| Radioactivity of long lived gamma emitters in rice consumed in Kuwait | Activities, Technical Solutions, Social Solutions | Governance, Trade, Unmet Needs | 2012 | 
              
                                                | Reasons for hospitalizations in adults with diabetes in Kuwait | Activities, Social Solutions | Governance, Population, Unmet Needs | 2010 | 
              
                                                | Water availability for the greening of Kuwait | Activities, Technical Solutions, Social Solutions | Agriculture, Energy, Land Use, Governance, Industry, Water | 2002 | 
              
                                                | Cyber Operations and the Jus in Bello: Key Issues | Activities, Social Solutions, International Responses | Conflicts, Governance | 2013 | 
              
                                                | Cyber Operations and the Jus Ad Bellum Revisited | Activities, Social Solutions, International Responses | Governance, Industry | 2013 | 
              
                                                | The Council of Europe Convention on Cybercrime | Activities, Social Solutions, International Responses | Governance | 2013 | 
              
                                                | Convention on Cybercrime: CETS No. 185 | Activities, Social Solutions, International Responses | Governance | 2013 | 
              
                                                | Law and Borders: The Rise of Law in Cyberspace | Activities, Social Solutions | Governance | 2013 | 
              
                                                | Technology and Internet Jurisdiction | Activities, Social Solutions | Governance | 2013 | 
              
                                                | National Cyber Incident Response Plan | Activities, Technical Solutions, Social Solutions | Governance, Industry | 2013 | 
              
                                                | International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World | Activities, Social Solutions | Governance, Industry, Trade | 2013 | 
              
                                                | Institutional Foundations for Cyber Security: Current Responses and New Challenges | Activities, Social Solutions, International Responses | Governance, Industry | 2013 | 
              
                                                | Trustworthy Cyberspace: Strategic plan for the Federal cybersecurity research and development program | Activities, Social Solutions | Governance | 2013 | 
              
                                                | Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise | Activities, Social Solutions | Governance | 2013 | 
              
                                                | Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions | Activities, Social Solutions, International Responses | Governance | 2013 | 
              
                                                | Cybersecurity: Authoritative Reports and Resources | Activities | Governance | 2013 | 
              
                                                | The Smart Grid and Cybersecurity -- Regulatory Policy and Issues | Activities, Technical Solutions, Social Solutions | Energy, Governance, Industry | 2013 | 
              
                                                | Changing the game: Key findings from The Global State of Information Security Survey 2013 | Activities | Governance, Industry, Trade | 2013 | 
              
                                                | Cyber-Security: The vexed question of global rules, An independent report of cyber-preparedness around the world | Activities | Governance | 2013 | 
              
                                                | Internet matters: The Net's sweeping impact on growth, jobs, and prosperity | Activities, Social Solutions | Governance, Trade | 2011 | 
              
                                                | Posner's Remarks on Internet Freedom and Responsibility, October 2011 | Activities, Social Solutions, International Responses | Governance, Industry, Trade | 2013 | 
              
                                                | Emerging Cyber Threats Report 2013 - Georgia Tech Institute Summit | Activities, Technical Solutions, International Responses | Conflicts, Governance, Industry | 2012 | 
              
                                                | Cyber Warfare: An Analysis of the Means and Motivations of Selected Nation States | Activities, International Responses | Conflicts, Governance, Industry | 2004 | 
              
                                                | Classification of Cyber Conflict | Activities, International Responses | Conflicts, Industry | 2012 | 
              
                                                | The Fourth Quadrant | Activities | Governance | 2012 | 
              
                                                | Power Hackers: The U.S. Smart Grid is Shaping Up to be Dangerously Insecure | Activities | Energy, Governance | 2012 | 
              
                                                | The Problem Isn't Attribution; It's Multi-Stage Attacks | Activities | Conflicts, Governance | 2012 | 
              
                                                | Optimal Error Correction for Computationally Bounded Noise | Activities | Industry | 2012 | 
              
                                                | Creating the Demand Curve for Cybersecurity | Activities, Social Solutions | Governance | 2012 | 
              
                                                | Cyberthreat, Government Network Operations, and the Fourth Amendment | Activities | Conflicts, Governance, Industry | 2012 | 
              
                                                | Everything you need to know about Wikileaks | Activities | Governance | 2012 | 
              
                                                | Regulators Can Help Obama Secure It | Activities, Social Solutions | Governance | 2012 | 
              
                                                | Egypt Unrest: How do you shut down Internet service in an entire country? | Activities, Social Solutions, International Responses | Governance | 2012 | 
              
                                                | Power and Information in Egypt - and Beyond | Activities | Governance | 2012 | 
              
                                                | Untangling Attribution | Activities, Technical Solutions | Conflicts, Governance | 2012 | 
              
                                                | China's Cyberassault on America | Activities | Governance | 2012 | 
              
                                                | Protecting the Internet as a Public Commons | Activities | Industry | 2012 | 
              
                                                | Dim Prospects for Cybersecurity Law in 2011 | Activities, Social Solutions | Governance | 2012 | 
              
                                                | Semantic Distances for Technology Landscape Visualization | Activities | Governance | 2012 | 
              
                                                | The Future of Power - Book | Activities | Governance, Industry | 2012 | 
              
                                                | Perspectives: Towards a Common Wireless Market: Why the FCC Should Promote a Single Interoperable Technological Market for Mobile Devices | Activities, Social Solutions | Governance, Industry | 2012 | 
              
                                                | The Convergence of Cyberspace and Sustainability | Activities, Social Solutions, International Responses | Consumption, Energy, Governance | 2012 | 
              
                                                | Internet Service Providers are the Front Line of Cyber-Defence | Activities, International Responses | Governance | 2012 | 
              
                                                | A Unified Approach for Taxonomy-Based Technology Forecasting | Activities | Governance | 2014 | 
              
                                                | The Right Way | Activities | Governance, Population | 2012 | 
              
                                                | The Next 50 Years: A Personal View | Activities | Governance, Industry | 2012 | 
              
                                                | Lost in Cyberspace: Harnessing the Internet, International Relations, and Global Security | Activities, Social Solutions | Governance, Industry | 2012 | 
              
                                                | Empirical Studies of Bottom-Up Internet Governance | Activities | Governance, Industry | 2012 | 
              
                                                | Cyberpolitics in International Relations | Activities | Conflicts, Governance | 2012 | 
              
                                                | Would a 'Cyber Warrior' Protect Us? Exploring Trade-Offs Between Attack and Defense of Information Systems | Activities | Conflicts, Governance | 2012 |