Government to Government
TOC-> Issues-> Espionage->Government to Government
| Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
|---|---|---|---|---|---|---|
| Anderson, Ross J. | 2008 | Security Engineering | Book | Moderate:Technology; Moderate:Cryptography | N/A | |
| Brown, Davis | 2006 | A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict | Law Journal | Moderate:Law | ||
| Center for Strategic and International Studies | 2008 | Securing Cyberspace for the 44th Presidency | Independent Reports | Low:Policy | ||
| Department of Defense | 1999 | An Assessment of International Legal Issues in Information Operations | Government Report | Moderate:Law | ||
| Department of Defense | 2007 | Mission Impact of Foreign Influence on DoD Software | Government Report | Low:Defense Policy/Procurement | ||
| Hollis, Duncan B. | 2007 | Why States Need an International Law for Information Operations | Law Review | Moderate:Law | ||
| Sklerov, Matthew J. | 2009 | Solving the Dilemma of State Responses to Cyberattacks | Law Review | Moderate:Law; Low:Technology | ||
| Todd, Graham H. | 2009 | Armed Attack in Cyberspace | Law Review | Moderate:Law |
- Subcategories: None