44 Results for:

May 17, 2017

Cybersecurity
Transforming Election Cybersecurity

The events of the 2016 U.S. election demonstrate that more high-level political action is required to manage real and perceived cyber vulnerabilities in election systems.

June 15, 2015

Islamic State
Countering Islamic State Exploitation of the Internet

The use of social media and other Internet-enabled communications by the self-proclaimed Islamic State is pushing the United States and other democracies to react to the abuse of liberal freedoms by …

Countering Islamic State Exploitation of the Internet header

July 1, 2013

Greece
Global Economics Monthly: July 2013

Bottom Line: Recognizing that the recent debt restructuring was insufficient to restore Greece's creditworthiness, the IMF will likely toughen conditions for lending to countries with unsustainable d…

June 28, 2013

South Korea
Nuclear Power in South Korea’s Green Growth Strategy

Introduction Nuclear power has been an important, if understated, aspect of South Korea's National Strategy for Green Growth, a set of policies reflecting the idea that economic growth and environ…

Nuclear Power in  South Korea’s Green Growth Strategy header

November 28, 2011

Radicalization and Extremism
SAVE Supporting Document: Leaving the Gang

Overview Why do people leave a group that they have been a member of? What do they do to leave their group? What role, if any, do the use of social media and the Internet play in this process? The…