Cyberthreat, Government Network Operations, and the Fourth Amendment |
Activities |
Conflicts, Governance, Industry |
2012 |
Everything you need to know about Wikileaks |
Activities |
Governance |
2012 |
Nuclear Lessons for Cyber Security? |
Social Solutions, International Responses |
Conflicts, Governance |
2012 |
Regulators Can Help Obama Secure It |
Activities, Social Solutions |
Governance |
2012 |
Egypt Unrest: How do you shut down Internet service in an entire country? |
Activities, Social Solutions, International Responses |
Governance |
2012 |
Power and Information in Egypt - and Beyond |
Activities |
Governance |
2012 |
Freedom and Anonymity: Keeping the Internet Open |
Technical Solutions |
Governance |
2012 |
Untangling Attribution |
Activities, Technical Solutions |
Conflicts, Governance |
2012 |
jMWE: A Java Toolkit for Detecting Multi-Word Expressions |
Technical Solutions |
Industry |
2012 |
China's Cyberassault on America |
Activities |
Governance |
2012 |
The Strong Story Hypothesis and the Directed Perception Hypothesis |
Social Solutions |
Governance |
2012 |
Protecting the Internet as a Public Commons |
Activities |
Industry |
2012 |
Dim Prospects for Cybersecurity Law in 2011 |
Activities, Social Solutions |
Governance |
2012 |
Semantic Distances for Technology Landscape Visualization |
Activities |
Governance |
2012 |
The Future of Power - Book |
Activities |
Governance, Industry |
2012 |
Perspectives: Towards a Common Wireless Market: Why the FCC Should Promote a Single Interoperable Technological Market for Mobile Devices |
Activities, Social Solutions |
Governance, Industry |
2012 |
The Convergence of Cyberspace and Sustainability |
Activities, Social Solutions, International Responses |
Consumption, Energy, Governance |
2012 |
Internet Service Providers are the Front Line of Cyber-Defence |
Activities, International Responses |
Governance |
2012 |
A Unified Approach for Taxonomy-Based Technology Forecasting |
Activities |
Governance |
2014 |
The Right Way |
Activities |
Governance, Population |
2012 |
The Next 50 Years: A Personal View |
Activities |
Governance, Industry |
2012 |
Lost in Cyberspace: Harnessing the Internet, International Relations, and Global Security |
Activities, Social Solutions |
Governance, Industry |
2012 |
Empirical Studies of Bottom-Up Internet Governance |
Activities |
Governance, Industry |
2012 |
Cyberpolitics in International Relations |
Activities |
Conflicts, Governance |
2012 |
Would a 'Cyber Warrior' Protect Us? Exploring Trade-Offs Between Attack and Defense of Information Systems |
Activities |
Conflicts, Governance |
2012 |
Cyber Politics: Understanding the Use of Social Media for Dissident Movements in an Integrated State Stability Framework |
Activities |
Conflicts, Governance |
2012 |
2012-2017 Defense Intelligence Agency Strategy |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2012 |
National Cybersecurity Center Policy Capture |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2012 |
Department of Defense Cyberspace Policy Report: A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 943 |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2011 |
Blueprint for a Science of Cybersecurity |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2012 |
International Cyber Diplomacy: Promoting Openness, Security and Prosperity in a Networked World |
Activities, Technical Solutions, Social Solutions, International Responses |
Governance |
2012 |
Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2012 |
The Internet in Saudi Arabia |
Activities |
Governance, Industry |
2012 |
Sweeping Ethics Under the Rug |
Activities, International Responses |
Governance, Industry |
2012 |
In the Name of God: Faith Based Internet Censorship in Majority Muslim Countries |
Activities |
Governance, Industry |
2012 |
Mass Media in the Middle East: Patterns of Political & Social Change |
Activities |
Governance, Industry |
2012 |
Information Technology Adoption and Political Regimes |
Activities |
Governance, Industry |
2012 |
Mapping the Arabic blogosphere: Politics and Dissent Online |
Activities |
Industry |
2012 |
Digital Scheherazades in the Arab World |
Activities |
Governance |
2012 |
The Internet in the Arab World: Playground for Political Liberalization |
Activities |
Governance, Industry |
2012 |
Saudi Arabia Ministry of Communication – Content Filtering Policy |
Activities |
Governance, Industry |
2012 |
Ruling the Arab Internet: An analysis of Internet Ownership Trends of Six Arab Countries |
Activities |
Governance, Industry, Trade |
2012 |
UN Global Alliance for ICT and Development: An Introduction |
Problems, Technical Solutions, Social Solutions |
Governance |
2012 |
Smart 2020: Enabling the Low-Carbon Economy in the Information Age |
Problems, Technical Solutions, Social Solutions |
Consumption, Energy, Governance, Industry, Urbanization |
2012 |
National e-Strategies for Development: Global Status and Perspectives 2010 |
Problems, Technical Solutions, Social Solutions |
Governance, Industry |
2012 |
World Economic and Social Survey 2012: In Search of New Development Finance |
Problems, Technical Solutions, Social Solutions |
Energy, Governance, Trade |
2012 |
World Economic and Social Survey 2012: In Search of New Development Finance |
Problems, Technical Solutions, Social Solutions |
Energy, Governance, Trade |
2012 |
A Climate Change Plan for the Purposes of the Kyoto Protocol Implementation Act |
Problems, Technical Solutions, Social Solutions |
Consumption, Energy, Governance |
2012 |
UCDP/PRIO Armed Conflict Dataset Codebook |
Activities, Social Solutions |
Conflicts |
2012 |
WSIS Forum 2012: Identifying Emerging Trends and a Vision Beyond 2015! |
Problems, Social Solutions |
Governance, Industry |
2012 |