-
1
-
-
84904416346
-
-
February 12,, 41 p., Accessed December 15, 2015
-
National Institute of Standards and Technology. Framework for Improving Critical Infrastructure Cybersecurity, February 12, 2014. 41 p. Available at: http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214-final.pdf, Accessed December 15, 2015.
-
(2014)
Framework for Improving Critical Infrastructure Cybersecurity
-
-
-
2
-
-
85029080900
-
-
October 14,, Accessed December 15, 2015
-
U.S. Department of Homeland Security. National Cybersecurity Protection System (NCPS), October 14, 2015. Available at: http://www.dhs.gov/national-cybersecurity-protection-system-ncps, Accessed December 15, 2015.
-
(2015)
National Cybersecurity Protection System (NCPS)
-
-
-
3
-
-
33749991949
-
Understanding regulation
-
Shleifer A. Understanding regulation. European Financial Management, 2005; 11(4):439–451.
-
(2005)
European Financial Management
, vol.11
, Issue.4
, pp. 439-451
-
-
Shleifer, A.1
-
4
-
-
85029122231
-
-
Arlington, VA, Mercatus Center at George Mason University, February, 4 p., Accessed December 15, 2015
-
Williams R, Adams M. Regulatory Overload. Arlington, VA: Mercatus Center at George Mason University, February 2012. 4 p. Report No.: 103. Available at: http://mercatus.org/sites/default/files/Regulatory_Overload_WilliamsAdams_MOP103.pdf, Accessed December 15, 2015.
-
(2012)
Regulatory Overload
-
-
Williams, R.1
Adams, M.2
-
5
-
-
84969264352
-
How to hack the hackers: The human side of cybercrime
-
Waldrop MM. How to hack the hackers: The human side of cybercrime. Nature, 2016; 533(7602):164–167.
-
(2016)
Nature
, vol.533
, Issue.7602
, pp. 164-167
-
-
Waldrop, M.M.1
-
6
-
-
84929251988
-
-
Washington, DC, Accessed December 15, 2015
-
U.S. Government Publishing Office. Code of Federal Regulations (Annual Edition). Washington, DC, 2015. Available at: https://www.gpo.gov/fdsys/browse/collectionCfr.action?collectionCode=CFR, Accessed December 15, 2015.
-
(2015)
Code of Federal Regulations (Annual Edition)
-
-
-
8
-
-
85026737590
-
-
Cheltenham, UK, March 15,, Accessed May 31, 2016
-
CESG, Government Communications Headquarters. Password Guidance: Simplifying Your Approach. Cheltenham, UK, March 15, 2016. Available at: https://www.cesg.gov.uk/guidance/password-guidance-simplifying-your-approach, Accessed May 31, 2016.
-
(2016)
Password Guidance: Simplifying Your Approach
-
-
-
9
-
-
84947490388
-
Percolation model of insider threats to assess the optimum number of rules
-
Kepner J, Gadepally V, Michaleas P. Percolation model of insider threats to assess the optimum number of rules. Environment Systems and Decisions, 2015; 35(4):504–510.
-
(2015)
Environment Systems and Decisions
, vol.35
, Issue.4
, pp. 504-510
-
-
Kepner, J.1
Gadepally, V.2
Michaleas, P.3
-
12
-
-
17844409803
-
-
Manchester, UK, University of Manchester, Accessed December 15, 2015
-
Ogus A. Comparing Regulatory Systems: Institutions, Processes and Legal Forms in Industrialised Countries. Manchester, UK: University of Manchester, 2002. Report No.: 35/2002. Available at: http://purl.umn.edu/30609, Accessed December 15, 2015.
-
(2002)
Comparing Regulatory Systems: Institutions, Processes and Legal Forms in Industrialised Countries
-
-
Ogus, A.1
-
13
-
-
0037401532
-
Safety goals in “risk-informed, performance-based” regulation
-
Saji G. Safety goals in “risk-informed, performance-based” regulation. Reliability Engineering & System Safety, 2003; 80(2):163–172.
-
(2003)
Reliability Engineering & System Safety
, vol.80
, Issue.2
, pp. 163-172
-
-
Saji, G.1
-
16
-
-
77955141180
-
-
Cambridge, MA, National Bureau of Economic Research, May, Report w15018., Accessed December 15, 2015
-
Aizenman J. Financial Crisis and the Paradox of Under- and Over-Regulation. Cambridge, MA: National Bureau of Economic Research, May 2009. Report No.: w15018. Available at: http://www.nber.org/papers/w15018.pdf, Accessed December 15, 2015.
-
(2009)
Financial Crisis and the Paradox of Under- and Over-Regulation
-
-
Aizenman, J.1
-
17
-
-
84901605504
-
Changing the resilience paradigm
-
Linkov I, Bridges T, Creutzig F, Decker J, Fox-Lent C, Kröger W, Lambert JH, Levermann A, Montreuil B, Nathwani J, Nyer R, Renn O, Scharte B, Scheffler A, Schreurs M, et al. Changing the resilience paradigm. Nature Climate Change, 2014; 4(6):407–409.
-
(2014)
Nature Climate Change
, vol.4
, Issue.6
, pp. 407-409
-
-
Linkov, I.1
Bridges, T.2
Creutzig, F.3
Decker, J.4
Fox-Lent, C.5
Kröger, W.6
Lambert, J.H.7
Levermann, A.8
Montreuil, B.9
Nathwani, J.10
Nyer, R.11
Renn, O.12
Scharte, B.13
Scheffler, A.14
Schreurs, M.15
-
19
-
-
85029070875
-
-
Washington, DC, February 9,, Accessed May 30, 2016
-
U.S. Census Bureau. U.S., NAICS Sectors, Larger Employment Sizes [Internet]. Washington, DC, February 9, 2016. Available at: http://www2.census.gov/econ/susb/data/2013/us_naicssector_large_emplsize_2013.xlsx, Accessed May 30, 2016.
-
(2016)
U.S., NAICS Sectors, Larger Employment Sizes [Internet]
-
-
-
20
-
-
0038483826
-
Emergence of scaling in random networks
-
Barabasi A. Emergence of scaling in random networks. Science, 1999; 286(5439):509–512.
-
(1999)
Science
, vol.286
, Issue.5439
, pp. 509-512
-
-
Barabasi, A.1
-
21
-
-
84955567691
-
Operational resilience: concepts, design and analysis
-
Ganin AA, Massaro E, Gutfraind A, Steen N, Keisler JM, Kott A, Mangoubi R, Linkov I. Operational resilience: concepts, design and analysis. Scientific Reports, 2016; 6:19540.
-
(2016)
Scientific Reports
, vol.6
, pp. 19540
-
-
Ganin, A.A.1
Massaro, E.2
Gutfraind, A.3
Steen, N.4
Keisler, J.M.5
Kott, A.6
Mangoubi, R.7
Linkov, I.8
-
22
-
-
4544247849
-
Redundancy as a design principle and an operating principle
-
Carroll JS. Redundancy as a design principle and an operating principle. Risk Analysis, 2004; 24(4):955–957.
-
(2004)
Risk Analysis
, vol.24
, Issue.4
, pp. 955-957
-
-
Carroll, J.S.1
-
23
-
-
4544264381
-
Thinking about how many guards will do the job
-
Bunn M. Thinking about how many guards will do the job. Risk Analysis, 2004; 24(4):949–953.
-
(2004)
Risk Analysis
, vol.24
, Issue.4
, pp. 949-953
-
-
Bunn, M.1
-
24
-
-
4544366486
-
The problem of redundancy problem: Why more nuclear security forces may produce less nuclear security
-
Sagan SD. The problem of redundancy problem: Why more nuclear security forces may produce less nuclear security. Risk Analysis, 2004; 24(4):935–946.
-
(2004)
Risk Analysis
, vol.24
, Issue.4
, pp. 935-946
-
-
Sagan, S.D.1
-
25
-
-
55349142134
-
How a system backfires: Dynamics of redundancy problems in security
-
Ghaffarzadegan N. How a system backfires: Dynamics of redundancy problems in security. Risk Analysis, 2008; 28(6):1669–1687.
-
(2008)
Risk Analysis
, vol.28
, Issue.6
, pp. 1669-1687
-
-
Ghaffarzadegan, N.1
-
26
-
-
70350780079
-
Cybersecurity: Stakeholder incentives, externalities, and policy options
-
Bauer JM, van Eeten MJG. Cybersecurity: Stakeholder incentives, externalities, and policy options. Telecommunications Policy, 2009; 33(10–11):706–719.
-
(2009)
Telecommunications Policy
, vol.33
, Issue.10-11
, pp. 706-719
-
-
Bauer, J.M.1
van Eeten, M.J.G.2
-
27
-
-
84936824601
-
Management support systems: Towards integrated knowledge management
-
Milan Z. Management support systems: Towards integrated knowledge management. Human Systems Management, 1987;(1):59–70.
-
(1987)
Human Systems Management
, Issue.1
, pp. 59-70
-
-
Milan, Z.1
-
28
-
-
85029075464
-
-
New York, NY Springer-Verlag,, P
-
Wood MD, Thorne S, Kovacs D, Butte G, Linkov I. Mental Modeling Approach: Risk management application case studies. New York, NY: Springer-Verlag, 2017; 251 P.
-
(2017)
Mental Modeling Approach: Risk management application case studies
, pp. 251
-
-
Wood, M.D.1
Thorne, S.2
Kovacs, D.3
Butte, G.4
Linkov, I.5
|