Articles

48 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

Xi Jingping and other world leaders attend an APEC-ASEAN dialogue.

(Jorge Silva/Pool Photo via AP)

Journal Article - Quarterly Journal: International Security

China in a World of Orders: Rethinking Compliance and Challenge in Beijing’s International Relations

    Author:
  • Alastair Iain Johnston
| Fall 2019

Rather than debating whether China is challenging a single, U.S.-dominated liberal order, scholars and analysts should consider China’s actions in relation to multiple orders in different domains, where China is supportive of some, unsupportive of others, and partially supportive of still others.

Photo of Mark Zuckerberg preparing to resume testimony about user data on Facebook.

(AP Photo/Jacquelyn Martin)

Magazine Article - Belfer Center for Science and International Affairs, Harvard Kennedy School

America Needs to Align Technology with a Public Purpose

| Nov. 25, 2018

The arc of innovative progress has reached an inflection point, writes Ash Carter in The Atlantic. "Recent technological change that has brought immeasurable improvements to billions around the globe now threatens to overwhelm us. Making this disruption positive for all is the chief challenge of our time. We ourselves—not only market forces—should bend the arc of change toward human good. To do so, we must reinvigorate an ethos of public purpose that has become dangerously decoupled from many of today’s leading tech endeavors."

U.S. Secretary of State John Kerry stands with other Foreign Ministers whose countries are members of the Gulf Cooperation Council following a meeting on January 23, 2016, in Riyadh, Saudi Arabia.

U.S. Department of State

Journal Article - New Political Economy

Domestic Sources of Twenty-first-century Geopolitics: Domestic Politics and Sovereign Wealth Funds in GCC Economies

| Feb. 05, 2018

The present article brings domestic politics into an analysis on sovereign wealth funds (SWFs) that are relevant for the study of contemporary geopolitics. What are the domestic drivers behind SWF creation, and how does a country’s domestic political environment affect the creation of these funds? Using a comparative historical case study on sovereign funds in Gulf Cooperation Countries, this article investigates the effects of domestic state–society structures on decisions about SWF creation and their evolving structure.

tenth grader attending a class how to investigate a computer network that has been hacked in Beit Shemesh, Israel.

AP

Journal Article - Cyber, Intelligence, and Security

Four Big "Ds" and a Little "r": A New Model for Cyber Defense

| June 2017

This article argues that cyberthreats are not fundamentally different from other asymmetric threats, and it provides a conceptual model for developing a response by drawing on classic principles of military strategy, the "four Ds"— Detection, Deterrence, Defense, and Defeat—as well as resilience (the little "r"). The authors offer a model for how countries can create policies addressing each of these principles that will enhance the security of national cyber systems.

University of Michigan Journal of Law Reform

University of Michigan Journal of Law Reform

Journal Article - University of Michigan Journal of Law Reform

Making Democracy Harder to Hack

| Spring 2017 (Volume 50, Issue 3)

With the Russian government hack of the Democratic National Convention email servers and related leaks, the drama of the 2016 U.S. presidential race highlights an important point: nefarious hackers do not just pose a risk to vulnerable companies; cyber attacks can potentially impact the trajectory of democracies.