Critical Terminology Foundations (updated version) |
Social Solutions, International Responses |
Conflicts |
2014 |
Cross-Domain Deterrence and Credible Threats |
Activities, Social Solutions |
Governance |
2010 |
Cross-Domain Deterrence: Strategy in an Era of Complexity |
Activities |
Governance |
2014 |
Crossing Scales and Disciplines to Achieve Forest Sustainability |
Social Solutions |
Land Use |
2008 |
Crowdsourcing cyber security: a property rights view of exclusion and theft on the information commons. |
Problems, Social Solutions |
Governance |
2014 |
Cryptocurrencies and Fundamental Rights |
Social Solutions |
Trade |
2020 |
CSIRO - Australia |
Technical Solutions |
Agriculture, Energy, Land Use, Industry, Water |
---- |
Cultivation of Barley Under Harsh Environmental Conditions in Kuwait |
Activities, Problems, Social Solutions |
Agriculture |
2012 |
Cumbre de las Americas sobre Desarrollo Sostenible |
Social Solutions, Technical Solutions, Problems, Activities |
Energy, Trade, Land Use, Consumption, Population, Governance |
---- |
Current challenges and future perspectives of plant and agricultural biotechnology |
Problems, Technical Solutions |
Agriculture, Consumption, Energy, Land Use |
2016 |
Customs Reform: ASYCUDA |
Technical Solutions |
Trade |
---- |
Cyber Cheating in an Information Technology Age |
Activities, Technical Solutions |
Industry |
2008 |
Cyber Deterrence: A Comprehensive Approach? |
Activities, Technical Solutions, Social Solutions |
Conflicts |
2018 |
Cyber Insecurity is Harming Emerging Markets |
Social Solutions |
Industry |
2018 |
Cyber Operations and the Jus Ad Bellum Revisited |
Activities, Social Solutions, International Responses |
Governance, Industry |
2013 |
Cyber Operations and the Jus in Bello: Key Issues |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2013 |
Cyber Operations in Conflict: Lessons from Analytic Wargames |
Technical Solutions, Social Solutions |
Conflicts |
---- |
Cyber Operations: Air Force Doctrine Document 3-12 |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
Cyber Operations: The New Balance |
Activities, Social Solutions |
Conflicts, Governance |
2009 |
Cyber Politics: Understanding the Use of Social Media for Dissident Movements in an Integrated State Stability Framework |
Activities |
Conflicts, Governance |
2012 |
Cyber risk from a chief risk officer perspective |
Technical Solutions |
Governance, Industry, Trade |
2018 |
Cyber Security and International Agreements |
Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
Cyber Security and International Agreements |
Activities, Problems, Social Solutions, International Responses |
Conflicts, Governance, Industry, Trade |
2010 |
Cyber Security and International Law |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2012 |
Cyber Security and Mobile Threats: The Need for Antivirus Applications for Smart Phones |
Social Solutions |
Industry |
2012 |
Cyber Security and Privacy Issues in Smart Grids |
Problems, Technical Solutions, Social Solutions |
Energy |
2012 |
Cyber Security in Internet-Based Multiplayer Gaming |
Activities, Technical Solutions |
Industry |
2010 |
Cyber Security in the Payment Card Industry |
Activities, Social Solutions |
Governance, Trade |
2008 |
Cyber Security Meets Security Politics: Complex Technology, Fragmented Politics, and Networked Science |
Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2019 |
Cyber Security Research and Development Agenda |
Activities, Technical Solutions |
Conflicts, Industry |
2003 |
Cyber Security Within The Globalization Process |
Activities, Technical Solutions, International Responses |
Conflicts, Industry |
2012 |
Cyber Security Without Cyber War |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2012 |
Cyber Security – Threat Scenarios, Policy Framework and Cyber Wargames |
Technical Solutions |
Governance |
2014 |
Cyber Security: A Crisis of Prioritization |
Activities, Social Solutions |
Conflicts, Governance |
2005 |
Cyber socializing and victimization of women |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2009 |
Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point, or Patriot Games? |
Activities, Social Solutions, International Responses |
Conflicts |
2006 |
Cyber Threats in Social Networking Websites |
Technical Solutions, Social Solutions |
Industry |
2012 |
Cyber trust and crime prevention: a synthesis of the state-of-the-art science reviews |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2013 |
Cyber War Will Not Take Place |
Activities, International Responses |
Conflicts |
2012 |
Cyber Warfare and Precautions Against the Effects of Attacks |
Activities |
Conflicts, Industry |
2010 |
Cyber Warfare and Sino-American Crisis Instability |
Activities |
Conflicts |
2018 |
Cyber Warfare: An Analysis of the Means and Motivations of Selected Nation States |
Activities, International Responses |
Conflicts, Governance, Industry |
2004 |
Cyber-Deterrence |
Activities |
Conflicts, Industry |
2010 |
Cyber-Insurance Revisited |
Activities, Social Solutions |
Conflicts, Industry, Trade |
2005 |
Cyber-physical systems for water sustainability: challenges and opportunities |
Problems, Technical Solutions |
Unmet Needs |
2015 |
Cyber-Physical-Social Based Security Architecture for Future Internet of Things |
Technical Solutions, Social Solutions |
Industry |
2012 |
Cyber-Security: The vexed question of global rules, An independent report of cyber-preparedness around the world |
Activities |
Governance |
2013 |
Cyber-Sustainability: Leaving a lasting legacy of human wellbeing |
Problems |
Consumption, Industry |
2015 |
Cyber-Sustainability: leaving a lasting legacy of human wellbeing |
Problems, Technical Solutions |
Consumption, Industry |
2011 |
Cyber-Sustainability: Towards a Sustainable Digital Future |
Problems, Technical Solutions |
Energy, Industry |
2014 |