Risk Management and Investment: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 8: Line 8:


Aviram, Amitai and Tor, Avishalom (2004) [[Overcoming Impediments to Information Sharing]]
Aviram, Amitai and Tor, Avishalom (2004) [[Overcoming Impediments to Information Sharing]]
Camp, and L. Jean and Lewis, Stephen (2004) [[Economics of Information Security]]


Camp, L. Jean and Wolfram, Catherine  (2004) [[Pricing Security]]
Camp, L. Jean and Wolfram, Catherine  (2004) [[Pricing Security]]
Line 42: Line 40:


Varian, Hal (2004) [[System Reliability and Free Riding]]
Varian, Hal (2004) [[System Reliability and Free Riding]]
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
|-
! style="background-color: #efefef;" | Author 1
! style="background-color: #efefef;" | Author 2
! style="background-color: #efefef;" | Year
! style="background-color: #efefef;" | Title
! style="background-color: #efefef;" | Source
! style="background-color: #efefef;" | Expertise
! style="background-color: #efefef;" class="unsortable" | Full Text 
|-
|Camp, L. Jean||Lewis, Stephen||2004||[[Economics of Information Security]]||Book||High:Economics||N/A
|}


*'''''Subcategories:''''' ''None''
*'''''Subcategories:''''' ''None''


''[[Table of Contents| Jump to Table of Contents]]''
''[[Table of Contents| Jump to Table of Contents]]''

Revision as of 09:17, 11 August 2010

TOC-> Issues-> Economics of Cybersecurity->Risk Management and Investment

Anderson, Ross (2001) Why Information Security is Hard

Anderson, Ross and Moore, Tyler (2006) The Economics of Information Security

Arora et al. (2006) Does Information Security Attack Frequency Increase With Vulnerability Disclosure

Aviram, Amitai and Tor, Avishalom (2004) Overcoming Impediments to Information Sharing

Camp, L. Jean and Wolfram, Catherine (2004) Pricing Security

Computing Research Association (2003) Four Grand Challenges in Trustworthy Computing

Department of Defense (2007) Mission Impact of Foreign Influence on DoD Software

Financial Services Sector Coordinating Council for Critical Infrastructure Protection (2008) Research Agenda for the Banking and Finance Sector

Franklin, Jason, et. al (2007) An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants

Grady, Mark F. and Parisi, Francesco (2006) The Law and Economics of Cybersecurity

Institute for Information Infrastructure Protection (2003) Cyber Security Research and Development Agenda

Johnson, Eric M. (2008) Managing Information Risk and the Economics of Security

National Cyber Defense Initiative (2009) National Cyber Defense Financial Services Workshop Report

National Institute of Standards and Technology (2006) SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security

National Research Council (2007) Toward a Safer and More Secure Cyberspace

National Research Council (1999) Trust in Cyberspace

Schneier, Bruce (2008) Schneier on Security

van Eeten, Michel J. G. and Bauer, Johannes M. (2008) Economics of Malware

Varian, Hal (2000) Managing Online Security Risks

Varian, Hal (2004) System Reliability and Free Riding

Author 1 Author 2 Year Title Source Expertise Full Text
Camp, L. Jean Lewis, Stephen 2004 Economics of Information Security Book High:Economics N/A
  • Subcategories: None

Jump to Table of Contents