Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2012 |
UCDP/PRIO Armed Conflict Dataset Codebook |
Activities, Social Solutions |
Conflicts |
2012 |
African Information Society Initiative (AISI) |
Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry, Urbanization |
1996 |
Code of Conduct on Politico-Military Aspects of Security |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
1994 |
Principles Governing Conventional Arms Transfers |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
1993 |
Stabilizing Measures for Localized Crisis Situations |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
1993 |
Global Exchange of Military Information |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
1994 |
OSCE Document on Stockpiles of Conventional Ammunition |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2003 |
OSCE Document on Small Arms and Light Weapons |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2000 |
Vienna Document 2011 on Confidence- and Security-Building Measures |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2011 |
Astana Commemorative Declaration: Towards A Security Community |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2010 |
OSCE Annual Report 2011 |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2012 |
Cyber Operations: The New Balance |
Activities, Social Solutions |
Conflicts, Governance |
2009 |
Why States Need an International Law for Information Operations |
Activities, International Responses |
Conflicts, Governance |
2007 |
The National Strategy to Secure Cyberspace |
Activities, International Responses |
Conflicts, Governance |
2003 |
Cyber Security: A Crisis of Prioritization |
Activities, Social Solutions |
Conflicts, Governance |
2005 |
Hardening the Internet: Final Report and Recommendations by the Council |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2004 |
Modeling Cyber-Insurance |
Activities, Social Solutions |
Conflicts, Industry |
2010 |
Models and Measures for Correlation in Cyber-Insurance |
Activities, Social Solutions |
Conflicts, Industry |
2006 |
Securing Cyberspace for the 44th Presidency: A report of the CSIS Commission on Cybersecurity for the 44th Presidency |
Social Solutions, International Responses |
Conflicts, Governance |
2008 |
An Assessment of International Legal Issues in Information Operations |
Activities, International Responses |
Conflicts, Governance |
1999 |
The Economics of Information Security |
Activities, Social Solutions |
Conflicts, Industry, Trade |
2006 |
Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure |
Activities, International Responses |
Conflicts, Governance |
2009 |
Impact of Software Vulnerability Announcements on the Market Value of Software Vendors |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2005 |
Overcoming Impediments to Information Sharing |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2004 |
Towards a Cyberspace Legal Regime in the Twenty-First Century |
Activities, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2008 |
Defense Industrial Base Assessment |
Activities, Social Solutions |
Conflicts, Governance, Trade |
2010 |
Is Cybersecurity a Public Good? Evidence from the Financial Services Industry |
Activities, Social Solutions |
Conflicts, Industry, Trade |
2001 |
An Economic Analysis of Notification Requirements for Data Security Breaches |
Activities, Social Solutions |
Conflicts, Industry, Trade |
2005 |
An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2011 |
An Introduction to Key Themes in the Economics of Cyber Security |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2006 |
Cyber-Insurance Revisited |
Activities, Social Solutions |
Conflicts, Industry, Trade |
2005 |
Cyber Security Research and Development Agenda |
Activities, Technical Solutions |
Conflicts, Industry |
2003 |
A Roadmap for Cybersecurity Research |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance |
2009 |
Roadmap to Secure Control Systems in the Energy Sector |
Activities, Social Solutions |
Conflicts, Energy, Governance, Industry |
2006 |
A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict |
Activities, International Responses |
Conflicts, Governance, Industry |
2006 |
The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets |
Activities, Social Solutions |
Conflicts, Governance |
2003 |
Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point, or Patriot Games? |
Activities, Social Solutions, International Responses |
Conflicts |
2006 |
Critical Infrastructure Threats and Terrorism |
Activities, Social Solutions, International Responses |
Conflicts, Energy, Governance, Industry, Water |
2006 |
Solving the Dilemma of State Responses to Cyberattacks |
Activities, International Responses |
Conflicts, Governance |
2009 |
Information Communication Technology for Peace: The Role of ICT in Preventing, Responding to, and Recovering from Conflict |
Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance |
---- |
Climate Change and International Security |
Problems, Social Solutions |
Conflicts, Governance |
---- |
Information Assurance for Network-Centric Naval Forces |
Activities |
Conflicts, Industry |
2010 |
Information Warfare and International Law |
Activities |
Conflicts, Industry |
1998 |
Low-Intensity Computer Network Attack and Self-Defense |
Activities |
Conflicts, Industry |
2010 |
China's Electronic Strategies |
Activities |
Conflicts, Industry |
2001 |
Proceedings of a Workshop on Deterring CyberAttacks: Informing Strategies and Developing Options for U.S. Policy |
Activities, Social Solutions |
Conflicts, Industry |
2010 |
Information Operations and Cyberwar: Capabilities and Related Policy Issues |
Social Solutions |
Conflicts, Industry |
2006 |
Exploit Derivatives and National Security |
Activities |
Conflicts, Industry |
2007 |
Information Warfare as International Coercion: Elements of a Legal Framework |
Activities |
Conflicts, Industry |
2001 |