User contributions
Jump to navigation
Jump to search
- 10:12, 4 June 2010 diff hist 0 An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods
- 10:11, 4 June 2010 diff hist -9 An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods
- 10:08, 4 June 2010 diff hist 0 An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods
- 15:30, 3 June 2010 diff hist +2,213 N A Model for When Disclosure Helps Security: What Is Different About Computer and Network Security New page: ==Full Title of Reference== A Model for When Disclosure Helps Security: What is Different About Computer and Network Security? ==Full Citation== Peter P. Swire, ''A Model for When D...
- 15:29, 3 June 2010 diff hist 0 A Theory of Disclosure for Security and Competitive Reasons: Open Source, Proprietary Software, and Government Systems Undo revision 467 by Intern2 (Talk) current
- 15:28, 3 June 2010 diff hist 0 A Theory of Disclosure for Security and Competitive Reasons: Open Source, Proprietary Software, and Government Systems →Full Citation
- 15:23, 3 June 2010 diff hist +129 Information Sharing/Disclosure
- 15:22, 3 June 2010 diff hist 0 A Theory of Disclosure for Security and Competitive Reasons: Open Source, Proprietary Software, and Government Systems →Full Citation
- 15:18, 3 June 2010 diff hist +37 A Theory of Disclosure for Security and Competitive Reasons: Open Source, Proprietary Software, and Government Systems →Full Citation
- 15:11, 3 June 2010 diff hist +1,660 N A Theory of Disclosure for Security and Competitive Reasons: Open Source, Proprietary Software, and Government Systems New page: ==Full Title of Reference== ==Full Citation== Peter P. Swire, ''A Theory of Disclosure for Security and Competitive Reasons: Open Source, Proprietary Software, and Government Systems'', ...
- 15:07, 3 June 2010 diff hist -1 Information Sharing/Disclosure
- 15:06, 3 June 2010 diff hist +4 Much Ado About Notification: Does the Rush to Pass State-Level Data Security Regulations Benefit Consumers →Full Citation
- 15:05, 3 June 2010 diff hist +1 Information Sharing/Disclosure
- 15:05, 3 June 2010 diff hist +149 Information Sharing/Disclosure
- 14:55, 3 June 2010 diff hist +71 Much Ado About Notification: Does the Rush to Pass State-Level Data Security Regulations Benefit Consumers →Full Citation
- 14:53, 3 June 2010 diff hist -2 Much Ado About Notification: Does the Rush to Pass State-Level Data Security Regulations Benefit Consumers →Full Citation
- 14:53, 3 June 2010 diff hist +1,403 N Much Ado About Notification: Does the Rush to Pass State-Level Data Security Regulations Benefit Consumers New page: ==Full Title of Reference== Much Ado About Notification: Does the Rush to Pass State-Level Data Security Regulations Benefit Consumers? ==Full Citation== Thomas M. Lenard and Paul H. Ru...
- 14:39, 3 June 2010 diff hist +162 Information Sharing/Disclosure
- 12:30, 3 June 2010 diff hist 0 An Economic Analysis of Notification Requirements for Data Security Breaches
- 12:29, 3 June 2010 diff hist +6 An Economic Analysis of Notification Requirements for Data Security Breaches →Full Citation
- 12:29, 3 June 2010 diff hist +790 N An Economic Analysis of Notification Requirements for Data Security Breaches New page: ==Full Title of Reference== An Economic Analysis of Notification Requirements for Data Security Breaches ==Full Citation== Thomas M. Lenard and Paul H. Rubin, ''An Economic Analysis of N...
- 12:26, 3 June 2010 diff hist +4 An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods
- 12:26, 3 June 2010 diff hist +1,605 N An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods New page: ==Full Title of Reference== An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and other Public Security Goods ==Full Citation== Bruce H. Kobayashi (2...
- 12:22, 3 June 2010 diff hist +155 Economics of Cybersecurity
- 12:12, 3 June 2010 diff hist +1,749 N Models and Measures for Correlation in Cyber-Insurance New page: ==Full Title of Reference== Models and Measures for Correlation in Cyber-Insurance ==Full Citation== Rainer Bohme, ''Models and Measures for Correlation in Cyber-Insurance'', Workshop on...
- 12:08, 3 June 2010 diff hist +105 Insurance
- 12:05, 3 June 2010 diff hist +131 Information Sharing/Disclosure
- 11:47, 3 June 2010 diff hist +35 Do Data Breach Disclosure Laws Reduce Identity Theft
- 11:47, 3 June 2010 diff hist +2,119 N Do Data Breach Disclosure Laws Reduce Identity Theft New page: ==Do Data Breach Disclosure Laws Reduce Identity Theft?== Sasha Romanosky, Rahul Telang, Alessandro Acquisti, ''Do Data Breach Disclosure Laws Reduce Identity Theft'' (2007). [http://wei...
- 11:33, 3 June 2010 diff hist +86 Information Sharing/Disclosure
- 11:25, 3 June 2010 diff hist -1 The Price of Restricting Vulnerability Publications
- 11:25, 3 June 2010 diff hist +1,931 N The Price of Restricting Vulnerability Publications New page: ==The Price of Restricting Vulnerability Publications== Jennifer Stisa Granick, ''The Price of Restricting Vulnerability Publications'' (2007). [http://www.ijclp.net/files/ijclp_web-doc_...
- 11:19, 3 June 2010 diff hist +92 Information Sharing/Disclosure
- 11:10, 3 June 2010 diff hist +1 Notification of Data Security Breaches
- 11:10, 3 June 2010 diff hist +1,987 Notification of Data Security Breaches
- 11:06, 3 June 2010 diff hist +152 N Notification of Data Security Breaches New page: http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&action=viewsource&startkey=Schwartz_Janger:2007&keyword=schwartz&f=wikibiblio.bib
- 11:06, 3 June 2010 diff hist +89 Information Sharing/Disclosure
- 10:41, 3 June 2010 diff hist +2,274 N Does Information Security Attack Frequency Increase With Vulnerability Disclosure - An Empirical Analysis New page: ==Does Information Security Attack Frequency Increase With Vulnerability Disclosure? - An Empirical Analysis== Ashish Arora, Anand Nandkumar, Rahul Telang, ''Does Information Security Att...
- 10:40, 3 June 2010 diff hist +1 Information Sharing/Disclosure
- 10:40, 3 June 2010 diff hist 0 Information Sharing/Disclosure
- 10:36, 3 June 2010 diff hist +2,132 Does Information Security Attack Frequency Increase With Vulnerability Disclosure
- 10:32, 3 June 2010 diff hist +142 N Does Information Security Attack Frequency Increase With Vulnerability Disclosure New page: http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&action=viewsource&startkey=Arora_Nandkumar_Telang:2006&f=wikibiblio.bib
- 10:31, 3 June 2010 diff hist +134 Information Sharing/Disclosure
- 10:13, 3 June 2010 diff hist -93 Impact of Software Vulnerability Announcements on the Market Value of Software Vendors - An Empirical Investigation
- 10:12, 3 June 2010 diff hist +2,278 N Impact of Software Vulnerability Announcements on the Market Value of Software Vendors - An Empirical Investigation New page: ==Impact of Software Vulnerability Announcements on the Market Value of Software Vendors== ==Impact of Software Vulnerability Announcements on the Market Value of Software Vendors - An Em...
- 10:06, 3 June 2010 diff hist -1 Information Sharing/Disclosure
- 10:06, 3 June 2010 diff hist +1 Information Sharing/Disclosure
- 10:06, 3 June 2010 diff hist +1 Information Sharing/Disclosure
- 10:06, 3 June 2010 diff hist +163 Information Sharing/Disclosure
- 10:05, 3 June 2010 diff hist +2 Information Sharing/Disclosure
- 10:03, 3 June 2010 diff hist +2 Information Sharing/Disclosure
- 18:10, 2 June 2010 diff hist -21 Economics of Malware: Security Decisions, Incentives and Externalities →Full Citation
- 18:10, 2 June 2010 diff hist +17 Economics of Malware: Security Decisions, Incentives and Externalities →Categorization
- 18:09, 2 June 2010 diff hist +764 N Economics of Malware: Security Decisions, Incentives and Externalities New page: ==Full Title of Reference== Economics of Malware: Security Decisions, Incentives and Externalities ==Full Citation== ''Bluebook Style'' Michel J. G. van Eeten and Johannes M. Bauer (200...
- 18:02, 2 June 2010 diff hist +136 Economics of Cybersecurity
- 17:30, 2 June 2010 diff hist 0 Private Versus Social Incentives in Cybersecurity: Law and Economics current
- 17:30, 2 June 2010 diff hist +7 Private Versus Social Incentives in Cybersecurity: Law and Economics
- 17:28, 2 June 2010 diff hist +520 N Private Versus Social Incentives in Cybersecurity: Law and Economics New page: ==Full Title of Reference== Private Versus Social Incentives in Cybersecurity: Law and Economics ==Full Citation== The Law and Economics of Cybersecurity. [www.law.gmu.edu/faculty/pape...
- 17:27, 2 June 2010 diff hist 0 Strategy for Homeland Defense and Civil Support →Full Citation
- 17:27, 2 June 2010 diff hist +1,575 N Strategy for Homeland Defense and Civil Support New page: ==Full Title of Reference== Strategy for Homeland Defense and Civil Support ==Full Citation== Department of Defense (2005) Strategy for Homeland Defense and Civil Support. U.S. Governme...
- 17:22, 2 June 2010 diff hist -1 Incentives
- 17:22, 2 June 2010 diff hist +5 Incentives
- 17:19, 2 June 2010 diff hist +1 Public Critical Infrastructure
- 17:19, 2 June 2010 diff hist +85 Public Critical Infrastructure
- 16:05, 2 June 2010 diff hist -20 The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets
- 16:04, 2 June 2010 diff hist -1 The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets →Categorization
- 16:03, 2 June 2010 diff hist +97 The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets
- 15:57, 2 June 2010 diff hist +694 N The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets New page: ==Full Title of Reference== The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets ==Full Citation== ''Bluebook Style'' Department of Homeland Sec...
- 15:56, 2 June 2010 diff hist +96 N Incentives New page: Kobayashi, Bruce ''(2006)'' Private Versus Social Incentives in Cybersecurity: Law and Economics
- 15:53, 2 June 2010 diff hist +15 Public Critical Infrastructure
- 15:50, 2 June 2010 diff hist +4 Public Critical Infrastructure
- 15:50, 2 June 2010 diff hist +120 N Public Critical Infrastructure New page: Department of Homeland Security ''(2003)'' The National Strategy for the Physical Protection of Critical Infrastructures
- 15:44, 2 June 2010 diff hist +1,488 N Cyber-Insurance Revisited New page: ==Full Title of Reference== Cyber-Insurance Revisited ==Full Citation== Rainer Bohme, ''Cyber-Insurance Revisited'', Internet Security Alliance (2005). [http://infosecon.net/workshop/pd...
- 15:35, 2 June 2010 diff hist +56 Insurance
- 15:26, 2 June 2010 diff hist -96 Insurance
- 15:25, 2 June 2010 diff hist +100 Insurance
- 15:25, 2 June 2010 diff hist 0 Cyber-Insurance Metrics and Impact on Cyber-Security →Full Citation
- 15:24, 2 June 2010 diff hist -3 Cyber-Insurance Metrics and Impact on Cyber-Security
- 15:22, 2 June 2010 diff hist +711 N Cyber-Insurance Metrics and Impact on Cyber-Security New page: ==Full Title of Reference== Cyber-Insurance Metrics and Impact on Cyber-Security ==Full Citation== Larry Clinton, ''Cyber-Insurance Metrics and Impact on Cyber-Security'', Internet Secur...
- 15:21, 2 June 2010 diff hist -98 Overcoming Impediments to Information Sharing
- 15:12, 2 June 2010 diff hist +685 N Overcoming Impediments to Information Sharing New page: Contents [hide] * 1 Overcoming Impediments to Information Sharing * 2 Full Citation * 3 Categorization * 4 Key Words * 5 Synopsis * 6 Additional Notes and Highligh...
- 15:09, 2 June 2010 diff hist +1 Insurance
- 15:09, 2 June 2010 diff hist +80 N Insurance New page: Clinton Larry ''(Undated)'' Cyber-Insurance Metrics and Impact on Cyber-Security
- 15:00, 2 June 2010 diff hist +4 Information Sharing/Disclosure
- 14:59, 2 June 2010 diff hist +86 N Information Sharing/Disclosure New page: Aviram, Amitai and Tor, Avishalom (2003) Overcoming Impediments to Information Sharing