Articles

340 Items

solar panels at the Cochin International Airport in Kochi, Kerala state, India

AP Photo/R S Iyer

Journal Article - Innovation and Development

Catching-Up in Green Industries: The Role of Product Architecture

| Aug. 23, 2022

As latecomers to the industrialization process, developing countries may face barriers to upgrading from the production of mass-produced goods to higher-value technologies. Using a comparative qualitative case study focusing on three renewable energy technologies, this paper develops a typology of catching-up opportunities in green energy industries and finds that policymakers should target certain technologies in their industrial strategies based on certain technology characteristics, and should seek opportunities to capitalize on a local niche that creates a need for innovation.

Close-up of two hands placed on the laptop keyboards with reflection on the screen.

AP Photo/Damian Dovarganes, File

Journal Article - Journal of International Relations and Sustainable Development

The New Frontier of Democratic Self-Defense

| Winter 2022

The United States nor its allies alone cannot counter adversarial and criminal cyber activity in the digital domain-–the reach, scale, stealth, and danger are simply too great for any one country to bear. As such, calls for international operational collaboration in cybersecurity and emerging technologies are increasing. Former U.S. State Department Cyber Diplomat Chris Painter noted in a December 2020 Foreign Policy article that there must be more leadership and partnership on global cyber cooperation. What follows represents a thinking-through of what this ought to entail.

A security guard stands near a sculpture of the Chinese Communist Party flag at the Museum of the Communist Party of China on May 26, 2022, in Beijing.

AP Photo/Ng Han Guan

Journal Article - Quarterly Journal: International Security

Strategic Substitution: China’s Search for Coercive Leverage in the Information Age

    Author:
  • Fiona Cunningham
| Summer 2022

After the mistaken U.S. bombing of the Chinese Embassy in Belgrade in 1999, China turned to information-age weapons to create a risk of escalation to nuclear war with the United States. This shift helps compensate for its conventional military inferiority.

U.S. Military Academy cadets watch data on computers

AP Photo

Journal Article - Quarterly Journal: International Security

Prediction and Judgment: Why Artificial Intelligence Increases the Importance of Humans in War

    Authors:
  • Avi Goldfarb
  • Jon R. Lindsay
| Winter 2021/22

Rather than rapid robotic wars and decisive shifts in military power, AI-enabled conflict will likely involve significant uncertainty, organizational friction, and chronic controversy. Greater military reliance on AI will therefore make the human element in war even more important, not less.

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

FORT GORDON NELSON HALL, Augusta, Georgia, June 10, 2014 – The U.S. Army’s ‘Cyber Center of Excellence’, Fort Gordon in Augusta, Georgia, hosted a multi-service ‘NetWar’ to show, and build, cyber Warrior capabilities Tuesday, June 10.

Georgia Army National Guard photo by Staff Sgt. Tracy J. Smith

Journal Article - Quarterly Journal: International Security

The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations

    Author:
  • Lennart Maschmeyer
| Fall 2021

Although cyber conflict has existed for thirty years, the strategic utility of cyber operations remains unclear. The subversive trilemma explains why cyber operations tend to fall short of their promise in both warfare and low-intensity competition.