Actors and Incentives
| Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
|---|---|---|---|---|---|---|
| Anderson, Ross J. | 2008 | Security Engineering | Book | Low:Technology; Low:Cryptography | N/A | |
| Barkham, Jason | 2001 | Information Warfare and International Law on the Use of Force | Law Review | Moderate:Law | Pdf Alt Pdf | |
| Brown, Davis | 2006 | A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict | Law Review | Moderate:Law | ||
| Clarke, Richard A. | Knake, Robert | 2010 | Cyber War | Book | None | N/A |
| Department of Commerce | 2010 | Defense Industrial Base Assessment | Government Report | None | ||
| Department of Defense | 1999 | An Assessment of International Legal Issues in Information Operations | Government Report | Moderate:Law | ||
| Department of Defense | 2005 | Strategy for Homeland Defense and Civil Support | Government Report | None | ||
| Department of Defense | 2007 | Mission Impact of Foreign Influence on DoD Software | Government Report | Low:Defense Policy/Procurement | ||
| Department of Homeland Security | 2003 | The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets | Government Report | None | ||
| Department of Homeland Security | 2009 | A Roadmap for Cybersecurity Research | Government Report | Low:Technology | ||
| Deputy Chief of Staff for Intelligence | 2006 | Critical Infrastructure Threats and Terrorism | Government Report | Low:Organizational Analysis; Low:Risk Management | ||
| Dörmann, Knut | 2004 | Applicability of the Additional Protocols to Computer Network Attacks | Independent Report | Low:Law | ||
| Dunlap, Charles J. Jr. | 2009 | Towards a Cyberspace Legal Regime in the Twenty-First Century | Speech | None | N/A | |
| Energetics Inc. | 2006 | Roadmap to Secure Control Systems in the Energy Sector | Independent Report | None | ||
| Epstein, Richard A. | Brown, Thomas P. | 2008 | Cybersecurity in the Payment Card Industry | Law Review | Low:Law; Low:Economics | |
| Financial Services Sector Coordinating Council for Critical Infrastructure Protection | 2008 | Research Agenda for the Banking and Finance Sector | Independent Report | None | ||
| Franklin, Jason, et. al | 2007 | An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants | Conf. Paper | Low:Statistics; Low:Economics | Pdf Alt Pdf | |
| Grady, Mark F. | Parisi, Francesco | 2006 | The Law and Economics of Cybersecurity | Book | Low:Economics; Low:Law | N/A |
| Hollis, Duncan B. | 2007 | Why States Need an International Law for Information Operations | Law Review | Moderate:Law | ||
| Johnson, Eric M. | 2008 | Managing Information Risk and the Economics of Security | Book | High:Economics | N/A | |
| Johnson, Vincent R. | 2005 | Cybersecurity, Identity Theft, and the Limits of Tort Liability | Law Review | Moderate:Law | Pdf AltPdf | |
| Korns, Stephen W. | 2009 | Cyber Operations | Journal Article | Low:International Warfare | ||
| Kramer, Franklin D., et. al | 2009 | Cyberpower and National Security | Book | None | N/A | |
| McAfee, Inc. | 2010 | McAfee Threats Report | Industry Report | None | ||
| Moore, Tyler, et. al | 2009 | The Economics of Online Crime | Journal Article | Low:Technology | ||
| Moore, Tyler | Clayton, Richard | 2007 | Examining the Impact of Website Take-down on Phishing | Conf. Paper | Low:Technology | Pdf Alt Pdf |
| Moore, Tyler | Clayton, Richard | 2008 | The Consequence of Non-Cooperation in the Fight Against Phishing | Conf. Paper | Low:Technology; Low:Economics | Pdf Alt Pdf |
| Moore, Tyler | Clayton, Richard | 2009 | The Impact of Incentives on Notice and Take-down | Book Chapter | Moderate:Technology; Low:Law | |
| National Cyber Defense Initiative | 2009 | National Cyber Defense Financial Services Workshop Report | Independent Report | Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance | ||
| National Cyber Security Summit Task Force | 2004 | Information Security Governance | Government Report | Moderate:Executive Administration | ||
| National Institute of Standards and Technology | 2006 | SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security | Government Report | Moderate:Technology | ||
| National Research Council | 1999 | Trust in Cyberspace | Independent Report | Moderate:Technology | ||
| National Research Council | 2007 | Toward a Safer and More Secure Cyberspace | Independent Report | Low:Research Processes; Low:Technology | ||
| Nye, Joseph | 2010 | Cyber Power | Book Chapter | Low:Technology; Low:Policy | ||
| Powell, Benjamin | 2005 | Is Cybersecurity a Public Good | Law Review | Low/Moderate:Economics | Pdf AltPdf | |
| President's Commission on Critical Infrastructure Protection | 1997 | Critical Foundations | Government Report | None | ||
| Rotenberg et. al. | 2010 | The Cyber War Threat Has Been Grossly Exaggerated | Debate | None | Audio/Transcript | |
| Schmitt, Michael N., et. al | 2004 | Computers and War | Conf. Paper | Moderate:Law | ||
| Schmitt, Michael N. | 1999 | Computer Network Attack and the Use of Force in International Law | Law Review | High:Law | ||
| Schmitt, Michael N. | 2002 | Wired Warfare | Journal Article | Moderate:Law | ||
| Schneier, Bruce | 2003 | Beyond Fear | Book | None | Scribd | |
| Schneier, Bruce | 2008 | Schneier on Security | Book | None | Purchase | |
| Sklerov, Matthew J. | 2009 | Solving the Dilemma of State Responses to Cyberattacks | Law Review | Moderate:Law; Low:Technology | ||
| Stohl, Michael | 2006 | Cyber Terrorism | Journal Article | None | Purchase | |
| Symantec Corporation | 2010 | Symantec Global Internet Security Threat Report | Industry Report | Low/Moderate:Technology | ||
| Thomas, Rob | Martin, Jerry | 2006 | The Underground Economy | Journal Article | Low:Technology | |
| Todd, Graham H. | 2009 | Armed Attack in Cyberspace | Law Review | Moderate:Law | ||
| United States Secret Service | 2004 | Insider Threat Study | Government Report | None | ||
| Verizon | 2010 | 2010 Data Breach Investigations Report | Industry Report | Low:Technology | ||
| Watts, Sean | 2010 | Combatant Status and Computer Network Attack | Law Review | Moderate:Law |
Subcategories:
- Threats and Actors-> Actors and Incentives->States
- Threats and Actors-> Actors and Incentives->Groups
- Threats and Actors-> Actors and Incentives->Hacktivists
- Threats and Actors-> Actors and Incentives->Terrorists
- Threats and Actors-> Security Targets-> Public Critical Infrastructure->Government Networks (.gov)
- Threats and Actors-> Security Targets-> Public Critical Infrastructure->Military Networks (.mil)
- Threats and Actors-> Security Targets-> Private Critical Infrastructure->Electricity, Oil and Natural Gas
- Threats and Actors-> Security Targets-> Private Critical Infrastructure->Financial Institutions and Networks
- Threats and Actors-> Security Targets-> Private Critical Infrastructure->Transportation
- Threats and Actors-> Security Targets-> Private Critical Infrastructure->Water, Sewer, etc.
- Threats and Actors-> Security Targets-> Communications->Telephone
- Threats and Actors-> Security Targets-> Communications->Public Data Networks
- Threats and Actors-> Security Targets-> Communications->Cloud Computing