Cybersecurity Gets Smart |
Technical Solutions |
Conflicts |
2016 |
Cybersecurity and the North American Electric Grid: New Policy Approaches to Address an Evolving Threat |
Problems, Social Solutions |
Conflicts, Energy, Governance |
2014 |
Cyberpolitics in International Relations |
Activities |
Conflicts, Governance |
2012 |
Cyberpiracy and morality: Some utilitarian and deontological challenges |
Activities, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
Cyber-Insurance Revisited |
Activities, Social Solutions |
Conflicts, Industry, Trade |
2005 |
Cyber-Deterrence |
Activities |
Conflicts, Industry |
2010 |
Cyber Warfare: An Analysis of the Means and Motivations of Selected Nation States |
Activities, International Responses |
Conflicts, Governance, Industry |
2004 |
Cyber Warfare and Sino-American Crisis Instability |
Activities |
Conflicts |
2018 |
Cyber Warfare and Precautions Against the Effects of Attacks |
Activities |
Conflicts, Industry |
2010 |
Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point, or Patriot Games? |
Activities, Social Solutions, International Responses |
Conflicts |
2006 |
Cyber socializing and victimization of women |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2009 |
Cyber Security: A Crisis of Prioritization |
Activities, Social Solutions |
Conflicts, Governance |
2005 |
Cyber Security Without Cyber War |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2012 |
Cyber Security Within The Globalization Process |
Activities, Technical Solutions, International Responses |
Conflicts, Industry |
2012 |
Cyber Security Research and Development Agenda |
Activities, Technical Solutions |
Conflicts, Industry |
2003 |
Cyber Security and International Law |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2012 |
Cyber Security and International Agreements |
Activities, Problems, Social Solutions, International Responses |
Conflicts, Governance, Industry, Trade |
2010 |
Cyber Security and International Agreements |
Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
Cyber Politics: Understanding the Use of Social Media for Dissident Movements in an Integrated State Stability Framework |
Activities |
Conflicts, Governance |
2012 |
Cyber Operations: The New Balance |
Activities, Social Solutions |
Conflicts, Governance |
2009 |
Cyber Operations: Air Force Doctrine Document 3-12 |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
Cyber Operations and the Jus in Bello: Key Issues |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2013 |
Critical Terminology Foundations (updated version) |
Social Solutions, International Responses |
Conflicts |
2014 |
Critical Infrastructure Threats and Terrorism |
Activities, Social Solutions, International Responses |
Conflicts, Energy, Governance, Industry, Water |
2006 |
CREA (Conservation through Research, Education, and Action) Balancing People and Nature |
Activities, Problems, Social Solutions |
Energy, Agriculture, Land Use, Conflicts, Unmet Needs, Population |
---- |
Countering Urban Terrorism in Russia and the United States |
Activities |
Conflicts, Industry |
2006 |
Contested Cyberspace and Rising Powers |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2013 |
Congress's Role in Cyber Warfare |
Activities |
Conflicts, Industry |
2010 |
Conflict over Natural Resources in South-East Asia and the Pacific. |
Activities |
Conflicts |
1990 |
Confidence-building and international agreement in cybersecurity |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2013 |
Conciliation Resources |
Social Solutions |
Conflicts |
---- |
Combatant Status and Computer Network Attack |
Activities |
Conflicts, Industry |
2010 |
Code of Conduct on Politico-Military Aspects of Security |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
1994 |
Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents |
Activities, Problems, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry, Unmet Needs |
2015 |
Climate Change and International Security |
Problems, Social Solutions |
Conflicts, Governance |
---- |
Climate change and conflict |
Problems |
Conflicts, Energy |
2007 |
Classification of Cyber Conflict |
Activities, International Responses |
Conflicts, Industry |
2012 |
Civil War in Syria and the ‘New Wars’ Debate |
Problems, Social Solutions |
Conflicts |
2013 |
China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2011 |
China's Electronic Strategies |
Activities |
Conflicts, Industry |
2001 |
Center for Nonproliferation Studies (CNS) |
Activities, Technical Solutions, Social Solutions, Problems |
Conflicts |
---- |
Center for Defense Information |
Activities |
Conflicts |
---- |
CARE |
Social Solutions |
Conflicts |
---- |
Canadian Coalition for Nuclear Responsibility |
Activities, Technical Solutions, Social Solutions, Problems |
Conflicts |
---- |
Cain |
Activities |
Conflicts |
---- |
Building Cybersecurity Awareness: The need for evidence-based framing strategies |
Activities |
Conflicts, Governance, Industry |
2017 |
Bonn International Center for Conversion |
Activities, Technical Solutions, Social Solutions |
Conflicts |
---- |
Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy |
Technical Solutions, Social Solutions, International Responses |
Conflicts, Industry |
2011 |
Astana Commemorative Declaration: Towards A Security Community |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2010 |
Assessing Western perspectives on Chinese Intelligence |
Activities, Problems |
Conflicts, Governance |
2012 |