Articles and events specifically related to the year 2015.
All items (159)
2
A
-
A Digital Single Market Strategy for Europe
-
A Legal and Empirical Study into the Intellectual Property Implications of 3D Printing
-
A Legal and Empirical Study of 3D Printing Online Platforms and an Analysis of User Behaviour
-
A Review of the Next Generation Air Transportation System: Implications and Importance of System Architecture
-
A Review of the U.S. Navy Cyber Defense Capabilities
-
A Review of the U.S. Navy Cyber Defense Capabilities: Abbreviated Version of a Classified Report
-
Accessibility in IT Procurement
-
ACSC 2015 Threat Report
-
Actions to Strengthen Cybersecurity and Protect Critical IT Systems
-
Air Traffic Control: FAA Needs a More Comprehensive Approach to Address Cybersecurity As Agency Transitions to NextGen
-
Alliance for Internet of Things Innovation
- Army Support of Military Cyberspace Operations: Joint Contexts and Global Escalation Implications
-
ARSC Guide to Audio Preservation
-
Australian Public Service ICT Strategy 2012-2015
-
Authors Guild v. Google (Google III)
-
Automotive Information Sharing and Analysis Center
-
Autonomous Weapons Systems: A Brief Survey of Developmental, Operational, Legal, and Ethical Issues
B
C
- Careful Connections: Building Security in the Internet of Things
-
CIS Controls for Effective Cyber Defense Version 6.0
-
CNSSI No. 4009
-
Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement
-
CONNECTing the Dots: Options for Future Action
-
Copyright and the Music Marketplace
-
Copyright Reform For a Digital Economy
-
Criminals Continue to Defraud and Extort Funds from Victims Using CryptoWall Ransomware Schemes
-
CRS Reports - 2015
- Cyber Defense: An International View
-
Cyber Incident Management Planning Guide
-
Cyber Operations in DOD Policy and Plans: Issues for Congress
-
Cyber Security Growth Centre
-
Cyber Threat Intelligence Integration Center
-
Cybersecurity Best Practices Guide
-
Cybersecurity Dilemmas: Technology, Policy, and Incentives: Summary of Discussions at the 2014 Raymond and Beverly Sackler U.S.-U.K. Scientific Forum
-
Cybersecurity Guidance
-
Cybersecurity Issues for the Bulk Power System
-
Cybersecurity Risk Management and Best Practices (WG4): Final Report
-
Cybersecurity: Actions Needed to Address Challenges Facing Federal Systems
-
Cybersecurity: Authoritative Reports and Resources, by Topic
-
Cybersecurity: Bank and Other Depository Regulators Need Better Data Analytics and Depository Institutions Want More Usable Threat Information
D
-
Data Privacy and the Smart Grid: A Voluntary Code of Conduct
-
Defense Additive Manufacturing: DOD Needs to Systematically Track Department-wide 3D Printing Efforts
-
Department of Justice Policy Guidance: Use of Cell-Site Simulator Technology
-
Digital America: A Tale of the Haves and Have-Mores
-
Digital Currencies: Response to the Call for Information
-
DMCA Notice-and-Takedown Processes: List of Good, Bad and Situational Practices
-
DoD Cloud Computing Security Requirements Guide
-
DoD Instruction 8410.01
E
F
-
Facial Recognition Technology: Commercial Uses, Privacy Issues, and Applicable Federal Law
-
FACT SHEET: Enhancing and Strengthening the Federal Government's Cybersecurity
-
Federal Information Management Security Act: Annual Report to Congress
-
Fifth Annual Benchmark Study on Privacy and Security of Healthcare Data
-
FinTech & Innovation Group
-
Fox Broadcasting v. Dish Network
-
Framework for Cyber-Physical Systems
G
-
GAO Reports - 2015
-
General Wellness: Policy for Low Risk Devices
-
Global Cyber Governance: Preparing for New Business Risks
-
Governance of Cybersecurity
-
GPS: Actions Needed to Address Ground System Development Problems and User Equipment Production Readiness
-
Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security
-
Guidance Update No. 2015-02
I
-
IAD's Top 10 Information Assurance Mitigation Strategies
-
Industrial Internet of Things: Unleashing the Potential of Connected Products and Services
-
Information Security: IRS Needs to Continue Improving Controls over Financial and Taxpayer Data
-
Insecurity in the Internet of Things (IoT)
-
Integrated DoD Intelligence Priorities
-
Intellectual Property and Innovation in Information and Communication Technology (ICT)
-
Intelligent Nation 2015
-
Interagency International Cybersecurity Standardization Working Group
-
Internet Management: Structured Evaluation Could Help Assess Proposed Transition of Key Domain Name and Other Technical Functions
-
Internet of Things Poses Opportunities for Cyber Crime
-
IoTivity
-
ISO/IEC CD 18033-1-1:2015
K
-
Keys Under Doormats: Mandating Insecurity by Requiring Government Access to All Data and Communications
-
Keystones to Foster Inclusive Knowledge Societies; Access to Information and Knowledge, Freedom of Expression, Privacy, and Ethics on a Global Internet
-
Killing by Machine: Key Issues for Understanding Meaningful Human Control
L
M
-
Make or Break: The UK's Digital Future
-
Maritime Critical Infrastructure Protection: DHS Needs to Better Address Port Cybersecurity
-
Mastering the Game: Business and Legal Issues for Video Game Developers
-
Medical Devices Data Systems, Medical Image Storage Devices, and Medical Image Communications Devices
-
Mobile Medical Applications: Guidance for Industry and Food and Drug Administration Staff
N
O
P
-
Policy Implications of the Internet of Things
- Privacy-Enhanced Identity Brokers
-
Promoting Economic Competitiveness While Safeguarding Privacy, Civil Rights, and Civil Liberties in Domestic Use of Unmanned Aircraft Systems
-
Promoting Private Sector Cybersecurity Information Sharing
-
Proposal to Transition the Stewardship of the Internet Assigned Numbers Authority (IANA) Functions
- Prosecuting Intellectual Property Crimes
-
Protection of Digital Computer and Communication Systems and Network
R
-
Ransomware on the Rise: FBI and Partners Working to Combat This Cyber Threat
-
Report on Cybersecurity Practices
- Research Roadmap for Smart Fire Fighting
-
Responsibilities of Third-Party Service Providers under FERPA
-
Revolutionizing our Roadways: Cybersecurity Considerations and Automated Vehicle Policy
-
Rise of Robots: The Military's Use of Autonomous Lethal Force
-
Risk Management for Replication Devices
-
Rosen v. eBay
-
Royal Canadian Mounted Police Cybercrime Strategy
S
-
Safeguarding Personal Information Collected from Signals Intelligence Activities
- Start with Security: A Guide for Business
-
Stopping Malware and Unauthorized Software Through Application Whitelisting
-
Strategies for Improving the U.S. Payment System
-
Strengthening our Nation's Cyber Defenses
-
Strong Artificial Intelligence and National Security
T
- Terrorist and Insurgent Unmanned Aerial Vehicles: Use, Potentials, and Military Implications
-
TeslaCrypt
-
The Current Status and Impact of 3D Printing Within the Industrial Sector: An Analysis of Six Case Studies
-
The Deep Web and the Darknet: A Look Inside the Internet's Massive Black Box
-
The Defender's Dilemma: Charting a Course Toward Cybersecurity
- The DoD Cyber Strategy
-
The Emergence of Contention in Global Internet Governance
-
The European Agenda on Security
-
The Federal Communications Commission: Current Structure and Its Role in the Changing Telecommunications Landscape
-
The Internet of Things: Frequently Asked Questions
-
The Internet Of Things: Mapping The Value Beyond The Hype
-
The Legal Aspects of 3D Printing from a European Perspective
-
Threat Landscape and Good Practice Guide for Software Defined Networks/5G
- Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk
-
Transmission Operations Reliability Standards and Interconnection Reliability Operations and Coordination Reliability Standards
U
-
U.N. Encryption Report
-
Understanding Open Access: When, Why & How to Make Your Work Openly Accessible
- United States Coast Guard Cyber Strategy
-
Unmanned Aerial Systems: FAA Continues Progress Toward Integration into the National Airspace
-
Unmanned Aircraft Systems (UAS): Commercial Outlook for a New Industry
W