Difference between revisions of "Public-Private Cooperation"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 2: Line 2:
  
 
Aviram, Amitai and Tor, Avishalom (2004) [[Overcoming Impediments to Information Sharing]]
 
Aviram, Amitai and Tor, Avishalom (2004) [[Overcoming Impediments to Information Sharing]]
 
Center for Strategic and International Studies (2008) [[Securing Cyberspace for the 44th Presidency]]
 
  
 
Energetics Inc. (2006) [[Roadmap to Secure Control Systems in the Energy Sector]]
 
Energetics Inc. (2006) [[Roadmap to Secure Control Systems in the Energy Sector]]
Line 26: Line 24:
 
! style="background-color: #efefef;" | Expertise
 
! style="background-color: #efefef;" | Expertise
 
! style="background-color: #efefef;" class="unsortable" | Full Text   
 
! style="background-color: #efefef;" class="unsortable" | Full Text   
 +
|-
 +
|Center for Strategic and International Studies||2008||[[Securing Cyberspace for the 44th Presidency]]||Independent Reports||Low:Policy||[http://www.cyber.st.dhs.gov/docs/081208_securingcyberspace_44.pdf ''Pdf'']
 
|-
 
|-
 
|Department of Commerce||||2010||[[Defense Industrial Base Assessment]]||Government Report||None||[http://www.bis.doc.gov/defenseindustrialbaseprograms/osies/defmarketresearchrpts/final_counterfeit_electronics_report.pdf  ''Pdf'']
 
|Department of Commerce||||2010||[[Defense Industrial Base Assessment]]||Government Report||None||[http://www.bis.doc.gov/defenseindustrialbaseprograms/osies/defmarketresearchrpts/final_counterfeit_electronics_report.pdf  ''Pdf'']

Revision as of 16:10, 11 August 2010

TOC-> Issues->Public-Private Cooperation

Aviram, Amitai and Tor, Avishalom (2004) Overcoming Impediments to Information Sharing

Energetics Inc. (2006) Roadmap to Secure Control Systems in the Energy Sector

Korns, Stephen W. (2009) Cyber Operations

Moore, Tyler and Clayton, Richard (2008) The Consequence of Non-Cooperation in the Fight Against Phishing

Moore, Tyler, et. al (2009) The Economics of Online Crime

National Research Council (1999) Trust in Cyberspace

Powell, Benjamin (2005) Is Cybersecurity a Public Good

Author 1 Author 2 Year Title Source Expertise Full Text
Center for Strategic and International Studies 2008 Securing Cyberspace for the 44th Presidency Independent Reports Low:Policy Pdf
Department of Commerce 2010 Defense Industrial Base Assessment Government Report None Pdf
Department of Defense 2007 Mission Impact of Foreign Influence on DoD Software Government Report Low:Defense Policy/Procurement Pdf
Department of Defense 2005 Strategy for Homeland Defense and Civil Support Government Report None Pdf
Department of Homeland Security 2009 A Roadmap for Cybersecurity Research Government Report Low:Technology Pdf
Department of Homeland Security 2003 The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets Government Report None Pdf
Grady, Mark F. Parisi, Francesco 2006 The Law and Economics of Cybersecurity Book Low:Economics; Low:Law N/A
Kramer, Franklin D., et. al 2009 Cyberpower and National Security Book None N/A
National Cyber Security Summit Task Force 2004 Information Security Governance Government Report Moderate:Executive Administration Pdf
National Infrastructure Advisory Council 2004 Hardening The Internet Government Report High:Technology Pdf
White House 2009 Cyberspace Policy Review Government Report None Pdf
  • Subcategories: None

Jump to Table of Contents