Is Cybersecurity a Public Good? Evidence from the Financial Services Industry |
Activities, Social Solutions |
Conflicts, Industry, Trade |
2001 |
Managing Online Security Risks |
Activities, Social Solutions |
Industry, Trade |
2000 |
An Economic Analysis of Notification Requirements for Data Security Breaches |
Activities, Social Solutions |
Conflicts, Industry, Trade |
2005 |
An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2011 |
An Introduction to Key Themes in the Economics of Cyber Security |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2006 |
Cyber-Insurance Revisited |
Activities, Social Solutions |
Conflicts, Industry, Trade |
2005 |
Cyber Security Research and Development Agenda |
Activities, Technical Solutions |
Conflicts, Industry |
2003 |
A Roadmap for Cybersecurity Research |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance |
2009 |
Research Agenda for the Banking and Finance Sector |
Activities, Technical Solutions |
Trade |
2008 |
Cyber Security in the Payment Card Industry |
Activities, Social Solutions |
Governance, Trade |
2008 |
Roadmap to Secure Control Systems in the Energy Sector |
Activities, Social Solutions |
Conflicts, Energy, Governance, Industry |
2006 |
A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict |
Activities, International Responses |
Conflicts, Governance, Industry |
2006 |
2010 Data Breach Investigations Report (DBIR) |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
The Economics of Online Crime |
Activities, Social Solutions, International Responses |
Governance, Industry, Trade |
2007 |
An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants |
Activities, Social Solutions, International Responses |
Governance, Industry, Trade |
2007 |
The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets |
Activities, Social Solutions |
Conflicts, Governance |
2003 |
Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point, or Patriot Games? |
Activities, Social Solutions, International Responses |
Conflicts |
2006 |
Critical Infrastructure Threats and Terrorism |
Activities, Social Solutions, International Responses |
Conflicts, Energy, Governance, Industry, Water |
2006 |
Solving the Dilemma of State Responses to Cyberattacks |
Activities, International Responses |
Conflicts, Governance |
2009 |
ICT for e-Environment Toolkit and the e-Environment Readiness Index (EERI) |
Activities, Problems, Technical Solutions |
Energy, Industry |
2009 |
Cyber-Deterrence |
Activities |
Conflicts, Industry |
2010 |
Information Society Statistical Profiles 2009 – Europe (v1.01) |
Activities, Technical Solutions, Social Solutions, International Responses |
Industry, Governance |
2009 |
Countering Urban Terrorism in Russia and the United States |
Activities |
Conflicts, Industry |
2006 |
ICT Regulatory Trends 2010 |
Activities, Technical Solutions, Social Solutions, International Responses |
Trade, Industry, Governance |
2010 |
Congress's Role in Cyber Warfare |
Activities |
Conflicts, Industry |
2010 |
Cyber Warfare and Precautions Against the Effects of Attacks |
Activities |
Conflicts, Industry |
2010 |
Information Society Statistical Profiles 2009 – Arab States |
Activities, Technical Solutions, Social Solutions, International Responses |
Industry, Governance |
2009 |
Information Assurance for Network-Centric Naval Forces |
Activities |
Conflicts, Industry |
2010 |
Information Society Statistical Profiles 2009 – Asia and the Pacific |
Activities, Technical Solutions, Social Solutions, International Responses |
Industry, Governance |
2009 |
Information Warfare and International Law |
Activities |
Conflicts, Industry |
1998 |
Combatant Status and Computer Network Attack |
Activities |
Conflicts, Industry |
2010 |
"Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework" |
Activities |
Conflicts, Industry |
1999 |
Information Warfare as International Coercion: Elements of a Legal Framework |
Activities |
Conflicts, Industry |
2001 |
Proceedings of a Workshop on Deterring CyberAttacks: Informing Strategies and Developing Options for U.S. Policy |
Activities, Social Solutions |
Conflicts, Industry |
2010 |
Information Society Statistical Profiles 2009 – Africa |
Activities, Technical Solutions, Social Solutions, International Responses |
Industry, Governance |
2009 |
Global Information Technology Report 2009-2010: ICT for Sustainability |
Activities, Problems, Social Solutions, International Responses |
Governance, Industry, Trade |
2010 |
Low-Intensity Computer Network Attack and Self-Defense |
Activities |
Conflicts, Industry |
2010 |
China's Electronic Strategies |
Activities |
Conflicts, Industry |
2001 |
Cyberwarfare: Law & Policy Proposals for U.S. & Global Governance - Updated |
Activities |
Conflicts, Industry |
2010 |
Information Society Statistical Profiles 2009 – Americas (v1.01) |
Activities, Technical Solutions, Social Solutions, International Responses |
Industry, Governance |
2009 |
Letter Report for the Committee on Deterring Cyberattacks |
Activities |
Conflicts, Industry |
2010 |
Exploit Derivatives and National Security |
Activities |
Conflicts, Industry |
2007 |
A Proposal for an International Convention on Cyber Crime and Terrorism |
Activities |
Conflicts, Industry |
2000 |
From Nuclear War to Net War: Analogizing Cyber Attacks in International Law |
Activities |
Conflicts, Industry |
2009 |
Information Society Statistical Profiles 2009 – CIS (Commonwealth Independent States) |
Activities, Technical Solutions, Social Solutions, International Responses |
Industry, Governance |
2009 |
Toward a Safer and More Secure Cyberspace |
Activities |
Conflicts, Industry |
2007 |
A Model for When Disclosure Helps Security: What is Different About Computer and Network Security? |
Activities |
Conflicts, Industry |
2004 |
Cyberwarfare and the Use of Force Giving Rise to the Right of Self-Defense |
Activities |
Conflicts, Industry |
2009 |
Multi-Stakeholder Partnerships for Bridging the Digital Divide – Draft Chairman’s Report |
Activities, Technical Solutions, International Responses |
Governance, Industry |
2005 |
The Millennium Development Goals Report 2011 |
Activities, Social Solutions, International Responses |
Unmet Needs, Governance |
2011 |