Public-Private Cooperation: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 15: | Line 15: | ||
|Aviram, Amitai||Tor, Avishalom||2004||[[Overcoming Impediments to Information Sharing]]||Law Review||Low:Economics||[http://law.haifa.ac.il/faculty/lec_papers/tor/55Ala1.L.Rev.231.pdf ''Pdf''] [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=435600 ''SSRN''] | |Aviram, Amitai||Tor, Avishalom||2004||[[Overcoming Impediments to Information Sharing]]||Law Review||Low:Economics||[http://law.haifa.ac.il/faculty/lec_papers/tor/55Ala1.L.Rev.231.pdf ''Pdf''] [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=435600 ''SSRN''] | ||
|- | |- | ||
|Center for Strategic and International Studies||||2008||[[Securing Cyberspace for the 44th Presidency]]||Independent | |Center for Strategic and International Studies||||2008||[[Securing Cyberspace for the 44th Presidency]]||Independent Report||Low:Policy||[http://www.cyber.st.dhs.gov/docs/081208_securingcyberspace_44.pdf ''Pdf''] | ||
|- | |- | ||
|Department of Commerce||||2010||[[Defense Industrial Base Assessment]]||Government Report||None||[http://www.bis.doc.gov/defenseindustrialbaseprograms/osies/defmarketresearchrpts/final_counterfeit_electronics_report.pdf ''Pdf''] | |Department of Commerce||||2010||[[Defense Industrial Base Assessment]]||Government Report||None||[http://www.bis.doc.gov/defenseindustrialbaseprograms/osies/defmarketresearchrpts/final_counterfeit_electronics_report.pdf ''Pdf''] | ||
Line 27: | Line 27: | ||
|Department of Homeland Security||||2003||[[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]||Government Report||None||[http://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf ''Pdf''] | |Department of Homeland Security||||2003||[[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]||Government Report||None||[http://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf ''Pdf''] | ||
|- | |- | ||
|Energetics Inc.||||2006||[[Roadmap to Secure Control Systems in the Energy Sector]]||Independent | |Energetics Inc.||||2006||[[Roadmap to Secure Control Systems in the Energy Sector]]||Independent Report||None||[http://www.cyber.st.dhs.gov/docs/DOE%20Roadmap%202006.pdf ''Pdf''] | ||
|- | |- | ||
|Grady, Mark F.||Parisi, Francesco||2006||[[The Law and Economics of Cybersecurity]]||Book||Low:Economics; Low:Law||N/A | |Grady, Mark F.||Parisi, Francesco||2006||[[The Law and Economics of Cybersecurity]]||Book||Low:Economics; Low:Law||N/A | ||
Line 43: | Line 43: | ||
|National Infrastructure Advisory Council||||2004||[[Hardening The Internet]]||Government Report||High:Technology||[http://www.cyber.st.dhs.gov/docs/NIAC%20Internet%20Hardening.pdf ''Pdf''] | |National Infrastructure Advisory Council||||2004||[[Hardening The Internet]]||Government Report||High:Technology||[http://www.cyber.st.dhs.gov/docs/NIAC%20Internet%20Hardening.pdf ''Pdf''] | ||
|- | |- | ||
|National Research Council||||1999||[[Trust in Cyberspace]]||Independent | |National Research Council||||1999||[[Trust in Cyberspace]]||Independent Report||Moderate:Technology||[http://www.cyber.st.dhs.gov/docs/Trust%20in%20Cyberspace%20Report%201999.pdf ''Pdf''] | ||
|- | |- | ||
|Powell, Benjamin||||2005||[[Is Cybersecurity a Public Good]]||Law Review||Low/Moderate:Economics||[http://www.independent.org/pdf/working_papers/57_cyber.pdf ''Pdf''] | |Powell, Benjamin||||2005||[[Is Cybersecurity a Public Good]]||Law Review||Low/Moderate:Economics||[http://www.independent.org/pdf/working_papers/57_cyber.pdf ''Pdf''] |
Revision as of 15:44, 20 August 2010
TOC-> Issues->Public-Private Cooperation
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross, et. al | 2008 | Security Economics and the Internal Market | Study | Low:Economics | ||
Aviram, Amitai | Tor, Avishalom | 2004 | Overcoming Impediments to Information Sharing | Law Review | Low:Economics | Pdf SSRN |
Center for Strategic and International Studies | 2008 | Securing Cyberspace for the 44th Presidency | Independent Report | Low:Policy | ||
Department of Commerce | 2010 | Defense Industrial Base Assessment | Government Report | None | ||
Department of Defense | 2007 | Mission Impact of Foreign Influence on DoD Software | Government Report | Low:Defense Policy/Procurement | ||
Department of Defense | 2005 | Strategy for Homeland Defense and Civil Support | Government Report | None | ||
Department of Homeland Security | 2009 | A Roadmap for Cybersecurity Research | Government Report | Low:Technology | ||
Department of Homeland Security | 2003 | The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets | Government Report | None | ||
Energetics Inc. | 2006 | Roadmap to Secure Control Systems in the Energy Sector | Independent Report | None | ||
Grady, Mark F. | Parisi, Francesco | 2006 | The Law and Economics of Cybersecurity | Book | Low:Economics; Low:Law | N/A |
Korns, Stephen W. | 2009 | Cyber Operations | Journal Article | Low:International Warfare | ||
Kramer, Franklin D., et. al | 2009 | Cyberpower and National Security | Book | None | N/A | |
Moore, Tyler | Clayton, Richard | 2008 | The Consequence of Non-Cooperation in the Fight Against Phishing | Conf. Paper | Low:Technology; Low:Economics | Pdf Alt Pdf |
Moore, Tyler, et. al | 2009 | The Economics of Online Crime | Journal Article | Low:Technology | ||
National Cyber Security Summit Task Force | 2004 | Information Security Governance | Government Report | Moderate:Executive Administration | ||
National Infrastructure Advisory Council | 2004 | Hardening The Internet | Government Report | High:Technology | ||
National Research Council | 1999 | Trust in Cyberspace | Independent Report | Moderate:Technology | ||
Powell, Benjamin | 2005 | Is Cybersecurity a Public Good | Law Review | Low/Moderate:Economics | ||
White House | 2009 | Cyberspace Policy Review | Government Report | None |
- Subcategories: None