JOURNAL ARTICLES

ISA Authored Articles

2012-04-25  “Federal Red Tape Increases Threat of Cyberattacks,” by Larry Clinton.  Stars and Stripes

2011-10-00  “One Side Now: The Need to Adopt a Business Systems Approach to Cloud Security,” by Larry Clinton.  Journal of Software Technology, Vol.14, No.4

2011-05-00  “A Theory to Guide US Cyber Security Policy,” by Larry Clinton.  Cutter IT Journal, Vol. 24, No.5

2011-00-00  “A Relationship on the Rocks: Industry-Government Partnership for Cyber Defense,” by Larry Clinton.  Journal of Strategic Security, Vol.IV, Issue 2 2011

2009-09-00  “Education’s Critical Role in Cybersecurity,” by Larry Clinton.  EDUCAUSE, Sept-Oct 2009

 

Cutter IT Journal – “Securing Cyberspace: What Exactly Should We Be Doing?,” Featuring ISA Member and Partner Authors

2006-05-00  “Opening Statement,” by Larry Clinton (ISA).  Cutter IT Journal, Vol.19, No.5.  Guest Editor Larry Clinton

2006-05-00  “How to Stop Talking About – and Start Fixing – Cyber Security Problems,” by Bill Hancock (SecureInfo Corporation).  Cutter IT Journal, Vol.19, No.5.  Guest Editor Larry Clinton

2006-05-00  “Moving Beyond Security: The Resilience Imperative,” by Debra van Opstal (Council for Competitiveness).  Cutter IT Journal, Vol.19, No.5.  Guest Editor Larry Clinton

2006-05-00  “Contracting for Information Security in Commercial Transactions,” by Jeffrey Ritter, Esq. (Kirkpatrick & Lockhart).  Cutter IT Journal, Vol.19, No.5.  Guest Editor Larry Clinton

2006-05-00  “The Role of Cyber Insurance in Fighting the War on Terror,” by Ty Sagalow, Esq. (AIG).  Cutter IT Journal, Vol.19, No.5.  Guest Editor Larry Clinton

2006-05-00  “Payments System Security: No Longer Just a ‘Company Issue,’” by Steve Ruwe (Visa USA).  Cutter IT Journal, Vol.19, No.5.  Guest Editor Larry Clinton

2006-05-00  “Forging a Public-Private Partnership: The ‘Work-Free’ Approach to Cyber Security,” by Greg Garcia. (Information Technology Association of America).  Cutter IT Journal, Vol.19, No.5.  Guest Editor Larry Clinton

 

Cutter IT Journal – “Securing Cyberspace: Is It Time to Rethink Our Strategy?,” Featuring ISA Member and Partner Authors

2006-01-00  “Opening Statement,” by Larry Clinton (ISA).  Cutter IT Journal, Vol.19, No.1.  Guest Editor Larry Clinton

2006-01-00  “Cyber Risk Management: The Need for Effective Public and Private Partnership,” by Robert Stephan (U.S. DHS).  Cutter IT Journal, Vol.19, No.1.  Guest Editor Larry Clinton

2006-01-00  “Investing in Cyber Security: The Path to Good Practice,” by Shari Pfleeger (RAND Corp. – GMU Institute for Information Infrastructure Protection), et al.  Cutter IT Journal, Vol.19, No.1.  Guest Editor Larry Clinton

2006-01-00  “Securely Sustaining Software-Intensive Systems,” by Carol Woody (Carnegie Mellon University – Software Engineering Institute).  Cutter IT Journal, Vol.19, No.1.  Guest Editor Larry Clinton

2006-01-00  “Authentication Mechanisms You Can Bank On,” by Lee Imrey (U.S. DOJ).  Cutter IT Journal, Vol.19, No.1.  Guest Editor Larry Clinton

2006-01-00  “Security and Identity Management at Tata Consultancy Services,” by M. Vidyasagar (Tata Consultancy Services).  Cutter IT Journal, Vol.19, No.1.  Guest Editor Larry Clinton

2006-01-00  “Are We Ready to Face Next-Generation Spam,” by Charalampos Patrikakis (Univ. of Athens) and Anastasios Pallas (Univ. of Paisley).  Cutter IT Journal, Vol.19, No.1.  Guest Editor Larry Clinton

2005-09-14  “What Are You Afraid Of?  Risks, Roles, and Responsibilities in the Public-Private Partnership to Secure Cyberspace” by Larry Clinton.  Cutter Consortium Executive Update, Vol.2, No.15

2005-09-00  “Governance in the Age of IT,” by Larry Clinton.  Cutter IT Journal, Vol.18, No.9

2003-09-15  “On The Record,” Interview of Larry Clinton.  Government Executive Magazine

 

Articles Citing ISA Work

2011-00-00  “Overview and Analysis on Cyber Terrorism,” by Steve Saint-Claire.  School of Doctoral Studies (European Union) Journal, No.3

2010-08-13  “Will There Be Cybersecurity Legislation,” by John Grant.  Journal of National Security Law and Policy”

2006-04-00  “A Primer on Cryptography in Communications,” by Stamatios Kartalopoulos.  IEEE Communications Magazine

2004-11-08  “Cybersecurity and Authentication,” by Clyde Wayne Crews.  Competitive Enterprise Institute

2002-00-00  “Pervasive Health Care Applications Face Tough Security Challenges,” by Vince Stanford.  Pervasive Computing

2001-12-00  “The Code Red Worm,” by Hal Berghel.  Digital Village