INFORMATION AND COMMUNICATIONS TECHNOLOGY
Magazine or Newspaper Article (continued)
September 28, 2011
Magazine or Newspaper Article, GovInfoSecurity.com
By Melissa Hathaway, Senior Advisor, Project on Technology, Security, and Conflict in the Cyber Age
"If Congress focuses its efforts on the areas where members appear to agree reform is needed, then it is possible that a cybersecurity bill will finally become a law. The proposals, if adopted, will make incremental change and a small difference in our cybersecurity posture. Bolder steps are needed but are unlikely to be taken given the combination of this fiscally constrained environment, politically divided Congress and the upcoming presidential election cycle."
Magazine or Newspaper Article, Bulletin of the American Academy of Arts and Sciences, issue 3, volume LXIV
"The conventional wisdom among those who looked at the Middle East used to be that you had a choice either of supporting the autocrat or being stuck with the religious extremists. The extraordinary diffusion of information created in Egypt and other Middle Eastern countries reveals a strong middle that we weren't fully aware of. What is more, new technologies allow this new middle to coordinate in ways unseen before Twitter, Facebook, and so forth, and this could lead to a very different politics of the Middle East. This introduces a new complexity to our government's dealings with the region."
February 2, 2008
Magazine or Newspaper Article, that's China
By Jing Zhang and Calestous Juma, Professor of the Practice of International Development; Director, Science, Technology, and Globalization Project; Principal Investigator, Agricultural Innovation in Africa
China's Ministry of Science and Technology launched the China-Africa Science and Technology Partnership on November 24, 2009. The ministry announced that technological cooperation will be enhanced in areas such as water management and conservation, sanitation, crop breeding, health, and renewable energy. One hundred joint research partnerships will be created, and 100 African scientists at the postdoctoral level will have the opportunity to conduct research at China's technology parks, research institutes, and private enterprises. Chinese scientists and engineers will also travel to African countries to provide technical guidance, and in order to increase the research capacities of African countries, China will also donate laboratory equipment.
Science, Technology, and Globalization Project Director Calestous Juma shared his insights into the history and future of Sino-African relations in a February 2008 interview with that's China columnist Jing Zhang.
December 19, 2005
Magazine or Newspaper Article, The New Republic, issue 4,744, volume 233
By Daniel B. Prieto, Former Research Fellow, Belfer Center for Science and International Affairs; Former Research Director of the Homeland Security Partnership Initiative, 2004-2005
"Other proposed solutions that seek to give consumers greater control over the use and sharing of their information-akin to the data privacy rules in Europe-are also problematic. To begin with, the number of organizations already in possession of our data is huge, and, for the most part, we gave it to them willingly. So such an approach is really a rear-guard measure. Like it or not, the level of interest by companies and the government to use our personal data for business, marketing, and national security purposes is enormous, legitimate, and, in many ways, desirable. Given the commercial and government interests at stake, significant restrictions on data use in the United States are unlikely."
March 5, 2013
By Ryan Ellis, Postdoctoral Research Fellow, Science, Technology, and Public Policy Program/Project on Technology, Security, and Conflict in the Cyber Age
Dr. Ellis raises an interesting question: Does the pursuit of offensive cyber capabilities undermine domestic security? The conversation highlights a growing area of concern and ongoing debate.
January 30, 2012
Alec Ross, Senior Advisor for Innovation to Hillary Clinton, met with Future of Diplomacy Project Executive Director Cathryn Cluver in January 2012 for a conversation on his efforts to engage the State Department with 21st century innovations.
November 15, 2011
By Chris Dede, Faculty Affiliate, Project on Technology, Security, and Conflict in the Cyber Age and Susan M. Lynch, Program Assistant, International Security Program; Web Manager, Science, Technology, and Public Policy Program
ICTPP Faculty Affiliate and Harvard Graduate School of Education Professor Chris Dede convened the Wireless Education Technology Conference 2011 in Washington, D.C., on October 20–21, 2011. Its focus: the major issues that must be resolved to realize the full potential of mobile broadband for learning.
March 25, 2011
By Tolu Odumosu, Postdoctoral Research Fellow, Science, Technology, and Public Policy Program/Project on Technology, Security, and Conflict in the Cyber Age
The Communications & Internet Policy panel had a far ranging discussion at Harvard Kennedy School's September 2010 Technology & Governance 2.0 conference on the pressing policy challenges in the Information and Communications Technology space, Topics covered include, IPV4 to IPV6 challenge, competitive pressures in cable vs. fiber optics, Internet Governance, and the problems of Internet advertising.
October 11, 2012
By Krysten Hartman, Program Coordinator, Middle East Initiative
An audio recording and summary of Dr. Shafeeq Ghabra's lecture at Harvard Kennedy School on September 24.
By Sharon Wilke, Associate Director of Communications
The Spring 2013 issue of the Belfer Center newsletter features recent and upcoming activities, research, and analysis by members of the Center community on critical global issues. This edition highlights the Belfer Center’s deepening engagement with China.