This research note talks about disaster preparedness strategies in remote areas who don't have access to latest technologies, crisis management resources and pre-positioned relief supply.
Read MoreResearch Notes — 2013
Managing Third Party Risks
This research note talks about how third party risks are emerging with the constantly evolving regulatory environment for business.
Read MoreTechnology Risk and Business Impact
The research note talks about the dependency of critical businesses on IT and highlights this impact on the healthcare.gov website.
Read MoreRisk Themes for America's Defense Industrial Base Sector
This research note outlines three major categorical risk themes and includes assessments and treatment suggestions for each category.
Read MorePandemic Risk Assessment
Examines influenza as more than simple flu-like symptoms. It conducts a risk assessment that is difficult due to the constantly mutating nature of influenza virus. In order to assess potential risk, organizations must constantly monitor patient data on local, state, national, and worldwide levels. Compilation of data and coordinated responses are necessary to prevent spread of the virus and develop vaccines. Additionally private sectors must coordinate effort with public sectors.
Read MoreMoney From Nothing: The Socioeconomic Implications of "Cyber-currencies"
Holistically examines the phenomena of "cyber-currencies" by delineating the primary types currently in circulation, identifying the risks associated with each, and ultimately providing a high-level risk assessment of the overall landscape.
Read MoreRisks in Digital Identity After Death
Explores the new risks regarding the ethics, legality and privacy of an individual's digital identity after their death.
Read MoreDepartment of Veterans Affairs—Current Challenges, Risks and Mitigation Strategies
Discusses the current challenges facing the Department of Veterans Affairs with their claim backlog and their transition to a new online Veterans benefit management system.
Read MoreBridging the Digital Divide—The African Condition
Reviews the key tenets of the African Manifesto for Science, Technology, and Innovation and seeks to augment it further by offering concepts with which the foundational impediments preventing the continent from bridging the digital divide can be overcome.
Read MoreThe Mobile Banking Phenomenon
Discusses the rising trend in mobile banking, the risks that mobile users should be aware of and how to securely use mobile banking.
Read MoreVirtual Currency: The Next Generation Banking Model
Describes the unique features of virtual currencies, specifically Bitcoin. It also discusses the reasons for its consumer attraction and the associated risks that it faces.
Read MoreBuilding Resiliency in the IT Sector
Identifies key cyber risks that pose a threat to the functioning of Information Technology in the public and private sectors.
Read MoreCritical Infrastructure Protection Healthcare and Public Health
Reflects on other risks associated with public and private healthcare in the United States that do not garner as much attention as the issues surrounding rising costs and increasing unafforability for the middle class do.
Read MoreThe Art of Social Engineering
Defines social engineering and discusses how it negatively affects organizations. Provides recommendations on how to defend and protect against attackers using social engineering techniques.
Read MoreThe Foreign Intelligence Surveillance Act of 1978
Reviews the history of FISA, from the foundations of enactment to amendments and decent debates, and how it reflect the system of checks and balances between the three branches of government.
Read MoreEngaging in Cyber Warfare
Defines cyber warfare, justifies the need to establish rules for cyber warfare, and briefly discusses the current cyber war between the United States and China.
Read MoreThe Fight to Define US Cybersecurity and Information Sharing Policy
Reviews the recent political battles over cybersecurity and information sharing policy in the past two years, particularly regarding critical infrastructure.
Read MoreThe Cyber Intelligence Sharing and Protection Act and Online Privacy
Discusses the arguments for the passage of Cyber Intelligence Sharing and Protection Act (CISPA) and elaborates the criticisms made by privacy advocates.
Read MoreMachine-to-Machine Communications
Defines machine-to-machine communications and discusses the benefits and associated risks this technology brings to organizations.
Read MoreViolence in the Workplace
Defines workplace violence and discusses ways to identify early warning signs. Also discusses ways that employers and employees can protect themselves from workplace violence.
Read More