• Corpus ID: 12905345

Cyber-Infrastructure Protection Policy : On Resolving Ostensibly Intractable Positions The Challenge : Integrate Industrial Organization

@inproceedings{Bagby2013CyberInfrastructurePP,
  title={Cyber-Infrastructure Protection Policy : On Resolving Ostensibly Intractable Positions The Challenge : Integrate Industrial Organization},
  author={John W. Bagby},
  year={2013}
}
Infrastructure challenges continue to drive considerable public policy debate. The nation’s economy relies very heavily on the combined provision of three critical infrastructures: energy, banking and finance, and information technology (IT). These three critical infrastructures are interconnected, interdependent and cross-cutting essential services to the whole economy. Indeed, the “incapacity or destruction of such systems and assets would have a debilitating impact on security, national… 

References

SHOWING 1-7 OF 7 REFERENCES

Evolving Institutional Structure and Public Policy Environment of Critical Infrastructures

  • J. Bagby
  • Political Science
    SSRN Electronic Journal
  • 2010
For the foreseeable future, the United States’ critical infrastructures will be a major focus for homeland security while contributing greatly to the prosperity of the states and the private sector.

Emerging Threats to Internet Security: Incentives, Externalities and Policy Implications

The rise of botnets is explained as the outcome of the incentive structures of market players and new empirical evidence on these incentives is presented, which has implications for the controversial debate on the appropriate policy measures.

arguing chronic potential for overinvestment in physical security inapplicable to information goods, therefore suggesting significant free riding)

  • arguing chronic potential for overinvestment in physical security inapplicable to information goods, therefore suggesting significant free riding)

org is one of several compilers of privacy breach notices, see: http://www.privacyrights.org 37 See e.g., Breach Notification for Unsecured Protected Health Information, 74 Fed

  • Reg
  • 2009

Code § § 56.06, 1785.11.2, 1798.29, 1798.82. California's S.B.1386 does not require encryption but exempts incidents from disclosure if the data lost in a breach is encrypted

  • Code § § 56.06, 1785.11.2, 1798.29, 1798.82. California's S.B.1386 does not require encryption but exempts incidents from disclosure if the data lost in a breach is encrypted

Chamber of Commerce, to Members of

  • Chamber of Commerce, to Members of
  • 2012

Jay) Rockefeller IV, Chairman, Senate Committee On Commerce

  • Science, & Transportation
  • 2012