Regulation/Liability: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
 
(28 intermediate revisions by 2 users not shown)
Line 1: Line 1:
''[[Table of Contents | TOC->]][[Approaches | Approaches->]][[Regulation/Liability]]''
''[[Table of Contents | TOC->]][[Approaches | Approaches->]][[Regulation/Liability]]''


Anderson, Ross (2001) [[Why Information Security is Hard]]
{{Filtered_Table||5.1,false}}


Anderson, Ross and Moore, Tyler (2006)  [[The Economics of Information Security]]
Anderson, Ross, et. al (2008) [[Security Economics and the Internal Market]]
Aviram, Amitai and Tor, Avishalom (2004) [[Overcoming Impediments to Information Sharing]]
Barkham, Jason (2001) [[Information Warfare and International Law on the Use of Force]]
Camp, L. Jean and Lewis, Stephen (2004) [[Economics of Information Security]]
Granick, Jennifer Stisa (2005) [[The Price of Restricting Vulnerability Publications]]
Johnson, Vincent R. (2005) [[Cybersecurity, Identity Theft, and the Limits of Tort Liability]]
Korns, Stephen W.  (2009) [[Cyber Operations]]
Lernard, Thomas M. and Rubin, Paul H. (2005) [[An Economic Analysis of Notification Requirements for Data Security Breaches]]
Lernard, Thomas M. and Rubin, Paul H. (2006) [[Much Ado About Notification]]
Powell, Benjamin  (2005)  [[Is Cybersecurity a Public Good]]
Romanosky et al. (2008) [[Do Data Breach Disclosure Laws Reduce Identity Theft]]
Todd, Graham H. (2009) [[Armed Attack in Cyberspace]]
Schmitt, Michael N., et. al (2004) [[Computers and War]]
Schmitt, Michael N. (2002) [[Wired Warfare]]
Schwartz, Paul and Janger, Edward (2007) [[Notification of Data Security Breaches]]
Sklerov, Matthew J. (2009) [[Solving the Dilemma of State Responses to Cyberattacks]]
Swire, Peter P (2004) [[A Model for When Disclosure Helps Security]]
Swire, Peter P (2006) [[A Theory of Disclosure for Security and Competitive Reasons]]
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
|-
! style="background-color: #efefef;" | Author 1
! style="background-color: #efefef;" | Author 2
! style="background-color: #efefef;" | Year
! style="background-color: #efefef;" | Title
! style="background-color: #efefef;" | Source
! style="background-color: #efefef;" | Expertise
! style="background-color: #efefef;" class="unsortable" | Full Text 
|-
|Anderson, Ross J.||||2008||[[Security Engineering]]||Book||Moderate:Technology; Moderate:Cryptography||N/A
|-
|Camp, L. Jean||Lewis, Stephen||2004||[[Economics of Information Security]]||Book||High:Economics||N/A
|-
|Center for Strategic and International Studies||||2008||[[Securing Cyberspace for the 44th Presidency]]||Independent Reports||Low:Policy||[http://www.cyber.st.dhs.gov/docs/081208_securingcyberspace_44.pdf ''Pdf'']
|-
|Epstein, Richard A.||Brown, Thomas P.||2008||[[Cybersecurity in the Payment Card Industry]]||Law Review Article||Low:Law; Low:Economics||[http://lawreview.uchicago.edu/issues/archive/v75/75_1/EpsteinArticle.pdf ''Pdf'']
|-
|Grady, Mark F.||Parisi, Francesco||2006||[[The Law and Economics of Cybersecurity]]||Book||Low:Economics; Low:Law||N/A
|-
|Institute for Information Infrastructure Protection||||2003||[[Cyber Security Research and Development Agenda]]||Independent Reports||Low/None:Technology||[http://www.cyber.st.dhs.gov/docs/I3P%20Research%20Agenda%202003.pdf ''Pdf'']
|-
|Johnson, Eric M.||||2008||[[Managing Information Risk and the Economics of Security]]||Book||High:Economics||N/A
|-
|Kramer, Franklin D., et. al||||2009||[[Cyberpower and National Security]]||Book||None||N/A
|-
|National Cyber Defense Initiative||||2009||[[National Cyber Defense Financial Services Workshop Report]]||Independent Report||Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance||[http://www.cyber.st.dhs.gov/docs/NCDI_FI_Workshop_Report.pdf ''Pdf'']
|-
|National Cyber Security Summit Task Force||||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf'']
|-
|National Research Council||||2007||[[Toward a Safer and More Secure Cyberspace]]||Independent Reports||Low:Research Processes; Low:Technology||[http://www.cyber.st.dhs.gov/docs/Toward_a_Safer_and_More_Secure_Cyberspace-Full_report.pdf ''Pdf'']
|-
|Schneier, Bruce||||2008||[[Schneier on Security]]||Book||None||[http://www.schneier.com/book-sos.html ''Purchase'']
|-
|White House||||2009||[[Cyberspace Policy Review]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/Cyberspace_Policy_Review_final.pdf ''Pdf'']
|-
|Zittrain, Jonathan L.||||2008||[[The Future of the Internet and How To Stop It]]||Book||None||[http://futureoftheinternet.org/static/ZittrainTheFutureoftheInternet.pdf ''Pdf'']
|}
*'''''Subcategories:''''' ''None''


''[[Table of Contents | Jump to Table of Contents]]''
''[[Table of Contents | Jump to Table of Contents]]''

Latest revision as of 16:50, 7 August 2012

TOC-> Approaches->Regulation/Liability

Types
U.S. Government Report
U.S. Government Hearing
Non-U.S. Government Report
Independent Report
Industry Report
Book
Journal Article
Article
Categories
Exclude Subcatgeories
Search
Help


Jump to Table of Contents