/~jfrankli/acmccs07/ccs07_franklin_eCrime.pdf  ''Alt Pdf'']
|-
|Gandal, Neil||||2008||[[An Introduction to Key Themes in the Economics of Cyber Security]]||Book Chapter||Low:Economics||[http://www.tau.ac.il/~gandal/security%20encyclopedia%20entry.pdf ''Pdf'']
|-
|Grady, Mark F.||Parisi, Francesco||2006||[[The Law and Economics of Cybersecurity]]||Book||Low:Economics; Low:Law||N/A
|-
|Johnson, Eric M.||||2008||[[Managing Information Risk and the Economics of Security]]||Book||High:Economics||N/A
|-
|Moore, Tyler||Clayton, Richard||2009||[[The Impact of Incentives on Notice and Take-down]]||Book Chapter||Moderate:Technology; Low:Law||[http://weis2008.econinfosec.org/papers/MooreImpact.pdf  ''Pdf'']
|-
|Moore, Tyler, et. al||||2009||[[The Economics of Online Crime]]||Journal Article||Low:Technology||[http://people.seas.harvard.edu/~tmoore/jep09.pdf  ''Pdf'']
|-
|Schneier, Bruce||||2003||[[Beyond Fear]]||Book||None||[http://www.scribd.com/doc/12185921/beyond-fear-thinking-sensibly-about-security-in-an-uncertain-world-bruce-schneier-copernicus-books-2003 ''Scribd'']
|-
|Symantec Corporation||||2010||[[Symantec Global Internet Security Threat Report]]||Industry Report||Low/Moderate:Technology||[http://www4.symantec.com/Vrt/wl?tu_id=SUKX1271711282503126202 ''Pdf'']
|-
|Thomas, Rob||Martin, Jerry||2006||[[The Underground Economy]]||Journal Article||Low:Technology||[http://www.usenix.org/publications/login/2006-12/openpdfs/cymru.pdf ''Pdf'']
|}
'''''Subcategories:'''''
*''[[Economics of Cybersecurity | Economics of Cybersecurity->]][[Risk Management and Investment]]''
*''[[Economics of Cybersecurity | Economics of Cybersecurity->]][[Incentives]]''
*''[[Economics of Cybersecurity | Economics of Cybersecurity->]][[Insurance]]''
*''[[Economics of Cybersecurity | Economics of Cybersecurity->]][[Behavioral Economics]]''
*''[[Economics of Cybersecurity | Economics of Cybersecurity->]][[Market Failure]]''


''[[Table of Contents| Jump to Table of Contents]]''
''[[Table of Contents| Jump to Table of Contents]]''

Latest revision as of 16:41, 7 August 2012

TOC-> Issues->Economics of Cybersecurity

Types
U.S. Government Report
U.S. Government Hearing
Non-U.S. Government Report
Independent Report
Industry Report
Book
Journal Article
Article
Categories
Exclude Subcatgeories
Search
Help


Jump to Table of Contents