Actors and Incentives: Difference between revisions
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
''[[ | ''[[Table of Contents | TOC->]][[Threats and Actors | Threats and Actors->]][[Actors and Incentives]]'' | ||
Anderson, Ross J. (2008) [[Security Engineering]] | Anderson, Ross J. (2008) [[Security Engineering]] | ||
Line 31: | Line 31: | ||
Watts, Sean (2010) [[Combatant Status and Computer Network Attack]] | Watts, Sean (2010) [[Combatant Status and Computer Network Attack]] | ||
''[[Table of Contents | Jump to Table of Contents]]'' |
Revision as of 11:23, 1 July 2010
TOC-> Threats and Actors->Actors and Incentives
Anderson, Ross J. (2008) Security Engineering
Barkham, Jason (2001) Information Warfare and International Law on the Use of Force
Clarke, Richard A. and Knake, Robert (2010) Cyber War
Department of Defense (2007) Mission Impact of Foreign Influence on DoD Software
Department of Homeland Security (2003) The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets
Epstein, Richard A. and Brown, Thomas P. (2008) Cybersecurity in the Payment Card Industry
Franklin, Jason, et. al (2007) An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants
Grady, Mark F. and Parisi, Francesco (2006) The Law and Economics of Cybersecurity
Johnson, Eric M. (2008) Managing Information Risk and the Economics of Security
Johnson, Vincent R. (2005) Cybersecurity, Identity Theft, and the Limits of Tort Liability
Moore, Tyler, et. al (2009) The Economics of Online Crime
Nye, Joseph (2010) Cyber Power
Schneier, Bruce (2003) Beyond Fear
Stohl, Michael (2006) Cyber Terrorism
Watts, Sean (2010) Combatant Status and Computer Network Attack