56 Results for:

February 18, 2016

Privacy
Protecting Data Privacy With User-Friendly Software

Protecting the privacy of user data from unauthorized access is essential for business executives, policymakers, and users themselves. The pace of targeted attacks and massive data breaches is only i…

Protecting Data Privacy With User-Friendly Software header

December 17, 2015

Conflict Prevention
Preventive Priorities Survey: 2016

View the accompanying online interactive: CPA's Global Conflict Tracker. Preventing further intensification of Syria's civil war should be the top priority for U.S. policymakers in 2016, according…

Preventive Priorities Survey: 2016 header

August 20, 2015

Cybersecurity
Developing a Proportionate Response to a Cyber Incident

Introduction As offensive cyber activity becomes more prevalent, policymakers will be challenged to develop proportionate responses to disruptive or destructive attacks. Already, there has been si…

Developing a Proportionate Response to a Cyber Incident header

June 15, 2015

Islamic State
Countering Islamic State Exploitation of the Internet

The use of social media and other Internet-enabled communications by the self-proclaimed Islamic State is pushing the United States and other democracies to react to the abuse of liberal freedoms by …

Countering Islamic State Exploitation of the Internet header

December 15, 2014

Conflict Prevention
Preventive Priorities Survey: 2015

View the accompanying online interactive: CPA's Global Conflict Tracker The intensification of the crisis in Iraq due to advances by the militant group the Islamic State of Iraq and Syria (ISIS) i…

PPSCover2015_lrg.jpg