Establishing Cyber Warfare Doctrine |
Technical Solutions, Social Solutions, International Responses |
Conflicts, Industry |
2012 |
Ethnic cleansing or resource struggle in Darfur? An empirical analysis |
Activities, Problems, Social Solutions |
Conflicts, Migration, Population |
2013 |
Exploit Derivatives and National Security |
Activities |
Conflicts, Industry |
2007 |
Federation of American Scientists |
Activities, Technical Solutions, Problems |
Conflicts |
---- |
Fellowship of Reconciliation (FOR) |
Social Solutions |
Conflicts |
---- |
FM 3-38 Cyber Electromagnetic Activities |
Technical Solutions, International Responses |
Conflicts, Governance |
2014 |
Former NSA Director: Countries Spewing Cyberattacks Should Be Held Responsible |
Social Solutions |
Conflicts, Governance |
2010 |
France’s New Offensive Cyber Doctrine |
Activities, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2019 |
From Global Village to Virtual Battlespace: The Colonizing of the Internet and the Extension of Realpolitik |
Activities, Social Solutions |
Conflicts, Governance |
2010 |
From Nuclear War to Net War: Analogizing Cyber Attacks in International Law |
Activities |
Conflicts, Industry |
2009 |
Global Exchange of Military Information |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
1994 |
Guidance Notes and Recommendations For Sustainable Development Planning In Lebanon |
Activities, Problems |
Conflicts, Governance, Industry, Trade |
2011 |
Hacktivism: A Theoretical and Empirical Exploration of China’s Cyber Warriors |
Activities, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2011 |
Hardening the Internet: Final Report and Recommendations by the Council |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2004 |
How a Dorm Room Minecraft Scam Brought Down the Internet |
Activities |
Conflicts, Governance |
2019 |
How to Strengthen Nuclear Security in China |
Technical Solutions, International Responses |
Conflicts, Governance |
2015 |
Human Rights and Hacktivism: The Cases of Wikileaks and Anonymous |
Activities, Social Solutions |
Conflicts, Governance |
2018 |
Human Swarms, a real-time method for collective intelligence |
Technical Solutions |
Conflicts, Governance, Industry |
2015 |
Humanitarian Bulletin Syria |
Activities, Problems |
Conflicts, Unmet Needs |
2013 |
ICT - Terrorism & Counter-Terrorism |
Activities |
Conflicts |
---- |
Impact of Software Vulnerability Announcements on the Market Value of Software Vendors |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2005 |
Impediments with Policy Interventions to Foster Cybersecurity |
Social Solutions, International Responses |
Conflicts, Governance |
---- |
In Cyberwar, There are no rules: Why the world desperately needs digital Geneva Conventions. |
International Responses |
Conflicts, Governance |
2018 |
Increasing International Cooperation in Cybersecurity and Adapting Cyber Norms |
Social Solutions, International Responses |
Conflicts, Governance |
2018 |
Index Mundi Factbook for Jordan |
Activities |
Agriculture, Conflicts, Consumption, Energy, Land Use, Governance, Industry, Migration, Mobility, Population, Trade, Unmet Needs, Urbanization, Water |
2012 |
Information Assurance for Network-Centric Naval Forces |
Activities |
Conflicts, Industry |
2010 |
Information Communication Technology for Peace: The Role of ICT in Preventing, Responding to, and Recovering from Conflict |
Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance |
---- |
Information Operations and Cyberwar: Capabilities and Related Policy Issues |
Social Solutions |
Conflicts, Industry |
2006 |
Information Warfare and International Law |
Activities |
Conflicts, Industry |
1998 |
Information Warfare as International Coercion: Elements of a Legal Framework |
Activities |
Conflicts, Industry |
2001 |
Institute of World Affairs (IWA) |
Social Solutions |
Conflicts |
---- |
Institutions for Cyber Security: International Responses and Global Imperatives |
Problems, Technical Solutions |
Conflicts, Governance, Industry |
2014 |
International Cyber Incidents: Legal Considerations |
International Responses |
Conflicts, Governance |
2010 |
International Cybersecurity Strategy: Deterring Foreign Threats and Building Global Cyber Norms |
Problems |
Conflicts, Governance |
2016 |
International Federation of Red Cross and Red Crescent Societies |
Activities, Technical Solutions, Social Solutions, Problems |
Conflicts, Migration, Unmet Needs |
---- |
International Federation of Red Cross and Red Crescent Societies |
Activities, International Responses, Social Solutions, Problems |
Conflicts, Unmet Needs |
---- |
International Institute for strategic Studies |
Social Solutions |
Conflicts |
---- |
Iraq War: Background and Issues Overview |
Activities |
Conflicts, Governance |
2013 |
Is Cybersecurity a Public Good? Evidence from the Financial Services Industry |
Activities, Social Solutions |
Conflicts, Industry, Trade |
2001 |
Jane's Information Group |
Activities |
Conflicts |
---- |
Joint Operation Planning, 2011 |
Social Solutions, International Responses |
Conflicts, Governance |
2011 |
Journal of Public and International Affairs (JPIA) |
Activities, Problems, Technical Solutions, Social Solutions |
Conflicts, Energy, Governance, Trade, Water |
---- |
Kuwait: Detailed Assessment Report on Anti-Money Laundering and Combating the Financing of Terrorism |
Social Solutions |
Conflicts, Governance, Migration, Urbanization |
2011 |
Kuwait: Security, Reform, and U.S. Policy |
Social Solutions |
Conflicts, Governance, Trade |
2012 |
Letter Report for the Committee on Deterring Cyberattacks |
Activities |
Conflicts, Industry |
2010 |
Libya: changing its spots? |
Activities, International Responses, Technical Solutions, Social Solutions |
Conflicts, Energy, Governance, Industry, Mobility, Trade |
---- |
Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy |
Social Solutions |
Conflicts, Governance |
2011 |
Low-Intensity Computer Network Attack and Self-Defense |
Activities |
Conflicts, Industry |
2010 |
Managing Disaster Risks for a Resilient Future A Work Plan for the Global Facility for Disaster Reduction and Recovery 2016 – 2018 |
Problems, Technical Solutions, Social Solutions |
Conflicts, Governance, Population, Trade, Urbanization, Water |
2015 |
Managing Water for Peace in the Middle East: Alternative Strategies |
Activities, Technical Solutions |
Conflicts, Water |
1995 |