Applying the Full Protection and Security Standard of International Investment Law to Digital Assets |
Activities, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2011 |
An investigation into Chinese cybercrime and the underground economy in comparison with the West |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
An Introduction to Key Themes in the Economics of Cyber Security |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2006 |
An evaluation framework for Cyber Security Strategies |
Technical Solutions, Social Solutions |
Conflicts, Industry |
2014 |
An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods |
Activities, Social Solutions |
Conflicts, Governance, Industry |
2011 |
An Economic Analysis of Notification Requirements for Data Security Breaches |
Activities, Social Solutions |
Conflicts, Industry, Trade |
2005 |
An e-SOS for Cyberspace |
Social Solutions |
Conflicts |
2011 |
An Assessment of North Korean Cyber Threats |
Social Solutions |
Conflicts, Governance |
2019 |
An Assessment of International Legal Issues in Information Operations |
Activities, International Responses |
Conflicts, Governance |
1999 |
Ambiguity in Transboundary Environmental Dispute Resolution: The Israeli—Jordanian Water Agreement |
Social Solutions, International Responses |
Conflicts, Water |
2008 |
Agenda 21 |
Activities, Problems, Technical Solutions, Social Solutions, International Responses |
Agriculture, Conflicts, Consumption, Energy, Land Use, Governance, Industry, Migration, Mobility, Population, Trade, Unmet Needs, Urbanization, Water |
1992 |
African Information Society Initiative (AISI) |
Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry, Urbanization |
1996 |
Addressing Cyber Instability |
Activities, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2012 |
A Wide Scale Survey on Botnet |
Activities, Technical Solutions |
Conflicts, Governance, Industry |
2011 |
A Treaty for Cyberspace |
Activities, Problems, Social Solutions, International Responses |
Conflicts |
2010 |
A treaty for cyberspace |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2010 |
A Study on Cyber Crimes and Protection |
Technical Solutions, Social Solutions |
Conflicts, Industry |
2011 |
A Roadmap for Cybersecurity Research |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance |
2009 |
A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict |
Activities, International Responses |
Conflicts, Governance, Industry |
2006 |
A Proposal for an International Convention on Cyber Crime and Terrorism |
Activities |
Conflicts, Industry |
2000 |
A Precarious Existence: The Shelter Situation of Refugees from Syria in Neighbouring Countries |
Problems, Social Solutions |
Conflicts, Migration, Population, Unmet Needs |
2014 |
A New Old Threat: Countering the Return of Chinese Industrial Cyber Espionage |
International Responses |
Conflicts, Governance |
2019 |
A Model for When Disclosure Helps Security: What is Different About Computer and Network Security? |
Activities |
Conflicts, Industry |
2004 |
A Hotter World Is Poorer and More Violent |
Activities |
Conflicts |
2016 |
A Chinese Perspective on the Pentagon’s Cyber Strategy: From ‘Active Cyber Defense’ to ‘Defending Forward' |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2018 |
2012-2017 Defense Intelligence Agency Strategy |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2012 |
"Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework" |
Activities |
Conflicts, Industry |
1999 |
Weathering climate change: Can institutions mitigate international water conflict? |
Problems, Social Solutions, International Responses |
Conflicts, Governance, Migration, Water |
2013 |
Perspectives for Cyber Strategists on Law for Cyberwar |
Technical Solutions, International Responses |
Conflicts, Governance, Industry |
2011 |