Reports & Papers

26 Items

Report Chapter

Sustainable and Secure Development: A Framework for Resilient Connected Societies

| March 2016

Internet penetration and the wider adoption of information communications technologies (ICTs) are reshaping many aspects of the world's economies, governments, and societies. Everything from the way goods and services are produced, distributed, and consumed, to how governments deliver services and disseminate information, to how businesses, and citizens interact and participate in the social contract are affected. The opportunities associated with becoming connected and participating in the Internet economy and the potential economic impact cannot be ignored.

Paper - Harvard Business Publishing

The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy

| February 2015

The case is designed to support a discussion of the costs and benefits associated with competing models of vulnerability disclosure. The trade in zero-days is a growing area of policy concern. The case can be used in courses on cyber policy, science and technology policy, or national security. It can be used to explore the concepts of public goods, dual-use technologies, and externalities.

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

The Regime Complex for Managing Global Cyber Activities

| November 2014

In 1992, there were only a million users on the Internet; today, there are nearly three billion, and the Internet has become a substrate of modern economic, social and political life. And the volatility continues. Analysts are now trying to understand the implications of ubiquitous mobility, the "Internet of everything" and analysis of "big data." Over the past 15 years, the advances in technology have far outstripped the ability of institutions of governance to respond, as well as our thinking about governance.

teaser image

Report - Office of Science and Technology Policy

The Strength of the U.S. Commercial Privacy Regime

| March 2014

"The purpose of this paper is to promote a thoughtful understanding of the U.S. privacy regime, and to help begin a discussion that recognizes some of the advantages of the relatively flexible and non-prescriptive nature of the American system, which counts on enforcement and deterrence more than detailed prohibitions and rules..."

Discussion Paper - Science, Technology, and Public Policy Program, Belfer Center

The Discovery-Invention Cycle: Bridging the Basic/Applied Dichotomy

| February 2013

In this paper we hope to provide an alternative point of view. By examining both the evolution of the famous "linear model of innovation" — which holds that scientific research precedes technological innovation — and the problematic description of engineering being "applied science" we seek to challenge the existing dichotomies between basic / applied research, science and engineering, tracing how knowledge travels between different knowledge domains through a case study of a selected group of Nobel Prizes in physics.

Report - Center for Strategic and International Studies

The U.S.-Japan Alliance: Anchoring Stability in Asia

| August 2012

The following report presents a consensus view of the members of a bipartisan study group on the U.S.-Japan alliance. The report specifically addresses energy, economics and global trade, relations with neighbors, and security-related issues. Within these areas, the study group offers policy recommendations for Japan and the United States, which span near- and long-term time frames. These recommendations are intended to bolster the alliance as a force for peace, stability, and prosperity in the Asia-Pacific region and beyond.

Paper - Science, Technology, and Public Policy Program, Belfer Center

On the Use of Offensive Cyber Capabilities: A Policy Analysis on Offensive US Cyber Policy

    Authors:
  • Robert Belk
  • Matthew Noyes
| March 2012

This paper offers analysis and policy recommendations for use and response to various forms of cyber action for Offensive Military Cyber Policy. It establishes a pragmatic policy-relevant, effects-based ontology for categorizing cyber capabilities, and develops a comprehensive framework for cyber policy analysis. Furthermore, it demonstrates the utility of the cyber policy analysis framework by analyzing six key categories of external cyber actions identified by our ontology, which range the entire spectrum of cyber activity. Lastly, this work develops actionable policy recommendations from our analysis for cyber policy makers while identifying critical meta-questions.

Paper - Science, Technology, and Public Policy Program, Belfer Center

Internet Fragmentation: Highlighting the Major Technical, Governance and Diplomatic Challenges for U.S. Policy Makers

| May 2012

The Internet is at a crossroads. Today it is generally open, interoperable and unified. Tomorrow, however, we may see an entirely different Internet, one not characterized by openness and global reach, but by restrictions, blockages and cleavages. In order to help ensure that the Internet continues to serve as a source of global integration, democratization, and economic growth, American policymakers must be aware of the most significant technical, political and legal challenges to a unified Internet.

A Pakistani Internet user surfs the YouTube Web site at a local Internet cafe in Islamabad, Pakistan, Feb. 26, 2008. Pakistan defended its clampdown on the YouTube Web site which accidentally interrupted access for Internet users around the globe.

AP Photo

Paper - Munk School of Global Affairs, University of Toronto

Duties for Internet Service Providers

| March 2012

In today's interconnected world, the Internet is no longer a tool. Rather, it is a service that helps generate income and employment, provides access to business and information, enables e-learning, and facilitates government activities. It is an essential service that has been integrated into every part of our society. Our experience begins when an Internet Service Provider (ISP) uses fixed telephony (plain old telephone service), mobile-cellular telephony, or fixed fiber-optic or broadband service to connect us to the global network. From that moment on, the ISP shoulders the responsibility for the instantaneous, reliable, and secure movement of our data over the Internet.

Discussion Paper - Science, Technology, and Public Policy Program, Belfer Center

Cloud and Mobile Privacy: The Electronic Communications Privacy Act

| February 2012

Consumer expectations of online and mobile privacy have in recent years diverged significantly from reality. In certain circumstances, the United States government has the ability to access a consumer's cloud-based email, location data gathered from their mobile phones, and information about what calls a user places on a mobile device—without a warrant. While a broad coalition is spearheading reform efforts in Washington, providers of these services should take proactive steps to bring consumer understanding of their privacy more in line with reality.