The Internet of Things is a Cyberwar Nightmare |
Technical Solutions, Social Solutions |
Conflicts, Governance |
2016 |
The Means to Justify the End: Combating Cyber Harassment in Social Media |
Activities, Social Solutions |
Conflicts, Governance |
2013 |
The National Military Strategy of the United States of America |
Activities, Social Solutions |
Conflicts, Governance |
2015 |
The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets |
Activities, Social Solutions |
Conflicts, Governance |
2003 |
The National Strategy to Secure Cyberspace |
Activities, International Responses |
Conflicts, Governance |
2003 |
The New Policy World of Cybersecurity |
Activities, Social Solutions |
Conflicts, Governance |
2011 |
The Nuclear Control Institute |
Activities, Technical Solutions, Social Solutions |
Conflicts |
---- |
The Politics of Population Movements in Contemporary Iraq: A Research Agenda |
Activities, Social Solutions |
Conflicts, Governance, Population |
2013 |
The Problem Isn't Attribution; It's Multi-Stage Attacks |
Activities |
Conflicts, Governance |
2012 |
The Rainforest Education & Research Centre |
International Responses |
Conflicts |
---- |
The Revolution in Military Affairs |
Activities, Social Solutions |
Conflicts |
2010 |
The Role of ICT for Disaster Warning and Relief |
Technical Solutions, International Responses |
Conflicts, Governance, Industry |
2005 |
The Spy who Came in from the Cold War: Intelligence and International Law |
Activities, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2013 |
The Syria crisis, displacement and protection |
Problems, Social Solutions |
Conflicts, Migration |
2014 |
The Transnational Foundation for Peace and Future Research |
Social Solutions |
Conflicts |
---- |
The Wrong War: The Insistence on Applying Cold War Metaphors to Cybersecurity Is Misplaced and Counterproductive |
Social Solutions, International Responses |
Conflicts, Governance |
2011 |
Theories of Conflict and the Iraq War |
Activities |
Conflicts |
2013 |
Thermonuclear cyberwar |
Activities, Technical Solutions, International Responses |
Conflicts, Governance, Industry |
2018 |
Thinking Through Active Defense in Cyberspace |
Activities |
Conflicts |
2010 |
Toda Institute |
Social Solutions |
Conflicts |
---- |
TOOLKIT AND GUIDANCE FOR PREVENTING AND MANAGING LAND AND NATURAL RESOURCES CONFLICT |
Problems, Social Solutions, International Responses |
Conflicts, Consumption, Governance |
2012 |
Toward a Safer and More Secure Cyberspace |
Activities |
Conflicts, Industry |
2007 |
Towards a Cyberspace Legal Regime in the Twenty-First Century |
Activities, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2008 |
Transforming our world: the 2030 Agenda for Sustainable Development |
Activities, Problems, Social Solutions, International Responses |
Agriculture, Conflicts, Consumption, Energy, Land Use, Governance, Industry, Migration, Population, Trade, Unmet Needs, Urbanization, Water |
2015 |
Transparency International |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
---- |
Tunisia Online |
Activities, International Responses, Technical Solutions, Social Solutions, Problems |
Agriculture, Conflicts, Energy, Land Use, Mobility, Population, Urbanization, Water |
---- |
Twelve Principles of Computer Network Operations |
Activities |
Conflicts |
2002 |
UCDP/PRIO Armed Conflict Dataset Codebook |
Activities, Social Solutions |
Conflicts |
2012 |
UN Office of Disarmament General Assembly Resolutions and Decisions |
Activities |
Conflicts, Governance |
---- |
UNDER PRESSURE: the impact of the Syrian refugee crisis on host communities in Lebanon |
Technical Solutions, Social Solutions, International Responses |
Conflicts, Migration, Population, Unmet Needs |
2013 |
UNESCO’s Education Response to the Syria Crisis: Towards Bridging the Humanitarian- Development Divide |
Activities, Social Solutions |
Conflicts, Migration, Unmet Needs |
2016 |
Union of Concerned Scientists |
Activities, Problems, Technical Solutions, Social Solutions |
Agriculture, Conflicts, Consumption, Energy, Industry, Mobility, Population |
---- |
United Nation Population Fund (Egypt) |
Activities, Social Solutions |
Conflicts, Population, Unmet Needs |
2015 |
United States Army Corps of Engineers |
Technical Solutions, Social Solutions |
Conflicts, Energy, Land Use, Governance, Water |
---- |
United States Naval Research |
Technical Solutions |
Conflicts |
---- |
Untangling Attribution |
Activities, Technical Solutions |
Conflicts, Governance |
2012 |
Vienna Document 2011 on Confidence- and Security-Building Measures |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2011 |
What visibility conceals. Re-embedding Refugee Migration from Iraq |
Activities |
Conflicts, Migration, Population |
2013 |
Why Humanitarians Should Pay Attention to Cybersecurity |
Problems, Social Solutions, International Responses |
Conflicts, Industry |
2014 |
Why States Need an International Law for Information Operations |
Activities, International Responses |
Conflicts, Governance |
2007 |
Why the Internet Is Not Increasing Terrorism |
Problems, Social Solutions |
Conflicts |
2014 |
WikiLeaks and the Age of Transparency |
Activities, Problems, International Responses |
Conflicts, Governance |
2013 |
Women Organising for Change in Syria and Bosnia |
Activities, Social Solutions |
Conflicts, Population |
2014 |
World Resources Institute (WRI) |
Activities, Problems, Technical Solutions, Social Solutions |
Agriculture, Conflicts, Consumption, Energy, Land Use, Governance, Industry, Migration, Mobility, Population, Trade, Unmet Needs, Urbanization, Water |
---- |
Would a 'Cyber Warrior' Protect Us? Exploring Trade-Offs Between Attack and Defense of Information Systems |
Activities |
Conflicts, Governance |
2012 |