Suggested References to Add to Wiki: Difference between revisions
No edit summary |
No edit summary |
||
(34 intermediate revisions by 4 users not shown) | |||
Line 1: | Line 1: | ||
''Please add links to reference pages for Redmine articles you believe should be added to the cybersecurity wiki here.'' | ''Please add links to reference pages for Redmine articles you believe should be added to the cybersecurity wiki here or email them to: cybersecurity-feedback@cyber.law.harvard.edu'' | ||
''Entries should look just like any other entry on a topic page, i.e., "<lastname>, <firstname> ''(<year>)'' [<Title as a link to the reference page>]"'' | ''Entries should look just like any other entry on a topic page, i.e., "<lastname>, <firstname> ''(<year>)'' [<Title as a link to the reference page>]"'' | ||
Aloise, Gene, Barkakati, Nabajyoti, and Wilshusen, Gregory C. (2008) [[Nuclear Security]] | |||
Bauer, Johannes M. and van Eeten, Michel J. G. (2009) [[Cybersecurity | Bauer, Johannes M. and van Eeten, Michel J. G. (2009) [[Cybersecurity]] | ||
Bellovin, Steven M. (2009) [[The Government and Cybersecurity]] | Bellovin, Steven M. (2009) [[The Government and Cybersecurity]] | ||
Line 24: | Line 16: | ||
Cornish, Paul (2009) [[Cyber Security and Politically, Socially and Religiously Motivated Cyber Attacks]] | Cornish, Paul (2009) [[Cyber Security and Politically, Socially and Religiously Motivated Cyber Attacks]] | ||
Cornish, Paul, Hughes, Rex, and Livingstone, David (2009) [[Cyberspace and the National Security of the United Kingdom]] | |||
ENISA (2010) [[Introduction to Country Reports]] | |||
Gable, Kelly A. (2010) [[Cyber-Apocalypse Now]] | |||
GAO (2009) [[Critical Infrastructure Protection]] | |||
GAO (2010) [[Information Security]] | |||
Geer, Daniel E. and Conway, Daniel G. (2010) [[Nothing Ventured, Nothing Gained]] | |||
Intelligence Squared US (IQ2US) Video Debate ''(2010)'' [[The Cyber War Threat Has Been Grossly Exaggerated]] | |||
Kobayashi, Bruce H. (2005) [[An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and other Public Security Goods]] | |||
Lan, Tang et al. (2010) [[Global Cyber Deterrence]] | |||
Lewis, James Andrews (2005) [[Cyber Security and Regulation in the United States]] | |||
Madnick, Stuart (2009) [[Experiences and Challenges with Using CERT Data to Analyze International Cyber Security]] | |||
Maughan, Douglas (2010) [[The Need for a National Cybersecurity Research and Development Agenda]] | |||
Nojeim, Gregory T. (2009) [[Cybersecurity: Preventing Terrorist Attacks and Protecting Privacy in Cyberspace]] | |||
Nye, Joseph S. (2010) [[Cyber Power]] | |||
OECD (2009) [[Cybersecurity and Economic Incentives]] | |||
OECD (2009) [[The Market Consequences of Cybersecurity]] | |||
Perkins, Earl (2009) [[Evolving Cybersecurity Issues in the Utility Industry]] | |||
Rollins, John and Wilson, Clay (2007) [[Terrorist Capabilities for Cyberattack]] | |||
Rue, Rachel and Pfleeger, Shari Lawrence (2009) [[Making the Best Use of Cybersecurity Economic Models]] | Rue, Rachel and Pfleeger, Shari Lawrence (2009) [[Making the Best Use of Cybersecurity Economic Models]] | ||
Santos, Joost R, | Santos, Joost R., et. al (2007) [[A Framework for Linking Cybersecurity Metrics to the Modeling of Macroeconomic Interdependencies]] | ||
Schneidewind, Norman (2010) [[Metrics for Mitigating Cybersecurity Threats to Networks]] | Schneidewind, Norman (2010) [[Metrics for Mitigating Cybersecurity Threats to Networks]] | ||
Line 37: | Line 65: | ||
Stohl, Michael (2006) [[Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games]] | Stohl, Michael (2006) [[Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games]] | ||
van Eeten, Michael and Bauer, Johannes M. (2009) [[Emerging Threats to Internet Security | Theohary, Catherine A. and Rollins, John (2010) [[Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress]] | ||
van Eeten, Michael and Bauer, Johannes M. (2009) [[Emerging Threats to Internet Security]] | |||
Wilshusen, Gregory C. and Powner, David A. (2009) [[Continued Efforts are Needed to Protect Information Systems from Evolving Threats]] |
Latest revision as of 08:01, 4 April 2012
Please add links to reference pages for Redmine articles you believe should be added to the cybersecurity wiki here or email them to: cybersecurity-feedback@cyber.law.harvard.edu
Entries should look just like any other entry on a topic page, i.e., "<lastname>, <firstname> (<year>) [<Title as a link to the reference page>]"
Aloise, Gene, Barkakati, Nabajyoti, and Wilshusen, Gregory C. (2008) Nuclear Security
Bauer, Johannes M. and van Eeten, Michel J. G. (2009) Cybersecurity
Bellovin, Steven M. (2009) The Government and Cybersecurity
Besunder, Allison A. (2009) Best Practices for Data Protection and Privacy
Burstein, Aaron J. (2008) Amending The ECPA To Enable a Culture of Cybersecurity Research
Cetron, Marvin J. and Davies, Owen (2009) World War 3.0: Ten Critical Trends for Cybersecurity
Cornish, Paul (2009) Cyber Security and Politically, Socially and Religiously Motivated Cyber Attacks
Cornish, Paul, Hughes, Rex, and Livingstone, David (2009) Cyberspace and the National Security of the United Kingdom
ENISA (2010) Introduction to Country Reports
Gable, Kelly A. (2010) Cyber-Apocalypse Now
GAO (2009) Critical Infrastructure Protection
GAO (2010) Information Security
Geer, Daniel E. and Conway, Daniel G. (2010) Nothing Ventured, Nothing Gained
Intelligence Squared US (IQ2US) Video Debate (2010) The Cyber War Threat Has Been Grossly Exaggerated
Kobayashi, Bruce H. (2005) An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and other Public Security Goods
Lan, Tang et al. (2010) Global Cyber Deterrence
Lewis, James Andrews (2005) Cyber Security and Regulation in the United States
Madnick, Stuart (2009) Experiences and Challenges with Using CERT Data to Analyze International Cyber Security
Maughan, Douglas (2010) The Need for a National Cybersecurity Research and Development Agenda
Nojeim, Gregory T. (2009) Cybersecurity: Preventing Terrorist Attacks and Protecting Privacy in Cyberspace
Nye, Joseph S. (2010) Cyber Power
OECD (2009) Cybersecurity and Economic Incentives
OECD (2009) The Market Consequences of Cybersecurity
Perkins, Earl (2009) Evolving Cybersecurity Issues in the Utility Industry
Rollins, John and Wilson, Clay (2007) Terrorist Capabilities for Cyberattack
Rue, Rachel and Pfleeger, Shari Lawrence (2009) Making the Best Use of Cybersecurity Economic Models
Santos, Joost R., et. al (2007) A Framework for Linking Cybersecurity Metrics to the Modeling of Macroeconomic Interdependencies
Schneidewind, Norman (2010) Metrics for Mitigating Cybersecurity Threats to Networks
Shackelford, Scott J. (2010) Estonia Three Years Later
Shah, Shashi K. (2004) The Evolving Landscape of Maritime Cybersecurity
Stohl, Michael (2006) Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games
Theohary, Catherine A. and Rollins, John (2010) Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress
van Eeten, Michael and Bauer, Johannes M. (2009) Emerging Threats to Internet Security
Wilshusen, Gregory C. and Powner, David A. (2009) Continued Efforts are Needed to Protect Information Systems from Evolving Threats