Science & Technology

38 Items

Maintaining America's Edge

Aspen Strategy Group

Book Chapter - Aspen Strategy Group

Introduction: Navigating Uncharted Territory in the Technological Era

| Jan. 30, 2019

In August 2018, the nonpartisan Aspen Strategy Group (ASG) convened its thirtyfourth annual meeting in Aspen, Colorado. Over the course of three days, ASG members and invited experts from government, universities, think tanks, and the private sector debated the impact of dramatic technological change over the next decade on American national security. Our conversations covered a wide breadth of emerging technologies—artificial intelligence, machine learning, quantum computing, and biotechnology—and the challenges they pose to America’s military, the intelligence community, U.S. economic power, and democratic institutions. Our group grappled with the central dilemma of how the U.S. government can harness these technologies—developed primarily in the private sector and research labs—to compete with China and other adversaries in the years ahead.

Solar panel field and wind turbines

PIXNIO / hpgruesen

Book - Edward Elgar Publishing, Inc.

Handbook of the International Political Economy of Energy and Natural Resources

| 2018

This Handbook offers a comprehensive overview of the latest research from leading scholars on the international political economy of energy and resources. Highlighting the important conceptual and empirical themes, the chapters study all levels of governance, from global to local, and explore the wide range of issues emerging in a changing political and economic environment.

Book - Oxford University Press

The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations

    Author:
  • Ben Buchanan
| February 2017

In this book, Cyber Security Project Fellow Dr. Ben Buchanan shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.

Book - Rowman & Littlefield Publishers, Inc.

Cyber Insecurity: Navigating the Perils of the Next Information Age

| October 2016

In this volume, academics, practitioners from both private sector and government, along with former service members come together to highlight sixteen of the most pressing contemporary challenges in cybersecurity, and to offer recommendations for the future.

Book - Oxford University Press

Innovation and Its Enemies: Why People Resist New Technologies

| July 2016

This book explores the sources and dynamics of social opposition to innovation. It:

  • Explains the roots of resistance to new technologies - and why such resistance is not always futile
  • Draws on nearly 600 years of economic history to show how the balance of winners and losers shapes technological controversies
  • Outlines policy strategies for inclusive innovation to reduce the risks and maximize the benefits of new technologies

Sign up to receive updates about the book ›

Molten Salt Reactor diagram

DOE

Book Chapter

Design for Values in Nuclear Technology

| 2014

Safety has always been an important criterion for designing nuclear reactors, but in addition to safety, there are at least four other values that play a key role, namely, security (i.e., sabotage and proliferation), sustainability (i.e., environmental impacts, energy resource availability), economic viability (i.e., embarking on new technology and its continuation), as well as intergenerational justice (i.e., what we leave behind for future generations). This chapter reviews the evolution of generations of nuclear reactors (I, II, III, III, and IV) in terms of these values.

Book Chapter

Creating a Secure Network: The 2001 Anthrax Attacks and the Transformation of Postal Security

| June 2014

The author critically examines the creation and implementation of new security standards within the postal network after the 2001 anthrax attack. Drawing on research conducted at the Smithsonian Institution and documents obtained under the Freedom of Information Act (FOIA), the article traces the politics inscribed within the architecture of new security technologies. The article sets debates about postal security within a broader account of political economy. The article emphasizes the possibilities and limitations of disasters to create moments of disruption and undergird new political interventions.

Book Chapter

Technology and the Reinvention of Education in Africa

| February 2014

"...More recently, the MOOC promise has come under scrutiny as early evidence of its impact started to emerge. The rate of completion of MOOC-based courses was surprising low and their pedagogic contributions became uncertain. The evaluations, however, have failed to distinguish between the dynamics of early euphoric adopters and long-trends in technological innovation. There is a possibility that the MOOC revolution will follow the pattern of mobile phone adoption, favoring poor countries with outdated educational infrastructure and technology."