Latest projects

The project Global Internet Governance and International Information Security is part of the PIR Center Emerging Technologies and Global Security prog...

The project Emerging Technologies and Global Security is part of the PIR Center eponymous program and aimed at exploring the potential for cooperation...

All projects

PIR Center recommends to read

Sharon Squassoni

The recent PIR Center report, “Iran in the Regional and Global Perspective” offers a fresh twist on advice for negotiators as they continue to work on an agreement. As a compilation of articles by experts who met in Bangkok and Moscow in 2014 to explore the prerequisites of longer term solutions for...

The book “The Dead Hand: The Untold Story of the Cold War Arms Race and Its Dangerous Legacy” by David Hoffman is a true documentary thriller focusing on the most difficult period of the 20th century. The international situation at that time is described as teetering on the brink of a nuclear world ...

All articles

Articles

Select period

This report explores key trends and challenges to the right of all individuals to seek, receive and impart information and ideas of all kinds through the Internet. The Special Rapporteur underscores the unique and transformative nature of the Internet not only to enable individuals to exercise their...

Serious changes are taking place in the contemporary international environment. Aspiration to peace and sustainable development, promotion of equal cooperation became the spirit of the times. The tendency towards true multipolarity is irreversible. There is a growing significance of the regional asp...

The objective of this Framework Decision is to improve cooperation between judicial and other competent authorities, including the police and other specialised law enforcement services of the Member States, through approximating rules on criminal law in the Member States in the area of attacks again...

The asymmetrical threat posed by cyber attacks and the inherent vulnerabilities of cyberspace constitute a serious security risk confronting all nations. For this reason, the cyber threats need to be addressed at the global level. Given the gravity of the threat and of the interests at stake, it is ...

Recent years have witnessed the considerable progress achieved in developing and applying the latest information and telecommunication technologies, which could potentially be used for purposes that are inconsistent with the objectives of maintaining international stability and security. It is of gr...

The present Convention is necessary to deter action directed against the confidentiality, integrity and availability of computer systems, networks and computer data as well as the misuse of such systems, networks and data by providing for the criminalisation of such conduct, as described in this Con...

loading