Risk Management and Investment
TOC-> Issues-> Economics of Cybersecurity->Risk Management and Investment
| Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
|---|---|---|---|---|---|---|
| Anderson, Ross | 2001 | Why Information Security is Hard | Conf. Paper | None | Pdf AltPdf | |
| Anderson, Ross | Moore, Tyler | 2006 | The Economics of Information Security | Journal Article | Low:Economics | |
| Arora et al. | 2006 | Does Information Security Attack Frequency Increase With Vulnerability Disclosure | Journal Article | Moderate:Economics | ||
| Aviram, Amitai | Tor, Avishalom | 2004 | Overcoming Impediments to Information Sharing | Law Review | Low:Economics | Pdf SSRN |
| Camp, L. Jean | Lewis, Stephen | 2004 | Economics of Information Security | Book | High:Economics | N/A |
| Camp, L. Jean | Wolfram, Catherine | 2004 | Pricing Security | Book Chapter | Low:Economics | Web SSRN |
| Computing Research Association | 2003 | Four Grand Challenges in Trustworthy Computing | Independent Report | None | ||
| Department of Defense | 2007 | Mission Impact of Foreign Influence on DoD Software | Government Report | Low:Defense Policy/Procurement | ||
| Financial Services Sector Coordinating Council for Critical Infrastructure Protection | 2008 | Research Agenda for the Banking and Finance Sector | Independent Report | None | ||
| Franklin, Jason, et. al | 2007 | An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants | Conf. Paper | Low:Statistics; Low:Economics | Pdf Alt Pdf | |
| Grady, Mark F. | Parisi, Francesco | 2006 | The Law and Economics of Cybersecurity | Book | Low:Economics; Low:Law | N/A |
| Institute for Information Infrastructure Protection | 2003 | Cyber Security Research and Development Agenda | Independent Report | Low/None:Technology | ||
| Johnson, Eric M. | 2008 | Managing Information Risk and the Economics of Security | Book | High:Economics | N/A | |
| National Cyber Defense Initiative | 2009 | National Cyber Defense Financial Services Workshop Report | Independent Report | Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance | ||
| National Institute of Standards and Technology | 2006 | SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security | Government Report | Moderate:Technology | ||
| National Research Council | 2007 | Toward a Safer and More Secure Cyberspace | Independent Report | Low:Research Processes; Low:Technology | ||
| National Research Council | 1999 | Trust in Cyberspace | Independent Report | Moderate:Technology | ||
| Schneier, Bruce | 2008 | Schneier on Security | Book | None | Purchase | |
| van Eeten, Michel J. G. | Bauer, Johannes M. | 2008 | Economics of Malware | Non-US Govt. Report | Moderate:Economics | |
| Varian, Hal | 2000 | Managing Online Security Risks | Newspaper Article | None | Web | |
| Varian, Hal | 2004 | System Reliability and Free Riding | Book Chapter | High:Economics | Pdf AltPdf |
- Subcategories: None