Suggested References to Add to Wiki: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 36: Line 36:


Epstein, Richard A. and Brown, Thomas P. (2008) [[Cybersecurity in the Payment Card Industry]]
Epstein, Richard A. and Brown, Thomas P. (2008) [[Cybersecurity in the Payment Card Industry]]
GAO (2009) [[Current Cyber Sector-Specific Planning Approach Needs Reassessment]]


Gable, Kelly A. (2010) [[Cyber-Apocalypse Now - Securing the Internet Against Cyberterrorism and Using Universal Jurisdiction as a Deterrent]]
Gable, Kelly A. (2010) [[Cyber-Apocalypse Now - Securing the Internet Against Cyberterrorism and Using Universal Jurisdiction as a Deterrent]]

Revision as of 14:59, 16 June 2010

Please add links to reference pages for Redmine articles you believe should be added to the cybersecurity wiki here.

Entries should look just like any other entry on a topic page, i.e., "<lastname>, <firstname> (<year>) [<Title as a link to the reference page>]"

Kobayashi, Bruce H. (2005) An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and other Public Security Goods

Lewis, James Andrews (2005) Cyber Security and Regulation in the United States

Madnick, Stuart (2009) Experiences and Challenges with Using CERT Data to Analyze International Cyber Security

Maughan, Douglas (2010) The Need for a National Cybersecurity Research and Development Agenda

Lan, Tang et al. (2010) Global Cyber Deterrence

Nojeim, Gregory T. (2009) Cybersecurity: Preventing Terrorist Attacks and Protecting Privacy in Cyberspace

Nye, Joseph S. (2010) Cyber Power

OECD (2009) Cybersecurity and Economic Incentives

OECD (2009) The Market Consequences of Cybersecurity: Defining Externalities and Ways to Address Them

Bauer, Johannes M. and van Eeten, Michel J. G. (2009) Cybersecurity: Stakeholder Incentives, Externalities, and Policy Options

Bellovin, Steven M. (2009) The Government and Cybersecurity

Besunder, Allison A. (2009) Best Practices for Data Protection and Privacy

Burstein, Aaron J. (2008) Amending The ECPA To Enable a Culture of Cybersecurity Research

Cetron, Marvin J. and Davies, Owen (2009) World War 3.0: Ten Critical Trends for Cybersecurity

Cornish, Paul (2009) Cyber Security and Politically, Socially and Religiously Motivated Cyber Attacks

Cornish, Paul, Hughes, Rex, and Livingstone, David (2009) Cyberspace and the National Security of the United Kingdom

Epstein, Richard A. and Brown, Thomas P. (2008) Cybersecurity in the Payment Card Industry

GAO (2009) Current Cyber Sector-Specific Planning Approach Needs Reassessment

Gable, Kelly A. (2010) Cyber-Apocalypse Now - Securing the Internet Against Cyberterrorism and Using Universal Jurisdiction as a Deterrent

Rollins, John and Wilson, Clay (2007) Terrorist Capabilities for Cyberattack: Overview and Policy Issues

ENISA (2010) Introduction to Country Reports

Rue, Rachel and Pfleeger, Shari Lawrence (2009) Making the Best Use of Cybersecurity Economic Models

Santos, Joost R, Haimes, Yacov Y and Chenyang Kian (2007) A Framework for Linking Cybersecurity Metrics to the Modeling of Macroeconomic Interdependencies

Schneidewind, Norman (2010) Metrics for Mitigating Cybersecurity Threats to Networks

Shackelford, Scott J. (2010) Estonia Three Years Later

Shah, Shashi K. (2004) The Evolving Landscape of Maritime Cybersecurity

Stohl, Michael (2006) Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games

Theohary, Catherine A. and Rollins, John (2010) Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress

van Eeten, Michael and Bauer, Johannes M. (2009) Emerging Threats to Internet Security - Incentives, Externalities and Policy Implications

Wilshusen, Gregory C. and Powner, David A. (2009) Continued Efforts are Needed to Protect Information Systems from Evolving Threats