Regulation/Liability: Difference between revisions
No edit summary |
No edit summary |
||
Line 24: | Line 24: | ||
Lernard, Thomas M. and Rubin, Paul H. (2006) [[Much Ado About Notification]] | Lernard, Thomas M. and Rubin, Paul H. (2006) [[Much Ado About Notification]] | ||
National Research Council (2007) [[Toward a Safer and More Secure Cyberspace]] | National Research Council (2007) [[Toward a Safer and More Secure Cyberspace]] | ||
Line 70: | Line 68: | ||
|- | |- | ||
|Kramer, Franklin D., et. al||||2009||[[Cyberpower and National Security]]||Book||None||N/A | |Kramer, Franklin D., et. al||||2009||[[Cyberpower and National Security]]||Book||None||N/A | ||
|- | |||
|National Cyber Defense Initiative||||2009||[[National Cyber Defense Financial Services Workshop Report]]||Independent Report||Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance||[http://www.cyber.st.dhs.gov/docs/NCDI_FI_Workshop_Report.pdf ''Pdf''] | |||
|- | |- | ||
|National Cyber Security Summit Task Force||||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf''] | |National Cyber Security Summit Task Force||||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf''] |
Revision as of 11:22, 11 August 2010
TOC-> Approaches->Regulation/Liability
Anderson, Ross (2001) Why Information Security is Hard
Anderson, Ross and Moore, Tyler (2006) The Economics of Information Security
Anderson, Ross, et. al (2008) Security Economics and the Internal Market
Aviram, Amitai and Tor, Avishalom (2004) Overcoming Impediments to Information Sharing
Barkham, Jason (2001) Information Warfare and International Law on the Use of Force
Camp, L. Jean and Lewis, Stephen (2004) Economics of Information Security
Epstein, Richard A. and Brown, Thomas P. (2008) Cybersecurity in the Payment Card Industry
Granick, Jennifer Stisa (2005) The Price of Restricting Vulnerability Publications
Johnson, Vincent R. (2005) Cybersecurity, Identity Theft, and the Limits of Tort Liability
Korns, Stephen W. (2009) Cyber Operations
Lernard, Thomas M. and Rubin, Paul H. (2005) An Economic Analysis of Notification Requirements for Data Security Breaches
Lernard, Thomas M. and Rubin, Paul H. (2006) Much Ado About Notification
National Research Council (2007) Toward a Safer and More Secure Cyberspace
Powell, Benjamin (2005) Is Cybersecurity a Public Good
Romanosky et al. (2008) Do Data Breach Disclosure Laws Reduce Identity Theft
Todd, Graham H. (2009) Armed Attack in Cyberspace
Schmitt, Michael N., et. al (2004) Computers and War
Schmitt, Michael N. (2002) Wired Warfare
Schwartz, Paul and Janger, Edward (2007) Notification of Data Security Breaches
Sklerov, Matthew J. (2009) Solving the Dilemma of State Responses to Cyberattacks
Swire, Peter P (2004) A Model for When Disclosure Helps Security
Swire, Peter P (2006) A Theory of Disclosure for Security and Competitive Reasons
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross J. | 2008 | Security Engineering | Book | Moderate:Technology; Moderate:Cryptography | N/A | |
Camp, L. Jean | Lewis, Stephen | 2004 | Economics of Information Security | Book | High:Economics | N/A |
Center for Strategic and International Studies | 2008 | Securing Cyberspace for the 44th Presidency | Independent Reports | Low:Policy | ||
Grady, Mark F. | Parisi, Francesco | 2006 | The Law and Economics of Cybersecurity | Book | Low:Economics; Low:Law | N/A |
Institute for Information Infrastructure Protection | 2003 | Cyber Security Research and Development Agenda | Independent Reports | Low/None:Technology | ||
Johnson, Eric M. | 2008 | Managing Information Risk and the Economics of Security | Book | High:Economics | N/A | |
Kramer, Franklin D., et. al | 2009 | Cyberpower and National Security | Book | None | N/A | |
National Cyber Defense Initiative | 2009 | National Cyber Defense Financial Services Workshop Report | Independent Report | Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance | ||
National Cyber Security Summit Task Force | 2004 | Information Security Governance | Government Report | Moderate:Executive Administration | ||
Schneier, Bruce | 2008 | Schneier on Security | Book | None | Purchase | |
White House | 2009 | Cyberspace Policy Review | Government Report | None | ||
Zittrain, Jonathan L. | 2008 | The Future of the Internet and How To Stop It | Book | None |
- Subcategories: None