China's Mass Surveillance More Sophisticated Than Thought |
Activities |
Industry |
2019 |
Facebook Data Breach Suggests the Public Sees Cybersecurity as Obsolete |
Technical Solutions |
Industry |
2019 |
The cyber-resilience of financial institutions: significance and applicability |
Social Solutions |
Trade |
2019 |
Cyberterrorism: its effects on psychological well-being, public confidence and political attitudes |
Activities |
Industry |
2019 |
Global Consequences of Escalating U.S.-Russia Cyber Conflict |
International Responses |
Industry |
2019 |
Internet of Things for Sustainability: Perspectives in Privacy, Cybersecurity, and Future Trends |
Technical Solutions |
Governance, Industry, Trade |
2019 |
On the Effectiveness of Machine and Deep Learning for Cyber Security |
Technical Solutions |
Industry |
2019 |
France’s New Offensive Cyber Doctrine |
Activities, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2019 |
Researchers Warn Open Sky Drone Policy Poses Cybercriminal Risk |
Social Solutions |
Industry |
2019 |
Trump’s cyber workforce order gets bipartisan praise |
Technical Solutions, International Responses |
Governance |
2019 |
The Second Amendment and the Struggle Over Cryptography |
Social Solutions |
Governance, Industry |
2019 |
Cybersecurity is Putting Customer Trust at the Center of Competition |
Social Solutions |
Industry |
2019 |
The Truth About Machine Learning in Cybersecurity: Defense |
Technical Solutions |
Industry |
2018 |
Tech Firms Sign ‘Digital Geneva Accord’ Not to Aid Governments in Cyberwar |
Technical Solutions |
Conflicts, Governance |
2018 |
The Prospects of Sustainable Desert Agriculture to Improve Food Security in Oman |
Problems |
Agriculture |
2018 |
Towards an Education Campaign for Fostering a Societal, Cyber Security Culture |
Activities |
Governance |
2018 |
National Snow and Ice Data Center |
Activities, Problems, Technical Solutions |
Energy |
2018 |
The Ancient History of Bitcoin |
Technical Solutions |
Governance, Trade |
2018 |
Using Offline Activities to Enhance Online Cybersecurity Education |
Social Solutions |
Industry |
2018 |
Analyzing the Great Firewall of China Over Space and Time |
Technical Solutions, Social Solutions |
Governance |
2018 |
Zero Waste Sustainability- A New Way of Living |
Social Solutions |
Consumption, Governance |
2018 |
Why Cybersecurity Is About More Than Prevention-Focused Products |
Technical Solutions |
Governance |
2018 |
Increasing International Cooperation in Cybersecurity and Adapting Cyber Norms |
Social Solutions, International Responses |
Industry |
2018 |
Taiwan Heist: Lazarus Tools and Ransomware |
Technical Solutions, Social Solutions, International Responses |
Governance, Industry |
2018 |
Sustainability of Population Growth |
Social Solutions |
Migration, Population |
2018 |
Open School of Sustainable Development (for Russian-speaking) |
Problems, Social Solutions |
Governance, Urbanization |
2018 |
Cybersecurity for the Nation: Workforce Development |
Social Solutions |
Industry |
2018 |
Surveillance Self-Defense |
Activities |
Governance |
2018 |
NSF Arctic Data Center |
Activities, Problems |
Consumption, Energy, Water |
2018 |
Human Rights and Hacktivism: The Cases of Wikileaks and Anonymous |
Activities, Social Solutions |
Conflicts, Governance |
2018 |
Freedom on the Net 2018: The Rise of Digital Authoritarianism |
Activities, Social Solutions, International Responses |
Industry |
2018 |
Why Cybersecurity Is About More Than Prevention-Focused Products |
Activities, Social Solutions |
Governance |
2018 |
Addressing the Private Sector Cybersecurity Predicament: The Indispensable Role of Insurance |
Social Solutions |
Industry |
2018 |
The Board’s Role in Managing Cybersecurity Risks |
Social Solutions |
Industry |
2018 |
Cyber Insecurity is Harming Emerging Markets |
Social Solutions |
Industry |
2018 |
The Serious Problem of Nuclear Waste |
Problems |
Energy |
2018 |
Corporate Cybersecurity Is Becoming Geopolitical. Are U.S. Tech Companies Ready? |
Social Solutions |
Industry |
2018 |
Brute Force Attacks Conducted by Cyber Actors |
Social Solutions |
Industry |
2018 |
Weak and Strong Sustainability |
Activities, Problems |
Trade |
2018 |
The SDG Academy (education) |
Activities, Problems, Technical Solutions, Social Solutions, International Responses |
Energy, Land Use, Governance, Population, Urbanization, Water |
2018 |
The US Leans on Private Firms to Expose Foreign Hackers |
Social Solutions, International Responses |
Industry |
2018 |
Increasing International Cooperation in Cybersecurity and Adapting Cyber Norms |
Social Solutions, International Responses |
Conflicts, Governance |
2018 |
Social engineering in cybersecurity: The evolution of a concept |
Social Solutions |
Governance |
2018 |
100 Resilient Cities |
Activities, Problems, Social Solutions |
Governance, Population, Urbanization |
2018 |
The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies |
Activities, Problems, Technical Solutions, Social Solutions, International Responses |
Industry |
2018 |
A problem shared is a problem halved:
A survey on the dimensions of collective cyber defense through security information sharing |
Activities, Technical Solutions |
Governance, Industry |
2018 |
A New, More Aggressive U.S. Cybersecurity Policy Complements Traditional Methods |
Social Solutions |
Industry |
2018 |
Machine Learning in Cybersecurity |
Technical Solutions |
Industry |
2018 |
The Private Sector: A Reluctant Partner in Cybersecurity |
Activities, Social Solutions |
Governance |
2018 |
How Will Artificial Intelligence And Machine Learning Impact Cyber Security?” |
Technical Solutions |
Industry |
2018 |