Suggested References to Add to Wiki: Difference between revisions
No edit summary |
No edit summary |
||
Line 18: | Line 18: | ||
Burstein, Aaron J. (2008) [[Amending The ECPA To Enable a Culture of Cybersecurity Research]] | Burstein, Aaron J. (2008) [[Amending The ECPA To Enable a Culture of Cybersecurity Research]] | ||
Cetron, Marvin J. and Davies, Owen (2009) [[World War 3.0: Ten Critical Trends for Cybersecurity]] | |||
Rue, Rachel and Pfleeger, Shari Lawrence (2009) [[Making the Best Use of Cybersecurity Economic Models]] | Rue, Rachel and Pfleeger, Shari Lawrence (2009) [[Making the Best Use of Cybersecurity Economic Models]] |
Revision as of 11:07, 11 June 2010
Please add links to reference pages for Redmine articles you believe should be added to the cybersecurity wiki here.
Entries should look just like any other entry on a topic page, i.e., "<lastname>, <firstname> (<year>) [<Title as a link to the reference page>]"
Nojeim, Gregory T. (2009) Cybersecurity: Preventing Terrorist Attacks and Protecting Privacy in Cyberspace
Nye, Joseph S. (2010) Cyber Power
OECD (2009) Cybersecurity and Economic Incentives
OECD (2009) The Market Consequences of Cybersecurity: Defining Externalities and Ways to Address Them
Bauer, Johannes M. and van Eeten, Michel J. G. (2009) Cybersecurity: Stakeholder Incentives, Externalities, and Policy Options
Bellovin, Steven M. (2009) The Government and Cybersecurity
Besunder, Allison A. (2009) Best Practices for Data Protection and Privacy
Burstein, Aaron J. (2008) Amending The ECPA To Enable a Culture of Cybersecurity Research
Cetron, Marvin J. and Davies, Owen (2009) World War 3.0: Ten Critical Trends for Cybersecurity
Rue, Rachel and Pfleeger, Shari Lawrence (2009) Making the Best Use of Cybersecurity Economic Models
Santos, Joost R, Haimes, Yacov Y and Chenyang Kian (2007) A Framework for Linking Cybersecurity Metrics to the Modeling of Macroeconomic Interdependencies
Schneidewind, Norman (2010) Metrics for Mitigating Cybersecurity Threats to Networks
Shackelford, Scott J. (2010) Estonia Three Years Later
Shah, Shashi K. (2004) The Evolving Landscape of Maritime Cybersecurity
Stohl, Michael (2006) Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games
van Eeten, Michael and Bauer, Johannes M. (2009) Emerging Threats to Internet Security - Incentives, Externalities and Policy Implications