Cybercrime: Difference between revisions
No edit summary |
No edit summary |
||
Line 16: | Line 16: | ||
Moore, Tyler and Clayton, Richard (2009) [[The Impact of Incentives on Notice and Take-down]] | Moore, Tyler and Clayton, Richard (2009) [[The Impact of Incentives on Notice and Take-down]] | ||
Symantec Corporation (2010) [[Symantec Global Internet Security Threat Report]] | Symantec Corporation (2010) [[Symantec Global Internet Security Threat Report]] | ||
Line 42: | Line 40: | ||
|- | |- | ||
|Kramer, Franklin D., et. al||||2009||[[Cyberpower and National Security]]||Book||None||N/A | |Kramer, Franklin D., et. al||||2009||[[Cyberpower and National Security]]||Book||None||N/A | ||
|- | |||
|National Research Council||||2007||[[Toward a Safer and More Secure Cyberspace]]||Independent Reports||Low:Research Processes; Low:Technology||[http://www.cyber.st.dhs.gov/docs/Toward_a_Safer_and_More_Secure_Cyberspace-Full_report.pdf ''Pdf''] | |||
|} | |} | ||
Revision as of 11:24, 11 August 2010
Anderson, Ross, et. al (2008) Security Economics and the Internal Market
Epstein, Richard A. and Brown, Thomas P. (2008) Cybersecurity in the Payment Card Industry
Franklin, Jason, et. al (2007) An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants
McAfee, Inc. (2010) McAfee Threats Report
Moore, Tyler, et. al (2009) The Economics of Online Crime
Moore, Tyler and Clayton, Richard (2007) Examining the Impact of Website Take-down on Phishing
Moore, Tyler and Clayton, Richard (2008) The Consequence of Non-Cooperation in the Fight Against Phishing
Moore, Tyler and Clayton, Richard (2009) The Impact of Incentives on Notice and Take-down
Symantec Corporation (2010) Symantec Global Internet Security Threat Report
Thomas, Rob and Martin, Jerry (2006) The Underground Economy
Trend Micro Incorporated (2010) Trend Micro Annual Report
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross J. | 2008 | Security Engineering | Book | Moderate:Technology; Moderate:Cryptography | N/A | |
Deputy Chief of Staff for Intelligence | 2006 | Critical Infrastructure Threats and Terrorism | Government Report | Low:Organizational Analysis; Low:Risk Management | ||
Johnson, Eric M. | 2008 | Managing Information Risk and the Economics of Security | Book | High:Economics | N/A | |
Kramer, Franklin D., et. al | 2009 | Cyberpower and National Security | Book | None | N/A | |
National Research Council | 2007 | Toward a Safer and More Secure Cyberspace | Independent Reports | Low:Research Processes; Low:Technology |
- Subcategories: None