Regulation/Liability
TOC-> Approaches->Regulation/Liability
Anderson, Ross (2001) Why Information Security is Hard
Anderson, Ross and Moore, Tyler (2006) The Economics of Information Security
Anderson, Ross, et. al (2008) Security Economics and the Internal Market
Aviram, Amitai and Tor, Avishalom (2004) Overcoming Impediments to Information Sharing
Barkham, Jason (2001) Information Warfare and International Law on the Use of Force
Camp, L. Jean and Lewis, Stephen (2004) Economics of Information Security
Center for Strategic and International Studies (2008) Securing Cyberspace for the 44th Presidency
Epstein, Richard A. and Brown, Thomas P. (2008) Cybersecurity in the Payment Card Industry
Granick, Jennifer Stisa (2005) The Price of Restricting Vulnerability Publications
Institute for Information Infrastructure Protection (2003) Cyber Security Research and Development Agenda
Johnson, Vincent R. (2005) Cybersecurity, Identity Theft, and the Limits of Tort Liability
Korns, Stephen W. (2009) Cyber Operations
Lernard, Thomas M. and Rubin, Paul H. (2005) An Economic Analysis of Notification Requirements for Data Security Breaches
Lernard, Thomas M. and Rubin, Paul H. (2006) Much Ado About Notification
National Cyber Defense Initiative (2009) National Cyber Defense Financial Services Workshop Report
National Cyber Security Summit Task Force (2004) Information Security Governance
National Research Council (2007) Toward a Safer and More Secure Cyberspace
Powell, Benjamin (2005) Is Cybersecurity a Public Good
Romanosky et al. (2008) Do Data Breach Disclosure Laws Reduce Identity Theft
Todd, Graham H. (2009) Armed Attack in Cyberspace
Schmitt, Michael N., et. al (2004) Computers and War
Schmitt, Michael N. (2002) Wired Warfare
Schneier, Bruce (2008) Schneier on Security
Schwartz, Paul and Janger, Edward (2007) Notification of Data Security Breaches
Sklerov, Matthew J. (2009) Solving the Dilemma of State Responses to Cyberattacks
Swire, Peter P (2004) A Model for When Disclosure Helps Security
Swire, Peter P (2006) A Theory of Disclosure for Security and Competitive Reasons
White House (2009) Cyberspace Policy Review
Zittrain, Jonathan L. (2008) The Future of the Internet and How To Stop It
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross J. | 2008 | Security Engineering | Book | Moderate:Technology; Moderate:Cryptography | N/A | |
Camp, L. Jean | Lewis, Stephen | 2004 | Economics of Information Security | Book | High:Economics | N/A |
Grady, Mark F. | Parisi, Francesco | 2006 | The Law and Economics of Cybersecurity | Book | Low:Economics; Low:Law | N/A |
Johnson, Eric M. | 2008 | Managing Information Risk and the Economics of Security | Book | High:Economics | N/A | |
Kramer, Franklin D., et. al | 2009 | Cyberpower and National Security | Book | None | N/A |
- Subcategories: None