156 Items

Book - Oxford University Press

The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations

    Author:
  • Ben Buchanan
| February 2017

In this book, Cyber Security Project Fellow Dr. Ben Buchanan shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.

Book - Rowman & Littlefield Publishers, Inc.

Cyber Insecurity: Navigating the Perils of the Next Information Age

| October 2016

In this volume, academics, practitioners from both private sector and government, along with former service members come together to highlight sixteen of the most pressing contemporary challenges in cybersecurity, and to offer recommendations for the future.

Book - Oxford University Press

Innovation and Its Enemies: Why People Resist New Technologies

| July 2016

This book explores the sources and dynamics of social opposition to innovation. It:

  • Explains the roots of resistance to new technologies - and why such resistance is not always futile
  • Draws on nearly 600 years of economic history to show how the balance of winners and losers shapes technological controversies
  • Outlines policy strategies for inclusive innovation to reduce the risks and maximize the benefits of new technologies

Sign up to receive updates about the book ›

Book - Oxford University Press

The New Harvest: Agricultural Innovation in Africa

| September 2015

The New Harvest argues that Africa can feed itself in a generation and help contribute to global food security despite its history of persistent food shortages and the rising threat of climate change. This new edition provides ideas on how to place agriculture at the center of the continent's long-term economic transformation. It demonstrates how policy coordination can help realize agriculture's full potential as a motherboard for other economic activities.

The full text of The New Harvest is available here.

Book Chapter

Creating a Secure Network: The 2001 Anthrax Attacks and the Transformation of Postal Security

| June 2014

The author critically examines the creation and implementation of new security standards within the postal network after the 2001 anthrax attack. Drawing on research conducted at the Smithsonian Institution and documents obtained under the Freedom of Information Act (FOIA), the article traces the politics inscribed within the architecture of new security technologies. The article sets debates about postal security within a broader account of political economy. The article emphasizes the possibilities and limitations of disasters to create moments of disruption and undergird new political interventions.

Book Chapter

Technology and the Reinvention of Education in Africa

| February 2014

"...More recently, the MOOC promise has come under scrutiny as early evidence of its impact started to emerge. The rate of completion of MOOC-based courses was surprising low and their pedagogic contributions became uncertain. The evaluations, however, have failed to distinguish between the dynamics of early euphoric adopters and long-trends in technological innovation. There is a possibility that the MOOC revolution will follow the pattern of mobile phone adoption, favoring poor countries with outdated educational infrastructure and technology."

Book - IOS Press

Best Practices in Computer Network Defense: Incident Detection and Response

| February 2014

The cyber security of vital infrastructure and services has become a major concern for countries worldwide. The members of NATO are no exception, and they share a responsibility to help the global community to strengthen its cyber defenses against malicious cyber activity. This book presents 10 papers and 21 specific findings from the NATO Advanced Research Workshop (ARW) "Best Practices in Computer Network Defense (CND): Incident Detection and Response", held in Geneva, Switzerland, in September 2013.

Book Chapter

Preliminary Considerations: On National Cyber Security

| December 2012

In this chapter, Melissa Hathaway and Alexander Klimburg introduce three conceptual tools to help focus the strategic context and debate. These are termed the "three dimensions," the "five mandates," and the "five dilemmas" of national cyber security. Each dimension, mandate and dilemma will play a varying role in each nation's attempt to formulate and execute a national cyber security strategy according to their specific conditions.

Book - Yale University Press

Captive Audience: The Telecom Industry and Monopoly Power in the New Gilded Age

| January 2013

This important book by leading telecommunications policy expert Susan Crawford explores why Americans are now paying much more but getting much less when it comes to high-speed Internet access. Using the 2011 merger between Comcast and NBC Universal as a lens, Crawford examines how we have created the biggest monopoly since the breakup of Standard Oil a century ago. In the clearest terms, this book explores how telecommunications monopolies have affected the daily lives of consumers and America's global economic standing.