Page 220 - Privacy in a Cyber Age Policy and Practice
P. 220

208  NOTES

           11.  However, the U.S. Chamber of Commerce endorsed the Cybersecurity Act of
              2013, which “would codify NIST’s role in developing the Cybersecurity Frame-
              work.” Hogan Lovells Privacy Team, “U.S. Cybersecurity Policy Developments:
              A Year-to-Date Roundup,” The International Association of Privacy Professionals
              https://www.privacyassociation.org/privacy_tracker/post/u.s._cybersecurity_
              policy_developments_a_year_to_date_roundup (accessed June 29, 2014).
           12.  James A. Lewis, “Innovation and Cybersecurity Regulation,” Center for Strategic
              and International Studies, http://csis.org/files/media/csis/pubs/090327_lewis_
              innovation_cybersecurity.pdf (accessed June 29, 2014). Here, faith-based
              refers to the assumption that the private sector will act in good faith to secure
              its networks and computers against cyber attacks.
           13.  James A. Lewis, “Innovation and Cybersecurity Regulation”.
           14. Daniel Kahneman, Thinking, Fast and Slow (New York: Farrar, Straus and Gir-
              oux, 2011).
           15.  Danny Yadron, “Boards Race to Fortify Cybersecurity,” The Wall Street Journal,
              http://www.wsj.com/articles/boards-race-to-bolster-cybersecurity-
              1404086146 (accessed June 30, 2014).
           16.  Nathan Alexander Sales, “Regulating Cyber-Security,” Northwestern University
              Law Review 107, 4 (Summer 2013): 1508.
           17.  Danny Yadron, “Boards Race to Fortify Cybersecurity.”
           18.  Ken Dilanian, “U.S. Chamber of Commerce Leads Defeat of Cyber-security
              Bill,”  Los Angeles Times,  http://articles.latimes.com/2012/aug/03/nation/la-
              na-cyber-security-20120803 (accessed June 29, 2014).
           19.  Danny Yadron, “Companies Wrestle with the Cost of Cybersecurity.”
           20.  Kevin Coleman, “Meeting the Cost of Cybersecurity,” Defense News. http://
              www.defensenews.com/article/M5/20140325/C4ISRNET18/303250028/
              Meeting-cost-cybersecurity (accessed June 29, 2014).
           21.  Amitai Etzioni, “Cybersecurity in the Private Sector,”  Issues in Science and
              Technology 28,1 (Fall 2011): 58–62.
           22.  Alexander Botting, “Cybersecurity in the Private Sector—Playing Catch-up,”
              The Hill,  http://thehill.com/blogs/congress-blog/technology/205883-cyber-
              security-in-the-private-sector-playing-catch-up (accessed June 29, 2014).
           23.  Emily R. Caron, “Target Data Breach and NIST Cybersecurity Framework
              Raise Tough Insurance Questions,” Lathrop & Gage, LLP, https://law.ku.edu/
              sites/law.ku.edu/files/docs/media_law/2014/Media_Privacy_Beyond.pdf
              (accessed June 29, 2014).
           24.  Ariel Yehezkel and Thomas Michael, “Cybersecurity: Breaching the Board-
              room,” Sheppard Mullin Richter & Hampton LLP, http://www.sheppardmullin.
              com/media/article/1280_MCC-Cybersecurity-Breaching%20The%20Board-
              room.pdf (accessed June 29, 2014).
           25.  Alina Selyukh, Ros Krasny, and Chris Reese, “Senate Cybersecurity Bill Gives
              Firms Liability Protection for Sharing Data,” Insurance Journal, http://www.
              insurancejournal.com/news/national/2014/04/30/327968.htm (accessed June
              29, 2014).
           26.  Alina Selyukh, Ros Krasny, and Chris Reese, “Senators Ready to Try Again on U.S.
              Cybersecurity Legislation,” Reuters, http://www.reuters.com/article/2014/04/30/
   215   216   217   218   219   220   221   222   223   224   225