Cybercrime: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 2: | Line 2: | ||
Anderson, Ross, et. al (2008) [[Security Economics and the Internal Market]] | Anderson, Ross, et. al (2008) [[Security Economics and the Internal Market]] | ||
Moore, Tyler, et. al (2009) [[The Economics of Online Crime]] | Moore, Tyler, et. al (2009) [[The Economics of Online Crime]] | ||
Line 30: | Line 28: | ||
|- | |- | ||
|Epstein, Richard A.||Brown, Thomas P.||2008||[[Cybersecurity in the Payment Card Industry]]||Law Review Article||Low:Law; Low:Economics||[http://lawreview.uchicago.edu/issues/archive/v75/75_1/EpsteinArticle.pdf ''Pdf''] | |Epstein, Richard A.||Brown, Thomas P.||2008||[[Cybersecurity in the Payment Card Industry]]||Law Review Article||Low:Law; Low:Economics||[http://lawreview.uchicago.edu/issues/archive/v75/75_1/EpsteinArticle.pdf ''Pdf''] | ||
|- | |||
|Franklin, Jason, et. al||||2007||[[An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants]]||Conference Paper||Low:Statistics; Low:Economics||[http://sparrow.ece.cmu.edu/group/pub/franklin_paxson_perrig_savage_miscreants.pdf ''Pdf''] [http://www.cs.cmu.edu/~jfrankli/acmccs07/ccs07_franklin_eCrime.pdf ''Alt Pdf''] | |||
|- | |- | ||
|Johnson, Eric M.||||2008||[[Managing Information Risk and the Economics of Security]]||Book||High:Economics||N/A | |Johnson, Eric M.||||2008||[[Managing Information Risk and the Economics of Security]]||Book||High:Economics||N/A |
Revision as of 12:36, 11 August 2010
Anderson, Ross, et. al (2008) Security Economics and the Internal Market
Moore, Tyler, et. al (2009) The Economics of Online Crime
Moore, Tyler and Clayton, Richard (2007) Examining the Impact of Website Take-down on Phishing
Moore, Tyler and Clayton, Richard (2008) The Consequence of Non-Cooperation in the Fight Against Phishing
Moore, Tyler and Clayton, Richard (2009) The Impact of Incentives on Notice and Take-down
Thomas, Rob and Martin, Jerry (2006) The Underground Economy
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross J. | 2008 | Security Engineering | Book | Moderate:Technology; Moderate:Cryptography | N/A | |
Deputy Chief of Staff for Intelligence | 2006 | Critical Infrastructure Threats and Terrorism | Government Report | Low:Organizational Analysis; Low:Risk Management | ||
Epstein, Richard A. | Brown, Thomas P. | 2008 | Cybersecurity in the Payment Card Industry | Law Review Article | Low:Law; Low:Economics | |
Franklin, Jason, et. al | 2007 | An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants | Conference Paper | Low:Statistics; Low:Economics | Pdf Alt Pdf | |
Johnson, Eric M. | 2008 | Managing Information Risk and the Economics of Security | Book | High:Economics | N/A | |
Kramer, Franklin D., et. al | 2009 | Cyberpower and National Security | Book | None | N/A | |
McAfee, Inc. | 2010 | McAfee Threats Report | Industry Report | None | ||
National Research Council | 2007 | Toward a Safer and More Secure Cyberspace | Independent Reports | Low:Research Processes; Low:Technology | ||
Symantec Corporation | 2010 | Symantec Global Internet Security Threat Report | Industry Report | Low/Moderate:Technology | ||
Trend Micro Incorporated | 2010 | Trend Micro Annual Report | Industry Report | Moderate:Technology |
- Subcategories: None