+ MUSE Alert

In this Issue

Table of Contents

  1. Editors' Note
  2. Harrison Goohs, Tom Hoffecker, Laura Pedersen
  3. pp. 1-2
  4. DOI: https://doi.org/10.1353/gia.2017.0030
  5. restricted access
  1. "Digital Reliance"Public Confidence in Media in a Digital Era
  2. Stephen J. A. Ward
  3. pp. 3-10
  4. DOI: https://doi.org/10.1353/gia.2017.0031
  5. restricted access
  1. Unveiling the "United Cyber Caliphate" and the Birth of the E-Terrorist
  2. Christina Schori Liang
  3. pp. 11-20
  4. DOI: https://doi.org/10.1353/gia.2017.0032
  5. restricted access
  1. Post-Truth Soft Power: Changing Facets of Propaganda, Kompromat, and Democracy
  2. Paweł Surowiec
  3. pp. 21-27
  4. DOI: https://doi.org/10.1353/gia.2017.0033
  5. restricted access
  1. International Financial Regulatory Cooperation and Digital Currencies
  2. Daniel Heller, Edwin Truman
  3. pp. 59-66
  4. DOI: https://doi.org/10.1353/gia.2017.0037
  5. restricted access
  1. Ten Years after the Estonian CyberattacksDefense and Adaptation in the Age of Digital Insecurity
  2. Stephen Herzog
  3. pp. 67-78
  4. DOI: https://doi.org/10.1353/gia.2017.0038
  5. restricted access
  1. Cybersecurity Statecraft in EuropeA Case Study of Poland
  2. Joanna Świątkowska
  3. pp. 83-94
  4. DOI: https://doi.org/10.1353/gia.2017.0040
  5. restricted access
  1. Cybersecurity, Encryption, and Corporate Social Responsibility
  2. David W. Opderbeck
  3. pp. 105-111
  4. DOI: https://doi.org/10.1353/gia.2017.0042
  5. restricted access
  1. The Elusive Ethics of Leaking
  2. Mark Fenster
  3. pp. 112-119
  4. DOI: https://doi.org/10.1353/gia.2017.0043
  5. restricted access
  1. Who's in ControlBalance in Cyber's Public-Private Sector Partnerships
  2. Jason Healey
  3. pp. 120-130
  4. DOI: https://doi.org/10.1353/gia.2017.0044
  5. restricted access
  1. Campaign Planning with Cyber Operations
  2. Michael Sulmeyer
  3. pp. 131-137
  4. DOI: https://doi.org/10.1353/gia.2017.0045
  5. restricted access
  1. CyberpeacekeepingA New Role for the United Nations?
  2. Walter Dorn
  3. pp. 138-146
  4. DOI: https://doi.org/10.1353/gia.2017.0046
  5. restricted access
  1. Cyberwar and Its Strategic Context
  2. Paul Bracken
  3. pp. 147-157
  4. DOI: https://doi.org/10.1353/gia.2017.0047
  5. restricted access
  1. From the Dust Bowl to Drones to Big DataThe Next Revolution in Agriculture
  2. Bruno Basso, James Dobrowolski, Channing McKay
  3. pp. 158-165
  4. DOI: https://doi.org/10.1353/gia.2017.0048
  5. restricted access