Number of results to display per page
Search Results
262. The Diffusion of the Internet in China
- Author:
- William Foster and Seymour E. Goodman
- Publication Date:
- 11-2000
- Content Type:
- Working Paper
- Institution:
- Center for International Security and Cooperation
- Abstract:
- China and the United States share a new and rapidly expanding border—the Internet. It is a border that neither country fully understands. The possibility for misunderstanding is great because the Internet is not only transforming the relationship between the two countries, it is also transforming the countries themselves. It could be argued that China is going through the greater change. Unlike the past where information was mediated by the State, the mass media, and the work unit, Chinese citizens with Internet connections and a command of English have unprecedented direct and immediate access to information and people around the world. Because of abundance of Chinese language content, Chinese who can only read Chinese still have access to a wealth of information. The Chinese government has imposed its own unique regime on the networks in China that connect to the Internet. Though the United States and China both participate in the Internet, the regimes that they use to govern their networks are very different.
- Topic:
- Government and Science and Technology
- Political Geography:
- United States, China, and Asia
263. A Proposal for an International Convention on Cyber Crime and Terrorism
- Author:
- Seymour E. Goodman and Abraham D. Sofaer
- Publication Date:
- 08-2000
- Content Type:
- Working Paper
- Institution:
- Center for International Security and Cooperation
- Abstract:
- The information infrastructure is increasingly under attack by cyber criminals. The number, cost, and sophistication of attacks are increasing at alarming rates. Worldwide aggregate annual damage from attacks is now measured in billions of U.S. dollars. Attacks threaten the substantial and growing reliance of commerce, governments, and the public upon the information infrastructure to conduct business, carry messages, and process information. Most significant attacks are transnational by design, with victims throughout the world.
- Topic:
- Security, International Law, Science and Technology, and Terrorism
- Political Geography:
- United States
264. Civil Liberties in Cyberspace
- Author:
- Ekaterina A. Drozdova
- Publication Date:
- 08-2000
- Content Type:
- Working Paper
- Institution:
- Center for International Security and Cooperation
- Abstract:
- Societies are becoming more dependent on computer networks and therefore more vulnerable to cyber crime and terrorism. Measures to protect information systems are receiving increasing attention as the threat of attack grows and the nature of that threat is better understood. The primary purpose of this article is to determine what legal standards should govern the use of such measures and what nontechnical constraints are likely to be placed, or should be placed, on them. The article demonstrates that policing of computer networks poses a real threat to privacy, protection against self-incrimination and unwarranted searches and seizures, and the right to due process of law. Technological realities and the differences in national values and rules concerning the intrusiveness of law enforcement, protection of citizens' rights, and international cooperation can complicate the observance of these rights and allow misuse of systems set up for preventing, tracking, or punishing cyber crime. Another purpose of this article is to show that while technologies of crime and punishment are undergoing a rapid and profound evolution, the legal and normative principles discussed here will endure, because they are independent of specific technology. As such, they can provide a framework for building a global infrastructure and policy environment that can balance the needs for crime–free business, government, and personal communications, with the protection of property, privacy, and civil liberties. The article concludes that ensuring civil liberties in the course of legal and technological cooperation against cyber attacks is essential.
- Topic:
- Security, Human Rights, International Law, and Science and Technology
- Political Geography:
- United States
265. Managing the Global Nuclear Materials Threat: Policy Recommendations
- Author:
- Sam Nunn and Robert E. Ebel
- Publication Date:
- 01-2000
- Content Type:
- Working Paper
- Institution:
- Center for Strategic and International Studies
- Abstract:
- Despite the end of the Cold War, nuclear weapons continue to pose the most devastating security threat to Americans. Although the risk of a nuclear war destroying civilization has virtually disappeared, the risk that a single nuclear weapon might be used to destroy a major city has increased, particularly given the erosion of control over nuclear material with the collapse of the Soviet Union. Nothing could be more central to international security than ensuring that the essential ingredients of nuclear weapons do not fall into the hands of terrorists or proliferant states. Effective controls over nuclear warheads and the nuclear materials needed to make them are essential to the future of the entire global effort to reduce nuclear arms and stem their spread. At the same time, ensuring protection of public health and the environment in the management of all nuclear materials—from nuclear weapons to nuclear wastes—remains a critical priority. Appropriate management of both safety and security worldwide will be essential to maintaining nuclear fission as an expandable option for supplying the world's greenhouse-constrained energy needs in the twenty-first century.
- Topic:
- Security, Energy Policy, Nuclear Weapons, and Science and Technology
- Political Geography:
- United States and Soviet Union
266. Emerging Threats on the Internet
- Author:
- Mariyam Joyce-Hasham
- Publication Date:
- 07-2000
- Content Type:
- Policy Brief
- Institution:
- Chatham House
- Abstract:
- Fears about extremist groups operating on the Internet are on the increase. This is paralleled by concern about the ways in which such groups can use Internet technology to disrupt or undermine familiar ways of life in stable societies. The Internet appeals particularly to groups that operate at substate level, most visibly the neo-Nazis and hate groups at the forefront of the resurgent white pride movement in America.
- Topic:
- Security and Science and Technology
- Political Geography:
- United States and America
267. Reinventing The Climate Negotiations: An Analysis of COP6
- Author:
- Christian Egenhofer and Jan Cornillie
- Publication Date:
- 04-1999
- Content Type:
- Policy Brief
- Institution:
- Centre for European Policy Studies
- Abstract:
- With the cancellation of the Oslo ministerial mini-summit, the prospects for an early entry into force of the Kyoto Protocol are rapidly fading. Even if the US agrees to an outcome at a resumed COPbis in July, continued Congressional opposition and unresolved questions concerning the developing countries' commitments make US ratification highly implausible.
- Topic:
- Environment, International Law, and Science and Technology
- Political Geography:
- United States
268. The Internet and Global Telecommunications: Exploring the Boundaries of International Coordination
- Author:
- Michael J. Kleeman
- Publication Date:
- 01-1999
- Content Type:
- Working Paper
- Institution:
- Aspen Institute
- Abstract:
- The Internet is a driving force in global communications and commerce; as such, issues related to its governance and growth have broad implications that reach beyond those of traditional telecommunications services or networks. Unlike prior communications networks that carried primarily voice traffic, the Internet collects and distributes content and facilitates global and local/national commerce— which raises two types of questions: What purposes does the network serve for users? What barriers prevent or constrain such use?
- Topic:
- Industrial Policy and Science and Technology
- Political Geography:
- United States
269. Toward Sustainable Competition in Global Telecommunications: From Principle to Practice
- Author:
- William J. Drake
- Publication Date:
- 01-1999
- Content Type:
- Working Paper
- Institution:
- Aspen Institute
- Abstract:
- Many observers consider 1998 to be a watershed year in the evolution of the global telecommunications industry. This view is based on the fact that two major changes in the international policy landscape have begun to clear away many longstanding barriers to competition in global networks and services.
- Topic:
- Industrial Policy and Science and Technology
- Political Geography:
- United States
270. Media Madness: The Revolution So Far
- Author:
- David Bollier and Max Frankel
- Publication Date:
- 01-1999
- Content Type:
- Working Paper
- Institution:
- Aspen Institute
- Abstract:
- Henry, for that generous introduction. I am proud to bear the title of Catto Fellow and if I were allowed to recite your biography as you have recited mine, you would know the source of my great pride. But like Harry Evans in a similar recent situation, (and now also his wife, Tina Brown), I am reminded of the New Yorker cartoon showing a partygoer being introduced at a cocktail party while enduring the urgent plea of a spouse: “Tell them who you WERE, dear. Tell them who you WERE!” I have to emphasize who I once was not only because I have retired from executive duties but also because the Revolution that I have come to discuss often regards me as passé, out of date, an expiring person of print—you know, that dying industry. That may be so. But the revolutionary “new” media are exhausting themselves parading their newness while actually betraying highly familiar symptoms of a very old media disease. We are all mad: just not newly mad.
- Topic:
- Industrial Policy and Science and Technology
- Political Geography:
- United States and New York