Difference between revisions of "Public-Private Cooperation"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 2: Line 2:
  
 
Aviram, Amitai and Tor, Avishalom (2004) [[Overcoming Impediments to Information Sharing]]
 
Aviram, Amitai and Tor, Avishalom (2004) [[Overcoming Impediments to Information Sharing]]
 
Korns, Stephen W.  (2009) [[Cyber Operations]]
 
  
 
Powell, Benjamin  (2005)  [[Is Cybersecurity a Public Good]]
 
Powell, Benjamin  (2005)  [[Is Cybersecurity a Public Good]]
Line 34: Line 32:
 
|-
 
|-
 
|Grady, Mark F.||Parisi, Francesco||2006||[[The Law and Economics of Cybersecurity]]||Book||Low:Economics; Low:Law||N/A
 
|Grady, Mark F.||Parisi, Francesco||2006||[[The Law and Economics of Cybersecurity]]||Book||Low:Economics; Low:Law||N/A
 +
|-
 +
|Korns, Stephen W.|| ||2009||[[Cyber Operations]]||Journal Article||Low:International Warfare||[http://www.carlisle.army.mil/DIME/documents/Cyber%20Operations%20-%20The%20New%20Balance%20-%20Korns.pdf ''Pdf'']
 
|-
 
|-
 
|Kramer, Franklin D., et. al||||2009||[[Cyberpower and National Security]]||Book||None||N/A
 
|Kramer, Franklin D., et. al||||2009||[[Cyberpower and National Security]]||Book||None||N/A

Revision as of 16:58, 11 August 2010

TOC-> Issues->Public-Private Cooperation

Aviram, Amitai and Tor, Avishalom (2004) Overcoming Impediments to Information Sharing

Powell, Benjamin (2005) Is Cybersecurity a Public Good

Author 1 Author 2 Year Title Source Expertise Full Text
Anderson, Ross, et. al 2008 Security Economics and the Internal Market Study Low:Economics Pdf
Center for Strategic and International Studies 2008 Securing Cyberspace for the 44th Presidency Independent Reports Low:Policy Pdf
Department of Commerce 2010 Defense Industrial Base Assessment Government Report None Pdf
Department of Defense 2007 Mission Impact of Foreign Influence on DoD Software Government Report Low:Defense Policy/Procurement Pdf
Department of Defense 2005 Strategy for Homeland Defense and Civil Support Government Report None Pdf
Department of Homeland Security 2009 A Roadmap for Cybersecurity Research Government Report Low:Technology Pdf
Department of Homeland Security 2003 The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets Government Report None Pdf
Energetics Inc. 2006 Roadmap to Secure Control Systems in the Energy Sector Independent Reports None Pdf
Grady, Mark F. Parisi, Francesco 2006 The Law and Economics of Cybersecurity Book Low:Economics; Low:Law N/A
Korns, Stephen W. 2009 Cyber Operations Journal Article Low:International Warfare Pdf
Kramer, Franklin D., et. al 2009 Cyberpower and National Security Book None N/A
Moore, Tyler Clayton, Richard 2008 The Consequence of Non-Cooperation in the Fight Against Phishing Conference Paper Low:Technology; Low:Economics Pdf Alt Pdf
Moore, Tyler, et. al 2009 The Economics of Online Crime Journal Article Low:Technology Pdf
National Cyber Security Summit Task Force 2004 Information Security Governance Government Report Moderate:Executive Administration Pdf
National Infrastructure Advisory Council 2004 Hardening The Internet Government Report High:Technology Pdf
National Research Council 1999 Trust in Cyberspace Independent Reports Moderate:Technology Pdf
White House 2009 Cyberspace Policy Review Government Report None Pdf
  • Subcategories: None

Jump to Table of Contents