Cyber-Infrastructure Protection Policy : On Resolving Ostensibly Intractable Positions The Challenge : Integrate Industrial Organization
@inproceedings{Bagby2013CyberInfrastructurePP, title={Cyber-Infrastructure Protection Policy : On Resolving Ostensibly Intractable Positions The Challenge : Integrate Industrial Organization}, author={John W. Bagby}, year={2013} }
Infrastructure challenges continue to drive considerable public policy debate. The nation’s economy relies very heavily on the combined provision of three critical infrastructures: energy, banking and finance, and information technology (IT). These three critical infrastructures are interconnected, interdependent and cross-cutting essential services to the whole economy. Indeed, the “incapacity or destruction of such systems and assets would have a debilitating impact on security, national…
References
SHOWING 1-7 OF 7 REFERENCES
Evolving Institutional Structure and Public Policy Environment of Critical Infrastructures
- Political ScienceSSRN Electronic Journal
- 2010
For the foreseeable future, the United States’ critical infrastructures will be a major focus for homeland security while contributing greatly to the prosperity of the states and the private sector.…
Emerging Threats to Internet Security: Incentives, Externalities and Policy Implications
- Computer Science
- 2009
The rise of botnets is explained as the outcome of the incentive structures of market players and new empirical evidence on these incentives is presented, which has implications for the controversial debate on the appropriate policy measures.
arguing chronic potential for overinvestment in physical security inapplicable to information goods, therefore suggesting significant free riding)
- arguing chronic potential for overinvestment in physical security inapplicable to information goods, therefore suggesting significant free riding)
org is one of several compilers of privacy breach notices, see: http://www.privacyrights.org 37 See e.g., Breach Notification for Unsecured Protected Health Information, 74 Fed
- Reg
- 2009
Code § § 56.06, 1785.11.2, 1798.29, 1798.82. California's S.B.1386 does not require encryption but exempts incidents from disclosure if the data lost in a breach is encrypted
- Code § § 56.06, 1785.11.2, 1798.29, 1798.82. California's S.B.1386 does not require encryption but exempts incidents from disclosure if the data lost in a breach is encrypted
Chamber of Commerce, to Members of
- Chamber of Commerce, to Members of
- 2012
Jay) Rockefeller IV, Chairman, Senate Committee On Commerce
- Science, & Transportation
- 2012