Cybersecurity

Recent Scholarly Publications

Records 34 / 34

How Much Is Enough? A Risk-Management Approach to Computer Security

August 2000

How much security is enough? No one today can satisfactorily answer this question for computer-related risks.

Critical Infrastructures: The Path Ahead (Proceedings of: XIWT symposium on Cross-Industry Activities for Information Infrastructure Robustness)

February 1999

The Cross-Industry Working Team (XIWT), with the support of Stanford University Consortium for Research on Information Security and Policy (CRISP), sponsored a symposium on cross-industry...

Regional Interest Group on Information Security: Sharing Information and Exploring Collaborative Opportunities

December 1998

On December 7, 1998, a cross-industry group of professionals interested in information security met to discuss perspectives on information security and prospects for multilateral cooperative...

Workshop on Protecting and Assuring Critical National Infrastructure: Next Steps

June 1998

The third Stanford-Livermore workshop in the series examining the protection of critical national infrastructures against cyber attack was held at Lawrence Livermore National Laboratory on February...

Review and Analysis of the Report of the President's Commission on Critical Infrastructure Protection

January 1998

In July 1996, President Clinton established the Commission on Critical Infrastructure Protection (PCCIP), with a charter to designate critical infrastructures, to assess their vulnerabilities, to...

Workshop on Protecting and Assuring Critical National Infrastructure: Setting the Research and Policy Agenda

October 1997

The July Workshop on Protecting and Assuring Critical National Infrastructure focused on three specific areas: international and legal issues relating to the control of network misuse and...

Workshop on Protecting and Assuring Critical National Infrastructure

July 1997

In July 1996, President Clinton established the Commission on Critical Infrastructure Protection, with a charter to designate critical infrastructures and assess their vulnerabilities, to recommend...

Public and Private Roles in the Protection of Critical Information-Dependent Infrastructure

May 1997

The discussion begins with a conceptual framework for addressing the protection of infrastructure systems subject to attacks on their information subsystems.

Strategic Information Warfare - A New Arena for Arms Control?

October 1996

Information warfare is a relatively new rubric, which is receiving increasing attention within the United States from both the government and the general population.

Building on the Basics: An Examination of High-Performance Computing Export Control Policy in the 1990s

November 1995

This paper reports the results of a study of the special export control regime for high-performance computers.
  •  

People

Benjamin Lawsky Benjamin Lawsky Cyber Initiative Visiting Scholar
stephen zoepf Stephen Zoepf Executive Director of the Center for Automotive Research at Stanford
Melissa Valentine Melissa Valentine Assistant Professor of Management Science and Engineering
Fei-Fei Li Fei-Fei Li Associate Professor of Computer Science
Sonoo Thadaney Sonoo Thadaney Israni Executive Director, Presence + Program in Bedside Medicine
Ronald Egan Ronald Egan Professor, East Asian Languages and Cultures
John Duchi John Duchi Assistant Professor of Statistics and Electrical Engineering and (by courtesy) Computer Science
Ben Calvert Ben Calvert Chief Information Security Officer at SLAC National Accelerator Laboratory
Lee Ross Lee Ross Stanford Federal Credit Union Professor of Psychology
Kostas Bimpikis Kostas Bimpikis Associate Professor, Operations, Information & Technology
Adam Segal Adam Segal Affiliate
susan athey Susan Athey Professor of Economics (by courtesy), Senior Fellow, Stanford Institute for Economic Policy Research