Regulation/Liability: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 50: Line 50:


Swire, Peter P (2006) [[A Theory of Disclosure for Security and Competitive Reasons]]
Swire, Peter P (2006) [[A Theory of Disclosure for Security and Competitive Reasons]]
White House (2009) [[Cyberspace Policy Review]]


{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
Line 77: Line 74:
|-
|-
|Schneier, Bruce||||2008||[[Schneier on Security]]||Book||None||[http://www.schneier.com/book-sos.html ''Purchase'']
|Schneier, Bruce||||2008||[[Schneier on Security]]||Book||None||[http://www.schneier.com/book-sos.html ''Purchase'']
|-
|White House||||2009||[[Cyberspace Policy Review]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/Cyberspace_Policy_Review_final.pdf ''Pdf'']
|-
|-
|Zittrain, Jonathan L.||||2008||[[The Future of the Internet and How To Stop It]]||Book||None||[http://futureoftheinternet.org/static/ZittrainTheFutureoftheInternet.pdf ''Pdf'']
|Zittrain, Jonathan L.||||2008||[[The Future of the Internet and How To Stop It]]||Book||None||[http://futureoftheinternet.org/static/ZittrainTheFutureoftheInternet.pdf ''Pdf'']

Revision as of 11:05, 11 August 2010

TOC-> Approaches->Regulation/Liability

Anderson, Ross (2001) Why Information Security is Hard

Anderson, Ross and Moore, Tyler (2006) The Economics of Information Security

Anderson, Ross, et. al (2008) Security Economics and the Internal Market

Aviram, Amitai and Tor, Avishalom (2004) Overcoming Impediments to Information Sharing

Barkham, Jason (2001) Information Warfare and International Law on the Use of Force

Camp, L. Jean and Lewis, Stephen (2004) Economics of Information Security

Center for Strategic and International Studies (2008) Securing Cyberspace for the 44th Presidency

Epstein, Richard A. and Brown, Thomas P. (2008) Cybersecurity in the Payment Card Industry

Granick, Jennifer Stisa (2005) The Price of Restricting Vulnerability Publications

Institute for Information Infrastructure Protection (2003) Cyber Security Research and Development Agenda

Johnson, Vincent R. (2005) Cybersecurity, Identity Theft, and the Limits of Tort Liability

Korns, Stephen W. (2009) Cyber Operations

Lernard, Thomas M. and Rubin, Paul H. (2005) An Economic Analysis of Notification Requirements for Data Security Breaches

Lernard, Thomas M. and Rubin, Paul H. (2006) Much Ado About Notification

National Cyber Defense Initiative (2009) National Cyber Defense Financial Services Workshop Report

National Research Council (2007) Toward a Safer and More Secure Cyberspace

Powell, Benjamin (2005) Is Cybersecurity a Public Good

Romanosky et al. (2008) Do Data Breach Disclosure Laws Reduce Identity Theft

Todd, Graham H. (2009) Armed Attack in Cyberspace

Schmitt, Michael N., et. al (2004) Computers and War

Schmitt, Michael N. (2002) Wired Warfare

Schwartz, Paul and Janger, Edward (2007) Notification of Data Security Breaches

Sklerov, Matthew J. (2009) Solving the Dilemma of State Responses to Cyberattacks

Swire, Peter P (2004) A Model for When Disclosure Helps Security

Swire, Peter P (2006) A Theory of Disclosure for Security and Competitive Reasons

Author 1 Author 2 Year Title Source Expertise Full Text
Anderson, Ross J. 2008 Security Engineering Book Moderate:Technology; Moderate:Cryptography N/A
Camp, L. Jean Lewis, Stephen 2004 Economics of Information Security Book High:Economics N/A
Grady, Mark F. Parisi, Francesco 2006 The Law and Economics of Cybersecurity Book Low:Economics; Low:Law N/A
Johnson, Eric M. 2008 Managing Information Risk and the Economics of Security Book High:Economics N/A
Kramer, Franklin D., et. al 2009 Cyberpower and National Security Book None N/A
National Cyber Security Summit Task Force 2004 Information Security Governance Government Report Moderate:Executive Administration Pdf
Schneier, Bruce 2008 Schneier on Security Book None Purchase
White House 2009 Cyberspace Policy Review Government Report None Pdf
Zittrain, Jonathan L. 2008 The Future of the Internet and How To Stop It Book None Pdf
  • Subcategories: None

Jump to Table of Contents