Difference between revisions of "Privacy"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 2: Line 2:
  
 
Anderson, Ross and Moore, Tyler (2006)  [[The Economics of Information Security]]
 
Anderson, Ross and Moore, Tyler (2006)  [[The Economics of Information Security]]
 
Camp, and L. Jean and Lewis, Stephen (2004) [[Economics of Information Security]]
 
  
 
Department of Homeland Security (2009) [[A Roadmap for Cybersecurity Research]]
 
Department of Homeland Security (2009) [[A Roadmap for Cybersecurity Research]]
Line 14: Line 12:
  
 
Schneier, Bruce (2008) [[Schneier on Security]]
 
Schneier, Bruce (2008) [[Schneier on Security]]
 +
 +
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
 +
|-
 +
! style="background-color: #efefef;" | Author 1
 +
! style="background-color: #efefef;" | Author 2
 +
! style="background-color: #efefef;" | Year
 +
! style="background-color: #efefef;" | Title
 +
! style="background-color: #efefef;" | Source
 +
! style="background-color: #efefef;" | Expertise
 +
! style="background-color: #efefef;" class="unsortable" | Full Text 
 +
|-
 +
|Camp, L. Jean||Lewis, Stephen||2004||[[Economics of Information Security]]||Book||High:Economics||N/A
 +
|}
  
 
*'''''Subcategories:''''' ''None''
 
*'''''Subcategories:''''' ''None''
  
 
''[[Table of Contents| Jump to Table of Contents]]''
 
''[[Table of Contents| Jump to Table of Contents]]''

Revision as of 14:17, 11 August 2010

TOC-> Issues->Privacy

Anderson, Ross and Moore, Tyler (2006) The Economics of Information Security

Department of Homeland Security (2009) A Roadmap for Cybersecurity Research

Dunlap, Charles J. Jr. (2009) Towards a Cyberspace Legal Regime in the Twenty-First Century

Johnson, Vincent R. (2005) Cybersecurity, Identity Theft, and the Limits of Tort Liability

Schneier, Bruce (2003) Beyond Fear

Schneier, Bruce (2008) Schneier on Security

Author 1 Author 2 Year Title Source Expertise Full Text
Camp, L. Jean Lewis, Stephen 2004 Economics of Information Security Book High:Economics N/A
  • Subcategories: None

Jump to Table of Contents