Information Policy: Global, national and domestic security policy, cybersecurity and computer crime, civil liberties (including privacy), telecommunications and spectrum, intellectual property, innovation and antitrust, internet and free speech. Economic policy, competition, technological disruption and displacement, jobs, training and education, economic espionage. Information policy and free trade, globalization and global security, international jurisdiction, internet governance. Information management, institutional and organizational architecture, and business process engineering.
Energy and Environmental Policy: International energy and environmental security. Alternative sourcing, smart grid distribution and consumption management, market based solutions including trading markets. Monitoring, enforcement and remidiation management. Resource management.
Enabling Technologies: Sensing, data collection, data aggregation, data integration, data fusion, data analysis, data mining, artificial intelligence, augmented reality, visualization, decision support, distributed networks, database management, information sharing, enterprise architecture, distributed computing, wireless communications, remote sensing, nanotechnology, identification and authentication, network and computer security, biometrics, cryptography, rule-based processing, digital rights management, knowledge management.
Security Applications: Global security, national security, energy and environmental security, foreign intelligence (FI), defense intelligence (DI), counter-intelligence (CI), domestic intelligence, homeland security, law enforcement, counterterrorism, counter-insurgency, electronic surveillance, regulatory compliance, corporate and enterprise security, corporate intelligence, competitive intelligence, systems security, cybersecurity, information security, communication security, information assurance (IA), information warfare (IW), perception management, strategic influence, information operations (IO), psychological operations (PSYOPS), military deception (MILDEC), operations security (OPSEC), electronic warfare (EW), computer network operations (CNO), computer network attack (CNA), computer network exploitation (CNE), computer network defense (CND), netcentric strategy, environmental monitoring, international relations and global security.
Related Areas of Research Interest: Technology innovation and adoption, social change, knowledge-creation, decision-making, learning, risk-analysis, risk-management, conflict resolution, deviation analysis, pedagogy, communications, media analysis, information economics, behavioral economics, control theory, cybernetics, network theory, emergence, complexity, computational social science, behavioral science, history of technology, and cultural history.