27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

References<br />

Merritt Baer<br />

Anderson, R. and Moore, T. (2006) “The Economics of Information Security,” Science Vol. 314 No. 5799, pp.<br />

610-613.<br />

Arnold, S. A., et al. (2009) "Can Profit Policy and Contract Incentives Improve Defense Contract Outcomes?"<br />

Institute for Defense Analyses, Washington, DC.<br />

Baer, M. (2010a) “Cyberstalking, and the Internet Landscape We Have Constructed.” Virginia Journal of Law and<br />

Technology 154 Vol. 15, No. 2.<br />

-- (2010b) “Cyber Attacks & the Ethical Dimension of the Google China Episode,” [online], Global Comment,<br />

http://globalcomment.com/2010/cyber-attacks-the-ethical-dimension-of-the-google-china-episode/<br />

Baker, S. (2010) “Cyberwar: What is it Good For?” ABA 20 th Annual Review of the Field of National Security Law,<br />

Washington, DC.<br />

Baram, M. (2009) “Wasteful Spending by Private Contractors in Afghanistan Climbs to $1 Billion, as their<br />

Numbers Multiply,” Huffington Post.<br />

Booz Allen Hamilton (2009) “Cyber In-Security: Strengthening the Federal Cybersecurity Workforce,” [online],<br />

http://www.ourpublicservice.org/OPS/publications/viewcontentdetails.php?id=135<br />

Calbreath, D. (2005) "MZM Scandal Illuminates Defense Contract Tactics," [online], Sign on San Diego,<br />

http://archives.signonsandiego.com/news/politics/cunningham/20050821-87-mzmscand.html<br />

Carney, J. (2010) “The War Against Wikileaks is Worse than Wikileaks,” [online], CNBC,<br />

http://www.cnbc.com/id/40551046/<br />

CBS News (2009) “Cyber War: Sabotaging the System” 60 Minutes,<br />

http://www.cbsnews.com/stories/2009/11/06/60minutes/main5555565_page1.shtml?tag=contentMain;conte<br />

ntBody<br />

Charney, S. (2009) “Reviewing the Federal Cybersecurity Mission,” Testimony Before the U.S. House Committee<br />

on Homeland Security Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology,<br />

Washington, DC.<br />

Clockbackward (2009) “Does Beauty Equal Truth in Physics and Math?” [online], Clockbackward Essays,<br />

http://www.clockbackward.com/2009/03/11/does-beauty-equal-truth-in-physics-and-math/<br />

DoD 45 th Annual Federal Forecast (2009) Department of Defense Special Topic Cyber Security: TechAmerica<br />

2009 Vision <strong>Conference</strong>, Washington, DC.<br />

Director of National Intelligence, “Vision 2015: A Globally Networked and Integrated Intelligence Enterprise,”<br />

[online], HYPERLINKhttp://www.dni.gov/Vision_2015.pdf<br />

Espiner, T. (2010) “Chertoff Advances Cyber Cold War,” [online], ZDNet UK<br />

http://www.zdnet.co.uk/news/security-threats/2010/10/14/chertoff-advocates-cyber-cold-war-40090538/<br />

Gal-Or, E. and Ghose, A. (2004), “The Economic Consequences of Sharing Security Information,” Economics of<br />

Information Security, Vol. 12, pp. 95-104.<br />

GAO Report to Congressional Committees (2009) "Defense Acquisitions: Assessments of Selected Weapons<br />

Plans," [online], http://www.gao.gov/new.items/d09326sp.pdf<br />

Geer, D., Jr., Sc.D. (2010) “Cybersecurity and National Policy,” Harvard National Security Journal, Vol. 1.<br />

Giesler, R. (2009) personal conversation with the author.<br />

Gilbert, D. (2007) “If Only Gay Sex Caused Global Warming,” Huffington Post.<br />

Goldsmith, J. (2010) “Can We Stop the Global Cyber Arms Race?” Washington Post.<br />

Hathaway, M. (2009) “Strategic Advantage: Why America Should Care About Cybersecurity,” Harvard Kennedy<br />

School, Cambridge, MA.<br />

Hamilton, S.N., Miller, W.L., Ott, A., and Saydjari, O.S. (2002) The Role of Game Theory in Information Warfare,<br />

and Challenges in Applying Game Theory to the Domain of Information Warfare, Fourth Information<br />

Survivability Workshop ISW-2001/2002, Vancouver, BC Canada<br />

Winands, M.H.M. (2004) “Informed Search in Complex Games,” Datawyse b.v., Maastricht, The Netherlands.<br />

Jamakka, J. and Mölsä, J.V.E. (2005) “Modeling Information Warfare as a Game,” Journal of Information Warfare<br />

Vol. 4, No. 2, pp. 12-25.<br />

Kahneman, D. and Renshon, J. (2006) “Why Hawks Win.” Foreign Policy.<br />

http://www.foreignpolicy.com/articles/2006/12/27/why_hawks_win<br />

Libicki, M. (1995) What is Information Warfare? National Defense University, Washington, DC.<br />

McCormick, G. H. and Owen, G. (2006) "A Game Model of Counterproliferation, with Multiple Entrants,"<br />

International Game Theory Review, Vol. 8, No. 3, pp. 339-353.<br />

Moscaritolo, A. (2009) “Industry Collaboration: Drumming Up Defenses,” SC Magazine.<br />

MSNBC (2007) “Defense Dept. warns about Canadian spy coins,” [online],<br />

http://www.msnbc.msn.com/id/16572783/<br />

National Research Council Committee on Offensive Information Warfare (2009) “Technology, Policy, Law and<br />

Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities,” The National Academies Press,<br />

Washington, DC.<br />

http://www.abanet.org/natsecurity/cybersecurity_readings/1final_report_cyberattack_nasnae.pdf<br />

Prince, B. (2010) “Microsoft: U.S. Home to Most Botnet PCs,” eWeek [online]<br />

http://www.eweek.com/c/a/Security/Microsoft-US-Home-to-Most-Botnet-PCs-216614/<br />

Project Honey Pot, (2009) “Our 1 Billionth Spam Message” [online]<br />

http://www.projecthoneypot.org/1_billionth_spam_message_stats.php<br />

30

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!