Sustainability Policy and Environmental Policy |
Activities, Social Solutions |
Agriculture, Energy, Governance, Industry |
2004 |
Sustainable supply chain management: A case study of British Aerospace (BAe) Systems |
Activities, Problems |
Industry |
2012 |
Green growth in developing countries: a summary for policy makers |
Activities, Social Solutions |
Consumption, Energy, Governance, Population, Trade |
2012 |
Local solutions to global problems: the potential of agroforestry for climate change adaptation and mitigation in southern Africa |
Activities, Social Solutions |
Agriculture, Land Use, Industry |
2013 |
A multiple criteria decision making approach to manure management systems in the Netherlands |
Activities, Technical Solutions |
Agriculture |
2013 |
Promotion of eco-innovation to leverage sustainable development of eco-industry and green growth |
Activities, Social Solutions |
Consumption, Energy, Governance, Industry, Trade |
2013 |
Strategic assessment of fuel taxation in energy conservation and CO2 reduction for road transportation: a case study from China |
Activities, Social Solutions |
Energy, Governance |
2012 |
Economic development and foreign direct investment : How to create sustainable development an analysis of the potential for sustainable development on the Indian subcontinent |
Activities, Social Solutions |
Energy, Population, Trade, Water |
2010 |
STAKEHOLDER INFLUENCES ON SUSTAINABILITY PRACTICES IN THE CANADIAN FOREST PRODUCTS INDUSTRY. |
Activities, Social Solutions |
Agriculture |
2005 |
Contested Waters: Conflict, Scale, and Sustainability in Aquatic Socioecological Systems |
Activities, Social Solutions |
Consumption, Water |
2010 |
The Chains of Agriculture: Sustainability and the Restructuring of Agri-Food Markets |
Activities, Problems |
Agriculture |
2001 |
Urbanization in developing countries: Current trends, future projections, and key challenges for sustainability |
Activities, Problems |
Urbanization |
2006 |
Health policy and systems research in access to medicines: a prioritized agenda for low- and middle-income countries |
Activities, Problems |
Population |
2013 |
Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions |
Activities, Social Solutions, International Responses |
Governance |
2013 |
Cybersecurity: Authoritative Reports and Resources |
Activities |
Governance |
2013 |
Changing the game: Key findings from The Global State of Information Security Survey 2013 |
Activities |
Governance, Industry, Trade |
2013 |
Internet matters: The Net's sweeping impact on growth, jobs, and prosperity |
Activities, Social Solutions |
Governance, Trade |
2013 |
Assessing Western perspectives on Chinese Intelligence |
Activities, Problems |
Conflicts, Governance |
2012 |
WikiLeaks and the Age of Transparency |
Activities, Problems, International Responses |
Conflicts, Governance |
2013 |
The National Military Strategy of the United States of America |
Activities, Social Solutions |
Conflicts, Governance |
2015 |
National Security Strategy |
Activities, Problems, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
Cyber Operations: Air Force Doctrine Document 3-12 |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
Dominant Factors in National Information Security Policies |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2010 |
Informational trends for organizations in information society |
Activities, Technical Solutions |
Governance, Industry |
2007 |
Secure web application development and global regulation |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2007 |
Privacy and Data Protection in Cyberspace in Indian Environment |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2010 |
Tracing the Origins of Distributed Denial of Service Attacks |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2011 |
Cyberpiracy and morality: Some utilitarian and deontological challenges |
Activities, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
Comprehensive Security Framework for Global Threats Analysis |
Activities, Technical Solutions, Social Solutions, International Responses |
Governance, Industry |
2009 |
Security in Cyberspace: Combatting Distributed Denial of Service Attacks |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2003 |
A Wide Scale Survey on Botnet |
Activities, Technical Solutions |
Conflicts, Governance, Industry |
2011 |
Applying the Full Protection and Security Standard of International Investment Law to Digital Assets |
Activities, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2011 |
Data Security: An Analysis |
Activities, Technical Solutions |
Industry |
2010 |
Modeling Human Behavior to Anticipate Insider Attacks |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2011 |
Formulating Specialized Legislation to Address the Growing Spectre of Cybercrime: A Comparative Study |
Activities, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2009 |
An investigation into Chinese cybercrime and the underground economy in comparison with the West |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
Non-Security – Premise of Cybercrime |
Activities, Technical Solutions |
Industry |
2012 |
Global tendencies and local implications: cyber exclusion of and within Western Balkan countries |
Activities, Technical Solutions, Social Solutions, International Responses |
Governance, Industry |
2006 |
Cyber trust and crime prevention: a synthesis of the state-of-the-art science reviews |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2013 |
XXI An Odyssey in Cyberspace: A Preliminary Look at Cyber-Feminism |
Activities, Technical Solutions, Social Solutions |
Industry |
2008 |
Cyber Security in Internet-Based Multiplayer Gaming |
Activities, Technical Solutions |
Industry |
2010 |
Cyber Cheating in an Information Technology Age |
Activities, Technical Solutions |
Industry |
2008 |
e-Government Ethics: a Synergy of Computer Ethics, Information Ethics, and Cyber Ethics |
Activities, Problems, Technical Solutions, Social Solutions |
Governance, Industry |
2011 |
A Relationship on the Rocks: Industry-Government Partnership for Cyber Defense |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2011 |
Hacktivism: A Theoretical and Empirical Exploration of China’s Cyber Warriors |
Activities, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2011 |
Study of Indian Banks Websites for Cyber Crime Safety Mechanism |
Activities, Technical Solutions |
Governance, Industry |
2011 |
Cyber socializing and victimization of women |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2009 |
Evaluation of Vulnerability Assessment in System From Hackers in Cyber Security |
Activities, Technical Solutions |
Governance, Industry |
2010 |
Role of metadata in cyber forensic and status of Indian cyber law |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2011 |
China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2011 |