ISA Authored Articles
2012-04-25 “Federal Red Tape Increases Threat of Cyberattacks,” by Larry Clinton. Stars and Stripes
2011-10-00 “One Side Now: The Need to Adopt a Business Systems Approach to Cloud Security,” by Larry Clinton. Journal of Software Technology, Vol.14, No.4
2011-05-00 “A Theory to Guide US Cyber Security Policy,” by Larry Clinton. Cutter IT Journal, Vol. 24, No.5
2011-00-00 “A Relationship on the Rocks: Industry-Government Partnership for Cyber Defense,” by Larry Clinton. Journal of Strategic Security, Vol.IV, Issue 2 2011
2009-09-00 “Education’s Critical Role in Cybersecurity,” by Larry Clinton. EDUCAUSE, Sept-Oct 2009
Cutter IT Journal – “Securing Cyberspace: What Exactly Should We Be Doing?,” Featuring ISA Member and Partner Authors
2006-05-00 “Opening Statement,” by Larry Clinton (ISA). Cutter IT Journal, Vol.19, No.5. Guest Editor Larry Clinton
2006-05-00 “How to Stop Talking About – and Start Fixing – Cyber Security Problems,” by Bill Hancock (SecureInfo Corporation). Cutter IT Journal, Vol.19, No.5. Guest Editor Larry Clinton
2006-05-00 “Moving Beyond Security: The Resilience Imperative,” by Debra van Opstal (Council for Competitiveness). Cutter IT Journal, Vol.19, No.5. Guest Editor Larry Clinton
2006-05-00 “Contracting for Information Security in Commercial Transactions,” by Jeffrey Ritter, Esq. (Kirkpatrick & Lockhart). Cutter IT Journal, Vol.19, No.5. Guest Editor Larry Clinton
2006-05-00 “The Role of Cyber Insurance in Fighting the War on Terror,” by Ty Sagalow, Esq. (AIG). Cutter IT Journal, Vol.19, No.5. Guest Editor Larry Clinton
2006-05-00 “Payments System Security: No Longer Just a ‘Company Issue,’” by Steve Ruwe (Visa USA). Cutter IT Journal, Vol.19, No.5. Guest Editor Larry Clinton
2006-05-00 “Forging a Public-Private Partnership: The ‘Work-Free’ Approach to Cyber Security,” by Greg Garcia. (Information Technology Association of America). Cutter IT Journal, Vol.19, No.5. Guest Editor Larry Clinton
Cutter IT Journal – “Securing Cyberspace: Is It Time to Rethink Our Strategy?,” Featuring ISA Member and Partner Authors
2006-01-00 “Opening Statement,” by Larry Clinton (ISA). Cutter IT Journal, Vol.19, No.1. Guest Editor Larry Clinton
2006-01-00 “Cyber Risk Management: The Need for Effective Public and Private Partnership,” by Robert Stephan (U.S. DHS). Cutter IT Journal, Vol.19, No.1. Guest Editor Larry Clinton
2006-01-00 “Investing in Cyber Security: The Path to Good Practice,” by Shari Pfleeger (RAND Corp. – GMU Institute for Information Infrastructure Protection), et al. Cutter IT Journal, Vol.19, No.1. Guest Editor Larry Clinton
2006-01-00 “Securely Sustaining Software-Intensive Systems,” by Carol Woody (Carnegie Mellon University – Software Engineering Institute). Cutter IT Journal, Vol.19, No.1. Guest Editor Larry Clinton
2006-01-00 “Authentication Mechanisms You Can Bank On,” by Lee Imrey (U.S. DOJ). Cutter IT Journal, Vol.19, No.1. Guest Editor Larry Clinton
2006-01-00 “Security and Identity Management at Tata Consultancy Services,” by M. Vidyasagar (Tata Consultancy Services). Cutter IT Journal, Vol.19, No.1. Guest Editor Larry Clinton
2006-01-00 “Are We Ready to Face Next-Generation Spam,” by Charalampos Patrikakis (Univ. of Athens) and Anastasios Pallas (Univ. of Paisley). Cutter IT Journal, Vol.19, No.1. Guest Editor Larry Clinton
2005-09-14 “What Are You Afraid Of? Risks, Roles, and Responsibilities in the Public-Private Partnership to Secure Cyberspace” by Larry Clinton. Cutter Consortium Executive Update, Vol.2, No.15
2005-09-00 “Governance in the Age of IT,” by Larry Clinton. Cutter IT Journal, Vol.18, No.9
2003-09-15 “On The Record,” Interview of Larry Clinton. Government Executive Magazine
Articles Citing ISA Work
2011-00-00 “Overview and Analysis on Cyber Terrorism,” by Steve Saint-Claire. School of Doctoral Studies (European Union) Journal, No.3
2010-08-13 “Will There Be Cybersecurity Legislation,” by John Grant. Journal of National Security Law and Policy”
2006-04-00 “A Primer on Cryptography in Communications,” by Stamatios Kartalopoulos. IEEE Communications Magazine
2004-11-08 “Cybersecurity and Authentication,” by Clyde Wayne Crews. Competitive Enterprise Institute
2002-00-00 “Pervasive Health Care Applications Face Tough Security Challenges,” by Vince Stanford. Pervasive Computing
2001-12-00 “The Code Red Worm,” by Hal Berghel. Digital Village