Information Sharing/Disclosure: Difference between revisions
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
Aviram, Amitai and Tor, Avishalom (''2003'') [[Overcoming Impediments to Information Sharing]] | Aviram, Amitai and Tor, Avishalom (''2003'') [[Overcoming Impediments to Information Sharing]] | ||
Besunder, Alison A. ''(2009)'' [[Best Practices for Data Protection and Privacy]] | |||
Burstein, Aaron J. (2008) [[Amending The ECPA To Enable a Culture of Cybersecurity Research]] | Burstein, Aaron J. (2008) [[Amending The ECPA To Enable a Culture of Cybersecurity Research]] |
Revision as of 14:32, 16 June 2010
Aviram, Amitai and Tor, Avishalom (2003) Overcoming Impediments to Information Sharing
Besunder, Alison A. (2009) Best Practices for Data Protection and Privacy
Burstein, Aaron J. (2008) Amending The ECPA To Enable a Culture of Cybersecurity Research
Telang, Rahul and Wattal, Sunil (2007) Impact of Software Vulnerability Announcements on the Market Value of Software Vendors - An Empirical Investigation
Arora et al. (2006) Does Information Security Attack Frequency Increase With Vulnerability Disclosure - An Empirical Analysis
Schwartz, Paul and Janger, Edward (2007) Notification of Data Security Breaches
Granick, Jennifer Stisa (2005) The Price of Restricting Vulnerability Publications
Romanosky et al. (2008) Do Data Breach Disclosure Laws Reduce Identity Theft
Lernard, Thomas M. and Rubin, Paul H. (2005) An Economic Analysis of Notification Requirements for Data Security Breaches
Lernard, Thomas M. and Rubin, Paul H. (2006) Much Ado About Notification
Swire, Peter P (2006) A Theory of Disclosure for Security and Competitive Reasons
Swire, Peter P (2004) A Model for When Disclosure Helps Security