February 12, 2019
Posted by: Michael Walstrom
IPI Program Coordinator Michael Walstrom reached out to Cybersecurity Fellow Grant Dailey to learn more about his experiences conducting and guiding research. Grant Dailey is a concurrent Masters student in
December 31, 2018
Posted by: Michael Walstrom
On December 10, 2018, a Jackson School Global Research Group of students and faculty assembled near the Husky Union Building before driving to Microsoft HQ in Redmond. Their task: Provide members of
November 30, 2018
Posted by: Jeremy D Pritchard
In 2018, the team produced an analysis of the factors influencing the rise of new global data powers (data tigers) and identified which countries are likely to emerge as major
January 25, 2018
Posted by: dpal
The Cybersecurity Initiative at the Jackson School’s International Policy Institute has published two research briefs on emerging cybersecurity topics, in collaboration with Digital Futures Project at Wilson Center. In “Cybersecurity Workforce Preparedness: The
August 16, 2017
Posted by: Jessica Beyer
During spring quarter, a Jackson School Applied Research Program team worked in collaboration with Jackson School faculty member Stephen Meyers, consultants from the International Solutions Group (ISG), and representatives from
July 29, 2017
Posted by: Jessica Beyer
During spring quarter, one of the Jackson School’s Applied Research Program student teams was given a daunting task – help Microsoft think about Brad Smith’s call for a Digital Geneva Convention. In addition to weighing in on current Microsoft strategy, the students found out that they were working on the exact same research task that Microsoft had asked RAND to tackle. The project was the fifth product of a Jackson School Applied Research collaboration with Microsoft’s Global Security Strategy & Diplomacy Team.
June 20, 2017
Posted by: Monique Thormann
What does cybersecurity policy have to do with trade in Washington state? How can we meet workforce preparedness among cybersecurity policy professionals? What is meant by the cybersecurity policy domain? Cybersecurity
February 13, 2017
Posted by: Monique Thormann
“In developing new cyber infrastructure, how will this play out in developing countries whose basic infrastructure is still struggling?” asked Jackson School M.A. in International Studies student Michael Walstrom in front
October 3, 2016
Posted by: Jessica Beyer
Extremist use of information and communications technology (ICT) has proliferated, creating a unique security predicament for the companies who provide ICT products and services internationally. As the role of ICT
August 8, 2016
Posted by: Jessica Beyer
Extremist use of information and communication technology (ICT) has resulted in tension between the government, industry actors, and ICT users. In their response to extremist use of ICT, industry actors have faced a serious dilemma over how to respond to bad actors in a way that promotes security but does not infringe upon users’ rights to privacy and freedom of speech.