From Global Village to Virtual Battlespace: The Colonizing of the Internet and the Extension of Realpolitik |
Activities, Social Solutions |
Conflicts, Governance |
2010 |
Letter Report for the Committee on Deterring Cyberattacks |
Activities |
Conflicts, Industry |
2010 |
A Treaty for Cyberspace |
Activities, Problems, Social Solutions, International Responses |
Conflicts |
2010 |
Soverign Discourse on Cyber Conflict under International Law |
Problems, Social Solutions, International Responses |
Conflicts, Governance |
2010 |
Joint Operation Planning, 2011 |
Social Solutions, International Responses |
Conflicts, Governance |
2011 |
Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses |
Technical Solutions, Social Solutions, International Responses |
Conflicts, Industry |
2011 |
Kuwait: Detailed Assessment Report on Anti-Money Laundering and Combating the Financing of Terrorism |
Social Solutions |
Conflicts, Governance, Migration, Urbanization |
2011 |
An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2011 |
Nuclear Lessons for Cyber Security? |
Problems, Social Solutions |
Conflicts, Governance |
2011 |
Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy |
Technical Solutions, Social Solutions, International Responses |
Conflicts, Industry |
2011 |
Applying the Full Protection and Security Standard of International Investment Law to Digital Assets |
Activities, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2011 |
The Wrong War: The Insistence on Applying Cold War Metaphors to Cybersecurity Is Misplaced and Counterproductive |
Social Solutions, International Responses |
Conflicts, Governance |
2011 |
The New Policy World of Cybersecurity |
Activities, Social Solutions |
Conflicts, Governance |
2011 |
Guidance Notes and Recommendations For Sustainable Development Planning In Lebanon |
Activities, Problems |
Conflicts, Governance, Industry, Trade |
2011 |
A Wide Scale Survey on Botnet |
Activities, Technical Solutions |
Conflicts, Governance, Industry |
2011 |
China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2011 |
Perspectives for Cyber Strategists on Law for Cyberwar |
Technical Solutions, International Responses |
Conflicts, Governance, Industry |
2011 |
The Five Futures of Cyber Conflict |
Social Solutions, International Responses |
Conflicts, Governance |
2011 |
Cyberwarfare and International Law |
Social Solutions, International Responses |
Conflicts, Governance |
2011 |
Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy |
Social Solutions |
Conflicts, Governance |
2011 |
An e-SOS for Cyberspace |
Social Solutions |
Conflicts |
2011 |
Department of Defense Cyberspace Policy Report: A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 943 |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2011 |
A Study on Cyber Crimes and Protection |
Technical Solutions, Social Solutions |
Conflicts, Industry |
2011 |
Vienna Document 2011 on Confidence- and Security-Building Measures |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2011 |
Hacktivism: A Theoretical and Empirical Exploration of China’s Cyber Warriors |
Activities, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2011 |
National Cybersecurity Center Policy Capture |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2012 |
Index Mundi Factbook for Jordan |
Activities |
Agriculture, Conflicts, Consumption, Energy, Land Use, Governance, Industry, Migration, Mobility, Population, Trade, Unmet Needs, Urbanization, Water |
2012 |
The Five Futures of Cyber Conflict and Cooperation |
Social Solutions, International Responses |
Conflicts, Governance, Industry |
2012 |
Nuclear Lessons for Cyber Security? |
Social Solutions, International Responses |
Conflicts, Governance |
2012 |
2012-2017 Defense Intelligence Agency Strategy |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2012 |
Space Sustainability and US Cyberwar Strategic Doctrine |
Problems, Social Solutions, International Responses |
Conflicts, Governance |
2012 |
National Cyber Security Framework Manual |
International Responses |
Conflicts, Governance, Industry |
2012 |
Cyber Security and International Law |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2012 |
Cyberthreat, Government Network Operations, and the Fourth Amendment |
Activities |
Conflicts, Governance, Industry |
2012 |
Assessing Western perspectives on Chinese Intelligence |
Activities, Problems |
Conflicts, Governance |
2012 |
Cyber Politics: Understanding the Use of Social Media for Dissident Movements in an Integrated State Stability Framework |
Activities |
Conflicts, Governance |
2012 |
Cyber Security Within The Globalization Process |
Activities, Technical Solutions, International Responses |
Conflicts, Industry |
2012 |
UCDP/PRIO Armed Conflict Dataset Codebook |
Activities, Social Solutions |
Conflicts |
2012 |
Emerging Cyber Threats Report 2013 - Georgia Tech Institute Summit |
Activities, Technical Solutions, International Responses |
Conflicts, Governance, Industry |
2012 |
Addressing Cyber Instability |
Activities, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2012 |
Cyber Security Without Cyber War |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2012 |
The Problem Isn't Attribution; It's Multi-Stage Attacks |
Activities |
Conflicts, Governance |
2012 |
OSCE Annual Report 2011 |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2012 |
Would a 'Cyber Warrior' Protect Us? Exploring Trade-Offs Between Attack and Defense of Information Systems |
Activities |
Conflicts, Governance |
2012 |
Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2012 |
Establishing Cyber Warfare Doctrine |
Technical Solutions, Social Solutions, International Responses |
Conflicts, Industry |
2012 |
Cyberpolitics in International Relations |
Activities |
Conflicts, Governance |
2012 |
Sovereign Discourse on Cyber Conflict Under International Law |
Social Solutions, International Responses |
Conflicts, Governance |
2012 |
Classification of Cyber Conflict |
Activities, International Responses |
Conflicts, Industry |
2012 |
Untangling Attribution |
Activities, Technical Solutions |
Conflicts, Governance |
2012 |