7 Items

man wearing a shirt promoting TikTok

AP/Ng Han Guan

Analysis & Opinions - Project Syndicate

The Other Global Power Shift

| Aug. 06, 2020

Joseph Nye writes that the world is increasingly obsessed with the ongoing power struggle between the United States and China. But the technology-driven shift of power away from states to transnational actors and global forces brings a new and unfamiliar complexity to global affairs.

Analysis & Opinions - Forbes

Why We Need Innovation To Prepare For the Global Aging Society

| October 3, 2012

"Technology alone will not be adequate to address the needs of the elderly. But policy proposals that fail to take into account advances in medicine and engineering are unlikely to take advantage of human creativity. In fact, strategies that put the elderly at the center of the innovation process could significantly increase the prospects of turning the elderly from being a burden on society to being an asset."

Paper - Science, Technology, and Public Policy Program, Belfer Center

Internet Fragmentation: Highlighting the Major Technical, Governance and Diplomatic Challenges for U.S. Policy Makers

| May 2012

The Internet is at a crossroads. Today it is generally open, interoperable and unified. Tomorrow, however, we may see an entirely different Internet, one not characterized by openness and global reach, but by restrictions, blockages and cleavages. In order to help ensure that the Internet continues to serve as a source of global integration, democratization, and economic growth, American policymakers must be aware of the most significant technical, political and legal challenges to a unified Internet.

A computer forensic examiner looks for evidence on hard drives at the Dept. of Defense Cyber Crime Center in Linthicum, Md., Aug. 11, 2011. Hackers and hostile states are launching increasingly sophisticated cyberattacks against U.S. defense contractors.

AP Photo

Analysis & Opinions - The New York Times

How China Steals Our Secrets

| April 2, 2012

"Under Customs authority, the Department of Homeland Security could inspect what enters and exits the United States in cyberspace. Customs already looks online for child pornography crossing our virtual borders. And under the Intelligence Act, the president could issue a finding that would authorize agencies to scan Internet traffic outside the United States and seize sensitive files stolen from within our borders."

- Belfer Center for Science and International Affairs, Harvard Kennedy School Belfer Center Newsletter

Scholars Weigh Info-Tech Policy Challenges

| Winter 2011-2012

In September, experts from Harvard University, the Massachusetts Institute of Technology, and other Boston-area universities participated in a three day conference convened by the Belfer Center to examine policy choices facing the fast-changing field of information and communications technology.

Professor Venkatesh "Venky" Narayanamurti

Martha Stewart Photo

News - Science, Technology, and Public Policy Program, Belfer Center

Information and Communications Technology and Public Policy: The Next Wave

| November 15, 2011

Industry and academic experts from Harvard, MIT, and other Boston-area universities met for a three-day conference in September 2011 to examine policy choices facing the fast-changing field of information and communications technology at the intersection of public policy. The conference was convened by the Belfer Center for Science and International Affair’s Information and Communications Technology and Public Policy Project (ICTPP) at the Harvard Kennedy School.