Cyberpiracy and morality: Some utilitarian and deontological challenges |
Activities, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
From Global Village to Virtual Battlespace: The Colonizing of the Internet and the Extension of Realpolitik |
Activities, Social Solutions |
Conflicts, Governance |
2010 |
Letter Report for the Committee on Deterring Cyberattacks |
Activities |
Conflicts, Industry |
2010 |
A Treaty for Cyberspace |
Activities, Problems, Social Solutions, International Responses |
Conflicts |
2010 |
Soverign Discourse on Cyber Conflict under International Law |
Problems, Social Solutions, International Responses |
Conflicts, Governance |
2010 |
Thinking Through Active Defense in Cyberspace |
Activities |
Conflicts |
2010 |
Digital Disaster, Cyber Security, and the Copenhagen School |
Activities, Problems |
Conflicts |
2009 |
Solving the Dilemma of State Responses to Cyberattacks |
Activities, International Responses |
Conflicts, Governance |
2009 |
Cyber Operations: The New Balance |
Activities, Social Solutions |
Conflicts, Governance |
2009 |
A Roadmap for Cybersecurity Research |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance |
2009 |
Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure |
Activities, International Responses |
Conflicts, Governance |
2009 |
Securing the Information Highway: How to Enhance the United States' Electronic Defenses |
Activities |
Conflicts, Governance |
2009 |
Cyber socializing and victimization of women |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2009 |
Technology, Policy, Law, and Ethics Regarding Acquisition and Use of U.S. Cyberattack Capabilities |
Activities |
Conflicts, Governance |
2009 |
Cyberwarfare and the Use of Force Giving Rise to the Right of Self-Defense |
Activities |
Conflicts, Industry |
2009 |
From Nuclear War to Net War: Analogizing Cyber Attacks in International Law |
Activities |
Conflicts, Industry |
2009 |
Securing Cyberspace for the 44th Presidency: A report of the CSIS Commission on Cybersecurity for the 44th Presidency |
Social Solutions, International Responses |
Conflicts, Governance |
2008 |
The Constitution in the National Surveillance State |
Social Solutions, International Responses |
Conflicts, Governance |
2008 |
Ambiguity in Transboundary Environmental Dispute Resolution: The Israeli—Jordanian Water Agreement |
Social Solutions, International Responses |
Conflicts, Water |
2008 |
Towards a Cyberspace Legal Regime in the Twenty-First Century |
Activities, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2008 |
Protecting the Electric Grid From Cybersecurity Threats: (U.S. House of Representatives Subcommittee on Energy and Air Quality Hearing) |
Activities, Social Solutions |
Conflicts, Energy, Governance |
2008 |
Toward a Safer and More Secure Cyberspace |
Activities |
Conflicts, Industry |
2007 |
Why States Need an International Law for Information Operations |
Activities, International Responses |
Conflicts, Governance |
2007 |
Exploit Derivatives and National Security |
Activities |
Conflicts, Industry |
2007 |
Climate change and conflict |
Problems |
Conflicts, Energy |
2007 |
A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict |
Activities, International Responses |
Conflicts, Governance, Industry |
2006 |
Roadmap to Secure Control Systems in the Energy Sector |
Activities, Social Solutions |
Conflicts, Energy, Governance, Industry |
2006 |
Models and Measures for Correlation in Cyber-Insurance |
Activities, Social Solutions |
Conflicts, Industry |
2006 |
Countering Urban Terrorism in Russia and the United States |
Activities |
Conflicts, Industry |
2006 |
National Military Strategy for Cyberspace Operations |
Technical Solutions |
Conflicts, Governance, Industry |
2006 |
Critical Infrastructure Threats and Terrorism |
Activities, Social Solutions, International Responses |
Conflicts, Energy, Governance, Industry, Water |
2006 |
Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point, or Patriot Games? |
Activities, Social Solutions, International Responses |
Conflicts |
2006 |
The Economics of Information Security |
Activities, Social Solutions |
Conflicts, Industry, Trade |
2006 |
Information Operations and Cyberwar: Capabilities and Related Policy Issues |
Social Solutions |
Conflicts, Industry |
2006 |
An Introduction to Key Themes in the Economics of Cyber Security |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2006 |
Impact of Software Vulnerability Announcements on the Market Value of Software Vendors |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2005 |
The Role of ICT for Disaster Warning and Relief |
Technical Solutions, International Responses |
Conflicts, Governance, Industry |
2005 |
An Economic Analysis of Notification Requirements for Data Security Breaches |
Activities, Social Solutions |
Conflicts, Industry, Trade |
2005 |
Cyber-Insurance Revisited |
Activities, Social Solutions |
Conflicts, Industry, Trade |
2005 |
Cyber Security: A Crisis of Prioritization |
Activities, Social Solutions |
Conflicts, Governance |
2005 |
Overcoming Impediments to Information Sharing |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2004 |
The Environmental Impacts of the Gulf War 1991 |
Activities, Problems, Technical Solutions, Social Solutions, International Responses |
Agriculture, Conflicts, Consumption, Energy, Land Use, Governance, Industry, Migration, Mobility, Population, Trade, Unmet Needs, Urbanization, Water |
2004 |
Cyber Warfare: An Analysis of the Means and Motivations of Selected Nation States |
Activities, International Responses |
Conflicts, Governance, Industry |
2004 |
Hardening the Internet: Final Report and Recommendations by the Council |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2004 |
A Model for When Disclosure Helps Security: What is Different About Computer and Network Security? |
Activities |
Conflicts, Industry |
2004 |
Sustainability: a gender studies perspective |
Problems, Social Solutions |
Conflicts, Consumption, Governance |
2003 |
OSCE Document on Stockpiles of Conventional Ammunition |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2003 |
National Strategy to Secure Cyberspace |
Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2003 |
Cyber Security Research and Development Agenda |
Activities, Technical Solutions |
Conflicts, Industry |
2003 |
Security in Cyberspace: Combatting Distributed Denial of Service Attacks |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2003 |