Carolyn Tweedy provides a brief background of 3D printing and contributes a focused discussion of the implications of 3D printing technologies in the world of information management and intellectual property, specifically copyright and patent laws and the development of policies to govern this burgeoning domain.
Read MoreImportance of Compliance, Regulations and Ethics in the Wake of Korean Ferry Accident
Divya Yadav highlights loopholes in the very successful South Korea’s shipping industry and discusses some of these issues in detail in the context of this tragic maritime disaster.
Read MoreDisappearance of Malaysian Airlines Flight MH370
Divya Yadav discusses some of the social and political issues surrounding the disappearance and what takeaways can be gleaned from the tragedy to better understand similar incidents in the future.
Read MoreThe Future of Bitcoin
Divya Yadav talks about the impact and future of digital currency in the changing economic landscape.
Read MoreThe Olympics—Impact on Security, Economy and Culture
Divya Yadav talks about the Winter Olympics at Sochi and the economic, social and cultural impact of the Olympics.
Read MoreImpact of Data Breaches
Divya Yadav talks about the business impact of data breaches and what can organizations do to safeguard themselves from this pervasive problem.
Read MoreTyphoon Haiyan and Disaster Preparedness
This research note talks about disaster preparedness strategies in remote areas who don't have access to latest technologies, crisis management resources and pre-positioned relief supply.
Read MoreManaging Third Party Risks
This research note talks about how third party risks are emerging with the constantly evolving regulatory environment for business.
Read MoreTechnology Risk and Business Impact
The research note talks about the dependency of critical businesses on IT and highlights this impact on the healthcare.gov website.
Read MoreRisk Themes for America's Defense Industrial Base Sector
This research note outlines three major categorical risk themes and includes assessments and treatment suggestions for each category.
Read MorePandemic Risk Assessment
Examines influenza as more than simple flu-like symptoms. It conducts a risk assessment that is difficult due to the constantly mutating nature of influenza virus. In order to assess potential risk, organizations must constantly monitor patient data on local, state, national, and worldwide levels. Compilation of data and coordinated responses are necessary to prevent spread of the virus and develop vaccines. Additionally private sectors must coordinate effort with public sectors.
Read MoreMoney From Nothing: The Socioeconomic Implications of "Cyber-currencies"
Holistically examines the phenomena of "cyber-currencies" by delineating the primary types currently in circulation, identifying the risks associated with each, and ultimately providing a high-level risk assessment of the overall landscape.
Read MoreRisks in Digital Identity After Death
Explores the new risks regarding the ethics, legality and privacy of an individual's digital identity after their death.
Read MoreDepartment of Veterans Affairs—Current Challenges, Risks and Mitigation Strategies
Discusses the current challenges facing the Department of Veterans Affairs with their claim backlog and their transition to a new online Veterans benefit management system.
Read MoreBridging the Digital Divide—The African Condition
Reviews the key tenets of the African Manifesto for Science, Technology, and Innovation and seeks to augment it further by offering concepts with which the foundational impediments preventing the continent from bridging the digital divide can be overcome.
Read MoreThe Mobile Banking Phenomenon
Discusses the rising trend in mobile banking, the risks that mobile users should be aware of and how to securely use mobile banking.
Read MoreVirtual Currency: The Next Generation Banking Model
Describes the unique features of virtual currencies, specifically Bitcoin. It also discusses the reasons for its consumer attraction and the associated risks that it faces.
Read MoreBuilding Resiliency in the IT Sector
Identifies key cyber risks that pose a threat to the functioning of Information Technology in the public and private sectors.
Read MoreCritical Infrastructure Protection Healthcare and Public Health
Reflects on other risks associated with public and private healthcare in the United States that do not garner as much attention as the issues surrounding rising costs and increasing unafforability for the middle class do.
Read MoreThe Art of Social Engineering
Defines social engineering and discusses how it negatively affects organizations. Provides recommendations on how to defend and protect against attackers using social engineering techniques.
Read More