The Need for a National Cybersecurity Research and Development Agenda: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
 
(One intermediate revision by the same user not shown)
Line 5: Line 5:
==Full Citation==
==Full Citation==


Douglas Maughan, The Need for a National Cybersecurity Research and Development Agenda, 53 Comm. of ACM 2 (2010)  [http://portal.acm.org/citation.cfm?id=1646365&dl=GUIDE&coll=GUIDE&CFID=93498964&CFTOKEN=96406105  ''Purchase'']
Douglas Maughan, ''The Need for a National Cybersecurity Research and Development Agenda'', 53 Comm. of ACM 2 (2010)  [http://portal.acm.org/citation.cfm?id=1646365&dl=GUIDE&coll=GUIDE&CFID=93498964&CFTOKEN=96406105  ''Purchase'']


[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=&startkey=Maughan:2010&f=wikibiblio.bib ''BibTeX'']
[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=&startkey=Maughan:2010&f=wikibiblio.bib ''BibTeX'']
Line 14: Line 14:
*Approaches: [[Government Organization]]
*Approaches: [[Government Organization]]


==Key Words==  
==Key Words==


[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Research_.26_Development research & development]


==Synopsis==
==Synopsis==

Latest revision as of 15:48, 11 June 2010

Full Title of Reference

The Need for a National Cybersecurity Research and Development Agenda

Full Citation

Douglas Maughan, The Need for a National Cybersecurity Research and Development Agenda, 53 Comm. of ACM 2 (2010) Purchase

BibTeX

Categorization

Key Words

research & development

Synopsis

According to this column, government-funded initiatives, in cooperation with private-sector partners in key technology areas, are fundamental to cybersecurity technical transformation. The goal should be to avoid the risks that have prevailed in the past as a U.S. national cyber security agenda is being developed.

Additional Notes and Highlights

The author is project manager for cybersecurity R&D at the U.S. Department of Homeland Security.