Cybercrime: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 2: Line 2:


Anderson, Ross, et. al (2008) [[Security Economics and the Internal Market]]
Anderson, Ross, et. al (2008) [[Security Economics and the Internal Market]]
Epstein, Richard A. and Brown, Thomas P. (2008) [[Cybersecurity in the Payment Card Industry]]


Franklin, Jason, et. al (2007) [[An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants]]
Franklin, Jason, et. al (2007) [[An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants]]
Line 30: Line 28:
|-
|-
|Deputy Chief of Staff for Intelligence||||2006||[[Critical Infrastructure Threats and Terrorism]]||Government Report||Low:Organizational Analysis; Low:Risk Management||[http://www.fas.org/irp/threat/terrorism/sup2.pdf  ''Pdf'']
|Deputy Chief of Staff for Intelligence||||2006||[[Critical Infrastructure Threats and Terrorism]]||Government Report||Low:Organizational Analysis; Low:Risk Management||[http://www.fas.org/irp/threat/terrorism/sup2.pdf  ''Pdf'']
|-
|Epstein, Richard A.||Brown, Thomas P.||2008||[[Cybersecurity in the Payment Card Industry]]||Law Review Article||Low:Law; Low:Economics||[http://lawreview.uchicago.edu/issues/archive/v75/75_1/EpsteinArticle.pdf ''Pdf'']
|-
|-
|Johnson, Eric M.||||2008||[[Managing Information Risk and the Economics of Security]]||Book||High:Economics||N/A
|Johnson, Eric M.||||2008||[[Managing Information Risk and the Economics of Security]]||Book||High:Economics||N/A

Revision as of 12:35, 11 August 2010

TOC-> Issues->Cybercrime

Anderson, Ross, et. al (2008) Security Economics and the Internal Market

Franklin, Jason, et. al (2007) An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants

Moore, Tyler, et. al (2009) The Economics of Online Crime

Moore, Tyler and Clayton, Richard (2007) Examining the Impact of Website Take-down on Phishing

Moore, Tyler and Clayton, Richard (2008) The Consequence of Non-Cooperation in the Fight Against Phishing

Moore, Tyler and Clayton, Richard (2009) The Impact of Incentives on Notice and Take-down

Thomas, Rob and Martin, Jerry (2006) The Underground Economy

Author 1 Author 2 Year Title Source Expertise Full Text
Anderson, Ross J. 2008 Security Engineering Book Moderate:Technology; Moderate:Cryptography N/A
Deputy Chief of Staff for Intelligence 2006 Critical Infrastructure Threats and Terrorism Government Report Low:Organizational Analysis; Low:Risk Management Pdf
Epstein, Richard A. Brown, Thomas P. 2008 Cybersecurity in the Payment Card Industry Law Review Article Low:Law; Low:Economics Pdf
Johnson, Eric M. 2008 Managing Information Risk and the Economics of Security Book High:Economics N/A
Kramer, Franklin D., et. al 2009 Cyberpower and National Security Book None N/A
McAfee, Inc. 2010 McAfee Threats Report Industry Report None Pdf
National Research Council 2007 Toward a Safer and More Secure Cyberspace Independent Reports Low:Research Processes; Low:Technology Pdf
Symantec Corporation 2010 Symantec Global Internet Security Threat Report Industry Report Low/Moderate:Technology Pdf
Trend Micro Incorporated 2010 Trend Micro Annual Report Industry Report Moderate:Technology Pdf
  • Subcategories: None

Jump to Table of Contents