2012-2017 Defense Intelligence Agency Strategy |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2012 |
The Convergence of Cyberspace and Sustainability |
Activities, Social Solutions, International Responses |
Consumption, Energy, Governance |
2012 |
Power Hackers: The U.S. Smart Grid is Shaping Up to be Dangerously Insecure |
Activities |
Energy, Governance |
2012 |
Social Network Analysis of Kuwait Publicly-Held Corporations |
Activities, Social Solutions |
Governance, Trade |
2012 |
Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2012 |
Transforming governance and institutions for global sustainability: key insights from the Earth System Governance Project |
Activities, Problems, Social Solutions |
Governance |
2012 |
The Next 50 Years: A Personal View |
Activities |
Governance, Industry |
2012 |
Rejuvenating the transport sector in Iraq |
Activities, Problems |
Mobility |
2012 |
Everything you need to know about Wikileaks |
Activities |
Governance |
2012 |
Non-Security – Premise of Cybercrime |
Activities, Technical Solutions |
Industry |
2012 |
Information Technology Adoption and Political Regimes |
Activities |
Governance, Industry |
2012 |
Kuwait’s Parliament: An Experiment in Semi-democracy |
Activities |
Governance, Migration, Urbanization |
2012 |
China's Cyberassault on America |
Activities |
Governance |
2012 |
Environment in the United Nations System |
Activities, Social Solutions |
Governance |
2012 |
Climate change, the monsoon, and rice yield in India |
Activities, Problems |
Agriculture, Water |
2012 |
Ruling the Arab Internet: An analysis of Internet Ownership Trends of Six Arab Countries |
Activities |
Governance, Industry, Trade |
2012 |
Cyber Politics: Understanding the Use of Social Media for Dissident Movements in an Integrated State Stability Framework |
Activities |
Conflicts, Governance |
2012 |
Reports on Energy -- US National Academies, Division on Engineering and Physical Sciences |
Activities |
Energy |
2012 |
Cybersecurity: Authoritative Reports and Resources |
Activities |
Governance |
2013 |
Country Analysis Briefs |
Activities |
Consumption, Energy |
2013 |
Regulation and Supervision Bureau |
Activities, Problems, Technical Solutions, Social Solutions, International Responses |
Consumption, Energy, Governance, Water |
2013 |
The Federal Bureau of Investigation's Ability to Address the National Cyber Intrusion Threat |
Activities, Social Solutions |
Governance |
2013 |
The national determinants of deforestation in sub-Saharan Africa |
Activities, Technical Solutions |
Agriculture, Land Use |
2013 |
Policy: Sustainable development goals for people and planet |
Activities, Problems, Social Solutions, International Responses |
Agriculture, Governance, Unmet Needs, Water |
2013 |
Local solutions to global problems: the potential of agroforestry for climate change adaptation and mitigation in southern Africa |
Activities, Social Solutions |
Agriculture, Land Use, Industry |
2013 |
Iraq Law Alliance |
Activities, Social Solutions |
Governance |
2013 |
Water Resources of Mainland China |
Activities, Problems |
Water |
2013 |
FAO's Information System on Water and Agriculture |
Activities, Problems, Technical Solutions, Social Solutions, International Responses |
Agriculture, Energy, Land Use, Governance, Industry, Migration, Population, Trade, Urbanization, Water |
2013 |
Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise |
Activities, Social Solutions |
Governance |
2013 |
Depleted Trust in the Cyber Commons |
Activities, Technical Solutions, International Responses |
Governance, Industry |
2013 |
Humanitarian Bulletin Syria |
Activities, Problems |
Conflicts, Unmet Needs |
2013 |
Modeling Nutrient Release in the Tai Lake Basin of China: Source Identification and Policy Implications |
Activities, Problems, Social Solutions |
Agriculture, Consumption, Governance, Population, Water |
2013 |
United Arab Emirates - Agriculture |
Activities, Social Solutions |
Agriculture, Consumption, Land Use |
2013 |
Cyber-Security: The vexed question of global rules, An independent report of cyber-preparedness around the world |
Activities |
Governance |
2013 |
Empirical Link between Economic Growth, Energy Consumption and CO2 Emission in Australia |
Activities |
Consumption, Energy |
2013 |
Fisheries Sustainability in Oman |
Activities |
Agriculture, Consumption |
2013 |
Cyber Operations and the Jus Ad Bellum Revisited |
Activities, Social Solutions, International Responses |
Governance, Industry |
2013 |
Science Technology and Innovation for Development in Iraq |
Activities, Social Solutions |
Consumption, Energy, Governance, Industry, Population, Trade |
2013 |
Cyber-victimization and cybersecurity in China |
Activities, Problems, Social Solutions |
Governance, Industry |
2013 |
Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions |
Activities, Social Solutions, International Responses |
Governance |
2013 |
Freedom of Expression and Internet |
Activities, Social Solutions, International Responses |
Governance |
2013 |
Theories of Conflict and the Iraq War |
Activities |
Conflicts |
2013 |
Abu Dhabi Water and Electricity Company |
Activities, Problems, Technical Solutions, Social Solutions |
Consumption, Energy, Governance, Water |
2013 |
State and Trends of the Russian Digital Crime Market 2011 |
Activities |
Governance, Industry |
2013 |
Post 2015: Making Migration Work for Sustainable Development |
Activities, Problems, Social Solutions, International Responses |
Migration |
2013 |
Contested Cyberspace and Rising Powers |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2013 |
WikiLeaks and the Age of Transparency |
Activities, Problems, International Responses |
Conflicts, Governance |
2013 |
Public Transportation Services in Oman: A Study of Public Perceptions |
Activities |
Industry, Mobility |
2013 |
Trustworthy Cyberspace: Strategic plan for the Federal cybersecurity research and development program |
Activities, Social Solutions |
Governance |
2013 |
The Internet Trust Bubble: Global Values, Beliefs and Practices |
Activities, Social Solutions |
Governance, Population |
2013 |