🍂 Autumn reading time! Let our AI Librarian find your perfect cozy read 🫖
Explore the literary world of this author
To evaluate public perception of the benefits and risks of U.S. Department of Homeland Security use of artificial intelligence technologies, researche...
The authors of this report examine military applications of artificial intelligence (AI); compare development efforts in the United States, China, and...
A Scorecard Approach for Evaluating the Privacy Implications of COVID-19 Mobile Phone Surveillance Programs
As part of the response to the COVID-19 pandemic, governments worldwide have deployed mobile phone surveillance programs to augment public health inte...
Toward International Accountability in Cyberspace
This report reviews the state of cyber attribution and examines alternative options for producing standardized and transparent attribution that may ov...
Using Social Bots to Fight Violent Extremism
As the online recruitment of violent extremist organizations grows, the U.S. government may benefit from promising emerging technology tools to rapidl...
A Method for Prioritizing Cybersecurity Risk in Election Infrastructure
U.S. election systems are diverse in terms of governance and technology. This reflects the constitutional roles reserved for the states in administeri...
Advancing Critical Infrastructure Security and Resilience
This report helps the Cybersecurity and Infrastructure Security Agency codify the concept of systemically important critical infrastructure by documen...
A Framework for Social Applications
This report is an examination of pathologies in social institutions' use of algorithmic decisionmaking processes. The primary focus is understanding h...
Researchers reviewed various stakeholders' perceptions of fifth-generation (5G) technology and how they could affect homeland security uses of such te...
Considerations for K-12 Schools, Caregivers, Government, and Technology Developers
Schools have begun employing artificial intelligence (AI)-based tools to help identify students at risk for suicide. The authors examine how these pro...
Scenario-Based Technology Assessment for Future Military Contingencies
This report presents the development and implementation of a technology assessment process to help the Army understand the implications of key emergin...
Opportunities, Risks, and Governance
...
The Role of International Norms in Pomoting U.S. Cybersecurity
The authors discuss the need and potential for norms constraining cyber aggression. They review the history of cyber norms and the current policies su...