Economics of Cybersecurity: Difference between revisions
No edit summary |
No edit summary |
||
Line 22: | Line 22: | ||
National Research Council (1999) [[Trust in Cyberspace]] | National Research Council (1999) [[Trust in Cyberspace]] | ||
Romanosky et al. (2008) [[Do Data Breach Disclosure Laws Reduce Identity Theft]] | Romanosky et al. (2008) [[Do Data Breach Disclosure Laws Reduce Identity Theft]] | ||
Line 91: | Line 89: | ||
|- | |- | ||
|Moore, Tyler, et. al||||2009||[[The Economics of Online Crime]]||Journal Article||Low:Technology||[http://people.seas.harvard.edu/~tmoore/jep09.pdf ''Pdf''] | |Moore, Tyler, et. al||||2009||[[The Economics of Online Crime]]||Journal Article||Low:Technology||[http://people.seas.harvard.edu/~tmoore/jep09.pdf ''Pdf''] | ||
|- | |||
|Powell, Benjamin||||2005||[[Is Cybersecurity a Public Good]]||Law Review||Low/Moderate:Economics||[http://www.independent.org/pdf/working_papers/57_cyber.pdf ''Pdf''] | |||
[http://www.ciaonet.org/wps/pob03/pob03.pdf ''AltPdf''] | |||
|- | |- | ||
|Schneier, Bruce||||2003||[[Beyond Fear]]||Book||None||[http://www.scribd.com/doc/12185921/beyond-fear-thinking-sensibly-about-security-in-an-uncertain-world-bruce-schneier-copernicus-books-2003 ''Scribd''] | |Schneier, Bruce||||2003||[[Beyond Fear]]||Book||None||[http://www.scribd.com/doc/12185921/beyond-fear-thinking-sensibly-about-security-in-an-uncertain-world-bruce-schneier-copernicus-books-2003 ''Scribd''] |
Revision as of 15:32, 19 August 2010
TOC-> Issues->Economics of Cybersecurity
Bohme, Rainer (2005) Cyber-Insurance Revisited
Camp, L. Jean and Wolfram, Catherine (2004) Pricing Security
Clinton, Larry (Undated) Cyber-Insurance Metrics and Impact on Cyber-Security
Computing Research Association (2003) Four Grand Challenges in Trustworthy Computing
Department of Defense (2007) Mission Impact of Foreign Influence on DoD Software
Financial Services Sector Coordinating Council for Critical Infrastructure Protection (2008) Research Agenda for the Banking and Finance Sector
Institute for Information Infrastructure Protection (2003) Cyber Security Research and Development Agenda
National Cyber Defense Initiative (2009) National Cyber Defense Financial Services Workshop Report
National Institute of Standards and Technology (2006) SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security
National Research Council (2007) Toward a Safer and More Secure Cyberspace
National Research Council (1999) Trust in Cyberspace
Romanosky et al. (2008) Do Data Breach Disclosure Laws Reduce Identity Theft
Schwartz, Paul and Janger, Edward (2007) Notification of Data Security Breaches
Swire, Peter P (2004) A Model for When Disclosure Helps Security
Swire, Peter P (2006) A Theory of Disclosure for Security and Competitive Reasons
Telang, Rahul and Wattal, Sunil (2007) Impact of Software Vulnerability Announcements on the Market Value of Software Vendors
van Eeten, Michel J. G. and Bauer, Johannes M. (2008) Economics of Malware
Varian, Hal (2000) Managing Online Security Risks
Varian, Hal (2004) System Reliability and Free Riding
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross J. | 2008 | Security Engineering | Book | Moderate:Technology; Moderate:Cryptography | N/A | |
Anderson, Ross | 2001 | Why Information Security is Hard | Conf. Paper | None | Pdf AltPdf | |
Anderson, Ross | Moore, Tyler | 2006 | The Economics of Information Security | Journal Article | Low:Economics | |
Anderson, Ross, et. al | 2008 | Security Economics and the Internal Market | Study | Low:Economics | ||
Arora et al. | 2006 | Does Information Security Attack Frequency Increase With Vulnerability Disclosure | Journal Article | Moderate:Economics | ||
Aviram, Amitai | Tor, Avishalom | 2004 | Overcoming Impediments to Information Sharing | Law Review | Low:Economics | Pdf SSRN |
Bohme, Rainer | Kataria, Gaurav | 2006 | Models and Measures for Correlation in Cyber-Insurance | Conf. Paper | High:Economics | |
Bohme, Rainer | Schwartz, Galina | 2010 | Modeling Cyber-Insurance | Conf. Paper | High:Economics | |
Camp, L. Jean | Lewis, Stephen | 2004 | Economics of Information Security | Book | High:Economics | N/A |
Computer Economics, Inc. | 2007 | 2007 Malware Report | Industry Report | None | Purchase | |
Franklin, Jason, et. al | 2007 | An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants | Conference Paper | Low:Statistics; Low:Economics | Pdf Alt Pdf | |
Gandal, Neil | 2008 | An Introduction to Key Themes in the Economics of Cyber Security | Book Chapter | Low:Economics | ||
Grady, Mark F. | Parisi, Francesco | 2006 | The Law and Economics of Cybersecurity | Book | Low:Economics; Low:Law | N/A |
Granick, Jennifer Stisa | 2005 | The Price of Restricting Vulnerability Publications | Law Review | Low/Moderate:Law | ||
Johnson, Eric M. | 2008 | Managing Information Risk and the Economics of Security | Book | High:Economics | N/A | |
Johnson, Vincent R. | 2005 | Cybersecurity, Identity Theft, and the Limits of Tort Liability | Law Review | Moderate:Law | Pdf AltPdf | |
Kobayashi, Bruce H. | 2006 | An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods | Journal Article | High:Economics | ||
Lernard, Thomas M. | Rubin, Paul H. | 2005 | An Economic Analysis of Notification Requirements for Data Security Breaches | Online Paper | Low:Economics | |
Moore, Tyler | Clayton, Richard | 2009 | The Impact of Incentives on Notice and Take-down | Book Chapter | Moderate:Technology; Low:Law | |
Moore, Tyler, et. al | 2009 | The Economics of Online Crime | Journal Article | Low:Technology | ||
Powell, Benjamin | 2005 | Is Cybersecurity a Public Good | Law Review | Low/Moderate:Economics | ||
Schneier, Bruce | 2003 | Beyond Fear | Book | None | Scribd | |
Stohl, Michael | 2006 | Cyber Terrorism | Journal Article | None | Purchase | |
Symantec Corporation | 2010 | Symantec Global Internet Security Threat Report | Industry Report | Low/Moderate:Technology | ||
Thomas, Rob | Martin, Jerry | 2006 | The Underground Economy | Journal Article | Low:Technology |
Subcategories: