CISAC - Publications Page

Publications

Filter:

Filter results Close
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
Herbert Lin
Working Papers

A Research Agenda for Cyber Risk and Cyber Insurance

Gregory Falco, Martin Eling, Virginia Miller, Lawrence A. Gordon, Shaun Shuxun Wang, Joan Schmit, Russell Thomas, Mauro Elvedi, Thomas Maillart, Emy Donavan, Simon Dejung, Matthias Weber, Eric Durand, Franklin Nutter, Uzi Scheffer, Gil Arazi, Gilbert Ohana, Herbert Lin
The 2019 Workshop on the Economics of Information Security (WEIS) , 2020

A Research Agenda for Cyber Risk and Cyber Insurance

By: Gregory Falco, Stanford University

Martin Eling, University of St. Gallen

Danielle Jablanski, Stanford University

Virginia Miller, Stanford University

Lawrence A. Gordon, University of Maryland

Shaun Shuxun Wang, Nanyang Technological University

Joan Schmit, University of Wisconsin-Madison

Russell Thomas, RMS and George Mason University

Show body
Journal Articles

Cyber Risk Research Impeded by Disciplinary Barriers

Gregory Falco, Martin Eling, Danielle Jablanski, Matthias Weber, Virginia Miller, Lawrence A. Gordon, Shaun Shuxun Wang, Joan Schmit, Russell Thomas, Mauro Elvedi, Thomas Maillart, Emy Donavan, Simon Dejung, Eric Durand, Franklin Nutter, Uzi Scheffer, Gil Arazi, Gilbert Ohana, Herbert Lin
Science , 2019
Show body
Journal Articles

The Existential Threat From Cyber-enabled Information Warfare

Herbert Lin, Herbert Lin
Bulletin of the Atomic Scientists , 2019

Corruption of the information ecosystem is not just a multiplier of two long-acknowledged existential threats to the future of humanity—climate change and nuclear weapons. Cyber-enabled information warfare has also become an existential threat in its own right, its increased use posing the realistic possibility of a global information dystopia, in which the pillars of modern democratic self-government—logic, truth, and reality—are shattered, and anti-Enlightenment values undermine civilization around the world. 

 

Show body
Journal Articles

On the Organization of the U.S. Government for Responding to Adversarial Information Warfare and Influence Operations

Herbert Lin, Herbert Lin
I/S: A Journal of Law and Policy for the Information Society , 2019
Show body
Books

Bytes, Bombs, and Spies - The Strategic Dimensions of Offensive Cyber Operations

Herbert Lin, Herbert Lin, Amy Zegart
Brookings Institution Press , 2019

Offensive cyber operations have become increasingly important elements of U.S. national security policy. From the deployment of Stuxnet to disrupt Iranian centrifuges to the possible use of cyber methods against North Korean ballistic missile launches, the prominence of offensive cyber capabilities as instruments of national power continues to grow. Yet conceptual thinking lags behind the technical development of these new weapons. How might offensive cyber operations be used in coercion or conflict? What strategic considerations should guide their development and use?

Show body
Journal Articles

Introduction to the special issue on strategic dimensions of offensive cyber operations

Amy Zegart, Amy Zegart, Herb Lin, Herb Lin
Oxford Academic , 2017

Nations around the world recognize cybersecurity as a critical issue for public policy. They are concerned that their adversaries could conduct cyberattacks against their interests—damaging their military forces, their economies, and their political processes. Thus, their cybersecurity efforts have been devoted largely to protecting important information technology systems and networks against such attacks.

Show body
Working Papers

Attribution of Malicious Cyber Incidents: From Soup to Nuts

Herbert Lin, Herbert Lin
Social Science Research Network , 2016

Attribution of malicious cyber activities is a deep issue about which confusion and disquiet can be found in abundance. Attribution has many aspects—technical, political, legal, policy, and so on. A number of well-researched and executed papers cover one or more of these aspects, but integration of these aspects is usually left as an exercise for the analyst. This paper distinguishes between attribution of malicious cyber activity to a machine, to a specific human being pressing the keys that initiate that activity, and to a party that is deemed ultimately responsible for that activity.

Show body
Commentary

Maneuvering The China-U.S. Relationship in Cyberspace

Herbert Lin, Herbert Lin
Forbes , 2015

The article examines the impact of the summit between President Obama and President Xi on future cybersecurity relations between the two countries, and the changing nature of cyber cooperation and confrontation.

Show body
Journal Articles

Learning from the Sony Hack Attack

Herbert Lin
The Bulletin , 2015

As the fallout from the November 2014 cyber attack on Sony Pictures Entertainment continues, with Sony co-chairman Amy Pascal stepping down this month, it’s still not clear how the story will end, either for the Hollywood luminaries or U.S. national security. Herb Lin writes in this Bulletin of the Atomic Scientists piece that we can learn from the incident and start to formulate responses for the future attacks that will inevitably occur.

Show body