Chapter 3

  • Toward a Safer and More Secure Cyberspace (2007)
  • Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities (2009)

Chapter 4

  • Cryptography’s Role in Securing the Information Society (1996)
  • Who Goes There? Authentication Through the Lens of Privacy (2003)
  • Toward a Safer and More Secure Cyberspace (2007)
  • Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities (2009)
  • Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop (2010)
  • Letter Report from the Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy (2010)

Chapter 5

  • Toward a Safer and More Secure Cyberspace (2007)
  • Engaging Privacy and Information Technology in a Digital Age (2007)
  • Assessing the Impacts of Changes in the Information Technology R&D Ecosystem: Retaining Leadership in an Increasingly Global Environment (2009)
  • Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities (2009)

Chapter 6

  • Toward a Safer and More Secure Cyberspace (2007)
  • Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities (2009)


The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement