Actors and Incentives: Difference between revisions
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
''[[Annotated Bibliography | TOC->]][[Threats and Actors | Threats and Actors->]][[Actors and Incentives]]'' | |||
Anderson, Ross J. (2008) [[Security Engineering]] | Anderson, Ross J. (2008) [[Security Engineering]] | ||
Revision as of 08:53, 1 July 2010
TOC-> Threats and Actors->Actors and Incentives
Anderson, Ross J. (2008) Security Engineering
Barkham, Jason (2001) Information Warfare and International Law on the Use of Force
Clarke, Richard A. and Knake, Robert (2010) Cyber War
Department of Defense (2007) Mission Impact of Foreign Influence on DoD Software
Department of Homeland Security (2003) The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets
Epstein, Richard A. and Brown, Thomas P. (2008) Cybersecurity in the Payment Card Industry
Franklin, Jason, et. al (2007) An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants
Grady, Mark F. and Parisi, Francesco (2006) The Law and Economics of Cybersecurity
Johnson, Eric M. (2008) Managing Information Risk and the Economics of Security
Johnson, Vincent R. (2005) Cybersecurity, Identity Theft, and the Limits of Tort Liability
Moore, Tyler, et. al (2009) The Economics of Online Crime
Nye, Joseph (2010) Cyber Power
Schneier, Bruce (2003) Beyond Fear
Stohl, Michael (2006) Cyber Terrorism
Watts, Sean (2010) Combatant Status and Computer Network Attack