Privacy: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 8: Line 8:


Johnson, Vincent R. (2005) [[Cybersecurity, Identity Theft, and the Limits of Tort Liability]]
Johnson, Vincent R. (2005) [[Cybersecurity, Identity Theft, and the Limits of Tort Liability]]
Schneier, Bruce (2003) [[Beyond Fear]]


Schneier, Bruce (2008) [[Schneier on Security]]
Schneier, Bruce (2008) [[Schneier on Security]]
Line 24: Line 22:
|-
|-
|Camp, L. Jean||Lewis, Stephen||2004||[[Economics of Information Security]]||Book||High:Economics||N/A
|Camp, L. Jean||Lewis, Stephen||2004||[[Economics of Information Security]]||Book||High:Economics||N/A
|-
|Schneier, Bruce||||2003||[[Beyond Fear]]||Book||None||[http://www.scribd.com/doc/12185921/beyond-fear-thinking-sensibly-about-security-in-an-uncertain-world-bruce-schneier-copernicus-books-2003 ''Scribd'']
|}
|}



Revision as of 10:37, 11 August 2010

TOC-> Issues->Privacy

Anderson, Ross and Moore, Tyler (2006) The Economics of Information Security

Department of Homeland Security (2009) A Roadmap for Cybersecurity Research

Dunlap, Charles J. Jr. (2009) Towards a Cyberspace Legal Regime in the Twenty-First Century

Johnson, Vincent R. (2005) Cybersecurity, Identity Theft, and the Limits of Tort Liability

Schneier, Bruce (2008) Schneier on Security

Author 1 Author 2 Year Title Source Expertise Full Text
Camp, L. Jean Lewis, Stephen 2004 Economics of Information Security Book High:Economics N/A
Schneier, Bruce 2003 Beyond Fear Book None Scribd
  • Subcategories: None

Jump to Table of Contents