Template:Filtered Table
From Cybersecurity Wiki
Types
U.S. Government Report
U.S. Government Hearing
Non-U.S. Government Report
Independent Report
Industry Report
Book
Journal Article
Article
Categories
Exclude Subcatgeories
Search
Author/Agency | Date | Title | Type | Category | Synopsis |
---|---|---|---|---|---|
Anderson, Ross | 2001 | Why Information Security is Hard | Article | 4.2.1 Risk Management and Investment, 4.2.2 Incentives, 5.1 Regulation/Liability |
Yes |
Anderson, Ross | 2006 | The Economics of Information Security | Journal Article | 4.2 Economics of Cybersecurity, 5.1 Regulation/Liability, 5.7 Technology |
Yes |
Anderson, Ross J. | 2008 | Security Engineering | Book | 3.2 Security Targets, 4.2 Economics of Cybersecurity, 5.1 Regulation/Liability |
Yes |
Anderson, Ross, et. al | 2008 | Security Economics and the Internal Market | Study | 4.2 Economics of Cybersecurity, 4.11 Cybercrime, 5.6 Deterrence |
Yes |
Arora et al. | 2006 | Does Information Security Attack Frequency Increase With Vulnerability Disclosure | Journal Article | 4.2.1 Risk Management and Investment, 4.6 Information Sharing/Disclosure |
Yes |
Aviram, Amitai | 2004 | Overcoming Impediments to Information Sharing | Journal Article | 4.2.1 Risk Management and Investment, 4.6 Information Sharing/Disclosure, 4.7 Public-Private Cooperation |
Yes |
Barkham, Jason | 2001 | Information Warfare and International Law on the Use of Force | Journal Article | 3.2.1 States, 4.12 Cyberwar, 5.5 International Law (including Laws of War) |
Yes |
Beard, Jack M. | 2009 | Law and War in the Virtual Era | Journal Article | 4.12 Cyberwar, 5.5 International Law (including Laws of War) |
Yes |
Bohme, Rainer | 2005 | Cyber-Insurance Revisited | Article | 4.2.2 Incentives, 4.2.3 Insurance, ,4.2.5 Market Failure |
Yes |
Bohme, Rainer | 2006 | Models and Measures for Correlation in Cyber-Insurance | Article | 4.2.3 Insurance, 5.2 Private Efforts/Organizations |
Yes |
Bohme, Rainer | 2010 | Modeling Cyber-Insurance | Article | 4.2.2 Incentives, 4.2.3 Insurance, ,5.2 Private Efforts/Organizations |
Yes |
Booz Allen Hamilton and the Economist Intelligence Unit | 2012-01-15 | Cyber Power Index | Industry Report | 4. Issues, 4.1 Metrics, 5. Approaches |
No |
Brown, Davis | 2006 | A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict | Journal Article | 3.3.2.1 Military networks (.gov), 4.12 Cyberwar, 5.5 International Law (including Laws of War) |
Yes |
Business Roundtable | 2012-10-11 | Mission Critical: A Public-Private Strategy for Effective Cybersecurity | Independent Report | No | |
Business Software Alliance | 2012-02-02 | Global Cloud Computing Scorecard a Blueprint for Economic Opportunity | Industry Report | 3.3.3.3 Cloud Computing | No |
Business Software Alliance, Center for Democracy & Technology, U.S. Chamber of Commerce, Internet Security Alliance, Tech America | 2011-03-08 | Improving our Nation’s Cybersecurity through the Public-Private Partnership: a White Paper | Industry Report | 4.6 Information Sharing/Disclosure, 4.7 Public-Private Cooperation, 5. Approaches |
No |
Cabinet Office (United Kingdom) | 2012-11-11 | The UK Cyber Security Strategy: Protecting and promoting the UK in a digital world | Non-U.S. Government Report | 3. Threats and Actors, 4.7 Public-Private Cooperation, 5.3 Government Organizations |
No |
Camp, L. Jean | 2004 | Economics of Information Security | Book | 4.2 Economics of Cybersecurity, 5.1 Regulation/Liability |
Yes |
Camp, L. Jean | 2004 | Pricing Security | Book Chapter | 4.2.1 Risk Management and Investment, 4.2.2 Incentives |
Yes |
Center for a New American Security | 2012-06-11 | America’s Cyber Future: Security and Prosperity in the Information Age | Independent Report | 1. Overview, 4. Issues, 5. Approaches |
No |
Center for Strategic and International Studies | 2008 | Securing Cyberspace for the 44th Presidency | Independent Report | 4.7 Public-Private Cooperation, 5.1 Regulation/Liability, 5.4 International Cooperation |
Yes |
Centre for Secure Information Technologies | 2012-09-11 | World Cybersecurity Technology Research Summit (Belfast 2011) | Independent Report | No | |
Clarke, Richard A. | 2010 | Cyber War | Book | 3.1 The Threat and Skeptics, 3.2.1 States, 4.12 Cyberwar |
Yes |
Clinton, Larry | Undated | Cyber-Insurance Metrics and Impact on Cyber-Security | Online Paper | 4.2.3 Insurance, 5.2 Private Efforts/Organizations |
Yes |
Cloud Security Alliance | 2012-12-09 | Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 | Independent Report | 3.3.3.3 Cloud Computing, 4. Issues, 5.2 Private Efforts/Organizations |
No |
Showing 1 to 25 of 305 entries