DHS Cyber Incident Data and Analysis Working Group White Papers This paper outlines the benefits of creating a cyber incident data repository. It argues that improved information sharing capabilities amongst…
Healthy, Resilient, and Sustainable Communities After Disasters: Strategies, Opportunities, and Planning for Recovery This book looks at public health in the context of disaster recovery and resilience. The book discusses public health in…
Water Management for Smart Cities: Implications of Advances in Real-Time Sensing, Information Processing, and Algorithmic Controls This piece explores the role new technologies can play in coordinating urban water, wastewater, and stormwater systems. It explains that…
The South Carolina Deluge: Lessons from a Watershed Disaster This report analyzes the October 2015 South Carolina record breaking rainstorms that lasted for over five days and the resulting…
Creating a Federally Sponsored Cyber Insurance Program An analysis in support of a cyber insurance program. A particular emphasis is placed on the lack of private sector…
Energy and Communication Infrastructure for Disaster Resilience in Rural and Regional Australia This paper looks at disaster mitigation and recovery in rural and regional Australia. Disasters in these regions can have severe…
The role of social capital, personal networks, and emergency responders in post-disaster recovery and resilience: a study of rural communities in Indiana This paper details the various aspects of societal resilience integral to post-disaster recovery. Through a mail survey, researchers studied the…
Toward a gender diverse workforce in the renewable energy transition Despite the rapid growth of the renewable energy field, there is still a lack of gender diversity. Diversity has been…
Boston Under Snow: Resilience Lessons for the Nation This report by the Global Resilience Institute looks at the record breaking snowfall experienced by the metro-Boston Region in 2015.…
Breaking the Target: An Analysis of Target Data Breach and Lessons Learned This paper analyzes the events leading up to the second most devastating data breach in history: the attack on the…
The Strategic Logic of Credit Claiming: A New Theory for Anonymous Terrorist Attacks In theory, terrorism is a political communication strategy for groups to convey their grievances and the costs of ignoring them.…
Five Myths About Syrian Refugees An estimated 11 million Syrians—about half the national population—have fled their homes since the beginning of the conflict in March 2011. Yet a…