July 3, 2019
Posted by: Jessica Beyer
This event was the fourth in a series of events. The first focused on privacy. The second focused on systemic risk. The third tackled questions around Artificial Intelligence (AI). The next one will focus on
February 21, 2019
Posted by: Jessica Beyer
During spring quarter 2018, a group of Jackson School undergraduates and graduate students spent the quarter tackling the issue of systemic cyber risk as part of an Applied Research Project
December 24, 2018
Posted by: Michael Walstrom
A series on: Cybersecurity and technology futures Sponsored by the University of Washington’s Jackson School of International Studies, Information School, Women’s Center Join us for engaging discussions with leaders from business, government,
February 28, 2018
Posted by: Jessica Beyer
The rapid growth of digital data stores and the increasing vulnerability in intellectual property challenges governments around the world to find ways to protect and regulate the flow and storage
February 28, 2018
Posted by: Jessica Beyer
Data localization laws require that certain types of data be stored within a country before being allowed to move outside that country’s borders. Internationally, there has been an increase in
February 7, 2018
Posted by: Jessica Beyer
China is not the first country to pursue data localization. Nigeria has required all subscriber and consumer data of ICT companies to be stored locally within the country, as well
January 31, 2018
Posted by: Jessica Beyer
In the wake of recent cyber-attacks and data leaks, countries have increasingly enacted data localization laws aimed at limiting the cross-border flow of data and monitoring corporations and individuals (Panday
January 25, 2018
Posted by: Jessica Beyer
While countries around the world are enacting data barriers, the Japanese government has kept their data borders relatively free from constraints. Other countries create data barriers based on the rationale
December 1, 2017
Posted by: Monique Thormann
In their article “Russia Is Now Providing North Korea With Internet: What That Could Mean For Cyber Warfare“, Matthew Newton and Donghui Park, both Jackson School graduate students and Jackson
September 8, 2017
Posted by: Jessica Beyer
Since the early 2000s, cyber espionage issues have strained U.S.-China relations. In response, the U.S. and China entered into a cybersecurity agreement in 2015 to decrease economic espionage between the