The primary focus of this report is understanding how to evaluate the equitable use of algorithms...
This report reviews the state of cyber attribution and examines alternative options for producing...
The authors of this report examine military applications of artificial intelligence (AI); compare...
As the online recruitment of violent extremist organizations grows, the U.S. government may benef...
The authors of this report examine military applications of artificial intelligence (AI); compare...
The authors discuss the need and potential for norms constraining cyber aggression. They review t...
The future is highly uncertain-however, it is important for the Army to try to anticipate future ...
Researchers from the Homeland Security Operational Analysis Center have developed a methodology f...
In response to the widespread youth mental health crisis, some kindergarten-through-12th-grade (K...
In response to the mounting specter of systemic cyber risks, the Cyberspace Solarium Commission r...
Authors researched public perceptions of government use of facial recognition technology and othe...
Researchers reviewed various stakeholders' perceptions of fifth-generation (5G) technology and ho...