Regulation/Liability: Difference between revisions
No edit summary |
No edit summary |
||
Line 4: | Line 4: | ||
Anderson, Ross and Moore, Tyler (2006) [[The Economics of Information Security]] | Anderson, Ross and Moore, Tyler (2006) [[The Economics of Information Security]] | ||
Aviram, Amitai and Tor, Avishalom (2004) [[Overcoming Impediments to Information Sharing]] | Aviram, Amitai and Tor, Avishalom (2004) [[Overcoming Impediments to Information Sharing]] | ||
Line 52: | Line 50: | ||
|- | |- | ||
|Anderson, Ross J.||||2008||[[Security Engineering]]||Book||Moderate:Technology; Moderate:Cryptography||N/A | |Anderson, Ross J.||||2008||[[Security Engineering]]||Book||Moderate:Technology; Moderate:Cryptography||N/A | ||
|- | |||
|Anderson, Ross, et. al|| ||2008||[[Security Economics and the Internal Market]]||Study||Low:Economics||[http://www.enisa.europa.eu/act/sr/reports/econ-sec/economics-sec/at_download/fullReport ''Pdf''] | |||
|- | |- | ||
|Camp, L. Jean||Lewis, Stephen||2004||[[Economics of Information Security]]||Book||High:Economics||N/A | |Camp, L. Jean||Lewis, Stephen||2004||[[Economics of Information Security]]||Book||High:Economics||N/A |
Revision as of 11:55, 11 August 2010
TOC-> Approaches->Regulation/Liability
Anderson, Ross (2001) Why Information Security is Hard
Anderson, Ross and Moore, Tyler (2006) The Economics of Information Security
Aviram, Amitai and Tor, Avishalom (2004) Overcoming Impediments to Information Sharing
Barkham, Jason (2001) Information Warfare and International Law on the Use of Force
Camp, L. Jean and Lewis, Stephen (2004) Economics of Information Security
Granick, Jennifer Stisa (2005) The Price of Restricting Vulnerability Publications
Johnson, Vincent R. (2005) Cybersecurity, Identity Theft, and the Limits of Tort Liability
Korns, Stephen W. (2009) Cyber Operations
Lernard, Thomas M. and Rubin, Paul H. (2005) An Economic Analysis of Notification Requirements for Data Security Breaches
Lernard, Thomas M. and Rubin, Paul H. (2006) Much Ado About Notification
Powell, Benjamin (2005) Is Cybersecurity a Public Good
Romanosky et al. (2008) Do Data Breach Disclosure Laws Reduce Identity Theft
Todd, Graham H. (2009) Armed Attack in Cyberspace
Schmitt, Michael N., et. al (2004) Computers and War
Schmitt, Michael N. (2002) Wired Warfare
Schwartz, Paul and Janger, Edward (2007) Notification of Data Security Breaches
Sklerov, Matthew J. (2009) Solving the Dilemma of State Responses to Cyberattacks
Swire, Peter P (2004) A Model for When Disclosure Helps Security
Swire, Peter P (2006) A Theory of Disclosure for Security and Competitive Reasons
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross J. | 2008 | Security Engineering | Book | Moderate:Technology; Moderate:Cryptography | N/A | |
Anderson, Ross, et. al | 2008 | Security Economics and the Internal Market | Study | Low:Economics | ||
Camp, L. Jean | Lewis, Stephen | 2004 | Economics of Information Security | Book | High:Economics | N/A |
Center for Strategic and International Studies | 2008 | Securing Cyberspace for the 44th Presidency | Independent Reports | Low:Policy | ||
Epstein, Richard A. | Brown, Thomas P. | 2008 | Cybersecurity in the Payment Card Industry | Law Review Article | Low:Law; Low:Economics | |
Grady, Mark F. | Parisi, Francesco | 2006 | The Law and Economics of Cybersecurity | Book | Low:Economics; Low:Law | N/A |
Institute for Information Infrastructure Protection | 2003 | Cyber Security Research and Development Agenda | Independent Reports | Low/None:Technology | ||
Johnson, Eric M. | 2008 | Managing Information Risk and the Economics of Security | Book | High:Economics | N/A | |
Kramer, Franklin D., et. al | 2009 | Cyberpower and National Security | Book | None | N/A | |
National Cyber Defense Initiative | 2009 | National Cyber Defense Financial Services Workshop Report | Independent Report | Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance | ||
National Cyber Security Summit Task Force | 2004 | Information Security Governance | Government Report | Moderate:Executive Administration | ||
National Research Council | 2007 | Toward a Safer and More Secure Cyberspace | Independent Reports | Low:Research Processes; Low:Technology | ||
Schneier, Bruce | 2008 | Schneier on Security | Book | None | Purchase | |
White House | 2009 | Cyberspace Policy Review | Government Report | None | ||
Zittrain, Jonathan L. | 2008 | The Future of the Internet and How To Stop It | Book | None |
- Subcategories: None