Difference between revisions of "Public-Private Cooperation"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 4: Line 4:
  
 
Center for Strategic and International Studies (2008) [[Securing Cyberspace for the 44th Presidency]]
 
Center for Strategic and International Studies (2008) [[Securing Cyberspace for the 44th Presidency]]
 
Department of Defense (2007) [[Mission Impact of Foreign Influence on DoD Software]]
 
  
 
Department of Defense (2005) [[Strategy for Homeland Defense and Civil Support]]
 
Department of Defense (2005) [[Strategy for Homeland Defense and Civil Support]]
Line 42: Line 40:
 
|-
 
|-
 
|Department of Commerce||||2010||[[Defense Industrial Base Assessment]]||Government Report||None||[http://www.bis.doc.gov/defenseindustrialbaseprograms/osies/defmarketresearchrpts/final_counterfeit_electronics_report.pdf  ''Pdf'']
 
|Department of Commerce||||2010||[[Defense Industrial Base Assessment]]||Government Report||None||[http://www.bis.doc.gov/defenseindustrialbaseprograms/osies/defmarketresearchrpts/final_counterfeit_electronics_report.pdf  ''Pdf'']
 +
|-
 +
|Department of Defense||||2007||[[Mission Impact of Foreign Influence on DoD Software]]||Government Report||Low:Defense Policy/Procurement||[http://www.cyber.st.dhs.gov/docs/Defense%20Science%20Board%20Task%20Force%20-%20Report%20on%20Mission%20Impact%20of%20Foreign%20Influence%20on%20DoD%20Software%20(2007).pdf  ''Pdf'']
 
|-
 
|-
 
|Grady, Mark F.||Parisi, Francesco||2006||[[The Law and Economics of Cybersecurity]]||Book||Low:Economics; Low:Law||N/A
 
|Grady, Mark F.||Parisi, Francesco||2006||[[The Law and Economics of Cybersecurity]]||Book||Low:Economics; Low:Law||N/A

Revision as of 15:10, 11 August 2010

TOC-> Issues->Public-Private Cooperation

Aviram, Amitai and Tor, Avishalom (2004) Overcoming Impediments to Information Sharing

Center for Strategic and International Studies (2008) Securing Cyberspace for the 44th Presidency

Department of Defense (2005) Strategy for Homeland Defense and Civil Support

Department of Homeland Security (2009) A Roadmap for Cybersecurity Research

Department of Homeland Security (2003) The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets

Energetics Inc. (2006) Roadmap to Secure Control Systems in the Energy Sector

Korns, Stephen W. (2009) Cyber Operations

Moore, Tyler and Clayton, Richard (2008) The Consequence of Non-Cooperation in the Fight Against Phishing

Moore, Tyler, et. al (2009) The Economics of Online Crime

National Cyber Security Summit Task Force (2004) Information Security Governance

National Infrastructure Advisory Council (2004) Hardening The Internet

National Research Council (1999) Trust in Cyberspace

Powell, Benjamin (2005) Is Cybersecurity a Public Good

White House (2009) Cyberspace Policy Review

Author 1 Author 2 Year Title Source Expertise Full Text
Department of Commerce 2010 Defense Industrial Base Assessment Government Report None Pdf
Department of Defense 2007 Mission Impact of Foreign Influence on DoD Software Government Report Low:Defense Policy/Procurement Pdf
Grady, Mark F. Parisi, Francesco 2006 The Law and Economics of Cybersecurity Book Low:Economics; Low:Law N/A
Kramer, Franklin D., et. al 2009 Cyberpower and National Security Book None N/A
  • Subcategories: None

Jump to Table of Contents