Criminals and Criminal Organizations: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 11: | Line 11: | ||
! style="background-color: #efefef;" class="unsortable" | Full Text | ! style="background-color: #efefef;" class="unsortable" | Full Text | ||
|- | |- | ||
| Anderson, Ross J. || || 2008 || [[Security Engineering]] || Book || Technology:Low; Cryptography:Low | | Anderson, Ross J. || || 2008 || [[Security Engineering]] || Book || Technology:Low; Cryptography:Low || N/A | ||
|- | |- | ||
| Department of Commerce || || 2010 || [[Defense Industrial Base Assessment]] || Online Government Paper || None | | Department of Commerce || || 2010 || [[Defense Industrial Base Assessment]] || Online Government Paper || None || [http://www.bis.doc.gov/defenseindustrialbaseprograms/osies/defmarketresearchrpts/final_counterfeit_electronics_report.pdf ''Link''] | ||
|- | |- | ||
| Epstein, Richard A. || Brown, Thomas P. || 2008 || [[Cybersecurity in the Payment Card Industry]] || Law Review Article || Law:Low; Economics:Low | | Epstein, Richard A. || Brown, Thomas P. || 2008 || [[Cybersecurity in the Payment Card Industry]] || Law Review Article || Law:Low; Economics:Low || Richard A. Epstein and Thomas P. Brown, ''Cybersecurity in the Payment Card Industry'', 75 U.Chi. L. Rev. 203 (2008). [http://lawreview.uchicago.edu/issues/archive/v75/75_1/EpsteinArticle.pdf ''Link''] | ||
|- | |- | ||
| Franklin, Jason, et. al || || 2007 || [[An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants]] || Conference Paper || Statistics:Low; Economics:Low | | Franklin, Jason, et. al || || 2007 || [[An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants]] || Conference Paper || Statistics:Low; Economics:Low |
Revision as of 14:01, 29 July 2010
TOC-> Threats and Actors-> Actors and Incentives->Criminals and Criminal Organizations
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross J. | 2008 | Security Engineering | Book | Technology:Low; Cryptography:Low | N/A | |
Department of Commerce | 2010 | Defense Industrial Base Assessment | Online Government Paper | None | Link | |
Epstein, Richard A. | Brown, Thomas P. | 2008 | Cybersecurity in the Payment Card Industry | Law Review Article | Law:Low; Economics:Low | Richard A. Epstein and Thomas P. Brown, Cybersecurity in the Payment Card Industry, 75 U.Chi. L. Rev. 203 (2008). Link |
Franklin, Jason, et. al | 2007 | An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants | Conference Paper | Statistics:Low; Economics:Low | ||
McAfee, Inc. | 2010 | McAfee Threats Report | Industry Report | None | ||
Moore, Tyler | Clayton, Richard | 2007 | Examining the Impact of Website Take-down on Phishing | Conference Paper | Technology:Low | |
Moore, Tyler | Clayton, Richard | 2008 | The Consequence of Non-Cooperation in the Fight Against Phishing | Conference Paper | Technology:Low; Economics:Low | |
Moore, Tyler | Clayton, Richard | 2009 | The Impact of Incentives on Notice and Take-down | Book Chapter | Technical:Low/Moderate; Law:Low | |
Moore, Tyler, et. al | 2009 | The Economics of Online Crime | Journal Article | Technology:Low | ||
Thomas, Rob | Martin, Jerry | 2006 | The Underground Economy | Journal Article | Technology:Low |
- Subcategories: None