Risk Management and Investment: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
 
(22 intermediate revisions by 2 users not shown)
Line 1: Line 1:
''[[Table of Contents | TOC->]][[Issues | Issues->]][[Economics of Cybersecurity | Economics of Cybersecurity->]][[Risk Management and Investment]]''
''[[Table of Contents | TOC->]][[Issues | Issues->]][[Economics of Cybersecurity | Economics of Cybersecurity->]][[Risk Management and Investment]]''


Anderson, Ross (2001) [[Why Information Security is Hard]]
{{Filtered_Table||4.2.1,false}}


Anderson, Ross and Moore, Tyler (2006)  [[The Economics of Information Security]]
Arora et al. (2006) [[Does Information Security Attack Frequency Increase With Vulnerability Disclosure]]
Aviram, Amitai and Tor, Avishalom (2004) [[Overcoming Impediments to Information Sharing]]
Camp, L. Jean and Wolfram, Catherine  (2004) [[Pricing Security]]
Computing Research Association (2003) [[Four Grand Challenges in Trustworthy Computing]]
Department of Defense (2007) [[Mission Impact of Foreign Influence on DoD Software]]
Financial Services Sector Coordinating Council for Critical Infrastructure Protection (2008) [[Research Agenda for the Banking and Finance Sector]]
Franklin, Jason, et. al (2007) [[An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants]]
Institute for Information Infrastructure Protection (2003) [[Cyber Security Research and Development Agenda]]
National Cyber Defense Initiative (2009) [[National Cyber Defense Financial Services Workshop Report]]
National Institute of Standards and Technology (2006) [[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]
National Research Council (2007) [[Toward a Safer and More Secure Cyberspace]]
National Research Council (1999) [[Trust in Cyberspace]]
Schneier, Bruce (2008) [[Schneier on Security]]
van Eeten, Michel J. G.  and  Bauer, Johannes M. (2008) [[Economics of Malware]]
Varian, Hal (2000) [[Managing Online Security Risks]]
Varian, Hal (2004) [[System Reliability and Free Riding]]
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
|-
! style="background-color: #efefef;" | Author 1
! style="background-color: #efefef;" | Author 2
! style="background-color: #efefef;" | Year
! style="background-color: #efefef;" | Title
! style="background-color: #efefef;" | Source
! style="background-color: #efefef;" | Expertise
! style="background-color: #efefef;" class="unsortable" | Full Text 
|-
|Camp, L. Jean||Lewis, Stephen||2004||[[Economics of Information Security]]||Book||High:Economics||N/A
|-
|Grady, Mark F.||Parisi, Francesco||2006||[[The Law and Economics of Cybersecurity]]||Book||Low:Economics; Low:Law||N/A
|-
|Johnson, Eric M.||||2008||[[Managing Information Risk and the Economics of Security]]||Book||High:Economics||N/A
|}
*'''''Subcategories:''''' ''None''


''[[Table of Contents| Jump to Table of Contents]]''
''[[Table of Contents| Jump to Table of Contents]]''

Latest revision as of 16:42, 7 August 2012

TOC-> Issues-> Economics of Cybersecurity->Risk Management and Investment

Types
U.S. Government Report
U.S. Government Hearing
Non-U.S. Government Report
Independent Report
Industry Report
Book
Journal Article
Article
Categories
Exclude Subcatgeories
Search
Help


Jump to Table of Contents