Countering Urban Terrorism in Russia and the United States |
Activities |
Conflicts, Industry |
2006 |
Roadmap to Secure Control Systems in the Energy Sector |
Activities, Social Solutions |
Conflicts, Energy, Governance, Industry |
2006 |
National Military Strategy for Cyberspace Operations |
Technical Solutions |
Conflicts, Governance, Industry |
2006 |
Critical Infrastructure Threats and Terrorism |
Activities, Social Solutions, International Responses |
Conflicts, Energy, Governance, Industry, Water |
2006 |
Exploit Derivatives and National Security |
Activities |
Conflicts, Industry |
2007 |
Climate change and conflict |
Problems |
Conflicts, Energy |
2007 |
Toward a Safer and More Secure Cyberspace |
Activities |
Conflicts, Industry |
2007 |
Why States Need an International Law for Information Operations |
Activities, International Responses |
Conflicts, Governance |
2007 |
The Constitution in the National Surveillance State |
Social Solutions, International Responses |
Conflicts, Governance |
2008 |
Ambiguity in Transboundary Environmental Dispute Resolution: The Israeli—Jordanian Water Agreement |
Social Solutions, International Responses |
Conflicts, Water |
2008 |
Towards a Cyberspace Legal Regime in the Twenty-First Century |
Activities, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2008 |
Protecting the Electric Grid From Cybersecurity Threats: (U.S. House of Representatives Subcommittee on Energy and Air Quality Hearing) |
Activities, Social Solutions |
Conflicts, Energy, Governance |
2008 |
Securing Cyberspace for the 44th Presidency: A report of the CSIS Commission on Cybersecurity for the 44th Presidency |
Social Solutions, International Responses |
Conflicts, Governance |
2008 |
Securing the Information Highway: How to Enhance the United States' Electronic Defenses |
Activities |
Conflicts, Governance |
2009 |
Cyber socializing and victimization of women |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2009 |
Cyberwarfare and the Use of Force Giving Rise to the Right of Self-Defense |
Activities |
Conflicts, Industry |
2009 |
Technology, Policy, Law, and Ethics Regarding Acquisition and Use of U.S. Cyberattack Capabilities |
Activities |
Conflicts, Governance |
2009 |
From Nuclear War to Net War: Analogizing Cyber Attacks in International Law |
Activities |
Conflicts, Industry |
2009 |
Digital Disaster, Cyber Security, and the Copenhagen School |
Activities, Problems |
Conflicts |
2009 |
Solving the Dilemma of State Responses to Cyberattacks |
Activities, International Responses |
Conflicts, Governance |
2009 |
Cyber Operations: The New Balance |
Activities, Social Solutions |
Conflicts, Governance |
2009 |
A Roadmap for Cybersecurity Research |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance |
2009 |
Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure |
Activities, International Responses |
Conflicts, Governance |
2009 |
Multilateral Agreements to Constrain Cyberconflict |
International Responses |
Conflicts |
2010 |
Ecological sustainability and peace: The effect of ecological sustainability on interstate and intrastate environmental conflict |
Social Solutions |
Conflicts, Energy, Governance |
2010 |
Proceedings of a Workshop on Deterring CyberAttacks: Informing Strategies and Developing Options for U.S. Policy |
Activities, Social Solutions |
Conflicts, Industry |
2010 |
International Cyber Incidents: Legal Considerations |
International Responses |
Conflicts, Governance |
2010 |
The Revolution in Military Affairs |
Activities, Social Solutions |
Conflicts |
2010 |
Astana Commemorative Declaration: Towards A Security Community |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2010 |
Defense Industrial Base Assessment |
Activities, Social Solutions |
Conflicts, Governance, Trade |
2010 |
Cyber Security and International Agreements |
Activities, Problems, Social Solutions, International Responses |
Conflicts, Governance, Industry, Trade |
2010 |
Cyberwarfare: Law & Policy Proposals for U.S. & Global Governance - Updated |
Activities |
Conflicts, Industry |
2010 |
From Global Village to Virtual Battlespace: The Colonizing of the Internet and the Extension of Realpolitik |
Activities, Social Solutions |
Conflicts, Governance |
2010 |
Letter Report for the Committee on Deterring Cyberattacks |
Activities |
Conflicts, Industry |
2010 |
A Treaty for Cyberspace |
Activities, Problems, Social Solutions, International Responses |
Conflicts |
2010 |
Cyberpiracy and morality: Some utilitarian and deontological challenges |
Activities, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
Soverign Discourse on Cyber Conflict under International Law |
Problems, Social Solutions, International Responses |
Conflicts, Governance |
2010 |
Thinking Through Active Defense in Cyberspace |
Activities |
Conflicts |
2010 |
Cyber-Deterrence |
Activities |
Conflicts, Industry |
2010 |
Cyber Operations: Air Force Doctrine Document 3-12 |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
Diffusion and Effects of Cyber-Crime in Developing Economies |
Activities, Social Solutions |
Conflicts, Population, Urbanization |
2010 |
Congress's Role in Cyber Warfare |
Activities |
Conflicts, Industry |
2010 |
An investigation into Chinese cybercrime and the underground economy in comparison with the West |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
Space Weaponization and the United Nations Charter Regime on Force: A Thick Legal Fog or a Receding Mist? |
Activities |
Conflicts |
2010 |
Cyber Warfare and Precautions Against the Effects of Attacks |
Activities |
Conflicts, Industry |
2010 |
NATO Review: Road to 21st century security |
Activities, International Responses |
Conflicts, Governance, Industry, Trade |
2010 |
A treaty for cyberspace |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2010 |
National Security Strategy |
Activities, Problems, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
Combatant Status and Computer Network Attack |
Activities |
Conflicts, Industry |
2010 |
Former NSA Director: Countries Spewing Cyberattacks Should Be Held Responsible |
Social Solutions |
Conflicts, Governance |
2010 |