Query Result Set
Skip Navigation Links
   ActiveUsers:757Hits:20301252Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
JOURNAL OF INTERNATIONAL AFFAIRS 2016-12 70, 1 (14) answer(s).
 
SrlItem
1
ID:   150183


Arms races in transparency and secrecy / Greenwald, Glenn   Journal Article
Greenwald, Glenn Journal Article
0 Rating(s) & 0 Review(s)
Key Words Arms Race  Interview  Transparency  Secrecy  Cyber  Glenn Greenwald 
        Export Export
2
ID:   150176


Attribution of malicious cyber incidents : from soup to nuts / Lin, Herbert   Journal Article
Lin, Herbert Journal Article
0 Rating(s) & 0 Review(s)
        Export Export
3
ID:   150179


Consequences of cyber attacks / Ilves, Hendrik Toomas   Journal Article
Ilves, Hendrik Toomas Journal Article
0 Rating(s) & 0 Review(s)
Key Words Interview  Cyber Attacks  Toomas Hendrik Ilves 
        Export Export
4
ID:   150182


Covering cyber- a journalist's inside look / Zetter, Kim   Journal Article
Zetter, Kim Journal Article
0 Rating(s) & 0 Review(s)
Key Words Interview  Covering Cyber  Kim Zetter 
        Export Export
5
ID:   150185


Honing cyber attribution : a framework for assessing foreign state complicity / Canfil, Justin Key   Journal Article
Canfil, Justin Key Journal Article
0 Rating(s) & 0 Review(s)
        Export Export
6
ID:   150173


How the next U.S. president can contain China in cyberspace / Knake, Rob; Segal, Adam   Journal Article
Segal, Adam Journal Article
0 Rating(s) & 0 Review(s)
Key Words China  Cyberspace  U.S. President  United Stated 
        Export Export
7
ID:   150174


Inside the digital revolution / Brooke, Heather   Journal Article
Brooke, Heather Journal Article
0 Rating(s) & 0 Review(s)
        Export Export
8
ID:   150181


Is cyber defence possible? / Ducaru, Sorin   Journal Article
Ducaru, Sorin Journal Article
0 Rating(s) & 0 Review(s)
Key Words Interview  Cyber Defense  Sorin Ducaru 
        Export Export
9
ID:   150177


Natural and quasi-natural experiments to evaluate cybersecurity policies / Dean, Benjamin   Journal Article
Dean, Benjamin Journal Article
0 Rating(s) & 0 Review(s)
        Export Export
10
ID:   150172


Non-state strategy for saving cyberspace / Healey, Jason   Journal Article
Healey, Jason Journal Article
0 Rating(s) & 0 Review(s)
Key Words Cyberspace  Non-State Strategy 
        Export Export
11
ID:   150180


Risk of cyber war and cyber terrorism / Clarke, A Richard   Journal Article
Clarke, A Richard Journal Article
0 Rating(s) & 0 Review(s)
Key Words Interview  Cyber Terrorism  Risk  Cyber War  Richard A Clarke 
        Export Export
12
ID:   150175


Social media, civic engagement , and the slacktivism hypothesis: lessons from Mexico's "E Bronco" / Howard, N Philip; Savage, Saiph; Saviaga, Claudia Flores; Toxtli, Carlos   Journal Article
"Howard, N Philip Journal Article
0 Rating(s) & 0 Review(s)
Key Words Mexico  Civic Engagement  Social Media  Slacktivism  El Bronco 
        Export Export
13
ID:   150184


Terrorist communications: are facbook, twitter, and google responsible for the Islamic State's actions? / Softness, Nicole   Journal Article
Softness, Nicole Journal Article
0 Rating(s) & 0 Review(s)
        Export Export
14
ID:   150178


Toward practical cyber counter deception / Porter, Christopher   Journal Article
Porter, Christopher Journal Article
0 Rating(s) & 0 Review(s)
        Export Export