Public-Private Cooperation: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 44: Line 44:
|-
|-
|National Research Council||||1999||[[Trust in Cyberspace]]||Independent Report||Moderate:Technology||[http://www.cyber.st.dhs.gov/docs/Trust%20in%20Cyberspace%20Report%201999.pdf ''Pdf'']
|National Research Council||||1999||[[Trust in Cyberspace]]||Independent Report||Moderate:Technology||[http://www.cyber.st.dhs.gov/docs/Trust%20in%20Cyberspace%20Report%201999.pdf ''Pdf'']
|-
|National Science and Technology Council||||2006||[[Federal Plan for Cyber Security and Information Assurance Research and Development]]||Government Report||Low:Technology||[http://www.cyber.st.dhs.gov/docs/Federal%20R&D%20Plan%202006.pdf ''Pdf'']
|-
|-
|Powell, Benjamin||||2005||[[Is Cybersecurity a Public Good]]||Law Review||Low/Moderate:Economics||[http://www.independent.org/pdf/working_papers/57_cyber.pdf  ''Pdf'']  
|Powell, Benjamin||||2005||[[Is Cybersecurity a Public Good]]||Law Review||Low/Moderate:Economics||[http://www.independent.org/pdf/working_papers/57_cyber.pdf  ''Pdf'']  

Revision as of 11:31, 9 September 2010

TOC-> Issues->Public-Private Cooperation

Author 1 Author 2 Year Title Source Expertise Full Text
Anderson, Ross, et. al 2008 Security Economics and the Internal Market Study Low:Economics Pdf
Aviram, Amitai Tor, Avishalom 2004 Overcoming Impediments to Information Sharing Law Review Low:Economics Pdf SSRN
Center for Strategic and International Studies 2008 Securing Cyberspace for the 44th Presidency Independent Report Low:Policy Pdf
Department of Commerce 2010 Defense Industrial Base Assessment Government Report None Pdf
Department of Defense 2007 Mission Impact of Foreign Influence on DoD Software Government Report Low:Defense Policy/Procurement Pdf
Department of Defense 2005 Strategy for Homeland Defense and Civil Support Government Report None Pdf
Department of Homeland Security 2009 A Roadmap for Cybersecurity Research Government Report Low:Technology Pdf
Department of Homeland Security 2003 The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets Government Report None Pdf
Energetics Inc. 2006 Roadmap to Secure Control Systems in the Energy Sector Independent Report None Pdf
Grady, Mark F. Parisi, Francesco 2006 The Law and Economics of Cybersecurity Book Low:Economics; Low:Law N/A
Korns, Stephen W. 2009 Cyber Operations Journal Article Low:International Warfare Pdf
Kramer, Franklin D., et. al 2009 Cyberpower and National Security Book None N/A
Moore, Tyler Clayton, Richard 2008 The Consequence of Non-Cooperation in the Fight Against Phishing Conf. Paper Low:Technology; Low:Economics Pdf Alt Pdf
Moore, Tyler, et. al 2009 The Economics of Online Crime Journal Article Low:Technology Pdf
National Cyber Security Summit Task Force 2004 Information Security Governance Government Report Moderate:Executive Administration Pdf
National Infrastructure Advisory Council 2004 Hardening The Internet Government Report High:Technology Pdf
National Research Council 1999 Trust in Cyberspace Independent Report Moderate:Technology Pdf
National Science and Technology Council 2006 Federal Plan for Cyber Security and Information Assurance Research and Development Government Report Low:Technology Pdf
Powell, Benjamin 2005 Is Cybersecurity a Public Good Law Review Low/Moderate:Economics Pdf

AltPdf

President's Commission on Critical Infrastructure Protection 1997 Critical Foundations Government Report None Pdf
President's Information Technology Advisory Council 2005 Cyber Security: A Crisis of Prioritization Government Report None Pdf
White House 2009 Cyberspace Policy Review Government Report None Pdf
White House 2003 The National Strategy to Secure Cyberspace Government Report None Pdf
  • Subcategories: None

Jump to Table of Contents