Difference between revisions of "Regulation/Liability"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 1: Line 1:
 
''[[Table of Contents | TOC->]][[Approaches | Approaches->]][[Regulation/Liability]]''
 
''[[Table of Contents | TOC->]][[Approaches | Approaches->]][[Regulation/Liability]]''
 
Granick, Jennifer Stisa (2005) [[The Price of Restricting Vulnerability Publications]]
 
  
 
Johnson, Vincent R. (2005) [[Cybersecurity, Identity Theft, and the Limits of Tort Liability]]
 
Johnson, Vincent R. (2005) [[Cybersecurity, Identity Theft, and the Limits of Tort Liability]]
Line 47: Line 45:
 
|-
 
|-
 
|Grady, Mark F.||Parisi, Francesco||2006||[[The Law and Economics of Cybersecurity]]||Book||Low:Economics; Low:Law||N/A
 
|Grady, Mark F.||Parisi, Francesco||2006||[[The Law and Economics of Cybersecurity]]||Book||Low:Economics; Low:Law||N/A
 +
|-
 +
|Granick, Jennifer Stisa||||2005||[[The Price of Restricting Vulnerability Publications]]||Law Review||Low/Moderate:Law||[http://www.ijclp.net/files/ijclp_web-doc_10-cy-2004.pdf  ''Pdf'']
 
|-
 
|-
 
|Institute for Information Infrastructure Protection||||2003||[[Cyber Security Research and Development Agenda]]||Independent Reports||Low/None:Technology||[http://www.cyber.st.dhs.gov/docs/I3P%20Research%20Agenda%202003.pdf ''Pdf'']
 
|Institute for Information Infrastructure Protection||||2003||[[Cyber Security Research and Development Agenda]]||Independent Reports||Low/None:Technology||[http://www.cyber.st.dhs.gov/docs/I3P%20Research%20Agenda%202003.pdf ''Pdf'']

Revision as of 20:14, 19 August 2010

TOC-> Approaches->Regulation/Liability

Johnson, Vincent R. (2005) Cybersecurity, Identity Theft, and the Limits of Tort Liability

Lernard, Thomas M. and Rubin, Paul H. (2005) An Economic Analysis of Notification Requirements for Data Security Breaches

Lernard, Thomas M. and Rubin, Paul H. (2006) Much Ado About Notification

Powell, Benjamin (2005) Is Cybersecurity a Public Good

Romanosky et al. (2008) Do Data Breach Disclosure Laws Reduce Identity Theft

Schwartz, Paul and Janger, Edward (2007) Notification of Data Security Breaches

Swire, Peter P (2004) A Model for When Disclosure Helps Security

Swire, Peter P (2006) A Theory of Disclosure for Security and Competitive Reasons

Author 1 Author 2 Year Title Source Expertise Full Text
Anderson, Ross J. 2008 Security Engineering Book Moderate:Technology; Moderate:Cryptography N/A
Anderson, Ross 2001 Why Information Security is Hard Conf. Paper None Pdf AltPdf
Anderson, Ross Moore, Tyler 2006 The Economics of Information Security Journal Article Low:Economics Pdf

AltPdf

Anderson, Ross, et. al 2008 Security Economics and the Internal Market Study Low:Economics Pdf
Aviram, Amitai Tor, Avishalom 2004 Overcoming Impediments to Information Sharing Law Review Low:Economics Pdf SSRN
Camp, L. Jean Lewis, Stephen 2004 Economics of Information Security Book High:Economics N/A
Center for Strategic and International Studies 2008 Securing Cyberspace for the 44th Presidency Independent Reports Low:Policy Pdf
Epstein, Richard A. Brown, Thomas P. 2008 Cybersecurity in the Payment Card Industry Law Review Article Low:Law; Low:Economics Pdf
Grady, Mark F. Parisi, Francesco 2006 The Law and Economics of Cybersecurity Book Low:Economics; Low:Law N/A
Granick, Jennifer Stisa 2005 The Price of Restricting Vulnerability Publications Law Review Low/Moderate:Law Pdf
Institute for Information Infrastructure Protection 2003 Cyber Security Research and Development Agenda Independent Reports Low/None:Technology Pdf
Johnson, Eric M. 2008 Managing Information Risk and the Economics of Security Book High:Economics N/A
Korns, Stephen W. 2009 Cyber Operations Journal Article Low:International Warfare Pdf
Kramer, Franklin D., et. al 2009 Cyberpower and National Security Book None N/A
National Cyber Defense Initiative 2009 National Cyber Defense Financial Services Workshop Report Independent Report Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance Pdf
National Cyber Security Summit Task Force 2004 Information Security Governance Government Report Moderate:Executive Administration Pdf
National Research Council 2007 Toward a Safer and More Secure Cyberspace Independent Reports Low:Research Processes; Low:Technology Pdf
Schmitt, Michael N. 2002 Wired Warfare Journal Article Moderate:Law Pdf
Schmitt, Michael N., et. al 2004 Computers and War Conference Paper Moderate:Law Pdf
Schneier, Bruce 2008 Schneier on Security Book None Purchase
Sklerov, Matthew J. 2009 Solving the Dilemma of State Responses to Cyberattacks Law Review Moderate:Law; Low:Technology Pdf
Todd, Graham H. 2009 Armed Attack in Cyberspace Law Review Moderate:Law Pdf
White House 2009 Cyberspace Policy Review Government Report None Pdf
Zittrain, Jonathan L. 2008 The Future of the Internet and How To Stop It Book None Pdf
  • Subcategories: None

Jump to Table of Contents