Information on "Information and Communications Technology (ICT)"
July 2013
-
17 Jul 2013
Caucasus Analytical Digest No. 53-54: Post-Elections Armenia
Author: Isabella Sargsyan, Ara Nedolyan, David Petrosyan, Gegham Vardanyan, David Hovhannisyan, Mikhayel Hovhannisyan, Iris Kempe
Publisher: Resource Security Institute (RSI) / Center for Security Studies (CSS) / Heinrich Böll Foundation / Research Centre for East European Studies (FSOE)
This double issue provides an overview of Armenia’s political and economic situation in the wake of the 2012 parliamentary and 2013 presidential and Yerevan City Council elections. More on «Caucasus Analytical Digest No. 53-54: Post-Elections Armenia» -
Jul 2013
Mixed Method Evaluation of a Passive mHealth Sexual Information Texting Service in Uganda
Author: Julian Jameson, Dean Karlan, Pia Raffler
Publisher: Center for Global Development (CGD)
This paper evaluates the impact of a health information intervention implemented through mobile phones in Uganda. More on «Mixed Method Evaluation of a Passive mHealth Sexual Information Texting Service in Uganda»
June 2013
-
20 Jun 2013
Federal Laws Relating to Cybersecurity
Author: Eric A Fischer
Publisher: Congressional Research Service (CRS)
This paper examines legislative proposals to review cyber-security. More on «Federal Laws Relating to Cybersecurity» -
19 Jun 2013
Cybersecurity: Authoritative Reports and Resources
Author: Rita Tehan
Publisher: Congressional Research Service (CRS)
This report discusses selected authoritative resources and data of government agencies, academic institutions, think tanks, security consultants, and trade associations concerning the issue of cybersecurity. More on «Cybersecurity: Authoritative Reports and Resources» -
Jun 2013
Enter the Cyber Dragon: Understanding Chinese Intelligence Agencies’ Cyber Capabilities
Author: Tobias Feakin
Publisher: Australian Strategic Policy Institute (ASPI)
This paper examines Chinese intelligence agencies and how they exploit cyberspace. More on «Enter the Cyber Dragon: Understanding Chinese Intelligence Agencies’ Cyber Capabilities» -
Jun 2013
Is Information Power? Using Mobile Phones and Free Newspapers During an Election in Mozambique
Author: Jenny Aker, Paul Collier, Pedro C Vicente
Publisher: Center for Global Development (CGD)
This paper reports the results of a field experiment conducted prior to and during the October 2009 elections in Mozambique. More on «Is Information Power? Using Mobile Phones and Free Newspapers During an Election in Mozambique» -
Jun 2013
Addressing Cyber Threats to Oil and Gas Suppliers
Author: Blake Clayton, Adam Segal
Publisher: Council on Foreign Relations (CFR)
This report describes the nature of cyber threats to oil and gas suppliers in the US and their potential costs. More on «Addressing Cyber Threats to Oil and Gas Suppliers»
May 2013
-
3 May 2013
Cybersecurity and Internet Governance
Author: Andrea Renda
Publisher: Council on Foreign Relations (CFR)
This brief summarizes the growing trends of cyber threats and cyber attacks both for the nation-state and the private sphere. More on «Cybersecurity and Internet Governance» -
May 2013
Military and Strategic Affairs, Vol 5, No 1
Author: Yoni Eshpar, Gil Baram, Amir Averbuch, Gabi Siboni, Daniel Cohen, Aviv Rotbart, Yiftah S Shapir, Asa Kasher, Amos Yadlin, Matthew Crosston
Publisher: Institute for National Security Studies (INSS)
The articles in this issue address the role of legal transparency in national security policy; various aspects of cyber warfare, defense and strategy; Israel's Iron Dome defense system; and international law and the ethics of the war on terror. More on «Military and Strategic Affairs, Vol 5, No 1»
April 2013
-
Apr 2013
Online Personal Data Processing and EU Data Protection Reform
Author: Kristina Irion, Giacomo Luchetta
Publisher: Centre for European Policy Studies (CEPS)
This report examines different aspects of data protection and regulation in the EU and provides policy recommendations. More on «Online Personal Data Processing and EU Data Protection Reform»


