Regulation/Liability: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 24: Line 24:
|Camp, L. Jean||Lewis, Stephen||2004||[[Economics of Information Security]]||Book||High:Economics||N/A
|Camp, L. Jean||Lewis, Stephen||2004||[[Economics of Information Security]]||Book||High:Economics||N/A
|-
|-
|Center for Strategic and International Studies||||2008||[[Securing Cyberspace for the 44th Presidency]]||Independent Reports||Low:Policy||[http://www.cyber.st.dhs.gov/docs/081208_securingcyberspace_44.pdf ''Pdf'']
|Center for Strategic and International Studies||||2008||[[Securing Cyberspace for the 44th Presidency]]||Independent Report||Low:Policy||[http://www.cyber.st.dhs.gov/docs/081208_securingcyberspace_44.pdf ''Pdf'']
|-
|-
|Epstein, Richard A.||Brown, Thomas P.||2008||[[Cybersecurity in the Payment Card Industry]]||Law Review||Low:Law; Low:Economics||[http://lawreview.uchicago.edu/issues/archive/v75/75_1/EpsteinArticle.pdf ''Pdf'']
|Epstein, Richard A.||Brown, Thomas P.||2008||[[Cybersecurity in the Payment Card Industry]]||Law Review||Low:Law; Low:Economics||[http://lawreview.uchicago.edu/issues/archive/v75/75_1/EpsteinArticle.pdf ''Pdf'']
Line 32: Line 32:
|Granick, Jennifer Stisa||||2005||[[The Price of Restricting Vulnerability Publications]]||Law Review||Low/Moderate:Law||[http://www.ijclp.net/files/ijclp_web-doc_10-cy-2004.pdf  ''Pdf'']
|Granick, Jennifer Stisa||||2005||[[The Price of Restricting Vulnerability Publications]]||Law Review||Low/Moderate:Law||[http://www.ijclp.net/files/ijclp_web-doc_10-cy-2004.pdf  ''Pdf'']
|-
|-
|Institute for Information Infrastructure Protection||||2003||[[Cyber Security Research and Development Agenda]]||Independent Reports||Low/None:Technology||[http://www.cyber.st.dhs.gov/docs/I3P%20Research%20Agenda%202003.pdf ''Pdf'']
|Institute for Information Infrastructure Protection||||2003||[[Cyber Security Research and Development Agenda]]||Independent Report||Low/None:Technology||[http://www.cyber.st.dhs.gov/docs/I3P%20Research%20Agenda%202003.pdf ''Pdf'']
|-
|-
|Johnson, Eric M.||||2008||[[Managing Information Risk and the Economics of Security]]||Book||High:Economics||N/A
|Johnson, Eric M.||||2008||[[Managing Information Risk and the Economics of Security]]||Book||High:Economics||N/A
Line 50: Line 50:
|National Cyber Security Summit Task Force||||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf'']
|National Cyber Security Summit Task Force||||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf'']
|-
|-
|National Research Council||||2007||[[Toward a Safer and More Secure Cyberspace]]||Independent Reports||Low:Research Processes; Low:Technology||[http://www.cyber.st.dhs.gov/docs/Toward_a_Safer_and_More_Secure_Cyberspace-Full_report.pdf ''Pdf'']
|National Research Council||||2007||[[Toward a Safer and More Secure Cyberspace]]||Independent Report||Low:Research Processes; Low:Technology||[http://www.cyber.st.dhs.gov/docs/Toward_a_Safer_and_More_Secure_Cyberspace-Full_report.pdf ''Pdf'']
|-
|-
|Powell, Benjamin||||2005||[[Is Cybersecurity a Public Good]]||Law Review||Low/Moderate:Economics||[http://www.independent.org/pdf/working_papers/57_cyber.pdf  ''Pdf'']  
|Powell, Benjamin||||2005||[[Is Cybersecurity a Public Good]]||Law Review||Low/Moderate:Economics||[http://www.independent.org/pdf/working_papers/57_cyber.pdf  ''Pdf'']  

Revision as of 16:48, 20 August 2010

TOC-> Approaches->Regulation/Liability

Author 1 Author 2 Year Title Source Expertise Full Text
Anderson, Ross J. 2008 Security Engineering Book Moderate:Technology; Moderate:Cryptography N/A
Anderson, Ross 2001 Why Information Security is Hard Conf. Paper None Pdf AltPdf
Anderson, Ross Moore, Tyler 2006 The Economics of Information Security Journal Article Low:Economics Pdf

AltPdf

Anderson, Ross, et. al 2008 Security Economics and the Internal Market Study Low:Economics Pdf
Aviram, Amitai Tor, Avishalom 2004 Overcoming Impediments to Information Sharing Law Review Low:Economics Pdf SSRN
Camp, L. Jean Lewis, Stephen 2004 Economics of Information Security Book High:Economics N/A
Center for Strategic and International Studies 2008 Securing Cyberspace for the 44th Presidency Independent Report Low:Policy Pdf
Epstein, Richard A. Brown, Thomas P. 2008 Cybersecurity in the Payment Card Industry Law Review Low:Law; Low:Economics Pdf
Grady, Mark F. Parisi, Francesco 2006 The Law and Economics of Cybersecurity Book Low:Economics; Low:Law N/A
Granick, Jennifer Stisa 2005 The Price of Restricting Vulnerability Publications Law Review Low/Moderate:Law Pdf
Institute for Information Infrastructure Protection 2003 Cyber Security Research and Development Agenda Independent Report Low/None:Technology Pdf
Johnson, Eric M. 2008 Managing Information Risk and the Economics of Security Book High:Economics N/A
Johnson, Vincent R. 2005 Cybersecurity, Identity Theft, and the Limits of Tort Liability Law Review Moderate:Law Pdf AltPdf
Korns, Stephen W. 2009 Cyber Operations Journal Article Low:International Warfare Pdf
Kramer, Franklin D., et. al 2009 Cyberpower and National Security Book None N/A
Lernard, Thomas M. Rubin, Paul H. 2005 An Economic Analysis of Notification Requirements for Data Security Breaches Online Paper Low:Economics Pdf
Lernard, Thomas M. Rubin, Paul H. 2006 Much Ado About Notification Journal Article Low:Economics Pdf SSRN
National Cyber Defense Initiative 2009 National Cyber Defense Financial Services Workshop Report Independent Report Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance Pdf
National Cyber Security Summit Task Force 2004 Information Security Governance Government Report Moderate:Executive Administration Pdf
National Research Council 2007 Toward a Safer and More Secure Cyberspace Independent Report Low:Research Processes; Low:Technology Pdf
Powell, Benjamin 2005 Is Cybersecurity a Public Good Law Review Low/Moderate:Economics Pdf

AltPdf

Romanosky et al. 2008 Do Data Breach Disclosure Laws Reduce Identity Theft Conf. Paper Moderate:Economics Pdf
Schmitt, Michael N. 2002 Wired Warfare Journal Article Moderate:Law Pdf
Schmitt, Michael N., et. al 2004 Computers and War Conf. Paper Moderate:Law Pdf
Schwartz, Paul Janger, Edward 2007 Notification of Data Security Breaches Law Review Low:Law; Low:Economics Pdf
Schneier, Bruce 2008 Schneier on Security Book None Purchase
Sklerov, Matthew J. 2009 Solving the Dilemma of State Responses to Cyberattacks Law Review Moderate:Law; Low:Technology Pdf
Swire, Peter P. 2004 A Model for When Disclosure Helps Security Law Review Low/Moderate:Logic PdfSSRN
Swire, Peter P. 2006 A Theory of Disclosure for Security and Competitive Reasons Law Review Low/Moderate:Logic SSRN
Todd, Graham H. 2009 Armed Attack in Cyberspace Law Review Moderate:Law Pdf
White House 2009 Cyberspace Policy Review Government Report None Pdf
Zittrain, Jonathan L. 2008 The Future of the Internet and How To Stop It Book None Pdf
  • Subcategories: None

Jump to Table of Contents