Related Publications for "Safeguarding Cyber-Security, Fighting in Cyberspace"
July 2013
-
Jul 2013
Mixed Method Evaluation of a Passive mHealth Sexual Information Texting Service in Uganda
Author: Julian Jameson, Dean Karlan, Pia Raffler
Publisher: Center for Global Development (CGD)
This paper evaluates the impact of a health information intervention implemented through mobile phones in Uganda. More on «Mixed Method Evaluation of a Passive mHealth Sexual Information Texting Service in Uganda»
June 2013
-
19 Jun 2013
Cybersecurity: Authoritative Reports and Resources
Author: Rita Tehan
Publisher: Congressional Research Service (CRS)
This report discusses selected authoritative resources and data of government agencies, academic institutions, think tanks, security consultants, and trade associations concerning the issue of cybersecurity. More on «Cybersecurity: Authoritative Reports and Resources» -
Jun 2013
Enter the Cyber Dragon: Understanding Chinese Intelligence Agencies’ Cyber Capabilities
Author: Tobias Feakin
Publisher: Australian Strategic Policy Institute (ASPI)
This paper examines Chinese intelligence agencies and how they exploit cyberspace. More on «Enter the Cyber Dragon: Understanding Chinese Intelligence Agencies’ Cyber Capabilities» -
Jun 2013
Is Information Power? Using Mobile Phones and Free Newspapers During an Election in Mozambique
Author: Jenny Aker, Paul Collier, Pedro C Vicente
Publisher: Center for Global Development (CGD)
This paper reports the results of a field experiment conducted prior to and during the October 2009 elections in Mozambique. More on «Is Information Power? Using Mobile Phones and Free Newspapers During an Election in Mozambique» -
Jun 2013
Addressing Cyber Threats to Oil and Gas Suppliers
Author: Blake Clayton, Adam Segal
Publisher: Council on Foreign Relations (CFR)
This report describes the nature of cyber threats to oil and gas suppliers in the US and their potential costs. More on «Addressing Cyber Threats to Oil and Gas Suppliers»
May 2013
-
May 2013
Military and Strategic Affairs, Vol 5, No 1
Author: Yoni Eshpar, Gil Baram, Amir Averbuch, Gabi Siboni, Daniel Cohen, Aviv Rotbart, Yiftah S Shapir, Asa Kasher, Amos Yadlin, Matthew Crosston
Publisher: Institute for National Security Studies (INSS)
The articles in this issue address the role of legal transparency in national security policy; various aspects of cyber warfare, defense and strategy; Israel's Iron Dome defense system; and international law and the ethics of the war on terror. More on «Military and Strategic Affairs, Vol 5, No 1»
April 2013
-
17 Apr 2013
Cybersecurity
Author: Edward C Liu, Gina Stevens, Kathleen Ann Ruane, Alissa M Dolan, Richard M Thompson II, Andrew Nolan
Publisher: Congressional Research Service (CRS)
This report addresses some of the legal issues related to cyber security. More on «Cybersecurity» -
Apr 2013
Operational Cyber: A Global View
Author: Ralph D Thiele
Publisher: Institut für Strategie- Politik- Sicherheits- und Wirtschaftsberatung (ISPSW)
This paper looks at cyber-security and its evolving role in national security. More on «Operational Cyber: A Global View »
March 2013
-
26 Mar 2013
Time for an International Law on Cyber Conflicts
Author: Rafał Tarnogórski
Publisher: Polish Institute of International Affairs (PISM)
This commentary advocates the adoption of an international legal framework to address cyber-warfare. More on «Time for an International Law on Cyber Conflicts» -
25 Mar 2013
Tackling Global Problems with Big Data
Author: Viktor Mayer-Schönberger, Kenneth Cukier
Publisher: Chatham House
This is a transcript of a discussion on big data and its impact on people's lives. More on «Tackling Global Problems with Big Data»


