Cybercrime: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 16: | Line 16: | ||
Thomas, Rob and Martin, Jerry (2006) [[The Underground Economy]] | Thomas, Rob and Martin, Jerry (2006) [[The Underground Economy]] | ||
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | {| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | ||
Line 42: | Line 40: | ||
|- | |- | ||
|Symantec Corporation||||2010||[[Symantec Global Internet Security Threat Report]]||Industry Report||Low/Moderate:Technology||[http://www4.symantec.com/Vrt/wl?tu_id=SUKX1271711282503126202 ''Pdf''] | |Symantec Corporation||||2010||[[Symantec Global Internet Security Threat Report]]||Industry Report||Low/Moderate:Technology||[http://www4.symantec.com/Vrt/wl?tu_id=SUKX1271711282503126202 ''Pdf''] | ||
|- | |||
|Trend Micro Incorporated||||2010||[[Trend Micro Annual Report]]||Industry Report||Moderate:Technology||[http://us.trendmicro.com/imperia/md/content/us/trendwatch/researchandanalysis/2009s_most_persistent_malware_threats__march_2010_.pdf ''Pdf''] | |||
|} | |} | ||
Revision as of 11:34, 11 August 2010
Anderson, Ross, et. al (2008) Security Economics and the Internal Market
Epstein, Richard A. and Brown, Thomas P. (2008) Cybersecurity in the Payment Card Industry
Franklin, Jason, et. al (2007) An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants
Moore, Tyler, et. al (2009) The Economics of Online Crime
Moore, Tyler and Clayton, Richard (2007) Examining the Impact of Website Take-down on Phishing
Moore, Tyler and Clayton, Richard (2008) The Consequence of Non-Cooperation in the Fight Against Phishing
Moore, Tyler and Clayton, Richard (2009) The Impact of Incentives on Notice and Take-down
Thomas, Rob and Martin, Jerry (2006) The Underground Economy
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross J. | 2008 | Security Engineering | Book | Moderate:Technology; Moderate:Cryptography | N/A | |
Deputy Chief of Staff for Intelligence | 2006 | Critical Infrastructure Threats and Terrorism | Government Report | Low:Organizational Analysis; Low:Risk Management | ||
Johnson, Eric M. | 2008 | Managing Information Risk and the Economics of Security | Book | High:Economics | N/A | |
Kramer, Franklin D., et. al | 2009 | Cyberpower and National Security | Book | None | N/A | |
McAfee, Inc. | 2010 | McAfee Threats Report | Industry Report | None | ||
National Research Council | 2007 | Toward a Safer and More Secure Cyberspace | Independent Reports | Low:Research Processes; Low:Technology | ||
Symantec Corporation | 2010 | Symantec Global Internet Security Threat Report | Industry Report | Low/Moderate:Technology | ||
Trend Micro Incorporated | 2010 | Trend Micro Annual Report | Industry Report | Moderate:Technology |
- Subcategories: None