Code of Conduct on Politico-Military Aspects of Security |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
1994 |
Combatant Status and Computer Network Attack |
Activities |
Conflicts, Industry |
2010 |
Conciliation Resources |
Social Solutions |
Conflicts |
---- |
Confidence-building and international agreement in cybersecurity |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2013 |
Conflict over Natural Resources in South-East Asia and the Pacific. |
Activities |
Conflicts |
1990 |
Congress's Role in Cyber Warfare |
Activities |
Conflicts, Industry |
2010 |
Contested Cyberspace and Rising Powers |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2013 |
Countering Urban Terrorism in Russia and the United States |
Activities |
Conflicts, Industry |
2006 |
CREA (Conservation through Research, Education, and Action) Balancing People and Nature |
Activities, Problems, Social Solutions |
Energy, Agriculture, Land Use, Conflicts, Unmet Needs, Population |
---- |
Criminals, Not State Actors, Target Russian Oil Company in 3-Year Cyber Attack |
International Responses |
Conflicts |
2018 |
Critical Infrastructure Threats and Terrorism |
Activities, Social Solutions, International Responses |
Conflicts, Energy, Governance, Industry, Water |
2006 |
Critical Terminology Foundations (updated version) |
Social Solutions, International Responses |
Conflicts |
2014 |
Cyber Operations and the Jus in Bello: Key Issues |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2013 |
Cyber Operations: Air Force Doctrine Document 3-12 |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
Cyber Operations: The New Balance |
Activities, Social Solutions |
Conflicts, Governance |
2009 |
Cyber Politics: Understanding the Use of Social Media for Dissident Movements in an Integrated State Stability Framework |
Activities |
Conflicts, Governance |
2012 |
Cyber Security and International Agreements |
Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
Cyber Security and International Agreements |
Activities, Problems, Social Solutions, International Responses |
Conflicts, Governance, Industry, Trade |
2010 |
Cyber Security and International Law |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2012 |
Cyber Security Research and Development Agenda |
Activities, Technical Solutions |
Conflicts, Industry |
2003 |
Cyber Security Within The Globalization Process |
Activities, Technical Solutions, International Responses |
Conflicts, Industry |
2012 |
Cyber Security Without Cyber War |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2012 |
Cyber Security: A Crisis of Prioritization |
Activities, Social Solutions |
Conflicts, Governance |
2005 |
Cyber socializing and victimization of women |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2009 |
Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point, or Patriot Games? |
Activities, Social Solutions, International Responses |
Conflicts |
2006 |
Cyber Warfare and Precautions Against the Effects of Attacks |
Activities |
Conflicts, Industry |
2010 |
Cyber Warfare and Sino-American Crisis Instability |
Activities |
Conflicts |
2018 |
Cyber Warfare: An Analysis of the Means and Motivations of Selected Nation States |
Activities, International Responses |
Conflicts, Governance, Industry |
2004 |
Cyber-Deterrence |
Activities |
Conflicts, Industry |
2010 |
Cyber-Insurance Revisited |
Activities, Social Solutions |
Conflicts, Industry, Trade |
2005 |
Cyberpiracy and morality: Some utilitarian and deontological challenges |
Activities, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
Cyberpolitics in International Relations |
Activities |
Conflicts, Governance |
2012 |
Cybersecurity and the North American Electric Grid: New Policy Approaches to Address an Evolving Threat |
Problems, Social Solutions |
Conflicts, Energy, Governance |
2014 |
Cybersecurity Gets Smart |
Technical Solutions |
Conflicts |
2016 |
Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure |
Activities, International Responses |
Conflicts, Governance |
2009 |
Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2012 |
Cyberthreat, Government Network Operations, and the Fourth Amendment |
Activities |
Conflicts, Governance, Industry |
2012 |
Cyberwarfare and International Law |
Social Solutions, International Responses |
Conflicts, Governance |
2011 |
Cyberwarfare and the Use of Force Giving Rise to the Right of Self-Defense |
Activities |
Conflicts, Industry |
2009 |
Cyberwarfare: Law & Policy Proposals for U.S. & Global Governance - Updated |
Activities |
Conflicts, Industry |
2010 |
Decoding the Bombshell Story for China |
Activities, Social Solutions |
Conflicts, Governance |
2018 |
Deconstructing yber security in Brazil: Threats in Responses |
Activities, Problems, Social Solutions |
Conflicts, Governance |
2015 |
Defense Industrial Base Assessment |
Activities, Social Solutions |
Conflicts, Governance, Trade |
2010 |
Department of Defense Cyberspace Policy Report: A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 943 |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2011 |
Deterrence in the Cyber Age |
International Responses |
Conflicts, Governance |
2014 |
Diffusion and Effects of Cyber-Crime in Developing Economies |
Activities, Social Solutions |
Conflicts, Population, Urbanization |
2010 |
Digital Disaster, Cyber Security, and the Copenhagen School |
Activities, Problems |
Conflicts |
2009 |
Directorate of Army Research and Analysis - Australian Army |
Activities |
Conflicts |
---- |
Divided by a common language: Cyber definitions in Chinese, Russian and English |
Social Solutions, International Responses |
Conflicts |
2013 |
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis |
Activities, Social Solutions |
Conflicts, Industry |
2006 |