+ MUSE Alert

In this Issue

Table of Contents

  1. Editors' Note
  2. Dane Alivarius, Cristine Pedersen
  3. p. 1
  4. DOI: https://doi.org/10.1353/gia.2018.0000
  5. restricted access
    • View HTML View
    • Download PDF Download
  1. Affordances of Websites for Counterpublicity and International Communication: Case of the Egyptian Muslim Brotherhood
  2. Soumia Bardhan
  3. pp. 3-11
  4. DOI: https://doi.org/10.1353/gia.2018.0001
  5. restricted access
    • View HTML View
    • Download PDF Download
  1. How the Internet Can Reinforce Authoritarian Regimes: The Case of North Korea
  2. Johannes Gerschewski, Alexander Dukalskis
  3. pp. 12-19
  4. DOI: https://doi.org/10.1353/gia.2018.0002
  5. restricted access
    • View HTML View
    • Download PDF Download
  1. Enduring Entanglement: The Multi-Sectoral Impact of the Rohingya Crisis on Neighboring Bangladesh
  2. Mayesha Alam
  3. pp. 20-26
  4. DOI: https://doi.org/10.1353/gia.2018.0003
  5. restricted access
    • View HTML View
    • Download PDF Download
  1. Blockchain Applications to International Affairs: Reasons for Skepticism
  2. Angela Walch
  3. pp. 27-35
  4. DOI: https://doi.org/10.1353/gia.2018.0004
  5. restricted access
    • View HTML View
    • Download PDF Download
  1. Blockchain Technology and Cryptocurrencies: Implications for the Digital Economy, Cybersecurity, and Government
  2. Christian Catalini
  3. pp. 36-42
  4. DOI: https://doi.org/10.1353/gia.2018.0005
  5. restricted access
    • View HTML View
    • Download PDF Download
  1. The Threat of Cyber Terrorism and What International Law Should (Try To) Do about It
  2. Heather A. Harrison Dinniss
  3. pp. 43-50
  4. DOI: https://doi.org/10.1353/gia.2018.0006
  5. restricted access
    • View HTML View
    • Download PDF Download
  1. Ensuring US Dominance in Cyberspace in a World of Significant Peer and Near-Peer Competition
  2. Gen. Keith B. Alexander, Jamil N. Jaffer
  3. pp. 51-66
  4. DOI: https://doi.org/10.1353/gia.2018.0007
  5. restricted access
    • View HTML View
    • Download PDF Download
  1. When Cyber Threats Loom, What Can State and Local Governments Do?
  2. Josephine Wolff, William Lehr
  3. pp. 67-75
  4. DOI: https://doi.org/10.1353/gia.2018.0008
  5. restricted access
    • View HTML View
    • Download PDF Download
  1. A Rules-Based Order to Keep the Internet Open and Secure
  2. Marietje Schaake
  3. pp. 76-82
  4. DOI: https://doi.org/10.1353/gia.2018.0009
  5. restricted access
    • View HTML View
    • Download PDF Download
  1. Could the Issue of DPRK Hacking Benefit from Benign Neglect?
  2. Martin Libicki
  3. pp. 83-89
  4. DOI: https://doi.org/10.1353/gia.2018.0010
  5. restricted access
    • View HTML View
    • Download PDF Download
  1. Why Beidou Could Help Protect GPS
  2. Christian Curriden
  3. pp. 90-96
  4. DOI: https://doi.org/10.1353/gia.2018.0011
  5. restricted access
    • View HTML View
    • Download PDF Download
  1. The Rising Drone Threat from Terrorists
  2. Alyssa Sims
  3. pp. 97-107
  4. DOI: https://doi.org/10.1353/gia.2018.0012
  5. restricted access
    • View HTML View
    • Download PDF Download