|
The Wrong War: The Insistence on Applying Cold War Metaphors to Cybersecurity Is Misplaced and Counterproductive |
Social Solutions, International Responses |
Conflicts, Governance |
2011 |
|
A Wide Scale Survey on Botnet |
Activities, Technical Solutions |
Conflicts, Governance, Industry |
2011 |
|
Vienna Document 2011 on Confidence- and Security-Building Measures |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2011 |
|
China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2011 |
|
The Five Futures of Cyber Conflict |
Social Solutions, International Responses |
Conflicts, Governance |
2011 |
|
An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2011 |
|
Perspectives for Cyber Strategists on Law for Cyberwar |
Technical Solutions, International Responses |
Conflicts, Governance, Industry |
2011 |
|
A Study on Cyber Crimes and Protection |
Technical Solutions, Social Solutions |
Conflicts, Industry |
2011 |
|
Joint Operation Planning, 2011 |
Social Solutions, International Responses |
Conflicts, Governance |
2011 |
|
Guidance Notes and Recommendations For Sustainable Development Planning In Lebanon |
Activities, Problems |
Conflicts, Governance, Industry, Trade |
2011 |
|
Hacktivism: A Theoretical and Empirical Exploration of China’s Cyber Warriors |
Activities, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2011 |
|
Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses |
Technical Solutions, Social Solutions, International Responses |
Conflicts, Industry |
2011 |
|
Kuwait: Detailed Assessment Report on Anti-Money Laundering and Combating the Financing of Terrorism |
Social Solutions |
Conflicts, Governance, Migration, Urbanization |
2011 |
|
An e-SOS for Cyberspace |
Social Solutions |
Conflicts |
2011 |
|
Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy |
Social Solutions |
Conflicts, Governance |
2011 |
|
Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy |
Technical Solutions, Social Solutions, International Responses |
Conflicts, Industry |
2011 |
|
The New Policy World of Cybersecurity |
Activities, Social Solutions |
Conflicts, Governance |
2011 |
|
Defense Industrial Base Assessment |
Activities, Social Solutions |
Conflicts, Governance, Trade |
2010 |
|
Thinking Through Active Defense in Cyberspace |
Activities |
Conflicts |
2010 |
|
A Treaty for Cyberspace |
Activities, Problems, Social Solutions, International Responses |
Conflicts |
2010 |
|
Astana Commemorative Declaration: Towards A Security Community |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2010 |
|
Cyber-Deterrence |
Activities |
Conflicts, Industry |
2010 |
|
Ecological sustainability and peace: The effect of ecological sustainability on interstate and intrastate environmental conflict |
Social Solutions |
Conflicts, Energy, Governance |
2010 |
|
Space Weaponization and the United Nations Charter Regime on Force: A Thick Legal Fog or a Receding Mist? |
Activities |
Conflicts |
2010 |
|
Congress's Role in Cyber Warfare |
Activities |
Conflicts, Industry |
2010 |
|
NATO Review: Road to 21st century security |
Activities, International Responses |
Conflicts, Governance, Industry, Trade |
2010 |
|
Cyber Warfare and Precautions Against the Effects of Attacks |
Activities |
Conflicts, Industry |
2010 |
|
Cyber Security and International Agreements |
Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
|
Soverign Discourse on Cyber Conflict under International Law |
Problems, Social Solutions, International Responses |
Conflicts, Governance |
2010 |
|
Cyber Security and International Agreements |
Activities, Problems, Social Solutions, International Responses |
Conflicts, Governance, Industry, Trade |
2010 |
|
Combatant Status and Computer Network Attack |
Activities |
Conflicts, Industry |
2010 |
|
From Global Village to Virtual Battlespace: The Colonizing of the Internet and the Extension of Realpolitik |
Activities, Social Solutions |
Conflicts, Governance |
2010 |
|
The Revolution in Military Affairs |
Activities, Social Solutions |
Conflicts |
2010 |
|
Diffusion and Effects of Cyber-Crime in Developing Economies |
Activities, Social Solutions |
Conflicts, Population, Urbanization |
2010 |
|
Information Assurance for Network-Centric Naval Forces |
Activities |
Conflicts, Industry |
2010 |
|
Low-Intensity Computer Network Attack and Self-Defense |
Activities |
Conflicts, Industry |
2010 |
|
International Cyber Incidents: Legal Considerations |
International Responses |
Conflicts, Governance |
2010 |
|
Cyberpiracy and morality: Some utilitarian and deontological challenges |
Activities, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
|
Proceedings of a Workshop on Deterring CyberAttacks: Informing Strategies and Developing Options for U.S. Policy |
Activities, Social Solutions |
Conflicts, Industry |
2010 |
|
Former NSA Director: Countries Spewing Cyberattacks Should Be Held Responsible |
Social Solutions |
Conflicts, Governance |
2010 |
|
Modeling Cyber-Insurance |
Activities, Social Solutions |
Conflicts, Industry |
2010 |
|
Cyber Operations: Air Force Doctrine Document 3-12 |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
|
A treaty for cyberspace |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2010 |
|
An investigation into Chinese cybercrime and the underground economy in comparison with the West |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
|
Cyberwarfare: Law & Policy Proposals for U.S. & Global Governance - Updated |
Activities |
Conflicts, Industry |
2010 |
|
Multilateral Agreements to Constrain Cyberconflict |
International Responses |
Conflicts |
2010 |
|
Letter Report for the Committee on Deterring Cyberattacks |
Activities |
Conflicts, Industry |
2010 |
|
National Security Strategy |
Activities, Problems, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
|
From Nuclear War to Net War: Analogizing Cyber Attacks in International Law |
Activities |
Conflicts, Industry |
2009 |
|
Securing the Information Highway: How to Enhance the United States' Electronic Defenses |
Activities |
Conflicts, Governance |
2009 |