Regulation/Liability: Difference between revisions
No edit summary |
No edit summary |
||
Line 42: | Line 42: | ||
Todd, Graham H. (2009) [[Armed Attack in Cyberspace]] | Todd, Graham H. (2009) [[Armed Attack in Cyberspace]] | ||
Schmitt, Michael N. (2002) [[Wired Warfare]] | |||
Schneier, Bruce (2008) [[Schneier on Security]] | Schneier, Bruce (2008) [[Schneier on Security]] |
Revision as of 11:27, 19 July 2010
TOC-> Approaches->Regulation/Liability
Anderson, Ross J. (2008) Security Engineering
Anderson, Ross (2001) Why Information Security is Hard
Anderson, Ross and Moore, Tyler (2006) The Economics of Information Security
Anderson, Ross, et. al (2008) Security Economics and the Internal Market
Aviram, Amitai and Tor, Avishalom (2004) Overcoming Impediments to Information Sharing
Barkham, Jason (2001) Information Warfare and International Law on the Use of Force
Camp, L. Jean and Lewis, Stephen (2004) Economics of Information Security
Center for Strategic and International Studies (2008) Securing Cyberspace for the 44th Presidency
Epstein, Richard A. and Brown, Thomas P. (2008) Cybersecurity in the Payment Card Industry
Grady, Mark F. and Parisi, Francesco (2006) The Law and Economics of Cybersecurity
Granick, Jennifer Stisa (2005) The Price of Restricting Vulnerability Publications
Institute for Information Infrastructure Protection (2003) Cyber Security Research and Development Agenda
Johnson, Eric M. (2008) Managing Information Risk and the Economics of Security
Johnson, Vincent R. (2005) Cybersecurity, Identity Theft, and the Limits of Tort Liability
Kramer, Franklin D., et. al (2009) Cyberpower and National Security
Lernard, Thomas M. and Rubin, Paul H. (2005) An Economic Analysis of Notification Requirements for Data Security Breaches
Lernard, Thomas M. and Rubin, Paul H. (2006) Much Ado About Notification
National Research Council (2007) Toward a Safer and More Secure Cyberspace
Powell, Benjamin (2005) Is Cybersecurity a Public Good
Romanosky et al. (2008) Do Data Breach Disclosure Laws Reduce Identity Theft
Todd, Graham H. (2009) Armed Attack in Cyberspace
Schmitt, Michael N. (2002) Wired Warfare
Schneier, Bruce (2008) Schneier on Security
Schwartz, Paul and Janger, Edward (2007) Notification of Data Security Breaches
Sklerov, Matthew J. (2009) Solving the Dilemma of State Responses to Cyberattacks
Swire, Peter P (2004) A Model for When Disclosure Helps Security
Swire, Peter P (2006) A Theory of Disclosure for Security and Competitive Reasons
Zittrain, Jonathan L. (2008) The Future of the Internet and How To Stop It
Subcategories: None