Information Society Statistical Profiles 2009 – Europe (v1.01) |
Activities, Technical Solutions, Social Solutions, International Responses |
Industry, Governance |
2009 |
Internet Governance: Creating Opportunities For All – The Fourth Internet Governance Forum |
Activities, Problems, Technical Solutions, Social Solutions, International Responses |
Industry, Governance |
2009 |
Information Society Statistical Profiles 2009 – Arab States |
Activities, Technical Solutions, Social Solutions, International Responses |
Industry, Governance |
2009 |
Information Society Statistical Profiles 2009 – Asia and the Pacific |
Activities, Technical Solutions, Social Solutions, International Responses |
Industry, Governance |
2009 |
Information Society Statistical Profiles 2009 – Africa |
Activities, Technical Solutions, Social Solutions, International Responses |
Industry, Governance |
2009 |
Dominant Factors in National Information Security Policies |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2010 |
Diffusion and Effects of Cyber-Crime in Developing Economies |
Activities, Social Solutions |
Conflicts, Population, Urbanization |
2010 |
Space Weaponization and the United Nations Charter Regime on Force: A Thick Legal Fog or a Receding Mist? |
Activities |
Conflicts |
2010 |
Cyberwarfare: Law & Policy Proposals for U.S. & Global Governance - Updated |
Activities |
Conflicts, Industry |
2010 |
Thinking Through Active Defense in Cyberspace |
Activities |
Conflicts |
2010 |
Cyberpiracy and morality: Some utilitarian and deontological challenges |
Activities, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
Organic Agriculture in Syria: Policy Options |
Activities, Social Solutions |
Agriculture |
2010 |
Letter Report for the Committee on Deterring Cyberattacks |
Activities |
Conflicts, Industry |
2010 |
Predictions of Turbidity Due to Enhanced Sediment Resuspension Resulting from Sea-Level Rise on a Fringing Coral Reef: Evidence from Molokai, Hawaii |
Activities, Technical Solutions |
Agriculture, Water |
2010 |
Data Security: An Analysis |
Activities, Technical Solutions |
Industry |
2010 |
Green marketing strategies: an examination of stakeholders and the opportunities they present |
Activities |
Industry, Trade |
2010 |
Sustainable urban development in historical areas using the tourist trail approach: A case study of the Cultural Heritage and Urban Development (CHUD) project in Saida, Lebanon |
Activities, Technical Solutions, Social Solutions |
Land Use, Population, Urbanization |
2010 |
Sustainable Water Management Assessment and Recommendations for the Emirate of Abu Dhabi |
Activities, Social Solutions |
Governance, Mobility, Water |
2010 |
Cyber Operations: Air Force Doctrine Document 3-12 |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
Human Development Report 2010 (The Real Wealth of Nations: Pathways to Human Development) |
Activities, Problems, Social Solutions, International Responses |
Governance, Urbanization |
2010 |
A treaty for cyberspace |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2010 |
2010 Data Breach Investigations Report (DBIR) |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
NATO Review: Road to 21st century security |
Activities, International Responses |
Conflicts, Governance, Industry, Trade |
2010 |
Sustainable development as a community of practice: insights from rural water projects in Egypt |
Activities, Problems |
Agriculture, Governance, Industry, Urbanization, Water |
2010 |
Corruption Perceptions Index 2010 |
Activities |
Governance |
2010 |
Human Footprints on the Global Environment: Threats to Sustainability |
Activities, Problems |
Consumption, Land Use, Governance, Population, Urbanization |
2010 |
The Ecological Impact of Biofuels |
Activities, Problems, Social Solutions |
Agriculture, Consumption, Energy, Land Use |
2010 |
Evaluation of Vulnerability Assessment in System From Hackers in Cyber Security |
Activities, Technical Solutions |
Governance, Industry |
2010 |
National Security Strategy |
Activities, Problems, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
Modeling Cyber-Insurance |
Activities, Social Solutions |
Conflicts, Industry |
2010 |
Astana Commemorative Declaration: Towards A Security Community |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2010 |
Cyber-Deterrence |
Activities |
Conflicts, Industry |
2010 |
Privacy and Data Protection in Cyberspace in Indian Environment |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2010 |
Contested Waters: Conflict, Scale, and Sustainability in Aquatic Socioecological Systems |
Activities, Social Solutions |
Consumption, Water |
2010 |
IGES CDM Investment Analysis Database |
Activities, Problems, Technical Solutions, International Responses |
Energy, Governance |
2010 |
Secure your network: 2010 Full year top cyber security risks report. In-depth analysis and attack data from HP DVLabs |
Activities, Technical Solutions |
Conflicts, Governance, Industry |
2010 |
"Is globalisation sustainable?" |
Activities |
Mobility, Population, Trade |
2010 |
Congress's Role in Cyber Warfare |
Activities |
Conflicts, Industry |
2010 |
ECOnet-Project |
Activities, Problems, Technical Solutions |
Consumption, Energy, Governance |
2010 |
An investigation into Chinese cybercrime and the underground economy in comparison with the West |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
Cyber Warfare and Precautions Against the Effects of Attacks |
Activities |
Conflicts, Industry |
2010 |
Reasons for hospitalizations in adults with diabetes in Kuwait |
Activities, Social Solutions |
Governance, Population, Unmet Needs |
2010 |
A 2010 Leadership Imperative: The Future Built on Broadband |
Activities, Technical Solutions, Social Solutions, International Responses |
Governance, Industry, Trade |
2010 |
The Older Population in the United States: 2010 to 2050 |
Activities, Problems |
Population |
2010 |
Cyber Security in Internet-Based Multiplayer Gaming |
Activities, Technical Solutions |
Industry |
2010 |
Information Assurance for Network-Centric Naval Forces |
Activities |
Conflicts, Industry |
2010 |
Defense Industrial Base Assessment |
Activities, Social Solutions |
Conflicts, Governance, Trade |
2010 |
Combatant Status and Computer Network Attack |
Activities |
Conflicts, Industry |
2010 |
Cross-Domain Deterrence and Credible Threats |
Activities, Social Solutions |
Governance |
2010 |
A Treaty for Cyberspace |
Activities, Problems, Social Solutions, International Responses |
Conflicts |
2010 |