Journal of International Affairs, Vol. 70 No. 1, 2016
1.) LETTER FROM THE DEAN. --Janow, Merit E.
2.) A NON-STATE STRATEGY FOR SAVING CYBERSPACE. --Healey, Jason.
3.) HOW THE NEXT U.S. PRESIDENT CAN CONTAIN CHINA IN CYBERSPACE. --Knake, Rob; Segal, Adam.
4.) INSIDE THE DIGITAL REVOLUTION. --Brooke, Heather.
5.) SOCIAL MEDIA, CIVIC ENGAGEMENT, AND THE SLACKTIVISM HYPOTHESIS: LESSONS FROM MEXICO'S "EL BRONCO". --Howard, Philip N; Savage, Saiph; Saviaga, Claudia Flores; Toxtli, Carlos; Monroy-Hernández, Andrés.
6.) ATTRIBUTION OF MALICIOUS CYBER INCIDENTS: FROM SOUP TO NUTS. --Lin, Herbert.
7.) NATURAL AND QUASI-NATURAL EXPERIMENTS TO EVALUATE CYBERSECURITY POLICIES. --Dean, Benjamin.
8.) TOWARD PRACTICAL CYBER COUNTER DECEPTION. --Porter, Christopher.
9.) THE CONSEQUENCES OF CYBER ATTACKS. --Ilves, Toomas Hendrik.
10.) THE RISK OF CYBER WAR AND CYBER TERRORISM. --Clarke, Richard A.
11.) IS CYBER DEFENSE POSSIBLE?. --Ducaru, Sorin.
12.) COVERING CYBER-A JOURNALIST'S INSIDE LOOK. --Zetter, Kim.
13.) ARMS RACES IN TRANSPARENCY AND SECRECY. --Greenwald, Glenn.
14.) TERRORIST COMMUNICATIONS: ARE FACEBOOK, TWITTER, AND GOOGLE RESPONSIBLE FOR THE ISLAMIC STATE'S ACTIONS?. --Softness, Nicole.
15.) HONING CYBER ATTRIBUTION: A FRAMEWORK FOR ASSESSING FOREIGN STATE COMPLICITY. --Canfil, Justin Key.
16.) A CRISIS OF CONFIDENTIALITY: A REVIEW OF LORDS OF SECRECY. --Santa-Wood, Bebe.
17.) EXPLAINING RUSSIA THROUGH PUTIN: A REVIEW OF THE NEW TSAR. --Carstens, Ross.
2.) A NON-STATE STRATEGY FOR SAVING CYBERSPACE. --Healey, Jason.
3.) HOW THE NEXT U.S. PRESIDENT CAN CONTAIN CHINA IN CYBERSPACE. --Knake, Rob; Segal, Adam.
4.) INSIDE THE DIGITAL REVOLUTION. --Brooke, Heather.
5.) SOCIAL MEDIA, CIVIC ENGAGEMENT, AND THE SLACKTIVISM HYPOTHESIS: LESSONS FROM MEXICO'S "EL BRONCO". --Howard, Philip N; Savage, Saiph; Saviaga, Claudia Flores; Toxtli, Carlos; Monroy-Hernández, Andrés.
6.) ATTRIBUTION OF MALICIOUS CYBER INCIDENTS: FROM SOUP TO NUTS. --Lin, Herbert.
7.) NATURAL AND QUASI-NATURAL EXPERIMENTS TO EVALUATE CYBERSECURITY POLICIES. --Dean, Benjamin.
8.) TOWARD PRACTICAL CYBER COUNTER DECEPTION. --Porter, Christopher.
9.) THE CONSEQUENCES OF CYBER ATTACKS. --Ilves, Toomas Hendrik.
10.) THE RISK OF CYBER WAR AND CYBER TERRORISM. --Clarke, Richard A.
11.) IS CYBER DEFENSE POSSIBLE?. --Ducaru, Sorin.
12.) COVERING CYBER-A JOURNALIST'S INSIDE LOOK. --Zetter, Kim.
13.) ARMS RACES IN TRANSPARENCY AND SECRECY. --Greenwald, Glenn.
14.) TERRORIST COMMUNICATIONS: ARE FACEBOOK, TWITTER, AND GOOGLE RESPONSIBLE FOR THE ISLAMIC STATE'S ACTIONS?. --Softness, Nicole.
15.) HONING CYBER ATTRIBUTION: A FRAMEWORK FOR ASSESSING FOREIGN STATE COMPLICITY. --Canfil, Justin Key.
16.) A CRISIS OF CONFIDENTIALITY: A REVIEW OF LORDS OF SECRECY. --Santa-Wood, Bebe.
17.) EXPLAINING RUSSIA THROUGH PUTIN: A REVIEW OF THE NEW TSAR. --Carstens, Ross.
Howard, Philip N. - Personal Name
Santa-Wood, Bebe - Personal Name
Canfil, Justin Key - Personal Name
Softness, Nicole - Personal Name
Greenwald, Glenn - Personal Name
Zetter, Kim - Personal Name
Ducaru, Sorin - Personal Name
Clarke, Richard A. - Personal Name
Ilves, Toomas Hendrik - Personal Name
Porter, Christopher - Personal Name
Dean, Benjamin - Personal Name
Lin, Herbert - Personal Name
Brooke, Heather - Personal Name
Knake, Rob - Personal Name
Healey, Jason - Personal Name
Janow, Merit E. - Personal Name
Carstens, Ross - Personal Name
Santa-Wood, Bebe - Personal Name
Canfil, Justin Key - Personal Name
Softness, Nicole - Personal Name
Greenwald, Glenn - Personal Name
Zetter, Kim - Personal Name
Ducaru, Sorin - Personal Name
Clarke, Richard A. - Personal Name
Ilves, Toomas Hendrik - Personal Name
Porter, Christopher - Personal Name
Dean, Benjamin - Personal Name
Lin, Herbert - Personal Name
Brooke, Heather - Personal Name
Knake, Rob - Personal Name
Healey, Jason - Personal Name
Janow, Merit E. - Personal Name
Carstens, Ross - Personal Name
Vol. 70 No. 1, 2016
0022-197X
e-Journal HI
Inggris
Columbia University - School of International and Public Affairs
2016
New York
LOADING LIST...
LOADING LIST...