Suggested References to Add to Wiki: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 23: Line 23:
Stohl, Michael (2006) [[Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games]]
Stohl, Michael (2006) [[Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games]]


van Eeten, Michael and Bauer, Johannes M. (2009) [[Emerging Threats to Internet Security: Incentives,  
van Eeten, Michael and Bauer, Johannes M. (2009) [[Emerging Threats to Internet Security - Incentives, Externalities and Policy Implications]]
Externalities and Policy Implications]]

Revision as of 14:42, 9 June 2010

Please add links to reference pages for Redmine articles you believe should be added to the cybersecurity wiki here.

Entries should look just like any other entry on a topic page, i.e., "<lastname>, <firstname> (<year>) [<Title as a link to the reference page>]"

OECD (2009) Cybersecurity and Economic Incentives

OECD (2009) The Market Consequences of Cybersecurity: Defining Externalities and Ways to Address Them

Bauer, Johannes M. and van Eeten, Michel J. G. (2009) Cybersecurity: Stakeholder Incentives, Externalities, and Policy Options

Burstein, Aaron J. (2008) Amending The ECPA To Enable a Culture of Cybersecurity Research

Rue, Rachel and Pfleeger, Shari Lawrence (2009) Making the Best Use of Cybersecurity Economic Models

Santos, Joost R, Haimes, Yacov Y and Chenyang Kian (2007) A Framework for Linking Cybersecurity Metrics to the Modeling of Macroeconomic Interdependencies

Schneidewind, Norman (2010) Metrics for Mitigating Cybersecurity Threats to Networks

Shackelford, Scott J. (2010) Estonia Three Years Later

Shah, Shashi K. (2004) The Evolving Landscape of Maritime Cybersecurity

Stohl, Michael (2006) Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games

van Eeten, Michael and Bauer, Johannes M. (2009) Emerging Threats to Internet Security - Incentives, Externalities and Policy Implications