This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. You can access the new platform at https://opencasebook.org. Thank you.
Edit playlist item notes below to have a mix of public & private notes, or:MAKE ALL NOTES PUBLIC (2/2 playlist item notes are public) MAKE ALL NOTES PRIVATE (0/2 playlist item notes are private)
|1||Show/Hide More||Jack Goldsmith, The New Vulnerability, The New Republic, Jun 7, 2010|
|2||Show/Hide More||2.2.2.a Failure of Market Incentives (cost-burden asymmetry)|
|2.1||Show/Hide More||Seymour E. Goodman and Herbert S. Lin, Toward a Safer and More Secure Cyberspace, Ch. 6.4: The Economics of Cybersecurity, National Research Council, 2007, pp. 142-165|
|2.2||Show/Hide More||Tyler Moore, Introducing the Economics of Cybersecurity: Principles and Policy Options, Proceedings of a Workshop on Deterring CyberAttacks: Informing Strategies and Developing Options for U.S. Policy, 2010|
May 21, 2013
Jack Goldsmith and a Berkman Center Cybersecurity Team
This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. If you would like access to the new version of the H2O platform and have not already been contacted by a member of our team, please contact us at firstname.lastname@example.org. Thank you.