Actors and Incentives: Difference between revisions
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
Anderson, Ross J. (2008) [[Security Engineering]] | |||
Barkham, Jason (2001) [[Information Warfare and International Law on the Use of Force]] | |||
Clarke, Richard A. and Knake, Robert (2010) [[Cyber War]] | |||
Department of Defense (2007) [[Mission Impact of Foreign Influence on DoD Software]] | |||
Department of Homeland Security (2003) [[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]] | |||
Epstein, Richard A. and Brown, Thomas P. (2008) [[Cybersecurity in the Payment Card Industry]] | Epstein, Richard A. and Brown, Thomas P. (2008) [[Cybersecurity in the Payment Card Industry]] | ||
Franklin, Jason, et. al (2007) [[An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants]] | Franklin, Jason, et. al (2007) [[An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants]] | ||
Grady, Mark F. and Parisi, Francesco (2006) [[The Law and Economics of Cybersecurity]] | |||
Johnson, Eric M. (2008) [[Managing Information Risk and the Economics of Security]] | |||
Johnson, Vincent R. (2005) [[Cybersecurity, Identity Theft, and the Limits of Tort Liability]] | Johnson, Vincent R. (2005) [[Cybersecurity, Identity Theft, and the Limits of Tort Liability]] | ||
Moore, Tyler, et. al (2009) [[The Economics of Online Crime]] | Moore, Tyler, et. al (2009) [[The Economics of Online Crime]] | ||
Nye, Joseph (2010) [[Cyber Power]] | |||
Schneier, Bruce (2003) [[Beyond Fear]] | |||
Stohl, Michael ''(2006)'' [[Cyber Terrorism]] | |||
Watts, Sean (2010) [[Combatant Status and Computer Network Attack]] |
Revision as of 13:22, 30 June 2010
Anderson, Ross J. (2008) Security Engineering
Barkham, Jason (2001) Information Warfare and International Law on the Use of Force
Clarke, Richard A. and Knake, Robert (2010) Cyber War
Department of Defense (2007) Mission Impact of Foreign Influence on DoD Software
Department of Homeland Security (2003) The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets
Epstein, Richard A. and Brown, Thomas P. (2008) Cybersecurity in the Payment Card Industry
Franklin, Jason, et. al (2007) An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants
Grady, Mark F. and Parisi, Francesco (2006) The Law and Economics of Cybersecurity
Johnson, Eric M. (2008) Managing Information Risk and the Economics of Security
Johnson, Vincent R. (2005) Cybersecurity, Identity Theft, and the Limits of Tort Liability
Moore, Tyler, et. al (2009) The Economics of Online Crime
Nye, Joseph (2010) Cyber Power
Schneier, Bruce (2003) Beyond Fear
Stohl, Michael (2006) Cyber Terrorism
Watts, Sean (2010) Combatant Status and Computer Network Attack