Crowdsourcing cyber security: a property rights view of exclusion and theft on the information commons. |
Problems, Social Solutions |
Governance |
2014 |
Cumbre de las Americas sobre Desarrollo Sostenible |
Social Solutions, Technical Solutions, Problems, Activities |
Energy, Trade, Land Use, Consumption, Population, Governance |
---- |
Cyber Operations and the Jus Ad Bellum Revisited |
Activities, Social Solutions, International Responses |
Governance, Industry |
2013 |
Cyber Operations and the Jus in Bello: Key Issues |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2013 |
Cyber Operations: Air Force Doctrine Document 3-12 |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
Cyber Operations: The New Balance |
Activities, Social Solutions |
Conflicts, Governance |
2009 |
Cyber Politics: Understanding the Use of Social Media for Dissident Movements in an Integrated State Stability Framework |
Activities |
Conflicts, Governance |
2012 |
Cyber risk from a chief risk officer perspective |
Technical Solutions |
Governance, Industry, Trade |
2018 |
Cyber Security and International Agreements |
Activities, Problems, Social Solutions, International Responses |
Conflicts, Governance, Industry, Trade |
2010 |
Cyber Security and International Agreements |
Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
Cyber Security and International Law |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2012 |
Cyber Security in the Payment Card Industry |
Activities, Social Solutions |
Governance, Trade |
2008 |
Cyber Security Without Cyber War |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2012 |
Cyber Security: A Crisis of Prioritization |
Activities, Social Solutions |
Conflicts, Governance |
2005 |
Cyber socializing and victimization of women |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2009 |
Cyber trust and crime prevention: a synthesis of the state-of-the-art science reviews |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2013 |
Cyber Warfare: An Analysis of the Means and Motivations of Selected Nation States |
Activities, International Responses |
Conflicts, Governance, Industry |
2004 |
Cyber-Security: The vexed question of global rules, An independent report of cyber-preparedness around the world |
Activities |
Governance |
2013 |
Cyber-victimization and cybersecurity in China |
Activities, Problems, Social Solutions |
Governance, Industry |
2013 |
Cyberpiracy and morality: Some utilitarian and deontological challenges |
Activities, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
Cyberpolitics in International Relations |
Activities |
Conflicts, Governance |
2012 |
Cybersecurity and the Cloud |
Social Solutions |
Governance, Industry |
2011 |
Cybersecurity and the North American Electric Grid: New Policy Approaches to Address an Evolving Threat |
Problems, Social Solutions |
Conflicts, Energy, Governance |
2014 |
Cybersecurity Gateway (ITU) |
Technical Solutions, International Responses |
Industry, Governance |
2010 |
Cybersecurity Strategies: The QuERIES Methodology |
Problems, Technical Solutions |
Governance, Industry |
2007 |
Cybersecurity Treaties: A Skeptical View |
Social Solutions, International Responses |
Governance |
2013 |
Cybersecurity: Authoritative Reports and Resources |
Activities |
Governance |
2013 |
Cybersecurity: Authoritative Reports and Resources |
Activities |
Governance |
2013 |
Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure |
Activities, International Responses |
Conflicts, Governance |
2009 |
Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2012 |
Cyberthreat, Government Network Operations, and the Fourth Amendment |
Activities |
Conflicts, Governance, Industry |
2012 |
Cyberwarfare and International Law |
Social Solutions, International Responses |
Conflicts, Governance |
2011 |
Damascus Call Towards Partnership for Building the Arab Information Society |
Social Solutions, International Responses |
Governance, Industry |
2004 |
Data Wiping and Anti Forensic Techniques |
Technical Solutions |
Governance, Industry |
2015 |
Decoding the Bombshell Story for China |
Activities, Social Solutions |
Conflicts, Governance |
2018 |
Deconstructing yber security in Brazil: Threats in Responses |
Activities, Problems, Social Solutions |
Conflicts, Governance |
2015 |
Decoupling Natural Resource Use and Environmental Impacts from Economic Growth |
Activities, Problems, Social Solutions, International Responses |
Consumption, Energy, Governance, Trade |
2012 |
Defense Industrial Base Assessment |
Activities, Social Solutions |
Conflicts, Governance, Trade |
2010 |
Department of Defense Cyberspace Policy Report: A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 943 |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2011 |
Department of Defense Dictionary of Military and Associated Terms |
Social Solutions |
Governance |
2010 |
Department of Economic Development, Abu Dhabi |
Social Solutions |
Governance, Industry |
2013 |
Department of Economic Devleopment, Dubai |
Social Solutions |
Governance, Industry, Trade |
2013 |
Department of Economic Devleopment, Ras Al Khaimah |
Social Solutions |
Governance, Industry, Trade |
2013 |
Department of Environmental and Occupational Health - Ministry of Health |
Problems, Social Solutions |
Governance, Population, Unmet Needs |
2012 |
Department of Statistics, Jordan: Environment and Urban Architecture |
Activities, Problems |
Agriculture, Energy, Land Use, Governance, Industry, Unmet Needs, Urbanization, Water |
---- |
Depleted Trust in the Cyber Commons |
Activities, Technical Solutions, International Responses |
Governance, Industry |
2013 |
Design for Sustainability and Project Management Literature – A Review |
Problems, Social Solutions |
Governance, Industry |
2017 |
Designing monitoring arrangements for collaborative learning about adaptation pathways |
Social Solutions |
Governance |
2017 |
Deterrence in the Cyber Age |
International Responses |
Conflicts, Governance |
2014 |
Developing sustainable energy policies for electrical energy conservation in Saudi Arabia |
Activities, Problems, Technical Solutions, Social Solutions |
Consumption, Energy, Governance, Unmet Needs |
2006 |