The 2008 Beijing Olympics were ardently sought, lavishly staged and hugely successful, despite intense scrutiny, speculation and setbacks. Amplified by modern media, most controversies revolved around China’s political repression, epitomised by Tibet brutality.

Source: Dissertation library
Author: Evans Phidelis Aryabaha, 2010

This study looks at the current state of cybersecurity initiatives in Malawi against a background of significant efforts to greatly enhance Internet connectivity speeds and access.

Source: Internet governance research paper
Author: Tiwonge Davis Manda, 2010

Professor Andre Liebich approaches the potential and limits of persuasion through the analysis of the use of coercion in political life.

Source: Persuasion, The Essence of Diplomacy
Author: Andre Liebich, 2010

Remmy Nweke attempts a search into the rationale behind Nigeria‟s decision to make Africa the cornerstone of her foreign policy.

Source: Dissertation library
Author: Remmy Nweke, 2010

This research presents an example of how evidence-based policy-making can lead to bandwidth optimisation in a university network, giving rise to improved network performance and cost savings.

Source: Internet governance research paper
Author: Maduka Kingsley Attamah, 2010

The title of the master thesis is “Influence of economic relations on bilateral relations”.

Firstly, three thesis statements concerning the influence of economic relations on non-economic bilateral relations have been developed.

Source: Dissertation library
Author: Antje Schuett, 2010

This report describes the evolution of remote participation in EuroDIG and provides an assessment of the current situation, focusing on the issue of inclusiveness by direct remote interaction.

Source: Internet governance research paper
Author: Alexandre Hannud Abdo, 2010

From an Internet governance perspective, multilingualism and security have been two of the cornerstone themes since its inception.

Source: Internet governance research paper
Author: Rumbidzayi Gadhula, 2010

This paper discusses cybersecurity in Fiji and offers recommendations to challenges such as the vulnerability of systems due to lack of a cybersecurity framework. The poorly framed laws and lack of appropriate policies.

Source: Internet governance research paper
Author: Salanieta Tamanikaiwaimaro, 2010

This paper looks at how cloud computing will surpass the Internet in adoption and usage as this technology’s users are on the other side of the digital divide.

Source: Internet governance research paper
Author: Sam Goundar, 2010

Pages