Economics & Global Affairs

15 Items

Paper - Potomac Institute for Policy Studies

Cyber Readiness Index 2.0

    Authors:
  • Chris Demchak
  • Jason Kerben
  • Jennifer McArdle
  • Francesca Spidalieri
| November 30, 2015

"Building on CRI 1.0, Cyber Readiness Index 2.0 examines one hundred twenty-five countries that have embraced, or are starting to embrace, ICT and the Internet and then applies an objective methodology to evaluate each country's maturity and commitment to cyber security across seven essential elements."

HQ of Underwriters Laboratories Inc. in Northbrook, Ill., Sept. 24, 2009. UL's stamp of approval ensures that consumers are knowledgeable and testing is done. There is no such lab or certification process for Internet-connected devices.

Wikimedia CC

Journal Article - Georgetown Journal of International Affairs

Taking Control of Our Cyber Future

| July 25, 2014

In our current state of cybersecurity, breach, crime, disruption, and destruction are growing in unacceptable ways. Key indicators suggest that we are not making enough progress and in fact, are possibly going backwards. This paper proposed four actions to start taking right now.

Melissa Hathaway introduces the Cyber Readiness Index 1.0 at a Cisco press event in Sydney, Australia.

Cisco Photo

Paper - Science, Technology, and Public Policy Program, Belfer Center

Cyber Readiness Index 1.0

| November 8, 2013

The Cyber Readiness Index (CRI) examines thirty-five countries that have embraced ICT and the Internet and compares their maturity and commitment to protecting those investments using an initial objective assessment of where countries stand in cyber security in five areas.

Analysis & Opinions - Today's Zaman

Surveillance and American Liberty

| August 12, 2013

"American policy is not to steal intellectual property, while China's policy appears to be the opposite. At the same time, both governments constantly hack into each other's computers to steal traditional political and military secrets. Spying is not a violation of international law (though it often violates various domestic laws), but the US argues that theft of intellectual property violates both the spirit and letter of international trade agreements."

Analysis & Opinions - Centre for International Governance Innovation

Change the Conversation, Change the Venue and Change Our Future

| May 14, 2013

"The G20 has an opportunity to articulate a vision for shaping the Internet economy for the next five to 10 years. The power of the leadership of this body, combined with its ability to assemble and speak to a simple, positive narrative for cybersecurity anchored in our collective economic well-being (and GDP growth), could be a watershed event. The GDP erosion that all nations are suffering places cybersecurity within the legitimate processes and 'architecture' of international economic governance. By changing the conversation to being about the economy and growth, this approach would enable the G20 to de-escalate the militarization and balkanization of the Internet."

Book Chapter

Preliminary Considerations: On National Cyber Security

| December 2012

In this chapter, Melissa Hathaway and Alexander Klimburg introduce three conceptual tools to help focus the strategic context and debate. These are termed the "three dimensions," the "five mandates," and the "five dilemmas" of national cyber security. Each dimension, mandate and dilemma will play a varying role in each nation's attempt to formulate and execute a national cyber security strategy according to their specific conditions.

Report - Center for Strategic and International Studies

The U.S.-Japan Alliance: Anchoring Stability in Asia

| August 2012

The following report presents a consensus view of the members of a bipartisan study group on the U.S.-Japan alliance. The report specifically addresses energy, economics and global trade, relations with neighbors, and security-related issues. Within these areas, the study group offers policy recommendations for Japan and the United States, which span near- and long-term time frames. These recommendations are intended to bolster the alliance as a force for peace, stability, and prosperity in the Asia-Pacific region and beyond.

Book Chapter

Falling Prey to Cybercrime: Implications for Business and the Economy

| February 2012

As American businesses, inventors, and artists market, sell, and distribute their products worldwide via the Internet, the threat from criminals and criminal organizations who want to profit illegally from their hard work grows. The threat from other nations wanting to jump start their industries without making the intellectual investment is even more disturbing. This fleecing of America must stop. We can no longer afford complacency and silence—we must find and use as many market levers as possible to change the path we are on.

A Pakistani Internet user surfs the YouTube Web site at a local Internet cafe in Islamabad, Pakistan, Feb. 26, 2008. Pakistan defended its clampdown on the YouTube Web site which accidentally interrupted access for Internet users around the globe.

AP Photo

Paper - Munk School of Global Affairs, University of Toronto

Duties for Internet Service Providers

| March 2012

In today's interconnected world, the Internet is no longer a tool. Rather, it is a service that helps generate income and employment, provides access to business and information, enables e-learning, and facilitates government activities. It is an essential service that has been integrated into every part of our society. Our experience begins when an Internet Service Provider (ISP) uses fixed telephony (plain old telephone service), mobile-cellular telephony, or fixed fiber-optic or broadband service to connect us to the global network. From that moment on, the ISP shoulders the responsibility for the instantaneous, reliable, and secure movement of our data over the Internet.