Regulation/Liability: Difference between revisions
No edit summary |
No edit summary |
||
Line 50: | Line 50: | ||
Swire, Peter P (2006) [[A Theory of Disclosure for Security and Competitive Reasons]] | Swire, Peter P (2006) [[A Theory of Disclosure for Security and Competitive Reasons]] | ||
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | {| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | ||
Line 77: | Line 74: | ||
|- | |- | ||
|Schneier, Bruce||||2008||[[Schneier on Security]]||Book||None||[http://www.schneier.com/book-sos.html ''Purchase''] | |Schneier, Bruce||||2008||[[Schneier on Security]]||Book||None||[http://www.schneier.com/book-sos.html ''Purchase''] | ||
|- | |||
|White House||||2009||[[Cyberspace Policy Review]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/Cyberspace_Policy_Review_final.pdf ''Pdf''] | |||
|- | |- | ||
|Zittrain, Jonathan L.||||2008||[[The Future of the Internet and How To Stop It]]||Book||None||[http://futureoftheinternet.org/static/ZittrainTheFutureoftheInternet.pdf ''Pdf''] | |Zittrain, Jonathan L.||||2008||[[The Future of the Internet and How To Stop It]]||Book||None||[http://futureoftheinternet.org/static/ZittrainTheFutureoftheInternet.pdf ''Pdf''] |
Revision as of 11:05, 11 August 2010
TOC-> Approaches->Regulation/Liability
Anderson, Ross (2001) Why Information Security is Hard
Anderson, Ross and Moore, Tyler (2006) The Economics of Information Security
Anderson, Ross, et. al (2008) Security Economics and the Internal Market
Aviram, Amitai and Tor, Avishalom (2004) Overcoming Impediments to Information Sharing
Barkham, Jason (2001) Information Warfare and International Law on the Use of Force
Camp, L. Jean and Lewis, Stephen (2004) Economics of Information Security
Center for Strategic and International Studies (2008) Securing Cyberspace for the 44th Presidency
Epstein, Richard A. and Brown, Thomas P. (2008) Cybersecurity in the Payment Card Industry
Granick, Jennifer Stisa (2005) The Price of Restricting Vulnerability Publications
Institute for Information Infrastructure Protection (2003) Cyber Security Research and Development Agenda
Johnson, Vincent R. (2005) Cybersecurity, Identity Theft, and the Limits of Tort Liability
Korns, Stephen W. (2009) Cyber Operations
Lernard, Thomas M. and Rubin, Paul H. (2005) An Economic Analysis of Notification Requirements for Data Security Breaches
Lernard, Thomas M. and Rubin, Paul H. (2006) Much Ado About Notification
National Cyber Defense Initiative (2009) National Cyber Defense Financial Services Workshop Report
National Research Council (2007) Toward a Safer and More Secure Cyberspace
Powell, Benjamin (2005) Is Cybersecurity a Public Good
Romanosky et al. (2008) Do Data Breach Disclosure Laws Reduce Identity Theft
Todd, Graham H. (2009) Armed Attack in Cyberspace
Schmitt, Michael N., et. al (2004) Computers and War
Schmitt, Michael N. (2002) Wired Warfare
Schwartz, Paul and Janger, Edward (2007) Notification of Data Security Breaches
Sklerov, Matthew J. (2009) Solving the Dilemma of State Responses to Cyberattacks
Swire, Peter P (2004) A Model for When Disclosure Helps Security
Swire, Peter P (2006) A Theory of Disclosure for Security and Competitive Reasons
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross J. | 2008 | Security Engineering | Book | Moderate:Technology; Moderate:Cryptography | N/A | |
Camp, L. Jean | Lewis, Stephen | 2004 | Economics of Information Security | Book | High:Economics | N/A |
Grady, Mark F. | Parisi, Francesco | 2006 | The Law and Economics of Cybersecurity | Book | Low:Economics; Low:Law | N/A |
Johnson, Eric M. | 2008 | Managing Information Risk and the Economics of Security | Book | High:Economics | N/A | |
Kramer, Franklin D., et. al | 2009 | Cyberpower and National Security | Book | None | N/A | |
National Cyber Security Summit Task Force | 2004 | Information Security Governance | Government Report | Moderate:Executive Administration | ||
Schneier, Bruce | 2008 | Schneier on Security | Book | None | Purchase | |
White House | 2009 | Cyberspace Policy Review | Government Report | None | ||
Zittrain, Jonathan L. | 2008 | The Future of the Internet and How To Stop It | Book | None |
- Subcategories: None