Modeling Cyber-Insurance |
Activities, Social Solutions |
Conflicts, Industry |
2010 |
Cyber-Deterrence |
Activities |
Conflicts, Industry |
2010 |
A Treaty for Cyberspace |
Activities, Problems, Social Solutions, International Responses |
Conflicts |
2010 |
An investigation into Chinese cybercrime and the underground economy in comparison with the West |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
Soverign Discourse on Cyber Conflict under International Law |
Problems, Social Solutions, International Responses |
Conflicts, Governance |
2010 |
Cyber Security and International Agreements |
Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
Defense Industrial Base Assessment |
Activities, Social Solutions |
Conflicts, Governance, Trade |
2010 |
Secure your network: 2010 Full year top cyber security risks report. In-depth analysis and attack data from HP DVLabs |
Activities, Technical Solutions |
Conflicts, Governance, Industry |
2010 |
Congress's Role in Cyber Warfare |
Activities |
Conflicts, Industry |
2010 |
Cyber Operations: Air Force Doctrine Document 3-12 |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
Cyber Warfare and Precautions Against the Effects of Attacks |
Activities |
Conflicts, Industry |
2010 |
2010 Data Breach Investigations Report (DBIR) |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
Information Assurance for Network-Centric Naval Forces |
Activities |
Conflicts, Industry |
2010 |
Diffusion and Effects of Cyber-Crime in Developing Economies |
Activities, Social Solutions |
Conflicts, Population, Urbanization |
2010 |
Combatant Status and Computer Network Attack |
Activities |
Conflicts, Industry |
2010 |
Solving the Dilemma of State Responses to Cyberattacks |
Activities, International Responses |
Conflicts, Governance |
2009 |
Cyber socializing and victimization of women |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2009 |
Technology, Policy, Law, and Ethics Regarding Acquisition and Use of U.S. Cyberattack Capabilities |
Activities |
Conflicts, Governance |
2009 |
Securing the Information Highway: How to Enhance the United States' Electronic Defenses |
Activities |
Conflicts, Governance |
2009 |
A Roadmap for Cybersecurity Research |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance |
2009 |
From Nuclear War to Net War: Analogizing Cyber Attacks in International Law |
Activities |
Conflicts, Industry |
2009 |
Cyber Operations: The New Balance |
Activities, Social Solutions |
Conflicts, Governance |
2009 |
Cyberwarfare and the Use of Force Giving Rise to the Right of Self-Defense |
Activities |
Conflicts, Industry |
2009 |
Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure |
Activities, International Responses |
Conflicts, Governance |
2009 |
Digital Disaster, Cyber Security, and the Copenhagen School |
Activities, Problems |
Conflicts |
2009 |
Formulating Specialized Legislation to Address the Growing Spectre of Cybercrime: A Comparative Study |
Activities, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2009 |
Securing Cyberspace for the 44th Presidency: A report of the CSIS Commission on Cybersecurity for the 44th Presidency |
Social Solutions, International Responses |
Conflicts, Governance |
2008 |
The Constitution in the National Surveillance State |
Social Solutions, International Responses |
Conflicts, Governance |
2008 |
Ambiguity in Transboundary Environmental Dispute Resolution: The Israeli—Jordanian Water Agreement |
Social Solutions, International Responses |
Conflicts, Water |
2008 |
Protecting the Electric Grid From Cybersecurity Threats: (U.S. House of Representatives Subcommittee on Energy and Air Quality Hearing) |
Activities, Social Solutions |
Conflicts, Energy, Governance |
2008 |
Towards a Cyberspace Legal Regime in the Twenty-First Century |
Activities, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2008 |
Exploit Derivatives and National Security |
Activities |
Conflicts, Industry |
2007 |
Climate change and conflict |
Problems |
Conflicts, Energy |
2007 |
Why States Need an International Law for Information Operations |
Activities, International Responses |
Conflicts, Governance |
2007 |
Toward a Safer and More Secure Cyberspace |
Activities |
Conflicts, Industry |
2007 |
An Introduction to Key Themes in the Economics of Cyber Security |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2006 |
A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict |
Activities, International Responses |
Conflicts, Governance, Industry |
2006 |
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis |
Activities, Social Solutions |
Conflicts, Industry |
2006 |
Information Operations and Cyberwar: Capabilities and Related Policy Issues |
Social Solutions |
Conflicts, Industry |
2006 |
National Military Strategy for Cyberspace Operations |
Technical Solutions |
Conflicts, Governance, Industry |
2006 |
Roadmap to Secure Control Systems in the Energy Sector |
Activities, Social Solutions |
Conflicts, Energy, Governance, Industry |
2006 |
Critical Infrastructure Threats and Terrorism |
Activities, Social Solutions, International Responses |
Conflicts, Energy, Governance, Industry, Water |
2006 |
Models and Measures for Correlation in Cyber-Insurance |
Activities, Social Solutions |
Conflicts, Industry |
2006 |
Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point, or Patriot Games? |
Activities, Social Solutions, International Responses |
Conflicts |
2006 |
Countering Urban Terrorism in Russia and the United States |
Activities |
Conflicts, Industry |
2006 |
The Economics of Information Security |
Activities, Social Solutions |
Conflicts, Industry, Trade |
2006 |
Cyber Security: A Crisis of Prioritization |
Activities, Social Solutions |
Conflicts, Governance |
2005 |
An Economic Analysis of Notification Requirements for Data Security Breaches |
Activities, Social Solutions |
Conflicts, Industry, Trade |
2005 |
Impact of Software Vulnerability Announcements on the Market Value of Software Vendors |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2005 |
The Role of ICT for Disaster Warning and Relief |
Technical Solutions, International Responses |
Conflicts, Governance, Industry |
2005 |