World Economic and Social Survey, 2011: The Great Green Technological Transformation |
Problems, Social Solutions |
Governance, Industry, Trade |
2012 |
Secure your network: 2010 Full year top cyber security risks report. In-depth analysis and attack data from HP DVLabs |
Activities, Technical Solutions |
Conflicts, Governance, Industry |
2010 |
Hardening the Internet: Final Report and Recommendations by the Council |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2004 |
Modeling Cyber-Insurance |
Activities, Social Solutions |
Conflicts, Industry |
2010 |
Models and Measures for Correlation in Cyber-Insurance |
Activities, Social Solutions |
Conflicts, Industry |
2006 |
The Economics of Information Security |
Activities, Social Solutions |
Conflicts, Industry, Trade |
2006 |
Critical Foundations: Protecting America's Infrastructure |
Social Solutions |
Governance, Industry |
1997 |
Impact of Software Vulnerability Announcements on the Market Value of Software Vendors |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2005 |
Overcoming Impediments to Information Sharing |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2004 |
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis |
Activities, Social Solutions |
Conflicts, Industry |
2006 |
Towards a Cyberspace Legal Regime in the Twenty-First Century |
Activities, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2008 |
Is Cybersecurity a Public Good? Evidence from the Financial Services Industry |
Activities, Social Solutions |
Conflicts, Industry, Trade |
2001 |
Managing Online Security Risks |
Activities, Social Solutions |
Industry, Trade |
2000 |
An Economic Analysis of Notification Requirements for Data Security Breaches |
Activities, Social Solutions |
Conflicts, Industry, Trade |
2005 |
An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2011 |
An Introduction to Key Themes in the Economics of Cyber Security |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2006 |
Cyber-Insurance Revisited |
Activities, Social Solutions |
Conflicts, Industry, Trade |
2005 |
Cyber Security Research and Development Agenda |
Activities, Technical Solutions |
Conflicts, Industry |
2003 |
Roadmap to Secure Control Systems in the Energy Sector |
Activities, Social Solutions |
Conflicts, Energy, Governance, Industry |
2006 |
A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict |
Activities, International Responses |
Conflicts, Governance, Industry |
2006 |
2010 Data Breach Investigations Report (DBIR) |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
The Economics of Online Crime |
Activities, Social Solutions, International Responses |
Governance, Industry, Trade |
2007 |
An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants |
Activities, Social Solutions, International Responses |
Governance, Industry, Trade |
2007 |
Critical Infrastructure Threats and Terrorism |
Activities, Social Solutions, International Responses |
Conflicts, Energy, Governance, Industry, Water |
2006 |
ICTs for e-Environment: Guidelines for develoing countries, with a focus on climate change |
Technical Solutions, Social Solutions, International Responses |
Consumption, Energy, Governance, Industry |
---- |
ICT for e-Environment Toolkit and the e-Environment Readiness Index (EERI) |
Activities, Problems, Technical Solutions |
Energy, Industry |
2009 |
Overview of Ongoing Multi-Year Science for Peace Projects |
Technical Solutions, Social Solutions, International Responses |
Energy, Land Use, Governance, Industry, Water |
---- |
Africa Transformation-Ready: The Strategic Application of ICTs to Climate Change |
Problems, Technical Solutions, Social Solutions |
Governance, Industry |
---- |
Information Assurance for Network-Centric Naval Forces |
Activities |
Conflicts, Industry |
2010 |
ICT Regulatory Trends 2010 |
Activities, Technical Solutions, Social Solutions, International Responses |
Trade, Industry, Governance |
2010 |
Reports and Conclusions of the Thematic meetings organized by UNESCO |
Problems, International Responses |
Governance, Industry |
2005 |
Congress's Role in Cyber Warfare |
Activities |
Conflicts, Industry |
2010 |
Information Society Statistical Profiles 2009 – Arab States |
Activities, Technical Solutions, Social Solutions, International Responses |
Industry, Governance |
2009 |
Conference on “Role and Place of Media in the Information Society in Africa and the Arab States” – Action Plan |
Social Solutions, International Responses |
Governance, Industry |
2004 |
Cyber Warfare and Precautions Against the Effects of Attacks |
Activities |
Conflicts, Industry |
2010 |
Proceedings of a Workshop on Deterring CyberAttacks: Informing Strategies and Developing Options for U.S. Policy |
Activities, Social Solutions |
Conflicts, Industry |
2010 |
Information Society Statistical Profiles 2009 – Asia and the Pacific |
Activities, Technical Solutions, Social Solutions, International Responses |
Industry, Governance |
2009 |
Global Information Technology Report 2009-2010: ICT for Sustainability |
Activities, Problems, Social Solutions, International Responses |
Governance, Industry, Trade |
2010 |
Combatant Status and Computer Network Attack |
Activities |
Conflicts, Industry |
2010 |
The Convergence of Cyberspace and Sustainability |
Problems |
Industry |
2012 |
Tokyo Ubiquitous Network Conference “Toward the Realization of a Ubiquitous Network Society” – Chairman’s Report |
Technical Solutions, Social Solutions, International Responses |
Governance, Industry |
2005 |
"Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework" |
Activities |
Conflicts, Industry |
1999 |
Cyberwarfare: Law & Policy Proposals for U.S. & Global Governance - Updated |
Activities |
Conflicts, Industry |
2010 |
Information Society Statistical Profiles 2009 – Africa |
Activities, Technical Solutions, Social Solutions, International Responses |
Industry, Governance |
2009 |
Letter Report for the Committee on Deterring Cyberattacks |
Activities |
Conflicts, Industry |
2010 |
Low-Intensity Computer Network Attack and Self-Defense |
Activities |
Conflicts, Industry |
2010 |
Information Warfare as International Coercion: Elements of a Legal Framework |
Activities |
Conflicts, Industry |
2001 |
Workshop on Internet Governance – Chairman’s Report |
Technical Solutions, Social Solutions, International Responses |
Governance, Industry |
2004 |
China's Electronic Strategies |
Activities |
Conflicts, Industry |
2001 |
From Nuclear War to Net War: Analogizing Cyber Attacks in International Law |
Activities |
Conflicts, Industry |
2009 |