There is increasing interest in neighborhood or area effects on health and individual development. China, due to its vast regional variations in health infrastructure and geography and relative immobility of older residents, provides a rare opportunity to study such effects.
Since discovering the theft of personal data from an OPM database last spring, government officials have been preoccupied with assessing the risks to national security. But they must also address its potential to enable an adversary to steal valuable economic and commercial information.
When defending an organization, cybersecurity professionals must choose from a large set of defensive measures while operating with a limited set of resources. What is the menu of actions for defending against an attack? And how can defenders navigate the selection process?
In perhaps no other field does society have as direct a stake in getting technology right as in policing. How will technology change the work that law enforcement agencies do and the communities they serve?
Natural and man-made mass-casualty incidents are a growing threat. Evaluating successes and shortcomings after each crisis can contribute to the design and implementation of robust and resilient response systems and ensure the best possible outcomes for individuals and impacted communities.
A review of how terrorists arrived in the United States in the past can help the government prioritize its efforts and resources. But it may not be a reliable indicator of how terrorist organizations could attempt to bring violence to America in the future.
In the ever-growing Internet of Things, attackers already outpace the defenders. If developing solutions for software liability doesn't become more of a priority, there may be no winning this technological war.
Reviews and analyzes how the U.S. Department of Defense and the Federal Emergency Management Agency work together to plan and execute disaster response activities, and recommends areas for improvement.
Existing cybersecurity measures in the EU are fragmented, largely due to gaps in operational capabilities as well as strategic priorities of Member States. However, there are many policy options that may improve the EU's overall cybersecurity approach.
Water resource agencies around the world are grappling with how to make smart investments to ensure long-term water reliability at a time of unprecedented water stress, growing demands, uncertain climate change, and limited budgets.
Securing government networks is certainly necessary, but authorities should not lose sight of the need to couple their defense of America's networks with appropriate resources dedicated to combatting criminal, terrorist, and other threats in cyberspace.
This study uses a simple model to speculate about whether deterrence can be a significant part of dealing with special features of the cyber attack challenge, and distinguishing different classes and contexts of cyber threats.
This study describes the development of a Youth Resilience Corps, or YRC (i.e., a set of tools to engage young people in youth-led community resilience activities) and the findings from a small-scale pilot test.