| Author 1
|
Author 2
|
Year
|
Title
|
Source
|
Expertise
|
Full Text
|
| Anderson, Ross J. |
|
2008 |
Security Engineering |
Book |
Moderate:Technology; Moderate:Cryptography |
N/A
|
| Anderson, Ross, et. al |
|
2008 |
Security Economics and the Internal Market |
Study |
Low:Economics |
Pdf
|
| Anderson, Ross |
|
2001 |
Why Information Security is Hard |
Conf. Paper |
None |
Pdf AltPdf
|
| Anderson, Ross |
Moore, Tyler |
2006 |
The Economics of Information Security |
Journal Article |
Low:Economics |
Pdf AltPdf
|
| Arora et al. |
|
2006 |
Does Information Security Attack Frequency Increase With Vulnerability Disclosure |
Journal Article |
Moderate:Economics |
Pdf
|
| Aviram, Amitai |
Tor, Avishalom |
2004 |
Overcoming Impediments to Information Sharing |
Law Review |
Low:Economics |
Pdf SSRN
|
| Barkham, Jason |
|
2001 |
Information Warfare and International Law on the Use of Force |
Law Review |
Moderate:Law |
Pdf Alt Pdf
|
| Beard, Jack M. |
|
2009 |
Law and War in the Virtual Era |
Law Review |
Low:Law |
Pdf
|
| Bohme, Rainer |
|
2005 |
Cyber-Insurance Revisited |
Conf. Paper |
High:Economics |
Pdf
|
| Bohme, Rainer |
Kataria, Gaurav |
2006 |
Models and Measures for Correlation in Cyber-Insurance |
Conf. Paper |
High:Economics |
Pdf
|
| Bohme, Rainer |
Schwartz, Galina |
2010 |
Modeling Cyber-Insurance |
Conf. Paper |
High:Economics |
Pdf
|
| Brown, Davis |
|
2006 |
A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict |
Law Review |
Moderate:Law |
Pdf
|
| Camp, L. Jean |
Lewis, Stephen |
2004 |
Economics of Information Security |
Book |
High:Economics |
N/A
|
| Camp, L. Jean |
Wolfram, Catherine |
2004 |
Pricing Security |
Book Chapter |
Low:Economics |
Web SSRN
|
| Center for Strategic and International Studies |
|
2008 |
Securing Cyberspace for the 44th Presidency |
Independent Reports |
Low:Policy |
Pdf
|
| Clarke, Richard A. |
Knake, Robert |
2010 |
Cyber War |
Book |
None |
N/A
|
| Clinton, Larry |
|
Undated |
Cyber-Insurance Metrics and Impact on Cyber-Security |
Online Paper |
Low:Technology; Low:Law |
Pdf
|
| Computer Economics, Inc. |
|
2007 |
2007 Malware Report |
Industry Report |
None |
Purchase
|
| Computing Research Association |
|
2003 |
Four Grand Challenges in Trustworthy Computing |
Independent Reports |
None |
Pdf
|
| Department of Commerce |
|
2010 |
Defense Industrial Base Assessment |
Government Report |
None |
Pdf
|
| Department of Defense |
|
1999 |
An Assessment of International Legal Issues in Information Operations |
Government Report |
Moderate:Law |
Pdf
|
| Department of Defense |
|
2005 |
Strategy for Homeland Defense and Civil Support |
Government Report |
None |
Pdf
|
| Department of Defense |
|
2007 |
Mission Impact of Foreign Influence on DoD Software |
Government Report |
Low:Defense Policy/Procurement |
Pdf
|
| Department of Homeland Security |
|
2003 |
The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets |
Government Report |
None |
Pdf
|
| Department of Homeland Security |
|
2009 |
A Roadmap for Cybersecurity Research |
Government Report |
Low:Technology |
Pdf
|
| Deputy Chief of Staff for Intelligence |
|
2006 |
Critical Infrastructure Threats and Terrorism |
Government Report |
Low:Organizational Analysis; Low:Risk Management |
Pdf
|
| Dörmann, Knut |
|
2004 |
Applicability of the Additional Protocols to Computer Network Attacks |
Independent Reports |
Low:Law |
Pdf
|
| Dunlap, Charles J. Jr. |
|
2009 |
Towards a Cyberspace Legal Regime in the Twenty-First Century |
Speech |
None |
N/A
|
| Energetics Inc. |
|
2006 |
Roadmap to Secure Control Systems in the Energy Sector |
Independent Reports |
None |
Pdf
|
| Epstein, Richard A. |
Brown, Thomas P. |
2008 |
Cybersecurity in the Payment Card Industry |
Law Review |
Low:Law; Low:Economics |
Pdf
|
| Financial Services Sector Coordinating Council for Critical Infrastructure Protection |
|
2008 |
Research Agenda for the Banking and Finance Sector |
Independent Reports |
None |
Pdf
|
| Franklin, Jason, et. al |
|
2007 |
An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants |
Conf. Paper |
Low:Statistics; Low:Economics |
Pdf Alt Pdf
|
| Gandal, Neil |
|
2008 |
An Introduction to Key Themes in the Economics of Cyber Security |
Book Chapter |
Low:Economics |
Pdf
|
| Grady, Mark F. |
Parisi, Francesco |
2006 |
The Law and Economics of Cybersecurity |
Book |
Low:Economics; Low:Law |
N/A
|
| Granick, Jennifer Stisa |
|
2005 |
The Price of Restricting Vulnerability Publications |
Law Review |
Low/Moderate:Law |
Pdf
|
| Hollis, Duncan B. |
|
2007 |
Why States Need an International Law for Information Operations |
Law Review |
Moderate:Law |
Pdf
|
| Institute for Information Infrastructure Protection |
|
2003 |
Cyber Security Research and Development Agenda |
Independent Reports |
Low/None:Technology |
Pdf
|
| Johnson, Eric M. |
|
2008 |
Managing Information Risk and the Economics of Security |
Book |
High:Economics |
N/A
|
| Johnson, Vincent R. |
|
2005 |
Cybersecurity, Identity Theft, and the Limits of Tort Liability |
Law Review |
Moderate:Law |
Pdf AltPdf
|
| Kobayashi, Bruce H. |
|
2006 |
An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods |
Journal Article |
High:Economics |
Pdf
|
| Korns, Stephen W. |
|
2009 |
Cyber Operations |
Journal Article |
Low:International Warfare |
Pdf
|
| Kramer, Franklin D., et. al |
|
2009 |
Cyberpower and National Security |
Book |
None |
N/A
|
| Lernard, Thomas M. |
Rubin, Paul H. |
2005 |
An Economic Analysis of Notification Requirements for Data Security Breaches |
Online Paper |
Low:Economics |
Pdf
|
| Lernard, Thomas M. |
Rubin, Paul H. |
2006 |
Much Ado About Notification |
Journal Article |
Low:Economics |
Pdf SSRN
|
| McAfee, Inc. |
|
2010 |
McAfee Threats Report |
Industry Report |
None |
Pdf
|
| Moore, Tyler, et. al |
|
2009 |
The Economics of Online Crime |
Journal Article |
Low:Technology |
Pdf
|
| Moore, Tyler |
Clayton, Richard |
2007 |
Examining the Impact of Website Take-down on Phishing |
Conf. Paper |
Low:Technology |
Pdf AltPdf
|
| Moore, Tyler |
Clayton, Richard |
2008 |
The Consequence of Non-Cooperation in the Fight Against Phishing |
Conf. Paper |
Low:Technology; Low:Economics |
Pdf Alt Pdf
|
| Moore, Tyler |
Clayton, Richard |
2009 |
The Impact of Incentives on Notice and Take-down |
Book Chapter |
Moderate:Technology; Low:Law |
Pdf
|
| National Cyber Defense Initiative |
|
2009 |
National Cyber Defense Financial Services Workshop Report |
Independent Report |
Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance |
Pdf AltPdf
|
| National Cyber Security Summit Task Force |
|
2004 |
Information Security Governance |
Government Report |
Moderate:Executive Administration |
Pdf AltPdf
|
| National Infrastructure Advisory Council |
|
2004 |
Hardening The Internet |
Government Report |
High:Technology |
Pdf AltPdf
|
| National Institute of Standards and Technology |
|
2006 |
SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security |
Government Report |
Moderate:Technology |
Pdf
|
| National Research Council |
|
1999 |
Trust in Cyberspace |
Independent Reports |
Moderate:Technology |
Pdf
|
| National Research Council |
|
2007 |
Toward a Safer and More Secure Cyberspace |
Independent Reports |
Low:Research Processes; Low:Technology |
Pdf
|
| National Science and Technology Council |
|
2006 |
Federal Plan for Cyber Security and Information Assurance Research and Development |
Government Report |
None |
Pdf
|
| Networking and Information Technology Research and Development |
|
2009 |
National Cyber Leap Year Summit 2009, Co-Chairs' Report |
Government Report |
None |
Pdf
|
| Nye, Joseph |
|
2010 |
Cyber Power |
Book Excerpt |
Low:Technology; Low:Policy |
Pdf
|
| Powell, Benjamin |
|
2005 |
Is Cybersecurity a Public Good |
Law Review |
Low/Moderate:Economics |
Pdf AltPdf
|
| President's Commission on Critical Infrastructure Protection |
|
1997 |
Critical Foundations |
Government Report |
None |
Pdf
|
| President's Information Technology Advisory Council |
|
2005 |
Cyber Security: A Crisis of Prioritization |
Government Report |
None |
Pdf
|
| Romanosky et al. |
|
2008 |
Do Data Breach Disclosure Laws Reduce Identity Theft |
Moderate:Economics |
Conf. Paper |
Pdf
|
| Rotenberg et. al. |
|
2010 |
The Cyber War Threat Has Been Grossly Exaggerated |
Debate |
None |
Audio/Transcript
|
| Schmitt, Michael N., et. al |
|
2004 |
Computers and War |
Conf. Paper |
Moderate:Law |
Pdf
|
| Schmitt, Michael N. |
|
1999 |
Computer Network Attack and the Use of Force in International Law |
Law Review |
High:Law |
Pdf
|
| Schmitt, Michael N. |
|
2002 |
Wired Warfare |
Journal Article |
Moderate:Law |
Pdf
|
| Schneier, Bruce |
|
2003 |
Beyond Fear |
Book |
None |
Scribd
|
| Schneier, Bruce |
|
2008 |
Schneier on Security |
Book |
None |
Purchase
|
| Schwartz, Paul |
Janger, Edward |
2007 |
Notification of Data Security Breaches |
Law Review |
Low:Law; Low:Economics |
Pdf
|
| Sklerov, Matthew J. |
|
2009 |
Solving the Dilemma of State Responses to Cyberattacks |
Law Review |
Moderate:Law; Low:Technology |
Pdf
|
| Stohl, Michael |
|
2006 |
Cyber Terrorism |
Journal Article |
None |
Purchase
|
| Swire, Peter P. |
|
2004 |
A Model for When Disclosure Helps Security |
Law Review |
Low/Moderate:Logic |
PdfSSRN
|
| Swire, Peter P. |
|
2006 |
A Theory of Disclosure for Security and Competitive Reasons |
Law Review |
Low/Moderate:Logic |
SSRN
|
| Symantec Corporation |
|
2010 |
Symantec Global Internet Security Threat Report |
Industry Report |
Low/Moderate:Technology |
Pdf
|
| Telang, Rahul |
Wattal, Sunil |
2007 |
Impact of Software Vulnerability Announcements on the Market Value of Software Vendors |
Journal Article |
Moderate:Economics |
Pdf
|
| Thomas, Rob |
Martin, Jerry |
2006 |
The Underground Economy |
Journal Article |
Low:Technology |
Pdf
|
| Todd, Graham H. |
|
2009 |
Armed Attack in Cyberspace |
Law Review |
Moderate:Law |
Pdf
|
| Trend Micro Incorporated |
|
2010 |
Trend Micro Annual Report |
Industry Report |
Moderate:Technology |
Pdf
|
| United States Secret Service |
|
2004 |
Insider Threat Study |
Government Report |
None |
Pdf
|
| van Eeten, Michel J. G. |
Bauer, Johannes M. |
2008 |
Economics of Malware |
Non-US Govt. Report |
Moderate:Economics |
Pdf
|
| Varian, Hal |
|
2000 |
Managing Online Security Risks |
Newspaper Article |
None |
Web
|
| Varian, Hal |
|
2004 |
System Reliability and Free Riding |
Book Chapter |
High:Economics |
Pdf AltPdf
|
| Verizon |
|
2010 |
2010 Data Breach Investigations Report |
Industry Report |
Low:Technology |
Pdf
|
| Watts, Sean |
|
2010 |
Combatant Status and Computer Network Attack |
Law Review |
Moderate:Law |
Pdf
|
| White House |
|
2003 |
The National Strategy to Secure Cyberspace |
Government Report |
None |
Pdf
|
| White House |
|
2010 |
The Comprehensive National Cybersecurity Initiative |
Government Report |
None |
Pdf
|
| White House |
|
2009 |
Cyberspace Policy Review |
Government Report |
None |
Pdf
|
| Zittrain, Jonathan L. |
|
2008 |
The Future of the Internet and How To Stop It |
Book |
None |
Pdf
|