Journal Article - Georgetown Journal of International Affairs
Taking Control of Our Cyber Future
International Engagement on Cyber: 2014
Despite efforts by experienced and driven professionals, multiple cybersecurity challenges plague us today. Key indicators suggest that we are not making enough progress and, in fact, are possibly going backwards. Organizations of all types, including companies, governments, schools, and critical infrastructures, are experiencing increased data breaches,[i] criminal activity, essential e-services disruption, and property destruction.
This must change.
To make differences at scale, this paper outlines four actions, from two points of view: a view focused towards technology and practice, and a view towards policy and law....
[i] A data breach is an intentional or unintentional release of sensitive or secure information to an untrusted environment.
Want to Read More?
The full text of this publication is available via the original publication source.
For more information on this publication:
Please contact
Science, Technology, and Public Policy
For Academic Citation:
Hathaway, Melissa and John Stewart. "Taking Control of Our Cyber Future." Georgetown Journal of International Affairs, (July 25, 2014) .
- Recommended
- In the Spotlight
- Most Viewed
Recommended
Video
- SNF Agora Institute
Election 2020 — Securing the Vote
Audio
- Pioneer Institute
Ballot Question 1: Risks & Regulations Regarding Right to Repair
Analysis & Opinions
- Scientific American
The Next Administration Must Get Science and Technology Policy Right
In the Spotlight
Most Viewed
Policy Brief
- Quarterly Journal: International Security
The Future of U.S. Nuclear Policy: The Case for No First Use
Discussion Paper
- Belfer Center for Science and International Affairs, Harvard Kennedy School
Why the United States Should Spread Democracy
Despite efforts by experienced and driven professionals, multiple cybersecurity challenges plague us today. Key indicators suggest that we are not making enough progress and, in fact, are possibly going backwards. Organizations of all types, including companies, governments, schools, and critical infrastructures, are experiencing increased data breaches,[i] criminal activity, essential e-services disruption, and property destruction.
This must change.
To make differences at scale, this paper outlines four actions, from two points of view: a view focused towards technology and practice, and a view towards policy and law....
[i] A data breach is an intentional or unintentional release of sensitive or secure information to an untrusted environment.
Want to Read More?
The full text of this publication is available via the original publication source.Hathaway, Melissa and John Stewart. "Taking Control of Our Cyber Future." Georgetown Journal of International Affairs, (July 25, 2014) .
- Recommended
- In the Spotlight
- Most Viewed
Recommended
Video - SNF Agora Institute
Election 2020 — Securing the Vote
Audio - Pioneer Institute
Ballot Question 1: Risks & Regulations Regarding Right to Repair
Analysis & Opinions - Scientific American
The Next Administration Must Get Science and Technology Policy Right
In the Spotlight
Most Viewed
Policy Brief - Quarterly Journal: International Security
The Future of U.S. Nuclear Policy: The Case for No First Use
Discussion Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School
Why the United States Should Spread Democracy


