Public-Private Cooperation: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 2: | Line 2: | ||
Aviram, Amitai and Tor, Avishalom (2004) [[Overcoming Impediments to Information Sharing]] | Aviram, Amitai and Tor, Avishalom (2004) [[Overcoming Impediments to Information Sharing]] | ||
Powell, Benjamin (2005) [[Is Cybersecurity a Public Good]] | Powell, Benjamin (2005) [[Is Cybersecurity a Public Good]] | ||
Line 34: | Line 32: | ||
|- | |- | ||
|Grady, Mark F.||Parisi, Francesco||2006||[[The Law and Economics of Cybersecurity]]||Book||Low:Economics; Low:Law||N/A | |Grady, Mark F.||Parisi, Francesco||2006||[[The Law and Economics of Cybersecurity]]||Book||Low:Economics; Low:Law||N/A | ||
|- | |||
|Korns, Stephen W.|| ||2009||[[Cyber Operations]]||Journal Article||Low:International Warfare||[http://www.carlisle.army.mil/DIME/documents/Cyber%20Operations%20-%20The%20New%20Balance%20-%20Korns.pdf ''Pdf''] | |||
|- | |- | ||
|Kramer, Franklin D., et. al||||2009||[[Cyberpower and National Security]]||Book||None||N/A | |Kramer, Franklin D., et. al||||2009||[[Cyberpower and National Security]]||Book||None||N/A |
Revision as of 11:58, 11 August 2010
TOC-> Issues->Public-Private Cooperation
Aviram, Amitai and Tor, Avishalom (2004) Overcoming Impediments to Information Sharing
Powell, Benjamin (2005) Is Cybersecurity a Public Good
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross, et. al | 2008 | Security Economics and the Internal Market | Study | Low:Economics | ||
Center for Strategic and International Studies | 2008 | Securing Cyberspace for the 44th Presidency | Independent Reports | Low:Policy | ||
Department of Commerce | 2010 | Defense Industrial Base Assessment | Government Report | None | ||
Department of Defense | 2007 | Mission Impact of Foreign Influence on DoD Software | Government Report | Low:Defense Policy/Procurement | ||
Department of Defense | 2005 | Strategy for Homeland Defense and Civil Support | Government Report | None | ||
Department of Homeland Security | 2009 | A Roadmap for Cybersecurity Research | Government Report | Low:Technology | ||
Department of Homeland Security | 2003 | The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets | Government Report | None | ||
Energetics Inc. | 2006 | Roadmap to Secure Control Systems in the Energy Sector | Independent Reports | None | ||
Grady, Mark F. | Parisi, Francesco | 2006 | The Law and Economics of Cybersecurity | Book | Low:Economics; Low:Law | N/A |
Korns, Stephen W. | 2009 | Cyber Operations | Journal Article | Low:International Warfare | ||
Kramer, Franklin D., et. al | 2009 | Cyberpower and National Security | Book | None | N/A | |
Moore, Tyler | Clayton, Richard | 2008 | The Consequence of Non-Cooperation in the Fight Against Phishing | Conference Paper | Low:Technology; Low:Economics | Pdf Alt Pdf |
Moore, Tyler, et. al | 2009 | The Economics of Online Crime | Journal Article | Low:Technology | ||
National Cyber Security Summit Task Force | 2004 | Information Security Governance | Government Report | Moderate:Executive Administration | ||
National Infrastructure Advisory Council | 2004 | Hardening The Internet | Government Report | High:Technology | ||
National Research Council | 1999 | Trust in Cyberspace | Independent Reports | Moderate:Technology | ||
White House | 2009 | Cyberspace Policy Review | Government Report | None |
- Subcategories: None