10 Items

man wearing a shirt promoting TikTok

AP/Ng Han Guan

Analysis & Opinions - Project Syndicate

The Other Global Power Shift

| Aug. 06, 2020

Joseph Nye writes that the world is increasingly obsessed with the ongoing power struggle between the United States and China. But the technology-driven shift of power away from states to transnational actors and global forces brings a new and unfamiliar complexity to global affairs.

Paper - Potomac Institute for Policy Studies

Cyber Readiness Index 2.0

    Authors:
  • Chris Demchak
  • Jason Kerben
  • Jennifer McArdle
  • Francesca Spidalieri
| November 30, 2015

"Building on CRI 1.0, Cyber Readiness Index 2.0 examines one hundred twenty-five countries that have embraced, or are starting to embrace, ICT and the Internet and then applies an objective methodology to evaluate each country's maturity and commitment to cyber security across seven essential elements."

Analysis & Opinions - Centre for International Governance Innovation

Change the Conversation, Change the Venue and Change Our Future

| May 14, 2013

"The G20 has an opportunity to articulate a vision for shaping the Internet economy for the next five to 10 years. The power of the leadership of this body, combined with its ability to assemble and speak to a simple, positive narrative for cybersecurity anchored in our collective economic well-being (and GDP growth), could be a watershed event. The GDP erosion that all nations are suffering places cybersecurity within the legitimate processes and 'architecture' of international economic governance. By changing the conversation to being about the economy and growth, this approach would enable the G20 to de-escalate the militarization and balkanization of the Internet."

Book - Yale University Press

Captive Audience: The Telecom Industry and Monopoly Power in the New Gilded Age

| January 2013

This important book by leading telecommunications policy expert Susan Crawford explores why Americans are now paying much more but getting much less when it comes to high-speed Internet access. Using the 2011 merger between Comcast and NBC Universal as a lens, Crawford examines how we have created the biggest monopoly since the breakup of Standard Oil a century ago. In the clearest terms, this book explores how telecommunications monopolies have affected the daily lives of consumers and America's global economic standing.

Analysis & Opinions - Forbes

Trading Places: Commerce Drives Science And Technology In Africa

| November 27, 2012

"Africa used mobile phones to create a radically new way of transferring money, thereby restructuring the banking sector. Mobile technology is on the verge of transforming other traditional industries including education and health, among others. In education, Africa can leapfrog into digital books and mobile learning to become a leading source of new educational businesses and industries. In healthcare, mobile technology will transform the very idea of a hospital."

June 12, 2012: A sign at a Verizon store in Mountain View, Calif. Verizon Wireless agreed on June 25, 2012, to sell some wireless spectrum rights to T-Mobile USA and swap others.

AP Photo

Analysis & Opinions - The Huffington Post

More Than an Appliance: Verizon, the FCC and our Digital Future

| August 21, 2012

"The DOJ has opened a broad inquiry into the practices and powers of the cable industry: that's the good news. As policymakers finalize this gargantuan deal, they should keep in mind that America's economic future needs a diet rich in fiber that enables competition and treats our digital future as something more than just an appliance."

A Pakistani Internet user surfs the YouTube Web site at a local Internet cafe in Islamabad, Pakistan, Feb. 26, 2008. Pakistan defended its clampdown on the YouTube Web site which accidentally interrupted access for Internet users around the globe.

AP Photo

Paper - Munk School of Global Affairs, University of Toronto

Duties for Internet Service Providers

| March 2012

In today's interconnected world, the Internet is no longer a tool. Rather, it is a service that helps generate income and employment, provides access to business and information, enables e-learning, and facilitates government activities. It is an essential service that has been integrated into every part of our society. Our experience begins when an Internet Service Provider (ISP) uses fixed telephony (plain old telephone service), mobile-cellular telephony, or fixed fiber-optic or broadband service to connect us to the global network. From that moment on, the ISP shoulders the responsibility for the instantaneous, reliable, and secure movement of our data over the Internet.

Analysis & Opinions - The Guardian

Africa's Quest for Prosperity

| December 26, 2011

"It is projected that Africa will have up to 240m mobile broadband connections by 2015. However, the economic gains will only be efficiently realised through regionally harmonised spectrum allocation. Such regional growth dynamics will also be realised in other areas of infrastructure investment such as energy, transport and irrigation."

Gertrude Kitongo poses with her mobile phone in Johannesburg, South Africa. She cherishes a cell phone as a link to family and friends and also sees it as a radio, a library, a mini cinema, a bank teller, etc., Nov. 8, 2011.

AP Photo

Magazine Article - Finance & Development

Africa's New Engine

| December 2011

Cell phone use has grown faster in Africa than in any other region of the world since 2003....Of course, South Africa—the most developed nation—still has the highest penetration, but across Africa, countries have leapfrogged technology, bringing innovation and connectivity even to remote parts of the continent, opening up mobile banking and changing the way business is done.

Norton Cybercrime Index

AP Photo

Paper - Science, Technology, and Public Policy Program, Belfer Center

Taking a Byte Out of Cybercrime

| October 2011

"Cybersecurity is a means to enable social stability and promote digital democracy; a method by which to govern the Internet; and a process by which to secure critical infrastructure from cybercrime, cyberespionage, cyberterrorism and cyberwar. As nations and corporations recognize their dependence on ICT, policymakers must find the proper balance in protecting their investments without strangling future growth."