Public-Private Cooperation: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 47: | Line 47: | ||
|Powell, Benjamin||||2005||[[Is Cybersecurity a Public Good]]||Law Review||Low/Moderate:Economics||[http://www.independent.org/pdf/working_papers/57_cyber.pdf ''Pdf''] | |Powell, Benjamin||||2005||[[Is Cybersecurity a Public Good]]||Law Review||Low/Moderate:Economics||[http://www.independent.org/pdf/working_papers/57_cyber.pdf ''Pdf''] | ||
[http://www.ciaonet.org/wps/pob03/pob03.pdf ''AltPdf''] | [http://www.ciaonet.org/wps/pob03/pob03.pdf ''AltPdf''] | ||
|- | |||
|President's Commission on Critical Infrastructure Protection||||1997||[[Critical Foundations]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/PCCIP%20Report%201997.pdf ''Pdf''] | |||
|- | |- | ||
|President's Information Technology Advisory Council||||2005||[[Cyber Security: A Crisis of Prioritization]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/PITAC%20Report%202005.pdf ''Pdf''] | |President's Information Technology Advisory Council||||2005||[[Cyber Security: A Crisis of Prioritization]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/PITAC%20Report%202005.pdf ''Pdf''] |
Revision as of 16:08, 8 September 2010
TOC-> Issues->Public-Private Cooperation
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross, et. al | 2008 | Security Economics and the Internal Market | Study | Low:Economics | ||
Aviram, Amitai | Tor, Avishalom | 2004 | Overcoming Impediments to Information Sharing | Law Review | Low:Economics | Pdf SSRN |
Center for Strategic and International Studies | 2008 | Securing Cyberspace for the 44th Presidency | Independent Report | Low:Policy | ||
Department of Commerce | 2010 | Defense Industrial Base Assessment | Government Report | None | ||
Department of Defense | 2007 | Mission Impact of Foreign Influence on DoD Software | Government Report | Low:Defense Policy/Procurement | ||
Department of Defense | 2005 | Strategy for Homeland Defense and Civil Support | Government Report | None | ||
Department of Homeland Security | 2009 | A Roadmap for Cybersecurity Research | Government Report | Low:Technology | ||
Department of Homeland Security | 2003 | The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets | Government Report | None | ||
Energetics Inc. | 2006 | Roadmap to Secure Control Systems in the Energy Sector | Independent Report | None | ||
Grady, Mark F. | Parisi, Francesco | 2006 | The Law and Economics of Cybersecurity | Book | Low:Economics; Low:Law | N/A |
Korns, Stephen W. | 2009 | Cyber Operations | Journal Article | Low:International Warfare | ||
Kramer, Franklin D., et. al | 2009 | Cyberpower and National Security | Book | None | N/A | |
Moore, Tyler | Clayton, Richard | 2008 | The Consequence of Non-Cooperation in the Fight Against Phishing | Conf. Paper | Low:Technology; Low:Economics | Pdf Alt Pdf |
Moore, Tyler, et. al | 2009 | The Economics of Online Crime | Journal Article | Low:Technology | ||
National Cyber Security Summit Task Force | 2004 | Information Security Governance | Government Report | Moderate:Executive Administration | ||
National Infrastructure Advisory Council | 2004 | Hardening The Internet | Government Report | High:Technology | ||
National Research Council | 1999 | Trust in Cyberspace | Independent Report | Moderate:Technology | ||
Powell, Benjamin | 2005 | Is Cybersecurity a Public Good | Law Review | Low/Moderate:Economics | ||
President's Commission on Critical Infrastructure Protection | 1997 | Critical Foundations | Government Report | None | ||
President's Information Technology Advisory Council | 2005 | Cyber Security: A Crisis of Prioritization | Government Report | None | ||
White House | 2009 | Cyberspace Policy Review | Government Report | None | ||
White House | 2003 | The National Strategy to Secure Cyberspace | Government Report | None |
- Subcategories: None