Articles

84 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

(Economic Research Forum)

(Economic Research Forum)

Journal Article - Economic Research Forum

Is Oil Wealth Good for Private Sector Development?

| March, 2019

When do autocratic rulers in oil-producing countries support private sector development? We argue that the size of oil rents per capita has an important effect on ruler support for the rule of law, respect for private property rights, and other factors that promote private investment.

Great Decisions Cover

Foreign Policy Association

Journal Article - Foreign Policy Association

The State of the State Department and American Diplomacy

| Jan. 03, 2019

During the Trump administration, the usual ways of conducting diplomacy have been upended. Many positions in the State Department have never been filled, and meetings with foreign leaders such as Kim Jong-un and Vladimir Putin have been undertaken with little advance planning. What effect are these changes having now, and how will they affect ongoing relationships between the United States and its allies and adversaries?

Photo of Mark Zuckerberg preparing to resume testimony about user data on Facebook.

(AP Photo/Jacquelyn Martin)

Magazine Article - Belfer Center for Science and International Affairs, Harvard Kennedy School

America Needs to Align Technology with a Public Purpose

| Nov. 25, 2018

The arc of innovative progress has reached an inflection point, writes Ash Carter in The Atlantic. "Recent technological change that has brought immeasurable improvements to billions around the globe now threatens to overwhelm us. Making this disruption positive for all is the chief challenge of our time. We ourselves—not only market forces—should bend the arc of change toward human good. To do so, we must reinvigorate an ethos of public purpose that has become dangerously decoupled from many of today’s leading tech endeavors."

teaser image

Journal Article - Global Policy

The Case for Economic Development Through Sovereign Investment: A Paradox of Scarcity?

| Apr. 14, 2018

Sovereign wealth funds (SWFs) have traditionally been created to recycle excess reserves from natural resource or non‐commodity revenues. However, in recent years funds are being established under conditions of capital scarcity with objectives to contribute domestic economic development, often through the buildout of national infrastructure programs. Such trends in new fund creation represent a fundamental shift in the sovereign wealth fund paradigm and raise serious questions about how these entities are to be capitalized and also the implications of capitalization models on their sustainability. This study examines the recent evolution of SWF models focused on economic development. Its analytic focus is drawn, in particular, to countries that are neither endowed with oil wealth, nor otherwise enjoy export surpluses to be used to capitalize a development‐oriented SWF. While this study is relevant to and expands the scope of the broad literature on SWFs, its specific contribution is as a focused analysis of how SWF funding sources impact achieving long‐term financial and socio‐economic development objectives.

tenth grader attending a class how to investigate a computer network that has been hacked in Beit Shemesh, Israel.

AP

Journal Article - Cyber, Intelligence, and Security

Four Big "Ds" and a Little "r": A New Model for Cyber Defense

| June 2017

This article argues that cyberthreats are not fundamentally different from other asymmetric threats, and it provides a conceptual model for developing a response by drawing on classic principles of military strategy, the "four Ds"— Detection, Deterrence, Defense, and Defeat—as well as resilience (the little "r"). The authors offer a model for how countries can create policies addressing each of these principles that will enhance the security of national cyber systems.