|
OSCE Document on Small Arms and Light Weapons |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2000 |
|
Vienna Document 2011 on Confidence- and Security-Building Measures |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2011 |
|
Astana Commemorative Declaration: Towards A Security Community |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2010 |
|
OSCE Annual Report 2011 |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2012 |
|
Cyber Operations: The New Balance |
Activities, Social Solutions |
Conflicts, Governance |
2009 |
|
Why States Need an International Law for Information Operations |
Activities, International Responses |
Conflicts, Governance |
2007 |
|
The National Strategy to Secure Cyberspace |
Activities, International Responses |
Conflicts, Governance |
2003 |
|
Cyber Security: A Crisis of Prioritization |
Activities, Social Solutions |
Conflicts, Governance |
2005 |
|
Hardening the Internet: Final Report and Recommendations by the Council |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2004 |
|
Modeling Cyber-Insurance |
Activities, Social Solutions |
Conflicts, Industry |
2010 |
|
Models and Measures for Correlation in Cyber-Insurance |
Activities, Social Solutions |
Conflicts, Industry |
2006 |
|
Securing Cyberspace for the 44th Presidency: A report of the CSIS Commission on Cybersecurity for the 44th Presidency |
Social Solutions, International Responses |
Conflicts, Governance |
2008 |
|
An Assessment of International Legal Issues in Information Operations |
Activities, International Responses |
Conflicts, Governance |
1999 |
|
The Economics of Information Security |
Activities, Social Solutions |
Conflicts, Industry, Trade |
2006 |
|
Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure |
Activities, International Responses |
Conflicts, Governance |
2009 |
|
Impact of Software Vulnerability Announcements on the Market Value of Software Vendors |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2005 |
|
Overcoming Impediments to Information Sharing |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2004 |
|
Towards a Cyberspace Legal Regime in the Twenty-First Century |
Activities, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2008 |
|
Defense Industrial Base Assessment |
Activities, Social Solutions |
Conflicts, Governance, Trade |
2010 |
|
Is Cybersecurity a Public Good? Evidence from the Financial Services Industry |
Activities, Social Solutions |
Conflicts, Industry, Trade |
2001 |
|
An Economic Analysis of Notification Requirements for Data Security Breaches |
Activities, Social Solutions |
Conflicts, Industry, Trade |
2005 |
|
An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2011 |
|
An Introduction to Key Themes in the Economics of Cyber Security |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2006 |
|
Cyber-Insurance Revisited |
Activities, Social Solutions |
Conflicts, Industry, Trade |
2005 |
|
Cyber Security Research and Development Agenda |
Activities, Technical Solutions |
Conflicts, Industry |
2003 |
|
A Roadmap for Cybersecurity Research |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance |
2009 |
|
Roadmap to Secure Control Systems in the Energy Sector |
Activities, Social Solutions |
Conflicts, Energy, Governance, Industry |
2006 |
|
A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict |
Activities, International Responses |
Conflicts, Governance, Industry |
2006 |
|
The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets |
Activities, Social Solutions |
Conflicts, Governance |
2003 |
|
Critical Infrastructure Threats and Terrorism |
Activities, Social Solutions, International Responses |
Conflicts, Energy, Governance, Industry, Water |
2006 |
|
Solving the Dilemma of State Responses to Cyberattacks |
Activities, International Responses |
Conflicts, Governance |
2009 |
|
Information Communication Technology for Peace: The Role of ICT in Preventing, Responding to, and Recovering from Conflict |
Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance |
---- |
|
Climate Change and International Security |
Problems, Social Solutions |
Conflicts, Governance |
---- |
|
Information Warfare as International Coercion: Elements of a Legal Framework |
Activities |
Conflicts, Industry |
2001 |
|
Cyber Warfare and Precautions Against the Effects of Attacks |
Activities |
Conflicts, Industry |
2010 |
|
Countering Urban Terrorism in Russia and the United States |
Activities |
Conflicts, Industry |
2006 |
|
Combatant Status and Computer Network Attack |
Activities |
Conflicts, Industry |
2010 |
|
"Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework" |
Activities |
Conflicts, Industry |
1999 |
|
Information Assurance for Network-Centric Naval Forces |
Activities |
Conflicts, Industry |
2010 |
|
Low-Intensity Computer Network Attack and Self-Defense |
Activities |
Conflicts, Industry |
2010 |
|
Information Warfare and International Law |
Activities |
Conflicts, Industry |
1998 |
|
China's Electronic Strategies |
Activities |
Conflicts, Industry |
2001 |
|
Proceedings of a Workshop on Deterring CyberAttacks: Informing Strategies and Developing Options for U.S. Policy |
Activities, Social Solutions |
Conflicts, Industry |
2010 |
|
Exploit Derivatives and National Security |
Activities |
Conflicts, Industry |
2007 |
|
Information Operations and Cyberwar: Capabilities and Related Policy Issues |
Social Solutions |
Conflicts, Industry |
2006 |
|
A Proposal for an International Convention on Cyber Crime and Terrorism |
Activities |
Conflicts, Industry |
2000 |
|
Cyberwarfare: Law & Policy Proposals for U.S. & Global Governance - Updated |
Activities |
Conflicts, Industry |
2010 |
|
A Model for When Disclosure Helps Security: What is Different About Computer and Network Security? |
Activities |
Conflicts, Industry |
2004 |
|
Letter Report for the Committee on Deterring Cyberattacks |
Activities |
Conflicts, Industry |
2010 |
|
Cyberwarfare and the Use of Force Giving Rise to the Right of Self-Defense |
Activities |
Conflicts, Industry |
2009 |