September 26, 2016
Posted by: rrc8
The Arctic Council is the leading intergovernmental forum that promotes cooperation in the Circumpolar North. A dynamic region, the Arctic experiences both the opportunities and difficulties associated with climate change.
September 22, 2016
Posted by: Jessica Beyer
Africa is now home to some of the world’s fastest growing economies–the terms “Africa rising” and “lions on the move” have both been used in recent years to capture the
September 12, 2016
Posted by: Jessica Beyer
The e-commerce industry has been rapidly growing in India. The distinct constraints and opportunities of the Indian context has shaped how e-commerce has developed, with online retailers having to address
September 7, 2016
Posted by: Jessica Beyer
The following article is the second in a series focusing on countries that restrict speech online in order to prevent “social panic” or “anxiety amongst citizenry.” The series will examine Venezuela, China, and
September 1, 2016
Posted by: Monique Thormann
In this Reuters commentary on “Who is hacking U.S. election databases and why are they so difficult to identify” UW Jackson School of International Studies and International Policy Institute Lecturer
August 31, 2016
Posted by: Jessica Beyer
While in Myanmar this summer, I had the opportunity on several occasions to connect with Ko Ye Tun Aung, an engineer in Myanmar who previously worked setting up and running
August 12, 2016
Posted by: Jessica Beyer
The following article is in a series focusing on countries that restrict speech online in order to prevent “social panic” or “anxiety amongst citizenry.” The series will examine Venezuela, China, and Saudi
August 8, 2016
Posted by: Jessica Beyer
Extremist use of information and communication technology (ICT) has resulted in tension between the government, industry actors, and ICT users. In their response to extremist use of ICT, industry actors have faced a serious dilemma over how to respond to bad actors in a way that promotes security but does not infringe upon users’ rights to privacy and freedom of speech.
June 28, 2016
Posted by: Jessica Beyer
North Korea has focused on an asymmetric military strategy because of its lack of conventional power and resources. However, its traditional asymmetric weapons and strength have been monitored by Western countries, therefore, heavily sanctioned. For North Korea, developing and exerting its cyber capabilities is the best way to avoid sanctions while achieving its strategic goals. Cyber tactics are effective because of the characteristics of cyberspace or cyber warfare–the low cost of entry, anonymity, and plausible deniability.
June 21, 2016
Posted by: Jessica Beyer
The closeness of China and Russia’s cybersecurity relationship is not dependent on their ties with each other, but is defined in relation to the US. Instead of augmenting the trust or preventing cyber-espionage between the two countries, Sino-Russian cybersecurity cooperation is a strategic move to challenge US dominance over the Internet.