Listing 1 - 10 of 22 | << page >> |
Sort by
|
Choose an application
Florida's Miami-Dade and Broward counties are vulnerable to flooding and intrusion of saltwater into drinking water wells as a consequence of sea level rise (SLR), changes in precipitation, and the distribution of future asset growth across the region. It is uncertain how these drivers will evolve in the future, so it is important to understand the risks, what areas are most at risk and why, and possible ways to mitigate the risks. Looking out to the 2040 time frame, the analysis linked two groundwater flow simulation models developed separately for the two counties with a simple economic model of asset values as a function of groundwater levels and the location of the saltwater/freshwater interface. Adaptation opportunities were evaluated against a number of climate hazards and future projections of asset growth. The results demonstrate that vulnerability to climate change is not constrained to high value coastal development but also includes inland areas where groundwater is shallow and wetter rainfall patterns could cause flooding. The region's vulnerability to both SLR and increased precipitation is cause for concern, but targeted actions, such as focusing development on higher ground, could reduce further exposure of assets and mitigate effects of saltwater intrusion on drinking water supplies.
Saltwater encroachment --- Climate change mitigation --- Mathematical models.
Choose an application
Terrorism insurance --- Terrorism risk assessment --- United States.
Choose an application
Choose an application
"Today's cyber environment presents unlimited opportunities for innovation, interaction, commerce, and creativity, but these benefits also bring serious security challenges. Satisfactory solutions will require building partnerships among public and private organizations, establishing mechanisms and incentives to foster routine information sharing and collective defense, and educating users about their role in thwarting increasingly sophisticated attacks. With a grant from the William and Flora Hewlett Foundation's Cyber Initiative, RAND developed and conducted two cybersecurity-focused discovery games in Washington, D.C., and California's Silicon Valley that aimed to capture the widest possible range of stakeholder perspectives. Participants represented the tech sector, government agencies, think tanks and academic institutions, advocacy organizations promoting civil liberties and privacy, technology users, and more. The goals were to explore opportunities for improving cybersecurity, assess the implications of possible solutions, and develop an initial framework to support debate and inform decisions regarding cybersecurity policies and practices. The games were structured around two plausible cybersecurity scenarios set in the near future. In the first scenario, malicious actors have exploited vulnerabilities in the Internet of Things, causing both virtual and physical harm; in the second, massive data breaches have compromised the financial system, including authentication processes. Participants debated dimensions of each problem in multidisciplinary teams, then shared potential solutions and strategies in a large-group setting. The format and findings of the exercises offer insights that can help guide holistic approaches to addressing future cybersecurity challenges"--Publisher's description.
Computer security --- Computer networks --- Computer crimes --- Games --- Security measures --- Government policy --- Prevention. --- Analysis.
Choose an application
Juvenile delinquency --- Violence --- Prevention. --- Violent behavior --- Social psychology --- Delinquency, Juvenile --- Juvenile crime --- Conduct disorders in children --- Crime --- Juvenile corrections --- Reformatories
Choose an application
Police training --- Caruth Police Institute. --- Police --- Police professionalization --- Training --- Training of --- CPI --- W.W. Caruth Jr. Police Institute
Choose an application
Information-sharing became a central element of the policy debate about U.S. homeland and national security after the September 11, 2001, terrorist attacks. However, sharing of information across jurisdictional lines is just as important for everyday criminal justice efforts to prevent and investigate crime, and systems to provide such capabilities have been in place for many years. Despite widespread belief that information-sharing is valuable, there have been relatively limited efforts to measure its effect on criminal justice outcomes. To help address this need, we examined the measurement of information-sharing effects from the strategic to the tactical levels, with a focus on developing reliable measurements that capture the range of ways sharing can affect outcomes and how the practicalities of law enforcement work practices can affect measurement. In collaboration with an advanced regional information-sharing agency, we developed techniques to examine the effects of multiple types of data-sharing at the officer, case, and offender levels. Analyses showed significant correlations between different types of sharing on the level of interagency involvement in cases for individual offenders, on the timing and likelihood of specific law enforcement events, and on the likelihood of individual police officers to be involved in cross-jurisdictional arrests. In addition, we explored lessons for future policy evaluation and information system design to facilitate measurement.
Choose an application
Choose an application
The sharing of intelligence and law enforcement information is a central part of U.S. domestic security efforts, yet there are concerns about the effectiveness of information-sharing and fusion activities and their value relative to the public funds invested in them. This report lays out the challenges of evaluating information-sharing efforts that seek to achieve multiple goals simultaneously; reviews past evaluations of information-sharing programs; and lays out a path to improving the evaluation of such efforts.
Domestic intelligence -- United States. --- Exchange of government information -- United States. --- Government information -- Access control -- United States. --- Information policy -- United States. --- Intelligence service -- United States. --- Intelligence service --- Domestic intelligence --- Information policy --- Domestic national security intelligence
Choose an application
Law enforcement --- Criminal justice, Administration of --- Social Welfare & Social Work --- Social Sciences --- Criminology, Penology & Juvenile Delinquency --- Information technology --- Data processing --- Administration of criminal justice --- Enforcement of law --- Law and legislation --- Justice, Administration of --- Crime --- Criminal law --- Criminals --- Policing
Listing 1 - 10 of 22 | << page >> |
Sort by
|