Regulation/Liability: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 24: | Line 24: | ||
|Camp, L. Jean||Lewis, Stephen||2004||[[Economics of Information Security]]||Book||High:Economics||N/A | |Camp, L. Jean||Lewis, Stephen||2004||[[Economics of Information Security]]||Book||High:Economics||N/A | ||
|- | |- | ||
|Center for Strategic and International Studies||||2008||[[Securing Cyberspace for the 44th Presidency]]||Independent | |Center for Strategic and International Studies||||2008||[[Securing Cyberspace for the 44th Presidency]]||Independent Report||Low:Policy||[http://www.cyber.st.dhs.gov/docs/081208_securingcyberspace_44.pdf ''Pdf''] | ||
|- | |- | ||
|Epstein, Richard A.||Brown, Thomas P.||2008||[[Cybersecurity in the Payment Card Industry]]||Law Review||Low:Law; Low:Economics||[http://lawreview.uchicago.edu/issues/archive/v75/75_1/EpsteinArticle.pdf ''Pdf''] | |Epstein, Richard A.||Brown, Thomas P.||2008||[[Cybersecurity in the Payment Card Industry]]||Law Review||Low:Law; Low:Economics||[http://lawreview.uchicago.edu/issues/archive/v75/75_1/EpsteinArticle.pdf ''Pdf''] | ||
Line 32: | Line 32: | ||
|Granick, Jennifer Stisa||||2005||[[The Price of Restricting Vulnerability Publications]]||Law Review||Low/Moderate:Law||[http://www.ijclp.net/files/ijclp_web-doc_10-cy-2004.pdf ''Pdf''] | |Granick, Jennifer Stisa||||2005||[[The Price of Restricting Vulnerability Publications]]||Law Review||Low/Moderate:Law||[http://www.ijclp.net/files/ijclp_web-doc_10-cy-2004.pdf ''Pdf''] | ||
|- | |- | ||
|Institute for Information Infrastructure Protection||||2003||[[Cyber Security Research and Development Agenda]]||Independent | |Institute for Information Infrastructure Protection||||2003||[[Cyber Security Research and Development Agenda]]||Independent Report||Low/None:Technology||[http://www.cyber.st.dhs.gov/docs/I3P%20Research%20Agenda%202003.pdf ''Pdf''] | ||
|- | |- | ||
|Johnson, Eric M.||||2008||[[Managing Information Risk and the Economics of Security]]||Book||High:Economics||N/A | |Johnson, Eric M.||||2008||[[Managing Information Risk and the Economics of Security]]||Book||High:Economics||N/A | ||
Line 50: | Line 50: | ||
|National Cyber Security Summit Task Force||||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf''] | |National Cyber Security Summit Task Force||||2004||[[Information Security Governance]]||Government Report||Moderate:Executive Administration||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf ''Pdf''] | ||
|- | |- | ||
|National Research Council||||2007||[[Toward a Safer and More Secure Cyberspace]]||Independent | |National Research Council||||2007||[[Toward a Safer and More Secure Cyberspace]]||Independent Report||Low:Research Processes; Low:Technology||[http://www.cyber.st.dhs.gov/docs/Toward_a_Safer_and_More_Secure_Cyberspace-Full_report.pdf ''Pdf''] | ||
|- | |- | ||
|Powell, Benjamin||||2005||[[Is Cybersecurity a Public Good]]||Law Review||Low/Moderate:Economics||[http://www.independent.org/pdf/working_papers/57_cyber.pdf ''Pdf''] | |Powell, Benjamin||||2005||[[Is Cybersecurity a Public Good]]||Law Review||Low/Moderate:Economics||[http://www.independent.org/pdf/working_papers/57_cyber.pdf ''Pdf''] |
Revision as of 15:48, 20 August 2010
TOC-> Approaches->Regulation/Liability
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross J. | 2008 | Security Engineering | Book | Moderate:Technology; Moderate:Cryptography | N/A | |
Anderson, Ross | 2001 | Why Information Security is Hard | Conf. Paper | None | Pdf AltPdf | |
Anderson, Ross | Moore, Tyler | 2006 | The Economics of Information Security | Journal Article | Low:Economics | |
Anderson, Ross, et. al | 2008 | Security Economics and the Internal Market | Study | Low:Economics | ||
Aviram, Amitai | Tor, Avishalom | 2004 | Overcoming Impediments to Information Sharing | Law Review | Low:Economics | Pdf SSRN |
Camp, L. Jean | Lewis, Stephen | 2004 | Economics of Information Security | Book | High:Economics | N/A |
Center for Strategic and International Studies | 2008 | Securing Cyberspace for the 44th Presidency | Independent Report | Low:Policy | ||
Epstein, Richard A. | Brown, Thomas P. | 2008 | Cybersecurity in the Payment Card Industry | Law Review | Low:Law; Low:Economics | |
Grady, Mark F. | Parisi, Francesco | 2006 | The Law and Economics of Cybersecurity | Book | Low:Economics; Low:Law | N/A |
Granick, Jennifer Stisa | 2005 | The Price of Restricting Vulnerability Publications | Law Review | Low/Moderate:Law | ||
Institute for Information Infrastructure Protection | 2003 | Cyber Security Research and Development Agenda | Independent Report | Low/None:Technology | ||
Johnson, Eric M. | 2008 | Managing Information Risk and the Economics of Security | Book | High:Economics | N/A | |
Johnson, Vincent R. | 2005 | Cybersecurity, Identity Theft, and the Limits of Tort Liability | Law Review | Moderate:Law | Pdf AltPdf | |
Korns, Stephen W. | 2009 | Cyber Operations | Journal Article | Low:International Warfare | ||
Kramer, Franklin D., et. al | 2009 | Cyberpower and National Security | Book | None | N/A | |
Lernard, Thomas M. | Rubin, Paul H. | 2005 | An Economic Analysis of Notification Requirements for Data Security Breaches | Online Paper | Low:Economics | |
Lernard, Thomas M. | Rubin, Paul H. | 2006 | Much Ado About Notification | Journal Article | Low:Economics | Pdf SSRN |
National Cyber Defense Initiative | 2009 | National Cyber Defense Financial Services Workshop Report | Independent Report | Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance | ||
National Cyber Security Summit Task Force | 2004 | Information Security Governance | Government Report | Moderate:Executive Administration | ||
National Research Council | 2007 | Toward a Safer and More Secure Cyberspace | Independent Report | Low:Research Processes; Low:Technology | ||
Powell, Benjamin | 2005 | Is Cybersecurity a Public Good | Law Review | Low/Moderate:Economics | ||
Romanosky et al. | 2008 | Do Data Breach Disclosure Laws Reduce Identity Theft | Conf. Paper | Moderate:Economics | ||
Schmitt, Michael N. | 2002 | Wired Warfare | Journal Article | Moderate:Law | ||
Schmitt, Michael N., et. al | 2004 | Computers and War | Conf. Paper | Moderate:Law | ||
Schwartz, Paul | Janger, Edward | 2007 | Notification of Data Security Breaches | Law Review | Low:Law; Low:Economics | |
Schneier, Bruce | 2008 | Schneier on Security | Book | None | Purchase | |
Sklerov, Matthew J. | 2009 | Solving the Dilemma of State Responses to Cyberattacks | Law Review | Moderate:Law; Low:Technology | ||
Swire, Peter P. | 2004 | A Model for When Disclosure Helps Security | Law Review | Low/Moderate:Logic | PdfSSRN | |
Swire, Peter P. | 2006 | A Theory of Disclosure for Security and Competitive Reasons | Law Review | Low/Moderate:Logic | SSRN | |
Todd, Graham H. | 2009 | Armed Attack in Cyberspace | Law Review | Moderate:Law | ||
White House | 2009 | Cyberspace Policy Review | Government Report | None | ||
Zittrain, Jonathan L. | 2008 | The Future of the Internet and How To Stop It | Book | None |
- Subcategories: None