Search form

The study Towards a secure cyberspace via regional co-operation provides an overview of the international dialogue on establishing norms of state behaviour and confidence-building measures in cyberspace.

Source: Cybersecurity
Author: Vladimir Radunovic, 2017

The adoption of open data policies and the standardisation of data collection were among the recommendations made during DiploFoundation's Data Diplomacy Roundtable: Mapping the Field, a brainstorming...
Source: Other
Author: DiploFoundation, 2017

Report on cybersecurity cooperation in the Western Balkans

Source: Cybersecurity
Author: Adriana Minovic, Adel Abusara, Eranda Begaj, Vladimir Erceg, Predrag Tasevski, Vladimir Radunovic, Franziska Klopfer, 2016

This text was published in the ASEF Outlook Report 2016/2017,  CONNECTIVITY: Facts and Perspectives.
 

Source: Other
Author: Jovan Kurbalija, 2016

Report on cybersecurity competence building trends in OECD countries

Source: Cybersecurity
Author: Vladimir Radunovic, David Rüfenacht, 2016

Dr Alex Sceberras Trigona stresses that not only persuasion but also resisting persuasion is highly important for small states, which tend to be seen as the ‘diplomatic prey’ of great powers.

Source: Persuasion, The Essence of Diplomacy
Author: Alex Sceberras Trigona, 2013

Persuasion is a very relative concept. Like beauty, persuasion is the eye of the beholder. Admittedly, persuasion does not exist in the absence of results.

Source: Persuasion, The Essence of Diplomacy
Author: Petru Dumitriu, 2013

Dr Paul Meerts discusses persuasion in the context of the Vienna Congress (1814–1815), one of the most successful diplomatic events in history.

Source: Persuasion, The Essence of Diplomacy
Author: Paul Meerts, 2013

Dr Milan Jazbec, a practitioner and researcher in diplomacy, positions a discussion on persuasion in the sociology of diplomacy. Social context determines both diplomacy and persuasion....

Source: Persuasion, The Essence of Diplomacy
Author: Milan Jazbec, 2013

The increasing militarisation of cyber-space comes in response to fears of critical damage caused by digital weapons like Distributed Denial-of-Service (DDoS).

Source: Other
Author: Vladimir Radunovic, 2013

Pages

Scroll to Top