136 Results for:

March 27, 2024

Palestinian Territories
The UN’s Palestinian Aid Controversy: What’s at Stake

The leading UN aid agency for Palestinian refugees is engulfed in allegations that twelve of its employees were involved in the Hamas attacks on southern Israel. The agency faces severe funding cutba…

February 9, 2024

Global
Central Bank Currency Swaps Tracker

Introduction Since the financial crisis of 2007, central banks around the world have entered into a multitude of bilateral currency swap agreements with one another. These agreements allow a centr…

March 1, 2021

Cybersecurity
Christina Ayiotis Should Get a Blue Check Mark. So Should Everyone Else

Widespread identity verification on social media platforms would make it harder for malicious actors to impersonate real people.

People holding mobile phones are silhouetted against a backdrop projected with the Twitter logo.

February 8, 2024

Israeli-Palestinian Conflict
The Israel-Hamas War: The Humanitarian Crisis in Gaza

International calls for a cease-fire are mounting as the humanitarian situation in Gaza deteriorates rapidly amid the ongoing war between Israel and Hamas.

May 12, 2009

Economic Crises
Growth Without Bubbles: A Conversation with Christina Romer

Watch Christina Romer, the chair of President Obama's Council of Economic Advisers, discuss her "cautiously hopeful" vision for the U.S. economy following an address at the Council on Foreign Relatio…

Play

May 12, 2009

Development
Growth Without Bubbles: A Conversation with Christina Romer

Christina Romer, the chair of President Obama's Council of Economic Advisers, discusses her "cautiously hopeful" vision for the U.S. economy following an address at the Council on Foreign Relations. …

January 23, 2024

Digital and Cyberspace Policy Program
Influence Immunity and Addressing Misinformation

Dolores Albarracín, professor and director of the Social Action Lab and the science of science communications division of the Annenberg Public Policy Center at the University of Pennsylvania, discuss…

Play Hacker internet computer crime cyber attack network security programming code password protection