Internet matters: The Net's sweeping impact on growth, jobs, and prosperity |
Activities, Social Solutions |
Governance, Trade |
2013 |
Assessing Western perspectives on Chinese Intelligence |
Activities, Problems |
Conflicts, Governance |
2012 |
WikiLeaks and the Age of Transparency |
Activities, Problems, International Responses |
Conflicts, Governance |
2013 |
Joint Operation Planning, 2011 |
Social Solutions, International Responses |
Conflicts, Governance |
2011 |
National Strategy to Secure Cyberspace |
Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2003 |
National Military Strategy for Cyberspace Operations |
Technical Solutions |
Conflicts, Governance, Industry |
2006 |
Information Operations |
Technical Solutions |
Governance |
2012 |
National Security Strategy |
Activities, Problems, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
Department of Defense Dictionary of Military and Associated Terms |
Social Solutions |
Governance |
2010 |
Cyber Operations: Air Force Doctrine Document 3-12 |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
Dominant Factors in National Information Security Policies |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2010 |
Informational trends for organizations in information society |
Activities, Technical Solutions |
Governance, Industry |
2007 |
Secure web application development and global regulation |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2007 |
Privacy and Data Protection in Cyberspace in Indian Environment |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2010 |
A Generic Framework for Network Forensics |
Technical Solutions, Social Solutions |
Governance, Industry |
2010 |
Tracing the Origins of Distributed Denial of Service Attacks |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2011 |
New Strategy for Detecting Intrusion by Using c4.5 Algorithm |
Technical Solutions |
Governance, Industry |
2012 |
Cyberpiracy and morality: Some utilitarian and deontological challenges |
Activities, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
Comprehensive Security Framework for Global Threats Analysis |
Activities, Technical Solutions, Social Solutions, International Responses |
Governance, Industry |
2009 |
Security in Cyberspace: Combatting Distributed Denial of Service Attacks |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2003 |
Systematic Digital Forensic Investigation Model |
Technical Solutions, Social Solutions |
Governance, Industry |
2011 |
A Wide Scale Survey on Botnet |
Activities, Technical Solutions |
Conflicts, Governance, Industry |
2011 |
Applying the Full Protection and Security Standard of International Investment Law to Digital Assets |
Activities, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2011 |
Modeling Human Behavior to Anticipate Insider Attacks |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2011 |
An investigation into Chinese cybercrime and the underground economy in comparison with the West |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
Global tendencies and local implications: cyber exclusion of and within Western Balkan countries |
Activities, Technical Solutions, Social Solutions, International Responses |
Governance, Industry |
2006 |
Specification, Analyzing Challenges and Approaches for Cyber-Physical Systems (CPS) |
Technical Solutions |
Governance, Industry |
2010 |
Cyber trust and crime prevention: a synthesis of the state-of-the-art science reviews |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2013 |
e-Government Ethics: a Synergy of Computer Ethics, Information Ethics, and Cyber Ethics |
Activities, Problems, Technical Solutions, Social Solutions |
Governance, Industry |
2011 |
A Relationship on the Rocks: Industry-Government Partnership for Cyber Defense |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2011 |
Hacktivism: A Theoretical and Empirical Exploration of China’s Cyber Warriors |
Activities, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2011 |
Study of Indian Banks Websites for Cyber Crime Safety Mechanism |
Activities, Technical Solutions |
Governance, Industry |
2011 |
Cyber socializing and victimization of women |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2009 |
Evaluation of Vulnerability Assessment in System From Hackers in Cyber Security |
Activities, Technical Solutions |
Governance, Industry |
2010 |
China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2011 |
Addressing Cyber Instability |
Activities, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2012 |
Depleted Trust in the Cyber Commons |
Activities, Technical Solutions, International Responses |
Governance, Industry |
2013 |
National Cyber Security Framework Manual |
International Responses |
Conflicts, Governance, Industry |
2012 |
UNESCO Science and Technology Policy Forums Handout |
Technical Solutions, International Responses |
Governance, Industry |
2013 |
UNESCO Science for Peace and Development |
Problems, Technical Solutions, International Responses |
Energy, Governance, Industry |
2013 |
UNESCO Science Policy for Sustainable Development |
Problems, Technical Solutions, International Responses |
Governance, Industry |
2010 |
Sharjah Water and Electricity Authority |
Activities, Problems, Technical Solutions, Social Solutions, International Responses |
Consumption, Energy, Governance, Water |
2013 |
Emiratisation: drawing UAE nationals into their surging economy |
Social Solutions |
Governance, Population |
2008 |
Is OPEC a Cartel? Evidence from Cointegration and Causality Tests |
Social Solutions |
Energy, Governance |
1996 |
Internet Banking: An empirical investigation into the extent of adoption by banks and the determinants of customer satisfaction in the United Arab Emirates |
Social Solutions |
Governance, Trade |
2006 |
Health status of cement workers in the United Arab Emirates |
Technical Solutions, Social Solutions |
Governance, Industry, Population |
2013 |
Construction claims in United Arab Emirates: Types, causes, and frequency |
Social Solutions |
Governance, Industry |
2013 |
Department of Economic Devleopment, Dubai |
Social Solutions |
Governance, Industry, Trade |
2013 |
Abu Dhabi Water and Electricity Company |
Activities, Problems, Technical Solutions, Social Solutions |
Consumption, Energy, Governance, Water |
2013 |
Technology and Development: Implications for the Middle East |
Problems |
Governance, Industry, Mobility, Trade |
2003 |