Critical Foundations: Protecting America's Infrastructure |
Social Solutions |
Governance, Industry |
1997 |
Critical Infrastructure Threats and Terrorism |
Activities, Social Solutions, International Responses |
Conflicts, Energy, Governance, Industry, Water |
2006 |
CSIRO - Australia |
Technical Solutions |
Agriculture, Energy, Land Use, Industry, Water |
---- |
Cyber Cheating in an Information Technology Age |
Activities, Technical Solutions |
Industry |
2008 |
Cyber Insecurity is Harming Emerging Markets |
Social Solutions |
Industry |
2018 |
Cyber Operations and the Jus Ad Bellum Revisited |
Activities, Social Solutions, International Responses |
Governance, Industry |
2013 |
Cyber Operations: Air Force Doctrine Document 3-12 |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
Cyber risk from a chief risk officer perspective |
Technical Solutions |
Governance, Industry, Trade |
2018 |
Cyber Security and International Agreements |
Activities, Problems, Social Solutions, International Responses |
Conflicts, Governance, Industry, Trade |
2010 |
Cyber Security and International Agreements |
Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
Cyber Security and Mobile Threats: The Need for Antivirus Applications for Smart Phones |
Social Solutions |
Industry |
2012 |
Cyber Security in Internet-Based Multiplayer Gaming |
Activities, Technical Solutions |
Industry |
2010 |
Cyber Security Research and Development Agenda |
Activities, Technical Solutions |
Conflicts, Industry |
2003 |
Cyber Security Within The Globalization Process |
Activities, Technical Solutions, International Responses |
Conflicts, Industry |
2012 |
Cyber socializing and victimization of women |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2009 |
Cyber Threats in Social Networking Websites |
Technical Solutions, Social Solutions |
Industry |
2012 |
Cyber trust and crime prevention: a synthesis of the state-of-the-art science reviews |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2013 |
Cyber Warfare and Precautions Against the Effects of Attacks |
Activities |
Conflicts, Industry |
2010 |
Cyber Warfare: An Analysis of the Means and Motivations of Selected Nation States |
Activities, International Responses |
Conflicts, Governance, Industry |
2004 |
Cyber-Deterrence |
Activities |
Conflicts, Industry |
2010 |
Cyber-Insurance Revisited |
Activities, Social Solutions |
Conflicts, Industry, Trade |
2005 |
Cyber-Physical-Social Based Security Architecture for Future Internet of Things |
Technical Solutions, Social Solutions |
Industry |
2012 |
Cyber-Sustainability: leaving a lasting legacy of human wellbeing |
Problems, Technical Solutions |
Consumption, Industry |
2011 |
Cyber-Sustainability: Leaving a lasting legacy of human wellbeing |
Problems |
Consumption, Industry |
2015 |
Cyber-Sustainability: Towards a Sustainable Digital Future |
Problems, Technical Solutions |
Energy, Industry |
2014 |
Cyber-victimization and cybersecurity in China |
Activities, Problems, Social Solutions |
Governance, Industry |
2013 |
Cyberpiracy and morality: Some utilitarian and deontological challenges |
Activities, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
Cybersecurity and the Cloud |
Social Solutions |
Governance, Industry |
2011 |
Cybersecurity and the Smarter Grid |
Activities, Technical Solutions |
Energy, Industry |
2014 |
Cybersecurity for the Nation: Workforce Development |
Social Solutions |
Industry |
2018 |
Cybersecurity Gateway (ITU) |
Technical Solutions, International Responses |
Industry, Governance |
2010 |
Cybersecurity is Putting Customer Trust at the Center of Competition |
Social Solutions |
Industry |
2019 |
Cybersecurity Management Program |
Technical Solutions |
Industry |
2017 |
Cybersecurity Strategies: The QuERIES Methodology |
Problems, Technical Solutions |
Governance, Industry |
2007 |
Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2012 |
Cyberterrorism: its effects on psychological well-being, public confidence and political attitudes |
Activities |
Industry |
2019 |
Cyberthreat, Government Network Operations, and the Fourth Amendment |
Activities |
Conflicts, Governance, Industry |
2012 |
Cyberwarfare and the Use of Force Giving Rise to the Right of Self-Defense |
Activities |
Conflicts, Industry |
2009 |
Cyberwarfare: Law & Policy Proposals for U.S. & Global Governance - Updated |
Activities |
Conflicts, Industry |
2010 |
Damascus Call Towards Partnership for Building the Arab Information Society |
Social Solutions, International Responses |
Governance, Industry |
2004 |
Dark web crime markets targeted by recurring DDoS attacks |
Technical Solutions |
Industry |
2019 |
Data Access in a Cyber World: Making Use of Cyberinfrastructure |
Technical Solutions, Social Solutions |
Industry |
2008 |
Data Security: An Analysis |
Activities, Technical Solutions |
Industry |
2010 |
Data Wiping and Anti Forensic Techniques |
Technical Solutions |
Governance, Industry |
2015 |
Department of Defense Cyberspace Policy Report: A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 943 |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2011 |
Department of Economic Development, Abu Dhabi |
Social Solutions |
Governance, Industry |
2013 |
Department of Economic Devleopment, Dubai |
Social Solutions |
Governance, Industry, Trade |
2013 |
Department of Economic Devleopment, Ras Al Khaimah |
Social Solutions |
Governance, Industry, Trade |
2013 |
Department of Statistics, Jordan: Environment and Urban Architecture |
Activities, Problems |
Agriculture, Energy, Land Use, Governance, Industry, Unmet Needs, Urbanization, Water |
---- |
Depleted Trust in the Cyber Commons |
Activities, Technical Solutions, International Responses |
Governance, Industry |
2013 |