|
Designing monitoring arrangements for collaborative learning about adaptation pathways |
Social Solutions |
Governance |
2017 |
|
Design for Sustainability and Project Management Literature – A Review |
Problems, Social Solutions |
Governance, Industry |
2017 |
|
Depleted Trust in the Cyber Commons |
Activities, Technical Solutions, International Responses |
Governance, Industry |
2013 |
|
Department of Statistics, Jordan: Environment and Urban Architecture |
Activities, Problems |
Agriculture, Energy, Land Use, Governance, Industry, Unmet Needs, Urbanization, Water |
---- |
|
Department of Environmental and Occupational Health - Ministry of Health |
Problems, Social Solutions |
Governance, Population, Unmet Needs |
2012 |
|
Department of Economic Devleopment, Dubai |
Social Solutions |
Governance, Industry, Trade |
2013 |
|
Department of Defense Dictionary of Military and Associated Terms |
Social Solutions |
Governance |
2010 |
|
Department of Defense Cyberspace Policy Report: A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 943 |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2011 |
|
Defense Industrial Base Assessment |
Activities, Social Solutions |
Conflicts, Governance, Trade |
2010 |
|
Decoupling Natural Resource Use and Environmental Impacts from Economic Growth |
Activities, Problems, Social Solutions, International Responses |
Consumption, Energy, Governance, Trade |
2012 |
|
Deconstructing yber security in Brazil: Threats in Responses |
Activities, Problems, Social Solutions |
Conflicts, Governance |
2015 |
|
Decoding the Bombshell Story for China |
Activities, Social Solutions |
Conflicts, Governance |
2018 |
|
Data Wiping and Anti Forensic Techniques |
Technical Solutions |
Governance, Industry |
2015 |
|
Damascus Call Towards Partnership for Building the Arab Information Society |
Social Solutions, International Responses |
Governance, Industry |
2004 |
|
Cyberthreat, Government Network Operations, and the Fourth Amendment |
Activities |
Conflicts, Governance, Industry |
2012 |
|
Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure |
Activities, International Responses |
Conflicts, Governance |
2009 |
|
Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2012 |
|
Cybersecurity: Authoritative Reports and Resources |
Activities |
Governance |
2013 |
|
Cybersecurity: Authoritative Reports and Resources |
Activities |
Governance |
2013 |
|
Cybersecurity Strategies: The QuERIES Methodology |
Problems, Technical Solutions |
Governance, Industry |
2007 |
|
Cybersecurity Gateway (ITU) |
Technical Solutions, International Responses |
Industry, Governance |
2010 |
|
Cybersecurity and the North American Electric Grid: New Policy Approaches to Address an Evolving Threat |
Problems, Social Solutions |
Conflicts, Energy, Governance |
2014 |
|
Cybersecurity and the Cloud |
Social Solutions |
Governance, Industry |
2011 |
|
Cyberpolitics in International Relations |
Activities |
Conflicts, Governance |
2012 |
|
Cyberpiracy and morality: Some utilitarian and deontological challenges |
Activities, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
|
Cyber-victimization and cybersecurity in China |
Activities, Problems, Social Solutions |
Governance, Industry |
2013 |
|
Cyber-Security: The vexed question of global rules, An independent report of cyber-preparedness around the world |
Activities |
Governance |
2013 |
|
Cyber Warfare: An Analysis of the Means and Motivations of Selected Nation States |
Activities, International Responses |
Conflicts, Governance, Industry |
2004 |
|
Cyber trust and crime prevention: a synthesis of the state-of-the-art science reviews |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2013 |
|
Cyber socializing and victimization of women |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2009 |
|
Cyber Security: A Crisis of Prioritization |
Activities, Social Solutions |
Conflicts, Governance |
2005 |
|
Cyber Security Without Cyber War |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2012 |
|
Cyber Security in the Payment Card Industry |
Activities, Social Solutions |
Governance, Trade |
2008 |
|
Cyber Security and International Law |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2012 |
|
Cyber Security and International Agreements |
Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
|
Cyber Security and International Agreements |
Activities, Problems, Social Solutions, International Responses |
Conflicts, Governance, Industry, Trade |
2010 |
|
Cyber risk from a chief risk officer perspective |
Technical Solutions |
Governance, Industry, Trade |
2018 |
|
Cyber Operations: The New Balance |
Activities, Social Solutions |
Conflicts, Governance |
2009 |
|
Cyber Operations: Air Force Doctrine Document 3-12 |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
|
Cyber Operations and the Jus in Bello: Key Issues |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2013 |
|
Cyber Operations and the Jus Ad Bellum Revisited |
Activities, Social Solutions, International Responses |
Governance, Industry |
2013 |
|
Cumbre de las Americas sobre Desarrollo Sostenible |
Social Solutions, Technical Solutions, Problems, Activities |
Energy, Trade, Land Use, Consumption, Population, Governance |
---- |
|
Crowdsourcing cyber security: a property rights view of exclusion and theft on the information commons. |
Problems, Social Solutions |
Governance |
2014 |
|
Cross-Domain Deterrence: Strategy in an Era of Complexity |
Activities |
Governance |
2014 |
|
Cross-Domain Deterrence and Credible Threats |
Activities, Social Solutions |
Governance |
2010 |
|
Critical Infrastructure Threats and Terrorism |
Activities, Social Solutions, International Responses |
Conflicts, Energy, Governance, Industry, Water |
2006 |
|
Critical Foundations: Protecting America's Infrastructure |
Social Solutions |
Governance, Industry |
1997 |
|
Creating the Demand Curve for Cybersecurity |
Activities, Social Solutions |
Governance |
2012 |
|
Creating the Clean Energy Economy: Analysis of the Offshore Wind Energy Industry |
Problems, Social Solutions |
Energy, Governance |
2015 |
|
Country Summary Kuwait |
Social Solutions |
Consumption, Governance, Migration, Population, Urbanization |
2012 |