Can Smartphones and Privacy Coexist? Assessing Technologies and Regulations Protecting Personal Data on Android and iOS Devices
This report assesses smartphone users' privacy from technical and regulatory perspectives. It describes a literature review, experiments on Google's Android and Apple's iOS, and federal regulation for protecting privacy in the United States.
Oct 27, 2016
This report examines the debate about the Islamic State in Iraq and Syria (ISIS) on Arabic Twitter and uses a mixed-methods analytic approach to identify and characterize in detail the Twitter networks of ISIS supporters and opponents.
Aug 16, 2016
This interactive, web-based tool accompanies The Army's Local Economic Effects, and maps the economic effects of national-level U.S. Army spending for each state broken down by fiscal year (2012-2014) and congressional district.
Jan 4, 2016
The vulnerability of Cloud Computing Systems (CCSs) to Advanced Persistent Threats (APTs) is a significant concern to government and industry.
Dec 23, 2015
This report assesses challenges for unit cohesion from integrating women into special operations forces and provides analytical support for validating occupational standards for positions controlled by U.S. Special Operations Command.
Dec 16, 2015
This report describes common commercial practices for cyber workforce management and organizational issues that are applicable to the U.S. Air Force as it endeavors to improve the management of its cyber forces.
Sep 9, 2015
This report addresses ways to increase information-sharing among law enforcement's records management systems, computer-aided dispatch systems, and other key regional, state, and federal information repositories.
Sep 4, 2015
Examines the portfolio of tools funded by the State Department's Bureau of Democracy, Human Rights, and Labor that help support Internet freedom and assesses the impact of these tools in promoting U.S. interests without enabling criminal activity.
Jun 30, 2015