Number of Syrian refugees tops 2 million mark with more on the way |
International Responses |
Conflicts, Migration |
2013 |
Weathering climate change: Can institutions mitigate international water conflict? |
Problems, Social Solutions, International Responses |
Conflicts, Governance, Migration, Water |
2013 |
Ambiguity in Transboundary Environmental Dispute Resolution: The Israeli—Jordanian Water Agreement |
Social Solutions, International Responses |
Conflicts, Water |
2008 |
Ecological sustainability and peace: The effect of ecological sustainability on interstate and intrastate environmental conflict |
Social Solutions |
Conflicts, Energy, Governance |
2010 |
Assessing Western perspectives on Chinese Intelligence |
Activities, Problems |
Conflicts, Governance |
2012 |
WikiLeaks and the Age of Transparency |
Activities, Problems, International Responses |
Conflicts, Governance |
2013 |
Joint Operation Planning, 2011 |
Social Solutions, International Responses |
Conflicts, Governance |
2011 |
The National Military Strategy of the United States of America |
Activities, Social Solutions |
Conflicts, Governance |
2015 |
National Strategy to Secure Cyberspace |
Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2003 |
National Military Strategy for Cyberspace Operations |
Technical Solutions |
Conflicts, Governance, Industry |
2006 |
National Security Strategy |
Activities, Problems, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
Joint Operations |
Social Solutions, International Responses |
Conflicts, Governance |
2011 |
Cyber Operations: Air Force Doctrine Document 3-12 |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
Cyberpiracy and morality: Some utilitarian and deontological challenges |
Activities, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
Security in Cyberspace: Combatting Distributed Denial of Service Attacks |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2003 |
A Wide Scale Survey on Botnet |
Activities, Technical Solutions |
Conflicts, Governance, Industry |
2011 |
Applying the Full Protection and Security Standard of International Investment Law to Digital Assets |
Activities, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2011 |
Formulating Specialized Legislation to Address the Growing Spectre of Cybercrime: A Comparative Study |
Activities, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2009 |
An investigation into Chinese cybercrime and the underground economy in comparison with the West |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
Hacktivism: A Theoretical and Empirical Exploration of China’s Cyber Warriors |
Activities, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2011 |
Cyber socializing and victimization of women |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2009 |
China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2011 |
Cyber Security Within The Globalization Process |
Activities, Technical Solutions, International Responses |
Conflicts, Industry |
2012 |
Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy |
Technical Solutions, Social Solutions, International Responses |
Conflicts, Industry |
2011 |
Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses |
Technical Solutions, Social Solutions, International Responses |
Conflicts, Industry |
2011 |
A Study on Cyber Crimes and Protection |
Technical Solutions, Social Solutions |
Conflicts, Industry |
2011 |
Establishing Cyber Warfare Doctrine |
Technical Solutions, Social Solutions, International Responses |
Conflicts, Industry |
2012 |
Addressing Cyber Instability |
Activities, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2012 |
National Cyber Security Framework Manual |
International Responses |
Conflicts, Governance, Industry |
2012 |
What visibility conceals. Re-embedding Refugee Migration from Iraq |
Activities |
Conflicts, Migration, Population |
2013 |
The Politics of Population Movements in Contemporary Iraq: A Research Agenda |
Activities, Social Solutions |
Conflicts, Governance, Population |
2013 |
Iraq War: Background and Issues Overview |
Activities |
Conflicts, Governance |
2013 |
Theories of Conflict and the Iraq War |
Activities |
Conflicts |
2013 |
Effect of the Gulf War on Infant and Child Mortality in Iraq |
International Responses |
Conflicts, Governance, Trade |
1992 |
Kuwait: Detailed Assessment Report on Anti-Money Laundering and Combating the Financing of Terrorism |
Social Solutions |
Conflicts, Governance, Migration, Urbanization |
2011 |
Kuwait: Security, Reform, and U.S. Policy |
Social Solutions |
Conflicts, Governance, Trade |
2012 |
Confidence-building and international agreement in cybersecurity |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2013 |
Cyber Operations and the Jus in Bello: Key Issues |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2013 |
The Spy who Came in from the Cold War: Intelligence and International Law |
Activities, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2013 |
Cyber Security and International Agreements |
Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
Permanent mission of the UAE to the United Nations-Occupation of the Three Islands |
Social Solutions, International Responses |
Conflicts, Land Use, Governance |
2013 |
The Economic Costs of the Iraq War: An Appraisal Three Years After the Beginning of the Conflict |
Social Solutions |
Conflicts |
2013 |
Sovereign Discourse on Cyber Conflict Under International Law |
Social Solutions, International Responses |
Conflicts, Governance |
2012 |
Perspectives for Cyber Strategists on Law for Cyberwar |
Technical Solutions, International Responses |
Conflicts, Governance, Industry |
2011 |
Emerging Cyber Threats Report 2013 - Georgia Tech Institute Summit |
Activities, Technical Solutions, International Responses |
Conflicts, Governance, Industry |
2012 |
Cyber Warfare: An Analysis of the Means and Motivations of Selected Nation States |
Activities, International Responses |
Conflicts, Governance, Industry |
2004 |
The Five Futures of Cyber Conflict and Cooperation |
Social Solutions, International Responses |
Conflicts, Governance, Industry |
2012 |
Classification of Cyber Conflict |
Activities, International Responses |
Conflicts, Industry |
2012 |
International Cyber Incidents: Legal Considerations |
International Responses |
Conflicts, Governance |
2010 |
The Problem Isn't Attribution; It's Multi-Stage Attacks |
Activities |
Conflicts, Governance |
2012 |