1. Editors' Note
  2. Harrison Goohs, Tom Hoffecker, Laura Pedersen
  3. pp. 1-2
  4. DOI: 10.1353/gia.2017.0030
  5. restricted access View | Download |
  1. "Digital Reliance": Public Confidence in Media in a Digital Era
  2. Stephen J. A. Ward
  3. pp. 3-10
  4. DOI: 10.1353/gia.2017.0031
  5. restricted access View | Download |
  1. Unveiling the "United Cyber Caliphate" and the Birth of the E-Terrorist
  2. Christina Schori Liang
  3. pp. 11-20
  4. DOI: 10.1353/gia.2017.0032
  5. restricted access View | Download |
  1. Post-Truth Soft Power: Changing Facets of Propaganda, Kompromat, and Democracy
  2. Paweł Surowiec
  3. pp. 21-27
  4. DOI: 10.1353/gia.2017.0033
  5. restricted access View | Download |
  1. Protecting Financial Consumer Data in Developing Countries: An Alternative to the Flawed Consent Model
  2. Katharine Kemp, Ross P. Buckley
  3. pp. 35-46
  4. DOI: 10.1353/gia.2017.0035
  5. restricted access View | Download |
  1. FinTech and RegTech: Enabling Innovation While Preserving Financial Stability
  2. Douglas W. Arner, Dirk A. Zetzsche, Ross P. Buckley, Janos N. Barberis
  3. pp. 47-58
  4. DOI: 10.1353/gia.2017.0036
  5. restricted access View | Download |
  1. International Financial Regulatory Cooperation and Digital Currencies
  2. Daniel Heller, Edwin Truman
  3. pp. 59-66
  4. DOI: 10.1353/gia.2017.0037
  5. restricted access View | Download |
  1. Ten Years after the Estonian Cyberattacks: Defense and Adaptation in the Age of Digital Insecurity
  2. Stephen Herzog
  3. pp. 67-78
  4. DOI: 10.1353/gia.2017.0038
  5. restricted access View | Download |
  1. From Good Diplomacy to Fast Diplomacy: Conducting Foreign Policy in the Information Age: An Interview with Philip Seib
  2. Philip Seib
  3. pp. 79-82
  4. DOI: 10.1353/gia.2017.0039
  5. restricted access View | Download |
  1. Cybersecurity Statecraft in Europe: A Case Study of Poland
  2. Joanna Świątkowska
  3. pp. 83-94
  4. DOI: 10.1353/gia.2017.0040
  5. restricted access View | Download |
  1. Cybersecurity, Encryption, and Corporate Social Responsibility
  2. David W. Opderbeck
  3. pp. 105-111
  4. DOI: 10.1353/gia.2017.0042
  5. restricted access View | Download |
  1. The Elusive Ethics of Leaking
  2. Mark Fenster
  3. pp. 112-119
  4. DOI: 10.1353/gia.2017.0043
  5. restricted access View | Download |
  1. Who's in Control: Balance in Cyber's Public-Private Sector Partnerships
  2. Jason Healey
  3. pp. 120-130
  4. DOI: 10.1353/gia.2017.0044
  5. restricted access View | Download |
  1. Campaign Planning with Cyber Operations
  2. Michael Sulmeyer
  3. pp. 131-137
  4. DOI: 10.1353/gia.2017.0045
  5. restricted access View | Download |
  1. Cyberpeacekeeping: A New Role for the United Nations?
  2. Walter Dorn
  3. pp. 138-146
  4. DOI: 10.1353/gia.2017.0046
  5. restricted access View | Download |
  1. Cyberwar and Its Strategic Context
  2. Paul Bracken
  3. pp. 147-157
  4. DOI: 10.1353/gia.2017.0047
  5. restricted access View | Download |
  1. From the Dust Bowl to Drones to Big Data: The Next Revolution in Agriculture
  2. Bruno Basso, James Dobrowolski, Channing McKay
  3. pp. 158-165
  4. DOI: 10.1353/gia.2017.0048
  5. restricted access View | Download |