Information Sharing/Disclosure: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
''[[Table of Contents | TOC->]][[Issues | Issues->]][[Information Sharing/Disclosure]]'' | ''[[Table of Contents | TOC->]][[Issues | Issues->]][[Information Sharing/Disclosure]]'' | ||
Lernard, Thomas M. and Rubin, Paul H. (2006) [[Much Ado About Notification]] | Lernard, Thomas M. and Rubin, Paul H. (2006) [[Much Ado About Notification]] | ||
Line 49: | Line 47: | ||
|- | |- | ||
|Johnson, Vincent R.||||2005||[[Cybersecurity, Identity Theft, and the Limits of Tort Liability]]||Law Review||Moderate:Law||[http://www.stmarytx.edu/law/pdf/Johnsoncyber.pdf ''Pdf''] [http://law.bepress.com/cgi/viewcontent.cgi?article=3530&context=expresso ''AltPdf''] | |Johnson, Vincent R.||||2005||[[Cybersecurity, Identity Theft, and the Limits of Tort Liability]]||Law Review||Moderate:Law||[http://www.stmarytx.edu/law/pdf/Johnsoncyber.pdf ''Pdf''] [http://law.bepress.com/cgi/viewcontent.cgi?article=3530&context=expresso ''AltPdf''] | ||
|- | |||
|Lernard, Thomas M.||Rubin, Paul H.||2005||[[An Economic Analysis of Notification Requirements for Data Security Breaches]]||Online Paper||Low:Economics||[http://www.pff.org/issues-pubs/pops/pop12.12datasecurity.pdf ''Pdf''] | |||
|- | |- | ||
|Moore, Tyler||Clayton, Richard||2007||[[Examining the Impact of Website Take-down on Phishing]]||Conference Paper||Low:Technology||[http://www.ecrimeresearch.org/2007/proceedings/p1_moore.pdf ''Pdf''] [http://www.cl.cam.ac.uk/~rnc1/ecrime07.pdf ''Alt Pdf''] | |Moore, Tyler||Clayton, Richard||2007||[[Examining the Impact of Website Take-down on Phishing]]||Conference Paper||Low:Technology||[http://www.ecrimeresearch.org/2007/proceedings/p1_moore.pdf ''Pdf''] [http://www.cl.cam.ac.uk/~rnc1/ecrime07.pdf ''Alt Pdf''] |
Revision as of 15:23, 19 August 2010
TOC-> Issues->Information Sharing/Disclosure
Lernard, Thomas M. and Rubin, Paul H. (2006) Much Ado About Notification
Powell, Benjamin (2005) Is Cybersecurity a Public Good
Romanosky et al. (2008) Do Data Breach Disclosure Laws Reduce Identity Theft
Schwartz, Paul and Janger, Edward (2007) Notification of Data Security Breaches
Swire, Peter P (2004) A Model for When Disclosure Helps Security
Swire, Peter P (2006) A Theory of Disclosure for Security and Competitive Reasons
Telang, Rahul and Wattal, Sunil (2007) Impact of Software Vulnerability Announcements on the Market Value of Software Vendors
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross | Moore, Tyler | 2006 | The Economics of Information Security | Journal Article | Low:Economics | |
Anderson, Ross, et. al | 2008 | Security Economics and the Internal Market | Study | Low:Economics | ||
Arora et al. | 2006 | Does Information Security Attack Frequency Increase With Vulnerability Disclosure | Journal Article | Moderate:Economics | ||
Aviram, Amitai | Tor, Avishalom | 2004 | Overcoming Impediments to Information Sharing | Law Review | Low:Economics | Pdf SSRN |
Camp, L. Jean | Lewis, Stephen | 2004 | Economics of Information Security | Book | High:Economics | N/A |
Computing Research Association | 2003 | Four Grand Challenges in Trustworthy Computing | Independent Reports | None | ||
Department of Homeland Security | 2003 | The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets | Government Report | None | ||
Grady, Mark F. | Parisi, Francesco | 2006 | The Law and Economics of Cybersecurity | Book | Low:Economics; Low:Law | N/A |
Granick, Jennifer Stisa | 2005 | The Price of Restricting Vulnerability Publications | Law Review | Low/Moderate:Law | ||
Johnson, Eric M. | 2008 | Managing Information Risk and the Economics of Security | Book | High:Economics | N/A | |
Johnson, Vincent R. | 2005 | Cybersecurity, Identity Theft, and the Limits of Tort Liability | Law Review | Moderate:Law | Pdf AltPdf | |
Lernard, Thomas M. | Rubin, Paul H. | 2005 | An Economic Analysis of Notification Requirements for Data Security Breaches | Online Paper | Low:Economics | |
Moore, Tyler | Clayton, Richard | 2007 | Examining the Impact of Website Take-down on Phishing | Conference Paper | Low:Technology | Pdf Alt Pdf |
Moore, Tyler | Clayton, Richard | 2008 | The Consequence of Non-Cooperation in the Fight Against Phishing | Conference Paper | Low:Technology; Low:Economics | Pdf Alt Pdf |
Moore, Tyler | Clayton, Richard | 2009 | The Impact of Incentives on Notice and Take-down | Book Chapter | Moderate:Technology; Low:Law | |
Moore, Tyler, et. al | 2009 | The Economics of Online Crime | Journal Article | Low:Technology | ||
National Cyber Defense Initiative | 2009 | National Cyber Defense Financial Services Workshop Report | Independent Report | Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance | ||
National Cyber Security Summit Task Force | 2004 | Information Security Governance | Government Report | Moderate:Executive Administration |
- Subcategories: None