Economics & Global Affairs

24 Items

Paper - Potomac Institute for Policy Studies

Cyber Readiness Index 2.0

    Authors:
  • Chris Demchak
  • Jason Kerben
  • Jennifer McArdle
  • Francesca Spidalieri
| November 30, 2015

"Building on CRI 1.0, Cyber Readiness Index 2.0 examines one hundred twenty-five countries that have embraced, or are starting to embrace, ICT and the Internet and then applies an objective methodology to evaluate each country's maturity and commitment to cyber security across seven essential elements."

Analysis & Opinions - Harvard Crimson

How America Checks Up

| November 6, 2014

"The main explanation for this situation...is the difficulty of creating a unified approach for the large variety and number of financial institutions in the U.S. But if the European Union has managed to do so across countries and languages, the U.S. should be able to so, too. It certainly does not lack the technical expertise."

HQ of Underwriters Laboratories Inc. in Northbrook, Ill., Sept. 24, 2009. UL's stamp of approval ensures that consumers are knowledgeable and testing is done. There is no such lab or certification process for Internet-connected devices.

Wikimedia CC

Journal Article - Georgetown Journal of International Affairs

Taking Control of Our Cyber Future

| July 25, 2014

In our current state of cybersecurity, breach, crime, disruption, and destruction are growing in unacceptable ways. Key indicators suggest that we are not making enough progress and in fact, are possibly going backwards. This paper proposed four actions to start taking right now.

Nov. 29, 2008: Ad for M-Pesa, a cellphone money-transfer system that came to Tanzania from Kenya, where it had begun. Once created, the Kenyan government used it to provide more services.

Jerry Michalski Photo

Analysis & Opinions - The Korea Times

Governance in the Information Age

| December 13, 2013

"The WEF's Global Agenda Council on the Future of Government...has considered ways in which information technology can improve governance and reduce feelings of alienation among the governed. The most effective initiatives, the council observed, often arise from partnerships between government and the private sector."

Melissa Hathaway introduces the Cyber Readiness Index 1.0 at a Cisco press event in Sydney, Australia.

Cisco Photo

Paper - Science, Technology, and Public Policy Program, Belfer Center

Cyber Readiness Index 1.0

| November 8, 2013

The Cyber Readiness Index (CRI) examines thirty-five countries that have embraced ICT and the Internet and compares their maturity and commitment to protecting those investments using an initial objective assessment of where countries stand in cyber security in five areas.

Analysis & Opinions - Today's Zaman

Surveillance and American Liberty

| August 12, 2013

"American policy is not to steal intellectual property, while China's policy appears to be the opposite. At the same time, both governments constantly hack into each other's computers to steal traditional political and military secrets. Spying is not a violation of international law (though it often violates various domestic laws), but the US argues that theft of intellectual property violates both the spirit and letter of international trade agreements."

Analysis & Opinions - Centre for International Governance Innovation

Change the Conversation, Change the Venue and Change Our Future

| May 14, 2013

"The G20 has an opportunity to articulate a vision for shaping the Internet economy for the next five to 10 years. The power of the leadership of this body, combined with its ability to assemble and speak to a simple, positive narrative for cybersecurity anchored in our collective economic well-being (and GDP growth), could be a watershed event. The GDP erosion that all nations are suffering places cybersecurity within the legitimate processes and 'architecture' of international economic governance. By changing the conversation to being about the economy and growth, this approach would enable the G20 to de-escalate the militarization and balkanization of the Internet."

Book Chapter

Preliminary Considerations: On National Cyber Security

| December 2012

In this chapter, Melissa Hathaway and Alexander Klimburg introduce three conceptual tools to help focus the strategic context and debate. These are termed the "three dimensions," the "five mandates," and the "five dilemmas" of national cyber security. Each dimension, mandate and dilemma will play a varying role in each nation's attempt to formulate and execute a national cyber security strategy according to their specific conditions.

Book - Yale University Press

Captive Audience: The Telecom Industry and Monopoly Power in the New Gilded Age

| January 2013

This important book by leading telecommunications policy expert Susan Crawford explores why Americans are now paying much more but getting much less when it comes to high-speed Internet access. Using the 2011 merger between Comcast and NBC Universal as a lens, Crawford examines how we have created the biggest monopoly since the breakup of Standard Oil a century ago. In the clearest terms, this book explores how telecommunications monopolies have affected the daily lives of consumers and America's global economic standing.